Infrastructure management spans a vast gamut of issues, which
would include structured cabling, defining hardware requirements and software
applications. The CIO, however, should have a fixed path, set with clear
expectations, and link the investment in the solution to the needs of his
business.
From the technology perspective, infrastructure management
comprises major areas like networks, platforms (or servers), storage, databases,
middleware and security.
Structured cabling
A structured cabling system (SCS) comprises a set of cabling and
connectivity products that integrate the voice, data, video and various
management systems of a network, such as safety alarms, security access, energy
systems etc.
-
Structured cabling should have a modular design and
different unit sizes, so that all needs including design are met. -
In a cabling system, a single weak component — one not
designed to operate within the system-can cause the entire network to fail
in meeting performance levels. -
The structured cabling solution should be capable of
supporting every protocol and to support enough bandwidth for easy adoption
of newer technologies. Despite vendor claims that a particular solution will
not become obsolete for the next 20 years, one needs to be careful when
selecting such offerings. -
Most vendors today have basic structured cabling
components. However, there are other factors that need to be evaluated on
factors such as return on investment, speed and bandwidth availability,
capacity to keep up with developing standards and the price to performance
factor. -
While a CIO may end up buying the best of active
components such as hubs, switches, routers, workstations and software, the
performance would eventually upon the underlying cabling infrastructure. -
Most Indian enterprises view the cost of installation as
an additional burden as compared to MNCs who treat this as a long-term
benefit.
Network security
Network security is vital to minimize the risk of intrusions, both from
within and outside the network. A number of third party products provide
services that are important for protecting the business. These products help in
authentication, encryption and monitoring. A router with an access control list
(ACL) and network address translation is an organization’s first line of
defense. ACLs are router statements that limit who can access the network.
-
Firewalls are the second line of defense and should be
installed after the router but before the network. The job of the firewall
is to isolate corporate assets from each other and from the outside world in
a secure and manageable manner. -
Encryption can ensure data integrity or protect sensitive
information sent over insecure lines. Such protection is important for
remote access to important assets or as an extra protection when using the
organization’s Intranet.
Storage
As storage management gets more complex, enterprises need to look beyond
just buying storage devices. Back-ups, security, data recovery and contingency
planning are other critical factors that need to be considered.
Affordability and RoI: A cost-benefit analysis is essential. Even when you
have decided to implement network storage, the return on investment may not
justify the costs. A comprehensive SAN could cost crores of rupees, putting it
beyond the reach of most small enterprises.
Cost Components of Infrastructure Management |
|
Capital |
Operational |
Hardware cost |
Hardware upgrade cost |
Cost of EMS tools |
Cost of upgrading EMS tools |
Cost of ancillary tools/software |
Cost of upgrading other software/tools |
Implementation costs |
Premises’ rental |
Facility upgradation cost |
Manpower cost of network management staff |
Cost of agents and their installation |
Bandwidth/communication costs |
Costs of recruiting manpower |
Department overheads |
Training of manpower recruited |
Retention, and retraining of new staff |
Ease of configuration and interoperability: Companies implementing network
storage often buy hardware from one company, software from another and the
components needed to connect them, from a third. This could pose serious
interoperability problems, if you don’t check the compatibility of these
solutions.
Scalability, performance and upgrade: Your requirements are expanding at an
unpredictable pace. So it is essential to build systems that are highly
scaleable and allow easy upgrades in a non-disruptive manner.
Data integrity and security: Data being a company’s most valuable asset,
any loss of critical information can cripple a company’s operations. The lack
of industry standards also heightens concern about security. All necessary
safeguards must be built into your network architecture.
Vendor Support and Services: If you do not have in-house resources to manage
your storage, vendor support becomes all the more critical. As the solution
includes a combination of hardware and software, one should look for services
that include applications support.
Phases in |
Security |
Network integrators
CIOs while setting up their enterprise network infrastructure, need to look
into the following issues:
- The network has to cater to all the information requirements of the
organization; -
The network has to be available 24X7X365, Secure and
mobile (if necessary); -
The network has to be scalable and interoperable so that
any future alterations, modifications, or transformations can be undertaken; -
The network should be feature-rich and supported by
Quality of Service features like rate limiting, application prioritization
and server load balancing; and -
Last but not the least, the network has to be cost
effective and should provide sufficient ROI to the client.
Also, network integrators provide a range of services such as
drafting an e-commerce strategy, security services, electronic data interchange,
e-payment, virtual private networks, and Internet data center solutions. While
selecting a network integrator:
-
One should look for network integrators who have forged
alliances with global leaders to deliver the latest technologies at
competitive prices. Integrators should know all vertical segments and
technologies. -
The right strategy would require assessment, a process of
understanding the current infrastructure and assessing the current/long term
requirements. -
A network integrator (NI) should be called in to help to
choose and install the network. One should consider a NI if the network
connects more than 30 stations and if there is a need to connect stations on
different floors/buildings or there is a need to connect different
networks/computers. -
While searching for a NI, the best bet is to talk to
colleagues and friends who have a similar-sized network and have recently
installed a network with a NI.