You are on page 1of 21

Unit-1

Define Information System? Explain how information helps in decision 20. Define MIS. Explain various functions of MIS.
making.?
Definition of MIS
Ans: MIS is an integrated system which collects, maintains, correlates and
selectively displays information to meet the specific needs of the various
levels of management. It helps in making decisions and taking actions
BASIC CONCEPT OF INFORMATION
for fulfilling the objectives of an organization.
Information is a processed form of data. According to Davis and Olson,
According to Schwartz, 'MIS is a system of people, equipment,
'Information is data that has been processed into a form that is
procedures, documents and communication that collects, validates,
meaningful to the recipient and is of real or perceived value in current
operates on transformers, stores, retrieves, and present data for use in
or prospective actions or decisions.'
planning, budgeting, accounting, controlling and other management
Types of Information
process.
Different types of information are used in performing different functions
Goals of MIS
of an organization. Based on the use and purpose of information,
Various goals of MIS in an organization are:
information can be broadly categorized into the following types:
 To provide information to managerial end-users to support
 Strategic information
their day-to-day decision-making needs
 Tactical information
 To produce reports for specific time periods designed for
 Operational information
managers responsible for specific functions in an
Different levels of management such as top, middle and lower use
organization.
different types of information. For example, top management uses
 To provide correct information to the concerned manager at
strategic information, whereas lower management uses operational
the right time
information.
 To help in carrying out regular and routine operations
Strategic information: Strategic information helps the top management
 To control, organize and plan better business operations
to devise the strategies that need to be implemented in an organization.
Significance of MIS
The strategic information is vital for decision making in an organization
and generally used for long-term planning. The significance of a planned, analyzed, designed and maintained MIS is
as follows:
For example, the top management of an organization needs strategic
information to plan for adopting new technologies for increasing the  Provides timely, useful and reliable information that helps in
production in an organization. the progress and growth of the business and management
Tactical information: Tactical information helps the middle-level infrastructure in a situation of increased business
management to devise the strategies that need to be implemented in an complexities.
organization. Tactical information is vital for making control-related  Supports the business processes and operations of the
decisions in an organization. This information is generally obtained from organization that help in globalization and liberalization of
the records of the day-to-day activities in an organization. the organizations and enables the organization to compete
For example, the regional sales manager of an enterprise needs to both locally and globally.
forecast the future sales of the products on the basis of sales records of  Provides Management Information (MI) at various stages of
past three-four years. In such cases, the daily records maintained by an decision making in an organization that helps assist the
organization are the basis of collecting tactical information. Information decision makers to take decision in an organization.
obtained from external sources such as competitor records also has a
deep impact on tactical information. Limitations of MIS
Operational information: Operational information helps the lower-level When the organization decides to implement an MIS, the following
management to devise the strategies that need to be implemented in an problems directly affect and limit an MIS:
organization. Operational information is vital for making decisions  Organizational framework: MIS does not help to achieve the
required on a day-to-day basis and used for short-term planning. goal without a good planning and control within the
Operational information generally consists of work status, customer framework of an organizational structure.
orders and stocks in hand related information.  Generation of information: The information is the raw
material of decision making for MIS and if information is not
being generated, disseminated and used for management,
then no system manual or computer is going to solve the
organizational problems.
 Managerial participation: The most striking characteristic of
the successful company is that the development of MIS has
been viewed as a responsibility of the management.

Elements of MIS
The Elements of MIS are
 Management is defined as the process of achieving the
business objectives of an organization by making the best
decisions that involve optimized combination of manpower,
resources and working environment of the organization. The
key person involved in the management of an organization is
the manager. The various activities performed by a manager
are:
o Planning:
o Organizing
o Staffing
o Directing
o Controlling:
o Information

 Information is the processed data that are provided to the


decision makers or managers to aid them in their project. The
various types of information in an organization can be:
o Structured
o Unstructured The structure of MIS can be described by using the following
o External approaches:
o Internal  Physical components
 Information processing functions
 System: The system in MIS is defined as a set of elements  Levels of management activities
that are joined together toachieve a common objective.  Decision support
These elements are interrelated and interdependent. A
system has three elements, namely, inputs, process and  Physical Components:The various physical components used
output. in an information system are:
o Hardware: Hardware refers to the components of an
Characteristics of MIS information system that includes the physical data processing
The various characteristics of MIS include: equipment and the peripheral devices used in the
 System approach: MIS follows the system approach which information system.
implies a step by step approach to the study of complete o Software: Software refers to the written instructions or
system of an organization and its performance in the light of programmes that are used to manage the operations of the
the objectives of the system. hardware in an information system.
 Management-oriented: The management-oriented of MIS o Database: Database refers to an organized collection of data
implies that top-down approach needs to be followed for used by application software in an information system.
designing MIS. MIS, being management-oriented, also o Procedures: Procedures refer to a written set of steps which
implies that the management is actively involved in directing helps operate an information system.
the system development efforts. o Operating personnel: Operating personnel refers to the
 Need-based: This implies that MIS needs to provide the manpower involved in operating an information system.
requirements for the managers throughout the management o Input and output: Input refers to the data entered into an
hierarchy of the organization. information system and output refers to the data which is
 Future-oriented: It should also look into the future aspects received from the information system after the processing of
on the basis of the predictions made for the system. the input data.
 Integrated: MIS has the ability to produce meaningful
information because of the integration concept.  Information Processing Functions: The following information
 Common data flows: The common data flow is an processing functions of MIS help explain the functionality of
economically sound and logical concept that supports several MIS:
basic principles of system analysis that include avoiding
duplication, combining similar functions and simplifying o Processing transactions: MIS helps process a transaction
operations. which you can define as an activity performed in an
 Long-term planning: While planning the MIS, the designer organization.
needs to be cautious that the system should not be an o Maintaining master files: MIS handles the creation and
outdated one. maintenance of the master file in an organization.
 Subsystem concept: The development of MIS allows you to o Producing reports: MIS helps produce various reports in an
understand the subsystem concept which helps view the organization,
system as a combination of various subsystems. o Processing enquiries: MIS is also used to process enquiries
 Central database: The development of MIS allows an that help you understand and maintain the data used in MIS.
organization to collect data at a central location. o Processing interactive support applications: MIS contains
various interactive applications which help support the
Functions of MIS 'planning, analysis and decision making of the system.
MIS needs to perform the following functions:
 Collecting data: MIS helps collect data from different  Levels of Management Activities: The levels that help
external and internal sources of an organization. describe the structure of MIS are: '
 Processing data: Processing the data includes converting the o Strategic planning level: The strategic planning level of
collected data into the required management information. management activities specifies the long-term plans which
 Storing information: MIS allows you to store both processed are based on the business objective of the organization.
and· unprocessed data used in an organized manner for o Management control level: Management control level of
future use. activities specifies the internal activities performed by one or
more managers.
 Retrieving information: MIS helps retrieve information from
o Operational control level: The operational control level of
its databases when users request for the information.
management activities specifies short-term plans and
 Disseminating management information: Disseminating MI
decisions for the currents operations in the organization.
involves dividing and distributing the retrieved information to
the users of the information.
 Decision Support: A decision in an organization depends on
the structure which is provided to make the decision. A
Types of Models in Information System
structured decision is generally pre-planned, whereas a
The information system is considered to be evolved through three
highly unstructured decision is not pre-planned.The
different levels of systems which are as follows:
structured decisions are regular and well-defined and they
 Conceptual Model: It is the first level of development of
can be processed with the software instructions related to
information system in an organization. At this level, experts
MIS.
think about such a system in which entire information of
organization flows from one place to another place without
CLASSIFICATION OF MIS
the intervention of any person.
MIS can categorize these information systems on the basis of their roles
 Logical Model: In this model, all objectives which are decided
in the operations and management of business as:
at the middle level are logically implemented.
1. Operations support systems
 Physical Model: Testing and evaluation processes related to 2. Management support systems
MIS are also implemented at this level of development of 3. General support systems
information system in an organization. Physical model of MIS
contains software, programmes, data files and 1. Operations Support Systems:The operations support
documentation related to MIS. systems allow to perform various tasks such as efficient
processing of business transactions, supporting
STRUCTURE OF MIS organizational communications and updating databases of
the organization. The different types of operating support 7. Describe, in brief, the various subsystems of an information
systems in an organization are: system.
 Transaction Processing Systems: A Transaction Processing
System (TPS) allows you to process and record data and helps SUBSYSTEMS OF AN INFORMATION SYSTEM
produce reports from the processed data. Subsystem refers to a part of information system that plays a specific
 Process Control Systems: A Process Control System (PCS) role in the working of information system. Subsystems have a great
monitors and controls the physical processes in an importance for the end-users of the information system since the
organization. subsystems are the integral part of any type of information system.
 Office Automation Systems: Office automation systems These subsystems are as follows:
refers to those information systems in which computer and 1. Real-Life Business Subsystem
communication technology applications are used to process Real-life business subsystem is responsible for collecting
office transactions and office activities at all levels of an information about the organization and its business environment.
organization. This information is very important to implement an information
 Word Processing: Word processing enables you to create system in the organization because the information system of the
computer-assisted documents such as reports and memo organization must be compatible with each and every business
using textual data which are entered via a keyboard. activities of the organization.
 Electronic Filing: Electronic filing allows you to store incoming 2. Production Subsystem
and outgoing documents on a magnetic disk that you can use Production subsystem is responsible for collecting all the
for future reference. information provided by the production department of the
 Electronic Mail: Electronic mail (e-mail) uses the organization. The production department of the organization deals
telecommunication network and software applications to with the decision making related to the production process so that
transfer different documents among several computers the resulting goods and services are produced in accordance with
connected through a network. the quantitative specifications and demand schedule with
minimum cost.
2. Management Support Systems 3. Marketing Subsystem
Management support systems include those information systems which Marketing subsystem is responsible for collecting information
emphasize on providing information and support for effective decision about acquisition transportation, storage and delivering of the
making by the managers of an organization. The various management product of the organization. All the data, which are required for
support systems are: the marketing subsystem of the information system, are gathered
Management Information System: Management information system is from the records of the marketing department of the organization.
the information system that takes data as input and processes the data 4. Personnel Subsystem
to convert it into information as the output. Management information Personnel subsystem is responsible for maintaining information
system also helps provide analysis and planning of data and support such as records of account, employees and finance of the
decision making. organization. It also provides a way to record information in the
Decision Support System:Decision Support Systems (DSS) are storage medium of the information system from the terminal ends
information systems that supportdecision- making in an organization. of the information system.
DSS is also used in planning and error handling in the organization. 5. Material Subsystem
Executive Support System:Executive Support System (ESS) extends the It is responsible for collecting information about materials used in
management information system and includes the functionality of a DSS different departments of an organization. All inventory- and stock-
that helps support the decision making of the chief executives in an related information is handled by this subsystem of the
organization. organization. Financial Subsystem
6. Financial Subsystem
3. General Support Systems: Financial subsystem is responsible for collecting all the information
The information systems under MIS that perform both the roles of related to financial management of the organization.
operations and management are categorized as general support Decomposition of System
systems. The various general support systems are: Decomposition of system refers to the division of system into
Business Expert System: A Business Expert Systems (BES) is an advanced various subsystems.
and knowledge-based information system that acts as an expert to The decomposition of system into various subsystems allows you
provide knowledge-specific solutions to application areas which include to perform complex tasks with greater ease. A system is divided
medical, business and engineering. The main elements of a BES are: into smaller units until the smallest unit of the system becomes
 Knowledge base: It contains information about the specific manageable at the system level. The decomposition of a system
area for which the BES can provide expert information. can be best exemplified by the hierarchical arrangement of various
 Inference engine: It specifies how you can deduce an departments in an organization.
inference from the stored data and rules. The process of decomposition helps to identify and separate the
 User interface: It allows a user to communicate with BES. subsystems that can work independently in a system and decouple
Knowledge Management Systems: A Knowledge Management System them to achieve efficient results. Decoupling refers to the
(KMS) is a knowledge-based information system that helps support in phenomenon in which the interaction between subsystems and
creation and distribution of business knowledge to the managers and other elements of the system disappears.
other employees of an organization.
Strategic Information Systems: A Strategic Information System (SIS) is
an information system that helps an organization in achieving strategic
advantage over its competitor by applying Information Technology (IT)
to the products and services of the organization.
Functional Business Systems: A Functional Business System (FBS) helps
support the various function areas such as production, marketing and
accounting of an organization.
Unit -2  Structured observation: Structured observation takes place in
1. What is fact finding analysis? Briefly explain various types of a formal way in which each activity in the observation
fact finding techniques. process is predefined.
Ans:  Unstructured observation: In this type observer observes
FACT-FINDING TECHNIQUES whatever might be pertinent at the time.
Fact-finding analysis is a process of ensuring that the information c) Time sampling
gathered is the actual required information. To gather the actual Time sampling is an information collection technique which helps the
required information, you need to use the fact-finding techniques. The system analyst to maintain a definite time interval between two
fact-finding techniques are: subsequent observation of various activities of managers and decision
makers.
1. Review of Literature, Procedures and Forms d) Event sampling
Procedure manuals and forms are excellent sources of information Event sampling involves sampling of entire events such as meetings and
because they describe the format and functions of the present system. conferences. Event sampling provides observation of an integral
Update manuals can provide lots of information which saves a lot of behavior in its natural context.
time. e) Examining behavior of decision makers
i) Analyzing quantitative documents To obtain the information about how tasks related to a software system
These reports supply strategic overviews of the organizational plans. are done, you need to observe each task carefully. It must be structured
Beyond these key reports, many summary reports are used by the in order to be interpretable.
decision makers to provide the background information and spot f) Physical environment observation
exceptions to normal circumstances. Decision makers influence and in turn are influenced by their physical
ii) Performance reports environment. The method for Structured Observation of the
Performance reports provide the information related to the Environment (STROBE) provides a standard methodology and
performance of the system. It helps in analyzing the varying trends in classification for the analysis of those organizational elements that
the performance and in implementing the required changes. influence decision making.
iii) Records
Records are maintained to help the system analyst determine the
functioning of the system.
iv) Data capturing forms
Data capturing forms helps in collecting the specific information related
to therequirement of the system.
v) Analyzing qualitative documents
Analyzing the qualitative documents helps understand how the
organizational members engage in the process of organizing. The types
of qualitative documents are memos and sign-on bulletin boards and in
work areas, manuals and policy handbooks.
vi) Memos
Memos are qualitative documents which help in providing the details
regarding the daily activities of the organization.
vii) Manuals
Manuals are the qualitative documents pertaining to the working area
of any system. These manuals can be based on the functioning of an
organization or the system and help in analyzing their performance.
viii) Policy handbooks
Policy handbooks are the documents that provide the information
regarding the policies and rules of the organization or the system.
2. On-Site Observation
On-site observation allows analysts to gain information they cannot
obtain by any other fact-finding methods. With thorough on-site
observation, you can gain the first-hand information.
a) Steps for observation
Following is the sequence of steps that must be followed while carrying
out on-site observation:
 Decide what is to be observed
 Decide the level of activities
 Create categories for capturing key activities
 Prepare materials for observations
 Decide the time for observation

b) On-Site observation methods


When humans are observed, four alternative observation methods are
considered which are as follows:
 Natural observation: Natural observation takes place in a
setting such as at an employee's work place.
 Contrived observation: It takes place in a set-up by the
observer such as laboratories.
 Obtrusive observation: Obtrusive observation takes place
with the knowledge of the respondent.
 Unobtrusive observation: It takes place without the
knowledge of the respondent.
 Direct observation: Direct observation takes place when the
observer observes the system at work by being physically
present at the actual work place.
 Indirect observation: This type of on-site observation makes
use of secondary devices such as video cameras to capture
information.
2. Explain the spiral model of system development. How is it and boundary value analysis to uncover errors and bugs and
different from prototyping model? fix these errors.
9. Compare and contrast various system development life  Implementation and maintenance: This phase delivers the
cycle models. fully functioning operational software to the user. Once the
12. List the features, advantages and disadvantages of prototyping software is accepted and deployed at the user's end, various
model. changes occur due to changes in external environment.
These include upgrading new operating system or adding a
SYSTEM DEVELOPMENT LIFE CYCLE MODELS new peripheral device. This phase focuses on modifying
SDLC models represent descriptive and diagrammatic model of a software, correcting errors and improving the performance
software product with a series of identifiable phases through which the of the software.
software product goes during its lifetime. The advantages of classical waterfall model are:
The fundamental need for using a life cycle model is to provide a basis  Each phase of development in the waterfall model proceeds
that helps in controlling the various activities required for developing in a sequential order.
and maintaining a system. In addition, it establishes a precedence  This model allows managerial control where a schedule with
ordering among the various activities and helps the development team deadlines is set for each stage of development.
in facilitating and understanding the activities involved in the project.  This model helps in controlling schedules, budgets and
The primary task of the development team, while developing a system, documentation.
is to identify a suitable life cycle model and follow the model throughout The limitations include:
the life cycle of the product.  The classical waterfall model is appropriate for the small
Another need for using a life cycle model is that it helps in defining the project; but for a large project, it is very difficult to follow this
entry and exit criteria for every phase of the system life cycle. This model where exact requirements are not known initially.
enables the system project managers to easily monitor the progress of  It is not suitable for GUI-based applications where it is not
the system development process and also helps in controlling and possible to maintain document for every page.
systematically organizing the various activities of its life cycle.  Once an application is in the testing phase, it is difficult to
Some of the well-known SDLC models include: incorporate changes at such a late phase.
1. Classic waterfall model  No user involvement and working version of the software is
2. Prototyping model available when the software is developed.
3. Spiral model  This model lacks any feedback path to the preceding phases
4. Rapid Application Development (RAD) model of SDLC. As a result, the cost of defect removal increases in
5. Incremental model this model.
6. V Model
 This model assumes that requirements are stable and frozen
7. Build and fix model
across the project span.
8. Evolutionary development model
9. Synchronize and Stabilize Model
2. Prototyping Model
Prototyping model is applied when there is an absence of detailed
1. Classical Waterfall Model
information regarding input and output requirements of the system.
The classical waterfall model or waterfall model is follows a sequential
Proto typing model is developed on the assumption that it is often
approach from feasibility analysis phase to the maintenance phase of
difficult to know all the requirements at the beginning of a project.
the system development process. Since the classical waterfall model
Prototyping model is usually used, when a system does not exist or
follows a sequential approach to the various phases of the software
there is no manual process to determine the requirements in case of
development, it is often referred to as linear sequential model.The
large and complex system.
classical waterfall model is the simplest among all SDLC models where
Generally, prototyping can be prepared by following the various
all the requirements are known before the start of the system
approaches listed below:
development process. It consists of different phases and each phase has
 By creating major user interfaces without any substantive
its distinct goal. The phases of the classical waterfall model are:
coding in the background in order to give the users a feel of
 Feasibility study: This phase analyze the technical and
what the system will look like
economic feasibility of the software. The technical feasibility
 By abbreviating a version of the system that will perform
of software involves analyzing software development
limited subsets of functions
environment, characteristic of the end-users and software
 Using system components to demonstrate functions that will
development resources such as human resources and
be included in the developed system
hardware resources.
The various steps in the prototyping model are:
 Requirement analysis and specifications: This phase focuses
 Requirements gathering and analysis: Prototyping model
on the requirements of the system to be developed. In this
begins with requirements analysis and the requirements of
phase, the key activity is to gather and understand what the
the system are defined in detail. The user is interviewed to
clients require from the system. System analyst analyzes the
know the requirements of the system.
client requirements and removes all inconsistent and
 Design: When the requirements are known, a preliminary
ambiguous requirements.
design or a quick design for the system is created.
 Design: It determines the detailed process of developing
 Build prototype: Information gathered from quick design is
software after the requirements are analyzed. In this phase,
modified to form a prototype.
the system designer translates requirements specified in SRS
into various diagrammatic representations such as flow  Assessment or user evaluation: Next, the proposed system is
chart, data flow diagram, entity relationship diagram and presented to the user for consideration and users thoroughly
Unified Modeling Language (UML) diagrams. Structural evaluate the prototype and recognize its strengths and
design and object-oriented design are the two different weaknesses such as what is to be added or removed.
system design techniques. The design document is the work  Prototype refinement: Once the user evaluates the
product of design phase. prototype, it is refined according to the requirements. The
 Coding: This phase emphasizes the translation of the design developer revises the prototype to make it more effective
into a programming language by using the coding style and and efficient according to the user requirements. Once the
guidelines. user is satisfied with the developed prototype, a final system
is developed based on the final prototype.
 Testing: This phase ensures that the product is developed
according to the requirements of the user. Testing is a multi-  Engineer product: After the requirements are completely
stage activity and in this phase, the software engineer met, the user accepts the final prototype. The final system is
conducts various types of software testing such as thoroughly evaluated and tested followed by routine
conditional testing, structural testing and basis path testing maintenance on continuing basis to prevent large scale
failures and to minimize downtime.
Advantages of prototyping model
The various advantages of the prototyping model are:  The estimation of budget and schedule gets realistic as the
 The prototyping model provides a working model to the user work progresses.
early in the process enabling early assessment and increasing The disadvantages associated with the implementation of the spiral
user confidence. model are like. In the spiral model, assessment of project risks and its
 The software developer gains experience and insight by resolution is not an easy task. It is difficult to estimate budget and
developing a prototype thereby resulting in better schedule in the beginning of this model, as some of the analysis is not
implementation of requirements. done until the design of the software is developed.
 Prototyping model serves to clarify requirements which are 4. RAD Model
not clear, therefore, reducing ambiguity and improving RAD model lays emphasis on delivering projects in small pieces. In case
communication between the developer and the user. the project is large, it is divided into a series of smaller projects. Each of
 There is a great involvement of the user in software these smaller projects are planned and delivered individually. Therefore,
development. Therefore, the requirements of the user are with a series of smaller projects, it is delivered quickly and in a less
met to the greatest extent. structured manner. The RAD model enables high-speed development by
 The prototyping model helps in reducing the risks associated using waterfall model techniques. RAD model is applied when all the
with the project. requirements are well described in advance and frozen. The RAD model
Disadvantages of prototyping model adopts component-based development process and all the components
The disadvantages of the prototyping model are: are integrated in the testing phase.
 If the user is not satisfied by the developed prototype, then a The various phases involved in the RAD model are:
new prototype is developed. Thus, this model is time-  Business modelling: Business modelling phase is the concept
consuming and expensive. development phase for software development process. The
 Prototyping can lead to false expectations. business modelling represents all the client requirements
 The primary goal of prototyping is rapid development; which are to be transformed into the data modelling.
therefore, the design of system can suffer as it is built in a  Data modelling: This phase transforms the business
series of layers without considering integration of all the information into the data objects. Each data object has
other components. attributes which describe the relationship of data object with
another data object.
3. Spiral Model  Process modelling: Process modelling phase describes how
In 1980, Boehm introduced a process model known as the spiral model. various data objects are combined to achieve a common
The spiral model comprises activities organized in a spiral which has goal. The process model implements functions to add,
several cycles. This model combines the features of the prototyping modify, delete and retrieve the attributes of data objects.
model and the classical waterfall model and is advantageous for large,  Application 'generation: RAD uses fourth generation
complex and expensive projects. The spiral model determines the programming language such as Case tool languages to
requirement problems in developing prototypes. In addition, the spiral implement the functions defined in the process model. RAD
model guides and measures the need for risk management in each cycle applies reuse engineering principles and uses Computer
of the spiral model. IEEE defines the spiral model as a model of the Added Software Engineering (CASE) tool for rapid
software development process in which the constituent activities, development of the software.
typical requirements analysis, preliminary and detailed design, coding, Various advantages associated with RAD model are:
integration and testing are performed iteratively until the software is  In the RAD model, deliverables are easier to transfer as high-
complete. level abstractions, scripts and intermediate code are used.
The various regions available in the spiral model are:  It provides greater flexibility as redesign is done according to
 Client communication: This region includes tasks to establish the developer.
effective communication between the client and the  RAD model results in reduction of manual coding due to code
software engineer to understand the system requirements. generators and code reuse.
 Planning: This region includes estimating schedule, cost and  This model encourages user involvement.
staff for the project.  This model involves with the possibility of lesser defects due
 Risk analysis: This region involves identifying, estimating and to prototyping in nature.
monitoring the technical and management risks.  These disadvantages include:
 Engineering: This region involves software development. It This model is useful for only larger projects.
includes requirement gathering, design, coding and testing of  RAD projects fail if there is no commitment by the developers
the software. or the users to get software completed on time.
 Construction and release: This region includes deploying and  This model is not considered appropriate when technical
testing the software at client's site and creating user support risks are high. This occurs when the new application utilizes
documents. new technology or when new software requires a high
 Client evaluation: This region includes tasks to evaluate the degree of interoperability with the existing system.
software by client and provides feedback regarding the  As the interests of users and developers can diverge from
quality and functional capability of software to the software single iteration to next, requirements may not converge in
engineer. the RAD model.
As the development process starts in the spiral model, the software  This model requires the mapping of all client requirements
engineering team moves in clockwise direction around the spiral. The into well-defined functional module which is not always
first iteration around the spiral results in concept development of the possible.
system. Similarly, next iteration produces the prototype of the system
and the subsequent iteration produces more sophisticated version of 5. Incremental Model
the system. During each of the iteration around the spiral, planning In the incremental model, the system is developed in various
region adjusts the project plan if there is any deviation in execution of incremental steps. Each step adds some functional feature to the
actual plan. System quality, cost and project schedule are monitored existing version of system until the system is fully developed. At each
after getting the feedback from the client evaluation region. step, the client suggests enhancement and modification to be
The various advantages associated with the spiral model are: introduced in the partially developed systems which are implemented in
 Spiral model avoids the problems resulting in risk-driven the next increment. The incremental model reduces the testing effort,
approach in the software. as the partial system is fully tested in each increment. Quality of the
 This model specifies a mechanism for software quality system also increases, as client evaluates each increment and gives
assurance activities. feedback to the software engineer.
 Spiral model is utilized by complex and dynamic projects. In this model, system analyst analyzes client requirements and places
 Re-evaluation after each step in spiral model allows changes them in a project activity list on the priority basis. Project activity list is a
in user perspectives, technology advances or fmancial list of client requirements which are to be implemented in phases to
perspectives. develop the complete software. The three phases are:
Select the topmost activity from the project activity list and create Q. What is DFD and what is its element. Discuss the rules to construct a
design for it DFD. What is Zero level DFD.
Implement design in a programming language and perform testing on
the partial product DATA FLOW DIAGRAM
Do analysis to understand the functional capability of the partially Data Flow Diagram (DFD) is a technique which is used to specify how the
developed product data flow between the functions of the system. The basic purpose of the
The three phases are called design, implementation and analysis phase. diagram is to show how the system is currently implemented.
The incremental approach is followed until all the activities of the Elements of DFD
project activity lists are implemented. A data flow diagram illustrates the flow of data through a system and
The project activity list forms the basis of the incremental model. Order the work performed by that system. In data flow diagrams, the symbol
of the activity in the project activity list is the key factor because set comprises diagram, data flow, entity, data store and process.
disorder in activities may cause problems. An entity is used to define the boundaries of the system. An entity is
Following are the advantages that are associated with the incremental represented by a rectangle. A process is work or action performed by
model: people, machines, etc. within the system. It is used to transform input of
 The understanding of the problem increases through a system into an output. In DFD, process is represented by bubbles. In
successive refinements in the incremental method. DFD, data store is used to store data and it is represented by open box.
 It performs cost benefit analysis before enhancing software A data flow is any item that carries data to, within or from the system.
with capabilities. That is, it is used to represent inputs and outputs of the system. In DFD,
 It incrementally grows in effective solution after each flow of data is represented by arrows.
multiple iterations. There are basically two types of DFD, one is called physical DFD and
 This model does not involve high complexity rate. other is known as logical DFD.
 Early feedback is generated in this model because Physical DFD:A physical DFD is an implementation dependent view of
implementation occurs rapidly for a small subset of the the current system, showing what functions are performed. A physical
software. diagram provides details about hardware, software, files and people
The major disadvantage of the incremental model is that it requires involved in the implementation of the system.
planning at the management and technical level. This model also Logical DFD:Logical DFD is an implementation independent view of a
becomes invalid when there is time constraint in the project schedule or system that focusesonly on the flow of data between different
when the user cannot accept the phased deliverables. processes or activities. Logical diagrams show how the business
6. V Model operates, not how the system can be implemented. It explains the
V model is very useful in each phase of SDLC. This model determines the events of the system and the data required by each event of the system.
complex relationship between each phase of system development Rules to Construct a DFD
process and ensures that each phase of system development is Following are the rules that must be followed to construct the DFD of a
associated with testing. particular system:
Following points shows the activities of V model:  Each process involved in a system should be named and
 V model emphasizes that testing occurs in every phase of numbered for easy reference.
software development and does not occur after coding is  Name of each process should be symbolic.
completed.  The direction of flow of information in a DFD should be from
 V model helps determine activities and results to be top to bottom and from left to right.
produced in SDLC.  When a process is divided into several lower level processes,
 SDLC describes the products that are to be created during the each low-level process should be numbered.
software project life cycle.  The names of the data stores, sources and destination should
V model is divided into two branches. The left branch analyses and be in capital letters.
determines the requirements of the software to be developed. On the
other hand, the right branch includes the testing activities. The left and Zero Level DFD
right branches of this model work concurrently. The interrelationship Zero level DFD provides more detail than the context diagrams by
between the branches of V model is listed below: exploding them. By exploding context diagram processes into sub
 Unit testing verifies the technical design. It individually tests processes, the system analyst begins to fill in the details about the flow
the units to verify that the units are functioning according to of data within the system. Each sub process in the zero level DFD is
the requirements. numbered with an integer. Generally, this number starts from the upper
 The integration and system testing verifies the functional left comer and proceeds towards the lower right comer of the zero level
design of the programme. System testing verifies the DFD.
functional design of the programme to ensure that the Each process in zero level DFD may in turn be exploded to create a more
functional design is implemented correctly. detailed child diagram. The process of zero level DFD that is exploded is
 The requirements of the business are validated at the user called the'parent process' and the resultant diagram is called the 'child
end with the help of acceptance testing. Acceptance testing diagram'.
is used when the final system is developed. It verifies that the The primary rule while creating child diagram is that the child diagram
requirements are accomplished according to user can not receive input or produce output that are not produced or
requirements. received by its parent process. That means any data that are flowing in
 Lastly, the production verification is carried out. or out of the parent process should be shown flowing into or out of the
One of the key aspects of V model is that verification and validation are child diagram.
performed simultaneously in both branches. It is essential to link the left The processes in the child diagram are numbered using the parent
branch with the right branch as the left side of V model is executed to process number, a decimal point and a unique number assigned for each
correct problems which are encountered during verification and child process of the child diagram.
validation. Following are the advantages of V model: FLOWCHART
 V model covers all functional areas. Flow chart can be defined as a graphical picture of the logical steps and
 This model contains instructions and recommendations that sequence involved in a procedure and programme. Flow chart is
provide a detailed explanation of problems involved. basically a graphical representation of an algorithm or process.
Algorithm is a set of ordered stepswhich are used to solve a problem. It
 This model emphasizes the significance of testing and
is designed by a user to make a problem more understandable. In order
ensures that testing is planned.
to solve a problem, a user has to first design an algorithm related to the
The main disadvantage associated with V model is that the processes of
solution of that problem.
this model are institutionalized during the project and when the project
It represents the flow of data from one stage to another stage of solving
is finished, they are abolished.
a problem. In a flow chart, some specific rules or conventions are used
to show various blocks of a flow chart. As per standard convention",
some shapes are used to show particular part of a flow chart. For
example, a rectangle with rounded edge is used to represent START and
END (STOP) ofa flow chart, Parallelogram for Input & Output operations, Explain Marketing and Human Resource Information System briefly?
Rectangle for Execution operation and Diamond for Decision operation.
FINANCIAL INFORMATION SYSTEM
A financial information system is defined as a subsystem of the
organizational management information system that supports the
decision-making process of financial functions at the organizational
levels.
A brief description of each of the financial decisions that a financial
manager needs to take is as follows:
 Capital budgeting: Allocates the funds for long-term assets
that yield benefits/returns in the future.
 Financing: Refers to when, where and how to acquire funds
to meet the investment needs of the organization. The
financial manager needs to decide about the proportion of
equity and debt capital. In addition, he needs to determine
the areas where the use of debt capital affects the return and
poses a risk to shareholders.
 Dividend: Relates to the dividend policy of the organization.
A decision whether the organization should distribute all
profits or retain them or distribute a portion and retain the
balance is taken by the financial managers.
 Current asset management: Refers to the management of
current assets of the organization in order to safeguard the
organization against illiquidity.
In addition to the abovementioned managerial functions, other
functions of financial systems are summarized as:Controlling the receipt
& payments, Maintaining statutory records and preparing periodic
reports for statistics, performance and results forinternal control and
audit.
Financial information systems also include accounting systems as these
systems are concerned with recording the business transactions. Such
transactions include wages, salaries and all other types of income and
expenditure related to an organization. The records of these
transactions become the basis for preparing periodic or annual profit
and loss accounts, balance sheets, etc. in the organization.
MARKETING INFORMATION SYSTEM
Marketing information system provides information about various
functions of the marketing system of an organization.
Various important marketing functions are as follows:
Marketing identification: It means that the determination of the
potential buyers and their characteristic is important in order to satisfy
the needs and desires of the customers.
Purchase motivation: It refers to the assessment of various social,
economic and psychological forces that influence the purchase behavior
of the market.
Product adjustment: It includes all such activities that are necessary to
match the product and services offered in the market. As the needs and
desires of customer keeps on changing, an equivalent adjustment is
required in terms of product planning. .
Physical distribution: It refers to the actual movement of goods from
points of production to points of consumption.
Communication: It refers to the communication of information and
messages between buyers and sellers.
Transaction: It refers to the inclusion of activities such as invoicing and
billing that are needed to facilitate the transfer of title of ownership of
goods or services between the parties involved in a transaction.
Post-transaction: It refers to the feedback about the performance of the
product or service that is obtained from the customer.
To carry out the above-mentioned marketing functions, the marketing
manager needs timely, accurate and relevant information to take an
array of decisions. Thus, every organization needs to organize the flow
of marketing information to its marketing managers. This marketing
information is developed with the help of internal company records,
marketing intelligence activities, marketing research and marketing
decision support analysis.
Various options used in marketing information system are as follows:
Transaction: It specifies that the reports on orders, sales, prices,
inventorylevels and receivables are obtained from the internal records
of the organization.
Marketing intelligence: It specifies the relevant developments in the
marketing environment.
PRODUCTION/ MNUFACTURING INFORMATION SYSTEM
A production or manufacturing information system provides information
Unit -3 on the production or operation activities of an organization and
facilitates the decision-making process for the production managers of Ans:
the organization. . DECISION SUPPORT SYSTEM
The main decisions to be taken in the manufacturing system are related Decision Support System (DSS) is a model that helps the management of
to the following areas: an organization in taking decisions related to the functioning of the
Product design, Plant location, Plant layout, Production planning, organization. DSS involves three phases: intelligence, design and choice.
Routing, Scheduling, Loading, Production control, Quality control, During the intelligence phase of DSS, the main objective of the
Workforce&Environment. management is to identify the problem for which the decision needs to
The manufacturing information system gathers different types of data be taken. In the design phase, all possible solutions for the problem are
from various sources. After gathering data, it processes data to determined. After determining all the possible solutions for the problem
transform them into meaningful information. This information is then in the design phase, the best solution is selected in the choice phase.
provided to the production managers to facilitate decision making at the The criterion for choice phase varies from problem to problem.
various levels of management. Information that is required for Therefore, it is necessary to go through these phases repeatedly until an
manufacturing decisions is processed from data that are gathered from optimum solution is achieved.
a wide variety of sources. These various types of data are discussed as DSS helps the management in taking various decisions such as:
follows:  Optimum product mix
Production: It includes production orders, assembly orders, finished  Alternative loading pattern
items and scrap.  Alternative assignment of jobs and machines
Inventory: It includes data related to the inventories of raw materials,  Alternative material, tools and process
goods in process and finished goods. Types of DSS
Supplier: It provides information about the sources of raw materials.  Communication-driven DSS: This provides support to
The materials manager maintains the supplier data. internal teams including partners in organizing business
HUMAN RESOURCE INFORMATION SYSTEM meetings in an organization. Communication-driven DSS is
Human resource information system supports the functions of human implemented in an organization using either Web or client
resource management of an organization. Human resource information server technology.
system also deals with employee compensation, wages, salary  Data-driven DSS: Data- driven DSS helps filter only the
administration, labor relations and employee services and benefits. required information from a database or data warehouse in
Various options used in human resource information system are as order to obtain specific results for specific objectives. Data-
follows: driven DSS is implemented in an organization using the
Transaction: It is the basis for various types of output information or mainframe and client server technology.
analysis. These data include employee number, name, qualification,  Document-driven DSS: Document-driven DSS helps search
experience and joining date of the employee. They also include the Web pages and documents related to an organization on the
categories and grades of posting and daily performance of the basis of certain keywords and search items. Document-driven
employees. DSS is implemented in an organization by using either the
Environmental: It includes data about the availability of personnel, Web or a client server technology.
trends in the labor force, competition, and market offerings to the  Knowledge-driven DSS: Knowledge-driven DSS helps the
employees, government and labor laws. The human resource management in taking managerial decisions and selecting
information system gathers environmental data from journals, news suitable products or services. Knowledge-driven DSS is
items, research studies, seminars and informal talks by the managers. implemented in an organization by using either the client
Organizational Plans: It provides an important input data to the human server technology or the Web.
resource information system. On the basis of these data, future planning  Model-driven DSS: Model- driven DSS is primarily used by
for recruitment and job assignment is done. The human resource the managers and staff members of an organization. Model-
information system processes all these types of data to convert it into driven DSS is implemented in an organization by using the
information which supports decision-making of human resource client server technology, the Web and the software or
managers. hardware in stand-alone computer systems
Components of DSS
 User interface: It is a means through which a user interacts
with· the machine or a device.
 Database: It is a collection of current and historical records
stored in a systematic manner. The information retrieved
from the database can be used in decision-making by the DSS
of an organization.
 Network: It is a collection of terminals, computers, servers
and components which allow the information flow and
sharing of resources among different users.
 DSS software system: It is a collection of mathematical and
analytical tools used to perform various operations on the
information stored in a database.
Applications of DSS
Business and management: DSS provides information that help in
strategic planning and decision-making process. DSS generates payrolls,
inventory and financial reports to assist the top management in
decision-making process of an organization.
Banking: DSS enables the employees of banks to perform day-to-day
banking transactions easily and efficiently.
Railway: In railways, DSS can be used to test the equipment on a regular
basis and also to set time for the arrival and departure of trains.
Hospitals: DSS can be used in hospitals for various purposes such as
medical diagnosis.
Airlines: DSS can be used for various purposes such as flight scheduling
and passenger demand forecasting.
Oil refineries: In oil refineries, DSS can be used to determine the
potential drilling sites for oil.
EXECUTIVE SUPPORT SYSTEM
An Executive Support System (ESS) is a computer-based system which
3. Describe ESS and DSS. helps senior executives to easily access internal and external
information required to take strategic decisions. ESS has an easy to use
graphical user interface and offers strong reporting. It helps top-level
executives to supervise performance by analyzing, comparing and
highlighting important variables.
The component of ESS can be classified as:
 Hardware: The hardware components required to implement
ESS in an organization are easy to use and less expensive.
Computer hardware for an ESS includes the following three
components:
 Input data-entry devices, which help the employees of
an organization to input and modify the information
necessary for decision making.
 The Central Processing Unit (CPU), which helps manage
the functioning of various components such as monitor
and keyboards of the computer.
 Output devices, which provide an interface to the
employees of an organization to visualize the output of
a particular operation.
 Software: It is necessary to select appropriate software
components for developing an effective ESS. Following are
the software components required to develop an effective
ESS:
 Text base software: This helps the employees of an
organization to record and update the information
about day-to-day transactions.
 Database: This is used by the employees of an
organization to store and access information related to
the organization in a tabular form.
 Graphic base: This helps an end-user to convert large
quantity of information into various kinds of charts such
as scatter chart, bar charts, pie charts and moving
graphics.
 Model base: This helps in analyzing the statistical and
financial information stored in the organization
database.
 Interface: It is required to access data by a user. Interfaces
should have consistent look, should be flexible enough to
meet the changing needs of end-users, and should have
provision for help and error reports.
 Telecommunication: It is used to establish an organization in
the market and meet the executives' need to access and
transmit data from one source to another.
Role of ESS
Executives use ESS to explore information according to the requirement
of the user. ESS can be used in the following fields:
 Manufacturing: It is defined as converting unprocessed
materials into finished goods. ESS critically evaluates
vendors, buyers and purchased materials. Executives can
manage and analyze the purchasing operations effectively
with ESS.
 Marketing: The marketing executives can use ESS to perform
the marketing involved in an organization. It also helps in
predicting sales and product price which helps end-user to
compare predicted sales with previous sales. Executives can
control data with the help of ESS by studying previous trends
and audits of the sales data.
 Financial: The financial executives can use ESS to perform
financial role in an organization. For this the financial
executives decide the investment strategies with the help of
financial ratios and cash flow analysis. By using the quality
information provided by ESS, an end-user can estimate
budget and set standards for cost. ESS also helps in long-term
plans by making it easier for end-users to keep a track of cash
flow and expanding needs of an organization.
Benefits of ESS
The use of ESS is very easy and provides various benefits to the
executives of an organization.
 It is not necessary for the users to be an expert in using
computers.
 It helps provide summarized information to the concerned
authority on time.
 It provides information in a form which is easy to understand.
 It can sort data into different categories. 26. Name some ERP software. What are the challenges faced by
 It helps to keep track of information. ERP?
 It helps to take efficient decision.
ENTERPRISE RESOURCE PLANNING SYSTEM Decision making means making a choice from the given alternatives by a
ERP system is a type of information system that is used to integrate all manager or a decision maker. The decision-making process lets a
the data and processes of the organization into a cohesive system. ERP manager come to a conclusion about a given situation. Therefore
system is regarded as the enterprise-wide framework that includes all decision making may be defined as a process of selecting an optimum
the major departments of the organization such as sales, marketing, and best alternative from a couple of given alternatives to accomplish a
production, inventory management, accounts, finance and human particular task. Decision-making process is the core of managerial
resource department. functions in MIS. It is said that the decision-making process considers
This is the cross-functional enterprise framework that handles the two or more alternatives from which a final decision could be made.
processes related to all the departments and helps the organization to
use the available resources in an efficient manner. The ERP system A decision-making process involves the entire process of establishing
follows the philosophy of handling and integrating all the processes at goals, defining activities, searching for alternatives and finally the
all levels. The ERP system also manages the resources of the development of plans. In addition, the decision-making process includes
organization in an efficient manner so that it can satisfy the needs of the all the activities of problem solving, coordinating, information
customers in a convenient manner. The changes that are required to be processing and evaluating alternatives that usually precede a decision.
incorporated in the business processes can be easily done with ERP On the basis of the purpose of the decision-making activities, the
system with no extra effort, because changes have to be incorporated in organizational decisions are divided into the following three different
one place that affect the complete process of information system categories:
automatically.  Strategic planning: These are the decisions in which a
some of the ERP software vendors. decision maker develops objectives and allocates resources
ERP Software Vendor ERP Software Name to achieve these objectives Decisions in this category are of
SAP SAP Rl3 long-time period and involve a large investment and effort.
Baan Triton Such decisions are taken by the strategic planning level
PeopleSoft PeopleS oft managers who belong to the top level of the management
ID. Edwards Word Software hierarch) in an organization.
QAD MFGlPro  Management control: These are the decisions taken by the
Ross Systems Irenaissance management control level managers who are from the
Oracle . Oracle Manufacturing middle level of the management hierarchy in an organization.
These managers deal with the use of resources in the
ERP Challenges organization. Analysis of variance, product mix and planning
Companies have to face many problems while implementing the ERP decisions fall in this category of decisions.
system. The first problem the, organization has to face is about the  Operational control: These are the decisions dealing with the
selection of the ERP vendor. Most organizations face ERP challenges in day-to-day problems that affect the operation of an
three areas which are: organization.
 Integration of ERP modules: Different ERP vendors sell their Simon's Model of Decision-making
ERP software package consisting of production planning, The decision-making process is based on the following three phases as
inventory control, finance and HR. The organizations have to given by Herbert A. Simon in his model of decision making:
install all these modules in the beginning phase of ERP  Intelligence phase
implementation.The integration of the modules purchased  Design phase
from different vendors is one of the major challenges for the  Choice phase
organizations.  Implementation Phase
 Integration of e-business applications: E-Business a) Intelligence Phase: A decision maker studies the
applications consist of strategies, technologies and processes environment and identifies the problem or opportunity. The
that integrate the internal and external business processes scanning of environment may be continuous or intermittent.
electronically. E-Business software system falls into four
categories. These are: The Intelligence phase of the decision-making process involves:
o Enterprise Resource Planning (ERP) Problem searching: Refers to the difference between the
o Customer Relationship Management (CRM) expected and real result obtained after making a decision
o Supply Chain Management (SCM) which is given by the following formula:
o Knowledge Management (KM) (Desired/Expected) - (Actual/Reality)=Difference/Problem
 Integration with legacy systems: A legacy system is the In actual practice, the reality or actual is compared to some standard
existing computer system or application implemented in the desired model. Then the differences are measured and evaluated to
organization to handle different business processes. determine the problem or difference. Various types of models that are
Integration of ERP systems with the legacy systems requires used to compare reality are:
the installation of the third-party software that can be used-  Historical models based on estimated information
as an interface between the ERP systems and the legacy  Planning model
systems.  Extra organizational models in which expectations
are derived from customers, consultants and
competition
 Models used by employees in an 'organization
Problem formulation: Refers to the proper identification of
the problem to avoid the risk of solving the wrong problem.
To avoid such a risk, it is very important to understand the
problem well and state it clearly. Sometimes, the process of
clearly defining the problem is sufficient, but in other cases,
we have to simplify the problem by determining its
boundaries. Boundaries are simplified by breaking the
problem into smaller manageable sub-problems. In problem
formulation, establishing relations with some problems that
are solved earlier prove quite useful.
b) Design Phase: A decision maker identifies alternative courses
of action to solve the problem. Design phase includes
inventing or developing various alternatives in order to get
the best possible alternative. Developing alternatives is a
11. Discuss in detail, the Simons model of decision making. time-consuming and crucial activity, as the decision maker
MIS AND DECISION-MAKING has to explore all the possible alternatives. Decision-maker
should not take the risk of missing any alternative since the
missed-out alternative might be the best one from the given
alternatives. Developing alternatives is a creative activity
which' can be enhanced by various aids such as
brainstorming, checklists and analogies.
c) Choice Phase: Refers to the selection of the alternative
developed in the design phase as the decision by the decision
maker. A decision maker makes a detailed analysis of each
and every alternative for performing this selection. After
making the decision, the decision is implemented. However,
at any phase, the decision maker may return to the previous
phase. For example, the decision maker in the choice phase
may reject all alternatives and return to the design phase for
developing more alternatives.
d) Implementation Phase: Refers to the phase in which the final
decision made by the decision maker during the design phase
is implemented. It should be noted that the completion of
this phase means successful completion of the decision-
making process. In case of any discrepancies, the decision
maker might return to the previous phase or phases to carry
out the decision-making process. The implementation phase
includes training of the personnel, who implement the
decision put forward by the decision maker. In addition, this
phase may require additional support from the top-level
management of the organization for implementing the
decision. This additional support may be personnel or
financial support.

Role of Information System in Decision-making


The stages of the decision-making process are: intelligence, design and
choice. The role of information system in these three stages of the
decision-making process is discussed as follows:
 Intelligence stage: Information systems may provide
information about internal as well as external environments
of the decision-making process. Internal information is
generated from the functional areas but the external
information is collected from various sources such as
newspapers, and personal contacts. Availability of a large
amount of information in this stage makes it necessary to
scan the data sources to get the relevant information. As a
result, information system is used to scan the business
environment of an organization. In order to get the required
information in the intelligence phase of the decision-making
process, information system must be designed so as to
answer pre-specified and ad hoc queries made by a decision
maker.
 Design stage: Information systems provide support by
quantifying and automating a decision-making process during
the design stage while considering structured decisions. At
this stage, various alternatives are developed and evaluated.
On the other hand, for semi-structured and unstructured
decisions, the support of information system provides the
following abilities:

o To reach a decision in an interactive process which


includes DSS capability

o To make ad hoc queries for information in the


organizational databases

o Therefore, information systems should be designed to


incorporate various models of business operations and
advanced statistical and optimization techniques

 Choice stage: Information systems provide summarized and


organized information to the decision makers at this stage of
the decision-making process. It is the stage in which a course
of action is selected and feedback is collected on the
implemented decision. Information system also provides the
feedback support to decision- makers in case they want to
return to the preceding stages of the decision- making
process in order to gather more information. Models such as
optimization and suggestion should be used to select the
most appropriate alternative which helps the decision Unit-4
makers in selecting the best course of action. COMPUTERS NETWORKS COMPONENTS
Computer Network involves group of computers and associated devices  Protocol converter - Protocol is a set conventions/rules which
that are connected by communications facilities. A network can be small governs the exchange of data between sender and receiver
as LAN consisting of few computers, printers and other devices or big as (computer) with as little error as possible. Dissimilar devices
WAN consisting of many small and large computers distributed over vast cannot communicate with each other.
geographic area.  Repeaters: A repeater is a device used on communication
circuits that decreases distortion by amplifying or
Networking systems consists of five basic elements arranged in the regenerating a signal so that it can be transmitted in its
following manner and follow the process of communication in that original form. A repeater generally connects two networks at
order: the physical layer.
 Bridges: It is a device that connects the same type of
 The originating/source computer that transmits data. networks or LANs using same communication protocols so
 A data communication device attached to the sending that information can be passed from one to another. In order
computer. to transmit this data successfully the bridge magnifies the
 A communication channel, which carries the data from point data transmission signal. This means that bridge can act as a
to point. repeater as well as link.
 Data communication device attached to the receiving  Gateway: It is a device that connects dissimilar networks
system, capable of converting the data in the form which using different communication protocols so that information
receiving system can read. can flow from one to the other. A Gateway performs two
 The receiving computer, which receives the information and functions, it transfers the information and it converts
displays it on the screen, prints them, and stores them in a information to a form compatible with the protocol used by
file. the receiving network.
 Router is an intermediary device on a communication
ADVANTAGES OF NETWORKING network that directs the communicating messages when
several networks are connected together. On a single
Computer networks have many advantages. Some of them are listed network, several computers may be linked through a mesh
below: topology of possible connections. A router receives
transmitted messages and forwards them to their correct
 Sharing of Hardware: Networking allows the user to share destinations by means of most efficient available route. High
the hardware in departments of a company/Institution. speed routers can serve as part of the Internet backbone or
 Sharing of Information: It allows the sharing of information, transmission path, handling the major data traffic.
which may be used constantly throughout the company.  Switch: In networking, switch is a device capable of
 Transfer of Text: Networking facilitates the electronic forwarding packets directly to the ports associated with
transfer of text. particular network address.
 Decentralization of Data Processing: A complicated job can NETWORK TOPOLOGIES
be divided into multiple modules and can be distributed to Network topology refers to the geometrical arrangement and
different departments for processing. connection of nodes in the network. Topology is the layout of the
 Easy Communication: Various organizations cooperating in a connection between the computers. Network topology generally,
task can communicate with each other on network and determines the reliability and efficiency of computer networks. Some
exchange information. network works on the Client-Server technique where server does all
traffic control; on the other hand there are some networks which don't
COMMUNICATION INTERFACE DEVICES need server at all. Depending upon different topologies, network can be
divided into following types.
 Network Interface Cards (NIC) - Network Interface Card  Bus Topology (Linear bus): In a bus structure of network,
allows the transmission of data over a cable network which there is a single cable and all the workstations are attached
connects various computer and other devices such as to it. Its structure is like Spinal Cord of human body. In this
printers. NIC has additional memory for buffering, incoming structure all network nodes have unique addresses and are
and outgoing data packets, thus it increases the network connected to a common transmission medium that is called
throughput. Since it is an expansion card on the mother- broadcasting bus. Bus type of network is meant for Local
board, thus, circuit on the board provides protocols and Area Networks (LANs).
commands required to support this kind of network card. Advantages of bus topology are:
NICs are available in 8-bit orin 16-bit bus standards. (a) It is easy to use and understand, reliability is higher in very
 Modem is a device which carries voice or sound signals like small networks.
telephone system. The modem refers to a device which (b) It is cheaper than other topologies because, it requires less
performs two processes modulation i.e. conversion from cable to connect the computers.
digital to analog and demodulation i.e. reverse the (c) It is easy to extend and more computers can be connected to
conversion from analog to digital. Modems transmission the network as cables can be joined with a connector.
speed is measured in bits per second. Typically, modems (e) Bus network commonly rely on collision detection or token
speed ranges from 14,000 bps to 56,000 bps. Modem stands passing to regulate traffic.
for Modulator/demodulator. It is a communication device Disadvantages of bus topology are:
that converts between digital data from a computer of (a) Bus network works slow in heavy traffic because any computer
terminal and analog audio signals that can pass through can transmit at any time and can interrupt each other by using a
standard telephone lines. lot of bandwidth.
(b) Each connection between two cables weakens the electrical
 Multiplexer is an electronic device that divides a physical
signals.
channel into logical channel to carry data transmission
(c) A network is disabled if someone accidentally cuts the main
simultaneously from many sources. Multiplexing makes
cable.
optimal use of existing communication channel by merging
the transmission of several sources at one end of thechannel.  Ring Topology (Ring connection): Ring topology is similar to
the bus, as it is also having a single cable, but the cable
 Front-end Communication Processor: The most sophisticated
(media) forms a complete loop. In this type of network
communication management device is the front-end
computer communicates with other by sending a signal
processor. In communications, a front-end processor is a
around the ring and each workstation takes an active part in
small computer that is connected to the main (host) or larger
the transmission. Information is passed from node to node
computer and is used to transmit and receive messages over
around the ring until it arrives at the node that is addressed.
the communication channels, detect and correct errors,
Advantages of Ring network are following :
encoding of messages and relieves the host computer from
routine computational tasks.
(a) Ring network offers reliable performance for small and larger international network as well, built by the Government
distances. Telecommunication agencies e.g., global communication
(b) It can be easily extended. service providers. Generally public network handles bulk
(c) A ring topology makes it easy for computers to co-ordinate amount of data and is more economical.
access and to detect whether the network is operating correctly. METROPOLITAN AREA NETWORK (MAN)
Disadvantages of ring network: MAN is a network bigger than LAN but smaller than a WAN it is also
(a) Compared to other networks it is difficult to install and relatively defined as multiple network that are connected within the same city to
expensive. form a city wide network for a specific Government or industry. MAN is
(b) Entire network is disabled if one of cable is cut. a high speed network that can carry voice data and images at up to 200
(c) Because of the closed loop, adding a new node can be difficult and Mbps or faster over distances of up to 75 km.
can disrupt the network. A MAN can include one or more LANs as well as telecommunication
(d) Ring networks are highly vulnerable, if a single computer fails, then equipment such as microwave or satellite relay station. It operates at a
at least one part of the network is not working. higher speed and it is smaller than WAN.
WHAT ARE PROTOCOLS?
 Star Topology (Star connection): In some networks when In computing, a protocol or communication protocol is a set of rules in
communication goes through a center point, then star which computers communicate with each other. The protocol says what
topology is preferred. A star-shaped network resembles the part of the conversation comes at which time. It also says how to end
spoke of a wheel; the center of a star network is often called the communication.
a hub. The wiring between the nodes is not shared as in the Types of Protocol
case of bus topology. This topology is used in applications  Hypertext Transfer Protocol (HTTP), is used for accessing and
where a central computer communicates with remote receiving Hypertext Markup Language (HTML) files on the
terminals or workstations. internet.
Star network is a LAN in which each node is connected to a  Simple Mail Transfer Protocol (SMTP), is used for transferring
central computer in a star shaped configuration. e-mail between computers.
Advantages of a star network are:  Post Office Protocol version 3 (PoP3) is the most common
(a) It is easy to add and remove nodes account type for personal e‑mail. Messages are typically
(b) It is easy to trouble shoot the network through a central deleted from the server when you check your e‑mail.
hub.  Internet Message Access Protocol (IMAP) is a protocol for e-
(c) If a node fails, it does not affect the network. mail retrieval and storage developed in 1986 at Stanford
(d) A star topology helps protect the network from damage University as an alternative to POP.
to a single table.  File Transfer Protocol (FTP), is used for showing files to be
Local Area Network (LAN) copied between devices.
When the network is spread in a small geographical area say 0 to 10 km.  Transmission Control Protocol (TCP), ensures the delivery of
then such network is called Local area network. Ring, Star, etc. are information packets across networks.
examples of LAN. LANs are usually intra-organizational and privately  Internet Protocol (IP), is responsible for logical addressing
owned. For example, network can be used to connect different called "IP address" to route information between networks.
terminals in the lab, to connect different offices of same organization or  In computer networking, Point-to-Point Protocol (PPP) is a
to connect different departments of a university and so on. data link (layer 2) protocol used to establish a direct
COMPONENTS OF LAN connection between two nodes.
 Workstation: A workstation in LAN is a single user TCP/IP protocol suite
microcomputer with communication capabilities. The TCP/IP protocol suite maps to a four-layer conceptual model known
 File Server:A file server is powerful computer that works as as the DARPA model. The four layers of the DARPA model are:
server for the LAN. It is loaded with special software such as Application, Transport, Internet, and Network Interface.
Network Operating System is loaded to control the  Network Interface Layer: The Network Interface layer (also
functioning of LAN. called the Network Access layer) sends TCP/IP packets on the
 Network Interface Card: Network interface card mediate network medium and receives TCP/IP packets off the
between the computer and the physical media such as network medium. TCP/IP was designed to be independent of
cabling over which data transmission takes place. the network access method, frame format, and medium.
 Network Operating System: An operating system specifically
designed to support networking. A server based network  Internet Layer: The Internet layer responsibilities include
operating system provides networking support for multiple addressing, packaging, and routing functions. The Internet
simultaneous users as well as administrative, security and layer is analogous to the Network layer of the OSI model.
management functions.  Transport Layer: The Transport layer provides the
 Network cabling or cabling system - Once the server, Application layer with session and datagram communication
workstations and network interface cards are in place then services. The Transport layer encompasses the
cable is required to connect the network. responsibilities of the OSI Transport layer.
WIDE AREA NETWORK  Application Layer: The Application layer allows applications
Wide area networks (WAN) are formed when a geographically to access the services of the other layers, and it defines the
distributed network composed of LANs joined into a single large protocols that applications use to exchange data.
network using services provided by common carriers. WANs are CHARACTERISTICS OF INTERNET
commonly implemented in enterprise networking environment in which  As we know Internet is a network of separate distinct
company offices are in different cities, states or countries or on different networks. It does not represent a single entity and is not
continents. WANs are usually public access networks. owned by any single person or organization. Thus being
The well-known examples of private and public networks are given "Wild west", nature of Internet possess following
below: characteristics, these are:
(a) Private Network:  Complex Network: Internet is huge set of networks
WANs are commercial and regulated network, while others are privately connected together i.e., more than 100 separate Internet
owned usually by large-sized organizations. Some WANs Private networks meet to exchange data at the Network Access Point
networks are regional networks for corporations spread over a large (NAP).
area such as telephone companies.  Hierarchical in structure: At the top, there are very large
Examples: ARPANET, SWIFT, SITA national Internet Service Providers (ISPs). These national ISPs
(b) Public Network: connect together and exchange data at network access
Some WANs can be implemented by public network in terms points (NAPs). Though at end user level, it appears to be
of their management, resources and access. One such public unorganized and confusing.
WAN is the Internet whereas public networks are, may be
 Open-membership professional society: Because Internet is
said to be network of networks, not one organization
operates and owns the Internet. The owner of the Internet is
the Internet Society which is open and allows anyone to join.
 Dynamic in nature: The Internet is changing. New
applications and access technologies keep changing.
 Internet covers globe: Internet is accessed by people across
the globe in over 155 countries.
 Wider application accessibility : The Internet offers access to
data, graphics, sound, software, text and people through a
variety of services and tools for communication and data
exchange.
 Growing exponentially: Internet joins a set of one or more
networks every day.
VARIOUS COMMUNICATION SERVICES
The innovations of the technological key areas that have filled e-
commerce are the following:
 Telecommunication Companies: Providing simple services
such as phone calls to all types of customers. They are
developing new technologies XDSL, fast switches for higher
bandwidth communication across existing networks.
 Satellite Technology: Vendors setting up new broadband
network with global reach.
 Wireless Network: Provides Internet facility at a faster pace,
Unit-5
even on cell phones using wireless Internet protocol.
 Cable Companies: Provide two way Internet traffic on
television by introducing set-top boxes which act as 4. What is normalization? Why is it needed? Explain the
converters and separators for the inbound and outbound following terms with respect to normalization giving
traffic. examples :
APPLICATION OF INTERNET a) First Normal Form
The common applications of the Internet can be classified into three b) Second Normal Form
primary types namely: c) Third Normal Form
Communication: Communication on the Internet can be both online or
offline. When some users connect to a single server at the same time, Normalization
they can communicate to each other in an "online chat manner". This Normalization is integral to the database design and it can be defined as
can be "many to many" as in a room full of people talking to each other the process of eliminating the redundancy of data in a database. A
on peer to peer basis. Alternatively, the users send e-mail to each other relational table in a database is said to be in a normal form if it satisfies
which can be read by the receiver whenever he/ she find the time. certain constraints. The various normal forms are first normal form
Data Retrieval: On the Internet, a large number of databases exist. For (1NF), second normal form (2NF), third normal form (3NF), fourth
data retrieval, availability of data that has been compiled from various normal form (4NF) and fifth normal Form (5NF).
sources put together in a usable form. These databases have been put The benefits of normalization are:
together by commercially run data providers as well as individuals or  Provides better overall database organization and data
groups with special interest in particular areas. To retrieve such data, consistency within a database
any user needs to know the address/ s of such Internet servers.  Allows you to create tables that can be easily joined with
Data Publishing: Information that needs to be made available to others other tables with related information
can be forwarded to specific addresses, posted in a Usenet site or kept  Helps to reduce redundant data across the tables
on display in a special site.  Prevents data loss by assigning primary and foreign keys in a
Business use of Internet: Business has taken to Internet in this era only. table
Business has to use Internet innovatively but within the norms and  Helps to reduce modification anomalies such as deletion,
modes of this fast growing world-wide community. Business methods insertion and update anomalies
and practices have changed the life styles of the people.  Defines relation constraints that are a logical consequence of
keys
Normalization terminology consists of various concepts frequently used
III normalization such as primary key and functional dependency.
Primary key
The primary key of a relational table uniquely identifies each row in a
table. A primary key is either a column in a table that is unique such as
identification number and social security number or it is generated by
the DBMS such as a Globally Unique Identifier (GUlD). Primary key is a
set of single column or multiple columns from a table. The first table,
STUDENTS, contains a record for each student at the university. The
table consists of various attributes such as student_id, first_name,
last_name and student_stream. Table
lists the various attributes in the STUDENTS table.
Student id First name Last name Student stream
SOl John Wilkins Computers
SOl Chris Burton Electronics
SOl Ken Wilkins Electronics
A unique Student_id number of a student is a primary key in the
STUDENTS table. You cannot make the first or last name of a student a
primary key because more than one student can have the same first
name and can have same stream.
Functional dependency
A functional dependency is a constraint between two sets of attributes
from the database. Functional dependency is represented by X - > Y
between two attributes, X and Y, in a table. The functional dependency entire primary key identified for the table. The tables formed after
X - >Y implies that Y is functionally dependent on X. lists the various applying 2NF to the employee project table are empproj table and EMP
attributes in the EMPLOYEE table. table and proj table. Table
Employee_id Employee_name Employee _ dept Empproject Table
K067263 John Sales Emp_id Proj no ProLhrs
K067264 Chris Accounts H76320 W36 08
K067265 Ken Sales H7632I W37 02
the various attributes of the EMPLOYEE are Employee_id, lists the various attributes in the EMP table.
Employee_name and Employee _ dept. You can state that: Emp_id Emp_name
Employee_id - >Employee_name H76320 W36
The above representation that the Employee_name attribute is H76321 W37
functionally dependent on the Employee _id implies that the name of an lists the various attributes in the proj table.
employee can be uniquely identified from id of the employee. However, Proj no Projjiame Projjuc
you cannot uniquely identify the Employee_id from the Employee_name H76320 Payroll system Houston
column because more than one employee can have the same name. H7632l Billing system Denver
However, each employee has different value in the Employee _id Transitive Dependency
column. A transitive dependency occurs when a non-key column is uniquely
Functional dependencies are a type of constraints based on keys such as identified by values in another non-key column of a table. A non-key
primary key or foreign key. For a relation table R, a column Y is said to column of a table refers to the column that is not identified as a key
be functionally dependent on a column X of the same table if each value such as candidate or primary key.
of the column X is associated with only one value of the column Y at a Third Normal Form
given time. All the columns in the relational table R should be A table is in 3NF if the table satisfies the requirements of 2NF and the
functionally dependent on X if the column X is a primary key. non-key columns are functionally dependent on only the primary key.
If the columns X and Yare functionally dependent, the functional The third normal form is based on the concept of transitive dependency.
dependency can be represented as: A functional dependency, A - > B, in a relation, R is a transitive
IR.x ~ R.y dependency if the following conditions are satisfied:
First Normal Form A column or set of columns, C, exists in the table that is neither the
A table is in 1NF if the data in the table has an identifying key and does candidate key of R nor the subset of any key of R.
not include repeating groups of data. To reduce data redundancy by The functional dependencies A - > C and C - > B hold in the table.
using first normal form, you need to: For example, consider a Subject table with attributes such as Subject no
 Remove the duplicate columns from a table. and chapter name.
 Create a separate table for related data and identify the Subject Table
primary key in the table. Subject_no Chapter_name Instructor Department

Order No Iteml Iteml_Qty Item l Price Item2 H76320 Data structure ABC Computer
Item2_Qty Item2_Price H76320 Communication XYZ Electronics
Oil IT90 322 36$ IT91 564 45$ In the above table, Subject_no is the only candidate key. Therefore, the
following functional dependency exists for the subject table.
In Table, the information provided is redundant. The multiple values of Subject_no ~ Chapter_name
the same type are stored in multiple columns such as quantity and price Subject_no~ Instructor
of two items are stored in different columns. Instructor~ Department
The requirements of first normal form are: From the above functional dependencies, you can say that Subject_no -
 Eliminate the multi valued fields from the table. > Department and therefore the above table is in 2NF. However, the
 Each column in the table must be atomic. table is not in 3NF since Department is not directly dependent on
 Each column in the table must have a key such as primary or Subject_no. In the Subject table, the Department column is determined
foreign key. by another non-key column, Instructor. Therefore, to apply 3NF to the
 Remove the repeating information from the table. Subject table, you need to decompose the table in two tables,
Second Normal Form Subject_inst table and instructor table.
A table is in 2NF if the table satisfies all the conditions of first normal Subject_inst Table
form and does not consist of any column that depends on only one part Subject_no Subject_name Instructor
of the identified primary key. The 2NF is based on the concept of full H76320 Data structure ABC
dependency. H76320 Advanced OS XYZ
To apply 2NF to a table you need to:
 Ensure that the table conforms to INF. lists the various attributes in the instructor table.
 Create a separate table for sets of values that apply to Instructor Department
multiple records. ABC Computer
 Relate these tables with a foreign key. XYZ Electronics
For example, Boyce-Codd Normal Form
Emp_id Proj no Projhrs Emp_name Proj name Boyce-Codd Normal Form (BCNF) is stricter than third normal form. The
Projloc relation present in BCNF is also found in 3NF; however, the relation in
H76320 W36 08 Abc Payroll Houston 3NF form is not necessarily present in BCNF. In 3NF, anomalies can
H76321 W37 02 Xyz Billing occur, when a relation has more than one candidate key. In the situation
Denver of overlapping candidate keys, 3NF is unable to stop occurrence of the
In the above table, “Employee project” conforms to 1 NF since it does anomalies. This provides a base for BCNF which is based on the concept
not contain repeated values and Emp_id and Projjd are identified as the of determinant. A determinant is an attribute on which some other
primary keys for the 'table. However, the table is not in 2NF because all attribute is fully functionally dependent. The following code shows the
the columns of the table depend on only a part of the primary key which relation and determinants:
comprises Emp_id and Projno identified for the table. For example, the [R (a, b , c , d) [ :
column Emp_name is dependent on only the Emp _ id and does not a, c ~ b, d
depend on the Proj no part of the primary key. Similarly, the Projname a, d ~ b
column is dependent on only the Proj no column and not on the Emp_id In the above code, the first determinant states that you can change the
primary key. primarykey of relation R from a, b to a,c. After applying this change, you
Therefore, to apply 2NF to the employeeproject table, you need to make can stillrhefiftl determine the non-key attributes present in relation R.
a separate table for columns that depend on only a part of the primary The second determinant indicates that a, d determines b, but as a, d do
key. The new table should contain columns that are dependent on the not determine all the non-key attributes of R, it cannot be considered as
the primary key of R. This implies that the first determinant is a Smith I I New
candidate key, but the second determinant is not a candidate key; York Smith lNew York
hence, this relation is not in BCNF but is in 3NF. Smith 2 I
To be in BCNF, every determinant of the relation has to be a candidate Chicago Smith Chicago
key. The definition of BCNF specifies that a relation schema R is in BCNF
if a non-trivial functional dependency X -+ A holds in R, then X is a super Jones I 2
key of R . Chicago Jones Chicago
Decomposition
The relational database design algorithm start with a single universal
relation schema, R = {AI, A2, A3, ..... , An}, which includes all the
attributes of a database. The database designers specify the set, F of
functional dependencies, which holds true for all the attributes of R.
This set, F of functional dependencies, is also provided to the design
algorithms. With the help of functional dependencies, these algorithms
decompose the universal relation schema, R into a set of relation
schemas, D = {RI R2, ... , Rm}, which becomes the relational database
schema. In this case, D is referred as a decomposition of R. The
properties of decomposition
 Attribute preservation: It involves preserving all the
attributes of therelation which is being decomposed by the
design algorithms. While decomposing a relation, you need
to make sure that each attribute in R exists in at least one
relation schema, R, while decomposing the relation.
 Lossless-join decomposition: It ensures that the join remains
in the same relation, as it was before the decomposition of
the relation. The decomposition of the relation R into several
relations, RI, R2, ... , Rn is called a lossless-join
deClbmposition, if the relation R is the natural join of the
relations R-I, R2, ... , Ro. To test whether a given
decomposition is a lossless-join for a given set F of functional
dependencies, you need to decompose the relation, R into RI
and R2. If the decomposition of the relation R is lossless-join,
then one of the following conditions has to be true:
 (RI intersection RI) -+ (RI - R2) and
 (RI intersection RI) -+ (R2 - RI)
 Dependency preservation: It states that if each functional
dependency X -+ Y, specified in F, either directly appears in
one of the relation schemas R, in the decomposition D or is
inferred from the dependencies that appear in the relation,
Ri, The need of dependency preservation arises because each
.dependency in F represents a constraint on the database.
When a decomposition do not preserve the dependency,
then some dependency can be lost in decomposition. You
can check for a lost dependency by creating a join of two or
more relations in a decomposition to get a relation, which
includes all the left and right-hand side attributes of the lost
dependency. Then, check whether or not the dependency is
preserved on the result of join.
Fifth Normal Form
The "fifth normal form (5NF) is based on join dependency. Join
dependency implies that after a table is decomposed into three or more
tables, the tables can be joined to form the original table. A table is in
5NF if the table cannot have lossless decomposition into smaller tables.
A lossless decomposition implies that after a relational table is
decomposed into smaller tables, the joining of the tables’results in
exactly the same relation table which was decomposed. If an instance is
added to a table, which is not in 5NF, it results in spurious results when
the tables are decomposed and then rejoined.
lists the various attributes ofInstructor-MID-Location Table.
Instructor MID Location
Smith I New York
Smith 2 Chicago
Jones I Chicago
If you were to add the MID-2 to New York, you would be faced with
adding a line to the table for each instructor located in New YOlk. If
Jones were certified for MID-2 and could travel to New York, you would
have to add two lines to reflect this.
Fifth Normal Form ofInstructor-MID-Location Table
Instructor-Seminar Seminar-Location Instructor-
Location
Table Table
Table
Instructor MID MID 8.
What is a Data Model? Explain different categories of data
Location Instructor Location model.
DATA MODELS
A data model in DBMS is defined as a collection of concepts which is collection of named fields or data items. Each data item or field has a
used to describe the structure of a database. Data model describes certain data type such as character, float or integer.
logical structure of a database by considering following concepts: Set type is a description of a l:N relationship between two record types.
 Structure: It represents how the data are organized in a Each set type definition has following elements:
database. The data can be organized using hierarchical,  Name for set type
network, relational or objectoriented data model.  Owner record type
 Integrity: It provides a definition of rules to indicate whether  Number record type
or not the defined structure can be used to organize data in a The advantages of the network data model are:
database.  It enables the representation of complex relationships and
 Manipulation: It provides a language in which you can update effect of operations such as add and delete on the
the data in a database. relationships.
 Querying data: It provides a language in which the data in the  It uses constructs such as FIND, FIND owner and FIND NEXT
database are queried. within a set that allows the users to navigate through the
For DBMS implementation you can use various data models which database.
include all, database-related concepts for describing the structure of a  Network model can inherit the advantages of hierarchical
database. Following are the various data model used in DBMS: model.
1. Hierarchical  Many-to-many (M : N) relationships are easier to implement
2. Network in network model as compare to hierarchical model.
3. Relational  This model ensures data integrity.
4. Object-oriented The disadvantages of the network data model are:
1. Hierarchical Model  It provides navigational and procedural processing of data.
In the Hierarchical model also called Hierarchical schema, data are  It provides complex array of pointers that thread through a
organized in the form of a tree structure. Hierarchical model supports set of records.
the concept of data independence. Data independence is the ability to  It provides less scope of query optimization.
change the representation of data at one level of a database system 3. Relational Data Model
without the compulsion of changing the data representation at the next In a relational data model, data is stored in tables which are also called
higher level. relations.The related tables or relations in the relational data model
Hierarchical model uses two types of data structures, records and form a database. Theproperties of relational data model are:
parent-child relationship to define the data and relationship among  Each row in a table is unique from every other row in the
data. Records can be defined as a set of field values which are used to table.
provide information about an entity. An entity is a collection of object in  Each row contains atomic data which implies that data are
a database which can be described by using a set of attributes. Records not repeated and do not contain structures such as arrays.
of same type can be easily grouped together to form a record type and In a relational model, tables are used to organize data. A table consists
assigned a name. The structure of a record type can be defined by using of columns or fields that represent attributes of an entity. Each row or
a collection of named fields or data items. Each data item or field has a tuple in a table represents occurrence of an entity and must consist of a
certain data type such as character, float or integer. Parent-Child value that uniquely identifies the row. Such a column that uniquely
Relationship (PCR) can be defmed as a 1: N relationship between two identifies the rows or tuples in table is called the primary key. The
different record types. The record type on the l-side is called parent relational model also consists of foreign keys that allow joining data of
record type and record type on the N-side is called child record type. two tables.
Occurrence of PCR type, also called instance, consists of one record of Relational data model makes use of the set theory and is based on the
the parent record type and a number of records of the child record concept of mathematical relation which contains several data elements.
types. The basic characteristics of the relational model are relational algebra
Hierarchical schema consists of number of record types and PCR types. and relational calculus. Relational algebra is a set of operations for
In hierarchical schema, record types are represented by rectangular manipulating relations and specifying queries. Relational calculus
boxes and PCR types are represented by the lines which are used to provides a declarative way to specify database queries. The relational
connect parent record type to child record type. algebra and the relational calculus are two different means of
The advantages of the hierarchical data model are: representing the database queries. Any relational algebraic expression
 It is simple to construct and operate on data in the can also be converted into a corresponding expression in the relational
hierarchical model. calculus and vice versa.
 It involves hierarchically organized domains such as product Relations
information in manufacturing and employee information in A relation is a two-dimensional table which is used to represent data in
organization. the form of rows and columns. The names of the columns are known as
 It uses constructs such as GET, GET UNIQUE and GET NEXT. attributes and rows are known as tuples of the relation. There are
The disadvantages of the hierarchical data model are: various parts of a relation which are:
 It requires navigational and procedural processing of data.  Domain: It is a set of atomic values. The values that cannot
 It provides less scope of query optimization. be divided into subcomponents are called atomic values.
 Tuple: In relational data model, a row IS termed as tuple that
2. Network Model gives complete information of an entity.
The network model can be defined as a database model which is used to  Attribute: It is a column header in a relation that represents
represent objects and the relationships among these objects. In network the attributes of an entity.
model, a record can have a number of parent records and it also can Relational Schema
have multiple child records. Like Hierarchical model, network model also Relational schema is the description of the database that is specified
supports the concept of data independence which can be defined as the during database designing. You can graphically represent relational
ability to change the representation of data at one level of a database schema which is known as schema diagram.
system without the compulsion of changing the data representation at There are certain features of relations that distinguish relations from a
the next higher level. In network model, Data Manipulation Language file or a table.
(DML) is used for searching and retrieving records from the database. The various features of relations are:
Network model uses two types of data structures: records and set type  Ordering of Tuples
to define the data and relationship among data. Records can be defined  Ordering of Attributes
as a set of field values which are used to provide information about an
 Interpretation of a Relation
entity. An entity is a collection of object in a database which can be
Ordering of Tuples
described by using a set of attributes. Records that have a same type
In a relation, tuples are not defined in any particular order. Two tables
can be easily grouped together to form arecord type and assigned a
are same if they contain same attributes and tuples but the order of
name. The structure of a record type can be defined by using a
tuple differs.
Interpretation of a Relation
You can interpret a relation in relational data model as a type of  DBMS utility module reorganizes a database file into
assertion and declaration. Consider the relation student listed in Table different file organization to improve performance.
5.6. Student relation contains various attributes such as name, SSN and  DBMS provides status information to the application
phone number. Each tuple in the relation is an instance of assertion. program regarding record found or not found status.
First tuple asserts the fact that John Bayer is a student whose SSN is  DBMS may be available for sorting files, handling data
678-54, age is 19, city is Paris, GPA is 4.9 and phone number is 373-654. compression, monitoring access by user and provide statistics
Thus, interpretation of relation provides some facts. to the DBA.
4.Object-Oriented Model
The Object-Oriented (OO) data model consists of a collection of entities. COMPONENTS OF DBMS
Entity refers to the concept or object described in a database and is The important component of DBMS is DBMS languages i.e. data
represented as a class in the object-oriented data model. The instances definition language and data manipulation language which allows user
of a class are called objects. Attribute provides additional information to to define, construct and manipulate a database.
describe an entity. The attributes of a class help distinguish an object
from another object in a class. DBMS Languages
For example, in an Employee database, employee is an entity and For defining each level or component of the database i.e. internal level,
employee name, salary and ID are the attributes of an employee entity. conceptual level and external level, DBMS provides languages and these
Relationship describes the interaction between the various entities in a are:-
database.  Data Definition Language (DDL): It is used by the database
Consider an employee database that can be represented in 00 data designers or application programmer to specify the content
model as follows: and structure (conceptual view) of the database. DDL is used
• Class :Employee to define the physical characteristics of each record i.e. the
• Attributes: Employee_name,Employee_code, Employee_salary, logical name of the fields, their data types and size. DDL
• Behaviour: Works for manager performs the following functions:
The OO data model consists of: DDL is used by DBA and by database designer to define
 Object: It represents a real world entity. conceptual and internal schema.
 Attributes and methods: It represents the set of values for DDL specifies the fields in each record and the record's logical
the attributes of the object and set of methods to operate on name.
the attributes of the object. o It specifies the data type and name of each field.
 Class: It is a group of all the objects that share the same set o It defines the structure and format of the data.
of attributes and methods. o It provides data independence at logical and
 Class hierarchy and inheritance: It represents derivation of a physical level.
new class from an existing class which is called superclass. o It specifies and provides the means to establish
The new class is called subclass and it inherits all the relationship among various records.
attributes and methods of the existing class. In addition, it o It identifies the records by unique data item
also consists of additional attributes and methods of the known as KEY.
class. o It sets up data security access and change/update
restrictions.
 Data Manipulation Language (DML): The database has to be
27. What is mean by Database anomalies? accessed by various users for typical manipulations such as
23. What is Database Management System? What are its basic retrieval, insertion, deletion and modification of the data.
components? Name the different categories of database users The DBMS provides a Data Manipulation Language (DML)
explaining. such as SQL for this purpose.
WHAT IS DATABASE MANAGEMENT SYSTEM (DBMS) ? The summary of functions and features of DML/SQL are
A database management system is a collection of programs that enables following:
users to create and maintain a database. Defining a database involves o SQL - Structured Query Language is data
specifying the data types, structures, and constraints for the data to be manipulation language used in querying, updating
stored in a database. Constructing the database is the process of storing and managing relational databases. It is English
the data itself on some storage medium that is controlled by the DBMS. like command such as SELECT ... FROM ....
Manipulating a database includes some functions as querying the data o WHERE. SQL is simple English like language.
base to retrieve specific data, updating the database to reflect changes o DML/SQL allows user to perform typical
in the mini world, and generating reports from the data. manipulations that include retrieval, insertion,
A DBMS may typically perform the following functions: deletion and modification of data.
 It loads the existing data files, text files or sequential files into o It is a comprehensive integrated language.
the data base as per desired database structure. o DML statements can be entered interactively from
 The database and DBMS catalogue are usually stored on disk. a terminal or can be embedded in a general
Thus, the module of the DBMS controls access to information purpose programming language, such as COBOL,
stored on disk. It also handles the data transfers in the main PL/I and C++. Thus it provides, independence of
memory from secondary storage. programming language.
 When a command coded in data manipulation language o It allows to retrieve many records.
reaches to run time database processor, then control passes o It provides user-friendly interface for end users.
from application program to the DBMS. The control unit of o It provides record relationship.
CPU causes each instruction of the application program to be o Its syntax is easy that it can be used by non-
executed in sequence. programmers
 The query it receives may be retrieval or update operations ADVANTAGES OF DATABASE APPROACH USING DBMS
to be carried out on to the database. It parses, analyzes and  Standards can be enforced: In a centralized database
compiles or interprets a query by creating database access environment, industry, State, country standards can be
code and executes that code. enforced more easily than in an environment
 DBMS requests operating system to schedule Input/output  Development time of an application may be reduced:
operations. Designing and implementing a new database may take more
 DBMS interacts with operating system when disk access to time but once the database is set up and running, then
the database or to the catalogue. DBMS also interfaces with developing any new application using DBMS requires 1/ 6th
compilers for general purpose host programming language. time of the traditional file processing system.
 DBMS backup utility module creates backup copy of the  Flexible: DBMS allows changes to the structure if required, of
database that can be used to restore the database in case of the database affecting the stored data and existing
catastrophic failure. application.
 Availability of currently updated information: In transaction  Ownership problem: In file based system, programmer/user
processing applications such as reservation system or is the owner of the data and program whereas database
banking database, it is essentially required to retrieve the consisting of such files is owned by entire company. For any
information which is most currently updated. Moreover, the change or read or insertion of data in the database, user
information or data may be updated just by one user needs to seek permission from managers of the company.
according to the priority of the request. For a database to be successful the database must be viewed
 Reduces overall cost: The DBMS approach reduces the and updated as a corporate resource, not as individual
wasteful overlap of activity of data processing personnel in resource.
different departments. This reduces the overall cost of  Concurrency problem: Several problems can occur when
operation and management as well. concurrent transactions execute in an uncontrolled manner.
 Redundancy can be controlled: Being central control over There may be lost update problem when two transactions
data removes, duplication of data also reduces the that access the same database items have their operations
application of effort of recording and so is the updating of inter-leaved in a way that makes the value of some database
data. Secondly, saving of the storage space and thirdly, item incorrect.
inconsistency of the data may be avoided using database
approach.
 Unauthorized access may be restricted: Database is used 19. How are parallel databases different from distributed
when multiple users share the database. Financial data is databases?
considered to be confidentialThus; only authorized user is TYPES OF DATABASE
permitted to make changes in the existing database, whereas Nowadays, there also exist three new types of databases: parallel
other user category is allowed only to retrieve the database. database, distributed database and object-oriented databases.
This modern DBMS provides a security and authorization 1) Parallel Database
system for each class of user. Parallel database architecture follows parallel dataflow architecture
 Provide multiple user interface and support 4GL (or non- with new designs used for high speed of database while processing
procedural language) for manipulation of data: DBMS relational database queries. In parallel database systems, the relational
provides a variety of user interfaces. The most common is data model is used; for parallel dataflow, relational queries and various
graphical user interface (GUI). In addition to this users do not relational operators, which are composed of parallel dataflow graphs,
have to learn programming techniques to access the are used. Parallel database supports the concept of pipe lined and
database. The DBMS supports non-procedural language such partitioned parallelism. When the output of one operator is used as the
as SQL or QBE to access the database. input of the other operator, then the two operators can work in a series
 Support multiple files and complex relationship among data: which it turn is called pipe lined parallelism. When the input data are
DBMS generally has the capability to represent a variety of partitioned among multiple processors and memories, then this
complex relationships among data (As Database is an partitioned data and execution is known as partitioned parallelism.
integration of number of files), which may be retrieved and Following are the advantages of parallel database:
updated efficiently.  Higher performance: Higher speedup and scale up can be
 Database can maintain Integrity: A DBMS generally possess attained with CPU availability. Synchronization activities
the capability for defining and enforcing the constraints improve the performance in which lock operation is a
(restrictions) that must hold for the data that results to the processor and message intensive.
correctness and accuracy of data. For example, a student  High availability: In the parallel database, nodes, which are
database contains inform action about marks scored by a also called terminals, are apart from each other so the entire
student in an examination, the maximum marks are 100 and system will not get down if the failure occurs. System
a student cannot score more than 100. continues to provide data access to the users when the
 Integrity constraints can be specified by the user while surviving nodes recover the failed node. The availability of
designing the system, so that database will accept numbers data, even if there is a node failure, shows higher database
only in the range of a to 100. availability.
 Provision of backup and recovery system: If there is any  Greater flexibility: There is more flexibility in parallel
failure of hardware or software, then DBMS provides the database, as you can allocate or deallocate instances as per
facility of recovery by maintaining its regular backup. your requirements. You can allocate more instances as the
Moreover, it also ensures that program may be resumed database demand increases. Once the instances are no
from the point at which it was interrupted. longer required, they can be deallocated.
LIMITATIONS OF DATABASES  More users: Parallel database technology makes it possible to
 Overhead Cost: when very large data need to be managed in enable a single system to serve thousands of users
largescale organization, then database approach is simultaneously.
motivated. This also requires a powerful hardware platform
and software for database management, which are quite 2) DDB
expensive. Another cost incurred will be hiring of system DDB is a collection of multiple interrelated databases that are spread
analyst, database designers, database administrators, over a computer network. Each computer contains its own database
programmers and data processing personnel’s and cost of which is managed by an individual database management system. A
training. This means to adopt this approach, a significant Distributed DBMS (DDBMS) manages DDBs and makes the distribution
extra cost has to be borne by the organization. transparent to the user so that the user is not aware of the distribution
 Security problem: Another disadvantage of this approach is and accesses the data as they are stored at one place. The applications
that sharing of data also carries the risk of the data being that use the data, which are distributed across different sites, operates
accessed by unauthorized user. Thus, the organization needs from a logical point of view, i.e., the application is not aware of the fact
to cope up this problem by taking security measures, that the data are stored at different places and executes as if all data are
concurrency control, recovery and integrity. managed by a single DBMS.
 Problem of Resources: In order to run on-line, real time Some of the advantages of DDBs are as follows:
system to answer on-line queries requires large amount of  Increased reliability and availability: Reliability is a measure
data to be stored. As a result more terminals may be needed of the possibility that a system is running at a given time
to put managers and other users on-line. Communication point. On the other hand, availability is a measure of the
devices are also required to connect extra terminals to the possibility that the system is continuously serving the queries
database. It may require resources such as multiprocessor made to it during a time interval. When you use DDBs, which
system and software to run a DBMS. Therefore, DBMS may are spread over several sites, one site may fail but other sites
require extra computing resources depending upon the continue to function normally. Only the data and software
application. that resides on the failed site cannot be accessed without
affecting the performance of other sites in the distributed The database system architecture possesses three level architecture,
database. This improves both reliability and availability. these are:
 Improved performance: A distributed DBMS fragments the  The internal level: This describes the physical storage
database and keeps the data closer to the site where it is structure of the database along with the details of data
required most. As a large database is fragmented and storage and access paths for the database.
distributed over many sites, this leads to smaller databases at  The conceptual level: The conceptual level gives the
each site. The queries and transactions accessing data at complete structure of the whole of the database for all users.
smaller databases have a better performance. In addition, In this description, physical storage structure is hidden, but
when the database is fragmented into smaller databases, emphasis is more on describing entries, data types,
each site has less overhead of transaction in the execution of relationships, user operations, and constraints. Data-mode
a query. implementation takes place at this level.
 The external level: At this level, user views part of the
3) Object-Oriented Database database as per the access rights given to the user.
Object-oriented databases were designed to meet the needs of the
complex application. The object-oriented databases give the designer
the capability to create the structure of complex objects and the
operations which are applied to these objects. The other reason for the
creation of the object-oriented databases is the use of object-oriented
programming languages such as C++ or java. The object-oriented
database provides support to these languages. Some of the object-
oriented databases are ORION systems, IRIS systems and ODE systems.
Object-oriented database vendors proposed a standard called as ODMG
standard which has the standard model and its language was
recognized.

Roles Performed in DBMS


In DBMS, several people play important roles in organizing and
manipulating the data. These roles are assigned to people according to
the work performed by them in creating and maintaining the DBMS. The
various roles performed in DBMS are:
i. Database administrator
ii. Database designers •
iii. Database users
iv. Database manager

i. Database administrator
DBA is responsible for making the strategy and policy decisions
regarding the organization of data in the database. DBA also provides
technical support in implementing the decisions which are taken by the
data administrator. DBA performs the following functions:
 Defining the conceptual schema for a database
 Defining the internal schema for a database
 Coordinating with users
 Defining security and integrity constraints for the
database
 Defining dump and reload policies for a database
 Monitoring performance and responding to
changing requirements
ii. Database designers
A database designer identifies the data to be stored in a database. The
database designer is also responsible for choosing the right database
structure to represent and store the data in the database. The tasks of
identifying the data and choosing the structure are performed before
the implementation of a database. The database designer
communicates with the various database users to understand their
requirements before selecting the database structure.
iii. Database users
The database users are the people who need to interact with DBMS. The
database users can be categorized according to their requirements of
data. The people who interact with DBMS to retrieve data are called the
naive users and the people who interact with DBMS to make some
changes in the database are called the developers.
iv. Database manager
The database manager refers to the software that helps use and
management of the data stored in a database. The database manager
handles the requests of database users to access the data items from
database. The database manager also provides facilities such as support
for a query language, to retrieve and update the database. The facilities
provided by the database manager depend on the design of the
database manager. For example, if the data manager is designed to
handle one request at a time, then multiple users cannot access data
simultaneously.

DATABASE SYSTEM ARCHITECTURE

You might also like