IT infrastructure consists of all components that somehow play a role in overall IT and IT-enabled operations. It can be used for internal business operations or developing customer IT or business solutions.
Typically, a standard IT infrastructure consists of the following components:
- Hardware: Servers, computers, data centers, switches, hubs and routers, and other equipment
- Software: Enterprise resource planning (ERP), customer relationship management (CRM), productivity applications and more
- Network: Network enablement, internet connectivity, firewall and security
- Meatware: Human users, such as network administrators (NA), developers, designers and end users with access to any IT appliance or service are also part of an IT infrastructure, specifically with the advent of user-centric IT service developmen
A network switch is the device that provides connectivity between network devices on a Local Area Network (LAN). A switch contains several ports that physically connect to other network devices – including other switches, routers and servers. Early networks used bridges, in which each device “saw” the traffic of all other devices on the network. Switches allow two devices on the network to talk to each other without having to forward that traffic to all devices on the network.
Routers move packets between networks. Routing allows devices separated on different LAN’s to talk to each other by determining the next “hop” that will allow the network packet to eventually get to its destination.
If you have ever manually configured your IP address on a workstation, the default gateway value that you keyed in was the IP address of your router.
Firewalls are security devices at the edge of the network. The firewall can be thought of as the guardian or gatekeeper.
A set of rules defines what types of network traffic will be allowed through the firewall and what will be blocked.
In the simplest version of a firewall, rules can be created which allow a specific port and /or protocol for traffic from one device (or a group of devices) to a device or group of devices. For example: if you want to host your own web server and only limit it to only web traffic, you would typically have two firewall rules that look something like this:
|Source||Destination||Port / Protocol||Description|
|any||10.1.1.100||80 / http||Web traffic in|
|any||10.1.1.100||443/ https||Secure web traffic in|
The source is the originating device. In this case, any means ‘allow any computer to communicate’. Destination is the specific IP address of your internal web server. Port/Protocol defines what type of traffic is allowed from the source to the destination. Most firewall devices allow for a description for each rule that have no effect on the rule itself. It is used only for notes.
Firewall devices can get complicated quickly. There are many different types of firewalls which approach managing traffic in different ways. Detailed firewall capabilities and methods are beyond the scope of this post.
A network server is simply just another computer but usually larger in terms of resources than what most people think of. A server allows multiple users to access and share its resources. There are several types of servers.
- Perhaps the most common type of server is a file server. A file server provides end users with a centralized location to store files. When configured correctly, file servers can allow or prevent specific users to access files.
- Another common type of server is a directory server. A directory server provides a central database of user accounts that can be used by several computers. This allows centralized management of user accounts which are used to access server resources.
- Perhaps the most common type of server is a web server. Web servers use HTTP (Hyper Text Transfer Protocol) to provide files to users through a web browser.
- There are also application servers, database servers, print servers, etc.
The physical plant is all of the network cabling in your office buildings and server room/ datacenter. This all too often neglected part of your infrastructure usually is the weakest link and is the cause of most system outages when not managed properly. There are two main types of cabling in the infrastructure -CAT 5/6/7 and fiber optic. Each type of cabling has several different subtypes depending on the speed and distance required to connect devices.
By the strict ITIL definition, people are not considered part of the network infrastructure. However, without competent well-qualified people in charge of running and maintaining your infrastructure, you will artificially limit the capabilities of your organization. In larger organizations, there are specialty positions for each of the areas mentioned in this article. In smaller organizations, you will find that the general systems administrator handles many of the roles.
Server rooms / Data center
The server room, or data center (in large organizations), can be thought of as the central core of your network. It is the location in which you place all of your servers and usually acts as the center of most networks.
This is perhaps the most “gray” of all infrastructure components. However, I consider server operating systems and directory services (like MS Active Directory) to be part of the infrastructure. Without multi-user operating systems, the hardware can’t perform its infrastructure functions.
DAVE LAZOR EXPLAINS WHY A SOPHISTICATED IT INFRASTRUCTURE IS IMPORTANT
Most start-ups and small businesses that aren’t technology-based companies start out with a “DIY” infrastructure that gets the job done – they invest in basic hardware like desktop computers, laptops, a simple phone system and a router for a solid Internet connection. Delivering services and communicating with employees, suppliers and customers is typically accomplished through cloud applications that allow you to share files over the Internet, like Dropbox, Evernote, and Google Apps for Business.
But as the company grows, issues of security, connectivity and overall productivity are increasingly questioned. Computing speed and reliability are important, but what about system disruptions and security breaches? Cyberattacks on small businesses are up 300 percent since 2012 due to weaker online security and their ability to be an entry point to other, perhaps larger businesses’ sensitive data.
Ensuring that your IT infrastructure is reliable and secure is rudimentary. To gain a real competitive advantage, a strategic infrastructure is vital. Smart investments in hardware, software, network services and people to manage it all could be the difference between a profitable company and a failing one. Taking shortcuts to save money is unwise – even something as simple as poor cabling could make a fancy software application unusable.
To tackle the next-generation IT challenges, business leaders need to get involved in the infrastructure conversation, elevating the importance of IT infrastructure and making the right investments for the future.