Presentation is loading. Please wait.

Presentation is loading. Please wait.

Looking Forward Chapter 12 Copyright 2001 Prentice Hall Revision 2: May 2001.

Similar presentations


Presentation on theme: "Looking Forward Chapter 12 Copyright 2001 Prentice Hall Revision 2: May 2001."— Presentation transcript:

1 Looking Forward Chapter 12 Copyright 2001 Prentice Hall Revision 2: May 2001

2 Budgeting and Procurement Planning how to spend money Selecting and purchasing technologies and services

3 3 The Budget Realities Exploding demand but stagnant or slowly- growing budgets Must buy only what you really need in every system Time Demand Budget

4 4 Costs Total Purchase Costs Base price misleading due to absence of needed options Must cost out total purchase cost of fully configured system Initial Installation Cost The purchased product or service Labor needed to implement  Central staff labor  User labor, including training costs  Losses due to implementation disruptions

5 5 Costs Ongoing Costs over Life Span Often exceed initial costs  Labor  Upgrades Especially high in immature products  When possible, avoid the “bleeding edge”

6 6 The Timing of Costs and Benefits Discounting Money can be invested (I.e. opportunity cost)  If the investment rate is 20%, then  $1 invested today will bring $1.20 next year  So $1 received today is worth $1.20 received next year  Or, $1.20 received next year is worth $1 today  Or, $1 received next year is worth only $0.80 today

7 7 The Timing of Costs and Benefits When Costs and Benefits Come Over Time Hurdle rate: minimum rate of return expected by a corporation for investments  Often around 20% If the hurdle rate is i then  Money received or spent a year from now should be discounted (divided) by (1+i)  Money received or spent n years from now should be discounted (divided) by (1+i) n

8 8 The Timing of Costs and Benefits Discounted Cash Flow Example (i=20%) Net Present Value (NPV) = 3,639 (sum of annual present values) This YearNext YearYear After Cash Flow In2,0003,0004,000 Cash Flow Out1,0001,5002,000 Net Cash Flow1,0001,5002,000 Discount Ratio11.21.44 Present Value1,0001,2501,389

9 9 Procurement User Needs Must drive everything else Sometimes difficult to assess But the only way to drive evaluations of alternatives

10 10 Procurement Request for Proposals (RFP) Call for proposals to bid on the project Specifies what should be provided RFP will form the basis for resolving subsequent contract disputes  Must be very detailed  A legal document If something is left out, negotiating for it after the contract is signed will be done at the contractor’s advantage

11 11 Procurement Proposals Several companies are likely to submit proposals These proposals must be evaluated so that you can select the best one You must lay out your evaluation criteria in the RFP and follow them in selection, or you can be sued by a loser

12 12 Procurement Evaluating Proposals with Multicriteria Decision Making First, you must have specific criteria  For instance, price, performance, and reliability  Same criteria must be applied to each proposal Second, you must give a weight (importance) to each  Often of 5-point or 10-point scale  Same weights must be applied to each proposal

13 13 Procurement Evaluating Proposals with Multicriteria Decision Making Third, you must evaluate each proposal on each criteria  Perhaps on scale of 1 to 10 or some other scale  Score on each criterion will be different for each proposal

14 14 Procurement Evaluating Proposals with Multicriteria Decision Making Fourth, do the arithmetic for each proposal Highest total score should win Proposal AScoreWeightProduct Price10550 Performance6848 Reliability5420 118Total Score

15 15 Procurement Evaluating Proposals with Multicriteria Decision Making Example: a different proposal Same criteria & weights, different scores, total score Proposal BScoreWeightProduct Price8540 Performance7856 Reliability8432 128Total Score

16 16 Procurement Negotiating before contractor selection Often, negotiate with a few highly-rated proposers before selection for better terms Proposers present their Best and Final Offers Ongoing Monitoring Must monitor ongoing work to ensure compliance Renegotiating During Performance Sometimes must renegotiate during work; Bad because buyer is at a disadvantage in negotiations

17 17 Types of Servers Small Servers Usually are PCs Need a PC Server Operating System (SOS) such as Microsoft Windows Server, Novell NetWare, LINUX Large Servers Usually use Workstation Servers Usually run UNIX

18 18 Symmetric Multiprocessing (SMP) PC or workstation can have multiple microprocessors Work is shared among the microprocessors through symmetric multiprocessing (SMP) to increase overall speed However, if you have N microprocessors, your server is not N times faster than a single- microprocessor server because of problems in assigning work evenly

19 19 RAID Redundant Array of Inexpensive (or Independent) Drives RAID controller controls multiple small inexpensive disk drives Reads and writes in parallel for higher speed despite low-cost drives Information usually is stored redundantly If one disk fails, lose no information Drives may even be hot-swappable  Do not have to turn off computer to replace

20 20 Server Farms In large sites, one server is not enough Have several, even hundreds of servers Called a server farm Many PC servers may be more cost- effective than fewer workstation servers Server Farm

21 21 Server Farms Load Balancing Approach Router or other device sends requests to servers based on load

22 22 Server Farms Server Clustering Approach Act as a single server without an external load balancer

23 23 Server Farms Reliability If one server’s hardware fails, operation continues without interruption However, software failures often take down all servers simultaneously

24 24 Server Configuration When Server Operating System is Installed, it Must be Configured Complex task with many steps, many of which require you to have conceptual knowledge Requires training Valuable skill

25 25 Ongoing Work Server Systems Administration is Labor- Intensive on a Continuing Basis Assisting users Adding/dropping Users Assigning and changing rights for users Data backup Upgrading and repairing servers Adding & maintaining application programs …

26 26 Network Management System The Concept From a central computer, network administrator can manage entire network  Collect data  Give commands Moving gradually toward this ideal Data Command

27 27 Network Management System Standards Most widely used is the Simple Network Management Protocol (SNMP) Other standards exist SNMP

28 28 Network Management System The Manager Software on network administrator's computer Short for “network management software” Implements network management support Managed Nodes Routers, client PCs, etc. that are managed Manager Managed Node

29 29 Network Management System Agents Network management agents Installed in managed nodes Communicate with the manager on behalf of the node ManagerAgent Managed Node

30 30 Network Management System RMON Probes Remote MONitoring SNMP only Special type of agent Collects data on a LAN’s traffic: packet sizes, error rates, etc. Manager LAN RMON Probe

31 31 Network Management System Objects Managed nodes have several objects that are managed Example: Client PC, one object might be status of TCP connection to particular server another may be status of router port A managed node may have several “instances” of some objects; For instance, a router may have several ports Agent OBJ

32 32 Network Management System Management Information Base (MIB) Stores collected information Schema  The overall design  Entities (objects) and attributes  Object-oriented database The actual stored information Confusingly, “MIB” is used to refer both to the schema and the actual data MIB

33 33 Network Management System Management Information Base (MIB) Full MIB is stored on the central administration computer Relevant portion of the MIB is also stored by each Agent ManagerAgent MIB

34 34 Network Management Protocol Network management protocol standardizes Communication between manager and agent Defines the schema of the MIB Most popular is the Internet Engineering’s Simple Network Management Protocol (SNMP) There are others

35 35 Network Management Protocol SNMP Requests and Responses Manager sends requests  Get: give me data  Set: change your setting (e.g., turn off Port 1) Agent sends back responses  The information  Confirmation or reason for rejection ManagerAgent MIB Get or Set Request Response

36 36 Network Management Protocol SNMP Traps Sometimes, agent can send a message without a prior manager request Message is called a trap in SNMP For instance, if the agent senses a problem ManagerAgent MIB Trap

37 37 Directory Servers Information is Organized Hierarchically Hierarchy of objects X.500 Standard defines types of objects and their properties Organization (O) = xxx Organizational Unit (OU) = yyy Employee (E) = zzz Common Name (CN)=Pat Lee E-Mail (EM)=Lee Digital Certificate (DC)= Password (PW)=$^%@&

38 38 Directory Servers LDAP Lightweight Directory Access Protocol Most popular directory access protocol Governs user interaction with directory server Directory Server LDAP

39 39 Directory Server Products Novell Directory Services (NDS) From Novell Book incorrectly calls it NetWare Directory Services Mature, widely used Active Directory From Microsoft New

40 40 Directory Servers and Security Directory Server can store data and policies for security servers Digital certificates Passwords Policies Centralizes management and control

41 41 Converging Boxes Today, Many Types of Devices Forwarding: Hubs, Switches, Routers Security: Firewalls, etc. Difficult to Manage Difficult to Integrate Forwarding and Security

42 42 Converging Boxes Comprehensive Relay Devices are Needed Combine both forwarding and security Easier management Easier integration of forwarding, security CRD

43 43 Converging Boxes Multi-Layer Packet Analysis Comprehensive relay devices will analyze headers and data fields at all layers For intelligent forwarding, like Layer 4 switches For intelligent security, like firewalls This will reduce costs compared to having separate devices

44 44 Converging Boxes Processing Concerns Multi-layer forwarding will be processing intensive So will be multi-layer security Processors must grow in power to keep up with increasing demand plus multi-layer processing and security

45 45 Policy Based Networking Policy Servers will Store Policies and Related Data Will control individual forwarding, security, and comprehensive relay devices Uniformity in policy implementation CRD Policy Policy Server

46 46 Policy Based Networking COPS Common Open Policy Service Standardized way for policy servers to talk with devices for which they set policy CRD COPS Policy Server

47 47 Wireless Communication Site Wireless Networking 802.11 For large site networks with many stations Bluetooth For a few devices close to one another Personal area networking May Interfere with Each Other if Both are Implemented

48 48 Wireless Communication Metropolitan Wireless Networking For an urban area Exists now, but slow (around 9,600 bps) Soon 100 kbps 3d Generation (3G) wireless service up to 2 Mbps Satellite Wireless Networking Megabit speeds anywhere

49 49 Wireless Communication Cellular Systems Service area is broken up into several small areas called cells Within each cell, there is a cellsite that transmits to and receives from cellular devices Cellsite

50 50 Wireless Communication Cellular Systems Channel reuse. Channels can be reused in non-adjacent cells  Very important due to limited available frequencies  Serves more subscriber with the same amount of frequency spectrum No Yes No Yes No Yes No Uses Channel 232 Can Reuse Ch. 232? Channel 232 Used in 4 cells

51 51 Wireless Communication The Wireless Revolution New freedom for users Anything, anytime, anywhere Likely to spawn new applications

52 52 Really Personal Computing Both Desktop PCs and Notebook PCs are Large This limits their portability Many Future Access Devices Will be Smaller Personal digital assistants (PDAs) Cellphones

53 53 Cellphone Access Cellphones will be Very Popular for Internet Access Cellphones are very widespread  In Japan, the number of cellphones passed the number of wired phones in early 2000  This is happening in other countries as well  The U.S. is somewhat behind because it did not settle on the world cellphone standard, GSM

54 54 Cellphone Access Starting to have small displays capable of showing a few lines of data Good for short messages (Short Message Service or SMS) Good for restricted Internet access Text only A few short lines only

55 55 Cellphone Access Wireless Access Protocol (WAP) Emerging standard for cellphone web access Also for other small devices, such as personal digital assistants (PDAs) Competition from i-mode technology created and popularized in Japan

56 56 Cellphone Access Wireless Markup Language (WML) Part of WAP Way of formatting webpages for small displays Simpler than HTML Reformatting may be expensive

57 57 Cellphone Access Wireless Access Protocol (WAP) Device will communicate over the Internet with WAP server via WAP protocols rather than with webservers directly Wireless Carrier WAP Protocols WAP Protocols WAP Server

58 58 Cellphone Access Wireless Access Protocol (WAP) WAP server may get content from full webserver using full webservice protocols (HTTP, TCP), probably translating webpages to WML Wireless Carrier WAP Server Webservice Protocols Full Webserver

59 59 Network Object-Oriented Processing Traditional Object-Oriented Programming Programs consist of many objects (forms, buttons, etc.) Objects send messages to one another to ask others to do certain tasks by executing methods OBJ Message Application

60 60 Network Object-Oriented Processing Network Object-Oriented Programming (NOOP) Objects can run on multiple machines Still communicate by sending messages NOOP takes advantage of available capacity on computers on the network If computer has idle capacity, it will be sent objects OBJ Message

61 61 Network Object-Oriented Processing NOOP Standards are Needed for Object- Object Communication Microsoft’s standard is DCOM CORBA is a competing consortium standard OBJ

62 62 The Changing Internet Today’s Internet Speed too low Delays (Latencies) are too long Reliability is too slow Need a “Business Class Internet” Faster Lower Latency High reliability Two Classes of Service? Regular versus Business Class? Haves versus Have-Nots?

63 63 The Next Big Thing The PC Revolution of the 1980s was not anticipated The Internet Revolution of the 1990s was not anticipated Will the future simply be an extension of the past, or will there be a Next Big Thing?


Download ppt "Looking Forward Chapter 12 Copyright 2001 Prentice Hall Revision 2: May 2001."

Similar presentations


Ads by Google