Sie sind auf Seite 1von 75

INFORMATION TECHNOLOGY

INFRASTRUCTURE

BY: Asst prof.Dipti Purohit


2

UNIT 2
Ø Computer hardware
Ø Software
Ø Managing &Organization
Data &Information
Ø Information networks
Ø Internet, Intranet
I.

By: Dipti Purohit


COMPUTER
3

Understand and distinguish between mainframe


computer, network computer, personal computer,
laptop, personal digital assistant (PDA) in terms of
capacity, speed, cost, and typical users.
Main Parts of a Personal Computer

Know the main parts of a personal computer such as:

central processing unit (CPU), hard disk, common


input and output devices, types of memory.
Understand the term peripheral device.

By: Dipti Purohit


1.Central Processing Unit
4
The Central Processing Unit or CPU can be thought of as the
brain of the computer. The function of the CPU is to execute the
instructions in the programs. At the heart of its operations are
arithmetic and logical operations.
1.1. Processor Chip

 The CPU is made up of millions of electronic components called transistors,


capacitors and resistors. Transistors are the active components of the CPU.
Modern CPUs contain millions of transistors.

By: Dipti Purohit


PARTS OF CPU
5
 1.2. Integrated Circuit
 It was the miniaturization of
components and the creation
of the integrated circuit
that has made the
development of modern
computers possible. Although
integrated circuits contain
enormous numbers of
components and connectors,
the whole object is
manufactured as a single item
through special manufacturing
techniques. From the outside,
the integrated circuit looks like
a small black box with a
number of electrical
connectors on the outside.


By: Dipti Purohit
Input devices
6

Input devices are components which are


used to feed commands and data into
the computer. These include devices
such as keyboards and mice.

By: Dipti Purohit


Cont…..
7
1. Track ball
2.Barcode reader
3.Light pen
4.Joystick
5.Digital camera
6.Scanner
7.Microphones

By: Dipti Purohit


Output devices
8

Output devices are devices that the


computer uses to send us the results of
the processing. These include the VDU
(monitor) and printers.

By: Dipti Purohit


Cont….
9
 1.Plotter
 Plotters are usually used in
conjunction with CAD
(Computer Assisted Design)
programs. These are used in
everything from the design of
ships and machines to buildings.
 2.Speakers

1.

By: Dipti Purohit


Peripheral devices
10

A computer system comprises the case which


houses the motherboard, CPU, hard drives,
 power supply and various other components.
Devices such as printers, monitor, keyboard
mouse which are connected to the main unit
by various types of cables and connectors are
called peripheral devices.

By: Dipti Purohit


Memory
11
 Primary memory is the Secondary memory

memory that is consists of the various


intimately associated devices that are able to
with the actual working store data and programs
of the computer. This even when the power is off.
includes memory that holds This includes devices such as
the start-up routines as well hard drives, floppy drives,
as the current program and tape drives, CD drives and
data it is working with. DVD drives.
There are various forms of
primary memory: RAM,
ROM and Cache memory.

By: Dipti Purohit


Input/output Devices
12

 Some devices function as both input and output


devices.
 A touch screen is a special type of screen in which the
screen not only displays output but also responds to
being touched. A typical example is their use in auto
tellers at banks. Part of the screen contains
information. Other parts may contain a menu. When
you touch one of the icons on the screen, the system
responds to the associated command.

By: Dipti Purohit


Storage Devices
13

Diskette, Zip disk, data cartridges,


CD-ROM, internal, external hard
disk, DVD, Memory sticks

By: Dipti Purohit


Cont……
14
 Hard Disk

The hard disk is the

component that stores data


and programs even after the
computer has been switched
off. It consists of a number
of rotating platters which are
covered with a magnetic
film. Information is stored
using the magnetic
properties of the film. The
platters rotate from between
5000 and 8000 rpm or
faster.

By: Dipti Purohit


SOFTWARE
15

 Software is divided into two broad


categories: systems software and
application software.

By: Dipti Purohit


TWO TYPES OF SOFTWARE
16
 Systems software  Applications software
 is the term used to  is the term used for
described programs that programs that enable
enable the computer to the user to achieve
function, improve its specific objectives such as
performance and access the create a document, use a
functionality of the database, produce a
hardware. Systems software spreadsheet or design a
sole function is the control of building.
the operation of the
computer. You can think of
systems software as
providing the foundation for
applications software.

By: Dipti Purohit


Operating System Software
17

The following is a list of some of the functions of the operating system:


• Boot-up the computer.


• Control the hard drives: This includes such features as formatting and

defragmenting
disks as well as saving files to and retrieving files from disk.

• Control input devices such as keyboards, mice and scanners.

• Control output devices such as the video display and printer.

• Control the external ports: Ports are the external connections that enable

peripheral
devices to be connected to a computer. Common types of ports are serial,

parallel, USB and firewire. Of these the USB ports are the most important.
• Provide the functionality for computers to be linked in a network.

• Provide the foundation for application software to be launched.

• Enable application software to access and use the hardware.

By: Dipti Purohit


Some operating systems
18

Unix; Linux; Free BSD


• Windows 95; Windows 98; Windows Me,

Windows NT4 Workstation / Server;


Windows 2000 Workstation / Server;

Windows XP; Windows 2003 Server, VISTA,


Windows 7

By: Dipti Purohit


Applications Software
19

some common software applications such as: word


processing, spreadsheet, database,
Web browsing, desktop publishing, accounting, etc.

By: Dipti Purohit


Application Brand name
20 function
Word processor OpenOffice.org Create, store, format and edit documents,
Writer letters and
StarWriter, articles. Word processors arebalance
used where
Spreadsheet SpreadsheetOpenOffice.org
KWord
Calc
Create financial
the emphasis
sheets, performis
statements,

Microsoft
StarCalc, Word on manipulation
statistical and of lectures,
text. analysis
numerical of data,
Presentation OpenOffice.org
Lotus Ami Pro
KSpread
Impress
Create
make
slide shows,
forecasts
other types of
seminars and
Corel
Microsoft Excel
StarImpress based on numeric
presentation. data.into
Spreadsheets are
Database Sybase, MySQL
WordPerfect
Quattro Pro
KPresenter
Microsoft Access
Store and
used where
convert data
Databases are the
information.
Lotus 123
Microsoft emphasis
particularlyis on arithmetic.
useful in working with large
PowerPoint quantities of
data.

By: Dipti Purohit


Application Brand name Function

Email Evolution, KMail 21 Send, receive, store and organise


client Microsoft electronic mail.
Outlook

Web Mozilla, Netscape Surf the Internet and view web sites.
Browser Microsoft Internet
Explorer

Desktop Microsoft DTP is similar to word processing except


publishing Publisher that there is
DTP Page Maker more emphasis on page layout and the
integration of
diagrams.
Accounting GnuCash Store accounting information and produce
Pastel Accounting reports,
statements and invoices.

Web Dreamweaver Create web sites that can be read by a


Development Microsoft browser
FrontPage

Graphics The GIMP Create and manipulate graphics images


and Adobe Photoshop and store images
Imaging in a variety of formats.

By: Dipti Purohit


Graphical User Interface
22

 A graphical user interface or GUI is designed to


simplify the work of the user whether they are
using the operating system or an application package.
The interface consists of a screen with a number of
icons or menus. Functions are executed by pointing
and clicking with the mouse.

By: Dipti Purohit


Managing Information Systems
23

Information Systems (IS) have enormous strategic value


so when they are not working even for a short time, an

organization cannot function. Furthermore, the Life Cycle

Costs (acquisition, operation, security, and maintenance)

of these systems is considerable. Therefore, it is essential

to manage them properly. The planning, organizing,

implementing, operating, and controlling of the

infrastructures and the organization’s portfolio of

applications must be done with great skill.

• The responsibility for the management of information

resources is divided between two organizational entities

By: Dipti Purohit


Cont…
24

The information systems department (ISD), which is a


corporate
entity

– the end users, who are scattered throughout the

world

By: Dipti Purohit


Fundamental Concepts
25

Database is a shared collection of related data


which will be used to support the activities of
particular organization. Database can be viewed
as a repository of data that is defined once and
then is accessed by various users. A database has
the following properties:
 It is a representation of some aspect of the real world; or

perhaps, a collection of data elements (facts) representing


real world information.
· Database is logical coherent and internally consistent.

· Database is designed, built, and populated with data for a

specific purpose.

By: Dipti Purohit


Database Management System (DBMS)
26

 Database Management System (DBMS) is a


collection of programs that enable users to
create, maintain database and control all the
access to the database. The primary goal of the
DBMS is to provide an environment that is
both convenient and efficient for user to
retrieve and store information.

By: Dipti Purohit


The components of a database system
27

Application program accesses the data stored in the database by sending requests
to the DBMS.
By: Dipti Purohit
File-based approach for banking system/Database
approach for banking system
28

By: Dipti Purohit


Classification of Database Systems
29

Based on the ways database is distributed we have


centralized or distributed system
1.Centralized database system : Data in this kind

of system is stored at a single site.


2.Distributed database system: Actual database

and DBMS software are distributed in various sites


connected by a computer network.

By: Dipti Purohit


Centralized Database System
30

By: Dipti Purohit


Distributed Database System
31

By: Dipti Purohit


Benefits of Database Approach
32
1. To control Data Redundancy
o In the Database approach, ideally each data item is stored in only one

place in the database

o However, in some case redundancy is still exists to improving system

performance, but such redundancy is controlled and kept to minimum

2· Data Sharing


o The integration of the whole data in an organization leads to the ability to

produce more information from a given amount of data

3· Enforcing Integrity Constraints

o DBMSs should provide capabilities to define and enforce certain

constraints such as data type, data uniqueness.

4· Restricting Unauthorized Access

o Not all users of the system have the same accessing privileges.

o DBMSs should provide a security subsystem to create and control the user

accounts.

By: Dipti Purohit


Information Networks
33

 A set of computers connected together so that they can


communicate is called a computer network. This involves
installing network cards in each computer. Each
computer is then connected through cabling to a central
device called a hub. Operating systems contain
components that are dedicated to the task of enabling
computers to communicate over a network. This software
makes use of special rules of communication called
protocols. There are many different types of protocols
used for a variety of purposes. The most commonly used
protocol for establishing and maintaining communication
across a network is called TCP/IP or Transmission
Control Protocol / Internet Protocol.

By: Dipti Purohit


Telecommunications Network Model
34
A telecommunications network is any arrangement
where
 A sender transmits a message
 To a receiver
 Over a channel
 Consisting of some sort of medium

By: Dipti Purohit


Telecommunications Network
Components
35

Terminals
 Any input/output device that uses networks
to transmit or receive data
Telecommunications processors
 Devices that support data transmission, reception

Telecommunications channels
 Media over which data are transmitted, received

Computers
 All sizes and types

By: Dipti Purohit


Telecommunications Network
Components
36

Telecommunications control software


 Controls telecommunications activities
 Manages the functions of telecommunications networks

Includes network management programs of all


kinds
 Telecommunications monitors (mainframes)
 Network operating systems (network servers)
 Web browsers (microcomputers)

By: Dipti Purohit


Network Component Alternatives
37

By: Dipti Purohit


Types of Communications Networks
38

Primary types of communications networks


 Wide Area
 Local Area
 Virtual Private
 Client/Server
 Peer-to-peer

By: Dipti Purohit


Wide Area Network (WAN)
39

Telecommunication network that covers a large


geographic area

By: Dipti Purohit


Local Area Network (LAN)
40
Connects
computers
within a
limited
physical area,
such as an
office,
classroom, or
building

By: Dipti Purohit


Virtual Private Networks (VPN)
41

Used to establish secure intranets and extranets


 The Internet is the main backbone network
 Relies on network firewalls, encryption, and
other security features to build a “pipe” through the Internet
 Creates a private network without the high
cost of a separate proprietary connection

By: Dipti Purohit


Virtual Private Network
42

By: Dipti Purohit


Client/Server Networks
43
Clients
 End user personal computers or networked computers

Servers
 Used to manage the networks

Processing
 Shared between the clients and servers
 Sometimes called a two-tier architecture

Larger computer systems are being replaced with


multiple client/server networks

By: Dipti Purohit


Client/Server Network
44

By: Dipti Purohit


Network Computing
45
Networks are the central computing resource of the
organization
 Thin clients provide a browser-based user interface for
processing applets
Thin clients include
 Network computers
 Net PCs
 Other low-cost network devices or
information appliances

By: Dipti Purohit


Network Computing
46
Application and database servers provide
 The operating system
 Application software
 Applets
 Databases
 Database management software

Sometimes called a three-tier client/server


model because it consists of
 Thin clients
 Application servers
 Database servers

By: Dipti Purohit


Network Computing
47

By: Dipti Purohit


Peer-to-Peer Networks
48
Central Server Architecture
 P2P file-sharing software connects all PCs
to a central server
 When a PC requests a file, the server searches
all active peers on the network
 The server sends the requesting PC a list of
links to all active peers who have the file
 Clicking a link connects the two PCs and automatically
transfers the file to the
requesting PC

By: Dipti Purohit


Peer-to-Peer Networks
49
Pure Peer-to-Peer Architecture
 No central directory or server
 File-sharing software connects one PC to
another online user
 When you request a file, the software searches every online
user and sends you a list of active file names
 Clicking a link automatically transfers the file from that
user’s hard drive to yours

By: Dipti Purohit


Central Server Peer-to-Peer Networks
50

Advantages
 Can better protect the integrity and security
of the content and users of the network
Disadvantages
 Directory server can be slowed or overwhelmed by too many
users or technical problems

By: Dipti Purohit


Peer-to-Peer Network Diagrams
51

By: Dipti Purohit


Digital and Analog Signals
52

Analog or digital refers to the method used to


convert information into an electrical signal
 Analog: an electrical current is generated that
is proportional to the quantity being observed
 Digital: the quantity being observed is expressed as a
number
 Analog: if the temperature is 83 degrees, a measuring device
would generate 8.3 volts
 Digital: a measurement of 83 degrees would be displayed as
the number 83

By: Dipti Purohit


Telecommunications
53
Media
 Twisted-Pair Wire
Ordinary telephone wire

 Copper wire is twisted
into pairs
 Coaxial Cable
 Sturdy copper or
aluminum wire wrapped
with spacers to insulate
and protect it
 Fiber-Optic Cable
 One or more hair-thin
filaments of glass
fiber wrapped in a
protective jacket
By: Dipti Purohit
The Problem of “The Last Mile”
54

Network providers use fiber optic cable as a


communications backbone
 Houses connected to the backbone are wired
with twisted pair
 Users don’t benefit from the faster, better technology

By: Dipti Purohit


Wireless Technologies
55
 Terrestrial Microwave
Earthbound microwave systems transmit

high-speed radio signals
 Follows a line-of-sight path between relay systems
spaced about 30 miles apart
 Communications Satellites
 Serve as relay stations
 Use microwave radio signals
 Earth stations beam signals to the satellites
 Not suitable for interactive, real-time processing

By: Dipti Purohit


Wireless Technologies
56
 Cellular and PCS Telephone and Pager Systems
Geographic areas are divided into cells

Each cell has a low-power transmitter or radio relay

antenna
 Computers and other communications processors
coordinate and control the transmissions to and
from mobile users
 Wireless LANS
 Uses wireless radio-wave technology to
connect PCs within an office or a building
 Can be high-frequency, similar to digital
cellular, or low frequency (spread spectrum)

By: Dipti Purohit


Wireless Technologies
57
 Bluetooth
Short-range wireless technology

Connects PCs to devices, such as a printer

Fairly low cost to implement

 Other Wireless Systems
 Cellular phones
 Mobile radio
 PDAs
 Telecommunications networks now play vital and pervasive
roles in
 Web-enabled e-business processes
 Electronic commerce
 Enterprise collaboration
 Other applications that support business operations,
management, and strategic objectives

By: Dipti Purohit


The Wireless Web
58
Wireless Internet access is growing as Web-enabled
information appliances proliferate
 Smart telephones, pagers, PDAs
 All are very thin clients in wireless networks

By: Dipti Purohit


Telecommunications Processors
59

Modems
 The most common type of communications processor
 Converts a digital signal to an analog frequency that can be
transmitted over phone lines, then back into a digital signal
 Modulation and demodulation

By: Dipti Purohit


Inter-Network Processors
60

Switch… makes connections between


telecommunications circuits in a network
Router… intelligent communications processor
that interconnects networks based on different
protocols
Hub… a port-switching communications processor
Gateway… connects networks with different
communications architectures

By: Dipti Purohit


Network Management
61
Functions
 Traffic Management
Manage network resources and traffic to

avoid congestion and optimize service levels
 Security
 Provide authentication, encryption, firewall, auditing,
and enforcement
 Network Monitoring
 Troubleshoot and watch over the network, alerting
administrators of potential problems
 Capacity Planning
 Survey network resources, traffic patterns, and users’
needs
 Determine the best way to accommodate the needs of
the network as it grows and changes

By: Dipti Purohit


INTERNET INTRANET EXTRANET
The internet is the An intranet is similar to the An extranet is an
collection of all computers Internet in operation.
62
However, it is limited to an
extension of a
across the world which can organization's intranet to
organization. include outside users. In
access each other
Users may browse computers an
in some way. The links
within an intranet using a extranet, outside
between computers might
browser but will usually not be organizations or individuals
include telephone, fiber optic
able to access the wider are allowed access to certain
cable,
Internet. In the same way, parts of the
radio, microwave or satellite.
outsiders will not be able to intranet. This access is usually
Today tens of millions of
access the controlled by means of
computers are able to access
intranet of an organization. An passwords and access rights.
each other. The Internet has
intranet can be thought of as a These
no central organization which
private Internet. restrict which users can access
controls its use. Because the
Internet knows no borders, the extranet and what they can
many governments have tried do once they have access.
to control the flow of The purpose of the extranet is
information across the to facilitate business
Internet. However, transactions with other
communications technology is organizations.
so varied and so widespread
that this is a near impossible
task.

By: Dipti Purohit


The Internet Revolution
63
The Internet has become a global information
superhighway
 Millions of smaller, private networks operating independent
of, or in harmony with, each other
 10 servers in 1991 to over 46 million today
 Sustained growth in excess of 1 million servers per month
 No central computer system
 No governing body
 Based on common standards

By: Dipti Purohit


Internet Service Providers
64

ISP
 A company that specializes in providing easy access to the
Internet
 For a monthly fee, provides software, user name, password,
and Internet access
ISPs themselves are connected to one another
through network access points
 One ISP can easily connect to another to obtain addresses of
websites or user nodes

By: Dipti Purohit


Internet Applications
65

Most popular Internet applications and uses


 E-mail
 Instant messaging
 Browsing the Web
 Newsgroups
 Chat rooms
 Publish opinions, subject matter, creative work
 Buy and sell
 Downloading (data, software, reports, pictures, music,
videos)

By: Dipti Purohit


Business Use of the Internet
66

By: Dipti Purohit


Business Value 67of the Internet

By: Dipti Purohit


The Role of
68
Intranets
Many companies have sophisticated and widespread
intranets, offering…
 Detailed data retrieval
 Collaboration
 Personalized customer profiles
 Links to the Internet
Intranets use Internet technologies
 Web browsers and servers
 TCP/IP network protocols
 HTML publishing and databases

By: Dipti Purohit


Intranets
69

Intranets are protected by…


 Passwords
 Encryption
 Firewalls

Customers, suppliers, and other business partners can


access an intranet via extranet links

By: Dipti Purohit


Business Value of Intranets
70

Intranets support
 Communications and collaboration
 Business operations and management
 Web publishing
 Intranet portal management

By: Dipti Purohit


Intranets as Information Portals
71

By: Dipti Purohit


Extranets
72

Network links that use Internet technologies to


connect the intranet of a business to the intranets
of another
Virtual Private Networks
 Direct private network links, or private secure Internet links
between companies
Unsecured Extranet
 Link between a company and others via the Internet, relying
on encryption of sensitive data and firewall security
systems

By: Dipti Purohit


Extranet Connectivity
73

By: Dipti Purohit


Business Value
74
of Extranets
Web browser technology makes customer and supplier
access to intranets easier and faster
Another way to build and strengthen strategic
relationships
Enables and improves collaboration between a
business, customers, and partners
Facilitates online, interactive product development and
marketing

By: Dipti Purohit


75

THANK
YOU

By: Dipti Purohit

Das könnte Ihnen auch gefallen