Advertisment

Infrastructure Management: No Second Chances

author-image
DQI Bureau
New Update

Infrastructure management spans a vast gamut of issues, which

would include structured cabling, defining hardware requirements and software

applications. The CIO, however, should have a fixed path, set with clear

expectations, and link the investment in the solution to the needs of his

business.

Advertisment

From the technology perspective, infrastructure management

comprises major areas like networks, platforms (or servers), storage, databases,

middleware and security.

Structured cabling



A structured cabling system (SCS) comprises a set of cabling and

connectivity products that integrate the voice, data, video and various

management systems of a network, such as safety alarms, security access, energy

systems etc.

  • Structured cabling should have a modular design and

    different unit sizes, so that all needs including design are met.

  • In a cabling system, a single weak component — one not

    designed to operate within the system-can cause the entire network to fail

    in meeting performance levels.

  • The structured cabling solution should be capable of

    supporting every protocol and to support enough bandwidth for easy adoption

    of newer technologies. Despite vendor claims that a particular solution will

    not become obsolete for the next 20 years, one needs to be careful when

    selecting such offerings.

  • Most vendors today have basic structured cabling

    components. However, there are other factors that need to be evaluated on

    factors such as return on investment, speed and bandwidth availability,

    capacity to keep up with developing standards and the price to performance

    factor.

  • While a CIO may end up buying the best of active

    components such as hubs, switches, routers, workstations and software, the

    performance would eventually upon the underlying cabling infrastructure.

  • Most Indian enterprises view the cost of installation as

    an additional burden as compared to MNCs who treat this as a long-term

    benefit.

Advertisment

Network security



Network security is vital to minimize the risk of intrusions, both from

within and outside the network. A number of third party products provide

services that are important for protecting the business. These products help in

authentication, encryption and monitoring. A router with an access control list

(ACL) and network address translation is an organization’s first line of

defense. ACLs are router statements that limit who can access the network.

  • Firewalls are the second line of defense and should be

    installed after the router but before the network. The job of the firewall

    is to isolate corporate assets from each other and from the outside world in

    a secure and manageable manner.

  • Encryption can ensure data integrity or protect sensitive

    information sent over insecure lines. Such protection is important for

    remote access to important assets or as an extra protection when using the

    organization’s Intranet.

Storage



As storage management gets more complex, enterprises need to look beyond

just buying storage devices. Back-ups, security, data recovery and contingency

planning are other critical factors that need to be considered.

Advertisment

Affordability and RoI: A cost-benefit analysis is essential. Even when you

have decided to implement network storage, the return on investment may not

justify the costs. A comprehensive SAN could cost crores of rupees, putting it

beyond the reach of most small enterprises.

Cost

Components of Infrastructure Management

Capital

Expense

Operational

Expense

Hardware

cost
Hardware

upgrade cost
Cost of EMS

tools
Cost of

upgrading EMS tools
Cost of

ancillary tools/software
Cost of

upgrading other software/tools
Implementation

costs
Premises’

rental
Facility

upgradation cost
Manpower

cost of network management staff
Cost of

agents and their installation
Bandwidth/communication

costs
Costs of

recruiting manpower
Department

overheads
Training of

manpower recruited
Retention,

and retraining of new staff

Ease of configuration and interoperability: Companies implementing network

storage often buy hardware from one company, software from another and the

components needed to connect them, from a third. This could pose serious

interoperability problems, if you don’t check the compatibility of these

solutions.

Advertisment

Scalability, performance and upgrade: Your requirements are expanding at an

unpredictable pace. So it is essential to build systems that are highly

scaleable and allow easy upgrades in a non-disruptive manner.

Data integrity and security: Data being a company’s most valuable asset,

any loss of critical information can cripple a company’s operations. The lack

of industry standards also heightens concern about security. All necessary

safeguards must be built into your network architecture.

Vendor Support and Services: If you do not have in-house resources to manage

your storage, vendor support becomes all the more critical. As the solution

includes a combination of hardware and software, one should look for services

that include applications support.

Advertisment

Phases in

Purchase of Security Options

Security

products could be classified as ‘soft products’ or ‘non-technological

services’. For how to form an indicative path for security technology

acquisition and deployment for you enterprise, read on...



Preventive
: Technology

deployment starts with the initiation of IT systems into the business.

These technologies and methods help prevent a breach of security from

occurring. They operate with the objective of defeating known

incidents that have occurred.



Monitoring
: Monitoring

technologies should be deployed to facilitate a single point of

security controls for IT systems across the enterprise.



Enabling
: The

objective here is to create a security infrastructure that other

systems can use.



Integrative: Integrative
tools such as single sign-on (SSO) and enterprise security management

(ESM) provide the basis of integrating multiple business applications

by facilitating a shared security apparatus for applications across

the enterprise IT spectrum.

Network integrators



CIOs while setting up their enterprise network infrastructure, need to look

into the following issues:

  • The network has to cater to all the information requirements of the

    organization;
  • The network has to be available 24X7X365, Secure and

    mobile (if necessary);

  • The network has to be scalable and interoperable so that

    any future alterations, modifications, or transformations can be undertaken;

  • The network should be feature-rich and supported by

    Quality of Service features like rate limiting, application prioritization

    and server load balancing; and

  • Last but not the least, the network has to be cost

    effective and should provide sufficient ROI to the client.

Advertisment

Also, network integrators provide a range of services such as

drafting an e-commerce strategy, security services, electronic data interchange,

e-payment, virtual private networks, and Internet data center solutions. While

selecting a network integrator:

  • One should look for network integrators who have forged

    alliances with global leaders to deliver the latest technologies at

    competitive prices. Integrators should know all vertical segments and

    technologies.

  • The right strategy would require assessment, a process of

    understanding the current infrastructure and assessing the current/long term

    requirements.

  • A network integrator (NI) should be called in to help to

    choose and install the network. One should consider a NI if the network

    connects more than 30 stations and if there is a need to connect stations on

    different floors/buildings or there is a need to connect different

    networks/computers.

  • While searching for a NI, the best bet is to talk to

    colleagues and friends who have a similar-sized network and have recently

    installed a network with a NI.

Team DQ

Advertisment