Understand the strategic arrangement of IS/IT in modern organisations. Week 3 IT Architecture and Infrastructure. Lecture objectives
|
|
- Olivia Fleming
- 8 years ago
- Views:
Transcription
1 IMS9043 IT in Organisations Lecture objectives Week 3 IT Architecture and Infrastructure Understand the strategic arrangement of IS/IT in modern organisations 1 2 Information Systems & People Information Infrastructure There are five major components of the infrastructure: Computer hardware Development software Networks and communication facilities (including the Internet and intranets) Databases Information management personnel 3 4 Information Architecture Information architecture is a high-level map or plan of the information requirements in an organization. Information Architecture In preparing information architecture, the designer requires two kinds of information: The business needs of the organization that is, its objectives and problems, and the contribution that IT can make. The information systems that already exist in an organization and how they can be combined among themselves or with future systems to support the organization s information needs. 5 6
2 Computer hardware environments (1) Mainframe (server-based) Mainframe environment. In the mainframe environment, processing is done by a mainframe computer. The users work with passive (or dumb ) terminals, which are used to enter or change data and access information from the mainframe. Earliest computerised information systems: Information problem brought to the computer Number crunching Technicians in control Specific tasks 7 8 Computer hardware environments (2) Personal computer (client-based) PC environment. In the PC configuration, only PCs form the hardware information architecture. Networked (distributed) environment. Distributed processing divides the processing work between two or more computers. The purpose of client/server architecture is to maximize the use of computer resources Client/Server Architecture Client/Server Architecture A client/server architecture divides networked computing units into two major categories; clients and servers. A client is a computer such as a PC or a workstation attached to a network, which is used to access shared network resources. A server is a machine that is attached to this same network and provides clients with these services. Client/server architecture gives a company as many access points to data as there are PCs on the network. 11 PC LAN (local area network) PCs, each with its own storage Flexible Device sharing Scalability increased load catered absorbed by adding workstations 12
3 Processing architectures: Distributed Systems Processing divided (not necessarily evenly) between client and server Mainframe or PC combinations One location or several inter-organisational cooperation access vast amounts of data team geographically dispersed computers new software supports info. exchange/ collaboration Distributed systems: Electronic Data Interchange (EDI) Electronic data interchange (EDI) is the electronic movement of specially formatted standard business documents, such as orders, bills, and confirmations sent between business partners. The cost of VANS limited EDI to large business partners. However, the situation is changing rapidly with the emergence of Internet-based EDI Distributed systems: Web-based Systems www vs. internet Web-based systems refer to those applications or services that are resident on a server that is accessible from anywhere via the WWW. The only client-side software needed to access and execute Web-based applications is a Web browser environment. Two important features of Web-based functionality; The generated content/ data is updated in real time. They are universally accessible via the Web to users (dependent on defined user-access rights). WWW: application which handles digital standards for storing and retrieving data. GUI-based. Internet: transport mechanism, protocols Distributed systems: Internet and intranet Internet, intranet as business technologies The Internet is a worldwide system of computer networks--a network of networks in which users at any one computer can, if they have permission, get information from any other computer. Transport mechanism. (cf. WWW - applicationwhich handles digital standards for storing, retrieving data. GUI based.) An intranet is the use of WWW technologies to create a private network, usually within one enterprise. A security gateway such as a firewall is used to segregate the intranet from the Internet. Corporate portals: Web-based personalised gateway to work-appropriate information and knowledge from disparate IT systems. A response to information overload An Extranet (use of the internet between firms) can be viewed as an external extension of the enterprise intranet
4 IS Infrastructure Areas The basic facilities, services, and installations needed for the functioning of an Information System. Critical areas: 1. network design and management 2. processing architecture 3. desktop environment 4. operations support strategy these are critical for a number of reasons; for instance, an organization would want good performance marks in these areas before an internet-commerce initiative could be sustained 19 IT Infrastructure IT Infrastructure supports the flow and processing of information and includes: Hardware Communication network Middleware Application software Database management software Data 20 Hardware Location Reach Workstations Range Communication network Physical communications Coax, twisted pair, fibre, wireless Broadband, baseband Redundancy Backup Alternative paths to nodes Protocols: ASCII, Ethernet (for LANs), ISDN (Integrated Services Digital Network), TCP/IP (Transmission Control/Internet Protocols), Many others Mixed, proprietary vendor protocols Application architectures Middleware software An Information System can be looked at as: Functionality layer (application domain) HCI layer (user interface) Persistent elements layer (dbms) System architecture layer (middleware) Foundation layer (building blocks) Hardware, software and communication technologies for data presentation, analysis and management. Handles messages from the business logic to the database Transparent to the application WWW middleware browsers, search engines Distributed data management Distributed transaction processing 23 24
5 Application Software Database management software Can reside on one computer or over several Receives requests from the interface layer as messages Communicates with middleware Choices: Relational database Object-Relational database Object database Single database server Distributed database Choosing which technology Relational database Commitment to installed DBMS Legacy systems Extent of OO development in the organisation Availability of relevant expertise Future Plans (IT strategy) Currently the most common form of implementing databases Only practical option in heterogeneous environments RDBMS expertise is readily available Object-oriented paradigm is compromised Object-Relational database Object databases Fundamentally a RDBMS Extended with specially defined data types Objects in different tables from attribute values Still compromised by its tabular structure Some OO features restricted by language dependence Not well penetrated into the industry yet Steep learning curve for existing developers and relational DBAs Supports inheritance (language dependent) Supports repeating groups and multivalued attributes (not in ORDBMS because of normalisation constraints) 29 30
6 Other infrastructure considerations References Security versus Ease of Access Response time of the network (if the delay between key press and response is greater then 3 seconds frustration) Breadth of network access Turban McLean & Wetherbe Martin, Brown, DeHayes, Hoffer & Perkins (2005). Managing Information Technology (5 th Edition). Pearson, Prentice Hall. Chapter
ICS 434 Advanced Database Systems
ICS 434 Advanced Database Systems Dr. Abdallah Al-Sukairi sukairi@kfupm.edu.sa Second Semester 2003-2004 (032) King Fahd University of Petroleum & Minerals Information & Computer Science Department Outline
More informationClient/server is a network architecture that divides functions into client and server
Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate
More informationKM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems
Knowledge Management Systems Chapter 5- The Technology Infrastructure Dr. Mohammad S. Owlia Associate Professor, Industrial Engineering Department, Yazd University E-mail :owliams@gmail.com, Website :
More informationLecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
More informationOutline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]
Outline Introduction to Internet, and Yan Wang E6A 339 yan.wang@mq.edu.au Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within
More informationLocal Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
More informationIntroduction. Introduction: Database management system. Introduction: DBS concepts & architecture. Introduction: DBS versus File system
Introduction: management system Introduction s vs. files Basic concepts Brief history of databases Architectures & languages System User / Programmer Application program Software to process queries Software
More informationIntroduction: Database management system
Introduction Databases vs. files Basic concepts Brief history of databases Architectures & languages Introduction: Database management system User / Programmer Database System Application program Software
More informationOverview RDBMS-ORDBMS- OODBMS
Overview RDBMS-ORDBMS- OODBMS 1 Database Models Transition Hierarchical Data Model Network Data Model Relational Data Model ER Data Model Semantic Data Model Object-Relational DM Object-Oriented DM 2 Main
More informationDistributed Systems and Recent Innovations: Challenges and Benefits
Distributed Systems and Recent Innovations: Challenges and Benefits 1. Introduction Krishna Nadiminti, Marcos Dias de Assunção, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory Department
More informationIT Components of Interest to Accountants. Importance of IT and Computer Networks to Accountants
Chapter 3: AIS Enhancements Through Information Technology and Networks 1 Importance of IT and Computer Networks to Accountants To use, evaluate, and develop a modern AIS, accountants must be familiar
More informationi. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis
ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information
More informationCloud computing an insight
Cloud computing an insight Overview IT infrastructure is changing according the fast-paced world s needs. People in the world want to stay connected with Work / Family-Friends. The data needs to be available
More informationChapter 9 Understanding Complex Networks
Chapter 9 Understanding Complex Networks Objectives Explain how to implement a multivendor network environment Discuss the differences between centralized and client/server computing Define the client/server
More informationBase One's Rich Client Architecture
Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.
More informationChapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.
Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:
More informationTier Architectures. Kathleen Durant CS 3200
Tier Architectures Kathleen Durant CS 3200 1 Supporting Architectures for DBMS Over the years there have been many different hardware configurations to support database systems Some are outdated others
More informationSession 12 Evolving IT Architectures: From Mainframes to Client-Server to Network Computing
Session 12 Evolving IT Architectures: From Mainframes to Client- to Network Computing S. Madnick, 1998 12/ 1 Outline Stages of System Architectures Components: Data Management,, Mainframe era PC era Stages
More informationOct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
More informationHow To Create A Network Management Solution For An Msp
Network Management In Distributed Environments Challenges and Opportunities for MSPs I. Introduction As networks have grown in size and capabilities, they also have grown in terms of their importance to
More informationARCHITETCTURES of COMPUTERS SYSTEMS
ARCHITETCTURES of COMPUTERS SYSTEMS 1 Centralized systems Characteristics Proprietary systems Limited knowledge of the computer thecnologies Backlog 2 Centralized solution TERMINAL TERMINAL centralized
More informationA Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide
p 1/6 White Paper A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide Francis Vander Ghinst Head of Sales & Marketing
More informationIntroduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February
More informationPerformance Testing IBM MQSeries* Infrastructures
Performance Testing IBM * Infrastructures MQTester TM for LoadRunner from CommerceQuest Inc. 2001 CommerceQuest Inc. All rights reserved. The information contained herein is the proprietary property of
More information3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
More informationWhat is Middleware? Software that functions as a conversion or translation layer. It is also a consolidator and integrator.
What is Middleware? Application Application Middleware Middleware Operating System Operating System Software that functions as a conversion or translation layer. It is also a consolidator and integrator.
More informationInternet-Accessible Power Monitoring & Control Systems
Internet-Accessible Power Monitoring & Control Systems By GE Specification Engineers Keith B. Brock, P.E. Robert P. Hansen, PhD, P.E. Introduction Accessing electrical system information from any location
More informationThis paper was presented at the 1996 CAUSE annual conference. It is part of the proceedings of that conference, "Broadening Our Horizons:
This paper was presented at the 1996 CAUSE annual conference. It is part of the proceedings of that conference, "Broadening Our Horizons: Information, Services, Technology -- Proceedings of the 1996 CAUSE
More informationChapter 5: Understanding Internetworking Infrastructure
Chapter 5: Understanding Internetworking Infrastructure Key questions What are the basic components of Internetw orking Infrastructures? What Business Implications do they bring? The Future? A Graphical
More informationAS/400 System Overview
Chapter 1 AS/400 System Overview 1.1 Major Characteristics of AS/400 1.1.1 High Level of Integration 1.1.2 Object Orientation 1.1.3 Relational and Integrated Database 1.1.4 Data and Program Independence
More informationNettech White Paper: Mobile Middleware: The Next Frontier in Enterprise Application Integration
Nettech White Paper: Mobile Middleware: The Next Frontier in Enterprise Application Integration By, Tamara Kanoc, Director of Marketing, Nettech Systems, Inc. Nettech Systems, Inc. 600 Alexander Road Princeton,
More informationChapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system
Dear Student Here is the list of chapter sections that we will be covering for this semester. For each chapter listed in pages below: Any Bold text is required (with all the details in that sections) Any
More informationCOMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters
COMP5426 Parallel and Distributed Computing Distributed Systems: Client/Server and Clusters Client/Server Computing Client Client machines are generally single-user workstations providing a user-friendly
More informationVirtualization of CBORD Odyssey PCS and Micros 3700 servers. The CBORD Group, Inc. January 13, 2007
Virtualization of CBORD Odyssey PCS and Micros 3700 servers January 13, 2007 61 Brown Road Ithaca, NY 14850 (607) 257-2410 Document Revision: 2 Last revised: January 13, 2007 Changes are periodically made
More informationChapter 16 Distributed Processing, Client/Server, and Clusters
Operating Systems: Internals and Design Principles Chapter 16 Distributed Processing, Client/Server, and Clusters Eighth Edition By William Stallings Table 16.1 Client/Server Terminology Applications Programming
More informationSSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
More informationIMPLEMENTING AND SUPPORTING EXTRANETS
87-10-18 DATA SECURITY MANAGEMENT IMPLEMENTING AND SUPPORTING EXTRANETS Phillip Q. Maier INSIDE Extranet Architectures; Router-Based Extranet Architecture; Application Gateway Firewalls; Scalability; Multi-homed
More informationBasic Computer Networks Configurations
School of Business Eastern Illinois University Basic Computer Networks Configurations (September 2, 2015) Abdou Illia, Fall 2015 Learning Objectives 2 Outline Basic network configurations Name kinds of
More informationClient/server and peer-to-peer models: basic concepts
Client/server and peer-to-peer models: basic concepts Dmitri Moltchanov Department of Communications Engineering Tampere University of Technology moltchan@cs.tut.fi September 04, 2013 Slides provided by
More informationServer Virtualization with VMWare
Server Virtualization with VMware Information Technology Server Virtualization with VMWare A look at server virtualization, what it is and why it should be considered. By Alex Dewar, Head of IT & IM Solutions,
More informationClient/Server Computing Distributed Processing, Client/Server, and Clusters
Client/Server Computing Distributed Processing, Client/Server, and Clusters Chapter 13 Client machines are generally single-user PCs or workstations that provide a highly userfriendly interface to the
More informationAchieving HIPAA Compliance with Red Hat
Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops The Health Insurance Portability and Accountability Act (HIPAA) of 1996 introduced a sweeping set of regulations that have
More informationAchieving HIPAA Compliance with Red Hat
Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops The Health Insurance Portability and Accountability Act (HIPAA) of 1996 introduced a sweeping set of regulations that have
More information3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19
3-Tier Architecture Prepared By Channu Kambalyal Page 1 of 19 Table of Contents 1.0 Traditional Host Systems... 3 2.0 Distributed Systems... 4 3.0 Client/Server Model... 5 4.0 Distributed Client/Server
More informationModern Databases. Database Systems Lecture 18 Natasha Alechina
Modern Databases Database Systems Lecture 18 Natasha Alechina In This Lecture Distributed DBs Web-based DBs Object Oriented DBs Semistructured Data and XML Multimedia DBs For more information Connolly
More informationEssential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time
Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop
More informationScalability and BMC Remedy Action Request System TECHNICAL WHITE PAPER
Scalability and BMC Remedy Action Request System TECHNICAL WHITE PAPER Table of contents INTRODUCTION...1 BMC REMEDY AR SYSTEM ARCHITECTURE...2 BMC REMEDY AR SYSTEM TIER DEFINITIONS...2 > Client Tier...
More informationOverview - Using ADAMS With a Firewall
Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationOut-of-Band Management: the Integrated Approach to Remote IT Infrastructure Management
WHITE PAPER Management: the Integrated Approach to Remote IT Management EXECUTIVE SUMMARY For decades, business imperatives for information technology (IT) have remained constant to cut costs and improve
More informationVIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY. 03/27/09 Version
VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY 03/27/09 Version Approved April 30, 2009 Approval of Enterprise Security Architecture Policy (03/27/2009 Version) Douglas G. Mack IT Security
More informationOverview - Using ADAMS With a Firewall
Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationChapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,
More informationChapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
More informationSoftware Architecture Document
COMPREHENSIVE WATERSHED MANAGEMENT WATER USE TRACKING PROJECT Southwest Florida Water Management District 2379 Broad Street Brooksville, FL 34604-6899 Date Revision Description Author Table of Contents
More informationObjectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation
Objectives Distributed Databases and Client/Server Architecture IT354 @ Peter Lo 2005 1 Understand the advantages and disadvantages of distributed databases Know the design issues involved in distributed
More informationSuccession Solutions. Voice over IP enabled Meridian
Succession Solutions Voice over IP enabled Meridian Evolution with Continuity With Nortel Networks Succession Internet-enabled Solutions for Meridian, you can evolve to Internet Telephony at a pace in
More informationManagement Information Systems. B08. Interorganizational and Global Information Systems
Management Information Systems Management Information Systems B08. Interorganizational and Global Information Systems Code: 166137-01+02 Course: Management Information Systems Period: Spring 2013 Professor:
More informationConcepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches
Concepts of Database Management Seventh Edition Chapter 9 Database Management Approaches Objectives Describe distributed database management systems (DDBMSs) Discuss client/server systems Examine the ways
More informationDATABASE SYSTEM CONCEPTS AND ARCHITECTURE CHAPTER 2
1 DATABASE SYSTEM CONCEPTS AND ARCHITECTURE CHAPTER 2 2 LECTURE OUTLINE Data Models Three-Schema Architecture and Data Independence Database Languages and Interfaces The Database System Environment DBMS
More informationOutline. TIM 50 - Business Information Systems. Lecture 10. Instructor: Terry Allen UC Santa Cruz 10/28/2011
TIM 50 - Business Information Systems Lecture 10 Instructor: Terry Allen UC Santa Cruz 10/28/2011 Outline Announcements Review Alibris Case Study Information Technology Student Presentations Client-Server
More informationTIM 50 - Business Information Systems
TIM 50 - Business Information Systems Lecture 10 Instructor: Terry Allen UC Santa Cruz 10/28/2011 Outline Announcements Review Alibris Case Study Information Technology Student Presentations Client-Server
More informationManaging Information Technology 6 th Edition
Managing Information Technology 6 th Edition CHAPTER 6 ENTERPRISE SYSTEMS Copyright 2009 Pearson Education, Inc. Publishing as Prentice Hall 1 APPLICATION AREAS Interorganizational systems Systems that
More informationNetwork Management In. Challenges and Opportunities for Enterprises
Network Management In Distributed Environments Challenges and Opportunities for Enterprises I. Introduction As networks have grown in size and capabilities, they also have grown in terms of their importance
More informationWhy Switch from IPSec to SSL VPN. And Four Steps to Ease Transition
Why Switch from IPSec to SSL VPN And Four Steps to Ease Transition Table of Contents The case for IPSec VPNs 1 The case for SSL VPNs 2 What s driving the move to SSL VPNs? 3 IPSec VPN management concerns
More informationNetwork Topology Comparison
Topology Star Bus Each computer connects to a central connection device. Bus Single cable connects everything. Ring Single cable configured in a ring. Information Transfer All information passes through
More informationNETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
More informationIntroduction to Cloud Computing. Lecture 02 History of Enterprise Computing Kaya Oğuz
Introduction to Cloud Computing Lecture 02 History of Enterprise Computing Kaya Oğuz General Course Information The textbook: Enterprise Cloud Computing by Gautam Shroff (available at bookstore). Course
More informationHMS Industrial Networks
HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks AB Stationsgatan 37 30245
More informationIT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationContents. Chapter 1. Introduction
Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual
More informationChapter 3. Database Environment - Objectives. Multi-user DBMS Architectures. Teleprocessing. File-Server
Chapter 3 Database Architectures and the Web Transparencies Database Environment - Objectives The meaning of the client server architecture and the advantages of this type of architecture for a DBMS. The
More informationComparison of Thin Client Solutions
Comparison of Thin Client Solutions Reviewed: March 10, 1999 Revised: April 7, 1999 Introduction As your network grows in size, the costs of hardware, maintenance and support become issues that impact
More informationAPPENDIX A WORK PROCESS SCHEDULE RELATED INSTRUCTION OUTLINE
APPENDIX A WORK PROCESS SCHEDULE RELATED INSTRUCTION OUTLINE E COMMERCE SPECIALIST PAGE 1 OF 11 WORK PROCESS SCHEDULE E COMMERCE SPECIALIST (ECS) O*NET SOC CODE: 15 1099.99 RAIS CODE: 1054CB DESCRIPTION:
More informationInformation and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
More informationIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
More informationDistributed Database Design
Distributed Databases Distributed Database Design Distributed Database System MS MS Web Web data mm xml mm dvanced Database Systems, mod1-1, 2004 1 Advanced Database Systems, mod1-1, 2004 2 Advantages
More informationVirtual Desktop Infrastructure Planning Overview
WHITEPAPER Virtual Desktop Infrastructure Planning Overview Contents What is Virtual Desktop Infrastructure?...2 Physical Corporate PCs. Where s the Beef?...3 The Benefits of VDI...4 Planning for VDI...5
More informationOutline. Definitions. The Evolution of Distributed Systems. Distributed Systems: The Overall Architecture. Chapter 5
Outline Distributed Systems: The Overall Architecture Chapter 5 U51020 Peter Lo 2008 1 Introduction Four Attributes of Distributed Systems When to Distribute Computing Responsibilities Two Guiding Frameworks
More informationInformation Technology Security Guideline. Network Security Zoning
Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning
More informationIPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1
IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 Copyright 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2 The Traditional Extended Enterprise Fixed
More information1.5 Distributed Systems
1.5 Distributed Systems A network, in the simplest terms, is a communication path between two or more systems. Distributed systems depend on networking for their functionality. By being able to communicate,
More informationDBMS Infrastructures and IT Career Recommendations. Jeff Fineberg November 21, 2011
DBMS Infrastructures and IT Career Recommendations Jeff Fineberg November 21, 2011 Topics Importance of Databases Security Computing Environments / Infrastructures Methodologies for Data access Database
More informationRealizing the Benefits of Data Modernization
February 2015 Perspective Realizing the Benefits of How to overcome legacy data challenges with innovative technologies and a seamless data modernization roadmap. Companies born into the digital world
More informationBirdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA
White Paper Birdstep Intelligent Mobile IP Client v2.0, Universal Edition Seamless secure mobility across all networks Copyright 2002 Birdstep Technology ASA Haakon VII's gate 5B, N-0161 Oslo, Norway Tel:
More informationCYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.
21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale
More informationNetwork Station - Thin Client Computing - Overview
Network Station - Thin Client Computing - Overview Overview The objective of this document is to help develop an understanding of a Server Based Computing/Thin-Client environment using MS Windows NT 4.0,
More informationMPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
More informationHow To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................
More informationNZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks
Page 1 of 5 Title Demonstrate an understanding of local and wide area computer networks Level 7 Credits 10 Purpose People credited with this unit standard are able to: describe network types and standards;
More informationChapter 4 IT Infrastructure: Hardware and Software
1 Chapter 4 IT Infrastructure: Hardware and Software LEARNING TRACK 1: THE EVOLUTION OF IT INFRASTRUCTURE Evolution of IT Infrastructure: 1950 2005 The IT infrastructure in organizations today is an outgrowth
More informationCLOUD CLOUT WITH OPEN APIS WHAT YOU SHOULD ASK OF YOUR CLOUD PROVIDER
CLOUD CLOUT WITH OPEN APIS WHAT YOU SHOULD ASK OF YOUR CLOUD PROVIDER STRATEGIC WHITE PAPER As cloud services become increasingly popular, more questions arise about the capabilities of cloud solutions.
More informationTSplus White Paper 1
TSplus White Paper 1 Contents What is it?... 4 Business Challenges... 6 Evaluating the alternatives... 10 Alternatives solutions for web-enabled deployments... 13 The Benefits of Server-Based Application
More informationPearson Education Limited 2003
84 Activities Activity 5.1 (P. 171) Describe the order in which a message passes from one piece of hardware to the next when a home user in the UK sends an e-mail via the Internet to someone in a large
More informationHow To Manage Technology
Chapter 4 IT Infrastructure: Hardware and Software 4.1 2007 by Prentice Hall STUDENT OBJECTIVES Identify and describe the components of IT infrastructure. Identify and describe the major types of computer
More informationCloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
More informationChapter 14! Enterprise Computing!
Chapter 14 Enterprise Computing Enterprise computing involves the use of computers in networks, such as LANs and WANs, or a series of interconnected networks that encompass a variety of different operating
More information