chapter 5: understanding internetworking … 5 table 5-1 fundamental components of internetworking...
TRANSCRIPT
Chapter 5: “Understanding Internetworking Infrastructure”
Key questions
n What are the basic components of Internetworking Infrastructures?
n What Business Implications do they bring?
n The Future?
A Graphical Representation of Moore’s Law
Chapter 5 Figure 5-1
Moore's Law
02000400060008000
10000120001400016000
1970 1975 1980 1985 1990 1995 2000
Year
Tran
sist
ors
per C
hip
Adapted by author from Microprocessor Report 9(6), May 1995 and “ChipList 9.9.5,” by Aad Offerman, July 1998.
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Basic Components of Internetworking Infrastructuresn The Technological Elements
q Local Area networksq Hubs, switches and Network Adaptersq Wide Area Networksq Routersq Firewalls and other security systems and devicesq Caching, content acceleration and other specialized
devices
T h e E v o l u t i o n o f C o r p o r a t e I T I n f r a s t r u c t u r e
C h a p t e r 5 F i g u r e 5 - 2
S o u r c e : A p p l e g a t e , L y n d a M . , R o b e r t D . A u s t i n , a n d F . W a r r e n M c F a r l a n , C o r p o r a t e I n f o r m a t i o n S t r a t e g y a n d M a n a g e m e n t . B u r r R i d g e , I L : M c G r a w - H i l l / I r w i n , 2 0 0 2 .
Chapter 5 Figure 5-3
A Graphical Representation of Metcalfe’s Law
Metcalfe's Law
0200400600800
10001200140016001800
0 10 20 30 40
Number of Users Connected to the Network
Valu
e of
Net
wor
k
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
T h e B a n d w i d t h E x p l o s i o n
C h a p t e r 5 F i g u r e 5 - 4
N e t w o r k B a n d w i d t h G r o w t h
1 9 6 0 - 1 9 9 0
1 9 9 0 - 1 9 9 4
1 9 9 4 - 1 9 9 6
1 9 9 6 - 1 9 9 7
1 9 9 7 - 1 9 9 8
1 9 9 9 - 2 0 0 0
2 0 0 1 +
I n c r e a s i n g N e t w o r k B a n d w i d t h
M a s s W W W a d o p t i o n , g r a p h i c i n t e n s i v e , i n s ta n t m e s s a g i n g
M a s s e - m a i l a d o p t i o n , b a s i c W W W s i t e s
L a r g e f i l e t r a n s f e r , e - m a i l
F i l e t r a n s f e r
S t r e a m i n g a u d i o a n d v i d e o , a d v a n c e d e -c o m m e r c e , l i v e s t o c k q u o t e s , 1 ,0 0 0 M B p s
L i v e a u d i o a n d v i d e o s t r e a m i n g e v e n t s , d i g i t a l c o m m e r c e , I n t e r n e t r a d i o a n d t e l e v i s i o n , v i o c e c h a t a p p l i c a t i o n s
T r u e v o i c e - o v e r - I P t e l e p h o n y , h i g h r e s o l u t i o n I n t e r n e t t e l e v i s i o n , m u s i c a n d m o v i e s o n d e m a n d , v i r t u a l w o r k p l a c e s , b r o a d b a n d w i r e l e s s
S o u r c e : A d a p t e d f r o m : h t t p : / / w w w . s t a n f o r d . e d u / ~ y z a r o l i a / C h a l l e n g e s . h t m
Basic Components of Internetworking Infrastructures (Cont)
n The Technological Elements of Processing Systemsq Client Devices and Systemsq Server Devices and Systemsq Mainframe Devices and Systemsq Middlewareq Infrastructure Management Systemsq Business Applications
Chapter 5 Figure 5-5
A Simple LAN
Hub
Laptop
Laptop Workstation
Workstation
Workstation Printer
Printer
Server
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Figure 5-6
An Example of a WAN
Backup Frame Relay Network
Frame Relay Provider Network
Backup Frame Relay Network
Backup Frame Relay Network
ProductionPlant
Corporate
ProductionPlant
Remote
Remote
Remote
Backup Frame Relay NetworkBackup Frame Relay Network
Frame Relay Provider Network
Frame Relay Provider Network
Backup Frame Relay NetworkBackup Frame Relay Network
Backup Frame Relay NetworkBackup Frame Relay Network
ProductionPlant
Corporate
ProductionPlant
Remote
Remote
Remote
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Servers in a Typical E-Commerce Configuration
Chapter 5 Figure 5-7
iPremier Co Cage
To Public Internet
D
UPPER LOWER NORMA
InternetRouter
Router- Cust A
Router- Cust B
Router- Cust ...
VPN Cust B
VPN Cust ...
Router Firewall
Web Server Cluster
Database Server
SD
SD
SMTP/POPServer
SD
DNS ServersEthernet Switch
SD
Web Accelerator
Router to HO
T1
SD
NetworkManagement
Ethernet Switches
Qdata Facility
DIAGRAM SIMPLIFIED FOR ILLUSTRATION PURPOSES
VPN Cust A
VPN iPremier Company
Qdata Private Network
SD
Network Management
SD
SD
Big Iron
Source : Austin, Robert D.; Leibrock, Larry; Murray, Alan, “The iPremier Company: Denial of Service Attack (A),” Harvard Business School Case No. 601-114.
Basic Components of Internetworking Infrastructures (Cont)
n The Technological Elements of Facilitiesq Building and Physical spacesq Network Conduits and connectionsq Powerq Environmental controlsq Security
Chapter 5 Figure 5-8
A Modern Data Center
Source: Allegiance Telecom
Basic Components of Internetworking Infrastructures (Cont)
n The Operational Characteristics of Internetworksq Open Standards (TCP/IP)q Asynchronous Operationq Inherent Latencyq Decentralizationq Scalability
Chapter 5 Table 5-1
Fundamental Components of Internetworking Infrastructure
Core Technologies Key Management Issues Netw ork Fiber optics, cable systems, DSL,
satellite, wireless, Internetworking hardware (routers, switches, firewalls), content delivery software, identity and policy management, net monitoring
• How to select technologies and standards
• How to select partners • How to manage partner relationships • How to assure reliability • How to maintain security
Processing Systems
Transaction software (enterprise systems offered by companies such as SAP or Oracle; or more targeted solu tions offered by companies such as Trilogy and i2), servers, server appliances, client devices (PCs, handhelds)
• What to keep internal and what to outsource
• How to deploy, grow, and modify • Enterprise system or best-of-breed
hybrid? • Relationships with legacies • How to manage incidents • How to recover after a “disaster”
Facilities Corporate data centers, collocation
data centers, managed services data centers, data closets
• Internal or external management? • Choosing a facilities model suited to
your company • How to assure reliability • How to maintain security
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
Chapter 5 Table 5-2
Measuring Network Bandwidth
Term Definition Bandwidth The maximum rate at which information can be transmitted along a
communication link.
bit Smallest unit of information handled by computers
bits per second or bps Bandwidth measurement unit
Bandwidth Rates Bit equivalent Information Transfer speed
1 kilobit (Kb) 1 thousand bits 1,000 bits/ second
1 megabit (Mb) 1 million bits 1,000,000/ second
1 gigabit (Gb) 1 billion bits 1,000,000,000/ second
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
The Rise of Internetworking: Business Implicationsn The emergence of Real Time Infrastructuresn Broader Exposure to Operational Threatsn New Models Of Service Deliveryn Managing Legacies
Chapter 5 Table 5-3
Communication Technology Bandwidths and User Groups
Communication Technology Bandwidtha User Groups Telephone Modem 33.6 kbps – 56 kbps Individuals and small
businesses Integrated Services Digital Network (ISDN)
128 kbps Individuals and small businesses
Cable Modem 128 kbps – 512 kbps Individuals and small businesses
Digital Subscriber Line (DSL) 128 kps – 1.5 mbps Individuals and small businesses
Ethernet LAN 10 mbps–100 mbps Most businesses and organizations
Leased Lines (T1, T3) 1.544 mbps, 45 mbps Government, universities, medium and large businesses
Asynchronous Transfer Mode (ATM)/ Gigabit Ethernet
155 mbps–25.6 gbps Government, universities, and large corporations
a We have listed the typical bandwidth performance. Some of the technologies are theoretically capable of higher bandwidths. Additional, some technologies perform at different speeds upstream and downstream.
Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, 2002.
W a k e - U p C a l l : D e n i a l o f S e r v i c e A t t a c k s i n F e b r u a r y 2 0 0 0
C h a p t e r 5 T a b l e 5 - 4
a O v e r a l l p e r f o r m a n c e o f t h e I n t e r n e t d e g r a d e d b y a s m u c h a s 2 5 % d u r i n g t h e p e a k o f t h e a t t a c k s a s c o m p u t e r s r e - s e n t m e s s a g e s r e p e a t e d l y a n d a u t o m a t i c a l l y , t r y i n g t o r e c o v e r i n t e r r u p t e d t r a n s a c t i o n s .
S o u r c e : A d a p t e d f r o m : N e t w o r k W o r l d F u s i o n , w w w . n f u s i o n . c o m , c o m p l i e d b y L e G r a n d E l e b a s h .
D a t e T a r g e t C o m p a n y R e s u l t s o f A t t a c k F e b r u a r y 7 Y a h o o • O v e r w h e l m i n g s p i k e i n t r a f f i c t h a t l a s t e d
3 h o u r s . • N e t w o r k a v a i l a b i l i t y d r o p p e d f r o m 9 8 %
t o 0 % . • A t t a c k o r i g i n a t e d f r o m 5 0 d i f f e r e n t
l o c a t i o n s a n d w a s t i m e d t o o c c u r d u r i n g m i d d l e o f b u s i n e s s d a y .
• S t o c k w a s d o w n 3 . 2 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 % .
F e b r u a r y 8 B u y . c o m • A t t a c k o c c u r r e d w i t h i n a n h o u r o f t h e c o m p a n y ’ s I n i t i a l P u b l i c O f f e r i n g ( I P O ) .
• S t o c k w a s d o w n a t w e e k ’ s e n d m o r e t h a n 2 0 % f r o m I P O p r i c e .
E b a y • S t o c k w a s d o w n 7 . 3 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 % .
C N N . c o m • S e r v i c e d i s r u p t e d F e b r u a r y 9 E * T r a d e • A t t a c k e d d u r i n g p e a k t r a d i n g h o u r s .
• S t o c k w a s d o w n 7 . 6 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 % .
Z D N e t • S e r v i c e d i s r u p t e d F e b r u a r y 1 8 F e d e r a l B u r e a u o f I n v e s t i g a t i o n
( F B I ) • S e r v i c e d i s r u p t e d .
F e b r u a r y 2 4 N a t i o n a l D i s c o u n t B r o k e r s G r o u p ( N D B )
• A t t a c k e d d u r i n g p e a k t r a d i n g h o u r s . • O p e r a t o r s a c c i d e n t a l l y c r a s h e d s i t e a s
t h e y a t t e m p t e d t o d e f e n d a g a i n s t t h e a t t a c k .
The Future
n Client-Server model became popularn LANs, WANs, VANsn Less dependence on Mainframe computers & MIS
n Electronic communication/workgroup computing tools support group work
n See GWUForecast.gwu.edu
Organizational Design Challenges
n The Virtual Corporationq From Control to Learningq From Autonomy to
Collaborationn Organizational Structuren Authority and Decision
Makingn Operating Processesn Management Processesn Incentives and rewardsn Roles/Skills and Expertisen Career Development
Targeted Opportunities
n Communicating Organizational Priorities
n Meaningful Budgetsn Effective Incentive
Systemsn Solution for Productionn Adaptation for Change
Interorganizational Systems (IOS)
n Networked information systems used by two or more separate organizations to perform a joint business function
n Interorganizational systems (IOS)q Electronic Data Interchange uses EDI standardsq Extranets - IOS over the Internet
IOS EXAMPLE
Kmart has opened its IS to help suppliers better serve customers. The interface has an extensive GUI component and allows 50to 100 vendors to look at Kmart’s merchandising database.
For example, the system lets Black and Decker access to any datathat Kmart believes helps B&D better serve Kmart and its customers.
Kmart implemented this program in exchange for more frequentand smaller deliveries, but also because it was in the best interestedof the company, its customers and its suppliers.
Why did Kmart implement this IOS? What is the implication forhaving Kmart decide on what info B&D can access?
IOS Risks
n Forces automation & lock-in to a particular system
n Government regulations may changen Great impacts on organizational structures,
systems, & people - loss of controln Diminishes organizational boundaries --
requires trust in partners
Electronic Data Interchange (EDI)n Computer-to-computer
exchange of standard business transaction documents between 2 organizationsq purchase ordersq invoicesq bill of lading