Unit 1.3 - Understand business IT systems

Descripción

Unit 1 LO3 of CTEC IT
Joe O'Dwyer
Fichas por Joe O'Dwyer, actualizado hace más de 1 año
Joe O'Dwyer
Creado por Joe O'Dwyer hace casi 7 años
9
0

Resumen del Recurso

Pregunta Respuesta
What is a file server? A file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files.
Why is the use of a file server convenient? It allows users to share information over a network without having to physically transfer files via external storage devices.
What is a print server? A print server is software application, network device or computer that manages print requests and makes printer queue status information available to end users and network administrators. They are used in both large enterprises and small or home office networks.
What is an application server? An application server is a server program in a computer in a distributed network that provides the business logic for an application program. The application server is frequently viewed as part of a three-tier application, consisting of a GUI served, an application and a database and transaction server.
What is a database server? A database server is a back-end system of a database application using client-server architecture.
What tasks will a database server perform? Data analysis, storage, data manipulation, archiving and other non-user specific tasks.
What is a web server? A web server is a program that uses HTTP to serve the files that form web pages to users, in response to their requests, which are forwarded by their computers' HTTP clients. Dedicated computers and appliances may be referred to as web servers as well.
What is a mail server? A mail server is an application that receives incoming email from local users and remote senders and forwarss outgoing email for delivery. Essentially, a mail server is a 'virtual post office'. A computer dedicated to running such applications is also called a mail server.
What is a hypervisor? A hypervisor is a function which isolates operating systems and applications from the underlying computer hardware.
What does a hypervisor allow to happen? The abstraction caused by a hypervisor allows the underlying host machine hardware to independently operate one or more virtual machines as guests, allowing multiple VMs to effectively share the system's physical compute resources, such as processor cycles, memory space, network bandwidth and so on.
Define Virtualisation. Virtualisation is the process of using software to create a simulated machine, such as a server or a client. Virtualisation also expands out into networks and storage.
What is server virtualisation? Splitting a single physical server into multiple virtual servers. This allows for a single server to run many applications.
Benefits and Limitations of Server Virtualisation? Pros: Power supplied to one server is sufficient to run multiple servers. Less physical storage space is required. Virtual servers have the potential to save a lot of money. Cons: Require a lot of resources to be shared (processing power, memory), which could limit the capabilities of each individual server.
What is Client Virtualisation? Client Virtualisation is the simulation of a user's desktop experience, but separates the desktop from the hardware, OS and applications. The simulated client desktop, or virtual machine, runs on a physical host server that's running virtualisation software.
What is storage virtualisation? The pooling of physical storage from multiple network storage devices into what appears to be a single storage device that is managed from a central console.
Pros and Cons of Storage Virtualisation? Pros: Can solve many infrastructure issues and lower equipment costs. Cons: Any transition from non-virtualised to virtualised systems is never smooth. IT administrators never know whether it should go in the hosts, networks or arrays.
What is Cloud Computing? Not virtualisation. Uses existing technology to deliver services (security, storage, data manipulation) to users over a network. It is used like a utility. Size or range of usage can be increased through payment.
What is Hybrid Virtualisation? Mixture of private, public cloud and locally owned services. As its activities and data requirements change, the organisation can adjust its usage more efficiently and effectively.
Describe a peer-to-peer network? Each computer shares information equally and all play equal roles. Suitable for small offices for access rights on files/folders.
Pros and Cons of a Peer-to-Peer network? Pros: No need for network OS, easy setup. Don't need expensive server, individual workstations used to access files. No need for specialist staff, users set own permissions/access rights. Cons: Slower and more virus prone. No central backup. Files/folders not centrally organised into shared area, reliant on host connections being maintained.
Describe a Client-Server network? The server is the main computer which handles all requests, storage which can be accessed by clients, depending on permissions.
Pros and Cons of a Client-Server network? Pros: Files stored in central location. Peripherals connected are controlled centrally. Backups/security is controlled centrally. Shared data can be accessed, also centrally controlled. Cons: Specialist network OS required. Server is expensive. Specialist staff are also required (e.g. Network Manager). Any part of network fails, a lot of disruption can occur.
Desribe the ring topology? All machines are connected to each other in a loop. Data passes from one computer to another as it passes around the ring until it reaches the specified destination. Passing signal is a token.
Pros and Cons of ring topology? Pros: Quick transmission. No dependance on single server. Cons: Bigger security problems. If 1 workstation or port goes down, entire network gets affected.
Describe the bus topology? The network has a single 'backbone' cable and all workstations and peripheral devices share this cable. Only one PC can transmit data at a time. There are terminators at either end of the main cable to prevent the signal from transmitting back and forth down the cable.
Pros and Cons of the bus topology? Pros: Easy installation. Easy addition of clients. Cons: Low security because all computers receive sent signal from source. High dependency on main cable.
Describe the star topology? Each workstation has its own individual cable that connects to the central switch or hub. The switch will redirect data packets to and from devices. Also fewer security problems due to central control.
Pros and cons of the star topology? Pros: Easy expansion. Network stays active if one line breaks. Cons: Huge dependence on central server. Requires more cable length than bus topology.
Describe the mesh topology? Every node in the network is connected either directly or indirectly to all other nodes. An example of a mesh network is the internet.
Pros and Cons of the mesh topology? Pros: High scalability. Robustness. Cons: Complexity. Latency. Power consumption.
Describe a default gateway? Serves as an access point or IP router that a networked computer uses to send information to a computer in another network or the internet. Default simply means that this gateway is used by default, unless an application specifies another gateway.
What is an IP address? Every device connected to the Internet is assigned an IP address, which is a unique 32-bit reference number. Even though they are stored as 32-bit numbers, they are displayed as 4 decimal numbers separated by dots for our convenience. The numbers represent geographical location and the actual individual network to which the device is connected.
Describe a subnet mask? This is used to determine what subnet an IP address belongs to. It divides the IP address to identify the network address and a particular host on the network.
What is a LAN? Local Area Network. A LAN is a collection of computers and peripherals that are connected within a small geographical distance. Users on a LAN will have to log on with a specific username and password which determines access rights.
LANs will typically use what topology? A ring topology, in which passing signals are a token (travel in one direction only).
What is the alternative to a LAN using a ring topology? An ethernet network LAN. This allows messages to travel in either direction, but only one at a time.
How does a network recover from data packet collision? Carrier Sense Multiple Access with Collision Detection. During this process, each device will calculate a 'back off' time which is the time that a specific device will wait before attempting to resend the message. Each device performs its own calculations so only one will be ready to transmit once the collision is cleared.
What is a WAN? Wide Area Network. A WAN is a collection of computers that typically span a radius of more than 1km. WANs typically cover countries and even continents. The main example of a WAN is the Internet, which covers the entire globe.
What is a MAN? Metropolitan Area Network. Network that interconnects users in a geographical area larger than that of a LAN but smaller than that of a WAN. A MAN can also be the interconnection of several LANs by bridging them with backbone lines.
Describe the voice connectivity method? Voice communication is typically sent via telephone lines or cellular/satellite technology. The most reliable method for this particular use is fixed cables between sender and receiver. If it isn't possible to be linked to a computer which is plugged into a PTSN (Public Switched Telephone Network), then cellular/satellite has to be used.
Describe the satellite connectivity method? Those in geostatic orbit are point-to-multipoint communication systems as they receive transmissions and rebroadcast them to receivers. These satellites can be moved to another location quite quickly if required. However, distances between the satellite and the ground can result in transmission delays.
What is MIS? Management Information System. Software/hardware used to aid managers in important decision-making.
Some characteristics of MIS? Collects and data and stores it within a large database. Mass amounts of data can be processed by the system in order for reports to be produced. These reports are presented in a format which is convenient for the manager to read quickly but provide enough information for them to make a decision.
What is the aim of MIS? Make the business more efficient, given that the tasks this performs can save the manager a lot of time, which can be allocated for other, more important things.
Pros of MIS? - Provides evidence of organisational status. - Shows areas of improvement. - Shows areas of risk. - Shows personal/group responsibility for success or failure.
Cons of MIS? - High cost of creation. - Complex installation. - Poor/inflexible design which does not meet needs of organisation. - Risk of out of date, incomplete or inaccurate data. - End users may have lack of training and not know how to use it properly. - Does not make decisions, only provides the relevant information.
What is CRM? Customer relations management. Process that is responsible for how a business interacts with its customers. This is a vital part of any business so it needs serious consideration at all times.
What will CRM do? Analyse previous customer interactions to aid with identifying improvements that can be made. It will hold customer personal information, as well as logs of communication with clients. Will also identify trends and aid with forecasting so that the business can anticipate a certain situation and use it to their advantage.
Pros of CRM? - Can centrally hold essential customer information. - Can also store leads for new customers/new services. - Marketers can use it to aid their understanding of current sales, prospective sales and forecasting future trends.
Cons of CRM? - Can still experience software issues, such as limits on data storage sizes or emails. - Integration difficulties with organisational systems. - Lack of training will lead to incorrect use (poor data entry, incorrect data). - Some sales staff will believe that face to face meetings allows them to have a better understanding of clients rather than digital information.
What are SOPs? Standard Operating Procedures. Detailed step by step guides to how functions should be carried out within an organisation.
Why should SOPs be created for business systems? To ensure data and resulting information remains accurate and useful.
Pros of SOP? - They will ensure accuracy and consistency is maintained. - New employees can be trained quicker with use of an SOP. - SOP can ensure tasks can be completed even if a member of staff is absent.
Cons of SOP? - Imposes restrictions which result in inflexible practice and lack of innovation. - Results in too much time being spent of admin rather than doing job. - SOPs must be updated regularly to reflect new regulatory requirements. - Lack of version control. If updates to SOP aren't recorded, individuals could be working to different versions, which will result in big confusion.
Describe a helpdesk? Knowledgeable individuals need to be on hand to solve any technical problems within any large, complex systems. Simple problems will be solved by the help desk providing instructions to the user, but complex problems will result in a technician visiting the location and resolving it/providing a temporary fix.
Pros of a helpdesk? - Centralised place for employees to go if they need support. - Staff on helpdesk are trained on a common set of procedures, which provides a systematic approach. - IT helpdesk will generate a log of problems encountered which can be used as references in case they arise again.
Cons of a helpdesk? - Cost of setting up in-house helpdesk with hardware, software, staffing. - Cost of buying helpdesk services from a third party. - Issues with availability of the helpdesk, e.g. need for 24 hour call out. - Loss of service through breakdown of communication systems.
Mostrar resumen completo Ocultar resumen completo

Similar

Common Technology Terms
Julio Aldine Branch-HCPL
Project Communications Management
farzanajeffri
Network Protocols
Shannon Anderson-Rush
Abstraction
Shannon Anderson-Rush
Computing
Kwame Oteng-Adusei
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Introduction to the Internet
Shannon Anderson-Rush
Construcción de software
CRHISTIAN SUAREZ
Historical Development of Computer Languages
Shannon Anderson-Rush
Useful String Methods
Shannon Anderson-Rush
Web Designing & Development Full Tutorial
Nandkishor Dhekane