5-1 CHAPTER 5 IT ARCHITECTURES

Post on 22-Nov-2014

1,305 views 0 download

description

 

transcript

5-1

CHAPTER 5IT ARCHITECTURES

CHAPTER 5IT ARCHITECTURES

Jason C. H. Chen, Ph.D.Professor of MIS

School of Business AdministrationGonzaga UniversitySpokane, WA 99223

chen@jepson.gonzaga.edu

Opening CaseElectronic Breaking Points

5-2

Chapter Five Overview

• SECTION 5.1 - HARDWARE AND SOFTWARE BASICS– Hardware Basics– Computer Categories– Software Basics

• SECTION 5.2 – MANAGING ENTERPRISE ARCHITECTURES– Enterprise Architectures– Information Architecture– Infrastructure Architecture– Application Architecture

McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved

SECTION 5.1SECTION 5.1

HARDWARE AND SOFTWARE

HARDWARE AND SOFTWARE

5-4

INTRODUCTION

• Information technology (IT) - any computer-based tool that people use to work with information and support the information and information-processing needs of an organization– Hardware - consists of the physical devices

associated with a computer system– Software - the set of instructions that the

hardware executes to carry out specific tasks

5-5

HARDWARE BASICS

• Computer - an electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data

• Hardware components include:1. Central processing unit (CPU)

2. Primary storage

3. Secondary storage

4. Input device

5. Output device

6. Communication device

Is hard drive a primary storage?

How about flash memory?

5-6

HARDWARE BASICS

5-7

Computer System Components

Central Processing UnitCentral Processing Unit

OutputDevices

CacheMemory

Primary Storage

SecondaryStorageDevices

ControlUnit ALU

SpecialPurposeProcessors

Output Devices

InputDevices

Primary Storage

Which component listed above is the most important for a computer?Which component listed above is the least important for a computer?

5-8

Primary Storage

• Primary storage - the computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the CPU

5-9

Random Access Memory (RAM)

• Random access memory (RAM) - the computer’s primary working memory, in which program instructions and data are stored so that they can be accessed directly by the CPU via the processor’s high-speed external data bus– Volatility – Cache memory

5-10

Read-Only Memory (ROM)

• Read-only memory (ROM) - the portion of a computer’s primary storage that does not lose its contents when one switches off the power– Flash memory

• Memory card• Memory stick(secondary storage or primary storage)?

5-11

Secondary Storage

• Secondary storage - consists of equipment designed to store large volumes of data for long-term storage– Megabyte (MB or M or Meg) - roughly 1 million

bytes– Gigabyte (GB) - roughly 1 billion bytes– Terabyte (TB) - roughly 1 trillion bytes

5-12

Communication Devices

• Communication device - equipment used to send information and receive it from one location to another– Dial-up access– Cable– Digital subscriber line– Wireless– Satellite

5-13

SOFTWARE BASICS

• System software - controls how the various technology tools work together along with the application software– Operating system software – Utility software

• Application software - solve specific problems or perform specific tasks– General purpose (e.g. Java)– Specific purpose

5-14

Database Management Packages

DatabaseDevelopment

DatabaseMaintenance

DatabaseInterrogation

ApplicationDevelopment

Primary Tasks ofDatabase Management

Packages

Primary Tasks ofDatabase Management

Packages

5-15

Business Enterprise Application Software

CustomerRelationshipManagement

HumanResource

Management

Accounting andFinancial

Management

Supply Chain

Management

EnterpriseResourcePlanning

BusinessDecisionSupport

5-16

OPENING CASE QUESTIONSElectronic Breaking Points

1. Identify six hardware categories and place each product listed in the case in its appropriate category

2. Describe the CPU and identify which products would use a CPU

3. Describe the relationship between memory sticks and laptops. How can a user employ one to help protect information loss from the other?

4. What different types of software might each of the products listed in the case use?

McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved

SECTION 5.2SECTION 5.2

Enterprise ArchitectureEnterprise

Architecture

5-18

Information Architecture and Infrastructure

• Information architecture (IA) is the art and science of expressing a model or concept for information. Information architecture is used in web development, database development, programming, enterprise architecture, critical system software design, library systems and other activities that require expressions of complex systems.

• The term ‘Information Infrastructure' (II) refers to the communications networks and associated software that support interaction among people and organizations. The Internet is the phenomenon that has driven the debate to date.

5-19

ENTERPRISE ARCHITECTURES

• Enterprise architecture - includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets

• Enterprise architect (EA) - a person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business

5-20

ENTERPRISE ARCHITECTURES

• Primary goals of enterprise architectures

5-21

ENTERPRISE ARCHITECTURES

5-22

INFORMATION ARCHITECTURE

5-23

CLASSROOM EXERCISE

• Backup and Recovery (Answer the following questions) – Do you have a backup strategy for your computer?– How often do you backup?– What do you backup?– What type of format do you use for your backup?– Where do you save the backup?– How long do you save the backup?– Now ask your students that if you stole their

computer or spilled a hot cup of coffee on their computer right now how much information would they lose?

– Create a backup strategy.

5-24

Disaster Recovery Cost Curve

5-25

INFRASTRUCTURE ARCHITECTURE

5-26

INFRASTRUCTURE ARCHITECTURE

• Five primary characteristics of a solid infrastructure architecture:

1. Flexibility

2. Scalability

3. Reliability

4. Availability

5. Performance

5-27

Internet Enabled Technology Architectures

Management

SecuritySoftware

ToolsContentand Data

Infrastructure

TCP/IPNetwork

HypermediaDatabases

Servers Browsers

Network ManagementSoftware

AuthoringTools

Policies and Standards

FirewallsPasswordsEncryption

5-28

OPENING CASE QUESTIONSElectronic Breaking Points

5. How can an organization use an information architecture to protect its IT investment in electronic devices outlined in the case?

6. How can an organization use the devices mentioned in the case to protect information security?

7. Identify the five ilites (in enterprise infrastructure architecture) and rank them in order of importance for a laptop (1 highest, 5 lowest)

8. Describe how a “Customer Phone Number” Web service could be used by one of the products outlined in the case

5-29

CLOSING CASE TWOUPS in the Computer Repair Business

1. Do you think UPS’s entrance into the laptop repair business was a good business decision? Why or why not?

2. Identify the different types of hardware UPS technicians might be working on when fixing laptops

3. Assume you are a technician working at UPS. Explain to a customer the different types of memory and why only certain types of data are lost during a computer failure. Also identify a potential backup strategy you can suggest to the customer

4. Assume you are a technician working at UPS. Explain to a customer the different types of software found in a typical laptop

5-30

End of Chapter 2