1 is 8950 managing network infrastructure and operations
TRANSCRIPT
![Page 1: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/1.jpg)
1
IS 8950
Managing Network Infrastructure and Operations
![Page 2: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/2.jpg)
2
Understanding Internetworking Infrastructure
![Page 3: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/3.jpg)
3
Background
• 75% of all IT dollars go to infrastructure• IT infrastructure lies at the heart of most
companies’ operating capabilities• IT infrastructure is vital; no longer is it nice to
have or just value-adding.• Internetworking technologies provide a low-cost
way to connect virtually everyone on the same network
• The rise of internetworking technologies offers new possibilities for addressing business computing needs
![Page 4: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/4.jpg)
4
A G rap h ica l R ep resen tation o f M oore’s L aw
C hapter 5 F igu re 5 -1
M o o re 's L aw
0
2 00 0
4 00 0
6 00 0
8 00 0
1 00 0 0
1 20 0 0
1 40 0 0
1 60 0 0
1 97 0 1 97 5 1 98 0 1 98 5 1 99 0 1 99 5 2 00 0
Yea r
Tran
sist
ors
per C
hip
A dap ted b y au th or from M icroprocessor R eport 9(6), M ay 1995 and “C h ipL ist 9 .9 .5 ,” b y A ad O fferm an , Ju ly 1998 .
S ource: A pp lega te, L ynda M ., R obert D . A ustin , and F . W arren M cF arlan , C orpora te In form ation S tra tegy and M anagem ent . B urr R idge, IL : M cG raw -H ill/Irw in , 2002 .
![Page 5: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/5.jpg)
5
The Evolution of Corporate IT Infrastructure
Chapter 5 Figure 5-2
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
![Page 6: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/6.jpg)
6
The Drivers of Change: Better Chips, Bigger Pipes
• PCs made computing available to a wide variety of non-technical users
• Web made network resources (such as distant databases) and capabilities (such as over-the-Net collaboration) accessible
• Metcalfe’s law: “The usefulness of a network increases with the square of the number of users connected to the network”
• Powerful chips and large communication “pipes”, both at low cost, fueled a process that would lead to qualitatively different computing infrastructure
![Page 7: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/7.jpg)
7
C hapter 5 F igure 5 -3
A G raph ical R epresentation of M etcalfe’s L aw
M etca lfe 's L aw
0200400600800
10001200140016001800
0 10 20 30 40
N u m b er o f U sers C o n n ected to th e N etw o rk
Valu
e of
Net
wor
k
Source: A pplegate, L ynda M ., R obert D . A ustin , and F . W arren M cF arlan , C orporate In form ation S trategy and M anagem ent. B urr R idge, IL : M cG raw -H ill/Irw in , 2002 .
![Page 8: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/8.jpg)
8
T h e B a n d w id th E x p lo s io n
C ha p te r 5 F ig ure 5 -4
N e tw o rk B a n d w id th G ro w th
1 9 6 0 -1 9 9 0
1 9 9 0 -1 9 9 4
1 9 9 4 -1 9 9 6
1 9 9 6 -1 9 9 7
1 9 9 7 -1 9 9 8
1 9 9 9 -2 0 0 0
2 0 0 1 +
In c r e a s in g N e tw o r k B a n d w id th
M a s s W W W a d o p tio n , g ra p h ic in te n s ive , in s ta n t m e s s a g in g
M a s s e -m a i l a d o p tio n , b a s ic W W W s i te s
L a rg e fi le tra n s fe r , e -m a i l
F i le tra n s fe r
S tre a m in g a u d io a n d vid e o , a d va n c e d e -c o m m e rc e , l ive s to c k q u o te s , 1 ,0 0 0 M B p s
L ive a u d io a n d vid e o s tre a m in g e ve n ts , d ig i ta l c o m m e rc e , In te rn e t ra d io a n d te le vis io n , vio c e c h a t a p p l ic a tio n s
T ru e vo ic e -o ve r- IP te le p h o n y, h ig h re s o lu tio n In te rn e t te le vis io n , m u s ic a n d m o vie s o n d e m a n d , vi r tu a l w o rk p la c e s , b ro a d b a n d w ire le s s
S o urc e : A d a p te d fro m : h ttp :/ /w w w . sta n fo rd .e d u / ~ yz a ro lia /C ha lle n ge s. h t m
![Page 9: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/9.jpg)
9
Basic components of internetworking infrastructure
• Network– The medium and supporting technologies (hardware
and software)
• Processing systems– HW and SW that provides an organization’s ability to
handle business transactions
• Facilities– The physical systems that house and protect
computing and network devices
![Page 10: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/10.jpg)
10
C hapter 5 T able 5 -1
F undam ental C om ponents of Internetw orking Infrastructure
Core Technologies Key Management Issues Network Fiber optics, cable systems, DSL,
satellite, w ireless, Internetworking hardware (routers, sw itches, firewalls), content delivery softw are, identity and policy management, net monitoring
How to select technologies and standards
How to select partners How to manage partner relationships How to assure reliability How to maintain security
Processing Systems
Transaction software (enterprise systems offered by companies such as SA P or Oracle; or more targeted solutions offered by companies such as Trilogy and i2), servers, server appliances, client devices (PCs, handhelds)
W hat to keep internal and what to outsource
How to deploy, grow, and modify Enterprise system or best-of-breed
hybrid? Relationships w ith legacies How to manage incidents How to recover after a “disaster”
Facilities Corporate data centers, collocation
data centers, managed serv ices data centers, data closets
Internal or external management? Choosing a facilities model suited to
your company How to assure reliability How to maintain security
Source: A pplegate, L ynda M ., R obert D . A ustin , and F . W arren M cF arlan , C orporate In form ation Strategy and M anagem ent . B urr R idge, IL : M cG raw -H ill/Irw in, 2002.
![Page 11: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/11.jpg)
11
Chapter 5 Figure 5-5
A Simple LAN
Hub
Laptop
Laptop Workstation
Workstation
Workstation Printer
Printer
Server
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
![Page 12: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/12.jpg)
12
Technological elements of networks
• Local Area Networks (LANs)• Hubs, Switches, and Network Adapters• Wide Area Networks (WANs)• Routers, the means by which messages are
relayed across large distances • Firewalls and other security systems and devices• Caching, content acceleration, and other
specialized network devices
![Page 13: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/13.jpg)
13
Chapter 5 Figure 5-6
An Example of a WAN
Backup Frame Relay Network
Frame Relay Provider Network
Backup Frame Relay Network
Backup Frame Relay Network
ProductionPlant
Corporate
ProductionPlant
Remote
Remote
Remote
Backup Frame Relay NetworkBackup Frame Relay Network
Frame Relay Provider Network
Frame Relay Provider Network
Backup Frame Relay NetworkBackup Frame Relay Network
Backup Frame Relay NetworkBackup Frame Relay Network
ProductionPlant
Corporate
ProductionPlant
Remote
Remote
Remote
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
![Page 14: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/14.jpg)
14
Technological elements of processing systems
• Client devices and systems: PCs, handheld devices, cell phones, and even automotive components
• Server devices and systems• Mainframe devices and systems• Middleware: enabling utilities, message handling
and queuing systems, protocols, standards, software tool kits, etc.
• Infrastructure management system• Business applications
![Page 15: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/15.jpg)
15
Servers in a Typical E-Commerce Configuration
Chapter 5 Figure 5-7
iPremier Co Cage
To Public Internet
D
UPPER LOWER NORMA
InternetRouter
Router- Cust A
Router- Cust B
Router- Cust ...
VPN Cust B
VPN Cust ...
Router Firewall
Web Server Cluster
Database Server
SD
SD
SMTP/POPServer
SD
DNS Servers
Ethernet Switch
SD
Web Accelerator
Router to HO
T1
SD
NetworkManagement
Ethernet Switches
Qdata Facility
DIAGRAM SIMPLIFIED FOR ILLUSTRATION PURPOSES
VPN Cust A
VPN iPremier Company
Qdata Private Network
SD
Network Management
SD
SD
Big Iron
Source : Austin, Robert D.; Leibrock, Larry; Murray, Alan, “The iPremier Company: Denial of Service Attack (A),” Harvard Business School Case No. 601-114.
![Page 16: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/16.jpg)
16
Technological elements of facilities
• Buildings and physical spaces
• Network conduits and connections
• Power: UPSs, backup generators, etc.
• Environmental controls
• Security
![Page 17: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/17.jpg)
17
Chapter 5 Figure 5-8
A Modern Data Center
Source: Allegiance Telecom
![Page 18: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/18.jpg)
18
Operational characteristics of internetworks
• Internetworking technologies are based on open standards
• Internetworking technologies operate asynchronously
• Internetwork communications have inherent latency
• Internetworking technologies are naturally decentralized
• Internetworking technologies are scalable
![Page 19: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/19.jpg)
19
Emergence of real-time infrastructure
• Better data, better decision
• Improved process visibility
• Improved process efficiency
• From make-and-sell to sense-and-respond
![Page 20: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/20.jpg)
20
W a k e - U p C a l l : D e n i a l o f S e r v i c e A t t a c k s i n F e b r u a r y 2 0 0 0
C h a p t e r 5 T a b l e 5 - 4
a O v e r a l l p e r f o r m a n c e o f t h e I n t e r n e t d e g r a d e d b y a s m u c h a s 2 5 % d u r i n g t h e p e a k o f t h e a t t a c k s a s c o m p u t e r s r e - s e n t m e s s a g e s r e p e a t e d l y a n d a u t o m a t i c a l l y , t r y i n g t o r e c o v e r i n t e r r u p t e d t r a n s a c t i o n s .
S o u r c e : A d a p t e d f r o m : N e t w o r k W o r l d F u s i o n , w w w . n f u s i o n . c o m , c o m p l i e d b y L e G r a n d E l e b a s h .
D a t e T a r g e t C o m p a n y R e s u l t s o f A t t a c k F e b r u a r y 7 Y a h o o O v e r w h e l m i n g s p i k e i n t r a f f i c t h a t l a s t e d
3 h o u r s . N e t w o r k a v a i l a b i l i t y d r o p p e d f r o m 9 8 %
t o 0 % . A t t a c k o r i g i n a t e d f r o m 5 0 d i f f e r e n t
l o c a t i o n s a n d w a s t i m e d t o o c c u r d u r i n g m i d d l e o f b u s i n e s s d a y .
S t o c k w a s d o w n 3 . 2 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 % .
F e b r u a r y 8 B u y . c o m A t t a c k o c c u r r e d w i t h i n a n h o u r o f t h e c o m p a n y ’s I n i t i a l P u b l i c O f f e r i n g ( I P O ) .
S t o c k w a s d o w n a t w e e k ’ s e n d m o r e t h a n 2 0 % f r o m I P O p r i c e .
E b a y S t o c k w a s d o w n 7 . 3 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 % .
C N N . c o m S e r v i c e d i s r u p t e d F e b r u a r y 9 E * T r a d e A t t a c k e d d u r i n g p e a k t r a d i n g h o u r s .
S t o c k w a s d o w n 7 . 6 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 % .
Z D N e t S e r v i c e d i s r u p t e d F e b r u a r y 1 8 F e d e r a l B u r e a u o f I n v e s t i g a t i o n
( F B I )
S e r v i c e d i s r u p t e d .
F e b r u a r y 2 4 N a t i o n a l D i s c o u n t B r o k e r s G r o u p ( N D B )
A t t a c k e d d u r i n g p e a k t r a d i n g h o u r s . O p e r a t o r s a c c i d e n t a l l y c r a s h e d s i t e a s
t h e y a t t e m p t e d t o d e f e n d a g a i n s t t h e a t t a c k .
![Page 21: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/21.jpg)
21
Assuring reliable and secure IT services
![Page 22: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/22.jpg)
22Chapter 6 Figure 6-2
Combining Components in Series Decreases Overall Availability
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
Number of Components In Series (each 98% available)
Av
ail
ab
ilit
y
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
![Page 23: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/23.jpg)
23
Five Components in Parallel (each 98% Available)
Chapter 6 Figure 6-3
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
C h a p t e r 6 F i g u r e 6 - 1
F i v e C o m p o n e n t s i n S e r i e s ( e a c h 9 8 % A v a i l a b l e )
C o m p o n e n t 1
9 8 %a v a i l a b i l i t y
C o m p o n e n t 2
9 8 %a v a i l a b i l i t y
C o m p o n e n t 3
9 8 %a v a i l a b i l i t y
C o m p o n e n t 4
9 8 %a v a i l a b i l i t y
C o m p o n e n t 5
9 8 %a v a i l a b i l i t y
. 9 8 x . 9 8 x . 9 8 x . 9 8 x . 9 8 = s e r v i c e a v a i l a b i l i t y o f 9 0 %
S o u r c e : A p p l e g a t e , L y n d a M . , R o b e r t D . A u s t i n , a n d F . W a r r e n M c F a r l a n , C o r p o r a t e I n f o r m a t i o n S t r a t e g y a n d M a n a g e m e n t . B u r r R i d g e , I L : M c G r a w - H i l l / I r w i n , 2 0 0 2 .
![Page 24: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/24.jpg)
24
High-available facilities
• Uninterruptible electric power delivery
• Physical security
• Climate control and fire suppression
• Network connectivity
• Help desk and incident response procedures
• N+1 and N+N redundancy
![Page 25: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/25.jpg)
25
Chapter 6 Figure 6-4
Redundancy Increases Overall Availability
98.0%
98.5%
99.0%
99.5%
100.0%
1 2 3 4 5 6 7 8 9 10
Number of Components In Parallel (each 98% available)
Av
ail
ab
ilit
y
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
![Page 26: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/26.jpg)
26
Chapter 6 Figure 6-5
A Representative E-Commerce Infrastructure
Router
Firewall 1
Firewall 2
Switch
Web Server1
Web Server2
DatabaseServer
Disk Array
PolicyServer 1
PolicyServer 2
ApplicationServer 1
ApplicationServer 2
Inte
rnet
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management . Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
![Page 27: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/27.jpg)
27
Securing infrastructure against malicious threats
• Classification of threats– External attacks (Denial of service—DoS)– Intrusion: obtaining user names and password– Viruses and worms
• Defensive measures– Security policies– Firewalls– Authentication– Encryption– Patching and change management– Intrusion detection and network monitoring
• Security management framework– Make deliberate security decisions– Consider security a moving target– Practice disciplined change management– Educate users– Deploy multilevel technical measures, as many as you can afford
![Page 28: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/28.jpg)
28
M anaging Infrastructure R isks: C onsequences and P robabilities
C hapter 6 F igure 6 -9
S ource: A pp legate, L ynda M ., R obert D . A ustin , and F . W arren M cFarlan , C o rporate In form ation S tra tegy and M anagem ent . B urr R idge, IL : M cG raw -H ill/Irw in , 2002.
H IG H
H igh C onsequence
Low P robability
H igh C onsequence
H igh P robab ility
C R ITIC A L
TH R EATS
LO W
Low C onsequence
Low P robability
M IN O R
TH R EATS
Low C onsequence
H igh P robab ility
Con
sequ
ence
s PR IO R ITIZE TH R EATS
0 Probability 1
![Page 29: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/29.jpg)
29
Managing diverse IT infrastructures
![Page 30: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/30.jpg)
30
New service models
• Managing the shortage of skilled IT workers
• Reduced time to market
• The shift to 24 x 7 operations
• Favorable cash flow profiles
• Cost reduction in IT service chains
• Making applications globally accessible
![Page 31: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/31.jpg)
31
P u r c h a s e v e r s u s S u b s c r i b e C a s h F l o w s
C h a p t e r 7 F i g u r e 7 - 1
S o u r c e : A p p l e g a t e , L y n d a M . , R o b e r t D . A u s t i n , a n d F . W a r r e n M c F a r l a n , C o r p o r a t e I n f o r m a t i o n S t r a t e g y a n d M a n a g e m e n t . B u r r R i d g e , I L : M c G r a w - H i l l / I r w i n , 2 0 0 2 .
+
P u r c h a s e a n d I n s t a l l a t i o n B u y s o f t w a r e H i r e c o n s u l t a n t s I n s t a l l a n d T e s t
CUTOVER
B e n e f i t s B e g i n T o T r e n d U p ( i f p r o j e c t i s s u c c e s s f u l )
C o s t s S t a b i l i z e a t M a i n t e n a n c e L e v e l
PU
RC
HA
SE
_ T i m e
SU
BS
CR
IBE
S t a r t u p F e e
S u b s c r i p t i o n F e e s
T i m e
I m m e d i a t e B e n e f i t s ( i n f r a s t r u c t u r e a l r e a d y i n p l a c e )
+
_
![Page 32: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/32.jpg)
32
Risk through incremental outsourcing
• Incremental outsourcing example: hosting– Categories of hosting models
• Colocation hosting• Shared hosting• Dedicated hosting
– Dedicated hosting subcategories • Simple dedicated hosting• Complex dedicated hosting• Custom dedicated hosting
![Page 33: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/33.jpg)
33
C h a p te r 7 T a b le 7 -1
L e v e ls o f S e r v ic e fr o m H o s t in g P r o v id e r s
Level of Serv ice
D escription of Serv ice
Bu siness op erating serv ices
A d m inistering and op erating an ap p lication.
A p p lication su p p ort serv ices Su p p ort for softw are abov e the op erating sy stem lev el; ap p lication su p p ort; ap p lication p erform ance m onitoring and tu ning; d esign of ap p lications for scalability , reliability , secu rity .
P latform serv ices Su p p ort for hard w are, op erating sy stem ; reboot serv ices; d ata backu p and d isaster recov ery serv ices; U RL m onitoring.
N etw ork serv ices C onnectiv ity w ith in the facility and externally to the p u blic In ternet and to p riv ate p eering netw orks; m onitoring of netw ork traff ic at the transp ort lay er; serv ice lev el assu rances at the p acket loss and netw ork av ailability lay er; netw ork secu rity .
Real estate serv ices (low est lev el) Su itable fl oor sp ace and p hy sical facilities; m aintenance of the sp ace and facilities
S o u rc e : A p p le g a te , L y n d a M ., R o b e r t D . A u s tin , a n d F . W a rr e n M c F a r la n , C o r p o r a te In fo r m a tio n S tr a te g y a n d M a n a g e m e n t . B u rr R id g e , IL : M c G ra w -H ill / Irw in , 2 0 0 2 .
![Page 34: 1 IS 8950 Managing Network Infrastructure and Operations](https://reader037.vdocuments.mx/reader037/viewer/2022110100/56649e265503460f94b168a6/html5/thumbnails/34.jpg)
34
Summary Grid for Comparing Hosting Providers
Chapter 7 Table 7-2
Com parison D im ension
Provider 1 Provider 2 Provider 3
Com p an y Descrip tion
Region al h ostin g and broad band p rovid er (backbone, DSL) serv ice p rov id er
N ation al hostin g serv ices p rov id er
Region al telco, backbone, broad band serv ice p rov id er
Em p loyees 1600 3300 28,000 Fin ancial Profile Declined to p rovid e
(p rivate com p any) After tax loss $180 m il on sales of $600 m il; stron g cash p osition ; new facilities bu ild ing offered as exp lanation for lack of p rofitab ility
After tax p rofit of $1.1 billion on sales of $13 billion (m ost not from h osting bu siness).
N u m ber of Data Cen ters M anaged / Total Squ are Feet
3 d ata cen ters, 160,000 sq. ft.
28 d ata cen ters, 1.6 m illion sq. ft.
5 (2 op eration al), 220,000 sq. ft. (45,000 op erational)
Sp ace offered (RFP sp ecified sp ace for six racks of equ ip m en t)
3 8’x8’ cages (192 sq ft), p artitions rem oved to p rovid e con tigu ou s sp ace
3 8’x7’ cages (168 sq ft), p artitions rem oved to p rovid e con tigu ou s sp ace
280 sq ft enclosed room
Physical secu rity Fu lly m eets requ irem en t
Fu lly m eets requ irem en t
Som e concerns (see notes from site v isit)
Pow er Fu lly m eets requ irem en t
Fu lly m eets requ irem en t
Con nected to on ly one p ow er grid ; tw o p rom ised w ith in 6 w ks
Con nectiv ity Fu lly m eets requ irem en t
Fu lly m eets requ irem en t
N ot red u nd an t to backbone; p rom ised red u nd ancy in 6 w ks
Serv ice Level Gu aran tees
Fu lly m eets requ irem en t
Fu lly m eets requ irem en t
Partially m eets requ irem en t
One-Tim e Setu p Cost, Sp ace
$6500 $7800 $10,800
M on th ly Sp ace Ren tal
3 X $6500 3 X $6800 $9,800
One-Tim e Setu p Cost, Connectiv ity
$1200 $1500 $1600
Variable Con nectiv ity Cost
$1200 p er m on th p lu s $525 p er m on th for each m bp s above 10
$1500 p er m on th p lu s $589 p er m on th for each m bp s above 10
$900 p er m on th p lu s $412 p er m on th for each m bp s above 10
Source: Adapted from Robert D. Austin, "Selecting a Hosting Provider." Harvard Business School Exercise No. 601 -171. Although based on real
cases, this data is fictitious and does not pertain to any real hosting provider.