0% found this document useful (0 votes)
6 views

System Management Areas

The document defines and categorizes the different systems management areas required to manage the CityTime infrastructure. It discusses 12 management areas including asset, network, operating system, database, application, availability, change, job scheduling, security, storage, service and IT service desk management.

Uploaded by

airace
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

System Management Areas

The document defines and categorizes the different systems management areas required to manage the CityTime infrastructure. It discusses 12 management areas including asset, network, operating system, database, application, availability, change, job scheduling, security, storage, service and IT service desk management.

Uploaded by

airace
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 8

CITYTIME R1B - INFRASTRUCTURE MANAGEMENT

CityTime Release 1B

SYSTEM MANAGEMENT AREAS

Submitted by
Satish Jipster
REVISION HISTORY

Date Version Description Author


2/09/2004 0.1 Initial Draft Satish Jipster
Non-Functional CityTime Release 1B
Requirements NFR Categories

TABLE OF CONTENTS
1. Introduction............................................................................................................................1
1.1 PURPOSE AND SCOPE.......................................................................................................1
2. “MANAGEMENT VS MONITORING” DEFINED.......................................................................1
3. SYSTEMS MANAGEMENT AREAS CATEGORIZED..................................................................2
4. MANAGEMENT AREAS DEFINED............................................................................................2
4.1 ASSET MANAGEMENT......................................................................................................2
4.2 NETWORK MANAGEMENT................................................................................................2
4.3 OPERATING SYSTEM MANAGEMENT................................................................................3
4.4 DATABASE MANAGEMENT...............................................................................................3
4.5 APPLICATION MANAGEMENT...........................................................................................3
4.6 AVAILABILITY AND PERFORMANCE MANAGEMENT........................................................3
4.7 CHANGE MANAGEMENT...................................................................................................4
4.8 JOB SCHEDULING.............................................................................................................4
4.9 SECURITY MANAGEMENT................................................................................................4
4.10 STORAGE MANAGEMENT.................................................................................................5
4.11 SERVICE MANAGEMENT...................................................................................................5
4.12 IT Service Desk...............................................................................................................5

Confidential i
Non-Functional CityTime Release 1B
Requirements NFR Categories

1. INTRODUCTION
The City of New York Office of Payroll Administration (OPA) has engaged Science
Applications International Corporation (SAIC) to implement a Citywide Time and
Attendance-reporting project referred to as CityTime
The CityTime Architecture components include
 Polling / Presence PCs
 DCDs - Data Collection Device
 Routers, Switches, Firewalls, Load Balancers
 Windows Servers, Unix Servers-Solaris
 EMC Storage Devices
 Oracle –Database
 Web / Internet Components
 Mainframes
 Web, J2EE Application

1.1 Purpose and Scope


Managing CityTime Infrastructure would require a variety of Monitoring and
Management Tools in different IT management areas. In order to analyze requirements,
propose recommendations and evaluation criteria the first step would be to define the
management areas. The Purpose of this document is to categorize and define the
“System Management areas”.

2. “MANAGEMENT VS MONITORING” DEFINED


Managing the CityTime R1B Infrastructure would be a combination of People, Processes
and Tools & Technologies. Most of the industry leading Monitoring Tools is capable of
performing Management as well. In this document the term “Management” would be
used instead of “Monitoring” because in real world there isn’t always a distinct line
separating the two. The Monitoring tool can be a Management Tool when it is
customized and by adding people and processes to it.
“Monitoring” is observational — you look at what is occurring.
“Management” is the ability to do something about on what you’re monitoring.
Management tools are those that either take action on their own, or enable an IT manager
to take action.
Example
“A performance monitor, merely registers what’s happening performance wise,”
“Performance management would observe performance trends and then would take some
action if performance wandered out of acceptable bounds.”

Confidential 1
Non-Functional CityTime Release 1B
Requirements NFR Categories

3. SYSTEMS MANAGEMENT AREAS CATEGORIZED


Based on the CityTimeR1B architectural components and Operational support
groups, the System Management Areas are categorized as following

 Asset Management
 Network Management
 Operating System Management
 Database Management
 Application Management
 Availability and Performance Management
 Change Management
 Job Scheduling
 Security Management
 Storage Management
 Service Management
 IT Service Desk

4. MANAGEMENT AREAS DEFINED

4.1 Asset Management


This includes products that provide one or all of the following: asset discovery, asset
management, an asset database/repository, asset portfolio management, tracking of
purchases, leases, contracts and disposal pertaining to IT assets including hardware and
software.

4.2 Network Management


These are applications designed to isolate and resolve faults on the network, measure and
optimize performance, manage the network topology, track resource utilization over time,
initially provision and reconfigure elements, and account for network elements.

Confidential 2
Non-Functional CityTime Release 1B
Requirements NFR Categories

4.3 Operating System Management


Operating Systems Management Tools help reduce downtime by proactively alerting
administrators of critical incidents and by helping them resolve problems that impact
systems or application availability. These tools can manage UNIX, Linux and Windows
NT, Windows 2000 and Windows Server 2003.

4.4 Database Management


Included here are tools for monitoring and diagnosing problems with databases, for analyzing and
improving the performance of databases, and for routine administration of databases, including
configuration changes. Examples include DBMS monitors, SQL turners, space tuners, reorg
tools, utilities, loader/unloaders and many others, as well as suites that may include several of the
above.

4.5 Application Management


Included here are tools for monitoring and diagnosing problems with packaged (and
custom Web) applications, for analyzing and improving the performance of applications,
and for routine administration of applications, including some configuration changes.
Examples include tools for managing MQ Series, Web servers, J2EE and .NET
application servers, ERP applications, CRM applications, and e-commerce applications,
etc. Some vendors offer suites that manage the infrastructure behind the application as
well as the application in order to provide end-end Application performance
management. They may include management of DBMSs, systems and network links as
all-inclusive features.

4.6 Availability and Performance Management


These are software products, including enterprise-wide event consoles that are used to
monitor and manage the performance and availability of systems, networks, mainly
beneath the DBMS and Application layers. Event management (fault management) tools
are used to collect, report and diagnosis problems (faults) identified in the environment.
Root-cause analysis tools for networked systems are in this segment. Also included in
this category are the Tools that are capable of monitoring end-end application
availability, response time and performance. The combination of tools in this category
can be used to
 Detect bottlenecks
 Capacity Planning
 Generate Reports on Availability and Performance etc.
 Perform Root-Cause-Analysis

Confidential 3
Non-Functional CityTime Release 1B
Requirements NFR Categories

4.7 Change Management


Change Management solution enables users to automatically link incidents, problems,
and changes, then define root causes, create a plan for change, assess business risks, and
obtain approvals. Change Management process includes

 Configuration Management

 Problem Management

 Incident Management

4.8 Job Scheduling


These are tools that supervise a logical process (several jobs or programs) as they execute
in a mainframe or distributed environment, providing scheduling and dependency
management of the process as it runs, mainly in sequence, across disparate systems,
geographies and applications. The tools in this category are used for "batch integration"
of heterogeneous applications and datastores.

4.9 Security Management


The products for security management are grouped under following subcategories

4.9.1 Identity and Access Management


Identity and access management software products are used to create and manage user
identities and to provide access to system resources based on predefined criteria. This
segment includes Web-based management products as well as single-sign on (SSO) and
other secure provisioning products.

4.9.2 Encryption
Encryption software products provide a mechanism to systematically encode and decode
data so that an unauthorized party cannot decipher it.

4.9.3 Public-Key Infrastructure (PKI)


PKI software products are necessary to manage and enable the effective use of public-key
encryption technology

4.9.4 Antivirus
Antivirus software products scan, detect and correct viruses and malicious mobile code at
the desktop, at the server level and, increasingly, embedded in other devices in the
network.

Confidential 4
Non-Functional CityTime Release 1B
Requirements NFR Categories

4.9.5 Intrusion Detection


Intrusion detection products monitor network traffic through observation of actions,
security logs or audit data to detect, identify and isolate attempts to make inappropriate or
unauthorized access to system resources.

4.9.6 Other Security


This segment contains the rest of security software, including but not limited to such
products as firewall and virtual-private networks (VPN), Web content security and
security

4.10 Storage Management


Products in this category provide basic data organization functions such as file systems,
volume management and physical replication to ensure data integrity and availability by
offering fast failure recovery and data redundancy. Subsegments include:
 Storage infrastructure products
 Data management products
 Enterprise storage resource management

4.11 Service Management


Service Level Management Software tools focus on comparing the expected quality of
resource availability for a “service” with actual results. The tools use historical data and
include features such as baselining, trend analysis, historical usage analysis, service-level
reporting, and, in some cases, interfaces to chargeback and billing systems. Included here
are service level agreement tools, and customer response time measurement tools.

4.12 IT Service Desk


Service Desk products can range from simple call tracking/trouble ticketing products to
sophisticated solutions for the complete business management of an IT department’s or
an outsourcer’s people, processes and tangible assets.

Confidential 5

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy