74
ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Embed Size (px)

Citation preview

Page 1: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

ISM 50 - Business Information Systems

Lecture 10

Instructor: John MusacchioUC Santa Cruz

October 27, 2009

Page 2: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Class announcements Midterm Thursday

Office Hours modified for today 2-2:50 , 4:15-5:15 Room E2 557

Page 3: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Student Presentation

Edward Udarbe

Page 4: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Data and information

byDavid G. Messerschmitt

Page 5: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Copyright notice

©Copyright David G. Messerschmitt, 2000. This material may be used, copied, and distributed freely for educational purposes as long as this copyright notice remains attached. It cannot be used for any commercial purpose without the written permission of the author.

Page 6: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Key concept

The key commodity manipulated by information technology is information

To be manipulated in a computing/networking environment, information must be represented by data

What is information?

Page 7: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Information

From a user (human) perspective…….recognizable patterns that influence you in

some way (perspective, understanding, behavior…)

In the computing infrastructure, information has a somewhat different connotation as structure and interpretation added to data

Page 8: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Data

A bit is “0” or “1” — the atom of the information economy

Data is a collection of bits, like “0101110111010110” “0000011” “111011101011010110101111011011010”

Note: the terms data and information are not always used consistently!

Page 9: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Representation

Take the place of the original Equivalent to, in the sense that the

original can be reconstructed from its representation

Often the original can only be approximately reconstructed, although it may be indistinguishable to the user e.g. audio or video

Page 10: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

ASCII

Alphabet Hex Binary

<7> /x37 00110111

<8> /x38 00111000

<9> /x39 00111001

<:> /x3A 00111010

<;> /x3B 00111011

<<> /x3C 00111100

<=> /x3D 00111101

</>> /x3E 00111110

<?> /x3F 00111111

<At> /x40 01000000

<A> /x41 01000001

<B> /x42 01000010

<C> /x43 01000011

<D> /x44 01000100

Note that this representation isnot unique…

….this one happens to be a standard (ANSI X3.110-1983)

StructureInterpretation

Page 11: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

A picture

This picture conveysinformation

This information is represented in this computer, but how?

Page 12: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Representation of picture: image

Expanding a small portion of thepicture, we see that it is representedby square pixels….

….300 tall by 200 wide…..

….with a range of 256 intensities per pixel

300 • 200 • 8 bits = 480,000 bits (but it can be compressed)

Anapproximation!

Structure

Interpretation

Page 13: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Color picture

A color picture can berepresented by threemonochrome images…

At the expense of threetimes as many bits

Page 14: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Terminology

Information

Data

Information

Data

Communicate data toanother user or organization

RepresentationDataprocessing

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 15: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Representation needs to be standardized

Information

Data

Information

Data

Communicate data toanother user or organization

If the representationis not standardized, theinformation is garbled!

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 16: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Regeneration

Make a precise copy of the data (copy bit by bit)

If you know the representation, this is equivalent to making a precise copy of the information

Each such precise copy is called a generation

process is called regeneration

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 17: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Replication of information

0101011010111101011011010010110000001101010111101110101010111010101010110101111010110110100101100000011010101121011101010101110101

0101011010111101011011010010110000001101010111101110101010111010101010110101111010110110100101100000011010101121011101010101110101

0101011010111101011011010010110000001101010111101110101010111010101010110101111010110110100101100000011010101121011101010101110101

0101011010111101011011010010110000001101010111101110101010111010101010110101111010110110100101100000011010101121011101010101110101

Anything that can be regenerated can be replicated any number of times This is a blessing and a

curse

Page 18: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Analog information cannot be regenerated

Analog information can be copied, but not regenerated

We will never know exactly what the original of this Rembrandt looked like

Page 19: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Discrete information can be regenerated

Regeneration can preserve data (but not its original physical form)

Regeneration is possible for information represented digitally (which is tolerant of physical deterioration)

0 + noise 01 + noise 1

Page 20: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Replication of information requires knowledge of representation

Information

Data

Information

DataReplication

Replication of informationalso presumes knowledge ofits representation

Replication preserves the integrityof the data, but that is not sufficient

Every .xxxDOS file isa representation

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 21: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Implications

Digitally represented information can be preserved over time or distance in its precise original form by occasional regeneration digital library digital telephony

Replication of data is easy and cheap

Page 22: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Implications (con’t)

Replication of information requires knowledge of the structure and interpretation Standardization or some other means

Extreme supply economies of scale You can give away or sell and still retain Unauthorized replication or piracy

relatively easy

Page 23: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Architecture

byDavid G. Messerschmitt

Page 24: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Copyright notice

©Copyright David G. Messerschmitt, 2000. This material may be used, copied, and distributed freely for educational purposes as long as this copyright notice remains attached. It cannot be used for any commercial purpose without the written permission of the author.

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 25: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

What is Architecture?

How do you architect a solution?

Page 26: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Three-tier client/server

Applicationserver

Enterprisedata server

Client

Page 27: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

System integration

Architecture->subsystem implementation

-> system integrationBring together subsystems and make them

cooperate properly to achieve desired system functionality

Always requires testing May require modifications to architecture

and/or subsystem implementation

Page 28: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Emergence

Subsystems are more specialized and simpler functionality

Higher-level system functionality arises from the interaction of subsystems

Emergence includes capabilities that arise purely from that interaction (desired or not) e.g. airplane flies, but subsystems can’t

Page 29: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Why system decomposition?

Divide and conquer approach to containing complexity

Reuse Consonant with industry structure

(unless system is to be supplied by one company)

Others?

Page 30: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Networked computing infrastructure

byDavid G. Messerschmitt

Page 31: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Layering

Existing layers

Elaboration or specialization

Services

Page 32: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Example of Layering: networking

Physical

Link

Network

Transport

Application

Messages

Packets

Frames

Bits

Signals

Page 33: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Software Layering

Application

Middleware

Operating System

Page 34: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Operating system functions

Graphical user interface (client only) Hide details of equipment from the

application Multitasking Resource management

Processing, memory, storage, etc etc

Page 35: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Middleware Functions

Capabilities that can be shared by many applications, but that is not part of OS Example: Database Management System

(DBMS) Hide details of OS from application

Java Virtual Machine

More purposes we’ll talk about later.

Page 36: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

What’s a database?

Database File with specified structure Example: relational table

Page 37: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Year City Accommodation Tourists

2002 Oakley Bed&Breakfast 14

2002 Oakley Resort 190

2002 Oakland Bed&Breakfast 340

2002 Oakland Resort 230

2002 Berkeley Camping 120000

2002 Berkeley Bed&Breakfast 3450

2002 Berkeley Resort 390800

2002 Albany Camping 8790

2002 Albany Bed&Breakfast 32402003 Oakley Bed&Breakfast 552003 Oakley Resort 3202003 Oakland Bed&Breakfast 2802003 Oakland Resort 2102003 Berkeley Camping 1158002003 Berkeley Bed&Breakfast 45602003 Berkeley Resort 4190002003 Albany Camping 76502003 Albany Bed&Breakfast 6750

A Database

Page 38: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Storage Middleware example: DBMS Database Management System (DBMS)

Manage Multiple databases Allow multiple applications to access

common databases Implement standard data “lookup” (query)

functions.

Page 39: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

The Internet

byDavid G. Messerschmitt

Page 40: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

IntranetPrivate internet

Often connected to Internet

Firewall creates a protected enclave

Firewall

Router

intranet

GlobalInternet

Page 41: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Extranet

An Extranet is composed of Intranets connected through an unprotected

domain (typically the Internet)

Encryption and other security technologies used to

protect proprietary information prevent imposters, vandals, etc

Page 42: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

What is the Internet?

An internet is a “network of networks” Interconnect standard for LAN’s, MAN’s, and

WAN’s Internet = the major global internet A private internet is called an intranet

Page 43: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Client - Server Computing

Page 44: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Client Server Example

Client “I want to seewww.google.com ”

Server

<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Google</title><style><!--body,td,a,p,.h{font-family:arial,sans-serif;}.h{font-size: 20px;}.q{color:#0000cc;}//--> …

Page 45: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Client Server Example – Layers Revealed

Client

Application:

Infrastructure

Server

<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Google</title><style><!--body,td,a,p,.h{font-family:arial,sans-serif;}.h{font-size: 20px;}.q{color:#0000cc;}//--> …

Packet Packet

Infrastructure

Application

Internet

PacketPacket

<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Google</title><style><!--body,td,a,p,.h{font-family:arial,sans-serif;}.h{font-size: 20px;}.q{color:#0000cc;}//--> …

Page 46: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

3-Tier Client Server Architecture example

Application Server

Clicks, keystrokes

<head><title>Bank of America | Online Banking | Accounts Overview</title><meta name="Description" content="Bank of America Online Banking - Accounts Overview"><link rel="stylesheet" type="text/css" href="/eas-docs/images/win_ie.css"><script language="JavaScript" type="text/javascript" src="/eas-docs/ias_js/scripts.js"></script><script language="JavaScript" type="text/javascript"><!-- function hover(ref, classRef) { eval(ref).className = classRef; }//--></script>

Shareddata

What is Bob’s balance?

$0.50

Client

Balance $0.50

Page 47: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

3-Tier Client Server Architecture example

Application Server

Shareddata

Web Server

Application Logic

CommonGatewayInterchange

Client

Page 48: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

3-Tier Client Server Architecture example

Application Server

Shareddata

Web Server

Application Logic

CommonGatewayInterchange

Client

Database Management System(DBMS)

What is Bob’sBalance?

Database

Page 49: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

3-Tier Client Server Architecture example

Application Server

Shareddata

Web Server

Java Servlet

Client

Database Management System(DBMS)

What is Bob’sBalance?

Database

In some implementationsApplication Logic andWeb Server can be put onDifferent machines.

Application Logic

Page 50: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Relational Database

Customer Balance Customer Class

Alice $527 Silver

Bob $0.50 Bronze

Charles $1000000 Gold

Page 51: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

DBMS Responsibilities

Hide Changes in the Database hardware from the Application

Standard operations on the data, including searches, such a search is called a query.

Separate Database Management from Applications, so that many applications can access the same data.

Security, Integrity, Backup, fault tolerance, etc..

Page 52: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

3-Tier Client Server Architecture in General

Application Server

Shareddata

Client

-Accept instructions from user-Make requests of server-Display responses of server

-Takes inputs from client-Decides what to be done next-Decides what shared data to access and manipulates it-Processes shared data

-Support multiple applications with common data-Protect critical data-Decouple data administration and application administration

Page 53: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Book distributioncenters

books4u.comCustomers

Financial institution

Consumer Enterprise Inter-enterprise

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 54: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Clients

Customers Merchandise

Acquirerbank

BookdistributorsOrders

Customer logic

Databases

Fulfillment logic

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 55: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Peer to peer

Client

Client

Server

Server

Peer Peer

Slide adapted from slides for Understanding Networked ApplicationsBy David G Messerschmitt. Copyright 2000. See copyright notice

Page 56: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Sun Case

Page 57: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Sun N-tier case

What does Sun make? Workstations Servers Software

Page 58: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

How Successful had Sun been up to 1998? Founded in 1982 Open Standards Workstation

Unix Operating System (Solaris) TCP/IP networking

1988 – Revenues $1 billion 1993 – Market value $3.0 billon 1997 – Jumped from 3rd to 1st in Unix

Server Market.

Page 59: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

How Successful had Sun been up to 1998? 1993 – “The network is the computer.” 1994 – Internet explodes in popularity

Page 60: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Microsoft mid to late 90s

Dominated Desktop software Users familiar with Windows, Office, etc.

NT servers Fine for small intranets, “not industrial

strength”

Page 61: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Sun N-Tier Case

What is Java? Programming Language Portable between computers with different

operating systems

Easy to write programs in

Easier re-use

But, programs are slow

Page 62: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

What problems did the micro era produce? Desktops are expensive to maintain

TCO for windows PC $9900!

Every PC had a lot of software that had to be maintained Office, Windows, etc…

Small differences, like the order in which software is installed, could make different PCs behave differently!

Page 63: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

In the Networking Era

These “bloated” PCs are networked and termed fat clients.

But networking of PCs offered the possibility of putting most of the functionality into servers Getting rid of much of the software on the

client These clients would be called thin clients. Sun, Oracle, and others saw it as the future.

Page 64: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Hardware for thin clients

A Network Computer (NC) – a computer with minimal hardware that depends on a network connection to a server to function Be careful not to confuse it with the phrase

“networked computer!” Example: Sun’s JavaStation (1996-2000) It is the hardware one would use to

implement a thin-client computing model.

Page 65: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Another term from that era..

A NetPC was a PC introduced by Microsoft and Intel in 1996 Same software as a normal PC Did not allow users to install their own

software NetPC died out Features of it, and Microsoft’s Zero

Administration Kit, live on in today’s version of windows.

Page 66: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Microsoft Vision

Keep “fat-client” model Add some features to Windows to

reduce administration costs

Page 67: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Sun’s Vision

Thin Client model. Application Servers with Applications written

in Java. NCs could retrieve applications from

application server as needed. Applications compatible with any NC

hardware and OS. Applications could be fixed, added, updated

at the server level, rather than maintaining each PC.

Page 68: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

SUN 3 - Tier

Page 69: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Sun N-tier

Page 70: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Sun N-Tier

Page 71: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Sun’s Performance

Page 72: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Sun’s Performance

Page 73: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Today

3-tier model common. Sun’s version of 4-tier model not-

common. N-tier model where Webserver and

Application Server on separate equipment also common.

Sun’s hardware business not strong. Linux on cheap PCs most common servers Microsoft desktops replacing Sun workstations

Page 74: ISM 50 - Business Information Systems Lecture 10 Instructor: John Musacchio UC Santa Cruz October 27, 2009

Today

Java Common in Server implementations

Example: Java Servlet implementing application logic in a banking application.

Often used to push simple applets onto client

Not common For “big” desktop applications Office Suite in Java not popular

Microsoft is still in business…