There are many definitions as to what IT Infrastructure is. It can be formally defined as all of the hardware, software, networks, facilities, etc that are required to develop, test, deliver, monitor, control or support IT. The term IT Infrastructure includes all of Information Technology, but not the associated people, processes and documentation. In general, the IT infrastructure serves as the foundation upon which mission/programs/project specific systems and capabilities are built. It essentially underpins the distributed operational and administrative computing environment.
Many have a hard time understanding the importance of IT Infrastructure because it is usually hidden. It is mostly invisible and is taken for granted. For example, user of IT systems know that applications are important, however, the way they are implemented or where they are deployed is invisible to them . For business analysts, how information is managed using systems is invisible to them. Lastly, for systems managers it’s the electricity that supplies their machines that is invisible to them.
The components that make up IT Infrastructure are End User Devices, Operating Systems, Virtualization, Storage, Networking, Servers and Datacenters.
- End user devices are the devices used by end users such as PC’s, laptops, etc.
- Operating systems, such as Windows, are collection of programs that manage a computer’s storage, memory, devices and file system.
- Virtualization acts as an abstraction layer between the operating system and the server hardware.
- Storage can be correlated to items such as hard disks and tapes.
- Networking is what allows all the components of the infrastructure to be connected.
- Servers are the main physical processing units. These units are located in the datacenter, which provide a power supply, cooling systems and security measures.
Although there are many definitions, the characteristics that we can agree on for IT Infrastructure are that it provides services to applications, is usually shared by multiple applications, and that it is more static and permanent than the applications running on it. Note that the department owning the infrastructure components is a different department than the one owning the applications using it. Lastly, it is widely assumed that availability, performance and security are the most essentials characteristics needed in IT infrastructure architecture.
Networking
A network is an arrangement of devices that can communicate with one another. An example of a network is the PSTN over which residential and commercial telephones and modems communicate with one another. It is one of the most important building blocks of any infrastructure. It includes components such as routers, switches, firewalls, WAN (wide area network), LAN, dial-in, Internet access and VPN’s (Virtual Private Network) and services such as DNS, DHCP and time services. These are all necessary for the infrastructure to work.
Automation
We can define automation from an infrastructure standpoint as is the use of IT controls to supervise and carry out every-day management functions. Network automation can occur in many different ways. These include script automation and cloud computing. Script creation can allow you to automate very manual tasks. Cloud computing allows an IT team to automate most datacenter tasks and duties. As stated in the Chemical Engineering Editor’s Page, the internet of things (IoT) movement is beginning to automate everyday objects and tasks. Benefits of these types of automation include more time to focus on important IT tasks. As well, in terms of cloud computing, it means less cost and expertise to uphold a datacenter.
However, anytime you automate you can run into many issues. One disadvantage is in terms of security. For instance, when choosing cloud computing, one has to make sure that the service chosen has very detailed security protocols. Moving your data centers over to the cloud essentially means relinquishing control of its security and into the vendor’s hands. Security is also an issue with the IoT movement. For instance, about 2 weeks ago, Dyn suffered a DDOS attack that can be attributed to internet connected cameras and DVR’s. This was one of the largest denial of service attacks that have happened. Second, although the IoT movement may be advancing technology, it is also taking away privacy. As everyday objects connect to the internet, it began to track data on usage and personal information of its users. Soon there will be a time when all everyday movements will be tracked and recorded.