0% found this document useful (0 votes)
4 views

Introduction to Computer System Infrastructure.pptx

The document provides an overview of Computer System Infrastructure, detailing its essential components including hardware, software, networking, data storage, security, and virtualization. It also discusses shipboard applications that manage vessel operations, safety, and efficiency, highlighting systems for navigation, communication, propulsion, safety, cargo handling, and environmental protection. Key concepts such as cloud storage, data processing, and security measures are also explored.

Uploaded by

jmCaneta
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Introduction to Computer System Infrastructure.pptx

The document provides an overview of Computer System Infrastructure, detailing its essential components including hardware, software, networking, data storage, security, and virtualization. It also discusses shipboard applications that manage vessel operations, safety, and efficiency, highlighting systems for navigation, communication, propulsion, safety, cargo handling, and environmental protection. Key concepts such as cloud storage, data processing, and security measures are also explored.

Uploaded by

jmCaneta
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Introduction to

Basic Computer System


Infrastructure
Prepared by: Gian S. Mahusay
Overview
What is Computer System Infrastructure?

• Computer System Infrastructure refers to the hardware


and software components required for a computer
system to function.
• Plays a crucial role in supporting various applications,
storage, and network operations.
Key Components of Computer
System Infrastructure:

1. Hardware Elements
2. Software Components
3. Networking Components

4. Data Storage Systems


5. Security
6. Virtualization and Cloud Computing
Hardware Elements
•Central Processing Unit (CPU): The "brain" of the computer, responsible for
executing instructions and processing data.
•Memory (RAM): Temporary storage used by the system to store data for
running applications.
•Storage Devices: Hard disk drives (HDD), solid-state drives (SSD), and
external/cloud storage systems for long-term data retention.
•Motherboard: Connects all components like CPU, memory, and storage,
providing pathways for communication.
•Peripherals: Input/output devices such as keyboards, monitors, mice, printers,
and scanners.
Software Infrastructure

•Operating System (OS): Software that manages hardware resources


and provides an interface for users to interact with the computer (e.g.,
Windows, Linux, macOS).
•Applications: Software programs designed to perform specific tasks
like word processing, spreadsheets, and web browsing.
•System Utilities: Programs that help maintain, configure, and
optimize the system (e.g., antivirus, disk management tools).
Networking Components
•Network Interface Card (NIC): Enables a computer to connect to a
network.
•Routers and Switches: Facilitate data flow between computers and other
network devices.
•Cabling and Wireless: Physical and wireless means of transmitting data
within and between systems.
•IP Addressing and Protocols: Ensure proper identification and
communication between networked devices.
Network Interface Card – (NIC)
Network Interface Card – (NIC)
Routers and Switches

VS.
Routers Switch
•Main Job: •Main Job:
Connects different networks, usually your Connects devices within the same network
home or office network to the internet. (like inside your home or office).
•How It Works: It directs traffic between •How It Works: A switch ensures that data goes
your network (local devices like computers, directly from one device to another in the same
phones, etc.) and external networks (like local area network (LAN). It doesn't deal with the
the internet). It makes sure that the data internet or external networks.
gets to the right place, even outside your
network.
Data Storage Systems
•Primary Storage: On-premise storage such as internal hard drives and SSDs.
•Secondary Storage: External storage options like external hard drives, USB drives, or
networked storage.
•Cloud Storage: Off-premise data storage accessible through the internet, providing
scalable and redundant data storage solutions.
•Backup and Recovery Systems: Solutions for creating copies of data to ensure
protection and availability in the event of a failure or disaster.
Types of Cloud Storage
•Personal Cloud Storage:
•Used by individuals for personal data storage and file sharing.
•Examples: Google Drive, Apple iCloud, Dropbox.
•Public Cloud Storage:
•A service offered by third-party providers where the infrastructure is
shared by multiple organizations or users.
•Examples: Amazon S3, Microsoft Azure, Google Cloud Storage.
Types of Cloud Storage
• Private Cloud Storage:
• Cloud storage infrastructure is dedicated to a single organization and can be
hosted on-premise or by a third-party provider.
• Use Case: Used by businesses that need high levels of control and security over
their data.
• Hybrid Cloud Storage:
• A mix of private and public cloud storage, allowing data to move between private
and public clouds based on needs.
• Use Case: Businesses that want to keep sensitive data private while using public
cloud for less sensitive data.
Benefits of Cloud Storage

•Cost-Effective: No need to invest in physical hardware or manage storage systems; you pay
only for what you use.
•Data Security: Providers often offer high-end encryption and security protocols to protect your
data.
•Disaster Recovery: Cloud storage provides backups in case of data loss due to hardware
failure or disasters.
•Collaboration: Teams can easily share and access files from multiple locations in real-time.
Types of Back-up and Recovery Solutions
•On-Premise Backup: Data is backed up to a local server or storage device, offering
quick recovery times but vulnerable to physical damage (e.g., fire, theft).
•Cloud Backup: Data is stored in remote, cloud-based servers, providing
accessibility, scalability, and protection against local disasters. Common providers
include AWS, Google Cloud, and Microsoft Azure.
•Hybrid Backup Solutions: Combines local backups with cloud backups for
redundancy and increased data protection.
Security
•Firewalls: Hardware or software barriers that block unauthorized access
to a network.
•Encryption: Methods to protect sensitive data by encoding it so only
authorized users can access it.
•Authentication and Authorization: Security protocols that ensure only
verified users can access the system and data.
Firewalls
A firewall is a security system that monitors and controls
incoming and outgoing network traffic based on predetermined
security rules. It acts as a barrier between a trusted internal
network (like a business or home network) and untrusted
external networks (like the internet), preventing unauthorized
access while allowing legitimate communication.
Types of Firewalls

•Hardware Firewalls: Physical devices installed between the


network and the internet.
•Software Firewalls: Programs installed on individual devices or
servers.

Function: Inspects data packets, allowing or blocking them based on security rules.
Hardware Firewalls
Hardware firewalls are physical devices that are placed between a network (e.g., an
office network) and the internet. They provide robust security and are often used by
businesses.

•Cisco ASA (Adaptive Security Appliance): A widely used hardware firewall for enterprise
networks, offering advanced features like VPN, intrusion prevention, and threat protection.
•SonicWall TZ Series: Provides security for small to medium-sized businesses, offering features
like intrusion detection, malware blocking, and content filtering.
•Fortinet FortiGate: Known for its high-performance security capabilities, including intrusion
prevention, VPN, and advanced threat protection.
•Netgear ProSAFE: A cost-effective option for small businesses, offering features like secure VPN
access and web filtering.
•Palo Alto Networks PA Series: Provides next-generation firewall capabilities with integrated
security features such as deep packet inspection and application control.
Software Firewalls
Software firewalls are programs installed on individual devices (computers,
servers, etc.) to monitor and control network traffic for that specific machine.

•Windows Defender Firewall: Built into Windows operating systems, it monitors and controls
incoming and outgoing traffic based on security rules.
•ZoneAlarm: A popular personal firewall solution that provides basic protection against unauthorized
access and malware.
•Norton Firewall: Part of Norton’s security suite, it protects individual computers by filtering traffic
and blocking malware and unauthorized access.
•McAfee Personal Firewall: A feature in McAfee’s antivirus and security suite, offering protection
against hackers and other network threats.
•pfSense: An open-source firewall software that can be installed on a computer or server and used
to protect an entire network.
Software Firewall vs.
Hardware Firewall
•Hardware Firewalls: Typically protect entire networks, offering centralized
control for all devices on the network.
•Software Firewalls: Protect individual devices, providing localized security on
each machine.
Virtualization and Cloud Computing
•Virtualization: Technology that allows multiple virtual machines to
run on a single physical machine, increasing efficiency and
resource utilization.
•Cloud Computing: Delivery of computing services (storage,
networking, processing) over the internet, providing scalability and
cost-efficiency.
Types of Virtualization
Main Purpose: Increases efficiency by allowing multiple operating systems and
applications to run on one physical machine.

•Server Virtualization: Divides a physical server into multiple virtual


servers.
•Storage Virtualization: Combines multiple storage devices into one
virtual storage system.
•Network Virtualization: Creates virtual networks that operate
independently on a single physical network.
Types of Cloud Computing
Main Purpose: Provides flexible, scalable, and cost-efficient access to computing
resources without the need for local infrastructure.

•Infrastructure as a Service (IaaS): Offers virtualized computing resources


like servers and storage.
•Platform as a Service (PaaS): Provides a platform for developers to build,
test, and deploy applications.
•Software as a Service (SaaS): Delivers software applications over the
internet (e.g., Google Workspace, Microsoft 365).
Data Processing
Mechanism
Understanding How Data is Transformed into Useful Information
What is data processing?
Data Processing Mechanism refers to the methods
and techniques used to collect, process, transform,
and manage raw data into meaningful information
that can be easily analyzed, interpreted, and utilized
for decision-making.
Stages of data processing
1. Data Collection: Gathering raw data from various sources (e.g., sensors,
databases, user input).
2. Data Preparation: Cleaning and organizing the data to remove errors, duplicates,
or inconsistencies.
3. Data Input: Entering the cleaned data into a processing system.
4. Data Processing: Transforming the data using algorithms or mathematical models
to generate useful outputs.
5. Data Output: The processed data is presented in a readable format, such as
charts, reports, or visualizations.
6. Data Storage: Storing the processed data securely for future reference or analysis.
Challenges in Data processing
● Data Quality:
Incomplete, inaccurate, or inconsistent data can lead to faulty insights. Cleaning and validating data is
essential but time-consuming.
● Handling Large Data Volumes:
Processing massive datasets (big data) can be difficult in terms of storage, speed, and computational
power.
● Data Integration:
Combining data from multiple sources, which may have different formats or structures, can be complex and
require sophisticated techniques.
● Data Privacy and Security:
Ensuring the data is secure and complies with privacy regulations (like GDPR) is crucial, especially when
handling sensitive or personal information.
● Real-Time Processing:
Processing data in real-time, such as in financial markets or IoT applications, demands high-speed
computing and low-latency systems.
● Scalability:
As data grows, processing systems need to scale efficiently to manage the increasing load without
performance degradation.
Shipboard
Applications
What are Shipboard Applications?

•Shipboard applications encompass the systems and technologies that


manage the operation, safety, and efficiency of vessels.
•Critical for navigation, communication, safety, and overall ship
management.
Types of Shipboard Applications:
•Navigation Systems
•Communication Systems
•Propulsion and Power Systems

•Safety Systems
•Cargo Handling Systems
•Environmental Protection Systems
Navigation Systems
•GPS (Global Positioning System): Provides accurate location and
tracking.
•ECDIS (Electronic Chart Display and Information System): Digital
navigation tool for route planning and real-time positioning.
•Radar Systems: Detects nearby objects to ensure collision avoidance.
•Gyrocompass: Offers precise heading information for safe navigation.
Communication Systems
•VHF Radio: Used for short-range communication with other vessels and
coastal stations.
•Satellite Communication: Enables long-distance communication and
internet access.
•GMDSS (Global Maritime Distress and Safety System): Ensures
worldwide safety communication.
•AIS (Automatic Identification System): Shares ship position and
movement data with nearby ships and authorities.
Propulsion and Power Systems
•Main Engine: Propels the ship forward.
•Auxiliary Engines/Generators: Provides electricity for onboard
systems.
•Integrated Power Management: Controls power generation and
distribution for energy efficiency.
Safety and Emergency Systems
•Fire Detection and Suppression: Protects the ship from onboard
fires.
•Lifeboats and Liferafts: Emergency evacuation tools for crew and
passengers.
•Emergency Shutdown Systems (ESD): Halts operations during
emergencies to prevent damage or risk.
•Gas Detection Systems: Monitors for hazardous gases in sensitive
areas.
Cargo Handling Systems

•Cranes and Derricks: Load and unload cargo efficiently.


•Ballast Water Management: Maintains ship stability while complying
with environmental regulations.
•Refrigeration Systems: Maintains the correct temperature for
perishable goods.
•Tank Monitoring Systems: Used on tankers to control liquid cargo
and ballast.
Environmental Protection Systems
•Ballast Water Treatment: Prevents the spread of invasive
species.
•Scrubbers: Reduces sulfur emissions from ship exhausts.
•Sewage Treatment: Safely treats and discharges wastewater.
•Oil Discharge Monitoring: Prevents the illegal release of oil into
the ocean.

You might also like