You are on page 1of 223

Foundations of Information

Systems in Business
2
Foundation Concepts
Why study information systems and information
technology?
Vital component of successful businesses
Helps businesses expand and compete
Improves efficiency and effectiveness of
business processes
Facilitates managerial decision making and
workgroup collaboration
3
What is a System?
A set of interrelated components
With a clearly defined boundary
Working together
To achieve a common set of objectives
4
What is an Information System?
An organized combination of
People
Hardware and software
Communication networks
Data resources
Policies and procedures
This system
Stores, retrieves, transforms, and
disseminates information in an organization
5
Information Technologies
Information Systems
All the components and resources necessary
to deliver information and functions to the
organization
Could be paper based
Information Technologies
Hardware, software, networking, data
management
Our focus will be on computer-based information
systems (CBIS)
6
Fundamental Roles of IS in
Business
7
Trends in Information Systems
8
Types of Information Systems
Operations Support Systems
Efficiently process business transactions
Control industrial processes
Support communication and collaboration
Update corporate databases
Management Support Systems
Provide information as reports and displays
Give direct computer support to managers
during decision-making

9
Purposes of Information Systems
10
Operations Support Systems
What do they do?
Efficiently process business transactions
Control industrial processes
Support communications and collaboration
Update corporate databases
11
Types of OSS
Transaction Processing Systems
Record and process business transactions
Example: sales processing, inventory systems,
accounting systems
Process Control Systems
Monitor and control physical processes
Example: using sensors to monitor chemical
processes in a petroleum refinery
Enterprise Collaboration Systems
Enhance team and workgroup communication
Example: email, video conferencing
12
Two Ways to Process Transactions
Batch Processing
Accumulate transactions over time and
process periodically
Example: a bank processes all checks
received in a batch at night
Online Processing
Process transactions immediately
Example: a bank processes an ATM
withdrawal immediately
13
Management Support Systems
What do they do?
Provide information and support for effective
decision making by managers
Management information systems
Decision support systems
Executive information systems
14
Types of Management Support Systems
Management Information Systems (MIS)
Reports and displays
Example: daily sales analysis reports
Decision Support Systems (DSS)
Interactive and ad hoc support
Example: a what-if analysis to determine where
to spend advertising dollars
Executive Information Systems (EIS)
Critical information for executives and
managers
Example: easy access to actions of competitors
15
Other Information Systems
Expert Systems - provide expert advice
Example: credit application advisor
Knowledge Management Systems - support creation,
organization, and dissemination of business knowledge
throughout company
Example: intranet access to best business practices
Strategic Information Systems - help get a strategic
advantage over customer
Example: shipment tracking, e-commerce Web
systems
Functional Business Systems - focus on operational and
managerial applications of basic business functions
Example: accounting, finance, or marketing
16
System Concepts: A Foundation
System concepts help us understand
Technology: hardware, software, data
management, telecommunications networks
Applications: to support inter-connected
information systems
Development: developing ways to use
information technology includes designing the
basic components of information systems
Management: emphasizes the quality,
strategic business value, and security of an
organizations information systems
17
What is a System?
A system is
A set of interrelated components
With a clearly defined boundary
Working together
To achieve a common set of objectives
By accepting inputs and producing outputs
In an organized transformation process
18
Basic Functions of a System
Input
Capturing and assembling elements that enter
the system to be processed
Processing
Transformation process that converts input
into output
Output
Transferring transformed elements to their
ultimate destination
19
Cybernetic System
All systems have input, processing, and output
A cybernetic system, a self-monitoring, self-
regulating system, adds feedback and control:
Feedback is data about the performance of a
system
Control involves monitoring and evaluating
feedback to determine whether a system is moving
toward the achievement of its goal
20
A Business as a System
21
Other System Characteristics
If a system is one of the components of a larger
system, it is a subsystem
The larger system is an environment
Several systems may share the same
environment
Some may be connected via a shared
boundary, or interface
Types of systems
Open
Adaptive
22
Components of an IS
23
Information System Resources
People Resources
Specialists
End users
Hardware Resources
Machines
Media
Software Resources
Programs
Procedures
Data Resources
Product descriptions, customer records, employee files,
inventory databases
Network Resources
Communications media, communications processors, network
access and control software
Information Resources
Management reports and business documents using text and
graphics displays, audio responses, and paper forms
24
Data Versus Information
Data are raw facts about physical phenomena or
business transactions
Information is data that has been converted into
meaningful and useful context for end users
Example:
Sales data is names, quantities, and dollar
amounts
Sales information is amount of sales by
product type, sales territory, or salesperson
25
IS Activities
Input of data resources
Data entry activities
Processing of data into information
Calculations, comparisons, sorting, and so on
Output of information products
Messages, reports, forms, graphic images
Storage of data resources
Data elements and databases
Control of system performance
Monitoring and evaluating feedback
26
Recognizing IS
Business professionals should be able to look at
an information system and identify
The people, hardware, software, data, and
network resources they use
The type of information products they produce
The way they perform input, processing,
output, storage, and control activities
Computer Hardware
28
Pre-Computer Calculations
Counting on fingers and toes
Stone or bead abacus
Calculate comes from calculus, the Latin word
for stone
1642: first mechanical adding machine
Invented by Blaise Pascal
Wheels moved counters
Modified in 1674 by Von Leibnitz
Age of industrialization
Mechanical loomed used punch cards
29
Early Computing
19th Century
Charles Babbage proposed the Analytical
Engine, which could calculate, store values in
memory, perform logical comparisons
Never built because of lack of electronics
1880s
Holleriths punched cards used to record
census data using On/Off patterns
The holes turned sensors On or Off when run
through tabulating machine
This company became the foundation for IBM
30
Electronic Computers
1946 - First Generation Computer
ENIAC
Programmable
5000 calculations per second
Used vacuum tubes
Drawbacks were size and processing ability
1950s
ENIAC replaced by UNIVAC 1, then the
IBM 704
Calculations jumped to 100,000 per second
31
Waves of Computing
Late 1950s - Second Generation
Transistors replaced vacuum tubes
200,000 to 250,000 calculations per second
Mid-1960s - Third Generation
Integrated circuitry and miniaturization
1971 - Fourth Generation
Further miniaturization
Multiprogramming and virtual storage
1980s - Fifth Generation
Millions of calculations per second
32
Microcomputers
1975
ALTAIR flicking switches
1977
Commodore and Radio Shack produce
personal computers
1979
Apple computer, the fastest selling PC thus far
1982
IBM introduced the PC, which changed the
market
33
Categories of Computer
Systems
34
Microcomputer Systems
Usually called a personal computer or PC
Computing power now exceeds that of the
mainframes of previous generations
Relatively inexpensive
Are the networked professional workstations
used by business processions
Versions include hand-held, notebook, laptop,
tablet, portable, desktop, and floor-standing
35
Recommended PC Features
Business Pro Multimedia Heavy Newcomer
2-3 GHz processor Mac G4 or 2-3 GHz
Intel processor
1-2 GHz Celeron
processor
512MB RAM 512MB RAM 256MB RAM
80GB hard drive 120GB+ hard drive 40GB hard drive
18-inch flat-panel
display
18-inch or larger CRT,
flat-panel LCD, or
plasma display
17-inch CRT or 15-inch
flat panel LCD

CD-RW/DVD drive or
portable hard drives for
backup
CD-RW/DVD+RW
drive
CD-RW/DVD drive
Network interface card
(NIC)
High-end color printer Internal, 56K modem

Basic speaker system Deluxe speaker system Basic inkjet printer
36
Microcomputer Uses
Workstations
Supports have mathematical computer and
graphics display demands
CAD, investment and portfolio analysis
Network Servers
More powerful than workstations
Coordinates telecommunications and resource
sharing
Supports small networks and Internet or
intranet websites
37
Corporate PC Criteria
Solid performance at a reasonable price
Operating system ready
Connectivity
Network interface cards
or wireless capabilities
38
Information Appliances
Hand-held microcomputer devices
Known as personal digital assistants (PDAs)
Web-enabled PDAs use touch screens,
handwriting recognition, or keypads
Mobile workers use to access email or the Web,
exchange data with desktop PCs or servers
Latest entrant is the BlackBerry
PDAs include
Video-game consoles
Cellular and PCS phones
Telephone-based home email appliances
39
Midrange Systems
High-end network servers that handle large-scale
processing of business applications
Not as powerful as mainframes
Less expensive to buy, operate, and maintain
Often used to manage
Large Internet websites
Corporate intranets and extranets
Integrated, enterprise-wide applications
Used as front-end servers to assist mainframes
with telecommunications and networks
40
Mainframe Computer Systems
Large, fast, powerful computer systems
Large primary storage capacity
High transaction processing
Handles complex computations
Widely used as superservers for
Large client/server networks
High-volume Internet websites
Becoming a popular computing platform for
Data mining and warehousing
Electronic commerce applications
41
Supercomputer Systems
Extremely powerful systems designed for
Scientific, engineering, and business applications
Massive numeric computations
Markets include
Government research agencies
Large universities
Major corporations
Uses parallel processing
Billions to trillions of operations per second
(gigaflops and teraflops)
Costs $5 to $50 million
42
Computer System Concept
A system of hardware devices organized by
function
Input
Keyboards, touch screens, pens,
electronic mice, optical scanners
Converts data into electronic form for entry
into computer system
Processing
Central Processing Unit (CPU)
CPU subunits: arithmetic-logic and control
unit
43
Computer System Concept
Output
Video display units, printers, audio response
units,
and so on
Converts electronic information into human-
intelligible form
Storage
Primary storage (memory)
Secondary storage (disk drives)
Control
CPU controls other components of the system
44
Computer System Concept
45
Peripherals
Peripheral is a generic name for all input, output,
and secondary storage devices
Parts of the computer system, but not the CPU
Are all online devices
Online devices
Separate from the CPU, but electronically
connected to and controlled by it
Offline devices
Separate from and not under the control of the
CPU
46
Peripherals Advice
47
Input Technologies
Keyboard - Still most widely used input device
Graphical User Interface (GUI) - Icons, menus,
windows, buttons, bars; Selected with pointing
devices
Electronic Mouse - Most popular pointing device;
Pressing mouse buttons initiates activity
represented by the icon selected
Trackball - Stationary device, similar to mouse;
Roller ball moves cursor on screen
Pointing Stick - Small eraser-head device
embedded in keyboard; Cursor moves in the
direction of the pressure placed on the stick
48
Input Technologies
Touchpad
Small, rectangular, touch-sensitive surface
Usually on keyboard
Cursor moves in direction your finger moves
Touch Screen
Use computer by touching screen Screen emits
a grid of infrared beams, sound waves, or
electric current
Grid is broken when screen is touched
49
Pen-Based Computing
Used in Tablet PCs and PDAs
Pressure-sensitive layer, similar
to touch screen, under liquid
crystal display screen
Software digitizes handwriting,
hand printing, and hand drawing
50
Speech Recognition Systems
Speech be the future of data entry
Easiest, most natural means of human communication
Recognizing speech patterns
Discrete required pauses between each word
Continuous speech recognition software (CSR) recognized
continuous, conversationally paced speech
Speech recognition systems digitize, analyze, and classify
speech and sound patterns
Compares to a database of sound patterns in its vocabulary
Passes recognized words to the application software
Typically requires voice recognition training
Speaker-independent voice recognition systems
Allows computer to recognize words from a voice it has never
heard before
Typically used in voice-messaging computers
51
Optical Scanning
Devices read text or graphics and convert them into digital input
for a computers
Enables direct entry of data from source documents
A document management library system
Scans documents, then organizes and stores them for easy
reference or retrieval
Scanners
Compact desktop models are popular for low cost and ease of
use
Larger, more expensive flatbed scanners are faster and
provide high-resolution color scanning
Optical Character Recognition (OCR)
Software that reads characters and codes
Used to real merchandise tags, sort mail, score tests
Optical scanning wands read bar codes
52
Other Input Technologies
Magnetic Stripe
Reads the magnetic stripe on credit cards
Smart Cards
Microprocessor chip and memory on credit card
Use more in Europe than in the U.S.
Digital Cameras
Allows you to shoot, store, and download photos or full-
motion video with audio into the PC
Images and audio can then be edited or enhanced
Magnetic Ink Character Recognition (MICR)
Used by banks to magnetically read checks and deposit
slips
Requires an iron oxide-based ink
Reader-sorter equipment magnetizes the ink, then passes
it under a reading head to sense the signal
53
Output Technologies
Video Displays
Cathode-ray tube (CRT)
Liquid crystal displays (LCDs)
Active matrix and dual scan
Plasma displays
Used in large TVs and flat-panel monitors
Printed Output
Inkjet printers spray ink on a page
Laser printers use an electrostatic process
similar to a photocopying machine
54
Storage Tradeoffs
55
Computer Storage Fundamentals
Uses a two-state or binary representation of data
On or Off
On represents the number 1
Off represents the number 0
Data are processed and stored in computer
systems through the presence or absence of
On/Off signals
56
Bit and Byte
Bit
Short for binary digit
Smallest element of data
Either zero or one
Byte
Group of eight bits, which operate as a single
unit
Represents one character or number
57
Representing Characters in Bytes

58
Using Binary Code to Calculate
59
Storage Capacity Measurement
Kilobyte (KB): one thousand bytes
Megabyte (MB): one million bytes
Gigabyte (GB): one billions bytes
Terabyte (TB): one trillion bytes
Petabyte (PB): one quadrillion bytes
60
Direct and Sequential Access
Direct or Random Access
Directly store and retrieve data
Each storage position has a unique address and can be
accessed in the same length of time
Semiconductor memory chips, magnetic disks
Sequential Access
Data is stored and retrieved sequentially
Must be accessed in sequence by searching through prior
data
Magnetic tape
61
Semiconductor Memory
Microelectronic semiconductor memory chips
are used for primary storage
Advantages: small size, fast, shock and
temperature resistance
Disadvantages: volatility; must have
uninterrupted electric power or loses memory
62
Types of Semiconductor Memory
Random Access Memory (RAM)
Most widely used primary storage medium
Volatile memory
Read/write memory
Read-Only Memory (ROM)
Permanent storage
Can be read, but not overwritten
Frequently used programs burnt into chips
during manufacturing process
Called firmware
63
Flash Drives
Sometimes referred to as a jump drive
Uses a small chips containing
thousands of transistors
Can store data for virtually
unlimited periods without power
Easily transported and highly
durable
Storage capacity of up to 1 GB
Plugs into any USB port
64
Magnetic Disks
Used for secondary storage
Fast access and high capacity
Reasonable cost
Types of Magnetic Disks
Floppy Disks (diskettes)
Magnetic disk inside a plastic jacket
Hard Disk Drives (hard drives)
Magnetic disk, access arms, and read/write heads in
sealed module for stable environment
Fixed or removable
Capacity from several hundred MBs to
hundreds of GBs
65
RAID Storage
Redundant Arrays of Independent Disks
Disk arrays of hard disk drives
Provides virtually unlimited online storage
Combines from 6 to more than 100 small hard
disk drives into a single unit
Data are accessed in parallel over multiple
paths from many disks
Redundant storage of data on several disks
provides fault-tolerant capacity
Storage area networks can interconnect many
RAID units
66
Magnetic Tape
Secondary storage
Tape reels, cassettes, and cartridges
Used in robotic, automated drive assemblies
Archival and backup storage
Lower-cost storage solution
67
Optical Disks
68
Uses of Optical Disks
Image processing
Long-term storage of historical image files
Storage of scanned documents
Publishing medium
Allows fast access to reference materials
Catalogs, directories, and so on
Interactive multimedia applications
Video games, educational videos, and so on
69
Radio Frequency Identification (RFID)
One of the newest and fastest growing storage
technologies
System for tagging and identifying mobile
objects
Used with store merchandise, postal packages,
casino chips, pets
Special reader allows objects to be tracked as
they move from place to place
Chips half the size of a grain of sand
Passive chips derive power from reader signal
Active chips are self-powered
70
RFID Versus Bar Coding
RFID
Scans from greater distance
Can store data
Allows more information to be tracked
Privacy concerns
Invisible nature of the system
Capacity to transmit fairly sophisticated
messages
Computer Software
Chapter 4 Computer Software 72
Types of Application & System
Software
Chapter 4 Computer Software 73
Application Software
General Purpose
Programs that perform common information processing
jobs for end users; e.g., word processing, spreadsheet
Also call productivity packages
Custom Software
Software applications developed within an organization for
use by that organization
Commercial Off-the-Shelf (COTS)
Many copies sold
Minimal changes beyond scheduled upgrades
Purchasers have no control over specifications, schedule,
or evolution, and no access to source code or internal
documentation
Product vendor retains the intellectual property rights of
the software

Chapter 4 Computer Software 74
Application Software
Open-source Software
Developers collaborate on the development of an
application using programming standards which allow
anyone to contribute to the software
As each developer completes a project, the application
code becomes available and free to anyone who wants it
Chapter 4 Computer Software 75
Business Application Software
Function-Specific Application Software
Thousands of these packages support
specific applications of end users
Examples: customer relationship
management, enterprise resource planning,
supply chain management, Web-enabled
electronic commerce
Chapter 4 Computer Software 76
Software Suites, Integrated
Packages
Most widely used productivity packages
are bundled together as software suites
Advantages
Cost less than buying individual packages
All have similar GUI
Work well together
Disadvantages
All features not used
Takes a lot of disk space (bloatware)
Chapter 4 Computer Software 77
Components of Top Software
Suites
Chapter 4 Computer Software 78
Integrated Packages
Integrated packages combine the
functions of several programs into one
package
E.g., Microsoft Works, AppleWorks
Advantages
Many functions for lower price
Uses less disk space
Frequently pre-installed on microcomputers
Disadvantages
Limited functionality
Chapter 4 Computer Software 79
Web Browsers
Software applications that support
navigation through the point-and-click
hyper-linked resources of the Web
Becoming the universal platform from
which end users launch
Information searches
E-mail
Multimedia file transfer
Discussion groups
Other Internet-based applications
Chapter 4 Computer Software 80
Search Engines
Browsers are used to gain access to
Internet search engines
Google, Ask Jeeves, Look Smart, Lycos,
Overture, Yahoo!
Using search engines to find information
has become an indispensable part of
Internet, intranet, and extranet applications
Chapter 4 Computer Software 81
E-mail, Instant Messaging, and
Weblogs
E-mail
Software to communicate by sending and
receiving messages and attachments via the
Internet, intranet, or extranet
Instant messaging (IM)
Receive electronic messages instantly
Weblog or blog
A personal website in dated log format
Updated with new information about a subject
or range of subjects
Chapter 4 Computer Software 82
Word Processing/Desktop
Publishing
Word Processing
Create, edit, revise, and print documents
Example: Microsoft Word, Lotus WordPro,
Corel WordPerfect
Desktop Publishing
Produce printed materials that look
professionally published
Example: Adobe PageMaker, Microsoft
Publisher, QuarkXPress
Chapter 4 Computer Software 83
Electronic Spreadsheets
Used by virtually every business for
Analysis, planning, modeling
Electronic Spreadsheet
Worksheet of rows and columns
Can be stored on local computer or on
network
Requires designing format and developing the
relationships (formulas)
Most help you develop charts and graphic
displays of spreadsheet results
Supports what-if questions
Chapter 4 Computer Software 84
Presentation Graphics
Common presentation graphics
packages
Converts numeric data into graphics displays
Used to create multimedia presentations of
graphics, photos, animation, and video clips
E.g., Microsoft PowerPoint, Lotus Freelance,
Corel Presentations
Top packages can tailor files for transfer in
HTML format to websites

Chapter 4 Computer Software 85
Personal Information Managers
Software for end user productivity and
collaboration
Stores information about clients
Manages schedules, appointments, tasks
Most include ability to access the Web and
provide e-mail capabilities
Some support team collaboration by sharing
information with other PIM users
Example: Lotus Organizer, Microsoft Outlook
Chapter 4 Computer Software 86
Groupware
Software that helps workgroups
collaborate on group assignments
E-mail, discussion groups, databases, video
conferencing
Example: Lotus Notes, Novell GroupWise,
Microsoft Exchange
Windows SharePoint Services and
WebSphere both allow teams to create
websites for information sharing and
document collaboration
Chapter 4 Computer Software 87
Software Alternatives
Outsourcing development and
maintenance of software
Application service providers (ASPs)
Companies that own, operate, and maintain
application software and computer system
resources
Use the application for a fee over the Internet
Pay-as-you-go
Use expected to accelerate in the coming
years
Chapter 4 Computer Software 88
Software Licensing
All COTS and ASP software is licensed
Involves the underlying..
Intellectual property rights
Copyright
Trademark
Trade secrets
Also involves traditional contract law, including
Uniform Commercial Code (UCC)
You dont buy software
You buy a license to use the software
Licensed to protect the vendors property rights
Chapter 4 Computer Software 89
Categories of Group Software
System Management Programs
Manages the hardware, software, network,
and data resources of computer systems
Example: operating systems, network manage-
ment programs, database management
systems, system utilities
System Development Programs
Helps users develop IS programs and
procedures and then prepare them for
processing
Includes language translators and editors,
CASE and programming tools
Chapter 4 Computer Software 90
Interface Between End Users and
Computer
Chapter 4 Computer Software 91
Operating Systems
Integrated system of programs that
Manages the operations of the CPU
Controls the input/output, storage resources,
and activities of the computer system
Provides support services as the computer
executes application programs
The operating system must be loaded and
activated before other tasks can be
accomplished
Chapter 4 Computer Software 92
Operating System Basic
Functions
Chapter 4 Computer Software 93
User Interface
The part of the operating system that
allows you to communicate with it
Three main types
Command-driven
Menu-driven
Graphical user interfaces (GUI)
Chapter 4 Computer Software 94
Resource Management
Part of the operating system that manages
the hardware and networking resources of
a computer system
Includes CPU, memory, secondary storage
devices, telecommunications, and
input/output peripherals
Common functions
Keeping track of where data and programs
are stored
Subdividing memory; providing virtual
memory capability
Chapter 4 Computer Software 95
File Management
Part of the operating system that controls
the creation, deletion, and access of files
and programs
Keeps track of physical location on storage
devices
Maintains directories of information about the
location and characteristics of stored files
Chapter 4 Computer Software 96
Task Management
Part of the operating system that manages
the accomplishment of end user
computing tasks
Controls which task gets access to the CPU,
and for how long
Can interrupt the CPU at any time to
substitute a higher priority task
Supports preemptive and cooperative multi-
tasking and multi-processing
Chapter 4 Computer Software 97
Popular Operating Systems
Windows
GUI, multitasking, networking, multimedia
Microsofts operating system
NT, XP, 2003
Different versions manage servers
Unix
Multitasking, multi-user, network-managing
Portable - can run on mainframes, midrange,
and PCs
Linux
Low-cost, powerful reliable Unix-like
operating system
Open-source
MAC OS X
Apple operating system for the iMac
GUI
Multitasking
Multimedia
Chapter 4 Computer Software 98
Open-Source Licensing
Characteristics
The Program
Must include source code and allow distribution in
source code as well as compiled form
The License
Shall not restrict any party from selling or giving
away the software as a component of an
aggregate software distribution containing
programs from several sources
Must allow modifications and derived works, and
must allow them to be distributed under the same
terms as the license of the original software
Chapter 4 Computer Software 99
Open-Source Licensing
Characteristics
The License (contd)
Must allow modifications and derived works and
allow them to be distributed under the same
terms as the license of the original software
May restrict source code from being distributed in
modified form only if the license allows the
distribution of patch files with the source code
for the purpose of modifying the program at build
time
Must not discriminate against any person or any
group of persons
Chapter 4 Computer Software 100
Open-Source Licensing
Characteristics
The License (contd)
Must not restrict anyone from making use of the
program in a specific field of endeavor
The rights attached to the program must apply to
all to whom the program is redistributed, without
the need for execution of an additional license
Must not be specific to a product
Must not contaminate other software by placing
restrictions on any software distributed along with
the licensed software
Chapter 4 Computer Software 101
Other System Management
Programs
Chapter 4 Computer Software 102
Other System Software
Utilities
Miscellaneous housekeeping functions
Example: Norton utilities includes data
backup, virus protection, data compression,
etc.
Performance Monitors
Programs that monitor and adjust computer
system to keep them running efficiently
Security Monitors
Monitor and control use of computer systems
to prevent unauthorized use of resources
Chapter 4 Computer Software 103
Application Servers
Provide an interface between an operating
system and the application programs of
users
Middleware
Software that helps diverse software
applications exchange data and work together
more efficiently
Chapter 4 Computer Software 104
Programming Languages
Examples of programming in each
language
Chapter 4 Computer Software 105
Machine Languages
First generation languages
The most basic of programming languages
Strings of binary codes unique to each
computer
Requires specific knowledge of the internal
operations of the CPU being used
Must specify the storage locations for every
instruction and item of data used
Difficult to work with, and error prone
Chapter 4 Computer Software 106
Assembler Languages
Second generation languages
Developed to reduce difficulties in writing
machine language programs
Uses assemblers to convert the programs into
machine instructions
Symbols are used to represent operation
codes and storage locations
Alphabetic abbreviations call mnemonics and
other symbols represent operation codes,
storage locations, and data elements
Chapter 4 Computer Software 107
High-Level Languages
Third generation languages
Uses brief statements or arithmetic
expressions
Statements translated into machine language
by compilers or interpreters
Less efficient than assembler languages and
requires greater translation time
Machine independent
Example: BASIC, COBOL, and FORTRAN
Chapter 4 Computer Software 108
Fourth-Generation Languages
Variety of programming languages that are
nonprocedural and conversational
Encourages programmers to specify the results
wanted; the computer determines the sequence
of instructions that accomplishes the results
Simplified the programming process
Natural languages
Very close to English or other human language
Sometimes called fifth-generation (5GLs)
No longer a trade-off between ease of use and
flexibility
Chapter 4 Computer Software 109
Object-Oriented Languages
Combines data
elements
and the procedures
that
will be performed upon
them into objects
Example: data about a
bank account and the
procedures performed
on it, such as interest
calculations
Chapter 4 Computer Software 110
Object-Oriented Languages
Most widely used software development
languages
Easier to use and more efficient for graphics-
oriented user interfaces
Reusable: can use an object from one
application in another application
Example: Visual Basic, C++, Java
Most object-oriented languages provide a GUI
that supports visual programming
Chapter 4 Computer Software 111
Web Languages
HTML
A page description language that creates
hypertext documents for the Web
XML
Describes Web page content by applying
identifying tags or contextual labels to the data
Java
Object-oriented programming language that is
simple, secure, and platform independent
Java applets can be executed on any computer
Chapter 4 Computer Software 112
Web Services
Web services are
software components
that are
Based on framework
of Web and object-
oriented standards
and technology
Used to link the
applications of
different users and
computing platforms
via the Web
How Web Services Work
Chapter 4 Computer Software 113
Language Translator Programs
Translate instructions written in
programming languages into machine
language
Assembler
Translates assembler language statement
Compiler
Translates high-level language statements
Interpreter
A compiler that translates and executes each
statement in a program, one at a time
Chapter 4 Computer Software 114
Programming Tools
Help programmers identify and minimize
errors while they are programming
Graphical programming interfaces
Programming editors
Debuggers
CASE Tools
A combination of many programming tools
into a single application with a common
interface
Used in different stages of the systems
development process
Data Resource
Management
Chapter 5 Data Resource
ManagementChapter 5 116
Logical Data Elements
Chapter 5 Data Resource
ManagementChapter 5 117
Logical Data Elements
Character
A single alphabetic, numeric, or other symbol
Field or data item
Represents an attribute (characteristic or quality)
of some entity (object, person, place, event)
Example: salary, job title
Record
Grouping of all the fields used to describe the attributes of an
entity
Example: payroll record with name, SSN, pay rate
File or table
A group of related records
Database
An integrated collection of logically related
data elements
Chapter 5 Data Resource
ManagementChapter 5 118
Electric Utility Database
Chapter 5 Data Resource
ManagementChapter 5 119
Database Structures
Common database structures
Hierarchical
Network
Relational
Object-oriented
Multi-dimensional
Chapter 5 Data Resource
ManagementChapter 5 120
Hierarchical Structure
Early DBMS
structure
Records arranged in
tree-like structure
Relationships are
one-to-many
Chapter 5 Data Resource
ManagementChapter 5 121
Network Structure
Used in some mainframe DBMS packages
Many-to-many relationships
Chapter 5 Data Resource
ManagementChapter 5 122
Relational Structure
Most widely used structure
Data elements are stored in tables
Row represents a record; column is a field
Can relate data in one file with data in
another,
if both files share a common data element
Chapter 5 Data Resource
ManagementChapter 5 123
Relational Operations
Select
Create a subset of records that meet a stated
criterion
Example: employees earning more than
$30,000
Join
Combine two or more tables temporarily
Looks like one big table
Project
Create a subset of columns in a table
Chapter 5 Data Resource
ManagementChapter 5 124
Multidimensional Structure
Variation of relational model
Uses multidimensional structures to
organize data
Data elements are viewed as being in cubes
Popular for analytical databases that support
Online Analytical Processing (OLAP)
Chapter 5 Data Resource
ManagementChapter 5 125
Multidimensional Model
Chapter 5 Data Resource
ManagementChapter 5 126
Object-Oriented Structure
An object consists of
Data values describing the attributes of an
entity
Operations that can be performed on the data
Encapsulation
Combine data and operations
Inheritance
New objects can be created by replicating
some or all of the characteristics of parent
objects
Chapter 5 Data Resource
ManagementChapter 5 127
Object-Oriented Structure
Source: Adapted from Ivar Jacobsen, Maria Ericsson, and Ageneta Jacobsen, The Object
Advantage: Business Process Reengineering with Object Technology (New York: ACM Press,
1995), p. 65.
Copyright @ 1995, Association for Computing Machinery. By permission.
Chapter 5 Data Resource
ManagementChapter 5 128
Object-Oriented Structure
Used in object-oriented database management
systems (OODBMS)
Supports complex data types more efficiently
than relational databases
Example: graphic images, video clips,
web pages
Chapter 5 Data Resource
ManagementChapter 5 129
Evaluation of Database Structures
Hierarchical
Works for structured, routine transactions
Cant handle many-to-many relationship
Network
More flexible than hierarchical
Unable to handle ad hoc requests
Relational
Easily responds to ad hoc requests
Easier to work with and maintain
Not as efficient/quick as hierarchical or network
Chapter 5 Data Resource
ManagementChapter 5 130
Database Development
Database Administrator (DBA)
In charge of enterprise database development
Improves the integrity and security of
organizational databases
Uses Data Definition Language (DDL) to
develop and specify data contents,
relationships, and structure
Stores these specifications in a data
dictionary or a metadata repository
Chapter 5 Data Resource
ManagementChapter 5 131
Data Dictionary
A data dictionary
Contains data about data (metadata)
Relies on specialized software component to
manage a database of data definitions
It contains information on..
The names and descriptions of all types of
data records and their interrelationships
Requirements for end users access and use
of application programs
Database maintenance
Security
Chapter 5 Data Resource
ManagementChapter 5 132
Database Development
Chapter 5 Data Resource
ManagementChapter 5 133
Data Planning Process
Database development is a top-down process
Develop an enterprise model that defines the
basic business process of the enterprise
Define the information needs of end users in
a business process
Identify the key data elements that are
needed to perform specific business activities
(entity relationship diagrams)

Chapter 5 Data Resource
ManagementChapter 5 134
Entity Relationship Diagram
Chapter 5 Data Resource
ManagementChapter 5 135
Database Design Process
Data relationships are represented in a
data model that supports a business
process
This model is the schema or subschema
on which to base
The physical design of the database
The development of application programs to
support business processes
Logical Design
Schema - overall logical view of relationships
Subschema - logical view for specific end
users
Data models for DBMS
Physical Design
How data are to be physically stored and
accessed on storage devices
Chapter 5 Data Resource
ManagementChapter 5 136
Logical and Physical Database Views
Chapter 5 Data Resource
ManagementChapter 5 137
Data Resource Management
Data resource management is a managerial activity
Uses data management, data warehousing,
and other IS technologies
Manages data resources to meet the information
needs of business stakeholders
Data stewards
Dedicated to establishing and maintaining the
quality of data
Need business, technology, and diplomatic skills
Focus on data content
Judgment is a big part of the job
Chapter 5 Data Resource
ManagementChapter 5 138
Types of Databases
Chapter 5 Data Resource
ManagementChapter 5 139
Operational Databases
Stores detailed data needed to support business
processes and operations
Also called subject area databases (SADB),
transaction databases, and production
databases
Database examples: customer, human
resource, inventory
Chapter 5 Data Resource
ManagementChapter 5 140
Distributed Databases
Distributed databases are copies or parts of databases stored on
servers at multiple locations
Improves database performance at worksites
Advantages
Protection of valuable data
Data can be distributed into smaller databases
Each location has control of its local data
All locations can access any data, any where
Disadvantages
Maintaining data accuracy
Replication
Look at each distributed database and find changes
Apply changes to each distributed database
Very complex
Duplication
One database is master
Duplicate the master after hours, in all locations
Easier to accomplish
Chapter 5 Data Resource
ManagementChapter 5 141
External Databases
Databases available for a fee from commercial
online services, or free from the Web
Example: hypermedia databases, statistical
databases, bibliographic and full text
databases
Search engines like Google or Yahoo are
external databases

Chapter 5 Data Resource
ManagementChapter 5 142
Hypermedia Databases
A hypermedia database contains
Hyperlinked pages of multimedia
Interrelated hypermedia page elements,
rather than interrelated data records
Chapter 5 Data Resource
ManagementChapter 5 143
Components of Web-Based
System
Chapter 5 Data Resource
ManagementChapter 5 144
Data Warehouses
Stores static data that has been extracted from
other databases in an organization
Central source of data that has been cleaned,
transformed, and cataloged
Data is used for data mining, analytical
processing, analysis, research, decision support
Data warehouses may be divided into data marts
Subsets of data that focus on specific aspects
of a company (department or business process)
Chapter 5 Data Resource
ManagementChapter 5 145
Data Warehouse Components
Chapter 5 Data Resource
ManagementChapter 5 146
Applications and Data Marts
Chapter 5 Data Resource
ManagementChapter 5 147
Data Mining
Data in data warehouses are analyzed to reveal
hidden patterns and trends
Market-basket analysis to identify new
product bundles
Find root cause of qualify or manufacturing
problems
Prevent customer attrition
Acquire new customers
Cross-sell to existing customers
Profile customers with more accuracy
Chapter 5 Data Resource
ManagementChapter 5 148
Traditional File Processing
Data are organized, stored, and processed in
independent files
Each business application designed to use
specialized data files containing specific
types of data records
Problems
Data redundancy
Lack of data integration
Data dependence (files, storage devices,
software)
Lack of data integrity or standardization
Chapter 5 Data Resource
ManagementChapter 5 149
Traditional File Processing
Chapter 5 Data Resource
ManagementChapter 5 150
Database Management
Approach
The foundation of modern methods of managing
organizational data
Consolidates data records formerly in
separate files into databases
Data can be accessed by many different
application programs
A database management system (DBMS) is
the software interface between users and
databases
Chapter 5 Data Resource
ManagementChapter 5 151
Database Management
Approach
Chapter 5 Data Resource
ManagementChapter 5 152
Database Management System
In mainframe and server computer systems, a
software package that is used to
Create new databases and database
applications
Maintain the quality of the data in an
organizations databases
Use the databases of an organization to
provide the information needed by end users
Chapter 5 Data Resource
ManagementChapter 5 153
Common DBMS Software
Components
Database definition
Language and graphical tools to define
entities, relationships, integrity constraints,
and authorization rights
Nonprocedural access
Language and graphical tools to access data
without complicated coding
Application development
Graphical tools to develop menus, data entry
forms, and reports
Chapter 5 Data Resource
ManagementChapter 5 154
Common DBMS Software
Components
Procedural language interface
Language that combines nonprocedural access
with full capabilities of a programming language
Transaction processing
Control mechanism prevents interference from
simultaneous users and recovers lost data after
a failure
Database tuning
Tools to monitor, improve database performance
Chapter 5 Data Resource
ManagementChapter 5 155
Database Management System
Database Development
Defining and organizing the content,
relationships, and structure of the data needed
to build a database
Database Application Development
Using DBMS to create prototypes of queries,
forms, reports, Web pages
Database Maintenance
Using transaction processing systems and
other tools to add, delete, update, and correct
data
Chapter 5 Data Resource
ManagementChapter 5 156
DBMS Major Functions
Chapter 5 Data Resource
ManagementChapter 5 157
Database Interrogation
End users use a DBMS query feature or report
generator
Response is video display or printed report
No programming is required
Query language
Immediate response to ad hoc data requests
Report generator
Quickly specify a format for information you
want to present as a report
Chapter 5 Data Resource
ManagementChapter 5 158
Database Interrogation
SQL Queries
Structured, international standard query
language found in many DBMS packages
Query form is SELECTFROMWHERE
Chapter 5 Data Resource
ManagementChapter 5 159
Database Interrogation
Boolean Logic
Developed by George Boole in the mid-1800s
Used to refine searches to specific
information
Has three logical operators: AND, OR, NOT
Example
Cats OR felines AND NOT dogs OR
Broadway
Chapter 5 Data Resource
ManagementChapter 5 160
Database Interrogation
Graphical and Natural Queries
It is difficult to correctly phrase SQL and other
database language search queries
Most DBMS packages offer easier-to-use,
point-and-click methods
Translates queries into SQL commands
Natural language query statements are similar
to conversational English
Chapter 5 Data Resource
ManagementChapter 5 161
Graphical Query Wizard
Chapter 5 Data Resource
ManagementChapter 5 162
Database Maintenance
Accomplished by transaction processing
systems and other applications, with the support
of the DBMS
Done to reflect new business transactions and
other events
Updating and correcting data, such as
customer addresses
Chapter 5 Data Resource
ManagementChapter 5 163
Application Development
Use DBMS software development tools to
develop custom application programs
Not necessary to develop detailed data-
handling procedures using conventional
programming languages
Can include data manipulation language
(DML) statements that call on the DBMS to
perform necessary data handling
Telecommunications
and Networks
Chapter 6 Telecommunications
and Networks 165
Digital Network Technologies
Telecommunications are being
revolutionized by switch from analog to
digital
Analog: voice-oriented transmission
Digital: discrete pulse transmission
Benefits
Higher transmission speeds
Moves larger amounts of information
Greater economy and much lower error rates
Transmits multiple types of communications
(data, voice, video) on the same circuits
Chapter 6 Telecommunications
and Networks 166
Wireless Technologies
Fiber-optic
Uses pulses of laser-generated light
Reduced size and installation effort
Vastly greater communication capacity
Faster transmission speeds
Freedom from electrical interference
Satellite Transmission
Can move massive quantities of data, audio,
and video over global networks
Especially useful in isolated areas
Chapter 6 Telecommunications
and Networks 167
Business Application Trends
Telecommunications networks now play a
vital and pervasive role in Web-enabled
E-business processes
Electronic commerce
Enterprise collaboration
Other applications that support operations,
management, and strategic objectives
Chapter 6 Telecommunications
and Networks 168
Internet2
Next generation of the Internet
High-performance
Different infrastructure than the current
Internet
Will not replace the current Internet
In use at over 200 universities, scientific
institutions, communications corporations
May never become totally open
Users are connected via Abilene, a backbone
that supports throughput of 10 Gbps
Infinite bandwidth
Chapter 6 Telecommunications
and Networks 169
The Internet Revolution
The Internet has become a global
information superhighway
Millions of smaller, private networks operating
independent of, or in harmony with, each
other
10 servers in 1991 to over 46 million today
Sustained growth in excess of 1 million
servers per month
No central computer system
No governing body
Based on common standards
Chapter 6 Telecommunications
and Networks 170
Internet Service Providers
ISP
A company that specializes in providing easy
access to the Internet
For a monthly fee, provides software, user
name, password, and Internet access
ISPs themselves are connected to one
another through network access points
One ISP can easily connect to another to
obtain addresses of websites or user nodes
Chapter 6 Telecommunications
and Networks 171
Internet Applications
Most popular Internet applications and uses
E-mail
Instant messaging
Browsing the Web
Newsgroups
Chat rooms
Publish opinions, subject matter, creative work
Buy and sell
Downloading (data, software, reports, pictures,
music, videos)
Chapter 6 Telecommunications
and Networks 172
Business Use of the Internet
Chapter 6 Telecommunications
and Networks 173
Business Value of the Internet
Chapter 6 Telecommunications
and Networks 174
The Role of Intranets
Many companies have sophisticated and
widespread intranets, offering
Detailed data retrieval
Collaboration
Personalized customer profiles
Links to the Internet
Intranets use Internet technologies
Web browsers and servers
TCP/IP network protocols
HTML publishing and databases
Chapter 6 Telecommunications
and Networks 175
Intranets
Intranets are protected by
Passwords
Encryption
Firewalls
Customers, suppliers, and other business
partners can access an intranet via
extranet links
Chapter 6 Telecommunications
and Networks 176
Business Value of Intranets
Intranets support
Communications and collaboration
Business operations and management
Web publishing
Intranet portal management

Chapter 6 Telecommunications
and Networks 177
Intranets as Information Portals
Chapter 6 Telecommunications
and Networks 178
Extranets
Network links that use Internet
technologies to connect the intranet of a
business to the intranets of another
Virtual Private Networks
Direct private network links, or private secure
Internet links between companies
Unsecured Extranet
Link between a company and others via the
Internet, relying on encryption of sensitive
data and firewall security systems
Chapter 6 Telecommunications
and Networks 179
Extranet Connectivity
Chapter 6 Telecommunications
and Networks 180
Business Value of Extranets
Web browser technology makes customer
and supplier access to intranets easier and
faster
Another way to build and strengthen strategic
relationships
Enables and improves collaboration between
a business, customers, and partners
Facilitates online, interactive product
development and marketing
Chapter 6 Telecommunications
and Networks 181
Telecommunications Network
Alternatives
Telecommunications is a highly technical,
rapidly changing field
Most business professionals dont need
detailed technical knowledge
However, understanding basic components
and their characteristics is necessary
Can help you make informed decisions about
telecommunications alternatives
Chapter 6 Telecommunications
and Networks 182
Telecommunications Network Model
A telecommunications network is any
arrangement where
A sender transmits a message
To a receiver
Over a channel
Consisting of some sort of medium
Chapter 6 Telecommunications
and Networks 183
Telecommunications Network
Components
Terminals
Any input/output device that uses networks
to transmit or receive data
Telecommunications processors
Devices that support data transmission,
reception
Telecommunications channels
Media over which data are transmitted,
received
Computers
All sizes and types
Chapter 6 Telecommunications
and Networks 184
Telecommunications Network
Components
Telecommunications control software
Controls telecommunications activities
Manages the functions of telecommunications
networks
Includes network management programs
of all kinds
Telecommunications monitors (mainframes)
Network operating systems (network servers)
Web browsers (microcomputers)
Chapter 6 Telecommunications
and Networks 185
Network Component Alternatives
Chapter 6 Telecommunications
and Networks 186
Types of Communications
Networks
Primary types of communications
networks
Wide Area
Local Area
Virtual Private
Client/Server
Peer-to-peer
Chapter 6 Telecommunications
and Networks 187
Wide Area Network (WAN)
Telecommunication network that covers a
large geographic area
Chapter 6 Telecommunications
and Networks 188
Local Area Network (LAN)
Connects
computers
within a
limited
physical
area, such
as an office,
classroom,
or building
Chapter 6 Telecommunications
and Networks 189
Virtual Private Networks (VPN)
Used to establish secure intranets and
extranets
The Internet is the main backbone network
Relies on network firewalls, encryption, and
other security features to build a pipe
through the Internet
Creates a private network without the high
cost of a separate proprietary connection
Chapter 6 Telecommunications
and Networks 190
Virtual Private Network
Chapter 6 Telecommunications
and Networks 191
Client/Server Networks
Clients
End user personal computers or networked
computers
Servers
Used to manage the networks
Processing
Shared between the clients and servers
Sometimes called a two-tier architecture
Larger computer systems are being
replaced with multiple client/server
networks
Chapter 6 Telecommunications
and Networks 192
Client/Server Network
Chapter 6 Telecommunications
and Networks 193
Network Computing
Networks are the central computing
resource of the organization
Thin clients provide a browser-based user
interface for processing applets
Thin clients include
Network computers
Net PCs
Other low-cost network devices or
information appliances
Chapter 6 Telecommunications
and Networks 194
Network Computing
Application and database servers provide
The operating system
Application software
Applets
Databases
Database management software
Sometimes called a three-tier client/server
model because it consists of
Thin clients
Application servers
Database servers
Chapter 6 Telecommunications
and Networks 195
Network Computing
Chapter 6 Telecommunications
and Networks 196
Peer-to-Peer Networks
Central Server Architecture
P2P file-sharing software connects all PCs
to a central server
When a PC requests a file, the server
searches
all active peers on the network
The server sends the requesting PC a list of
links to all active peers who have the file
Clicking a link connects the two PCs and
automatically transfers the file to the
requesting PC
Chapter 6 Telecommunications
and Networks 197
Peer-to-Peer Networks
Pure Peer-to-Peer Architecture
No central directory or server
File-sharing software connects one PC to
another online user
When you request a file, the software
searches every online user and sends you a
list of active file names
Clicking a link automatically transfers the file
from that users hard drive to yours
Chapter 6 Telecommunications
and Networks 198
Central Server Peer-to-Peer
Networks
Advantages
Can better protect the integrity and security
of the content and users of the network
Disadvantages
Directory server can be slowed or
overwhelmed by too many users or technical
problems

Chapter 6 Telecommunications
and Networks 199
Peer-to-Peer Network Diagrams
Chapter 6 Telecommunications
and Networks 200
Digital and Analog Signals
Analog or digital refers to the method used
to convert information into an electrical
signal
Analog: an electrical current is generated that
is proportional to the quantity being observed
Digital: the quantity being observed is
expressed as a number
Analog: if the temperature is 83 degrees, a
measuring device would generate 8.3 volts
Digital: a measurement of 83 degrees would be
displayed as the number 83
Chapter 6 Telecommunications
and Networks 201
Telecommunications Media
Twisted-Pair Wire
Ordinary telephone wire
Copper wire is twisted
into pairs
Coaxial Cable
Sturdy copper or
aluminum wire wrapped
with spacers to insulate
and protect it
Fiber-Optic Cable
One or more hair-thin
filaments of glass
fiber wrapped in a
protective jacket
Chapter 6 Telecommunications
and Networks 202
The Problem of The Last Mile
Network providers use fiber optic cable as
a communications backbone
Houses connected to the backbone are wired
with twisted pair
Users dont benefit from the faster, better
technology
Chapter 6 Telecommunications
and Networks 203
Wireless Technologies
Terrestrial Microwave
Earthbound microwave systems transmit
high-speed radio signals
Follows a line-of-sight path between relay systems
spaced about 30 miles apart
Communications Satellites
Serve as relay stations
Use microwave radio signals
Earth stations beam signals to the satellites
Not suitable for interactive, real-time processing
Chapter 6 Telecommunications
and Networks 204
Wireless Technologies
Cellular and PCS Telephone and Pager Systems
Geographic areas are divided into cells
Each cell has a low-power transmitter or radio relay
antenna
Computers and other communications processors
coordinate and control the transmissions to and from
mobile users
Wireless LANS
Uses wireless radio-wave technology to
connect PCs within an office or a building
Can be high-frequency, similar to digital
cellular, or low frequency (spread spectrum)
Chapter 6 Telecommunications
and Networks 205
Wireless Technologies
Bluetooth
Short-range wireless technology
Connects PCs to devices, such as a printer
Fairly low cost to implement
Other Wireless Systems
Cellular phones
Mobile radio
PDAs
Telecommunications networks now play vital and
pervasive roles in
Web-enabled e-business processes
Electronic commerce
Enterprise collaboration
Other applications that support business operations,
management, and strategic objectives
Chapter 6 Telecommunications
and Networks 206
The Wireless Web
Wireless Internet access is growing as
Web-enabled information appliances
proliferate
Smart telephones, pagers, PDAs
All are very thin clients in wireless networks
Chapter 6 Telecommunications
and Networks 207
Telecommunications Processors
Modems
The most common type of communications
processor
Converts a digital signal to an analog
frequency that can be transmitted over phone
lines, then back into a digital signal
Modulation and demodulation
Chapter 6 Telecommunications
and Networks 208
Comparing Technologies
Chapter 6 Telecommunications
and Networks 209
Inter-Network Processors
Switch makes connections between
telecommunications circuits in a network
Router intelligent communications
processor that interconnects networks
based on different protocols
Hub a port-switching communications
processor
Gateway connects networks with
different communications architectures
Chapter 6 Telecommunications
and Networks 210
Communications Processors
Chapter 6 Telecommunications
and Networks 211
Communications Processors
Multiplexer allows a single
communications channel to carry
simultaneous data transmissions from
many terminals
In time division multiplexing (TDM), the
multiplexer divides the time each terminal can
use the high-speed into short time slots
Multiplexers increase the number of
transmissions possible
Does not increase the number of physical
data channels
Chapter 6 Telecommunications
and Networks 212
Telecommunications Software
May reside in PCs, servers, mainframes,
and communications processors
Vital part of all telecommunications networks
Used to manage network performance
WANs often use telecommunications
monitors or teleprocessing monitors
Other networks use operating system
software
Middleware helps diverse networks
communicate with each other
Chapter 6 Telecommunications
and Networks 213
Network Management Functions
Traffic Management
Manage network resources and traffic to
avoid congestion and optimize service levels
Security
Provide authentication, encryption, firewall, auditing,
and enforcement
Network Monitoring
Troubleshoot and watch over the network, alerting
administrators of potential problems
Capacity Planning
Survey network resources, traffic patterns, and users
needs
Determine the best way to accommodate the needs
of the network as it grows and changes
Chapter 6 Telecommunications
and Networks 214
Network Topologies
Topology - The structure of a network
Star Network - Ties end user computers to a central
computer
Ring Network - Ties local computer processors together
in a ring on a relatively equal basis
Bus Network - Local processors share the same
communications channel
Mesh Network - Uses direct communications lines to
connect some or all of the computers in the ring to
each other
Switch - A message-switching computer that handles
data communication between autonomous
local computers
Chapter 6 Telecommunications
and Networks 215
Network Topologies
Chapter 6 Telecommunications
and Networks 216
Network Architectures and
Protocols
Protocol
A standard set of rules and procedures for the control of
communications in a network
Handshaking
The process of exchanging predetermined
signals and characters
Establishes a telecommunications session between terminals
and computers
Network Architecture
Master plan of standard protocols, hardware, software, and
interfaces between end users
and computer systems
Goal is to promote an open, simple, flexible,
and efficient telecommunications environment
Chapter 6 Telecommunications
and Networks 217
OSI and TCP/IP Models
Open Systems Interconnection (OSI)
Model
A seven-layer model that serves as a
standard model for network architectures
Model for how messages should be
transmitted between two points in a network
Each layer adds functions
Transmission Control Protocol/Internet
Protocol (TCP/IP)
A five-layer telecommunications protocol used
by the Internet
Chapter 6 Telecommunications
and Networks 218
OSI and TCP/IP Models
Chapter 6 Telecommunications
and Networks 219
Voice Over IP
Internet Telephony
Using an Internet connection to pass voice
data using IP instead of a telephone network
Often referred to as voice over IP or VoIP
Works like a regular phone, but skips long-
distance charges
Runs over standard network infrastructure
Requires a well-configured network to work
smoothly
Chapter 6 Telecommunications
and Networks 220
Bandwidth
Bandwidth
The frequency range of a telecommunications
channel that determines the maximum
transmission rate
Speed and capacity typically measured in bits
per second (bps)
Sometimes call baud rate
Transmission Rates
Narrow-band = low speed
Broadband = high speed
Chapter 6 Telecommunications
and Networks 221
Transmission Speeds
Chapter 6 Telecommunications
and Networks 222
Switching Alternatives
Circuit Switching
Switch opens a circuit to establish a link
between a sender and a receiver
It remains open until the communication
session is completed
Packet Switching
Breaks messages into groups called packets
Transmits packets separately
Chapter 6 Telecommunications
and Networks 223
Network Interoperability
Ensures that anyone anywhere on one
network can communicate with anyone
anywhere on another network
From a telecommunications perspective, no
need to speak a common language
Telecommunications would be possible
without
Complete accessibility
Transparency
Seamless interoperability across all networks

You might also like