Introduction to Computer System Infrastructure.pptx
Introduction to Computer System Infrastructure.pptx
1. Hardware Elements
2. Software Components
3. Networking Components
VS.
Routers Switch
•Main Job: •Main Job:
Connects different networks, usually your Connects devices within the same network
home or office network to the internet. (like inside your home or office).
•How It Works: It directs traffic between •How It Works: A switch ensures that data goes
your network (local devices like computers, directly from one device to another in the same
phones, etc.) and external networks (like local area network (LAN). It doesn't deal with the
the internet). It makes sure that the data internet or external networks.
gets to the right place, even outside your
network.
Data Storage Systems
•Primary Storage: On-premise storage such as internal hard drives and SSDs.
•Secondary Storage: External storage options like external hard drives, USB drives, or
networked storage.
•Cloud Storage: Off-premise data storage accessible through the internet, providing
scalable and redundant data storage solutions.
•Backup and Recovery Systems: Solutions for creating copies of data to ensure
protection and availability in the event of a failure or disaster.
Types of Cloud Storage
•Personal Cloud Storage:
•Used by individuals for personal data storage and file sharing.
•Examples: Google Drive, Apple iCloud, Dropbox.
•Public Cloud Storage:
•A service offered by third-party providers where the infrastructure is
shared by multiple organizations or users.
•Examples: Amazon S3, Microsoft Azure, Google Cloud Storage.
Types of Cloud Storage
• Private Cloud Storage:
• Cloud storage infrastructure is dedicated to a single organization and can be
hosted on-premise or by a third-party provider.
• Use Case: Used by businesses that need high levels of control and security over
their data.
• Hybrid Cloud Storage:
• A mix of private and public cloud storage, allowing data to move between private
and public clouds based on needs.
• Use Case: Businesses that want to keep sensitive data private while using public
cloud for less sensitive data.
Benefits of Cloud Storage
•Cost-Effective: No need to invest in physical hardware or manage storage systems; you pay
only for what you use.
•Data Security: Providers often offer high-end encryption and security protocols to protect your
data.
•Disaster Recovery: Cloud storage provides backups in case of data loss due to hardware
failure or disasters.
•Collaboration: Teams can easily share and access files from multiple locations in real-time.
Types of Back-up and Recovery Solutions
•On-Premise Backup: Data is backed up to a local server or storage device, offering
quick recovery times but vulnerable to physical damage (e.g., fire, theft).
•Cloud Backup: Data is stored in remote, cloud-based servers, providing
accessibility, scalability, and protection against local disasters. Common providers
include AWS, Google Cloud, and Microsoft Azure.
•Hybrid Backup Solutions: Combines local backups with cloud backups for
redundancy and increased data protection.
Security
•Firewalls: Hardware or software barriers that block unauthorized access
to a network.
•Encryption: Methods to protect sensitive data by encoding it so only
authorized users can access it.
•Authentication and Authorization: Security protocols that ensure only
verified users can access the system and data.
Firewalls
A firewall is a security system that monitors and controls
incoming and outgoing network traffic based on predetermined
security rules. It acts as a barrier between a trusted internal
network (like a business or home network) and untrusted
external networks (like the internet), preventing unauthorized
access while allowing legitimate communication.
Types of Firewalls
Function: Inspects data packets, allowing or blocking them based on security rules.
Hardware Firewalls
Hardware firewalls are physical devices that are placed between a network (e.g., an
office network) and the internet. They provide robust security and are often used by
businesses.
•Cisco ASA (Adaptive Security Appliance): A widely used hardware firewall for enterprise
networks, offering advanced features like VPN, intrusion prevention, and threat protection.
•SonicWall TZ Series: Provides security for small to medium-sized businesses, offering features
like intrusion detection, malware blocking, and content filtering.
•Fortinet FortiGate: Known for its high-performance security capabilities, including intrusion
prevention, VPN, and advanced threat protection.
•Netgear ProSAFE: A cost-effective option for small businesses, offering features like secure VPN
access and web filtering.
•Palo Alto Networks PA Series: Provides next-generation firewall capabilities with integrated
security features such as deep packet inspection and application control.
Software Firewalls
Software firewalls are programs installed on individual devices (computers,
servers, etc.) to monitor and control network traffic for that specific machine.
•Windows Defender Firewall: Built into Windows operating systems, it monitors and controls
incoming and outgoing traffic based on security rules.
•ZoneAlarm: A popular personal firewall solution that provides basic protection against unauthorized
access and malware.
•Norton Firewall: Part of Norton’s security suite, it protects individual computers by filtering traffic
and blocking malware and unauthorized access.
•McAfee Personal Firewall: A feature in McAfee’s antivirus and security suite, offering protection
against hackers and other network threats.
•pfSense: An open-source firewall software that can be installed on a computer or server and used
to protect an entire network.
Software Firewall vs.
Hardware Firewall
•Hardware Firewalls: Typically protect entire networks, offering centralized
control for all devices on the network.
•Software Firewalls: Protect individual devices, providing localized security on
each machine.
Virtualization and Cloud Computing
•Virtualization: Technology that allows multiple virtual machines to
run on a single physical machine, increasing efficiency and
resource utilization.
•Cloud Computing: Delivery of computing services (storage,
networking, processing) over the internet, providing scalability and
cost-efficiency.
Types of Virtualization
Main Purpose: Increases efficiency by allowing multiple operating systems and
applications to run on one physical machine.
•Safety Systems
•Cargo Handling Systems
•Environmental Protection Systems
Navigation Systems
•GPS (Global Positioning System): Provides accurate location and
tracking.
•ECDIS (Electronic Chart Display and Information System): Digital
navigation tool for route planning and real-time positioning.
•Radar Systems: Detects nearby objects to ensure collision avoidance.
•Gyrocompass: Offers precise heading information for safe navigation.
Communication Systems
•VHF Radio: Used for short-range communication with other vessels and
coastal stations.
•Satellite Communication: Enables long-distance communication and
internet access.
•GMDSS (Global Maritime Distress and Safety System): Ensures
worldwide safety communication.
•AIS (Automatic Identification System): Shares ship position and
movement data with nearby ships and authorities.
Propulsion and Power Systems
•Main Engine: Propels the ship forward.
•Auxiliary Engines/Generators: Provides electricity for onboard
systems.
•Integrated Power Management: Controls power generation and
distribution for energy efficiency.
Safety and Emergency Systems
•Fire Detection and Suppression: Protects the ship from onboard
fires.
•Lifeboats and Liferafts: Emergency evacuation tools for crew and
passengers.
•Emergency Shutdown Systems (ESD): Halts operations during
emergencies to prevent damage or risk.
•Gas Detection Systems: Monitors for hazardous gases in sensitive
areas.
Cargo Handling Systems