Download presentation
Presentation is loading. Please wait.
Published byClifford Hampton Modified over 9 years ago
1
IT ARCHITECTURES Systems Infrastructure IT ARCHITECTURES Systems Infrastructure Ref. IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 8/29/2015
2
5-2 LEARNING OUTCOMES List essential information systems infrastructure components and describe why they are necessary for satisfying an organization's informational needs Describe the components of an organization's hardware infrastructure and highlight current trends.
3
5-3 LEARNING OUTCOMES Describe the components of an organization's software infrastructure and highlight current trends. Describe the components of an organization's communication and collaboration infrastructure and highlight current trends.
4
5-4 Infrastructure 4-4 Interconnection of basic facilities and services enabling an area to function properly –Streets –Power, telephone, water, and sewage lines –Schools –Retail stores –Law enforcement
5
5-5 The IS Infrastructure 4-5 Google’s Data center—The Dalles, OR Why there? –Fiber-optic network connectivity –Access to water for cooling needs –Cheap, uninterrupted power from a nearby hydroelectric dam Rf. 7 in U.S. 2 in Asia 3 in Europe
6
5-6 Components of an IS Infrastructure 4-6 Businesses rely on a functioning information systems infrastructure
7
5-7 Key Elements of Information Systems Hardware 4-7 Input Devices –Used to enter information into a computer Processing Devices –Transform inputs into outputs. Output Devices –Deliver information to users in a usable format Input: Mouse and Keyboard Output: Monitor Processing: CPU
8
5-8 Input Technologies 4-8 Entering text and numbers: keyboard Selecting and pointing: mouse, touch screen, touch pad Entering batch data: scanner, bar code reader Entering audio and video: microphone, digital camera
9
5-9 Processing Technologies 4-9 Binary Code –Machine Language—the language computers understand –Binary or base-2 math (2, 4, 8, 16, 32, and so on) Bits Bytes –ASCII (American Standard Code for Information Interchange)
10
5-10 Central Processing Unit (CPU) 4-10 System unit: houses all components CPU: Microprocessor, processor, chip –Responsible for performing all of the operations of the computer Arithmetic logic unit (ALU): Perform math and logical operations Control unit: Fetch program instructions Decode instructions Retrieve data Store results
11
5-11 Moore’s Law 4-11 In the 1970s Dr. Gordon Moore from Intel hypothesized that processing performance would double every eighteen months Reduction of feature size 1960s: 20 microns Today:.032 micron Ref : Hwang’s Law
12
5-12 Primary Storage 4-12 For temporary storage to support computer processing Registers and cache (volatile) –Store data for immediate use by the CPU Random-access memory (RAM) (volatile) –Store programs and data currently in use Read-only memory (ROM) (nonvolatile) –Store programs and data automatically loaded when the computer is turned on –Basis input/output system (BIOS)
13
5-13 Secondary Storage 4-13 Nonvolatile storage for permanently storing data –Large capacity –Example: Hard disk, CD-ROM disk, SSD (Solid State Drive –EEPROM: Electrically erasable programmable memory - Flash memory
14
5-14 Output Devices: Video Output 4-14 Used to display information from a computer –Monitors –Projectors Video card (graphics card) –Tells monitor which dots to activate
15
5-15 Printers and Plotters 4-15 Plotter –Uses pens to transfer engineering designs to drafting paper Dot Matrix –Used for voluminous information Ink-jet –Sprays ink onto paper Laser –Uses electrostatic process to force ink onto paper 3D printers
16
5-16 Audio Output 4-16 Sound card and speakers –Sound card translates digits into sound –Also used to capture sound
17
5-17 Types of Computers 4-17
18
5-18 Hardware Infrastructure Trends Supercomputers
19
5-19 On-Demand Computing 4-19 Dealing with fluctuating computing needs Available resources allocated based on user needs Utility computing –On-demand computing rented from external provider –Paid on as-needed basis –Storage service provider Scalability
20
5-20 Grid Computing 4-20 Combines computing power of a large number of smaller, independent, networked computers –Tasks broken down into smaller chunks –BOINC Dedicated vs. heterogeneous grids –Acquisition vs. management costs
21
5-21 Edge Computing 4-21 Multiple small servers located closer to individual users Save bandwidth Decreased access time
22
5-22 Green Computing 4-22 Use computers more efficiently Large organizations with significant computing needs –Save money using: Virtualization Virtual machines can be configured to run on a single computer
23
5-23 Systems Software/Operating System 4-23 Coordinates: –hardware –peripherals –application software –users Also used in embedded devices Written in assembly language Performs day-to-day operations
24
5-24 The OS Acts as a Manager 4-24
25
5-25 Interfaces: Command vs. GUI 4-25 Provided by operating system Interface types: –Command line interface Requires typing text commands –Graphical user interface (GUI) Windows Vista Mac OS X Linux (KDE or GNOME)
26
5-26 Application Software 4-26 For performing specific user tasks –Writing a business letter –Processing payroll Application software interacts with systems software
27
5-27 Software Infrastructure Trends 4-27 Open-source software –Open-source movement aided by the advent of the Internet Source code is freely available for use and/or modification –Open-source operating system Linux –Used in embedded systems to personal computers to supercomputers
28
5-28 Open-Source Application Software 4-28 Open-source application software –Apache Web server –Firefox Web browser –OpenOffice Drawback: –Obtaining customer support may be difficult
29
5-29 Application Service Providers 4-29 ASPs provide on-demand software access over the Web –Specific software located on the ASP’s server –Accessed using Web-enabled interfaces –Software as a service (SaaS) Benefits: –Reduced need to maintain or upgrade software –Fixed monthly fee for services –Reliability
30
5-30 Service Oriented Architecture 4-30 Used to integrate business processes across organizations Business processes are broken down into distinct services –Enables rapid reaction to changing business conditions –Reusable nature of services reduces cost of developing new applications
31
5-31 Evolution of Computer Networking 4-31 Computer networking –Sharing of information or services –Comparable to human communication
32
5-32 Messages, Senders, and Receivers 4-32 Components of communication: –Senders and receivers with something to share –A transmission medium to send the message –Protocols (rules) dictating communication
33
5-33 Computer Networks 4-33 Digitizing: converting information into bits Bandwidth: transmission capacity
34
5-34 Bandwidth Requirements for Different Types of Information 4-34
35
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Enterprise Architecture
36
5-36 LEARNING OUTCOMES –Explain the three components of an enterprise architecture –Describe how an organization can implement a solid information architecture –List and describe the ‘4 ilities and performance’ of an infrastructure architecture –Compare Web services and open systems
37
5-37 ENTERPRISE ARCHITECTURES Enterprise architecture - includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets Enterprise architect (EA) - a person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business
38
5-38 ENTERPRISE ARCHITECTURES Primary goals of enterprise architectures
39
5-39 ENTERPRISE ARCHITECTURES
40
5-40 INFORMATION ARCHITECTURE
41
5-41 Backup and Recovery Backup - an exact copy of a system’s information Recovery - the ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup –Fault tolerance –Failover
42
5-42 Disaster Recovery plan Disaster recovery best practices include: –Mind the enterprise architectures –Monitor the quality of computer networks that provide data on power suppliers and demand –Make sure the networks can be restored quickly in the case of downtime –Set up disaster recovery detail steps –Provide adequate staff training, including verbal communication protocols “so that operators are aware of any IT-related problems
43
5-43 Disaster Recovery Financial Institutions Worldwide Spending on Disaster Recovery
44
5-44 Disaster Recovery Disaster recovery plan - a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood Disaster recovery cost curve - charts (1) the cost to the organization of the unavailability of information and technology and (2) the cost to the organization of recovering from a disaster over time –Hot site –Cold site
45
5-45 Disaster Recovery Cost Curve
46
5-46 Information Security A good information architecture includes: –A strong information security plan –Managing user access –Up-to-date antivirus software and patches
47
5-47 INFRASTRUCTURE ARCHITECTURE
48
5-48 INFRASTRUCTURE ARCHITECTURE Five primary characteristics of a solid infrastructure architecture: 1.Flexibility 2.Scalability 3.Reliability 4.Availability 5.Performance
49
5-49 APPLICATION ARCHITECTURE Application architecture - determines how applications integrate and relate to each other
50
5-50 Web Services Web service - contains a repertoire of Web- based data and procedural resources that use shared protocols and standards permitting different applications to share data and services Interoperability - the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
51
5-51 Web Services Event - detect threats and opportunities and alert those who can act on the information Service - more like software products than they are coding projects, and must appeal to a broad audience, and they need to be reusable if they are going to have an impact on productivity
52
5-52 Open Systems Open system - a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them –Allow systems to seamlessly share information –Capitalize on enterprise architectures –Eliminate proprietary systems and promote competitive pricing
53
5-53 CLOSING CASE THREE Fear the Penguin 1.How does Linux differ from traditional software? 2.Should Microsoft consider Linux a threat? Why or why not? 3.How is open source software a potential trend shaping organizations?
54
5-54 CLOSING CASE THREE Fear the Penguin 4.How can you use Linux as an emerging technology to gain a competitive advantage? 5.Research the Internet and discover potential ways that Linux might revolutionize business in the future
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.