Information Management Unit 3
Information Management Unit 3
Information Technology (IT) infrastructure is the combination of hardware, software, networks, and
other resources necessary for the operation, management, and delivery of IT services within an
organization. It forms the foundation upon which an organization's digital capabilities and operations
are built. The IT infrastructure enables the processing, storage, transmission, and retrieval of data
and information critical for business operations and decision-making.
Hardware Platforms
Software Platforms
• Operating System (OS): Manages hardware resources, provides user interface. Examples:
Windows, macOS, Linux.
• System Software: Supports computer operation. Examples: device drivers, antivirus software.
• Application Software: Performs specific tasks for users. Examples: word processors, web
browsers.
• Development Tools: Aids software creation and maintenance. Examples: IDEs, compilers.
An operating system (OS) platform is a software program that acts as an interface between the user
and the computer hardware. It manages the computer's resources and provides common services
for application software.
• Microsoft Windows: Popular OS for PCs, user-friendly GUI, wide software variety.
• macOS: Apple's sleek OS, easy to use, stable interface.
• Linux: Free, open-source OS, flexible and secure, customizable options.
• Android: Top OS for mobile devices, open-source, vast app selection.
• iOS: Apple's closed-source OS for iPhones and iPads, known for stability and security.
Networking Platforms
• Routers: Devices that direct data between computer networks, choosing the best path for
efficient communication.
• Switches: Connect multiple devices within a local network, managing data flow based on MAC
addresses for better efficiency.
• Firewalls: Security devices that monitor and control network traffic, safeguarding against
unauthorized access and malicious threats.
• Network Protocols: Rules governing device communication on a network, including TCP/IP,
UDP, HTTP, and FTP.
• Wireless Access Points (WAPs): Enable wireless devices to connect to a wired network,
providing Wi-Fi access within a specific area.
• Virtual Private Networks (VPNs): Secure connections over public networks, encrypting data
for privacy and security.
• Network Management Software: Tools to monitor, analyze, and manage network resources
and performance.
• Load Balancers: Distribute incoming network traffic across servers to ensure optimal resource
use and prevent overload.
A Database Management System (DBMS) is a software system that enables users to define, create,
maintain, and control access to databases. These systems manage the storage, retrieval, and
organization of data in a structured format.
1. Data Definition Language (DDL): It's like giving instructions to build the framework of your
database. You tell the system what tables to create, how they're related, and any rules they
need to follow.
2. Data Manipulation Language (DML): This is about playing with the data inside your database.
You can ask questions, add new stuff, change what's there, or remove things you don't need
anymore.
3. Query Optimization: Think of it like organizing a messy closet. The system figures out the best
way to find things quickly in your database. It uses tricks to make searching faster, like keeping
a list of what's where.
4. Transaction Management: Imagine doing a bunch of chores, like laundry and dishes, as one
big task. The system makes sure that if one part fails, everything gets undone, so you're not
left with half-clean laundry and dishes.
5. Concurrency Control: It's like making sure everyone gets their turn on the playground. The
system keeps track of who's using what in the database so nobody messes things up by
accident.
6. Data Security and Authorization: This is about locking doors and giving keys to the right
people. Only those allowed can get in, and you can even set rules about what they're allowed
to do once they're inside.
7. Backup and Recovery: Picture making a copy of your important files regularly. If something
bad happens, like your computer crashing, you can get back to where you were before
without losing everything.
8. Database Monitoring and Administration: It's like having a caretaker who keeps an eye on
your house. They check for leaks, fix broken things, and make sure everything's running
smoothly.
9. Scalability and Replication: This is about being able to handle more people using your
database without it slowing down. It's like adding more lanes to a road when traffic gets
heavy.
10. Data Integrity and Constraints: It's like setting rules for a game. You decide what's allowed
and what's not in your database, so it stays organized and correct.
Non-relational databases
Non-relational databases, also known as NoSQL (Not Only SQL) databases, are a category of database
management systems that do not adhere to the traditional relational database model based on
tables and SQL (Structured Query Language). Instead, they provide a flexible schema design and are
suitable for storing and managing large volumes of unstructured or semi-structured data.
Cloud Databases
Cloud databases are databases that are hosted on a cloud computing platform, typically provided as
a service. These databases offer various advantages over traditional on-premises databases,
including scalability, flexibility, accessibility, and cost-effectiveness. Here are some key aspects of
cloud databases:
1. Scalability: Cloud databases can easily scale up or down based on demand. This means you
can increase or decrease resources such as storage, computing power, and memory without
experiencing downtime.
2. Accessibility: Cloud databases can be accessed from anywhere with an internet connection.
This accessibility allows for remote work, collaboration, and data analysis from different
locations.
3. Cost-effectiveness: Cloud databases often operate on a pay-as-you-go pricing model,
allowing organizations to pay only for the resources they use. This can result in cost savings
compared to traditional databases, where organizations need to invest in hardware,
maintenance, and upgrades.
4. Managed Services: Many cloud database providers offer managed services, handling routine
tasks such as backups, security, and maintenance. This frees up time and resources for
organizations to focus on their core business objectives.
5. High Availability and Disaster Recovery: Cloud databases typically offer built-in features for
high availability and disaster recovery. Data is often replicated across multiple geographic
regions to ensure reliability and minimize the risk of data loss.
6. Security: Cloud database providers invest heavily in security measures to protect data from
unauthorized access, breaches, and other threats. This includes encryption, access controls,
and compliance certifications.
7. Integration: Cloud databases can easily integrate with other cloud services and applications,
enabling seamless data exchange and interoperability within an organization's cloud
ecosystem.
Blockchain
Blockchain is a decentralized, distributed ledger technology that forms the foundation of
cryptocurrencies like Bitcoin, as well as various other applications beyond digital currencies. It
operates as a continuously growing list of records, called blocks, which are linked and secured using
cryptography.
Key Elements
1. Decentralization: Unlike traditional centralized systems where a single entity controls the
data, blockchain operates on a decentralized network of nodes, with each node having a copy
of the entire blockchain. This decentralization ensures transparency, security, and
immutability of the data.
2. Security: Cryptography is used to secure the transactions and ensure the integrity of the data.
Each block contains a cryptographic hash of the previous block, creating a chain that cannot
be altered without altering all subsequent blocks, thus providing a high level of security
against tampering.
5. Use Cases: Beyond cryptocurrencies, blockchain technology has various applications across
industries such as supply chain management, healthcare, finance, real estate, and more. It
enables transparency, traceability, and efficiency in processes where trust and security are
crucial.
6. Public vs. Private Blockchains: Public blockchains are open to anyone to participate and
validate transactions, while private or permissioned blockchains restrict access and
participation to authorized entities. The choice between public and private blockchains
depends on the specific use case and requirements.
Big data and business intelligence (BI) infrastructure are critical components for organizations
looking to extract value from their data assets. These infrastructures encompass hardware, software,
and processes designed to collect, store, manage, and analyze large volumes of data efficiently.
Here's an overview of key components and considerations:
1. Data Sources: Identify all potential data sources within and outside the organization,
including structured (e.g., databases), semi-structured (e.g., logs, XML), and unstructured
(e.g., documents, social media).
2. Data Ingestion: Implement mechanisms to collect and ingest data from diverse sources into
the infrastructure. This may involve batch processing, real-time streaming, or a hybrid
approach.
3. Data Storage: Choose appropriate storage solutions based on the volume, velocity, and
variety of data. Options include data lakes (e.g., Hadoop Distributed File System - HDFS), data
warehouses (e.g., Amazon Redshift, Google BigQuery), and NoSQL databases (e.g., MongoDB,
Cassandra).
4. Data Processing and Transformation: Utilize technologies for data processing and
transformation to cleanse, enrich, and structure data for analysis. This may involve ETL
(Extract, Transform, Load) tools, data pipelines, and stream processing frameworks (e.g.,
Apache Spark, Apache Flink).
5. Data Governance and Security: Establish policies and procedures for data governance,
including data quality, metadata management, access control, and compliance with
regulations (e.g., GDPR, CCPA). Implement security measures to protect data from
unauthorized access, breaches, and cyber threats.
6. Analytics and Business Intelligence Tools: Deploy BI and analytics tools to enable users to
explore, visualize, and derive insights from data. This includes dashboarding platforms (e.g.,
Tableau, Power BI), reporting tools, ad-hoc query tools, and advanced analytics (e.g., machine
learning, predictive analytics).
7. Scalability and Performance: Design the infrastructure for scalability and performance to
accommodate growing data volumes and user demands. This may involve distributed
computing architectures, parallel processing, and optimization techniques.
8. Cloud vs. On-Premises: Consider whether to build the infrastructure on-premises, in the
cloud, or a hybrid approach. Cloud offerings provide scalability, flexibility, and cost-
effectiveness but require careful consideration of data sovereignty, compliance, and vendor
lock-in.
9. Monitoring and Management: Implement monitoring and management tools to track system
health, performance metrics, and usage patterns. This includes logging, alerting, capacity
planning, and resource optimization.
10. Collaboration and Skillsets: Foster collaboration between data engineers, data scientists,
analysts, and business stakeholders to ensure alignment between technical capabilities and
business objectives. Invest in training and development to build expertise in big data
technologies and analytics methodologies.
Computer Network
A computer network is a collection of interconnected devices that can communicate with each other
to share resources and information. Networks can vary in size and complexity, ranging from small
local area networks (LANs) connecting a few devices within a single building to vast global networks
like the internet connecting millions of devices worldwide. Here are some common types of
computer networks:
1. Local Area Network (LAN): A LAN typically covers a small geographic area, such as a single
building or a campus. Devices within a LAN can communicate directly with each other at high
speeds.
2. Wide Area Network (WAN): WANs cover larger geographical areas and often connect
multiple LANs. WANs can be established using various technologies, including leased lines,
satellite links, or public networks like the internet.
3. Wireless LAN (WLAN): WLANs use wireless technology, such as Wi-Fi, to connect devices
within a limited area, eliminating the need for physical cables. They are commonly found in
homes, offices, and public spaces.
4. Metropolitan Area Network (MAN): MANs cover larger geographical areas than LANs but
smaller areas than WANs, such as a city or metropolitan area. They are often used by service
providers to connect multiple LANs across a city.
5. Personal Area Network (PAN): A PAN is the smallest type of network and typically connects
devices owned by a single person, such as smartphones, tablets, and personal computers.
Bluetooth is a common technology used for PAN communication.
6. Campus Area Network (CAN): CANs interconnect multiple LANs within a university campus,
corporate campus, or any other large organizational campus.
7. Storage Area Network (SAN): SANs are specialized networks designed to provide high-speed
access to storage devices, such as disk arrays and tape libraries, for servers. They are
commonly used in data centers and enterprise environments.
8. Virtual Private Network (VPN): VPNs establish secure connections over a public network,
such as the internet, allowing users to access private networks remotely. They are commonly
used for remote work, accessing geographically restricted content, and securing
communications.
9. Peer-to-Peer Network (P2P): In a P2P network, devices communicate directly with each other
without the need for a centralized server. P2P networks are often used for file sharing,
distributed computing, and decentralized applications.
10. Client-Server Network: In this model, clients (such as computers or devices) request services
or resources from servers (dedicated computers or software), which fulfill those requests.
This is a common architecture for networks handling tasks like web browsing, email, and file
sharing.
Internet Addressing
Internet addressing refers to the system used to identify and locate devices, resources, and services
on the internet. This system is based on the Internet Protocol (IP), which assigns unique numerical
addresses to each device connected to a network. There are two main versions of IP currently in use:
IPv4 and IPv6.
1. IPv4 (Internet Protocol version 4): This is the older and more widely used version of IP
addressing. IPv4 addresses are 32-bit numerical values expressed in decimal format, typically
written as four sets of numbers separated by periods (e.g., 192.168.1.1). However, the pool
of available IPv4 addresses has become increasingly exhausted due to the growth of the
internet, leading to the adoption of IPv6.
2. IPv6 (Internet Protocol version 6): IPv6 was developed to address the limitations of IPv4 and
to accommodate the growing number of devices connected to the internet. IPv6 addresses
are 128-bit numerical values expressed in hexadecimal format, often written as eight groups
of four hexadecimal digits separated by colons (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334). IPv6 provides a significantly larger address
space than IPv4, allowing for trillions of unique addresses.
Architecture
Software architecture refers to the high-level structure of a software system. It encompasses various
elements such as components, modules, relationships, and principles governing their design and
evolution over time. Good software architecture facilitates the development of a system that meets
both functional and non-functional requirements effectively.
Web Services
Web services are software systems designed to allow interoperable communication between
different applications over a network. They enable various systems to exchange data and
functionality without needing to know the internal workings of each other. Web services follow
specific protocols and standards for communication, typically using HTTP for transport and XML or
JSON for data representation.
• GraphQL: A query language and runtime for executing queries against a data graph,
often used as an alternative to RESTful APIs.
Wireless Networking
Wireless networking involves the transmission of data over a wireless medium, typically using radio
frequencies. It allows devices to communicate with each other and access the internet without the
need for physical cables. Some key aspects of wireless networking include:
• Wi-Fi (Wireless Fidelity): A common wireless networking technology used for local
area networking (LAN) and internet access in homes, businesses, and public spaces.
• Cellular Networks: These networks enable mobile communication via cellular towers,
providing wider coverage areas than Wi-Fi or Bluetooth.
• 5G: The fifth generation of cellular network technology, offering faster speeds, lower
latency, and increased capacity compared to previous generations.
RFID is a technology that uses radio waves to identify and track objects or individuals wirelessly. It
consists of tags or labels containing electronic chips that store data, and RFID readers or scanners
that communicate with the tags. Key features of RFID technology include:
• Passive RFID: Tags do not have their own power source and rely on the energy
transmitted by RFID readers to operate.
• Active RFID: Tags have their own power source (such as a battery) and can transmit
data over longer distances.
Sensor Networks
Sensor networks comprise interconnected sensors capable of collecting and transmitting data about
their environment. These sensors can measure various parameters such as temperature, humidity,
pressure, motion, light, and more. Key aspects of sensor networks include:
• Internet of Things (IoT): Sensor networks are a crucial component of the IoT
ecosystem, where everyday objects are connected to the internet to gather and
exchange data.