IT Infrastructure Chap 1: Definition

Slides:



Advertisements
Similar presentations
Business Continuity Technology Peter Lesser (212) Peter Lesser (212) Kraft Kennedy & Lesser, Inc. 360 Lexington.
Advertisements

Data Storage Solutions Module 1.2. Data Storage Solutions Upon completion of this module, you will be able to: List the common storage media and solutions.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
Lecture 12 IaaS Chapter 3 of the second reference book.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
Empowering Business in Real Time. © Copyright 2009, OSIsoft Inc. All rights Reserved. Virtualization and HA PI Systems: Three strategies to keep your PI.
LANs and WANs Network size, vary from –simple office system (few PCs) to –complex global system(thousands PCs) Distinguish by the distances that the network.
Networking in Virtual Environments Virtualization – Why do I care? Technical components of virtualization Networking in a virtual world What is cloud computing?
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 11 Exploring Secure Topologies  MModified by :Ahmad Al Ghoul  PPhiladelphia.
“An integrator view on storage consolidation & Information Lifecycle Management (ILM)” Ulrik Van Schepdael - Marketing Manager Belgacom Network & System.
IS Network and Telecommunications Risks
© Copyright 2011 John Wiley & Sons, Inc.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Session 3 Windows Platform Dina Alkhoudari. Learning Objectives Understanding Server Storage Technologies Direct Attached Storage DAS Network-Attached.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
Virtual Network Servers. What is a Server? 1. A software application that provides a specific one or more services to other computers  Example: Apache.
Microsoft Load Balancing and Clustering. Outline Introduction Load balancing Clustering.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Module 1 – MIS Careers & Intro to Systems Architecture MIS5122: Enterprise Architecture for IT Auditors.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Routing and Switching in the Enterprise – Chapter 1 Networking.
Effectively Explaining the Cloud to Your Colleagues.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
1 IS 8950 Managing Network Infrastructure and Operations.
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice HallChapter Nine 1 Business Data Communications Chapter Nine Enterprise Solutions.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Exploring the Network.
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
Hadoop Hardware Infrastructure considerations ©2013 OpalSoft Big Data.
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Database Systems. Role and Advantages of the DBMS Improved data sharing Improved data security Better data integration Minimized data inconsistency Improved.
VMware vSphere Configuration and Management v6
1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment.
1/28/2010 Network Plus Malware and Ensuring Availability.
CERN - IT Department CH-1211 Genève 23 Switzerland t High Availability Databases based on Oracle 10g RAC on Linux WLCG Tier2 Tutorials, CERN,
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Cloud computing: IaaS. IaaS is the simplest cloud offerings. IaaS is the simplest cloud offerings. It is an evolution of virtual private server offerings.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
Enterprise Vitrualization by Ernest de León. Brief Overview.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Chapter 1: Explore the Network
Chapter 6: Securing the Cloud
Chapter 1: Exploring the Network
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLOUD COMPUTING
Server Upgrade HA/DR Integration
High Availability Linux (HA Linux)
Components of information systems
CCNET Managed Services
Introduction to Networks
Physical Architecture Layer Design
Network+ Guide to Networks 6th Edition
Unit 27: Network Operating Systems
Systems Analysis and Design 5th Edition Chapter 8. Architecture Design
Virtualization Meetup Discussion
An Introduction to Computer Networking
Business Continuity Technology
Cloud computing mechanisms
Unit 11- Computer Networks
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

IT Infrastructure Chap 1: Definition Mark Abraham Magumba

The Evolution of IT Infrastructure During the first years IT infrastructures were relatively simple With the advent of more advanced applications like ERP, E-commerce and data ware housing they’ve become more complex Many IT infrastructures are the result of an incremental process of implementation, acquisition and mergers The result it is that most are extremely complex and ineficient with little integration and interoperability

IT infrastructure Definitions The equipment, systems, software, services used in common across organizations regardless of mission, program or project. Also serves as the foundation upon which mission, program and project specific services are built All of the configuration components that are necessary to provide services to the customers All of the hardware, software, networks, facilities e.tc. That are required to deliver, monitor, control or support IT services. The term It infrastructure includes all IT but not associated people, processes and documentation The distributed operational and administrative computing environment hidden from the unseen world of application users

Infrastructure definition contd Different Views of infrastructure Business processes Information Infrastructure for business analyst Application Infrastructure for end user Server Infrastructure for end user Building Electricity

Typical Characteristics of infrastructure Infrastructure provides services to applications Infrastructure is usually shared by multiple applications It infrastructure is more static and permanent than the applications running on it The management of infrastructure is separate from the management of the application running on it The department owning the infrastructure is separate from the department owning the applications

The infrastructure Model

The infrastructure model The model depicts the infrastructure itself and the “users” of the infrastructure The users are the applications that deliver utility to the system users built on top of the infrastructure and these are Middleware and databases Applications Processes and information

Virtualization: Acts as abstraction layer between the hardware and the operating system, it allows a single physical device to run multiple operating systems Operating system: A collection of programs to manage a computers inner workings including its memory, storage, hardware and file system End user devices: The devices used by end users to use to run applications such as PCs, thin clients, smart phones

IT infrastructure building blocks The model also describes the IT infrastructure building blocks Data centers: Typically IT hardware is provided in data centers. These provide (uninterrupted) power supply, cooling, computer racks, availability and security measures Servers: Are physical and main processing units also known as computers found in the data centers Networks: Connect the different components of the data center. Comprise routers, switches, cabling and include LANs, WANs, VPNS and simple services such as DHCP and DNS Storage: Servers can have internal storage like hard disks and external storage like tapes, Direct Attached Storage (DAS), Network Attached Storage (NAS), Storage Area Networks (SAN)

Non Functional Attributes Vertically three essential non functional attributes including availability, security and performance are shown Availability: is about maximizing system uptime and includes elements like backup, restore and disaster recovery, failover, clustering and replication Performance which includes areas such as scaling, load balancing, virtualization, Quality of Service (QoS) and high performance clustering Security which is about minimizing threats and vulnerabilities and includes solutions such as Virtual Private Networks (VPN), Intrusion Detection Systems (IDS), access control and encryption The three non functional attributes can all be affected by the configuration of each of the infrastructure components Though several other non functional attributes can be defined these three are the most critical