1 / 34

IS 8950

IS 8950. Managing Network Infrastructure and Operations . Understanding Internetworking Infrastructure. Background. 75% of all IT dollars go to infrastructure IT infrastructure lies at the heart of most companies’ operating capabilities

annice
Download Presentation

IS 8950

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IS 8950 Managing Network Infrastructure and Operations

  2. Understanding Internetworking Infrastructure

  3. Background • 75% of all IT dollars go to infrastructure • IT infrastructure lies at the heart of most companies’ operating capabilities • IT infrastructure is vital; no longer is it nice to have or just value-adding. • Internetworking technologies provide a low-cost way to connect virtually everyone on the same network • The rise of internetworking technologies offers new possibilities for addressing business computing needs

  4. The Drivers of Change: Better Chips, Bigger Pipes • PCs made computing available to a wide variety of non-technical users • Web made network resources (such as distant databases) and capabilities (such as over-the-Net collaboration) accessible • Metcalfe’s law: “The usefulness of a network increases with the square of the number of users connected to the network” • Powerful chips and large communication “pipes”, both at low cost, fueled a process that would lead to qualitatively different computing infrastructure

  5. Basic components of internetworking infrastructure • Network • The medium and supporting technologies (hardware and software) • Processing systems • HW and SW that provides an organization’s ability to handle business transactions • Facilities • The physical systems that house and protect computing and network devices

  6. Technological elements of networks • Local Area Networks (LANs) • Hubs, Switches, and Network Adapters • Wide Area Networks (WANs) • Routers, the means by which messages are relayed across large distances • Firewalls and other security systems and devices • Caching, content acceleration, and other specialized network devices

  7. Technological elements of processing systems • Client devices and systems: PCs, handheld devices, cell phones, and even automotive components • Server devices and systems • Mainframe devices and systems • Middleware: enabling utilities, message handling and queuing systems, protocols, standards, software tool kits, etc. • Infrastructure management system • Business applications

  8. Technological elements of facilities • Buildings and physical spaces • Network conduits and connections • Power: UPSs, backup generators, etc. • Environmental controls • Security

  9. Operational characteristics of internetworks • Internetworking technologies are based on open standards • Internetworking technologies operate asynchronously • Internetwork communications have inherent latency • Internetworking technologies are naturally decentralized • Internetworking technologies are scalable

  10. Emergence of real-time infrastructure • Better data, better decision • Improved process visibility • Improved process efficiency • From make-and-sell to sense-and-respond

  11. Assuring reliable and secure IT services

  12. High-available facilities • Uninterruptible electric power delivery • Physical security • Climate control and fire suppression • Network connectivity • Help desk and incident response procedures • N+1 and N+N redundancy

  13. Securing infrastructure against malicious threats • Classification of threats • External attacks (Denial of service—DoS) • Intrusion: obtaining user names and password • Viruses and worms • Defensive measures • Security policies • Firewalls • Authentication • Encryption • Patching and change management • Intrusion detection and network monitoring • Security management framework • Make deliberate security decisions • Consider security a moving target • Practice disciplined change management • Educate users • Deploy multilevel technical measures, as many as you can afford

  14. Managing diverse IT infrastructures

  15. New service models • Managing the shortage of skilled IT workers • Reduced time to market • The shift to 24 x 7 operations • Favorable cash flow profiles • Cost reduction in IT service chains • Making applications globally accessible

  16. Risk through incremental outsourcing • Incremental outsourcing example: hosting • Categories of hosting models • Colocation hosting • Shared hosting • Dedicated hosting • Dedicated hosting subcategories • Simple dedicated hosting • Complex dedicated hosting • Custom dedicated hosting

More Related