3 CHAPTER
3 CHAPTER
Infrastructure and
Strategies
TOPIC
NETWORK INFRASTRUCTURE
◦ The End-User Computing group consists of two teams that provide personal computer
management, support and assistance to faculty and staff, in addition to academic
computer labs and classrooms management.
◦ The End-User Computing hardware team is the "hands and feet" for CCS. This team
provides guidance, recommendations and assists faculty and staff with personal
computer, printer, and other device acquisition needs.
◦ The team also provides personal computer operating system imaging and application
setup and support, including hardware installation and connectivity to the network.
◦ In addition, the hardware team provides hardware troubleshooting and repairs of
supported desktop, laptop and printer equipment used by faculty and staff, as well as
support for equipment installed in labs or podiums managed by CCS and used by
students and faculty.
◦ The End-User Computing infrastructure team provides back-end management and
support for a number of key applications, including Microsoft Active Directory, used
to provide authentication and rights access to services such as network shares and
other services.
◦ This team is responsible for managing the printing infrastructure for administrative
networked printers and academic/lab printers. In addition, the infrastructure team
builds, tests, installs and manages desktop images deployed in CCS academic
managed labs, as well as labs owned by other departments.
◦ The End-User Computing group, as a unit, works very closely with other groups
within CCS and other departments, to ensure that the best solutions and services
are delivered in a secure and manageable way.
◦ Server & Storage Services
◦ The Server and Storage Services group is responsible for the CCS managed data centers, servers and
storage systems that provide infrastructure resources to applications and services used by staff, faculty and
students.
◦ This group ensures that the UPS and HVAC solutions within the data centers are operating efficiently and
coordinates any maintenance, repairs and changes with other groups within CCS or outside of CCS,
including Facilities Management and Development.
◦ The Server and Storage Services group is responsible for optimizing the operations within the data center,
including the power distribution from UPS systems to allow power redundancy sources to data center
equipment, as well as efficient cooling within the data center.
◦ The Server and Storage Services group is also responsible for establishing
standard server and storage platforms and for the management of the
hardware and software required to integrate these platforms to deliver
an efficient, scalable and cost-effective infrastructure capable of supporting
layered services that consume server and storage resources, including core
applications such as RAMSS, Human Resources, Finance, Bright space by
D2L, and various other services.
◦ The Computing Infrastructure team has a vast collective set of skills and
expertise in areas such as data center management, Storage Area
Networks, desktop and server imaging, database administration and
general troubleshooting skills, that can be leveraged by other groups at the
University for advice and consultation.
◦ Computing Infrastructure provides the hardware and services that other systems
and services are built on[13].
◦ File and disk storage services: Information Services provides a number of file
and disk storage services. These include file servers, file backup, long-term archive
and ftp services. Some of these services are provided by Storage Area Networks
(SANs).
◦ Authentication and authorization: Authentication is the means by which you log
in and identify yourself. Authorization is the means by which a service determines
whether an authenticated person should have access to a service.
◦ Virtual hosting: The virtual hosting service provides a managed platform for
hosting Windows, Linux and Unix services on a highly
resilient virtualization platform based on VMware.
◦ Cloud computing services: An Open Stack service to provide a platform to self-
provision server infrastructure to support both researchers and development teams.
DATA CENTERS
◦ Data centers are simply centralized locations where computing and networking equipment is concentrated
for the purpose of collecting, storing, processing, distributing or allowing access to large amounts of data.
◦ They have existed in one form or another since the advent of computers.
◦ In the days of the room-sized behemoths that were our early computers, a data center might have had one
supercomputer. As equipment got smaller and cheaper, and data processing needs began to increase -- and
they have increased exponentially -- we started networking multiple servers (the industrial counterparts to
our home computers) together to increase processing power.
◦ We connect them to communication networks so that people can access them, or the information on them,
remotely[14]. Large numbers of these clustered servers and related equipment can be housed in a room,
an entire building or groups of buildings.
◦ Today's data center is likely to have thousands of very powerful and very small servers running 24/7.
Need of Data Center
◦ Despite the fact that hardware is constantly getting smaller, faster and more powerful, we are an
increasingly data-hungry species, and the demand for processing power, storage space and information in
general is growing and constantly threatening to outstrip companies' abilities to deliver.
◦ Any entity that generates or uses data has the need for data centers on some level, including government
agencies, educational bodies, telecommunications companies, financial institutions, retailers of all sizes,
and the purveyors of online information and social networking services such as Google and Facebook.
◦ Lack of fast and reliable access to data can mean an inability to provide vital services or loss of customer
satisfaction and revenue.
What are the core components of a
data center?
◦ Data center design includes routers, switches, firewalls, storage systems, servers, and application delivery
controllers. Because these components store and manage business-critical data and applications, data
center security is critical in data center design. Together, they provide:
◦ Network infrastructure. This connects servers (physical and virtualized), data center services, storage, and
external connectivity to end-user locations.
◦ Storage infrastructure. Data is the fuel of the modern data center. Storage systems are used to hold this
valuable commodity[15].
◦ Computing resources. Applications are the engines of a data center. These servers provide the processing,
memory, local storage, and network connectivity that drive applications.
How do data centers operate?
◦ Data center services are typically deployed to protect the performance and integrity of the core data center
components.
◦ Network security appliances. These include firewall and intrusion protection to safeguard the data center.
◦ Application delivery assurance. To maintain application performance, these mechanisms provide application
resiliency and availability via automatic failover and load balancing.
What are the standards for data
center infrastructure?
◦ The most widely adopted standard for data center design and data center infrastructure is ANSI/TIA-942. It
includes standards for ANSI/TIA-942-ready certification, which ensures compliance with one of four
categories of data center tiers rated for levels of redundancy and fault tolerance[16].
◦ Tier 1: Basic site infrastructure. A Tier 1 data center offers limited protection against physical events. It has
single-capacity components and a single, non redundant distribution path.
◦ Tier 2: Redundant-capacity component site infrastructure. This data center offers improved protection
against physical events. It has redundant-capacity components and a single, non redundant distribution
path.
◦ Tier 3: Concurrently maintainable site infrastructure. This data center protects against virtually all physical
events, providing redundant-capacity components and multiple independent distribution paths. Each
component can be removed or replaced without disrupting services to end users.
◦ Tier 4: Fault-tolerant site infrastructure. This data center provides the highest levels of fault tolerance and
redundancy. Redundant-capacity components and multiple independent distribution paths enable
concurrent maintainability and one fault anywhere in the installation without causing downtime.
E-GOVERNMENT ARCHITECTURE
◦ Presentation Layer
◦ The presentation layer identifies and describes the system users, who require access to government
information at different capacities, and the channels through which information can be accessed.
◦ If a project is to be successful, different stakeholders need to be identified in the beginning, involved in the
initial stages, and kept involved throughout development and implementation.
◦ E-Government Layer
◦ E-government public services utilize very specialized applications those are only available to certain
agencies and not all agencies participating in the association.
◦ Is well informed
◦ This aims is to simplify the existing processes and procedures, reduce the manual touch points and make
the entire transaction cycle friendly.
◦ For E-governance to succeed, it is imperative that processes are simplified and understood by all
stakeholders.
◦ Information Architecture Layer
◦ Service Classification
◦ The service classification sub-layer classifies service components according to how they support business
and performance objectives e.g. ERPS, CRMs.
◦ It serves to identify and classify horizontal and vertical service components supporting government and
their IT investments and assets.
◦ Data Standardization Sub-layer
◦ The data standardization sub-layer is flexible and standard based to enable information sharing and reuse
across the government via the standard description and discovery of common data and the promotion of
uniform data management practices.
◦ It provides a standard means by which data may be described, categorized and shared.
◦ Data descriptions
◦ Data descriptions, provides a means to uniformly describe data, thereby supporting its discovery and
sharing.
◦ Data context
◦ Data facilitates discovery of data through an approach to the categorization of data according to
taxonomies.
◦ Data sharing;
◦ It provides guidance for implementing repeatable processes to enable data sharing in accordance with
government-wide agreements encompassing national, county as well as other public and private non-
governmental institutions.
◦ Technology Architecture Layer
◦ The technology architecture layer categorizes the standards and technologies that support and enable the
delivery of service components and capabilities.
◦ It also unifies existing agency technologies and e-government guidance by providing a foundation to
advance the reuse and standardization of technology and service components from a government wide
perspective.
INTEROPERABILITY FRAMEWORK
◦ Interoperability Framework is Set of standards and guidelines which describe the way in which
organizations have agreed, or should agree, to interact with each other.
◦ An e-government Interoperability Framework (IF) is a document or group of documents that specify a set of
common elements such as vocabularies, concepts, principles, policies, guidelines, recommendations,
standards, and practices for agencies that wish to work together, towards the joint delivery of public
services.
◦ IFs are seen by governments as promising instruments to boost the interoperability of their services and
systems. Henceforth, many countries have created and published their Ifs.
◦ The e-GIF, launched in September 2000 in the United Kingdom by Minister Ian McCartney, is usually
considered the first IF published.
◦ Since then, many other countries have published their national IFs, not only because they perceive them as
an important instrument to foster and facilitate interoperability of public systems but also due to financial
and political pressures set by prominent and powerful organizations and institutions such as the European
Commission, United Nations, and the World Bank.
◦ An IF is “a strategic document containing specifications and standards to be followed in order to ensure
interoperability among public administrations and their beneficiaries (citizens, businesses, other public
administrations)”.
◦ It “specifies a set of common elements such as vocabulary, concepts, principles, policies, guidelines,
recommendations, standards, specifications and practices”, which provide guidance to practitioners about
what to consider and do in order to enable seamless interaction within their public administration as well as
with other public authorities.
◦ The common elements set in an IF may cover multiple issues at a technical, semantic, organizational, or
even at a legal or political level.
◦ Many practitioners and academics consider that the creation and publication of a national IF and its
adoption by the multiple public agencies may, gradually, generate the appearing of a favorable
environment to naturally achieve interoperability.
◦ The existence of IFs may thus ending up contributing to the improvement of the quality of services
provided to citizens:
◦ The interoperability levels related to the sharing of information in IFEG are mainly classified into:
◦ Semantic Interoperability (Enabling data to be interpreted & processed with the same meaning, etc.)
and
◦ Technical Interoperability (like technical issues in interconnecting ICT systems and services, information
storage and archival, protocols for information exchange and networking, security, etc.);
◦ The Multilateral mechanism for IFEG is influenced by the following key sub-areas:
◦ Political: For strategy related issues. In Political context, support and commitment from authority,
provisioning of policies / guidelines, strategies over different levels of interoperability are expected.
◦ Legal: For issues like IPR / Copy Right, content regulation, privacy, freedom of information, electronic
identities, etc; these are context-sensitive.
◦ Managerial: For issues like training, motivation, reorientation of concerned staff from public agencies.
◦ Social/Cultural: For social/cultural characteristics of system stakeholders. Social / Cultural factors like
differences in culture, working practices, issues of trust, timings, social exclusion issues have more
influence.
CLOUD GOVERNANCE
◦ Introduction
◦ A cloud governance framework encompasses people, processes, and technology while ensuring security,
cost management, and deployment acceleration.
◦ Cloud governance is a carefully designed set of rules and protocols put in place by businesses that operate
in a cloud environment to enhance data security, manage risks, and keep things running smoothly.
◦ Cloud governance ensures that everything from asset deployment to systems interactions to data security
is properly considered, examined, and managed.
◦ Controlled Access
◦ By designating who owns each area of asset and software management, your cloud governance plan will
build necessary limits on who can access and impact your cloud ecosystem.
◦ Reduced Security Risks
◦ Once an organization has committed to moving their data to the cloud, it’s imperative that they develop
the security measures to protect that data.
◦ Lowered Costs
◦ These also trigger automated responses to cloud activity, which reduces the manpower needed to enforce
your cloud governance. And reduced manpower means reduced costs.
Elements of Cloud Governance
◦ Cloud Governance is comprised of the following key components.
◦ Cloud Business Office (CBO) ensures alignment of cloud vision with business vision and ensures that
governance is enforced across the enterprise. CBO is also responsible for demand management, cost
optimization, and prioritization.
◦ Cloud CoE(Center of Excellence) , which is a cross-functional team that defines processes, regulates and
standardize cloud adoption, migration and operation across the enterprise.
◦ Cloud foundational components like cloud reference architecture, standards, templates, guidelines, best
practices and policies
Risk of Poor Cloud Governance
◦ Cloud Security Risks
◦ Cloud Proliferation and Sprawl (the uncontrolled proliferation of an organization's cloud instances,
services or providers)
◦ Cloud Vendor Lock-In(when someone is essentially forced to continue using a product or service
regardless of quality, because switching away from that product or service is not practical.)
◦ Cloud Applications Governance – designing and migrating applications to appropriate Cloud pattern(s)
◦ E-readiness (electronic readiness) is defined as a degree to which to a country or economy may be ready,
willing or prepared to obtain benefits which arise from information and communication technologies. This
measure is often used to gauge how ready a country is to participate in electronic activities such as e-
governance.
◦ E-readiness also defined as “The degree to which a community is prepared to participate in the Networked
World, which is gauged by accessing a community’s relative advancement in the area that are most critical
for ICT adoption and the most important of ICTs”
◦ E-Readiness is the ability to use information and communication technologies (ICT) to develop one's
economy and to foster one's welfare.
◦ Is a measure of e-business environment, a collection of factors that indicate how amenable (willing) a
market is to Internet-based opportunities.
◦ Is not simply a matter of the number of computer servers, websites and mobile phones in the country, but
also things such as its citizen's ability to utilize technology skillfully, the transparency of its business and
legal systems, and the extent to which governments encourage the use of digital technologies.
Data System Infrastructure
◦ The core of e-governance is e-MIS and holds the entire database of any organization.
◦ The major question that arises here is “ Are all the requisite management information systems, records,
databases and work processes in proper place so as to provide the quantity and quality of data to support
the move to e-governance?”
◦ The data that were managed manually need to be computerized or brought into electronic form which
means that the preparedness of computerized database or data warehouse is required.
◦ Data quality and data security are of prime concern here as most of the government infrastructures are not
up to the mark in developing countries.
◦ This is the core computerization activity of any government process which may take several years to reach
this stage.
Legal Infrastructure Preparedness
◦ They lack requisite legislation and legal infrastructure to enable such reforms or reengineering of the
existing business practices, rules and regulations within the government at various levels.
◦ The manual processes in government are usually obsolete, inefficient and bureaucratic.
◦ Though they have transformed to computerization practices, they continue to have poor and inefficient
performance and this is due to lack of administrative reforms and lack of business process reengineering.
◦ This seems to be accentuated in developing countries while developed countries have been significantly
successful in administrative reforms and business reengineering.
◦ The fundamental question that arises here is “ Are the laws and regulations required to permit and support
the move towards e- governance initiatives in place?
◦ The government body has to establish a separate IT department which basically coordinates with
facilitators for e-government projects within the nation.
◦ The IT department works out for the hardware selection and procurement, network or software
development and implementation and also the training of staff at various levels of the government.
◦ The technical manpower resources are essential for all the phases of e- governance and related information
system life cycle comprising systems analysis, design, programming, implementation, operation and
documentation.
◦ Both private and government institutions should play a major role in this regard.
◦ Apart from technical human infrastructure, there is a need for the crucial training and orientation of user
personnel i.e. government staff in e- governance project.
◦ The government employees and staff who are the stake-holders in all e- government projects as the end
users are to be appropriately trained and oriented for change management from a manual government
environment to e-governance environment.
◦ Such training will make them competent and capable of handling e- governance projects at operational
level
Technological Infrastructural
Prepaidness
◦ Technology is fast changing in ICT domain and there is a rapid obsolescence of software as well as
hardware which require great financial support time and again.
◦ Government organizations encounter this situation especially as their procedures to procure hardware or
software are very inefficient and slow.
◦ cost of technology
◦ Adaptability
◦ Obsolescence
◦ E-governance evolves gradually from the simplest levels to advanced levels and the evolution may not be
same in all cases.
◦ The mostly fundamental, cheapest andeasiest ICT tool is e-mail. E-mail has now become common in all
urban areas and some rural areas .within the government it is the easiest of all options available for
implementation. Official orders to accept
◦ e-mail communication as valid have been issued in a large number of government , judicial andlegislative
organizations . E-mail can reach out side organizations via the internet , most government organizations
adapt e-mail for internal messaging. Due to increased lateral and bottom upcommunication .E-mail break
the official hierarchy of communication as any one can send to e-mail toany other breaking the hierarchy
and other barriers. They allow person to person communication can
◦ Improve information sharing, exchange coordination and feed back of information. The internal networking
of various department of an organization linked e-mail is a prerequisite
◦ Stage2: Use of internet by connecting internal activities to internet
◦ while e-mail provides the veryfundamental mode of communication, the basic and personal use of internet
from offices and personaluse of internet from offices and houses in now generally a reality in all urban
areas and limited surgicalareas. It has been noticed that most government employees spend a few hours a
day surfing theinternet whether for official purpose or personal benefits or for pleasure.The internet has
inculcated an information culture in the people in general and government employees in particular to surf
the internet in general for all purpose of information retrieval.
◦ Stage3: Allowing public access to information
◦ Web pages, citizen charters and application forms: If the government department concerned puts up aweb page on the
internet, describing all functions of the department , It can be accessed by citizens andgeneral public interested .The web pages
can be dynamic, the contents changing with time . Thewebsite up dating process can take place dynamically.
◦ General information services: E-enabling of the basic functionality of the government department concerned, There could be
mush greater scope , content and depth of information that can be ofinterest and use for the people and the citizens at large that
is the general public information requirement.
◦ The general information requirement of the public in general can be broadly defined to a verylarge extent or scope and coverage.
In wide ranging sectors such as education and Tourism, a part frominformation from information from census and the statistical
information pertaining to various sectorsof economy.
◦ Work flow: Another dimension of public access to information can be in terms of providing access tointegrated workflow in
different divisions of the government department can be viewed in terms ofthe ability to move images ,files, documents form on
workstation to another using specific relevantrules of business to review , authorize authenticate, validate, enter and edit data
and assign tasks .Once the workflow is automated in a government office, The related subject functionalities concernedalso used
to be automated and integrated with simple workflow automation .
◦ Stage 4: Allowing two way interactive communication with stake holders to enable internet enabled
transactions (including financial transactions)
◦ Once a website is operational, correspondences from thecitizens can be allowed through e-mail by
providing them the appropriate e-mail address. For examples:In china , the Beijing city government
websites provides e-mail section to citizens apart from otherimportant information , such as government
regulations , rules , laws or information about servicesoffered by the government . In this e-mail section ,
the citizens are asked to express their suggestion isto permit citizens to celerity some queries and response
to such queries will be posted on the websiteitself.Similarly, in Karnataka state , under the “Bhoomi project
rural citizens can ”obtain the officialonline land record exact at the kiosk a small amount payable to the
operator of the kiosk .
◦ Stage 5: Allowing online transactions by citizens
◦ In stage4 the citizens interacted through kiosksobtained services through online or the internet but made
payments manually .But now in stage 5 in addition to permitting single online enquiry access to information
, citizens may be enabled to makepayments of fees and taxes ,lodge complaints, file applications and
perform and other transactionsonline through citizens kiosks installed at busy public locations .This is a
much more advanced stage ine-governance not yet reached in the developed world .
◦ In Singapore, the citizens can transact every government business online and sound the clockthrough
specially designed kiosks which can be operated using smart cards.
◦ They can transact allgovernment related business such as social well fare claims , tax assessment and
payment ,visaapplications and license renewals, in addition to bank based fund or financial transactions
using smartcards.
◦ Stage 6: Enriching digital democracy
◦ Democracy can be strengthened and enriched by ICT in multipleways and modes. At least two important
sets of ICT applications that can potentially supportparticipatory and democratic processes ,specially in the
developing countries have been identified .There relate to applications that enrich and further empower the
citizens to express themselves byvoting in democratic processes through internet or by any other electronic
means.
◦ In Andhra Pradesh ,the poor women in villages form self help group with micro credit. They were able to
grow big enough to setup their own banks which use ICT to a significant level. The community information
center project in North Eastern states of India is a success story of engaginglocal Youth in ICT application
development and usage. ICT has been used by the government in variouscountries for strengthening
democracy, democratic processes. It is expected in the long term digitaldemocracy will come to some
countries in another form.
◦ Stage 7: Electronically integrated or joined up government with legislative and judiciary
◦ In the final stage of e-governance a comprehensive web portal and a smart card integrators information
andservices from various responsible government agencies. In this stage both horizontal integration
ofservices across departments and vertical integration of service delivery is expected to take place.
Asalready available in Singapore and also being experimented in many states , on a web portal users
canobtain services across different geographical levels level of government with in the same functionalarea
and access different functions . A citizen could submit a change of address on driving license andsuch a
change would automatically be effected in all other sectors such as health , education , elections, taxation
etc.
Steps to e-Government readiness
◦ There are ten step process to e-government readiness that can act as a guide for improving the score of e-
government readiness. It is not necessary to follow the 10 steps sequentially. Some of them can be
implemented in parallel. Each step may be broken down into a set of tasks and pursued for effective
results.
◦ Step 1: Emphasize the e-government vision and strategy. Prepare a five-year perspective plan
◦ Step 2: Review the Telecommunication policy, to promote an open, competitive environment for creation
of national and sub-national networks.
◦ Step 3: Prepare a list of G2c and G2B services that citizens and businesses need to be provide
electronically. Prioritize the services. Announce a policy on electronically services delivery.
◦ Step 4: Design Functional and Technology Architectures that are aimed at delivering thee-services. Prescribe
standards for security.
◦ Step 5: Initiate statewide e-government projects adopting the pilot approach. Ensure these are part of the ‘big
picture’ developed in step 4
◦ Step 6: Design and implement an appropriate CIO(Chief Information Officer) program. Implement change
management programs across all major government agencies.
◦ Step 7: Ensure that all government agencies earmark 2-5% of their budget to e-government.
◦ Step 8: Establish a government-wide WAN for data, voice and video for G2G applications.
◦ Step 9: Enact a cyber law that gives a legal validity to all electronic transactions and records and permits use
of digital signatures for authenticating messages and documents. Publish polices on security and privacy for e-
government.
◦ Step 10: Establish data centers for e- government using the PPP model. Design and establish an e-government
gateway at the Static Data Centre.
STEPS TO E-GOSTEPS TO
E-GOVERNMENT
READINESS
VERNMENT READINESS