Transcript

McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved

CHAPTER 5CHAPTER 5

IT ARCHITECTURES

IT ARCHITECTURES

McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved

SECTION 5.0SECTION 5.0

HARDWARE AND SOFTWARE

HARDWARE AND SOFTWARE

5-3

LEARNING OUTCOMES

1. Describe the six major categories of hardware and provide an example of each

2. Identify the different computer categories and explain their potential business uses

3. Explain the difference between primary and secondary storage

5-4

LEARNING OUTCOMES

4. List the common input, output, storage, and communication devices

5. Describe the eight categories of computers by size

6. Define the relationship between operating system software and utility software

5-5

INTRODUCTION

• Information technology (IT) - any computer-based tool that people use to work with information and support the information and information-processing needs of an organization– Hardware - consists of the physical devices

associated with a computer system– Software - the set of instructions that the

hardware executes to carry out specific tasks

5-6

HARDWARE BASICS

• Computer - an electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data

• Hardware components include:1. Central processing unit (CPU)

2. Primary storage

3. Secondary storage

4. Input device

5. Output device

6. Communication device

5-7

HARDWARE BASICS

(RAM, ROM, Cache)

5-8

Hardware - Another View

5-9

Central Processing Unit

• Central processing unit (CPU) (or microprocessor) - the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together

• Control unit - interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions

• Arithmetic-logic unit (ALU) - performs all arithmetic operations (for example, addition and subtraction) and all logic operations (such as sorting and comparing numbers)

5-10

Central Processing Unit

• The number of CPU cycles per second determines the speed of a CPU – Megahertz (MHz) - the number of millions of

CPU cycles per second– Gigahertz (GHz) - the number of billions of CPU

cycles per second

5-11

Central Processing Unit

• CPU speed factors– Clock speed– Word length– Bus width– Chip line width

• Binary digit (bit) - the smallest unit of information that a computer can process

• Byte - a group of eight bits representing one natural language character

5-12

Advances in CPU Design

• Complex instruction set computer (CISC) chip - type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly

• Reduced instruction set computer (RISC) chip - limit the number of instructions the CPU can execute to increase processing speed

• Virtualization - a protected memory space created by the CPU allowing the computer to create virtual machines

5-13

Primary Storage

• Primary storage - the computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the CPU

5-14

Random Access Memory (RAM)

• Random access memory (RAM) - the computer’s primary working memory, in which program instructions and data are stored so that they can be accessed directly by the CPU via the processor’s high-speed external data bus– Volatility – Cache memory

5-15

Random Access Memory (RAM)

5-16

Read-Only Memory (ROM)

• Read-only memory (ROM) - the portion of a computer’s primary storage that does not lose its contents when one switches off the power– Flash memory – Memory card– Memory stick

5-17

Secondary Storage

• Secondary storage - consists of equipment designed to store large volumes of data for long-term storage– Megabyte (MB or M or Meg) - roughly 1 million

bytes– Gigabyte (GB) - roughly 1 billion bytes– Terabyte (TB) - roughly 1 trillion bytes

5-18

Secondary Storage

5-19

Magnetic Medium

• Magnetic medium - a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnetically sensitive materials

• Magnetic tape - an older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium

• Hard drive - a secondary storage medium that uses several rigid disks coated with a magnetically sensitive material and housed together with the recording heads in a hermetically sealed mechanism

5-20

Optical Medium

• Optical medium types include:– Compact disk-read-only memory (CD-ROM) – Compact disk-read-write (CD-RW) drive– Digital video disk (DVD) – DVD-ROM drive– Digital video disk-read/write (DVD-RW)

5-21

Input Devices

• Input device - equipment used to capture information and commands– Manual input devices

• Joystick• Keyboard• Microphone

– Automated input devices• Bar code scanner• Digital camera• Magnetic ink character reader

5-22

Output Devices

• Output device - equipment used to see, hear, or otherwise accept the results of information processing requests – Cathode-ray tube (CRT)– Liquid crystal display (LCD)– Laser printer– Ink-jet printer– Plotter

5-23

Communication Devices

• Communication device - equipment used to send information and receive it from one location to another– Dial-up access– Cable– Digital subscriber line– Wireless– Satellite

5-24

COMPUTER CATEGORIES

• Computer categories include:– Personal digital assistant (PDA) – Laptop– Tablet– Desktop– Workstation – Minicomputer – Mainframe computer– Supercomputer

5-25

Computer Categories

PDA Laptop/TabletSmartPhone Desktop/Workstation

Microcontroller Mainframe Supercomputer

Ultra-Mobile PC

Minicomputer

Business, Industrial,Scientific, and Academic

Personal (Micro Computers)

5-26

COMPUTER CATEGORIES

• For the past 20 years, federally funded supercomputing research has given birth to some of the computer industry’s most significant technology breakthroughs including:– Clustering – Parallel processing– Mosaic browser

5-27

SOFTWARE BASICS

• System software - controls how the various technology tools work together along with the application software– Operating system software – Utility software – Application software

5-28

Categories of Software

5-29

Utility Software

• Types of utility software– Crash-proof – Disk image– Disk optimization – Encrypt data– File and data recovery – Text protect– Preventative security – Spyware – Uninstaller

5-30

Application Software

• Types of application software– Bowser– Communication– Data management– Desktop publishing– E-mail– Groupware– Presentation graphics– Programming– Spreadsheet– Word processing

5-31

How Hardware and Software Interact

5-32

OPENING CASE QUESTIONSElectronic Breaking Points

1. Identify six hardware categories and place each product listed in the case in its appropriate category

2. Describe the CPU and identify which products would use a CPU

3. Describe the relationship between memory sticks and laptops. How can a user employ one to help protect information loss from the other?

4. What different types of software might each of the products listed in the case use?

McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved

SECTION 5.1SECTION 5.1

MANAGING ENTERPRISE

ARCHITECTURES

MANAGING ENTERPRISE

ARCHITECTURES

5-34

LEARNING OUTCOMES

5.1 Explain the three components of an enterprise architecture

5.2 Describe how an organization can implement a solid information architecture

5-35

LEARNING OUTCOMES

5.3 List and describe the five-ilities in an infrastructure architecture

5.4 Compare web services and open systems

5-36

ENTERPRISE ARCHITECTURES

• Enterprise architecture - includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets

• Enterprise architect (EA) - a person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business

5-37

ENTERPRISE ARCHITECTURES

• Primary goals of enterprise architectures

5-38

ENTERPRISE ARCHITECTURES

5-39

INFORMATION ARCHITECTURE

• Information architecture - identifies where and how important information, such as customer records, is maintained and secured

• Enterprise information architecture should focus on:1. Backup and recovery

2. Disaster recovery

3. Information security

5-40

INFORMATION ARCHITECTURE

5-41

Backup and Recovery

• Backup - an exact copy of a system’s information

• Recovery - the ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup

5-42

Backup and Recovery

• Fault tolerance - a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service

• Failover - a backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time

5-43

Disaster Recovery

• Disaster recovery best practices include:– Mind the enterprise architectures– Monitor the quality of computer

networks that provide data on power suppliers and demand

– Make sure the networks can be restored quickly in the case of downtime

– Set up disaster recovery plans– Provide adequate staff training

5-44

Disaster Recovery

• Financial Institutions Worldwide Spending on Disaster Recovery

5-45

Disaster Recovery

• Disaster recovery plan - a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood

• Disaster recovery cost curve - charts (1) the cost to the organization of the unavailability of information and technology and (2) the cost to the organization of recovering from a disaster over time

5-46

Disaster Recovery

5-47

Disaster Recovery

• Hot site - a separate and fully equipped facility where the company can move immediately after a disaster and resume business

• Cold site - a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster

5-48

Disaster Recovery

• Business continuity planning (BCP) - is a plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption

5-49

Information Security

• Good information architectures include…– A strong information security plan– Managing user access – Up-to-date antivirus software and patches

5-50

INFRASTRUCTURE ARCHITECTURE

• Infrastructure architecture - includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization’s goals

• As an organization changes, its systems must be able to change to support its operations

5-51

INFRASTRUCTURE ARCHITECTURE

5-52

INFRASTRUCTURE ARCHITECTURE

• Five primary characteristics of a solid infrastructure architecture:1. Flexibility

2. Scalability

3. Reliability

4. Availability

5. Performance

5-53

Flexibility

• Organizations must watch today’s business, as well as tomorrow’s, when designing and building systems

• Systems must be flexible enough to meet all types of business changes

5-54

Scalability

• Scalability - refers to how well a system can adapt to increased demands

• Capacity planning - determines the future IT infrastructure requirements for new equipment and additional network capacity– Performing a capacity plan is one way to

ensure the IT infrastructure is scalable

5-55

Reliability

• Reliability ensures all systems are functioning correctly and providing accurate information

• Reliability is another term for accuracy when discussing the correctness of systems within the context of efficiency IT metrics

5-56

Availability

• Availability - addresses when systems can be accessed by users

• High availability - refers to a system or component that is continuously operational for a desirably long length of time

5-57

Performance

• Performance - measures how quickly a system performs a certain process or transaction (in terms of efficiency IT metrics of both speed and throughput)

• Not having enough performance capacity can have a devastating, negative impact on a business

5-58

APPLICATION ARCHITECTURE

• Application architecture - determines how applications integrate and relate to each other

• With new architectures, IT can build new business capabilities faster, cheaper, and in a vocabulary the business can understand

5-59

Web Services

• Web service - contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services

• Interoperability - the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers

5-60

Web Services

5-61

Web Services

• The two primary parts of web services are:

1. Event - detect threats and opportunities and alert those who can act on the information

2. Service - more like software products than they are coding projects• Need to be reusable if they are going to have an

impact on productivity

5-62

Open Systems

• Open system - a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them

• Open source - refers to any program whose source code is made available for use or modification as users or other developers see fit

5-63

OPENING CASE QUESTIONSVirgin Mobile

1. How can an organization use an information architecture to protect its IT investment in electronic devices outlined in the case?

2. How can an organization use the architectures mentioned in the case to protect information security?

3. Identify the five-ilites and rank them in order of importance for a cell phone (1 highest, 5 lowest)

4. Describe the importance of web services and open systems to companies such as Virgin Mobile

McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved

SECTION 5.2SECTION 5.2

ARCHITECTURE TRENDS

ARCHITECTURE TRENDS

5-65

LEARNING OUTCOMES

5.5 Describe the business value in deploying a service oriented architecture

5.6 Explain the need for interoperability and loose coupling in building today’s IT systems

5-66

LEARNING OUTCOMES

5.7 Identify the logical functions used in a virtualized environment

5.8 Explain the business benefits of grid computing

5-67

ARCHITECTURE TRENDS

• Organizations today must continually watch new architecture trends to ensure they can keep up with new and disruptive technologies

• Three architecture trends that are quickly becoming requirements for all businesses including:1. Service oriented architecture2. Virtualization3. Grid computing

5-68

SERVICE ORIENTED ARCHITECTURE

• Service oriented architecture (SOA) is a business-driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services

• SOA ensures IT systems can adapt quickly, easily, and economically to support rapidly changing business needs

5-69

SERVICE ORIENTED ARCHITECTURE

5-70

SOA Business Benefits

• The key technical concepts of SOA are:– Services

– Interoperability

– Loose coupling

5-71

SOA Business Benefits

5-72

Service

• Service oriented architecture begins with a service

• (A SOA) service - can be a business task, such as checking a potential customer's credit rating only opening a new account

• Services are “like” software products

5-73

Service

5-74

Interoperability

• Interoperability - is the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers

• Extensible Markup Language (XML) - a markup language for documents containing structured information

5-75

Loose Coupling

• Loose coupling - is the capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional components

• Loose coupling is a way of ensuring that the technical details are decoupled from the service

5-76

VIRTUALIZATION

• Virtualization - is a framework of dividing the resources of a computer into multiple execution environments

• It is a way of increasing physical resources to maximize the investment in hardware

5-77

VIRTUALIZATION

5-78

What are Virtual Machines?

• System virtualization - is the ability to present the resources of a single computer as if it is a collection of separate computers ("virtual machines")

• Each with its own virtual CPUs, network interfaces, storage, and operating system

5-79

What are Virtual Machines?

5-80

Virtualization Business Benefits

• Trends that have moved virtualization into the spotlight:

– Hardware being underutilized

– Data centers running out of space

– Increased energy costs

– System administration costs mounting

5-81

Additional Virtualization Benefits

• Rapid application deployment

• Dynamic load balancing

• Streamlined disaster recovery

5-82

GRID COMPUTING

• Grid computing - is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data

5-83

GRID COMPUTING

5-84

Grid Computing Business Benefits

• Improving productivity and collaboration of virtual organizations and respective computing and data resources

• Allowing widely dispersed departments and businesses to create virtual organizations to share data and resources

• Building robust and infinitely flexible and resilient operational architectures

5-85

Grid Computing Business Benefit

• Providing instantaneous access to massive computing and data resources

• Leveraging existing capital investments, which in turn help to ensure optimal utilization and costs of computing capabilities

5-86

Grid Computing Business Benefits

5-87

OPENING CASE STUDY QUESTIONSVirgin Mobile

5. Explain the advantages Virgin Mobile has using a service oriented architecture

6. Why does Virgin Mobile need to use interoperability and loose coupling in their architecture?

7. Explain the business drivers for Virgin Mobile using virtualization

8. What business benefits would Virgin Mobile experience deploying grid computing?

5-88

CLOSING CASE ONEChicago Tribune

1. Review the five characteristics of infrastructure architecture and rank them in order of their potential impact on the Tribune Co.’s business

2. What is the disaster recovery cost curve? Where should the Tribune Co. operate on the curve?

3. Define backups and recovery. What are the risks to the Tribune’s business if it fails to implement an adequate backup plan?

5-89

CLOSING CASE ONEChicago Tribune

4. Why is a scalable and highly available enterprise architecture critical to the Tribune Co.’s current operations and future growth?

5. Identify the need for information security at the Tribune Co.

6. How could the Tribune Co. use a classified ad web service across its different businesses?

5-90

CLOSING CASE TWOThe US Open Supports SOA

1. Review the five characteristics of infrastructure architecture and rank them in order of their potential impact on the USOpen.org

2. What are the USTA security concerns regarding interoperability between the tournament database and its website?

3. How could the USTA benefit from virtualization?

5-91

CLOSING CASE TWOThe US Open Supports SOA

4. Identify the value of integrating the tournaments information with the USTA website USOpen.org?

5. Explain why a sudden surge in server utilization during the middle of the US Open could spell disaster for the USTA

6. Why is loose coupling a critical business component to the USTA architecture?

5-92

CLOSING CASE THREEeBay’s Grid

1. Review the five characteristics of infrastructure architecture and rank them in order of their potential impact on eBay’s business

2. What are the business benefits that eBay enjoys thanks to grid computing?

3. What precautions would eBay take to ensure 100 percent security?

5-93

CLOSING CASE THREEeBay’s Grid

4. How can eBay take advantage of implementing SOA?

5. Explain how eBay uses fault tolerance

6. Describe the potential value of eBay using virtualization

7. What ethical and security concerns should eBay be aware of to ensure its business operates properly?

5-94

BUSINESS DRIVEN BEST SELLERS

• THE NEW LANGUAGE OF BUSINESS: SOA & WEB 2.0, by Sandy Carter

5-95

BUSINESS DRIVEN BEST SELLERS

• DOES IT MATTER?, by Nicholas G. Carr

top related