System Analysis & design

Size: px
Start display at page:

Download "System Analysis & design"

Transcription

1 Assiut University Faculty of Computers and Information System Analysis & design Year 2 Academic Year 2014/ 2015 Term (2) Copyright 2014 Dr. Hossam Ragab

2 8 A n important component of the design phase is the architecture design, which describes the system s hardware, software, and network environment. The architecture design flows primarily from the nonfunctional requirements, such as operational, performance, security, cultural, and political requirements. The deliverables from architecture design include the architecture design and the hardware and software specification.

3 OBJECTIVES Describe the fundamental components of an information system. Describe server-based, client-based, and client server architectures. Describe newer architectural options, such as cloud computing. Explain how operational, performance, security, cultural, and political requirements affect the architecture design. Create an architectural design. Create a hardware and software specification.

4 ARCHITECTURE DESIGN An important step of the design phase is the creation of the architecture design, the plan for how the information system components will be distributed across multiple computers and what hardware, operating system software, and application software will be used on each computer (e.g., Windows or Linux operating system software). The nonfunctional requirements developed early in the analysis phase play a key role in architecture design. These requirements are reexamined and refined into more detailed requirements that influence the system s architecture. The objective of architecture design is to determine how the software components of the information system will be assigned to the hardware devices of the system.

5 ELEMENTS OF AN ARCHITECTURE DESIGN Architectural Components The major architectural components of any system are the software and the hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. Software systems can be divided into four basic functions, which are the basic building blocks of any information system. 1. Data storage; Most information systems require data to be stored and retrieved, whether a small file or a large database. These are the data entities documented in ERDs. 2. Data access logic; the processing required to access data, often meaning database queries in Structured Query Language (SQL) 3. Application logic; the logic documented in the DFDs, use cases, and functional requirements. 4. Presentation logic; the display of information to the user and the acceptance of the user s commands (the user interface)

6 ELEMENTS OF AN ARCHITECTURE DESIGN Architectural Components Hardware components of a systems are client computers, servers, and the network that connects them. 1. Client computers; are the input output devices employed by the user and are usually descktop or laptop computers, and also handheld devices, smartphones, special-purpose terminals. 2. Servers; are larger multi-user computers used to store software and data. 3. The network that connects the computers can vary in speed from slow, to medium-speed, to fast, to high-speed.

7 ELEMENTS OF AN ARCHITECTURE DESIGN Client Server Architectures attempt to balance the processing between client devices and one or more server devices. The client is responsible for the presentation logic, The server is responsible for the data access logic and data storage. The application logic may reside on the client, reside on the server, or be split between both Two-Tiered Client Server Architecture ** If the client contained all or most of the application logic, it is called a thick or fat client

8 ELEMENTS OF AN ARCHITECTURE DESIGN Client Server Architectures have four important benefits; They are scalable, that means it is easy to increase or decrease the storage and processing capabilities of the servers. can support many different types of clients and servers. It is possible to connect computers that use different operating systems so that you are not locked into one vendor. (Middleware is a type of system software designed to translate between different vendors software, and installed on both the client and server computers) for thin client server architectures that use Internet standards, it is simple to clearly separate the presentation logic, the application logic, and the data access logic and design each to be somewhat independent. it is possible to change the application logic without changing the presentation logic or the data, which are stored in databases if a server fails in a client server architecture, only the applications requiring that server will fail. The failed server can be swapped out and replaced and the applications can then be restored Client server architectures have critical limitations; The complexity of writing the software and / or updating the overall system, due to all applications in client server computing have two parts, the software on the client side and the software on the server side.

9 ELEMENTS OF AN ARCHITECTURE DESIGN Client Server Tiers; There are many ways in which the application logic can be partitioned between the client and the server. In the Two-Tiered Client Server Architecture the server is responsible for the data and the client is responsible for the application and presentation, and it called a two-tiered architecture because it uses only two sets of computers clients and servers A three-tiered architecture uses three sets of computers, the software on the client computer is responsible for presentation logic, an application server(s) is responsible for the application logic, and a separate database server(s) is responsible for the data access logic and data storage

10 An n-tiered architecture distributes the work of the application (the middle tier) among multiple layers of more specialized server computers. This type of architecture is common in today s Web-based e-commerce systems. The browser software on client computers makes HTTP requests to view pages from the Web server(s), and the Web server(s) enable the user to view merchandise for sale by responding with HTML documents As the user shops, components on the application server(s) are called as needed to allow the user to put items in a shopping cart; determine item pricing and availability; compute purchase costs, sales tax, and shipping costs; authorize payments, etc.., those elements of business logic, or detailed processing, are stored on the application server(s) and are accessible to any application. The database server(s) manage the data components of the system. Each of these four components is separate, which makes it easy to spread the different components on different servers and to partition the application logic on a Web-oriented server and a business-oriented server.

11 n-tiered architecture advantage compared with two / three - tiered architecture is that; it separates out the processing that occurs to better balance the load on the different servers; it is more scalable If we discover that the application server is too heavily loaded, we can simply replace it with a more powerful server or just put in several more application servers to share the load. if we discover that the database server is underused, we could store data from another application on it. n-tiered architecture disadvantage compared with two/three - tiered architecture are that; the configuration puts a greater load on the network the n-tiered model requires more communication among the servers; it generates more network traffic, so you need a higher-capacity network it is much more difficult to program and test software in n-tiered architectures than in two-tiered architectures, because more devices have to communicate properly to complete a user s transaction

12 Less Common Architectures Server-Based Architectures The very first computing architectures were serverbased, with the server (usually, a central mainframe computer) performing all four application functions. The clients (usually, terminals) enabled users to send and receive messages to and from the server computer. The clients merely captured keystrokes and sent them to the server for processing, and accepted instructions from the server on what to display This very simple architecture often works very well. Application software is developed and stored on the server, and all data are on the same computer. There is one point of control because all messages flow through the one central server. Software development and software administration are simplified because a single computer hosts the entire system (operating system and application software).

13 Less Common Architectures Client-Based Architectures With client-based architectures, the clients are microcomputers on a local area network, and the server is a server computer on the same network. The application software on the client computers is responsible for the presentation logic, the application logic, and the data access logic; the server simply provides storage for the data This simple architecture often works very well in situations with low numbers of users or limited data access requirements. The fundamental problem in the clientbased architecture is that all data on the server must travel to the client for processing.

14 Advances in Architecture Configurations Advances in hardware, software, and networking have given rise to a number of new architecture options. Two advances that are currently getting a lot of attention, virtualization and cloud computing. Virtualization This term, in the computing domain, refers to the creation of a virtual device or resource, such as a server or storage device. Server virtualization involves partitioning a physical server into smaller virtual servers. Software is used to divide the physical server into multiple virtual environments, called virtual or private servers. Storage virtualization involves combining multiple network storage devices into what appears to be single storage unit. Storage area network (SAN) uses storage virtualization to create a highspeed sub network of shared storage devices In this environment, tasks such as backup, archiving, and recovery are easier and faster.

15 Advances in Architecture Configurations Cloud computing This term refers to everything, from computing power to computing infrastructure, applications, business processes to personal collaboration of which can be delivered as a service wherever and whenever needed, It is no longer necessary for organizations to own, manage, and administer their own computing infrastructure. Cloud computing can be defined as the set of hardware, networks, storage, services, and interfaces that combine to deliver aspects of computing as a service, and it can be implemented in three ways: private cloud, public cloud, and hybrid clouds. Public clouds, services are provided as a service over the Internet with little or no control over the underlying technology infrastructure Private clouds offer activities and functions as a service, but are deployed over a company intranet or hosted data center Hybrid clouds combine the power of both public and private clouds, activities and tasks are allocated to private or public clouds as required Cloud computing suppliers utilize virtualization as a key enabling technology, for cloud computing customers, the point is to outsource IT technology, applications, and skills with a pay per usage model. Through the cloud computing model, the power of virtualization is converted into measurable business value.

16 CREATING AN ARCHITECTURE DESIGN The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Creating an architecture design begins with the nonfunctional requirements. The first step is to refine the nonfunctional requirements into more detailed requirements Then employed those detailed nonfunctional requirements to help select the architecture to be used (server-based, client-based, or client server) and the software components to be placed on each device. In a client server architecture, it has to decide whether to use a two-tier, three-tier, or n-tier architecture. There are four primary types of nonfunctional requirements that can be important in designing the architecture: 1. Operational requirements, 2. Performance requirements, 3. Security requirements, and 4. Cultural and political requirements.

17 CREATING AN ARCHITECTURE DESIGN Operational requirements, specify the operating environment in which the system must perform and how those may change over time. (operating systems, system software, and information systems with which the system must interact, but will on occasion also include the physical environment if the environment is important to the application e.g., in a noisy factory floor where no audible alerts can be heard). The four key operational requirement areas are; 1. Technical Environment Requirements Specify the type of hardware and software on which the system will work, usually focus on the operating system software (e.g., Windows, Linux), database system software (e.g., Oracle), and other system software (e.g., Internet Explorer). 2. System Integration Requirements need to the system to operate with other information systems, either inside or outside the company. These typically specify interfaces through which data will be exchanged with other systems. 3. Portability Requirements define how the technical operating environments may evolve over time and how the system must respond (e.g., the system may currently run on Windows Vista, but in the future may have to run on Windows 7 and Linux). Portability requirements also refer to potential changes in business requirements that will drive technical-environment changes. For example, many organizations today are working to ensure their applications are optimized for devices such as the ipad in response to user demand. 4. Maintainability Requirements specify the business requirement changes that can be anticipated, not all changes are predictable but some are.

18 Operational Requirements

19 CREATING AN ARCHITECTURE DESIGN Performance Requirements, focus on performance issues such as response time, capacity, and reliability. As analysts define the performance requirements for the system, the testability of those requirements is a key issue. Each requirement must be measurable so that a benchmark comparison can be made. The three key Performance requirement areas are; 1. Speed Requirements (a) how fast the system must operate (the response time of the system), and (b) how long it takes transactions in one part of the system to be reflected in other parts. 2. Capacity Requirements attempt to predict how many users the system will have to support, both in total and simultaneously. 3. Availability and Reliability Requirements focus on the extent to which users can assume that the system will be available for them to use. While some systems are intended to be used just during the 40-hour work week, other systems are designed to be used by people around the world

20 Performance Requirements

21 CREATING AN ARCHITECTURE DESIGN Security Requirements, Security is the ability to protect the information system from disruption and data loss, whether caused by an intentional act (e.g., a hacker or a terrorist attack) or a random event (e.g., disk failure, tornado). Security is primarily the responsibility of the operations group, the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations. Developers of new systems must ensure that the system s security requirements produce reasonable precautions to prevent problems; system developers are responsible for ensuring security within the information systems themselves. System developers must know the security standards that are applicable to their organizations. The most important computer asset in any organization is not the equipment; it is the organization s data. Security within systems usually focuses on; 1. specifying who can access what data, 2. identifying the need for encryption and authentication, and 3. ensuring that the application prevents the spread of viruses.

22 Security Requirements

23 CREATING AN ARCHITECTURE DESIGN Cultural and Political Requirements, are specific to the countries in which the system will be used. Important part of the design of the system s architecture is understanding the global cultural and political requirements for the system

24 CREATING AN ARCHITECTURE DESIGN Designing the Architecture Operational Requirements System integration requirements may lead to one architecture over another, depending upon the architecture and design of the system(s) with which the system needs to integrate Performance Requirements information systems that have high performance requirements are best suited to client server architectures. Security Requirements, server-based architectures tend to be more secure because all software is in one location and because mainframe operating systems are more secure than microcomputer operating systems. Cultural and Political Requirements As the cultural and political requirements become more important, the ability to separate the presentation logic from the application logic and the data becomes important. Nonfunctional Requirements and Their Implications for Architecture Design

25 HARDWARE AND SOFTWARE SPECIFICATION The hardware and software specification is a document that describes what hardware and software are needed to support the application. When a specification document is created, the hardware needed to support the future system is listed and then described in as much detail as possible. Next, the software to run on each hardware component is written down, along with any additional associated costs, such as technical training, maintenance, extended warranties, and licensing agreements. The project team will work in conjunction with the purchasing department to acquire the hardware and software.

26

Systems Analysis and Design II

Systems Analysis and Design II Systems Analysis and Design II Chapter 8. Architecture Design. Dr. Tinabo Chapter 8: Outline Elements of an architecture design. Creating an architecture design. Hardware and software specification. INTRODUCTION,

More information

Chapter 11: Physical Architecture Layer Design

Chapter 11: Physical Architecture Layer Design Chapter 11: Physical Architecture Layer Design Objectives Understand the different physical architecture components. Understand server-based, client-based, and client server physical architectures. Be

More information

ARCHITECTURE DESIGN CHAPTER 8 OBJECTIVES CHAPTER OUTINE

ARCHITECTURE DESIGN CHAPTER 8 OBJECTIVES CHAPTER OUTINE CHAPTER 8 ARCHITECTURE DESIGN A n important component of the design phase is the architecture design, which describes the system s hardware, software, and network environment. The architecture design flows

More information

CLIENT SERVER ARCHITECTURE:

CLIENT SERVER ARCHITECTURE: CLIENT SERVER ARCHITECTURE: Client-Server architecture is an architectural deployment style that describe the separation of functionality into layers with each segment being a tier that can be located

More information

1/10/2011. Topics. What is the Cloud? Cloud Computing

1/10/2011. Topics. What is the Cloud? Cloud Computing Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility

More information

Network. Arcstar Universal One

Network. Arcstar Universal One Network Universal One ARCSTAR UNIVERSAL ONE Universal One Enterprise Network NTT Communications' Universal One is a highly reliable, premium-quality network service, delivered and operated in more than

More information

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

More information

Business Data Communications and Networking

Business Data Communications and Networking Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Dwayne Whitten, D.B.A Mays Business School Texas A&M University http://alainmaterials.webs.com/

More information

Cloud Computing the VMware Perspective. Bogomil Balkansky Product Marketing

Cloud Computing the VMware Perspective. Bogomil Balkansky Product Marketing Cloud Computing the VMware Perspective Bogomil Balkansky Product Marketing Cloud Computing - the Key Questions What is it? Why do you need it? How do you build (or leverage) one (or many)? How do you operate

More information

Chapter 3. Database Architecture and the Web

Chapter 3. Database Architecture and the Web Chapter 3 Database Architecture and the Web 1 Chapter 3 - Objectives Software components of a DBMS. Client server architecture and advantages of this type of architecture for a DBMS. Function and uses

More information

Key Ideas. OO Analysis and Design Foundation. Objectives. Adapted from slides 2005 John Wiley & Sons, Inc.

Key Ideas. OO Analysis and Design Foundation. Objectives. Adapted from slides 2005 John Wiley & Sons, Inc. Slide 1 Information Systems Development COMM005 (CSM03) Autumn Semester 2009 Dr. Jonathan Y. Clark Email: j.y.clark@surrey.ac.uk Course Website: www.computing.surrey.ac.uk/courses/csm03/isdmain.htm Course

More information

Backup Exec Subscription Licensing Guide

Backup Exec Subscription Licensing Guide Backup Exec Subscription Licensing Guide Last Update: 27 September 2017 CONTENTS Product Overview... 3 Backup Exec Subscription Licensing... 4 Packaging and Licensing Overview....5 Packaging and Licensing

More information

What to Look for in a DRaaS Solution

What to Look for in a DRaaS Solution What to Look for in a DRaaS Solution Storage Switzerland, LLC GEORGE CRUMP - LEAD ANALYST Introduction Disaster Recovery as a Service (DRaaS) outsources and simplifies the most difficult situations that

More information

Designing Database Solutions for Microsoft SQL Server 2012

Designing Database Solutions for Microsoft SQL Server 2012 Course 20465 : Designing Database Solutions for Microsoft SQL Server 2012 Page 1 of 6 Designing Database Solutions for Microsoft SQL Server 2012 Course 20465: 4 days; Instructor-Led Introduction This course

More information

Cisco CloudCenter Solution Use Case: Application Migration and Management

Cisco CloudCenter Solution Use Case: Application Migration and Management Cisco CloudCenter Solution Use Case: Application Migration and Management Application migration and management Cloud computing is here to stay. According to recent Gartner research 1, from 2011 to 2014

More information

Designing Database Solutions for Microsoft SQL Server 2012

Designing Database Solutions for Microsoft SQL Server 2012 Designing Database Solutions for Microsoft SQL Server 2012 Course 20465A 5 Days Instructor-led, Hands-on Introduction This course describes how to design and monitor high performance, highly available

More information

Designing Database Solutions for Microsoft SQL Server 2012

Designing Database Solutions for Microsoft SQL Server 2012 Designing Database Solutions for Microsoft SQL Server 2012 Course 20465B 5 Days Instructor-led, Hands-on Introduction This course describes how to design and monitor high performance, highly available

More information

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS QM 433 - Chapter 1 Database Fundamentals Version 10 th Ed Prepared by Dr Kamel Rouibah / Dept QM & IS www.cba.edu.kw/krouibah Dr K. Rouibah / dept QM & IS Chapter 1 (433) Database fundamentals 1 Objectives

More information

Course AZ-100T01-A: Manage Subscriptions and Resources

Course AZ-100T01-A: Manage Subscriptions and Resources Course AZ-100T01-A: Manage Subscriptions and Resources Module 1: Managing Azure Subscriptions In this module, you ll learn about the components that make up an Azure subscription and how management groups

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Web Serving Architectures

Web Serving Architectures Web Serving Architectures Paul Dantzig IBM Global Services 2000 without the express written consent of the IBM Corporation is prohibited Contents Defining the Problem e-business Solutions e-business Architectures

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

Design Checklist. Application Architecture. Initial cost and Total Cost of Ownership (TCO) Enterprise Resource Planning (ERP) Peter Lo

Design Checklist. Application Architecture. Initial cost and Total Cost of Ownership (TCO) Enterprise Resource Planning (ERP) Peter Lo Design Checklist Application Architecture Peter Lo Before selecting application architecture, the analyst must consider the following issues: Enterprise resource planning Initial cost and Total Cost of

More information

Architectural Design

Architectural Design Modeling and Systems Development Lecture 9 Architectural Design Creating a clear plan of what needs to be built and the infrastructure to build it on Design The purpose of the analysis phase is to figure

More information

IBM Storwize V7000: For your VMware virtual infrastructure

IBM Storwize V7000: For your VMware virtual infrastructure IBM Storwize V7000: For your VMware virtual infrastructure Innovative midrange disk system leverages integrated storage technologies Highlights Complement server virtualization, extending cost savings

More information

System Analysis & design

System Analysis & design Assiut University Faculty of Computers and Information System Analysis & design Year 2 Academic Year 2014/ 2015 Term (2) 5 A PICTURE IS WORTH A 1,000 WORDS A process model is a graphical way of representing

More information

CHEM-E Process Automation and Information Systems: Applications

CHEM-E Process Automation and Information Systems: Applications CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison

More information

Continuous Processing versus Oracle RAC: An Analyst s Review

Continuous Processing versus Oracle RAC: An Analyst s Review Continuous Processing versus Oracle RAC: An Analyst s Review EXECUTIVE SUMMARY By Dan Kusnetzky, Distinguished Analyst Most organizations have become so totally reliant on information technology solutions

More information

Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution

Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution The Ever-Present Storage Management Conundrum In the modern IT landscape, the storage management conundrum is as familiar

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,

More information

Survey of Oracle Database

Survey of Oracle Database Survey of Oracle Database About Oracle: Oracle Corporation is the largest software company whose primary business is database products. Oracle database (Oracle DB) is a relational database management system

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud

More information

ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump

ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS By George Crump Economical, Storage Purpose-Built for the Emerging Data Centers Most small, growing businesses start as a collection of laptops

More information

Cloud Computing For Researchers

Cloud Computing For Researchers Cloud Computing For Researchers August, 2016 Compute Canada is often asked about the potential of outsourcing to commercial clouds. This has been investigated as an alternative or supplement to purchasing

More information

Cloud on z Systems Solution Overview: IBM Cloud Manager with OpenStack

Cloud on z Systems Solution Overview: IBM Cloud Manager with OpenStack Cloud on z Systems Solution Overview: IBM Cloud Manager with OpenStack June 1, 2015 IBM Systems Nisha Bonda Client Technical Specilist Mike Bonett zgrowth Team North America Table of Contents ACKNOWLEDGEMENTS

More information

Data Security at Smart Assessor

Data Security at Smart Assessor Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department 1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud

More information

FUJITSU Backup as a Service Rapid Recovery Appliance

FUJITSU Backup as a Service Rapid Recovery Appliance FUJITSU Backup as a Service Rapid Recovery Appliance The unprecedented growth of business data The role that data plays in today s organisation is rapidly increasing in importance. It guides and supports

More information

Database Management System Fall Introduction to Information and Communication Technologies CSD 102

Database Management System Fall Introduction to Information and Communication Technologies CSD 102 Database Management System Fall 2016 Introduction to Information and Communication Technologies CSD 102 Outline What a database is, the individuals who use them, and how databases evolved Important database

More information

Course: 2553A Administering Microsoft SharePoint Portal Server 2003

Course: 2553A Administering Microsoft SharePoint Portal Server 2003 Course: 2553A Administering Microsoft SharePoint Portal Server 2003 Description: This three-day course provides students with the knowledge and skills to deploy and manage a Microsoft SharePoint Portal

More information

10 Cloud Myths Demystified

10 Cloud Myths Demystified 10 Cloud s Demystified The Realities for Modern Campus Transformation Higher education is in an era of transformation. To stay competitive, institutions must respond to changing student expectations, demanding

More information

SCALEFAST COMMERCE CLOUD INFRASTRUCTURE

SCALEFAST COMMERCE CLOUD INFRASTRUCTURE SCALEFAST COMMERCE CLOUD INFRASTRUCTURE ALWAYS-ON, GLOBAL ECOMMERCE INFRASTRUCTURE Scalefast provides the highest level of availability, performance and security for your online store. We take care of

More information

Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines

Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates

More information

VIRTUAL PRIVATE NETWORKS (VPN)

VIRTUAL PRIVATE NETWORKS (VPN) VIRTUAL PRIVATE NETWORKS (VPN) Cisco on Cisco E-Learning Series - Executive Track TRANSCRIPT INTRODUCTION Helping employees work productively anytime, anywhere is a necessity in many organizations. Offering

More information

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015 Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually

More information

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief 5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren

More information

Cloud Computing: Making the Right Choice for Your Organization

Cloud Computing: Making the Right Choice for Your Organization Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,

More information

Magento Commerce Architecture and Security Model Last updated: Aug 2017

Magento Commerce Architecture and Security Model Last updated: Aug 2017 Magento Commerce Architecture and Security Model Last updated: Aug 2017 Architecture The Magento Commerce architecture is designed to provide a highly secure environment. Each customer is deployed into

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

Storage Made Easy. SoftLayer

Storage Made Easy. SoftLayer Storage Made Easy Providing an Enterprise File Fabric for SoftLayer STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR SOFTLAYER The File Fabric is a comprehensive multi-cloud data security solution built on

More information

NEXT GENERATION SECURITY OPERATIONS CENTER

NEXT GENERATION SECURITY OPERATIONS CENTER DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting

More information

ON SCHEDULE TERMS AND CONDITIONS (September 23rd 2018)

ON SCHEDULE TERMS AND CONDITIONS (September 23rd 2018) By using On Schedule web application you are making an agreement with us, code fish, according to the current terms and conditions at the time of use. Upon the terms and conditions changing you will be

More information

Providing an Enterprise File Share and Sync Solution for

Providing an Enterprise File Share and Sync Solution for Storage Made Easy Providing an Enterprise File Share and Sync Solution for Microsoft Azure Storage Storage Made Easy Enterprise File Share and Sync Solution for Microsoft Azure The Storage Made Easy (SME)

More information

Storage Made Easy. Providing an Enterprise File Fabric for INVESTOR NEWSLETTER ISSUE N 3

Storage Made Easy. Providing an Enterprise File Fabric for INVESTOR NEWSLETTER ISSUE N 3 INVESTOR NEWSLETTER ISSUE N 3 Storage Made Easy Providing an Enterprise File Fabric for STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR OPENIO Storage Made Easy (SME) File Fabric is a comprehensive Enterprise

More information

Welcome to Gumnut Cloud

Welcome to Gumnut Cloud Welcome to Gumnut Cloud How does it work : Benefits Of Gumnut Cloud In our Cloud solution, applications and data are stored, run from, and managed by a central Cloud server. Users do not download and install

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Introduction to Cloud Computing Nabil Abdennadher nabil.abdennadher@hesge.ch 2017/2018 1 Plan Context Definition Market Cloud service models Cloud deployments models Key drivers to adopting the Cloud Barriers

More information

Deploying Application and OS Virtualization Together: Citrix and Virtuozzo

Deploying Application and OS Virtualization Together: Citrix and Virtuozzo White Paper Deploying Application and OS Virtualization Together: Citrix and Virtuozzo www.swsoft.com Version 1.0 Table of Contents The Virtualization Continuum: Deploying Virtualization Together... 3

More information

Where are you with your Cloud or Clouds? Simon Kaye Dr Cloud

Where are you with your Cloud or Clouds? Simon Kaye Dr Cloud Where are you with your Cloud or Clouds? Simon Kaye Dr Cloud 15 th September, 2011 2 3 Cloud Computing definitions are varying, but a common set of attributes can be identified 4 Organizations need to

More information

Cloud Computing Concepts, Models, and Terminology

Cloud Computing Concepts, Models, and Terminology Cloud Computing Concepts, Models, and Terminology Chapter 1 Cloud Computing Advantages and Disadvantages https://www.youtube.com/watch?v=ojdnoyiqeju Topics Cloud Service Models Cloud Delivery Models and

More information

CND Exam Blueprint v2.0

CND Exam Blueprint v2.0 EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding

More information

Security Architecture Models for the Cloud

Security Architecture Models for the Cloud White Paper Security Architecture Models for the Cloud Introduction While Hardware Security Module (HSM) customers traditionally have their own infrastructures and data centers and run HSMs on premises,

More information

25 Best Practice Tips for architecting Amazon VPC

25 Best Practice Tips for architecting Amazon VPC 25 Best Practice Tips for architecting Amazon VPC 25 Best Practice Tips for architecting Amazon VPC Amazon VPC is one of the most important feature introduced by AWS. We have been using AWS from 2008 and

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

Backup and Restore Strategies

Backup and Restore Strategies Backup and Restore Strategies WHITE PAPER How to identify the appropriate life insurance for your data At home, you safeguard against any incident to protect your family, your life, your property everything

More information

Benefits of Multi-Node Scale-out Clusters running NetApp Clustered Data ONTAP. Silverton Consulting, Inc. StorInt Briefing

Benefits of Multi-Node Scale-out Clusters running NetApp Clustered Data ONTAP. Silverton Consulting, Inc. StorInt Briefing Benefits of Multi-Node Scale-out Clusters running NetApp Clustered Data ONTAP Silverton Consulting, Inc. StorInt Briefing BENEFITS OF MULTI- NODE SCALE- OUT CLUSTERS RUNNING NETAPP CDOT PAGE 2 OF 7 Introduction

More information

BACKUP AND RECOVERY OF A HIGHLY VIRTUALIZED ENVIRONMENT

BACKUP AND RECOVERY OF A HIGHLY VIRTUALIZED ENVIRONMENT BACKUP AND RECOVERY OF A HIGHLY VIRTUALIZED ENVIRONMENT Featuring Industry Perspectives from The Enterprise Strategy Group (ESG) 24 January 2013 Jason Buffington (@Jbuff), ESG Senior Analyst, Data Protection

More information

Symantec Security Monitoring Services

Symantec Security Monitoring Services 24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts

More information

February 2017 Version: 1.0. Xerox App Gallery 4.0 Information Assurance Disclosure

February 2017 Version: 1.0. Xerox App Gallery 4.0 Information Assurance Disclosure February 2017 Version: 1.0 Xerox App Gallery 4.0 Information Assurance Disclosure 2017 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey and WorkCentre are trademarks of

More information

EBOOK. NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD

EBOOK. NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD EBOOK NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD NetApp ONTAP Cloud for Microsoft Azure The ONTAP Cloud Advantage 3 Enterprise-Class Data Management 5 How ONTAP Cloud

More information

Security Solutions. Overview. Business Needs

Security Solutions. Overview. Business Needs Security Solutions Overview Information security is not a one time event. The dynamic nature of computer networks mandates that examining and ensuring information security be a constant and vigilant effort.

More information

ACS 3907 E-Commerce. E-Commerce Design Architecture Part 1. Client/Server Architecture. Instructor: Kerry Augustine February 7 th 2019

ACS 3907 E-Commerce. E-Commerce Design Architecture Part 1. Client/Server Architecture. Instructor: Kerry Augustine February 7 th 2019 ACS 3907 E-Commerce Instructor: Kerry Augustine February 7 th 2019 2014 Pearson Education, Inc. Publishing as Prentice Hall 1 E-Commerce Design Architecture Part 1 Client/server architecture Two-tier vs.

More information

Transforming IT: From Silos To Services

Transforming IT: From Silos To Services Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New

More information

Back To The Future - VMware Product Directions. Andre Kemp Sr. Product Marketing Manager Asia - Pacific

Back To The Future - VMware Product Directions. Andre Kemp Sr. Product Marketing Manager Asia - Pacific Back To The Future - VMware Product Directions Andre Kemp Sr. Product Marketing Manager Asia - Pacific Disclaimer This session contains product features that are currently under development. This session/overview

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

IZO MANAGED CLOUD FOR AZURE

IZO MANAGED CLOUD FOR AZURE USE CASE - HYBRID CLOUD IZO MANAGED CLOUD FOR AZURE 1. LET S UNDERSTAND THE MARKET DYNAMICS In this era of digitisation, the cloud debate is over-enterprises have already moved a sizeable portion of their

More information

Real-time Protection for Microsoft Hyper-V

Real-time Protection for Microsoft Hyper-V Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to

More information

Deploy. Your step-by-step guide to successfully deploy an app with FileMaker Platform

Deploy. Your step-by-step guide to successfully deploy an app with FileMaker Platform Deploy Your step-by-step guide to successfully deploy an app with FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements, and

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager Course 20703-1A 5 Days Instructor-led, Hands on Course Information This five-day course describes how to use Configuration Manager and its associated site

More information

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER Course Code: 20703-1a Duration 5 days Introduction This five-day course describes how to use Configuration and its associated site systems to efficiently

More information

A Cloud WHERE PHYSICAL ARE TOGETHER AT LAST

A Cloud WHERE PHYSICAL ARE TOGETHER AT LAST A Cloud WHERE PHYSICAL AND VIRTUAL STORAGE ARE TOGETHER AT LAST Not all Cloud solutions are the same so how do you know which one is right for your business now and in the future? NTT Communications ICT

More information

Introduction to Oracle

Introduction to Oracle Class Note: Chapter 1 Introduction to Oracle (Updated May 10, 2016) [The class note is the typical material I would prepare for my face-to-face class. Since this is an Internet based class, I am sharing

More information

Cloud Computing An IT Paradigm Changer

Cloud Computing An IT Paradigm Changer Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reached breaking point App

More information

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW Veritas Backup Exec Powerful, flexible and reliable data protection designed for cloud-ready organizations. OVERVIEW Veritas Backup Exec is the backup solution without barriers, delivered your way. You

More information

DHIS2 Hosting Proposal

DHIS2 Hosting Proposal www.knowarth.com 1 Table of Contents 2 Cloud Consulting & Hosting... 3 2.1 Cloud Consulting & Hosting includes... 3 2.2 DHIS2 Hosting features... 4 2.2.1 Best-practice installation... 4 2.2.2 Uptime and

More information

Technology Outsourcing with Cloud Computing. Understanding the Opportunity

Technology Outsourcing with Cloud Computing. Understanding the Opportunity Technology Outsourcing with Cloud Computing Understanding the Opportunity Cloud Basics Cloud Benefits Summary Q&A Agenda CLOUD BASICS What is the cloud? Software As a Service Infrastructure As a Service

More information

Storage Made Easy. Mirantis

Storage Made Easy. Mirantis Storage Made Easy Providing an Enterprise File Fabric for Mirantis STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR MIRANTIS The File Fabric is a comprehensive multi-cloud data security solution built on top

More information

CLOUD COMPUTING IT0530. G.JEYA BHARATHI Asst.Prof.(O.G) Department of IT SRM University

CLOUD COMPUTING IT0530. G.JEYA BHARATHI Asst.Prof.(O.G) Department of IT SRM University CLOUD COMPUTING IT0530 G.JEYA BHARATHI Asst.Prof.(O.G) Department of IT SRM University What is virtualization? Virtualization is way to run multiple operating systems and user applications on the same

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager 20703-1; 5 Days; Instructor-led Course Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently

More information

THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION CONTENTS EXECUTIVE SUMMARY HANDLING CONFLICTING RESPONSIBILITIES WITH CARE DIGITAL TRANSFORMATION CREATES NEW

More information

How unified backup and cloud enable your digital transformation success

How unified backup and cloud enable your digital transformation success Key Considerations for Data Protection and Cloud on Your Digital Journey How unified backup and cloud enable your digital transformation success An IDC InfoBrief, Sponsored by February 2018 1 Digital Transformation

More information

Software Defined Storage for the Evolving Data Center

Software Defined Storage for the Evolving Data Center Software Defined Storage for the Evolving Data Center Petter Sveum Information Availability Solution Lead EMEA Technology Practice ATTENTION Forward-looking Statements: Any forward-looking indication of

More information

Windows Server The operating system

Windows Server The operating system Windows Server 2019 The operating system that bridges onpremises and cloud By maximizing technology and infrastructure investments with Windows Server 2019, forward-facing businesses can capture direct

More information

10 Cloud Myths Demystified

10 Cloud Myths Demystified 10 Cloud s Demystified The Realities for Digital Healthcare Transformation It s a challenging time for the healthcare industry, with changing regulations, consolidation and the consumerization of healthcare

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE

HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HIFIS Development Team May 16, 2014 Contents INTRODUCTION... 2 HIFIS 4 SYSTEM DESIGN... 3

More information

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed. Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple

More information