MSCI 2130 Introduction to MIS Lecture Notes PDF
Document Details
![YouthfulJadeite3332](https://quizgecko.com/images/avatars/avatar-15.webp)
Uploaded by YouthfulJadeite3332
University of Windsor
Tags
Related
Summary
These lecture notes provide an introduction to information systems, covering topics like computer networks, cloud computing, and wireless technologies. The document includes diagrams and examples to illustrate key concepts.
Full Transcript
MSCI 2130: Introduction to MIS Week 2-Lecture 1 1 6 Wireless Tech and Cloud Computing Data & Knowledge Mgt Introduction to IS Hardware, Software, & Telecommunicati...
MSCI 2130: Introduction to MIS Week 2-Lecture 1 1 6 Wireless Tech and Cloud Computing Data & Knowledge Mgt Introduction to IS Hardware, Software, & Telecommunications 3 4 Introduction to Management Information Systems Chapter 6 Telecommunications and Networking ©2022 John Wiley & Sons, Inc. All rights reserved. Fundamental Points About Network Computing 1. Computers do not work in isolation; they constantly exchange data 2. This exchange takes place over any distance and over networks of any size Networks Are Essential Enable organizations to adapt to rapidly changing business conditions Enable organizations to share hardware, applications, and data across the organization and among organizations Enable geographically dispersed employees to work together Networks are a critical link between organizations, their partners, and their customers What is a Computer Network? A computer network is a system that connects computers and other devices (e.g., printers) through communications media so that data and information can be transmitted among them. Common Types of Computer Networks include: Local Area Network (LAN) Wide Area Network (WAN) LAN Connects two or more devices in a limited geographical region, usually within the same building. The ownership of the network is private. Every device in the LAN has a network interface card (NIC) that allows the device to physically connect to the LAN. WAN A network that covers a large geographical area. WANs typically connect multiple LANs. They have large capacity and are generally provided by common carriers such as telephone companies and international telecommunication services providers. The Internet is an example of a WAN. The ownership of the network could be private or public FIGURE 6.2 Enterprise network. Key Terms Internet: - A global network that connects millions of computer networks including devices such as smartphones, PCs, mainframe computers, etc. Intranet: - The use of internet technology inside organizations - Example: the university has an intranet that you use as a student intranet to access the university materials or apps) Extranet: - Connects organizations’ intranets to each other if they are business partners Key Terms (cont’d) Bandwidth: - Refers to the transmission capacity of a network; it is stated in bits per second. - Bandwidth ranges from narrowband (relatively low transmission capacity) to broadband (relatively high network capacity). - A broadband connection means a “Fast” connection Communications Media and Channels A communication channel is a pathway or medium for delivering data from one computing device to another Two types of media: 1. Cables (i.e., use physical wires) 2. Wireless (i.e., does not require physical wires) Cable or WireLine Media Twisted-pair wire Coaxial cable Fiber optics Cable or WireLine Media (cont’d) Twisted-pair wire (copper wires) Twisted pairs of Copper, with plastic sheathing on them, twisted around each other. Cheap and easy to break Cable or WireLine Media (cont’d) Coaxial cable (copper wires) - Sheathed copper - Has greater broadband than the twisted-pair Cable or WireLine Media (cont’d) Fiber optics (glass) - Made of glass - Extremely high-bandwidth - Expensive - If you break it, you cannot splice it Network Protocols Protocol: - The set of rules and procedures governing transmission of data across a network - Two major types: Ethernet: common protocol for Local Area Network (LAN) TCP/IP: protocol of the internet (note: you can learn more about it from the textbook if you wish) 22 Introduction to Management Information Systems Chapter 8 Wireless Technologies ©2022 John Wiley & Sons, Inc. All rights reserved. Wireless Technology Any type of technology that can send and/or receive data over a network without the need for cables or wires to be connected to that network. 23 The National Hockey League Scores with Wireless Technology You can watch this video: https://www.youtube.com/watch?v=OdJsmaNJqkw 24 The Internet of Things (IoT) When objects or devices connected wirelessly over a network are supplied with unique identifiers to share data without the need for physical human interaction to transmit the data, we can say we have “Internet of Things” (IoT). 27 The Internet of Things (IoT) (cont’d) Internet of Things (IoT): a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (aka sensors) and are able to transfer data wirelessly over a network without requiring human-to-human or human-to- computer interaction A thing in the IoT can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low or any other natural or man-made object that can be assigned an IP address and is able to transfer data over a network. This continuous connection or presence over the internet from any location using any device is called “Ubiquitous Computing” 28 Examples of Internet of Things in Use Source: https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT29 IoT Issues Security: Because IoT devices are closely connected, all a hacker has to do is exploit one vulnerability to manipulate all the data. Manufacturers that don't update their devices regularly -- or at all -- leave them vulnerable to cybercriminals. Privacy: is another major concern for IoT users. For instance, companies that make and distribute consumer IoT devices could use those devices to obtain and sell users' personal data. Challenges with IoT: i. Reliability and stability – of IoT sensors ii. Maintenance 30 31 Introduction to Management Information Systems Technology Guide 3 Cloud Computing ©2022 John Wiley & Sons, Inc. All rights reserved. IT Infrastructure IT components: o Hardware o Software o Networks o Databases o IT services: Developing information systems, managing security and risk, and managing data 32 Traditional IT Infrastructure On-premise Computing: A type of IT model where a company owns its IT infrastructure (hardware, software, networks, and data management) and maintains the physical existence of this infrastructure internally (i.e., on- premise) What is the problem, then?! 33 Problems with Traditional Approach There are pressures to be more flexible, do more with less cost, and use information as a competitive advantage. IT organizations want to respond by transforming IT into something with greater business agility. 34 Problems with Traditional Approach 35 Problems with Traditional IT Infrastructure Globalization: IT must meet the business needs to serve customers world-wide, round the clock – 24x7x365. Aging Data Centers: Migration, upgrading technology to replace old technology. Storage Growth: Explosion of storage consumption and usage. Application Explosion: New applications need to be deployed and their usage may scale rapidly. The current data center infrastructures are not planned to accommodate for such rapid growth. Cost of ownership: Due to increasing business demand, the cost of buying new equipment, power, cooling, support, licenses, etc., increases the Total Cost of Ownership (TCO.) Acquisitions: When companies are acquired, the IT infrastructures of the acquired company and the acquiring company are often different. These differences in the IT infrastructures demand significant effort to make them interoperable. 36 Any Solutions..?! Moving from on-premise to the cloud… This process is called “virtualization” 37 What is Cloud Computing? Cloud computing is a general term for anything that involves delivering hosted services over the Internet. They are hosted on virtualized servers (e.g., server farms / Data centers) The name “cloud computing” was inspired by the cloud symbol that's often used to represent the Internet in flowcharts and diagrams. Cloud computing uses the internet and remote computing to deliver convenient, on-demand, pay-as-you-go access for multiple customers to a shared pool of computing resources These resources include servers, networks, storage, applications, and services 38 Servers Servers are large multi-user computers used to store applications and data Example of server roles include hosting a shopping application such as Amazon.ca Smaller organizations may own a handful of servers or may “rent” server capacity from larger organizations Large computing-intensive organizations such as Amazon, Google, IBM and Facebook operate server “farms” that fill entire buildings and are interconnected and replicated on a global scale (i.e., also called data centers) 40 Server Farms or Data Centers Typically, the cloud computing hardware resources are located in server farms 41 Example of CC Service A simple example of cloud computing is your Microsoft 365 email or Gmail etc. You do not need to install a software or buy a server to use them. All what you need is just an internet connection and you can start sending emails. So where is the email application then? It is hosted on servers in a server farm or a data centre (i.e., cloud) either owned and managed by University of Windsor or Microsoft. But we do not care where it is hosted. We just care that we access it. 42 How the Web Works? What happens behind the scenes when you click a link or type a web page address into your browser? Assume you want to go to the Leddy Library website. 43 How the Web Works? (cont’d) www.leddy.uwindsor.ca Internet 44 How the Web Works? (cont’d) 1- Tell the web browser the web page you want to visit by typing its Uniform Resource Locator (URL) (e.g., https://www.uwindsor.ca ) URL Prefix Domain name 2- The browser: Checks the prefix of the URL this is usually http:// or https://, both of which indicate that the resource is a web page. Gets the URL’s domain name — “the something.com” or “whatever.org” part — and translates this into a unique location — called the IP (Internet Protocol) address so that the web server that hosts the page can understand which page it should render to the user. Remember! The computer does not understand our language! But only 0s & 1s 45 How the Web Works? (cont’d) Request: https://www.leddy.uwindsor.ca Results: Prefix: https:// Domain name: uwindsor.ca Web Server IP address: 137.207.71.12 3- The browser contacts the web server and requests the web page: With the web server’s unique IP address in hand, the web browser sets up a communications channel with the server and then uses that channel to send along a request for the web page 4- The web server encodes the page request: The server uses the page address to find the directory that holds the page and the file in which the page code is stored 46 How the Web Works? (cont’d) 5- The web server sends the web page file to the web browser 6- The web browser decodes the web page file: Decoding the page file means looking for text to display, instructions on how to display that text, and other resources required by the page, such as images and fonts 47 Different Types of Clouds Public Clouds: Shared, easily accessible, multi-customer IT infrastructures that are available nonexclusively to any entity in the general public (individuals, groups, and/or organizations). Public cloud vendors provide applications, storage, and other computing resources as services over the Internet (e.g., Google). Private Clouds: Also known as internal clouds or corporate clouds IT infrastructures accessed only by a single entity or by an exclusive group of related entities that share the same purpose and requirements, such as all of the business units within a single organization. Enterprises adopt private clouds to ensure system and data security. For this reason, these systems are implemented behind the corporate firewall. Hybrid Clouds: Composed of public and private clouds offering users the benefits of multiple deployment models. Hybrid clouds deliver services based on security requirements, the nature of the applications, and other company-established policies. 48 Public, Private, and Hybrid Clouds 49 Cloud Computing Services Infrastructure-as-a-Service (IaaS) Platform-as-a-Service (PaaS) Software-as-a-Service (SaaS) 50 Comparison of on-premise software, infrastructure-as-a-service, platform-as-a- service, and software-as-a-service 51 Infrastructure-as-a-Service (IaaS) Cloud computing providers offer remotely accessible servers, networks, and storage capacity. They supply these resources on demand from their large resource pools, which are located in their data centers. 52 Platform-as-a-Service (PaaS) Advantages With PaaS, customers rent servers, network capacity over the Internet, storage + operating systems, and software development technologies such as Java and.NET. The PaaS model allows the customer both to run existing applications and to develop and test new applications on a cloud platform without the cost of buying and managing the underlying hardware and software layers. 53 Software-as-a-Service (SaaS) Cloud computing vendors provide software that is specific to their customers’ requirements. SaaS is the most widely utilized service model, and it provides a broad range of software applications. SaaS providers typically charge their customers a monthly or yearly subscription fee. SaaS applications reside in the cloud instead of on a user’s hard drive or in a data center. 54 The “Big Three” Cloud Computing Vendors Amazon Web Services (AWS) Microsoft Azure Google Cloud Platform 55 Cloud Computing Characteristics Provides on-demand self-service where customers can access needed computing resources automatically Enables organizations to utilize resources more efficiently Provides fault tolerance (i.e., there is no single point of failure, so the failure of one computer will not stop an application from executing) 56 Cloud Computing Characteristics (cont’d) Makes it easy to scale up: The ability to access increased computing resources (i.e., add more servers)—to meet the processing demands of complex applications Makes it easy to scale down: Organizations can easily remove computers if extensive processing is not needed. 57 AI Today! Did you know! xAI just launched a new beta standalone app for its Grok AI assistant, marking the first shift away from its X (Twitter) integration and positioning the chatbot as a more direct competitor to rivals like ChatGPT and Gemini 58 59