Chapter3_eGovernment Infrastrure Development
Chapter3_eGovernment Infrastrure Development
E-GOVERNMENT
INFRASTRUCTURE DEVELOPMENT
HPP
Syllabus Topics
Network Infrastructure;
Computing Infrastructure;
Data centers;
E-Government Architecture;
Interoperability Framework;
Cloud Governance;
Syllabus Topics
E-readiness;
Data System Infrastructure;
Legal Infrastructural Preparedness;
Institutional Infrastructural Preparedness;
Human Infrastructural Preparedness;
Technological Infrastructural Preparedness
E-Governance Infrastructure
A set of basic services and tools that enables the development and execution of
electronic public services ( e-services).
It provides services that are typically used by many services (e-services).
Data Centers
E-Government Architecture
Computing Infrastructures
Network Infrastructure
Network infrastructure is the hardware and software resources of an entire network that
enable network connectivity , communication operations and management of an
enterprise network and establish the connectivity to all the entities of digital governance.
Network infrastructure is typically part of the IT infrastructure found in most enterprise IT
environments.
The entire network infrastructure is interconnected and can be used for internal
communications, external communications, or both.
Network Infrastructure
It Provides the communication path and services between users, processes ,applications,
services and the internet. The entire network infrastructure is interconnected and can be
used for internal communications, eternal communications or both
A typical network infrastructure includes
a) Networking Hardware
b) Networking Software
c) Networking Services
Network Infrastructure
1. Networking Hardware:
Networking hardware, also known as network equipment or computer
networking devices, are electronic devices that are required for
communication and interaction between devices on a computer
network.
Specifically, they mediate data transmission in a computer network.
Units that are the last receiver or generate data are called hosts, end
systems, or data terminal equipment. Different Networking Hardware
is described below:-
Network Infrastructure : Networking Hardware:
a) Routers : A router is an electronic device that interconnects two or more computer networks
and interchanges packets of data between them. Each data packet contains address
information that a router can use to determine if the source and destination are on the same
network, or if the data packet must be transferred from one network to another. If you have a
LAN that you want to connect to the Internet, you will need a router to serve as the translator
between information on your LAN and the Internet
b) Switch : A switch is a hardware device that connects multiple devices on a computer
network. A Switch contains more advanced features than Hub. The Switch contains the
updated table that decides where the data is transmitted or not. The switch delivers the
message to the correct destination based on the physical address present in the incoming
message. A Switch does not broadcast the message to the entire network like the Hub. It
determines the device to whom the message is to be transmitted. Therefore, we can say that
switch provides a direct connection between the source and destination. It increases the speed
of the network.
Network Infrastructure : Networking Hardware:
c) LAN cards : A LAN card connects a computer to a network. LAN cards are typically built
into your computer. You can connect to the network via an Ethernet cable, usb, or wirelessly.
LAN cards also make it possible to connect many different computers together through the
LAN.
d) Hub : A Hub is a hardware device that divides the network connection among multiple
devices. When a computer requests some information from a network, it first sends the
request to the Hub through cable. Hub will broadcast this request to the entire network. All
the devices will check whether the request belongs to them or not. If not, the request will be
dropped.
e) Cables : Network cables are used to connect and transfer data and information between
computers, routers, switches, and storage area networks. These cables are essentially the
carrier or media through which data flows. There are different types of communications
cables, and the appropriate type to use will depend on the structure and topology of the
overall architecture of the system.
Network Infrastructure : Networking Software
Networking software is a foundational element for any network. It helps administrators deploy, manage,
and monitor a network. Traditional networks are made up of specialized hardware, such as routers and
switches, that bundle the networking software into the solution.
a ) Network operations and management : It manages, automates, and ensures compliance for Physical,
Virtual, and Software-Defined Networks. It is the first heterogeneous network management solution to
provide unified management for modern networks.
b )Operating systems : An operating system is the most important software that runs on a computer. It
manages the computer's memory and processes, as well as all of its software and hardware.
It also allows you to communicate with the computer without knowing how to speak the computer's language.
Without an operating system, a computer is useless.
c) Firewall : A firewall is a system designed to prevent unauthorized access to or from a private network.
You can implement a firewall in either hardware or software form, or a combination of both. Firewalls
prevent unauthorized Internet users from accessing private networks connected to the internet, especially
intranets.
Network Infrastructure : Networking Services
A networking service is a low-level application that enables the network to perform more than basic
functions.
a ) T-1 Line : A TI line is a communications transmission service that uses 2 twisted pair copper wires to
transmit and receive data or voice traffic. A T1 line can transmit data at a speed of 1.544 Mbps.
b) DSL : Stands for "Digital Subscriber Line." DSL is a communications medium used to transfer digital
signals over standard telephone lines. Along with cable Internet, DSL is one of the most popular ways ISPs
provide broadband Internet access.
c) Satellite : A satellite is an object in space that orbits or circles around a bigger object.
There are two kinds of satellites: natural (such as the moon orbiting the Earth) or artificial (such as the
International Space Station orbiting the Earth).
Network Infrastructure : Networking Services
The End-User Computing group consists of two teams that provide personal computer management,
support, and assistance to faculty and staff, in addition to academic computer labs and classroom
management.
The End-User Computing hardware team is the "hands and feet" for CCS. This team provides guidance,
recommendations, and assists, faculty and staff, with personal computer, printer, and other device
acquisition needs. The team also provides personal computer operating system imaging and
application setup and support, including hardware installation and connectivity to the network.
The End-User Computing infrastructure team provides back-end management and support for a
number of key applications, including Microsoft Active Directory, used to provide authentication and
rights access to services such as network shares and other services. This team is responsible for
managing the printing infrastructure for administrative networked printers and academic/lab printers.
The End-User Computing group, as a unit, works very closely with other groups within CCS and other
departments, to ensure that the best solutions and services are delivered in a secure and manageable
way.
Computing Infrastructure : Server and Storage Services
The Server and Storage Services group is responsible for the CCS-managed data centers, servers, and
storage systems that provide infrastructure resources to applications and services used by staff, faculty,
and students.
The Server and Storage Services group is responsible for optimizing the operations within the data
center, including the power distribution from UPS systems to allow power redundancy sources to data
center equipment, as well as efficient cooling within the data center.
The Server and Storage Services group is also responsible for establishing standard server and
storage platforms and for the management of the hardware and software required to integrate these
platforms to deliver an efficient, scalable, and cost-effective infrastructure capable of supporting
layered services that consume server and storage resources, including core applications.
The Server and Storage group also manages the virtual server infrastructure which is a very scalable
platform used to deploy virtual servers for a variety of core services delivered by CCS, as well as for
many departments throughout the University.
This group also provides backup & restore solutions that protect the data hosted within our data
centers.
Data Center
• Data center design includes routers, switches, firewalls, storage systems, servers, and
application delivery controllers.
• Because these components store and manage business-critical data and
applications, data center security is critical in data center design.
• Together, they provide:
• Network infrastructure. This connects servers (physical and virtualized), data center
services, storage, and external connectivity to end-user locations.
• Storage infrastructure. Data is the fuel of the modern data center. Storage systems
are used to hold this valuable commodity.
• Computing resources. Applications are the engines of a data center. These servers
provide the processing, memory, local storage, and network connectivity that drive
applications.
Core components of a data center
• GIDC is without a doubt the leading hosting service provider in Nepal.One and only
one government data center of Nepal to date.
• It is a government-owned server that hosts government websites portal, MIS, and
other.
• It was set up with the collaboration of the Korea International Cooperation
Agency(Koica) and World Friends Korea in 2008 AD.
• Nepal Government has this primary data center inside the Ministry of Home
Affairs(गहृ मन्त्रालय) in Singha Durbar.
• Disaster Recovery Site is located in Hetauda and this site is established with the aim
to increase security and availability of government and citizens data.
Objectives of GIDC
Fig: Overall
E-Government
Architecture
Structure
E- Government Architecture
1) Presentation layer
The presentation layer identifies and describes the system users, who require
access to government information at different capacities, and the channels
through which information can be accessed.
During system development, one is required to explicitly identify the
government user, the system is intended to serve, and also the means through
which this information is to be accessed so that the system can be tailored to
meet these requirements.
It manages the user’s interface with the system. If a pro- project is to be
successful, different stakeholders need to be identified at the beginning,
involved in the initial stages and kept involved throughout development and
implementation.
E- Government Architecture
The service classification sub-layer classifies service components according to how they
support business and performance objectives e.g ERPS, CRMs. It serves to identify and
classify horizontal and vertical service components supporting government and their IT
investments and assets.
It is organized across horizontal service areas independent of the business functions,
providing a leverage-able foundation for the reuse of applications, application
capabilities, and business services.
E- Government Architecture
b) Data standardization sub-layer
The data standardization sub-layer is flexible and standard-based to enable information sharing and
reuse across the government via the standard description and discovery of common data and the
promotion of uniform data management practices. It provides a standard means by which data may
be described, categorized, and shared. These are reflected- ed within each of the three standardized
areas;
Data descriptions:- Data descriptions provide a means to uniformly describe data, thereby supporting
its discovery and sharing.
Data context:- Data facilitates the discovery of data through an approach to the categorization of
data according to taxonomies.
Data sharing:- Data sharing supports the access and exchange of data; where access consists of ad
hoc requests (such as a query of data access asset) and exchange consists of fixed, recurring
transactions between parties, enabled by capabilities provided by both the data context and data
description standardization areas.
E- Government Architecture
5) Technology architecture layer
categorizes the standards and technologies that support and enable the delivery
of service components and capabilities.
It also unifies existing agency technologies and e-government guidance by
providing a foundation to advance the reuse and standardization of technology
and service components from a government-wide perspective.
So, an e-government architecture model for a devolved government is developed.
It shows clearly how government can redesign their business processes based on
the information and government policy to develop software. For a devolved
government that operates through consultation and collaboration interoperability is
of great value.
GEA(Government Enterprise Architecture)
eGIF provides the know how to achieve interoperability of data and information within and
outside the government.
It enables any ministry/agency to provide and receive information and integrate its processes
with other agencies using a predetermined framework.
Many people and bodies (industries, standards organisations, software and hardware vendors,
analysts etc.) have different views on standards for ensuring interoperability.
The success depends on choosing the right set of technical standards and policies that are
suitable to the environment. However technical standards in eGIF alone cannot ensure
interoperability.
Each organisation‘s process, collaborative environment, common applications, development of
semantics are other key factors to ensure interoperability. An analogy to eGIF is the road
/traffic rules. It would be inefficient and cumbersome to adhere and agree to road/traffic rules
every time a vehicle encounters another vehicle.
Standards like traffic rules will set the base to achieve common understanding and uniformity
e-Government Interoperability Frameworks (e-GIFs)
Cloud Governance is the people, process, and technology associated with your
cloud infrastructure, security, and operations.
Governance involves a framework with a set of policies and standard
practices. This could include policies for cost optimization, resiliency, security, or
compliance.
Is a framework to govern the use of cloud services, not block them from using
these services
A Cloud framework includes people, process, and technology while ensuring
security, cost management and deployment acceleration
Cloud Governance
Cloud Governance refers to the structures, policies, and systems for the direction,
control, and activity monitoring of the company.
It is the system that defines the roles and responsibilities of all the level of
management, considers the regulatory framework and risk management.
Cloud governance is the system directed towards controlling business activities by
providing data security, data management, and authorized access and modification
of the data to avoid operational and financial loss. It also assists in risk management
associated with cloud computing.
Cloud governance provides the set of principles to the management for the effective
and efficient functioning of the system. It enables the achievement of the objectives of
the organization. The efficient utilization of resources helps in the reduction of the
cost.
Cloud Governance framework: Key Benefits
Controlled Access
By selecting who owns each area of asset and software management cloud governance plan
will build necessary limits on who can access and impact
Reduce Security Risks
Help us to identify vulnerabilities in our system and establish metrics to measure the impact of
security measures
Enhanced Compliance Readiness
Allows us to build compliance review and standards into our processes and architecture
Lower Costs
Automation of Works , automated workflows reduces manpower and reduced manpower
means reduced cost
Cloud Governance : Risks
Public Cloud:
all customers can share the same infrastructure pool with limited configuration, security protections
and availability variances. The customers take benefit from economies of scale, because
infrastructure costs are spread across all users.
Private Cloud (also known as internal cloud):
cloud infrastructure dedicated to a particular organization which it is not shared with other
organizations. It will require the organization to reevaluate decisions about existing resources.
Private clouds are more expensive but also more secure when compared to public clouds.
Hybrid Cloud:
These Clouds are a composition of two or more clouds to take the advantages of multiple
deployment models such as increasing the flexibility of computing.
Community Cloud:
means sharing computing infrastructure by organizations of the same community.
Cloud computing and E-Government
Cloud computing is used to help the E-governments in providing best possible services
to its stockholders i.e. citizens and businesses, and to reduce the costs by reducing
repetitive operations and increase the effective use of resources, in the global arena.
Cloud computing technologies have many benefits in different parts of E-government.
These benefits discussed in the following points.
Scalability: Cloud computing resources such as CPU, servers, hard drives can be
purchased automatically in any quantity at any time to fit growing number of users
Availability and Accessibility: cloud computing applications and information are
hosted online therefore it has high availability and citizens can use them at anytime and
from anywhere
Cost Saving: cloud computing systems do not need to purchase and install the ICT
equipments and software on their own building
Cloud computing E-Government
Backup and Recovery: Since all the data is stored in the cloud, backing it up and
restoring is much simpler than traditional way [50]
Unlimited Storage. Storing information in the cloud gives you almost unlimited
storage capacity.
Green technology: Cloud computing is relatively good in energy consumption and
provides eco-systems through virtual services
Due to cloud computing benefits as mentioned above, many countries have launched
E-governance services using cloud computing.
Cloud computing in Government of Nepal
Government Cloud is a cloud platform which provide free cloud infrastructure facilities to the
government bodies.
GCloud provides the tools and technologies to abstract the underlying infrastructure in an easy and
standardized consumption model.
GCloud manages virtual and physical Compute, Network and Storage technologies. It provides APIs
and tools to access these resources in an agile and programmatic manner.
This standardized abstraction helps prevent users from being locked into a specific technology or tool.
Cloud computing is actually working to help break down the barriers of many governments to enter
new phase of collaboration and partnering, sharing services, and pooling of resources.
It offers an effective way to share information between citizens, reducing efforts in providing services,
budget management and cost effective.
Cloud computing in Government of Nepal
https://doit.gov.np/en/spage/g-cloud
https://portal.gcloud.gov.np
Also
NITC has providing virtualization and cloud service to the Nepal’s government agencies
Nepal Government Cloud is facilitated inside the Government Integrated Data Center
(GIDC) and looked after by National Information Technology Center (NITC) and DOIT
Cloud computing in Government of Nepal
Infrastructure -
Human Resource
Services
Importance of e-readiness
Using an e-readiness model:
Will Help formulating strategic plans based on identified parameters.
Justify projects and their dependencies
Step1: Articulate the e-government vision and strategy. Prepare a five-year perspective plan
Step 2: Review the Telecommunication policy, to promote an open, competitive environment for
creation of national and sub-national networks.
Step 3: prepare a list of G2c and G2B services that citizens and businesses need to be provide
electronically.
Announce a PPP policy for e-government and take up a few projects adopting the PPP Model
Step 8: Establish a government –wide WAN for data, voice and video for G2G applications, adopting a PPP
model.
Step 9: Enact a cyber law that gives a legal validity to all electronic transactions and records and permits use
of digital signatures for authenticating messages and documents
Step 10: Establish data centers for e- government using the PPP model.
Stage IV – Transactional,
Stage V – Connected
Telecommunication Infrastructure Index (TII)
A composite measure
PCs
Internet users
Telephone lines
Cellular subscribers and
Broadband per 100
The most fundamental, cheapest and easiest ICT tool is e-mail. E-mail has now become common in all
urban areas and some rural areas. Within the government, it is the easiest of all options available for
implementation. Official orders to accept e-mail communication as valid have been issued in a large
number of government, judicial and legislative organizations.
E-mail can reach outside organizations via the internet; most government organizations adapt e-mail for
internal messaging. Due to increased lateral and bottom-up communication .
E-mail break the official hierarchy of communication as anyone can send to e-mail to any other breaking
the hierarchy and other barriers.
They allow person to person communication can improve information sharing, exchange coordination and
feedback of information.
The internal networking of various department of an organization linked e-mail is a prerequisite
Stage2: Use of internet by connecting internal activities to internet
while e-mail provides the very fundamental mode of communication , the basic and
personal use of internet from offices and personal use of internet from offices and
houses in now generally a reality in all urban areas and limited surgical areas.
It has been noticed that most government employees spend a few hours a day surfing
the internet whether for official purpose or personal benefits or for pleasure.
The internet has inculcated an information culture in the people in general and
government employees in particular to surf the internet in general for all purpose of
information retrieval.
Stage3: Allowing public access to information:
Once a website is operational, correspondences from the citizens can be allowed through e-mail
by providing them the appropriate e-mail address.
For examples: In china, the Beijing city government websites provides e-mail section to citizens
apart from other important information, such as government regulations, rules, laws or
information about services offered by the government.
In this e-mail section, the citizens are asked to express their suggestion is to permit citizens to
celebrity some queries and response to such queries will be posted on the website itself.
Stage5: Allowing online transactions by citizens
In stage 4 the citizens interacted through kiosks obtained services through online or
the internet but made payments manually . But now in stage5 in addition to
permitting single online inquiry access to information, citizens may be enabled to
make payments of fees and taxes, lodge complaints, file applications and perform
and other transactions online through citizens kiosks installed at busy public locations .
This is a much more advanced stage in e-governance not yet reached in the
developed world.
Stage6: Enriching digital democracy
A comprehensive web portal and smart card integrators information and services from various
responsible government agencies.
Both horizontal integration of services across departments and vertical integration of service delivery
is expected to take place.
As already available in Singapore and also being experimented in many states, on a web portal users
can obtain services across different geographical levels level of government within the same functional
area and access different functions.
A citizen could submit a change of address on driving license and such a change would automatically
be effected in all other sectors such as health, education, elections, taxation etc.