SlideShare a Scribd company logo
2
Most read
6
Most read
7
Most read
ashisdesai@gmail.com
Enterprise Information Systems
Prepared By: Ashish Desai
7383381111
IPCC
INFORMATION
SYSTEM
INFORMATION SYSTEM
PEOPLE RESOURCES
COMPUTER SYSTEM – HARDWARE AND SOFTWARE
Input Devices
Processing Devices
Data Storage Devices
A.
B.
Output Devices
DATA RESOURCES
Data:
Database:
Database Management Systems (DBMS):
Database Models:
4.
Enterprise Information Systems
Prepared By: Ashish Desai
7383381111
IPCC 3. Business Process Management & IT
Advantages of a DBMS
Disadvantages of a DBMS
Big Data
Data Warehouse
Data Mining
NETWORKING AND COMMUNICATION SYSTEMS
Benefits of Computer Network
Benefits of Telecommunication
NETWORK RELATED CONCEPTS
Packet:
Repeater:
Hub:
Switch:
Router:
Bridge:
MAC Address:
Network Topology:
Transmission Mode:
Protocol:
IP Address:
Domain Name:
Domain Name System (DNS):
Packet Switching:
Wi-Fi:
Voice Over IP (VoIP):
Enterprise Information Systems
Prepared By: Ashish Desai
7383381111
Enterprise Information Systems
1
ashisdesai@gmail.com
We now have systems that are constantly exchanging information about various things
and even about us. This inter-networking of physical devices, vehicles, smart devices,
embedded electronics, software, sensors or any such device is often referred to as IoT
(Internet of Things). In this chapter, we are going to explore each of those key elements.
INFORMATION
Data is a raw fact and it is necessary for businesses to put in place procedures to ensure
data have been processed so that they are meaningful. This meaningful data known as
Information.
This requires a process that is used to produce information which involves collecting data
and then subjecting them to a transformation process in order to create information.
Some examples of information like summarizes data at any place.
SYSTEM
The system can be defined as “a group of mutually related, cooperating elements working
on reaching a common goal by taking inputs and producing outputs in organized
transformation processes.”
Not every system has a single goal and often a system contains several subsystems with
sub goals, all contributing to meeting the overall system goal.
There are thus five components
of a generic system in terms of
Input, Process, Output,
Feedback and Control.
In systems, data are used as
the input for a process that
creates information as an
output.
In order to monitor the performance of the system, some kind of feedback mechanism
is required.
In addition, control must be exerted to correct any problems that occur and ensure
that the system is fulfilling its purpose.
INFORMATION SYSTEM
In the extensive sense, the term Information Systems (IS) refers to the interaction
between processes and technology.
Information System: Information System (IS) is a combination of people, hardware,
software, communication devices, network and data resources that processes (can be
Enterprise Information Systems
2
ashisdesai@gmail.com
storing, retrieving, transforming information) data and information for a specific
purpose.
The system needs inputs from user which will then be processed using technology devices
such as computers, and produce output that will be sent to another user or other system
via a network and a feedback method that controls the operation.
The main aim and purpose of each information system is to convert the data into
information which is useful and meaningful.
An Information System depends on the resources of people (end users and IS specialists),
hardware (machines and media), software (programs and procedures), data (data and
knowledge bases), and networks (communications media and network support) to
perform input, processing, output, storage, and control activities that transform data
resources into information products.
An Information System model comprises of following steps:
Input: Data is collected from an organization or from external environments and
converted into suitable format required for processing.
Process: A process is a series of steps undertaken to achieve desired outcome or goal.
Output: Then information is stored for future use or communicated to user after
application of respective procedure on it.
Some of the important characteristics of Computer Based Information Systems are given
as follows:
All systems work for predetermined objectives and the system is designed accordingly.
In general, a system has several interrelated and interdependent subsystems and No
sub system can function in isolation.
If one sub system fails in most of the case entire system cannot functioning.
The way a subsystem works with another subsystem is called interaction.
The work done by individual subsystems is integrated to achieve the central goal of
the system.
A Computer Based Information
system is a combination of people, IT
and business processes that helps
management in taking important
decisions to carry out the business
successfully.
An Information System comprise of People, Hardware, Software, Data and Network for
communication support shown in Fig.
Enterprise Information Systems
3
ashisdesai@gmail.com
PEOPLE RESOURCES
From the help desk to the system programmer all the way up to the CIO all of them are
the essential elements of IS.
The people involved include users of the system and information systems personnel,
including all the people who manage, run, program, and maintain the system.
COMPUTER SYSTEM – HARDWARE AND SOFTWARE
Hardware is the tangible portion of our computer systems; something we can touch and
see.
It basically consists of devices that perform the functions of input, processing, data
storage and output activities of the computer.
Input Devices
These are devices through which we interact with the systems and include devices
like Keyboard, Mouse and other pointing devices, Scanners & Bar Code, MICR readers,
Webcams, Microphone and Stylus/ Touch Screen.
Keyboard helps us with text based input, Mouse helps us in position based input,
Scanners & Webcams help in image based input and Microphone helps us in voice
based input.
Processing Devices
They include computer chips that contain the Central Processing Unit and main
memory.
The Central Processing Unit (CPU or microprocessor) is the actual hardware that
interprets and executes the program (software) instructions and coordinates how all
the other hardware devices work together.
The CPU is built on a small flake of silicon and can contain the equivalent of several
million transistors.
We can think of transistors as switches which could be” on” or “off” i.e., taking a value
of 1 or 0.
The processor or CPU is like the brain of the computer. The main function of CPU is to
execute programs stored in memory.
It consists of three functional units:
Enterprise Information Systems
4
ashisdesai@gmail.com
Control Unit (CU): CU controls the flow of data and instruction to and from
memory, interprets the instruction and controls which tasks to execute and when.
Arithmetic and Logical Unit (ALU): Performs arithmetic operations such as
addition, subtraction, multiplication, and logical comparison of numbers: Equal to,
Greater than, Less than, etc.
Registers: These are high speed memory units within CPU for storing small amount
of data (mostly 32 or 64 bits).
Registers could be:
Accumulators: They can keep running totals of arithmetic values.
Address Registers: They can store memory addresses which tell the CPU as to
where in the memory an instruction is located.
Storage Registers: They can temporarily store data that is being sent to or
coming from the system memory.
Miscellaneous: These are used for several functions for general purpose.
Data Storage Devices
They refers to the memory where data and programs are stored.
Various types of memory techniques/devices are given as follows:
A.
Registers are internal
memory within CPU,
which are very fast and
very small.
B.
These are devices in
which any location can
be accessed in any
order (in contrast with sequential order).
These are primarily of two types:
Random Access Memory (RAM)
This is Read Write memory.
Information can be read as well as modified.
Volatile in nature means Information is lost as soon as power is turned off.
Read Only Memory (ROM)
This is non-volatile in nature (contents remain even in absence of power).
Usually, these are used to store small amount of information for quick
reference by CPU.
Information can be read not modified.
Enterprise Information Systems
5
ashisdesai@gmail.com
Generally used by manufacturers to store data & programs.
There is a huge speed difference between Registers and Primary Memory. In
order to bridge these speed differences, we have cache memory.
Cache (pronounced as cash) is a smaller, faster memory, which stores copies of
the data from the most frequently used main memory locations so that
Processor/Registers can access it more rapidly than main memory.
Virtual Memory is in fact not a separate device but an imaginary memory area
supported by some operating systems (for example, Windows) in conjunction
with the hardware.
If a computer lacks the Random Access Memory (RAM) needed to run a
program or operation, Windows uses virtual memory to compensate.
Virtual memory combines computer’s RAM with temporary space on the hard
disk.
When RAM runs low, virtual memory moves data from RAM to a space called a
paging file. Moving data to and from the paging file frees up RAM to complete
its work.
Thus, Virtual memory is an allocation of hard disk space to help RAM.
The secondary memories are available in bigger sizes, thus programs and data
can be stored on secondary memories.
Secondary storage differs from primary storage in that it is not directly
accessible by the CPU.
The computer usually uses its input/output channels to access secondary
storage and transfers the desired data using intermediate area in primary
storage.
Secondary storage does not lose the data when the device is powered down: it
is non-volatile.
Enterprise Information Systems
6
ashisdesai@gmail.com
The features of secondary memory devices are non-volatility (contents are
permanent in nature), greater capacity (they are available in large size), greater
economy (the cost of these is lesser compared to register and RAMs) and slow
speed (slower in speed compared to registers or primary storage).
Storage devices could differ amongst each other in terms of speed and access
time, cost/ portability, capacity and type of access.
Based on these parameters most common forms of secondary storage are: USB
Pen Drives, Floppy drive, Hard Drive, CD, DVD, Blue ray Disks and Smart cards.
Output Devices
Computers systems provide output to decision makers at all levels in an enterprise to
solve business problems, the desired output may be in visual, audio or digital forms.
Output devices are devices through which system responds. Visual output devices like,
a display device visually conveys text, graphics, and video information.
Information shown on a display device is called soft copy because the information
exists electronically and is displayed for a temporary period of time.
Display devices include CRT monitors, LCD monitors and displays, gas plasma monitors,
and televisions.
Some types of output are textual, graphical, tactile, audio, and video.
Textual output comprises of characters that are used to create words, sentences,
and paragraphs.
Graphical outputs are digital representations of non-text information such as
drawings, charts, photographs, and animation.
Tactile output such as raised line drawings may be useful for some individuals who
are blind.
Audio output is any music, speech, or any other sound.
Video output consists of images played back at speeds to provide the appearance
of full motion.
Enterprise Information Systems
7
ashisdesai@gmail.com
DATA RESOURCES
Data:
Data are the raw bits and pieces of information with no context. Data can be
quantitative or qualitative. Quantitative data is numeric, the result of a measurement,
count, or some other mathematical calculation.
By itself, data is not that useful. For it to be useful, it needs to be given context.
Once we have put our data into context, aggregated and analysed it, we can use it to
make decisions for our organization which also known as Information.
This consumption of information produces knowledge.
And knowledge can be used to make decisions, set policies, and even spark innovation.
The final step from knowledge to wisdom, means someone combine their knowledge
and experience to produce a deeper understanding of a topic. And recent areas for
the same are Artificial Intelligence and Machine Learning.
Database:
The goal of many information systems is to transform data into information to
generate knowledge that can be used for decision making.
A database is an organized collection of related information.
It is called an organized collection because in a database all data is described and
associated with other data.
Database Management Systems (DBMS):
Database is just electronic filing cabinet. Even this simple system help us to do various
operation on file, such as:
Add New Files
Delete Existing File From Db
Insert Data In Existing File
Modify The Data
Retrieving Or Querying The Data From Existing File
DBMS may defined as software that aid (helps) in Organizing, Controlling and using the
data needed by application Programme.
Data Base Management Systems are Oracle, MySQL, SQL Servers and DB2 etc.
MS-Access and Open Office Base are the example of personal DBMS which are not
meant to share in network but they are installed in single device and used by the single
user at a time.
Enterprise Information Systems
8
ashisdesai@gmail.com
Database Models:
It determines the logical structure of a database and fundamentally determines in
which manner data can be stored, organized and manipulated.
Let’s now look at the database model hierarchy.
Database: This is a collection of Files.
File: This is a collection of Records.
Record: This is a collection of Fields.
Field: This is a collection of Characters.
Characters: These are a collection of Bits.
Some prominent database models are as follows:
A hierarchically structured database is arranged logically in an inverted tree
pattern.
The DB structure
reflects the fact that
repairs are made to
equipment located in
rooms that are part of
buildings.
All records in hierarchy are called Nodes. Each node is related to the others in
a parent-child relationship.
Each parent record may have one or more child records, but no child record
may have more than one parent record. Thus, the hierarchical data structure
implements one-to-one and one-to-many relationships.
The top parent record in the hierarchy is called the Root Record. Records that
“own” other records are called Parent Records.
Enterprise Information Systems
9
ashisdesai@gmail.com
The network model is a variation on the hierarchical model, to the extent that
it is built on the concept of multiple branches where in that branches can be
connected to multiple nodes. The network model can represent redundancy.
However, unlike the hierarchical model, the network model also permits a
record to be a member of more than one set at one time.
The network model would permit the equipment records to be the children of
both the room records and the vendor records. This feature allows the network
model to implement the many-to-one and the many-to many relationship
types.
This gives excellent retrieval performance, at the expense of operations such as
database loading and reorganization.
A relational database allows the definition of data and their structures, storage
and retrieval operations and integrity constraints that can be organized in a
table structure.
A table is a collection of records and each record in a table contains the same
fields.
Three key terms are used extensively in relational database models: relations,
attributes, and domains.
A RELATION is a table with columns and rows.
The named columns of the relation are called ATTRIBUTES.
And the DOMAIN is the set of values the attributes are allowed to take.
All relations (and, thus, tables) in a relational database have to adhere to some
basic rules to qualify as relations.
First, the ordering of columns is immaterial in a table.
Second, there can't be identical record in a table.
And third, each record will contain a single value for each of its attributes.
Tables can also have a designated single attribute or a set of attributes that can
act as a "key", which can be used to uniquely identify each record in the table.
A key that can be used to uniquely identify a row in a table is called a primary
key. Keys are commonly used to join or combine data from two or more tables.
Enterprise Information Systems
10
ashisdesai@gmail.com
It is based on the concept that the world can be modelled in terms of objects
and their interactions.
An Object-oriented database provides a mechanism to store complex data such
as images, audio and video, etc.
An object-oriented database management system is a relational database
designed to manage all of these independent programs, using the data
produced to quickly respond to requests for information by a larger application.
In the Fig. 2.7.5, the light rectangle indicates that ‘engineer’ is an object
possessing attributes like ‘date of birth’, ‘address’, etc. which is interacting with
another object known as ‘civil jobs’.
When a civil job is
commenced, it updates the
‘current job’ attribute of the
object known as ‘engineer’,
because ‘civil job’ sends a
message to the latter
object.
Objects can be organized by
first identifying them as a
member of a class /
subclass.
The dark rectangles indicate
‘Engineer’ as a class and
‘Civil Engineer’ and also
‘Architect’ as both
subclasses of ‘Engineer’.
These subclasses possess all the attributes of ‘Engineer’ over and above each
possessing at least one attribute not possessed by ‘Engineer’.
The line intersecting particular object classes represents the class of structure.
Secondly, objects can be identified as a component of some other object.
The dotted line intersecting particular object classes represents the part of
structure. Apart from possessing attributes, objects as well as possess methods
or services that are responsible for changing their states.
Enterprise Information Systems
11
ashisdesai@gmail.com
In the Fig. 2.7.5 for example, the service ‘Experience’ as a Civil Engineer or
Architect for the object ‘Engineer’ calculates how much experience the
engineers of these particular two subclasses have as professionals.
Advantages of a DBMS
One of the principle advantages of a DBMS is that the
same information can be made available to different users.
In a DBMS duplication of information or
redundancy is, if not eliminated, carefully controlled or reduced i.e. there is no need
to repeat the same data over and over again.
Data integrity is maintained by having accurate,
consistent, and up-to-date data.
Using a DBMS, file formats and programs are
standardized. This makes the data files easier to maintain because the same rules and
guidelines apply across all types of data. The level of consistency across files and
programs also makes it easier to manage data when multiple programmers are
involved.
DBMS makes the data access and manipulation easier for the user.
DBMS also reduce the reliance of users on computer experts to meet their data needs.
DBMSs allow multiple users to access the same data resources
which could lead to risk to an enterprise if not controlled. Through the use of
passwords, database management systems can be used to restrict data access to only
those who should see it.
In a DBMS data does not reside in
applications but data bases program & data are independent of each other.
In the case of deployment of DBMS,
application development becomes fast. The data is already therein databases,
application developer has to think of only the logic required to retrieve the data in the
way a user needs.
Disadvantages of a DBMS
Implementing a DBMS system can be expensive and time-consuming, especially
in large enterprises. Training requirements alone can be quite costly.
Even with safeguards in place, it may be possible for some unauthorized
users to access the database. If one gets access to database then it could be an all or
nothing proposition.
Enterprise Information Systems
12
ashisdesai@gmail.com
Big Data
The term refers to such massively large data sets that conventional database tools do
not have the processing power to analyse them.
For example, Walmart must process over one million customer transactions every
hour. Storing and analysing that much data is beyond the power of traditional
database-management tools.
Understanding the best tools and techniques to manage and analyze these large data
sets is a problem that governments and businesses alike are trying to solve.
Data Warehouse
Data warehouse is simple: extract data from one or more of the organization’s
databases and load it into the data warehouse (which is itself another database) for
storage and analysis.
A data warehouse should be designed so that it meets the following criteria:
It Uses Non-Operational Data
This means that the data warehouse is using a copy of data from the active
databases that the company uses in its day to-day operations, so the data
warehouse must pull data from the existing databases on a regular,
scheduled basis.
The Data Is Time-Variant
This means that whenever data is loaded into the data warehouse, it
receives a time stamp, which allows for comparisons between different time
periods.
The Data Is Standardized
Because the data in a data warehouse usually comes from several different
sources, it is possible that the data does not use the same definition or units.
For example one table using the format of dd/mm/yyyy where other table
in another database use the format mm/dd/yyyy for the date, so now here
the data warehouse must have to create specific standards to load the data
in data warehouse.
This process is called Extraction-Transformation-Load (ETL).
There are two primary schools of thought when designing a data warehouse:
It starts by creating small data warehouses,
called data marts, to solve specific business
problem. As these data marts created they
can be combined into a larger data
warehouse.
Enterprise Information Systems
13
ashisdesai@gmail.com
It suggests that we should start by creating an enterprise-wide data warehouse
and then, as per need of organization create smaller data marts from the data
warehouse.
It forces an organization to better understand the data that it is currently collecting
and, equally important.
It provides a centralized view of all data being collected across the enterprise.
Once all data identified as consistent, an organization can generate one version of
the truth.
This creates a historical record of data, which allows for an analysis of trends.
A data warehouse provides tools to combine data, which can provide new
information and analysis.
Data Mining
Data Mining is
the process of
analysing data to
find previously
unknown trends,
patterns, and
associations to
make decisions.
In some cases, a data-mining project is begun with a hypothetical result in mind.
In other cases, there are no presuppositions and a data-mining program is run
against larger data sets to find pattern and association.
NETWORKING AND COMMUNICATION SYSTEMS
Telecommunications give an organization the capability to move information rapidly
between distant locations and to provide the ability for the employees, customers, and
suppliers to collaborate from anywhere.
Through telecommunications, this value may be:
Increase the efficiency of the operation.
Improvement in the effectiveness of the management.
Innovation in the marketplace.
Enterprise Information Systems
14
ashisdesai@gmail.com
Computer Network is a collection of computers and other hardware interconnected by
communication channels that allow sharing of resources and information. A network is a
group of devices connected to each other.
Network and Communication System: These consist of both physical devices and
software, transfers the data from one physical location to another. Computers and
communications equipment can be connected in networks for sharing voice, data, images,
sound and video.
Each component, namely the computer in a computer network is called a ‘Node’.
The networks could be of two types:
wherein connection first established then
data is exchanged like it happens in case of telephone networks.
Where no prior connection is made before data
exchanges.
The networks is modelled to address the following basic issues:
It refers to the process of deciding on how to communicate the data from
source to destination in a network.
It refers to the amount of data which can be sent across a network in
given time.
It refers to the ability of a network to recover from any kind of error like
connection failure, loss of data etc.
It refers to the situation that arises when there is a conflict for some
common resources in a network.
Benefits of Computer Network
There would be many situations where information must be distributed
geographically.
Data could be stored at a central location and can be shared across different
systems. Even resource sharing could be in terms of sharing peripherals like
printers etc.
It would increase drastically if the processing is distributed amongst computer
systems.
Enterprise Information Systems
15
ashisdesai@gmail.com
Many critical application should be available 24X7, which are distributed across
the network so reliability of the application would be high.
It provides multiple ways to communicate the data like using e-mail, newsgroups,
video conferencing, etc.
Benefits of Telecommunication
It enable a firm to transmit raw data and information quickly and accurately
between remote sites.
It enable an organization with geographically remote sites to function, as a single
unit.
Operational efficiency may be raised by eliminating intermediaries from various
business processes.
NETWORK RELATED CONCEPTS
Packet:
It breaks the message down into smaller pieces, called packets. Each packet has the
sender’s address, the destination address, a sequence number, and a piece of the
overall message to be sent.
Repeater:
A repeater regenerates the signal over the same network before the signal becomes
too weak or corrupted to extend the length to which the signal can be transmitted
over the same network.
Hub:
A hub is basically a multiport repeater that connects multiple wires coming from
different branches.
As they do not have intelligence to find out best path for data packets which leads to
inefficiency and wastage
Switch:
It connects multiple devices together and filters packets based on their destination
within the connected devices.
Router:
A device that receives and analyses packets and then routes them towards their
destination.
Enterprise Information Systems
16
ashisdesai@gmail.com
Bridge:
A communications processor that connects two Local Area Networks (LANs) working
on the same protocol.
MAC Address:
These are most often assigned by the manufacturer of a Network Interface Controller
(NIC) and are stored in its hardware, such as the card’s read only memory.
Network Topology:
Topology means, the physical or logical arrangement of links in a network.
It involves a central unit with number of terminals tied to it.
A single length of wire, cable, or optical fiber (called bus) connects several
computer.
It’s much like a bus network, except the length of wire connects to form a loop.
Each node is connected by a dedicated point to point link to every node.
Transmission Mode:
It defines the direction of signal flow between two linked devices.
The data flows only in one direction- unidirectional
The data flows in one direction or the other, but not both at the same time
The data flows in both directions simultaneously
Protocol:
A protocol is the set of rules that allow two (or more) devices to exchange information
back and forth across the network.
IP Address:
Every device that communicates on the Internet, is assigned a unique identifying
number called an IP (Internet Protocol) address.
The IP address standard used has been IPv4 (version 4), which has the format of four
numbers between 0 and 255 separated by a period.
The IPv4 standard has limit of 4,294,967,296 possible address.
Where IPv6 standards which is currently being phased in, is formatted as eight groups
of four hexadecimal digits.
Enterprise Information Systems
17
ashisdesai@gmail.com
The IPv6 standards has a limit of 3.4 x 1038 possible address.
Domain Name:
A Domain Name is a human-friendly name for a device on the Internet.
For example domain name id Wikipedia.org describe the organization and .org is the
top level domain.
Other well-known TLDs include .com, .net, and .gov.
Domain Name System (DNS):
DNS which acts as the directory on the Internet.
When a request to access a device with a domain name is given, a DNS server is
queried.
It returns the IP address of the device requested, allowing for proper routing.
Packet Switching:
When a packet is sent from one device out over the Internet, it does not follow a
straight path to its destination.
In fact, sometimes two packets from the same message will take different routes.
Sometimes, packets will arrive at their destination out of order. When this happens,
the receiving device restores them to their proper order.
Wi-Fi:
Wi-Fi is a technology that takes an Internet signal and converts it into radio waves.
These radio waves can be picked up within a radius of approximately 65 feet by devices
with a wireless adapter. Several wi-fi specification have been developed over the
years, starting with 802.11b (1999), followed by the 802.11 g specification in 2003.
And 802.11n in 2009.
Voice Over IP (VoIP):
A growing class of data being transferred over the Internet is Voice Data.
A protocol called VoIP enables sounds to be converted to a digital format for
transmission over the Internet and then recreated at the other end.

More Related Content

PPT
Types of Data Processing
PPT
Database Management System Introduction
PPT
Planning, design and implementation of information systems
PPTX
Data and Information
PPT
Mis – Subsystems
PPTX
Computer virus
PPTX
Implementation & Evaluation of MIS
PPTX
DOS - Disk Operating System
Types of Data Processing
Database Management System Introduction
Planning, design and implementation of information systems
Data and Information
Mis – Subsystems
Computer virus
Implementation & Evaluation of MIS
DOS - Disk Operating System

What's hot (20)

PPTX
System concept in MIS
PPT
Mis planning
PPTX
Server virtualization
PPTX
FORMAL & INFORMAL INFORMATION SYSTEM
PDF
STRATEGIC ROLE OF ‎INFORMATION SYSTEMS
PPTX
Computer Security risks Shelly
PPT
Components of information system
PPTX
Disk operating system
PPT
System vulnerability and abuse
PPTX
Web services security
PPT
It infrastructure
PPTX
Management information System and its types
PPTX
Database management system
DOCX
Microsoft word features
PDF
Ms excel for Accountants
PPTX
MIS 17 Cross-Functional Enterprise Systems
PPTX
Information System Development
PPTX
Database design process
DOCX
System development life cycle
PPTX
TRANSACTION PROCESSING SYSTEM
System concept in MIS
Mis planning
Server virtualization
FORMAL & INFORMAL INFORMATION SYSTEM
STRATEGIC ROLE OF ‎INFORMATION SYSTEMS
Computer Security risks Shelly
Components of information system
Disk operating system
System vulnerability and abuse
Web services security
It infrastructure
Management information System and its types
Database management system
Microsoft word features
Ms excel for Accountants
MIS 17 Cross-Functional Enterprise Systems
Information System Development
Database design process
System development life cycle
TRANSACTION PROCESSING SYSTEM
Ad

Similar to Information systems and its components 1 (20)

PPTX
lesson_1_Introduction_to_computers_pptx.pptx
PPTX
Lesson 1 introduction to computers
PPT
Chapter 5 It Architecture
PPTX
lesson_1_Introduction_to_computers_pptx.pptx
PPTX
lesson_1_Introduction_to_computers_pptx.pptx
PPTX
lesson_1_Introduction_to_computers_pptx.pptx
PDF
1. Components of Information Systems.pdf
PPTX
Concepts and components of information system
PPT
PPTX
Lecture TWO new 24.pptx it and it's related disciplines
PPT
Ch02
PPTX
Lecture-02 - Introduction to computer.pptx
PPTX
computer Science FIRST TERM SCHEME OF WORK FOR JSS TWO
PPTX
Lecture 1.pptx
PDF
cental processing unit and all its components
PDF
Topic_1___Part_1_Introduction.pptx.pdf
PPTX
Intro to computer
PDF
Data processing
PDF
operating system
PPT
Lecture 1 2
lesson_1_Introduction_to_computers_pptx.pptx
Lesson 1 introduction to computers
Chapter 5 It Architecture
lesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptx
1. Components of Information Systems.pdf
Concepts and components of information system
Lecture TWO new 24.pptx it and it's related disciplines
Ch02
Lecture-02 - Introduction to computer.pptx
computer Science FIRST TERM SCHEME OF WORK FOR JSS TWO
Lecture 1.pptx
cental processing unit and all its components
Topic_1___Part_1_Introduction.pptx.pdf
Intro to computer
Data processing
operating system
Lecture 1 2
Ad

More from Ashish Desai (13)

PDF
2. Account and Financial Information System
PPTX
5. Core Banking System
PDF
4. E-Commerce, M-Commerce and Emerging Technologies
PDF
Study Abroad for USA and UK
PDF
Higher Studies in Australia
PDF
Information Technology
PDF
1. Automated Business Process
PDF
2. Financial and Accounting System
PDF
5. Core Banking System
PDF
4. e commerce, m-commerce and emerging technologies 2018
PDF
Information systems and its components iii
PDF
Information systems and its components ii
PDF
Business Process Management and Information Technology
2. Account and Financial Information System
5. Core Banking System
4. E-Commerce, M-Commerce and Emerging Technologies
Study Abroad for USA and UK
Higher Studies in Australia
Information Technology
1. Automated Business Process
2. Financial and Accounting System
5. Core Banking System
4. e commerce, m-commerce and emerging technologies 2018
Information systems and its components iii
Information systems and its components ii
Business Process Management and Information Technology

Recently uploaded (20)

PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
master seminar digital applications in india
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Basic Mud Logging Guide for educational purpose
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Complications of Minimal Access Surgery at WLH
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Pharma ospi slides which help in ospi learning
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
Microbial diseases, their pathogenesis and prophylaxis
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
FourierSeries-QuestionsWithAnswers(Part-A).pdf
master seminar digital applications in india
TR - Agricultural Crops Production NC III.pdf
Microbial disease of the cardiovascular and lymphatic systems
human mycosis Human fungal infections are called human mycosis..pptx
Basic Mud Logging Guide for educational purpose
GDM (1) (1).pptx small presentation for students
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Classroom Observation Tools for Teachers
Complications of Minimal Access Surgery at WLH
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Module 4: Burden of Disease Tutorial Slides S2 2025
Pharma ospi slides which help in ospi learning
O7-L3 Supply Chain Operations - ICLT Program
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf

Information systems and its components 1

  • 2. Enterprise Information Systems Prepared By: Ashish Desai 7383381111 IPCC INFORMATION SYSTEM INFORMATION SYSTEM PEOPLE RESOURCES COMPUTER SYSTEM – HARDWARE AND SOFTWARE Input Devices Processing Devices Data Storage Devices A. B. Output Devices DATA RESOURCES Data: Database: Database Management Systems (DBMS): Database Models: 4.
  • 3. Enterprise Information Systems Prepared By: Ashish Desai 7383381111 IPCC 3. Business Process Management & IT Advantages of a DBMS Disadvantages of a DBMS Big Data Data Warehouse Data Mining NETWORKING AND COMMUNICATION SYSTEMS Benefits of Computer Network Benefits of Telecommunication NETWORK RELATED CONCEPTS Packet: Repeater: Hub: Switch: Router: Bridge: MAC Address: Network Topology: Transmission Mode: Protocol: IP Address: Domain Name: Domain Name System (DNS): Packet Switching: Wi-Fi: Voice Over IP (VoIP):
  • 4. Enterprise Information Systems Prepared By: Ashish Desai 7383381111
  • 5. Enterprise Information Systems 1 ashisdesai@gmail.com We now have systems that are constantly exchanging information about various things and even about us. This inter-networking of physical devices, vehicles, smart devices, embedded electronics, software, sensors or any such device is often referred to as IoT (Internet of Things). In this chapter, we are going to explore each of those key elements. INFORMATION Data is a raw fact and it is necessary for businesses to put in place procedures to ensure data have been processed so that they are meaningful. This meaningful data known as Information. This requires a process that is used to produce information which involves collecting data and then subjecting them to a transformation process in order to create information. Some examples of information like summarizes data at any place. SYSTEM The system can be defined as “a group of mutually related, cooperating elements working on reaching a common goal by taking inputs and producing outputs in organized transformation processes.” Not every system has a single goal and often a system contains several subsystems with sub goals, all contributing to meeting the overall system goal. There are thus five components of a generic system in terms of Input, Process, Output, Feedback and Control. In systems, data are used as the input for a process that creates information as an output. In order to monitor the performance of the system, some kind of feedback mechanism is required. In addition, control must be exerted to correct any problems that occur and ensure that the system is fulfilling its purpose. INFORMATION SYSTEM In the extensive sense, the term Information Systems (IS) refers to the interaction between processes and technology. Information System: Information System (IS) is a combination of people, hardware, software, communication devices, network and data resources that processes (can be
  • 6. Enterprise Information Systems 2 ashisdesai@gmail.com storing, retrieving, transforming information) data and information for a specific purpose. The system needs inputs from user which will then be processed using technology devices such as computers, and produce output that will be sent to another user or other system via a network and a feedback method that controls the operation. The main aim and purpose of each information system is to convert the data into information which is useful and meaningful. An Information System depends on the resources of people (end users and IS specialists), hardware (machines and media), software (programs and procedures), data (data and knowledge bases), and networks (communications media and network support) to perform input, processing, output, storage, and control activities that transform data resources into information products. An Information System model comprises of following steps: Input: Data is collected from an organization or from external environments and converted into suitable format required for processing. Process: A process is a series of steps undertaken to achieve desired outcome or goal. Output: Then information is stored for future use or communicated to user after application of respective procedure on it. Some of the important characteristics of Computer Based Information Systems are given as follows: All systems work for predetermined objectives and the system is designed accordingly. In general, a system has several interrelated and interdependent subsystems and No sub system can function in isolation. If one sub system fails in most of the case entire system cannot functioning. The way a subsystem works with another subsystem is called interaction. The work done by individual subsystems is integrated to achieve the central goal of the system. A Computer Based Information system is a combination of people, IT and business processes that helps management in taking important decisions to carry out the business successfully. An Information System comprise of People, Hardware, Software, Data and Network for communication support shown in Fig.
  • 7. Enterprise Information Systems 3 ashisdesai@gmail.com PEOPLE RESOURCES From the help desk to the system programmer all the way up to the CIO all of them are the essential elements of IS. The people involved include users of the system and information systems personnel, including all the people who manage, run, program, and maintain the system. COMPUTER SYSTEM – HARDWARE AND SOFTWARE Hardware is the tangible portion of our computer systems; something we can touch and see. It basically consists of devices that perform the functions of input, processing, data storage and output activities of the computer. Input Devices These are devices through which we interact with the systems and include devices like Keyboard, Mouse and other pointing devices, Scanners & Bar Code, MICR readers, Webcams, Microphone and Stylus/ Touch Screen. Keyboard helps us with text based input, Mouse helps us in position based input, Scanners & Webcams help in image based input and Microphone helps us in voice based input. Processing Devices They include computer chips that contain the Central Processing Unit and main memory. The Central Processing Unit (CPU or microprocessor) is the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together. The CPU is built on a small flake of silicon and can contain the equivalent of several million transistors. We can think of transistors as switches which could be” on” or “off” i.e., taking a value of 1 or 0. The processor or CPU is like the brain of the computer. The main function of CPU is to execute programs stored in memory. It consists of three functional units:
  • 8. Enterprise Information Systems 4 ashisdesai@gmail.com Control Unit (CU): CU controls the flow of data and instruction to and from memory, interprets the instruction and controls which tasks to execute and when. Arithmetic and Logical Unit (ALU): Performs arithmetic operations such as addition, subtraction, multiplication, and logical comparison of numbers: Equal to, Greater than, Less than, etc. Registers: These are high speed memory units within CPU for storing small amount of data (mostly 32 or 64 bits). Registers could be: Accumulators: They can keep running totals of arithmetic values. Address Registers: They can store memory addresses which tell the CPU as to where in the memory an instruction is located. Storage Registers: They can temporarily store data that is being sent to or coming from the system memory. Miscellaneous: These are used for several functions for general purpose. Data Storage Devices They refers to the memory where data and programs are stored. Various types of memory techniques/devices are given as follows: A. Registers are internal memory within CPU, which are very fast and very small. B. These are devices in which any location can be accessed in any order (in contrast with sequential order). These are primarily of two types: Random Access Memory (RAM) This is Read Write memory. Information can be read as well as modified. Volatile in nature means Information is lost as soon as power is turned off. Read Only Memory (ROM) This is non-volatile in nature (contents remain even in absence of power). Usually, these are used to store small amount of information for quick reference by CPU. Information can be read not modified.
  • 9. Enterprise Information Systems 5 ashisdesai@gmail.com Generally used by manufacturers to store data & programs. There is a huge speed difference between Registers and Primary Memory. In order to bridge these speed differences, we have cache memory. Cache (pronounced as cash) is a smaller, faster memory, which stores copies of the data from the most frequently used main memory locations so that Processor/Registers can access it more rapidly than main memory. Virtual Memory is in fact not a separate device but an imaginary memory area supported by some operating systems (for example, Windows) in conjunction with the hardware. If a computer lacks the Random Access Memory (RAM) needed to run a program or operation, Windows uses virtual memory to compensate. Virtual memory combines computer’s RAM with temporary space on the hard disk. When RAM runs low, virtual memory moves data from RAM to a space called a paging file. Moving data to and from the paging file frees up RAM to complete its work. Thus, Virtual memory is an allocation of hard disk space to help RAM. The secondary memories are available in bigger sizes, thus programs and data can be stored on secondary memories. Secondary storage differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfers the desired data using intermediate area in primary storage. Secondary storage does not lose the data when the device is powered down: it is non-volatile.
  • 10. Enterprise Information Systems 6 ashisdesai@gmail.com The features of secondary memory devices are non-volatility (contents are permanent in nature), greater capacity (they are available in large size), greater economy (the cost of these is lesser compared to register and RAMs) and slow speed (slower in speed compared to registers or primary storage). Storage devices could differ amongst each other in terms of speed and access time, cost/ portability, capacity and type of access. Based on these parameters most common forms of secondary storage are: USB Pen Drives, Floppy drive, Hard Drive, CD, DVD, Blue ray Disks and Smart cards. Output Devices Computers systems provide output to decision makers at all levels in an enterprise to solve business problems, the desired output may be in visual, audio or digital forms. Output devices are devices through which system responds. Visual output devices like, a display device visually conveys text, graphics, and video information. Information shown on a display device is called soft copy because the information exists electronically and is displayed for a temporary period of time. Display devices include CRT monitors, LCD monitors and displays, gas plasma monitors, and televisions. Some types of output are textual, graphical, tactile, audio, and video. Textual output comprises of characters that are used to create words, sentences, and paragraphs. Graphical outputs are digital representations of non-text information such as drawings, charts, photographs, and animation. Tactile output such as raised line drawings may be useful for some individuals who are blind. Audio output is any music, speech, or any other sound. Video output consists of images played back at speeds to provide the appearance of full motion.
  • 11. Enterprise Information Systems 7 ashisdesai@gmail.com DATA RESOURCES Data: Data are the raw bits and pieces of information with no context. Data can be quantitative or qualitative. Quantitative data is numeric, the result of a measurement, count, or some other mathematical calculation. By itself, data is not that useful. For it to be useful, it needs to be given context. Once we have put our data into context, aggregated and analysed it, we can use it to make decisions for our organization which also known as Information. This consumption of information produces knowledge. And knowledge can be used to make decisions, set policies, and even spark innovation. The final step from knowledge to wisdom, means someone combine their knowledge and experience to produce a deeper understanding of a topic. And recent areas for the same are Artificial Intelligence and Machine Learning. Database: The goal of many information systems is to transform data into information to generate knowledge that can be used for decision making. A database is an organized collection of related information. It is called an organized collection because in a database all data is described and associated with other data. Database Management Systems (DBMS): Database is just electronic filing cabinet. Even this simple system help us to do various operation on file, such as: Add New Files Delete Existing File From Db Insert Data In Existing File Modify The Data Retrieving Or Querying The Data From Existing File DBMS may defined as software that aid (helps) in Organizing, Controlling and using the data needed by application Programme. Data Base Management Systems are Oracle, MySQL, SQL Servers and DB2 etc. MS-Access and Open Office Base are the example of personal DBMS which are not meant to share in network but they are installed in single device and used by the single user at a time.
  • 12. Enterprise Information Systems 8 ashisdesai@gmail.com Database Models: It determines the logical structure of a database and fundamentally determines in which manner data can be stored, organized and manipulated. Let’s now look at the database model hierarchy. Database: This is a collection of Files. File: This is a collection of Records. Record: This is a collection of Fields. Field: This is a collection of Characters. Characters: These are a collection of Bits. Some prominent database models are as follows: A hierarchically structured database is arranged logically in an inverted tree pattern. The DB structure reflects the fact that repairs are made to equipment located in rooms that are part of buildings. All records in hierarchy are called Nodes. Each node is related to the others in a parent-child relationship. Each parent record may have one or more child records, but no child record may have more than one parent record. Thus, the hierarchical data structure implements one-to-one and one-to-many relationships. The top parent record in the hierarchy is called the Root Record. Records that “own” other records are called Parent Records.
  • 13. Enterprise Information Systems 9 ashisdesai@gmail.com The network model is a variation on the hierarchical model, to the extent that it is built on the concept of multiple branches where in that branches can be connected to multiple nodes. The network model can represent redundancy. However, unlike the hierarchical model, the network model also permits a record to be a member of more than one set at one time. The network model would permit the equipment records to be the children of both the room records and the vendor records. This feature allows the network model to implement the many-to-one and the many-to many relationship types. This gives excellent retrieval performance, at the expense of operations such as database loading and reorganization. A relational database allows the definition of data and their structures, storage and retrieval operations and integrity constraints that can be organized in a table structure. A table is a collection of records and each record in a table contains the same fields. Three key terms are used extensively in relational database models: relations, attributes, and domains. A RELATION is a table with columns and rows. The named columns of the relation are called ATTRIBUTES. And the DOMAIN is the set of values the attributes are allowed to take. All relations (and, thus, tables) in a relational database have to adhere to some basic rules to qualify as relations. First, the ordering of columns is immaterial in a table. Second, there can't be identical record in a table. And third, each record will contain a single value for each of its attributes. Tables can also have a designated single attribute or a set of attributes that can act as a "key", which can be used to uniquely identify each record in the table. A key that can be used to uniquely identify a row in a table is called a primary key. Keys are commonly used to join or combine data from two or more tables.
  • 14. Enterprise Information Systems 10 ashisdesai@gmail.com It is based on the concept that the world can be modelled in terms of objects and their interactions. An Object-oriented database provides a mechanism to store complex data such as images, audio and video, etc. An object-oriented database management system is a relational database designed to manage all of these independent programs, using the data produced to quickly respond to requests for information by a larger application. In the Fig. 2.7.5, the light rectangle indicates that ‘engineer’ is an object possessing attributes like ‘date of birth’, ‘address’, etc. which is interacting with another object known as ‘civil jobs’. When a civil job is commenced, it updates the ‘current job’ attribute of the object known as ‘engineer’, because ‘civil job’ sends a message to the latter object. Objects can be organized by first identifying them as a member of a class / subclass. The dark rectangles indicate ‘Engineer’ as a class and ‘Civil Engineer’ and also ‘Architect’ as both subclasses of ‘Engineer’. These subclasses possess all the attributes of ‘Engineer’ over and above each possessing at least one attribute not possessed by ‘Engineer’. The line intersecting particular object classes represents the class of structure. Secondly, objects can be identified as a component of some other object. The dotted line intersecting particular object classes represents the part of structure. Apart from possessing attributes, objects as well as possess methods or services that are responsible for changing their states.
  • 15. Enterprise Information Systems 11 ashisdesai@gmail.com In the Fig. 2.7.5 for example, the service ‘Experience’ as a Civil Engineer or Architect for the object ‘Engineer’ calculates how much experience the engineers of these particular two subclasses have as professionals. Advantages of a DBMS One of the principle advantages of a DBMS is that the same information can be made available to different users. In a DBMS duplication of information or redundancy is, if not eliminated, carefully controlled or reduced i.e. there is no need to repeat the same data over and over again. Data integrity is maintained by having accurate, consistent, and up-to-date data. Using a DBMS, file formats and programs are standardized. This makes the data files easier to maintain because the same rules and guidelines apply across all types of data. The level of consistency across files and programs also makes it easier to manage data when multiple programmers are involved. DBMS makes the data access and manipulation easier for the user. DBMS also reduce the reliance of users on computer experts to meet their data needs. DBMSs allow multiple users to access the same data resources which could lead to risk to an enterprise if not controlled. Through the use of passwords, database management systems can be used to restrict data access to only those who should see it. In a DBMS data does not reside in applications but data bases program & data are independent of each other. In the case of deployment of DBMS, application development becomes fast. The data is already therein databases, application developer has to think of only the logic required to retrieve the data in the way a user needs. Disadvantages of a DBMS Implementing a DBMS system can be expensive and time-consuming, especially in large enterprises. Training requirements alone can be quite costly. Even with safeguards in place, it may be possible for some unauthorized users to access the database. If one gets access to database then it could be an all or nothing proposition.
  • 16. Enterprise Information Systems 12 ashisdesai@gmail.com Big Data The term refers to such massively large data sets that conventional database tools do not have the processing power to analyse them. For example, Walmart must process over one million customer transactions every hour. Storing and analysing that much data is beyond the power of traditional database-management tools. Understanding the best tools and techniques to manage and analyze these large data sets is a problem that governments and businesses alike are trying to solve. Data Warehouse Data warehouse is simple: extract data from one or more of the organization’s databases and load it into the data warehouse (which is itself another database) for storage and analysis. A data warehouse should be designed so that it meets the following criteria: It Uses Non-Operational Data This means that the data warehouse is using a copy of data from the active databases that the company uses in its day to-day operations, so the data warehouse must pull data from the existing databases on a regular, scheduled basis. The Data Is Time-Variant This means that whenever data is loaded into the data warehouse, it receives a time stamp, which allows for comparisons between different time periods. The Data Is Standardized Because the data in a data warehouse usually comes from several different sources, it is possible that the data does not use the same definition or units. For example one table using the format of dd/mm/yyyy where other table in another database use the format mm/dd/yyyy for the date, so now here the data warehouse must have to create specific standards to load the data in data warehouse. This process is called Extraction-Transformation-Load (ETL). There are two primary schools of thought when designing a data warehouse: It starts by creating small data warehouses, called data marts, to solve specific business problem. As these data marts created they can be combined into a larger data warehouse.
  • 17. Enterprise Information Systems 13 ashisdesai@gmail.com It suggests that we should start by creating an enterprise-wide data warehouse and then, as per need of organization create smaller data marts from the data warehouse. It forces an organization to better understand the data that it is currently collecting and, equally important. It provides a centralized view of all data being collected across the enterprise. Once all data identified as consistent, an organization can generate one version of the truth. This creates a historical record of data, which allows for an analysis of trends. A data warehouse provides tools to combine data, which can provide new information and analysis. Data Mining Data Mining is the process of analysing data to find previously unknown trends, patterns, and associations to make decisions. In some cases, a data-mining project is begun with a hypothetical result in mind. In other cases, there are no presuppositions and a data-mining program is run against larger data sets to find pattern and association. NETWORKING AND COMMUNICATION SYSTEMS Telecommunications give an organization the capability to move information rapidly between distant locations and to provide the ability for the employees, customers, and suppliers to collaborate from anywhere. Through telecommunications, this value may be: Increase the efficiency of the operation. Improvement in the effectiveness of the management. Innovation in the marketplace.
  • 18. Enterprise Information Systems 14 ashisdesai@gmail.com Computer Network is a collection of computers and other hardware interconnected by communication channels that allow sharing of resources and information. A network is a group of devices connected to each other. Network and Communication System: These consist of both physical devices and software, transfers the data from one physical location to another. Computers and communications equipment can be connected in networks for sharing voice, data, images, sound and video. Each component, namely the computer in a computer network is called a ‘Node’. The networks could be of two types: wherein connection first established then data is exchanged like it happens in case of telephone networks. Where no prior connection is made before data exchanges. The networks is modelled to address the following basic issues: It refers to the process of deciding on how to communicate the data from source to destination in a network. It refers to the amount of data which can be sent across a network in given time. It refers to the ability of a network to recover from any kind of error like connection failure, loss of data etc. It refers to the situation that arises when there is a conflict for some common resources in a network. Benefits of Computer Network There would be many situations where information must be distributed geographically. Data could be stored at a central location and can be shared across different systems. Even resource sharing could be in terms of sharing peripherals like printers etc. It would increase drastically if the processing is distributed amongst computer systems.
  • 19. Enterprise Information Systems 15 ashisdesai@gmail.com Many critical application should be available 24X7, which are distributed across the network so reliability of the application would be high. It provides multiple ways to communicate the data like using e-mail, newsgroups, video conferencing, etc. Benefits of Telecommunication It enable a firm to transmit raw data and information quickly and accurately between remote sites. It enable an organization with geographically remote sites to function, as a single unit. Operational efficiency may be raised by eliminating intermediaries from various business processes. NETWORK RELATED CONCEPTS Packet: It breaks the message down into smaller pieces, called packets. Each packet has the sender’s address, the destination address, a sequence number, and a piece of the overall message to be sent. Repeater: A repeater regenerates the signal over the same network before the signal becomes too weak or corrupted to extend the length to which the signal can be transmitted over the same network. Hub: A hub is basically a multiport repeater that connects multiple wires coming from different branches. As they do not have intelligence to find out best path for data packets which leads to inefficiency and wastage Switch: It connects multiple devices together and filters packets based on their destination within the connected devices. Router: A device that receives and analyses packets and then routes them towards their destination.
  • 20. Enterprise Information Systems 16 ashisdesai@gmail.com Bridge: A communications processor that connects two Local Area Networks (LANs) working on the same protocol. MAC Address: These are most often assigned by the manufacturer of a Network Interface Controller (NIC) and are stored in its hardware, such as the card’s read only memory. Network Topology: Topology means, the physical or logical arrangement of links in a network. It involves a central unit with number of terminals tied to it. A single length of wire, cable, or optical fiber (called bus) connects several computer. It’s much like a bus network, except the length of wire connects to form a loop. Each node is connected by a dedicated point to point link to every node. Transmission Mode: It defines the direction of signal flow between two linked devices. The data flows only in one direction- unidirectional The data flows in one direction or the other, but not both at the same time The data flows in both directions simultaneously Protocol: A protocol is the set of rules that allow two (or more) devices to exchange information back and forth across the network. IP Address: Every device that communicates on the Internet, is assigned a unique identifying number called an IP (Internet Protocol) address. The IP address standard used has been IPv4 (version 4), which has the format of four numbers between 0 and 255 separated by a period. The IPv4 standard has limit of 4,294,967,296 possible address. Where IPv6 standards which is currently being phased in, is formatted as eight groups of four hexadecimal digits.
  • 21. Enterprise Information Systems 17 ashisdesai@gmail.com The IPv6 standards has a limit of 3.4 x 1038 possible address. Domain Name: A Domain Name is a human-friendly name for a device on the Internet. For example domain name id Wikipedia.org describe the organization and .org is the top level domain. Other well-known TLDs include .com, .net, and .gov. Domain Name System (DNS): DNS which acts as the directory on the Internet. When a request to access a device with a domain name is given, a DNS server is queried. It returns the IP address of the device requested, allowing for proper routing. Packet Switching: When a packet is sent from one device out over the Internet, it does not follow a straight path to its destination. In fact, sometimes two packets from the same message will take different routes. Sometimes, packets will arrive at their destination out of order. When this happens, the receiving device restores them to their proper order. Wi-Fi: Wi-Fi is a technology that takes an Internet signal and converts it into radio waves. These radio waves can be picked up within a radius of approximately 65 feet by devices with a wireless adapter. Several wi-fi specification have been developed over the years, starting with 802.11b (1999), followed by the 802.11 g specification in 2003. And 802.11n in 2009. Voice Over IP (VoIP): A growing class of data being transferred over the Internet is Voice Data. A protocol called VoIP enables sounds to be converted to a digital format for transmission over the Internet and then recreated at the other end.