Вы находитесь на странице: 1из 108

Basics of Computer :: 1

1
Basics of Computer

1.1 INTRODUCTION
In this lesson we present an overview of the basic design of a
computer system: how the different parts of a computer system
are organized and various operations performed to perform a
specific task. You would have observed that instructions have to
be fed into the computer in a systematic order to perform a
specific task. Computer components are divided into two major
categories, namely, hardware and software. In this lesson we will
discuss about hardware, i.e., the machine itself and its connected
devices such as monitor, keyboard, mouse etc., as well as
software that makes use of hardware for performing various
functions.

1.2 OBJECTIVES
After going through this lesson you would be able to:
l
explain basic organization of computer system
l
explain different types of input and output devices
l
define Software and its classification
l
distinguish between system software and application
software
l
describe computer language and its classification

2 :: Data Entry Operations

1.3 WHAT IS A COMPUTER?


Computer is a device that transforms data into meaningful
information. Data can be anything like marks obtained by you in
various subjects. It can also be name, age, sex, weight, height,
etc. of all the students in a class.
Computer can also be defined in terms of functions it can
perform. A computer can i) accept data, ii) store data, iii) process
data as desired, and iv) retrieve the stored data as and when
required and v) print the result in desired format.
The major characteristics of a computer are high speed, accuracy,
diligence, versatility and storage.

1.3.1 Computer Organisation


The block diagram of computer is shown in Fig. 1.1.

Memory Unit

Input unit

Control Unit

Output unit

Arithmetic
Logic Unit

Fig. 1.1 Block diagram of Computer Organisation

The computer performs basically five major operations of


functions irrespective of their size and make. These are 1) it
accepts data or instruction by way of input, 2) it stores data, 3) it
can process data as required by the user, 4) it gives results in
the form of output, and 5) it controls all operations inside a
computer. We discuss below each of these operations.
1.

Input: this is the process of entering data and programs


into the computer system.

Basics of Computer :: 3

2.

Control Unit (CU): The process of input, output, processing


and storage is performed under the supervision of a unit
called 'Control Unit'. It decides when to start receiving data,
when to stop it, where to store data, etc. It takes care of step
-by-step processing of all operations in side the computer.
3.
Memory Unit: Computer is used to store data and
instructions.
4.
Arithmetic Logic Unit (ALU): The major operations
performed by the ALU are addition, subtraction,
multiplication, division, logic and comparison.
5.
Output: This is the process of producing results from the
data for getting useful information.
The ALU and the CU of a computer system are jointly known as
the central processing unit (CPU). You may call CPU as the brain
of any computer system.

INTEXT QUESTIONS
1.
2.
3.

What are the five basic operations performed by the


computer?
Define ALU, CU and CPU.
Choose the correct answer.
(a)
The task of performing arithmetic and logical
operations is called:
(i) ALU (ii) editing (iii) storage (iv) Output
(b)
The ALU and CU jointly are known as
(i) RAM (ii) ROM
(iii) CPU
(iv) None of above
(c)
The process of producing results from the data for
getting useful information is called:
(i) output (ii) input
(iii) processing (iv) storage

1.4 PERIPHERAL DEVICES


Peripheral devices are connected to the computer externally.
These devices are used for performing some specific functions.
Peripheral devices are as follows:
1.
Input Devices
2.
Output Devices
3.
Other Peripherals

4 :: Data Entry Operations

Disk drives
Monitor

Keyboard

Mouse

Fig. 1.2 Different peripheral devices of Computer

1.5 INPUT DEVICES


Input devices accept data and instructions from the user.
Following are the examples of various input devices, which are
connected to the computer for this purpose.
1.
Keyboard
2.
Mouse
3.
Light Pen
4.
Optical/magnetic Scanner
5.
Touch Screen
6.
Microphone for voice as input
7.
Track Ball

1.5.1 Keyboard
A keyboard (as shown in figure 1.3) is the most common input
device. Several kinds of keyboards are available, but they
resemble each other with
minor variations. The
keyboard in most common
use is the QWERTY board.
Generally
standard
keyboard has 104 keys. In
these keyboards, the cursor
control keys are duplicated
to allow easier use of the
Fig. 1.3 Keyboard
numeric pad.

Basics of Computer :: 5

1.5.2 Mouse
A mouse is an electro-mechanical, hand-held device (as shown
in figure 1. 4). It is used as a pointer. It can perform functions
like selecting menu commands, moving icons, resizing windows,
starting programs, and choosing options.

Fig. 1.4 Mouse

The most common mouse uses an internal, magnetically coated


ball, to detect the movement of the mouse across a flat surface,
usually a desktop. Now a days Optical or laser mouse is used to
detect the movement. All windows based applications today are
designed to work with a mouse. A mouse is used to replace hard
-to-remember key combinations with easier "Point and Click"
actions. However, it cannot substitute all keyboard operations.
It can be alternative for commands based operations.

1.5.3 Light pen


An input device that utilizes a light-sensitive
detector to select objects on a display screen.
A light pen is similar to a mouse (as shown in
figure 1.5), except that with a light pen you can
move the pointer and select objects on the
display screen by directly pointing to the
objects with the pen.

1.5.4 Optical Scanner

Fig. 1.5 Light Pen

These devices are used for automatic data collection. The


devices of this category completely eliminate manual input of
data. For example, the bar-code reader is actually just a special
type of image scanner. An image scanner translates printed

6 :: Data Entry Operations

images into an electronic format that can be


stored in a computers memory, and with the
right kind of software, one can alter a stored
image. Another example of scanner is optical
character recognition (OCR) device, used by
banks to convert the scanned image of a
typed or printed page into text that can be
edited on the computer.

Fig. 1.6 Scanner

1.5.5 Touch Screen


Touch panel displays and pads are now being offered as
alternatives to keyboard. Here the input can be given through the
computer screen, that accepts the input through monitor; users
touch electronic buttons displayed on the screen or they may use
light pen.

Fig. 1.7 Touch Screen Monitor

1.5.6 Microphone
Microphone is an input device, which takes voice as input. The
voice communication is more error-prone than information
through keyboard. There are two types of microphones available
(as shown in figure 1.8):
1.

Desktop Microphone

2.

Hand held Microphone

Fig. 1.8 Desktop microphone and Hand-held Microphone

Basics of Computer :: 7

1.5.7 Track Ball


Trackball, a pointing device, is a mouse
lying on its back (as shown in figure 1. 9).
To move the pointer, you rotate the ball
with your thumb, your fingers, or the
palm of your hand. There are usually one
to three buttons next to the ball, which
you use just like mouse buttons.

Fig. 1.9 Track Ball

The advantage of trackballs over mouse is that the trackball is


stationary so it does not require much space to use it. In addition,
you can place a trackball on any type of surface, including your
lap. For both these reasons, trackballs are popular pointing
devices for portable computers.

1.6 OUTPUT DEVICES


Output devices return processed data that is information, back
to the user. Some of the commonly used output devices are:
1.

Monitor (Visual Display Unit)

2.

Printers

3.

Plotter

4.

Speakers

1.6.1 Monitor
Out of all the output devices,
monitor (as shown in figure
1.10) is perhaps the most
important output device
because people interact with
this device most intensively
than others. Computer
Fig. 1.10 CRT and LCD Monitor
information is displayed,
visually with a video adapter card and monitor. Information
processed within the CPU, that needs to be visually displayed,
is sent to video adapter. The video adapter converts information
from the format used, in the same manner as a television displays
information sent to it by a cable service.

8 :: Data Entry Operations

Two basic types of monitors are used with microcomputers,


which are as follows:
1.

CRT

2.

LCD

Cathode Ray Tube (CRT): CRT or Cathode Ray Tube Monitor is


the typical monitor that you see on a desktop computer. It looks
a lot like a television screen, and works the same way. This type
uses a large vacuum tube, called cathode ray tube (CRT).
Liquid Crystal Displays (LCD): This type of monitors are also
known as flat panel monitor. Most of these employ liquid crystal
displays (LCDs) to render images. These days LCD monitor are
very popular.
When people talk about the capabilities of various monitors, one
critical statistic is the resolution of the monitor. Most monitors
have a resolution of at least 800 x 600 pixels. High-end monitors
can have resolutions of 1024 x 768 pixels or even 1280 x 1024
pixels. Thus monitors are available either in low resolution or in
high resolution.

1.6.2 Printer
After a document is created on the computer, it can be sent to a
printer for a hard copy (printout). Some printers offer special
features such as colored and large page formats. Some of the
most commonly used printers are:
1.

Laser Printer

2.

Ink Jet Printer

3.

Dot Matrix Printer

4.

Line Printer

Laser Printer: A laser printer produces


high quality print that one normally finds
in publishing. It is extremely fast and
quiet. Moreover, the operation of a laser
printer is easy with automatic paper
loading and no smudging or messing up
of ink ribbons. The fastest laser printer

Fig. 1.11 Laser Printer

Basics of Computer :: 9

can print up to 200 pages per minute in monochrome (black and


white) and up to 100 pages per minute in colour.
Ink-Jet Printer: An ink-jet printer
creates an image directly on paper by
spraying ink through as many as 64
tiny nozzles. Although the image it
produces is not generally quite as
sharp as the output of a laser printer,
the quality of ink-jet images is still high.
Fig. 1.12 Ink-Jet Printer
In general, ink-jet printer offers an
excellent middle ground between dot
matrix and laser printer. Like laser printer, an ink-jet printer is
quiet and convenient, but not particularly fast.

Typically, an ink-jet printer is more expensive than a dot-matrix


printer, but costs only half as much as a laser printer.
Dot Matrix Printer: The dot matrix
printer was very popular at one point of
time. It is a very versatile and inexpensive
output device. In dot matrix printer the
print head physically "hits" the paper
through the ribbon and produces text (or
images) by combinations of dots; hence
the name dot matrix printer. Its speed is
measured in characters per second
(CPS). Although it is less expensive, it is
louder, slower and produces lower print
quality.
Line Printer: A line printer is generally
used with large computer systems to
produce text based data processing
reports. Line printers are high-speed
printers with speeds ranging anywhere
from 100 to about 3800 lines per minute.
In the past, print quality on line printers
was not high. Developments in
technology are improving the print quality
on line printers. These are in the cost
range of lacs of Rupees.

Fig. 1.13 Dot Matrix


Printer

Fig. 1.14 Line Printer

10 :: Data Entry Operations

1.6.3 Plotter
A plotter is a special kind of output device that, like a printer,
produces images on paper, but does so in a different way. Plotters
are designed to produce large drawings or images, such as
construction plans for buildings or blueprints for mechanical
objects. A plotter can be connected to the port normally used by
a printer.
An array of different colored pens in a clip rack and a robotic arm
is part of plotter. The instructions that a plotter receives from a
computer consist of a color, and beginning and ending
coordinates for a line. With that information, the plotter picks up
the appropriate pen through its arm, positions it at the beginning
coordinates drops the pen down to the surface of the paper and
draws to the ending coordinates. Plotters draw curves by creating
a sequence of very short straight lines.
Plotters usually come in two designs:
1.

Flat Bed: Plotters of small size to be kept on table with


restriction of paper size.

2.

Drum: These plotters are of big size using rolls of paper of


unlimited length.

Fig. 1.15 Flat bed and Drum Plotter

1.6.4 Speaker
Speakers (as shown in figure 1.16) are
another type of output device, which
allow you to listen to voice like music,
and conversation with people.
Fig. 1.16 Speaker

Basics of Computer :: 11

INTEXT QUESTION
4.

Write True or False for the following:


(a)

Mouse is an output device.

(b)

OCR stands for Optical Content Reader.

(c)

LCD Monitor is used in notebook computer.

(d)

Speed of DOT Matrix Printer is measured in


Characters Per Second.

(e)

Plotters are used to produce high quality drawings


and images, such as construction plans for buildings
or blueprints for mechanical objects.

1.7 SOFTWARE
As you are aware, computer cannot do anything on its own. It is
the user who instructs computer; what to do, how to do and when
to do. In order to perform any task, you have to give a set of
instructions in a particular sequence to the computer. These sets
of instructions are called Programs. Software refers to a set of
programs that makes the hardware perform a particular set of
tasks in particular order. Software can be classified mainly
into following categories and sub-categories are shown in
Figure 1.17.

Software

System Software

Operating
System

Utilities

Application Software

Generalized
Packages

Fig. 1.17 Classification of Software

Customized
Packages

12 :: Data Entry Operations

1.7.1 System Software


When you switch on the computer the programs stored in ROM
are executed which activates different units of your computer and
makes it ready for you to work on it. This set of programs can be
called system software.
System softwares are sets of programs, responsible for running
the computer, controlling various operations of computer
systems and management of computer resources. Operating
System (OS) falls under this category.
An operating system is a system software that provides an
interface for a user to communicate with the computer, manages
hardware devices (disk drives, keyboard, monitor, etc), manages
and maintains disk file systems and supports application
programs. Some popular Operating systems are UNIX, Windows
and Linux.
Although operating system provides all the features users need
to use and maintain their systems, inevitably, they still do not
meet everyones expectations. This has led to another type of
system software called "Utilities". These are programs that bridge
the gap between the functionality of an OS and the needs of users.
Utility programs are a broad category of software such as
compress (zip)/uncompress (unzip) files software, anti virus
software, split and join files software, etc.

1.7.2 Application Software


Application software is a set of programs, which are written to
perform specific tasks, for example: An application package for
managing library known as library information system is used
to manage information of library such as: keeping book details,
account holder details, book issue details, book return details
etc. Another application package for managing student details is
called students information system, manages students roll no,
name, parents name, address, class, section, processing of
examination results etc. Application software can be broadly
classified into two types:
(a)

Generalized packages

(b)

Customized packages

Basics of Computer :: 13

Generalized Packages
These are user friendly softwares written to cater to users very
general needs such as preparing documents, drawing pictures,
database to manage data/information, preparing presentations,
play games etc.
It is a group of programs that provide general purpose tools to
solve specific problems. Some of the generalized packages are
listed below:
l

Word Processing Software(for preparing documents): Word


Perfect, MS-Word, OpenOffice.org Writer

Spreadsheets (Data Analysis): Lotus Smart suites, MSExcel, OpenOffice.org Calc, Apple Numbers

Presentations : Presentation Graphics, MS-PowerPoint,


OpenOffice.org Impress

Database Management System: MS-Access, OpenOffice.org Base,


MS-SQL Server, ORACLE

Graphics Tools: Paint shop pro, Adobe Photoshop

Customized Packages
These are the applications that are customized (or developed) to
meet the specific requirements of an organization/institution. For
Example: Student information details, Payroll packages,
inventory control etc.
These packages are developed using high-level computer
language.

1.8 COMPUTER LANGUAGES


Languages are a means of communication. Normally people
interact with each other through a language. On the same pattern,
communication with computers is carried out through a
language. This language is understood both by user and the
machine. Just as every language like English, Hindi has its
grammatical rules; every computer language is bound by rules
known as SYNTAX of that language. The user is bound by that
syntax while communicating with the computer system.

14 :: Data Entry Operations

Computer languages are broadly classified as:

1. Low Level Language:


The term low level means closeness to the way in which machine
understand. The low level languages are:
a. Machine Language:
This is the language (in the form of 0s and 1s, called binary
numbers) understood directly by the computer. It is machine
dependent. It is difficult to learn and even more difficult to write
programs.
b. Assembly Language:
This is the language where the machine codes comprising of 0s
and 1s are substituted by symbolic codes (called mnemonics)
to improve their understanding. It is the first step to improve
programming structure.
Assembly language programming is simpler and less time
consuming than machine level programming, it is easier to locate
and correct errors in assembly language than in machine
language programs. It is also machine dependent. Programmers
must have knowledge of the machine on which the program will
run.

2. High Level Language


You know that low level language requires extensive knowledge
of the hardware since it is machine dependent. To overcome the
limitation, high level language has been evolved which uses
normal English like, easy to understand statements to solve any
problem. Higher level languages are computer independent and
programming becomes quite easy and simple.
Various high level languages are given below:
l

BASIC (Beginners All Purpose Symbolic Instruction Code):


It is widely used, easy to learn general purpose language.
Mainly used in microcomputers in earlier days.

Basics of Computer :: 15
l

COBOL (Common Business Oriented language): A


standardized language used for commercial applications.

FORTRAN (Formula Translation): Developed for solving


mathematical and scientific problems. One of the most
popular languages among scientific community.

C: Structured Programming Language used for all purpose


such as scientific application, commercial application,
developing games etc.

C++: Popular object oriented programming language, used


for general purpose.

1.9 COMPILER AND ASSEMBLER


As you know that High Level language is machine independent
and assembly language though it is machine dependent yet
mnemonics that are being used to represent instructions are not
directly understandable by machine. Hence to make the machine
understand the instructions provided by both the languages,
Compiler and Assembler are required to convert these
instructions into machine language.
The software (set of programs) that reads a program written in high
level language and translates it into an equivalent program in
machine language is called as Compiler.
The program written by the programmer in high level language
is called source program and the program generated by the
compiler after translation is called as object program.

Source Program
(Higher Level Language)

Compiler

Object Program
(Machine Language)

Fig. 1.18 Compiler

The software (set of programs) that reads a program written in


assembly language and translates it into an equivalent program
in machine language is called as Assembler.

16 :: Data Entry Operations

Source Program

Assembler

(Assembling Language)

Object Program
(Machine Language)

Fig. 1.19 Assembler

INTEXT QUESTION
5.

Write True or False for the following:


(a)

Operating System (OS) is an Application Software.

(b)

High level languages are easy to program than low


level language.

(c)

Computer language FORTRAN is used to solve


Scientific and Mathematical problems.

(d)

C is an object oriented programming language.

(e)

Compiler converts high level languages into machine


language.

1.10 WHAT YOU HAVE LEARNT


A computer is useful only when it interacts with the external
devices such as keyboard, mouse, monitor, speaker, which are
called as peripheral devices. In this lesson we have discussed
in details about major peripheral devices of a computer system.
You have learnt that only hardware does not do anything of its
own without the help of software. Hence we have explained in
details about software, its types and the computer languages
used to prepare the software.

1.11 TERMINAL QUESTIONS


1.

What is a computer? Draw a block diagram to illustrate the


basic organisation of a computer system and explain the
functions of various units.

2.

What is an input device? Briefly describe varioius important


input devices.

3.

Discuss two basic types of monitors CRT and LCD.

Basics of Computer :: 17

4.

What is a software? Discuss its various categories with the


help of diagram.

5.

Distinguish between system and application software.

6.

Write short notes on:

7.

(a)

Laser Printer

(b)

High level language

(c)

Compiler

(d)

Plotter

Write a note on Computer language and its classification.

1.12 FEEDBACK TO INTEXT QUESTIONS


1.

The five basic operations that a computer performs are


input, storage, processing, output and control.

2.

ALU :

Arithmetic Logic Unit

CU

Control Unit

CPU :

Central Processing Unit

3.

(a) i

(b) iii

(c) i

4.

(a) False

(b) False

(c) True

(d) True

(e) True

5.

(a) False

(b) True

(c) True

(d) False

(e) True

MODEULE 2
INFORMATION SYSTEMS AND STRATEGIC IMPLICATIONS
What Is an Information System?
In this lesson, we'll take a look at the definition of an information system. We will also learn who
stakeholders are and how they contribute to an information system.

Definition of Information System


Information is an organized set of seemingly related data. A system is a method, or process, of
grouping things together. You may or may not have wondered how these two terms have combined
and what helps them work in near harmony. This video grouping will help you discover the
components and processes that make up the early 21st century's information system. Our formal
definition of information systems is the combining of users, technology and processes to complete
a given goal.

Users
Think about your daily routine. It doesn't matter if you are a student, working adult, someone's
parent, retired or some combination of all of these, systems of technology impact you. For example,
these videos are made with a broad variety of technological and human resources. You might
access your school or employment record system or take a trip to the gas station to fill up or buy a
gallon of milk. We all use these systems day in and day out, making us users of information
systems.

AKA Stakeholders
Another term for people who have an interest in information systems is a stakeholder. These can
include anyone who makes use of the system - who's also known as an end-user - and the creative
team, customers and anyone else who may be affected by the system.
Let's take a moment to break down a very complex system into a really simple visual to show how
an information system affects a hospital and its stakeholders. Let's say you're shooting hoops with
your buds. You go up to jam, and you come down on the opponent's foot. Your ankle rolls and gives
a great 'pop' you really didn't want to hear.
Your friends load you up and take you to the emergency room. You go through the process of
registration and triage. Your personal information is sent to a system that holds data and your basic
medical information, such as vital signs, height, weight and the symptoms you're presenting. These
may be entered into the computer system and held or documented on paper, passed along with your
billing information and entered into the system later. You are then assigned to a bed and a nurse
and ER doctor. Both of these individuals would have clocked in to a system that held payroll
information. Their login and logout times are maintained until the pay period ends, at which time the
payroll department combines their data with their personal information and processes the paycheck.

Your nurse may take your vital signs and discuss the symptoms with you, marking them down in an
electronic chart. She'll report the information to a doctor, who will then come to complete the
interview and make an early diagnosis. The doctor might order lab work, X-rays, MRIs or CT scans.
Again, these orders would be entered into the hospital's information system. Once the ordered tests
are completed, the results of the lab tests and digital copies of X-rays, MRIs and CTs are tied to your
record held in the computer system.
Your doctor will then make his final diagnosis and either admit or discharge you. If you are admitted,
your status would change from emergency room to admit and the bed assignment would be
changed. Your on-call doctor would start a treatment plan, and once you're healed, you would then
be discharged. When you're discharged, instructions are created, the visit is communicated to your
personal physician, all services and materials used for the visit are transmitted to patient billing who
will then create an invoice to send to your insurance company using electronic data interchange. The
hospital then waits for the insurance company to return payment via direct pay. This combination of
users, technologies and processes to complete a given goal is the information system, and it is
vitally important to all the different stakeholders that will be a part of that system.

Input, Processing, Output & Feedback: Information System


Components
What are the components that really make an information system work? In this less, we'll explore
IPOS (input, process, output and storage) and how this system works.

IPOS

Printing a photo is an example of short-term output

Information systems require a constant cycle. We'll get to the specifics of what equipment they need
later, but the functionality requires four basic steps:input, process, output and storage. It also
requires significant feedback during and after use of the system. These steps, if remembered, will
help you understand with what should be taken out of an information system. IPOS is a simple
acronym to learn, and is the ground work of all the components, internal and external, tangible and
intangible, of the information system.
Input is anything we wish to embed in a system for some type of use. A variety of sources are used
to input: keyboard, scanner, microphone, mouse, even another computer. What we input has a
purpose - but until it is processed and generated in some form of output, it doesn't do us much good.

Processing takes place in the internal parts of the computer. It is the act of taking inputted data and
converting it to something usable. What we typically see on the screen in today's computer world
(known as what you see iswhat you get or WYSIWYG) is the result of our input being processed by
some program so we can have usable output: an English paper, an edited photograph, this video
you're watching.
Output, or processed information in a usable format, comes in many different forms: monitor or
printer for visual work, a speaker for audio. Sometimes our output is short-term, such as printing a
photo, and sometimes what we work on needs to be kept around for a while. That's where storage
comes in.
Storage is the term used to indicate we will be saving data for a period of time. We store for many
reasons: for future reference; to prevent full loss of data; because we forget to purge. But, storage is
vital. There are several mediums on which we can keep output and processed data: a hard disk, a
USB drive, a CD.
Here are two anecdotes to drive that point home. Someone lost an entire season of her son playing
hockey because she didn't back-up the video and photo files. And, a fellow student was working on a
year-long bachelor's thesis and did not back it up the first, the second or the third time she lost it - all
at different stages of completion, with a thesis over 60 pages long when she was done.
Quick - what does IPOS stand for? That's right, input, process, output and store! Besides the four
functions of IPOS, an information system also requires feedback. This is how future systems are
revised and rebuilt - by receiving ideas, impressions and constructive (or not so constructive)
criticism by users and other stakeholders.

IPOS in Action

Types of storage mediums

'Okay, teach. You gave us a bunch of technical jargon, but what does it mean?'
Let's take a trip to a favorite restaurant. The overall system means that a patron is entering the
doors, being seated (and served a tasty meal), then departing as a happy customer. The bottom line
is a meal that pleases the customer because all of the criteria were met. There are multiple inputs in
this transaction and we will step through them.
The first input: greetings would be exchanged and the patron places their order. Let's say you're
ready for a steak. At this point we go into the process mode: the chefs will do their thing back in the
kitchen. Output: the dinner will be presented nicely to Mr. Smith. For storage, your order is kept for
the evening and tied with the computer system that may be used for ordering, trend analysis and

other things. In feedback: in this case, you (the patron) provide feedback to the server about the
quality of the food and service. Was the steak cooked to your liking? Do you have the correct side
dishes and condiments? Is the taste satisfactory?
Now, take that back to the information system. Many restaurants use a point-of-order information
system that accepts input at a computer screen and flows through an entire process. During the
input step, the server jots down your order and then inputs it into the order system. The order is then
processed (along with other patrons') by using that order system. Orders are output either on printed
tickets or monitors for the kitchen staff (and of course, on your final bill). Servers, kitchen staff and
managers may provide feedback to the system administrator regarding functionality, ease of use,
repetitive tasks and so on. And finally, storage: the information that is stored can be used as
previously mentioned for inventory control and sales trends. It can also be used for income and
expense reports, staffing needs and so on.

Information Systems Resources: Networks, Hardware, Software, Data & People

What are the resources an information system needs? Discover how networks, hardware, software,
data and people work together to create usable information.

Understanding Data
We've established that an information system is the combining of users, technology and processes
to complete a specific goal. A stakeholder isn't only a user but is someone who has any type of
interest in a particular process. These people utilize hardware and software, typically in a network
format, to process raw data into usable information.
Data is one piece of a record. Individually, some of your datum might be your first name, middle
name, last name, address, city, state, zip, phone number and occupation. When put together, we
see a record. Consider a global business with nearly 100,000 employees. If we were to put each bit
of data on index cards and toss it in a room, we'd have a lot of cards, but could you interpret and use
that data? Probably not. What we would have is a great start to a bonfire. But if each person's data
was compiled as a record and those records processed into an employee list, we would now have
usable information, or a collection of related records.
The old way would have been handwritten or typed index cards filed in many boxes alphabetically.
The list would then have been typed and photocopied for distribution. Technology has made that
process just a little faster. We now use keyboards, scanners and microphones to input data into a
system. The system unit contains components, which house the software that processes the data
into information.

Hardware and Peripherals


The components of the system you can physically touch - the system unit (tower, desktop, laptop),
internal devices and peripheral devices (keyboards and monitors) - are called hardware. It is
important to remember that basic definition: Hardware are the parts of the computer that are tangible
and can be touched.
Specifics of peripheral devices are provided in many other ways, but think of them as hardware
that surrounds the system unit. Hint: Your peripheral vision is what lets you see out of the sides, or
corners, of your eyes. These peripheral devices may be connected by wired or wireless technology

to the system unit. Peripherals communicate with the interior components of the system unit via
installed software. Software itself is intangible and can't be touched physically.

Hardware allows you to physically interact with your computer.

Software
That particular type of software is the operating system software. Software, as a general term, is
the set of instructions written to direct the computer to execute specific tasks. Operating system
software is typically written for a specific type of computer. The operating system, or just system
software, instructs the hardware to get moving when the power is turned on or the mouse is moved,
deactivating a sleep mode. It interprets instructions from applications software to utilize peripherals
and/or storage devices. An example is Microsoft Windows 7 for a PC-based computer or Mac OS X
for a Macintosh.
Microsoft is semi-unique in that it produces not only operating system software, but application
software as well. Application software, or productivity software, is the set of instructions installed in
a computing device that lets us do something. There are thousands of software programs out there,
but a few examples you may be familiar with are iTunes, Microsoft Word and Adobe Reader. Both
application and system software are sold to individual users; however, there are versions that can be
used in a network environment.

Networks
A computer network is a grouping of computer stations connected in some manner that allows for
sharing of resources. You may have a wireless network at home that lets you share Internet
connection, printers or even storage devices. This same concept can be created, many times larger,
using wired technology in businesses ranging in size and physical location.

What Are Information Systems? - Definition &


Types

An information system is software that helps you organize and analyze data. This makes it possible
to answer questions and solve problems relevant to the mission of an organization.

What Is an Information System?


Many organizations work with large amounts of data. Data are basic values or facts and are
organized in adatabase. Many people think of data as synonymous with information; however,
information actually consists of data that has been organized to help answers questions and to solve
problems. An information system is defined as the software that helps organize and analyze data.
So, the purpose of an information system is to turn raw data into useful information that can be used
for decision making in an organization.

General Purpose vs. Specialized Information Systems


There are some general types of information systems. For example, a database management
system (DBMS)is a combination of software and data that makes it possible to organize and
analyze data. DBMS software is typically not designed to work with a specific organization or a
specific type of analysis. Rather, it is a general-purpose information system. Another example is
an electronic spreadsheet. This is a tool for basic data analysis based on formulas that define
relationships among the data. For example, you can use a spreadsheet to calculate averages for a
set of values or to plot the trend of a value over time.
In contrast, there are a number of specialized information systems that have been specifically
designed to support a particular process within an organization or to carry out very specific analysis
tasks. For example,enterprise resource planning (ERP) is an information system used to integrate
the management of all internal and external information across an entire organization. Another
example is a geographic information system (GIS), which is used to manage and analyze all
types of geographical data. Expert systems are another example of information systems. An
experts system is designed to solve complex problems by following the reasoning of an expert.

Typical Components of Information Systems


While information systems may differ in how they are used within an organization, they typically
contain the following components:
1. Hardware: Computer-based information systems use computer hardware, such as
processors, monitors, keyboard and printers.
2. Software: These are the programs used to organize, process and analyze data.
3. Databases: Information systems work with data, organized into tables and files.
4. Network: different elements need to be connected to each other, especially if many different
people in an organization use the same information system.
5. Procedures: These describe how specific data are processed and analyzed in order to get
the answers for which the information system is designed.
The first four components are part of the general information technology (IT) of an organization.
Procedures, the fifth component, are very specific to the information needed to answer a specific
question.

Different Types
The many different types of information system can be divided into categories based on the where
they are used in the hierarchy of an organization.

This is best understood with an example. Consider a chain of bookstores. Every day, each store
receives new books to put on the shelf, and many books are sold. All of these events are processed
using atransaction processing system. This is used by store clerks and cashiers. Individual store
managers have different tasks. They need to schedule staffing for their store, keep track of deliveries
of new books and keep track of the finances. A store manager will use one or more management
information systems for these tasks.
The company has a number of stores, and so it also has more senior managers need to make sure
the entire chain keeps running smoothly. This includes tasks like the logistics of shipping books from
a warehouse to the stores, keeping track of inventory and sales and managing personnel. At this
more senior level, managers would use decision support systems. At the executive level, the
decisions are more strategic. For example, they may need to determine where to locate a new store,
identify new markets and develop an online presence in addition to the brick-and-mortar stores. This
would require the use of executive information systems.
While this pyramid model is useful, some information systems might be used at different levels. In
the case of the bookstore chain, the sales information from the transaction processing makes it all
the way to the top in order to identify which products are doing well and which stores are doing
better than others.

Subsystem: Definition & Explanation


In this lesson, you will learn how to identify a subsystem and why it is important to define each
subsystem within an organization. Then, test your knowledge with a quiz.

Subsystem Defined
A system is defined as an assemblage or combination of things or parts forming a complex or
unitary whole. It's important to understand the difference between a process and a system. Business
processes occur within a business system. Processes are an organized set of steps intended to
take some input and generate a desired output. Systems don't generate outputs, but they provide
the structure and environment within which a process can reside.
A subsystem, while a system in itself, is also wholly contained within a larger system. An online
retailer may have a complex and extensive distribution system and within that system would be
subsystems, such as delivery, order fulfillment, and inventory management.

Business Examples
You may have heard the term 'system' used to describe specific parts of a business, such as a
distribution system or an information technology system. Both of these reside within a larger system
- the organization of which they're a part - and even the organization is part of a larger economic
system.
A distribution subsystem includes the people, processes, equipment, and policies that exist to
distribute products or services from an organization to individual customers. These components
might include delivery trucks, an order entry process, inventory, and employees to make it all
happen.
Information technology systems are very complex and often have hundreds of subsystems within
subsystems. These systems include the hardware (computers, devices, etc.) and the software
(operating system, word processors, web browser, etc.), as well as the human or mechanical owner
of the system. All of the hardware and software owned by a company could be considered the
information technology system, and a single workspace that consists of a computer, printer, and
software could be considered the subsystem.

MODULE 3
INTRODUCTOIN TO E-BUSINESS

What is 'e-Business'?
Simply defined, an e-business is an electronic business activity. It's an older term, just like many of
the terms created in the late 1980s and early 1990s as the Internet started becoming part of
everyday life: first for researchers, then for many businesses, and then for consumers. Just like 'email,' the abbreviation 'e' - meaning electronic - was put in front of words already used to describe
how the Internet was changing our lives.
At first, e-business generally referred to businesses that interfaced with their consumers almost
exclusively over the Internet. For example, one of the earliest e-businesses that aimed to serve a
broad market was Amazon.com. The Amazon.com of 1994 was very different than the Amazon.com
of today. Even if you could compare their homepage in 1994 to their current homepage, you'd be
shocked at how much technology has changed. But you would also notice that, in 1994,
Amazon.com was a specialty bookstore.
Today, while it still sells books, it also sells nearly every other product you can think of: clothes,
electronics, toys, household goods, music, movies, and even food! Amazon Dash is a service
available in many large U.S. cities where you can order fresh vegetables, fruit, and other food on
Amazon and it is delivered the same day. Amazon.com also includes the Amazon Marketplace,
which is where third-party vendors can sell on Amazon, much like eBay (but Amazon Marketplace
doesn't use bidding). As the 'e' part of 'e-business' has changed, Amazon is a great example of a
company that has changed with it.
But not all e-businesses were intended for consumers to see and use. As the Internet developed, so
did the type of businesses on it.

The Development of e-Business


Think of all the types of businesses in a normal economy. You have retailers that sell directly to the
consumer. You have wholesalers who sell to the retailers. You have manufacturers who sell to the
wholesalers. You have service providers that sell services to help the rest of the economy work.
Throughout the 1990s and 2000s, all of those businesses found ways to use the Internet to be more
productive, thus, in some way, becoming e-businesses. Soon, the term 'e-commerce' was in use, still
referring to e-business activities, but often being more focused on the buying or selling transactions.

Types of e-Businesses
Earlier, we discussed Amazon. Amazon is a great example of a direct-to-consumer e-business.
Their marketing, distribution system, and website is all aimed at the end user - me and you - using
their website and buying something, without ever leaving our home. When you think about ebusinesses, these might be the first to come to mind. These are often called B2C or business-toconsumer companies. But there are other types.

How about eBay or Craigslist? eBay may sound like a direct-to-consumer business, but really, it's
a third-party service provider. When you buy something from eBay, you don't really buy it from
eBay, you buy it from someone that has listed an item for sale on eBay. In that way, a third-party
service provider isn't selling you something directly, but is facilitating a transaction between the
buyer and seller. Companies like eBay that connect two consumers are sometimes called C2C, or
consumer-to-consumer businesses.
Third-party service providers are popular on the internet. Think about PayPal. PayPal isn't a bank,
but it helps you send and receive money from other people. And how about Gmail, AOL, Yahoo!
Mail, or any other email provider? They facilitate communication between two or more other people.
These third-party service providers have become big businesses on the Internet.
Another type of e-business that quickly became popular were business-to-business wholesalers,
or B2B. Companies no longer needed to call one of their manufacturers when they needed new
inventory, ask for a catalog, fax or call in an order of something, and then wait for it to arrive. Much
of that process could be automated by keeping track of inventory online, so restock triggers could be
automatic, sending a new order for a predetermined amount directly to the manufacturer. This
benefited both the wholesaler and the manufacturer.
A good example of a business-to-business company that had an early online presence is Sony.
Sony doesn't have physical stores, so before the Internet, they sold their goods through wholesalers
and retailers. When there are two parties in between the producer and end consumer, costs rise. But
when Sony could eliminate much of the waste in the process by communicating with their
wholesalers online, they saved money, time, and waste. An interesting point about these pre-Internet
manufacturers is that many have now skipped the traditional distribution channels and have started
selling directly to consumers, since the Internet allows them to do so.

What Is Electronic Commerce?


Have you ever purchased a pair of shoes over the Internet? Or, maybe you've used your computer
to sell an old phone? If so, you've taken part in electronic commerce. Also known as ecommerce, electronic commerce is the process by which businesses and consumers buy and sell
goods and services through an electronic medium.
Electronic commerce emerged in the early 1990s, and its use has increased at a rapid rate. Today,
the majority of companies have an online presence. In fact, having the ability to conduct business
through the Internet has become a necessity. Everything from food and clothes to entertainment and
furniture can be purchased online.
Two familiar examples of electronic commerce companies are eBay and Amazon. Both of these
companies allow consumers to purchase a variety of goods and services online from businesses
and other consumers, while eBay also hosts online auctions. Consumers on these sites typically
have numerous payment options, as well as choices for how their products are delivered.

Types of E-Commerce
There are several types of electronic commerce. The most common is business to consumer, in
which a business sells products or services directly to consumers over the Internet. An example of a
business to consumer e-commerce transaction would be an individual purchasing a pair of sneakers
through Nike's website.

Another type of electronic commerce is business to business, where companies sell products or
services to other companies over the Internet. An example would be the company GoDaddy, which
sells domain names, websites, and hosting services to other businesses.
Consumer to business electronic commerce involves consumers selling products or services to
businesses. You've taken part in this form of e-commerce if you've ever completed a paid online
survey where you've given your opinion about a product.
Finally, there is consumer to consumer e-commerce, which is where consumers sell products to
other consumers. An example would be one consumer selling something that he or she no longer
needs or wants to another consumer via a site like eBay or Amazon.

Advantages and Disadvantages


Let's take a look at some of the advantages and disadvantages of electronic commerce.
Advantages - Electronic commerce can allow consumers to access their favorite store at any time,
day or night. This benefits both buyers, who might not be able to visit a store during typical business
hours, and sellers, who can peddle their products around the clock.
Additionally, e-commerce lets businesses and consumers conduct business anywhere in the world.
This broadens consumers' shopping sphere, giving them access to businesses located in the next
town over or even on the other side of the world. Not only can this save them the time and money
they'd spend to commute to a store, it also provides the opportunity to easily comparison shop so
they get the best price on their purchases. For businesses, e-commerce can provide a larger
consumer base and thus the potential for greater profit. It can also allow sellers to conduct business
without ever opening a brick-and-mortar store.
Disadvantages - Although electronic commerce is becoming increasingly popular, there are still a
few concerns. Some people aren't comfortable making financial transactions over the Internet and/or
are worried about the possibility of identity theft. Additionally, some consumers are skeptical of items
that aren't sitting right in front of them or worried about not getting what they ordered. Questions
about sizing persist for consumers purchasing clothing or shoes, and products can get damaged or
lost in the shipping process.

E-Commerce Business Models

Business-to-Consumer E-Commerce

Business-to-consumer E-commerce has changed the way customers buy products from stores and
businesses. This lesson discusses the benefits of business-to-consumer E-commerce. A short quiz
follows the lesson.

What is Business-to-Consumer E-Commerce?


It's 2:00 AM and Annie, one of your customers on the East Coast, is perusing your men's clothing
website, looking for a new outfit for her husband. She has been so busy with work, the kids, her
husband, and all aspects of life that she doesn't have time to go shopping at a brick and mortar
store. Because you have all of your inventory available online, she can select her husband's entire
outfit, pay for it, and have it shipped without ever leaving her home.

Business-to-consumer E-Commerce is the process of individual customers buying from a


company online. E-commerce has drastically changed how businesses interact with their customers.
It provides an opportunity to sell to customers around the world, 24-hours a day, 7 days a week. The
characteristics of traditional business change when they operate online. Instead of relating to
customers face-to-face, the interaction is less personal through E-commerce. Customers must email
or call with questions or problems, which can cause more frustration or concern when
communication challenges arise.

Benefits of Business-to-Consumer E-Commerce


There are many benefits to companies offering online sales:
1. Convenience. Customers can shop at their convenience, in their own home. Customers are not
bound by your business hours or when they can make time to go to your store. They can get online
whenever they have time, wherever they are, and make purchases. This allows customers to buy at
any time, day or night.
Annie is benefiting from the convenience of your online store, allowing her to shop in the middle of
the night.
2. Your customers are not limited by geography. They might live around the corner or across the
world. When you offer online sales, you can ship your products anywhere. This removes
geographical barriers and allows you to target a much larger audience.
Annie is located across the country from your West Coast store. She isn't limited to stores within
driving distance and she can purchase easily and quickly, having the items shipped directly to her
doorstep.
3. Online sales can happen quickly. In the brick and mortar environment, it can take a while to make
changes to products and prices and then communicate those changes to customers. Sales must be
marketed, signs or flyers created, and advertising prepared. Online, a sale can happen in minutes. A
simple email or message on social media can be created quickly and communicated to thousands
with a click of a button. This makes marketing online a much more streamlined process.
Instead of scheduling two hours to go shopping, Annie can find the clothes she wants in a manner of
minutes. This saves her travel time and allows her to look at all of your inventory in a fraction of the
time.
4. You can expand your business rapidly. A physical store has a limit to the number of customers
they can serve, based on the size of the store and the number of employees available. Online, those
limitations disappear. Your store can serve hundreds of customers at a time and they can purchase
items without the interaction of a physical person. This allows more people to shop at your store at
any given time.
Annie not only shops at your store, she also tells her friends about the amazing inventory you have
available. In a matter of a few weeks, you have many additional customers from the East Coast
shopping from your company.

Business-to-Business E-Commerce

Some businesses primarily serve other businesses instead of consumers, and business-to-business
(B2B) e-commerce has become an increasingly important means of providing that service. In this
lesson, you'll learn about B2B e-commerce.

B2B E-Commerce Defined


Elisa is the president of an auto manufacturing company. Her company requires many different
types of goods and services that it procures from other companies. These types of transactions are
called business-to-business (B2B) commerce because it is commerce between two different
businesses rather than a business and a consumer.
An ever-growing share of Elisa's B2B transactions is e-commerce transactions. Ecommerce involves commercial activities transacted through the Internet. B2B e-commerce is
simply business-to-business commercial transactions that are conducted online. Let's take a quick
look at the type of B2B e-commerce transactions conducted by Elisa's company.

E-Distributor
Elisa's company relies on some e-distributors, online businesses that provide goods and services
directly for Elisa's company. For example, her company produces different types of motor vehicles
that require different components, such as steel, plastic, fiberglass, engine components, tires and
entertainment systems.
Just like traditional brick and mortar distributors, some e-distributors are retailers, while others
provide wholesale goods. For example, while the parts ordered for the production of the company's
autos are provided by a wholesale e-distributor, the company's office supplies are provided by a
retail e-distributer. Let's take a look at some other e-commerce options on how e-commerce may be
transacted.

E-Procurement
As mentioned earlier, Elisa's auto company needs to procure a wide variety of goods and services in
order to manufacture its vehicles. E-procurement can help Elisa do this efficiently. E-procurement is
an e-commerce business model where a business creates a digital marketplace where buyers and
suppliers can engage in sales transactions. You can kind of think of it as Etsy for businesses, though
businesses often pay for the access.
Aside from creating the online market place, the e-procurement business may also provide
specialized software to help suppliers and their customers transact business, such as e-invoicing, eauctions, e-payment, e-catalogues and order tracking, among others. In Elisa's case, her company
may decide to use an e-procurement service to acquire a variety of auto parts. However, there are
other options available. Let's take a look.

Exchange
Elisa's company sometimes may turn to an electronic exchange. An exchange provides a
marketplace that is focused on serving one vertical market, such as the steel market, chemical
market or copper market. It's different from e-procurement because it's more narrowly focused.

Elisa's company may utilize an exchange to acquire raw inputs, such as copper wire or steel that it
will machine into engine components.

Industry Consortium
Rather than use an exchange, Elisa may have her company turn towards an industry consortium.
An industry consortium is like an exchange as it also is a vertical market, but an industry
consortium is owned by a specific industry, such as the aerospace industry, the auto industry and
the pharmaceutical industry. An industry consortium typically will permit only a limited number of
suppliers in to try to serve its members.

Private Industrial Network


Sometimes a company will ditch the middleman and create its own private industrial network.
A private industrial network is a computer network owned by a company that allows its suppliers
to communicate and coordinate with the company regarding its supply chain needs.
You can distinguish a private industrial network by remembering that it's private - owned by and for
one business - and suppliers may participate by invitation only. For example, Elisa's company may
set up a private industrial network with her most trusted supply partners to improve procurement
communication and efficiency. The network will provide key information such as current inventory
levels, sales data and the status on delivery of shipments.

Consumer-to-Consumer (C2C) e-Commerce:

Consumers have a growing number of opportunities to engage in electronic commerce with each
other. Learn about how consumer-to-consumer e-commerce works and take a quiz to test your
knowledge.

What Is Consumer-to-Consumer E-Commerce?


Have you ever bought or sold an item on eBay.com or craigslist.org? If so, you have participated
in consumer-to-consumer (C2C) e-commerce. People who come together to buy, sell or trade
items online take part in C2C e-commerce. This type of e-commerce is the modern version of using
the classified advertising section of your local newspaper or going to an auction. C2C e-commerce is
a convenient way for consumers to buy and sell goods without getting in their cars and driving to a
store.

Business Model
C2C e-commerce differs from a business-to-business model or a business-to-consumer model
because consumers interact directly with each other. However, a business does operate the online
platform on which C2C transactions take place. Typically, buyers can shop for free, but sellers
sometimes have to pay a fee to list their products. Consumers often play an active role in monitoring
e-commerce sites for scams and other inappropriate content.
The C2C model entails lower costs and higher profits for buyers and sellers. Sellers can store
inventory in a home office, and it costs less to market and distribute products than in a traditional
business-to-consumer model. Both new and used goods are sold through C2C e-commerce, and

fewer middlemen are involved in the transactions. Advances in technology and ease of access to the
Internet have also made it possible for a growing number of individuals to launch C2C e-commerce
businesses.

Examples of C2C E-Commerce


Craigslist is one of the top websites in the world and the leading service for classified ads.
Consumers can not only buy, sell and trade items, but also conduct other transactions such as
housing and job searches. The site is very user-friendly, allowing consumers to register and list an
item for sale within minutes. For consumers looking to make a purchase, they simply go to the 'for
sale' category and choose the appropriate subcategory (e.g. computers, furniture, books, etc.).

The craigslist site is easy to navigate.

The craigslist site is easy to navigate. Consumers conduct their craigslist transactions via e-mail, but
the system disguises the e-mail addresses to protect consumer privacy. Craigslist has more than 25
million new classified ads each month posted from more than 450 different cities. Since craigslist
has a small workforce, users play an important role in monitoring the site's content and reporting
scams or other unethical or illegal activities.
eBay is a global online shopping and auction website that offers millions of consumers a wide
variety of goods and services. Sellers pay a fee or commission to sell their items, and buyers can
shop and make purchases for free. Buyers place bids just like in a traditional auction and only
acquire an item if they are the highest bidder. Monetary transactions are typically completed
through PayPal, a service for online money transfers. Once a transaction is complete, buyers and
sellers can rate each other based on their trustworthiness.
In addition to these two C2C e-commerce giants, there are many other C2C e-commerce sites.
Examples include the award-winning bizrate.com shopping site, China's eBay-style taobao.com site
and the handcrafts marketplace at etsy.com. These sites serve customers in specific regions and
specific niche markets. As Internet access spreads around the world, the number of opportunities for
C2C e-commerce will also continue to grow.

Value Chain and E-Strategy - Components of Commercial Value Chain


All companies undertake series of activities in order to deliver a product to the customers. These
series of activities like procurement of raw material, storage, production, distribution, etc. are
referred as value chain activities. The function of value chain activities is to add value to product at
every stage before it is delivered to the customers. There are two components, which make value
chain - primary activities and secondary activities. The primary activities are directly associated with
the manufacturing of products like supply management, plant operations, etc. The secondary
activities are referred to as support functions such as finance, HR, information technology, etc.
In the era of advanced information and communication technology, many businesses have started
operations on the internet as its medium. Through the internet, many commercial activities like
buying, selling, auctioning is taking place. This online commercial activity is known as e-commerce.
E-commerce value chain has series of activities like electronic fund transfer, internet marketing,
distribution channel, supply chain etc.
Value Chain and E-Strategy
Every activity within a physical value chain has an inherent information component. The amount of
information that is present in activities determines, companys orientation towards e-commerce. It
has been observed that companies with high information presence will adopt e-commerce faster
rather than companies with lower information presence.
For example, a computer manufacturer has high information presence, i.e. they can provide a great
deal of product information through their website. Consumers also have flexibility to determine the
product configuration using the website. Such computer manufacturers and companies with
comparative business model are also likely to adopt e-commerce.
Activities which comprise of the value chain are undertaken by companies to produce and sell
product and services. Some of the activities done within the value chain are understanding customer
needs, designing products, procuring materials for production, production, storage of products,
distribution of products, after sale services of products and customer care.
Understanding Information Presence
There are two ways to assess information presence. The first way is by looking at the industry, and
second way is by looking at the product. In an industry with high information presence, it has been
observed that:

Industry will have large number customer base.


Production process is complex.
Order turnaround cycle is long.

For a product with high information presence following is observed:

Product is simple to manufacture.


Product has multiple functionalities.
Product requires in dept end user training.

Industry and product which satisfy above conditions are likely to adapt e-commerce.

E-Strategy
Companies with high information presence were the first to look at e-commerce as an alternate way
of conducting business. For example, software companies, much of there is business is done
through the internet. Their website provides in-depth product information through e-brochure, video,
client opinion, etc. Sales leads are generated online; purchase and fund transfer is done, and also
after-sales service is done online.
These high information companies have made substantial investment in human resources and
information/communication technology.
Challenges
Companies which are moving towards e-commerce need to have business model developed to
support online activities. The dotcom burst of 2000 has served hard example about companies doing
e-commerce.

What is the Internet


If someone asked you about the Internet would you tell them that it is the World Wide Web? This
isn't really true, and you will learn why in this lesson as we look at the parts that make up the
internet.

What Is the Internet?


Can you remember a time when you could not tweet, post, email, blog, snap, or like someone
online? Many people today have grown up being able to do all of these things. But there was a time
when none of this was possible. What makes this possible today is what we call the Internet.
According to Webopedia, the Internet is a worldwide system of connected networks. Each network
consists of millions of computers, servers, routers, and printers. You can think of the Internet like the
telephone network or the interstate highway system. You may have even heard people refer to the
Internet as the Information Super Highway. The networks that make up the Internet may be owned
and maintained by different companies but messages and data move across all of them without
regard to ownership because they all use the same protocol or language to communicate.

Who Created the Internet?


According to Hobbes' Internet Timeline, in 1957, the Soviet Union launched the first satellite into
orbit. While this might not sound serious, this happened during a time in American history called the
Cold War. It was at this time the threat of nuclear war was at its greatest. The thought was, if the
Soviets could launch a satellite into space, then they might be able to launch a nuclear bomb and hit
the United States, destroying all of our communication lines.
The Internet began in 1969 as a research project funded by the Department of Defense with a goal
of creating a means of communication beside telephone lines. The first network was
called ARPANET (Advanced Research Project Agency NETwork). The focus was on communicating
in the event part of the network was disabled. This early network was the precursor to the Internet. It
was limited in function but launched the idea of a different method of communication.

How Does Information Move Across the Internet?


Information moves across the Internet much like UPS delivers packages. When you order
something, it could be boxes in multiple packages because one box would be too large to deliver. A
message or webpage is broken down into packets to be delivered to your computer. Each packet
has addressing information so that it knows where it is going. Your message or webpage could be
broken down into many packets and each packet will have the address and the number of the
packet so that when it gets to its final destination your computer or email server will know how to put
the packet together to make a meaningful message.
In the beginning, most information moved across telephone lines using a modem and dial up
connection. This method of connection, slow and unreliable, is still available. Today, though, we
have connections, such as ISDN - Integrated Service Digital Network, DSL - Digital Subscriber Line,
T1 and T3 lines, that provide faster speeds. You can also get the Internet over your local cable TV
lines and by satellite. No matter how you connect to the Internet, it has likely become a vital part of
our everyday life.

What Makes Up the Internet?


For information to move across the Internet, it takes hardware and an agreed upon set
of protocols. The hardware needed would be computers, cables, routers, servers, cell phone
towers, satellites, smartphones and a variety of other mobile devices. Anything that has the
capability to send or receive data would be considered a connection on the Internet. Your computer
or smartphone would be considered an end point - the final destination. Cables, routers, servers,
cell phone towers, and satellites are nodes on the network that pass information along on its way to
its final destination.
Protocols are sets of rules that machines follow to complete tasks. It is because of these protocols
that a variety of devices can connect to the Internet and communicate seamlessly, and the protocols
assure the information sent gets to its final destination in the correct order

World Wide Web: How the Web Works


In this lesson, an overview of the World Wide Web is discussed, including its development and
operation. The various technologies that enable the Web to work are also described. Topics include
Web browsers, hypertext markup language, hypertext transfer protocol, hyperlink and FTP.

Who Invented the World Wide Web?


Grandma: Come on in Wendy. It's good to see you, dear.
Wendy: Great to see you, too, Grandma. Show me this new computer you just had set up. This is
very nice! You will be able to access so much information and visit a variety of websites. It will keep
you so busy, you may not have enough time to knit anymore!
Grandma: Oh, I don't know about that! I just hope it isn't too difficult to access the World Wide Web.
Come to think of it, I am familiar with the term World Wide Web but I don't exactly know what it
means. Can you describe it to me in simple terms?
Wendy: Of course! The World Wide Web, commonly referred to as the Web, is a system of
interlinked, hypertext documents accessed through the Internet. It enables the retrieval and display
of text and media to your computer.

Grandma: Who invented the Web?


Wendy: The World Wide Web was developed by Tim Berners-Lee in 1991. It began as a project at
the European Particle Physics Laboratory referred to as CERN. Berners-Lee, being familiar
with hypertext, or linked words within text used to jump to other text or documents, proposed the
idea of creating a global hypertext system. This system would allow individuals to link their
documents together to create a web of interconnected documents. He named his system the World
Wide Web.
The World Wide Web's full potential was not realized until Marc Andreessen, an undergraduate
student at the National Center for Supercomputing Applications at the University of Illinois, realized
the vast public potential the Web had. His vision was to go beyond text and create hypermedia. This
included linking graphics, sounds and video elements. The first graphical Web browser was born. It
was called NCSA Mosaic. With this development, the Internet spread rapidly into homes,
businesses and higher education institutions.

The first graphical web browser introduced to the public

How Does the World Wide Web Work?


Grandma: You know a lot about how the Web was created. How does it actually function?
Wendy: The World Wide Web is based on several different technologies that make it possible for
users to locate and share information through the Internet. These include Web browsers, Hypertext
Markup Language (HTML) and Hypertext Transfer Protocol (HTTP).
To access webpages, you must use a Web browser usually referred to as a browser. Web
browsers are programs that display text, data, pictures, animation and video on the Internet. Web
browsers provide the software interface that enables you to use your mouse to click hyperlinked
resources on the World Wide Web. Web browsers were initially only used for surfing the Web. They
are now more universal and allow users to do many more tasks including conducting searches, emailing, transferring multimedia files, participating in discussion groups and much more. Some
examples of commonly used Web browsers are Internet Explorer, Mozilla Firefox, Google
Chrome and Safari.
Grandma, you have Internet Explorer already installed on your computer. You will double click this
icon to launch Internet Explorer. You are now connected to the World Wide Web.
Grandma: That was easy! How do I find the Publishers Clearing House Website?

Wendy: You can either conduct a search or type the Uniform Resource Locator (URL) into the
address bar. To conduct a search, click in the Web search box, type Publishers Clearing House and
click search. Your search will return a listing of results. The Website you want will most likely be
listed at the top. Click on the hyperlink of the result that you want, and you will be directed to the
Publishers Clearing House Website.

You can perform specialized searches in a web browser.

Grandma, did you know that websites are a collection of Web pages? Each website has a home
page. The home page is the first page of a website in which you are taken to a starting point. From
there, you can access other content. You are now on the Publishers Clearing House homepage. You
can click the other links to access information about Publishers Clearing House or to enter their
sweepstakes.
Grandma: No, Wendy, I didn't know that.
Wendy: The next technology that plays an integral role in the operation of the Web is Hypertext
Markup Language. Hypertext Markup Language (HTML) is a programming tool that uses hypertext
to establish dynamic links to other documents. It is known as the Web's programming language and
it provides a general structure for creating Web pages. If you wanted to create your own website you
would use HTML.
HTML allows webpage developers to create hyperlinks. These are the clickable images or words on
a webpage. Clicking on a hyperlink will take you to another webpage or file specified by that link.
Then, we have Hypertext Transfer Protocol (HTTP) . HTTP provides the rules which allow
requests and file transmissions to occur between Web browsers and Web servers. HTTP is a
protocol used by the Web which dictates how messages are formatted and transmitted. When you
type in a URL to your Web browser the HTTP protocol command is sent to the Web server and
instructs it to retrieve the desired Web page.
Grandma: Hypertext seems to be the key word when we discuss the Web!
Wendy: That's a good observation Grandma. Hypertext is a term we frequently hear because it
really is whole basis of the Web. Another commonly used term that is important to know is File
Transfer Protocol (FTP). It is an Internet protocol used for retrieving and transferring files from a
remote computer. FTP relies on the TCP/IP protocols to transfer files. It is often used to download
programs and files from one computer to another. You can use a Web browser to connect to an FTP
address just like you would to an HTTP address.

Network Working Group


Request for Comments: 1812
Obsoletes: 1716, 1009
Category: Standards Track

F. Baker, Editor
Cisco Systems
June 1995

Requirements for IP Version 4 Routers


Status of this Memo
This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
PREFACE
This document is an updated version of RFC 1716, the historical
Router Requirements document. That RFC preserved the significant
work that went into the working group, but failed to adequately
describe current technology for the IESG to consider it a current
standard.
The current editor had been asked to bring the document up to date,
so that it is useful as a procurement specification and a guide to
implementors. In this, he stands squarely on the shoulders of those
who have gone before him, and depends largely on expert contributors
for text. Any credit is theirs; the errors are his.
The content and form of this document are due, in large part, to the
working group's chair, and document's original editor and author:
Philip Almquist. It is also largely due to the efforts of its
previous editor, Frank Kastenholz. Without their efforts, this
document would not exist.

2. INTERNET ARCHITECTURE
This chapter does not contain any requirements. However, it does contain useful background
information on the general architecture of the Internet and of routers.
General background and discussion on the Internet architecture and supporting protocol suite can be
found in the DDN Protocol Handbook [ARCH:1]; for background see for example [ARCH:2],
[ARCH:3], and [ARCH:4]. The Internet architecture and protocols are also covered in an ever- growing
number of textbooks, such as [ARCH:5] and [ARCH:6].

2.1 Introduction
2.2 Elements of the Architecture
o 2.2.1 Protocol Layering
o 2.2.2 Networks
o 2.2.3 Routers
o 2.2.4 Autonomous Systems
o 2.2.5 Addressing Architecture
2.2.5.1 Classical IP Addressing Architecture

2.2.5.2 Classless Inter Domain Routing (CIDR)


2.2.6 IP Multicasting
2.2.7 Unnumbered Lines and Networks Prefixes
2.2.8 Notable Oddities
2.2.8.1 Embedded Routers
2.2.8.2 Transparent Routers
2.3 Router Characteristics
2.4 Architectural Assumptions
o
o
o

2.1 Introduction
The Internet system consists of a number of interconnected packet networks supporting communication
among host computers using the Internet protocols. These protocols include the Internet Protocol (IP),
the Internet Control Message Protocol (ICMP), the Internet Group Management Protocol (IGMP), and a
variety transport and application protocols that depend upon them. As was described in Section [1.2], the
Internet Engineering Steering Group periodically releases an Official Protocols memo listing all the
Internet protocols.
All Internet protocols use IP as the basic data transport mechanism. IP is a datagram, or connectionless,
internetwork service and includes provision for addressing, type-of-service specification, fragmentation
and reassembly, and security. ICMP and IGMP are considered integral parts of IP, although they are
architecturally layered upon IP. ICMP provides error reporting, flow control, first- hop router redirection,
and other maintenance and control functions. IGMP provides the mechanisms by which hosts and
routers can join and leave IP multicast groups.
Reliable data delivery is provided in the Internet protocol suite by Transport Layer protocols such as the
Transmission Control Protocol (TCP), which provides end-end retransmission, resequencing and
connection control. Transport Layer connectionless service is provided by the User Datagram Protocol
(UDP).

2.2 Elements of the Architecture


2.2.1 Protocol Layering
To communicate using the Internet system, a host must implement the layered set of protocols
comprising the Internet protocol suite. A host typically must implement at least one protocol from each
layer.
The protocol layers used in the Internet architecture are as follows [ARCH:7]:
Application Layer
The Application Layer is the top layer of the Internet protocol suite. The Internet suite does not
further subdivide the Application Layer, although some application layer protocols do contain
some internal sub- layering. The application layer of the Internet suite essentially combines the
functions of the top two layers - Presentation and Application - of the OSI Reference Model
[ARCH:8]. The Application Layer in the Internet protocol suite also includes some of the
function relegated to the Session Layer in the OSI Reference Model.

We distinguish two categories of application layer protocols: user protocols that provide service
directly to users, and support protocols that provide common system functions. The most
common Internet user protocols are:

Telnet (remote login)


FTP (file transfer)
SMTP (electronic mail delivery)

There are a number of other standardized user protocols and many private user protocols.
Support protocols, used for host name mapping, booting, and management include SNMP,
BOOTP, TFTP, the Domain Name System (DNS) protocol, and a variety of routing protocols.
Application Layer protocols relevant to routers are discussed in chapters 7, 8, and 9 of this
memo.
Transport Layer
The Transport Layer provides end-to-end communication services. This layer is roughly
equivalent to the Transport Layer in the OSI Reference Model, except that it also incorporates
some of OSI's Session Layer establishment and destruction functions.
There are two primary Transport Layer protocols at present:

Transmission Control Protocol (TCP)


User Datagram Protocol (UDP)

TCP is a reliable connection-oriented transport service that provides end-to-end reliability,


resequencing, and flow control. UDP is a connectionless (datagram) transport service. Other
transport protocols have been developed by the research community, and the set of official
Internet transport protocols may be expanded in the future.
Transport Layer protocols relevant to routers are discussed in Chapter 6.
Internet Layer
All Internet transport protocols use the Internet Protocol (IP) to carry data from source host to
destination host. IP is a connectionless or datagram internetwork service, providing no end-toend delivery guarantees. IP datagrams may arrive at the destination host damaged, duplicated,
out of order, or not at all. The layers above IP are responsible for reliable delivery service when
it is required. The IP protocol includes provision for addressing, type-of-service specification,
fragmentation and reassembly, and security.
The datagram or connectionless nature of IP is a fundamental and characteristic feature of the
Internet architecture.
The Internet Control Message Protocol (ICMP) is a control protocol that is considered to be an
integral part of IP, although it is architecturally layered upon IP - it uses IP to carry its data endto-end. ICMP provides error reporting, congestion reporting, and first-hop router redirection.

The Internet Group Management Protocol (IGMP) is an Internet layer protocol used for
establishing dynamic host groups for IP multicasting.
The Internet layer protocols IP, ICMP, and IGMP are discussed in chapter 4.
Link Layer
To communicate on a directly connected network, a host must implement the communication
protocol used to interface to that network. We call this a Link Layer protocol.
Some older Internet documents refer to this layer as the Network Layer, but it is not the same as
the Network Layer in the OSI Reference Model.
This layer contains everything below the Internet Layer and above the Physical Layer (which is
the media connectivity, normally electrical or optical, which encodes and transports messages).
Its responsibility is the correct delivery of messages, among which it does not differentiate.
Protocols in this Layer are generally outside the scope of Internet standardization; the Internet
(intentionally) uses existing standards whenever possible. Thus, Internet Link Layer standards
usually address only address resolution and rules for transmitting IP packets over specific Link
Layer protocols. Internet Link Layer standards are discussed in chapter 3.

2.2.2 Networks
The constituent networks of the Internet system are required to provide only packet (connectionless)
transport. According to the IP service specification, datagrams can be delivered out of order, be lost or
duplicated, and/or contain errors.
For reasonable performance of the protocols that use IP (e.g., TCP), the loss rate of the network should
be very low. In networks providing connection-oriented service, the extra reliability provided by virtual
circuits enhances the end-end robustness of the system, but is not necessary for Internet operation.
Constituent networks may generally be divided into two classes:

Local-Area Networks (LANs) LANs may have a variety of designs. LANs normally cover a
small geographical area (e.g., a single building or plant site) and provide high bandwidth with
low delays. LANs may be passive (similar to Ethernet) or they may be active (such as ATM).
Wide-Area Networks (WANs) Geographically dispersed hosts and LANs are interconnected by
wide-area networks, also called long- haul networks. These networks may have a complex
internal structure of lines and packet-switches, or they may be as simple as point-to-point lines.

2.2.3 Routers
In the Internet model, constituent networks are connected together by IP datagram forwarders which are
called routers or IP routers. In this document, every use of the term router is equivalent to IP router.
Many older Internet documents refer to routers as gateways.
Historically, routers ha ve been realized with packet-switching software executing on a general-purpose
CPU. However, as custom hardware development becomes cheaper and as higher throughput is

required, special purpose hardware is becoming increasingly common. This specification applies to
routers regardless of how they are implemented.
A router connects to two or more logical interfaces, represented by IP subnets or unnumbered point to
point lines (discussed in section [2.2.7]). Thus, it has at least one physical interface. Forwarding an IP
datagram generally requires the router to choose the address and relevant interface of the next-hop router
or (for the final hop) the destination host. This choice, called relaying or forwarding depends upon a
route database within the router. The route database is also called a routing table or forwarding table.
The term "router" derives from the process of building this route database; routing protocols and
configuration interact in a process called routing.
The routing database should be maintained dynamically to reflect the current topology of the Internet
system. A router normally accomplishes this by participating in distributed routing and reachability
algorithms with other routers.
Routers provide datagram transport only, and they seek to minimize the state information necessary to
sustain this service in the interest of routing flexibility and robustness.
Packet switching devices may also operate at the Link Layer; such devices are usually called bridges.
Network segments that are connected by bridges share the same IP network prefix forming a single IP
subnet. These other devices are outside the scope of this document.

2.2.4 Autonomous Systems


An Autonomous System (AS) is a connected segment of a network topology that consists of a collection
of subnetworks (with hosts attached) interconnected by a set of routes. The subnetworks and the routers
are expected to be under the control of a single operations and maintenance (O&M) organization. Within
an AS routers may use one or more interior routing protocols, and sometimes several sets of metrics. An
AS is expected to present to other ASs an appearence of a coherent interior routing plan, and a
consistent picture of the destinations reachable through the AS. An AS is identified by an Autonomous
System number.
The concept of an AS plays an important role in the Internet routing (see Section 7.1).

2.2.5 Addressing Architecture


An IP datagram carries 32-bit source and destination addresses, each of which is partitioned into two
parts - a constituent network prefix and a host number on that network. Symbolically:
IP-address ::= { <Network-prefix>, <Host-number> }

To finally deliver the datagram, the last router in its path must map the Host-number (or rest) part of an
IP address to the host's Link Layer address.

2.2.5.1 Classical IP Addressing Architecture


Although well documented elsewhere [INTERNET:2], it is useful to describe the historical use of the
network prefix. The language developed to describe it is used in this and other documents and permeates
the thinking behind many protocols.

The simplest classical network prefix is the Class A, B, C, D, or E network prefix. These address ranges
are discriminated by observing the values of the most significant bits of the address, and break the
address into simple prefix and host number fields. This is described in [INTERNET:18]. In short, the
classification is:
0xxx Class A
10xx Class B
110x Class C
1110 Class D
1111 Class E

general purpose unicast addresses with standard 8 bit prefix


general purpose unicast addresses with standard 16 bit prefix
general purpose unicast addresses with standard 24 bit prefix
IP Multicast Addresses - 28 bit prefix, non- aggregatable
reserved for experimental use

This simple notion has been extended by the concept of subnets. These were introduced to allow
arbitrary complexity of interconnected LAN structures within an organization, while insulating the
Internet system against explosive growth in assigned network prefixes and routing complexity. Subnets
provide a multi- level hierarchical routing structure for the Internet system. The subnet extension,
described in [INTERNET:2], is a required part of the Internet architecture. The basic idea is to partition
the <Host-number> field into two parts: a subnet number, and a true host number on that subnet:
IP-address ::=
{ <Network-number>, <Subnet-number>, <Host-number> }

The interconnected physical networks within an organization use the same network prefix but different
subnet numbers. The distinction between the subnets of such a subnetted network is not normally visible
outside of that network. Thus, routing in the rest of the Internet uses only the <Network-prefix> part of
the IP destination address. Routers outside the network treat <Network-prefix> and <Host-number>
together as an uninterpreted rest part of the 32-bit IP address. Within the subnetted network, the routers
use the extended network prefix:
{ <Network-number>, <Subnet-number> }

The bit positions containing this extended network number have historically been indicated by a 32-bit
mask called the subnet mask. The <Subnet-number> bits SHOULD be contiguous and fall between the
<Network-number> and the <Host- number> fields. More up to date protocols do not refer to a subnet
mask, but to a prefix length; the "prefix" portion of an address is that which would be selected by a
subnet mask whose most significant bits are all ones and the rest are zeroes. The length of the prefix
equals the number of ones in the subnet mask. This document assumes that all subnet masks are
expressible as prefix lengths.
The inventors of the subnet mechanism presumed that each piece of an organization's network would
have only a single subnet number. In practice, it has often proven necessary or useful to have several
subnets share a single physical cable. For this reason, routers should be capable of configuring multiple
subnets on the same physical interfaces, and treat them (from a routing or forwarding perspective) as
though they were distinct physical interfaces.

2.2.5.2 Classless Inter Domain Routing (CIDR)


The explosive growth of the Internet has forced a review of address assignment policies. The traditional
uses of general purpose (Class A, B, and C) networks have been modified to achieve better use of IP's

32-bit address space. Classless Inter Domain Routing (CIDR) [INTERNET:15] is a method currently
being deployed in the Internet backbones to achieve this added efficiency. CIDR depends on deploying
and routing to arbitrarily sized networks. In this model, hosts and routers make no assumptions about the
use of addressing in the internet. The Class D (IP Multicast) and Class E (Experimental) address spaces
are preserved, although this is primarily an assignment policy.
By definition, CIDR comprises three elements:

topologically significant address assignment,


routing protocols that are capable of aggregating network layer reachability information, and
consistent forwarding algorithm ("longest match").

The use of networks and subnets is now historical, although the language used to describe them remains
in current use. They have been replaced by the more tractable concept of a network prefix. A network
prefix is, by definition, a contiguous set of bits at the more significant end of the address that defines a
set of systems; host numbers select among those systems. There is no requirement that all the internet
use network prefixes uniformly. To collapse routing information, it is useful to divide the internet into
addressing domains. Within such a domain, detailed information is available about constituent networks;
outside it, only the common network prefix is advertised.
The classical IP addressing architecture used addresses and subnet masks to discriminate the host
number from the network prefix. With network prefixes, it is sufficient to indicate the number of bits in
the prefix. Both representations are in common use. Architecturally correct subnet masks are capable of
being represented using the prefix length description. They comprise that subset of all possible bits
patterns that have

a contiguous string of ones at the more significant end,


a contiguous string of zeros at the less significant end, and
no intervening bits.

Routers SHOULD always treat a route as a network prefix, and SHOULD reject configuration and
routing information inconsistent with that model.
IP-address ::= { <Network-prefix>, <Host-number> }

An effect of the use of CIDR is that the set of destinations associated with address prefixes in the routing
table may exhibit subset relationship. A route describing a smaller set of destinations (a longer prefix) is
said to be more specific than a route describing a larger set of destinations (a shorter prefix); similarly, a
route describing a larger set of destinations (a shorter prefix) is said to be less specific than a route
describing a smaller set of destinations (a longer prefix). Routers must use the most specific matching
route (the longest matching network prefix) when forwarding traffic.

2.2.6 IP Multicasting
IP multicasting is an extension of Link Layer multicast to IP internets. Using IP multicasts, a single
datagram can be addressed to multiple hosts without sending it to all. In the extended case, these hosts
may reside in different address domains. This collection of hosts is called a multicast group. Each
multicast group is represented as a Class D IP address. An IP datagram sent to the group is to be

delivered to each group member with the same best- effort delivery as that provided for unicast IP
traffic. The sender of the datagram does not itself need to be a member of the destination group.
The semantics of IP multicast group membership are defined in [INTERNET:4]. That document
describes how hosts and routers join and leave multicast groups. It also defines a protocol, the Internet
Group Management Protocol (IGMP), that monitors IP multicast group membership.
Forwarding of IP multicast datagrams is accomplished either through static routing information or via a
multicast routing protocol. Devices that forward IP multicast datagrams are called multicast routers.
They may or may not also forward IP unicasts. Multicast datagrams are forwarded on the basis of both
their source and destination addresses. Forwarding of IP multicast packets is described in more detail in
Section [5.2.1]. Appendix D discusses multicast routing protocols.

2.2.7 Unnumbered Lines and Networks Prefixes


Traditionally, each network interface on an IP host or router has its own IP address. This can cause
inefficient use of the scarce IP address space, since it forces allocation of an IP network prefix to every
point-to-point link.
To solve this problem, a number of people have proposed and implemented the concept of unnumbered
point to point lines. An unnumbered point to point line does not have any network prefix associated with
it. As a consequence, the network interfaces connected to an unnumbered point to point line do not have
IP addresses.
Because the IP architecture has traditionally assumed that all interfaces had IP addresses, these
unnumbered interfaces cause some interesting dilemmas. For example, some IP options (e.g., Record
Route) specify that a router must insert the interface address into the option, but an unnumbered
interface has no IP address. Even more fundamental (as we shall see in chapter 5) is that routes contain
the IP address of the next hop router. A router expects that this IP address will be on an IP (sub)net to
which the router is connected. That assumption is of course violated if the only connection is an
unnumbered point to point line.
To get around these difficulties, two schemes have been conceived. The first scheme says that two
routers connected by an unnumbered point to point line are not really two routers at all, but rather two
half- routers that together make up a single virtual router. The unnumbered point to point line is
essentially considered to be an internal bus in the virtual router. The two halves of the virtual router
must coordinate their activities in such a way that the y act exactly like a single router.
This scheme fits in well with the IP architecture, but suffers from two important drawbacks. The first is
that, although it handles the common case of a single unnumbered point to point line, it is not readily
extensible to handle the case of a mesh of routers and unnumbered point to point lines. The second
drawback is that the interactions between the half routers are necessarily complex and are not
standardized, effectively precluding the connection of equipment from different vendors using
unnumbered point to point lines.
Because of these drawbacks, this memo has adopted an alternate scheme, which has been invented
multiple times but which is probably originally attributable to Phil Karn. In this scheme, a router that has
unnumbered point to point lines also has a special IP address, called a router- id in this memo. The

router- id is one of the router's IP addresses (a router is required to have at least one IP address). This
router- id is used as if it is the IP address of all unnumbered interfaces.

2.2.8 Notable Oddities


2.2.8.1 Embedded Routers
A router may be a stand-alone computer system, dedicated to its IP router functions. Alternatively, it is
possible to embed router functions within a host operating system that supports connections to two or
more networks. The best-known example of an operating system with embedded router code is the
Berkeley BSD system. The embedded router feature seems to make building a network easy, but it has a
number of hidden pitfalls:
1. If a host has only a single constituent-network interface, it should not act as a router.
For example, hosts with embedded router code that gratuitously forward broadcast packets or
datagrams on the same net often cause packet avalanches.
2. If a (multihomed) host acts as a router, it is subject to the requirements for routers contained in
this document.
For example, the routing protocol issues and the router control and monitoring problems are as
hard and important for embedded routers as for stand-alone routers.
Internet router requirements and specifications may change independently of operating system
changes. An administration that operates an embedded router in the Internet is strongly advised
to maintain and update the router code. This might require router source code.
3. When a host executes embedded router code, it becomes part of the Internet infrastructure. Thus,
errors in software or configuration can hinder communication between other hosts. As a
consequence, the host administrator must lose some autonomy.
In many circumstances, a host administrator will need to disable router code embedded in the
operating system. For this reason, it should be straightforward to disable embedded router
functionality.
4. When a host running embedded router code is concurrently used for other services, the Operation
and Maintenance requirements for the two modes of use may conflict.
For example, router O&M will in many cases be performed remotely by an operations center;
this may require privileged system access that the host administrator would not normally want to
distribute.

2.2.8.2 Transparent Routers


There are two basic models for interconnecting local-area networks and wide-area (or long- haul)
networks in the Internet. In the first, the local-area network is assigned a network prefix and all routers
in the Internet must know how to route to that network. In the second, the local-area network shares (a
small part of) the address space of the wide-area network. Routers that support this second model are

called address sharing routers or transparent routers. The focus of this memo is on routers that support
the first model, but this is not intended to exclude the use of transparent routers.
The basic idea of a transparent router is that the hosts on the local-area network behind such a router
share the address space of the wide-area network in front of the router. In certain situations this is a very
useful approach and the limitations do not present significant drawbacks.
The words in front and behind indicate one of the limitations of this approach: this model of
interconnection is suitable only for a geographically (and topologically) limited stub environment. It
requires that there be some form of logical addressing in the network level addressing of the wide-area
network. IP addresses in the local environment map to a few (usually one) physical address in the widearea network. This mapping occurs in a way consistent with the { IP address <-> network address }
mapping used throughout the wide-area network.
Multihoming is possible on one wide-area network, but may present routing problems if the interfaces
are geographically or topologically separated. Multihoming on two (or more) wide-area networks is a
problem due to the confusion of addresses.
The behavior that hosts see from other hosts in what is apparently the same network may differ if the
transparent router cannot fully emulate the normal wide-area network service. For example, the
ARPANET used a Link Layer protocol that provided a Destination Dead indication in response to an
attempt to send to a host that was off- line. However, if there were a transparent router between the
ARPANET and an Ethernet, a host on the ARPANET would not receive a Destination Dead indication
for Ethernet hosts.

2.3 Router Characteristics


An Internet router performs the following functions:
1. Conforms to specific Internet protocols specified in this document, including the Internet
Protocol (IP), Internet Control Message Protocol (ICMP), and others as necessary.
2. Interfaces to two or more packet networks. For each connected network the router must
implement the functions required by that network. These functions typically include:
o Encapsulating and decapsulating the IP datagrams with the connected network framing
(e.g., an Ethernet header and checksum),
o Sending and receiving IP datagrams up to the maximum size supported by that network,
this size is the network's Maximum Transmission Unit or MTU,
o Translating the IP destination address into an appropriate network- level address for the
connected network (e.g., an Ethernet hardware address), if needed, and
o Responding to network flow control and error indications, if any.
See chapter 3 (Link Layer).
3. Receives and forwards Internet datagrams. Important issues in this process are buffer
management, congestion control, and fairness.
o Recognizes error conditions and generates ICMP error and information messages as
required.
o Drops datagrams whose time-to- live fields have reached zero.
o Fragments datagrams when necessary to fit into the MTU of the next network.

See chapter 4 (Internet Layer - Protocols) and chapter 5 (Internet Layer - Forwarding) for more
information.
4. Chooses a next-hop destination for each IP datagram, based on the information in its routing
database. See chapter 5 (Internet Layer - Forwarding) for more information.
5. (Usually) supports an interior gateway protocol (IGP) to carry out distributed routing and
reachability algorithms with the other routers in the same autonomous system. In addition, some
routers will need to support an exterior gateway protocol (EGP) to exchange topological
information with other autonomous systems. See chapter 7 (Application Layer - Routing
Protocols) for more information.
6. Provides network management and system support facilities, including loading, debugging,
status reporting, exception reporting and control. See chapter 8 (Application Layer - Network
Management Protocols) and chapter 10 (Operation and Maintenance) for more information.
A router vendor will have many choices on power, complexity, and features for a particular router
product. It may be helpful to observe that the Internet system is neither homogeneous nor fully
connected. For reasons of technology and geography it is growing into a global interconnect system plus
a fringe of LANs around the edge. More and more these fringe LANs are becoming richly
interconnected, thus making them less out on the fringe and more demanding on router requirements.

The global interconnect system is composed of a number of wide-area networks to which are
attached routers of several Autonomous Systems (AS); there are relatively few hosts connected
directly to the system.
Most hosts are connected to LANs. Many organizations have clusters of LANs interconnected by
local routers. Each such cluster is connected by routers at one or more points into the global
interconnect system. If it is connected at only one point, a LAN is known as a stub network.

Routers in the global interconnect system generally require:

Advanced Routing and Forwarding Algorithms


These routers need routing algorithms that are highly dynamic, impose minimal processing and
communication burdens, and offer type-of-service routing. Congestion is still not a completely
resolved issue (see Section [5.3.6]). Improvements in these areas are expected, as the research
community is actively working on these issues.

High Availability
These routers need to be highly reliable, providing 24 hours a day, 7 days a week service.
Equipment and software faults can have a wide-spread (sometimes global) effect. In case of
failure, they must recover quickly. In any environment, a router must be highly robust and able
to operate, possibly in a degraded state, under conditions of extreme congestion or failure of
network resources.

Advanced O&M Features


Internet routers normally operate in an unattended mode. They will typically be operated
remotely from a centralized monitoring center. They need to provide sophisticated means for
monitoring and measuring traffic and other events and for diagnosing faults.

High Performance
Long-haul lines in the Internet today are most frequently full duplex 56 KBPS, DS1 (1.544
Mbps), or DS3 (45 Mbps) speeds. LANs, which are half duplex multiaccess media, are typically
Ethernet (10Mbps) and, to a lesser degree, FDDI (100Mbps). However, network media
technology is constantly advancing and higher speeds are likely in the future.

The requirements for routers used in the LAN fringe (e.g., campus networks) depend greatly on the
demands of the local networks. These may be high or medium-performance devices, probably
competitively procured from several different vendors and operated by an internal organization (e.g., a
campus computing center). The design of these routers should emphasize low average latency and good
burst performance, together with delay and type-of-service sensitive resource management. In this
environment there may be less formal O&M but it will not be less important. The need for the routing
mechanism to be highly dynamic will become more important as networks become more complex and
interconnected. Users will demand more out of their local connections because of the speed of the global
interconnects.
As networks have grown, and as more networks have become old enough that they are phasing out older
equipment, it has become increasingly imperative that routers interoperate with routers from other
vendors.
Even though the Internet system is not fully interconnected, many parts of the system need to have
redundant connectivity. Rich connectivity allows reliable service despite failures of communication lines
and routers, and it can also improve service by shortening Internet paths and by providing additional
capacity. Unfortunately, this richer topology can make it much more difficult to choose the best path to a
particular destination.

2.4 Architectural Assumptions


The current Internet architecture is based on a set of assumptions about the communication system. The
assumptions most relevant to routers are as follows:

The Internet is a network of networks.


Each host is directly connected to some particular network(s); its connection to the Internet is
only conceptual. Two hosts on the same network communicate with each other using the same
set of protocols that they would use to communicate with hosts on distant networks.

Routers do not keep connection state information.


To improve the robustness of the communication system, routers are designed to be stateless,
forwarding each IP packet independently of other packets. As a result, redundant paths can be
exploited to provide robust service in spite of failures of intervening routers and networks.
All state information required for end-to-end flow control and reliability is implemented in the
hosts, in the transport layer or in application programs. All connection control information is thus
co-located with the end points of the communication, so it will be lost only if an end point fails.
Routers control message flow only indirectly, by dropping packets or increasing network delay.

Note that future protocol developments may well end up putting some more state into routers.
This is especially likely for multicast routing, resource reservation, and flow based forwarding.

Routing complexity should be in the routers.


Routing is a complex and difficult problem, and ought to be performed by the routers, not the
hosts. An important objective is to insulate host software from changes caused by the inevitable
evolution of the Internet routing architecture.

The system must tolerate wide network variation.


A basic objective of the Internet design is to tolerate a wide range of network characteristics e.g., bandwidth, delay, packet loss, packet reordering, and maximum packet size. Another
objective is robustness against failure of individual networks, routers, and hosts, using whatever
bandwidth is still available. Finally, the goal is full open system interconnection: an Internet
router must be able to interoperate robustly and effectively with any other router or Internet host,
across diverse Internet paths.
Sometimes implementors have designed for less ambitious goals. For example, the LAN
environment is typically much more benign than the Internet as a whole; LANs have low packet
loss and delay and do not reorder packets. Some vendors have fielded implementations that are
adequate for a simple LAN environment, but work badly for general interoperation. The vendor
justifies such a product as being economical within the restricted LAN market. However,
isolated LANs seldom stay isolated for long. They are soon connected to each other, to
organization-wide internets, and eventually to the global Internet system. In the end, neither the
customer nor the vendor is served by incomplete or substandard routers.
The requirements in this document are designed for a full- function router. It is intended that fully
compliant routers will be usable in almost any part of the Internet.

MODULE 4
DATABASE MANAGEMENT SYSTEMS AND SYSTEM ANALYSYS AND DESIGN

What is Database Management? - How Databases Help Organizations


Organizations use large amounts of data. Database management makes it possible to organize and
analyze these data. Learn why database management is important to support business operations.

Organizations Use Data


Organizations use large amounts of data. These data can be related to the people who work for the
organization, its products or services, the customers or any other aspect of the operations of the
organization. The data need to be organized in a way that supports decision-making. The most
common data types are text and numbers, but data can also include images, photographs, sound,
video and other types. Data are organized in a database.

Library Example
Let's consider an example of how databases are used. Think of a public library. A library contains
books, magazines, CDs, DVDs and other materials. All these materials need to be catalogued so we
know what is available in the library. For each item, the catalog would describe things like the type of
item, the title, the authors, the publishers and other relevant details. The catalog also needs to be
searchable, so the librarian typically assigns some keywords to each item. The library catalog is a
type of database.
Once we have a catalog, we also need to have a way for users to check out the materials. Users
need to be able to register, get a library card and use this card to check out the materials they want
to take home. So the library needs a database of users. This would include the user's name,
address, telephone number, e-mail and age. With a catalog of materials and a user database, the
library can start operating. What is needed to support the day-to-day operations is a system to keep
track of which materials each user checks out and when they get returned. This system needs to be
linked to the catalog and the user database.
Now consider how you actually use the library and what decisions are being made. You go to the
library and want to learn something about the theory of evolution. The first thing you probably do is
go to a computer terminal and search the catalog with a keyword like 'evolution theory.' You browse
through the results to see which books might be most useful. Once you have found a few titles, you
can check to make sure they are not already checked out.
You find the materials you are interested in on the shelves and take them to the checkout counter.
The staff at the counter scans your library card to make sure your account is in good standing. If you
have books overdue, the staff member will be quick to remind you. Then the materials you want to
check out are scanned, and the staff member will make sure you don't exceed any limits set by the
library - such as a maximum of three music CDs.

You take your materials home, and a week later you get a reminder e-mail that your music CDs are
due, since you can only keep them for a week. You return the music CDs but keep the books for
now. Two weeks later, you get a reminder your books are due. You are not quite done reading them,
so you log on to the library's website and renew the books online. A few weeks later, you return the
books.
Throughout these steps, you have used the library system in several ways:

The catalog terminals at the library


The checkout counters
The e-mail notification system, and
The online renewal system

All of this is possible because of the database systems maintained by the library.
Also consider how the library staff uses the databases. Staff at the checkout counters process user
requests. Librarians add new books to the catalogue and help users find materials at other libraries.
Senior staff at the library analyze how the collections are being used, which new materials should be
acquired and how to best meet the needs of the many library users. All of these decisions are
informed by the various databases.

Benefits of Database Management


The library example has demonstrated a number of benefits of database management:

Databases make it possible to store and organize large amounts of data.


Data become searchable using keywords and other identifiers.
Databases change constantly and get updated on an ongoing basis.
Various parts of a database are linked to each other.
Different users play different roles in using and maintaining the databases.
Databases can be accessed using different mechanisms.

Other Examples
The library is just one example. You can select almost any organization and think of the various data
being used and how they support decision-making. Consider a hospital. Databases used by a
hospital would include:

Patient records
Medication and equipment
Scheduling of staff and facilities
Billing and insurance and many others

These data are used to make decisions on how to treat patients - sometimes literally life-and-death
decisions. Without accurate and readily available data, it would be much harder for nurses and
doctors to do their jobs.
Or consider a supermarket. Databases used by a supermarket would include:

Product catalog
Sales transactions
Suppliers
Staffing
Customer loyalty program and others

Imagine you are the produce manager of the supermarket. Keeping a steady supply of fresh fruits
and vegetables every single day is no easy task. Customers expect to have the shelves stocked
continuously, so the supermarket is using various databases on a daily basis to keep the customers
happy.

Database Concepts and Structures: The Elements That Make Up a Database


Learn the fundamental elements of databases and how they are structured. One common data
structure is a database table, which uses records and fields to organize data.

What are Data?


Data are basic facts or values. Every task a computer carries out works with data in some way.
Without data, computers would be pretty useless. It is therefore important to understand what data
are and how to represent and organize data. The term 'data' is considered plural in the scientific
community, as in 'The data are collected,' not 'The data is collected.' However, not everyone follows
this, so sometimes you will see 'data' used as singular.

Database Structure
A database is an organized collection of data. Instead of having all the data in a list with a random
order, a database provides a structure to organize the data. One of the most common data
structures is a database table. A database table consists of rows and columns. A database table is
also called a two-dimensional array. An array is like a list of values, and each value is identified by a
specific index. A two-dimensional array uses two indices, which correspond to the rows and columns
of a table.
In database terminology, each row is called a record. A record is also called an object or an entity.
In other words, a database table is a collection of records. The records in a table are the objects you
are interested in, such as the books in a library catalog or the customers in a sales database.
A field corresponds to a column in the table and represents a single value for each record. A field is
also called an attribute. In other words, arecord is a collection of related attributes that make up a
single database entry.
The example shows a simple database table of customers. Each customer has a unique identifier
(Customer ID), a name and a telephone number. These are the fields. The first row is called the
header row and indicates the name of each field. Following the header row, each record is a unique
customer.
Notice a few things about the table. First, all the data values in a single field or column are of the
same kind - they are the same data type. Second, the data values in a single record or row can
consist of different types, such as numbers and text. Third, there are no empty rows or columns.
Individual data values can be missing, but there are no blank records or fields. These properties
make a database table quite different from a table in a word processing or spreadsheet application.

The database structure imposes certain constraints on the data values, which makes it more
reliable. For example, for the phone number, you cannot enter text, since that wouldn't make sense.
While this example is quite simple, you can easily imagine what else could be stored in such a
database. For example, you could store the customer's mailing address, billing information, history of
past purchases, etc. For an organization with many thousands of customers, this quickly becomes a
large database. To use a large database effectively, you can use a database management system
(DBMS). A DBMS is specialized software to input, store, retrieve and manage all the data.
A database can contain one or more tables, as well as other elements. DBMS software stores a
database as afile. A database file is similar to a file used to store a word processing document or a
video clip. A database file can be copied, deleted, renamed, etc. Just like other files, there are a
number of different database file types, many of them specific to a particular software application.

Data vs. Information


Data and information are related, but making a distinction is useful, especially when working with
computer systems. Data are basic facts or values. If they lack context, they are not very useful. For
example, a long list of numbers would be considered data. Information, on the other hand, helps us
answer questions. In order to do this, data has to be organized or processed in a useful manner.
For example, the list of numbers could be the stock prices of a number of companies during the
course of a year. But of course, you want to know for every number which company and what day of
the year it represents. You probably want to plot the changes in the stock prices over time, so you
can make comparisons between different stocks. Knowing what the data represent gives structure
and context to the data, resulting in information.
The distinction between data and information is useful, but it depends on the perspective of the user.
For example, if you want to decide on what stocks to buy, the fluctuations of stock prices over the
course of a year is not enough. You want to know something about the companies, what type of
business they're in, how large their organization is, what their financial reports look like, etc. So from
this perspective, the list of stock prices are just data and you need additional data to make an
informed decision.

What is a Database Management System? - Purpose and Function


In this lesson, we will describe the purpose and functions of a database management system, as
well as the advantages and disadvantages of using a database management system in an
organization.

Purpose of Database Management Systems


Organizations use large amounts of data. A database management system (DBMS) is a software
tool that makes it possible to organize data in a database.
The standard acronym for database management system is DBMS, so you will often see this instead
of the full name. The ultimate purpose of a database management system is to store and transform
data into information to support making decisions.
A DBMS consists of the following three elements:

1. The physical database: the collection of files that contain the data
2. The database engine: the software that makes it possible to access and modify the contents
of the database
3. The database scheme: the specification of the logical structure of the data stored in the
database
While it sounds logical to have a DBMS in place, it is worth thinking for a moment about the
alternative. What would the data in an organization look like without a DBMS? Consider yourself as
the organization for a moment, and the data are all the files on your computer. How is your data
organized? If you are like most typical computer users, you have a large number of files, organized
in folders.
You may have word processor documents, presentation files, spreadsheets, photographs, etc. You
find the information you need based on the folder structure you have created and the names you
have given to your files. This is called a file system and is typical for individual computer users.
Now consider the challenges you are faced with. Have you ever lost a file? Have you had difficulty
finding a file? Probably. Perhaps you are using multiple computers and your files are located in
different physical locations. And when was the list time you created a backup of all your files? You
do back up, right?
You probably get the picture. A file system is relatively simple, but it only works if you keep yourself
very organized and disciplined. Now consider an organization with 1,000 employees, each with their
own computer. Can you see some of the challenges when using a file system? Do you really want
critical financial data floating around the offices as simple files on individual computers?

Functions of a DBMS
So what does a DBMS really do? It organizes your files to give you more control over your data.
A DBMS makes it possible for users to create, edit and update data in database files. Once created,
the DBMS makes it possible to store and retrieve data from those database files.
More specifically, a DBMS provides the following functions:

Concurrency: concurrent access (meaning 'at the same time') to the same database by
multiple users
Security: security rules to determine access rights of users
Backup and recovery: processes to back-up the data regularly and recover data if a problem
occurs
Integrity: database structure and rules improve the integrity of the data
Data descriptions: a data dictionary provides a description of the data

Within an organization, the development of the database is typically controlled by database


administrators (DBAs) and other specialists. This ensures the database structure is efficient and
reliable.
Database administrators also control access and security aspects. For example, different people
within an organization use databases in different ways. Some employees may simply want to view
the data and perform basic analysis. Other employees are actively involved in adding data to the
database or updating existing data. This means that the database administrator needs to set the

user permissions. You don't want someone who only needs to view the database to accidentally
delete parts of the database.

Pros and Cons of DBMS


There are a number of benefits to using a DBMS.
A DBMS provides automated methods to create, store and retrieve data. It may take some time to
set up these methods, but once in place, a DBMS can make tedious manual tasks a thing of the
past.
A DBMS reduces data redundancy and inconsistency. Have you ever had different versions of the
same file on your computer hard drive? The same thing happens in organizations. A well-designed
DBMS will eliminate redundancy.
A DBMS allows for concurrent access by multiple users, each with their own specific role. Some
users only need to view the data, some contribute to adding new data, while others design and
manage the database - all at the same time!
A DBMS increases security and reliability. Database administrators are responsible for creating
backups of databases, controlling access and, in general, making sure it works the way it was
intended. Having one or more specialists control these tasks is a lot more effective than having each
computer user in an organization having to worry about the security of their data.
A DBMS improves data quality. It is easy to make mistakes when entering data. A DBMS makes it
possible to set up rules for the database. For example, when entering the phone number of a
customer you should not be entering text characters. A rule can be set up such that you cannot enter
text in the phone number field. Or think of specifying the state where a customer resides. It is easier
to select from a pre-defined list of states than to have to type in the name.
As with any information system, there are also some disadvantages to using a DBMS.
Implementing a DBMS can be expensive and time-consuming. Typically, it requires database
specialists to implement and maintain a database. More importantly, for a database to be really
useful, it needs to be integrated into the existing business processes. In many cases, implementing
a DBMS actually means some of those processes need to be changed. This may require training of
existing staff and hiring of new staff. And of course, there are costs associated with the hardware
and software needed to run a DBMS.
Any database remains vulnerable to security issues. As databases get larger and more complex, so
does the challenge of keeping all the data secure. How often have you read a story of a computer
hacker getting access to thousands of credit card numbers?

Multi-User Databases
One of the advantages of using a database management system is that multiple users can use the
same database at the same time.
Consider for a moment how this is different from using a regular document stored on your hard drive.
If you open a word processing or spreadsheet document on your computer, you are the only user. If
you want to share this document with a colleague, you could e-mail it to them so they can save it on
their hard drive. However, this creates a copy, and now there are two versions of the same file. Both
you and your colleague can work with the data, but what happens if you both start making changes?
You can see how this is going to get confusing.

Using a DBMS, you can store a database in a central location, such as a computer server. A server
is a computer system that provides a network service. One of these services is data storage.
Now, both you and your colleague can work with the same database. Depending on the
configuration of the DBMS, you can actually both edit the database at the same time. This does
require that the database has been set up for multiple users and that each user has been given the
proper permissions.

Models of Database Management Systems (DBMS)


Get to know the different models of database management systems and learn how each one is used
to systematically organize large amounts of data in a logical manner.

DBMS Models
There are a number of different types of database management systems (DBMS), also referred to as
DBMS models. Each one represents a somewhat different approach to organizing data in a
systematic manner. They include:
Flat file
Hierarchical DBMS
Network DBMS
Relational DBMS
Object-oriented DBMS
Of these five models, the relational DBMS is by far the most widely used, but a quick overview of
each model is useful.

Flat File
The most basic way to organize data is as a flat file. You can think of this as a single table with a
large number of records and fields. Everything you need is stored in this table, or flat file.
Think of a database of customers. Everything you want to know about the customers is stored in this
one table. You start off with a single record for every customer. A customer places an order and you
enter this in one of the fields. You continue entering customer orders in this way.
What if the same customer places a second order? Do you enter this as a new record in the table, or
do you add a field to the existing record for this customer?
There is no single best answer for this. The key point here is that a flat file is quite limited since it
provides very little in terms of structure. In fact, it is so simple that you could argue it is not a DBMS
at all. However, it is good to start off with the idea of a flat file, and then you will see how alternative
models are more flexible and effective.

Hierarchical DBMS
In a hierarchical DBMS one data item is subordinate to another one. This is called a parentchild relationship. The hierarchical data model organizes data in a tree-like structure.
One of the rules of a hierarchical database is that a parent can have multiple children, but a child
can only have one parent. For example, think of an online store that sells many different products.
The entire product catalog would be the parent, and the various types of products, such as books,
electronics, etc., would be thechildren. Each type of product can have its own children categories.
For example, books could be broken up into fiction and non-fiction. Each of these categories can be
broken up into subcategories. You can continue like this by listing individual authors and then the
individual book titles.
This is a rather simple way to represent data, but it is very efficient. This model works best for data
that is inherently hierarchical in nature. Many datasets cannot easily be organized in this manner
and require a more complex approach. For example, in the case of the product catalog, what if a
book falls into more than one category? Or what if one author has written several books but also
published an audio CD of one of her books? This is where the hierarchical model breaks down.

Network DBMS
In a network DBMS every data item can be related to many others ones. The database structure is
like a graph. This is similar to the hierarchical model and also provides a tree-like structure.
However, a child is allowed to have more than one parent. In the example of the product catalog, a
book could fall into more than one category. The structure of a network database becomes more like
a cobweb of connected elements.
For example, consider an organization with an employee database. For each employee there are
different pieces of data, such as their name, address, telephone number, social security number and
job function. Different units in the organization need different levels of access. For example, the
human resources department needs to have access to the social security information for each
employee so they can take care of tax deductions and set up benefits. This is somewhat sensitive
information, so other departments do not need access to this part of the database. All the pieces of
data are connected in a network that implements these rules.
While conceptually relatively simple, this database structure can quickly become very complicated.

Relational DBMS
In a relational DBMS all data are organized in the form of tables. This DBMS model emerged in the
1970s and has become by far the most widely used type of DBMS. Most of the DBMS software
developed over the past few decades uses this model. In a table, each row represents a record,
also referred to as an entity. Each column represents a field, also referred to as an attribute of the
entity.
A relational DBMS uses multiple tables to organize the data. Relationships are used to link the
various tables together. Relationships are created using a field that uniquely identifies each record.
For example, for a table of books, you could use the ISBN number since there are no two books with
the same ISBN. For a table of authors, you would create a unique Author ID to identify each
individual author.
Consider a relational database of books and authors. The first table is a table of authors. Each
author is identified by a unique author ID, and the table also contains their name and contact

information. The second table is a table of books. Each book is identified by its ISBN number, and
the table also contains the book's title, the publisher and the author ID associated with the author of
the book.
What makes a relational database so effective is that you can link these tables together. In this
example you would use the author ID field to do this. For example, you can store multiple books
written by the same author or multiple authors for the same book. The detailed information for each
author and each book is only stored once and not duplicated in both tables. Yet all the information
you need can be accessed using the table relationship.

Object-Oriented DBMS
The previous DBMS models work primarily with text and numbers. Object-oriented databases are
able to handle many newer data types, such as images, audio and video. These data items are
the objects stored in the database.
If you have data that fit neatly into rows and columns, such as a customer database with names,
addresses, ZIP codes, etc., a relational DBMS is typically the most suited. On the other hand, if you
have a library of multimedia files, an object-oriented DBMS is going to work better.
You can still create tabular representations of your data. For example, you can represent your video
library as a table showing a list of your videos with their length, sorted by the date of the recording.
Consider a database for all the medical imagery collected in a hospital, such as X-rays, CAT scans
and electrocardiograms. The most suitable way to organize this data would be an object-oriented
database. Each image would be an object and this would be tagged using the type of image, the
name of the patient, the name of the medical doctor who requested the exam, the technician who
carried out the exam, etc.
The various models are not entirely exclusive of each other. For example, the object-relational
database management system combines elements of both models. It uses a relational model to
describe associations between data tables, but it makes it possible to store multimedia objects.
In the case of the hospital example, you could use a relational model to create a database of patient
records and store all the imagery as objects. By tagging each image, you can link the patient records
with the imagery as needed.

What is a Relational Database? - Elements, Design & Advantages


The relational database is the most widely used type of database management system. Learn how
the relational database organizes data using tables, keys and associations.

Database Relationships
A relational database consists of tables that are linked together in some meaningful way. For
example, consider a company that sells products to customers. The company maintains a database
of the products it sells. Each product has a unique code so it can be identified. The product
database consists of a table, and every product is a record in this table. The second database the
company maintains is a database of its customers. Each customer also has a unique code as well
as their name and address. The third database is a database of orders placed by customers. Each
order also has a unique code.

So what are the relationships between the three tables? Think of a single order placed by a
customer. An order will contain at least one product, but possibly more than one. So each order will
include the unique codes for each product. An order is also linked to a particular customer, so each
order will include the unique code for this customer. Because customers are linked to their order and
each order contains the product codes, you can look up which products each customer has bought.
Once these relationships are established in the database, it becomes possible to look for meaningful
patterns in the data. For example, the company may be interested in finding out if certain products
are often bought together. This might give some insights into how to best market products as a
bundle. Or the company might be interested in identifying the customers that buy similar products
over time as part of different orders instead of as a single order. A well-designed relational database
makes it possible to examine such patterns based on the relationships between the various tables.

Rules for Relational Databases


In order for a relational database to function, a number of basic rules need to be followed:

Each table has a unique name.


Each table contains multiple rows.
Each row in a table is unique.
Every table has a key to uniquely identify the rows.
Each column in a table has a unique attribute name.

These rules are implemented as part of the overall database design. Typically, the design for a
database is developed by a database specialist in close consultation with various people in the
organization. These include the actual database users but also more senior executives who need to
make sure the database supports not only day-to-day operations but also provides the information
necessary to support decision-making.

Primary and Foreign Keys


You know that a relational database management system uses relationships to link tables together.
Relationships are also called table associations. Relationships are created using keys. A key for a
database table consists of one or more fields that uniquely identify a record. Keys are important in a
database because they assist in maintaining data consistency and they make it possible to create
associations between tables.
A primary key is a minimal set of fields whose values uniquely identify a record in a table. Each
table can only have one primary key, even though this may consist of multiple attributes. In most
databases a key consists of a single attribute. For example, for a book, you could use the ISBN
number since there are no two books with the same ISBN number. For employees of an
organization, you could use their Social Security Number, which is unique to each individual. For the
example of customers, products and orders, you would create your own unique codes as you build
the database. For example, the table of customers contains a field for Customer ID.
Sometimes a key is composed of multiple attributes. This means that only the combination of these
attributes uniquely identifies a record. This is called a composite key.
A foreign key is a field whose values are the same as the primary key of another table. For the
example of customers, products and orders, you would create a table of orders. For each order you
record the customer using the Customer ID. In the table of orders, the field Customer ID is the

foreign key since it is the primary key in the table of customers. The table of orders has its own
primary key, called Order ID, to uniquely identify each order. If the same customer makes multiple
orders, this results in duplicate values in the Customer ID field.
This applies as a general rule: primary keys are unique, while foreign keys may contain duplicate
values. Remember, keys create relationships in tables, and a relationship is an association between
two or more tables. In the example, the field Customer ID is used to create the association. This
field acts as the primary key in the table of customers and the foreign key in the table of orders.

Cardinality of Relationships
There are a number of different types of relationships based on how many records in one table are
related to how many records in the other table. This is known as cardinality. There are four types of
cardinality:

One-to-one (1:1).
One-to-many (1:m).
Many-to-one (m:1).
Many-to-many (m:m).

Let's look at an example of each. The simplest relationship is a one-to-one (1:1) relationship.
Consider that a voter can only cast one vote in an election. An election ballot can therefore belong
only to one voter. This means there is a one-to-one relationship between a voter and a ballot.
For our next example of cardinality, let's return to the earlier company database that included tables
for products, customers and orders. The table of customers contains the orders for each customer.
One customer can have one or more orders. However, a single order only has one customer. So the
relationship between customers and orders is one-to-many (1:m): one customer to many orders.
This does not mean every customer has to have more than one order, but it is possible for a
customer to have multiple orders, and therefore the cardinality is one-to-many.
Next, let's return to the example of voting. Consider the relationship between voters and the party
they voted for in a particular election. A single voter can only vote once, but a party can receive
votes from many different voters. So the relationship is many-to-one (m:1): many voters to one
party. Although one-to-many and many-to-one appear to be the same, their difference is a matter of
perspective since it depends on which table to start from.
Let's consider the fourth and final type of cardinality. In the example of products, customers and
orders, there is also a relationship between products and orders. A single product can occur in more
than one order, and a single order can contain more than one product. So the relationship is manyto-many (m:m): many products to many orders.

Types of Data: Text, Numbers & Multimedia


Discuss the basic types of data found in databases. These include character strings, integers,
decimals, images, audio, video and other multimedia types.

Data Types
Computer systems work with different types of digital data. In the early days of computing, data
consisted primarily of text and numbers, but in modern-day computing, there are lots of different
multimedia data types, such as audio, images, graphics and video. Ultimately, however, all data
types are stored as binary digits. For each data type, there are very specific techniques to convert
between the binary language of computers and how we interpret data using our senses, such as
sight and sound.

Analog vs. Digital Data


There are two general ways to represent data: analog and digital. Analog data are continuous.
They are 'analogous' to the actual facts they represent. Digital data are discrete, broken up into a
limited number of elements. Nature is analog, while computers are digital. Many aspects of our
natural world are continuous in nature. For example, think of the spectrum of colors. This is a
continuous rainbow of an infinite number of shades.
Computer systems, on the other hand, are not continuous, but finite. All data are stored in binary
digits, and there is a limit to how much data we can represent. For example, a color image on a
computer has a limited number of colors - the number might be very large, but it is still finite.
Consider the example of color in a bit more detail. The very first monitor displays were essentially
text terminals with only a single color. White or light green text appeared on a black background.
Newer monitors used more colors, enough to represent basic images, but still quite limited. Modern
displays have millions of colors and look much more natural. Still, the number of colors is finite. The
finite nature of data stored on a computer influences how different types are stored as binary digits.
You will see examples of this as the different types are discussed.

Character Strings
One of the most basic data types is plain text. In database terminology, this is referred to as
a character string, or simply a string. A string represents alphanumeric data. This means that a
string can contain many different characters, but that they are all considered as if they were text and
not put into calculations, even if the characters are numbers.
Consider the following database table. All of these fields are strings. Fields like the first and last
name consist only of text characters, so it makes sense they are stored as a string. The field for the
street address contains both numbers and characters and is also stored as a string. The student ID
looks like a number, but it really represents a code. It is not a number you want to do any
calculations with, so it is stored as a string. Similarly, the ZIP code looks like a number, but is also
stored as a string.

Numeric Data Types


The second most important data type is numeric data. As a general rule, you store numbers only as
a numeric data type if they represent a count or measurement of some kind and if it makes sense to
perform calculations with them. A ZIP code is a number assigned to a geographic area by the postal
service. It would not make much sense to determine the average value for multiple ZIP codes.

There are several different types of numeric data. An integer is a numeric value without a decimal.
Integers are whole numbers and can be positive or negative. In a database, a distinction is made
between short and long integers, referring to how much data storage is used for the number. A short
integer is typically stored using 16bits, which means that you can store up to 2^16, or 65,536 unique
values. For any number larger than that, you would need to use a long integer, which uses 32 bits or
more.
A number with a decimal is referred to as a decimal, a float or a double. The terminology varies
somewhat with the software being used. The term float comes from 'floating point,' which means you
can control where the decimal point is located. The term double refers to using double the amount of
storage relative to a float.
In the example table of students, the field credits completed is an integer, while GPA is a decimal. In
both these examples, it would make sense to do calculations. For example, you could use credits
completed to calculate how many more credits a student needs to graduate. Or, you could determine
the average GPA for all the students.

Boolean Data
The Boolean data type can only represent two values: true or false. Typically, a zero is used to
represent false and a one is used to represent true. In the example table of students, the field
Financial Aid is stored as a Boolean, since a student is classified as having financial aid or not.

Date and Time


Dates and times have their own data type to distinguish them from numeric data. There any many
different ways to format dates and times. Some common ways to format dates are:
YYYY-MM-DD - for example 2012-04-01
Month/Day/Year - for example 4/1/2012
Day of the week, month and day, year - for example Sunday, April 1, 2012
Some common ways to format time are:
HH:MM:SS AM/PM - for example 2:45:31 PM
HH:MM:SS - for example 14:45:31
Once a database table has been created using date or time as the data type, you can typically
display the values in different ways.

Multimedia Types
In the early days of computing, the most widely used data types were text and numbers. While these
are still very important today, the last 20 years or so have seen a rapid rise in the use of multimedia
data types. These include images, audio, and video, as well as many specialized types. Consider
the files you have on your computer. You probably have numerous word processing files and some
spreadsheets. You may have readings and course notes for school in PDF format. Most of your
other files are likely to be multimedia, such as digital music and photographs.
One very important aspect of multimedia data is that they require lots of storage, much more than
text and numbers. For example, a typical book contains around 100,000 words. Using a word

processing application, the total size of the file storing this text is less than 1 megabyte (MB). A
typical audio file that contains a four to five minute song in MP3 format is somewhere between 5 and
10 megabytes. If you have a good digital music collection, you will quickly end up with several
gigabytes (GB) of files.
When you start combining data types into one document, the file size also gets larger. While
100,000 words may require less than 1 megabyte, as soon as you add some images to your word
processing document, those images become part of the file. From a database management point of
view, multimedia data present somewhat of a challenge, since the data do not fit easily into a table,
like texts and numbers. Instead, organizing multimedia files typically uses an object-oriented view
of the data. This means every multimedia file becomes an object and you describe important
characteristics of each file. These characteristics are called properties or tags.
Think of your digital music collection. Typically, each song is a single MP3 file residing on the hard
drive of your computer. When you want to listen to some music, however, you normally don't
navigate to this file to play it. Instead, you use some type of music library application with a built-in
player. The software has organized all your music. Each song has tags, like the name of the artist,
the name of the song, the name of the album, perhaps a rating you have given to the song, etc.
The music library software is like an object-oriented database management system. Each song is an
object in the library and each object is tagged with important details about the object. This makes it
possible for you to quickly find the songs you want and organize them in a way that is helpful to you.
For example, you may have created a list of some good party songs. Without realizing it, you have
become a database manager!
If you work a lot with photographs and video, you probably have a similar library application for these
types of files. There are many other specialized multimedia types. For example, a Geographic
Information System uses maps in digital form to analyze spatial relationships. 3D modeling software
uses complex three-dimensional data types for animation. Drawing software is used by architects
and engineers to plan the design of buildings and objects. All these data are stored as specialized
data types.

Structured Query Language: Manipulating Databases Using SQL


Describe how to manipulate a database using the logic of Structured Query Language. Learn the
basic syntax to write database queries in SQL using the SELECT statement.

Manipulating a Database
One of the primary functions of a database management system (DBMS) is to be able
to manipulate data. This means adding new data, changing the values of existing data and
reorganizing the data. Another basic form of data manipulation is to retrieve specific information from
the database.
For example, for a database of employees within an organization, you may want to find just the
employees hired within the last year or those holding a certain position. In database terminology, this
is called a query. The term 'query' means 'to search, to question or to find.' So, a database query is
like asking a question of the database.

Structured Query Language


Database queries are usually constructed using SQL, or Structured Query Language. SQL is a
standard computer language for accessing and manipulating a database. SQL is a type of
programming language, which is a language used to write instructions for a computer. However,
SQL is a very specialized programming language specifically designed to work with databases.
Examples of more general programming languages are Java and Python. These can also be used to
work with databases, but SQL has many built-in functions that make it very easy to perform
database queries.
Since SQL is so widely used, it has become an official standard of the American National Standards
Institute. While the standard itself keeps changing over time as technology changes, the fact that
SQL is an official standard has the advantage that if you learn the basics of the language, you can
apply this in any database management system. Even though SQL uses the term 'query' in its name,
it can be used not only to query databases, but also to insert, update and delete data.

SQL Statements
Like any programming language, SQL uses statements. A statement is a specific instruction for the
computer to do something. For example, SQL contains the CREATE statement. As you can probably
guess, this statement is used to create a new database or a new table or a new user.
There are many different kinds of SQL statements. In the following, we'll focus on just one of them:
the SELECTstatement. This statement is used to perform a query on a database. If you are using an
existing database in DBMS software, this is likely the first SQL statement you will use. And, unless
you are a database administrator, it may be the only one you will use.
The SELECT statement is used to accomplish one of the following:

To select specific rows and/or specific columns from a single table


To perform arithmetic and logical operations on a single table
To select results from two or more associated tables

SQL Syntax
SQL uses a very specific syntax. Syntax defines the logic of a programming language. It is similar to
the grammar of a regular spoken language. Unless you follow the proper syntax, the DBMS will not
understand your SQL statement.
Here is the basic syntax of a SQL SELECT statement:
SELECT field(s)
FROM table(s)
WHERE conditional expression
This is a generic version of the syntax. When you work with an actual database, you specify the
field(s) and table(s) by their name and you provide the conditional expression. Think of the
conditional expression as the question you want to ask.
Time for an example. Let's say you have the following table of employees. Your question is, 'Which
employees have a salary greater than $65,000?' You translate this into a database query by writing

a SELECT statement. In database terms, you want to select just those records for which the salary is
greater than $65,000.
Here is what your SQL statement is going to look like:
SELECT Name
FROM Employees
WHERE Salary > 65,000
If you were to use this SQL statement in DBMS software, this is what your result would look like. Of
the seven records in the table, only five meet the stated condition. How this result is represented
depends on the specific software, but it is typically in the form of a new table or report.
You can perform additional tasks by using other SQL statements. For example, sorting the data can
be accomplished by using the ORDER BY statement.
SELECT Name
FROM Employees
WHERE Salary > 65,000
ORDER BY Name
Your result would be the same list as before, but in alphabetical order.
The examples so far have selected records as well as fields. In many cases, you may want to select
specific records, but you want to keep all the fields. This can be accomplished using
a wildcard symbol:
SELECT *
FROM Employees
WHERE Salary > 65,000
ORDER BY Name
The wildcard symbol (*) means that the name of the field can be anything. In other words, all fields
are selected.

SQL Operators
You probably noticed the use of the greater than (>) symbol in the conditional expression. This
works just as you might expect. For every record, the salary is compared to the value of 65,000. If
the salary is greater than 65,000, the record is selected and becomes a part of the result.
The greater than symbol is called a SQL operator. An operator manipulates individual data items
and returns a result. In the case of greater than, the manipulation is really in the form of a
comparison. There are a number of different kinds of other operators. Arithmetic operators are
used to work with numeric values. They include:

Add (+)
Subtract (-)
Multiply (*) and
Divide (/)

Comparison operators are used to compare one value to another. These include:

Equal to (=)
Not equal to (<>)
Greater than (>)
Greater than or equal to (>=)
Less than (<)
Less than or equal to (<=)

Boolean Logic
Finally, there are logical operators. Most logical operators combine the result of two conditions into
a single result. The logical operators include AND, OR and NOT.

AND displays a record if both the first condition and the second condition are true
OR displays a record if either the first or second conditions is true
NOT displays a record if the conditions are false

These are also called Boolean operators. Boolean means there are only two values: true and false.
A condition (such as Salary > 65,000) is either true or false. Boolean logic makes it possible to
combine two or more conditions in a single statement.
Time for a few more examples.
WHERE Salary > 65,000 AND Position = Accountant
returns a table with all the accountants with a salary greater than $65,000.
WHERE Position = Accountant OR Position = Financial Analyst

returns a table with all of the accountants and all of the financial analysts.
WHERE NOT (Position = Accountant)

returns a table with all the employees except for the accountants.
This last example could also have used a not equal to (<>) operator, but there are cases where the
condition is more complicated and only the logical operator will produce the desired result.

Data Warehousing and Data Mining: Information for Business Intelligence


Collections of databases that work together are called data warehouses. This makes it possible to
integrate data from multiple databases. Data mining is used to help individuals and organizations
make better decisions.

Data Warehouses
A database consists of one or more files that need to be stored on a computer. In large
organizations, databases are typically not stored on the individual computers of employees but in a
central system. This central system typically consists of one or more computer servers. A server is
a computer system that provides a service over a network. The server is often located in a room with
controlled access, so only authorized personnel can get physical access to the server.
In a typical setting, the database files reside on the server, but they can be accessed from many
different computers in the organization. As the number and complexity of databases grows, we start
referring to them together as a data warehouse.
A data warehouse is a collection of databases that work together. A data warehouse makes it
possible to integrate data from multiple databases, which can give new insights into the data. The
ultimate goal of a database is not just to store data, but to help businesses make decisions based on
that data. A data warehouse supports this goal by providing an architecture and tools to
systematically organize and understand data from multiple databases.

Distributed DBMS
As databases get larger, it becomes increasingly difficult to keep the entire database in a single
physical location. Not only does storage capacity become an issue, there are also security and
performance considerations. Consider a company with several offices around the world.
It is possible to create one large, single database at the main office and have all other offices
connect to this database. However, every single time an employee needs to work with the database,
this employee needs to create a connection over thousands of miles, through numerous network
nodes. As long as you are moving relatively small amounts of data around, this does not present a
major challenge.
But, what if the database is huge? It is not very efficient to move large amounts of data back and
forth over the network. It may be more efficient to have a distributed database. This means that the
database consists of multiple, interrelated databases stored at different computer network sites.
To a typical user, the distributed database appears as a centralized database. Behind the scenes,
however, parts of that database are located in different places. The typical characteristics of a
distributed database management system, or DBMS, are:

Multiple computer network sites are connected by a communication system


Data at any site are available to users at other sites
Data at each site are under control of the DBMS

You have probably used a distributed database without realizing it. For example, you may be using
an e-mail account from one of the major service providers. Where exactly do your e-mails reside?
Most likely, the company hosting the e-mail service uses several different locations without you
knowing it.
The major advantage of distributed databases is that data access and processing is much faster.
The major disadvantage is that the database is much more complex to manage. Setting up a
distributed database is typically the task of a database administrator with very specialized database
skills.

Data Mining
Once all the data is stored and organized in databases, what's next? Many day-to-day operations
are supported by databases. Queries based on SQL, a database programming language, are used
to answer basic questions about data. But, as the collection of data grows in a database, the amount
of data can easily become overwhelming. How does an organization get the most out of its data,
without getting lost in the details? That's where data mining comes in.
Data mining is the process of analyzing data and summarizing it to produce useful information. Data
mining uses sophisticated data analysis tools to discover patterns and relationships in large
datasets. These tools are much more than basic summaries or queries and use much more
complicated algorithms. When data mining is used in business applications, it is also referred to
as business analytics or business intelligence.
Consider an online retailer that sells a wide variety of products. In a typical day, it may sell
thousands of different products to tens of thousands of different customers. How does the company
leverage all this data to improve its business? One strategy is to discover which products are often
bought together.
This would make it possible to create product bundles that are attractive to customers. Another
method is to develop profiles for customers. A company could ask, based on past purchases, which
products might the same customer also be interested in? This makes it possible to make
suggestions to the customer and increase sales.
Another scenario is fraud detection. Have you ever had your credit card company contact you
regarding a suspicious transaction? How does this work? Let's say you're a construction worker in
Minneapolis. Normally, you use your credit card at the grocery store, the mall and some local
restaurants, all within the Minneapolis area.
Suddenly, your credit card is used to pay for a high-end hotel in Miami Beach, several nightclubs
and a jewelry store. It could very well be that you went down to Miami for a romantic weekend with
your girlfriend because you are going to propose to her. But, it is also quite possible that your credit
card was stolen and you have not noticed it yet.
So, the credit card company has sophisticated algorithms running in real-time to identify patterns
that are out-of-the ordinary based on your demographics and past spending habits. A suspicious
transaction triggers an alert and you are contacted by their fraud detection department. Pretty clever
and all thanks to data mining.
Data mining algorithms are often designed to get better over time as more data is collected and the
outcomes of the analysis are checked for accuracy. You probably recognize these scenarios. Data
mining has become integrated into many businesses, especially those with a strong online presence.

Database Administration and Security: Definition and Purpose


A database administrator or DBA plays a critical role in managing the databases of an organization.
Learn about the various roles of a DBA and the tools used to keep data safe and secure.

Database Administration
Imagine it's the first day of class in college, and you sit down for the first lecture. Your professor
walks in and makes an announcement:

'Welcome back after the summer everyone. I have to start off with some bad news. Due to a glitch in
the university's database, all grades and credits from last semester have been lost. I'm sorry, but we
are going to have to do last semester all over again. Now open your book on page'
That would be disastrous, right? Could you imagine? How could the university lose all that
information? Luckily, these things almost never happen. The important question really is how can we
prevent this from happening? Who is responsible for keeping all the data secure in an organization?
That would be the database administrator, or DBA.
Keeping data secure is only one of the roles of the DBA. The typical tasks of a DBA include:

Controlling access to the database, including creating logins for users and setting roles for
each user. Some users may only need to query the data, while others are involved in
entering new data.
Providing support services to the end users, such as making sure all users know how to use
the database.
Managing procedures for backup and recovery of data, in case of errors made by users or
system crashes. You don't want to lose all the valuable data just because the power went
out.
Ensuring data integrity, which means that data are complete, accurate and current for the
tasks at hand.
Controlling data security, including preventing unauthorized access to the data and
protecting against other security threats.
Setting data privacy, which means that only authorized individuals are able to see certain
data. For example, there is no need for everyone in the organization to be able to see all the
personnel files of all the employees.

Several of these tasks go hand-in-hand. For example, carefully controlling access to the data helps
to implement data security and data privacy policies.

Security Threats
Databases face a number of security threats. Many of these threats are common to all computer
systems, but large databases in organizations are particularly vulnerable because they often contain
sensitive information and are used by many different people.
One of the basic threats is data loss, which means that parts of a database can no longer be
retrieved. The earlier scenario where the university lost part of their records has disastrous
consequences.
This could be the result of physical damage to the storage medium, like fire or water damage,
human error or hardware failures. Every single computer system is to some degree vulnerable, so a
common strategy employed by DBAs is to create multiple backups on different computer systems.
So if one system were to fail, the data is still secure somewhere else.
Another security threat is unauthorized access. Many databases contain sensitive information, and it
could be very harmful if this information were to fall in the wrong hands. Imagine someone getting a
hold of your social security number, date of birth, address and bank information. It would be
relatively easy for someone to open up a credit card under your name and start spending without
your knowledge.

Getting unauthorized access to computer systems is known as hacking. Computer hackers have
developed sophisticated methods to obtain data from databases, which they may use for personal
gain or to harm others. Have you ever received an e-mail with a notification that you need to log in to
your credit card account with a link for you to follow? Most likely, this is a hacker trying to obtain your
log in details, so be careful.
A third category of security threats consists of viruses and other harmful programs. A computer
virus is a computer program that can cause damage to a computer's software, hardware or data. It
is referred to as a 'virus' because it has the capability to replicate itself and hide inside other
computer files. There are many types of viruses and new ones are being developed all the time.
Once a virus is present on a computer, it typically performs some type of harmful action, such as
corrupting data or obtaining sensitive information. Computer viruses are one type of malware, short
for 'malicious software.' Malware is used by attackers to disrupt computer operation. In addition to
computer viruses, this includes spyware (used to collect information about a person without their
knowledge), adware (used to display advertising) and Trojan horses (used to create unauthorized
access to someone's computer).
One of the most common ways to get a virus on your computer is to download a file from the Internet
that is infected. So if you get an e-mail from someone you don't know with a file attached to it, be
careful opening up these attachments. As the database administrator of your own computer, you
should use some type of anti-virus software.

Database Security
One of the primary tasks of a DBA is to keep databases secure. This can be accomplished, for
example, by restricting access to certain users, controlling what each user can do and running antivirus software.
Another way to keep databases safe is to use encryption. This is often used when data is
transferred over the Internet, where it could be potentially seen by others. Encryption is the process
of encoding messages so it can only be viewed by authorized individuals. An encryption key is used
to make the message unreadable, and a secret decryption key is used to decipher the message.
Encryption is widely used in systems, like e-commerce and Internet banking, where the databases
contain very sensitive information. If you have made purchases online using a credit card, it is very
likely that you used encryption to do this.
There is one other major strategy to improve database security, which is to use a firewall. A firewall
consists of software and hardware set up between an internal computer network and the Internet. A
computer network manager sets up rules for the firewall to filter out unwanted intrusions.
These rules are set up in such a way that unauthorized access is much more difficult. A DBA can
decide, for example, that only users within the firewall can access a particular database or those
outside the firewall have limited capabilities to modify the data. You can also set up a firewall for
your own computer, and on many computer systems, this is built into the operating system.

Cloud Computing and Databases: Technology to Improve Database Management

Cloud computing uses a network of computers to provide services that otherwise would be provided
by a single computer or computer server. Learn how cloud computing works and how it allows you to
use the same database on multiple devices in this video lesson.

Where Are Your Files?


You've probably heard of 'the cloud,' as the place where a lot of data is stored. What exactly is the
cloud? Let's consider a scenario you may have experienced yourself.
You are sitting at home, working on a somewhat lengthy e-mail on your laptop. Your phone rings
and your friend invites you out for coffee. You're not quite done with your e-mail yet so you hit 'Save.'
You meet your friend at a nearby coffee shop. After coffee you decide to linger around and return to
your e-mail. You open up your e-mail on your phone, do some tweaking on your e-mail message
and hit 'Send.' You return home and a little later you get a reply to your e-mail.
So here's the $64,000 question: How did your saved e-mail get from your laptop to your phone?
More broadly speaking, where are all your e-mails stored? Or for that matter, where are all your files
stored?
Well, some files are most likely stored on the hard drive of your computer. For example, if you open
up a word processing application, type up an essay and save it on the local drive on your computer.
You can open up a file management application and see the file sitting there on your drive. But what
about your e-mail, or your bank account information or your status updates on a social network?
Let's say your e-mail address is 'SmartStudent@abcmail.com.' You signed up online with the ABC
Company to use their e-mail system. This means they run computer systems to manage all the emails for you; the e-mails do not typically reside on your local computer. So when you hit 'Save' on
your laptop, the e-mail is stored on one of the computer servers of the ABC Company. When you
access your e-mail on your phone, the e-mail is downloaded from these servers. Then when you hit
'Send,' it is routed by these servers to the recipient. That's the answer to the $64,000 question.
So what if the physical address of the ABC Company is 123 Main St, Smalltown, USA? What if you
were to go to that address and walk into their office? Could you find an actual computer or a hard
drive where that one specific e-mail is stored and could you find it? Possibly, but not likely. It is much
more likely that the ABC Company runs a number of different servers in different locations and your
specific e-mail could be anywhere in the system. The ABC Company may not actually have its own
computer servers and instead rent out storage from another company, so your e-mail message
could literally be stored anywhere in the world. Welcome to the cloud!

Cloud Computing
So what exactly is cloud computing? Cloud computing uses a large number of networked
computers to provide services to users, such as running software applications, accessing databases
and file storage. These are normally services you would get from a single computer or from a
computer server. In the cloud, however, you cannot point to one single computer as the device that
is providing you the service - it's the entire network.
In cloud computing, the network of computers does the heavy lifting, such as running software and
storing files. The computer of the user only needs to run software to interact with the cloud, known

as interface software. E-mail is a very good example of this. You may use a web browser for your email. You use this to receive, read, delete, write and send messages. The actual e-mail software and
the files are not on your computer, but in the cloud.
One of the benefits of cloud computing is that sharing resources leads to economies of scale.
Instead of every small organization building its own network for services and storage, it is more
efficient to have a few organizations build this network for others to use at a cost. The analogy is
often made with electric utilities. We are now so used to having a handful of utilities provide
electricity to all of us, that we don't think of generating our own electricity for our own use, although
solar panels are changing this. A similar argument could be made that computer services are like a
utility.
Another benefit is that the entry cost has become very low. A very small organization can get access
to sophisticated services at a relatively low cost, since it does not have to build the entire
infrastructure itself. Cloud computing also creates flexibility. You can access any of the information in
your organization, anywhere, on any device. You don't have to go back to the office to look up
something. Or wait until you return from your trip to work on that memo. Everything can be right
there at your fingertips - that is, if everything works smoothly.

Security and Privacy Concerns


There're also a number of concerns related to cloud computing. The biggest concerns are security
and privacy. If you're using cloud computing, you are handing over all your important information to
another organization. You are trusting them that they will manage your data securely and won't
share it with anyone else. There have been numerous articles in the news over the past year that
have raised doubts in this area.

1
INTRODUCTION TO SYSTEM
ANALYSIS AND DESIGN

1.1 INTRODUCTION
Systems are created to solve problems. One can think of the systems approach as an organized way of dealing with a problem. In
this dynamic world, the subject System Analysis and Design (SAD),
mainly deals with the software development activities.
1.2 OBJECTIVES
After going through this lesson, you should be able to
l

define a system

explain the different phases of system development life cycle

enumerate the components of system analysis

explain the components of system designing

1.3 DEFINING A SYSTEM


A collection of components that work together to realize some objectives forms a system. Basically there are three major components in
every system, namely input, processing and output.
Input

Processing

Output

Fig. 1.1: Basic System Components

2 :: Computer Applications

In a system the different components are connected with each other


and they are interdependent. For example, human body represents
a complete natural system. We are also bound by many national
systems such as political system, economic system, educational system and so forth. The objective of the system demands that some
output is produced as a result of processing the suitable inputs. A
well-designed system also includes an additional element referred
to as control that provides a feedback to achieve desired objectives
of the system.
1.4 SYSTEM LIFE CYCLE
System life cycle is an organizational process of developing and maintaining systems. It helps in establishing a system project plan, because it gives overall list of processes and sub-processes required for
developing a system.
System development life cycle means combination of various activities. In other words we can say that various activities put together
are referred as system development life cycle. In the System Analysis and Design terminology, the system development life cycle also
means software development life cycle.
Following are the different phases of system development life cycle:
l
l
l
l
l
l
l
l
l

Preliminary study
Feasibility study
Detailed system study
System analysis
System design
Coding
Testing
Implementation
Maintenance

The different phases of system development life cycle is shown in


Fig. 1.2 below.
System Study
Maintenance
Implementation
Testing

Feasibility Study
Software
Development
Life Cycle

System Analysis
System Design

Coding
Fig. 1.2: Phases of System Development Life Cycle

Introduction to System Analysis and Design :: 3

INTEXT QUESTIONS
1. Write True or False for the following statements.
(a)

A collection of components that work together to realize


some objectives forms a system.

(b) System life cycle is not an organizational process of developing and maintaining a system.
(c)

In the system analysis and design terminology the system


development life cycle means software development life cycle.

(d) Coding is not a step in system development life cycle.


(e)

System analysis and system design are the same phase of


system development life cycle.

1.5 PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE


Let us now describe the different phases and related activities of
system development life cycle.
(a) Preliminary System Study
Preliminary system study is the first stage of system development
life cycle. This is a brief investigation of the system under consideration and gives a clear picture of what actually the physical system
is? In practice, the initial system study involves the preparation of a
System Proposal which lists the Problem Definition, Objectives of
the Study, Terms of reference for Study, Constraints, Expected benefits of the new system, etc. in the light of the user requirements.
The system proposal is prepared by the System Analyst (who studies the system) and places it before the user management. The management may accept the proposal and the cycle proceeds to the
next stage. The management may also reject the proposal or request some modifications in the proposal. In summary, we would
say that system study phase passes through the following steps:
l

problem identification and project initiation

background analysis

inference or findings (system proposal)

(b) Feasibility Study


In case the system proposal is acceptable to the management, the

4 :: Computer Applications

next phase is to examine the feasibility of the system. The feasibility


study is basically the test of the proposed system in the light of its
workability, meeting users requirements, effective use of resources
and of course, the cost effectiveness. These are categorized as technical, operational, economic and schedule feasibility. The main goal
of feasibility study is not to solve the problem but to achieve the
scope. In the process of feasibility study, the cost and benefits are
estimated with greater accuracy to find the Return on Investment
(ROI). This also defines the resources needed to complete the detailed investigation. The result is a feasibility report submitted to
the management. This may be accepted or accepted with modifications or rejected. The system cycle proceeds only if the management accepts it.
(c) Detailed System Study
The detailed investigation of the system is carried out in accordance
with the objectives of the proposed system. This involves detailed
study of various operations performed by a system and their relationships within and outside the system. During this process, data
are collected on the available files, decision points and transactions
handled by the present system. Interviews, on-site observation and
questionnaire are the tools used for detailed system study. Using
the following steps it becomes easy to draw the exact boundary of
the new system under consideration:
l

Keeping in view the problems and new requirements

Workout the pros and cons including new areas of the system

All the data and the findings must be documented in the form of
detailed data flow diagrams (DFDs), data dictionary, logical data structures and miniature specification. The main points to be discussed
in this stage are:
l

Specification of what the new system is to accomplish based on


the user requirements.

Functional hierarchy showing the functions to be performed by


the new system and their relationship with each other.

Functional network, which are similar to function hierarchy but


they highlight the functions which are common to more than
one procedure.

List of attributes of the entities these are the data items which
need to be held about each entity (record)

Introduction to System Analysis and Design :: 5

(d) System Analysis


Systems analysis is a process of collecting factual data, understand
the processes involved, identifying problems and recommending feasible suggestions for improving the system functioning. This involves
studying the business processes, gathering operational data, understand the information flow, finding out bottlenecks and evolving
solutions for overcoming the weaknesses of the system so as to
achieve the organizational goals. System Analysis also includes subdividing of complex process involving the entire system, identification of data store and manual processes.
The major objectives of systems analysis are to find answers for each
business process: What is being done, How is it being done, Who is
doing it, When is he doing it, Why is it being done and How can it be
improved? It is more of a thinking process and involves the creative
skills of the System Analyst. It attempts to give birth to a new efficient system that satisfies the current needs of the user and has
scope for future growth within the organizational constraints. The
result of this process is a logical system design. Systems analysis is
an iterative process that continues until a preferred and acceptable
solution emerges.
(e) System Design
Based on the user requirements and the detailed analysis of the
existing system, the new system must be designed. This is the phase
of system designing. It is the most crucial phase in the developments of a system. The logical system design arrived at as a result of
systems analysis is converted into physical system design. Normally,
the design proceeds in two stages:
l

Preliminary or General Design

Structured or Detailed Design

Preliminary or General Design: In the preliminary or general design, the features of the new system are specified. The costs of implementing these features and the benefits to be derived are estimated.
If the project is still considered to be feasible, we move to the detailed design stage.
Structured or Detailed Design: In the detailed design stage, computer oriented work begins in earnest. At this stage, the design of
the system becomes more structured. Structure design is a blue
print of a computer system solution to a given problem having the

6 :: Computer Applications

same components and inter-relationships among the same components as the original problem. Input, output, databases, forms, codification schemes and processing specifications are drawn up in detail. In the design stage, the programming language and the hardware and software platform in which the new system will run are
also decided.
There are several tools and techniques used for describing the system design of the system. These tools and techniques are:
l

Flowchart

Data flow diagram (DFD)

Data dictionary

Structured English

Decision table

Decision tree

Each of the above tools for designing will be discussed in detailed in


the next lesson.
The system design involves:
i.

Defining precisely the required system output

ii. Determining the data requirement for producing the output


iii. Determining the medium and format of files and databases
iv. Devising processing methods and use of software to produce
output
v.

Determine the methods of data capture and data input

vi. Designing Input forms


vii. Designing Codification Schemes
viii. Detailed manual procedures
ix. Documenting the Design
(f) Coding
The system design needs to be implemented to make it a workable
system. This demands the coding of design into computer understandable language, i.e., programming language. This is also called
the programming phase in which the programmer converts the pro-

Introduction to System Analysis and Design :: 7

gram specifications into computer instructions, which we refer to as


programs. It is an important stage where the defined procedures are
transformed into control specifications by the help of a computer
language. The programs coordinate the data movements and control the entire process in a system.
It is generally felt that the programs must be modular in nature.
This helps in fast development, maintenance and future changes, if
required.
(g) Testing
Before actually implementing the new system into operation, a test
run of the system is done for removing the bugs, if any. It is an
important phase of a successful system. After codifying the whole
programs of the system, a test plan should be developed and run on
a given set of test data. The output of the test run should match the
expected results. Sometimes, system testing is considered a part of
implementation process.
Using the test data following test run are carried out:
l

Program test

System test

Program test: When the programs have been coded, compiled and
brought to working conditions, they must be individually tested with
the prepared test data. Any undesirable happening must be noted
and debugged (error corrections)
System Test: After carrying out the program test for each of the
programs of the system and errors removed, then system test is
done. At this stage the test is done on actual data. The complete
system is executed on the actual data. At each stage of the execution, the results or output of the system is analysed. During the
result analysis, it may be found that the outputs are not matching
the expected output of the system. In such case, the errors in the
particular programs are identified and are fixed and further tested
for the expected output.
When it is ensured that the system is running error-free, the users
are called with their own actual data so that the system could be
shown running as per their requirements.
(h) Implementation
After having the user acceptance of the new system developed, the

8 :: Computer Applications

implementation phase begins. Implementation is the stage of a project


during which theory is turned into practice. The major steps involved in this phase are:
l

Acquisition and Installation of Hardware and Software

Conversion

User Training

Documentation

The hardware and the relevant software required for running the
system must be made fully operational before implementation. The
conversion is also one of the most critical and expensive activities in
the system development life cycle. The data from the old system
needs to be converted to operate in the new format of the new system.
The database needs to be setup with security and recovery procedures
fully defined.
During this phase, all the programs of the system are loaded onto
the users computer. After loading the system, training of the user
starts. Main topics of such type of training are:
l

How to execute the package

How to enter the data

How to process the data (processing details)

How to take out the reports

After the users are trained about the computerized system, working
has to shift from manual to computerized working. The process is
called Changeover. The following strategies are followed for
changeover of the system.
(i) Direct Changeover: This is the complete replacement of the old
system by the new system. It is a risky approach and requires
comprehensive system testing and training.
(ii) Parallel run: In parallel run both the systems, i.e., computerized
and manual, are executed simultaneously for certain defined
period. The same data is processed by both the systems. This
strategy is less risky but more expensive because of the following:
l

Manual results can be compared with the results of the computerized system.

Introduction to System Analysis and Design :: 9

The operational work is doubled.

Failure of the computerized system at the early stage does


not affect the working of the organization, because the
manual system continues to work, as it used to do.

(iii) Pilot run: In this type of run, the new system is run with the
data from one or more of the previous periods for the whole or
part of the system. The results are compared with the old
system results. It is less expensive and risky than parallel run
approach. This strategy builds the confidence and the errors
are traced easily without affecting the operations.
The documentation of the system is also one of the most important activity in the system development life cycle. This
ensures the continuity of the system. There are generally two
types of documentation prepared for any system. These are:
l

User or Operator Documentation

System Documentation

The user documentation is a complete description of the system


from the users point of view detailing how to use or operate the
system. It also includes the major error messages likely to be encountered by the users. The system documentation contains the
details of system design, programs, their coding, system flow, data
dictionary, process description, etc. This helps to understand the
system and permit changes to be made in the existing system to
satisfy new user needs.
(i) Maintenance
Maintenance is necessary to eliminate errors in the system during
its working life and to tune the system to any variations in its working environments. It has been seen that there are always some errors found in the systems that must be noted and corrected. It also
means the review of the system from time to time. The review of the
system is done for:
l

knowing the full capabilities of the system

knowing the required changes or the additional requirements

studying the performance.

If a major change to a system is needed, a new project may have to


be set up to carry out the change. The new project will then proceed
through all the above life cycle phases.

10 :: Computer Applications

INTEXT QUESTIONS
2. Fill in the blanks.
(a) System study is the _____________ stage of system development life cycle.
(b) Analysis involves a ____________ study of the current system.
(c)

All procedures requirements must be analysed and documented in the form of data flow diagrams, data dictionary,
___________ and miniature specifications.

(d) _____________ is a blue print of a computer system.


(e) In ___________ run the new system installed in parts.
(f)

In parallel run computerized and ____________ systems are


executed in parallel.

1.6 WHAT YOU HAVE LEARNT


In this lesson a systematic approach to solve any given problem is
explained. Phases of system such as preliminary system study,
detailed system study, system analysis, design, coding, testing,
implementation and maintenance are explained. Computer based
systems are defined. System development life cycle is discussed in
detail. The different phases of the development of system are
explained in detail.
1.7 TERMINAL QUESTIONS
1. Define a system. Explain the components of a system.
2. How do you explain system development life cycle?
3. Discuss the importance of system analysis and design in the
development of a system.
1.8 KEY TO INTEXT QUESTIONS
1. (A) True

(b) False

2. (a) first

(b) detailed (c) logical data structure

(d) structure design

(c) True

(e) pilot

(d) False (e) False

(f) manual

MODULE 5
DECISION SUPPORT SYSTEM
What Are Specialized Information Systems? - Decision Support Systems for Business

Specialized information systems have been developed to support decision making in an increasingly
complex world. Learn about some of the different types of specialized information systems.

Specialized Information Systems


An information system is a collection of software, hardware, procedures, data and computer
networks used by people in organizations. An information system is used to collect, store, manage
and distribute data to support specific activities. As organizations and their activities have grown
more complex, specialized information systems have emerged.
Some of this specialization is due to the nature of organizations. For example, an information system
that works well to maintain a library catalog may not be the best to keep track of the inventory of a
supermarket - even though the activities may share some similarities. While both systems need to
keep track of specific items, the types of items are very different.
In a library catalog, you need to keep track of individual books. In a supermarket inventory, you want
to know how many pounds of golden delicious apples are still in stock, but you don't need to keep
track of individual apples since they're all the same. You can probably think of other ways in which
libraries and supermarkets are different.
A single organization may use a number of different information systems. Consider the supermarket
example. A single supermarket will have some type of inventory system, which keeps track of what
is in stock, what is sold every day and what is being delivered. This inventory system is linked to a
transaction system of actual sales at individual registers.
The store manager also needs to keep a scheduling system to organize the working hours of
employees. If the supermarket is part of a chain, there will be other information systems at a different
level. Senior management may want to know how stores in specific markets are doing or where to
plan for a new store.
Think of all the decisions being made just within the supermarket chain. How many cartons of milk to
buy? How many cash registers to open up on Saturday morning? When to put the potato chips on
sale and at what price? How much to spend on advertising? Thousands of decisions are made every
day. Almost all these decisions require information, and most organizations have become very
reliant on information systems to support their decision making.

Types of Specialized Information Systems


Let's look at some examples of specialized information systems used in organizations. Management
Information Systems, or MIS, are computer-based systems that provide managers with the tools to
run their department. Relative to other types of specialized information systems, MIS is used by midlevel management to support ongoing operations. For example, an MIS could provide a manager
with real-time information on customer orders, customer complaints, sales and production cycles. In

the case of the supermarket, an inventory system for use by the store manager would be an
example of an MIS.
A Decision Support System, or DSS, is a specialized information system designed to facilitate the
decision-making process in organizations. It provides a framework to gather information from internal
and external sources to support decision making. There are many different kinds of decision support
systems, but in general, they are used for problems that are less structured.
So, while an MIS is used for routine decisions, a DSS is often used when the circumstances are not
well defined or unpredictable. In the case of a supermarket, an example of a DSS would be a system
for how to handle an emergency, such as a flood. Quick decisions without complete information will
be necessary, and this is not something all the employees will have to deal with on a daily basis.
An Executive Information System, or EIS, is a specialized DSS for senior management and
executives. It combines information from various units in the organization to provide a strategic
overview. This is often in the form of an executive dashboard that shows key performance indicators.
An Expert System (ES) is a specialized information system that simulates the reasoning and
decision making of human experts. Software collects and stores the experiences and knowledge of
human experts from various professional fields. This organized knowledge then makes it possible for
a less experienced individual to make decisions using this expertise. Expert systems are often
developed for very specialized applications. In the case of a supermarket chain, an ES could be
used to develop the most desirable layout of products within a store, given a certain size and
number of products.
A Business Intelligence System, or BIS, is a computerized intelligence system that collects,
manages and interprets information about a business and its competitors. BIS is not only used to
make well-informed decisions, but specifically to gain a competitive edge in the marketplace. BIS
typically includes some type of predictive analytics to try to determine the impact of certain decisions
on future trends. In the case of a supermarket, a BIS could be used to examine how market share
might change based on changes in the price of certain products.
A Geographic Information System, or GIS, allows you to map the locations of things of interest
and examine geographic relationships between these locations. In the case of a supermarket, a GIS
could be used to find the best location for a new store. You would want to select a location not too
close to an existing store, but close to potential customers and transportation.
Statistical analysis is used to analyze and interpret data. This includes creating graphs and charts
to get a visual display of the data, but also statistical testing to find patterns and relationships. In the
case of a supermarket, you may want to analyze whether a particular advertising campaign
produced the desired effect. Did sales really go up and how certain are we that this is related to the
advertising? That's where statistics comes in.

Decision Support Systems: How Managers Analyze Internal and External Data with DSS

A Decision Support System is a specialized information system used when a problem is


unstructured or when circumstances are uncertain. Learn about the data and models used in a DSS.

Decision Support Systems


A Decision Support System, or DSS, is a specialized information system specifically designed to
facilitate the decision making process in the operations of organizations. Compared to other types of
information systems, a DSS is typically used when a problem is unstructured or when circumstances
are difficult to predict.
A DSS may include other types of systems. For example, a database management system (DBMS)
is often part of a DSS in order to have access to the necessary data. However, a DSS is more than a
DBMS since it provides a structure to facilitate the process of making decisions.

Sources of Information
A DSS gathers information from internal sources of an organization over which there is a certain
amount of control as well as from external sources over which control is more limited. Internal
sources consist of all the various databases within an organization, such as those related to
personnel, finances, assets, customers, etc. External sources consist of the various factors that
influence how an organization operates, such as market trends, government regulations,
competitors, etc. How this information is used is best illustrated using an example.
Consider a bank, which provides loans to customers. A customer comes to the bank to request a
mortgage loan to buy a house. The bank employee working with the customer will collect information
to decide whether the bank will provide a loan to the customer and under what conditions. The
information collected includes things like the customer's employment, income, credit score, loan
history and other financial information.
Since this loan is to buy a house, the bank also collects information on the property, such as the
legal description and the assessed market value. The bank will also look at trends in the real estate
market, including interest rates offered by other financial institutions. Finally, the bank needs to
consider its own internal finances, such as the funds it has available for loans, how many mortgage
loans it has already approved recently, its experience with loans given to similar customers, etc.
There is a lot of information to consider. Some of this can be used again for the next loan
application, but some of it is very specific to this particular customer. Some of the information can
also change very quickly, such as trends in the housing market. A DSS makes it possible for the
bank employee to make an informed decision in a timely manner that considers all the different
internal and external data sources.

Decision Models
In addition to lots of data, a DSS uses a model base. This provides access to a number of different
models to support decision making. Many of these models consist of statistical analysis of data and
can serve as guidelines for certain decisions. Some models are used to determine patterns in
existing data, while others are used to try to predict trends in the future.
Models in a DSS provide relatively easy access to sophisticated analytical methods. Typically, such
models have already been developed and tested in other contexts, so users can have some
confidence in them. In the case of the mortgage loan, a DSS could include a model that predicts the
likelihood that someone will default on their loan based on their financial profile.

User Interface
A DSS uses many different data sources as well as a number of different models. A typical user,
however, could easily get overwhelmed by all this information. A DSS therefore often has a custombuilt user interface that makes it a lot easier to use. In the example of the mortgage loan, the bank
employee enters the information into electronic forms within the DSS. The user interface helps the
employee ask the right questions and collect all the necessary information. Some of the necessary
information is also collected automatically using behind-the-scenes protocols.
The user interface structures the collection and organization of data and also reports the results in
an easy-to-follow format. A certain amount of training may be needed to use the system, but the
employee does not have to be a database expert or statistical analyst to make an informed decision.

Not a Black Box


It is important to recognize that a DSS does not automatically make decisions. Ultimately, the
decisions are made by people, and a DSS is used to support these decisions. In other words, a DSS
is not a black box that magically produces the best decision.
In the case of the mortgage loan application, a DSS transforms a large amount of information into a
meaningful summary. This could be in the form of a numerical score, a list of strengths or
weaknesses or some type of visual. The bank employee or bank manager is still the person making
the decision to approve a loan or not.
It is also important to recognize that the user needs to have some general knowledge about how the
DSS works. In the case of a mortgage loan, if the application is denied, the bank employee should
be able to explain to the customer why. Perhaps the house the customer wants to buy is a bit too
expensive relative to their income, or they have too many other loans already.

Decision Making in Organizations


Information systems support decision making in organizations. Understanding the nature of decision
making can help in using information systems more effectively.

How to Make a Decision


Effective decision makers are needed in every organization. How an individual makes decisions,
however, differs from person to person. Some people take their time to make decisions, while others
make quick decisions. Some people follow a particular strategy, while others go with their intuition.
Consider how you decided where to go to college. You needed to decide what to study and where.
How did you decide this? Did you follow a logical series of steps, or did you follow your instinct?
Maybe you woke up one day and just knew the right answer, or perhaps you've been agonizing over
the decision for months and still can't decide?
Now consider what information you used to make your decision. How important were the opinions of
your family and friends? Did you use a guide to decide the best college? Did you have any peers in
school who influenced your decision?

Stages of Decision Making


You can think of making a decision in terms of three stages of decision making:
1. Intelligence stage - You identify the problem or opportunity and determine the constraints.
The problem could be that you need a good college degree to start a great career. So you need to
decide where to go to college. The constraints could be things like the cost of tuition, the distance to
your family and the majors you are interested in.
2. Design stage - You develop alternative solutions and evaluate their feasibility.
In this stage, you would collect information on a number of colleges and come up with some of their
pros and cons. Perhaps one college is more prestigious and more costly, but it's one of the best
places for your major of interest, and they offer scholarships if your grades are good enough.
3. Choice stage - You decide on a course of action.
Ultimately, you need to make a decision because the application deadlines are coming up. You need
to weigh the information you have organized about the various colleges and make the decision that
you think is the best for your long-term goals in life. Not that easy, is it? Once you have decided
where you want to go to college, you need to complete the applications and actually get into college!
While these stages sound a little abstract, they help to think about the information you need along
the way. For example, some of the resources at Study.com may help you find out which universities
are good places to study the majors you are interested in. Other resources may help you compare
the tuition costs and the availability of scholarships at different colleges.

Types of Decisions
There are a number of different ways to look at decisions. One way to characterize decisions is to
look at them as programmed or non-programmed. A programmed decision is one that can be
made into a rule or rigorous procedure.
For example, consider the inventory of a store. When should a store order new inventory? A store
could use a rule where it orders every month the same amount of product as it sold on a monthly
basis averaged over the past six months. You can probably think of a few cases where this rule may
not work, but you get the basic idea. You could write a rule that a computer system could
automatically implement.
A non-programmed decision would be one that is much harder to quantify. Deciding where to go to
college would be a good example. Trying to put all the factors into a single, quantifiable rule is
probably futile. How do you compare tuition cost with the quality of your education? This is more
subjective and likely different for different individuals. Knowing the type of decision you are making
helps you to understand the role of information systems.
In the case of managing store inventory, you could probably come up with a set of logical rules,
which could be programmed into a computer system. These rules could then be carried out into a
semi-automatic manner. An actual person still needs to look over these decisions and possibly
modify the orders, but the basic number crunching could be done automatically.
In the case of deciding where to go to college, no set of programmed rules is going to make the
decision for you. But what about an information system where you can quickly find the colleges
where they have the majors you are most interested in? The system would make you a map of
where they are located, show tuition costs and any other criteria you ask for. That would be useful,

right? This college information system does not make the decision for you but helps you in sorting
through all the information, so it becomes easier for you to make your decision.

Business Intelligence (BI): Organizing, Categorizing and Accessing Data

Business Intelligence uses specialized information systems to gain a competitive edge in the
marketplace. Learn about some of the specific tools used in Business Intelligence.

What Is Business Intelligence?


Business Intelligence, or BI, uses a computerized intelligence system to collect, manage and
interpret information about a business to make sound business decisions. BI monitors the operations
of a company intelligently. BI employs a combination of tools, such as database management,
decision support systems, data mining and statistical analysis.
How is BI different from a general decision support system? First, BI is not focused on supporting a
specific type of decision but on all the operations of a company. This makes it more comprehensive.
Second, BI often takes place on a continuous basis in close to real-time. This makes it possible to
get an ongoing, integrated view of a company.
Third, BI has an element of intelligence, which means it tries to integrate information internal to the
organization, and also information related to the market conditions and specific competitors. BI is
often used not just to make well-informed decisions but specifically to gain a competitive edge in the
marketplace. The specific focus of BI is often to gain more business or to improve market share.

Predictive Analytics
BI often has a predictive aspect to it, referred to as predictive analytics. What will the marketplace
look like in the next few weeks, months or years? What will my competitors do? What will give my
company a competitive edge in the near future?
These questions are not addressed by brainstorming through pie-in-the-sky thinking but by computer
algorithms analyzing data. Predictive analytics is a type of data mining that is focused on finding
patterns in existing data in order to predict trends and behavior into the future. One example of
predictive analytics you are already familiar with is weather forecasting. Meteorologists use longterm historic data and more recent measurements of the atmosphere to predict the temperature,
wind and precipitation a few days into the future. The forecast may not always be accurate, but it is
often pretty close.
A good example of predictive analytics in the business world is the insurance industry. Let's say you
have just bought a new car, but before you can even drive it off the lot, you need to get insurance.
You call an insurance agent to set up a new insurance policy. How will the insurance company
determine your monthly premium? This will depend first of all on the actual car you drive. If a very
expensive car gets into an accident, it will cost more to repair. It will also depend on how you will be
using your car and where it will be parked.
Can you think of some other things the insurance company wants to know? How about your age?
Definitely. Your gender? Yes. The ZIP code where you live, work and/or go to school? Those too.

So let's say you are 24. You provide all the other information, and the insurance company calculates
your premium at $137 per month. You turn 25 in a few months, and you want to know if it makes any
difference. Sure enough, your premium will drop to $125 per month.
So, how exactly did the insurance company calculate the $12 difference? Will you be a much better
driver in a few months? Remember how insurance works. You get an insurance policy, and when
you get into an accident, the insurance company pays for your repair. So, the insurance company
needs to calculate what kind of risk you present to them. What is the probability you will get into an
accident in the next 12 months?
This is determined by looking at the data on drivers from the past couple of years. How many drivers
with a similar profile got into an accident over a 12-month period? What insurance companies have
found is that younger drivers under 25 tend to drive less safe than those that are older.
Whatever the exact reasons are behind this, this is what the statistical analysis shows. What this
means is that younger drivers have to pay a little more. The $12 difference is determined by the
statistical model used to predict the risk of a driver getting into an accident.
Predictive analytics use historic data to predict the probability of you getting into an accident. That
doesn't mean you are going to get into an accident, of course. But let's say the insurance company
has 250,000 customers with an automobile insurance policy. Every year, there are going to be a
number of accidents. Predictive analytics helps to determine the overall risk to the insurance
company. That overall risk is used to calculate the premiums. Customers will have to pay more or
less, depending on how much they contribute to the overall risk.

Online Analytical Processing


One of the other specific tools used in BI is Online Analytical Processing, or OLAP. OLAP is an
approach to quickly answer questions that have multiple dimensions. You can think of a data table
as having two dimensions: rows and columns. For example, each row in the table could be a product
made by a business, and each column could be how many units of each product were sold every
month. You can answer questions about this table using a database query.
OLAP extends this idea to more than two dimensions. For example, for each product you also want
to know in which facility it was made (3rd dimension), which customer it was shipped to (4th
dimension) and how many units have some type of problem as reported by the customer (5th
dimension).This information could be stored in a relational database, but for a large number of
dimensions this can get complicated, and the database will become slow. OLAP organizes this multidimensional data, so that it can be analyzed quickly.
For example, once you have the data organized in the various dimensions, you can ask questions
like this: Show me all the facilities in Europe that made this particular product in the month of June
that were shipped to customers in Asia that were reported to have a problem. Now for those same
facilities, show me all the other products they made in the same month and that were shipped to
North America, and then give me a mailing list of all those customers in California.
OLAP is designed to process this type of analysis very quickly. You can see how OLAP can be very
useful to analyze complex business operations. OLAP and data mining are both used in business
intelligence, but they represent different approaches.
In data mining, analytical tools are used to uncover relationships in the data. You are basically
saying, 'Here is the data, show me what the interesting patterns are.' In OLAP, you start with some
very specific questions, and you are drilling down into the data to find the answers. Data mining is
bottom-up, discovery-driven. OLAP is top-down, query-driven.

Management Information Systems (MIS): Manager Decision-Making Tools

Management Information Systems help managers make effective decisions to support ongoing
operations within an organization. Learn about the types of reports produced by a MIS.

What Is a MIS?
A management information system, or MIS, is a computer-based system that provides managers
with the tools to run their department effectively. Relative to other types of specialized information
systems, an MIS is used by mid-level management to support ongoing operations. The emphasis is
on making routine decisions. MIS relies mostly on internal sources of information.
One of the important roles of an MIS is to provide the right information to the right person in the right
format at the right time. Information is collected within the organization on an ongoing basis and an
MIS processes this information, so managers get the summarized reports. Information is typically in
the form of reports on a daily or weekly basis.
MIS reports can be in the form of tables with numerical values, visual displays or other key
indicators. Reports can be in paper format, electronic format or both. More sophisticated systems
use electronic reports that can be updated on demand in close to real-time. This gives managers an
updated snapshot of the current state of operations. For example, an MIS could provide a manager
with real-time information on customer records, customer complaints, sales and production cycles.

MIS communications occur through various kinds of reports.

Types of Reports
An MIS can produce a number of different types of reports. A scheduled report is produced on a
regular interval, such as every day, week or month. For example, a manager of a production floor
may want to see weekly payroll reports to keep track of labor costs. Reports typically focus on a
number of key indicators, such as inventory levels, production activity or sales volume.
Often, these indicators are compared to numbers from prior reporting periods or to targets set by the
organization. This gives mangers the opportunity to implement any corrective actions where
necessary.

An on-demand report is only produced by request instead of on a fixed schedule. Such reports are
typically produced when a question arises regarding the status of a particular item or production
element. For example, consider a shipping company that picks up, ships and delivers thousands of
packages every day. If you ship a package, you get a tracking number that you can use to get the
status of that package. When you log in to the website and enter the tracking number, you are
requesting an on-demand report.
An exception report is automatically generated when a situation is unusual and requires some sort
of attention. For example, consider a manufacturing plant with several production lines. All lines are
expected to generate a certain volume. An MIS could generate an exception report if these are not
met. Exception reports rely on trigger points. These are parameters set up by managers that would
result in an exception. In the case of the production lines, the trigger point could be something like
10% below expected production.
A drill-down report provides great detail about a situation. Reports can provide information at a high
level (such as the volume at a production line), at a more detailed level (such as the employees who
worked on this line) and then at a very detailed level (such as the training provided to those
employees over the past year).

Characteristics of a MIS
The various types of reports help managers make better decisions on a daily basis. The general
characteristics of an MIS are:

Use a variety of internal data sources


Provide reports on routine operations of an organization
Provide a range of different reports, both scheduled and on-demand
Provide reports in a variety of formats, including paper copy and electronic
Allow users to develop custom reports, such as drill-down reports

Typically, an MIS is organized along the functional areas of an organization. So the finance
department will have a financial MIS, the human resources department will have a human resources
MIS, etc. Since an MIS is typically targeted at mid-level management, it may not integrate
information across these functional areas. This would be accomplished by using other types of
specialized information systems.

Applications of Management Information Systems (MIS): Financial, Marketing,


Manufacturing & Human Resources

Management Information Systems are typically organized around the functional areas of an
organization. Learn about some of the most common applications of Management Information
Systems.

MIS Applications
Many organizations are structured based on functional areas. This is often reflected in an
organizational chart. Typically, functional areas include finances, human resources, marketing, etc.
Many of these functional areas have their own Management Information System, or MIS.

Financial MIS
A financial MIS provides financial information for managers to make daily decisions on operations
within the organization. Most systems provide these functions:

Integrate financial information from multiple sources


Provide easy access to financial information in summarized form
Enable financial analysis using easy-to-use tools
Compare historic and current financial activity

A financial MIS often has a number of subsystems, depending on the type of organization. These
include systems to analyze revenues, costs and profits, auditing systems for both internal and
external purposes and systems to manage funds. A financial MIS can also be used to prepare
reports for third parties, such as external auditors or shareholders.

Marketing MIS
A marketing MIS supports activities throughout the many activities of marketing departments. Some
of the typical subsystems of a marketing MIS are marketing research, product development and
delivery, promotion and advertising, product pricing and sales analysis.
One of the most common uses of a marketing MIS is to produce sales reports. These are typically
produced on a regular schedule, such as by week, month and quarter. Reports can be organized by
sales representative, product, customer or geographic area. Such reports allow managers to see
which aspects of sales are doing well and which ones need attention.
Perhaps one sales representative has suddenly experienced a drop in sales by losing one major
customer and needs some support to develop some new leads. If there are only a handful of sales
reps sharing one office, a manager might be able to pick up on this just by talking to everyone.
However, what if a manager has to oversee more than 100 sales reps in 12 different offices around
the nation? A specialized information system that provides regular updates in a meaningful format
will make it a lot easier for the manager to make effective decisions.

Manufacturing MIS
Manufacturing is one of the areas where information systems have made a major impact. A
typicalmanufacturing MIS is used to monitor the flow of materials and products throughout the
organization. In a manufacturing process, raw materials or parts are transformed to finished
products, and a manufacturing MIS is used at every stage. Some of the common subsystems in a
manufacturing MIS include: design and engineering, production scheduling, inventory control,
process control and quality control.

Consider the example of building an airplane. How many different parts do you think there are in an
airplane? One of those commercial jets used by the major airlines easily has over 100,000 parts.
Many of those parts come from suppliers and have to be ordered. Others are made at the
manufacturing plant itself. Now think of the process that is needed to get all those parts at the right
place at the right time. And all those parts have to be carefully inspected before they can be used in
building the plane.
This process requires a very sophisticated system for inventory and process control. The supply of
parts has to be planned carefully so it closely follows the assembly schedule. You can't have boxes
of parts piling up around the plane since it would become very chaotic. And you don't want one
missing part to hold up the entire assembly process either.

Human Resources MIS


A human resources MIS is concerned with managing all the information related to employees of the
organization, including previous, current and potential employees. It is also called a personnel MIS.
This information system supports the many activities of a human resources department, such as
workforce planning, selection and recruiting, training, task assignments and administration of
salaries and benefits.
Consider the example again of building an airplane. How many different specialists are involved in
the design phase, the actual assembly and the testing of the plane? Making sure the right people are
available at the right times requires careful workforce planning. You do not want a lack of skilled
electricians on your team to hold up your entire assembly.

Executive Information Systems (EIS): Upper Management Decision-Making Tools

An Executive Information System is a specialized information system used to support senior-level


decision making. Learn how senior management uses an executive dash board to keep a close eye
on how well their organization is doing.

What Is an EIS?
Let's say you are the Chief Executive Officer of a large company. You have 35 locations in 12
countries with 20,000 employees. How do you keep track of everything that is going on in the
company? In order for you to be an effective leader, what information are you going to need? You
don't have the whole day to read through dozens of reports or listen to a series of presentations.
What you need is an executive information system.
An Executive Information System, or EIS, is a specialized information system used to support
senior-level decision making. An EIS is not only for the CEO but for any senior manager or executive
making strategic decisions to improve the long-term performance of the organization. An EIS is also
referred to as Executive Support Systems, or ESS.
Senior management is responsible for a number of different tasks within an organization, including
defining an overall vision, strategic planning, strategic organizing and staffing, strategic control and
crisis management. An EIS is designed to support these various activities.

Characteristics of an EIS
An EIS is a type of Decision Support System, or DSS, but is unique in a number of ways. First, in
many organizations there may be a number of different DSSs in place to support specific decisions
by individual units. An EIS, on the other hand, combines critical information from all areas within the
organization so senior management gets a complete overview.
Second, a typical DSS is designed for one specific decision. An EIS supports decisions that are
more strategic in nature and long-term. These differences influence what information is being used
and how it is presented.
Consider the example of maintaining an airplane. There are numerous critical parts to an airplane
that have to be carefully inspected after a certain number of flight hours. A DSS could be used to
assist safety inspectors in making sure no critical parts get missed and that any issues that come up
are dealt with appropriately.
Senior management is not specifically interested in the one-time inspection of a single plane. They
are interested, however, in making sure the company has an outstanding safety record, and they
need to know that the inspection program is working effectively. So the safety inspection program as
one unit would be part of an EIS, but the details on individual plane inspections would not.

Executive dashboards typically show KPIs and critical company


information

Executive Dashboards
An EIS typically extracts information from the various information systems used in an organization.
This information needs to be summarized in a meaningful manner. One popular approach to do this
is to use anexecutive dashboard.
The term 'dashboard' is used to indicate the various panels inside a vehicle. While you're driving,
you need to keep your eyes on the road, but your dashboard provides critical information you can
see with a quick glance: driving speed, gear information, fuel level, oil temperature, things like that.
Depending on your vehicle, the dashboard may also include a navigation system, audio system and
more detailed diagnostics for your vehicle.
Now instead of you driving a vehicle, you're a CEO running a company. You need to keep your eyes
on the road, which means you need to focus most of your time on actually running your company.

But once in a while, you glance at your executive dashboard to see how the company is doing, and
you make adjustments accordingly.
You probably get the idea of a dashboard. It should contain the critical information needed to make
decisions, and it needs to be easily understood. It should also not be too detailed. You don't want to
spend too much time trying to figure out what all the information on your dashboard means. The
dashboard should also be free of distractions, so you can focus on strategic decisions.
An executive dashboard typically shows Key Performance Indicators, or KPIs. These indicators
are carefully selected to measure achievement towards a specific objective or to measure the level
of success of specific activities. In the case of the airline company, one of these key performance
indicators could be the company's safety record or some measure of its safety inspection program.
There is no one-size-fits-all for what should go on an executive dashboard. This will vary between
organizations and will also depend on the management style. Some executives may want quite a bit
of detail on the daily operations, while others want to focus primarily on a few selected indicators.

Group Decision Support Systems (GDSS): Improving the GroupDecision-Making Environment

A Group Decision Support System, or GDSS, consists of interactive software that allows for making
decisions by a group of participants. Learn about some of the tools used in a GDSS.

Group Decision Making


Many decisions in an organization require the collaboration and participation of multiple individuals.
For example, consider a company manufacturing electronic consumer products, such as TVs, DVD
players, MP3 players, car stereos, etc. The company is losing market share to the competition. The
company needs to decide whether to keep selling its existing range of products, focus only on its
best-selling products or add new types of products.
This decision requires the input from a number of different units within the organization, such as
marketing, engineering, manufacturing, etc. Let's say the CEO of the company has set up a task
force to develop a recommendation. Each unit in the organization is represented by one of its
managers. How is the task force going to work together to come up with the best decision?
There are a number of ways for the group members to collaborate. They can have meetings to share
information and discuss the decisions that need to be made. If meeting face-to-face is not practical,
they can use a technology, like videoconferencing. They can also communicate with each other by
e-mail to share ideas and provide updates.

In-person meetings allow group members to collaborate, but are not


always feasible

While these approaches can be productive, many decisions in today's world are very complex and
require a lot of different considerations. Having access to the same information can contribute to
better decision making. However, this can quickly become overwhelming, and not all participants
may have the time, skill or interest to analyze all this information. Imagine having to read through
hundreds of pages of a document just to prepare for a meeting.
One strategy not to get bogged down by complexity and information overload is to use computerbased tools for group decision making. A Group Decision Support System, or GDSS, consists of
interactive software that allows for making decisions by a group of participants. The goal of a GDSS
is to improve the productivity of a group to come to a decision. A GDSS is sometimes also referred
to as a 'computerized collaborative work system.'

Characteristics of a GDSS
A GDSS has a number of unique characteristics to support a group of participants in their decisionmaking process:

Special design to support creative thinking, effective communications and decision-making


techniques
Easy-to-use so participants from different backgrounds can all participate effectively
Flexible so it can incorporate the different perspectives and decision-making styles of the
different participants
Automated record keeping for future review and analysis
Parallel communication to allow multiple participants to contribute simultaneously

The most important characteristic, however, is that it provides support for a group to come to a
decision. A number of different approaches can be used.
The Delphi approach is a structured communication technique in which experts answer
questionnaires in several rounds. Participants get to see each other's input after each round and are
encouraged to revise their earlier answers based on replies by others. The underlying assumption is
that this type of communication will lead to a convergence toward a final answer. This approach is
often used when conditions are highly uncertain and the opinion of experts is weighed heavily. A
good example of this would be trying to predict the sales of a particular new product. If there are no
similar products on the market, there may not be a lot of data for analysis.

The group consensus approach forces members to come to a unanimous decision. This is sort of
like locking a team up in a room, and they can't leave before a decision is reached - but the room
could be virtual, and the communications could all be electronic.

Networked computers allow group members to work with documents


at the same time

The nominal group technique gives each participant an equal voice, and the final decision is
reached by voting. Contrary to regular voting, however, the group comes up with a number of
different solutions, and these are ranked by using a voting process. Whatever the specific decisionmaking strategy employed, a GDSS is designed to facilitate this process.

GDSS Tools
A GDSS uses a number of different tools to encourage collaboration and group decisions. These
can include:

Videoconferencing - making it possible for multiple participants to see and talk to each other
in real-time
Group scheduling - allowing participants to share schedules and plan joint activities
Project management software - providing a way to plan for and keep track of group activities
Collaborative electronic workspace - making it possible for participants to work on the same
documents

While these tools can facilitate the decision-making process, many decisions still benefit greatly from
face-to-face meetings. Personal interactions remain an important part of group collaboration.
One approach to make face-to-face meetings more productive is to use a decision room. This is a
type of room that combines face-to-face interactions with technology. Using networked computers
and projectors, multiple participants can interact with the same information. For example, documents
can be shown on the screen and various participants can enter their feedback at the same time.
Specific collaborative software makes it possible to process this feedback into meaningful
information.

Geographic Information System (GIS): Using Maps & Locations


to Make Decisions

A Geographic Information System uses smart maps to describe geographical relationships. Learn
how organizations use spatial analysis to improve decision making.

What Is GIS?
Many decisions made by organizations are related to physical locations. For example, a
supermarket has a physical location and many of its customers will likely live nearby. Knowing the
location of the store and its customers is critical to making decisions. For example, a store manager
may want to know how many of the nearby residents are buying their groceries at competitors a few
blocks away. When distributing flyers to residents, which neighborhoods should be targeted? When
considering opening a new store, what would be the best location?

GIS is known as smart maps because of all the information they can
show.

In order to analyze these physical locations, you need a specialized


A Geographic Information System, or GIS, is a computer-based system
manage, analyze and display the geographical locations and the descriptions
In the case of the supermarket, you are interested in the location of the
competitors as well as the neighborhoods where the customers live.

information system.
to collect, organize,
of objects of interest.
supermarket and its

You've probably used GIS without referring to it by this name. For example, maybe you visited a
different city and you used a website to find the restaurants within walking distance of your hotel.
You typed in the address of your hotel and then searched for 'restaurants.' Up came a map with the
locations of restaurants, and you were able to click on each one to see the type of restaurant and
their reviews. Sounds familiar? How do you think that map was created? You got it - using GIS.
The website you used has access to a database with all the streets and landmarks. When you enter
the address of your hotel, it searches for this address in the database and reports the location as a
pin on a map. This is known as 'geocoding,' or converting addresses to geographic locations. When
you search for nearby restaurants, it pulls up the restaurants from the database that fall within the
same general area. Those locations are also reported on the map and linked to other websites,
which provide descriptive information, such as customer reviews.

How Does GIS Work?


You can think of GIS as 'smart maps.' For example, let's say you are the manager of a supermarket
and you want to examine your competition to come up with an advertising campaign in the local
media. First, you're going to map all the supermarkets in the city. In GIS, these locations are called
features.
Then you're going to add descriptions to those locations. You can label each supermarket by the
chain that it belongs to, so you can analyze your competition. You may also want to add something
about its size and whether it has a pharmacy department. This descriptive information about each
feature is called attributes.
The combination of features and attributes is called a map layer. So your first map layer consists of
supermarkets and their descriptions. The second layer could be the neighborhoods in the city. You
can describe the neighborhoods in terms of demographic information, such as the number of
families, the average family income and the number of children under 10 years old. This information
is useful to describe your potential customers. Your third layer could consist of the roads within the
city. Whether customers drive, walk or bike, they will need to use the roads to get to your store.

Layers such as these can be overlapped to analyze information.

Now that you have your three map layers organized, what is so smart about them? In GIS, you can
overlay these maps and ask questions about their geographic relationships. For example, you may
be interested in knowing how many people of a certain income with young children live within a fivekilometer drive from your store. GIS allows you to compare the maps of supermarkets,
neighborhoods and roads to answer this type of question. In this case, the answer is not only a
number, but also a map of where these families live.
Going one step further, you can also examine how many of those families also live within a fivekilometer drive from a competing store. That could be really useful information to determine which
customers you are really competing over.
Now think back about the last time you went to the supermarket. Did you use a customer loyalty
card? Or did they ask you for your ZIP code? What do you think the store does with all that data?
You guessed it, they map their customers - not exactly where they live but the general
neighborhood. In this way, a store can see where their customers come from. Perhaps many of them
come from relatively far away, so in the analysis of your competitors, you would use ten kilometers
instead of five.

Spatial Data
GIS uses two types of spatial data: vector and raster. Vector uses the locations of features of
interest and their attributes. In the case of supermarkets, the locations are represented by points.
Neighborhoods, on the other hand, are best described by areas instead of a single point location.
These are referred to as 'polygons.' Roads are best described by lines, referred to as 'polylines.'
Points, polylines and polygons represent the three types of vector data used in GIS. Vector data
represents real-world objects using line drawings. Vector is used for anything that has well-defined
boundaries.
The second type of spatial data is raster. For example, instead of a map showing locations, you can
use a photograph taken from a satellite to provide a view from above. These images are a type of
raster data. Raster data represents real-world objects using pixels. Raster is used for phenomena
that change more gradually. In addition to imagery, raster is used for things like elevation,
temperature and vegetation.

An example of a raster data map

Spatial Analysis
The previous example of mapping the locations of supermarkets and analyzing their customers is an
example of spatial analysis. More generally, spatial analysis examines the geographic relationships
between features of interest. There are numerous examples where organizations use spatial
analysis to assist with decision making and to implement more efficient ways of doing business:

A parcel delivery company uses GIS to plan the most efficient route to deliver all the parcels
to the right customers in a timely manner.
A health services organization uses GIS to predict the impact of climate change on the
number of people with malaria in West Africa.
An electricity company uses GIS to plan a new transmission line to connect a proposed wind
energy farm to maintain the electric grid.

Just think of any decision that involves the location of something, and it's no wonder GIS is used by
so many organizations.

Statistical Analysis: Using Data to Find Trends and Examine Relationships


Many different organizations use statistical analysis to describe and analyze data and to predict
future trends. Learn about the different types of statistics in this video lesson.

Making Sense of Data


The amount of data that we as humans generate every day is overwhelming. Consider that every
purchase of any product anywhere is a piece of data. Every phone call is a piece of data. Every post
to social media is a piece of data. Advances in computer systems make it possible to store all this
data.
A CEO of a major technology company recently said that humanity now creates as much data every
day as we did from the dawn of civilization up until the year 2000. That's a ton of data! And the pace
at which we generate the data continues to increase.
How do we make sense of all this data? Let's say you are running a company that makes
accessories for mobile phones, and you sell these to retail stores. You want to know how sales are
doing. One of your managers tells you the sales team made sales to 800 retail stores in January. Do
you want to see 800 different sales reports? No, you want some type of summary. For example, you
may want to know the total of all sales combined and the average value of those sales. Or perhaps
you want to see the 10 largest sales. You can obtain this information using statistical analysis.
Statistics is a field of study within mathematics. It involves the collection, analysis, interpretation
and presentation of data for decision making in organizations. Many different organizations use
statistical analysis to describe and analyze data and to predict future trends.

Descriptive Statistics
There are several types of statistics. The first type is descriptive statistics, which does just what
the term suggests. It describes the existing data, using measures such as average, sum and others.
This is the earlier example of the sales reports. You want to know things like the total value of all
sales combined and the average value of those sales.
Descriptive statistics allow you to summarize large amounts of data. You use these on a regular
basis in everyday life, so they are very intuitive. When you say you are going out for dinner on
average twice per week, you're using descriptive statistics. Or consider your GPA in high school or
college. Your GPA is a measure of your average grade for all your coursework. Descriptive statistics
also looks at variability of data. For example, if your GPA is exactly a 3.0, did you get mostly Bs or
did you get a lot of As and Cs? Both cases result in the same average but represent a very different
academic record.

Inferential Statistics
The second type is inferential statistics, which tries to infer something about the data. In other
words, you are trying to find patterns and relationships in the data. Inferential statistics often involves
statistical testing. For example, let's say you want to increase the sales of your company, which
makes mobile phone accessories. You're selling your products to retail stores across the entire
nation, and you're going to run an advertising campaign on TV, hoping to increase demand for your
products.

This type of advertising is expensive, so you're going to start small and see if it actually works.
You're going to run a TV spot on local channels only within the state of California for two months.
Then you want to see how much the demand for your product has increased. There are 100 retail
stores in California and 700 in the rest of the nation. A simple way to look at this would be to
calculate by how much your sales to the stores in California went up following advertising on TV.
Then you can calculate if the advertising was worth it.
However, you know from experience sales can fluctuate as part of normal business. Sales can go up
or down for any given store in any given market. So if you find that on average the sales in California
went up, how confident can you be in your result? Maybe it was just a fluctuation in the sales and not
actually a real increase due to the advertising.
How can you determine that your advertising dollars were a good investment? Time for inferential
statistics! You're going to do a statistical test to determine how confident you are that there is really a
major difference in sales between California and the rest of country. In this case, you would create
two groups: group one with 100 stores in California and group two with 700 stores in the rest of the
nation. Then you do a test to compare groups. Let's not worry about which test exactly - there are
many different types, each one for different circumstances.
The result of the test would be something like this: We are 95% confident that the monthly sales per
store increased by an average of 10% or more in the three months following the advertising
campaign. Why 95%? Well, in statistics we are never 100% sure because you would never have
enough data to really show this with absolute certainly. So 95% is a good start. With a result like this,
you can calculate whether the investment in advertising paid off.
The results of a test can also be inconclusive. If the sales didn't really go up much, you may not be
able to say anything with confidence about whether sales really increased or not. That is not what
you wanted to hear, but better to know that now than after you have rolled out a multi-million dollar
campaign across the nation.

Predictive Statistics
The third type is predictive statistics, which tries to predict future conditions based on existing
data. Consider an example of predictive statistics you are already familiar with: weather forecasting.
You are planning a hiking trip for the weekend, and on Wednesday, you would like to know what the
weather is going to be like on Saturday and Sunday. You check the weather forecast, and it's going
to be sunny and warm with a very low chance of rain. Meteorologists use historic data and recent
observations of the atmosphere to make this forecast. Can you be 100% sure you won't need a
raincoat? No, but nice and sunny is much more likely.
Let's return to your company making accessories for mobile phones. This is a trendy market, and
you have to stay on top. One of the major phone manufacturers is coming out with a totally cool new
model. You think it's going to do well, and so you've lined up the production of several unique
accessories. However, you still have to decide on the best colors to use. This can be tricky because
you don't want to get stuck with 10,000 pink phone covers. Which colors are going to appeal to the
users of this new model?
One approach would be to look at your own sales data for when similar introductions were made in
the past: different phones, different brands, but targeting the same type of user. So you start
analyzing your data. Which other phones were most similar? Which colors did better? Sleek gray
tones for the business crowd, or splashy yellows and greens for the teenagers? You can develop a
statistical model to predict which colors are going to do better based on your existing data. And then,
you're going to use this model to plan your production. Is the model going to be spot-on accurate?
Most likely not, but it may just give you a competitive edge when the new phone comes out.

Statistical Software
Statistical analysis requires the use of statistical software. Spreadsheet programs include a number
of built-in statistical functions. However, more advanced statistical analysis typically requires
specialized functions.
In order to carry out statistical analysis, you need to organize and manage your data. Statistical
software, therefore, has a number of functions that make it similar to a database management
system, or DBMS. However, when working with very large and complicated databases, it is common
to manage this data using a dedicated DBMS and only export parts of the data for use in statistical
software. Statistical software typically includes all the different types of statistics, including
descriptive, inferential and predictive statistics. It also contains the ability of making graphs as part of
describing your data.
Enterprise Wide Computing- An Introduction
Few years back, computing servers were only used by a company's employees on an
intranet. Today every company seems to be on the Internet. They have an order of
magnitude: customers, suppliers, distributors and any one can access to their web site.
That is, companies have been forced to move from local client/server or mainframe
computing to a new world order of multi-tier computing paradigm. This automatically brings
a new set of challenging issues to be sorted out efficiently. They are reliability, scalability,
security, application development, transaction processing, web interface design and timely
software development. Thus enterprises need robust technologies and tools to develop
enterprise software. Here we have a brief look on what is all about enterprise computing in
the computing arena.
What is Enterprise Computing
Enterprise computing, an umbrella term used mostly to sell business systems
development products, traditionally refers to the mission-critical systems on which a
business depends. It almost always includes a database. The word "enterprise" most
certainly does not communicate or represent a determinate content, an identifiable
meaning, or a describable value. Nowadays almost all the technology product aimed at the
business customer are marketed with the tag - the buzzword "enterprise".
It becomes necessary to understand the word "enterprise" within the context of
enterprise software. The term "enterprise" overshadows the idea of business taken
wholistically. An enterprise solution identifies common problem domains within a business
and provides a shared infrastructure as a solution for those identified problems. Take the
case of running a bank, which has several branches in different places with different
cultures. But these differences in cultures and locations won't come in the way of identifying
the common ground realities, such as accounts and customers. Looking at this business
from an enterprise perspective means abstracting away from irrelevant differences in the
way the individual branches function, and instead approaching the business from their
common things.
Applying this view to design and development of software, an enterprise system
provides the proper abstractions for business concepts that remain constant across a
business so that they may be shared by all the different units within the company. In this
Internet age, enterprise systems even can share the business concepts with vendors, clients
and perspective customers also apart from the company. Thus enterprise solution are in

high demand among business houses in these days. Here comes a list of requirements for a
true enterprise system.
In order to bring out solutions to enterprise problems, an enterprise system must
exhibit certain characteristics. The primary goal of an enterprise system is simply to be able
to represent business concepts to any possible user. The user may be an another
application within the same business, an XML interface for the business clients or even
vendors, or a Web interface for customers. An enterprise system emphasize on providing an
appropriate window for each audience without duplicating the effort required to capture the
rules of business. An enterprise system must therefore meet these following requirements:
Requirements for Enterprise Systems
1. An enterprise system must avoid incorporating proprietary components, that is, it
must be platform- and database-independent. Business should not impose any sort
of technical requirements on vendors, clients and customers. Also it helps to
integrate new components into the system as technology evolves as days go by. It is
not possible to integrate new technological advancements into closed, proprietary
components.
2. An enterprise system must be capable of supporting personalized user experience
that is being made possible in many forms, such as, internationalization, localization,
accessibility, personalization and customization. These requirements become feasible
by designing user interfaces which can display content tailored to the language and
cultural norms of the user interacting with the system. This also means that
developing client side supporting tools will enable users with disabilities to access
software applications. Finally, an enterprise system needs to be able to study the
way users interact with it so that it can better support each user's unique mode of
interaction.
3. An enterprise system must be the authoritative, shared source for the business
concepts it represents. All applications using concepts common across the business
should reference the objects that represent those concepts from the shared system.
This means that any given concept has an authoritative location that is transparent
to the client from which it can be referenced.
Enterprise Systems - Security
An enterprise contains many resources that can be accessed by many types of users.
Sensitive information often has to traverse on unprotected open networks, such as the
Internet. This open environment forces every enterprise to design the relevant security
requirements, specific mechanisms and infrastructure to meet the real threat. Although the
quality assurances and implementation details may vary, all enterprises have to share some
or all of the following characteristics:
1. Authentication - The means by which communicating entities prove to one another
that they are acting on behalf of specific identities.
2. Access Control for sensitive resources - The means by which interactions with vital
resources are limited to collections of users or programs for the purpose of enforcing
integrity, confidentiality, or availability constraints

3. Data Integrity - The means used to prove that information could not have
tampered with by any third part. That is, a recipient of data sent over an open network
must be able to check whether the data gets manipulated on its way.
4. Data Privacy - The means used to ensure that information is made available only
to users who are authorized to access it.
5. Non-repudiation - The means used to prove that a user performed some
transaction such that the user can not deny it later.
6. Auditing - The means used to capture a tamper-resistant record of security
related events for the purpose of being able to evaluate the effectiveness of security policies
and mechanisms.
Enterprise Computing by Java
The J2EE specification introduces the concept of enterprise applications. An
enterprise application contain J2EE modules, which could be web applications, EJBs,
application clients and applets. A J2EE Enterprise archive is packaged as a Java Archive file
with a .ear filename extension.
The database is the heart of any enterprise system. The shared business objects that
make up an enterprise need some way to make sure that they are saved across time. The
database provides that storage mechanism. Any language that is going to claim to be an
enterprise language therefore needs to have strong, reliable and robust database
connectivity. Java fulfills this need by Java Database Connectivity (JDBC). This facility
immensely helps to design and maintain a Web-based back-end database.
Towards enterprise computing, Java is really the only language in widespread use
that can easily be used to build enterprise systems that meets the certain requirements in a
robust and efficient manner. Java is a standards-based language. It has support for
accessibility and internationalization and localization, including a Unicode basic character
type, built into the language. Also Java has both database access and distributed computing
at its core with a number of tested technologies.
Advantages of J2EE Technologies
J2EE makes the Java language to embrace a number of server-side applications,
such as Web-based and e-commerce applications. Apart from all the innovative and pathbreaking features that Java provides, J2EE technologies brings some additional features
most suitable for all enterprise systems.
1. J2EE makes Java a fully-fledged server-side development platform.
2. J2EE has a solid infrastructure that provides a well-tested implementation of many
common applications that need security and messaging facilities.
3. J2EE standardizes development making it easier for companies to commit to J2EE
and share third party code.
4. J2EE provides a solid backend for wireless applications and many wireless companies
use J2EE on the server for this purpose.
5. Java is the primary language for designing many exciting application servers of today
and hence e-commerce applications fully utilize the guaranteed services of Java.

6. The use of Java as a development language and architecture for Enterprise


Application Integration (EAI) is widespread.
At this time, JDBC seems to be filling the enterprise space more than the Web space.
That trend will most likely continue as the future brings a Web-enabled, existing corporate
database. In many respects, JDBC is bringing the traditional, complex multi-tiered world of
Web-enablement back to the EAI problem domain.

Object Oriented Analysis & Design


What is OOAD?

Object-oriented analysis and design (OOAD) is a software engineering approach that models a
system as a group of interacting objects. Each object represents some entity of interest in the
system being modeled, and is characterized by its class, its state (data elements), and its behavior.
Various models can be created to show the static structure, dynamic behavior, and run-time
deployment of these collaborating objects. There are a number of different notations for representing
these models, such as the Unified Modeling Language (UML).
Object-oriented analysis (OOA) applies object-modelling techniques to analyze the functional
requirements for a system. Object-oriented design (OOD) elaborates the analysis models to produce
implementation specifications. OOA focuses on what the system does, OOD on how the system
does it.
Object-oriented systems
An object-oriented system is composed of objects. The behavior of the system results from the
collaboration of those objects. Collaboration between objects involves them sending messages to
each other. Sending a message differs from calling a function in that when a target object receives a
message, it itself decides what function to carry out to service that message. The same message
may be implemented by many different functions, the one selected depending on the state of the
target object.
The implementation of "message sending" varies depending on the architecture of the system being
modeled, and the location of the objects being communicated with.

Object-oriented analysis
Object-oriented analysis (OOA) looks at the problem domain, with the aim of producing a conceptual
model of the information that exists in the area being analyzed. Analysis models do not consider any
implementation constraints that might exist, such as concurrency, distribution, persistence, or how
the system is to be built. Implementation constraints are dealt during object-oriented design (OOD).
Analysis is done before the Design
The sources for the analysis can be a written requirements statement, a formal vision document,
interviews with stakeholders or other interested parties. A system may be divided into multiple
domains, representing different business, technological, or other areas of interest, each of which are
analyzed separately.

The result of object-oriented analysis is a description of what the system is functionally required to
do, in the form of a conceptual model. That will typically be presented as a set of use cases, one or
more UML class diagrams, and a number of interaction diagrams. It may also include some kind of
user interface mock-up. The purpose of object oriented analysis is to develop a model that describes
computer software as it works to satisfy a set of customer defined requirements.

Object-oriented design
Object-oriented design (OOD) transforms the conceptual model produced in object-oriented analysis
to take account of the constraints imposed by the chosen architecture and any non-functional
technological or environmental constraints, such as transaction throughput, response time, runtime platform, development environment, or programming language.
The concepts in the analysis model are mapped onto implementation classes and interfaces. The
result is a model of the solution domain, a detailed description of how the system is to be built.

Вам также может понравиться