SlideShare a Scribd company logo
1 of 5
Download to read offline
Demystifying IT by Ben Summers

Information Professionals often develop very in-depth knowledge of specific areas of IT: the areas theyʼve
had to battle with to deliver their Information Services. But a lack of understanding of how the whole of the
IT infrastructure in an organisation works, means that each IT issue they have to deal with is an uphill
struggle.

Letʼs start with your desktop computer.

For most people, your desktop computer is the only part of the IT infrastructure they really think about. But
on a corporate network, the desktop is just on the periphery, and is relatively unimportant. Any decent IT
network is designed so if your computer fails, your information doesnʼt get lost because itʼs all stored
elsewhere.

All computers these days are networked, and itʼs this which makes the desktop so unimportant. At the most
basic you connect two or three computers together with a network cable and and a piece of equipment called
a switch.

As things like printers, networked photocopiers, phones and so on became more intelligent, they tended to
be connected to the network too. The de-facto standard for physical networking is called ethernet, which
specifies the cables and the electronics which use them. In addition, thereʼs wifi, which replaces the cable
with a base station and wireless connection.

So, the switch connects everything in the network - these switches are just small boxes. You connect all the
computers to the switch, and when one wants to talk to another, the switch sends the information between
them. A network in a medium sized company will probably have about one switch between twenty
computers, and then you connect the switches together to create a bigger network.

These interconnected switches, computers and other devices, all form a Local Area Network, or LAN. LANs
connect things within a single building, allowing everything to talk to the servers.

The most important thing on your local network are the servers. Servers are very like your desktop
computer. Theyʼve got all the same bits, but more of them and theyʼre more expensive. The server is the
most critical part of your IT infrastructure, because itʼs where all the information is stored and processed.

Servers are designed to be always on. Good IT administrators will have bought servers with redundant parts,
so if anything fails the server doesnʼt stop, and there will be a monitoring system which alerts the
administrator at the first sign of trouble. Desk-side servers look like normal computers and live in normal
offices. Rack mounted servers are long and flat and get slotted into big racks and live in data centres.

Everything on the network is orientated around the servers, with the relatively unimportant desktop machines
asking the servers to do all the work. This principle is known as Client/server architecture. Your desktop is
the client, where you view and edit the information youʼre working on.

The server stores and processes this information. So itʼs the server which is carefully tended to by your IT
colleagues, because thatʼs the vital part of the system. Client/server architecture used to be a revolutionary
new thing with big debates about whether it was sensible, but nowadays, itʼs just the way everything is done.

You wonʼt necessarily have very many servers in an organisation. It can run from none to hundreds for
specialist applications. But a medium sized company might have three or four. Although a server is rather
more of a serious computer than your desktop, what really distinguishes it is what software it runs.


Edited notes from the presentation given to the CLSIG Professional Development Club, 22 September 2008. (c) ONEIS Ltd. 
   1
Operating Systems and Software

So far weʼve just looked at hardware - the physical boxes in a network. But without software, these boxes are
useless. Weʼre going to look at the software which runs on desktops and servers. Theyʼre very similar, both
with three layers of software.

Firmware starts everything going, and gets a machine running. It doesnʼt do all that much, and within a few
seconds hands over to the operating system. For computers, firmware is often called the BIOS, “basic input/
output system”, and itʼs the bit which displays the white text on black which appears when you switch the
computer on.

Once the firmware has got everything going, the operating system takes over. Itʼs the bit which make the
computer “operate” doing all the menial tasks like storing files and talking to the network.

On top of the OS, runs the application and server software, the reason for actually having a computer.

People often talk about platforms. This is a vague term: it could be the hardware, the operating system, or
even a particular bit of application software.

Itʼs most likely to refer to the operating system running on the server, and youʼll hear names like Microsoft
Windows, UNIX, Linux and Solaris. Each has different strengths, but choosing one is relatively simple -- it all
comes down to what applications you want to run.

Sometimes youʼll get a choice for a given application, in which case your IT people will choose the platform
theyʼre most familiar with.

So thatʼs a brief run down of your Local Area Network - how all the IT equipment within your building talks to
each other. Now letʼs look at how the computers within your building talks to computers outside your building.

When your company grows and opens a new office, the LANs in each building are normally connected
together. Theyʼre connected together by a WAN - a Wide Area Network.

The key piece of equipment here is the router. These are a bit like switches, but they are more
sophisticated. Instead of only being able to send information to computers or switches directly connected to
them, they know how to reach any computer, by ʻroutingʼ information to the next router, until it reaches itʼs
destination.

The line connecting the routers together will normally be leased lines, which are conceptually like very long
but slow network cables you rent from BT.

So thatʼs connecting two offices together. But how about connecting to the rest of the world?

The Internet is an example of a WAN too. Itʼs called the “Internet” because it interconnects networks. It
started in the late 60s, and over the next few decades moved from being a largely academic network to the
massive network which seems to have invaded every part of our lives.

The Internet is actually quite simple, and uses the same bits of equipment you find in your office. Again it is
the routers that enable everything to talk to everything else.

The router in your office connects to an Internet Service Provider, or ISP. The ISPs then connect their
routers together, so you can get to any other computer on the Internet, and all the servers in data centres.

In the domestic market, for home internet connections, ISPs include BT, Pipex and Tiscali. But organisations
chose more specialist ISPs, including BT, but there are lots of business-only ISPs. Which one you choose
will depend on how reliable you want it to be, how many people will be using it, and how much youʼre
prepared to pay.

Your internet connection arrives in one of two ways, a leased line or ADSL. A leased line is the same thing
youʼd use to connect offices, but is rather expensive. So smaller offices and homes use ADSL (Asymmetric

Edited notes from the presentation given to the CLSIG Professional Development Club, 22 September 2008. (c) ONEIS Ltd. 
   2
Digital Subscriber Line.) Itʼs a way of getting a fast-ish network connection over a standard phone line, and is
a pragmatic way of reusing the existing telephony infrastructure.

Sending of information from your computer to another computer over the internet is not instantaneous.
Thereʼs a physical limit on how fast packets of data can travel from one computer to another over a network
connection. That limit is known as Bandwidth: which is a measure of how quickly information can be sent,
measured in Mb/s. Each different type of network connection has a different bandwidth.

Your computer sends information to the router, which sends it on to the internet. This uses an ADSL link,
which is much slower.

This is why your IT department discourage you from sending large emails and watching videos. The links to
the internet are expensive and relatively low bandwidth, so if everyone uses them all at the same time,
everything slows to a halt.

A key part of the Internet is data centres.

These are buildings full of servers offering public services you might access over the internet like email,
websites, databases, and information services like Lexis Nexis. Some companies which need to run lots of
servers may have their own private data centres.

They contain rows upon rows of servers, all installed in racks. They are basically a warehouse full of
computers. Theyʼre useful for many reasons. Lots of ISPs have equipment there to inter-connect between
themselves, so itʼs comparatively cheap to get a very fast internet connection. This is handy if youʼre running
high traffic web sites or information services. Theyʼre built with security in mind and guarded 24 hours a day.
And finally, theyʼre the perfect place to run your servers, with plenty of air conditioning to keep them cool and
backup power generators in case something goes wrong with the electricity supply.

Network addresses

Youʼve got all these computers on the internet, and they need some way of specifying which other computer
they want to talk to. Just as every house has a postal address which the Post Office uses to deliver your
post, computers have Internet Protocol addresses which routers use to deliver information.

Youʼve probably come across IP addresses. This is what they look like, in a form called “dotted quad”:
192.168.99.201

Every computer needs to have a unique address so that information can be routed between them on the
Internet. However, thereʼs only four billion of these IP addresses, which isnʼt enough because of the sheer
number of devices connecting to the internet.

So organisations tend to have a few unique public IP addresses which have been assigned to them, by their
ISP if theyʼre small or a regional registry like RIPE if theyʼre big. And then within their network they can use
whatever private IP addresses they want for all their individual pieces of equipment. Private addresses are
just like public addresses, except theyʼre in one of three ranges set aside for them.

Now thereʼs a problem with using private IP addresses for computers which want to talk to the internet.
Because everyone uses the same set, if private addresses were allowed on the Internet, servers wouldnʼt be
able to send back the information because the “return address” could refer to potentially thousands of
computers.

So we use Network Address Translation, or NAT, which runs on your router. This translates the private IP
addresses into the public IP addresses which work on the internet.

For example, your desktop computer could have address 10.0.0.12 on your LAN. The LAN has a router
running NAT, which might have a public address of 17.0.0.29. This uses the public address to communicate
on the desktop computerʼs behalf with the rest of the world, translating the address from private to public.
When replies come back, it does it in reverse.



Edited notes from the presentation given to the CLSIG Professional Development Club, 22 September 2008. (c) ONEIS Ltd. 
   3
But this is only one way. The reverse translation is only possible because the NAT device knows which
computer initiated the connection. The rest of the internet canʼt connect to the desktop computer, because it
doesnʼt have a public address.

Security

In a perfect world, no one would make mistakes, and everyone would act with the best of intentions. In the
real world, mistakes are made and bad people exploit them. This means your IT team are constantly doing
battle to keep your network safe.

There are two sets of people who make these mistakes. Firstly developers, who write software, and secondly
system administrators, who sometimes set things up incorrectly.

All software has problems. There are millions upon millions of lines of code which make up your computer
and the applications running on it. A mistake in any one of those could be exploitable.

And systems administrators can make mistakes too, accidently getting the wrong permissions, or letting their
users set passwords which are easily guessed.

All this means you donʼt want just anyone connecting to your servers and desktop computers, because
thereʼs a possibility that mistakes can be exploited.

So you use firewalls to stop them. Your firewall lives on your router. Network Address Translation goes a
long way to prevent problems, because you canʼt connect to anything behind it. This is good enough for the
home and small offices.

With more complicated setups, you might have rules in place to prevent any connections other than those
you know are allowed. Youʼd often also run a packet filter. This is a piece of software that analyses the
information packets coming into the LAN and stops any that it thinks are malicious.

Firewalls, routers and NAT are often combined into a single box for a small network. When you build bigger
networks, you might separate them out.

So letʼs put this altogether, and look at how it all works when you browse a web site:

•   your web browser asks the operating system to make a connection to the web server
•   the OS uses the network hardware to talk to the network
•   which transmits the request to the server
•   the server hardware receives the transmission
•   which passes it to the operating system
•   which decodes it and asks the web server to respond
•   the web server sends the information back, in the same way it came.

Letʼs look at what happens in the network in more detail:

• your computer wants to request a web page from a web server, which lives in a data centre on the internet
• it sends the request to the switch
• which sends it on to the router
• which sends it to your ISP
• your ISP works out where the web server is located, and sends the request on via the internet to the ISP
  which connects the server to the internet
• and that ISP sends the request to the web server
• it responds, sending the reply back, the same way it came.

No magic

I often find that people assume that theyʼll never understand computers, and this stops them from getting the
most out of something which is fundamental to their work, and all for no good reason.



Edited notes from the presentation given to the CLSIG Professional Development Club, 22 September 2008. (c) ONEIS Ltd. 
   4
Weʼve looked at the setup behind your desktop computer, that lets you browse the web, access hosted
information providersʼ services, send and receive email.

It is a bit complicated, but itʼs not magic.

Computing is logical. Each part of the network is doing quite small tasks, and everything builds on something
else. The complexity comes through three or four decades of building stuff on top of other stuff!

So when you have an IT problem, approach it logically. Remember itʼs not magic, and problems can be
solved with rational thought. With the problems you face, youʼre really dealing with the simple bits which
underly it all, and your only challenge is to work out which bit to blame.


So here are a few tips on being your IT departmentʼs best friend when reporting issues:

•   describe the problem clearly and comprehensively, including any error messages you see
•   explain what you did, what happened, and how that differed from what you expected to happen
•   donʼt jump to diagnose: this can cause you to miss out critical parts of information
•   donʼt panic! Itʼs always easiest to solve problems calmly.



Copyright ONEIS Ltd 2008, All rights reserved.




About Ben

Ben Summers has been working in IT for over twelve years. He started off in web development as the web was
beginning to take hold. He was one of the very first people in the UK to build interactive websites, and has been getting
the most out of the web for clients ever since. He's branched out into other areas as his interests, opportunities and
clients necessitated. He's developed desktop applications, built large-scale servers, and used more computer platforms
than he cares to count. Ben has created and launched several open source products now in use throughout the world.

But it's not about the technology for Ben. It's about building things for people which make their lives easier and help their
businesses prosper. Ben is the technical lead for ONEIS - a hosted information management system for small
organisations. Ben is a mathematics graduate from the University of London and a chartered member of the British
Computer Society.

www.oneis.co.uk/blog




Edited notes from the presentation given to the CLSIG Professional Development Club, 22 September 2008. (c) ONEIS Ltd. 
    5

More Related Content

What's hot

Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network TutorialBOXLIGHT Inc
 
Data Communication
Data Communication Data Communication
Data Communication MSSadeq
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networkingVIJAY TRIPATHI (DSS Basti)
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkSudhriti Gupta
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies Shamima Akther
 
Project. Microsoft Windows Nt Networking
Project. Microsoft Windows Nt NetworkingProject. Microsoft Windows Nt Networking
Project. Microsoft Windows Nt Networkingbksp
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT InfrastructureLopamudra Das
 
Computer networking
Computer networkingComputer networking
Computer networkingjlunceford12
 
Prachi gupta 8 a
Prachi gupta 8 aPrachi gupta 8 a
Prachi gupta 8 aEashaGupta
 
Introduction to computer networks for performance venues
Introduction to computer networks for performance venuesIntroduction to computer networks for performance venues
Introduction to computer networks for performance venuesartsit
 
Evolution of computer_networks
Evolution of computer_networksEvolution of computer_networks
Evolution of computer_networksAdityaroy110
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptOsama Yousaf
 

What's hot (20)

Hardware1
Hardware1Hardware1
Hardware1
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Basics of network
Basics of networkBasics of network
Basics of network
 
Data Communication
Data Communication Data Communication
Data Communication
 
Modules1
Modules1Modules1
Modules1
 
Com
ComCom
Com
 
Network basics
Network basics Network basics
Network basics
 
5 - Networking
5 - Networking5 - Networking
5 - Networking
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networking
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Project. Microsoft Windows Nt Networking
Project. Microsoft Windows Nt NetworkingProject. Microsoft Windows Nt Networking
Project. Microsoft Windows Nt Networking
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Prachi gupta 8 a
Prachi gupta 8 aPrachi gupta 8 a
Prachi gupta 8 a
 
Introduction to computer networks for performance venues
Introduction to computer networks for performance venuesIntroduction to computer networks for performance venues
Introduction to computer networks for performance venues
 
Evolution of computer_networks
Evolution of computer_networksEvolution of computer_networks
Evolution of computer_networks
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides ppt
 

Viewers also liked

Emerging_Growth_Centres_Q1_07
Emerging_Growth_Centres_Q1_07Emerging_Growth_Centres_Q1_07
Emerging_Growth_Centres_Q1_07Chetanbir Kaur
 
Emerging Growth Centres 2
Emerging Growth Centres 2Emerging Growth Centres 2
Emerging Growth Centres 2Chetanbir Kaur
 
Dreams2
Dreams2Dreams2
Dreams2kctr29
 
Rockets project
Rockets projectRockets project
Rockets projectkctr29
 
Change the world, one map at a time.
Change the world, one map at a time.Change the world, one map at a time.
Change the world, one map at a time.guestc7edc4
 
IT for Information Professionals
IT for Information ProfessionalsIT for Information Professionals
IT for Information ProfessionalsCLSIG
 
The Anatomy of Account Planning
The Anatomy of Account PlanningThe Anatomy of Account Planning
The Anatomy of Account Planningblaiq
 
What is Account Planning? (and what do account planners do exactly?)
What is Account Planning? (and what do account planners do exactly?)What is Account Planning? (and what do account planners do exactly?)
What is Account Planning? (and what do account planners do exactly?)blaiq
 
Disk Director Suite10.0 Ug.En
Disk Director Suite10.0 Ug.EnDisk Director Suite10.0 Ug.En
Disk Director Suite10.0 Ug.Enguest6c80ba
 
Women Next (Executive Summary)
Women Next (Executive Summary)Women Next (Executive Summary)
Women Next (Executive Summary)blaiq
 
The State of Content: Rules of Engagement 2016
The State of Content: Rules of Engagement 2016The State of Content: Rules of Engagement 2016
The State of Content: Rules of Engagement 2016blaiq
 
The Behavioral Economics Guide 2016
The Behavioral Economics Guide 2016The Behavioral Economics Guide 2016
The Behavioral Economics Guide 2016blaiq
 

Viewers also liked (19)

Emerging_Growth_Centres_Q1_07
Emerging_Growth_Centres_Q1_07Emerging_Growth_Centres_Q1_07
Emerging_Growth_Centres_Q1_07
 
Rafael
RafaelRafael
Rafael
 
Aasta ajad
Aasta ajadAasta ajad
Aasta ajad
 
Emerging Growth Centres 2
Emerging Growth Centres 2Emerging Growth Centres 2
Emerging Growth Centres 2
 
Aceof Spades
Aceof SpadesAceof Spades
Aceof Spades
 
Dreams2
Dreams2Dreams2
Dreams2
 
Rockets project
Rockets projectRockets project
Rockets project
 
Change the world, one map at a time.
Change the world, one map at a time.Change the world, one map at a time.
Change the world, one map at a time.
 
IT for Information Professionals
IT for Information ProfessionalsIT for Information Professionals
IT for Information Professionals
 
Clari Psico
Clari PsicoClari Psico
Clari Psico
 
Susi
SusiSusi
Susi
 
Life in the Colonies
Life in the ColoniesLife in the Colonies
Life in the Colonies
 
The Anatomy of Account Planning
The Anatomy of Account PlanningThe Anatomy of Account Planning
The Anatomy of Account Planning
 
What is Account Planning? (and what do account planners do exactly?)
What is Account Planning? (and what do account planners do exactly?)What is Account Planning? (and what do account planners do exactly?)
What is Account Planning? (and what do account planners do exactly?)
 
Disk Director Suite10.0 Ug.En
Disk Director Suite10.0 Ug.EnDisk Director Suite10.0 Ug.En
Disk Director Suite10.0 Ug.En
 
Women Next (Executive Summary)
Women Next (Executive Summary)Women Next (Executive Summary)
Women Next (Executive Summary)
 
Aristotle On Soul
Aristotle On SoulAristotle On Soul
Aristotle On Soul
 
The State of Content: Rules of Engagement 2016
The State of Content: Rules of Engagement 2016The State of Content: Rules of Engagement 2016
The State of Content: Rules of Engagement 2016
 
The Behavioral Economics Guide 2016
The Behavioral Economics Guide 2016The Behavioral Economics Guide 2016
The Behavioral Economics Guide 2016
 

Similar to IT for Information Professionals Notes

Ahaana - How Internet Works
Ahaana - How Internet WorksAhaana - How Internet Works
Ahaana - How Internet WorksAnkur Jain
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfHonKencyTress
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfJafarHussain48
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 
Katie & toms_computer_network_project
Katie & toms_computer_network_projectKatie & toms_computer_network_project
Katie & toms_computer_network_projectkatiettoml
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Lakeisha Jones
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorialSusan Ferdon
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & NetworkingGohil Anshu
 
Types of communication networks
Types of communication networksTypes of communication networks
Types of communication networksDamaashaad
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks EssayKatyana Londono
 

Similar to IT for Information Professionals Notes (20)

Ahaana - How Internet Works
Ahaana - How Internet WorksAhaana - How Internet Works
Ahaana - How Internet Works
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdf
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Internet.pdf
Internet.pdfInternet.pdf
Internet.pdf
 
Katie & toms_computer_network_project
Katie & toms_computer_network_projectKatie & toms_computer_network_project
Katie & toms_computer_network_project
 
Primch5cg
Primch5cgPrimch5cg
Primch5cg
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 
Networking Concepts
Networking ConceptsNetworking Concepts
Networking Concepts
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 
Computer networks
Computer networksComputer networks
Computer networks
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
Types of communication networks
Types of communication networksTypes of communication networks
Types of communication networks
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks Essay
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

IT for Information Professionals Notes

  • 1. Demystifying IT by Ben Summers Information Professionals often develop very in-depth knowledge of specific areas of IT: the areas theyʼve had to battle with to deliver their Information Services. But a lack of understanding of how the whole of the IT infrastructure in an organisation works, means that each IT issue they have to deal with is an uphill struggle. Letʼs start with your desktop computer. For most people, your desktop computer is the only part of the IT infrastructure they really think about. But on a corporate network, the desktop is just on the periphery, and is relatively unimportant. Any decent IT network is designed so if your computer fails, your information doesnʼt get lost because itʼs all stored elsewhere. All computers these days are networked, and itʼs this which makes the desktop so unimportant. At the most basic you connect two or three computers together with a network cable and and a piece of equipment called a switch. As things like printers, networked photocopiers, phones and so on became more intelligent, they tended to be connected to the network too. The de-facto standard for physical networking is called ethernet, which specifies the cables and the electronics which use them. In addition, thereʼs wifi, which replaces the cable with a base station and wireless connection. So, the switch connects everything in the network - these switches are just small boxes. You connect all the computers to the switch, and when one wants to talk to another, the switch sends the information between them. A network in a medium sized company will probably have about one switch between twenty computers, and then you connect the switches together to create a bigger network. These interconnected switches, computers and other devices, all form a Local Area Network, or LAN. LANs connect things within a single building, allowing everything to talk to the servers. The most important thing on your local network are the servers. Servers are very like your desktop computer. Theyʼve got all the same bits, but more of them and theyʼre more expensive. The server is the most critical part of your IT infrastructure, because itʼs where all the information is stored and processed. Servers are designed to be always on. Good IT administrators will have bought servers with redundant parts, so if anything fails the server doesnʼt stop, and there will be a monitoring system which alerts the administrator at the first sign of trouble. Desk-side servers look like normal computers and live in normal offices. Rack mounted servers are long and flat and get slotted into big racks and live in data centres. Everything on the network is orientated around the servers, with the relatively unimportant desktop machines asking the servers to do all the work. This principle is known as Client/server architecture. Your desktop is the client, where you view and edit the information youʼre working on. The server stores and processes this information. So itʼs the server which is carefully tended to by your IT colleagues, because thatʼs the vital part of the system. Client/server architecture used to be a revolutionary new thing with big debates about whether it was sensible, but nowadays, itʼs just the way everything is done. You wonʼt necessarily have very many servers in an organisation. It can run from none to hundreds for specialist applications. But a medium sized company might have three or four. Although a server is rather more of a serious computer than your desktop, what really distinguishes it is what software it runs. Edited notes from the presentation given to the CLSIG Professional Development Club, 22 September 2008. (c) ONEIS Ltd. 1
  • 2. Operating Systems and Software So far weʼve just looked at hardware - the physical boxes in a network. But without software, these boxes are useless. Weʼre going to look at the software which runs on desktops and servers. Theyʼre very similar, both with three layers of software. Firmware starts everything going, and gets a machine running. It doesnʼt do all that much, and within a few seconds hands over to the operating system. For computers, firmware is often called the BIOS, “basic input/ output system”, and itʼs the bit which displays the white text on black which appears when you switch the computer on. Once the firmware has got everything going, the operating system takes over. Itʼs the bit which make the computer “operate” doing all the menial tasks like storing files and talking to the network. On top of the OS, runs the application and server software, the reason for actually having a computer. People often talk about platforms. This is a vague term: it could be the hardware, the operating system, or even a particular bit of application software. Itʼs most likely to refer to the operating system running on the server, and youʼll hear names like Microsoft Windows, UNIX, Linux and Solaris. Each has different strengths, but choosing one is relatively simple -- it all comes down to what applications you want to run. Sometimes youʼll get a choice for a given application, in which case your IT people will choose the platform theyʼre most familiar with. So thatʼs a brief run down of your Local Area Network - how all the IT equipment within your building talks to each other. Now letʼs look at how the computers within your building talks to computers outside your building. When your company grows and opens a new office, the LANs in each building are normally connected together. Theyʼre connected together by a WAN - a Wide Area Network. The key piece of equipment here is the router. These are a bit like switches, but they are more sophisticated. Instead of only being able to send information to computers or switches directly connected to them, they know how to reach any computer, by ʻroutingʼ information to the next router, until it reaches itʼs destination. The line connecting the routers together will normally be leased lines, which are conceptually like very long but slow network cables you rent from BT. So thatʼs connecting two offices together. But how about connecting to the rest of the world? The Internet is an example of a WAN too. Itʼs called the “Internet” because it interconnects networks. It started in the late 60s, and over the next few decades moved from being a largely academic network to the massive network which seems to have invaded every part of our lives. The Internet is actually quite simple, and uses the same bits of equipment you find in your office. Again it is the routers that enable everything to talk to everything else. The router in your office connects to an Internet Service Provider, or ISP. The ISPs then connect their routers together, so you can get to any other computer on the Internet, and all the servers in data centres. In the domestic market, for home internet connections, ISPs include BT, Pipex and Tiscali. But organisations chose more specialist ISPs, including BT, but there are lots of business-only ISPs. Which one you choose will depend on how reliable you want it to be, how many people will be using it, and how much youʼre prepared to pay. Your internet connection arrives in one of two ways, a leased line or ADSL. A leased line is the same thing youʼd use to connect offices, but is rather expensive. So smaller offices and homes use ADSL (Asymmetric Edited notes from the presentation given to the CLSIG Professional Development Club, 22 September 2008. (c) ONEIS Ltd. 2
  • 3. Digital Subscriber Line.) Itʼs a way of getting a fast-ish network connection over a standard phone line, and is a pragmatic way of reusing the existing telephony infrastructure. Sending of information from your computer to another computer over the internet is not instantaneous. Thereʼs a physical limit on how fast packets of data can travel from one computer to another over a network connection. That limit is known as Bandwidth: which is a measure of how quickly information can be sent, measured in Mb/s. Each different type of network connection has a different bandwidth. Your computer sends information to the router, which sends it on to the internet. This uses an ADSL link, which is much slower. This is why your IT department discourage you from sending large emails and watching videos. The links to the internet are expensive and relatively low bandwidth, so if everyone uses them all at the same time, everything slows to a halt. A key part of the Internet is data centres. These are buildings full of servers offering public services you might access over the internet like email, websites, databases, and information services like Lexis Nexis. Some companies which need to run lots of servers may have their own private data centres. They contain rows upon rows of servers, all installed in racks. They are basically a warehouse full of computers. Theyʼre useful for many reasons. Lots of ISPs have equipment there to inter-connect between themselves, so itʼs comparatively cheap to get a very fast internet connection. This is handy if youʼre running high traffic web sites or information services. Theyʼre built with security in mind and guarded 24 hours a day. And finally, theyʼre the perfect place to run your servers, with plenty of air conditioning to keep them cool and backup power generators in case something goes wrong with the electricity supply. Network addresses Youʼve got all these computers on the internet, and they need some way of specifying which other computer they want to talk to. Just as every house has a postal address which the Post Office uses to deliver your post, computers have Internet Protocol addresses which routers use to deliver information. Youʼve probably come across IP addresses. This is what they look like, in a form called “dotted quad”: 192.168.99.201 Every computer needs to have a unique address so that information can be routed between them on the Internet. However, thereʼs only four billion of these IP addresses, which isnʼt enough because of the sheer number of devices connecting to the internet. So organisations tend to have a few unique public IP addresses which have been assigned to them, by their ISP if theyʼre small or a regional registry like RIPE if theyʼre big. And then within their network they can use whatever private IP addresses they want for all their individual pieces of equipment. Private addresses are just like public addresses, except theyʼre in one of three ranges set aside for them. Now thereʼs a problem with using private IP addresses for computers which want to talk to the internet. Because everyone uses the same set, if private addresses were allowed on the Internet, servers wouldnʼt be able to send back the information because the “return address” could refer to potentially thousands of computers. So we use Network Address Translation, or NAT, which runs on your router. This translates the private IP addresses into the public IP addresses which work on the internet. For example, your desktop computer could have address 10.0.0.12 on your LAN. The LAN has a router running NAT, which might have a public address of 17.0.0.29. This uses the public address to communicate on the desktop computerʼs behalf with the rest of the world, translating the address from private to public. When replies come back, it does it in reverse. Edited notes from the presentation given to the CLSIG Professional Development Club, 22 September 2008. (c) ONEIS Ltd. 3
  • 4. But this is only one way. The reverse translation is only possible because the NAT device knows which computer initiated the connection. The rest of the internet canʼt connect to the desktop computer, because it doesnʼt have a public address. Security In a perfect world, no one would make mistakes, and everyone would act with the best of intentions. In the real world, mistakes are made and bad people exploit them. This means your IT team are constantly doing battle to keep your network safe. There are two sets of people who make these mistakes. Firstly developers, who write software, and secondly system administrators, who sometimes set things up incorrectly. All software has problems. There are millions upon millions of lines of code which make up your computer and the applications running on it. A mistake in any one of those could be exploitable. And systems administrators can make mistakes too, accidently getting the wrong permissions, or letting their users set passwords which are easily guessed. All this means you donʼt want just anyone connecting to your servers and desktop computers, because thereʼs a possibility that mistakes can be exploited. So you use firewalls to stop them. Your firewall lives on your router. Network Address Translation goes a long way to prevent problems, because you canʼt connect to anything behind it. This is good enough for the home and small offices. With more complicated setups, you might have rules in place to prevent any connections other than those you know are allowed. Youʼd often also run a packet filter. This is a piece of software that analyses the information packets coming into the LAN and stops any that it thinks are malicious. Firewalls, routers and NAT are often combined into a single box for a small network. When you build bigger networks, you might separate them out. So letʼs put this altogether, and look at how it all works when you browse a web site: • your web browser asks the operating system to make a connection to the web server • the OS uses the network hardware to talk to the network • which transmits the request to the server • the server hardware receives the transmission • which passes it to the operating system • which decodes it and asks the web server to respond • the web server sends the information back, in the same way it came. Letʼs look at what happens in the network in more detail: • your computer wants to request a web page from a web server, which lives in a data centre on the internet • it sends the request to the switch • which sends it on to the router • which sends it to your ISP • your ISP works out where the web server is located, and sends the request on via the internet to the ISP which connects the server to the internet • and that ISP sends the request to the web server • it responds, sending the reply back, the same way it came. No magic I often find that people assume that theyʼll never understand computers, and this stops them from getting the most out of something which is fundamental to their work, and all for no good reason. Edited notes from the presentation given to the CLSIG Professional Development Club, 22 September 2008. (c) ONEIS Ltd. 4
  • 5. Weʼve looked at the setup behind your desktop computer, that lets you browse the web, access hosted information providersʼ services, send and receive email. It is a bit complicated, but itʼs not magic. Computing is logical. Each part of the network is doing quite small tasks, and everything builds on something else. The complexity comes through three or four decades of building stuff on top of other stuff! So when you have an IT problem, approach it logically. Remember itʼs not magic, and problems can be solved with rational thought. With the problems you face, youʼre really dealing with the simple bits which underly it all, and your only challenge is to work out which bit to blame. So here are a few tips on being your IT departmentʼs best friend when reporting issues: • describe the problem clearly and comprehensively, including any error messages you see • explain what you did, what happened, and how that differed from what you expected to happen • donʼt jump to diagnose: this can cause you to miss out critical parts of information • donʼt panic! Itʼs always easiest to solve problems calmly. Copyright ONEIS Ltd 2008, All rights reserved. About Ben Ben Summers has been working in IT for over twelve years. He started off in web development as the web was beginning to take hold. He was one of the very first people in the UK to build interactive websites, and has been getting the most out of the web for clients ever since. He's branched out into other areas as his interests, opportunities and clients necessitated. He's developed desktop applications, built large-scale servers, and used more computer platforms than he cares to count. Ben has created and launched several open source products now in use throughout the world. But it's not about the technology for Ben. It's about building things for people which make their lives easier and help their businesses prosper. Ben is the technical lead for ONEIS - a hosted information management system for small organisations. Ben is a mathematics graduate from the University of London and a chartered member of the British Computer Society. www.oneis.co.uk/blog Edited notes from the presentation given to the CLSIG Professional Development Club, 22 September 2008. (c) ONEIS Ltd. 5