ISOM Midterm
ISOM Midterm
ISOM Midterm
● Refers to the wide variety of planning actions used to ensure that a business infrastructure has
adequate resources to maximize its potential activities and production output under any
condition.
● Act of ensuring a business maximizes its potentials activities and production output
● Measures how much companies can achieve, produce or sell within a given time period
● Maximum throughput that a configuration item or IT service can deliver
Capacity Management
● Working overtime
● Outsourcing business operations
● Purchasing additional equipment
● Leasing or selling commercial property
Space Management
● Calculating the proportion of spatial capacity that is actually being used over a certain time
period
Goal: Ensure that cost-justifiable IT capacity in all areas of IT always exists and is matched to the current
and future agreed need of the business, in a timely manner.
Purpose: Provide a point of focus and management for all capacity and performance related issues.
CMIS Contents
● Business performance data
● Financial data
● Business transaction metrics
● Infrastructure upgrade costs
● Application transaction counts
● Power and cooling cost
● Invoices generated
● IT budget information
● IT service performance data
● Component utilization data
● Transaction response times
● Server performance metrics
● Transaction rate
● Network performance
● Workload volumes
● Data storage measurements
● Memory usage
Characteristics of CMIS
1. Openness
- goal of CMIS is to become the central hub for all performance-related data
- a good CMIS need to make it easy to het information in and out
- a comprehensive performance data regarding the infrastructure going in and efficient access to
that data for analysis and reporting purposes.
● Data collectors use the CMIS to store information
● Performance and other systems management tools use it to access data and share analysis
results
- should be possible to effectively instrument all the critical applications (custom application)
- should be able to implement custom analysis and reports
- should facilitate information sharing with Configuration Management Database (CMDBs),
chargeback application and other tools
- should be able to alert event consoles and service desk tools when adverse events are detected
1. Business-relevant Views
- CMIS should let tools analyze and report on enterprise IT infrastructure from:
○ a component useful for problem-solving and technology-
view, specific detailed planning
○ an IT service- help facilitate business-aligned analysis and
based view, reporting
○ a business
process view
- these views allows you to relate operational and planning results at many different levels
1. Real-time Data
- ability to detect and respond to performance bottlenecks will be hampered if your CMIS is
unable to collect and deliver performance data in real-time
1. Heterogeneous Coverage
- one advantage of CMIS is being able to manage the performance and capacity of all those
platforms from a single repository
- CMIS can handle data from the key platforms within your data centers
1. Automation
- a good CMIS has built-in automation to handle most of the repetitive task and provide interfaces
where you can automate other related task that are specific to your organization's needs.
1. Scalability
- CMIS must have the ability to scale up or down to meet the growing need of the organization
1. Efficiency
- best CMIS tools minimize their use of computing resources, networking bandwidth and require
fewer data storage to perform their work
1. Security
- prevents unauthorized changes or deletion of historical data
- permits you to restrict access to proprietary data stored in the CMIS (e.g. business lan to
preserve competitive advantage)
1. Support
- CMIS must have a capable support team available to assist you with the implementation and
ongoing maintenance of CMIS
E.g.
1. IOmeter - free, open-source utility originally developed by Intel that provides details about
processing by servers, clusters of servers, or individual end-user computers
IOPS (input/output operations per second) - basic measure of the transfer rate of data during
processing.
1. Emulation Programs - mimic application programs such as database management system
(DBMSes) to determine how a system is likely to perform under similar loads in production
environments
2. Application Emulators - include their own sets of test data to help ensure accurate and
consistent results across disparate equipment.
3. Hardware-based monitoring devices - focus on network performance and can provide
comprehensive information on most aspects of data movement.
Components
1. Control devices (servers with specialized software)
2. Network TAPS ( Network Test Access Points) - devices that physically hook into particular
elements of a network to capture information about data traffic as it occurs.
Memory
- a factor in capacity management
- servers and other devices use their installed memory to run applications and process data
Physical Space
- most commonly associated with capacity management
- focus generally on storage space for application and data
● Storage Systems
- that are near capacity will have longer response time, as it takes longer to locate specific data
when drives (hard disk/solid-state) are full or nearly full
● Processor and memory measurements
- it's important to monitor space usage in devices other than server and end-user PCs that may
have installed storage that's used for caching data.
● Virtualized DRP
○ Provides opportunities to implement disaster recovery in a more efficient and simpler
wat
○ Can spin up new virtual machine (VM) instances within minutes and provide application
recovery through high availability
○ Testing is easier to achieve
○ Plan must include the ability to validate that application can be run in disaster recovery
mode and returned to normal operations within the RPO and RTO
● Network DRP
○ Recovering network gets more complication as the complexity of the network increases
○ It is important to detail the step-by-step recovery procedure, test it properly and keep it
updated
○ Data will be specific to the network such as performance and networking staff
● Cloud DRP
○ Can range from a file backup in the cloud to a complete replication
○ Can be space, time and cost-efficient but requires proper management for maintenance
○ Manager must know the location of the physical and virtual servers
○ The plan must address security which is a common issue that can be alleviated through
testing
● Data Center DRP
○ Focuses exclusively on the data center facility and infrastructure
○ Operation risk assessment is a key element because it analyzes key components such as
building location, power systems and protection security and office space
○ Plan must address a broad range of possible scenarios
DRP Checklist/Steps
● Establish the range/extent of necessary treatment an activity and the scope of recovery
● Gathering relevant network infrastructure documents
● Identifying the most serious threats and vulnerabilities and most critical assets
● Reviewing history of unplanned incidents and outages and how they were handle
● Identifying current disaster recovery strategies
● Identifying the incident response team
● Management review and approve the DRP
● Testing the plan
● Updating the plan
● Implementing a DRP audit
Elements of DRP
● A statement if intent and disaster recover policy statement
● Plan goals
● Authentication tools (passwords)
● Geographical risk and factors
● Tips for dealing with media
● Financial and legal information and action steps
● Plan history
Communication Plan
● Another component of DRP
● Details how both internal and external crisis communication will be handled
○ Internal Communications
■ Alerts that can be sent using email, overhead building paging systems, voice
messages or text messages to mobile devices
■ Examples (instructions to evacuate the building, updates on the progress of the
situation
○ External Communications
■ Include instructions on how to notify family members in the case of injury or
death; how to inform and update key clients and stakeholders