Top Banner
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved CHAPTER 5 IT ARCHITECTURES
95
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter 5 Modified

McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved

CHAPTER 5CHAPTER 5

IT ARCHITECTURES

IT ARCHITECTURES

Page 2: Chapter 5 Modified

McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved

SECTION 5.0SECTION 5.0

HARDWARE AND SOFTWARE

HARDWARE AND SOFTWARE

Page 3: Chapter 5 Modified

5-3

LEARNING OUTCOMES

1. Describe the six major categories of hardware and provide an example of each

2. Identify the different computer categories and explain their potential business uses

3. Explain the difference between primary and secondary storage

Page 4: Chapter 5 Modified

5-4

LEARNING OUTCOMES

4. List the common input, output, storage, and communication devices

5. Describe the eight categories of computers by size

6. Define the relationship between operating system software and utility software

Page 5: Chapter 5 Modified

5-5

INTRODUCTION

• Information technology (IT) - any computer-based tool that people use to work with information and support the information and information-processing needs of an organization– Hardware - consists of the physical devices

associated with a computer system– Software - the set of instructions that the

hardware executes to carry out specific tasks

Page 6: Chapter 5 Modified

5-6

HARDWARE BASICS

• Computer - an electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data

• Hardware components include:1. Central processing unit (CPU)

2. Primary storage

3. Secondary storage

4. Input device

5. Output device

6. Communication device

Page 7: Chapter 5 Modified

5-7

HARDWARE BASICS

(RAM, ROM, Cache)

Page 8: Chapter 5 Modified

5-8

Hardware - Another View

Page 9: Chapter 5 Modified

5-9

Central Processing Unit

• Central processing unit (CPU) (or microprocessor) - the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together

• Control unit - interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions

• Arithmetic-logic unit (ALU) - performs all arithmetic operations (for example, addition and subtraction) and all logic operations (such as sorting and comparing numbers)

Page 10: Chapter 5 Modified

5-10

Central Processing Unit

• The number of CPU cycles per second determines the speed of a CPU – Megahertz (MHz) - the number of millions of

CPU cycles per second– Gigahertz (GHz) - the number of billions of CPU

cycles per second

Page 11: Chapter 5 Modified

5-11

Central Processing Unit

• CPU speed factors– Clock speed– Word length– Bus width– Chip line width

• Binary digit (bit) - the smallest unit of information that a computer can process

• Byte - a group of eight bits representing one natural language character

Page 12: Chapter 5 Modified

5-12

Advances in CPU Design

• Complex instruction set computer (CISC) chip - type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly

• Reduced instruction set computer (RISC) chip - limit the number of instructions the CPU can execute to increase processing speed

• Virtualization - a protected memory space created by the CPU allowing the computer to create virtual machines

Page 13: Chapter 5 Modified

5-13

Primary Storage

• Primary storage - the computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the CPU

Page 14: Chapter 5 Modified

5-14

Random Access Memory (RAM)

• Random access memory (RAM) - the computer’s primary working memory, in which program instructions and data are stored so that they can be accessed directly by the CPU via the processor’s high-speed external data bus– Volatility – Cache memory

Page 15: Chapter 5 Modified

5-15

Random Access Memory (RAM)

Page 16: Chapter 5 Modified

5-16

Read-Only Memory (ROM)

• Read-only memory (ROM) - the portion of a computer’s primary storage that does not lose its contents when one switches off the power– Flash memory – Memory card– Memory stick

Page 17: Chapter 5 Modified

5-17

Secondary Storage

• Secondary storage - consists of equipment designed to store large volumes of data for long-term storage– Megabyte (MB or M or Meg) - roughly 1 million

bytes– Gigabyte (GB) - roughly 1 billion bytes– Terabyte (TB) - roughly 1 trillion bytes

Page 18: Chapter 5 Modified

5-18

Secondary Storage

Page 19: Chapter 5 Modified

5-19

Magnetic Medium

• Magnetic medium - a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnetically sensitive materials

• Magnetic tape - an older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium

• Hard drive - a secondary storage medium that uses several rigid disks coated with a magnetically sensitive material and housed together with the recording heads in a hermetically sealed mechanism

Page 20: Chapter 5 Modified

5-20

Optical Medium

• Optical medium types include:– Compact disk-read-only memory (CD-ROM) – Compact disk-read-write (CD-RW) drive– Digital video disk (DVD) – DVD-ROM drive– Digital video disk-read/write (DVD-RW)

Page 21: Chapter 5 Modified

5-21

Input Devices

• Input device - equipment used to capture information and commands– Manual input devices

• Joystick• Keyboard• Microphone

– Automated input devices• Bar code scanner• Digital camera• Magnetic ink character reader

Page 22: Chapter 5 Modified

5-22

Output Devices

• Output device - equipment used to see, hear, or otherwise accept the results of information processing requests – Cathode-ray tube (CRT)– Liquid crystal display (LCD)– Laser printer– Ink-jet printer– Plotter

Page 23: Chapter 5 Modified

5-23

Communication Devices

• Communication device - equipment used to send information and receive it from one location to another– Dial-up access– Cable– Digital subscriber line– Wireless– Satellite

Page 24: Chapter 5 Modified

5-24

COMPUTER CATEGORIES

• Computer categories include:– Personal digital assistant (PDA) – Laptop– Tablet– Desktop– Workstation – Minicomputer – Mainframe computer– Supercomputer

Page 25: Chapter 5 Modified

5-25

Computer Categories

PDA Laptop/TabletSmartPhone Desktop/Workstation

Microcontroller Mainframe Supercomputer

Ultra-Mobile PC

Minicomputer

Business, Industrial,Scientific, and Academic

Personal (Micro Computers)

Page 26: Chapter 5 Modified

5-26

COMPUTER CATEGORIES

• For the past 20 years, federally funded supercomputing research has given birth to some of the computer industry’s most significant technology breakthroughs including:– Clustering – Parallel processing– Mosaic browser

Page 27: Chapter 5 Modified

5-27

SOFTWARE BASICS

• System software - controls how the various technology tools work together along with the application software– Operating system software – Utility software – Application software

Page 28: Chapter 5 Modified

5-28

Categories of Software

Page 29: Chapter 5 Modified

5-29

Utility Software

• Types of utility software– Crash-proof – Disk image– Disk optimization – Encrypt data– File and data recovery – Text protect– Preventative security – Spyware – Uninstaller

Page 30: Chapter 5 Modified

5-30

Application Software

• Types of application software– Bowser– Communication– Data management– Desktop publishing– E-mail– Groupware– Presentation graphics– Programming– Spreadsheet– Word processing

Page 31: Chapter 5 Modified

5-31

How Hardware and Software Interact

Page 32: Chapter 5 Modified

5-32

OPENING CASE QUESTIONSElectronic Breaking Points

1. Identify six hardware categories and place each product listed in the case in its appropriate category

2. Describe the CPU and identify which products would use a CPU

3. Describe the relationship between memory sticks and laptops. How can a user employ one to help protect information loss from the other?

4. What different types of software might each of the products listed in the case use?

Page 33: Chapter 5 Modified

McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved

SECTION 5.1SECTION 5.1

MANAGING ENTERPRISE

ARCHITECTURES

MANAGING ENTERPRISE

ARCHITECTURES

Page 34: Chapter 5 Modified

5-34

LEARNING OUTCOMES

5.1 Explain the three components of an enterprise architecture

5.2 Describe how an organization can implement a solid information architecture

Page 35: Chapter 5 Modified

5-35

LEARNING OUTCOMES

5.3 List and describe the five-ilities in an infrastructure architecture

5.4 Compare web services and open systems

Page 36: Chapter 5 Modified

5-36

ENTERPRISE ARCHITECTURES

• Enterprise architecture - includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets

• Enterprise architect (EA) - a person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business

Page 37: Chapter 5 Modified

5-37

ENTERPRISE ARCHITECTURES

• Primary goals of enterprise architectures

Page 38: Chapter 5 Modified

5-38

ENTERPRISE ARCHITECTURES

Page 39: Chapter 5 Modified

5-39

INFORMATION ARCHITECTURE

• Information architecture - identifies where and how important information, such as customer records, is maintained and secured

• Enterprise information architecture should focus on:1. Backup and recovery

2. Disaster recovery

3. Information security

Page 40: Chapter 5 Modified

5-40

INFORMATION ARCHITECTURE

Page 41: Chapter 5 Modified

5-41

Backup and Recovery

• Backup - an exact copy of a system’s information

• Recovery - the ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup

Page 42: Chapter 5 Modified

5-42

Backup and Recovery

• Fault tolerance - a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service

• Failover - a backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time

Page 43: Chapter 5 Modified

5-43

Disaster Recovery

• Disaster recovery best practices include:– Mind the enterprise architectures– Monitor the quality of computer

networks that provide data on power suppliers and demand

– Make sure the networks can be restored quickly in the case of downtime

– Set up disaster recovery plans– Provide adequate staff training

Page 44: Chapter 5 Modified

5-44

Disaster Recovery

• Financial Institutions Worldwide Spending on Disaster Recovery

Page 45: Chapter 5 Modified

5-45

Disaster Recovery

• Disaster recovery plan - a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood

• Disaster recovery cost curve - charts (1) the cost to the organization of the unavailability of information and technology and (2) the cost to the organization of recovering from a disaster over time

Page 46: Chapter 5 Modified

5-46

Disaster Recovery

Page 47: Chapter 5 Modified

5-47

Disaster Recovery

• Hot site - a separate and fully equipped facility where the company can move immediately after a disaster and resume business

• Cold site - a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster

Page 48: Chapter 5 Modified

5-48

Disaster Recovery

• Business continuity planning (BCP) - is a plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption

Page 49: Chapter 5 Modified

5-49

Information Security

• Good information architectures include…– A strong information security plan– Managing user access – Up-to-date antivirus software and patches

Page 50: Chapter 5 Modified

5-50

INFRASTRUCTURE ARCHITECTURE

• Infrastructure architecture - includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization’s goals

• As an organization changes, its systems must be able to change to support its operations

Page 51: Chapter 5 Modified

5-51

INFRASTRUCTURE ARCHITECTURE

Page 52: Chapter 5 Modified

5-52

INFRASTRUCTURE ARCHITECTURE

• Five primary characteristics of a solid infrastructure architecture:1. Flexibility

2. Scalability

3. Reliability

4. Availability

5. Performance

Page 53: Chapter 5 Modified

5-53

Flexibility

• Organizations must watch today’s business, as well as tomorrow’s, when designing and building systems

• Systems must be flexible enough to meet all types of business changes

Page 54: Chapter 5 Modified

5-54

Scalability

• Scalability - refers to how well a system can adapt to increased demands

• Capacity planning - determines the future IT infrastructure requirements for new equipment and additional network capacity– Performing a capacity plan is one way to

ensure the IT infrastructure is scalable

Page 55: Chapter 5 Modified

5-55

Reliability

• Reliability ensures all systems are functioning correctly and providing accurate information

• Reliability is another term for accuracy when discussing the correctness of systems within the context of efficiency IT metrics

Page 56: Chapter 5 Modified

5-56

Availability

• Availability - addresses when systems can be accessed by users

• High availability - refers to a system or component that is continuously operational for a desirably long length of time

Page 57: Chapter 5 Modified

5-57

Performance

• Performance - measures how quickly a system performs a certain process or transaction (in terms of efficiency IT metrics of both speed and throughput)

• Not having enough performance capacity can have a devastating, negative impact on a business

Page 58: Chapter 5 Modified

5-58

APPLICATION ARCHITECTURE

• Application architecture - determines how applications integrate and relate to each other

• With new architectures, IT can build new business capabilities faster, cheaper, and in a vocabulary the business can understand

Page 59: Chapter 5 Modified

5-59

Web Services

• Web service - contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services

• Interoperability - the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers

Page 60: Chapter 5 Modified

5-60

Web Services

Page 61: Chapter 5 Modified

5-61

Web Services

• The two primary parts of web services are:

1. Event - detect threats and opportunities and alert those who can act on the information

2. Service - more like software products than they are coding projects• Need to be reusable if they are going to have an

impact on productivity

Page 62: Chapter 5 Modified

5-62

Open Systems

• Open system - a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them

• Open source - refers to any program whose source code is made available for use or modification as users or other developers see fit

Page 63: Chapter 5 Modified

5-63

OPENING CASE QUESTIONSVirgin Mobile

1. How can an organization use an information architecture to protect its IT investment in electronic devices outlined in the case?

2. How can an organization use the architectures mentioned in the case to protect information security?

3. Identify the five-ilites and rank them in order of importance for a cell phone (1 highest, 5 lowest)

4. Describe the importance of web services and open systems to companies such as Virgin Mobile

Page 64: Chapter 5 Modified

McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved

SECTION 5.2SECTION 5.2

ARCHITECTURE TRENDS

ARCHITECTURE TRENDS

Page 65: Chapter 5 Modified

5-65

LEARNING OUTCOMES

5.5 Describe the business value in deploying a service oriented architecture

5.6 Explain the need for interoperability and loose coupling in building today’s IT systems

Page 66: Chapter 5 Modified

5-66

LEARNING OUTCOMES

5.7 Identify the logical functions used in a virtualized environment

5.8 Explain the business benefits of grid computing

Page 67: Chapter 5 Modified

5-67

ARCHITECTURE TRENDS

• Organizations today must continually watch new architecture trends to ensure they can keep up with new and disruptive technologies

• Three architecture trends that are quickly becoming requirements for all businesses including:1. Service oriented architecture2. Virtualization3. Grid computing

Page 68: Chapter 5 Modified

5-68

SERVICE ORIENTED ARCHITECTURE

• Service oriented architecture (SOA) is a business-driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services

• SOA ensures IT systems can adapt quickly, easily, and economically to support rapidly changing business needs

Page 69: Chapter 5 Modified

5-69

SERVICE ORIENTED ARCHITECTURE

Page 70: Chapter 5 Modified

5-70

SOA Business Benefits

• The key technical concepts of SOA are:– Services

– Interoperability

– Loose coupling

Page 71: Chapter 5 Modified

5-71

SOA Business Benefits

Page 72: Chapter 5 Modified

5-72

Service

• Service oriented architecture begins with a service

• (A SOA) service - can be a business task, such as checking a potential customer's credit rating only opening a new account

• Services are “like” software products

Page 73: Chapter 5 Modified

5-73

Service

Page 74: Chapter 5 Modified

5-74

Interoperability

• Interoperability - is the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers

• Extensible Markup Language (XML) - a markup language for documents containing structured information

Page 75: Chapter 5 Modified

5-75

Loose Coupling

• Loose coupling - is the capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional components

• Loose coupling is a way of ensuring that the technical details are decoupled from the service

Page 76: Chapter 5 Modified

5-76

VIRTUALIZATION

• Virtualization - is a framework of dividing the resources of a computer into multiple execution environments

• It is a way of increasing physical resources to maximize the investment in hardware

Page 77: Chapter 5 Modified

5-77

VIRTUALIZATION

Page 78: Chapter 5 Modified

5-78

What are Virtual Machines?

• System virtualization - is the ability to present the resources of a single computer as if it is a collection of separate computers ("virtual machines")

• Each with its own virtual CPUs, network interfaces, storage, and operating system

Page 79: Chapter 5 Modified

5-79

What are Virtual Machines?

Page 80: Chapter 5 Modified

5-80

Virtualization Business Benefits

• Trends that have moved virtualization into the spotlight:

– Hardware being underutilized

– Data centers running out of space

– Increased energy costs

– System administration costs mounting

Page 81: Chapter 5 Modified

5-81

Additional Virtualization Benefits

• Rapid application deployment

• Dynamic load balancing

• Streamlined disaster recovery

Page 82: Chapter 5 Modified

5-82

GRID COMPUTING

• Grid computing - is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data

Page 83: Chapter 5 Modified

5-83

GRID COMPUTING

Page 84: Chapter 5 Modified

5-84

Grid Computing Business Benefits

• Improving productivity and collaboration of virtual organizations and respective computing and data resources

• Allowing widely dispersed departments and businesses to create virtual organizations to share data and resources

• Building robust and infinitely flexible and resilient operational architectures

Page 85: Chapter 5 Modified

5-85

Grid Computing Business Benefit

• Providing instantaneous access to massive computing and data resources

• Leveraging existing capital investments, which in turn help to ensure optimal utilization and costs of computing capabilities

Page 86: Chapter 5 Modified

5-86

Grid Computing Business Benefits

Page 87: Chapter 5 Modified

5-87

OPENING CASE STUDY QUESTIONSVirgin Mobile

5. Explain the advantages Virgin Mobile has using a service oriented architecture

6. Why does Virgin Mobile need to use interoperability and loose coupling in their architecture?

7. Explain the business drivers for Virgin Mobile using virtualization

8. What business benefits would Virgin Mobile experience deploying grid computing?

Page 88: Chapter 5 Modified

5-88

CLOSING CASE ONEChicago Tribune

1. Review the five characteristics of infrastructure architecture and rank them in order of their potential impact on the Tribune Co.’s business

2. What is the disaster recovery cost curve? Where should the Tribune Co. operate on the curve?

3. Define backups and recovery. What are the risks to the Tribune’s business if it fails to implement an adequate backup plan?

Page 89: Chapter 5 Modified

5-89

CLOSING CASE ONEChicago Tribune

4. Why is a scalable and highly available enterprise architecture critical to the Tribune Co.’s current operations and future growth?

5. Identify the need for information security at the Tribune Co.

6. How could the Tribune Co. use a classified ad web service across its different businesses?

Page 90: Chapter 5 Modified

5-90

CLOSING CASE TWOThe US Open Supports SOA

1. Review the five characteristics of infrastructure architecture and rank them in order of their potential impact on the USOpen.org

2. What are the USTA security concerns regarding interoperability between the tournament database and its website?

3. How could the USTA benefit from virtualization?

Page 91: Chapter 5 Modified

5-91

CLOSING CASE TWOThe US Open Supports SOA

4. Identify the value of integrating the tournaments information with the USTA website USOpen.org?

5. Explain why a sudden surge in server utilization during the middle of the US Open could spell disaster for the USTA

6. Why is loose coupling a critical business component to the USTA architecture?

Page 92: Chapter 5 Modified

5-92

CLOSING CASE THREEeBay’s Grid

1. Review the five characteristics of infrastructure architecture and rank them in order of their potential impact on eBay’s business

2. What are the business benefits that eBay enjoys thanks to grid computing?

3. What precautions would eBay take to ensure 100 percent security?

Page 93: Chapter 5 Modified

5-93

CLOSING CASE THREEeBay’s Grid

4. How can eBay take advantage of implementing SOA?

5. Explain how eBay uses fault tolerance

6. Describe the potential value of eBay using virtualization

7. What ethical and security concerns should eBay be aware of to ensure its business operates properly?

Page 94: Chapter 5 Modified

5-94

BUSINESS DRIVEN BEST SELLERS

• THE NEW LANGUAGE OF BUSINESS: SOA & WEB 2.0, by Sandy Carter

Page 95: Chapter 5 Modified

5-95

BUSINESS DRIVEN BEST SELLERS

• DOES IT MATTER?, by Nicholas G. Carr