Introduction to Information System Layers and Hardware Introduction to Information System Components Chapter 1 Part 1 of 4 CA M S Mehta, FCA 1
Information System Layers Learning Objectives Task Statements 1.1 Identify deployment of different components of IT and their functions: Computer Hardware, Operating system software, database management software, application software, middleware, Client Server Model, Communications technologies and networks, internet, peripherals, devices, accessories, etc. Knowledge Statements 1.1 Knowledge of Information Technology components of Information Systems Infrastructure and related processes in the context of practical deployment in enterprises. 1.2 Fundamental concepts of different components of IT and their functions: Computer Hardware, Operating system software, database management software, application software, middleware, Client Server Model, Communications technologies and networks, internet, peripherals, devices, accessories, etc. 2
I S Infrastructure Topics Covered Overview of Components of IS Infrastructure Components of Computer & Peripheral Devices Data Representation in Computer Hardware Asset Management Auditing 3
What are Information System Layers? 4
Components of IS Infrastructure PEOPLE (USERS) APPLICATIONS DBMS SYSTEM SOFTWARE NETWORKS HARDWARE 5
People Include : Users of the system Information systems personnel Including all the people who manage run program maintain the system. 6
Create User In Windows 7 Go to Control Panel > User Accounts > Manage accounts 7
Application Software Programs used to complete tasks Perform useful tasks beyond the running of the computer Address a real life problem for its end users Includes Productivity Software Business Software 8
Data Base Management Systems Software that aid in organizing controlling and using Data needed by the application programme Facility to create/maintain a well-organized database Applications access the DBMS>Data 9
System Software Coordinates instructions between applications and hardware Enables computer to work Controls computer s working Enables connecting I/O devices Includes: Operating system Utility programs 10
Networks Collection of computers and other hardware Interconnected by communication channels Allows sharing of resources and information One process in one device is able to send/ receive data from another device 11
Hardware Physical elements Tangible Portion Can be touched Help in functions Input Processing Data storage Output activities. Key Board, Monitors, CPU, HDD 12
What are components of Computer? 13
Hardware Components CPU Interact with System System responds Caters to desire of User & give results 14
Peripherals Interact with System Keyboard Mouse, Joystick Scanner, MICR, OCR, Barcode Web Cameras Voice Recognition Touch screen System responds Monitor Printer Plotters Speakers LCD Projector External hard drive Flash drive CD-ROM drive DVD-ROM drive 15
How do Computers work? 16
Etched on a chip Inside the Computer CPU (Central Processing Unit) Composed of silicon Contains millions of transistors Electronic switches that allow current to pass through The more functions that are combined on a microprocessor: The faster the computer runs The more reliable it is 17
CPU Central Processing Unit Fetches Programme from Memory and determines their type Performs Mathematical Operations and/or Logical Operations Small High Speed Memories that Store Temp Results Main Memory Input/ Output Device Bus 18
Machine Cycle Fetch Store Decode Execute 19
Data Representation -Bits & Bytes The computer has switches to represent data and switches have only two states: ON and OFF The memory chips: Divided into small compartments containing bits Each bit is either "on" or "off i.e. a 0 or 1 Bits are grouped together in eights called a byte b is symbol for bit B is symbol for byte Kilobyte (KB) = 1024 bytes, Megabyte(MB) =1024 KB Gigabyte (GB) =1024 MB New Terminology k- kilo- 1,000, Ki- kilobinary ("kibi-"), 1,024 Terabyte (TB) =1024 GB 20
Character Sets-ASCII Each character, number and punctuation mark is represented by an ASCII number (American Standard Code for Information Interchange). ASCII uses 7 bits for each character i.e. 0-127 1 Bit for parity i.e. 8 bits ANSI (American National Standard Institute) Code set- extended ASCII has 217 Characters used by Windows. UNICODE- uses 16 Bits & is Character set used in major OS and environments 21
Moving Information Within the Computer 22
Data Storage in Different Media Semiconductor Data is represented with switches Volatile or non-volatile. RAM,Flash Memory, flash-based solid-state drives (SSDs) Magnetic Data in patterns of magnetization Non-volatile. Hard Disks Optical storage Data stored in Pits on the surface Non-volatile. CDs, DVDs Blue-ray 23
Memory Hierarchy Register Cache Primary Virtual Memory ------------- Secondary Memory Bridge speed differences between registers & Primary Memory Random Access Memory (RAM) & Read Only Memory (ROM) 24
Cache P R O C E S S O R Step 1 Processor requests data or instructions Step 3 Transfer to main CPU and cache Cache Step 2 Go to address in main memory and read Next processor request Look first at cache Go to memory R A M 25
With Virtual Memory Computer looks for unused areas of RAM not been used recently copies them to hard disk. This frees up RAM space to load the new applications. Page File: space on hard disk as an extension to RAM Virtual Memory Control Panel > System and security > System >Advanced System Settings>Performance Options 26
Secondary Memory Characteristics of Secondary memory Speed and access time Slower than Primary Cost / Portability Capacity- Much Larger than Primary Examples: Hard Drives, Pen Drives, CDs 27
Controls -Hardware Asset Management 28
Hardware Asset Management: controls Acquisition How is hardware acquired from outside vendors? Standards What are the hardware compatibility standards? Performance How should computing capabilities be tested? Configuration Where should client/servers, personal computers, and others be used? Service providers Should third-party service providers be used? 29
Hardware Asset Management Hardware Asset Management Hardware Acquisition Plan Hardware Maintenance Program Hardware Monitoring Procedures Data and Capacity Management Hardware Retirement Plan 30
Evaluation Criteria-Acquisition Compatibility and Industry Standards Easy Operations Support Cost 31
Hardware Acquisition Invitation to Tender(ITT) Includes Information Processing Requirements Hardware Requirements System Software Requirements Maintenance/Training/Backup Adaptability Constraints Conversion 32
Evaluation of Bids-Acquisition Hardware Acquisition Evaluated on Existing user satisfaction Vendor financial condition Maintenance facilities Delivery schedules Up gradation capabilities Benchmarking Contract terms (Right to audit) Price 33
Turnaround Time Length of time for submission of the job and receipt of completed output. Acquisition CRITERIA Response Time Length of time between submission of transaction and first character of output. Throughput The amount of work done over the period of time. 34
Acquisition CRITERIA Compatibility hardware to be procured compatible with the existing one Capacity Accordance with workload and performance requirements Utilization Fit for the purpose it is to be acquired 35
Hardware maintenance Reputed Service provider MTBF & MTTR Hardware Maintenance Maintenance Schedule Performance History Cost of Maintenance 36
Hardware monitoring Malfunctioned hardware causes server downtime It is Important to employ tools for hardware Monitoring A Good Monitoring solution:- Leverages investment in existing hardware and monitoring agents 37
Hardware monitoring-benefits Flexible monitoring options Enhanced server uptime Proactive alerting Accurate rootcause diagnosis Reduce time to investigate and resolve Lower Total Cost of Ownership (TCO) Fast Return On Investment (ROI) Higher Quality of Service 38
Hardware Monitoring Error Reports Provide Details of failures Availability Reports provide Details of availability Down time- inadequate hardware, Utilization Reports Provide Details of utilisation 39
Capacity Management-Why Effectively manage rapidly growing data Leverage technology to support business needs Best data and storage management framework. Optimize performance high availability Best way to achieve greater storage capacity 40
Capacity Management Planning and monitoring of the computer resources. Ensures effective & efficient use of available resources. CPU utilisation Computer Storage utilisation Telecommunication and Wide Area Network bandwidth utilisation Terminal utilisation I/O channel utilisation etc. 41
Capacity Management-Advantages Appropriate capacity- support Existing Future Business Functions Reduce IT Operating Costs Improve Availability Projects Future resource Needs Improved support to application Present &.Future 42
Retirement-Policy PROCESS DESCRIPTION What to do with the older assets as newer systems come online. Retiring IT equipment possesses data That may be sources of significant economic return Need to be recycled according to regulations. Improper disposing of data and other IT assets Can cause embarrassing security breaches Increase costs Pose the risk of regulatory penalties. 43
Hardware Retirement-Policy POLICY IS NEEDED FOR Designating a system to be retired Establishing Data Archiving Requirements (data, code, etc.) Establishing Security Requirements (disposal, disposition, sensitive data, etc.) Removal of Data from System Hardware Removal of end-user devices or other equipment (racks, cradles, scanners, etc.) Closure of licensing and/or contracts Reallocation of resources (hardware, memory, support staff, etc.) Finalizing program budget Taking care of e-waste regulations Minimizing Environmental impact. 44
Auditing Hardware 45
Auditing Assess this process by reviewing control issues regarding the acquisition, implementation, and maintenance of hardware 46
Audit Hardware Acquisition Plan Hardware acquisition plan is compared to business plan. Environment adequate for current installed hardware Taken into consideration technological obsolescence Adequacy of documentation for hardware specifications, installation requirements Likely lead-time associated with planned acquisitions. 47
PC Acquisition Review Documented & communicated policy statements regarding the acquisition and use of PC s Criteria for acquisition of PC s are well developed Cost benefit analysis for acquisition of PC s Centralised purchased for volume discounts and standardization 48
Auditing Capacity Management Hardware performance-monitoring plan Review of problem logs, system reports, etc. Problem log review assists in identifying hardware malfunctions, operator actions, or system resets that negatively affect the performance of the IT infrastructure Hardware availability and performance reports Review and ensure that CPU utilisation storage utilisation bandwidth utilisation and system uptime reports are available 49
http://www.cio.in References Ralph M. Stair, George W. Reynolds, Principles of Information Systems, Cengage Learning www.howstuffworks.com www.youtube.com www.whatis.com www.webopedia.com www.wikipedia.com www.google.com 50
We have learnt about Hardware and Software Overview of Components of IS Infrastructure Components of Computer & Peripheral Devices Data Representation in Computer Hardware Asset Management Auditing Hardware 51
Hardware and Software Thank You 52