CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE The Business Benefits of a Solid MIS Infrastructure Supporting Operations: Information MIS Infrastructure Supporting Change: Agile MIS Infrastructure SECTION 5.2 – BUILDING SUSTAINABLE MIS INFRASTRUCTURES MIS and the Environment Supporting the Environment: Sustainable MIS Infrastructure Show
SECTION 5.1 MIS Infrastructures LEARNING OUTCOMES Explain MIS infrastructure and its three primary types Identify the three primary areas associated with an information MIS infrastructure Describe the characteristics of an agile MIS infrastructure THE BUSINESS BENEFITS OF A SOLID MIS INFRASTRUCTURE MIS infrastructure – Includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets Hardware Software Network Client Server THE BUSINESS BENEFITS OF A SOLID MIS INFRASTRUCTURE Supporting operations Information MIS infrastructure Supporting change Agile MIS Infrastructure Supporting the environment Sustainable MIS infrastructure SUPPORTING OPERATIONS: INFORMATION MIS INFRASTRUCTURE Backup and recovery plan Disaster recovery plan Business continuity plan Backup and Recovery Plan Backup – An exact copy of a system’s information Recovery – The ability to get a system up and running in the event of a system crash or failure Fault tolerance Failover Failback Backup and Recovery Plan Disaster recovery plan – A detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood Disaster recovery cost curve – Charts (1) the cost to the organization of the unavailability of information and technology and (2) the cost to the organization of recovering from a disaster over time Backup and Recovery Plan Backup and Recovery Plan Hot site – A separate and fully equipped facility where the company can move immediately after a disaster and resume business Cold site – A separate facility that does not have any computer equipment, but is a place where employees can move after a disaster Warm site – A separate facility with computer equipment that requires installation and configuration Business Continuity Plan Business continuity planning (BCP) – A plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption Emergency notification services SUPPORTING CHANGE: AGILE MIS INFRASTRUCTURE Characteristics of an agile MIS infrastructure Accessibility Availability Maintainability Portability Reliability Scalability Usability Accessibility Accessibility – Refers to the varying levels that define what a user can access, view, or perform when operating a system Administrator access – Unrestricted access to the entire system Availability Availability – Time frames when the system is operational Unavailable – Time frames when a system is not operating and cannot be used High availability – System is continuously operational at all times Maintainability Maintainability – How quickly a system can transform to support environmental changes Organizations must watch today’s business, as well as tomorrow’s, when designing and building systems Systems must be flexible enough to meet all types of business changes Portability Portability – The ability of an application to operate on different devices or software platforms Reliability Reliability – Ensures a system is functioning correctly and providing accurate information Reliability is another term for accuracy when discussing the correctness of systems within the context of efficiency IT metrics Scalability Scalability – How well a system can scale up, or adapt to the increased demands of growth Performance – Measures how quickly a system performs a process or transaction Capacity planning – Determines future environmental infrastructure requirements to ensure high-quality system performance Usability Usability – The degree to which a system is easy to learn and efficient and satisfying to use SECTION 5.2 Building Sustainable MIS Infrastructures LEARNING OUTCOMES Identify the environmental impacts associated with MIS Explain the three components of a sustainable MIS infrastructures along with their business benefits MIS AND THE ENVIRONMENT Moore’s Law – Refers to how the computer chip performance per dollar doubles every 18 months Sustainable, or “green,” MIS – Describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment Corporate social responsibility – Companies’ acknowledged responsibility to society MIS AND THE ENVIRONMENT Three Primary Side Effects of Businesses’ Expanded Use of Technology Increased Electronic Waste Ewaste – Refers to discarded, obsolete, or broken electronic devices Sustainable MIS disposal – Refers to the safe disposal of MIS assets at the end of their life cycle Increased Energy Consumption Huge increases in technology use have greatly amplified energy consumption The energy consumed by a computer is estimated to produce as much as 10 percent of the amount of carbon dioxide produced by an automobile Increased Carbon Emissions The major human-generated greenhouse gases, such as carbon emissions from energy use, are very likely responsible for the increases in climatic temperature over the past half a century When left on continuously, a single desktop computer and monitor can consume at least 100 watts of power per hour SUPPORTING THE ENVIRONMENT: SUSTAINABLE MIS INFRASTRUCTURE The components of a sustainable MIS infrastructure include Grid computing Cloud computing Virtualized computing Grid Computing Grid computing - A collection of computers, often geographically dispersed, that are coordinated to solve a common problem Grid computing – a collection of computers, often geographically dispersed, that are coordinated to solve a common problem. With grid computing, a problem is broken into pieces and distributed to many machines, allowing faster processing than could occur with a single system. Computers typically use less than 25 percent of their processing power, leaving more than 75 percent available for other tasks. Innovatively, grid computing takes advantage of this unused processing power by linking thousands of individual computers around the world to create a “virtual supercomputer” that can process intensive tasks Smart grid – delivers electricity using two-way digital technology. Cloud Computing Cloud computing - Refers to the use of resources and applications hosted remotely on the Internet Cloud Computing Infrastructure as a Service (IaaS) Software as a Service (SaaS) Platform as a Service (PaaS) Virtualized Computing Virtualization - Creates multiple “virtual” machines on a single computing device Virtualized Computing Data center – A facility used to house management information systems and associated components, such as telecommunications and storage systems Sustainable data centers Reduces carbon emissions Reduces required floor space Chooses geographic location Sustainable MIS infrastructure identifies ways that a company can grow interms of computing resources while simultaneously becoming less dependenton hardware and energy consumption. Sustainable, or green, MIS describes theproduction, management, use, and disposal of technology in a way thatminimizes damage to the environment. Sustainable MIS is a critical part ofcorporate social responsibility, that is, companies’ acknowledged responsibilityto society. Building sustainable MIS infrastructures is a core initiative andcritical success factor for socially responsible corporations. The three primaryside effects of businesses’ expanded use of technology include:Electronic wasteEnergy consumptionCarbon EmissionsIn this introduction to networking, learn how computer networks work, the architecture used to design networks, and how to keep them secure. A computer network comprises two or more computers that are connected—either by cables [wired] or WiFi [wireless]—with the purpose of transmitting, exchanging, or sharing data and resources. You build a computer network using
hardware [e.g., routers, switches, access points, and cables] and software [e.g., operating systems or business applications]. Geographic location often defines a computer network. For example, a LAN [local area network] connects computers in a defined physical space, like an office building, whereas a WAN [wide area network] can connect computers across continents. The internet is the largest example of a WAN, connecting billions of computers worldwide. You can further
define a computer network by the protocols it uses to communicate, the physical arrangement of its components, how it controls traffic, and its purpose. Computer networks enable communication for every business, entertainment, and research purpose. The internet, online search, email, audio and video sharing, online commerce, live-streaming, and social networks all exist because of computer networks. Computer network typesAs networking needs evolved, so did the computer network types that serve those needs. Here are the most common and widely used computer network types:
Important terms and conceptsThe following are some common terms to know when discussing computer networking:
Examples of computer networksThe wired or wireless connection of two or more computers for the purpose of sharing data and resources form a computer network. Today, nearly every digital device belongs to a computer network. In an office setting, you and your colleagues may share access to a printer or to a group messaging system. The computing network that allows this is likely a LAN or local area network that permits your department to share resources. A city government might manage a city-wide network of surveillance cameras that monitor traffic flow and incidents. This network would be part of a MAN or metropolitan area network that allows city emergency personnel to respond to traffic accidents, advise drivers of alternate travel routes, and even send traffic tickets to drivers who run red lights. The Weather Company worked to create a peer-to-peer mesh network that allows mobile devices to communicate directly with other mobile devices without requiring WiFi or cellular connectivity. The Mesh Network Alerts project allows the delivery of life-saving weather information to billions of people, even without an internet connection. Computer networks and the internetThe internet is actually a network of networks that connects billions of digital devices worldwide. Standard protocols allow communication between these devices. Those protocols include hypertext transfer protocol [the ‘http’ in front of all website addresses]. Internet protocol [or IP addresses] are the unique identifying numbers required of every device that accesses the internet. IP addresses are comparable to your mailing address, providing unique location information so that information can be delivered correctly. Internet Service Providers [ISPs] and Network Service Providers [NSPs] provide the infrastructure that allows the transmission of packets of data or information over the internet. Every bit of information sent over the internet doesn’t go to every device connected to the internet. It’s the combination of protocols and infrastructure that tells information exactly where to go. How do they work?Computer networks connect nodes like computers, routers, and switches using cables, fiber optics, or wireless signals. These connections allow devices in a network to communicate and share information and resources. Networks follow protocols, which define how communications are sent and received. These protocols allow devices to communicate. Each device on a network uses an Internet Protocol or IP address, a string of numbers that uniquely identifies a device and allows other devices to recognize it. Routers are virtual or physical devices that facilitate communications between different networks. Routers analyze information to determine the best way for data to reach its ultimate destination. Switches connect devices and manage node-to-node communication inside a network, ensuring that bundles of information traveling across the network reach their ultimate destination. ArchitectureComputer network architecture defines the physical and logical framework of a computer network. It outlines how computers are organized in the network and what tasks are assigned to those computers. Network architecture components include hardware, software, transmission media [wired or wireless], network topology, and communications protocols. Main types of network architectureThere are two types of network architecture: peer-to-peer [P2P] and client/server. In P2P architecture, two or more computers are connected as “peers,” meaning they have equal power and privileges on the network. A P2P network does not require a central server for coordination. Instead, each computer on the network acts as both a client [a computer that needs to access a service] and a server [a computer that serves the needs of the client accessing a service]. Each peer makes some of its resources available to the network, sharing storage, memory, bandwidth, and processing power. In a client/server network, a central server or group of servers manage resources and deliver services to client devices in the network. The clients in the network communicate with other clients through the server. Unlike the P2P model, clients in a client/server architecture don’t share their resources. This architecture type is sometimes called a tiered model because it's designed with multiple levels or tiers. Network topologyNetwork topology refers to how the nodes and links in a network are arranged. A network node is a device that can send, receive, store, or forward data. A network link connects nodes and may be either cabled or wireless links. Understanding topology types provides the basis for building a successful network. There are a number of topologies but the most common are bus, ring, star, and mesh:
SecurityComputer network security protects the integrity of information contained by a network and controls who access that information. Network security policies balance the need to provide service to users with the need to control access to information. There are many entry points to a network. These entry points include the hardware and software that comprise the network itself as well as the devices used to access the network, like computers, smartphones, and tablets. Because of these entry points, network security requires using several defense methods. Defenses may include firewalls—devices that monitor network traffic and prevent access to parts of the network based on security rules. Processes for authenticating users with user IDs and passwords provide another layer of security. Security includes isolating network data so that proprietary or personal information is harder to access than less critical information. Other network security measures include ensuring hardware and software updates and patches are performed regularly, educating network users about their role in security processes, and staying aware of external threats executed by hackers and other malicious actors. Network threats constantly evolve, which makes network security a never-ending process. The use of public cloud also requires updates to security procedures to ensure continued safety and access. A secure cloud demands a secure underlying network. Read about the top five considerations [PDF, 298 KB] for securing the public cloud. Mesh networksAs noted above, a mesh network is a topology type in which the nodes of a computer network connect to as many other nodes as possible. In this topology, nodes cooperate to efficiently route data to its destination. This topology provides greater fault tolerance because if one node fails, there are many other nodes that can transmit data. Mesh networks self-configure and self-organize, searching for the fastest, most reliable path on which to send information. Type of mesh networksThere are two types of mesh networks—full mesh and partial mesh:
Load balancers and networksLoad balancers efficiently distribute tasks, workloads, and network traffic across available servers. Think of load balancers like air traffic control at an airport. The load balancer observes all traffic coming into a network and directs it toward the router or server best equipped to manage it. The objectives of load balancing are to avoid resource overload, optimize available resources, improve response times, and maximize throughput. For a complete overview of load balancers, see Load Balancing: A Complete Guide. Content delivery networksA content delivery network [CDN] is a distributed server network that delivers temporarily stored, or cached, copies of website content to users based on the user’s geographic location. A CDN stores this content in distributed locations and serves it to users as a way to reduce the distance between your website visitors and your website server. Having cached content closer to your end users allows you to serve content faster and helps websites better reach a global audience. CDNs protect against traffic surges, reduce latency, decrease bandwidth consumption, accelerate load times, and lessen the impact of hacks and attacks by introducing a layer between the end user and your website infrastructure. Live-streaming media, on-demand media, gaming companies, application creators, e-commerce sites—as digital consumption increases, more content owners turn to CDNs to better serve content consumers. Computer networking solutions and IBMComputer networking solutions help businesses enhance traffic, keep users happy, secure the network, and easily provision services. The best computer networking solution is typically a unique configuration based on your specific business type and needs. Content delivery networks [CDNs], load balancers, and network security—all mentioned above—are examples of technologies that can help businesses craft optimal computer networking solutions. IBM offers additional networking solutions, including:
Networking services in IBM Cloud provide you with networking solutions to enhance your traffic, keep your users happy, and easily provision resources as you need them. Build networking skills and get IBM Professional Certification through the courses within the Cloud Site Reliability Engineers [SRE] Professional curriculum. Sign up for an IBMid and create your IBM Cloud account. Grid computing is defined as a distributed architecture of multiple computers connected by networks that work together to accomplish a joint task. This system operates on a data grid where computers interact to coordinate jobs at hand. MIS infrastructure consists of Information infrastructure, sustainable infrastructure, and agile information structure. The information indicates how a business can sustain operations through disaster recovery, backup, and business continuity plans. A Computer Network is a group of two or more interconnected computer systems that use common connection protocols for sharing various resources and files. What is the correlation between the fulfillment of Moore's law, which has helped make electronic devices more affordable, and ewaste? It has increasesd ewaste. |