+ All Categories
Home > Technology > 5-1 CHAPTER 5 IT ARCHITECTURES

5-1 CHAPTER 5 IT ARCHITECTURES

Date post: 22-Nov-2014
Category:
Upload: aamir97
View: 1,305 times
Download: 0 times
Share this document with a friend
Description:
 
30
5-1 CHAPTER 5 IT ARCHITECTURES Jason C. H. Chen, Ph.D. Professor of MIS School of Business Administration Gonzaga University Spokane, WA 99223 [email protected] Opening Case Electronic Breaking Points
Transcript
Page 1: 5-1 CHAPTER 5 IT ARCHITECTURES

5-1

CHAPTER 5IT ARCHITECTURES

CHAPTER 5IT ARCHITECTURES

Jason C. H. Chen, Ph.D.Professor of MIS

School of Business AdministrationGonzaga UniversitySpokane, WA 99223

[email protected]

Opening CaseElectronic Breaking Points

Page 2: 5-1 CHAPTER 5 IT ARCHITECTURES

5-2

Chapter Five Overview

• SECTION 5.1 - HARDWARE AND SOFTWARE BASICS– Hardware Basics– Computer Categories– Software Basics

• SECTION 5.2 – MANAGING ENTERPRISE ARCHITECTURES– Enterprise Architectures– Information Architecture– Infrastructure Architecture– Application Architecture

Page 3: 5-1 CHAPTER 5 IT ARCHITECTURES

McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved

SECTION 5.1SECTION 5.1

HARDWARE AND SOFTWARE

HARDWARE AND SOFTWARE

Page 4: 5-1 CHAPTER 5 IT ARCHITECTURES

5-4

INTRODUCTION

• Information technology (IT) - any computer-based tool that people use to work with information and support the information and information-processing needs of an organization– Hardware - consists of the physical devices

associated with a computer system– Software - the set of instructions that the

hardware executes to carry out specific tasks

Page 5: 5-1 CHAPTER 5 IT ARCHITECTURES

5-5

HARDWARE BASICS

• Computer - an electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data

• Hardware components include:1. Central processing unit (CPU)

2. Primary storage

3. Secondary storage

4. Input device

5. Output device

6. Communication device

Is hard drive a primary storage?

How about flash memory?

Page 6: 5-1 CHAPTER 5 IT ARCHITECTURES

5-6

HARDWARE BASICS

Page 7: 5-1 CHAPTER 5 IT ARCHITECTURES

5-7

Computer System Components

Central Processing UnitCentral Processing Unit

OutputDevices

CacheMemory

Primary Storage

SecondaryStorageDevices

ControlUnit ALU

SpecialPurposeProcessors

Output Devices

InputDevices

Primary Storage

Which component listed above is the most important for a computer?Which component listed above is the least important for a computer?

Page 8: 5-1 CHAPTER 5 IT ARCHITECTURES

5-8

Primary Storage

• Primary storage - the computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the CPU

Page 9: 5-1 CHAPTER 5 IT ARCHITECTURES

5-9

Random Access Memory (RAM)

• Random access memory (RAM) - the computer’s primary working memory, in which program instructions and data are stored so that they can be accessed directly by the CPU via the processor’s high-speed external data bus– Volatility – Cache memory

Page 10: 5-1 CHAPTER 5 IT ARCHITECTURES

5-10

Read-Only Memory (ROM)

• Read-only memory (ROM) - the portion of a computer’s primary storage that does not lose its contents when one switches off the power– Flash memory

• Memory card• Memory stick(secondary storage or primary storage)?

Page 11: 5-1 CHAPTER 5 IT ARCHITECTURES

5-11

Secondary Storage

• Secondary storage - consists of equipment designed to store large volumes of data for long-term storage– Megabyte (MB or M or Meg) - roughly 1 million

bytes– Gigabyte (GB) - roughly 1 billion bytes– Terabyte (TB) - roughly 1 trillion bytes

Page 12: 5-1 CHAPTER 5 IT ARCHITECTURES

5-12

Communication Devices

• Communication device - equipment used to send information and receive it from one location to another– Dial-up access– Cable– Digital subscriber line– Wireless– Satellite

Page 13: 5-1 CHAPTER 5 IT ARCHITECTURES

5-13

SOFTWARE BASICS

• System software - controls how the various technology tools work together along with the application software– Operating system software – Utility software

• Application software - solve specific problems or perform specific tasks– General purpose (e.g. Java)– Specific purpose

Page 14: 5-1 CHAPTER 5 IT ARCHITECTURES

5-14

Database Management Packages

DatabaseDevelopment

DatabaseMaintenance

DatabaseInterrogation

ApplicationDevelopment

Primary Tasks ofDatabase Management

Packages

Primary Tasks ofDatabase Management

Packages

Page 15: 5-1 CHAPTER 5 IT ARCHITECTURES

5-15

Business Enterprise Application Software

CustomerRelationshipManagement

HumanResource

Management

Accounting andFinancial

Management

Supply Chain

Management

EnterpriseResourcePlanning

BusinessDecisionSupport

Page 16: 5-1 CHAPTER 5 IT ARCHITECTURES

5-16

OPENING CASE QUESTIONSElectronic Breaking Points

1. Identify six hardware categories and place each product listed in the case in its appropriate category

2. Describe the CPU and identify which products would use a CPU

3. Describe the relationship between memory sticks and laptops. How can a user employ one to help protect information loss from the other?

4. What different types of software might each of the products listed in the case use?

Page 17: 5-1 CHAPTER 5 IT ARCHITECTURES

McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved

SECTION 5.2SECTION 5.2

Enterprise ArchitectureEnterprise

Architecture

Page 18: 5-1 CHAPTER 5 IT ARCHITECTURES

5-18

Information Architecture and Infrastructure

• Information architecture (IA) is the art and science of expressing a model or concept for information. Information architecture is used in web development, database development, programming, enterprise architecture, critical system software design, library systems and other activities that require expressions of complex systems.

• The term ‘Information Infrastructure' (II) refers to the communications networks and associated software that support interaction among people and organizations. The Internet is the phenomenon that has driven the debate to date.

Page 19: 5-1 CHAPTER 5 IT ARCHITECTURES

5-19

ENTERPRISE ARCHITECTURES

• Enterprise architecture - includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets

• Enterprise architect (EA) - a person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business

Page 20: 5-1 CHAPTER 5 IT ARCHITECTURES

5-20

ENTERPRISE ARCHITECTURES

• Primary goals of enterprise architectures

Page 21: 5-1 CHAPTER 5 IT ARCHITECTURES

5-21

ENTERPRISE ARCHITECTURES

Page 22: 5-1 CHAPTER 5 IT ARCHITECTURES

5-22

INFORMATION ARCHITECTURE

Page 23: 5-1 CHAPTER 5 IT ARCHITECTURES

5-23

CLASSROOM EXERCISE

• Backup and Recovery (Answer the following questions) – Do you have a backup strategy for your computer?– How often do you backup?– What do you backup?– What type of format do you use for your backup?– Where do you save the backup?– How long do you save the backup?– Now ask your students that if you stole their

computer or spilled a hot cup of coffee on their computer right now how much information would they lose?

– Create a backup strategy.

Page 24: 5-1 CHAPTER 5 IT ARCHITECTURES

5-24

Disaster Recovery Cost Curve

Page 25: 5-1 CHAPTER 5 IT ARCHITECTURES

5-25

INFRASTRUCTURE ARCHITECTURE

Page 26: 5-1 CHAPTER 5 IT ARCHITECTURES

5-26

INFRASTRUCTURE ARCHITECTURE

• Five primary characteristics of a solid infrastructure architecture:

1. Flexibility

2. Scalability

3. Reliability

4. Availability

5. Performance

Page 27: 5-1 CHAPTER 5 IT ARCHITECTURES

5-27

Internet Enabled Technology Architectures

Management

SecuritySoftware

ToolsContentand Data

Infrastructure

TCP/IPNetwork

HypermediaDatabases

Servers Browsers

Network ManagementSoftware

AuthoringTools

Policies and Standards

FirewallsPasswordsEncryption

Page 28: 5-1 CHAPTER 5 IT ARCHITECTURES

5-28

OPENING CASE QUESTIONSElectronic Breaking Points

5. How can an organization use an information architecture to protect its IT investment in electronic devices outlined in the case?

6. How can an organization use the devices mentioned in the case to protect information security?

7. Identify the five ilites (in enterprise infrastructure architecture) and rank them in order of importance for a laptop (1 highest, 5 lowest)

8. Describe how a “Customer Phone Number” Web service could be used by one of the products outlined in the case

Page 29: 5-1 CHAPTER 5 IT ARCHITECTURES

5-29

CLOSING CASE TWOUPS in the Computer Repair Business

1. Do you think UPS’s entrance into the laptop repair business was a good business decision? Why or why not?

2. Identify the different types of hardware UPS technicians might be working on when fixing laptops

3. Assume you are a technician working at UPS. Explain to a customer the different types of memory and why only certain types of data are lost during a computer failure. Also identify a potential backup strategy you can suggest to the customer

4. Assume you are a technician working at UPS. Explain to a customer the different types of software found in a typical laptop

Page 30: 5-1 CHAPTER 5 IT ARCHITECTURES

5-30

End of Chapter 2


Recommended