Description
The PPT includes topics like Evolution of corporate IT infrastructure,moore's law,metcalfe's law,technological elements of networks,processing systems and facilities,bandwidth.
INTERNETWORKING INFRASTRUCTURE
A Graphical Representation of Moore’s Law
Moore's Law 16000 Transistors per Chip 14000 12000 10000 8000 6000 4000 2000 0 1970 1975 1980 1985 Year
Adapted by author from Microprocessor Report 9(6), May 1995 and “ChipList 9.9.5,” by Aad Offerman, July 1998. Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Figure 5-1
1990
1995
2000
T e E o tio o C rp ra ITIn stru re h v lu n f o o te fra ctu
Su : o rce
A pleg , L n a M R b D A stin an F W p ate y d ., o ert . u , d . arren M raw -H cG ill/Irw , 2 2 in 00 .
M a cF rlan
, C rp ra In rm tio S te y a M n g en o o te fo a n tra g nd a a em t
. B rr R g IL u id e, :
C ap 5F re 5 h ter igu
-2
A Graphical Representation of Metcalfe’s Law
Metcalfe's Law 1800 1600 1400 1200 1000 800 600 400 200 0 0 10 20 30 40 Number of Users Connected to the Network
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Figure 5-3
Value of Network
The Bandwidth Explosion
Network Bandwidth Growth
True voice -over -IP telephony, high resolution Internet music and television, movies on demand, virtual workplaces, broadband wireless Live audio and video streaming events, digital commerce, Internet radio and televisi on, vioce chat applications Streaming audio and video, advanced e commerce, live stock quotes, 1,000M Bps Mass WWW adoption, graphic intensive, instant messaging Mass e -mail adoption, basic WWW sites Large file transfer, e -mail File transfer Increasing Network Bandwidth
Source: Adapted from: http://www. stanford . edu /~ yzarolia /Challenges. htm
2001+
1999 -2000
1997 -1998
1996 -1997
1994 -1996
1990 -1994
1960 -1990
Chapter 5 Figure 5.4
Fundamental Components of Internetworking Infrastructure
Network Core Technologies Fiber optics, cable systems, DSL, satellite, wireless, Internetworking hardware (routers, switches, firewalls), content delivery software, identity and policy management, net monitoring Key Management Issues • How to select technologies and standards • How to select partners • How to manage partner relationships • How to assure reliability • How to maintain security • What to keep internal and what to Transaction software (enterprise outsource systems offered by companies such • How to deploy, grow, and modify as SAP or Oracle; or more targeted • Enterprise system or bestofbreed solutions offered by companies hybrid? such as Trilogy and i2), servers, • Relationships with legacies server appliances, client devices • How to manage incidents (PCs, handhelds) • How to recover after a “disaster” Corporate data centers, collocation • Internal or external management? data centers, managed services data • Choosing a facilities model suited to your company centers, data closets • How to assure reliability • How to maintain security
Chapter 5 Table 5-1
Processing Systems
Facilities
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
A Simple LAN
Workstation
Laptop
Workstation
Printer
Hub Server
Printer
Laptop
Workstation
Chapter 5 Figure 5-5
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
An Example of a WAN
Remote
Backup Frame Relay Network
Production Plant Backup Frame Relay Network Frame Relay Provider Network
Production Plant
Remote Corporate Backup Frame Relay Network
Remote
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Figure 5-6
THE TECHNOLOGICAL ELEMENTS OF NETWORKS
Local Area Networks ? Hubs, Switches, and Network Adapters ? Wide Area Networks ? Routers ? Firewalls and other security systems and devices. ? Caching, content acceleration, and other specialized network devices.
?
Servers in a Typical E-Commerce Configuration
Qdata Facility
D
Big Iron
UPE PR OR LW E O N A M R
Qdata Private Network
SD
VPN Cust A
SD
Router- Cust A
To Public Internet VPN Cust B
Ethernet Switch DNS Servers
Router- Cust B
D S
VPN Cust ...
SD
Internet Router
VPN iPremier Company
Router- Cust ... Network Management
iPremier Co Cage
Router Firewall
SD
Web Accelerator Router to HO Ethernet Switches
SD
T1
SD
D S
Web Server Cluster
SMTP/POP Server
Network Management
Database Server
DIAGRAM SIMPLIFIED FOR ILLUSTRATION PURPOSES
Source : Austin, Robert D.; Leibrock, Larry; Murray, Alan, “The iPremier Company: Denial of Service Attack (A),” Harvard Business School Case No. 601-114.
Chapter 5 Figure 5-7
A Modern Data Center
Source: Allegiance Telecom
Chapter 5 Figure 5-8
THE TECHNOLOGICAL ELEMENTS OF PROCESSING SYSTEMS
Client devices and systems ? Server devices and systems ? Mainframe devices and systems ? Middleware ? Infrastructure management systems ? Business applications
?
TECHNOLOGICAL ELEMENTS OF FACILITIES
Buildings and physical spaces ? Network conduits and connections ? Power ? Environmental controls ? Security
?
Measuring Network Bandwidth
Term Bandwidth bit bits per second or bps Bandwidth Rates 1 kilobit (Kb) 1 megabit (Mb) 1 gigabit (Gb)
Definition The maximum rate at which information can be transmitted along a communication link. Smallest unit of information handled by computers Bandwidth measurement unit Bit equivalent 1 thousand bits 1 million bits 1 billion bits Information Transfer speed 1,000 bits/second 1,000,000/second 1,000,000,000/second
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Table 5-2
OPERATIONAL CHARACTERISTICS OF INTERNETWORKS
? Internetworking
technologies are based on open standards. ? Internetworking technologies operate asynchronously. ? Internetwork communications have inherent latency. ? Internetworking technologies are naturally decentralized. ? Internetworking technologies are scalable.
Communication Technology Bandwidths and User Groups
Communication Technology Telephone Modem Integrated Services Digital Network (ISDN) Cable Modem Digital Subscriber Line (DSL) Ethernet LAN Leased Lines (T1, T3) Bandwidtha 33.6 kbps – 56 kbps 128 kbps 128 kbps – 512 kbps 128 kps – 1.5 mbps 10 mbps–100 mbps 1.544 mbps, 45 mbps User Groups Individuals and small businesses Individuals and small businesses Individuals and small businesses Individuals and small businesses Most businesses and organizations Government, universities, medium and large businesses Government, universities, and large corporations
Asynchronous Transfer Mode (ATM)/ Gigabit Ethernet
155 mbps–25.6 gbps
a We have listed the typical bandwidth performance. Some of the technologies are theoretically capable of higher bandwidths. Add itional, some technologies perform at different speeds upstream and downstream. Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Table 5-3
THE RISE OF INTERNETWORKING: BUSINESS IMPLICATIONS
Better Data, Better Decisions ? Improved Process Visibility ? Improved Process Efficiency ? From Make-and-Sell to Sense-and-Respond
?
Wake - Up Call: Denial of Service Attacks in February 2000
Date
February 7 Yahoo
Target Company
Results of Attack
• Overwhelming spike in traffic that lasted 3 hours. • Network availability dropped from 98% to 0%. • Attack originated from 50 different locations a nd was timed to occur during middle of business day. • Stock was down 3.2% for week in which NASDAQ rose almost 3%. • Attack occurred within an hour of the company’s Initial Public Offering (IPO). • Stock was down at week’s end more than 20% from IPO price. • Stock was down 7.3% for week in which NASDAQ rose almost 3%. • Service disrupted • Attacked during peak trading hours. • Stock was down 7.6% for week in which NASDAQ rose a lmost 3%. • Service disrupted • Service disrupted. • Attacked during peak trading hours. • Operators accidentally crashed site as they attempted to defend against the attack.
e peak of the attacks as computers re sent messages -
February 8
Buy.com
Ebay CNN.com E*Trade ZDNet Federal Bureau of Investigation (FBI) National Discount Brokers Group (NDB)
February 9
February 18 February 24
a Overall performance of the Internet degraded by as much as 25% during th repeatedly and automaticall y, trying to recover interrupted tran sactions. Source: Adapted from: NetworkW orldFusion
, www. nfusion .com, complied by
LeGrand Elebash
.
doc_963759020.ppt
The PPT includes topics like Evolution of corporate IT infrastructure,moore's law,metcalfe's law,technological elements of networks,processing systems and facilities,bandwidth.
INTERNETWORKING INFRASTRUCTURE
A Graphical Representation of Moore’s Law
Moore's Law 16000 Transistors per Chip 14000 12000 10000 8000 6000 4000 2000 0 1970 1975 1980 1985 Year
Adapted by author from Microprocessor Report 9(6), May 1995 and “ChipList 9.9.5,” by Aad Offerman, July 1998. Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Figure 5-1
1990
1995
2000
T e E o tio o C rp ra ITIn stru re h v lu n f o o te fra ctu
Su : o rce
A pleg , L n a M R b D A stin an F W p ate y d ., o ert . u , d . arren M raw -H cG ill/Irw , 2 2 in 00 .
M a cF rlan
, C rp ra In rm tio S te y a M n g en o o te fo a n tra g nd a a em t
. B rr R g IL u id e, :
C ap 5F re 5 h ter igu
-2
A Graphical Representation of Metcalfe’s Law
Metcalfe's Law 1800 1600 1400 1200 1000 800 600 400 200 0 0 10 20 30 40 Number of Users Connected to the Network
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Figure 5-3
Value of Network
The Bandwidth Explosion
Network Bandwidth Growth
True voice -over -IP telephony, high resolution Internet music and television, movies on demand, virtual workplaces, broadband wireless Live audio and video streaming events, digital commerce, Internet radio and televisi on, vioce chat applications Streaming audio and video, advanced e commerce, live stock quotes, 1,000M Bps Mass WWW adoption, graphic intensive, instant messaging Mass e -mail adoption, basic WWW sites Large file transfer, e -mail File transfer Increasing Network Bandwidth
Source: Adapted from: http://www. stanford . edu /~ yzarolia /Challenges. htm
2001+
1999 -2000
1997 -1998
1996 -1997
1994 -1996
1990 -1994
1960 -1990
Chapter 5 Figure 5.4
Fundamental Components of Internetworking Infrastructure
Network Core Technologies Fiber optics, cable systems, DSL, satellite, wireless, Internetworking hardware (routers, switches, firewalls), content delivery software, identity and policy management, net monitoring Key Management Issues • How to select technologies and standards • How to select partners • How to manage partner relationships • How to assure reliability • How to maintain security • What to keep internal and what to Transaction software (enterprise outsource systems offered by companies such • How to deploy, grow, and modify as SAP or Oracle; or more targeted • Enterprise system or bestofbreed solutions offered by companies hybrid? such as Trilogy and i2), servers, • Relationships with legacies server appliances, client devices • How to manage incidents (PCs, handhelds) • How to recover after a “disaster” Corporate data centers, collocation • Internal or external management? data centers, managed services data • Choosing a facilities model suited to your company centers, data closets • How to assure reliability • How to maintain security
Chapter 5 Table 5-1
Processing Systems
Facilities
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
A Simple LAN
Workstation
Laptop
Workstation
Printer
Hub Server
Printer
Laptop
Workstation
Chapter 5 Figure 5-5
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
An Example of a WAN
Remote
Backup Frame Relay Network
Production Plant Backup Frame Relay Network Frame Relay Provider Network
Production Plant
Remote Corporate Backup Frame Relay Network
Remote
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Figure 5-6
THE TECHNOLOGICAL ELEMENTS OF NETWORKS
Local Area Networks ? Hubs, Switches, and Network Adapters ? Wide Area Networks ? Routers ? Firewalls and other security systems and devices. ? Caching, content acceleration, and other specialized network devices.
?
Servers in a Typical E-Commerce Configuration
Qdata Facility
D
Big Iron
UPE PR OR LW E O N A M R
Qdata Private Network
SD
VPN Cust A
SD
Router- Cust A
To Public Internet VPN Cust B
Ethernet Switch DNS Servers
Router- Cust B
D S
VPN Cust ...
SD
Internet Router
VPN iPremier Company
Router- Cust ... Network Management
iPremier Co Cage
Router Firewall
SD
Web Accelerator Router to HO Ethernet Switches
SD
T1
SD
D S
Web Server Cluster
SMTP/POP Server
Network Management
Database Server
DIAGRAM SIMPLIFIED FOR ILLUSTRATION PURPOSES
Source : Austin, Robert D.; Leibrock, Larry; Murray, Alan, “The iPremier Company: Denial of Service Attack (A),” Harvard Business School Case No. 601-114.
Chapter 5 Figure 5-7
A Modern Data Center
Source: Allegiance Telecom
Chapter 5 Figure 5-8
THE TECHNOLOGICAL ELEMENTS OF PROCESSING SYSTEMS
Client devices and systems ? Server devices and systems ? Mainframe devices and systems ? Middleware ? Infrastructure management systems ? Business applications
?
TECHNOLOGICAL ELEMENTS OF FACILITIES
Buildings and physical spaces ? Network conduits and connections ? Power ? Environmental controls ? Security
?
Measuring Network Bandwidth
Term Bandwidth bit bits per second or bps Bandwidth Rates 1 kilobit (Kb) 1 megabit (Mb) 1 gigabit (Gb)
Definition The maximum rate at which information can be transmitted along a communication link. Smallest unit of information handled by computers Bandwidth measurement unit Bit equivalent 1 thousand bits 1 million bits 1 billion bits Information Transfer speed 1,000 bits/second 1,000,000/second 1,000,000,000/second
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Table 5-2
OPERATIONAL CHARACTERISTICS OF INTERNETWORKS
? Internetworking
technologies are based on open standards. ? Internetworking technologies operate asynchronously. ? Internetwork communications have inherent latency. ? Internetworking technologies are naturally decentralized. ? Internetworking technologies are scalable.
Communication Technology Bandwidths and User Groups
Communication Technology Telephone Modem Integrated Services Digital Network (ISDN) Cable Modem Digital Subscriber Line (DSL) Ethernet LAN Leased Lines (T1, T3) Bandwidtha 33.6 kbps – 56 kbps 128 kbps 128 kbps – 512 kbps 128 kps – 1.5 mbps 10 mbps–100 mbps 1.544 mbps, 45 mbps User Groups Individuals and small businesses Individuals and small businesses Individuals and small businesses Individuals and small businesses Most businesses and organizations Government, universities, medium and large businesses Government, universities, and large corporations
Asynchronous Transfer Mode (ATM)/ Gigabit Ethernet
155 mbps–25.6 gbps
a We have listed the typical bandwidth performance. Some of the technologies are theoretically capable of higher bandwidths. Add itional, some technologies perform at different speeds upstream and downstream. Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Table 5-3
THE RISE OF INTERNETWORKING: BUSINESS IMPLICATIONS
Better Data, Better Decisions ? Improved Process Visibility ? Improved Process Efficiency ? From Make-and-Sell to Sense-and-Respond
?
Wake - Up Call: Denial of Service Attacks in February 2000
Date
February 7 Yahoo
Target Company
Results of Attack
• Overwhelming spike in traffic that lasted 3 hours. • Network availability dropped from 98% to 0%. • Attack originated from 50 different locations a nd was timed to occur during middle of business day. • Stock was down 3.2% for week in which NASDAQ rose almost 3%. • Attack occurred within an hour of the company’s Initial Public Offering (IPO). • Stock was down at week’s end more than 20% from IPO price. • Stock was down 7.3% for week in which NASDAQ rose almost 3%. • Service disrupted • Attacked during peak trading hours. • Stock was down 7.6% for week in which NASDAQ rose a lmost 3%. • Service disrupted • Service disrupted. • Attacked during peak trading hours. • Operators accidentally crashed site as they attempted to defend against the attack.
e peak of the attacks as computers re sent messages -
February 8
Buy.com
Ebay CNN.com E*Trade ZDNet Federal Bureau of Investigation (FBI) National Discount Brokers Group (NDB)
February 9
February 18 February 24
a Overall performance of the Internet degraded by as much as 25% during th repeatedly and automaticall y, trying to recover interrupted tran sactions. Source: Adapted from: NetworkW orldFusion
, www. nfusion .com, complied by
LeGrand Elebash
.
doc_963759020.ppt