IT infrastructure hardware, software, and networking
Introduction
IT, a very well know key of 21st century. In this era of the technological stack, we are moving towards the digitization. And this count is getting increased every day and every night. This is just because Information Technology not just enable the business platform but it helps any organization in a bulk package. IT can make management easier than expected. We can use this IT to take our business online. IT can enable the ability to reach a huge amount of audience or communities. To comply with this and discuss in detailed I have chosen a very well know and popular organization name "Whispir.com, inc". Whispir, deals in the information technology services. This organization is not just limited to Australia but it also has branches abroad, like in USA and Singapore.
Web Design Development
Application Development
CMS Development
LMS Development
Cloud Services
Enterprise System (Organization TASK Management)
SEO and Digital Marketing
IT Consultant
Above mentioned services are not just for their clients, but also they are using most of the services for their internal employee as well. Let's pick the Enterprise System (Organization TASK Management). This organization has various departments, teams, and members. The moment an employee or staff entered this organization they start their daily routine with a biometric system. This system uses to track the time in, time-out, working hours in the office of the employees. Each department uses information technology to track its assign task on a daily basis. This organization is build using the PHP, MySQL, HTML, JavaScript, jQuery etc. This application is hosted on the cloud. As we all know the cloud-based application come up with various advantages with it. There is a universal system for the organization staff. The staff can take the task from this system on the basis of the priority to start processing with. They pick the task from that system on a daily basis. Change the task status from Open to in-progress, in-progress to resolved and resolved to verified. They enter the time taken for any particular task again its id. In this system, all the employee data is already there with their team, department, project details, manager details, etc. This is how an employee of this organization uses a system to manage their daily routine task. The moment any employee change the status or do any activity on the system it automatically sends an email to the reporter of that task or ticket. Manger can see all the report of their department members as well to track the work progress report.
Whispir organization is an IT organization. It comes up with the various IT services to its customer as mentioned in the above section. Since this is an IT enable organization, there must have been the network or the internet to this organization to deal with their services. Every organization needs to have a good set up a strong network. A network must be secure and powerful enough. The network is a set of protocol to connect a device in such a way so that they can share the data, send a packet , etc.
There are various network devices an organization uses in their network.
To access anything in a network there is a setup of process internally, this process can be express as an OSI model. OSI is a short form of the Open System Interconnect.
This OSI model has 7 layers with it. The moment we open the home page of the organization website we are on the top 3 layers as mentioned in the above diagram that is called the Software Layer. First of all we need to understand it is not always possible for OSI layer to run in a linear manner to get the job done.
Home Page: - Application layer and presentation, we are seeing the home page of the website.
Whatever we are able to see on that page is a part of presentation layer. We are seeing something on the page, HTTP, HTTPS, FTP, SFTP are being used that is application layer. We are receiving this home page with some data just because we have made some request.
We request for home page, our request goes in encrypted form to the network, network sends back the data in the encrypted form and the presentation layer is responsible to show the data after decrypting the same.
Whenever we request that is a session. This recognizes from where the request coming and send the data packet back to the client as per the request made by the client. This is what is responsible for establish, maintain and the end the connection session as per the need.
Transport Layer, this receives the data from the session and segment it. It identified the page URL and the port number of the page. It is responsible for requesting the right segment or the port. It performs the error checking. This layer plays the role of mediator of the above 3 layers of the OSI model and the 3 other remaining layers.
Network Layer- this is responsible for the data packet between the network. Whenever we open this home from any system, that system will be designated with a unique system id that is called IP address. Network layer uses the IP address to transmit the data as per the request made.
Data Link Layer - It takes the data from the network layer. This layer performs physical addressing. This enables data transmission via the various medium of data transfer.
Physical Layer - This is the layer where data is actually stored. If the website content is a database-driven or static page, It will be stored on a physical device. The above layer is responsible for taking the data from the physical stored devices.
There have been thousands of new tools and the technologies have been invented in the last decade in the information technology. This technology can take the world to a new height. Here is the list of advancement has been made with respect to the time.
Reliability is getting increase with respect to the time.
Security, newly invited technologies are getting more secure comparatively.
Time and cost-saving.
More optimized
1. Lientz, B.P., Swanson, E.B. and Tompkins, G.E., 1978. Characteristics of application software maintenance. Communications of the ACM, 21(6), pp.466-471.
2. Klein, J. and Herrod, A., Symbol Technologies LLC, 2004. Mobile terminal with integrated host application software. U.S. Patent 6,714,969.
3. Zuo, J.M. and Mabon, J.C., 2004. Web-based electron microscopy application software: Web-EMAPS. Microscopy and Microanalysis, 10(S02), pp.1000-1001.
4. Briscoe, N., 2000. Understanding the OSI 7-layer model. PC Network Advisor, 120(2).
Day, J.D. and Zimmermann, H., 1983. The OSI reference model. Proceedings of the IEEE, 71(12), pp.1334-1340.
5. Handel, T.G. and Sandford, M.T., 1996, May. Hiding data in the OSI network model. In International Workshop on Information Hiding (pp. 23-38). Springer, Berlin, Heidelberg.
Reichmeyer, F.X., Luciani, J.V. and Squire, M.B., Nortel Networks Ltd, 2001. Method and apparatus for remotely configuring a network device. U.S. Patent 6,286,038.
6. Fuh, T.F., Fan, S.H. and Qu, D., Cisco Technology Inc, 2002. Local authentication of a client at a network device. U.S. Patent 6,463,474.
7. Borella, M.S., Schuster, G.M., Mahler, J.J. and Sidhu, I., 3Com Corp, 2001. Protocol and method for peer network device discovery. U.S. Patent 6,269,099.
8. Alienor & Howarth, A., 2018. Network Layers Explained: OSI & TCP/IP Models [with examples]. Plixer. Available at: https://www.plixer.com/blog/network-layers-explained/ [Accessed August 10, 2019].
9. Anon, Cloud Communications Platform & Messaging Workflows. Whispir. Available at: https://www.whispir.com/ [Accessed August 10, 2019].
1,212,718Orders
4.9/5Rating
5,063Experts
Turnitin Report
$10.00Proofreading and Editing
$9.00Per PageConsultation with Expert
$35.00Per HourLive Session 1-on-1
$40.00Per 30 min.Quality Check
$25.00Total
FreeBonanza Offer
Get 40% Off *
on your assignment today
Doing your Assignment with our samples is simple, take Expert assistance to ensure HD Grades. Here you Go....