chapter 5 it architecture

40
Chapter 5: IT Architecture Hardware & Software Basics

Upload: umaine

Post on 29-Nov-2014

906 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Chapter 5 It Architecture

Chapter 5: IT Architecture

Hardware & Software Basics

Page 2: Chapter 5 It Architecture

Information Technology

• Is any computer-based tool that people use to work with information and support the information and information-processing needs of an organization

• Hardware: consists of the physical devices associated with a computer system

• Software: is a set of instructions that the hardware executes to carry out specific tasks

Two basic categories of ITTwo basic categories of IT

Page 3: Chapter 5 It Architecture

3

Input, Process, Output, and Storage Hardware

Page 4: Chapter 5 It Architecture

Major hardware Components

• Central Processing Unit (CPU): hardware that interprets & executes program software (Instructions) and coordinates how all the other hardware works together

• Central Processing Unit (CPU): hardware that interprets & executes program software (Instructions) and coordinates how all the other hardware works together

• Made up of two parts;

1. Control Unit: interprets software instructions & tells hardware devices what to do.

2. Arithmetic Logic Unit: performs all arithmetic and logical operations

Essentially acts as the Brains of the ComputerEssentially acts as the Brains of the Computer

Page 5: Chapter 5 It Architecture

Computer Performance: Megahertz and Gigahertz

• The number of CPU cycles per second determines how fast a CPU carries out software instructions

• Speed is measured in in Megahertz & Gigahertz

• MHz: millions of CPU cycles per second

• GHz: billions of CPU cycles per second

• Clock Speed: speed of internal clock of a CPU that sets the pace of operations

• Word Length: number of bits that can be processed by the CPU at any giving time

• Bus Width: Size of internal electrical pathway along which signals are send from one part of the computer to another. Wider bus moves more data

• Chip line width: the distance between transistors on a chip

• Clock Speed: speed of internal clock of a CPU that sets the pace of operations

• Word Length: number of bits that can be processed by the CPU at any giving time

• Bus Width: Size of internal electrical pathway along which signals are send from one part of the computer to another. Wider bus moves more data

• Chip line width: the distance between transistors on a chip

Page 6: Chapter 5 It Architecture

What do I need to know when purchasing a computer?

• Depends on the job functions of your employees.

• Employees engaging in word-processing or spreadsheet management activities generally require no more than

• Functions demanding like AutoCAD require more and faster processing power;

• Microsoft Office Basic 2007

• Component Requirement Computer and processor

• 500 megahertz (MHz) processor or higher Memory

• AutoCAD System Requirements

For AutoCAD 2009: • Intel® Pentium® 4 processor or

AMD Athlon®, 2.2 GHz or greater orIntel or AMD Dual Core processor, 1.6 GHz or greater

• Microsoft Office Basic 2007

• Component Requirement Computer and processor

• 500 megahertz (MHz) processor or higher Memory

• AutoCAD System Requirements

For AutoCAD 2009: • Intel® Pentium® 4 processor or

AMD Athlon®, 2.2 GHz or greater orIntel or AMD Dual Core processor, 1.6 GHz or greater

Faster processing means higher costs for Computer systems

Page 7: Chapter 5 It Architecture

Virtualization

• Virtualization is a protected memory space created by the CPU that allows the computer to create virtual machines

• Essentially it is a computer within a computer!

• lets a single desktop computer simultaneously run several copies of operating systems like Microsoft's XP as processes on the desktop machine.

• This turns a single physical machine into a number of different computers, increasing hardware utilization and system flexibility.

• lets a single desktop computer simultaneously run several copies of operating systems like Microsoft's XP as processes on the desktop machine.

• This turns a single physical machine into a number of different computers, increasing hardware utilization and system flexibility.

Page 8: Chapter 5 It Architecture

Why Virtualize?

• Virtualization is a good idea because it helps manage computer complexity.

• Rather than try to juggle multiple installations of subtly different software, a computer user can now experiment with beta software within the safe confines of a virtual machine.

Page 9: Chapter 5 It Architecture

Primary Storage: RAM

• Primary storage is the computers main memory

• Made up of random access memory and read-only memory

• Primary storage is the computers main memory

• Made up of random access memory and read-only memory

• Random Access Memory: acts as the computers primary working memory

• Program instructions and data are stored in RAM so that they can be accessed directly by the CPU via the processors data bus

The term random is used to indicate that the computer does not need to access memory cells in sequence; rather, they can be referenced in any order.

Page 10: Chapter 5 It Architecture

RAM: Volatile• Often referred to as

Read/Write memory

• Allows you to work with programs (excel for example) and modify it (rewrite) as needed until the data is ready for printing or storage on secondary storage media

• Memory Swapping: Memory swapping occurs when there is a request to the operating system to store data in memory and the data will not fit because there is not enough free memory to store the requested data.

• Memory Swapping: Memory swapping occurs when there is a request to the operating system to store data in memory and the data will not fit because there is not enough free memory to store the requested data.

In this case, the operating system will have to remove something to make space.In this case, the operating system will have to remove something to make space.

Page 11: Chapter 5 It Architecture

RAM… So what? How does it effect me?Little swapping occurs

when:

Your computer has a very large main memory.

You use only one or a few programs at a time.

You use small files.

Little swapping occurs when:

Your computer has a very large main memory.

You use only one or a few programs at a time.

You use small files.

• You may have a serious problem if:

– You need to use many programs or process many large data files.

– Your computer has a small memory capacity.

Page 12: Chapter 5 It Architecture

What can businesses do?What can businesses do?

• Optimize applications to utilize memory more efficiently Or;

• Add more RAM

Page 13: Chapter 5 It Architecture

• Its important again then from a business perspective to understand your system requirements…… for example;

• Users need computers that will allow then to work with word processing, accounting software, and have constant access to a customer database….

• They will also be communicating via MS Outlook with co-workers and business partners…..

• Its important again then from a business perspective to understand your system requirements…… for example;

• Users need computers that will allow then to work with word processing, accounting software, and have constant access to a customer database….

• They will also be communicating via MS Outlook with co-workers and business partners…..

Page 14: Chapter 5 It Architecture

System Requirements• QuickBooks Enterprise requires at

least 1.8 GHz processor and 512 MB RAM for a multiuser environment

• MS Office requires at least 500 megahertz (MHz) processor or higher Memory 512 MB RAM

• CRM is handled by the QuickBooks software…..

• Outlook part of MS Office Suite….

IS Dept offers these PC’s

◦ Intel Pentium 4 Processor at 2.8 GHz with 533MHz Data Bus and 512K cache, 256MB RAM

◦ Intel Pentium 4 Processor at 2.8 GHz with 533MHz Data Bus and 512K cache, 512 MB RAM

◦ Intel Pentium 4 Processor at 2.8 GHz with 533MHz Data Bus and 512K cache, 256MB RAM

◦ Intel Pentium 4 Processor at 2.8 GHz with 533MHz Data Bus and 512K cache, 512 MB RAM

Intel Pentium 4 Processor at 3.6 GHz with 533MHz Data Bus and 1MB cache, 512 MB RAM

Page 15: Chapter 5 It Architecture

Cache Memory & ROM

Cache Memory• Is a small unit of ultra-fast

memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits as RAM.

• Cache resides on or is close to the CPU

• Is a small unit of ultra-fast memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits as RAM.

• Cache resides on or is close to the CPU

ROM: Read-Only Memory• Is the portion of primary storage

that does not lose its contents when the power goes off.

• Contains essential system programs that neither the user nor the computer can erase

• Start-up instructions are stored in ROM

Page 16: Chapter 5 It Architecture

Secondary Storage Devices

• Flash Memory & Memory Cards

• USB Drives• Flash Drives• Memory Cards

Like ROM it is not volatile

Magnetic Medium: Your hard drive– Uses several rigid disks

coated with a magnetic material housed together with a recording heads in a sealed mechanism

Optical DrivesCD-ROM, CD-RW, DVD, DVD-RW

Magnetic Medium: Your hard drive– Uses several rigid disks

coated with a magnetic material housed together with a recording heads in a sealed mechanism

Optical DrivesCD-ROM, CD-RW, DVD, DVD-RW

CD-ROMs & DVDs are an economical solution for storing data and programs. Provides increased capacity and portabilityCD-ROMs & DVDs are an economical solution for storing data and programs. Provides increased capacity and portability

Page 17: Chapter 5 It Architecture

Input & Output Devices already covered….

Input Devices & Output DevicesInput Devices & Output Devices

• Keyboards• Joysticks• Mouse• Touch screen• Monitors• Printers

Hardware also includes Communication DevicesHardware also includes Communication Devices

• Modems and routers are a few examples….

• We’ll cover these in more detail in later chapters…..

Page 18: Chapter 5 It Architecture

Opening QuestionsOpening Questions

• What is the relationship between memory sticks and laptops?

• How can a user employ one to help protect information loss from the other?

• How can an organization use technologies discussed to protect intellectual capital?

Page 19: Chapter 5 It Architecture

Computer Categories and Software Basics

• Supercomputers today are advancing some of the countries most dynamic industries including;

– advanced manufacturing, – gene research in life sciences

and – real-time financial marketing

modeling

• How? Because supercomputers are hitting processing power of well over 200 teraflops—the equivalent of everyone on earth performing 35,000 calculations per second!

• How? Because supercomputers are hitting processing power of well over 200 teraflops—the equivalent of everyone on earth performing 35,000 calculations per second!

Page 20: Chapter 5 It Architecture

Supercomputing

• Clustering: companies chaining together thousands of PCs to build mass-market systems

• See the Super Computing example in YouTube

• Clustering: companies chaining together thousands of PCs to build mass-market systems

• See the Super Computing example in YouTube

• Parallel processing: provides the ability to run two or more tasks simultaneously and is viewed as the chip industries future

Page 21: Chapter 5 It Architecture

Software Basics

• Hardware is only as good as the software that runs it.

• System software: controls how various technology tools work together along with the application software

• Firmware falls in between!

• BIOS of a PCs system software falls into this category but is more commonly understood as the application software that runs mobile device technology

• Firmware falls in between!

• BIOS of a PCs system software falls into this category but is more commonly understood as the application software that runs mobile device technology

System software includes both operating system software and utility softwareSystem software includes both operating system software and utility software

Page 22: Chapter 5 It Architecture

Operating System & Utility Software

Operating System & Utility Software

• Operating system software control the activities of managing a software application like Excel and ensuring that a graph is sent to the printer

• Utility software provides additional functionality to the operating system.

examples include;

– Antivirus software– Screen savers

Page 23: Chapter 5 It Architecture

Application Software

• Used for specific information processing needs, including payroll, CRM, project management, etc…

• Application software is used to solve specific problems or to perform specific tasks

• Used for specific information processing needs, including payroll, CRM, project management, etc…

• Application software is used to solve specific problems or to perform specific tasks

• Examples include:• MS Office• QuickBooks

Page 24: Chapter 5 It Architecture

Enterprise Architecture

• Includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT resources

• Unified and solid enterprise architecture standardizes hardware and software systems that adds these benefits to the organization;

– Decreased costs– Promotes the reuse of IT

assets– Speeds up the

development and delivery of new systems

– Decreased costs– Promotes the reuse of IT

assets– Speeds up the

development and delivery of new systems

Page 25: Chapter 5 It Architecture

Enterprise ArchitectureEnterprise Architecture

Page 26: Chapter 5 It Architecture

Information Architecture

• Identifies where and how important information like customer records is maintained and secured.

• Why do you suppose a data backup schedule is important to an organization?

• Some data cannot be recreated!

• BI lost from that data could be tremendous

• Securing against this type of loss is a major component!

• Some data cannot be recreated!

• BI lost from that data could be tremendous

• Securing against this type of loss is a major component!

Page 27: Chapter 5 It Architecture

Three Primary Areas of Information Architecture

1. Backup and Recovery2. Disaster Recovery3. Information Security

Money is lost anytime an organization experiences down time.

1. Backup and Recovery2. Disaster Recovery3. Information Security

Money is lost anytime an organization experiences down time.

• A backup is an exact copy of a system’s information

• Recovery is the ability to get a system up and running in the event of a system crash or failure

Page 28: Chapter 5 It Architecture

Network Administration

• From a network admin perspective; backup & restoration of data is the backing up of critical data files to a secure storage area & then restoring /retrieving data if original files are lost or deleted

• From a network admin perspective; backup & restoration of data is the backing up of critical data files to a secure storage area & then restoring /retrieving data if original files are lost or deleted

• Several techniques exist to backup and recover data;– Redundant storage

servers– Tapes– Disks– Even CD’s and DVD’s

Page 29: Chapter 5 It Architecture

Redundant Array of Independent or Inexpensive Disks (RAID)• Is a collection of disks that

provide fault tolerance shared and applications

• A group of hard disks is called a disk array or Drive

• The group of RAID disks is recognized as a single logical drive to the system.

• Because of this, if a single disk failure occurs it will not cause a catastrophic loss of data

• Provides fault tolerance!

• Another benefit of RAID is increased storage capacity and potentially better disk performance

• Because of this, if a single disk failure occurs it will not cause a catastrophic loss of data

• Provides fault tolerance!

• Another benefit of RAID is increased storage capacity and potentially better disk performance

Page 30: Chapter 5 It Architecture

Fault tolerance and Failover

• Fault tolerance is a computer system that is designed to ensure business continuity and backup should a component fail.

• Fault tolerance is a computer system that is designed to ensure business continuity and backup should a component fail.

• Failover: is a backup operational mode in which the functions of a computer component are assumed by secondary system components when primary components go off line

Page 31: Chapter 5 It Architecture

Disaster Recovery

• Disasters occur! – Power outages– Floods– Attacks on the system

• The question is what do we do to prepare for such occurrences?

• Disaster Recovery Plan– A detailed process for

recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood

• Disaster Recovery Plan– A detailed process for

recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood

Page 32: Chapter 5 It Architecture

Implement & Enforce security & disaster recovery plans• Having plans in place is not

enough

• They have to be enforced!

• Everyone in the organization should know what he or she is allowed to do on the network!

• Having plans in place is not enough

• They have to be enforced!

• Everyone in the organization should know what he or she is allowed to do on the network!

• Enforcing policy also means controlling how the system is used.

• Restrict users ability to create or change files (such as executable files)

• Limit users ability to download files

Page 33: Chapter 5 It Architecture

Disaster Planning: Offsite storage

• A comprehensive disaster plan includes ensuring that information is back-upped at a remote location

• Employees also need to be considered when protecting company assets!

• Hot Site: a separate and fully equipped facility where a company can move to and resume business

• Cold Site: no computer resources but is a place employees can move to after a disaster

• Hot Site: a separate and fully equipped facility where a company can move to and resume business

• Cold Site: no computer resources but is a place employees can move to after a disaster

Page 34: Chapter 5 It Architecture

Information SecurityInformation Security

• Demands of Information Security is growing!

– Workers want remote access to the network,

– Customers want remote access to authorized info,

– We are using increasingly available mobile devices and still want access

• Managing user Access is a critical piece of information architecture!

• Creating password policy that secures workstations and meets the requirements of legislation is part of this

Page 35: Chapter 5 It Architecture

Infrastructure Architecture

• Solid infrastructure include these five primary characteristics

1. Flexibility2. Scalability3. Reliability4. Availability5. Performance

• Solid infrastructure include these five primary characteristics

1. Flexibility2. Scalability3. Reliability4. Availability5. Performance

• Areas to focus on relate to integrity and availability

– Scalability – Reliability– Availability

• Areas to focus on relate to integrity and availability

– Scalability – Reliability– Availability

Page 36: Chapter 5 It Architecture

• Scalability: refers to how well a system can adapt to increased demands

• If disk space is not sufficient it can limit growth of information (customers) and can slow down transaction speed

• Reliability: ensures that all systems are functioning and providing accurate information

Page 37: Chapter 5 It Architecture

System DowntimeSystem Downtime

• Availability: addresses when systems can be accessed by users

• Systems have to go down occasionally » Maintenance » Upgrades» Fixes

• Scheduled downtime then should be coordinated to not interfere with business activities

Page 38: Chapter 5 It Architecture

IT Strategies for Ensuring Availability

IT Strategies for Ensuring Availability

• Allow only network admins to create or modify NOS and application system files

• Monitor network for unauthorized access or changes

• Utilize a change management system

• Install redundant components

• Perform regular health checks on system

• Check system performance, error logs, and system logs regularly

These steps used as part of a plan can

help ensure network integrity & availability

These steps used as part of a plan can

help ensure network integrity & availability

Page 39: Chapter 5 It Architecture

Application Architecture

• Determines how applications integrate and relate to each other

• Advances in integration technology –web services and open systems are providing organizations with more responsive enterprise architecture

Page 40: Chapter 5 It Architecture

• Web Services: contains a repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services

• Think of a SCM system or Intranet

• Open systems: a term we will continue to heart a lot about!

• A broad general term that describes nonproprietary IT hardware and software

Linux operating systems is an example…

• Open systems: a term we will continue to heart a lot about!

• A broad general term that describes nonproprietary IT hardware and software

Linux operating systems is an example…