Internet Working Infrastructure IT

Description
The PPT includes topics like Evolution of corporate IT infrastructure,moore's law,metcalfe's law,technological elements of networks,processing systems and facilities,bandwidth.

INTERNETWORKING INFRASTRUCTURE

A Graphical Representation of Moore’s Law
Moore's Law 16000 Transistors per Chip 14000 12000 10000 8000 6000 4000 2000 0 1970 1975 1980 1985 Year
Adapted by author from Microprocessor Report 9(6), May 1995 and “ChipList 9.9.5,” by Aad Offerman, July 1998. Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Figure 5-1

1990

1995

2000

T e E o tio o C rp ra ITIn stru re h v lu n f o o te fra ctu
 

Su : o rce

A pleg , L n a M R b D A stin an F W p ate y d ., o ert . u , d . arren M raw -H cG ill/Irw , 2 2 in 00 .

M a cF rlan

, C rp ra In rm tio S te y a M n g en o o te fo a n tra g nd a a em t

. B rr R g IL u id e, :

C ap 5F re 5 h ter igu

-2

A Graphical Representation of Metcalfe’s Law
Metcalfe's Law 1800 1600 1400 1200 1000 800 600 400 200 0 0 10 20 30 40 Number of Users Connected to the Network
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Figure 5-3

Value of Network

The Bandwidth Explosion
Network Bandwidth Growth
True voice -over -IP telephony, high resolution Internet music and television, movies on demand, virtual workplaces, broadband wireless Live audio and video streaming events, digital commerce, Internet radio and televisi on, vioce chat applications Streaming audio and video, advanced e commerce, live stock quotes, 1,000M Bps Mass WWW adoption, graphic intensive, instant messaging Mass e -mail adoption, basic WWW sites Large file transfer, e -mail File transfer Increasing Network Bandwidth
Source: Adapted from: http://www. stanford . edu /~ yzarolia /Challenges. htm

2001+

1999 -2000

1997 -1998

1996 -1997

1994 -1996

1990 -1994

1960 -1990

Chapter 5 Figure 5.4

Fundamental Components of Internetworking Infrastructure
  Network  Core Technologies  Fiber optics, cable systems, DSL,  satellite, wireless, Internetworking  hardware (routers, switches,  firewalls), content delivery  software, identity and policy  management, net monitoring  Key Management Issues  • How to select technologies and  standards  • How to select partners  • How to manage partner relationships  • How to assure reliability  • How to maintain security    • What to keep internal and what to  Transaction software (enterprise  outsource  systems offered by companies such  • How to deploy, grow, and modify  as SAP or Oracle; or more targeted  • Enterprise system or best­of­breed  solutions offered by companies  hybrid?  such as Trilogy and i2), servers,  • Relationships with legacies  server appliances, client devices  • How to manage incidents  (PCs, handhelds)  • How to recover after a “disaster”    Corporate data centers, collocation  • Internal or external management?  data centers, managed services data  • Choosing a facilities model suited to  your company  centers, data closets  • How to assure reliability  • How to maintain security   
Chapter 5 Table 5-1

Processing  Systems 

Facilities 

Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.

A Simple LAN

Workstation

Laptop

Workstation

Printer

Hub Server

Printer

Laptop

Workstation
Chapter 5 Figure 5-5

Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.

An Example of a WAN

Remote

Backup Frame Relay Network

Production Plant Backup Frame Relay Network Frame Relay Provider Network

Production Plant

Remote Corporate Backup Frame Relay Network

Remote
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Figure 5-6

THE TECHNOLOGICAL ELEMENTS OF NETWORKS
Local Area Networks ? Hubs, Switches, and Network Adapters ? Wide Area Networks ? Routers ? Firewalls and other security systems and devices. ? Caching, content acceleration, and other specialized network devices.
?

Servers in a Typical E-Commerce Configuration
Qdata Facility
D

Big Iron
UPE PR OR LW E O N A M R

Qdata Private Network
SD

VPN Cust A

SD

Router- Cust A
To Public Internet VPN Cust B

Ethernet Switch DNS Servers

Router- Cust B
D S

VPN Cust ...

SD

Internet Router
VPN iPremier Company

Router- Cust ... Network Management

iPremier Co Cage
Router Firewall

SD

Web Accelerator Router to HO Ethernet Switches
SD

T1

SD

D S

Web Server Cluster

SMTP/POP Server

Network Management

Database Server

DIAGRAM SIMPLIFIED FOR ILLUSTRATION PURPOSES

Source : Austin, Robert D.; Leibrock, Larry; Murray, Alan, “The iPremier Company: Denial of Service Attack (A),” Harvard Business School Case No. 601-114.

Chapter 5 Figure 5-7

A Modern Data Center

Source: Allegiance Telecom

Chapter 5 Figure 5-8

THE TECHNOLOGICAL ELEMENTS OF PROCESSING SYSTEMS
Client devices and systems ? Server devices and systems ? Mainframe devices and systems ? Middleware ? Infrastructure management systems ? Business applications
?

TECHNOLOGICAL ELEMENTS OF FACILITIES
Buildings and physical spaces ? Network conduits and connections ? Power ? Environmental controls ? Security
?

Measuring Network Bandwidth

Term  Bandwidth  bit  bits per second or bps  Bandwidth Rates  1 kilobit (Kb)  1 megabit (Mb)  1 gigabit (Gb) 

Definition  The maximum rate at which information can be transmitted along a  communication link.  Smallest unit of information handled by computers  Bandwidth measurement unit  Bit equivalent   1 thousand bits  1 million bits  1 billion bits  Information Transfer speed  1,000 bits/second  1,000,000/second  1,000,000,000/second 

Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.

Chapter 5 Table 5-2

OPERATIONAL CHARACTERISTICS OF INTERNETWORKS
? Internetworking

technologies are based on open standards. ? Internetworking technologies operate asynchronously. ? Internetwork communications have inherent latency. ? Internetworking technologies are naturally decentralized. ? Internetworking technologies are scalable.

Communication Technology Bandwidths and User Groups
Communication Technology  Telephone Modem  Integrated Services Digital  Network (ISDN)  Cable Modem  Digital Subscriber Line (DSL)  Ethernet LAN  Leased Lines (T1, T3)  Bandwidtha   33.6 kbps – 56 kbps  128 kbps   128 kbps – 512 kbps  128 kps – 1.5 mbps  10 mbps–100 mbps  1.544 mbps, 45 mbps  User Groups  Individuals and small  businesses  Individuals and small  businesses  Individuals and small  businesses  Individuals and small  businesses  Most businesses and  organizations  Government, universities,  medium and large  businesses  Government, universities,  and large corporations 

Asynchronous Transfer Mode  (ATM)/ Gigabit Ethernet 

155 mbps–25.6 gbps 

a We have listed the typical bandwidth performance. Some of the technologies are theoretically capable of higher bandwidths. Add itional, some technologies perform at different speeds upstream and downstream. Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.

Chapter 5 Table 5-3

THE RISE OF INTERNETWORKING: BUSINESS IMPLICATIONS
Better Data, Better Decisions ? Improved Process Visibility ? Improved Process Efficiency ? From Make-and-Sell to Sense-and-Respond
?

Wake - Up Call: Denial of Service Attacks in February 2000

Date
February 7 Yahoo

Target Company

Results of Attack
• Overwhelming spike in traffic that lasted 3 hours. • Network availability dropped from 98% to 0%. • Attack originated from 50 different locations a nd was timed to occur during middle of business day. • Stock was down 3.2% for week in which NASDAQ rose almost 3%. • Attack occurred within an hour of the company’s Initial Public Offering (IPO). • Stock was down at week’s end more than 20% from IPO price. • Stock was down 7.3% for week in which NASDAQ rose almost 3%. • Service disrupted • Attacked during peak trading hours. • Stock was down 7.6% for week in which NASDAQ rose a lmost 3%. • Service disrupted • Service disrupted. • Attacked during peak trading hours. • Operators accidentally crashed site as they attempted to defend against the attack.
e peak of the attacks as computers re sent messages -

February 8

Buy.com

Ebay CNN.com E*Trade ZDNet Federal Bureau of Investigation (FBI) National Discount Brokers Group (NDB)

February 9

February 18 February 24

a Overall performance of the Internet degraded by as much as 25% during th repeatedly and automaticall y, trying to recover interrupted tran sactions. Source: Adapted from: NetworkW orldFusion

, www. nfusion .com, complied by

LeGrand Elebash

.



doc_963759020.ppt
 

Attachments

Back
Top