0% found this document useful (0 votes)
20 views52 pages

Presentation - Infrastructure

The document outlines a presentation on IT Infrastructure by Professor Cheng Mich, covering 25 questions related to various aspects of IT, including cloud technology, data management, and network security. It details the importance of IT for business, benefits of operating systems, types of databases, and emerging technologies like AI and blockchain. The content serves as a comprehensive guide for understanding the fundamental components and technologies that support enterprise IT environments.

Uploaded by

Pov Sokchomrern
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views52 pages

Presentation - Infrastructure

The document outlines a presentation on IT Infrastructure by Professor Cheng Mich, covering 25 questions related to various aspects of IT, including cloud technology, data management, and network security. It details the importance of IT for business, benefits of operating systems, types of databases, and emerging technologies like AI and blockchain. The content serves as a comprehensive guide for understanding the fundamental components and technologies that support enterprise IT environments.

Uploaded by

Pov Sokchomrern
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 52

Presentation

mid-term 25 Questions.
Lecture by Professor: Cheng Mich
Subject: Infrastructure
1. Thy Sokvathanak

2. Pov Leapheng

3. Thorn Sakzanith
Members
4. Tep Pheara

5. Say Kong
6. Pich Chanthorn

Members 7. Mao Vibol

8. Heng Menghort
Content

• 1- What is IT Infrastructure?
• 2- Why we need IT for Business?
• 3- What are the benefi ts of OS for server and client to IT
infrastructure?
• 4- What is cloud technology?
• 5- What is a VM server?
• 6- What is network protocols and network standards?
• 7- Describe network communication concepts like Common
TCP/IP Protocols and Ports.
• 8- What is storage technology?
• 9- Describe type of cloud
• 10- Describe of RAID Level with advantage and
disadvantage
• 11- What is Methods for Data Recovery? 11-
• 12- What is Data Storage and Management?
• 13- What is DBMS?
• 14- Describe DBMS Work Related some technic.
• 15- Describe of Types of DBMS
• 16- Describe summary of IT Infrastructure | Design
and Planning (Page 64)
• 17- Describe Types of Authentication (Page 63-64)
• 18- Design Network with hardware bellow (Internet,
Router Firewall, Switch, Server, SAN, WAP, PC, ....)
for enterprise company.
• 19- What is Artifi cial Intelligence (AI) and Machine
• 20- What is Blockchain Technology?
• 21-What is 5G Technology?
• 22- What is Augmented Reality (AR) and Virtual
Reality (VR)?
• 23- what is Quantum Computing?
• 24- What is Wireless Network Security? (Page 73-74)
• 25- Describe of Wireless technologies and
standards. (Page 74-75)
1. What is IT Infrastructure ?
IT infrastructure refers to the composite hardware, software, network resources, and services
required for the existence, operation, and management of an enterprise IT environment. It
provides the foundation upon which all IT services and business applications run.
IT infrastructure typically includes:

1. Hardware: Servers, computers, data centers, switches, routers, and


other physical components

2. Software: Operating systems, applications, middleware,


management software

3. Network Infrastructure: Internet connectivity, firewalls, security


components

Services: Support, maintenance, and management of these


components
2. Why We Need IT
for Business?
Businesses need IT for several
critical reasons:

1. Operational efficiency:
Automates processes and reduces
manual work

2. Communication : Enables
internal and external
communication and collaboration

3. Data management: Allows


businesses to collect, store, and
analyze data for decision-making
Customer service: Improves customer experience through
digital touchpoints
Competitive advantage: Helps businesses innovate and
stay ahead of competitors
Global reach: Enables businesses to operate globally with
minimal physical presence
Cost reduction: Can reduce operational costs through
automation and optimization
3. Benefits of OS for Server and Client to IT Infrastructure

Server OS Benefits:

- Resource management: Efficiently allocates CPU, memory, and


storage

- Reliability: Provides stable environment for critical applications

- Security: Offers robust security features for protecting sensitive data

- Scalability: Can handle increased workloads and user demands

- Remote management: Allows administrators to manage servers from


anywhere
Client OS Benefits:

- User interface: Provides intuitive interface for end-users

- Application support: Runs various applications needed by users

- Device compatibility: Works with different hardware configurations

- Security: Protects end-user devices from threats

- Connectivity: Enables connection to networks and services


4. What is Cloud Technology?
Cloud technology refers to the delivery of computing services—including servers,
storage, databases, networking, software, and analytics—over the internet ("the
cloud").
Key characteristics include:
On-demand self-service: Users can provision resources without
human interaction

Broad network access: Services are available over the network


through standard mechanisms

Resource pooling: Provider's resources are pooled to serve multiple


consumers

Rapid elasticity: Resources can scale rapidly outward and inward


based on demand

Measured service: Usage can be monitored, controlled, and reported


for transparency
5. What is a VM Server?

A Virtual Machine (VM) server is a server that uses


virtualization technology to host multiple virtual
machines on a single physical server. Each VM is an
isolated software container with its own operating
system and applications.
Key aspects include:
- Hypervisor: Software that creates and runs virtual machines

- Resource allocation : VMs share the physical server's CPU, memory, and
storage

- Isolation: Each VM operates independently from others on the same


hardware

- Flexibility: VMs can be created, modified, or deleted as needed

- Efficiency: Allows better utilization of physical server resources

- Portability: VMs can be moved between physical servers with minimal


disruption

VM servers are fundamental to modern data centers and cloud computing


environments.
6- What are Network Protocols and
Network Standards?
Network Protocols: are rules and conventions for
communication between network devices. They
define how data is transmitted, received, and
interpreted across a network. Examples include
TCP/IP, HTTP, FTP, and DNS.
Network Standards: are guidelines developed by
organizations like IEEE, ISO, and IETF to ensure
interoperability and compatibility between different
networking devices and technologies. Examples
include Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11),
and IPv4/IPv6.
7. Describe network communication concepts like
Common TCP/IP Protocols and Ports.
TCP/IP Protocol Suite is the foundation of modern networking,
ensuring communication between devices over the internet.
Key protocols and their ports include:

HTTP (Hypertext Transfer Protocol): Port 80 (Used for web browsing)


HTTPS (Secure HTTP): Port 443 (Encrypted web communication)
FTP (File Transfer Protocol): Ports 20 & 21 (File transfers)
SMTP (Simple Mail Transfer Protocol): Port 25 (Email sending)
POP3 (Post Office Protocol v3): Port 110 (Email retrieval)
IMAP (Internet Message Access Protocol): Port 143 (Email
synchronization)
DNS (Domain Name System): Port 53 (Domain name resolution)
DHCP (Dynamic Host Configuration Protocol): Ports 67 & 68 (IP
address assignment)
Telnet: Port 23 (Remote command-line access)
SSH (Secure Shell): Port 22 (Secure remote access)
RDP (Remote Desktop Protocol): Port 3389 (Remote desktop
connection)
8. What is storage technology?

Storage technology refers to systems and devices


used for data storage, management, and retrieval. It
includes primary storage (RAM, cache), secondary
storage (HDDs, SSDs), and tertiary storage (tape
drives, optical discs). Emerging technologies include
cloud storage, NVMe SSDs, and blockchain-based
storage.
9- Describe type of cloud
Cloud computing is categorized into different types based on
deployment and service models:
By Deployment Model:
Public Cloud: Provided by third-party vendors like AWS, Google
Cloud, and Azure. Shared resources, scalable but less control.
Private Cloud: Dedicated to a single organization. More security
and control but expensive.
Hybrid Cloud: Combination of public and private cloud, balancing
scalability and security.
Community Cloud: Shared among organizations with similar needs
(e.g., government or healthcare).
By Service Model:
IaaS (Infrastructure as a Service): Virtualized computing resources
(e.g., AWS EC2, Google Compute Engine).
PaaS (Platform as a Service): Provides development environments
(e.g., Google App Engine, Microsoft Azure App Services).
SaaS (Software as a Service): Cloud-hosted applications (e.g.,
Google Drive, Dropbox, Office 365).
FaaS (Function as a Service): Serverless computing (e.g., AWS
Lambda, Azure Functions).
10. Describe of RAID Level with advantage and disadvantage

RAID (Redundant Array of Independent Disks) improves


performance, fault tolerance, or both. Common RAID levels:
Advantages Disadvantages

RAID 0 (Striping) Faster performance and full No data redundancy; if one


storage capacity utilization. disk fails, all data may be
lost.

RAID 1 (Mirroring) High data reliability and Only 50% of storage


easy recovery. capacity is usable, and
higher cost.

RAID 5 (Striping with Parity) Good balance between Slower write speeds and
storage efficiency and data longer rebuild times.
redundancy.
RAID 6 (Striping with Higher data protection than Even slower write speeds
Double Parity) RAID 5; can withstand two and higher cost.
disk failures.
Advantages Disadvantages

RAID 10 (1+0, Mirroring and High data reliability and High cost and only 50% of
Striping) improved performance. storage capacity is usable.

RAID 50 (5+0, Striping with Better performance than Complex to manage and
Parity and Striping) RAID 5 and good data higher cost.
redundancy.
RAID 60 (6+0, Striping with High data protection and Very high cost and complex
Double Parity and Striping) improved performance. to manage.
11. Methods for Data Recovery

Data recovery involves retrieving lost, corrupted, or inaccessible data


from storage devices.
Key methods include

- Backup Restoration: Recovering data from previously created backups

- File Recovery Software: Tools that scan storage media to recover deleted
files

- RAID Recovery: Techniques to recover data from failed RAID arrays

- Database Recovery Techniques: Transaction logs, checkpoints, and


rollback mechanisms

- Disk Imaging: Creating complete copies of drives to recover data

- Cold/Hot Backups: Different approaches to backing up database systems


12. Data Storage and Management

Data storage and management encompasses how data is stored,


organized, protected, and accessed.
Key aspects include

- Storage Technologies: HDDs, SSDs, tape, cloud storage, etc.


- Data Organization: File systems, databases, data warehouses
- Data Lifecycle Management: Policies for creating, using,
archiving, and deleting data
- Backup Strategies: Full, differential, and incremental backups
- Security Measures: Encryption, access controls
- Scalability Solutions: How to expand storage as needs grow
13. What is DBMS?

A Database Management System (DBMS) is software that


enables users to create, retrieve, update, and manage
data in a database. It serves as an interface between the
database and users or applications, providing tools to
organize, store, and access data efficiently.
15- Describe of Types of DBMS

There are several types of database management systems:


- Relational DBMS (RDBMS): Organizes data in tables with rows
and columns (MySQL, Oracle, SQL Server)
- NoSQL DBMS: Non-relational databases designed for
distributed data stores
Document stores (MongoDB)
- Object-Oriented DBMS: Stores data as objects (similar to
OOP)
- Hierarchical DBMS: Organizes data in a tree-like structure
- Network DBMS: Uses a network structure allowing many-to-
many relationships
- In-Memory DBMS: Stores data primarily in memory for faster
access
- NewSQL: Combines traditional RDBMS with NoSQL scalability
benefits
16. Describe summary of IT Infrastructure | Design and Planning

IT infrastructure design and planning involve structuring the


fundamental technology components that support business
operations. This includes hardware, software, networks, storage,
and security elements. The process ensures scalability, reliability,
and security while aligning with business objectives. Key factors
considered are network topology, data centers, cloud solutions,
virtualization, redundancy, and compliance with industry
standards.
17. Describe Types of Authentication

Authentication verifies the identity of users, devices, or systems


before granting access to resources.
The common types include

Password-based Authentication: Uses usernames and


passwords.
Multi-Factor Authentication (MFA): Combines two or
more authentication factors (e.g., password + OTP).
Biometric Authentication: Uses fingerprints, facial
recognition, or retina scans.
Token-based Authentication: Involves hardware or
software tokens for verification.
Certificate-based Authentication: Uses digital
certificates issued by a trusted Certificate Authority (CA).
Single Sign-On (SSO): Allows access to multiple
applications with a single login.
OAuth & OpenID Connect: Used for secure API and web
authentication.
19. What is Artificial Intelligence (AI) and Machine Learning (ML)

Artificial Intelligence (AI) refers to the simulation of human


intelligence in machines. AI enables systems to perform tasks
such as reasoning, problem-solving, and decision-making without
direct human intervention.
Machine Learning (ML) is a subset of AI that allows systems to
learn from data and improve performance over time without being
explicitly programmed. It includes supervised, unsupervised, and
reinforcement learning techniques.
20. What is Blockchain Technology?

Blockchain is a decentralized and distributed ledger


technology that records transactions across multiple
nodes in a secure, immutable, and transparent manner. It
is the backbone of cryptocurrencies like Bitcoin but also
has applications in finance, supply chain, smart
contracts, and digital identity management.
Key features of blockchain include

Decentralization – No central authority controls the data.


Immutability – Once recorded, data cannot be altered.
Transparency – Transactions are visible to all
participants in the network.
Security – Uses cryptographic techniques to prevent
fraud and hacking.
21. What is 5G Technology?

5G is the fifth generation of mobile network


technology, offering faster speeds, lower latency,
and greater capacity than 4G. It supports
advanced applications like IoT, autonomous
vehicles, and smart cities by enabling more
devices to connect simultaneously with improved
reliability.
22. What is Augmented Reality (AR) and Virtual Reality (VR)?

Augmented Reality (AR): Overlays digital content


(e.g., images, videos) onto the real world,
enhancing the user's environment.
- Virtual Reality (VR): Creates a fully immersive
digital environment, isolating the user from the
physical world. It is used in gaming, training, and
simulations, often with VR headsets.
23. What is Quantum Computing?

Quantum computing uses quantum mechanics


principles (e.g., superposition, entanglement) to
perform complex computations faster than
classical computers. It has potential applications in
cryptography, drug discovery, and optimization but
is still in early development.
24. What is Wireless Network Security?

Wireless network security involves protecting


wireless networks from unauthorized access, data
breaches, and attacks. Key measures include
encryption (e.g., WPA3), strong passwords,
firewalls, and regular updates to prevent
vulnerabilities.
25. Describe Wireless Technologies and Standards.

Wireless technologies enable communication


without physical connections, using radio waves,
infrared, or satellites.
Key standards include:
- Wi-Fi (IEEE 802.11): For local area networking.
- Bluetooth: For short-range device communication.
- 4G/5G: For mobile broadband.
- Zigbee: For low-power IoT applications.
These standards ensure interoperability and efficient
wireless communication across devices.
THE END
THANKS YOU
very much for your kind attention
to my presentation.

You might also like