0% found this document useful (0 votes)
36 views48 pages

BUILD IN Infra 2015 Lo1-4

Internet infrastructure consists of data centers, networks, internet service providers, computer equipment, storage services, server applications, and security controls. It enables the transmission of data between hardware systems using protocols like TCP/IP and enables the functioning of the internet.

Uploaded by

biruk molla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views48 pages

BUILD IN Infra 2015 Lo1-4

Internet infrastructure consists of data centers, networks, internet service providers, computer equipment, storage services, server applications, and security controls. It enables the transmission of data between hardware systems using protocols like TCP/IP and enables the functioning of the internet.

Uploaded by

biruk molla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 48

Plan and design internet infrastructure

LO 1
What is Internet Infrastructure?
 All the hardware and services required to make a web page appear in your
browser.
 Internet infrastructure is a collective term for all hardware and software
systems that constitute essential components in the operation of the Internet.
1 Physical transmission lines ,such as wired, fiber optic and microwave
links.
2 along with routing equipment. Routers.
3 critical software services like the Domain Name System (DNS), Email,
website hosting. Server operating systems.
4 authentication and authorization.
5 storage systems, database servers are considered critical
Internet components
Internet Infrastructure consisting of
1.Data Centre
• A Data Centre is basically a specialist building that has the ability
to power (and cool) massive amounts of computer equipment.
• Typically a Data Centre would also have a very large amount of
network bandwidth to accommodate data transfer in and out of
it.
• A data center is a centralized repository computer facility used to
house computer systems and associated components, such as
telecommunications and storage systems. It generally includes
redundant or backup power supplies, redundant data
communications connections,
• environmental controls (e.g., air conditioning, fire extinguisher)
and security devices
2. Network
• Most important foundation block of Internet Infrastructure is
the Network. Without a
• network connection no data can pass between Data Centers,
over the Internet, and
3. Internet Service Provider (ISP)
• Choosing the proper bandwidth and network connection
(cable) is critical to the site's web presence.
• The router and the communications interface (cable, modem,
bridge or other device) andthe cables that connect them form
the bridge from the Web server to the outside world.
• Most of this equipment will be provided by the Internet
Service Provider, but as the site grows more equipment such
as switches, hubs, patch panels, wiring and firewalls will be
needed
4. Computer Equipment
• Computer equipment refers to any or all of the
many different parts of a computer, as well
asperipheral devices such as printers, external hard
drives and servers. Basically, anything relating to a
computer is considered computer equipment.
5. Storage Services
• Data Storage is a huge part of Internet
Infrastructure. All those emails accessible online, all
the web pages on your favorite web site, all those
photos on Face book … are all stored on a hard
6. Server Applications
• The final piece of underlying Internet Infrastructure is
the server applications themselves. In order for a web
application to be delivered from a server, that server
requires
1. Operating System (typically Windows or Linux),
2. Web Server application (like Apache or Microsoft IIS),
and
3. Database (such as MySQL, MS-SQL or Oracle).
7. Internet security
A Management Controls:
• Focus on security policies, planning, guidelines, and
standards that influence the selection of operational and
technical controls to protect the organization.
Security policy
• - A high-level management document that describes the
management’s expectation of the employees’ security
practice and responsibilities
• sets a clear direction and demonstrates the management’s
support for andcommitment to information security.
• Background checking of employees
• Training/awareness
• ¢ Physical and environmental protection
B Technical Controls:
• Involve the correct use of hardware and software security
capabilities in systems.
• This rangefrom simple to complex measures that work
together to secure critical and sensitive assets of the
organization.
• Login
• Encryption
• Authentication protocol
• Access control
• Firewall/proxy server
• Intrusion detection system
• etc
C Operational Controls:
• Address the correct implementation and use of
security policies and standards, ensuring
• consistency in security operations and correcting
identified operational deficiencies.
• Backup/Restore
• Monitor audit trials
• Account/privilege management
• Monitoring and adjusting firewall
• Media disposal
• Patching
The Internet
• The Internet is a global system of interconnected
computer networks that use the standard Internet
protocol suite (TCP/IP) to serve several billion users
worldwide.
• It is a network of networks that consists of millions of
private, public, academic, business, and government
networks, of local to global scope, that are linked by a
broad array of electronic, wireless and optical
networking technologies.
• The Internet carries an extensive range of information
resources and services, such as the inter-linked hypertext
documents of the World Wide Web (WWW) and the
infrastructure to support email.
The Internet Infrastructure: General perspective

 Traditionally, the Internet infrastructure has been divided into backbone and access networks.
 the interface between these two parts of the infrastructure being managed by Internet Service
Providers (ISPs).
The backbone
• is made of high-speed routers/switches interconnected by large-capacity fiber-
optic links.
• Backbones can be divided into large national/international backbones and
smaller more local regional/metropolitan backbones.
• New technologies for backbones are mostly in the area of all-optical networks.
• Backbone operators serve mainly ISPs and large or medium companies with
complex communications needs, typically requiring high capacity links to the
Internet and the interconnection of several geographically distant facilities.
• The backbone business requires very large investments and enjoys considerable
economies of scale due to the cost of installing fiber. Fiber optic + tours
The access infrastructure,
• connecting businesses and households to regional and
nationalbackbones, is currently the most critical aspect of
the communications networks that support the Internet.
• Although large corporations can afford sophisticated high-
capacity access links, the existing access solutions for
residential customers and small businesses rely mostly on
the public switched telephone network (PSTN).
• NB :Internet service providers constitute the Interface
between backbones and access networks.Their main service is
to terminate a large number of access connections from
their customers and to offer connectivity to national
backbones.
• Today, access connections are in their large majority
switched telephone circuits using voce-grade modems.
These narrowband access links are terminated at modem
banks and statistically multiplexed into a packet-switched
IP network, allowing a large-number of connections to
efficiently share a high-speed pipe to a backbone.
• When compared to the access or the backbone, the
market for ISPs is very competitive with more than 8,000
companies in the US alone. Most ISPs are local, but there
are a few large ISPs with Points of Presence (POPs) all over
the country that controls a large share of the market. The
high degree of competition in this market is due to its low
barriers to enter. The only ISP until recent time in Ethiopia
is ethio telecom !! Recently safaricom become the other
option.
Technology :Protocol
• Protocol is some special set of roles/rules in digital communication to
ensure systematic and safe transmission/transfer of data over the
network.
• Protocols used everywhere from sending of emails to visiting of web
sites.
• TCP protocols: Is the backbone of all internet communication.
• TCP defines how to establish communication so the programs exchange
data. They are transport layer protocols
• TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic
communication language or protocol of the Internet. It can also be used
as a communications protocol in the private networks called Intranets
and in extranets.
• The TCP/IP Protocol is based on the 7 Layer OSI model, and all the
various protocols which TCP/IP consist of, work in different layers of this
7 Layer OSI Model.
• This gives each protocol some unique characteristics and allows us to
Protocols
• The communications infrastructure of the Internet consists of
its hardware components and a system of software layers that
control various aspects of the architecture.
• While the hardware can often be used to support other
software systems.
• it is the design and the rigorous standardization process of the
software architecture that characterizes the Internet and
provides the foundation for its scalability and success.
• The responsibility for the architectural design of the Internet
software systems has been delegated to the Internet
Engineering Task Force (IETF).
• The IETFconducts standard-setting work groups, open to any
individual, about the various aspects of Internet architecture.
• The Internet standards describe a framework known as the
Internet protocol suite.,This is a model architecture that
divides methods into a layered system of protocols. The
layers correspond to the environment or scope in which their
services operate. Layer stands from application layer ---
physical layer.
Internet Protocol (IP)
• The most prominent component of the Internet model is the
Internet Protocol (IP), whichprovides addressing systems (IP
addresses) for computers on the Internet.
• IP enables internetworking and in essence establishes the
Internet itself.
• IP Version 4 (IPv4) is the initial version used on the first
generation of today's Internet and is still in dominant use. It
was designed to address up to ~4.3 billion (109) Internet
hosts.
Topics about internet
 Routing
 General structure
 Governance
 Services
A) World Wide Web
B) Communication
C) Data transfer
 Access
 Users
 Social impact
 Electronic business
 Telecommuting
 Crowd sourcing
Routing
• The routing of the backbone network, servers, IP
Address, infrastructure from federal government to 10
region and to each zone for each regions !!!
Governance
• The Internet is a globally distributed network
comprising many voluntarily interconnected
autonomous networks.
• It operates without a central governing body.
• However, to maintain interoperability, the principal
name spaces of the Internet are administered by the
Internet Corporation for Assigned Names and Numbers
(ICANN), headquartered in Marina del Rey, California.
• ICANN is the authority that coordinates the assignment
of unique identifiers for use on the Internet, including
domain names, Internet Protocol (IP) addresses,
application port numbers in the transport protocols,
and many other parameters
Services

1) World Wide Web


 Many people use the terms Internet and World Wide
Web, or just the Web, interchangeably, but the two
terms are not synonymous.
 The World Wide Web is a global set of documents,
images and other resources, logically interrelated by
hyperlinks and referenced with Uniform Resource
Identifiers (URIs).
 URIs symbolically identifies services, servers, and
other databases, and the documents and resources
that they can provide.
 Hypertext Transfer Protocol (HTTP) is the main access
protocol of the World Wide Web,
• World Wide Web browser software, such as Microsoft's
Internet Explorer, Mozilla Firefox, Opera, Apple's Safari,
and Google Chrome, lets users navigate from one web
page to another via hyperlinks embedded in the
documents.
• These documents may also contain any combination of
computer data, including graphics, sounds, text, video,
multimedia and interactive content that runs while the
user is interacting with the page.
• The Web has also enabled individuals and organizations
to publish ideas and information to a potentially large
audience online at greatly reduced expense and time
delay.
2 Communication

 Email is an important communications service available on the


Internet.
 The concept of sending electronic text messages between parties
in a way analogous to mailing letters or memos predates the
creation of the Internet.
 Pictures, documents and other files are sent as email
attachments.
 Internet telephony is another common communications service
made possible by the creation of the Internet. VoIP stands for
Voice-over-Internet Protocol.
 The benefit is that, as the Internet carries the voice traffic, VoIP
can be free or cost much less than a traditional telephone call,
especially over long distances and especially for those with
always-on Internet connections .
 .VoIP is maturing into a competitive alternative to traditional
telephone service.
3 Data transfer
 File sharing is an example of transferring large amounts of data
across the Internet.
 A computer file can be emailed to customers, colleagues and
friends as an attachment. It can be uploaded to a website or FTP
server for easy download by others.
 It can be put into a "shared location" or onto a file server for
instant use by colleagues.
example is YOUTUBE
 Streaming media is the real-time delivery of digital media for the
immediate consumption or enjoyment by end users.
 Many radio and television broadcasters provide Internet feeds of
their live audio and video productions.
 Digital media streaming increases the demand for network
bandwidth. For example, standard image quality needs 1 Mbit/s
link speed for SD 480p, HD 720p quality requires 2.5
4 Access
• Common methods of Internet access in homes
include :
1dial-up, landline broadband (over coaxial cable
fiber optic or copper wires),
2 Wi-Fi provides wireless access to computer
networks
3 satellite
4 3G/4G technology cell phones.
Users
 Overall Internet usage has seen tremendous growth. From 2000
to 2009, the number of Internet users globally rose from 394
million to 1.858 billion.
 By 2010, 22 percent of the world's population had access to
computers with 1 billion Google searches every day, 300 million
Internet users reading blogs, and 2 billion videos viewed daily on YouTube.
Social impact
 Social networking and entertainment Many people use the
World Wide Web to access news, weather and sports
reports, to plan and book vacations and to find out more
about their interests.
 People use chat, messaging and email to make and stay in
touch with friends worldwide.
 Social networking websites such as Facebook, Twitter, and
MySpace have created new ways to socialize and interact.
• Electronic business Electronic business (E-business)
involves business processes spanning the entire value
chain: electronic purchasing and supply chain
management, processing orders electronically, handling
customer service, and cooperating with business
partners.
• Politics and political revolutions The Internet has
achieved new relevance as a political tool.
Reading Assignment
1 define Cyber sectarianism
2 Cyber slacking
3 Crowd sourcing
Identify requirements

 Computer Hardware Required for Internet & Internet


Access Components
1 Telephone Modem
2 Network Interface Card
3 Wired Access Points
4 Wireless Access Points
5 Internet Protocol (IP)
6 Install and Configure the Email Server in
Windows Server 2003 Introduction
1 Telephone Modem
Telephone Modem
 A telephone modem is a device that converts the signals from your
computer into a series of sounds and transmits them across the phone
line.
 A telephone modem on the other side of the connection converts these
sounds back to a signal the computer can understand, allowing the
computers to communicate.
NB: because two different signals used on the computers and internet.
Which is digital signal on the computer and analog signal on the
internet.
 Modem converts digital signal to analog, the process is modulation.
 Modem converts analog signal to digital signal, the process is
demodulation.
 Modem is what brings the internet in to your home or business by
establishing and maintain dedicated connection to your ISPs to give you
accesses to internet.
2 Network Interface Card
 Broadband connections provide much faster access to the
Internet then narrowband connections.
 There are multiple types of broadband connections, including
DSL, satellite, and cable access. Each of these types of access
involves connecting to an access point using either a wired
Ethernet connection or a wireless connection.
 A Network interface card (NIC) allows you to connect an
Ethernet cable to your computer from an access point.
 Communication to the access point travels through this cable.
 Connections using a wired NIC require that an Ethernet cable be
connected from the computer to the access point at all times
during Internet use.
 Network interface cards can be built in to the computer or
purchased as an external device that you plug in to the
computer.
3 Wired Access Points
 Computers using a NIC and Ethernet cable connect
through an access point.
 Access points are generally either routers, cable modems, or
DSL modems that provide a link between the Internet
service provider and your physical computer.
 NIC-based connections are widely used in local area
networks, such as groups of computers in businesses.
 They can be used in homes, but many users prefer to use
wireless connections for the added mobility.
4 Wireless Access Points
 A wireless access point allows you to connect to an
access point without using a physical connection.
 Wireless access can be configured in your home using a
wireless router and a computer with a wireless interface.
 Wireless interfaces can be installed within the computer
or purchased separately as a USB or PCI device that can
be plugged in when needed.
 Many businesses, such as hotels and coffee shops,
provide free wireless access in their buildings for the use
of their customers.
5 Internet Protocol (IP)

 Internet Protocol (IP) is a packet-switched protocol


that performs addressing and route selection.
 As a packet is transmitted, this protocol appends a
header to the packet so that it can be routed
through the network using dynamic routing tables.
 IP is a connectionless protocol and sends packets
without expecting the receiving host to
acknowledge receipt.
 In addition, IP is responsible for packet assembly
and disassembly as required by the physical and
data-link layers of the OSI reference model.
Elements of Competency and Performance Criteria
I. Plan and design internet infrastructure to meet business
requirements
• Select internet infrastructure in line with business and end-user
requirements, within budget limitations.
• Evaluate the internet service for satisfactory performance and confirm
that the service meets business and end-user requirements .
• Ensure that hardware, software, network and security requirements
are in accordance with agreed business and end-user specifications.
• Research internet to source suppliers, technologies, delivery schedules
and replacement parts and document findings .
• Evaluate internet service providers and establish their capability to
deliver the required connection service.
• Determine internet protocol address allocation based on the number
of addresses needed.
Evaluating Network Infrastructure Acquisition,Installation, and
Maintenance

• The IT organization should have both long- and short-


term plans that addressmaintenance, monitoring, and
migration to new software.
• During the acquisitionprocess, the IT organization
needs to map software acquisitions to the
organization's strategic plan and ensure that the
software meets documented compatibility standards.
• The IT organization might implement centralized
control andautomated distribution of software, as well
as scan user workstations to ensure adherence to
licensing agreements
 The following are some key risk indicators related
to software acquisition:
• Software acquisitions are not mapped to the strategic plan.
• No documented policies are aimed at guiding software
acquisitions.
• No process exists for comparing the "develop vs. purchase" option
• No one is assigned responsibility for the acquisition process.
• Affected parties are not involved with assessing requirements and
needs.
• There is insufficient knowledge of software alternatives.
• Security features and internal controls are not assessed.
• Benchmarking and performance tests are not carried out.
• Integration and scalability issues are not taken into account.
• Total cost of ownership is not fully considered.
Requirements issues
 When selecting and employing software and hardware
tools, one of the first and most importantactivities to
embark on is identifying what the client wants and to
ensure they sign-off on therequirements.
 An open and honestassessment of what will be delivered is
essential.So, one of the tasks is to document the
requirements.
This may include identifying or clarifying:
• the business case
• what the client considers the project’s main objectives are
• what IT infrastructure is already in place
• basic specifications (eg formats)
• conflicting or overlapping requirements
• maintenance and backup requirements
• conflicting or overlapping requirements
• maintenance and backup requirements
• bandwidth issues that may affect the project
• role definition of parties involved
• the nature of the data (eg banking details, multimedia)
• security needs (eg if the client needs logins, passwords,
lockable sections, etc)
• available support resources
• Costing.
Ensuring Requirements
 Requirement is a carful assessment of the needs that a system is
to fulfill. It must say
 1 Why, a system is needed, based on current and foreseen
condition, which may be internal operations or external market?
A )Context analysis: the reason why the system to be created.
Constraints on the environment in which the system is to
function.
 2 what system features will serve and satisfy this context?
Functional requirements (system)
• A description of what the system is to do. What information
needs to be maintained? What needs to be processes?
• Functional requirements capture the intended behavior of the
system. This behavior may beexpressed as services, tasks or
functions the system is required to perform.
Examples of functional requirements

 Functional requirements describe the way in which the different


components and functions in the solution will interact. They will
clarify how the solution is going to work and how users can use it.
 Next are some examples of the questions you might ask in order
to determine the functional requirements of an IT system.
User requirements
• How many users are expected to use the system?
• How many people will be utilising the solution at one time?
• Where the users will be located (eg overseas, interstate or at
home)?
• What navigation model will it use?
• What is the range of the content?
• How much content will it include?
• How will the content be structured?
Hardware requirements
• Compatibility: will the solution work with existing
systems?
• Support for multimedia formats: will the existing systems
and architecture support all types of media?
• Will the new system be supported by existing resources
within the company?
• Is there funding available for new hardware? (eg new
servers)
• What is the backup strategy? Has this been coste.
• Will there be time delays to purchase and install
hardware?
Role definitions

• One of the most important tasks a developer must do before


moving into the design and development phases is to clarify roles
and responsibilities.
 For example, the main things to clarify (in terms of roles and
responsibilities) may include:
• Who is responsible for the sign-off? (And if that person leaves the
company, who will do it then?)
• Who approves purchases (eg software)?
• Who will support the project after the development team has gone?
• Who will collect and collate the content?
• Who will check the legality of the content?
• Who has responsibility for organising the workspace for the
development team?
• Who will approve the security systems of the multimedia product?
• Who takes final responsibility for the project?
Budget issues
 Identifying who is supporting ,fulfilling and
covering the cost payment for the system or
software development.
Sign-off
• In the planning phase, the sign-off typically
covers an agreement with the client/
organization.
• What is the true cost of the software?
Software requirements

• Are there licensing issues? (As the system is in development,


should you pay for all the licensing now, or when the system is in
live mode?).
• How long has the software been on the market for?
• What happens if the software company becomes insolvent? Who
supports it?
• Who owns the source code?
• What happens if the source code is modified; who supports the
product then?
• Does the solution work with all other company software systems?
• If web-based, does the solution function on all common browsers?
• If security is a concern, can the software be delivered in a ‘locked
down’ format?
Technical requirements

• What types of computers/operating systems will


the users operate?
• Are their desktops all the same?
• What bandwidth restrictions occur presently?
• What security (login) will they need?
• What backup policies need to be in place?
• Who will have administration rights?
• What will the business do if the system fails at
any stage?
• Who is the project sponsor?
3 How
• Non-functional requirements (system) How the system is to be
constructed and function.
• The requirements documents are comprehensive; detailing what is
required of an installation to meet the business needs of users.
Use cases
 A use case is a list of steps, typically defining interactions between a
role and a system, to achieve a goal. The actor can be a human or an
external system.
 A use case is a very useful tool to help you start to determine the
required functionality of asystem. Use cases have quickly become a
standard tool for capturing functional requirements.
 A use case is a diagram showing how the proposed system will be
used in one particular scenario, by a particular user.
 Use cases allow the designer to focus on details, but keep thedesign
grounded in the basics of how the system will be used. A large
system will have many use cases.

You might also like