Professional Documents
Culture Documents
Introduction Page - 2
Limitations
Since the survey was done only in the areas for Bangalore city, the
results may not hold good for any other city.
Introduction Page - 3
1. The Research study tries to cover important aspects of IT
infrastructure maintenance such as-
a. Employee satisfaction
b. Expectations
c. Service provider
d. Perception about outsourcing.
e. Willingness to outsource
Company Profile
Introduction Page - 4
Continuously meeting the ever increasing customer expectations and
applications, its focus on integrated enterprise solutions has strengthened
the NETWEB TECHNOLOGIES' capabilities in supporting installation
types ranging from single to large, multi-location, multi-vendor & multi-
platform spread across India.
Introduction Page - 5
Services Offered
Networking Services
Introduction Page - 6
Networks are multiplying day by day in every organization. Systems are
becoming more & more dependent on the availability of data resources of
various departments / divisions / locations of an organization and thereby
increasing the load and requirements of Networks. The well known
networked applications such as Email, Internet / Intranet, GroupWare
solution, Relational Databases render the users completely in-effective
services, in the event of network shutdowns.
Facilities Management
Today IT assets have become widely distributed and less visible. Many
organizations are spending a very high portion of their technology budget
on "TOC – Total Cost of Ownership" like purchasing, installing,
managing, administration, troubleshooting, training, recruitment, etc for
supporting the IT Hardware and Software. So if the systems are critical to
the operation of business, downtime can have a disastrous impact on
production, customer satisfaction and revenues.
Introduction Page - 7
integration, migration assistance to system management, telephone support
and on-site hardware and software fixes.
These include:
System Administration
Helpdesk Services
Network Consulting
All these help the customer in deriving maximum value from the
investment in IT hardware and software.
Maintenance of Equipment
Introduction Page - 8
Maintenance of System Software- Operating System, Database
Virus support
Types of Networks
Introduction Page - 9
Main Network Types
Ethernet
FDDI (Fiber Distributed Data Interface)
Token Ring
ARC net (Attached Resource Computer Network)
AppleTalk
LAN
Local Area Network is a computer network that spans a relatively small
area. Most LANs are confined to a single building or group of buildings.
However, one LAN can be connected to other LANs over any distance via
telephone lines and radio waves. Most LANs connect workstations and
personal computers. Each node (individual computer) in a LAN has its
own CPU with which it executes programs, but it also is able to access data
and devices anywhere on the LAN. This means that many users can share
expensive devices, such as laser printers, as well as data.
There are many different types of LANs Ethernets being the most common
for PCs. The following characteristics differentiate one LAN from another:
Topology
Protocols
These are the rules and encoding specifications for sending data. The
protocols also determine whether the network uses a peer-to-peer or
client/server architecture.
Media
Introduction Page - 10
Devices that can be connected by twisted-pair wire, coaxial cables, or fiber
optic cables. Some networks do without connecting media altogether,
communicating instead via radio waves.
LANs are capable of transmitting data at very fast rates, much faster than
data can be transmitted over a telephone line; but the distances are limited,
and there is also a limit on the number of computers that can be attached to
a single LAN.
WAN
A system of LANs connected in this way is called a Wide Area Network.
The size of a network is limited due to size and distance constraints.
However networks may be connected over a high-speed communications
link (called a WAN link) to link them together and thus becomes a WAN.
Dial up connection
Dedicated connection
It is a permanent full time connection. When a dedicated
connection is used, the cable is leased rather than a part of the
cable bandwidth and the user has exclusive use.
Switched network
Several users share the same line or the bandwidth of the
line. There are two types of switched networks:
Introduction Page - 11
Packet Switching - This is a connection between multiple
points. It breaks data down into small packets to be sent
across the network. A virtual circuit can improve
performance by establishing a set path for data
transmission. This will shave some overhead of a packet
switching network. A variant of packet switching is called
cell switching where the data is broken into small cells
with a fixed length.
Security
Firewall
Introduction Page - 12
Packet filters
Circuit level gateways
Application level gateways
Tasteful multi layer inspection firewalls.
All firewalls run firewall software, and they all run it on some sort of
hardware, but the terms appliance based firewall and software firewall are
used to distinguish between products marketed as an integrated appliance
that comes with the software preinstalled, usually on a proprietary
operating system, and firewall programs that can be installed on general
purpose network operating systems such as Windows or UNIX.
VIRUS
Earlier, virus were made for testing the programmers, but has quickly
transformed itself into a multi million dollar menace every company has
been trying hard to combat.
The ease with which a virus can be made makes it easier for its
proliferation. Viruses today can proliferate networks within a matter of
minutes across countries infecting thousands of computers along the way
Introduction Page - 13
destroying data and causing computers to malfunction. Examples:
MyDoom, Melissa
ANTIVIRUS
To achieve consistent success in the medium and long term, the virus
dictionary approach requires periodic (generally online) downloads of
Introduction Page - 14
updated virus dictionary entries. As civically minded and technically
inclined users identify new viruses "in the wild", they can send their
infected files to the authors of anti-virus software, who then include
information about the new viruses in their dictionaries.
Introduction Page - 15
Data Warehousing
DAS
It means Directly Attached Storage. In the old days all mass storage
devices such as disk drives etc were attached directly to the nearest
computer (or were located inside the same box) so there was no need for a
term describing this. But since the technologies, which enable storage
networking, have become more prevalent, the term DAS has been used to
describe those parts of a wider storage network in which this local
connection is still used.
Introduction Page - 16
Reliable, cost-effective external SCSI (Small Computers Systems
Interface) storage systems attach directly to Power Edge TM servers in rack-
mount configurations or mounted vertically next to the server. SCSI drives
provide immediate expansion for one or two servers. While additional
drives and enclosures can be added as needed, SCSI drive enclosures
currently do not support more than 2 servers, for a given application, due
to the limited number of front-end ports available on SCSI disk arrays.
SCSI storage is ideal for departments and workgroups requiring additional
storage capacity.
Dell | EMC also offers highly scalable fiber channel RAID (Redundant
Array of Independent Disks) storage products. Fiber channel systems give
you high-capacity, non-disruptive access to data, while redundant
connections throughout help ensure data integrity.
NAS
Introduction Page - 17
possibly tape) drives can be attached to many NAS systems to increase
total capacity. Clients always connect to the NAS head, however, rather
than to the individual storage devices.
A NAS can store any data that appears in the form of files, such as email
boxes, Web content, remote system backups, and so on. Overall, the uses
of a NAS parallel those of traditional file servers.
NAS systems strive for reliable operation and easy administration. They
often include built-in features such as disk space quotas, secure
authentication, or the automatic sending of email alerts should an error be
detected.
SAN
Introduction Page - 18
A SAN can be thought of as an extension of direct attached storage
(DAS). Where DAS was a point-to-point link between a server and its
storage, a SAN allows many computers to access many storage devices
over a shared network.
IP-SAN
Internet Protocol –Storage Area Network links employees with stored data
for the complete continuity of business critical applications & databases
using an Ethernet. IP-SAN connects application servers, clients and
storage resources over IP networks. It facilitates uninterrupted access and
complete availability of business data.
Introduction Page - 19
A SAN can be deployed in two ways: using Fiber Channel or the IP way.
The first is called FC-SAN while the second is IP-SAN. IP-SAN can also
mean the network built with iSCSI as the protocol.
In an FC-SAN the file I/O is between the application and the file-system,
which in turn makes block I/O to the storage device. The file-system and
the volume manager are on the server and the storage has the RAID and
the disks.
The basic components of an IP-SAN system are the same, but here the
application makes the file I/O to a file-system which is outside the server
and the block I/O now happens within the storage between the volume
manager and the RAID.
Traditionally, NAS has been used for File services only and SAN for all
other applications. But those were the days of File-services from servers
and 10 Mbps LANs. With dedicated appliance and gigabit speeds on the
wire, throughputs that can be obtained from NAS devices are really good.
Applications have their own requirements or limitations in terms of the
bandwidth that they use. Just because you have connected a 200 Mbps link
between the server and the storage, the application server will not use the
full bandwidth, it might not use half of it too—it all depends on the
application requirements. An application might require about 20 Mbps
bandwidth, so there's no point giving it 200 Mbps Also, the servers have to
be big enough to pump so much of data in and out, a small or medium
server will not be able to pump so much I/O. A detailed assessment of the
I/O requirements and server capacities needs to be made before sizing any
storage device.
Introduction Page - 20
It provides support to end users on a variety of issues. It Identifies,
researches, and resolves technical problems. It also responds to telephone
calls, email and personnel requests for technical support. Tracks and
monitors the problem to ensure a timely resolution. Has knowledge of
commonly used concepts, practices, and procedures within a particular
field.
ANTIVIRUS MANAGEMENT
NETWORK MANAGEMENT
Introduction Page - 21
The conceptual control element of a data station that interfaces with all of
the layers of that data station and is responsible for the setting and resetting
control parameters, obtaining reports of error conditions, and determining
if the station should be connected to or disconnected from the medium.
WAN MONITORING
WAN links are usually the most expensive part of the network, and
managing bandwidth allocation can be complex. Oversubscribing to
bandwidth could mean that the company is paying for more
bandwidth than required, and under subscribing could result in
congestion and unacceptable network performance. WAN
Monitoring and Router Monitoring thus become very critical.
Network managers need to optimize the quality of service by
balancing throughput, committed information rate (CIR) and burst
rate with congestion, response time, and discards.
SERVER MONITORING
Servers are the heart and soul of today’s computing infrastructure.
Running mission critical applications as well as core IT services
such as email, file, print and database services, availability and
performance of your servers are critical to ensure smooth running of
business. The inherent complexity of heterogeneous distributed
environments makes server management both essential and
challenging.
SWITCH MONITORING
Introduction Page - 22
proactive switch monitoring system helps detect problems early and
avoid potential problems.
BACKUP MANAGEMENT
Introduction Page - 23
understand the difference between an incremental and differential
backup. Administrators use differential backups to facilitate more
complex tape rotation schemes and sometimes in database
environments.
In essence, ASPs are a way for companies to outsource some or almost all
aspects of their information technology needs. They may be commercial
ventures that cater to customers, or not-for-profit or government
organizations, providing service and support to end users
Introduction Page - 24
Vertical Market ASP - provide support to a specific industry, such
as healthcare.
Introduction Page - 25
Exodus Communications. Exodus ensures that the NOC has fully
redundant power, network connectivity, routing, and switching to ensure
maximum reliability and integrity. A "micro agent" interacts with customer
systems to provide system management. The agent is lightweight and
designed for use over the Internet. It acts as a universal agent invoking and
managing other agents and programs as required for specific actions
The service is delivered via the Web through a secure Internet portal that
lets customers view management information, based on their role in the
organization. For example, CIOs can view overall management
information while help desk technicians can check call queues, escalations,
and open ticket status. Systems analysts can conduct asset inventories and
view virus reporting.
Introduction
Introduction Page - 26
There is a big growth in infrastructure outsourcing. There are two reasons
for this trend. The real reason is that in terms of IT budgets, there is zero or
just 1-2 per cent growth. Outsourcing is a way of stretching the budget and
savings from this source are funded into innovations.
The last real big investment in desktops was four-five years ago.
Companies are looking to upgrade or buy MS tools and hardware. They
would need to outsource parts that would buy assets and amortize costs
rather than having to budget additional capital.
Clearly, the big move is towards transparency in offerings and prices for
such outsourcing. There is also a growing need and desire to invest in
selective sourcing. Companies have realized that there is a lot of risk in
outsourcing to one particular vendor. End users want vendors to provide
selective sourcing, with best-of-breed companies providing elements of
good IT services; At the same time, in this sourcing strategy, there is link
between strategy and business value. The end-users are asking providers
(or vendors) to demonstrate business value that they are providing, help
them build and communicate a business case. The CIO’s (of end-users) are
asking this of in-house and outsourced providers.
Introduction Page - 27
So, the CIO is not looking so much to reduce cost of discrete operations
but also to manage cost effectively and push total business value associated
with all this. That's a trend we see - associate spending with business value.
What is FM
Introduction Page - 28
Network outsourcing: The network is viewed as a utility,
connecting end-users with a pre-defined service level.
Types of Outsourcing
Total Outsourcing
Refers to all of the major functional areas of IS, including data centers,
applications development, systems maintenance, networks, help desk,
desktop services, and so on. Typically, only user liaison and contract-
management functions remain.
Selective Outsourcing
Transitional Outsourcing
Introduction Page - 29
Transformational outsourcing
Introduction Page - 30
Companies are trying to do something new
o Delivering standard IT services can distract the
implementation of new projects.
Need enforceable service level objectives
o Enforcing a Service Level Agreement is easier with an
external organisation using commercial inducements than
with an internal IT maintenance department.
Motivations
Benefits
Introduction Page - 31
Experience - There are two broad areas of IT infrastructure
maintenance expertise - business analysis (knowing how a business
works and how a particular software can help) and technical skills.
A company may not be good at these things. Here outsourcing the IT
infrastructure maintenance will help because a high level of
expertise will be available at a much lower cost. This also allows the
company to focus on the core area of business rather than worrying
about the network breakdowns or malware problems.
Strategic Intent
What should be the intent and ambition for IT, and how can
outsourcing be used to achieve them?
What kinds of outsourcing relationships should be entered into?
How should these relationships be structured to meet company
objectives?
What must be done to ensure the success of these arrangements?
Introduction Page - 32
Business impact concentrates on improving the contribution of IT
to company performance within its existing lines of business.
Introduction Page - 33
New Perspectives
Introduction Page - 34
NETWEB Technologies’s Chance
The big American firms also offer services out of India, and other local
firms are competing for a share of the market, notably Wipro. A recent
survey by the firm of 145 executives in a range of industries found that
about a third had plans to outsource some of their computer infrastructure
maintenance.
Cost, however, remains the big factor. On estimation it can be said that that
outsourcing the management of part of a computer infrastructure can cut
the “total cost of ownership” of it by an average of 40%. That is incentive
enough to live with the risks and drawbacks that come with any type of
outsourcing
Introduction
Introduction Page - 35
companies and analyzing the market perception about the outsourcing of
the IT infrastructure maintenance.
The ultimate objective of the project was to create a list of potential
customers for NETWEB TECHNOLOGIES Info systems.
Introduction Page - 36
Any feedback or suggestions that was received and any difficulties that
were faced was given priority and the errors were carefully looked into and
rectified.
Research Methodology
SOURCES OF DATA
Introduction Page - 37
The data for the target sample has been collected from various sources. For
the survey to be effective a database had to be created by selecting the
organizations and then collecting information about them.
The database was divided into two sections primary and secondary.
The survey demanded attention towards certain prime and important
organizations
Methodology
Introduction Page - 38
6. Creation of Database of Software Development and ITES
companies.
Diagrammatic Representation
MARKET
STUDY
CREATING A
QUESTIONNAIRE
CREATION OF
QUESTIONNAIRE
COLLECTION OF
DATA
ANALYSIS
OF DATA
FINAL
Questionnaire Design
Pre-Testing
Introduction Page - 40
The questionnaire was pre-tested on four companies. Based on their
responses, and the responses faced in getting them a web questionnaire was
designed. The wording of some questions was also changed to make them
less ambiguous and click options as answers were provided in the web
survey to make it user friendly.
Sampling
Once the questionnaire was ready, the companies were surveyed. Out of
the total of 80 companies 25 were put in the primary list as they were
considered important due to their IT infrastructure size. The rest were in
the secondary list. These companies were selected from using a lot of
mediums, primarily the Internet.
Editing
Based on the questions which test validity, forms which had crucial
questions unanswered were rejected. The final number of forms used for
data analysis was 27.
Plan of analysis
Some tips that work kept in mind while developing the Questionnaire:
Stepwise design of the Questionnaire:
Understanding what you want to know – know what your
requirements are and what you are doing to achieve it.
Introduction Page - 41
Translating objectives into information required – All the data
collected through survey would be in the forms of numbers and
statistics. It depends on how well one can sift through that matter
and derives the right information that will help in achieving the
objectives.
Introduction Page - 42
RESPONSE OF THE COMPANIES
RESPONSE
RECEIVED, 24,
30%
DID NOT
RESPOND, 57,
70%
ANALYSIS
Introduction Page - 43
INTERESTED IN FACILITIES MANAGEMENT
10, 12%
71, 88%
NO YES
ANALYSIS
Introduction Page - 44
level of satisfaction
average
20%
ANALYSIS
40% of the customers are not satisfied with the service levels and are
looking for a change. This implies that very high levels of services
should be maintained to retain the customers. At the same time it is also
inferred that the since the level of the service provided by the other
vendors is low, a high level of service would attract many customers.
Introduction Page - 45
LEVEL OF SATISFACTION WITH THE FACILITIES
MANAGEMENT LEVELS
Very Poor
Very High 11%
22% Poor
0%
Average
High 39%
28%
ANALYSIS
Findings
Introduction Page - 46
Respondents Profile
81 IT companies were contacted with a response rate of
30%.
The respondent list includes Software engineers, Help Desk
managers, HR managers, Network Engineers, IT Managers,
Technical Architects, Facilities Heads and Design engineers.
Areas covered for survey –
M. G. Road Residency road
Jayanagar J. P. Nagar
ITPL Electronic City
C.V. Raman Nagar Vijayanagar,
Brigade Road Indiranagar
And many surrounding areas
Recommendations
Introduction Page - 47
on the fact that many respondents of the survey have mentioned that with
the growth of the company they will soon be looking for outsourcing; so
that they can concentrate on their core areas of business.
Introduction Page - 48
Introduction Page - 49