Professional Documents
Culture Documents
2
2
2
4
5
6
the functions performed within the communication systems in passing messages between source
and destination, including:
examples of communication systems
transmitting and receiving in communication systems
communication protocols, including:
strategies for error detection and error correction
network topologies, including:
functions performed by the following hardware components used in communication systems:
other information processes in communication systems
issues related to communication systems
7
7
9
10
11
11
12
13
14
14
15
16
16
17
17
19
19
20
21
30
30
32
32
33
35
21
23
25
27
28
Key
Advantages // disadvantages
interviewing/surveying participants
Participants in existing systems will have an understanding of the part of the system
they work in. They can identify problems, ideas to solve it and provide details on the
info processes occurring.
Planning
Designing
context diagrams
decision trees
Diagrammatic way of representing all possible
combinations of decisions (branches) and their resulting
actions. The actions are listed right of the branches.
decision tables
decision tables represent all possible conditions and the
actions that will result. The table is divided vertically into
conditions and actions, and horizontally into the rules that are
based on combinations of the conditions.
data dictionaries
Data Dictionaries contain a comprehensive description of each
field in the database. This commonly includes field name,
number of characters (field width), data type, data format (the number of decimal
places), a description of the purpose of each field and an example.
Storyboards
Storyboards are the tools used for designing the user interface provided by the
system. They document the layout of elements found on each screen as well as the
links between screens. The representation of each interface should be detailed
enough for the reader to identify the purpose, contents and design elements.
Implementing
Parallel conversion The old system and the new system operate side
by side until the new system has proven to be satisfactory. This is the
safest method but is costlier. It allows the participant and users to get
used to the new system and to check its output. However, it created
duplications of data, additional workload for staff and all staff need to be
trained before implementation. Data can be protected while both systems
are running at the same time, as it is easy to return to the old system if
Direct conversion The existing system is fully discarded and the new
system over completely over a very short period of time (such as a
weekend). This method is used when the system is fairly standard, when
implementation time is minimal or when it is not possible for both systems
to operate at the same time. Neither system works during the conversion
stage, so it is done at a quiet tome. Participants must be fully trained
before conversion. The old system can not be used easily as a back and so
Pilot conversion One part of the new is introduced for a small number
of users. These users learn to use the system and evaluate it. If there are
no problems the system is implemented across the whole organisation. If
the new system fails, only a small part of the organisation is affected. This
method can be used as the final acceptance testing of the system.
How the system will be tested - Is sample data available? Hardware, software
and the overall running of the system should be tested.
Conversion of data for the new system - Is there data currently available
that the new system needs to run? How long will data conversion take? How
accurately can data be converted? Will the existing system remain operational?
Volume data - Volume data is test designed to ensure the system can process
large amounts of data. A query in a database may have to process millions of
records
Simulated data Simulated data aims to test the performance of the system
under simulated conditions such as performing different tasks at the same time
or the system having to respond to a large number of request.
Live data Live data is the actual data processed by operating system. Live
testing takes place once the system has been installed to ensure it is operating
as expected.
compare the new system to the old and evaluate whether the requirements have been
met
communication systems as being those systems which enable users to send and receive
data and information
the framework in which communication systems function, demonstrated by the following
model
the functions performed within the communication systems in passing messages between
source and destination, including:
Message Creation
The message is compiled at the source in preparation for sending. This
takes place using the software.
Organisation of packets at the interface between source and
transmitter
As the message descends the layers of protocols, it is wrapped with a
header and trailer, which contains data relevant to the protocol (address
and error checking). There will be multiple independent headers and
trailers.
Signal generation by the transmitter
The transmitter is the physical hardware the encodes the data onto the
medium creating the signal.
The transmitter represents individual bits as a wave (which is determined
by the rule of the TL protocol).
Transmitters and receivers are contained in the same hardware device.
Hardware is controlled by protocols at the transmission level.
Transmission
Transmission occurs as the signal travels through the medium. Each bit or
pattern bits move from the sender to the receiver as a particular
waveform.
Synchronising the exchange
Common clocks are used to sync the exchange to ensure that each
waveform (data packet) is detected by the receiver. The receiver is able to
decode the signals whilst the transmitter keeps sending it. Two preambles
are used to help sync the clocks.
Addressing and routing
Data packets (forming a single file) pass through many different links. For
each communication link, each packet will ascend its protocol level until it
reaches the addressing and routing of protocol and then descend the level
as it is prepared for transmission down the next path.
Error detection and correction
As messages descend the levels prior transmission; many protocols
calculate checksums or CRC values and include them in the headers and
trailers. The receiver recalculates the value for data detection.
Security and management Many protocols restrict messages based on user
names and passwords and others encrypt messages during transmission.
teleconferencing systems
A multi-location, multi-person, synchronous meeting where audio, video and/or
other is communicated in real time to all participants.
Purpose
To exchange info among several people in multiple locations using I.T.
(internet).
Participants
Business people, educators, students
Data/Information
Video, text (numeric), audio and graphics
Information Technology
Computer, video camera, microphone (headset), speakers, Internet
connection, large monitors/data projectors, web conference software,
teleconferencing server.
Transmitting and receiving data
Raw video is collected and fed, in real time, through a software-based
codec. The video is compressed, transmitted to Chat and Video server
(determines transmission speed, frame rate and resolution). Video is
transmitted as data packets, which is then decompressed and displayed.
Advantages of Teleconferencing
Systems
Simulates face to face meeting
without the required
Disadvantages of
Teleconferencing Systems
Requires high-speed data
connection for anything more
Both customers and merchants are charged each transaction. Merchants are in
charge of filling ATMs with cash.
Electronic (Internet) banking Internet backing allows customers to pay bills,
check account history and back balance information and transfer money
between accounts from work, home or wherever they can access the internet.
Most banks and financial institutions encourage customers to use internet
banking. To access Internet banking the customer must be connected to the
Internet and have a username and password form the financial institution.
Advantages include; always available, reduction of time and cost
Disadvantages include; not available for computer illiterate people or
without computers; phishing, malicious software to record key stroke;
identity theft
10
11
Token Ring. A token, which is a special bit pattern, travel around the
nodes or a ring topology comprising a local area network. To send a
message, a computer catches the token as It passes by, attaches a
message to it and then lets it continue to travel around the network.
When the message has been delivered to its destination, the token is then
passed to the next device in the network. No collisions occur using token
passing.
Ethernet. Ethernet operates at the transmission level. It is built into the
hardware devices or NICs used to transmit and receive. Ethernet uses a
system called CSMA/CD (Carrier Sense Multiple Access with Collision
Detection) to deal with collisions when messages are sent at the same
time. If two nodes attempt to transmit at the same time, a collision
occurred. This collision is detected by all participating nodes. After a
random time, interval, the node will try to resubmit the message. If
collisions continue to occur, the time intervals will gradually be increased
until the message is successfully transmitted.
strategies for error detection and error correction
Parity Checking.
Parity bits are single bits added after the data so the total number of 1s is either
even or odd. During handshaking, even or odd is decided. It is used for
asynchronous transmission. Errors with corruption of even number of 1s are
undetectable.
(or you could go more complicated )
Seven bits represent the normal ASCII character set when an eight-bit byte is
used in a computer. The eighth bit can be used to check whether that byte has
been received correctly by using the concept of parity. It works as follows
The originating computer counts the number of 1s in each transmitted
byte and determines whether there is an odd or even number
The eighth bit in the byte is then used to produce a byte with an even
number of 1s if even parity is set or with an off number of 1s if odd parity
is set in the protocol governing the particular communication session.
During handshaking the sender and receiver decided whether odd or even
parity will be used. If any single bit is corrupted during transmission, then the
receiver will detect the error. Problems with parity checking include the
following:
It can detect one error but assumes all is well even if there are two errors
or a multiple of two errors in the one byte.
If two bits flip value, then the parity check will not alert the receiver.
Any byte with an even number of errors will slip through.
Checksum.
Checksum is the count of the number of bits in a data packet that is included at
the end of the packet to allow the receiver to determine whether the packet is
erroneous or not. The accuracy depends on the length of the data packet and
length of checksum. It cant detect area of the error.
(or you could go more complicated )
A checksum can be created during data transmission to detect errors. In this
process the numeric value of all the bytes are added as if they were integers.
The resulting sum will be sent as a binary integer along with the message in the
header or trailer. The receiver also calculates a checksum value and if the sent
value does not agree, then an error is detected. The position of the error is not
known, however.
Problems with checksum include the following
If even numbers of bits flip value, then the error will not be detected.
An error will not be detected if the message package is corrupted in such a
way that the checksum remains the same.
12
Cyclic Redundancy Check. CRC are performed at the transmission level. The
CRC values are performed by the hardware. Both checksums and the CRC values
are included in the header or trailer of the message packet. CRC values are
calculated using division. This technique works as follows:
The checksum number is substituted into a formula and a sixteen-bit or
thirty-two-bit remainder is calculated.
Once the data has reached its destination the received checksum is put
through the same process.
If the remainder produced is identical to the one received then the data
has been correctly received, otherwise a retransmission is requested. This
process gives the receiving computer the ability to check that the
checksum has also been received correctly.
CRCs are able to detect most of the common types of transmission errors.
Star Topology
- All nodes connect to a hub (usually a switch) via their own
cable. For wireless LANs, a WAP (Wireless Access Point) is
used.
- Nodes dis/connected without affecting other nodes; Issues
more easily identified // More cabling required; if a fault
occurs at the hub, the network is down.
Bus Topology
- A bus topology (as shown below) is one of the simplest
designs in networking. A common cable, called a bus,
connects all the nodes in bus topology. All nodes on the
network receive data transmitted on a bus network, but
only the node to which it is addressed accepts and
processes the data.
- Less cabling, easier to implement // Cant
accommodate lots of nodes; Break in the backbone disables the whole network;
Collusions can occur when data is sent simultaneously.
Ring Topology
A ring topology network (as shown below) consists of a
number of nodes connected to a closed loop, so that
each of the stations on the network is physically
connected to two other stations. A node may be a
single computer or a device used to attach many
computers to a common ring. Data packets circulate
the ring in one direction. Each node receives data from
one node and transmits it to the next node. If the cable
is broken at any point, then the entire network is disabled.
No data collusion, cheaper without needing a hub // If a cable is broken, a node is off
or added/removed, the network is disabled.
Hybrid Topology
One transmission between any two nodes with bus as
backbone for stars (usually)
Used when different types of networks are required //
expensive, errors are more difficult to detect
wireless networks
Wireless networks use radio or microwaves, not cables.
13
Modems
Modems are used to connect a computer to their local ISP to provide internet access
to a household or network. It connects through USB, Ethernet or wireless
connections to the computer.
bridges and gateways
Bridges are used to connect two LANs together in a simple network topology which
use the same protocol to communicate.
Gateways provide the ability for one protocol to talk to a different one (protocol
conversion). They are more complex than bridges and will translate data in one
protocol to another protocol for transmission.
Network Interface Cards (NIC)
It is a small chip on the motherboard that allows for wireless/wired network. It
breaks down communication into binary and reassembles binary into more complex
data.
mobile phones
It uses radio waves to T&R data to and from the base station in each cell. They
provide portable access to text and video messaging, e-commerce and social
networking sites
cables
Transmission medium made of copper or fibre optic glass. They use EM or light
pulses, respectively to transmit 1s and 0s from a transmitter to a receiver
wireless access points
A central node (hub) to connect wireless nodes to a wireless LAN. It sends and
receives data to all wireless nodes and requires encryption for security. The WAP
must be physically connected to the LAN to allow wireless nodes to access wired
nodes on the network.
Devices can be added without cabling // small range for wireless signal, suffers
interference from bad weather
bluetooth devices
For short-range transmission, replacing cables that connect portable devices. It is
available in mobile phones, PDAs, computers, etc. The physical distance between
14
Bluetooth devices depend on the power of the transmitter in each device. Error
checking is present in each data packet.
other information processes in communication systems
collecting, such as
processing, including:
Routing
- Selecting paths in a network along which network traffic is sent. It is performed for
many kinds of networks and maintains no permanent link. This improves security
and is more efficient
security
Issue of the expanding internet
Globalization
Large companies can take advantage, moving forward, while smaller companies
may not be able to take advantage of this process.
interpersonal relationships
Due to electronic communication, misunderstandings may arise.
e-crime
15
legal
the Roads and Traffic Authority holding information on automobiles and holders
of drivers licence
- Environment: New South Wales; vehicle owners, government (NSW department of
transport), police and courts.
- Purpose: To manage registration of all drivers and motor vehicles in NSW. To provide
information to drivers/applicants on matters such as licensing, vehicle registration, etc.
as well as statistical information to government and other authorities.
- Data/information: Drivers details (contact, payment, driving history, license
information), vehicle details (registration numbers, make of car, etc.)
16
Organisatio
nal Method
Manual
Computerbased
Advantages
Disadvantages
telephone books
- Subscribers surnames are sorted alphabetically. Searching for the persons name
retrieves their phone number
flat-file systems
17
Hypermedia
- A combination of media whose locations are linked electronically to provide an easy
way to navigate between the documents. It is used a lot on the internet.
Hypermedia-based data organising systems are not as simple to create as flat file
databases and generally have limited data processing capabilities. Hypertext is a
system that allows documents to be cross-linked in such a way that the user can
move from one document to another by clicking on a text link. The author of the
hypertext must specify the location of the information accessed by each link. If
another computer is the destination of the link, that computer is called a node
- Data is easily exchanged between applications and over network, much faster
processing, can be easily edited, large storage of data is possible, can be accessed
by many at one time if required // Expensive hardware and software have to be
purchased, vulnerable to viruses and hackers, staff need to be trained to use it
the logical organisation of flat-file databases, including:
A file is a block of data
A record is a collection of facts about one specific entry in a database
A field is a specific category of data in a database. A key field is a field
that uniquely identifies a specific record. Every record must use the same
field as its key field and no two key fields can contain identical data.
A character is the smallest unit of data that people can use
18
create a schematic diagram for a scenario where the data is to be organised into a
relational database
19
choose and justify the most appropriate type of database, flat-file or relational, to organise
a given set of data
databases, including:
20
Second Normal Form (2NF). No field values can be derived (got) from
another field. Eg if have DOB dont need year of birth.
Third Normal Form (3NF). Each non-keyfield should be a direct description
of the primary key field. You must place any fields that do not relate
directly to the primary key into another table. This will avoid the repetition
of data.
Hypermedia is a combination of
media whose locations are linked
electronically to provide an easy way
to navigate between the information.
Hypertext is a system that allows
documents to be cross-linked in such
a way that the user can move from
one document to another by clicking
on a link
21
Logical Operators are used to combine queries so that a search is carried out on
one ore more fields. AND requires both to be true, OR requires either the first or
second query to be true.
Logical
AND
Both expressions must be true
A AND B
OR
At least one expression must be
A OR B
true
NOT
All expressions must be false
A NOT B
displaying
22
23
retail companies can find customers with common interests and habits,
thus increasing potential marketing strategies.
(Online Analytical Processing) OLAP
Online analytical processing is a technique for providing business decision
makers with statistical evidence, largely based on past trends, upon which
they can make intelligent decisions. OLAP aims to provide this critical
information visually, online, as needed and as quickly as possible. OLAP
tools organise and combine multiple databases into multidimensional
structures known as data cubes (however, it may have more than 3
dimensions).
(Online Transaction Processing) OLTP
Databases that allow transactions to be processed immediately by remote
users are known as online transaction processing systems. Completing an
online purchase over the Internet is a common example of a transaction
performed by an OLTP system. Such transactions must occur in close to
real time. OLTP commonly involves many different database systems
communicating to complete a single transaction. E.g. Internet purchase
involves about 2 banks plus maybe PayPal as well as the sellers system.
Many OLTP systems include transaction monitoring software, whose
central task is to direct, manage and control operation as they are
performed by the various systems involved in each transaction.
a transaction
a series of events important to an organisation that involve a request, an
acknowledgement, an action and an outcome
Either complete success or complete failure (leading to rollback)
Ensure events occur successfully events send response to show success or
failure to determine whether to commit or rollback. The events then send
acknowledgement of performing request
purpose
- An information system that collects, stores, modifies & retrieves the transactions of
organisations
data
- The type of data (stock numbers, prince in currency, PIN) and the range of
acceptable data input for normal transactions.
- Stored in DBs & transformed into info through info processes. Possible integrity issue
resolved by transaction log. Additional data used to record details of each
transaction
information technology
- Hardware (such as server machines, storage & communication devices, transmission
media, backup devices, client apps and collection devices) and software (DBMS
software (& log), client apps (interface for participants in client-server network),
proprietary software apps, transaction processing monitors) need to work together
to be both reliable and accurate.
Processes
- Determined as either batch or real-time, a range of processes may be performed on
the data (stock control, register cash total etc.)
Participants
- People who perform the transaction processing within the business (those who
restock shelves, checkout).
24
batch transaction processing the collection and storage of data for processing
at a scheduled time or when there is sufficient data
Involves the collection and storage of data (such as
the details associate with a person buying a
toaster from a store) for processing at a scheduled
time or when sufficient data has accumulated.
Many TPS operate as batch systems, since
immune processing is either not feasible or simply
not required.
25
web-based
Reservation systems
These are used in many businesses to put
aside a service or product for a customer.
The process is as follows;
1. Collect and store details of required
service
2. Confirm availability of service and
temporarily reserve service
3. Collect and store customer details
4. Collect payment details as required
5. Process and store payment as required
6. If successful then commit reservation
permanently
7. Create and display confirmation to a customer.
non web-based
Point of Sales
POS terminals are used by retail stores to sell goods
and services. In large retail organisations, POS
terminals send inventory data to a
central computer when the sale is
made. The central computer is
usually a mainframe or mid-range
computer that does the processing
for the entire chain. If the POS
terminal immediately processes the
transaction data, it minimises the costs of batch handling. To accomplish
this centralised processing of the transaction data, the data is converted
to a form that can be easily transmitted through a communication system.
Library Loans
A library loan system is used to keep track of items borrowed from the library. When a person
borrows a book, the librarian scans the barcode on the persons member-ship card and the
barcode on the book. This information and the date are immediately recorded on the library
database. The library loan system completes each transaction in real time.
26
systems that appear real time, responding as the transactions occur, but where
the actual updating is batch processed, such as credit card transactions
Credit card transactions (real time)
Done at EFTPOS terminals. The retailer sends the credit slips to the bank in
a group and does not send each credit slip individually. Similarly, the POS
credit card sales transactions are not processed immediately but are
stored for later processing. In either case, credit card sales transactions
are processed as a batch.
All credit card transactions involve at least 4 significant parties;
Customers who are card holders, merchants who are generally retailers,
card issuers who manage the customer side of transactions and
acquirers who manage the merchant side of transactions.
General sequence of events that occurs to process credit card
transactions.
1. Customer gives merchant permission to access credit in their
account to pay for goods or services. For card present transactions
handing over the card and signing verify that permission has been
given. For card not present transactions, such as telephone and
mail order, the verbal or written order are sufficient verification
27
28
off-site storage
- Offsite refers to a location which is physically separated from the
main
system, and hence, off-site storage is storage of data on magnetic disks or
Removable hard disks at an Employee house etc.
recovery testing
Recovery testing is the process of testing a backup after is has been made by
restoring files into a temporary directory
29
Mirroring
Writing data to two drives simultaneously (100% redundancy) & allows for fast
recovery (hot swapping). Fault tolerance, but doesnt protect from total system
failure
Rollback
- A roll back is the process of converting the current system back to its old system, or
going from a son backup and loading a father.
updating in batch systems (no considerable user interaction):
historical significance
- Paper record systems were collected in batch and transactions were updated on a
fixed basis.
- When punched cards/tape was only available, updating was considerably timely and
expensive
technology required
- Hardware includes large storage capacity media (must be sequential)
- Software does not have to allow for online work or a simple user interface as only
well trained and experienced participants use it.
30
suitable applications
- Paper-based collection, off-line systems, bulk generation
updating in on-line real time systems:
technology required
- Hardware includes large storage capacity media (must be direct access so response
time is very quick
- Software must enable online work for multiple simultaneous use (provide access to
an online database)
- Software must include a user friendly interface as many participants will use it
suitable applications
- high demand for TP as hardware & software expensive, on-line & web-based apps
31
data security
- Data security protects a systems data against accidental or deliberate damage
Passwords and biometric methods (fingerprints etc)
Encryption
Firewalls
data integrity
Data integrity is the reliability of data, it involves accuracy, currency and relevance
of the data
In real time transaction processing, data integrity is achieved when the ACID test is
passed;
Atomicity occurs when all of the steps involved in a transaction are
completed successfully as a group. If any step fails, no other step should
be completed. If the first step succeeds, then the second step must
succeed; otherwise, the entire transaction is abandoned. If some
operations succeed and others fail, there is no atomicity
Consistency occurs when a transaction successfully transforms the
system and the database from one valid state to another. Consistency in a
TPS stems from the correct application programming, such as always
debiting and crediting the same amount.
Isolation occurs if a transaction is processed concurrently with other
transactions and still behaves as if it were the only transaction executing
the system. Transactions must not interfere with each others database
updates
Durability occurs if all the changes that a transaction makes to the
database become permanent when the transaction is committed.
data quality
How reliable & effective data is to an organisation.
Issues when survey not completed truthfully or trying to combine data from different
systems.
- Effectiveness of info in data mining & OLAP reduced
control in transaction processing and the implications it has for participants in
the system
Controlling transaction processing starts with collecting and includes the way the TPS
manipulates the data and the way errors are corrected.
People should not become completely dependent on a TPS. They need to maintain
control over their organisations operations
32
Due to the immense volume of data errors are caused, and if no control measures
are taken these errors will be unnoticed and have dire effects on the transaction, the
transaction system and the organisation.
current and emerging trends in transaction processing
o Data Warehousing
the collection and storage of large amounts of data from a range of sources,
in order to support the future decisions of management. This data is often
historic (business data from the previous years, for example) and is organised
into a data warehouse. A data warehouse is a large separate combined copy
of different databases used by an organisation. It includes historical data,
which is used to analyse the activities of the organisation.
o Data Mining - the process of discovering non-obvious patterns within large
collections of data
This is a process of integrating large amounts of data, and by using
specialised software, attempts to find hidden patterns in warehouse data.
These previously unknown relationships among the data can be used to guide
decision making and predict future behaviour patterns for example, retail
companies can find customers with common interests and habits, thus
increasing potential marketing strategies.
o (Online Analytical Processing) OLAP
Online analytical processing is a technique for providing business decision
makers with statistical evidence, largely based on past trends, upon which
they can make intelligent decisions. OLAP aims to provide this critical
information visually, online, as needed and as quickly as possible. OLAP tools
organise and combine multiple databases into multidimensional structures
known as data cubes (however, it may have more than 3 dimensions).
o (Online Transaction Processing) OLTP
Databases that allow transactions to be processed immediately by remote
users are known as online transaction processing systems. Completing an
online purchase over the Internet is a common example of a transaction
performed by an OLTP system. Such transactions must occur in close to real
time. OLTP commonly involves many different database systems
communicating to complete a single transaction. E.g. Internet purchase
involves about 2 banks plus maybe PayPal as well as the sellers system.
Many OLTP systems include transaction monitoring software, whose central
task is to direct, manage and control operation as they are performed by the
various systems involved in each transaction.
33
34
books or other printed media normally bring with them the authority and
credibility of the author, thus a well-known and credentialed author will
generally produce authoritative and accepted documents. However, a
multimedia work will often have a number of contributors, may not have
an editor to supervisor, thus no single author will engender the same
degree of authority over the work
the demands placed on hardware by multimedia systems, including:
- primary and secondary storage requirements as a result of
bit depth and the representation of colour
Bit
Num Relations
data
Dep ber
hip
Increased bit depth will improve
th
Of
colour and image quality at the
Tones
expense of increased storage
1
2
21 = 2
requirements
sampling rates of audio data
2
4
22 = 4
3File Size
8 (Image)
23 = 8
Increased sampling rates will
Horizontal*Vertical*Bit Depth
improve audio quality at the
expense of increased storage
8*1024 (1kb)
requirements
e.g.
- processing as a result of:
600*400*1
= 31.25kb
video data and frame rates
8*1024
Higher frame rates will improve
video quality at the expense of
increased processing power
File Size (Audio)
requirements
(SampleRate* SampleSize*Time)*2
File size is calculated by multiplying
e.g.
the frame rate by the time in
(44000*16*180)*2
seconds, then multiplying that
= 254 016 000 bits
value by the #le size of each frame
= 31 752 000 bytes (divide by 8)
image processing, including morphing
= 30.28 Mb (divide by 1 Mil)
and distorting
Image processing can adjust images to suit a certain need but will
require significant processing power to do so
animation processing, including tweening
Animation processing can create animated video but will require
significant processing power to do so
Tweening will require even more power, as it is a more advanced
method that will place more stress on processing
- display devices as a result of:
pixels and resolution
Display devices with a sufficient pixel resolution are required to
view images and video correctly and in high quality
the variety of fields of expertise required in the development of multimedia
applications, including:
- content providers
people who provide the material for the multimedia product
- system designers and project managers
System designers
Identify purpose of the system, decide feasibility, determine
hardware and software and overall design
Leadership skills needed
Project managers
Develop the project plan and ensure it is followed on time and on
budget
Communication and negotiation skills needed
35
those skilled in the collection and editing of each of the media types
Text writers selected on ability and knowledge of subject matter
Graphics illustrators and animators who use software to create figures
Audio need technical skills to mix different digital audio clips and
creativity to create sound effects
Video camera operator, sound engineer, actors and director (who
approves set design, costumes, camera angles, lighting, editing)
those skilled in design and layout
Graphic designers improve the readability of multimedia by organising
layout of screen, adjusting colour and size.
those with technical skills to support the use of the information technology being
used
Ensure the final system will operate correctly on user screens
Tasks include;
Limiting the size of the multimedia product to the total size of CDROM
Coding of interactive elements of presentation
Copy protection and product registration to reduce likelihood of
illegal copies being made
36
such as digital cameras and camcorders (better quality images and video
capturing)
- increases in processing power of CPUs
Increased CPU processing power allows media to be rendered more
quickly and allows for viewing of higher quality media
- improved resolution of displays
so displays are more realistic and of higher quality
- new codecs for handling compression of media while improving quality.
New codecs decrease file sizes through compression of media and provide
a lower level of data loss in doing so, maintaining or increasing the quality
of the media output
Displaying In Multimedia Systems
hardware for creating and displaying multimedia
- screens including;
CRT (Cathode Ray Tubes) displays
Beam of electrons glow on phosphor coated screen to create image
In decline because of new screens that are lighter in weight, use
less desk space and have higher resolution
LCD (Liquid Crystal Display) displays
Electric current changes position of liquid crystals, creating the
image
Plasma displays
Heated gases emit U.V. light which glows on phosphor coated
screen to create image
Used for large advertising displays and home theatre
Touch screens
Sensor panel detects electrical disturbances to determine where
touch occurred
Used in ATMs, game consoles, tablet PC, information kiosk
Good for public areas mouse and keyboard not damaged
LCD screens can be converted into touch screens
- digital projection devices
Halogen light globe projects image onto screen
Either through a transparent image and then a lens (used in
homes)
Or reflects light of a smaller image and then lens (cinemas)
- speakers, sound systems
Analog device converting alternating current into sound waves (electrical
to sound)
The electromagnet vibrates rapidly back-and-forth, in turn making the
speaker cone vibrate, compressing the air, creating sound waves
- CD, DVD and video tape players
Stores digital data on spiral track composed of pits and lands
CDs have a single track; DVDs have more densely packed tracks
Read head generates laser beam which is reflected as fluctuations from
the pits on the spinning disk. A sensor translates this into an electrical
signal, representing the stored sequence of bits.
DVDs can be double sided and dual layered = large storage capacity =
ideal for distributing multimedia
Quality of CD and DVD data is maintained after copying
Video Tape Players stores analog data on long strip of magnetic tape
wound on reels. Quality reduces after copying
- Head-up displays and head-sets
37
Hierarchical
Top-down design that categorises pages
non-linear
Allows users to connect from the homepage to a series of linked
pages which then further connect to a number of
other pages
a combination of these
Combines aspects of two or more common types of
structures
38
39
40