74
ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

ISM 50 - Business Information Systems Lecture 7

  • Upload
    vuthu

  • View
    216

  • Download
    1

Embed Size (px)

Citation preview

Page 1: ISM 50 - Business Information Systems Lecture 7

ISM 50 - Business Information Systems

Lecture 10Instructor: John Musacchio

UC Santa CruzOctober 27, 2009

Page 2: ISM 50 - Business Information Systems Lecture 7

Class announcements Midterm Thursday

Office Hours modified for today 2-2:50 , 4:15-5:15 Room E2 557

Page 3: ISM 50 - Business Information Systems Lecture 7

Student Presentation Edward Udarbe

Page 4: ISM 50 - Business Information Systems Lecture 7

Data and information

byDavid G. Messerschmitt

Page 5: ISM 50 - Business Information Systems Lecture 7

Copyright notice

©Copyright David G. Messerschmitt, 2000. This material may be used, copied, and distributed freely for educational purposes as long as this copyright notice remains attached. It cannot be used for any commercial purpose without the written permission of the author.

Page 6: ISM 50 - Business Information Systems Lecture 7

Key concept

The key commodity manipulated by information technology is information

To be manipulated in a computing/networking environment, information must be represented by data

What is information?

Page 7: ISM 50 - Business Information Systems Lecture 7

Information

From a user (human) perspective…….recognizable patterns that influence you in some way (perspective, understanding, behavior…)

In the computing infrastructure, information has a somewhat different connotation as structure and interpretation added to data

Page 8: ISM 50 - Business Information Systems Lecture 7

Data

A bit is “0” or “1” — the atom of the information economy

Data is a collection of bits, like “0101110111010110” “0000011” “111011101011010110101111011011010”

Note: the terms data and information are not always used consistently!

Page 9: ISM 50 - Business Information Systems Lecture 7

Representation Take the place of the original Equivalent to, in the sense that the

original can be reconstructed from its representation

Often the original can only be approximately reconstructed, although it may be indistinguishable to the user e.g. audio or video

Page 10: ISM 50 - Business Information Systems Lecture 7

ASCII Alphabet Hex Binary<7> /x37 00110111<8> /x38 00111000<9> /x39 00111001<:> /x3A 00111010<;> /x3B 00111011<<> /x3C 00111100<=> /x3D 00111101</>> /x3E 00111110<?> /x3F 00111111<At> /x40 01000000<A> /x41 01000001<B> /x42 01000010<C> /x43 01000011<D> /x44 01000100

Note that this representation isnot unique…

….this one happens to be a standard (ANSI X3.110-1983)

StructureInterpretation

Page 11: ISM 50 - Business Information Systems Lecture 7

A picture

This picture conveysinformation

This information is represented in this computer, but how?

Page 12: ISM 50 - Business Information Systems Lecture 7

Representation of picture: image

Expanding a small portion of thepicture, we see that it is representedby square pixels….

….300 tall by 200 wide…..

….with a range of 256 intensities per pixel

300 • 200 • 8 bits = 480,000 bits (but it can be compressed)

Anapproximation!

Structure

Interpretation

Page 13: ISM 50 - Business Information Systems Lecture 7

Color picture

A color picture can berepresented by threemonochrome images…

At the expense of threetimes as many bits

Page 14: ISM 50 - Business Information Systems Lecture 7

Terminology

Information

Data

Information

Data

Communicate data toanother user or organization

RepresentationDataprocessing

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 15: ISM 50 - Business Information Systems Lecture 7

Representation needs to be standardized

Information

Data

Information

Data

Communicate data toanother user or organization

If the representationis not standardized, theinformation is garbled!

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 16: ISM 50 - Business Information Systems Lecture 7

Regeneration Make a precise copy of the data (copy

bit by bit) If you know the representation, this is

equivalent to making a precise copy of the information

Each such precise copy is called a generation

process is called regeneration

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 17: ISM 50 - Business Information Systems Lecture 7

Replication of information

0101011010111101011011010010110000001101010111101110101010111010101010110101111010110110100101100000011010101121011101010101110101

0101011010111101011011010010110000001101010111101110101010111010101010110101111010110110100101100000011010101121011101010101110101

0101011010111101011011010010110000001101010111101110101010111010101010110101111010110110100101100000011010101121011101010101110101

0101011010111101011011010010110000001101010111101110101010111010101010110101111010110110100101100000011010101121011101010101110101

Anything that can be regenerated can be replicated any number of times This is a blessing and a

curse

Page 18: ISM 50 - Business Information Systems Lecture 7

Analog information cannot be regenerated

Analog information can be copied, but not regenerated

We will never know exactly what the original of this Rembrandt looked like

Page 19: ISM 50 - Business Information Systems Lecture 7

Discrete information can be regenerated

Regeneration can preserve data (but not its original physical form)

Regeneration is possible for information represented digitally (which is tolerant of physical deterioration)

0 + noise 01 + noise 1

Page 20: ISM 50 - Business Information Systems Lecture 7

Replication of information requires knowledge of representation

Information

Data

Information

DataReplication

Replication of informationalso presumes knowledge ofits representation

Replication preserves the integrityof the data, but that is not sufficient

Every .xxxDOS file isa representation

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 21: ISM 50 - Business Information Systems Lecture 7

Implications

Digitally represented information can be preserved over time or distance in its precise original form by occasional regeneration digital library digital telephony

Replication of data is easy and cheap

Page 22: ISM 50 - Business Information Systems Lecture 7

Implications (con’t) Replication of information requires

knowledge of the structure and interpretation Standardization or some other means

Extreme supply economies of scale You can give away or sell and still retain Unauthorized replication or piracy

relatively easy

Page 23: ISM 50 - Business Information Systems Lecture 7

Architecture

byDavid G. Messerschmitt

Page 24: ISM 50 - Business Information Systems Lecture 7

Copyright notice

©Copyright David G. Messerschmitt, 2000. This material may be used, copied, and distributed freely for educational purposes as long as this copyright notice remains attached. It cannot be used for any commercial purpose without the written permission of the author.

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 25: ISM 50 - Business Information Systems Lecture 7

What is Architecture?

How do you architect a solution?

Page 26: ISM 50 - Business Information Systems Lecture 7

Three-tier client/server

Applicationserver

Enterprisedata server

Client

Page 27: ISM 50 - Business Information Systems Lecture 7

System integration

Architecture->subsystem implementation

-> system integrationBring together subsystems and make them

cooperate properly to achieve desired system functionality

Always requires testing May require modifications to architecture

and/or subsystem implementation

Page 28: ISM 50 - Business Information Systems Lecture 7

Emergence

Subsystems are more specialized and simpler functionality

Higher-level system functionality arises from the interaction of subsystems

Emergence includes capabilities that arise purely from that interaction (desired or not) e.g. airplane flies, but subsystems can’t

Page 29: ISM 50 - Business Information Systems Lecture 7

Why system decomposition? Divide and conquer approach to

containing complexity Reuse Consonant with industry structure

(unless system is to be supplied by one company)

Others?

Page 30: ISM 50 - Business Information Systems Lecture 7

Networked computing infrastructure

byDavid G. Messerschmitt

Page 31: ISM 50 - Business Information Systems Lecture 7

Layering

Existing layers

Elaboration or specialization

Services

Page 32: ISM 50 - Business Information Systems Lecture 7

Example of Layering: networking

Physical

Link

Network

Transport

Application

Messages

Packets

Frames

Bits

Signals

Page 33: ISM 50 - Business Information Systems Lecture 7

Software LayeringApplication

Middleware

Operating System

Page 34: ISM 50 - Business Information Systems Lecture 7

Operating system functions Graphical user interface (client only) Hide details of equipment from the

application Multitasking Resource management

Processing, memory, storage, etc etc

Page 35: ISM 50 - Business Information Systems Lecture 7

Middleware Functions Capabilities that can be shared by

many applications, but that is not part of OS Example: Database Management System

(DBMS) Hide details of OS from application

Java Virtual Machine

More purposes we’ll talk about later.

Page 36: ISM 50 - Business Information Systems Lecture 7

What’s a database?

Database File with specified structure Example: relational table

Page 37: ISM 50 - Business Information Systems Lecture 7

Year City Accommodation Tourists2002 Oakley Bed&Breakfast 142002 Oakley Resort 1902002 Oakland Bed&Breakfast 3402002 Oakland Resort 2302002 Berkeley Camping 1200002002 Berkeley Bed&Breakfast 34502002 Berkeley Resort 3908002002 Albany Camping 87902002 Albany Bed&Breakfast 32402003 Oakley Bed&Breakfast 552003 Oakley Resort 3202003 Oakland Bed&Breakfast 2802003 Oakland Resort 2102003 Berkeley Camping 1158002003 Berkeley Bed&Breakfast 45602003 Berkeley Resort 4190002003 Albany Camping 76502003 Albany Bed&Breakfast 6750

A Database

Page 38: ISM 50 - Business Information Systems Lecture 7

Storage Middleware example: DBMS Database Management System (DBMS)

Manage Multiple databases Allow multiple applications to access

common databases Implement standard data “lookup” (query)

functions.

Page 39: ISM 50 - Business Information Systems Lecture 7

The Internet

byDavid G. Messerschmitt

Page 40: ISM 50 - Business Information Systems Lecture 7

IntranetPrivate internet

Often connected to Internet

Firewall creates a protected enclave

Firewall

Router

intranet

GlobalInternet

Page 41: ISM 50 - Business Information Systems Lecture 7

Extranet

An Extranet is composed of Intranets connected through an unprotected

domain (typically the Internet)

Encryption and other security technologies used to

protect proprietary information prevent imposters, vandals, etc

Page 42: ISM 50 - Business Information Systems Lecture 7

What is the Internet? An internet is a “network of networks”

Interconnect standard for LAN’s, MAN’s, and WAN’s

Internet = the major global internet A private internet is called an intranet

Page 43: ISM 50 - Business Information Systems Lecture 7

Client - Server Computing

Page 44: ISM 50 - Business Information Systems Lecture 7

Client Server ExampleClient “I want to see

www.google.com ”

Server

<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Google</title><style><!--body,td,a,p,.h{font-family:arial,sans-serif;}.h{font-size: 20px;}.q{color:#0000cc;}//--> …

Page 45: ISM 50 - Business Information Systems Lecture 7

Client Server Example – Layers Revealed

Client

Application:

Infrastructure

Server

<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Google</title><style><!--body,td,a,p,.h{font-family:arial,sans-serif;}.h{font-size: 20px;}.q{color:#0000cc;}//--> …

Packet Packet

Infrastructure

Application

Internet

PacketPacket

<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Google</title><style><!--body,td,a,p,.h{font-family:arial,sans-serif;}.h{font-size: 20px;}.q{color:#0000cc;}//--> …

Page 46: ISM 50 - Business Information Systems Lecture 7

3-Tier Client Server Architecture example

Application Server

Clicks, keystrokes

<head><title>Bank of America | Online Banking | Accounts Overview</title><meta name="Description" content="Bank of America Online Banking - Accounts Overview"><link rel="stylesheet" type="text/css" href="/eas-docs/images/win_ie.css"><script language="JavaScript" type="text/javascript" src="/eas-docs/ias_js/scripts.js"></script><script language="JavaScript" type="text/javascript"><!-- function hover(ref, classRef) { eval(ref).className = classRef; }//--></script>

Shareddata

What is Bob’s balance?

$0.50

Client

Balance $0.50

Page 47: ISM 50 - Business Information Systems Lecture 7

3-Tier Client Server Architecture example

Application Server

Shareddata

Web Server

Application Logic

CommonGatewayInterchange

Client

Page 48: ISM 50 - Business Information Systems Lecture 7

3-Tier Client Server Architecture example

Application Server

Shareddata

Web Server

Application Logic

CommonGatewayInterchange

Client

Database Management System(DBMS)

What is Bob’sBalance?

Database

Page 49: ISM 50 - Business Information Systems Lecture 7

3-Tier Client Server Architecture example

Application Server

Shareddata

Web Server

Java Servlet

Client

Database Management System(DBMS)

What is Bob’sBalance?

Database

In some implementationsApplication Logic andWeb Server can be put onDifferent machines.

Application Logic

Page 50: ISM 50 - Business Information Systems Lecture 7

Relational Database

Customer Balance Customer Class

Alice $527 SilverBob $0.50 BronzeCharles $1000000 Gold

Page 51: ISM 50 - Business Information Systems Lecture 7

DBMS Responsibilities Hide Changes in the Database hardware from

the Application

Standard operations on the data, including searches, such a search is called a query.

Separate Database Management from Applications, so that many applications can access the same data.

Security, Integrity, Backup, fault tolerance, etc..

Page 52: ISM 50 - Business Information Systems Lecture 7

3-Tier Client Server Architecture in General

Application Server

Shareddata

Client

-Accept instructions from user-Make requests of server-Display responses of server

-Takes inputs from client-Decides what to be done next-Decides what shared data to access and manipulates it-Processes shared data

-Support multiple applications with common data-Protect critical data-Decouple data administration and application administration

Page 53: ISM 50 - Business Information Systems Lecture 7

Book distributioncenters

books4u.comCustomers

Financial institution

Consumer Enterprise Inter-enterprise

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 54: ISM 50 - Business Information Systems Lecture 7

Clients

Customers Merchandise

Acquirerbank

BookdistributorsOrders

Customer logic

Databases

Fulfillment logic

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 55: ISM 50 - Business Information Systems Lecture 7

Peer to peer

Client

Client

Server

Server

Peer Peer

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 56: ISM 50 - Business Information Systems Lecture 7

Sun Case

Page 57: ISM 50 - Business Information Systems Lecture 7

Sun N-tier case What does Sun make?

Workstations Servers Software

Page 58: ISM 50 - Business Information Systems Lecture 7

How Successful had Sun been up to 1998? Founded in 1982 Open Standards Workstation

Unix Operating System (Solaris) TCP/IP networking

1988 – Revenues $1 billion 1993 – Market value $3.0 billon 1997 – Jumped from 3rd to 1st in Unix

Server Market.

Page 59: ISM 50 - Business Information Systems Lecture 7

How Successful had Sun been up to 1998? 1993 – “The network is the computer.” 1994 – Internet explodes in popularity

Page 60: ISM 50 - Business Information Systems Lecture 7

Microsoft mid to late 90s Dominated Desktop software

Users familiar with Windows, Office, etc.

NT servers Fine for small intranets, “not industrial

strength”

Page 61: ISM 50 - Business Information Systems Lecture 7

Sun N-Tier Case What is Java?

Programming Language Portable between computers with different

operating systems

Easy to write programs in

Easier re-use

But, programs are slow

Page 62: ISM 50 - Business Information Systems Lecture 7

What problems did the micro era produce? Desktops are expensive to maintain

TCO for windows PC $9900!

Every PC had a lot of software that had to be maintained Office, Windows, etc…

Small differences, like the order in which software is installed, could make different PCs behave differently!

Page 63: ISM 50 - Business Information Systems Lecture 7

In the Networking Era These “bloated” PCs are networked and

termed fat clients. But networking of PCs offered the

possibility of putting most of the functionality into servers Getting rid of much of the software on the

client These clients would be called thin clients. Sun, Oracle, and others saw it as the future.

Page 64: ISM 50 - Business Information Systems Lecture 7

Hardware for thin clients A Network Computer (NC) – a

computer with minimal hardware that depends on a network connection to a server to function Be careful not to confuse it with the phrase

“networked computer!” Example: Sun’s JavaStation (1996-2000) It is the hardware one would use to

implement a thin-client computing model.

Page 65: ISM 50 - Business Information Systems Lecture 7

Another term from that era.. A NetPC was a PC introduced by

Microsoft and Intel in 1996 Same software as a normal PC Did not allow users to install their own

software NetPC died out Features of it, and Microsoft’s Zero

Administration Kit, live on in today’s version of windows.

Page 66: ISM 50 - Business Information Systems Lecture 7

Microsoft Vision Keep “fat-client” model Add some features to Windows to

reduce administration costs

Page 67: ISM 50 - Business Information Systems Lecture 7

Sun’s Vision Thin Client model. Application Servers with Applications written

in Java. NCs could retrieve applications from

application server as needed. Applications compatible with any NC

hardware and OS. Applications could be fixed, added, updated

at the server level, rather than maintaining each PC.

Page 68: ISM 50 - Business Information Systems Lecture 7

SUN 3 - Tier

Page 69: ISM 50 - Business Information Systems Lecture 7

Sun N-tier

Page 70: ISM 50 - Business Information Systems Lecture 7

Sun N-Tier

Page 71: ISM 50 - Business Information Systems Lecture 7

Sun’s Performance

Page 72: ISM 50 - Business Information Systems Lecture 7

Sun’s Performance

Page 73: ISM 50 - Business Information Systems Lecture 7

Today 3-tier model common. Sun’s version of 4-tier model not-

common. N-tier model where Webserver and

Application Server on separate equipment also common.

Sun’s hardware business not strong. Linux on cheap PCs most common servers Microsoft desktops replacing Sun workstations

Page 74: ISM 50 - Business Information Systems Lecture 7

Today Java

Common in Server implementations Example: Java Servlet implementing application

logic in a banking application. Often used to push simple applets onto

client Not common

For “big” desktop applications Office Suite in Java not popular

Microsoft is still in business…