* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Slide 1
Internet protocol suite wikipedia , lookup
Network tap wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Computer network wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Computer security wikipedia , lookup
Airborne Networking wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Wireless security wikipedia , lookup
CHAPTER 5 IT ARCHITECTURES Presented by Bernt Karlsson McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Chapter Five Overview • SECTION 5.1 - HARDWARE AND SOFTWARE BASICS – Hardware Basics – Computer Categories – Software Basics • SECTION 5.2 – MANAGING ENTERPRISE ARCHITECTURES – Enterprise Architectures – Information Architecture – Infrastructure Architecture – Application Architecture ITO 07-06-13 Bild 5-2 SECTION 5.1 - HARDWARE AND SOFTWARE BASICS Information technology (IT) - any computer-based tool that people use to work with information and support the information and information-processing needs of an organization – Hardware - consists of the physical devices associated with a computer system – Software - the set of instructions that the hardware executes to carry out specific tasks – Computer – is an electronic device operating under the control of instructions stored in its own memory that can accept, manipulate and store data. It consists of six hardware components. ITO 07-06-13 Bild 5-3 Hardware basics Control Unit Arithmetic Logic Unit, ALU Central Processing Unit, CPU ITO 07-06-13 Bild 5-4 Secondary Storage Zettabyte (ZB) Yottabyte (YB) 1024 EB) 1024 ZB) ITO 07-06-13 Bild 5-5 Secondary Storage • • Vilket årtal levereras den första hårddisken på 1 PetaByte ? Vilket årtal levereras den första hårddisken på 1 ExaByte ? ITO 07-06-13 Bild 5-6 Secondary Storage capacity Moores law: number of transistors on an integrated circuit for minimum component cost doubles every 24 months (18 month). Kryders law: Magnetic disk areal storage density doubles annually Log. scale ITO 07-06-13 Bild 5-7 Secondary Storage År GB 1979 0,001 1989 0,10 1999 10,00 2009 1 000,00 2019 100 000,00 2029 10 000 000,00 2039 1 000 000 000,00 1 TerraByte 2009 1 PettaByte 2024 1 ExaByte 2039 ITO 07-06-13 Bild 5-8 Communication Devices • Communication device - equipment used to send information and receive it from one location to another Carrier technology Speed Dial up access via modem 2400-56 Kbps Cable 512 Kbps-20 Mbps (100 Mbps) DSL Digital Subscriber Line 128 Kbps-8 Mbps Wireless (Local Multipoint Communication System (LMCS) 30 Mbps or more Satellite 6 Mbps or more ITO 07-06-13 Bild 5-9 Computer categories • Computer categories include: – – – – – – – – – – Smart Phones Personal digital assistant (PDA) Ultra Mobile PC (UMPC) Tablet PC Laptop Desktop Workstation Minicomputer Mainframe computer Supercomputer 1,5”-4” 4” -6” 7” -8” 8” -12” 12”-17” ITO 07-06-13 Bild 5-10 Några tekniska begrepp Binära tal 32 16 8 4 2 1 1 0 0 0 1 1 = 35 Binär lagring av tecken – ASCI-kod – 8 st 1/0 kallas byte 256 128 64 32 16 8 4 2 1 0 1 0 0 0 0 0 0 1=A 0 0 1 1 0 0 0 0 1 = 1 (tecknet ett, inte värdet) Lagring av tecken 1 Byte = 1 tecken Lagringskapacitet 100 MB = 100.000.000 bytes(tecken) Överföringshastighet Bits/ sekund Datorns hastighet 1 Hertz = 1 intern aktivitet/ sek (ex en jämförelse av två tal Eller MIPS = milj instruktioner per sekund, ex additioner ITO 07-06-13 Bild 5-11 CPU speed factors • General factors – Clock speed (Mhz or Ghz). One instruction per cycle – Word length in number of bits, to be processed at the same time – Bus width, the width of the bus connecting internal CPU units – Chip line width, distance between transistors in a chip • Architecture factors – Pipelining of data and instructions – Using cache memory – Parallell processing (multi core (dual core)) ITO 07-06-13 Bild 5-12 Performance variables for Computer system Capacity How much information can be stored and process? Speed How fast can data be processed? Price-Performance Cost for storage and processing Reliability How long will it continue without unplanned interruptions? (Mean time between failures, MTBF) Operating conditions Space, weight, temperature restrictions, electricity consumption ITO 07-06-13 Bild 5-13 Software basics • System software - controls how the various technology tools work together along with the application software – Operating system software – Utility software – Application software ITO 07-06-13 Bild 5-14 Utility Software •Types of utility software – Crash-proof – Disk image – Disk optimization – Encrypt data – File and data recovery – Text protect – Preventative security – AntiSpyware – Antivirus – Firewall – Uninstaller Utility software functions can also be part of the operating system, completely or partly ITO 07-06-13 Bild 5-15 Application Software • • Types of generic application software – Browser – Telnet Communication – Database management – Desktop publishing – E-mail – Groupware – Presentation graphics – Programming – Spreadsheet – Word processing Types of custom application software – Salary – Bookkeeping – bank transactions ITO 07-06-13 Bild 5-16 IBM WebSphere utvecklingsmiljö Rapid Application Development Visual composition of business flows Struts framework Java development Web development Web services development En komplett integrerad utvecklingsmiljö, EJB development baserad på checklistor och färdiga mallar Team development och komponenter Design and modelling (UML) Wizards, code generators Bygg ett system på några dagar………. Code assist and proposal XML and XSL development Component test tools Testing and publishing (local and remote) Built-in test environments Enterprice (legacy) tools Relational database tools Debugger (local and remote) Microsoft har liknande miljöer Profiling (local and remote) ITO 07-06-13 Bild 5-17 Olika paradigmer för programmering Program Databas Funktionellt Ex Pascal och SQL Program Objekt Attribut/Data OO Ex Java Operationer/ metoder Logik programmering Ex PROLOG Deklarativ programmering Meddelande Fråga: b ? Fakta: a Slutsatsregler: a->b Föreslå en lösning ITO 07-06-13 Bild 5-18 5.2. ENTERPRISE ARCHITECTURES • Enterprise architecture - includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets • Enterprise architect (EA) - a person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business ITO 07-06-13 Bild 5-19 IS-plan - en del av business-plan IS-plan Bild ur Alter Information Systems ITO 07-06-13 Bild 5-20 Vad innehåller en IS-plan ? • Strategier för bl.a. • Kompetensutveckling av IS-personal och användare • Hårdvara • Nät • Programvaruutveckling: metoder, tekniker • Lagring av information • Datakommunikation • Säkerhet och skydd • Leverantörsval • Kvalitetssäkring • Centralicering/decentralisering av IS-personal, datorer, data ITO 07-06-13 Bild 5-21 Challanges in IS Planning • Svårt att förutse och utvärdera tekniska möjligheter • Svårt att samordna mål, strategier och planer för IT med andra områden i företaget som organisation, produktutveckling etc. • Svårt, dyrt och tar tid att bygga system • Svårt att underhålla och anpassa system till snabba ändringar i verksamhet • Samarbetssvårigheter mellan IT-personal och annan personal, man pratar inte samma språk ITO 07-06-13 Bild 5-22 Centralisering - Decentralisering Hardware location Data location Ownership / Responsibility and control Development ITO 07-06-13 Bild 5-23 Enterprise architectures focus ITO 07-06-13 Bild 5-24 Backup and Recovery Fig from Alter: Information Systems ITO 07-06-13 Bild 5-25 Backup and Recovery • Preventing System failure – Fault tolerance, backup component or procedure take over without loss of service (may take some time however). Cold standby system. – Failover, a secondary computer component take over seamless when the primary component fails. Hot standby system (running in parallel) ITO 07-06-13 Bild 5-26 Disaster Recovery • Disaster recovery plan - a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood • Disaster recovery cost curve - charts (1) the cost to the organization of the unavailability of information and technology and (2) the cost to the organization of recovering from a disaster over time ITO 07-06-13 Bild 5-27 Disaster Recovery Cost Curve ITO 07-06-13 Bild 5-28 Information Security • A good information architecture includes: – A strong information security plan – Managing user accesses towards internet – Keep a strong password discipline – Up-to-date antivirus and anti-spy ware software – Install security patches immediately for the operating system, application and utility – Use intrusion detection, content filtering and anti spam software ITO 07-06-13 Bild 5-29 Infrastructure architecture • Five primary characteristics of a solid infrastructure architecture commonly known as “ilities”: 1. Flexibility 2. Scalability 3. Reliability 4. Availability 5. Performance ITO 07-06-13 Bild 5-30 Web Services • Web service - contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services • Interoperability - the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers ITO 07-06-13 Bild 5-31 Web – services SE-Banken Bokning Consumer Insättning SF Biografer 1. Web Service is a business service offered to consumers over the internet 2. Web Service a technology that standardizes system communication over the internet, using XML Internet-standarden och XML möjliggör att datortyp, programmeringspråk etc. blir irrelevant. Man får en generell öppen lösning. ITO 07-06-13 Bild 5-32 Designprincip Service Oriented Architecture (SOA) ”Gula sidorna” för Web-tjänster Broker 1) Publish 2) Find/discover Consumer (Requester) Provider 3) Bind/invoke SE-Banken SOA activities: “Publish-find-bind” SOA roles: provider, broker, consumer SF-biografer Martin Henkel, 2003 [email protected] ITO 07-06-13 Bild 5-33 Ett önskeläge Ett företag (processer: Inköp och betalning) önskar samarbeta elektroniskt med en leverantör (processer: Sälj och fakturering) I ett Bibliotek med Businessprocesser (Rutiner, dokument och Programvara) finner man processer som passar ihop. XML-format används genomgående Kommunikationen sker via Internet Företagen installerar detta på varsitt håll, varefter man kan samarbeta elektroniskt ITO 07-06-13 Bild 5-34 Open Systems • Open system - a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them – Allow systems to seamlessly share information – Capitalize on enterprise architectures – Eliminate proprietary systems and promote competitive pricing ITO 07-06-13 Bild 5-35 CHAPTER 7 NETWORKS, TELECOMMUNICATIONS, AND WIRELESS COMPUTING McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Chapter Seven Overview • SECTION 7.1 – NETWORKS AND TELECOMMUNICATIONS – – – – – – • Network Basics Architecture Topology Protocols Media E-Business Networks SECTION 7.2 – WIRELESS COMPUTING – – – – Wireless Fidelity Business Drivers for Wireless Technologies Advantages of Enterprise Mobility The Future of Wireless ITO 07-06-13 Bild 5-37 7.1. NETWORKS AND TELECOMMUNICATIONS • Telecommunication system - enable the transmission of data over public or private networks • Network - a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together ITO 07-06-13 Bild 5-38 Network basics Wide area network USA Boston IT-center Boston Local area network Metropolitan area network ITO 07-06-13 Bild 5-39 Network Basics • Networks are differentiated by the following: – – – – • Architecture - peer-to-peer, client/server Topology - bus, star, ring, hybrid Protocols - Ethernet, Transmission Control Protocol/Internet Protocol (TCP/IP) Media - coaxial, twisted-pair, fiber-optic, Wireless Understanding networks see: – http://compnetworking.about.com/od/basicnetworkingconcepts/ ITO 07-06-13 Bild 5-40 Architecture • There are two primary types of architectures – – Peer-to-peer (P2P) network • Public files located on the peers • All computers in the network can act as a peer Client/server network • One server supporting many clients ITO 07-06-13 Bild 5-41 Peer-to-Peer Networks • Peer-to-peer (P2P) network - any network without a central file server and in which all computers in the network have access to the public files located on all other workstations E.g. • Napster (1999 - 2001) • Kazaa (2000 – 2006) • Kazaa Lite (2002 - ????) • DC++ (Direct Connect)(2005 - ????) • Bit Torrent (2001 - ????) – – – LINUX distribution Podcasting/Podradio (Portable On Demand) RSS (Really Simple Syndication) (Prenumeration) ITO 07-06-13 Bild 5-42 Client/Server Networks • • Client - a computer that is designed to request information from a server Server - a computer that is dedicated to providing information in response to external requests • Client/server network - model for applications in which the bulk of the backend processing takes place on a server, while the front-end processing is handled by the clients • Can a Computer be both a Client and a Server? ITO 07-06-13 Bild 5-43 Client server vs. Main Frame computing Bild från Alter: Information Systems3 ITO 07-06-13 Bild 5-44 Client/Server Networks • Network operating system (NOS) - the operating system that runs a network, steering information between computers and managing security and users • Packet-switching - occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer • Router - an intelligent connecting device that connect networks together. It examines each packet of data it receives and then decides which way to send it onward toward its destination • Switch - an intelligent connecting device that filters and forward packets between network segments • HUB – a concentrator that act as a repeater for USB or Ethernet. Used inside LAN to connect network segments ITO 07-06-13 Bild 5-45 Client/Server Networks • Client/Server network The router growth worldwide is two times Every 4’th year during 2002 to 2010 (25% per year). 20M routers 2002 och 80M routers 2010. ITO 07-06-13 Bild 5-46 Topology ITO 07-06-13 Bild 5-47 Protocols • Protocol - a standard that specifies the format of data as well as the rules to be followed during transmission • Interoperability - the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers ITO 07-06-13 Bild 5-48 Ethernet – most popular • Ethernet - a physical and data layer technology for LAN networking (Xerox 1976 - ) 85% of all LAN use Ethernet. Others are: • AppleTalk •Token Ring 1, 10, 100, 1000 Mbit/s ITO 07-06-13 Bild 5-49 Transmission Control Protocol/ Internet Protocol Family • Transmission Control Protocol/Internet Protocol (TCP/IP) Family provides the technical foundation for the public Internet as well as for large numbers of private network. Five layer reference model if the physical layer is included. Developed by DoD (Department of Defence) in early -70. TCP is a connection-oriented secure protocol UDP (User Datagram Protocol) is an insecure connectionless protocol SNMP UDP Network Data Link Physical FDDI (Fiber Distributed Data Interface) Cable, Fiber ITO 07-06-13 Bild 5-50 Transmission Control Protocol/ Internet Protocol • TCP/IP applications – File transfer protocol (FTP) – Simple mail transfer protocol (SMTP) – Telnet protocol – Hypertext transfer protocol (HTTP) – Simple network management Protocol (SNMP) ITO 07-06-13 Bild 5-51 Open System Interconnection Model ITO 07-06-13 Bild 5-52 Voice over IP (VoIP) • Voice over IP (VoIP) - uses TCP/IP technology to transmit voice calls over long-distance telephone lines Niklas Zennström och Janus Friis vad är dom kända för ? ATM ATM switches very much faster than IP routers end of -90 ATM (Asynchronous Transfer Mode) ITO 07-06-13 Bild 5-53 Media • Network transmission media - refers to the various types of media used to carry the signal between computers – Wire media (guided) • Twisted pair wiring (Ethernet - LAN) • Coaxial cable (Token ring, old Ethernet installation) • Fiber-optic cable (IP backbone) – Wireless media (unguided) • Micro waves • radio waves • infrared light waves ITO 07-06-13 Bild 5-54 Wireless Media • Wireless media - natural parts of the Earth’s environment that can be used as physical paths to carry electrical signals ITO 07-06-13 Bild 5-55 E-business Networks ITO 07-06-13 Bild 5-56 E-business Networks • • Virtual private network (VPN) - a way to use the public telecommunication infrastructure (e.g., Internet) to provide secure access to an organization’s network Valued-added network (VAN) - a private network, provided by a third party, for exchanging information through a high capacity connection ITO 07-06-13 Bild 5-57 7.2. WIRELESS COMPUTING • Wireless fidelity (wi-fi) – a means of linking computers using infrared or radio signals • Common examples of wireless devices include: – Cellular phones and pagers – Global positioning systems (GPS) – Cordless computer peripherals – Home-entertainment-system control boxes – Two-way radios – Satellite television • Wireless Skype phone ? ITO 07-06-13 Bild 5-58 Wireless Fidelity (Wi-fi) • Disruptive wireless technologies – – – – WiMax wireless broadband (formed 2001, standard IEEE 802.16 Radio frequency identification tags (RFID) (active, passive) Micro hard drives (1” Hard Disk 20GB 2007) Apple’s G5 and AMD’s Athlon 64 processors handles 16 billion gigabyte at a time ITO 07-06-13 Bild 5-59 The Value of Timely Information • Timeliness is an aspect of information that depends on the situation – Real-time information – immediate, up-to-date information – Real-time system – provides real-time information in response to query requests ITO 07-06-13 Bild 5-60 The Value of Timely Information • Real-time systems help organizations make faster and more effective decisions ITO 07-06-13 Bild 5-61 Business Drivers For Wireless Technologies • Mobile and wireless are often used synonymously, but actually denote two different technologies – Mobile technology - means the technology can travel with the user, but it is not necessarily in real-time – Wireless technology - gives users a live (Internet) connection via satellite or radio transmitters ITO 07-06-13 Bild 5-62 Business Drivers For Wireless Technologies • Drivers of wireless technology growth include: – Universal access to information and applications – The automation of business processes – User convenience, timeliness, and ability to conduct business 24x7x365 ITO 07-06-13 Bild 5-63 Business Drivers For Wireless Technologies ITO 07-06-13 Bild 5-64 Business Drivers For Wireless Technologies • Wireless devices changing business include: – – – – – – Wireless local area network (wLAN) Cellular phones and pagers Cordless computer peripherals Satellite television WiMax wireless broadband Security sensor ITO 07-06-13 Bild 5-65 Advantages Of Enterprise Mobility ITO 07-06-13 Bild 5-66 Bluetooth • Bluetooth – an omnidirectional wireless technology that provides limited-range voice and data transmission over the unlicensed 2.4-GHz frequency band, allowing connections (max 30 feet) with a wide variety of fixed and portable devices that normally would have to be cabled together ITO 07-06-13 Bild 5-67 Radio Frequency Identification • Radio frequency identification (RFID) - use active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers • RFID tag - contains a microchip and an antenna, and typically work by transmitting a serial number via radio waves to an electronic reader, which confirms the identity of a person or object bearing the tag http://www.rfid.se/ ITO 07-06-13 Bild 5-68 RFID Activate and ITO 07-06-13 Bild 5-69 RFID ITO 07-06-13 Bild 5-70 RFID Technology • Passive RFID tags have no internal power supply. The minute electrical current induced in the antenna by the incoming radio frequency signal provides just enough power for the CMOS integrated circuit in the tag to power up and transmit a response • active RFID tags have their own internal power source, which is used to power the integrated circuits and broadcast the signal to the reader • Semi-passive tags are similar to active tags as they have their own power source, but the battery is used just to power the microchip and not broadcast a signal ITO 07-06-13 Bild 5-71 Satellite • Microware transmitter – commonly used to transmit network signals over great distances ITO 07-06-13 Bild 5-72 Global Positioning System • Global positioning system (GPS) (DoD 1993 - ))– a device that determines current latitude, longitude, speed, and direction of movement – Market for GPS services is at $5 billion with expectations for the demand to double over the next five years • Geographic information system (GIS) – designed to work with information that can be shown on a map ITO 07-06-13 Bild 5-73 The Future Of Wireless Entertainment (music, movies, sports etc.) ? ITO 07-06-13 Bild 5-74