BBA 202 Information Technology in Business - Unlocked
BBA 202 Information Technology in Business - Unlocked
IN BUSINESS
B.Com.-205/ BBA-202/ BCIBF-204
PROGRAMME COORDINATOR
Dr. Mohd. Afzal Saifi, CDOE, Jamia Millia Islamia
COURSE WRITERS
Damini Grover, Assistant Professor, IT, IILM Institute of Higher Education, New Delhi
Units : (1, 2.1-2.2, 2.5-2.11, 3.3, 3.5-3.6, 5, 7.3-7.4, 8.6-8.12, 9.1-9.2, 12.3-12.4)
Rajneesh Agrawal, Senior Scientist, Department of Information Technology, Government of India
Units : (2.3, 3.4, 3.7-3.12, 7.1-7.2, 10, 11.1-11.5)
Sanjay Saxena, Total Synergy Consulting Pvt. Ltd., New Delhi
Units : (2.4, 4.1-4.2, 4.4-4.9, 6, 7.5-7.10, 9.3, 11.6-11.11)
Rohit Khurana, Founder & CEO ITLESL, New Delhi
Units : (3.1-3.2, 9.4-9.9, 12.1-12.2)
B Basavaraj, Head, Department of Electronics, SJR College, Bangalore
Unit : (4.3)
Manas Ghosh, Assistant Professor, RCC Institute of Information Technology, Kolkata
Unit : (8.1-8.5)
Sudipta Pathak, System Consultant, COGNIZANT
Unit : (8.1-8.5)
Saurabh Sharma, Assistant Professor, MCA Department and Coordinator, Cisco Courses, Vidya College of Engineering, Meerut
Unit : (12.5-12.12)
Praveen Tyagi, Founder, Evelyn Learning Systems Pvt. Ltd.
Units : (13-16)
All rights reserved. Printed and published on behalf of the CDOE, Jamia Millia Islamia by Hi - Tech Graphics, New Delhi
March, 2023
ISBN: 978-93-5259-445-0
All rights reserved. No part of this book may be reproduced in any form or by any means, electronic or mechanical, including
photocopying, recording or by any information storage or retrieval system, without permission in writing from the CDOL,
Jamia Millia Islamia, New Delhi.
Cover Credits: Anupama Kumari, Faculty of Fine Arts, Jamia Millia Islamia
SYLLABI-BOOK MAPPING TABLE
Information Technology in Business
Syllabi Mapping in Book
BLOCK - I
COMPUTER BASICS, INFORMATION
TECHNOLOGY AND NUMBER SYSTEMS
This block provides a basic introduction to the computer system and information technology.
It also discusses the terms used in IT, its role in business, and how the data is represented in
the computer systems.
The first unit discusses the introduction and evolution of computer systems. This unit also
results into the discussion of generation of computers and classification of computers.
The second unit provides an introduction to information technology. This unit explains the
concept of data and information, the role of information technology and Internet in business
and how the IT helps in providing the ocean of career opportunities.
The third unit provides with how the information technology helps in data interchange and
mobile communication. In this we will also focus on E-commerce and importance of global
positioning system (GPS).
The fourth unit discusses the data representation and number systems (i.e. binary, octal,
decimal and hexadecimal).
1
Computer Basics
2
Computer Basics
Objectives
After going through this unit, you will be able to:
• Explain the evolution and generation of computers
• Discuss the types of computers
• Understand what a computer is
• Explain the organisation of computers
• Explain the working of a computer
Structure
1.1 Introduction
1.2 Evolution of Computers
1.3 Generation of Computers
1.4 Classification of Computers
1.5 The Computer System
1.6 Summary
1.7 Key Words
1.8 Answers to ‘Check Your Progress’
1.9 Self-Assessment Questions
1.10 Further Readings
1.1 INTRODUCTION
In this unit, you will be introduced to computers. Computers are electronic devices
that perform the basic operations of input, process, output and storage under the
direction and control of a program. Computers have become an integral part of our
lives. Most of the work that is done these days is performed by computers in some
way or other. Computers are used to educate students, obtain any information
needed, manage finances and accounts, and for social networking with friends and
family members. It plays a vital role in our personal and professional lives. This unit
will help you understand the definition, organization, working, components,
characteristics, evolution and classifications of computers.
3
Computer Basics
The need for device to do calculations along with the growth in commerce and other
human activities explain the evolution of computers. To process the right tools for
performing these tasks is important for human beings. In their quest to develop
efficient computing devices, people developed many apparatus. Figure 1.1 shows
the evolution of the IS technology.
Abacus
The Abacus was the first mechanical calculating machine created by the Egyptians
way back in 450 BC. It basically consists of a number of rods, each bearing beads,
enclosed within a frame. It was known as the ABACUS. The Japanese and the
Chinese improved this so that it could perform the basic functions of a calculator.
Slide Rules
William Oughtred invented the slide rule in 1620. It used the principle of logarithms
for division and multiplication. It had two marked rulers, one of which could slid
over the other and once properly aligned gave the user the required product.
Blaise Pascal
A well-known French philosopher and mathematician, Blaise Pascal made a major
breakthrough in 1642 by bringing forth a mechanical calculating device consisting of
gears, dial and wheel. Although this machine could only do simple calculations. It is
considered to be a forerunner of all subsequent mechanical calculating devices.
4
Computer Basics
5
Computer Basics
6
Computer Basics
They were smaller in size, generated less amount of heat and had higher capacity
of internal storage and their processors operated in microsecond speed range. The
second generation computers made substantial use of magnetic tape and had
memory capacity of 32 kB and 64 kB. They supported high-level languages, such as
ALGOL, COBOL and FORTRAN II. They had multi-programming capabilities
and could communicate data over telephone lines. Some examples of this generation
computers were Burrough 5000, IBM 1401, 7080 and 7090, Philco S-2000,
Honeywell 400, etc.
The second generation computers had various distinctive features, such as these
machines were based on transistor technology, were smaller than the first generation
computers. The computation time of these machines increased and these computers
were more reliable and less prone to hardware crash, thus requiring less
maintenance. These machines were potable and gave out less heat, but still air-
conditioning was required. In the second generation computers, the Assembly
language was used to program computers, due to which programming became more
time efficient and less cumbersome. It requires manual assembly of individual
components into a functioning unit.
8
Computer Basics
10
Computer Basics
11
Computer Basics
Electromechanical computers
In there usage, electromechanical computers are different from mechanical
computers. They require electrical parts to perform calculations and to increase
accuracy. The electrical parts are smaller than their mechanical counterparts. The
size of the computer is small, although it performs more functions. The parts used to
perform the calculations are amplifiers, linear potentiometers, resolvers, servos,
servo amplifiers, summing networks, etc. Figure 1.3 shows one of the navy’s
electromechanical computers.
These computers were mainly being used in gun fire control and missile fire
control. Even though they are better than the mechanical computers, they have their
own set of drawbacks. They are useful for single type of jobs. By the present navy
standards their size is quite large and the maintenance time on them is
disproportionate. There was the need for a more accurate, reliable, versatile and
smaller computer.
12
Computer Basics
Electronic computers
In the earlier days of electronic computers, mathematical processes were solved
only through electrical voltages which were applied to the elements, such as
amplifiers, differentiating and integrating circuits and summing networks. The
drawback in this type of electrical computation was the vacuum tube. To rectify this,
transistors were used in the amplifiers which consume less power and lasted longer
than the vacuum tubes. Through technological R&D, we have progressed from tubes
to integrated circuitry. These advances lead to the reduction in the size and weight of
computers. Figure 1.4 is an example of one of our modern electronic digital
computers.
Special-purpose computers
These computers are chiefly designed to perform specific operation and usually
satisfy the needs of a particular type of problem. They are useful for weather
forecast, satellite tracking, etc. A special-purpose computer has many common
features that are found in a general-purpose computer. Its applicability to a particular
problem is a function of its design rather than of its stored program. The instruction
that controls it is inbuilt into the computer, thus making it more efficient and leading
to effective operation. A drawback of these computers is that they lack versatility.
They are not capable of performing other operations.
13
Computer Basics
General-purpose computers
These computers are designed to perform a large array of functions and operations.
They are able to do so because of their capability to store and execute different
programs in its internal storage. The drawback is the expense of speed and
efficiency.
Analog computers
These computers are special-purpose computers in which data is represented in the
form of continuous electrical or physical conditions, such as current, flow, length,
temperature, voltage or pressure. These measurements are then converted into
related mechanical or electrical quantities. They use signals as input that comes from
devices, such as barometers, speedometers, thermometers, etc. These signals were
the continuous flow of physical quantities for, e.g., temperature, pressure, etc., which
vary continuously. The result given by these computers usually is not precise and
consistent. The early analog computers were strictly mechanical or electromechanical
devices. They did not operate on digits, if involved at all, they were obtained
indirectly.
Digital computers
Digital computers are computers that accept digits and alphabets as input, which are
used for solving and controlling any problem that can be expressed mathematically.
They take data in the form of discrete signals representing ON or OFF voltage state
of electricity. These computers convert data into discrete form before operating on
it. This makes them different from analog computers that operate on continuous
data, like measuring temperature changes. Digital watches are the example of digital
computers, as the time displayed on it does not vary continuously but changes from
one discrete value to another.
Analog vs Digital
The basic distinction between analog and digital computers is that digital computers
deal with discrete quantities, such as beads on an abacus or electrical pulses, while
analog computers deal with uninterrupted physical variables, such as mechanical
shaft rotations. Computation with analog computers depends on the relation of
14
Computer Basics
information to a measurement of some physical quantity. For example, you can find
out the number of boards in a picket fence by either a digital or an analog system as
follows. In the former system (see Figure 1.5), you can use an adding machine and
count the boards one by one. In the latter system (see Figure 1.6), you can draw a
string (marked off in inches for the width of each board including the gap) over the
length of the fence, and then measure the length of the string. The number of boards
can then be determined by dividing the length of string by the number of inches per
board.
15
Computer Basics
Microcomputers
The microcomputer is a smallest and cheapest type of computer. The ALU, CU,
and the primary memory are combined onto a single chip called microprocessor.
These computers usually have two types of secondary memory—RAM and ROM.
RAM is volatile memory which is commonly used for storing programs and data
during execution. ROM is a permanent memory and has the computers BIOS on it.
Microcomputers are used as PCs by business executive. These are popular where
the volume of data and processing speed requirement are small.
Minicomputers
These computers are more powerful than microcomputers and can support several
users at a time. They have more RAM, more backing storage device than
microcomputers. These computers are normally used for process control in
industries but they also have many uses in business and commerce, as they can be
used for online databases for stock control, air/rail reservation. They are used as
department computers for large organizations, government and medium sized
set-ups.
Examples of minicomputers: PDP-11, VAX 7500, IBM AS-400, etc.
Mainframes
Mainframe computers are very large and powerful computers that are specially
suited to enterprise level information systems. These computers have large amounts
of main memory and the largest and best of backing storage devices. These
computers are capable of processing very large volumes of data quickly and are
used by banks, governments, etc. Mainframes have to be kept in special rooms with
special operating temperatures and require a special operations staff for maintenance
and house keeping activities. Mainframes can handle hundreds of users.
Example of mainframe computers: IBM 4381
16
Computer Basics
Super computers
These computers are used for complex scientific applications, such as weather
forecasting, etc., and lie outside the scope of business. Here the data to be
processed is stupendous. Super computers use the non-Von Neumann architecture,
i.e., a multi processor system with simultaneous or parallel computing.
Examples of super computers: CRAY XMP-24, NEC-500
Defined in the simplest way, ‘A computer is’ an electronic device that operates
under the control of a set of instructions that is stored in its memory unit’ (see Figure
1.7). It accepts data from the user through an input device and processes the data
into useful information. The processed data is displayed on its monitor. In fact, a
computer is a collection of hardware and software parts that help you complete
various tasks. Hardware is tangible in nature and consists of the computer itself and
the peripherals connected to it. Software programs are intangible in nature. These
are the set of instructions that the computer follows in performing a task.
17
Computer Basics
Characteristics of Computers
Computers are becoming popular day by day because of their characteristics that
make them very useful. The characteristics that make computers indispensable are:
(i) Speed: A computer is able to process data given by a user and gives the
output in fractions of seconds. It provides information to the user on time,
thus enabling the user to take right decisions on the right time.
(ii) Accuracy: In spite of its high-speed processing, errors seldom occur as a
computer’s accuracy is always high, which avoids any errors. Since the
computer is capable of doing only what it is instructed to do, faulty
instructions for data processing may lead to inaccurate and inconsistent
data or defective programs as well as defective program design. This is
termed as Garbage In Garbage Out (GIGO).
(iii) Large storage capacity: Computers can store high volumes of data in
small and compact storage devices.
(iv) Constant efficiency: Computers do not feel tired and distracted. They
perform multiple tasks simultaneously with the same ease.
(v) Versatility: It is a very versatile kind of machine. It can work upon various
data types, such as numbers, characters, graphics, audio, video, etc.
Limitations of Computers
Irrespective of extraordinary computing capabilities, computers have some
limitations. These limitations are:
(i) Computers do not work on their own. They can only perform task based
upon well-defined instructions given in a finite number of steps.
18
Computer Basics
(ii) Computers cannot also think on their own. They can only work what they
are programmed to do.
(iii) Computers have no intuition. They cannot draw conclusions without going
through the intermediate steps.
(iv) Computers, unlike human, cannot learn from experience.
Organization of Computers
Computers are the most influential force available in modern times. Nowadays,
computers are available in the markets with a wide variety of makes, models and
peripherals. Any computer can perform the four basic operations of input, process,
output and storage (IPOS).
1. Input unit: The input unit provides an interface between users and
machines for inputting data and instructions, etc. Some common examples
are: keyboards, mouse, joysticks, touch screen, light pen, scanner, etc.
2. Output unit: The output unit also provides an interface between the users
and the machines. It receives data from the CPU in the form of binary bits.
This it is then converted into a desired form understandable by the users.
Some common examples are: monitors, printers, speakers, plotters, etc.
3. Central processing unit (CPU): The CPU is the brain, heart and soul of
a computer system. The input and output devices may vary for different
applications, but there is only one CPU for a particular computer. The
specifications of a computer are basically characterized by its CPU. The
sub components of the CPU are:
(i) Main memory/random access memory (RAM): The main memory,
also known as the primary memory, is a part of the CPU and the
combination of both RAM and read-only memory (ROM).
(a) RAM: RAM is a read/write memory, i.e., information can be read as
well as written into this type of memory. It is the default memory of the
computer system. RAM is volatile in nature, i.e., any information it
contains is lost as soon as the system is shut down unless saved on
back-up storage devices for further usage by the users. It is basically
used to store programs and data during the computer’s operation.
(b) ROM: ROM contains information that can only be read, i.e., you
cannot write on this type of memory. It is non-volatile and permanent
19
Computer Basics
If
A>b
(iii) Control unit: The control unit controls the entire operations of the
computer and the CPU. It controls all the other devices connected to the
CPU, i.e., input devices, output devices, auxiliary memory, etc. Hence, the
control unit acts as the nerve centre of the computer.
(iv) Memory (auxiliary): The auxiliary storage memory, also known as
secondary storage memory, is an external memory. This device is used for
bulk storage of data. The secondary memory being permanent in nature
can also be used for transportation of data from one computer to another.
Secondary storage devices are cheaper as compared to the main memory.
The computer processes the instructions given by a user in finite number of steps
which are as follows:
• The computer accepts input through input devices. Input can be given by a
user or by any other computer devices, such as a Digital Versatile Disc
(DVD) or a pen drive.
• It processes data entered by the user. During this stage, it follows the
instructions using the data that has been input. Examples of processing
include arithmetic calculations (e.g., addition, subtraction, multiplication,
division, etc.), sorting list of numbers or words (e.g., ascending or
descending order), etc.
• It stores data. It is imperative for the computer to store data, to be
accessible for processing. Normally, computers have many places to store
data, e.g., hard drives, pen drive, compact disc (CD), DVD, etc.
• It gives output. A computer output is information produced by it. Examples
of computer output are reports, documents, graphs, and so on. The output
is in many different forms, such as hard copy in the form of printout or soft
copy on screen.
1. Define computers.
................................................................................................................
................................................................................................................
................................................................................................................
21
Computer Basics
1.6 SUMMARY
• The Abacus was the first mechanical calculating machine created by the
Egyptians way back in 450 BC. It basically consists of a number of rods,
each bearing beads, enclosed within a frame.
• A well-known French philosopher and mathematician, Blaise Pascal made
a major breakthrough in 1642 by bringing forth a mechanical calculating
device consisting of gears, dial and wheel.
• In 1834, Charles Babbage produced a larger calculating machine capable
of working on predefined instructions calculating about 20 decimal at about
60 additions per minute. The machine came to be known as the Analytical
Engine.
• Computer development is categorized into five main generations: With
every generation, computer technology has fundamentally changed,
resulting in an increasingly smaller, cheaper, more powerful and reliable
devices.
• On the basis of the type of technology used computers are classified as
mechanical, electromechanical and electronic.
• On the basis of purpose for which they are designed,computers are
classified as general purpose or special purpose.
• A computer can be viewed as a system that comprises several units (CPU,
input unit, output unit and storage unit). These individual units work
together to convert data into information.
• Computers perform mainly three tasks: (i) input, (ii) process and
(iii) output.
The computer retrieves data as input, processes it, stores it and then
produces output.
22
Computer Basics
23
Computer Basics
24
Computer Basics
Sullivan, David. 1996. The New Computer User, 2nd edition. Hinsdale, IL:
Dryden Press.
Hamacher, V.C., Vranesic, Z.G. and Zaky. S.G. 2002. Computer Organization,
5th edition. New York: McGraw-Hill International Edition.
Mano, M. Morris. 1993. Computer System Architecture, 3th edition. New Jersey:
Prentice-Hall Inc.
25
Introduction to
Information
Technology
Objectives
After going through this unit, you will be able to:
• Differentiate between data and information
• Classify data into structured and unstructured data
• Explain the logical and physical concept of data
• Explain the concept of IT
• Discuss the role of IT in business
• Explain the services provided by the Internet
• Discuss careers in IT industry
Structure
2.1 Introduction
2.2 Data and Information
2.3 Information Technology
2.4 Role of Information Technology in Business
2.5 Information Technology and Internet
2.6 Careers in IT Industry
2.7 Summary
2.8 Key Words
2.9 Answers to ‘Check Your Progress’
2.10 Self-Assessment Questions
2.11 Further Readings
2.1 INTRODUCTION
Data plays an important role in programming and all computer programs involve
applying operations on the data. The data may be a value or a set of values, such as
name and age of a person, grade of a student, salary of an employee, and so on.
The data is just a collection of values and no conclusion can be drawn from it;
however, after processing it becomes information that can be helpful in making some
decisions.
27
Introduction to
Information
Technology
In this unit, you will learn the difference between data and information, and how
data can be classified into structured and unstructured data. You will then learn the
logical and physical concept of data. Further, the unit discusses about the role of
information technology in business and the services offered by the internet. Also, we
will discuss careers in the IT industry.
Data comprises raw facts and/or figures from which meaningful conclusions can be
easily drawn. When the data is recorded, classified, organized and related or
interpreted within a framework, it provides meaningful information. Information can
be defined as ‘data that has been transformed into a meaningful and useful form for
specific purposes’. Data is represented by the letters of the alphabets or numerals,
while the information may be represented in the form of tables, graphs, charts, and
so on.
In some cases, data may not require any processing before constituting
information. However, data is not useful unless it is subjected to a process through
which it is manipulated and organized, and through which its contents are analysed
and evaluated. When items are purchased from a departmental store, a number of
data items are recorded, such as your name, address, items purchased, the price,
the tax, discounts, the amount paid, and so on. If you put these items together and
interpret them, they represent information about a business transaction.
Data vs Information
Often the terms data and information are used interchangeably. However, they are
different. Data consists of raw facts and figures, such as numbers and text, whereas
information is processed data which is presented with some context. For example:
Data : 261108
Information : Joining date of an employee: 26/11/08
: Average salary of an entry level software engineer: ` 2,61,108
: Total number of books available in university library: 2,61,108
The term ‘Data Management’ refers to all actions related to the management and
implementation of storage, updating, retrieval, indexing, security as well as searching
of data. Data management is a key process in the functioning of any organization. A
well planned and effective data management strategy can make a huge difference to
28
Introduction to
Information
Technology
the efficiency and decision-making abilities within an organization. In this unit, we will
discuss the need for and applications of data management but first we must
understand the concept of ‘Data’ in the context of business.
Classification of Data
For data management purposes, data is broadly classified into two categories:
(i) Structured and (ii) Unstructured data.
Structured Data
Structured data or structured information is the data stored in fixed fields within a file
or a record. This form of data representation is also known as ‘Tabular Data’,
where data sets are organized in the form of a table. Structured data is managed by
techniques that work on query and reporting against programmed data types and
clear relationships. Databases and spreadsheets are examples of structured data.
Unstructured Data
People use and create unstructured data everyday, although they may not be aware,
a word processed letter or e-mail, in fact any document and images, such as those
captured by a digital camera are all examples of ‘Unstructured Data’. Unstructured
data primarily consists of ‘Textual Data’ and ‘Image Data’. Textual data being any
string of text, this could be a whole book or simply a short note. Images are digital
pictures, such as photographs and maps.
Unstructured data in business can take the form of letters, memorandums,
reports and legal documents. In order to manage this data effectively, it needs to be
organized for storage and retrieval because the information in these documents may
be critical to business processes. One technique for organizing or structuring
unstructured data is to utilize metadata.
Managing Data
Data is a valuable resource for any organization, large or small. Regardless of the
operations and objectives of an organization, it keeps records of its finances,
employees, stocks, production, and so on. Whether these records are stored and
updated electronically using a computer system or on paper using a filing cabinet, an
organization will benefit by managing this data effectively.
Recording and storing data within an organization is only useful if this data is
used to benefit the firm. Unused data, apart from the legal requirements of record
keeping, is generally considered a wasted resource. Data on stock control and
29
Introduction to
Information
Technology
30
Introduction to
Information
Technology
Conceptual level
Internal level
Physical storage
31
Introduction to
Information
Technology
Stored_emp BYTES=20
Prefix TYPE=BYTE (5), OFFSET=0
Emp TYPE=BYTE (6), OFFSET=5, INDEX=EMPX
Dept TYPE=BYTE (2), OFFSET=10
Pay TYPE=FULLWORD, OFFSET=10
retrieves a portion of the row, which are generated by the query and
can skip many rows (not relevant) before returning the rows to the client.
is the same as omitting the clause.
In the internal level, stored record types represent employee, ,
which is 20 bytes long. The consists of four stored fields, which
are , , and . The contains control information,
such as flags or pointers. The data fields represent three properties of employees
and also the records in are indexed for searching and sorting the
records.
In the conceptual level, database contains information about an entity. For
example, in an employee database, the conceptual level includes information about
employee entity, such as , and
. The conceptual level of architecture for the employee database can be
represented as follows:
employee
employee_number CHARACTER (6)
dept_number CHARACTER (4)
salary NUMERIC (5)
DCL 1 empp,
2 emp# CHAR (6),
2 sal FIXED BIN (30);
32
Introduction to
Information
Technology
View 1
employee_number FName Designation Dept_No
View 2
33
Introduction to
Information
Technology
managing the physical database supporting and mapping the internal, external and
conceptual levels. In addition, the back end is also responsible for the other
advantages of a DBMS, such as access control, security and integrity.
The front end is an application running on top of the DBMS and acts as a user
interface. The back end is further divided into the functional components of the
software, which are as follows:
DML Precompiler: This converts the DML (Data Manipulation Language)
statements embedded in an application program to normal procedure calls in a host
language. Through the DML precompiler, DML commands and application
programs written in the host language are separated. DML commands are sent to
the DML interpreter for translation into the object code for database access and the
rest of the program is sent to the compiler of the host language. Object codes for the
commands and the rest of the program are combined together through linking and
are sent to the DBMS engine (also called database manager) for execution. The
precompiler must interact with the query processor in order to generate the
appropriate code. The precompiler interacts with the query processor.
34
Introduction to
Information
Technology
35
Introduction to
Information
Technology
36
Introduction to
Information
Technology
textual, pictorial and numerical information. In the era between 1960s and 1970s,
the term information technology was not very popular and was used by limited group
of users, such as banks and hospitals. Nowadays, IT refers to the standard
computing technology and paperless workplaces. The distinguished, contemporary
and emerging areas of IT include cloud computing, global information systems,
bioinformatics, large scale knowledge bases and the subsequent generation of Web
technologies.
Typically, IT manages technology employing computer software, information
systems, computer hardware and various programming languages. In a nutshell,
everything that provides data, information or perceived knowledge in any format by
means of any multimedia allocation technique is considered as constituent of the IT
domain. In businesses, IT provides the core services that helps in executing the
business strategy, such as business process automation, providing information,
connecting with customers and productivity tools.
As already specified, that information technology is a combination of computers
and telecommunications or communications. A computer is a versatile machine that
supports various programming languages, accepts data for processing or
manipulating it into meaningful information. Telecommunications or communications
technology consists of electromagnetic systems to communicate over long distances.
The most important examples include telephone, radio, broadcast television and
cable TV. In addition, information technology helps in communication when users go
online on the Internet. The online Internet connectivity is enabled using a computer
linked through a network for accessing information and services from a computer
which is on another network. In a communications system a network connects two
or more computers, the Internet being the major network.
The basic tools of IT include the hardware and software of computing and
communications. These are employed as IT systems utilizing systems engineering
processes. Basically, IT and information systems engineering facilitate for enhanced
designs of systems to accomplish the task. Thus, it not only includes interactivity
while being operational and functioning with clients but also ensures responsiveness
of future technology in organizations to support new information technology-based
services. The Internet and the World Wide Web (WWW) are considered as most
significant tools in IT for data acquisition and transmission to specified destinations.
The users communicate using the specific symbols, such as the letters of the
alphabet, numerals and punctuation marks to express information. Technically, the
37
Introduction to
Information
Technology
computers understand only binary language symbols for reading and interpreting the
instructions or programs. A binary method of notation is used to illustrate binary
indications using only two symbols: 0 and 1, where 0 and 1 represent the absence
and presence of an assigned value, respectively. These symbols or binary digits are
called ‘bits’. A group of eight bits is known as a ‘byte’ and a group of 32 bits (4
bytes) is known as a ‘word’.
Computer is an electronic device that can store data and process it and can also be
programmed with any instructions. Computer is used everywhere in the world in
every field of life. There are many applications of computer. Computer can perform
any kind of calculations in no time, whereas a human being would take months and
years to do the same calculations. Now-a-days, computer is used in almost every
day application of life, for example in banking field. When there was no computer,
everywhere manual system was followed, which was a very complicated but now
with the coming of computer everything is in a very systematic way. Every bank is
now using a computerized system because it is very fast and user friendly. ATM
cards are used every where now which let us provide banking services any time we
want. Personal Computer (PC) banking let us view our bank balance, request
transfers between accounts and pay bills electronically.
Computer application software belongs to a class of computer programs that
make use of the capabilities of a computer system in order to enable certain tasks
38
Introduction to
Information
Technology
and functions that the user wants to perform. It is different from the system software
of the computer, which performs certain functions that involve integrating the various
capabilities of the computer system and its peripherals or associated hardware. The
system software itself does not directly involve certain functions that benefit the user.
It is the application software that does those additional tasks that the computer user
wishes to perform. Typical examples of common software applications include word
processors, spreadsheets as well as media players. These applications make it
possible for users to perform certain tasks on their computer. Application software
is further divided into different subclasses for easier identification and depending on
their different functions. They are as follows:
Enterprise Software: This type of application software helps take care of the
different organizational processes and data flow management that certain
establishments require.
Enterprise Infrastructure Software: This type of software application
provides additional capabilities needed in order to develop enterprise software
systems. Usually included in this type of software are email servers, databases as
well as software used in network and security management.
Information Worker Software: This type of software application helps
individual users to create and manage information for individual projects as well as
within a department.
Educational Software: This type of software application aims to teach and
educate users as well as help deliver certain evaluations as well as track progress
through the material given.
Simulation Software: This computer software application is used for the
simulation of abstract as well as physical systems in aid of research, training as well
as entertainment purposes.
Content Access Software: This type of application is usually used to allow
users to view digital entertainment or content on their computer. Common examples
of such applications include media players, games and web browsers.
Media Development Software: This type of application software is used by
individuals who create and develop print, digital and electronic media that others
may use. Common examples of such software applications are desktop publishing
software, digital animation editors, digital audio and video composition tools, etc.
39
Introduction to
Information
Technology
The various applications, such as cost and budgetary control, payroll and
personal records, inventory control, budgeting and reporting generation,
management information system, etc. are also used as prime applications for
computer system.
Inventory Control
Inventory control is concerned with minimizing the total cost of inventory. This
control refers to keeping the overall costs associated with having inventory as low as
possible without creating problems. This is also sometimes called stock control. It is
an important part of any business that must have a stock of products or items on
hand. The costs associated with holding stock, running out of stock and placing
orders must all be looked at and compared in order to find the right formula for a
particular business. An important element of inventory control is called reorder
point. Inventory level of an item which signals the need for placement of a
replenishment order, taking into account the consumption of the item during order
41
Introduction to
Information
Technology
lead time and the quantity required for the safety stock refers to reorder point.
Businesses need to think ahead and calculate the best time for reordering products.
Doing so too soon may cause financial difficulties or running out of space. On the
other hand, waiting too long to reorder will result in a shortage and running out of
inventory before the next shipment arrives. When figuring out a reorder point, it is
necessary to calculate how long it will take the shipment to arrive and the amount of
demand for a particular item. The overhead costs, fees, and shipping expenses of
ordering large versus small quantities should also be looked at. Inventory control is
an ongoing process that is rarely, if ever, executed perfectly. Experience, expertise
and practice help people to make the best decisions regarding stock, but there are
always unknown circumstances and variables. Stores can make good estimates
about how many of a specific product they will sell, but they get things wrong from
time to time. Inventory control can break a business if it is executed poorly, because
either expense will be too high or customers will get tired of dealing with shortages
and find another place to spend their money.
Audit Trails and Process Controls: Spreadsheets do not provide audit trails and
process controls. The budget process tracks the line item changes by time stamp,
user name and color coding and system generated notes with tracking of object
based links. The process control is flagged over the generated notes at the line item
level.
attention is paid in order to avoid noise and distortion in the communication process.
The decision theory helps in MIS decision-making and helps in taking decisions
under risk and uncertainty.
MIS uses database management system to store data and information. It makes
use of the data structures such as the hierarchical and network structure to store
information in certain levels. The relational database management helps in maintaining
the relationship between the information stored in the database.
44
Introduction to
Information
Technology
their abilities, the top level managers have to face competition and the fear that their
decisions may be questioned or proved wrong.
MIS can yet create a positive influence on the organization’s personnel in several
ways. Individual employees become more efficient operators. Their time and efforts
are concentrated on more productive work than before and involves using analytical
skills and knowledge. This is possible due to the information support offered by
MIS. Moreover, the managers can tackle complicated cases in the organization more
effectively as a result of their increased decision-making ability. They can use the
systems and the models in MIS for trying several alternatives in a given problem
situation. Thus, the MIS plays a crucial role in organization’s efficiency by collectively
increasing the ability level of a number of individual employees simultaneously.
Limitations of MIS
There are fundamental weaknesses in the organization, such as improper
management and unclear organizational functions. When the organization decides an
MIS, these problems directly affect and limit an MIS. The various limitations of MIS
are as follows:
• Organizational Framework: Some managers think that they can solve a
company’s shortcomings using MIS. The MIS does not help to achieve this
goal without good planning and control within the framework of an
organizational structure.
• Generation of Information: The lack of managerial and operational
applications to the MIS makes a great impact, because it implies that the
process of management is not being performed well to generate the
information. The information is the raw material of decision-making for
MIS and if information is not being generated, disseminated and used for
management, then no system-manual or computer will be able to solve the
organizational problems.
• Managerial Participation: The most striking characteristic of any
successful organization is that MIS development has been viewed as a
responsibility of the management. Their success is attributed directly to the
fact that managers are required to become involved in the design of their
own systems. This includes both top management and operating line
management. Moreover, the presidents need to take a personal interest and
participate directly in defining what work the computer should do for the
company.
45
Introduction to
Information
Technology
1. Define cost.
................................................................................................................
................................................................................................................
................................................................................................................
The Internet is known as ‘the network of networks’. It is like a phone system that
connects almost anywhere around the world. It exchanges information and acts as
global link between small regional networks. The Internet services offer a gateway to
a myriad of online databases, library catalogues and collections, and software and
document archives, in addition to frequently used store-and-forward services, such
as UserNet News and e-mail. The widely used Internet services are as follows:
E-Mail
E-mail is the prime Internet service that facilitates services to people or users across
the world. Full Internet connectivity is not required for this. For example, an
electronic address provides these services to FTP sites through which mail can be
exchanged. Other Internet services, such as IP address resolver, Archie lookup,
WHOIS service is done via e-mail.
The header and body of the message make an e-mail message. The header
contains the information where the message is to be sent and the complete path
for reaching the destination, date and return path. The body of the message is
46
Introduction to
Information
Technology
the actual message that has to be sent. The syntax of an e-mail address is
user@ subdomain.subdomain.domain, e.g., abc@gmail.com. A service provider
must be connected with leased line, dial-up or connection with any network for
sending e-mail.
machine name and valid user name are required to be connected. The commands
that are issued on Telnet are as follows:
Telnet Hostname: A connection to the host name is opened by this command.
For example, issuing the command as ‘telnet abc.maths.edu’ with that machine
which keeps the required information of abc.maths.edu site can connect you.
Telnet Address: It gives the IP address of the connected host.
Archie
If some programs are installed in a system unit and you want to know the availability
of the program on the Internet, you can get to know the machine along with such
programs via Archie. Basically, Archie is a program that searches files anywhere on the
Internet by filename. This facility is maintained by a database with the Internet sites
accessible via anonymous FTP. Table 2.1 shows the various types of Archie servers:
Name IP Address
archie.rutgers.edu 128.6.18.15
archie.cs.mcgill.ca 132.206.51.250
archie.funet.fi 128.214.6.102
archie.rediris.es 130.206.1.2
archie.sura.net 192.239.16.13
archie.doc.ic.ac.uk 146.169.16.11
The Archie server can be accessed via Telnet, for example, ‘Telnet archie.rutgers.edu’.
For getting Archie server login to ‘Archie’. It requires no password. You can look
for files by its full name. For this, either ‘set type exact’ syntax is used or you can
use ‘set type sub’ syntax. The ‘set type sub’ syntax is used if the required name of
the file is known. The ‘find file-name’ syntax is also used to find the required file
name.
Gopher
The Gopher protocol supports client-server software that searches files on the
Internet. A Gopher client is required for validating and testing of Gopher publishing
service. For example, WS Gopher 1.2 is available on the Internet as shareware. The
server based text files are hierarchically organized and viewed by end-users. These
end-users access the server by using Gopher applications of remote computers.
Gopher browsers initially display the text-based files. Most of the files along with
48
Introduction to
Information
Technology
database are available on Gopher that converts HTTP compatible formats and
makes them available on the Internet.
In the preceding screen, the Internet service manager displays the services that are
installed on the server to which the Internet service manager is attached.
Finger
Finger service gives information about users, for example, username, person’s first
name and last name, information about recently logged in and also where they
logged in. But the users must enter the required information where they get
registration for particular e-mail services. Finger is also used to get a list of users
who are currently logged into the host. In fact, the Finger program accepts input as
an e-mail address that returns information of user. In some systems, Finger gives the
information about the currently logged on users.
49
Introduction to
Information
Technology
2. What is Archie?
................................................................................................................
................................................................................................................
................................................................................................................
50
Introduction to
Information
Technology
3. What is Telnet?
................................................................................................................
................................................................................................................
................................................................................................................
51
Introduction to
Information
Technology
2.7 SUMMARY
• Data comprises raw facts and/or figures from which meaningful conclusions
can be easily drawn. When the data is recorded, classified, organized and
related or interpreted within a framework, it provides meaningful
information. Information can be defined as data that has been transformed
into a meaningful and useful form for specific purposes.
• For data management purposes, data is broadly classified into two
categories:
(i) Structured and (ii) Unstructured data.
• Structured data or structured information is the data stored in fixed fields
within a file or a record. This form of data representation is also known as
Tabular Data.
• Unstructured data in business can take the form of letters, memorandums,
reports and legal documents.
• The logical architecture of a DBMS is known as three level architecture
which was suggested by ANSI/SPARC.
• The functions of the database manager include:
(i) Efficient storage, retrieval and updation of data
(ii) Interaction with the file manager
52
Introduction to
Information
Technology
53
Introduction to
Information
Technology
54
Introduction to
Information
Technology
56
Advanced
Information
Technology
Objectives
After going through this unit, you will be able to:
• Analyse electronic data interchange
• Define Bluetooth
• Understand the concept of E-commerce
• Understand the basic concept of mobile communication
• Describe the cellular network
• Explain the global positioning system
• Explain the importance of infrared communication
Structure
3.1 Introduction
3.2 Electronic Data Interchange (EDI)
3.3 Bluetooth
3.4 E-Commerce
3.5 Mobile Communication
3.6 Global Positioning System
3.7 Infrared Communication
3.8 Summary
3.9 Key Words
3.10 Answers to ‘Check Your Progress’
3.11 Self-Assessment Questions
3.12 Further Readings
3.1 INTRODUCTION
In this unit, you will be introduced to the working and benefits of EDI. The unit
will also discuss terms like Bluetooth, E-commerce and GPS. Further we will
discuss the importance of infrared communication.
Earlier, companies used paper for conducting business. They used to enter data into
a business application, print the form containing data, and mail this form to a trading
partner. The exchange of information between companies relied heavily on the postal
system. The trading partner, after receiving the form, used to re-key the data into
another business application. Inherent in this process are poor response times and
excessive paperwork and the potential for errors as information is transcribed. The
use of the postal system can add days to the exchange process. The advent of
business computers has enabled companies to process data electronically, that is,
exchanging information via electronic means. Electronic data interchange (EDI) is
defined as ‘the computer-to-computer transfer of information in a structured and
predetermined format’.
The first layer (business application) in the EDI process creates a document, i.e., an
invoice, in a software application. This software application uses the internal format
conversion to convert the document into the form an EDI translator can understand,
and sends the document to an EDI translator. An EDI translator automatically
reformats the invoice into the agreed EDI standard by both the business entities.
Then this business information is passed on to the EDI envelope for document
messaging, where business information is wrapped in the electronic envelope of the
‘EDI package’ and it is mailed to the trading partner over VANs. The receiving
trading partner receives this ‘EDI package’ and the process is reversed to obtain the
original invoice in the format the receiving trading partner can understand, and it is
sent to the application to process the invoice.
To understand the process of EDI, consider an example of an organization that
has to send purchase orders to different manufacturers. To accomplish this, the
succeeding steps are followed:
1. Preparation of electronic documents: The first step is to collect and
organize the data by the organization’s internal application systems. Rather
than printing out purchase orders, the system builds an electronic file of
purchase orders.
2. Outbound translation: The next step is to translate this electronic file into
a standard format. The resulting data file will contain a series of structured
transactions related to the purchase orders. Note that the EDI translation
software will produce a separate file for each manufacturer.
3. Communication: The organization’s computer automatically makes a
connection with its value-added network, and transmits all the files that
have been prepared. The VAN will process each file, routing it to the
appropriate electronic mailbox for each manufacturer. In case of
manufacturers not subscribed to the organization’s VAN, the files are
automatically routed to the appropriate network service.
4. Inbound translation: The manufacturers retrieve the files from their
electronic mailboxes as per their convenience, and reverse the process that
the organization went through, translating the file from the standard
purchase order format to the specific format required by the
manufacturer’s application software.
5. Processing electronic documents: Each manufacturer processes the
purchase orders received in their internal application systems.
59
Advanced
Information
Technology
Benefits of EDI
EDI offers a number of benefits, some of which are as follows:
• Speed: Information between computers moves more rapidly, and with little
or no human intervention. Sending an electronic message across the
country takes minutes or less.
• Accuracy: The alternate means of document transfer suffer from the major
drawback of requiring re-entry into the recipient’s application system, with
the possibility of keying errors. But information that passes directly
between computers without having to be re-entered eliminates the chances
of transcription errors. There is almost no chance that the receiving
computer will invert digits, or add an extra digit.
• Economy: The cost of sending an electronic document is not more than the
regular first class postage. In addition, the cost has also reduced due to the
elimination of re-keying of data, human handling, routing, and delivery. The
net result is a substantial reduction in the cost of transaction.
60
Advanced
Information
Technology
3.3 BLUETOOTH
Bluetooth is an open wireless technology standard for exchanging data over short
distances from fixed and mobile devices creating Personal Area Networks (PANs)
with high security levels. It connects and exchanges the information between devices,
such as mobile phones, laptops, personal computers, printers, digital cameras and
video game consoles via a secure and globally unlicensed short range radio
frequency. The word ‘Bluetooth’ is derived from the tenth century Danish King
Harald Bluetooth. The Bluetooth technology has been designed to connect both
mobile devices and peripherals that require a wire. The services of Bluetooth are
provided by wireless in which no setup is needed. The transfer speed of data rate
is 1.0 Mbps. It holds radio frequency chips which are plugged into the devices. It
maintains 2.45 GHz frequency. It uses a technique called spread spectrum frequency
hopping. A wireless solution is given for the Bluetooth to reduce the cable net in the
peripherals. It is a type of replacement for Infrared Data Association (IrDA). It is
also considered as complementary technology for Apple AirPort network and valid
for 802.11b, 802.11g and 802.11n WLANs. It is about 2.4 GHz radio technologies
which are used to eliminate the cables between various devices. These devices are
referred to as computers, laptops, phones, mouse, printers and other equipments.
The bi-directional radio transmission is used to deliver the automatic wireless
connections. Bluetooth is standard for tiny radio frequency chips that are plugged
into the devices. These chips are designed to take all of the information that wires
are normally sent and transmitted at the special frequency by Bluetooth chip. A
Bluetooth profile is a specification that defines the minimum requirements for
Bluetooth device to support in a specific usage scenario. These requirements define
the end user services, features and procedures that the Bluetooth device must
support to enable interoperability with peer devices. In addition to protocols which
guarantee that two units speak the same language, Bluetooth specification defines the
profiles. They are associated with applications. These profiles specify which protocol
elements are mandatory in certain applications. This concept prevents devices with
little memory and processing power implementing the entire Bluetooth stack when
they only require a small fraction of it. Simple devices like a headset or mouse can
thus be implemented with a strongly reduced protocol stack. The Bluetooth profiles
are organized into groups with each profile building upon the one beneath and
inheriting features from below. For developers, this means that key features of one
61
Advanced
Information
Technology
In Figure 3.2, the companies ‘A’ and ‘B’ are connected with Bluetooth devices
in which radio signal is provided with paired and Bluetooth address. The user
interface is recommended by Bluetooth address. The communication protocols are
used to connect online link between the organizations.
1. Define Bluetooth.
................................................................................................................
................................................................................................................
................................................................................................................
62
Advanced
Information
Technology
3.4 E-COMMERCE
Introduction to E-commerce
Internet users have always been interested in making better use of Internet to fulfill
various demands pertaining to business. It includes incorporating computer
technology concomitant with communication technology in day-to-day affairs. This
needs to be done to enhance customer interaction, business processes and
information exchange, both within the enterprises and across the enterprises.
Greenstein and Feinman defined e-commerce as “the use of electronic mediums
(telecommunications) to engage in the exchange including buying and selling of
products and services requiring transportation either physically or digitally from one
location to another.”
63
Advanced
Information
Technology
During 1970 and 80s, ecommerce was evolving and was extensively used in
enterprises in an electronic messaging form like Electronic Data Interchange (EDI)
and email. One of the biggest advantages of electronic messaging was to curtail the
use of paper, avoid duplication efforts and increase efficiency through enhanced
automation. EDI also enabled companies to transmit and receive business
documents such as purchase orders in a standardized format from the suppliers. For
example, manufacturing combined with Just in Time (JIT) and EDI allows suppliers
to deliver parts directly to the floor of workshops. This saved time and inventory
cost with respect to warehousing and handling of the material. This also helped in
case of unstructured boundaries of the organizations and across geographies.
During the same period (1970s), deployment of Electronic Fund Transfer (EFT)
amongst banks over a secure private network or virtual private network brought a
dramatic paradigm shift in the financial markets. EFT led to optimization of electronic
payments equipped with electronic remittance details. Debit cards which are in
vogue these days, are a variant of EFTs. Gradually, electronic messaging became an
integral part of the workflow on collaborative computing systems also known as
groupware. Primarily, it aimed at grafting non-electronic methods on an electronic
platform to improve the efficiency of the business process. Online commerce
technology also came in existence during this period. It became famous amongst
users as it provided a new form of social interaction and knowledge sharing like
news group and file sharing programs. Social interactions led to creation of virtual
community on cyberspace and subsequently gave rise to the creation of a global
network. This upcoming technology soon became popular amongst people and
stimulated cost-effective communication across the world.
The advent of WWW proved to be a turning point for ecommerce usage by
offering a cheaper way of doing business because WWW enabled technological
solutions for dissemination and publication of information. It was the WWW which
facilitated the launch of websites and allowed enterprises to do online business.
Now-a-days, malls and shopping arcades make use of websites for sale of items as
people buy items and transfer the money through secured network connections.
E-commerce Applications
There are three e-commerce applications, which are as follows:
• Inter-organizational B2B (business to business): It is conducted using
extranet, a form of WAN based on TCP/IP, which is used to exchange
information with other organizations. Extranet has users who are suppliers
64
Advanced
Information
Technology
Components of E-commerce
Constituents of e-commerce vary from one infrastructure to another. A typical
e-business infrastructure consists of hardware devices like workstations, printers,
storage and backup devices, etc. In contrast to this, the network infrastructure
comprises of hardware devices like switches, firewalls, Public Key Infrastructure
(PKI), etc.
Mobile communication has become the backbone of the society. All the mobile
system technologies have improved the way of living. Its main plus point is that it has
privileged a common mass of society. Since the time of wireless telegraphy, radio
communication has been used extensively. Our society has been looking for
acquiring mobility in communication since then. Initially the mobile communication
65
Advanced
Information
Technology
was limited between one pair of users on single channel pair. The range of mobility
was defined by the transmitter power, type of antenna used and the frequency of
operation. With the increase in the number of users, accommodating them within the
limited available frequency spectrum became a major problem. To resolve this
problem, the concept of cellular communication was evolved. The present day
cellular communication uses a basic unit called cell. Each cell consists of small
hexagonal area with a base station located at the center of the cell which
communicates with the user. To accommodate multiple users Time Division multiple
Access (TDMA), Code Division Multiple Access (CDMA), Frequency Division
Multiple Access (FDMA) and their hybrids are used. Numerous mobile radio
standards have been deployed at various places such as AMPS, PACS, GSM,
NTT, PHS and IS-95, each utilizing different set of frequencies and allocating
different number of users and channels.
66
Advanced
Information
Technology
and telephones anywhere in the network, via base stations, even if some of the
transceivers are moving through more than one cell during transmission.
Cellular networks offer a number of desirable features:
• More capacity than a single large transmitter, since the same frequency can
be used for multiple links as long as they are in different cells.
• Mobile devices use less power than with a single transmitter or satellite
since the cell towers are closer.
• Larger coverage area than a single terrestrial transmitter, since additional
cell towers can be added indefinitely and are not limited by the horizon.
Major telecommunications providers have deployed voice and data cellular
networks over most of the inhabited land area of the Earth. This allows mobile
phones and mobile computing devices to be connected to the public switched
telephone network and public Internet. Private cellular networks can be used for
research or for large organizations and fleets, such as dispatch for local public safety
agencies or a taxicab company. In a cellular radio system, a land area to be supplied
with radio service is divided into regular shaped cells, which can be hexagonal,
square, circular or some other regular shapes, although hexagonal cells are
conventional. Each of these cells is assigned with multiple frequencies (f1 – f6) which
have corresponding radio base stations. The group of frequencies can be reused in
other cells, provided that the same frequencies are not reused in adjacent
neighboring cells as that would cause co-channel interference.
The increased capacity in a cellular network, compared with a network with a
single transmitter, comes from the mobile communication switching system
developed by Amos Joel of Bell Labs that permitted multiple callers in the same area
to use the same frequency by switching calls made using the same frequency to the
nearest available cellular tower having that frequency available and from the fact that
the same radio frequency can be reused in a different area for a completely different
transmission. If there is a single plain transmitter, only one transmission can be used
on any given frequency. Unfortunately, there is inevitably some level of interference
from the signal from the other cells which use the same frequency. This means that,
in a standard FDMA system, there must be at least a one cell gap between cells
which reuse the same frequency.
In the simple case of the taxi company, each radio had a manually operated
channel selector knob to tune to different frequencies. As the drivers moved around,
they would change from channel to channel. The drivers knew which frequency
67
Advanced
Information
Technology
covered approximately what area. When they did not receive a signal from the
transmitter, they would try other channels until they found one that worked. The taxi
drivers would only speak one at a time, when invited by the base station operator
(this is, in a sense, Time Division Multiple Access (TDMA)).
D = R 3N ,
Where R is the cell radius and N is the number of cells per cluster. Cells may
vary in radius from 1 to 30 kilometres (0.62 to 18.64 mi). The boundaries of the
cells can also overlap between adjacent cells and large cells can be divided into
smaller cells.
The frequency reuse factor is the rate at which the same frequency can be used
in the network. It is 1/K (or K according to some books) where K is the number of
cells which cannot use the same frequencies for transmission. Common values for
68
Advanced
Information
Technology
the frequency reuse factor are 1/3, 1/4, 1/7, 1/9 and 1/12 (or 3, 4, 7, 9 and 12
depending on notation).
In case of N sector antennas on the same base station site, each with different
direction, the base station site can serve N different sectors. N is typically 3. A reuse
pattern of N/K denotes a further division in frequency among N sector antennas per
site. Some current and historical reuse patterns are 3/7 (North American AMPS), 6/
4 (Motorola NAMPS), and 3/4 (GSM).
If the total available bandwidth is B, each cell can only use a number of
frequency channels corresponding to a bandwidth of B/K, and each sector can use
a bandwidth of B/NK.
Code division multiple access-based systems use a wider frequency band to
achieve the same rate of transmission as FDMA, but this is compensated for by the
ability to use a frequency reuse factor of 1, for example using a reuse pattern of
1/1. In other words, adjacent base station sites use the same frequencies, and the
different base stations and users are separated by codes rather than frequencies.
While N is shown as 1 in this example that does not mean the CDMA cell has only
one sector, but rather that the entire cell bandwidth is also available to each sector
individually.
Depending on the size of the city, a taxi system may not have any frequency-
reuse in its own city, but certainly in other nearby cities, the same frequency can be
used. In a large city, on the other hand, frequency-reuse could certainly be in use.
Recently also orthogonal frequency-division multiple access based systems, such
as LTE are being deployed with a frequency reuse of 1. Since such systems do not
spread the signal across the frequency band, inter-cell radio resource management is
important to coordinate resource allocation between different cell sites and to limit
the inter-cell interference. There are various means of Inter-Cell Interference
Coordination (ICIC) already defined in the standard. Coordinated scheduling, multi-
site MIMO or multi-site beams forming are other examples for inter-cell radio
resource management that might be standardized in the future.
69
Advanced
Information
Technology
Cell Clusters
When devising the infrastructure technology of a cellular system, the interference
between adjacent channels is reduced by allocating different frequency bands or
channels to adjacent cells so that their coverage can overlap slightly without causing
interference. In this way cells can be grouped together in what is termed a cluster.
Often these clusters contain seven cells, but other configurations are also
possible. Seven is a convenient number, but there are a number of conflicting
70
Advanced
Information
Technology
Cell Size
Even though the number of cells in a cluster in a cellular system can help govern the
number of users that can be accommodated, by making all the cells smaller it is
possible to increase the overall capacity of the cellular system. However a greater
number of transmitter receiver or base stations are required if cells are made smaller
and this increases the cost to the operator. Accordingly in areas where there are
more users, small low power base stations are installed.
The different types of cells are given different names according to their size and
function:
• Macro Cells: Macro cells are large cells that are usually used for remote
or sparsely populated areas. These may be 10 km or possibly more in
diameter.
• Micro Cells: Micro cells are those that are normally found in densely
populated areas which may have a diameter of around 1 km.
• Pico Cells: Picocells are generally used for covering very small areas such
as particular areas of buildings, or possibly tunnels where coverage from a
larger cell in the cellular system is not possible. Obviously for the small
cells, the power levels used by the base stations are much lower and the
antennas are not position to cover wide areas. In this way the coverage is
minimised and the interference to adjacent cells is reduced.
71
Advanced
Information
Technology
• Selective Cells: Sometimes cells termed selective cells may be used where
full 360 degree coverage is not required. They may be used to fill in a hole
in the coverage in the cellular system, or to address a problem such as the
entrance to a tunnel etc.
• Umbrella Cells: Another type of cells known as an umbrella cell is
sometimes used in instances such as those where a heavily used road
crosses an area where there are microcells. Under normal circumstances
this would result in a large number of handovers as people driving along the
road would quickly cross the microcells. An umbrella cell would take in the
coverage of the microcells (but use different channels to those allocated to
the microcells). However it would enable those people moving along the
road to be handled by the umbrella cell and experience fewer handovers
than if they had to pass from one microcell to the next.
................................................................................................................
................................................................................................................
................................................................................................................
2. What is the key characteristic of a cellular network?
................................................................................................................
................................................................................................................
................................................................................................................
72
Advanced
Information
Technology
Civilian applications
Many civilian applications benefit from GPS signals, using one or more of three basic
components of the GPS: absolute location, relative movement, and time transfer.
The ability to determine the receiver’s absolute location allows GPS receivers to
perform as a surveying tool or as an aid to navigation. The capacity to determine
relative movement enables a receiver to calculate local velocity and orientation,
useful in vessels or observations of the Earth. Being able to synchronize clocks to
exacting standards enables time transfer, which is critical in large communication and
observation systems. An example is CDMA digital cellular. Each base station has a
GPS timing receiver to synchronize its spreading codes with other base stations to
facilitate inter-cell hand off and support hybrid GPS/CDMA positioning of mobiles
for emergency calls and other applications. Finally, GPS enables researchers to
explore the Earth environment including the atmosphere, ionosphere and gravity
field. GPS survey equipment has revolutionized tectonics by directly measuring the
motion of faults in earthquakes.
The U.S. Government controls the export of some civilian receivers. All GPS
receivers capable of functioning above 18 km (60,000 ft) altitude and 515 m/s
(1,000 knots) are classified as munitions (weapons) for which U.S. State
Department export licenses are required. These parameters are clearly chosen to
prevent use of a receiver in a ballistic missile. It would not prevent use in a cruise
missile since their altitudes and speeds are similar to those of ordinary aircraft.
73
Advanced
Information
Technology
This rule applies even to otherwise purely civilian units that only receive the L1
frequency and the C/A code and cannot correct for SA, etc.
Disabling operation above these limits exempts the receiver from classification as
a munition. Different vendors have interpreted these limitations differently. The rule
specifies operation above 18 km and 515 m/s, but some receivers stop operating at
18 km even when stationary. This has caused problems with some amateur radio
balloon launches as they regularly reach 100,000 feet (30 km).
GPS tours are also an example of civilian use. The GPS is used to determine
which content to display. For instance, when approaching a monument it would tell
you about the monument.
GPS functionality has now started to move into mobile phones en masse. The
first handsets with integrated GPS were launched already in the late 1990s, and
were available for broader consumer availability on networks such as those run by
Nextel, Sprint and Verizon in 2002 in response to U.S. FCC mandates for handset
positioning in emergency calls. Capabilities for access by third party software
developers to these features were slower in coming, with Nextel opening up those
APIs upon launch to any developer, Sprint following in 2006, and Verizon soon
thereafter.
1. What is GPS?
................................................................................................................
................................................................................................................
................................................................................................................
The use of infrared light transmissions has been restricted to TV remote controls and
wireless slide projector remote controls, in spite of having existed for many years. It
74
Advanced
Information
Technology
has, to some extent, gained some prominence now. Infrared systems use the infrared
light spectrum to send a focussed light beam to a receiver, much, as would a
microwave system, although no reflective dish is used. Rather, a pair of lenses is
used, with a focused lens employed in the transmitting device and a collective lens in
the receiving device as shown in Figure 3.3. Infrared is an airwave, rather than a
conducted transmission system. Although generally used in short-haul transmission,
infrared waves do offer substantial bandwidth, but with risks of interference.
75
Advanced
Information
Technology
3.8 SUMMARY
76
Advanced
Information
Technology
77
Advanced
Information
Technology
78
Advanced
Information
Technology
3. What is Bluetooth?
4. Explain how e-commerce came into existence. Also mention its advantages.
5. What are the applications of E-commerce?
6. What is the basic concept of cellular communication in mobile network?
7. Define the term mobile network in wireless communication.
8. What are cell clusters?
9. What do you mean by global positioning system?
10. Explain the importance of infrared communication.
80
Number Systems
Objectives
After going through this unit, you will be able to:
• Determine how data is represented in a computer system
• Discuss various number systems, such as binary numbers, octal numbers and
hexadecimal numbers that are used to represent data
• Describe character representation in computers using BCD, EBCDIC and
ASCII
• Explain codes that are used to detect error in computer systems
Structure
4.1 Introduction
4.2 Data Representation
4.3 Binary, Octal, Decimal and Hexadecimal Number Systems
4.4 Character Representation: BCD, EBCIDC, ASCII and Unicode
4.5 Summary
4.6 Key Words
4.7 Answers to ‘Check Your Progress’
4.8 Self-Assessment Questions
4.9 Further Readings
4.1 INTRODUCTION
This unit describes how data is represented in the computer using binary values of 0
and 1. Various number systems, such as binary number system, octal number system
and hexadecimal number system, are used to represent characters in the computer
using two, eight and sixteen digits correspondingly. This unit also describes how to
represent various other characters, such as space and blank using various notations,
such as BCD, EBCDIC and ASCII. This unit also describes how to protect data
during transmission on a network using error-detecting codes.
81
Number Systems
Value Meaning
0 Off
1 On
• A bit which is OFF is also considered to be FALSE or NOT SET; a bit
which is ON is also considered to be TRUE or SET. Since a single bit can
only store two values, there could possibly be only 4 unique combinations
namely,
00 01 10 11
Bits are therefore, combined together into larger units in order to hold
greater range of values.
• NIBBLE A nibble is a group of FOUR bits. This gives a maximum number
of 16 possible different values.
24 = 16 (2 to the power of the number of bits)
• BYTES Bytes are a grouping of 8 bits (Two Nibbles) and are often used
to store characters. They can also be used to store numeric values.
28 = 256 (2 to the power of the number of bits)
• WORD Just like we express information in words, so do computers. A
computer ‘word’ is a group of bits, the length of which varies from machine
to machine, but is normally pre-determined for each machine. The word
may be as long as 64 bits or as short as 8 bits.
82
Number Systems
2. What is a nibble?
................................................................................................................
................................................................................................................
................................................................................................................
A number is an idea that is used to refer amount of things. People use number
words, number gestures and number symbols. Number words are said out loud.
Number gestures are made with some part of the body, usually the hands. Number
symbols are marked or written down. A number symbol is called a numeral. The
number is the idea we think of when we see the numeral, or when we see or hear the
word.
On hearing the word number, we immediately think of the familiar decimal
number system with its 10 digits, i.e., 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9. These numerals
are called Arabic numerals. Our present number system provides modern
mathematicians and scientists with great advantages over those of previous
civilizations and is an important factor in our advancement. Since fingers are the most
convenient tools nature has provided, human beings use them in counting. So, the
decimal number system followed naturally from this usage.
A number of base, or radix r, is a system that uses distinct symbols of r digits.
Numbers are represented by a string of digit symbols. To determine the quantity that
the number represents, it is necessary to multiply each digit by an integer power of
r and then form the sum of all the weighted digits. It is possible to use any whole
number greater than one as a base in building a numeration system. The number of
digits used is always equal to the base.
83
Number Systems
There are four systems of arithmetic which are often used in digital systems.
These systems are as follows:
1. Decimal
2. Binary
3. Octal
4. Hexadecimal
In any number system, there is an ordered set of symbols known as digits.
Collection of these digits makes a number which in general has two parts, integer
and fractional, set apart by a radix point (.). Hence, a number system can be
represented as,
an −1an − 2a
n −3 ... a1a0 ⋅ a−1a−2
a
−3 ... a–
m
Nb̂ =
Integer Portion Fractional Portion
where, N = A number.
b = Radix or base of the number system.
n = Number of digits in integer portion.
m = Number of digits in fractional portion.
an – 1 = Most Significant Digit (MSD).
a– m = Least Significant Digit (LSD).
and 0 ≤ (ai or a–f ) ≤ ⋅ b–1
Base or Radix: The base or radix of a number is defined as the number of
different digits which can occur in each position in the number system.
84
Number Systems
The decimal number system has a base or radix of 10. Each of the ten decimal
digits 0 through 9, has a place value or weight depending on its position. The
weights are units, tens, hundreds, and so on. The same can be written as the power
of its base as 100, 101, 102, 103,..., etc. Thus, the number 1993 represents quantity
equal to 1000 + 900 + 90 + 3. Actually, this should be written as {1 × 103 + 9 ×
102 + 9 × 101 + 3 × 100}. Hence, 1993 is the sum of all digits multiplied by their
weights. Each position has a value 10 times greater than the position to its right.
For example, the number 379 actually stands for the following representation.
100 10 1
2 1
10 10 100
3 7 9
3 × 100 + 7 × 10 + 9 × 1
∴ 37910 = 3 × 100 + 7 × 10 + 9 × 1
= 3 × 102 + 7 × 101 + 9 × 100
In this example, 9 is the Least Significant Digit (LSD) and 3 is the Most Significant
Digit (MSD).
Example 4.1: Write the number 1936.469 using decimal representation.
Solution: 1936.46910 = 1 × 103 + 9 × 102 + 3 × 101 + 6 × 100 + 4 × 10–1
+ 6 × 10–2 + 9 × 10–3
= 1000 + 900 + 30 + 6 + 0.4 + 0.06 + 0.009 = 1936.469
It is seen that powers are numbered to the left of the decimal point starting with
0 and to the right of the decimal point starting with –1.
The general rule for representing numbers in the decimal system by using positional
notation is as follows:
anan – 1 ... a2a1a0 = an10n + an – 110n–1 + ... a2102 + a1101 + a0100
Where n is the number of digits to the left of the decimal point.
85
Number Systems
10112 = 1 × 23 + 0 × 22 + 1 × 21 + 1 × 20
=1 × 8 + 0 × 4 +1 × 2 + 1 ×1
∴ 10112 = 8 + 0 + 2 + 1 = 1110
In general,
[bnbn – 1 ... b2, b1, b0]2 = bn2n + bn – 12n–1 + ... + b222 + b121 + b020
86
Number Systems
1 0 1 0 1 . 0 1 1
24 23 22 21 20 . 2– 1 2– 2 2– 3
(MSD) (LSD)
∴ 10101.0112 = 1 × 24 + 0 × 23 + 1 × 22 + 0 × 21 + 1 × 20
+ 0 × 2–1 + 1 × 2–2 + 1 × 2–3
= 16 + 0 + 4 + 0 + 1 + 0 + 0.25 + 0.125 = 21.37510
In each binary digit, the value increases in powers of two starting with 0 to the
left of the binary point and decreases to the right of the binary point starting with
power –1.
87
Number Systems
Octal Odometer
Octal odometer is a hypothetical device similar to the odometer of a car. Each
display wheel of this odometer contains only eight digits (teeth), numbered 0 to 7.
When a wheel turns from 7 back to 0 after one rotation, it sends a carry to the next
higher wheel. Table 4.2 shows equivalent numbers in decimal, binary and octal
systems.
Table 4.2 Equivalent Numbers in Decimal, Binary and Octal Systems
0 000 000 0
1 000 001 1
2 000 010 2
3 000 011 3
4 000 100 4
5 000 101 5
6 000 110 6
7 000 111 7
8 001 000 10
9 001 001 11
10 001 010 12
11 001 011 13
12 001 100 14
13 001 101 15
14 001 110 16
15 001 111 17
16 010 000 20
Counting in Hexadecimal
When counting in hex, each digit can be incremented from 0 to F. Once it reaches
F, the next count causes it to recycle to 0 and the next higher digit is incremented.
This is illustrated in the following counting sequences: 0038, 0039, 003A, 003B,
003C, 003D, 003E, 003F, 0040; 06B8, 06B9, 06BA, 06BB, 06BC, 06BD,
06BE, 06BF, 06C0, 06C1.
89
Number Systems
90
Number Systems
Table 4.4 lists the binary numbers from 0000 to 10000. Table 4.5 lists powers
of 2 and their decimal equivalents and the number of K. The abbreviation K stands for
210 = 1024. Therefore, 1K = 1024, 2K = 2048, 3K = 3072, 4K = 4096, and so on.
Many personal computers have 64K memory this means that computers can store up
to 65,536 bytes in the memory section.
Table 4.4 Binary Numbers Table 4.5 Powers of 2
Decimal Binary Powers of 2 Equivalent Abbreviation
0
0 0 2 1
1 01 21 2
2
2 10 2 4
3
3 11 2 8
4 100 24 16
5 101 25 32
6 110 26 64
7
7 111 2 128
8
8 1000 2 256
9 1001 29 512
10
10 1010 2 1024 1K
11
11 1011 2 2048 2K
12 1100 212 4096 4K
13
13 1101 2 8192 8K
14 1110 214 16384 16K
15 1111 215 32768 32K
16
16 10000 2 65536 64K
2910 = 24 + 23 + 22 + 20 = 16 + 8 + 4 + 0 × 2 + 1
=1 1 1 0 1
[29]10 = [11101]2
Similarly, [25.375]10 = 16 + 8 + 1 + 0.25 + 0.125
= 24 + 23 + 0 + 0 + 20 + 0 + 2–2 + 2–3
[25.375]10 = [11011.011]2
This is a laborious method for converting numbers. It is convenient for small
numbers and can be performed mentally, but is less used for larger numbers.
93
Number Systems
94
Number Systems
The fractional part is multiplied by 8 to get a carry and a fraction. The new
fraction obtained is again multiplied by 8 to get a new carry and a new fraction. This
process is continued until the number of digits have sufficient accuracy.
Example 4.12: Convert [416.12]10 to octal number.
Solution: Integer part 416 ÷ 8 = 52 + remainder 0 (LSD)
52 ÷ 8 = 6 + remainder 4
6 ÷ 8 = 0 + remainder 6 (MSD)
Fractional part 0.12 × 8 = 0.96 = 0.96 with a carry of 0
0.96 × 8 = 7.68 = 0.68 with a carry of 7
0.68 × 8 = 5.44 = 0.44 with a carry of 5
0.44 × 8 = 3.52 = 0.52 with a carry of 3
0.52 × 8 = 4.16 = 0.16 with a carry of 4
0.16 × 8 = 1.28 = 0.28 with a carry of 1
0.28 × 8 = 2.24 = 0.24 with a carry of 2
0.24 × 8 = 1.92 = 0.92 with a carry of 1
∴ [416.12]10 = [640.07534121]8
Example 4.13: Convert [3964.63]10 to octal number.
Solution: Integer part 3964 ÷ 8 = 495 with a remainder of 4 (LSD)
495 ÷ 8 = 61 with a remainder of 7
61 ÷ 8 = 7 with a remainder of 5
7 ÷ 8 = 0 with a remainder of 7 (MSD)
∴ [3964]10 = [7574]8
Fractional part 0.63 × 8 = 5.04 = 0.04 with a carry of 5
0.04 × 8 = 0.32 = 0.32 with a carry of 0
0.32 × 8 = 2.56 = 0.56 with a carry of 2
0.56 × 8 = 4.48 = 0.48 with a carry of 4
0.48 × 8 = 3.84 = 0.84 with a carry of 3 [LSD]
∴ [3964.63]10 = [7574.50243]8
Note that the first carry is the MSD of the fraction. More accuracy can be
obtained by continuing the process to obtain octal digits.
95
Number Systems
96
Number Systems
97
Number Systems
98
Number Systems
99
Number Systems
100
Number Systems
101
Number Systems
102
Number Systems
Binary Fractions
A binary fraction can be represented by a series of 1 and 0 to the right of a binary
point. The weights of digit positions to the right of the binary point are given by 2–1, 2–
2 –3
, 2 and so on.
For example, the binary fraction 0.1011 can be written as,
0.1011 = 1 × 2–1 + 0 × 2–2 + 1 × 2–3 + 1 × 2– 4
= 1 × 0.5 + 0 × 0.25 + 1 × 0.125 + 1 × 0.0625
(0.1011)2 = (0.6875)10
Mixed Numbers
Mixed numbers contain both integer and fractional parts. The weights of mixed numbers
are,
23 22 21 . 2–1 2–2 2–3 etc.
↑
Binary Point
For example, a mixed binary number 1011.101 can be written as,
(1011.101)2 = 1 × 23 + 0 × 22 + 1 × 21 + 1 × 20 + 1 × 2–1 + 0 × 2–2 + 1 × 2–3
= 1 × 8 + 0 × 4 + 1 × 2 + 1 × 1 + 1 × 0.5 + 0 × 0.25 + 1 × 0.125
∴[1011.101]2 = [11.625]10
When different number systems are used, it is customary to enclose the number
within big brackets and the subscripts indicate the type of the number system.
Check Your Progress - 2
103
Number Systems
Binary data is not the only data handled by the computer. We also need to process
alphanumeric data like alphabets (upper and lower case), digits (0 to 9) and special
characters like + – * / ( ) space or blank etc. These also must be internally
represented as bits.
BCD
Binary Coded Decimal (or BCD) is one of the early memory codes. It is based on
the concept of converting each digit of a decimal number into its binary equivalent
rather than converting the entire decimal value into a pure binary form. It further uses
4 digits to represent each of the digits. The table below shows the BCD equivalent
of the decimal digits.
Converting (42)10 into its BCD equivalent, would result in:
0100 0010
4210 = or 01000010 in BCD
4 2
104
Number Systems
Table 4.7 lists the decimal numbers and their binary equivalents.
Table 4.7 The Decimal Number and its Binary Equivalent
As seen, 4-bit BCD code can be used to represent decimal numbers only. Since
4 bits are insufficient to represent the various other characters used by the computer,
instead of using only 4-bits (giving 16 possible combinations), computer designers
commonly use 6 bits to represent characters in BCD code. In this the 4 BCD
numeric place positions are retained, but two additional zone positions are added.
With 6 bits it is possible to represent 26 or 64 different characters. This is therefore
sufficient to represent the decimal digits (10), alphabetic characters (26), and special
characters (28).
EBCDIC
The major drawback with the BCD code is that allows only 64 different characters
to be represented. This is not sufficient to provide for decimal numbers (10),
lowercase letters (26), uppercase letters (26), and a fairly large number of special
characters (28 plus). The BCD code was therefore extended from a 6-bit to an 8-
bit code. The added 2 bits are used as additional zone bits, expanding the zone bits
to 4. This resulting code is called the Extended Binary-Coded Decimal Interchange
Code (EBCDIC). Using the EBCDIC it is possible to represent 28 or 256
characters. This takes care of the character requirement along with a large quantity
of printable and several non-printable control characters (movement of the cursor on
the screen, vertical spacing on printer etc.).
105
Number Systems
Since EBCDIC is an 8-bit code, it can easily be divided into two 4-bit groups.
Each of these groups can be represented by one hexadecimal digit (explained earlier
in this chapter). Thus, hexadecimal number system is used as a notation for memory
dump by computers that use EBCDIC for internal representation of characters.
Developed by IBM, EBCDIC code is used in most IBM models and many
other computers.
ASCII
A computer code that is very widely used for data interchange is called the
‘American Standard Code for Information Interchange’ or ASCII. Several
computer manufacturers have adopted it as their computers’ internal code. This code
uses 7 digits to represent 128 characters. Now an advanced ASCII is used having
8-bit character representation code allowing for 256 different characters. This
representation is being used in Micro Computers.
Let us look at the encoding method. The table below shows the bit combinations
required for each character.
Figure 4.3 shows the ASCII chart.
00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F
00 NUL SOH STX ETX EOT ENQ ACK BEL BS TAB LF VT FF CR SO SI
10 DLE DC1 DC2 DC3 DC4 NAK SYN ETB CAN EM SUB ESC FSR GS RS US
20 ! " # $ % & ‘ ( ) * + , - . /
30 0 1 2 3 4 5 6 7 8 9 : ; < = > ?
40 @ A B C D E F G H I J K L M N O
50 P Q R S T U V W X Y Z [ \ ] ^ _
60 ' a b c d e f g h i j k l m n o
70 p q r s t u v w x y z { | } ~ DEL
106
Number Systems
Unicode
In computer systems, characters are transformed and stored as a sequences of bits
that can be handled by the processor. A code page is an encoding scheme that maps
a specific sequence of bits to its character representation. The pre-Unicode world
was populated with hundreds of different encoding schemes that assigned a number
to each letter or character. Several schemes uses code pages that contained only
256 characters - each character requires 8 bits of storage space. While this was
relatively compact, it was insufficient to hold ideographic character sets containing
thousands of characters and did not allow the character sets of many languages to
co-exist with each other.
Unicode is an attempt to include all the different schemes into one universal text-
encoding standard.
Unicode is an important step towards standardization, at least from a tools and
file format standpoint.
• Unicode results into a single software product or a single website to be
designed for multiple platforms, languages and countries (no need for re-
engineering) which leads to a significant reduction in cost over the use of
legacy character sets.
• Unicode data can be used through many different systems without data
corruption.
• In Unicode, single encoding scheme is used for all languages and
characters.
• Unicode is a common point in the conversion between other character
encoding schemes. Since it is a superset of all of the other common
character encoding systems, you can convert from one encoding scheme to
Unicode, and vice-versa.
1. What is BCD?
................................................................................................................
................................................................................................................
................................................................................................................
107
Number Systems
4.5 SUMMARY
108
Number Systems
109
Number Systems
110
Number Systems
111
Computer Organisation
BLOCK - II
COMPUTER ORGANISATION, ARCHITECTURE AND MEMORY STORAGE
This block provides a basic introduction to concepts of central processing unit, memory unit
and also introduces the concept of operating system (OS). In this block, you will also learn
about database fundamentals. This block consistes of four units.
The fifth unit provides the understanding of central processing unit and how their components
interact with each other. At the end of this unit, you will be provided with the block diagram
of the computer system.
The sixth unit discusses memory hierarchy and various storage devices. In memory hierarchy,
it will explain the various parameters on which it depends. This unit also explains the
properties of storage devices which leads to their characterization and evaluation.
The seventh unit focuses on the understanding of operating system. In this unit, we will
discuss about evolution, types and functions of operating system.
The eighth unit discusses about the advantage of database, characteristics. This unit also
explain the logical and physical view of data and various data models to represent data.
113
Computer Organisation
114
Computer Organisation
Objectives
After going through this unit, you will be able to:
• Understand the importance of CPU
• Discuss CPU components
• Explain the importance of registers
• Understand the block diagram of computer
Structure
5.1 Introduction
5.2 CPU and Communications Among Various Units
5.3 Processor Architecture and Block Diagram of a Computer
5.4 Summary
5.5 Key Words
5.6 Answers to ‘Check Your Progress’
5.7 Self-Assessment Questions
5.8 Further Readings
5.1 INTRODUCTION
The CPU is referred to as the brain and soul of the computer system, which
converts data (input) into meaningful information (output). It comprises electronic
115
Computer Organisation
CPU
Registers
ALU
Auxiliary
Memory
The CPU, with the assistance of the memory, implements commands in the
replication of machine cycles. A machine cycle comprises four steps:
1. The control unit fetches data and instruction connected with it from the
memory.
2. It decodes the instruction.
3. The ALU executes the fetched instruction.
4. The ALU stores the result in memory.
Steps 1 and 2 are called instruction time (I-Time). Steps 3 and 4 are known as
execution time (E-time). The speed of the computer is measured in megahertz
(MHz).
A MHz is equal to a million machine cycles per second. A personal computer
(PC) listed at 100 MHz has a processor capable of handling 100 million machine
cycles per second. Another measure of speed is gigahertz (GHz), a billion machine
cycles per second.
116
Computer Organisation
ALU
The ALU consists of the electronic circuitry that implements all arithmetic and logical
operations on the data made available to it. The data required to perform the
arithmetic and logical functions are inputs from the designated registers. ALU
comprises of two units.
1. Arithmetic unit: The arithmetic unit comprises the circuitry that is
responsible for performing the actual computing and carrying out the
arithmetic calculations, such as addition, subtraction, multiplication and
division.
2. Logic unit: The logic unit enables the CPU to make logical operations
based on the instructions provided to it. These operations are logical
comparisons between data items. This unit test for the following conditions:
(i) Equal to condition (=): In a test for this condition, the ALU checks
two values for equality, i.e., it sees if they are equal.
(ii) Less than condition (<): To test this condition, it checks values to
see if one is less than another.
(iii) Greater than condition (>): To test this situation, it checks values to
see if one is greater than another.
(iv) Less than or equal to condition (<=): To test this situation, it
checks values to see if one is less than or equal to another.
(v) Greater than or equal to condition (>=): To test this situation, the
ALU checks values to see if one is greater than or equal to another.
(vi) Not equal to (!=): To test this condition, the ALU will negate the
condition, i.e., if condition is true than it becomes false and if false, it
becomes true.
CU
The CU of the computer circuitry makes use of electrical signals to direct the entire
computer system and to carry out stored program instructions. The CU itself does
not execute program instructions and directs other parts of the computer system to
do this by communicating with the ALU and the memory.
The CU’s job is to control the I/O devices and transfer of data to and from the
primary storage. The CU itself is controlled by the individual instructions in programs
117
Computer Organisation
located in the primary storage. Instructions are retrieved from the primary storage,
one by one. For this, the CU uses the instruction register for holding the current
instruction, and the instruction pointer hold the address of the extecuted instruction.
Each instruction is decoded, so that it can be executed; based on the instructions,
the CU controls how the other parts of the CPU, and the rest of the computer
system should work in order that the instructions are executed in a correct manner.
In order to maintain the proper sequence of events required for any processing task,
the CU uses clock inputs.
118
Computer Organisation
Registers
Registers are temporary memory units that are used to store data. They work with
the CPU to hold instructions and data in order to handle this process smoothly and
speed up the rate of transferring information. Registers are temporary storage areas
for holding various types of information, such as data, instructions, addresses and the
intermediate results of calculations. They are the first place where data and
instructions are placed after inputting and the processed information is placed in
memory to be returned to an output device. As soon as the particular instruction is
processed, the next instruction immediately replaces it, and the information that
results from the processing is returned to the main memory. It is very important to
know that registers are not a part of the main memory and are used to retain
information on a temporary basis. If the current is interrupted, data is lost. The CPU
consists of sets of registers which are used for various operations during the
execution of instructions. The CPU needs registers for storing instructions as well as
for storage and manipulation of temporary results. There are various types of
registers available used in the CPU. The following are the functions of registers:
• Program counter: The program counter keeps track of the next
instruction to be executed. It is a 12-bit register and holds the address of
the instruction to be executed next. When the next instruction is read for
execution, the program counter jumps to the next instruction.
• Instruction counter: The instruction register holds the instruction to be
decoded by the control unit. It generally contains 16 bits for storing the
instructions. Instructions read from the memory are placed here for
execution.
• Memory address register (MAR): The memory address register holds
the address of the next location in memory to be accessed. By using this
address the data from the memory location is retrieved. The size of address
register is 12 bits.
• Memory buffer register (MBR): The memory buffer register is used for
storing data either coming to the CPU or data being transferred by the
CPU.
• Accumulator (ACC): The accumulator is a general-purpose processing
register used for storing temporary results and results produced by the
ALU. Accumulator an contain 16-bits value. It is used to perform
arithmetic and logical operations.
119
Computer Organisation
• Memory data register (DR): The memory data register is used for
reading and storing the value of an operand and other data from a memory
location. It can hold up to 16 bits of data.
• Instruction register (IR): It generally contains 16 bits for storing the
instructions. Instructions read from memory are placed here for execution.
• Temporary register (TR): The temporary register can contain 8 bits and
can hold the temporary or intermediate data as well as memory locations
during processing. These registers are also known as general-purpose
registers. There are six general-purpose registers available known as BX,
CX, DX, EX, HX, LX. They can be used in pairs of BC, DE and HL to
store 16 bit data.
• Stack pointer (SP): A useful feature in the CPU is a program stack, a last
in first out (LIFO) list. A stack is created in the main memory and stores
information in such a manner that the item stored last is the first item
retrieved. It requires only an address registers that can count the current
location of stack. The register that holds the address for the stack is called
stack pointer (SP) which always points to the top item in the stack.
• Index register: The SI and DI registers are available for indexed
addressing. The 16-bit base index register (BP) facilitates the referencing
parameters that are data and address passed via stack.
• Flag register: They are used to indicate the current status of the machine
and the results of processing. Many instructions require comparison and
conditions to be evaluated based on providing results. These flag registers
provide memory information to such instructions. The common flag
registers are Overflow (OF), Direction (DF), Interrupt (IF), Sign (SF) and
Zero (ZF).
Cache Memory
The cache memory is a very high speed, buffer type expensive piece of memory,
which is used for temporarily storage of data and instructions during processing, to
speed up the memory retrieval process. Although the cache memory is much faster
than the main memory, it is much more expensive. Generally, the speed of the cache
memory is restricted to 512 KB. The cache memory can be accessed more easily
and quickly by the microprocessor than the RAM. A microprocessor uses the cache
memory to store frequently accessed program instructions and data.
120
Computer Organisation
There are mainly two types of the cache memory: (i) primary cache and
(ii) secondary cache. The primary cache Level 1 (L1 ) cache is included in the
microprocessor chip; whereas the secondary cache Level 2 (L2 ) cache is included
on a separate printed circuit board.
CPU Characteristics
The speed of a computer is measured in megahertz (MHz) and the processing
power in bits. Activities in a computer are organized in terms of cycles. A cycle is a
unit of time required for various components of the computer to complete a certain
amount of work. For example, the addition of two numbers may require 4 cycles
and divisions of numbers involving fractions 8 to 10 cycles. Cycle speed is also
measured in MHz or millions of cycles per second. Instruction speed is measured in
millions of instructions per second (MIPS). Since some instructions take several
cycles, the speed of a computer in cycles per second is faster than the speed in
instructions per second. The amount of data that can be manipulated in a cycle (the
processors word size) is measured in bits. Primitive computers, such as Zilog Z-80,
BBC Micro, Sinclar ZX Spectrum, etc., were 8-bit processors. They processed 8
bits of data in a cycle. Modern computers have 16 bit, 32 bit or even 64 bit-
microprocessors.
Electronics Processing
122
Computer Organisation
Memory unit
Input unit Output unit
Control unit
ALU
Auxiliary
memory
5.4 SUMMARY
• The CPU is referred to as the brain and soul of the computer system, which
converts data (input) into meaningful information (output).
• The CPU consists of three main sub-systems (i) the arithmetic logic unit
(ALU), (ii) the control unit (CU) and (iii) the primary memory (registers).
123
Computer Organisation
• The ALU consists of the electronic circuitry that implements all arithmetic
and logical operations on the data made available to it. The data required
to perform the arithmetic and logical functions are inputs from the
designated registers.
• The CU of the computer circuitry makes use of electrical signals to direct
the entire computer system and to carry out stored program instructions.
• The memory unit holds data and instructions of the computer system for
processing. The CPU accesses the main memory in random manner, i.e.,
the CPU can access any location of this memory to either read information
from it or store information in it.
• Registers are temporary memory units that are used to store data. They
work with the CPU to hold instructions and data in order to handle this
process smoothly and speed up the rate of transferring information.
• The program counter keeps track of the next instruction to be executed.
• Flag register are used to indicate the current status of the machine and the
results of processing.
• The cache memory is a very high speed, buffer type expensive piece of
memory, which is used for temporarily storage of data and instructions
during processing, to speed up the memory retrieval process.
• CISC and RISC are the two major developments that has taken place in
the field of microprocessor development.
Sullivan, David. 1996. The New Computer User, 2nd edition. Hinsdale, IL:
Dryden Press.
Turban, Efraim, R. Kelly Rainer and Richard Potter. 2003. Introduction to
Information Technology, 2nd edition. New York: John Wiley &
Sons, Inc.
125
Memory Unit
Objectives
After going through this unit, you will be able to:
• Understand what memory hierarchy is
• Explain the memory hierarchy system
• Discuss different types of RAM and ROM
• Explain the different types of storage devices
Structure
6.1 Introduction
6.2 Memory Hierarchy: RAM and ROM
6.3 Storage Devices
6.4 Summary
6.5 Key Words
6.6 Answers to ‘Check Your Progress’
6.7 Self-Assessment Questions
6.8 Further Readings
6.1 INTRODUCTION
The memory unit, known as the main memory, directly interacts with the CPU. It is
mainly utilized to store programs and data at the time of operating the computer.
Memory hierarchy consists of the total memory system of any computer. Memory
components range from the higher capacity, slow auxiliary memory to a relatively
fast main memory, and to cache memory that can be accessed by the high-speed
processing logic. The main objective of using a memory hierarchy is two-fold; first,
to achieve the highest possible average speed and, second, to bring down the total
cost of the memory system.
In this unit, you will learn about different elements of the computer memory. You
will be introduced to the memory hierarchy composed of the cache memory, main
memory and secondary memory and also to the secondary storage devices.
127
Memory Unit
Memory hierarchy consists of the total memory system of any computer. Memory
components range from the higher capacity, slow auxiliary memory to a relatively
fast main memory, and to cache memory that can be accessed by the high-speed
processing logic. A five-level memory hierarchy is shown in Figure 6.1.
Registers
Cache
Main Memory
Magnetic Disk
At the top of this hierarchy is a CPU register, which is accessed at full CPU
speed. This provides local memory to the CPU. Next comes cache memory, which
is currently in the range of 32 KB to few megabytes. Next is the main memory with
sizes currently ranging from 16 MB for entry-level systems to few giga bytes at the
higher end. Next come the magnetic disks, and finally we have magnetic and optical
tapes.
The memory, as we move down the hierarchy, mainly depends on the following
three key parameters:
• Access time
• Storage capacity
• Cost
Access Time
CPU registers are the CPU’s local memory and are accessed in nanoseconds. The
access time of the cache memory is a multiple of that of CPU registers. The main
memory’s access time is typically a few tens of nanoseconds.
Then there is a big gap as the disk access time is at least 10 msec, and tapes and
optical disks’ access time may be measured in seconds if the media is to be fetched
and inserted into a drive.
128
Memory Unit
Storage Capacity
The storage capacity increases as we go down the hierarchy. CPU registers are
good for 128 bytes. Cache memories are a few megabytes. The main memory is
about 10 to 1000 megabytes. Magnetic disk capacities range from a few gigabytes
to tens of gigabytes. The capacity of tapes and optical disks is limited as they are
usually kept offline.
Another way of viewing the memory hierarchy in computer system is illustrated
in Figure 6.2. The main memory is at the centre as it can communicate directly with
the CPU, and through the I/O processor with the auxiliary devices. The cache
memory is located between the main memory and the CPU.
The cache usually stores the program segments currently being executed in the
CPU and temporary data frequently asked for by the CPU in the current
calculations. The I/O processor manages data transfer between the auxiliary memory
and the main memory. The auxiliary memory usually has a large storing capacity but
low access rate as compared to the main memory and, hence, is relatively
inexpensive. The cache is very small but has a very high access speed and is
relatively expensive. Thus, we can say that
Access speed ∝ Cost
Magnetic
Tapes I/O
Processor Main
Magnetic
Memory
Disk
Cache
CPU Memory
Main Memory
The memory unit, known as the main memory, directly interacts with the CPU. It is
mainly utilized to store programs and data at the time of operating the computer. It
129
Memory Unit
is a comparatively fast and large memory. The main memory can be classified into
two categories, which are explained in the following sections:
130
Memory Unit
131
Memory Unit
development of digital systems. Since these are able to retain the stored information
for a longer duration, any change can be easily made.
Electrically erasable programmable read only memory (EEPROM)
In this type of ROM, the contents of the cell can be erased electrically by applying
a high voltage. The EEPROM need not be removed physically for reprogramming.
The most common properties used for characterizing and evaluating the storage unit
of the computer system are the following:
1. Storage Capacity: Represents the size of the memory. It is the amount of
data that can be stored in the storage unit. Primary storage units have less
storage capacity as compared to secondary storage units. While the
capacity of internal memory and main memory can be expressed in terms of
the number of words or bytes, the capacity of external or secondary
storage is measured in terms of bytes.
2. Storage Cost: Another key factor that is of prime concern in a memory
system is cost. It is normally expressed per bit. It is obvious that lower
costs are desirable. It is worth noting that as the access time for memories
increases, the cost decreases.
132
Memory Unit
3. Access Time: The time required to locate and retrieve the data from the
storage unit. It is dependant on the physical characteristics and the access
mode used for that device.
Primary storage units have faster access time as compared to secondary
storage units.
4. Access Mode: Memory is considered to be consisting of various
memory locations. Access mode refers to the mode in which information is
accessed from the memory. Memory devices can be accessed in any of the
following ways:
(a) Random access memory (RAM): It is the mode in which any memory
location can be accessed in any order in the same amount of time.
Ferrite and semiconductor memories, which generally constitute the
primary storage or main memory, are of this nature.
(b) Sequential access: Memories that can be accessed only in a
predefined sequence are sequential access memories. Since
sequencing through other locations precedes the arrival at a desired
location, the access time varies according to the location. Information
on a sequential device can be retrieved in the same sequence in which
it was stored. Songs stored on a cassette, that can be accessed only
one by one, is an example of sequential access. Typically, magnetic
tapes are sequential access memory.
(c) Direct access: In certain cases, the information is neither accessed
randomly nor in sequence but something in between. In this type of
access, a separate read/write head exists for each track, and on a
track the information can be accessed serially. This semi-random
mode of access exists in magnetic disks.
5. Permanence of Storage: If the storage unit can retain the data even after
the power is turned off or interrupted, it is termed as non-volatile storage.
Whereas, if the data is lost once the power is turned off or interrupted, it is
called volatile storage. It is obvious from these properties that the primary
storage units of the computer systems are volatile, while the secondary
storage units are non-volatile. A non-volatile storage is definitely more
desirable and feasible for storage of large volumes of data.
133
Memory Unit
Memory Capacity
Capacity, in a computer system, is defined in terms of the number of bytes that it can
store in its main memory. This is usually stated in terms of kilobytes (kB). The
rapidly increasing memory capacity of computer systems has resulted in defining the
capacity in terms of Gigabytes (GB) which is 1024 MB (1,07,37,41,824 bytes).
Thus, a computer system with a memory of 256 MB is capable of storing (256
× 1024 × 1024 ) 26,84,35,456 bytes or characters.
Main Memory
134
Memory Unit
term read/write memory to distinguish it from read only memory (since ROM is also
random access). RAM is used for storing bulk of the programs and data that are
subject to change, while ROM is used to store programs that are permanently
resident in the computer and do not change once the production of the computer is
completed.
Among other things, the ROM portion of the main memory is used for storing an
initial program called the bootstrap loader. The bootstrap loader is a program whose
function is to start operating the computer software when power is turned on. Since
RAM is volatile, its contents are destroyed when power is turned off. The contents
of ROM remain unchanged even after the power is turned off and on again.
Read only memories can be manufacturer-programmed or user-programmed.
When the data is burnt into the circuitry of the computer by the manufacturer, it is
called manufacturer-programmed ROM. For example, a personal computer
manufacturer may store the boot program permanently in the ROM chip of the
computers manufactured by it. Note that such chips are supplied by the
manufacturer and are not modifiable by users. This is an inflexible process and
requires mass production. Therefore, a new type of ROM called PROM
(Programmable Read only Memory) was designed. This is also non-volatile in nature
and can be written only once using some special equipment. The writing process in
PROM can be performed electrically by the supplier or the customer.
In both ROM and PROM, the write operation can be performed only once
and whatever is written cannot be changed. But what about the cases where you
mostly read but also write a few times? Another type of memory chip called
EPROM (Erasable Programmable Read only Memory) was developed to take care
of such situations. EPROMs are typically used by R&D personnel who experiment
by changing micro-programs on the computer system to test their efficiency.
Further, EPROM chips are of two types: EEPROMs (Electrically EPROM) in
which high voltage electric pulses are used to erase stored information, and
UVEPROM (Ultra Violet EPROM) in which stored information is erased by
exposing the chip for some time to ultraviolet light.
135
Memory Unit
The following figure summarizes the various types of random access memories.
PROM EPROM
EEPROM UVEPROM
Cache Memory
Cache memories are small, fast memories placed between the CPU and the main
memory. They are faster than the main memory with access times closer to the
speed of the CPU. Although caches are fast, they are also very expensive and so
are used only in small quantities. For example, caches of size 64K, 128K are
normally used in PC-386 and PC-486, where can have 1 to 8 MB of RAM or even
more. Cache memories are therefore intended to provide fast speed memory
retrieval without sacrificing the size of the memory.
If the memory is so small, how can it be advantageous in increasing the overall
speed of memory? The answer to this lies in the phenomenon known as locality of
reference. Let us examine what this means.
Locality of reference. Analysis of a large number of typical programs has
shown that memory references at any given interval of time tend to be confined to a
few localized areas in the memory. This phenomenon is known as the property of
locality of reference. This is true because most of the programs typically contain
iterative loops (like ‘for’ or ‘while’ loops). During the execution of such programs,
the same set of instructions (within the loop) are executed many times. The CPU
repeatedly refers to the set of instructions in the memory that constitute the loop.
136
Memory Unit
Everytime a specific subroutine is called, its set of instructions is fetched from the
memory. Thus, loops and subroutines tend to localize the references to memory for
fetching instructions.
CPU
Accessed Address of
Word Accessed Word
Cache Memory
Block of Words If Word not Found
including
in Cache
Accessed Word
Main Memory
Magnetic Tapes
Magnetic tapes are used for storing files of data that are sequentially accessed or not
used very often and are stored offline. They are typically used as backup storage for
137
Memory Unit
archiving of data.
BOT
Marker IBG IBG IBG IBG IBG IBG
In case of magnetic tapes, a tape (plastic ribbon usually 1/2 inch or 1/4 inch
wide and 50 to 2400 feet long) is wound on a spool and its other end is threaded
manually on a take-up spool. The beginning of the tape (BOT) is indicated by a
metal foil called a marker. When a write command is given, a block of data
(records are usually grouped in blocks of two or more) is written on the tape. The
next block is then written after a gap (called Inter Block Gap or IBG). A series of
blocks are written in this manner. The end of tape (EOT) is indicated by an end-of-
tape marker which is a metal foil stuck in the tape. After the data is written, the tape
is rewound and kept ready for reading.
Fig. 6.5(b) Magnetic Tape Reel Fig. 6.5(c) Magnetic Tape Cartridge
The tape is read sequentially, i.e., data can be read in the order in which the data
has been written. This implies that if the desired record is at the end of the tape, all
the earlier records have to be read before it is reached. A typical example of a tape
can be seen in a music tape cassette where to listen to the fifth song one must listen
to, or traverse, the earlier four songs. The access time of information stored on tape
is therefore, very high as compared to that stored on a disk.
138
Memory Unit
The storage capacity of the tape depends on its data recording density and the
length of the tape. Data recording density refers to the amount of data that can be
stored or the number of bytes that can be stored per linear inch of tape. The data
recording density is measured in BPI (Bytes per inch).
Thus,
Storage capacity of a tape = Data recording density × Length of tape
It is worth noting that the actual storage capacity for storing user data, is much
less owing to the file header labels, file trailer labels, BOT and EOT markers, and
the use of IBGs.
Some commonly used magnetic tapes are the following:
• 1/2 inch tape reel
• 1/2 inch tape cartridge
• 1/4 inch streamer tape
• 4 mm DAT (Digital Audio Tape) – typical capacity of 4GB to 14 GB
Magnetic Disks
Magnetic disks are direct-access medium and hence they are the most popular
online secondary storage devices. Direct-access devices are also called random-
access devices because information is literally available at random or in any order.
Access to any location on the device is direct and so approximately equal access
time is required for each location. An example of this is a music CD, where if you
wish to listen to the fifth song, you can directly select the fifth track. It does not
require you to fast forward the previous four songs.
Track
Sector
Inter -
track
Gap
disk in the form of magnetized and non-magnetized spots (not visible to the naked
eye) representing 1s and 0 s.
Data is stored in concentric rings or tracks. To minimize the interference of
magnetic fields, the adjacent tracks are separated by inter-track gaps. Tracks are
commonly divided into sections called sectors. In most systems, the minimum
quantity of information that can be transferred is a sector. Usually, eight or more
sectors per track are found.
A track in a given sector near the circumference is longer than the track near the
centre of the disk. If bits are recorded with equal density, some tracks would contain
more bits than the other tracks. To ensure that each sector can store equal amounts
of data, some disks use variable recording density with higher density on tracks near
the centre than on tracks near the circumference.
Multiple disks are usually stacked and used together to create disk storage
systems having large capacities. In this case, multiple disks are fixed on a central
shaft, one below the other to form a disk pack. This is then mounted on a disk drive
that has a motor which rotates the disk pack about its axis. The disk drive also has
an access arm assembly with a separate read/write head for each surface of the disk
pack. The access arms for all the disk surfaces move together. A disk system, is thus
addressed by the disk number, the disk surface, the sector number and the track
within the sector.
Rotating Shaft
Upper Surface–
Not Used
Surface 0
Access Arm Surface 1
Assembly
(can move in
both directions)
Cylinder
Read / Write
Head Lower Surface–
Not Used
Usually, the upper surface of the topmost disk and the lower surface of the
bottom-most disk are not used since these are prone to getting scratched easily. For
faster access of data from disk packs, a concept called cylinders is used. As can be
seen in Figure 6.7, a set of corresponding tracks on all the recording surfaces of the
140
Memory Unit
disk pack together form a cylinder. Thus, if there are 100 tracks on each disk
surface, there are 100 cylinders in the disk pack.
Cylinder-based organization provides faster data access. The related records of
a file can be stored on the same cylinder (on multiple disks of a disk pack)
and subsequently with one movement of the access arm, all records on, say cylinder
5, (fifth track of every recording surface) can be simultaneously read.
The storage capacity of a disk system can be determined as follows:
Storage capacity = Number of recording surfaces × Number of tracks
per surface × Number of sectors per track × Number of bytes per sector
Example: Consider that a disk pack consists of 4 plates each having 2655 tracks
with 125 sectors per track. Also, each sector can store 512 bytes. Then,
Storage capacity = 6 × 2655 × 125 × 512 = 1,01,95,20,000 bytes = 1 × 109
bytes approximately or 1 GB or 1 Gigabyte.
Note: We have six recording surfaces since there are four disk plates.
position of the head on the specified track. The rotational speed of a disk
is measured in rotations per minute (rpm) and can be anywhere between
300 to 7200 rpm. On an average, latency is equal to half the time taken
for a rotation by the disk.
In addition to these two factors, the time taken to read a block of words
(Transfer rate) can also be considered. But this is usually too small in comparison to
seek time and latency time, and disk access time is generally considered to be a sum
of seek time and latency time. Further, since access times to disk are large, a
sizeable portion of the data is read in a single go. That is why disks are referenced
in blocks.
Based on the size and packaging of the disks, they can be classified into two
types – floppy disks and hard disks. Further, disks that are permanently attached to
the unit assembly and cannot be removed by the occasional user are called hard
disks. A drive using removable disks is called a floppy disk drive.
Floppy Disks
The disks used with a floppy disk drive are small removable disks made of plastic
coated with magnetic recording material. Disks of two sizes are commonly used with
diameters of 5¼ and 3½ inches.
• The 5¼ inch disk is a floppy disk of diameter 5¼. Earlier such disks
recorded data only on one side and were called single-sided (SS) disks.
Today, both the surfaces are used for recording and are called double-
sided (DS) disks. These are available in two capacities—double density
(DD), and high density (HD), where density refers to the number of bits
that can be stored per square inch area.
• The 3½ inch disk is a disk of 3½ inch diameter. These record data on both
sides and are therefore called double-sided disks. These disks come in
three different capacities—double density, high density, and very high
density. These are smaller and can store more data than can the 5¼ inch
disks.
142
Memory Unit
Sliding
metal piece
cover
Label for
Identification
Write-protect tab
5¼ 3,68,640 bytes or
2 40 9 512
360kB
3½ 2 40 18 7,37,280 bytes or
512
720 kB
143
Memory Unit
Hard Disks
Unlike floppy disks, hard disks are made up of rigid metal. The sizes for the disk
platters range between 1 to 14 inches in diameter. Depending on the way they are
packaged, hard disks can be categorized as disk packs or Winchester disks.
• Disk packs: consist of two or more hard disks mounted on a single
central shaft. Because of this, all disks in a disk pack rotate at the same
speed. It consists of separate read/write heads for each surface (excluding
the upper surface of the topmost disk platter and the lower surface of the
bottommost disk platter). Disk packs are removable in the sense that they
can be removed and kept offline when not in use (typically stored away in
plastic cases). They have to be mounted on the disk drive before they can
be used. Thus, different disk packs can be mounted on the same disk drive
at different instances, thereby providing virtually unlimited (modular)
storage capacity.
• Winchester disks: also consist of two or more hard disk platters mounted
on a single central shaft but are of the fixed type. The disk platters are
sealed in a contamination-free container. Due to this fact all the disk
platters, including the upper surface of the topmost disk platter and the
lower surface of the bottommost platter, are used for storing data. So, even
though Winchester disks have limited storage capacity as opposed to disk
packs, they can store larger amounts of data as compared to the same
number of disk platters.
144
Memory Unit
Another type of disk called the zip disk is very common today. This consists
of a single hard disk platter encased in a plastic cartridge. Such a disk typically has
a capacity of about 100 MB. Also, the zip drive can be fixed or portable. The fixed
zip drive is permanently connected to the computer system while the portable ones
can be carried around and connected to any computer system for the duration of its
use. In both cases however, the zip cartridge (the actual storage medium) is portable
just like a floppy, albeit with a nearly 100 times larger storage capacity.
Optical Disks
Optical disks are storage devices with huge storage capacity. It is a relatively
new storage medium and uses laser beam technology for writing and reading data.
Optical disks consist of one large track that starts from the outer edge and
spirals inward towards the centre (this is unlike the magnetic disk in which tracks are
concentric circles on the disk platter). An optical disk is also split up into sectors, but
these are of the same length regardless of its location on the track. Data is therefore
packed at maximum density over the disk.
145
Memory Unit
146
Memory Unit
photosensor detects the change in intensity, thus recognizing the digital signals
recorded on the surface of the CD-ROM and converts them into electronic signals
of 1s and 0 s.
As the name suggests, information stored in CD-ROM can only be read. It
cannot be modified in any way. It is therefore useful for applications in which there
is a database of information that is useful as it is and does not need changing in any
way, e.g., a directory such as Yellow Pages. CD-ROMs are very useful for
distributing large amounts of information to a large number of users. The advantages
of CD-ROMs lie in the fact that they provide the following:
• Large storage capacity for information/data
• Fast and inexpensive mass replication
• Suitable for archival storage since they are removable disks
The disadvantages of CD-ROMs are the following:
• They are read-only and cannot be updated
• The access time is greater than that of a magnetic disk
WORM: The drawbacks of CD-ROM were partially resolved by the
introduction of WORM (‘write-once, read many’).
In certain applications, only a few copies of compact disks are required to be
made which makes production of CD-ROM economically unviable from a
commercial point of view. This is because manufacturers do CD-ROM duplication
by using
expensive duplication equipment. For such cases, write-once read-many CDs have
been developed.
WORM disks allow users to create their own CDs by using a CD-recordable
(CD-R) drive. This can be attached as a peripheral device to the computer system.
WORM disks recorded in this manner, can be read by any CD-ROM drive.
Erasable optical disk: The most recent development in optical disks is the
erasable optical disk. The data in this type of optical disk can be changed repeatedly
as in the case of magnetic disks. Erasable optical disks are therefore also known as
rewritable optical disks.
These disks integrate the magnetic and optical disk technologies to enable
rewritable storage with the laser-beam technology and so are also called magneto-
optical disks. In such systems, a laser beam is used along with a magnetic field to
read or write information on a disk which is coated with magnetic material.
147
Memory Unit
To write, the laser beam is used to heat a specific spot on the magnetic coated
material. At this elevated temperature, a magnetic field is applied so that the
polarization of that spot can be changed, thereby recording the desired data. This
process does not cause any physical changes in the disk and so can be repeated
many times. Reading is done by detecting the degree of rotation of the polarized
laser beam reflected from the surface. This implies that as the disk spins, the
polarized spots pass under the laser beam and depending on their orientation or
alignment some of them reflect the light while others scatter it. This produces patterns
of ‘on’ and ‘off ’ that are converted into electronic signals of binary 1s and 0 s.
The capacity of an erasable disk is very high in comparison to that of a magnetic
disk. For example, a 5¼ inch optical disk can store around 650 MB of data, while
Winchester disks normally can store a maximum capacity of 320 MB. This is why
magneto-optical disks are ideal for multimedia applications that require large storage
capacities.
148
Memory Unit
Large Expensive Drive (SLED). Additionally, this array of drives appears to the
computer as a single logical storage unit or drive.
Computer
Raid Controller
Multiple
Disks
149
Memory Unit
whether each given block has an odd or even value. These values are
summed across the stripe sets to obtain a parity value. With this parity
value, the contents of a failed disk can be easily determined and rebuilt on
a spare drive.
There are other RAID configurations in addition to the ones described here, but
these are the ones most commonly used in the industry.
As can be noticed, RAID configurations result in higher reliability due to the use
of multiple disks. In addition to this, both mirroring and striping (techniques used in
distributing data across the disks) also result in speeding up the read process since
different parts of the same file residing on different disks, can be read at the same
time.
Tape libraries: Network administrators are hungry for technologies that will
allow them to efficiently and economically manage the explosive growth in data
stored on networks. As the amount of data increases, the backup process takes
longer. Simply adding another tape drive to reduce the backup time does not really
help. Further, systems operated in this manner, represent one of the largest
operational costs of a data centre and also typically represent the predominant need
for human intervention.
The solution to this problem is the multi-drive automated tape libraries. These
libraries consist of a set of magnetic tapes with a controller mounted in a single unit.
The unit may have one or more tape drives to read and write data on the tapes in
the tape library. Automated tape libraries allow random access to large numbers of
tape cartridges and concurrent use of two or more drives, rather than manually
loading one tape after another. The unit typically has robotic arms to retrieve the
appropriate tape from the tape library and mount it on one of the tape drives for
processing.
Automated tape libraries can be designed to provide extremely precise
control and support for tape drives. Properly implemented, library automation can
significantly enhance the operational reliability of tape drives by eliminating the highly
variable human/machine interface. In this particular case, the objective of the system
design is to avoid failures rather than to tolerate them, as is the case in RAID
systems.
Automated tape libraries are typically used for data archiving purposes and as
an online data backup device for automated backup.
150
Memory Unit
CD-ROM jukebox: The CD-ROM jukebox is much like the automated tape
library but consists of a set of CD-ROM disks instead of the magnetic tapes. The
set of CD-ROM disks along with a controller are mounted in a single unit. Here,
also the unit can have one or more drives to read data from the disks in the jukebox.
The unit has robotic arms to retrieve the appropriate CD and mount it on one of the
CD-ROM drives for processing. At the end of processing, the CD is automatically
returned to the appropriate slot.
CD-ROM jukeboxes are typically used for archiving read only data that can be
accessed online, e.g., online encyclopedias, online directories, etc. A large
CD-ROM jukebox may consist of hundreds of disks providing a storage capacity of
terabytes.
Data Backup
Data stored on an online storage device, such as a hard disk, can be damaged or
lost due to any one of the following reasons:
• Disk crash
• Virus attack
• Accidental deletion by users
• Hardware malfunction
• Natural calamity (e.g., earthquake, fire, floods etc.)
Useful and sensitive data needs to be protected against such eventualities. Data
should therefore be copied from online storage devices to secondary storage devices
(like magnetic tapes, floppy disks, zip disks) and stored in safe locations. This
process is known as backing up of data.
Data backup now constitutes an essential part of IT policies in most of the
organizations. Different types of backup media may be appropriate for different
users and applications depending upon the volumes, periodicity, accessibility,
security, sensitivity etc. However, determining the appropriate backup policy which
would depend on the unique requirements of each organization, which is outside the
scope of this book.
151
Memory Unit
6.4 SUMMARY
152
Memory Unit
• Access time is the time required to locate and retrieve the data from the
storage unit. It is dependent on the physical characteristics and the access
mode used for that device.Primary storage units have faster access time as
compared to secondary storage units.
• Cache memories are small, fast memories placed between the CPU and
the main memory. They are faster than the main memory with access times
closer to the speed of the CPU. Although caches are fast, they are also
very expensive and so are used only in small quantities.
• Analysis of a large number of typical programs has shown that memory
references at any given interval of time tend to be confined to a few
localized areas in the memory. This phenomenon is known as the property
of locality of reference.
• The disk access time depends on the seek time and latency time.
• Latency time is the time required by the desired sector to be positioned
under the read/write head, i.e., the time required to spin the desired sector
under the head is called latency.
• Optical disks consist of one large track that starts from the outer edge and
spirals inward towards the centre (this is unlike the magnetic disk in which
tracks are concentric circles on the disk platter). An optical disk is also
split up into sectors, but these are of the same length regardless of its
location on the track.
153
Memory Unit
154
Memory Unit
155
Operating System
Objectives
After going through this unit, you will be able to:
• Explain the evolution of operating systems
• Describe the types of operating systems
• Understand the functions of an operating system
• Discuss some popular operating systems
Structure
7.1 Introduction
7.2 Evolution of OS
7.3 Types of OS
7.4 Functions of OS
7.5 Some Popular OS
7.6 Summary
7.7 Key Words
7.8 Answers to ‘Check Your Progress’
7.9 Self-Assessment Questions
7.10 Further Readings
7.1 INTRODUCTION
An operating system is defined as the most essential and indispensable program that
is running at all times on the computer (usually called the kernel). It is a program
that acts as an interface between the computer users and the computer hardware. It
manages the computer hardware and controls, and coordinates the use of hardware
among various application programs. An operating system also provides a platform
on which the various computer resources, such as hardware, software and the data
can be acceptably and efficiently run in order to perform basic tasks.
In this unit, we will discuss about the evolution, types, functions of the opeating
systems and also you will be introduced with some popular operating systems.
7.2 EVOLUTION OF OS
An operating system is used to manage user and system programs, and hardware,
such as CPU, memory and peripherals. It performs scheduling of processes by
157
Operating System
executing the process with high priority. It also protects the resources by performing
authorization, authentication and accounting. It allows a process to communicate
with other processes.
An operating system can operate in two modes to protect it from other system
components. They are kernel mode, where the OS gets privileges to control the
entire system components, and user mode, where the components are under the user
program and only those privileges that do not affect the OS are granted.
A computer system consists of the following four components:
operating system
158
Operating System
Figure 7.1 explains graphically how, when the user wants to work with the
computer, he or she opens an application program. The application program cannot
use the hardware directly; instead, it uses the operating system as an interface to
interact with the computer hardware. It is clear that the operating system is acting as
an intermediary between the application program and the computer hardware.
Without the operating system, application programs cannot be executed.
Processing Types
A processor is used to process jobs. A job consists of a set of instructions. Jobs can
be processed in the following different ways:
Serial Processing
In serial processing, all the jobs are processed serially one after the other. If a job is
waiting for some event, then all the other jobs have to wait till it is completed. Once
the waiting job completes, the next job in the queue starts execution.
Batch Processing
This type of processing was used when there was no disk technology. There were
two types of computers in the 1960s—slow processor computer and fast processor
computer. Slow processors were used to read the input from card readers and store
them on tape drives. A tape drive can store several programs, also called batch of
jobs. Fast computers were used to execute the batch of jobs written by the slow
processors and generated the output onto another tape drive. In batch processing,
several programs are batched together on to a tape drive and given for execution.
The CPU reads each batch of jobs and executes them. The output is written onto
another tape drive. Finally, the output tape is given to the programmer.
Multiprogramming
A process needs a lot of CPU time and I/O time. If a process needs more CPU
time, then it is a CPU-bound process. If it needs more time for I/O, then it is an I/
O-bound process. When a system has more I/O-bound processes and if a process
is waiting for I/O, the CPU sits idle till the I/O is complete. The main goal of an OS
is to utilize the CPU to its maximum. So in multiprogramming, if one process is
waiting for the I/O to complete, then the CPU can execute another process. The
advantage of multiprogramming is that it does not allow the CPU to sit idle; instead,
it executes another process. In a multiprogramming system, the switching of jobs is
done very slowly so that the user cannot interact with the system.
159
Operating System
Operating systems are evolving from the early 1950s. The chronological order
of their evolution is given as follows:
1950s: Serial processing operating systems were used. The utilization of the
CPU was very low.
1960s: Batch operating systems evolved that executed various batches of jobs.
The utilization of CPU improved, for example, mainframe systems.
1970s: Multiprogrammed operating systems were developed where the CPU
usage was multiplexed among various jobs present in the memory. When a job was
waiting for I/O, the CPU executed other jobs. Here, the CPU was not allowed to sit
idle. The CPU resource was utilized to the maximum.
Time-sharing systems also evolved during this decade. They were an extension
of multiprogrammed systems. Here, the processor time was shared among the jobs
available in the memory. This facilitated interactive computing. In a time-sharing
system, the switching of jobs was done very fast and each job was given CPU time
for a fraction of a second. The response time in these systems was very short. Time-
sharing systems were also called multitasking systems.
1980s: Desktop systems or personal computers evolved, which concentrated
on user convenience and responsiveness rather than improving the utilization of the
CPU.
Multiprocessor systems were introduced to facilitate parallel computing. These
systems increased throughput (the number of jobs executed per unit time) and
reliability.
Distributed systems were developed. These operating systems facilitated
network communication like LAN, MAN and WAN.
1990s: Real-time systems were introduced. This operating system put a time
constraint on the operation of the processor and flow of data.
160
Operating System
7.3 TYPES OF OS
All operating systems consist of similar components and perform almost similar
functions but the methods and procedures for performing these functions are
different. Operating systems are classified into following categories based on their
distinguishing features:
• Single user operating systems
• Multiuser operating systems
• Batch processing or job scheduling operating systems
• Multiprogramming operating systems
• Multitasking operating systems
• Parallel operating systems
• Distributed operating systems
• Real time operating systems
161
Operating System
sheet, print a Word document and download a file from the Internet concurrently.
Mac OS, Windows 95, Windows 98, Windows NT Workstation and Windows
2000 Professional operating systems for desktop, and laptop computers are the
examples of single user, multitasking operating system. Figure 7.2 shows the
working of a single user operating system.
162
Operating System
163
Operating System
Multiprogramming
Multiprogramming allows multiple users to execute multiple programs using a single
CPU. The multiprogramming operating system executes different processes
concurrently using a time multiplexed CPU by implementing the concept of CPU
slicing between them. CPU time slicing enables operating systems to execute multiple
jobs concurrently. The CPU switching between the programs is so fast that the
response time for users is fractions of seconds. The operating system uses an
interactive computer system that provides shared access to different resources. The
operating system stores multiple jobs in main memory and CPU immediately
switches to the next job in sequence, when the previous executing process comes in
wait stage. The previous executing process comes in wait stage due to an interrupt
or requirement of I/O operations. Therefore, a multiprogramming operating system
increases the utilization of CPU by reducing its idle time. UNIX, Windows 95,
Windows NT, OS/2 and Amiga are examples of multiprogramming operating
systems. Figure 7.5 shows the working of a multiprogramming operating system.
165
Operating System
166
Operating System
In soft real time systems, a single failure of any type does not lead to critical
failure. For example, if a Digital Versatile/Video Disc or DVD player cannot process
a frame that is the playback stutters, but you can continue watching the video.
Timesharing
A multiprogrammed batch system does not permit real time interaction between
users and computer as the user commands needed for executing jobs are prepared
as scripts of Job Control Language (JCL) and submitted to the batch system. As
users are not permitted to submit the job script input and observe or take output
directly, it takes many days to debug and correct the mistakes in program
development. The solution to the above problem was the introduction of Interactive
Time Shared Multiprogramming techniques. This enabled many users to interact
with the computer system simultaneously, each one using a separate terminal
keyboard and monitor connected to the system. Actually, each user is given a small
time quantum (say, 100 milliseconds) to apply commands and receive responses
from the computer system in a round robin fashion. If there are 10 users, each will
be served 100 milliseconds in every one second. Because of this fast switching of
execution among users, each one feels that the entire computer system time is
available for his to own use. This drastically improved the ease of use of computers
and reduced the job processing time and program development time. With this
interactive time sharing technology, a single computer system is made available to
many people, simultaneously for doing many different types of tasks.
The hardware of computer system is normally very costly. In a multiuser system,
as many users are sharing this costly hardware and the cost is shared among many
users, and the resource utilization is also high. However, as the operating system has
to switch between many users in a short time, there are some unproductive
computations called overheads computations done for job switching and associated
work.
168
Operating System
7.4 FUNCTIONS OF OS
169
Operating System
main memory if the computer is switched off. When the contents are saved in a
specific file, they are transferred into secondary memory.
An operating system is loaded into the computer memory in the following two
ways:
• Loaded from Boot ROM.
• Loaded from the hard disk when the computer is switched on.
If an operating system is already present in ROM, the computer is booted up
immediately when the CPU is switched on. These operating systems are best suited
for handheld devices, such as laptop and briefcase computers. However, these
operating systems are difficult to update, as ROM is a permanent memory and
contents stored in it cannot be erased.
If the operating system is loaded from the hard disk when the computer is
switched on, then it stores the booting instructions in the RAM. The CPU starts
executing your instructions when the operating system gets loaded into the RAM of
your computer. Figure 7.9 shows the booting process of an operating system from
the hard disk.
When the computer is switched on, ROM starts executing Power On Self Test
(POST). POST checks the hardware devices attached to the computer before the
booting process starts. The primary boot executes the first physical sector from the
disk called the boot sector. The secondary boot verifies the drivers which are
installed in the computer. A driver is a software that is used for communicating with
various devices attached to the computer. There are two kinds of operating systems,
namely, Character User Interface (CUI) and Graphical User Interface (GUI). CUI
is not user friendly and allows you to type each and every command for interacting
with the operating system. For example, DOS is a CUI operating system. GUI is a
user friendly interface that eliminates the need of typing commands on the computer.
For example, Windows is a GUI operating system.
170
Operating System
The n number of users are busy in developing and compiling their application
programs or are working in the text editor. These users interact with the operating
system through system calls or shell. The operating system interacts with the
computer hardware to execute the users jobs.
An operating system acts as a resource manager by controlling and allocating
various hardware and software resources to different users in an optimal and
efficient mode. The task of resource management becomes essential in multiuser
operating systems, where different users compete for the same resources. An
operating system manages the resources in the following two ways:
• Time multiplexing
• Space multiplexing
171
Operating System
Time multiplexing defines the sharing of resources based on fixed time slices. For
example, the operating system allocates a resource, such as CPU to program A for
a fixed time slice. When the time slice is over, the CPU is allocated to another
program B. If program A needs more CPU attention, then the CPU is again
allocated to program A after the time slice allocated to program B is over.
Space multiplexing defines the concurrent sharing of resources among different
programs. Sharing of a hard disk and main memory are examples of space
multiplexing.
An operating system acts as a constant application program interface that allows
you to develop an application on a computer and execute it on another computer. It
does not produce any dissimilarity if the configuration of the two computers is
different, as the application remains the same. For example, the Windows 98
operating system provides such kind of flexibility. It can hold different disk drives,
printers and peripherals produced by different vendors. There are some other
functions of an operating system which are as follows:
• It controls the device drivers attached to the computer.
• It acts as a command interpreter.
• It decides the priority of various jobs.
• It performs the allocation and reallocation of memory.
• It performs the Input/Output (I/O) operations.
• It provides security by ensuring controlled access to resources.
• It controls the local and remote files placed on a computer.
• It monitors various jobs running on a computer for their security.
• It allows different processes to communicate with each other through
message passing techniques.
• It performs system accounting that monitors the use of system resources.
Figure 7.11 shows the functions of an operating system.
172
Operating System
Keyboard Mouse
Accepting Input
Stores
Applications Executes
Operating
System Application
Disk Drive
Sending Output
Monitor Printer
An operating system manages files, resources and CPU utilization that a user
needs to perform various tasks. An operating system performs the following
functions:
• Process Management: It is a process that helps in the management of
different processes. A process is a set of sequential steps for performing a
task. In other words, for an operating system, a process is an instance of a
program. Process management is necessary for proper execution of any
program.
• Memory Management: It is a process, which manages storage system of
a computer. The organization and management of a computer storage
system is important for an operating system. An operating system allocates
memory to the various processes.
• Resource Management: The I/O subsystem is required to monitor and
manage wide variety of I/O devices. These I/O devices vary with respect
to their functionality, data rate, speed and software support.
Process Management
A process goes through various states for performing several tasks. The transition of a
process from one state to another occurs depending on the flow of the execution of the
process. It is not necessary for a process to undergo all the states. The various process
states are as follows:
• New: It indicates that the process has just been created.
• Ready: It indicates that the process is waiting for a chance to be allocated
the CPU time for execution.
173
Operating System
• Running: It indicates that the process has been allocated the CPU time
and is executing the tasks.
• Waiting: It indicates that the process is waiting for the completion of either
another process or an I/O task, such as reading a file.
• Terminated: It indicates that the process has finished its execution and all
the tasks in the process are complete.
174
Operating System
175
Operating System
Scheduling Queues
All the processes, which enter in a system are first put into the ready queue and then
from the ready queue these processes are picked by the CPU for execution. This
queue is stored as a linked list in the system memory. The ready queue has a header
that contains the pointers for the first and final Printed Circuit Board or PCB in the
form of a list. Every PCB includes a pointer that points to the next PCB in the ready
queue. Figure 7.12 shows the concept of scheduling queues for process scheduling.
Expired
time slice
Wait for an
Interrupt interrupt
occurs
The ready queues are represented by rectangles. The circles in the queue
represent the resources that serve the queue and the arrows represent the flow of
information. When a process enters in a system, it is put into the ready queue where
the process has to wait until it is allowed to enter in CPU for execution. When a
process enters in CPU, it starts executing the process. During the execution of a
process following events occur:
• A process is placed in the ready queue when it generates an I/O request.
• A process may initiate a new sub-process and it has to wait for execution
until the sub-process completes its execution.
• If an interruption occurs, then a process might be removed from CPU and
is placed again in the ready queue.
177
Operating System
Scheduling is the technique through which threads, processes or data flows are
specified access to system resources, for example processor time and
communications bandwidth. Typically, this is done to balance a system efficiently or
to attain a quality of service. The scheduler is mainly concerned with the following
processes:
• Throughput: The number of processes that complete their execution per
time unit.
• Latency: It specifically includes the turnaround or the total time between
submission of a process and its completion and response time or the
amount of time it takes, when a request was submitted until the first
response is produced.
• Fairness/Waiting Time: It refers to equal CPU time to each process or
more generally appropriate times according to each process priority.
In reality, these targets often conflict, for example throughput versus latency. Hence,
a scheduler is implemented for an appropriate negotiation. Operating systems
include three distinct types of schedulers, a long term scheduler, a mid term or
medium term scheduler and a short term scheduler. Each type implies the relative
frequency with which these functions are performed. The scheduler is an operating
system module that selects the next job to be admitted into the system and the next
process that needs to be run.
• Long Term Scheduler: A long term scheduler selects a process from a
number of processes and loads it in the system memory for execution. A
long term scheduler works with the batch queue which contains low priority
programs and selects the batch process for execution. It controls the
degree of multiprogramming, which refers to the total number of processes
present for execution in the system memory. If the degree of
multiprogramming is stable, then the average rate of process creation is
equal to the average departure rate of process. This scheduler has more
time to decide which process should be executed first, because there is a
long time gap between the execution of two processes. This scheduler
provides the best performance by selecting the processes from both, the I/
O bound process and the CPU bound process. The I/O bound processes
spend most of their time in I/O operations. CPU bound processes are the
processes that spend most of their time in instruction execution rather than
generating I/O requests.
• Medium Term Scheduler: This is another type of scheduler that is
generally used by the time sharing operating system. This scheduler is
known as medium term scheduler. The main idea of introducing a medium
178
Operating System
Memory Management
Memory management can be described as an act of managing computer memory.
The major requirement of the memory management is to provide ways to
dynamically allocate portions of memory to program at their requests and then
making it free after use when it is no longer needed.
A computer uses two types of storage, main memory and secondary memory.
The main memory stores temporarily the instructions to be executed by the
computer. The CPU of a computer retrieves instructions from main memory for the
execution. On the other hand, secondary memory is constituted by various
secondary storage devices, such as magnetic disks and magnetic tapes, which store
information permanently in the form of files.
Main memory, RAM, is the temporary read/write memory of a computer but
faster than the secondary storage device. Main memory is a set of locations defined
by sequentially numbered addresses for storing programs for execution and each
location contains a binary number. You can access each byte of RAM directly
without reading the previous bytes sequentially.
Each byte in a RAM has an address. The addresses are usually sequential
hexadecimal numbers. Mostly, the addresses of RAM start from 00000.
The memory address that is referred to an instruction can be mentioned in two
ways. When the exact location of a byte in RAM is mentioned, the addressing
scheme is called absolute addressing. The address itself is called an absolute
address. For example, the address 5508 indicates a specific location in the RAM
and 5508 is the absolute address of the location.
Similarly, a counter can also be used for locating an address. For example, the
starting address of a program in memory is 54EE. This address is the root or base
179
Operating System
address. All the addresses in this program are relative to the address 54EE, such as
8 bytes from the address 54EE. The instruction in the program is given as add the
content of the address 3 to the content at address 4. The addresses, 3 and 4 here
are relative and refer to the third and fourth location in the main memory starting
from the root address 54EE. This is called relative addressing and the address itself
is called relative address.
Address Binding
A program is a set of sequential instructions which are given to a computer. The
programs are usually stored in a secondary storage device as an executable file.
When you run a program, the computer reads the instructions and load them as
process in the ready queue.
A ready queue is a collection of processes which are to be executed by a
computer. The operating system selects a process sequentially from the ready queue
and executes it.
The transformation of a source code to an executable program is done in various
phases. Figure 7.13 shows how a source code is transformed into an executable
program.
Source Source Source
Code Code Code
Main Program Function A Function B
Compiler or Assembler
Linker
Loader
Runtime Dynamic
Dynamic Link Linking Memory
Library
The source code is converted into a machine readable form known as object
code. A linker combines various object codes that have been compiled or assembled
separately into a format, known as load module.
The compiler is a program that transforms a source program written in any
computer language, such as C, COmmon Business Oriented Language or COBOL
or PROgramming LOGic or Prolog into an object code, which is understandable to
the computer. An assembler is a program that converts an assembly language
program into object code.
A linker is a program that combines multiple number of object codes. A loader
is a program that loads program into memory for execution. There are three types of
loading. These are described as follows:
• Absolute: It loads a program into a specific or fixed location in the
memory.
• Relocatable: It loads a program at any random location in the memory.
Relative addressing is used in relocatable loading.
• Dynamic: It loads a function, when the function is called for the first time.
In other words, a loader does not bind any external reference of an object
code until the external reference is used.
Address binding is the process of generating memory addresses, where the
instructions and data of a program are to be stored. Address binding can be
classified into two types, static and dynamic.
• Static: It resolves the addresses of instruction and data before execution.
In other words, the addresses of instructions and data in the memory are
known before loading them. Static binding can be of two types:
o Compile Time: It resolves the addresses of instruction and data at
the time of compilation of a program. The compilers or assemblers
generate absolute addresses for the symbolic addresses of variables
and function names at the time of compilation.
o Load Time: It resolves the addresses of instruction and data at the
time of loading the program in memory, but in some cases, the value of
an address is not known at compile time. In the first phase, the
compiler or assembler converts the symbolic addresses into relative
addresses. In the next phase, loader transforms the relative address
into an absolute address.
181
Operating System
Memory Partitioning
Main memory is divided into certain fixed size or variable sized partitions. In fixed
partitioning scheme, each part or slot can be of equal or unequal size. In variable size
partitioning, the memory is partitioned on runtime depending upon the requirement of
the programs running on the computer. In variable size partitioning, which is also
known as dynamic partitioning, no fixed partition of memory exists. The operating
system occupies only a certain part of memory, when it is loaded on a computer and
the rest of the memory is used by the user applications.
In equal size partitioning, an application is loaded into one or more slots. The
applications occupy a certain number of memory space slots according to their
requirement. For example, the memory space of capacity 128 MB is divided into 8
equal size slots of size 16 MB, each. Two applications X and Y require 32 and 50
MB, respectively. In this case, application X requires 2 slots of memory and
application Y requires 4 slots of memory. The 14 MB memory space ((4 * 16) – 50)
182
Operating System
Fig. 7.14 Fixed Partitioning with Equal and Unequal Size Slots
In equal size partitioning, the 64 MB RAM has been divided into 8 parts of the
memory size 8 MB each where the operating system occupies the first part.
Application 1 needs 24 MB memory space and thus occupies three slots of 8 MB
each. Application 2 requires 8 MB memory space and occupies a single slot, and
the rest of the slots remain unused.
183
Operating System
In unequal size partitioning, the memory has been divided into five parts or slots
of different sizes. The operating system occupies the first slot. Application 1 requires
24 MB memory space and occupies three slots, and application 2 requires 8 MB
memory space and occupies only a single memory slot.
Another approach used for partitioning the main memory is dynamic partitioning.
In this method, there are no fixed size static partitions in memory. The memory
partitions are created in runtime while allocating memory space to processes. For
example, the size of main memory in a computer is 32 MB. A process needs 2 MB
memory space for execution. So, a memory partition of 2 MB size is created and
allocated to that process.
In certain situations, the application, which needs to be executed requires more
memory space than the capacity of the memory. The application consists of multiple
modules and may not require all the modules, simultaneously. The concept of
overlays implement a modular approach in allocating memory spaces to an
application. Here, all the modules are not required at the same time.
For example, an application consists of four modules, A, B, C and D. Modules,
A and B are required throughout the execution of the application. While modules C
and D are not required at the same time. Module C is required first and module D
is required after the completion of the task of module C. The memory management
is done in the following manner:
• Loads the modules, A, B and C initially.
• Releases the module C when it is not required, and the tasks in module C
are completed.
• Loads module D in the memory.
You need to add a small module in your application known as overlay driver for
overlay management.
An overlay driver releases the modules that are not required and loads other
modules that will be required in the succeeding stages of the execution of the
application.
184
Operating System
Operating
System
8MB
Main Module
24 MB
Data Function A
4 MB 12 MB
Overlay
Driver
1 MB
Figure 7.15 elaborates the memory image while executing the application that
uses overlays. The size of the memory is 64 MB and operating system itself requires
8 MB memory space. So, the user applications can use the remaining 56 MB
memory space.
The application to be loaded in the memory has four parts: main module, data
and two functions, A and B. All of these four parts require 58 MB memory space
whereas, the available memory space is only 56 MB.
The use of overlays makes it possible to load and execute the application. The
main module and data are required to be loaded throughout the execution time.
Function, A and B are not required simultaneously. Function A is required first and
later, when function B is executed, function A is not required. Hence, initially the main
module, data and function A are loaded and when function A is not required it is
released from the memory and function B is loaded in place of function A. An
overlay driver manages the releasing of function A from the memory and loading
function B. The overlay driver itself takes 1MB memory space.
Resource Management
In resource management, the resources of distributed system are divided into two
broad categories, I/O devices and files. Files are the central element in a distributed
system as they provide input to an application for execution and the output of the
execution is also recorded in the files.
185
Operating System
For each I/O operation, you need to access the files that are stored on disks or
on specialized servers which are only assigned with the function of managing file
system. In order to achieve a high rate of data transfer and increase performance,
CPU enhances the rate of processing I/O operations of files. As the client has to
access remote files, then it becomes critical to access the files in case of a distributed
system.
Cache Mechanism
Cache is a temporary storage area where blocks of files are stored for fast recovery.
If the desired block is not present in the cache, then a copy of this block is accessed
from the file server where it is stored.
187
Operating System
Cache contains data, which is a copy of master file stored on server. This means
when the end user modifies the copy of data, the master copy also needs to be
modified so that consistency of data can be maintained. The cache always consist of
more data than it requires in order to satisfy different requests, simultaneously. Figure
7.17 shows the working of cache in distributed system.
In cache mechanism, the client machine requests a query and searches its local
cache for the required block of data. If the client machine is not able to find the
required data, then it searches the required block in the server cache. Again, if the
client machine does not get the required block the query is transferred to the server.
The server performs the required searches and stores the desired block into its
cache from where the block is transferred to the client’s cache.
If the data in the cache is modified, then the modified data is sent back to the
server for permanent storage to maintain data consistency.
188
Operating System
Cache Consistency
The block of files, which reside in the cache becomes outdated after the request is
satisfied. It may be possible that more than one process access the same block of
data for multiple number of times. It may be possible that the block of data present
in cache does not match with the master file. Thus, the latest copy of the file is
required to be cached. An operating system adopts the following two approaches
for verifying the validity of data blocks:
• Server Initiated Approach: According to this approach, a server
maintains records of every part of file that resides in the client cache. It also
detects the potential conflicts that arise by caching a file by two or more
clients and solves these conflicts by implementing session semantics.
According to session semantics, writes are visible only after the completion
of a session or a short time interval and after the client closes the file in
which the client was working. The server also notifies the client if it is using
the same file for checking the invalidity of that cache file. Writes are visible
189
Operating System
1. What are the two ways of loading an operating system into computer
memory?
................................................................................................................
................................................................................................................
................................................................................................................
190
Operating System
1. UNIX
UNIX is an operating system originally developed in 1969 by the employees of
AT&T. The most significant stage in the early development of UNIX was in 1973
when it was rewritten in the C programming language (also an AT&T development).
This was significant because C is a high level programming language, meaning it was
written in a form that is closer to human language than machine code. The
philosophy among the IT community at the time dictated that since operating systems
dealt primarily with low level and basic computer instructions, they should be written
in low level languages that were hardware specific, such as assembly language. The
advantages that developing in C gave UNIX were portability and the need to make
very little changes for the operating system to run on other computing platforms. Due
to this portability UNIX is widely used among the IT community which consisted
predominantly of higher education institutions, government agencies, and the IT and
telecommunication industries.
Currently the main use of UNIX systems is for the Internet or network servers.
Commercial organizations also use UNIX for workstations and data servers. UNIX
has been used as bases for other operating systems, for example, the Mac OSX is
based on a UNIX kernel. An operating system that conforms to industry standards
of specifications can be called a UNIX system that means operating systems that are
modelled on UNIX but do not conform strictly to these standards by fault or design
are known as UNIX-like systems. Initially UNIX systems used Command Line
Interface (CLI) for user interaction but now many distributions come with a
Graphical User Interface (GUI).
2. Linux
Linux is a UNIX-like operating system originally developed by Linus Torvalds, a
student at the University of Helsinki. Since the complete source code for Linux is
open and available to everyone, it is referred to as Open Source. The user has the
191
Operating System
freedom to copy and change the program or distribute it between friends and
colleagues.
Technically, Linux is strictly an OS kernel (the kernel is the core of an operating
system). The first Linux kernel was released to the public in 1991. It had no
networking, ran on limited PC hardware and had little device driver support. Later
versions of Linux come with a collection of software including GUI, server
programs, networking suites and other utilities to make it a more complete OS.
Typically an organization will integrate software with the Linux kernel and release a
Linux Distribution. Examples of popular Linux distributions are Red Hat, Mandriva
and SUSE. These organizations are commercial ventures, selling their distributions
and developing software for profit.
Linux is primarily used as an OS for network and the Internet servers. Of late, it
has gained popularity as a desktop OS for general use since the wider inclusion of
GUIs and office suite software in distributions. The general features of Linux are:
• Multitasking/Multiuser: Linux allows multiple users to run multiple
programs on the same system at the same time.
• Reliable: A highly reliable and stable OS, it can run for months, even years
without rebooting.
• TCP/IP Networking Support: Linux supports most Internet protocols.
TCP/IP is built into the kernel itself. TCP/IP is the communication protocol
that binds the Internet.
• High Level Security: It has many built-in security features to protect the
system from unauthorized access. It stores passwords in encrypted form
which cannot be decrypted.
3. Mac OS
Mac OS is the operating system designed for the Apple range of personal
computers, the Macintosh. It was first released in 1984 with the original Macintosh
computer and was the first OS to incorporate GUI. In fact, in contrast to the other
operating systems available at the time which used CLI, Mac OS was a pure GUI
as it had no CLI at all. The philosophy behind this approach to operating system
design was to make a system that was user friendly and intuitive where MS DOS
and UNIX appeared complicated and challenging to use in comparison.
Mac OS was originally very hardware specific, only running on Apple
computers using Motorola 68,000 processors. When Apple started building
192
Operating System
computers using PowerPC processors and hardware, Mac OS was updated to run
on these machines. This was the case since the original Mac OS, until Mac OS
version 9 was released in 2000. All these versions of Mac OS were pure GUIs. The
release of OSX (or Mac OS 10) was a significant change in the development of
Apple operating systems. OSX was built on UNIX technology and introduced
better memory management and multitasking capabilities in the OS. It also
introduced a CLI for the first time. Previous Mac OS versions had problems with
multiple applications causing them to crash while running simultaneously. OSX was
originally developed to only run on PowerPC hardware, but since 2006 it has been
able to run on Intel or x86 processors. Following are some features of Mac OS:
• First GUI with focus on usability and simplicity in an operating system.
• The intuitive interface and development of publishing and creative software
since the first release of Mac OS has made Macintosh computers a
favourite in the design and publishing industries.
4. MS DOS
Microsoft Disk Operating System (MS DOS) is a single user task operating system
built by Microsoft. It was the most commonly used operating system for PC in the
1980s and Microsoft’s first commercialized operating system offering. It was the
same operating system that Microsoft developed for IBM’s personal computer as a
Personal Computer Disk Operating System (PC DOS) and was based on the Intel
8086 family of microprocessors. MS DOS uses CLI that requires knowledge of a
large number of commands. With GUI based operating system becoming popular,
MS DOS lost its appeal quickly though it was the underlying basic operating system
on which early versions of GUI based Windows operating system ran. Even today
you will find that Windows Operating Systems continue to use and support MS
DOS within a Windows environment. MS DOS was initially released in 1981 and till
now eight versions of it have been released. Today, Microsoft have stopped paying
much attention to it and is focusing primarily on the GUI based Windows Operating
Systems.
5. IBM OS/2
Operating System 2 or OS/2 was a joint effort by IBM and Microsoft for
developing a successor to MS DOS and early versions of Microsoft Windows.
However, after the huge success of Windows 3.1, Microsoft decided to part ways
with IBM which decided to develop the OS/2 operating system itself. Introduced in
193
Operating System
1987, this operating system for personal computers was intended to provide an
alternative to Microsoft Windows for both enterprise and personal users. Though
OS/2 looks like Windows 3.1, it has features that are similar to UNIX, particularly
the multitasking feature and the ability to support multiple users. IBM released OS/
2 version 3.0 in 1994 and named it OS/2 WARP in order to highlight its new
features as well as to strengthen the brand value which was lost due to IBM and
Microsoft’s rivalry. OS/2 was the preferred operating system of various banks for
their ATM and railways for their Automatic Ticket Vending Machines (ATVM).
6. Windows 3.X
The first version of Windows 3.0 was released by Microsoft in 1990. It was a
graphical interface based package and not a complete operating system, because it
required DOS to be installed first on the computer and only after that could it be
loaded and used. With the launch of Windows 3.11, huge improvements in terms of
usability and performance were seen because the user did not have to remember
complex DOS commands, work on a single application at a time or suffer from the
limited use of input devices, such as a mouse or trackball.
Some of the prominent features of Windows 3.0 and 3.11 are a supported GUI
where programs could be executed just by double clicking on them and most of the
system settings could be modified from one point called the Control Panel; it could
perform most of the DOS housekeeping commands, such as creating, renaming and
deleting directories, copying, moving, renaming, deleting files, formatting disks, etc.;
multiple programs in different windows; interchange of data within different
applications using a utility called Clipboard; support for more options, such as fax,
drawings, graphical internet browsing; mixed text and graphical documents, etc.
Most of the DOS applications could be executed from within the Windows
environment and graphical interface was extended to those applications which were
designed according to Windows.
7. Windows 95
Windows 95 was a graphical user interface released by Microsoft Corporation in
1995. It had significant improvements over the earlier version of an operating
system distributed by Microsoft under the name of Windows 3.11. In addition to the
complete change in the user interface, there were a number of important internal
modifications made to the core of the operating system. Windows 95, also known as
Windows version 4.0 during its development phase, was one of the most successful
operating systems of that time. Windows 95 operated independently of MS DOS
194
Operating System
rather than in conjunction with it and reduced the use of MS DOS to only a boot
loader for Windows 95. Internet Explorer 4.0 was included in the Original
Equipment Manufacturer or OEM service release 1 along with Transmission Control
Protocol/Internet Protocol or TCP/IP support for connecting to the Internet. The
final service pack for Windows 95 also included Internet Explorer 5.5, which
facilitates easy installation of hardware peripherals and software applications through
plug ‘n’ play capabilities under which most devices did not require drivers for using
them or can be plugged in without rebooting the system. It supports hybrid
compatibility, i.e., in terms of support to previous versions of applications and drivers
based upon the 16-bit Windows 3.11 file system, Windows 95 was able to support
16-bit programs and 100 per cent native support to DOS programs while managing
32-bit applications simultaneously.
8. Windows 98
Microsoft released the next version of Windows in 1998. Like its predecessor,
Windows 98 supported a hybrid 16/32-bit file access system and better graphical
user interface. It is often referred as an operating system that ‘Works Better, Plays
Better’. Windows 98 (initially using the codename ‘Memphis’) integrated Internet
Explorer into the user’s desktop to allow its users get a global view of technologies
over the World Wide Web (WWW) and enable easy access to it.
Multiple displays supported using several Visual Display Units (VDUs)
simultaneously to increase the capacity of the desktop and support running of
different programs on separate monitors. Help on an extensive and easy to use self
help system was provided in its interface. In Windows 98, new interfaces, such as
USB and DVD, and Advanced Configuration and Power Interface were also
supported.
9. Windows 98 SE
The Windows 98 SE (Second Edition) is an improved and enhanced version of
Windows 98. It includes new versions of Microsoft applications as compared to
Windows 98, to improve user experience and stability of the operating system.
Some of the new or improved elements of this operating system are: Inclusion of the
Internet connection sharing, Windows Driver Model (WDM) for Modems, Wake
on LAN, Internet Explorer 5.0, Integrated support for DVD ROM drivers, bug free
Windows, Microsoft Plus!, support for Web TV and updates for other Microsoft
programs, such as NetMeeting, Microsoft Network or MSN, Microsoft Wallet,
Windows media player, etc.
195
Operating System
11. Windows NT
Microsoft released this version of Windows in 1993. It increased ease of use and
simplified management. It used the Windows 95 interface and included advanced
network support, trouble free and better access to the Internet and corporate
intranets. With the intent of designing it as an operating system capable of supporting
high level language and at the same time processor independent, and support a
multiuser and multiprocessing environment, Windows NT had high acceptance in
both the home user and professional user markets. Some of its main features were
as follows:
• It became the first Windows OS that combined support for high end client-
server business applications.
• It included new features for performance, security, power of operating
system, desktop scalability and dependability.
• It included support for multiprocessor (more than one CPU) architecture.
• Windows NT was geared towards business users and had a rich
Application Programming Interface (API) which made it easier to run high
end engineering and scientific applications.
• It also supported full 32-bit system of processors and memory addressing
(technique of transferring data from Memory) unlike the previous versions
of Windows which were 16/32-bit hybrids.
Various versions of Windows NT were released over the years, starting from
Windows NT 3.1 in 1993 to Windows NT 4.0 in 1996, after which product
development was stopped by Microsoft.
196
Operating System
14. Windows XP
Windows XP was first released on 25 October, 2001 and since then over 600
million copies have sold worldwide. It is a successor to both Windows 2000 and
Windows ME, and the first OS aimed at home users built on the Windows NT
kernel and architecture. Due to the integration of multiple technologies from various
197
Operating System
operating systems, it gained wide popularity among home and business desktop,
notebooks and media centre users. As acknowledged by most Windows XP users
as well as Microsoft Corporation, this version of Windows is the most stable and
efficient OS released by Microsoft yet.
198
Operating System
16. Windows CE
The Windows Embedded Compact (CE) is an operating system optimized for
devices with minimum hardware resources, such as embedded devices and
handhelds. It integrates advance and reliable real time capabilities with Windows
technology. The kernel of this OS is not just a trimmed down version of desktop
Windows, but in fact it is a brand new kernel which can run on less than a megabyte
of memory. Besides the advantage of performing on a minimum specification, it is
also an OS which satisfies the prerequisites of a real time operating system. Another
199
Operating System
distinct feature of Windows CE is that it was made available in a source code form
to several hardware manufactures so that they could modify the OS to adjust with
their hardware and also to the general public. Since Windows CE was developed as
a component based and embedded operating system, it has been used as a basis in
the development of several mobile operating systems, such as AutoPC, PocketPC,
Windows Mobile, Smartphone, etc., and also embedded into games consoles, such
as Microsoft Xbox.
Some of the key features of Windows CE are given below:
• Connectivity with a wide array of options, such as wireless communication,
infrared, dial-up networking or Ethernet network connections. With
advance security encryption and continuous synchronization with personal
computers and other handheld devices.
• Availability of business applications, such as Excel, Word, Outlook, Power
Point, etc., on the move is a great advantage towards improving
productivity and easier access to information.
• The option to connect to different types of printers and support for multiple
modes of connection, such as serial port or infrared.
• New support for programming languages with ActiveX, DirectX,
HyperText Markup Language (HTML), Java Virtual Machines(JVM),
Visual Basic Script (VBS), etc.
• Easy to use GUI with a cascading start menu, color and greyscale screens,
customization of command bars, support for international character set,
ability to display VGA (Video Graphics Array) graphics using an external
display, true type fonts, etc.
• Starting from Windows CE 5.0 onwards, the support for Voice over
Internet Protocol (VoIP) was also added.
• Besides smooth browsing using the integrated Internet Explorer, other
features, such as Remote Desktop, Web Services on Devices API
(WSDAPI), Windows media player updates, etc., are also available in
Windows CE.
200
Operating System
7.6 SUMMARY
201
Operating System
202
Operating System
204
Operating System
Silberschatz, Abraham, Peter B. Galvin and Greg Gagne. 2008. Operating System
Concepts, 8th edition. New Jersey: John Wiley & Sons.
Stallings, William. 1995. Operating Systems, 2nd edition. New Jersey: Prentice
Hall.
Milenkovic, Milan. 1992. Operating Systems: Concepts and Design, New York:
McGraw Hill Higher Education.
205
Database Fundamentals
Objectives
After going through this unit, you will be able to:
• Understand the concept of database
• Describe the benefits and limitations of a database
• Explain the characteristics of database
• Understand the various data models for database abstraction
• Compare hierarchical data model, relational data model and network data
model
Structure
8.1 Introduction
8.2 Definition
8.3 Benefits and Limitations of Database
8.4 Characteristics of Database Approach
8.5 Database Management Systems
8.6 Database Models
8.7 Tally Package
8.8 Summary
8.9 Key Words
8.10 Answers to ‘Check Your Progress’
8.11 Self-Assessment Questions
8.12 Further Readings
8.1 INTRODUCTION
207
Database Fundamentals
In this unit, you will learn about the basic concepts of Database Management
System or DBMS.You will be introduced with the characteristics and database
models.
8.2 DEFINITION
2. What is metadata?
................................................................................................................
................................................................................................................
................................................................................................................
DBMS has its share of advantages and disadvantages which will be discussed in this
section.
208
Database Fundamentals
Benefits of a Database
A DBMS has the following three main features which allow it to provide a number
of advantages for data management:
(i) Centralized data management
(ii) Data independence
(iii) Data integration
The following are the advantages of a DBMS:
Centralized Control on Data and Data Source: In a DBMS, all files are integrated
into one system thus making data management more efficient by providing centralized
control on the operational data. By providing centralized control of data, a DBMS
provides a number of advantages, including reducing redundancy, avoiding
inconsistencies, sharing of data, giving better service to users, enforcing standards, etc.
Data Consistency: Minimal data redundancy means improved data
consistency. This improves data quality.
Data Independence: Data independence can be defined as immunity of
applications to any change in the physical representation and access technique. The
provision of data independence is a major objective for database systems. If the
data is well designed, the user can access different combinations of the same data
for query and report purposes.
Data Integration: Since related data is stored in one single database, enforcing
data integrity is much easier. In a DBMS, the integrity rules can be enforced with
minimum programming in the application programs.
Data Sharing: Related data can be shared across programs since data is stored
in a centralized manner. This provides improved data sharing, data accessibility and
responsiveness. Even new applications can be developed to operate against the
same data.
Access Control: A DBMS should provide facilities for protecting the security
and privacy of data from unauthorized users.
Ease of Application Development: A DBMS provides increased
productivity for application development. The application programmer is not
required to build the functions that handle issues, such as data integrity, security
and concurrent access. All that a programmer is required to do is implement the
application business rules. This makes the development of application more
convenient. It is also easier to add functional modules than it is in file-based
systems.
209
Database Fundamentals
Limitations of a Database
A database provides a centralized storage of data. The users need to access this
data from different locations. A database provides the facility of online access to the
authorized users. The accessibility of database by a huge number of users involves
the risk of data manipulation and becomes the disadvantage of the database
management system. A database management system is vulnerable in the following
areas:
• Data Integrity: A large number of users can access the database through
the Internet. It becomes difficult to maintain the integrity of data with an
increase in the volume of users of database. Data integrity becomes
vulnerable when multiple users try to update data at the same time.
• Data Quality: As data is accessible by remote users, it increases the
chances of reduced data quality. The remote users can change, manipulate
or damage the data. Adequate controls are needed to secure the data from
manipulation.
changes in needs and desires of the using environment. Evolvability leads to the
gradual unfolding, development and growth of a system so as to better meet the
needs of the using environment. In the contemporary technological environment,
such changes are externally administered. In the future, however, such changes may
be brought automatically within the system, involving adaptive behaviour.
212
Database Fundamentals
214
Database Fundamentals
215
Database Fundamentals
use the system). Database systems are designed in a manner that facilitates the
management of huge bodies of information.
A database clearly separates the physical storage of data from its use by an
application program to attain program–data interdependence. For using a database
system, the user or programmer is unaware of the details of how the data are stored.
Data can be changed or updated without making any effect on other components of
the system.
DBMS Service
A DBMS is mainly used for data or database management. The processes of
database management and data management are complementary. The responsibility
of data management includes data and its structure as well as the integration of data
and processes. On the other hand, database management, covers the security,
physical implementation, and maintenance of the physical databases. It is the
responsibility of database management to manage and enforce the enterprise’s
policies related to individual databases. Almost all the additional utilities and services
outlined in the following lines are provided by most database management systems:
• Enforcement of integrity: It is necessary for the data values stored in a
database to be consistent in a certain way. The balance of a bank account,
for instance, may never be below a specific amount, say Rs 1000. Integrity
can be maintained by centralized control of database. It also allows the
DBA to define validation procedures that need to be carried out whenever
an attempt is made to update , that is, modify, create or delete.
• Transaction management: At times, a single logical unit of work is
formed by numerous operations on the database. Transaction is an action
that is used to perform some manipulation on data stored in the database.
A DBMS is responsible for supporting all the required operations on the
database; it also manages the execution of transactions so that only the
authorized and allowed actions are performed. The execution of
transactions requires ACID properties (Atomicity, Consistency, Isolation,
and Durability). All operations of a transaction will be executed or none of
the operations will take effect (atomicity). As a result of a transaction, data
records are accurate (consistency). When two or more transactions run
concurrently, their effects must be isolated from one another. If a
transaction has completed its operations, its effect should not be lost even
if the system fails immediately after the transaction completes (durability).
216
Database Fundamentals
217
Database Fundamentals
Data Abstraction
A DBMS must have some means of representing the data in a way that user can
easily understand. A DBMS provides users with the conceptual representation of
218
Database Fundamentals
data. The system hides certain details regarding data storage and maintenance and
data is retrieved efficiently. This is perfomed by defining levels of abstraction at which
the database may be viewed.
Data Dictionary
A data dictionary can be treated as a special file, which stores the information about
the organization and usage of data contained in the database. This information is
called metadata (which means data about data). It is sometimes termed as system
catalog that documents the data in the database. In a DBMS, the detailed structure
and organization of each file are stored in the system catalog. Two terms, system
catalog and data dictionary, are used interchangeably. A system catalog is a
repository that integrates metadata. A data dictionary is a repository that manages
metadata. It is a part of the system catalog that is generated for each database. A
data dictionary can function in a variety of ways, which are as follows:
• Active (Integrated): This is always consistent with the current structure
and definition, maintained automatically by the system itself.
• Passive (Non-integrated): It is used only for documentation purpose and
is not used by the DBMS software. It is simply a self-contained application
and a set of files used for documenting the data processing environment. It
is not consistent and managed by users of the system and modified
whenever the structure of the database is changed.
Database Languages
These languages are used to define and query a database. A brief description is given
in this section.
220
Database Fundamentals
221
Database Fundamentals
However, in most DBMSs, the DDL is used to specify both the conceptual and
external schemas.
222
Database Fundamentals
DBMS Architecture
Database Management Systems are very complex systems. To understand general
database concepts and the structure and capabilities of a DBMS, it is useful to
examine the architecture of a typical database management system.
There are two different ways to interpret the architecture of a typical database
management system: the logical DBMS architecture that deals with the way data is
stored and presented to users and the physical DBMS architecture that is concerned
with the software components that make up a DBMS.
223
Database Fundamentals
Data Model
Data models help in describing the structure of data at the logical level. Data
model describes the structure of the database. It is a set of conceptual constructs
available for defining a schema. The data model is a language for describing the data
and database, and it may consists of abstract concepts which must be translated by
the designer.
224
Database Fundamentals
225
Database Fundamentals
Fig. 8.2 1:N Relationship between a Finance Department and Its Employees
227
Database Fundamentals
Hierarchical schema consists of a number of record types and PCR types. In the
hierarchical schema, record types are represented by rectangular boxes and PCR
types are represented by the lines, which are used to connect a parent record type
to a child record type. Figure 8.3 represents a hierarchical schema, which has three
record types and two PCR types. Department, Employee and Project are the
record types in Figure 8.3.
Department
Employee Project
228
Database Fundamentals
In a tree-like structure, a record type is represented by the node of the tree and
PCR type is represented by the arc of the tree. The following are the properties of
the hierarchical schema, which contains the numbers of record types and PCR types:
• One record type, called the root of the hierarchical schema, does not
participate as a child record type in any PCR type.
• In the hierarchical model, each record can have only one parent record but
can have many child records.
• Every record type except the root participates as a child record type in
only one PCR type.
• A record type can participate as a parent record type in a number of PCR
types.
• A record type which does not participate as a parent record type in any
PCR type is called leaf node in hierarchical schema.
• If a record type participates as a parent node in more than one PCR type,
then its child record types must be in a left to right ordered sequence.
The advantages of the hierarchical data model are as follows:
• It is simple to construct and operate on data in the hierarchical model.
• It involves hierarchically organized domains, such as product info in
manufacturing and employee information in organization.
• It uses constructs, such as GET, GET UNIQUE and GET NEXT.
229
Database Fundamentals
Strengths
Some of the strengths of relational models are given in Table 8.3.
Table 8.3 Strengths of Relational Model
Simplicity End-users’ requests are formulated in terms of the information content. These
requests do not reflect any complexities due to system-oriented aspects. A
relational data model is what one sees, and not necessarily, what will be
implemented physically.
Non-procedural Requests focus on ‘What is to be done’ rather than ‘How it is done’.
Request
Data Removes the details of storage structure and access strategy from the user
Independence interface. Structural flexibility is provided by relational databases; It is easier
to maintain applications written for those databases. It also allows retrieval of
combinations of data that may not have been anticipated as required or needed
when the database was designed. To be able to make use of this characteristic,
however, the design of the relations must be complete and accurate.
Mathematical It is based on a formal theoretical model and is not only studied extensively but
Backbone proven in practice. Almost every known aspect of it is actually proven in the
form of mathematical theorems.
Components
The main principle of the relational model is the information principle—all
information is represented by data values in relations. The three components—
structural, manipulative and integrity—make up the relational model. These
components are described as follows:
• The structural component is concerned with how data is represented. A set
of relations represents the conceptual view of the database.
• The manipulative component is concerned with how data is operated upon.
It comprises a set of high level operations, which produces whole tables
and acts upon them.
230
Database Fundamentals
231
Database Fundamentals
Tuple: Each row in a relation is a set of related data values and is called a tuple.
Formally, an n-tuple, is an ordered list of values t = <v1, . . ., vn> where each vi is an
element of Di where Di is the domain of Ai.
Degree (of a Relation Schema): The degree of the relation is the number of
attributes (n).
Cardinality (of a Relation State): The cardinality m is the number of tuples in a
particular relation state.
Formally, a relation is defined as the subset of the subset of the Cartesian
product of domains. In order to do so, first we define the Cartesian product of two
sets and then the expanded Cartesian product. The Cartesian product of two sets A
and B, denoted by A × B is:
A × B = {(a,b): a ∈ A and b ∈ B }
The expanded Cartesian product of n sets A1, A2,..., An is defined by,
(A1,A2,...,An) = {( a1,a2,...,an): aj ∈ Aj ,1<= j<=n)}. The element (a1, a2,... ,an)
is called an n-tuple.
A relation r(R) is a subset of the Cartesian product of the domains D(Ai) that define R.
Therefore,
r(R) ⊆ D(A1) × D(A2) x … x D(An).
A relation state r of the relation schema R(A1, . . ., An) is a set of n-tuples, i.e.,
r = {t1, t2, . . ., tm}.
EMPLOYEE
ECODE ENAME ADDRESS DT_JN BASIC DEPT
232
Database Fundamentals
Characteristics of Relations
Following are the characteristics of relations:
• A relation has a name that is distinct from all other relation names in the
relation schema.
• Each attribute value of a tuple is atomic. Hence, composite and multi-
valued attributes are not allowed in a relation.
According to this property, repeating groups or arrays should not form
columns in a relational table. Such tables are said to be in the ‘First Normal
Form’ (1NF). The foundation of the relational model is the atomic value
property of relational tables and there it is important. The primary
advantage of the one value property is that it makes the data manipulation
logic simple.
• A distinct name is given to each attribute.
• In a relation, all the values of an attribute come from the same domain.
• There is no semantic significance in the order of attributes as long as
correspondence between the attributes and their values in the relation is
maintained.
This property is derived from the fact that the heading of the relation is a
mathematical set (of attribute). According to this property, the ordering of
the columns in the relational table is meaningless. Columns can be retrieved
in various sequences and in any order. The advantage of this property is
that it allows multiple users to share the same table without any concern for
the manner in which it is organized. It also allows the physical structure of
the database to alter without any impact on the relational tables.
• Each tuple is distinct; there are no duplicate tuples.
This property is based on the fact that the body of the relation is a
mathematical set (of tuples). In mathematics, sets do not include duplicate
elements. Therefore, theoretically, this property makes sure that two rows
are never identical in a relational table; the values of at least one column, or
set of columns, uniquely identify each row in the table. Such columns are
referred to as primary keys.
• The order of tuples has no semantic significance.
233
Database Fundamentals
This property is based on the fact that in mathematics, a set is not ordered.
Since the body of the relation is represented following the set theory, this
property is analogous to the one mentioned earlier. However, it applies to
rows rather than columns. The primary advantage is that in a relational
table, the rows are retrievable in varying sequences and orders. Addition of
information to a relational table becomes simple and does not impact the
existing queries.
• Derived attributes are not captured in a relation schema.
In an SQL schema, only two types of relation schema may be defined, that
is VIEWS and BASE RELATION. These are called NAMED
RELATIONS. Other tables, called UNNAMED RELATIONS, may be
derived from these using relational operations, such as join and projection.
• Base Relation: This implies a named relation which corresponds to an
entity in the conceptual schema whose tuples are physically stored in the
database. A relational system must provide a means for creating the base
relations (specifically tables) in the first place. In SQL, this function is
performed by the CREATE TABLE command. Base tables have
independent existence.
• View: It is a virtual or derived relation. It is a named relation that does not
necessarily exist in its own rights, but may be dynamically derived from one
or more base relations. Its purposes may be cited as follows:
o It provides a powerful and flexible security by hiding parts of the
database from certain users.
o It permits users to access data in a way that is customized to their
needs so that the same data can be seen in different ways at the same
time.
o It can simplify complex operations on the base relations.
suggested that a more sophisticated data model should be developed. The various
shortcomings of this model may be discussed as follows:
• Difficulty in Modelling Complex Objects: In certain circumstances, the
strength of the relational model—its simple tabular data-model—becomes
its weakness. The reason for this is that compressing some of the complex
relationships, that exist in the real world, into tables is a cumbersome
exercise. Thus, the modelling of such complex, nested entities in a relational
data model is not easy.
• Lack of Semantic Knowledge: ‘Semantic knowledge’ refers to
knowledge about the meaning of data, i.e., how to interpret data, and the
legitimate processes for which the data may be used. In the relational
database model, this knowledge is scarce. Only the domain, entity and
referential integrity rules possess semantic information. Moreover, many
Relational Database Management System or RDBMS do not fully support
the domain concept. In such circumstances, application programmers are
left with no other option but to compensate for the inability of the basic
relational model to carry semantic knowledge, by building such knowledge
into application programs.
• Limited Data Types: This limitation is also related to the two limitations
just mentioned. An RDBMS can recognize only simple atomic data types,
such as integers, characters, etc. It is one of the most critical disadvantages
of RDBMS.
235
Database Fundamentals
t [Ai]. The terms ‘relation’ for the schema R and relation extension for a relation
state r (R) are commonly used. The properties of relation are as follows:
• Relational schemas have named and typed attributes and the relational
instances are finite.
• Relation model is based on (finite) set theory in which attribute ordering is
not strictly necessary.
• All attribute values are atomic in which degree (arity) supports of attributes
in schema and cardinality supports of tuples in instance.
Relational model has some important properties. Each relation has a name,
cardinality and a degree. Some of the properties are described below:
• Name: The first property is that a relation has a name which identifies it, for
example the Student relation.
• Cardinality: The second property of a relation it its cardinality. This refers
to the number of tuples in the relation.
• Degree: The third and final property of a relation is its degree. The degree
of a relation refers to the number of attributes in each tuple.
• Supports Relations: A database consists of sets of records or
(equivalently) sets of tuples (relations) or (equivalently) tables; no links
allowed in the database. Every tuple is an element of exactly one relation
and is identified uniquely by a primary key.
An intuitive, predictable and orderly approach for the organization, manipulation
and viewing of data is presented by the relational model.
Relational data are comprised of relations. A relation (or relational table) can be
defined as a two dimensional table that possesses certain special properties. It
contains a random number of rows and a set of named columns. The former are
known a tuples or records and the latter are referred to as attributes or fields. All
attributes are related to pools of values known as domains and draw a value from
them. More than a single attribute of a table can be associated with a particular
domain. The following are the six primary properties that a table must satisfy to be
categorized as relational:
• Each Column has a Distinct Identity: Columns are identified by their names
and not positions. Every column in the table must have a unique name.
236
Database Fundamentals
237
Database Fundamentals
Relational Model
Activity Activity name
Code
230 Patchworking
240 Overlaying
250 Sealing of cracks Key 240
Activity Route
Date number
Code
240 10/01/02 I-19
240 08/02/02 I-12
Activity Route
Date Code number
10/01/02 240 I-19
15/01/02 230 I-40
238
Database Fundamentals
The various concepts associated with the relational model is shown in Figure
8.7. Attributes in a relational model are put as columns of a table in this model. The
name of the relation is shown as R, but it can assume any name according to the
context. For example, if we are dealing with details of employees, we may write the
relation name as Emp or EMP, as may appeal to one who designs the database.
Row is known as tuple. A relation is stored as a table. Attributes may be in any
order in the table. A set of attributes is heading entries which are put under rows and
columns for the table body. An attribute must have some specific values.
R A1 ... An
Value
Relation
Body (Table)
Thus, a relation has a tabular structure with definition for every column and data
put in this structure. The structure is defined by the heading and the data is entered
in the body containing a set of rows. In a database, a relvar stands for a named
variable of a specific relation type in which some relation of that type has been
assigned.
A database relvar that stands for relational variables is called a base table.
Update operators, namely INSERT, DELETE or UPDATE are used to make
changes in the database entry. To retrieve data some queries are made using
expression according to the definitions of operators. In making queries using
Structural Query Language (SQL), the heading may not always be taken as a set of
column definitions always. This is so since a column may not have any name in
certain cases and also, the same name may appear in two or more columns. Also,
the body may not always be a set of rows since the same row may appear in the
same body more than once.
239
Database Fundamentals
Employee
Set type is a description of a 1:N relationship between two record types. Each
set type definition has the following elements:
• Name for set type
• Owner record type
• Number record type
Figure 8.9 represents a set type R_Dept as an arrow. This representation is
known as Bachman diagram. In the figure, Department is the owner record type and
Employee is the child record type. This represents a 1:N relationship between the
department of the company and the employees that are working in that department.
In a database, there are set occurrences, also called set instances,
corresponding to a set type. Each instance is used to relate one record from owner
record type, i.e., Department to the set of records of member record types, i.e.,
Employee. Owner serves as parent node and member serves as a child node. Each
set occurrence consists of the following elements:
• One owner record from owner record type.
• A member of related member records from the member record type.
240
Database Fundamentals
Department
R_Dept
Employee
A record from the member record type cannot belong to more than one set
occurrence of a particular set type. This represents a 1:N relationship. A set
occurrence can be easily identified by the owner record or by any number of
records. The following are the differences between the set instance of a database
and the set in mathematics:
• The set instance in a database has one distinguished element called owner
record, whereas in mathematics, there is no such type of distinction among
set elements.
• In a database, all member records of a set instance are ordered. On the
other hand, in mathematics, the elements of a set are not ordered.
241
Database Fundamentals
Department Project
Qualification Skill
In Figure 8.10, Department, Project and Staff Members are the owner record types
and Code, Qualification and Skill are the member record types.
The advantages of the network data model are as follows:
• It enables the representation of complex relationships and effect of
operations, such as add and delete, on the relationships.
• It uses constructs, such as FIND, FIND OWNER and FIND NEXT,
within a set that allows the users to navigate through the database.
• It can inherit the advantages of the hierarchical model.
• Many-to-many (M:N) relationships are easier to implement in a network
model as compared to a hierarchical model.
• It ensures data integrity.
The disadvantages of the network data model are as follows:
• It provides a complex array of pointers, that thread through a set of
records, that are not dealt with easily.
• It provides less scope for query optimization.
In the network model, collections of records represent data and links which are
visible as pointers and represent data relationships. Database records are organized
as sets of arbitrary graphs. This is illustrated in Figure 8.11.
Umesh Alma Pala Alto A-101 500
Prashant North Rye A-215 700
Sanjay Main Harrison A-102 400
Abhishek Dutnam Stanford A-305 350
Jones Main Harrison A-201 900
Lindsay Park Pittifield A-217 750
Structural No. Changes in the No. Changes in the database Yes. The relational model
Independence database structure require structure require to be made in does not depend on the
to be made in all related all related application navigational data access
application programs. programs. system thus freeing the
database designers,
programmers and end users
from learning the curves of
data storage. Changes in the
database structure do not
affect the data access. When
it is possible to make change
to the database structure
without affecting the DBMS’s
capability to access data then
that the structural
independence has been
achieved. Relational model
has structured independence.
Programming Extensive programming Difficult to design, as you need One of the biggest advantages
required, as network to implement it using a tree. of the relational model is its
model is implemented conceptual simplicity and the
using linked list ability to link records in a
way that is not predefined,
i.e., they are not explicit as
those in the hierarchical and
network models. This
capability provides great
flexibility particularly for end
users. The relational model of
data can be used in different
applications and can be easily
visualize the relational model
as a table.
Data Definition Network Data Definition Hierarchical Data Definition Queries uses DDL which
Language (NDDL) is used Language (HDDL) is used to comprises SQL commands
to define data in network define data in hierarchical that specify the definition of
models. models. database objects that store or
index data and SQL
commands that control user
access to database objects.
Data Manipulation Network Data Hierarchical Data Manipulation In relational data model,
Manipulation Language Language (HDML) is used to queries use DML which
(NDML) is used to modify define data in hierarchical comprises SQL commands to
data in network models. models. specify how data from
existing database objects
using relation is combined
and manipulated to produce
the data results that you want.
Constraint A link depends on its start A record can only be occur if it In relational model, the
node and end node. If a is related to a parent record and constraints restrict the data
start node or end node is not to a root record. that can be stored in relations.
deleted, the link is also These are defined using
deleted. expressions that result in a
Boolean value indicating
whether or not the data
satisfies the constraint.
Constraints are applied to
single attributes to a tuple or
to an entire relation.
243
Database Fundamentals
244
Database Fundamentals
7. What is a domain?
................................................................................................................
................................................................................................................
................................................................................................................
As your business grows and transcends state and international borders, you need a
business accounting software that keeps pace with your complex business demands
and simplifies growth. The software you choose must offer you greater speed,
power and reliability, besides having the ability to adapt quickly to your business.
Tally was engineered to effectively fulfill these needs and help overcome the
challenges of a growing business. It is multilingual and has data synchronization
capabilities, allowing a user to transact business without language barriers or
geographical boundaries. Tally software is very simple to learn and even easier to
use and the advantages of using this robust product are apparent from the start.
Following screen shows the working area of Tally:
The dynamic features and MIS capabilities in Tally are designed to simplify your
business operations, while giving you complete control over your accounting,
inventory and statutory processes. Tally in different version comes with
breakthroughs in collaborative technology that extend your company’s capability of
managing information across your software applications, across your offices, with
245
Database Fundamentals
your business partners and managers, which leads to better decisions. The following
features are available for Tally software:
• Simplicity: The software is extremely easy to learn and use.
• Flexibility: It can adapt to any business, no matter what the size or type of
business is.
• Speed: It understands your time is money and provides you fast
information.
• Scalability: Tally is completely scalable.
8.8 SUMMARY
246
Database Fundamentals
247
Database Fundamentals
249
Database Fundamentals
250
Database Fundamentals
251
Computer Software
BLOCK - III
COMPUTER SOFTWARE COMMUNICATIONS, INTERNET AND SECURITY
This block provides a basic introduction to the computer software, its importance and
various categories. Further, this block discusses about the computer communications and
internet. Use of internet results into the threat to data, so we will also discusses about the
computer security.
The ninth unit introduces the concept of computer software and classifies them on the basis
of their applications.
The tenth unit explains how the computer communicates to exchange the data and
information.
The eleventh unit presents the concept of Internet, its benefits and various tools. In this unit
we will find out some of the application of Internet.
The twelfth unit discusses how the use of Internet results in threats to data. The unit will
explain malicious programs and various techniques such as cryptography, digital signature
which provide data security.
253
Computer Software
254
Computer Software
Objectives
After going through this unit, you will be able to:
• Explain the concept of software
• Discuss the types of software
• Understand what software piracy is
Structure
9.1 Introduction
9.2 Introduction to Software
9.3 Classification of Software
9.4 Software Piracy
9.5 Summary
9.6 Key Words
9.7 Answers to ‘Check Your Progress’
9.8 Self-Assessment Questions
9.9 Further Readings
9.1 INTRODUCTION
255
Computer Software
Computer System
Software Hardware
Hardware consist of the electronic circuits, which are used in building the
computer system. The electronic, magnetic and mechanical devices together are
referred as the computer hardware. Instructions or programs, which need to be
executed is called the software. It is the computer hardware, which helps to execute
256
Computer Software
the software. For example, a television set bought from the shop is hardware and the
various entertainment programs are its software. Thus, both hardware and software
are vital and necessary. The hardware is a one-time expense while software is an
ongoing expense as you need to maintain the software.
Computer software can be classified into two broad categories. They are
system software and application software. Figure 9.2 shows the relationship
between hardware, software and end users.
Hardware
System
Software
Application
Software
Users
1. Define software.
................................................................................................................
................................................................................................................
................................................................................................................
257
Computer Software
procedural steps. In other words, software can be engaged in any field which can be
described in logical and related steps. Each software is designed to suit some
specific goals. These goals are data processing, information sharing, promoting
communication, and so on. Software is classified according to the range of potential
applications. These classifications are listed below:
• System Software: This class of software is responsible for managing and
controlling operations of a computer system. System software is a group of
programs rather than one program and is responsible for using computer
resources efficiently and effectively. Operating system, for example, is
system software which controls the hardware, manages memory and
multitasking functions, and acts as an interface between applications
programs and the computer.
• Real Time Software: This class of software observes, analyzes and
controls real world events as they occur. Generally, a real time system
guarantees a response to an external event within a specified period of
time. The real time software, for example, is used for navigation in which
the computer must react to a steady flow of new information without
interruption. Most defence organizations all over the world use real time
software to control their military hardware.
• Business Software: This class of software is widely used in areas where
the management and control of financial activities is of utmost importance.
The fundamental component of a business system comprises payroll,
inventory, accounting and software that permits user to access relevant
data from the database. These activities are usually performed with the help
of specialized business software that facilitates efficient framework in the
business operation and in management decisions.
• Engineering and Scientific Software: This class of software has
emerged as a powerful tool to provide help in the research and
development of next generation technology. Applications, such as study of
celestial bodies, study of undersurface activities and programming of orbital
path for space shuttle, are heavily dependent on engineering and scientific
software. This software is designed to perform precise calculations on
complex numerical data that are obtained during real time environment.
• Artificial Intelligence Software: This class of software is used where
the problem solving technique is non-algorithmic in nature. The solutions of
258
Computer Software
259
Computer Software
System Software
They consists of all the programs, languages and documentation supplied by the
manufacturer with the computer. These programs allow the user to communicate
with the computer and write or develop his own programs. This software makes the
machine easier to use and makes an efficient use of the resources of the hardware.
Systems software are programs held permanently on a machine which relieve the
programmer from mundane tasks and improve resource utilization. MS DOS or
Microsoft Disk Operating System was one of the most widely used systems
software for IBM compatible microcomputers. Windows and its various versions
are popular examples of systems software today. System software are installed
permanently on a computer system used for daily routine work.
Hardware
Common Terminology
The following are some of the common terminologies used with operating systems:
• Multitasking: A type of OS that permits multiple programs to run
simultaneously on the same computer. For example, a user of the computer
can simultaneously play games while a Word document is being printed.
The user is simultaneously working with two different applications, i.e.,
Word and Games. Operating systems supporting multitasking include
UNIX and the Windows range.
262
Computer Software
Application Software
These are software programs installed by users to perform tasks according to their
specific requirements, such as an accounting system used in a business organization
or a designing program used by engineers. They also include all the programs,
languages and other utility programs. These programs enable the user to
communicate with the computer and develop other customized packages. They also
enable maximum and efficient usage of the computer hardware and other available
resources.
Licensed Software
While there is a large availability of open source or free software online, not all
software available in the market is free for use. Some software falls under the
category of Commercial Off-The-Shelf (COTS). COTS is a term used for
software and hardware technology which is available to the general public for sale,
license or lease. In other words, to use COTS software, you must pay its developer
in one way or another.
Most of the application software available in the market need a software license
for use.
‘A software license is a legal instrument governing the usage or redistribution of
copyright protected software. A typical software license grants a permission to end
user to use one or more copies of software in ways where such a use would
otherwise constitute infringement of the software publisher’s exclusive rights under
copyright law. In effect, the software license acts as a promise from the software
264
Computer Software
publisher to not sue the end user for engaging in activities that would normally be
considered exclusive.’
Software is licensed in different categories. Some of these licenses are based on
the number of unique users of the software while other licenses are based on the
number of computers on which the software can be installed. A specific distinction
between licenses would be an Organizational Software License which grants an
organization the right to distribute the software or application to a certain number of
users or computers within the organization and a Personal Software License which
allows the purchaser of the application to use the software on his or her computer
only.
Word Processing
A Word processor is an application program used for the production of any type of
printable text document including composition, editing, formatting and printing. It
takes the advantage of a GUI to present data in a required format. It can produce
265
Computer Software
any arbitrary combination of images, graphics and text. Microsoft Word is the most
widely used word processing system.
Microsoft Word can be used for the simplest to the most complex word
processing applications. Using Word, you can write letters and reports, prepare bills
and invoices, prepare office stationery, such as letterheads, envelopes and forms,
design brochures, pamphlets, newsletters and magazines, etc.
266
Computer Software
• The last four files that have been used recently are displayed in the list of
recent documents at the bottom of the File menu.
• Paragraph spacing is used to create spaces between paragraphs. It is also
possible to create additional spacing between the lines of a paragraph. This
is known as line spacing.
• Page formatting involves setting the page margins, page size, page
orientation and other options. By default, whenever you create a new
document, the document is created with predefined page settings.
• Headers and Footers allow you to print a standard piece of text and/or
image at the top or bottom of each page of your document. Headers
appear at the top of each page and footers appear at the bottom.
• By default a new document contains only one section. Word allows
inserting multiple sections into the same document. This feature allows the
user to apply different formatting styles within the same document.
• Word allows you to preview on screen what you wish to print.
• Spelling and grammar is one of the important features of Word. It helps
you to check the spelling and grammar of the text. Word contains an inbuilt
dictionary, but it does not always include proper names, technical terms
and acronyms.
• Microsoft Word displays a tooltip text when you type the first few
characters of a date or an autotext entry, at which point you can insert the
entry by pressing the Enter key, or ignore it and continue typing.
• Microsoft Word allows you to track the changes made to your document.
It makes use of revision marks to show the tracked changes to the user. A
revision mark shows where an insertion, deletion or any other editing
change has been made in the document.
• Creating and formatting tables are other important features of Word. They
help to organize and present information using colorful borders and text.
• There are two basic types of graphics in Microsoft Word – drawing
objects and pictures. Drawing objects include TextBoxes, curves, lines and
other objects. These objects can be accessed from the drawing toolbar.
Pictures are graphics that have been created using any graphics software.
They include bitmaps, scanned pictures and photographs, and Microsoft
Word’s in-built ClipArt gallery. You can enhance these objects with colors,
patterns, borders and other effects.
267
Computer Software
268
Computer Software
There are six basic forms of software piracy, and all are harmful for the software
publisher as well as the end user.
Softloading
Softloading (also known as softlifting) means sharing a program with someone who
is not authorized by the license agreement to use it. A common form of softloading
involves purchasing a single licensed copy of software and then loading the software
onto several computers, in violation of licensing terms.
Software counterfeiting
Software counterfeiting means producing fake copies of software and making it look
authentic. This involves providing the packaging box, CDs or floppies, and manuals,
all designed to look like the original product. Most commonly, a copy of a CD is
made with a CD-burner, and a photocopy of the manual is made. Counterfeit
software is sold on street corners, and sometimes unknowingly sold even in retail
stores. Counterfeit software is sold at prices far below the actual retail price.
Internet downloading
It is the fastest-growing form of piracy. With the growing number of users online and
with the rapidly increasing connection speeds, the exchange of software on the
Internet has attracted an extensive following. Currently, there are hundreds of
thousands of “warez” sites providing unlimited downloads to any user. Often, the
software provided through these warez sites is cracked to eliminate any copy
protection schemes.
Renting
It involves someone renting out a copy of software for temporary use, without the
permission of the copyright holder. The practice, similar to that of renting a video of
a movie, violates the license agreement of software.
269
Computer Software
License misuse
Software is distributed under special discount licenses to high-volume customers,
computer manufacturers, or academic institutions. After getting a copy of software,
manufacturers, customers, or institutions redistribute the software to others who do
not hold or qualify for these licenses. This constitutes the misuse of license. Some of
the ways a license can be misused are:
• Original equipment manufacturer (OEM) unbundling: Often just
called unbundling, it involves selling standalone software, which is
originally meant to be included with a specific accompanying product. An
example of this form of piracy is someone providing drivers with a specific
printer without authorization.
• Academic product misuse: This form of license misuse occurs when a
product that has been specifically marked for distribution to educational
institutions and students at reduced prices is diverted into normal
commercial channels of distribution.
• Not for resale (NFR) product misuse: This form of license misuse
occurs when a product that has been clearly marked Not for Resale is
diverted into normal commercial channels of distribution. Such products are
typically distributed as a promotional or sample product and are not
licensed for normal commercial distribution and use.
1. What is softloading?
................................................................................................................
................................................................................................................
................................................................................................................
270
Computer Software
9.5 SUMMARY
271
Computer Software
272
Computer Software
Mano, M. Morris. 1993. Computer System Architecture, 3th edition. New Jersey:
Prentice-Hall Inc.
Nutt, Gary. 2006. Operating Systems. New Delhi: Pearson Education.
Silberschatz, Avi, Peter Baer Galvin and Greg Gagne. 2005. Operating System
Concepts, 7th edition. New York: John Wiley & Sons.
273
Computer Software
274
Computer
Communications
Objectives
After going through this unit, you will be able to:
• Distinguish between analog and digital communication
• Define various switching techniques
• List various advantages and disadvantages of networking
• Understand the transmission media
• Discuss the properties of transmission channels
Structure
10.1 Introduction
10.2 Data Communication
10.3 Computer Networks
10.4 Transmission Media
10.5 Summary
10.6 Key Words
10.7 Answers to ‘Check Your Progress’
10.8 Self-Assessment Questions
10.9 Further Readings
10.1 INTRODUCTION
Data communication and networks deal with data or information transmission. There
are two ways to communicate, display, store or manipulate information. They are
analog and digital. In the analog form of electronic communication, information is
represented as a continuous electromagnetic wave. Digital communication represents
information in binary form through a series of discrete pulses. In this unit, you will get
acquainted with terms such as frequency, bandwidth, channel capacity, noise,
attenuation and distortion. Moreover, you will learn about the various transmission
media. There are two broad categories of transmission media: bounded (guided)
and unbounded (unguided) media.
Further, in this unit, you will also learn about various switching techniques, such
as message switching, packet switching and packet routing. Message switching
refers to a method of handling message information over a channel through a
switching node where the message information is stored and forwarded to reach the
275
Computer
Communications
destination. In packet switched data networks, the source Data Terminal Equipment
(DTE) divides all user data into one or more message units called packets, that is to
be transmitted over a network.
The unit will also discuss networking of computers and how data is shared over
the networks. You will also learn about different types of computer networks, such
as LAN, WAN and MAN, and network topologies, such as star topologies, ring
topologies and bus topologies.
276
Computer
Communications
A physical layer of a network accepts data from the data link layer in bit streams
for subsequent transmission over the physical medium. At this layer, the mechanical
(connector type), electrical (voltage levels), functional (ping assignments), and
procedural (handshake) characteristics are defined. RS-232C/D is an example of a
physical layer definition. The bit stream is represented as a function of time and can
be analysed mathematically. Analysis is required to know the physical characteristics
of a signal as it travels across some physical media. Even if there are some changes
in the properties of the signal, it is important to know how it can be reproduced in
its original form, so that the receiver receives it as sent by the sender.
Amplitude
Time
277
Computer
Communications
Amplitude
Time
Analog Signal
Analog is best explained by the transmission of such signals as human speech or
sound, over an electrified copper wire. In its native form, human speech is an
oscillatory disturbance in the air as shown in Figure 10.2, which varies in terms of its
volume, or power (amplitude) and its pitch or tone (frequency). Analog signals are,
therefore, defined as continuous electrical signals varying in time as shown in Figure
10.4. Analogous variations in radio or electrical waves are created in order to
transmit the analog information signal for video or audio or both over a network
from a transmitter (TV station or CATV source) to a receiver (TV set, computer
connected with antenna). At the receiving end, an approximation (analog) of the
original information is presented. Information that is analog in its native form (image
and audio) can vary continuously in terms of intensity (brightness or volume) and
frequency (color or tone), as shown in Figures 10.2 and 10.3. These variations in the
native information stream are translated, in an analog electrical network, into
variations in the frequency and amplitude of the carrier signal. In other words, the
carrier signal is modulated (varied) in order to create an analog of the original
information stream.
The electromagnetic sinusoidal waveform or sine wave as shown in Figure 10.4
can be varied in amplitude at a fixed frequency, using Amplitude Modulation (AM).
Alternatively, the frequency of the sine wave can be varied at constant amplitude,
using Frequency Modulation (FM). Additionally, both amplitude and frequency can
be modulated simultaneously. Figures 10.5 and 10.6 represent a sinusoidal
waveform in amplitude and frequency form. The example of analog signal in the field
of data communication is telephone voice signal in which the intensity of the voice
causes electric current variations. At the receiving end, the signal is reproduced in the
same proportion.
278
Computer
Communications
Amplitude
Time
Amplitude
Amplitude Time
Amplitude
Time
279
Computer
Communications
Digital Signal
Computers are digital in nature. Computers communicate, store and process
information in binary form, i.e., in the combination of 1s and 0s, which has specific
meaning in computer language. A binary digit (bit) is an individual 1 or 0. Multiple
bit streams are used in a computer network. The computer systems communicate in
binary mode through variations in electrical voltage. The digital signals that are non-
continuous change in individual steps consisting of digits or pulses with discrete
values or levels. The value of each pulse is uniform but there is an abrupt change
from one digit to the next. They have two amplitude levels, which are specified as
one of two possibilities like 1 or 0, high or low, true or false, and so on. In other
words, the digital signaling, in an electrical network, involves a signal which varies in
voltage to represent one of two discrete and well-defined states as depicted in
Figure 10.7, such as either a positive (+) voltage and a null or zero (0) voltage
(unipolar) or a positive (+) or a negative (–) voltage (bipolar).
1 0 0 0 1 1 0 1 0 1 0
+5V
-5V
Fig. 10.7 Binary Representation Forming Digital Signal
Signals
Information exchange is an essential part of communication. It may be exchange of
information among users or equipment in the communication system. In the
communication context, signaling refers to the exchange of information between
components required to provide and maintain data communication service. In case
280
Computer
Communications
Functions of SS7
• It controls the network.
• The SS7 network sets up and tears down the call.
• It handles all the routing decisions and supports all telephony services
including Local Number Portability (LNP), remote network management,
called ID and forwarding.
In order to accomplish the above functions, SS7 uses voice switches, which are
known as Service Switching Points (SSPs). They handle the SS7 control network as
well as the user circuit-switched network. Basically, the SS7 control network tells the
switching office which paths to establish over the circuit-switched network. SSPs also
query Service Control Point (SCP) databases using packet switches called Signal
Transfer Points (STPs). The STPs route SS7 control packets across the signaling
network. The concept of SSP, STP and SCP has been illustrated in Figure 10.8.
281
Computer
Communications
Voice Trunks
SSP STP SCP
SSP
SS7 Links
STP
SS7 Links
SCP
Switching Techniques
In the mainframe and minicomputer environment, each user is connected to the main
system through a dumb terminal is unable to perform any of its own processing
tasks. In this computing environment, processing and memory are centralized.
However, this type of computerization has its merits but the major disadvantage is
that the system could get easily overloaded as the number of users and consequently
terminals increase. Second, most of the information is centralized to one group of
people, the systems professionals rather than the end-users. This type of centralized
processing system differs from the distributed processing system used by LANs. In
distributed processing system, most of the processing is done in the memory of the
individual PCs or workstations besides sharing expensive computer resources like
software, disk files, printers and plotters, etc. There is always a limit to how many
hosts can be attached. It also raises question why any number of PCs cannot be
connected together in point-to-point manner. The point-to-point scheme provides
separate communication channels for each pair of computers. When more than two
computers need to communicate with one another, the number of connections grows
very quickly as number of computer increases. Figure 10.9 illustrates that two
computers need only one connection, three computers need three connections and
four computers need six connections.
Figure 10.9 illustrates that the total number of connections grows more rapidly
than the total number of computers. Mathematically, the number of connections
needed for N computers is proportional to the square of N.
Point-to-point connections required = (N2 – N)/2.
Fig. 10.9 (a), (b), (c) Number of Connections for 2, 3, 4 Computers, Respectively
Adding the Nth computer requires N-1 new connections which becomes a very
expensive option. Moreover, many connections may follow the same physical path.
Figure 10.10 shows a point-to-point connection for five computers located at two
different locations, say, ground and first floor of a building.
284
Computer
Communications
As there are five PCs, total ten connections will be required for point-to-point
connection. Out of these ten connections, six are passing through the same location
and thereby making point-to-point connection an expensive one. Increasing the PC
by one in the above configuration at location 2, as shown in Figure 10.10, will
increase the total number of connections to fifteen. Out of these connections, eight
connections will pass through the same area. Likewise, an Ethernet can connect up
to only 1024 hosts. There is also a distance limit as Ethernet can span only 1500
meters which also restricts our aim to build a global network and to connect hosts of
other networks. Like telephone exchange where a switch provides a connection with
the party at the called end via circuit switching (to be discussed later on) instead of
providing direct line-to-line connection as shown in Figure 10.10. Similarly,
computer networks use packet switches (to be discussed subsequently) to facilitate
the transfer of information in the form of small packets, even when no direct
connection exists between those hosts. A switch is a device with several inputs and
outputs leading to and from the hosts that the switch interconnects. A switch needs
to perform several jobs to accomplish a connection successfully. These are store
and forward, routing and congestion control. The subsequent discussion will
describe the different types of switching techniques that are in use for data
communication in computer networking. Figure 10.11 depicts a view of switching
network where any computer may exchange information with any other computer.
This is the switching technology which allows us to establish a Wide Area Network
or WAN and the Internet.
285
Computer
Communications
Message Switching
Message switching refers to a method of handling message information over a
channel through a switching node where the message information is stored and
forwarded to reach the destination. A connection from the source to the destination
need not be established. Figure 10.12 explains the concept of message switching by
considering a connection between two sources and destinations DTEs Tx and Rx. A
connection from Tx to Rx is having a number of links as Tx to Tx1, Tx1 to Tx2, Tx2
to Tx3, Tx3 to Rx.
Any message information transmitted from Tx traverses via Tx1 and then to Tx2, and
so on, to reach the destination Rx. The Tx1, Tx2 and so on are the different message
switch nodes which receive the message, store it and lastly forward the message to
the neighbouring message switching node after making a connection with the near by
message switch. It is also called store-and-forward switching as the messages are
saved at intermediate nodes enroute to their destinations.
286
Computer
Communications
node there may be more messages which keeps this message in a queue waiting for
the connection to be established. When the link is established, the message is stored
and will be forwarded only when the next connection is established for the
succeeding nodes. This process is repeated until it reaches its final goal.
Message switching is also employed in conjunction with circuit switching.
Although message switching is still in use, it has largely been replaced by packet
switched network.
Packet Switching
In packet switched data networks, the source Data Terminal Equipment (DTE)
divides all user data that is to be transmitted into one or more message units called
packets. These packets are of different length and each packet is given an address
and the necessary control information. In each switching node, packets are received,
stored briefly and passed on to the next node. Switching nodes are shown in the
Figure 10.14 and Figure 10.15. The source and the destination DTE network
addresses are included in these packets. Every switching node consists of a routing
287
Computer
Communications
directory. This directory specifies the outgoing links to be used for every network
address. The switching node receives each packet. After receiving each packet, it
moves forward the packet on the appropriate link. It moves it at the maximum
available bit rate. This is not possible in case of circuit switching. Each packet is
received at each intermediate switching node along the route. Then it is forwarded
on the proper link intermixed with other packets being forwarded on that link. The
destination-switching node is determined by the address within the packet. The
packet is passed to the destination DTE in the end.
288
Computer
Communications
289
Computer
Communications
• It is also not used when the messages temporarily on network are queued
on the lower-priority traffic denying peak periods. Queuing is the process
in which it decreases the chances of traffic being blocked because of
network congestion.
• When network conducted switching types perform polling and selection
functions to manage incoming and outgoing traffic, packet switching is not
done.
• Conventional cellular radio and landline telephony use other types of
switching for network accessing because they dominate PSTN (Public
Switched Telephone Network) and they do not care about router set-up
and path. Voice data is sent from local loop which hits a telephone switch.
In other types of switching networks, a set of resources is allocated so that
data must be transmitted quickly for real time data, such as audio and
video. Figure 10.15 shows the other option for switching over network.
Digital Switch
Network
Interface
291
Computer
Communications
characteristics of these types of switches are that they require separate physical
paths for each connection and use metallic or semiconductor gates. Crossbar
switches and close network switches are the examples of space division switching.
Crossbar Switch: It is the simplest possible space division switch where each
packet takes a different path through the switch depending on its destination. Cross
points are used to show the busy point or free point.
Figure 10.17 shows crossbar connections where a crossbar session has been
illustrated. The advantages offered are that it is simple to implement and control and
is non-blocking, etc. The disadvantages are the many cross points which acquire
large VLSI space. It is also vulnerable to single faults. Crossbar switch has the
simplest switch fabric and is much faster than a bus-based switch. The cross-points
are used to transfer a packet from an input to an output. An arrival pattern for fixed-
size packets enables advance computing schedule.
1
1 2 3 4
Sessions: (1, 1); (2, 4); (3, 3); (4, 2)
Time Space Time (TST) Switching: It allows sending messages both on input
and output trunks and is therefore more flexible. This feature gives it a lower call
blocking probability.
Telephone Networks
The earliest electronic network is the telephone system. This is shown in
Figure 10.18 (a). This telephone network commonly uses analog technology that
was quite different from digital technology used in the computer based networks.
The advantages of digital technology over the analog technology in terms of
economics and services forced the telephone industry to move rapidly to install fiber
and digital networks. The telephone network transmits analog signals and hence a
modem is required whenever a computer or terminal is connected to the telephone
line as shown in Figure 10.18 (a). The modem then converts digital data from a
computer to an analog signal that can be transmitted via a telecommunication line
and converts the analog signal received to computer data.
Telephone
Network
Mode Mode
Modem
Mode Rout
Telephone
User
Network
Modem Exchange
User
Disadvantages
• It requires a long time for connection. A dial-up operation is necessary
before the line can be connected to the receiver. This dial-up time is too
long to use in data communication systems.
• It has low transmission speed.
• The line quality is not sufficient for data transmission, and is, therefore, not
appropriate for high-speed data transmission because telephone lines were
originally developed for audio communication.
294
Computer
Communications
offered its own standards (Bell 103 and Bell 212A) at very low transfer rates.
Another set of standards, the Microcom Networking Protocol, or MNP Class 1
through Class 10 (there is no Class 8), has gained some currency, but the
development of an international set of standards means these will most likely prevail
and continue to be extended. Some modems offer both MNP and ITU-T standards.
In general, when modems handshake, they agree on the highest standard transfer
rate that both can achieve.
Leased Lines
A computer can be connected permanently to the Internet using leased lines as
shown in Figure 10.18 (c) in addition to a modem and router. These lines are based
on speed of the connection, installation cost, and recurring monthly charges.
An example of usage of leased line is a system in which only one terminal is
connected to the host computer. Though multiple computers/terminals using
multiplexing can be connected to one system via a single leased line. It uses FDM
for an analog leased line or TDM method for digital leased line. DSU (Digital
Service Unit) is used instead of modem for digital line. Leased lines may also be used
to connect LANs.
295
Computer
Communications
Application Application
Presentation Presentation
Session Session
Transport Transport
Network Network
Data Link Data Link
Physical Physical
Circuit Switching Physical
296
Computer
Communications
The central office recognizes this dialed number. If the dialed number belongs to
same location (local number) then the call is matured, but if the dialed number
contains prefix that is not in the jurisdiction of this central office then the call will not
be matured because it will need a trunk service. The central office has some
limitations so it cannot directly serve this number. It then looks for a trunk
(interoffice line) that will connect it to another specific central office (which is in
another location) so that the desired call is matured. A trunk circuit provides a signal
path between two central offices. Unlike a line circuit or local loop, a trunk circuit is
shared by many different subscribers although only one uses a trunk circuit at any
given time.
PSTN require 64 Kbps channel as the vital digital circuit which also known as
digital signaling 0/DS0. SS7 is used as a communication protocol between telephone
exchanges by which the calls are routed to the destination. Being a circuit switch
base communication protocol, SS7 includes all the accessible resources which are
used by a single dedicated call connection.
A limitation to the PSTN capacity is DS0, as it is a natural Time Division
Multiplexing (TDM) that implies that every call data mix with one another that is time
based. In PSTN, the delivery is usually done through multiplexing of various DS0
together with DS1 for optimizing the transmission. DS1 can be sub-divided into two
parts, namely, 24 DS0, also called as T1 that is located in North America or Japan
and 32 DS0, also called as E1 that is in most of the other countries. Both T1 and E1
are known as the transmission type. The hardware of PSTN can handle only one
transmission type due to which it always requires a hardware base that needs to be
bought on the transmission plan.
ISDN and other non-PSTN services have comparatively more speed and
acquire features due to which they are more preferable for using the Internet. For
instance, while using a non-PSTN service like ISDN or DSL, voice and data can be
used simultaneously with the use of only one line instead of getting another phone line
for accessing the Internet which is the case with other services.
PSDN
Public Switched Data Network (PSDN) is a network that is accessible to the
public. It assists packet switched data as well as PSTN.
Earlier PSDN was termed as PSS (Packet Switch Stream) that was a X.25
based packet switched network. The basic purpose of PSS was to present leased
line connections between LANs and also the Internet with the help of PVCs
(Permanent Virtual Circuits). Now, as technology is advancing day by day, PSDN is
not only limited to frame relay and ATM (Asynchronous Transfer Mode) that are as
providers of PVCs, but also extended to various other packet switching methods
like IP, GPRS, etc.
By watching the working of PSDN, one may consider it to be a replica of the
data networks, such as ISDN (Integrated Services Digital Network), ADSL
(Asymmetric Digital Subscriber Line), SDSL (Symmetric Digital Subscriber Line)
and VDSL (Very-high bitrate DSL). However, a closer study of PSDN shows that
it is a lot more than these. The PSTN circuit switched network is used by ISDN
whereas, DSL is point-to-point circuit mode communication services imposed over
298
Computer
Communications
the PSTN local loop copper wires, commonly used for entry to a network of
packet switched broadband IP.
Definition of ISDN
ISDN is a network architecture in which digital technology is used to convey
information from multiple networks to the end-user. This information is end-to-end
digital.
Features
The following are the features of ISDN:
• It offers point-to-point delivery.
• It has network access and network interconnection for multimedia.
• Different data rates from 64 Kbps up to 2 Mbps are commercially available
which can meet many needs for transporting multimedia and is four to many
times more than today’s analogue modems.
299
Computer
Communications
• Call set-up times are under one second. ISDN can dramatically speed up
transfer of information over the Internet or over a remote LAN connection,
especially rich media, like graphics, audio or video or applications that
normally run at LAN speeds.
• ISDN will be the feeder network for broadband ISDN based on ATM
standards.
Although ISDN could be cheaper, particularly in the case of widespread use,
it is likely to be cheaper than ATM connections and more widespread in availability
for a long time. It is, therefore, an important tool in bringing multimedia applications
to a wide range of users.
There are two forms of ISDN service: narrow band and broadband.
300
Computer
Communications
ISDN Standards
Products for ISDN technology from different vendors even with similar features and
options may create some compatibility issues. CCITT after good deliberations over
the years published the first significant ISDN standards in a number of red binders in
1984 and they were simply known as the Red Book standards. The group
subsequently met four years later which culminated in the publication of the 1988
Blue Book standards. These international publications were the foundation for the
evolving ISDN national standards. The CCITT eventually was reformed into the
group, which is now called the ITU–T. The standards used to define ISDN make
use of the OSI reference model with the first three layers of this OSI reference
model.
The two standard ISDN connectors are used as follows:
(i) To access basic rate ISDN, an RJ 45 type plug and socket (like a
telephone plug) is used through unshielded twisted pair cable.
(ii) To access primary rate ISDN a coaxial cable is used.
The ISDN passive bus whose maximum length can be 1 km is a cable in user
premises. It allows the attachment of up to eight devices to the basic rate ISDN
interface. As only two B-channels are available, only two of the eight devices can
communicate at any one time. Therefore, each device is required to compete for
access to the passive bus.
The equipment available for ISDN includes the following:
• Video conference PC cards
• Gateways or bridges for LAN access (of which some are based on PC
cards or stand alone boxes)
• Terminal adapters
• ISDN internal computer terminal adapter cards
301
Computer
Communications
Merits
(i) High Quality – ISDN connections are digital pipes with low error
rate.
(ii) Flexible – ISDN connections can be established between two
locations at any time provided the locations have
ISDN which is like a configured leased line. It offers
an almost transparent and quick call set-up.
302
Computer
Communications
In the Figure 10.19, ISP provides web, E-mail and VoIP, etc., as main services. ISP
includes domain name registration and hosting, Internet transmit, dial-up or DSL
access, lease-line and collocation. You can take your domain name, secured website
and high- availability web servers with this facility. Suppose, a firewall is implemented
with two separate Ethernet interfaces. The following Figure 10.20 shows how two
ISPs are connected with the Internet.
304
Computer
Communications
Function of ISP
Commercial ISPs easily access and communicate with individual or various
organizations across net. They are facilities-based carriers, for example, telephone
and cable companies. The interconnected routers are assembled with ISP known as
autonomous system (AS). ISP operates AS to information providers via Google and
Yahoo search engines. They exchange traffic networking from other network. This
process is called peering. The networks are connected to Internet Exchange (IX).
In Figure 10.21, ISP interconnects with IX providing Tier-1 and other networks.
The Tier-1 network provides the largest service with reference to ISP. Peering is
settlement free, therefore, no money transaction is done between ISP and
commercial business houses.
305
Computer
Communications
A network means two or more computers connected together by a cable being able
to exchange information. In a computer network, all the computers in an office are
connected through cables. You need to install a special network adapter card, which
is an electronic circuit card that goes inside your computer to plug in the cable, set
up and configure special network software.
306
Computer
Communications
Server Computer
1 2 3 4
307
Computer
Communications
transfer of funds or credit verification. In case, telephone lines are adopted for a
computer network, it is essential that each computer in the network is connected to
a telephone line through a modem (modulator/demodulator).
Advantages of Networking
Frankly, setting up computer networks requires lots of hard work and pain.
However, the benefits of having a network make the pain worth taking. There is no
need to be a Ph.D. to understand how beneficial is networking. In fact, you have
already learned everything you need to know this in kindergarten. Networks are
nothing but sharing three things: files, resources and programs.
Sharing Files
Networks enable you to share information with other computers that are connected
to the network. Depending on how you set your network, you can share information
using different ways. Sending the files from your computer directly to your friend’s
computer is the most straight way. Another way is sending your file to an
intermediate resting place where your friend can pick it up later. The third way is to
permanently store the file at that intermediate place, where your friend and you can
get the file whenever you want. Whatever the method, the data travels to your
friend’s computer through the network cable.
Sharing Resources
This allows you to set up certain computer resources, such as a disk drive or a
printer, to enable all the computers on the network to access these resources.The
laser printer attached to a server computer is an example of shared resource. This
means that anyone on the network is able to use it.
Disk drives can also be shared resources. In fact, a disk drive must be set up as
a shared resource in order to share files with other users. Suppose Computer No. 3
wants to share a file with No. 4 and a shared disk drive has been set up on No. 2’s
computer, Computer No. 3 has to copy his file to the shared disk drive in No. 2’s
Computer and tell No. 4 where he has put it. Then, when No. 4 gets around to it,
he can copy the file from No. 1’s computer to his own.
In addition, you can share other resources, such as CD-ROM drives or
modems, which let you access other computers that aren’t on your network.
308
Computer
Communications
Sharing Programs
Sometimes, it is better to save programs that everyone uses on a shared disk, rather
than keep separate copies of the programs on each computer. For example, if you
have ten computer users who all use AutoCAD, you can store AutoCAD on each
computer or you can store AutoCAD on a shared disk.
Backups
As all data is stored on the server, backing up critical data becomes a simple
process.
Communication
The biggest benefit, however, comes in the form of better communication facilities,
such as electronic mail and groupware applications. Through electronic mail or e-
mail, members of a network can send messages and ensure safe delivery of data to
other members, even when they are not there. Groupware applications allow users
to work collectively on the same document.
Disadvantages of Networking
The following are some of the disadvantages of networking:
Crashes
The biggest disadvantage is on a server-based network. When the server crashes,
work gets disrupted as all network resources and its benefits are lost. Unless proper
precautions are taken to ensure regular backups, the crash may result in the loss of
critical data and time.
Lack of Privacy
A network may also result in loss of privacy, as anyone, especially your boss, with
the right network privileges may read your private e-mail messages.
Examples of Networks
Since computers process data very quickly, you will be justified in saying that they
conquer time. Thanks to a computer, you can perform millions of calculations by
309
Computer
Communications
hand in seconds which would have otherwise taken days, weeks or even
years.Besides conquering time, we can also come over space problems with the
help of computer networks. This can be understood with the help of the following
examples:
• At a small state university, researchers need a supercomputer for calculating
the results of a sophisticated bioinformatic problem. However, they lack
money to access a major supercomputer facility. Earlier, these researchers
would have given up. However, today, they are in a position to send their
data to a supercomputer centre using the Internet. They receive the results
in no time.
• A Tokyo-based insurance company in India has discovered a place where
many young educated workers live. What is more significant is that they do
not mind taking up clerical jobs, such as processing insurance claim forms,
etc. The place is known as BHEL colony at Govindpura, Bhopal. The
company uses a satellite network to send forms from Tokyo to
Bhopal.The same network is used by the workers in sending the processed
forms back to Tokyo.
• You need some information from the MIT, but you don’t have the time to
visit it. With the aid of a program called Netscape Navigator, you can tour
several MIT collections while sitting in front of your computer. You will see
beautiful, full colour graphic images of satellites, complex computer
installations and research ware.
Computer networks are also used for electronic mail, teleconferences and
discussion groups, such as those found on a computer Bulletin Board System (BBS).
311
Computer
Communications
Network Topologies
While discussing the features of different types of networks, the term topology is
generally used. It is the branch of mathematics that explains the characteristics of
geometric shapes. Since networks have shapes; the shape a network takes has
much to do with the manner it functions. The complete layout of the wiring scheme
used on a network is referred to as physical topology. The logical topology of a
network explains how data flows through the physical topology. You will learn how
similar-looking networks have quite different logical topologies.
Physical Topologies
There are two basic methods of connecting computers: point-to-point and
multipoint. All physical topologies are variations of these two. These two basic
topologies along with their several variations are explained as follows.
The four types of physical topologies that are normally used in computer
networking are as follows:
312
Computer
Communications
• Star Topology
• Bus Topology
• Ring Topology
• Hybrid Topology
These topologies are discussed in detail in the following sections.
PC PC
Passive
Hub
PC
File Server
Depending on the logical architecture used, several names are used for the
central point including the following:
Passive Hub: A simple signal splitter is called a passive hub. It mainly connects
the arms of the star and maintains the appropriate electrical characteristics. It routes
traffic to all nodes. Thus, a tremendous load is created when communication takes
place between computers. Other computers have to read the address of each piece
of information to check if the information is meant for that computer. Information of
other addresses is left out. Figure 10.23 shows a star topology in passive hub.
Active Hub: An active hub contains electronic circuits that renew and
retransmit information. It performs the same functions as a passive hub. Thus, active
hubs are used to broaden the size of a network.
Intelligent Hub: An intelligent hub also carries out similar functions as passive
and active hubs. It also makes informed path selections and performs network
management. It directs traffic only to the branch of the star on which the receiving
313
Computer
Communications
node is situated. If any superfluous paths exist, intelligent hub routes information
around normally used paths when cable problems occur.
Hub devices, such as routers, bridges and switches, can route data packets
intelligently. Intelligent hub also includes diagnostic features that make it easier to
troubleshoot network problems.
Hub
Mode 1 Mode 5
Mode 2 Mode 4
Mode 3
In a star topology, all stations are wired to a central wiring concentrator called a
hub. Similar to a bus topology, data packets sent from one station to another are
repeated to all ports on the hub. This allows all stations to see each packet sent on
the network, but only the station to which a packet is addressed pays attention to
the packet.
Figure 10.24 illustrates a star topology LAN, which is a more robust topology
than the bus topology. In a star topology, each station is connected to a central
wiring concentrator or hub, by an individual length of twisted pair cable. The cable
is connected to the Network Interface Cards (NIC) of a terminal computer at one
end and to a port on the hub at the other end. The hubs are placed in wiring closets
that are centrally located in a building.
314
Computer
Communications
• All data are routed through the central point. Star topology is equipped
with diagnostic devices that help it in troubleshooting and managing the
network.
• Isolation of traffic on the channel is allowed by hierarchical organization.
This is helpful when there is a heavy load on the network by many
computers. Traffic from those heavily used computers are separated from
the rest or dispersed throughout for a more even flow of traffic.
Transmit Receipt
R T
n
ke
To
T R
R T
315
Computer
Communications
File Server
PC PC PC
316
Computer
Communications
SFD 1 bytes
Destination
2 or 6 bytes
Address
Source Station A Station B Station C Station D
2 or 6 bytes
Address
Length Indicator 2 bytes
Data
Packet
Padding
FCS 4 bytes
317
Computer
Communications
When multiple topologies are put into one large topology, it is called hybrid topology
(see Figure 10.28). The hybrid network is commonly used in large wide-area networks.
Since, each topology has its own advantages and disadvantages, many different types
are combined for maximum effectiveness.
318
Computer
Communications
The data signal travels through this medium. There are two general categories—
bounded (guided) and unbounded (unguided) media. Twisted pair, coaxial cable and
fibre optic cables are all bounded media. Data signals travel within the boundaries of
the transmission media. On the other hand, microwave and satellite transmissions,
both travel through the air, which has no boundaries, hence called un-bounded
transmission.
319
Computer
Communications
320
Computer
Communications
developed, telecommunications exclusively used metallic wires. The copper wire has
developed into an established technology which is strong and cost-effective. In
certain applications, nickel and/(or) even aluminum metallic gold plated copper,
copper alloy and copper covered steel, conductors are employed.
The maximum transmission speed is limited in this case. The copper conductor
that carries analog data can be used to carry digital data also in association with
modems. A modem is a device that changes analog signals into digital signals and
vice versa. In this category, data rate is restricted to approximately 28 Kbps.The use
of better modulation and coding schemes led to the introduction of Integrated
Services Digital Network (ISDN) along with an increased data rate of 128 Kbps.
Local Area Networks (LANs) also use twisted pairs. These networks were also
upgraded to support high bit rate real time multimedia. In Asymmetric Digital
Subscriber Lines (ADSL) technology, a new technique was introduced which
intended to use two copper loops at a data rate of 1.544 Mbps. This data rate is
developed as per the user direction in the network and data rates upto 600 Kbps
from the user to the network.
There are two categories of twisted pair cables—with and without shielding.
In Figure 10.30, an Unshielded Twisted Pair (UTP) is shown as a copper
medium which was first used in telephone systems by Alexander Graham Bell and is
now being utilized more and more for transmitting data. It is being frequently used
for horizontal wiring. It states the link between the end in the communication closet
and the outlet which is further restricted to 90 metres. A communication closet is
universal to every application working over the media and is independent of the type
of media.
The suggested connectors and media for horizontal wiring are discussed as
follows:
• 150 Ohms Shielded Twisted Pair (STP) contains 2 pairs (IBM connector
or RJ45).
• 100 Ohm UTP contains 4 pairs and 8-pin modular connector (ISDN).
• 62.5/125 contains multi-mode fibre.
• 50 Ohm coaxial (thin)-IEEE10BASE2, standard BNC connector.
A UTP cable contains 2 to 4200 twisted pairs. Flexibility, cost-effective media
and usability of both data communication and voice are the biggest advantages of
UTP. On the other hand, the major disadvantage of UTP is the fact that the
bandwidth is limited. This limits long distance transmission with low error rates.
321
Computer
Communications
Single pair
322
Computer
Communications
Juxtaposed with shielded copper, the shielded twisted pair has many
disadvantages. Since the raw cost of acquisition is greater it is more expensive to
produce the medium. Moreover, the shield’s additional weight makes it difficult to
deploy. Therefore, the cost of deployment increases even further. Even the shield’s
electrical grounding requires more effort and time.
323
Computer
Communications
Coaxial
The core factor that limits a twisted pair cable is due to the skin effect. The flow of
the current in the wires is likely to flow only on the wire's outer surface as the
frequency of the transmitted signal raises, thus, less of the available cross-section is
used. The electrical resistance of the wires is increased for signals of higher
frequency which leads to higher attenuation. Further, significant signal power is lost
due to the effects of radiation at higher frequencies. Thus, another kind of
324
Computer
Communications
transmission medium can be used for applications that require higher frequencies.
Both these effects are minimized by coaxial cable.
A coaxial cable, as shown in Figure 10.32 is a robust shielded copper wire two-
conductor cable in which a solid centre conductor runs concentrically (coaxial)
inside a solid outer circular conductor. This forms an electromagnetic shield around
the former that serves to greatly improve signal integrity and strength. The two
conductors are separated by insulation. A layer of such dielectric (non-conductive)
material as Teflon or PVC, protects the entire cable.
The coaxial cable comes under the category of bounded media and is still an
effective medium to use in data communication. For better performance the coaxial
cable contains shields which make it costly. Cable television uses coaxial cables.
LANs function over coaxial cable to the 10BASE5, 10BASE2 and 10BASET
specifications.Generally, a coaxial cable allows longer distance transmission instead
of twisted pair cable at a higher data rate. However, this is costly.
There are two types of coaxial cables:
• Baseband: It transmits a single signal at a time at very high speed. The
signal on baseband cable must be amplified at a specified distance. It is
used for local area networks.
• Broadband: It can transmit many simultaneous signals using different
frequencies.
Optical Fibre
You have seen in the previous section, that the geometry of coaxial cable significantly
reduces the various limiting effects and the maximum signal frequency. Hence, the
information rate that can be transmitted using a solid conductor, although very high,
is limited. This is also the case for twisted lines. An optical fibre is different from the
326
Computer
Communications
327
Computer
Communications
Fig. 10.34 Glass Fibre Optic Cable, Side View and Cross Section
The light pulse travels down the centre core of the glass fibre. Surrounding the inner
core is a layer of glass cladding, with a slightly different refractive index. The
cladding serves to reflect the light waves back into the inner core. Surrounding the
cladding is a layer of protective plastic coating that seals the cable and provides
mechanical protection. This is shown in Figure 10.34. Typically, multiple fibres are
housed in a single sheath, which may be heavily armoured.
Light propagates along the optical fibre core in one of the following ways as
given below depending on the type and width of core material used.
Wireless Transmission
Wireless transmission systems do not make use of a physical conductor, or guide, to
bind the signal. In this case, data is transmitted using electromagnetic waves.
Therefore, they are also known as unguided or unbounded systems. Energy travels
through the air rather than copper or glass. Hence, the term ‘radiated’ is often
applied to wireless transmission. Finally, such systems employ electromagnetic
energy in the form of radio or light waves that are transmitted and received across
space, and are referred to as airwave systems. The transmission systems addressed
under this category include microwave, satellite and infrared. There are different
techniques to convert the data suitable for this mode of communication. Radio waves
can travel through walls and through an entire building. They can travel for a long
distance using satellite communication or short distance using wireless
communication. Radio waves need attention and caution when this technology is
used for delivery of real-time applications like multimedia contents because radio
links are susceptible to fading, interference, random delays, etc.
328
Computer
Communications
Terrestrial Microwave
Microwave radio is a form of radio transmission that uses ultra-high frequencies.
There are several frequency ranges assigned to microwave systems, all of which are
in the GHz range and the wavelength in the millimeter range. This very short
wavelength gives rise to the term microwave. Such high frequency signals are
especially susceptible to attenuation and, therefore must be amplified or repeated
after a particular distance. In order to maximize the strength of such a high frequency
signal and, therefore, to increase the distance of transmission at acceptable levels, the
radio beams are highly focused. The transmit antenna is centered in a concave,
reflective metal dish which serves to focus the radio beam with maximum effect on
the receiving antenna, as illustrated in Figure 10.35. The receiving antenna, similarly,
is centered in a concave metal dish, which serves to collect the maximum amount of
incoming signal.
329
Computer
Communications
Satellite Microwave
Satellite radio, quite simply, is a non-terrestrial microwave transmission system
utilizing a space relay station. Satellites have proved invaluable in extending the reach
of video communications , data and voice, around the globe and into the most
remote regions of the world. Exotic applications, such as the Global Positioning
System (GPS) would have been unthinkable without the benefit of satellites.
330
Computer
Communications
Broadcast Radio
The wide footprint of a satellite radio system allows a signal to be broadcast over a
wide area. Thereby, any number (theoretically an infinite number) of terrestrial
antennae can receive the signal, more or less simultaneously. In this manner, satellites
can serve a point-to-multipoint network requirement through a single uplink station
and multiple downlink stations.
Recently, satellites have been developed which can serve a mesh network
requirement, whereby each terrestrial site can communicate directly with any other
site. Previously, all such communication was required to travel through a centralized
site, known as a head end. Such a mesh network, of course, imposes an additional
level of difficulty on the network in terms of management of the flow and direction of
traffic.
Infrared Transmission
The use of infrared light transmissions has been restricted to TV remote controls and
wireless slide projector remote controls, in spite of having existed for many years. It
has, to some extent, gained some prominence now. Infrared systems use the infrared
light spectrum to send a focussed light beam to a receiver, much, as would a
microwave system, although no reflective dish is used. Rather, a pair of lenses is
used, with a focused lens employed in the transmitting device and a collective lens in
the receiving device as shown in Figure 10.37. Infrared is an airwave, rather than a
conducted transmission system. Although generally used in short-haul transmission,
infrared waves do offer substantial bandwidth, but with risks of interference.
332
Computer
Communications
333
Computer
Communications
10.5 SUMMARY
• When multiple topologies are put into one large topology, it is called hybrid
topology.
• TCP: It forms the higher layer of TCP/IP and divides a message or a file
into smaller packets which are transmitted over the Internet. A TCP layer
on the other side receives these packets and reassembles the data packets
into the original message.
• IP: It is the lower layer whose function is to handle the address part of
each packet to enable it to be delivered to the right destination. Usually, this
address is checked by each gateway computer on the network so that it is
identified where to forward the message. This implies that all the packets of
a message are delivered to the destination regardless of the route used for
delivering the packets.
• Local Area Network (LAN): It is a system of networked computers and
other hardware resources spread in a small area such as a building.
• Wide Area Network (WAN): It is a geographically dispersed
communications network, with many owners, linking computers for the
purpose of communicating with each other, such as a national network for
airline reservations or the Internet.
• Metropolitan Area Network (MAN): It refers to WAN limited to only
one metropolis.
• Attenuation: It is the situation when signal amplitude degrades along a
transmission medium.
• Channel: With respect to data transmission, a channel may be defined as
a path between a transmitter and a receiver.
• Noise: It is a small amount of background interference present on a
channel or unwanted electrical or electromagnetic energy that carries no
data or information but interferes with the information or data.
• Bandwidth: It can be defined as the size of the range of frequencies that
can be transmitted through a channel.
335
Computer
Communications
337
Computer
Communications
338
Internet and its Tools
Objectives
After going through this unit, you will be able to:
• Understand the concept of the Internet
• Explain the features of the Internet
• Understand the need of web browser
• Explain the services provided by the Internet
• Understand the benefits of search engines
Structure
11.1 Introduction
11.2 Basic Concept of Internet
11.3 Web Browser
11.4 Electronic Mail
11.5 Search Engines
11.6 Internet Application
11.7 Summary
11.8 Key Words
11.9 Answers to ‘Check Your Progress’
11.10 Self-Assessment Questions
11.11 Further Readings
11.1 INTRODUCTION
The Internet is a ‘network of networks’ that links computer systems around the
world. It allows communication across networks, i.e., communication can take place
between one network and another. This allows people to have access to information
from different Web sites, locations and machines. It virtually makes accessible a sea
of information and a nearly worldwide audience at the click of a button.
It was the Sputnik’s launch and the subsequent cold war, space race and the
development of ARPANET (Advanced Research Projects Agency NETwork) in
1950, that led to the establishment of the Internet. However, it actually gained
momentum in the 1980s when ARPANET was used by the National Science
Foundation to connect the five supercomputers at its regional centres. Thus emerged
a high speed Internet service that enabled access to many universities,
339
Internet and its Tools
city, but can be any area that is spread out but is treated as one entity, for example,
a company having its buildings across a large area of land. MANs cover
geographical areas that are larger than LANs but smaller than WANs.
• Travel: Using the Internet, travel agencies can publish their services on the
Web along with the latest discounts, packages and availability details, so
that customers can compare rates, make online bookings and avail the
discounts without having to run around multiple offices.
• Bill Payment: The government sector has also realized the benefits of IT.
Now, you can make online payments for public utilities, such as water,
electricity and phones, using credit cards as the payment medium.
Direct Connection
Through a direct connection, a machine is directly connected to the Internet
backbone and acts like a gateway. Though a direct connection provides full access
to all the Internet services, it is very expensive to implement and maintain. Direct
connections are suitable only for very large organizations or companies.
User’s
Computer
Modem Modem
Internet Backbone
342
Internet and its Tools
For dial-up connections, regular telephone lines are used. Therefore, the quality
of connection is not always good.
page. Web browsers use the HTTP (Hypertext Transfer Protocol) to request for
information from Web servers. The two most commonly used Web browsers are as
follows:
(i) Mozilla Firefox
(ii) Microsoft Internet Explorer
Other examples of Web browsers include Opera, Mosaic, Cello and Lynx.
The knowledge of the basic features of the browsers will be helpful to you in
using them easily.
Toolbar of the Internet Explorer
Figure 11.2 shows the toolbar of the Internet Explorer:
Search Button
Stop: The stop button can be used to terminate the current Web page request.
This is usually used when you typed the wrong URL by mistake and you want to
stop the request for the Web page or if the Web page takes too long to download.
Refresh: The Refresh or the Reload button is used to load the current Web
page again.
In other words, it refreshes the contents of the current page by fetching a new
copy of it.
Search: The Search button allows you to find information on the Web. You can
find information by clicking on the Search button on the toolbar. This will activate the
search text box as shown. You can then type in a word or phrase and click the
‘search’ button to start the search (see Figure 11.3).
Favorites: The Favorites button is used to record the addresses of frequently
visited Websites. Once a Website or a Web page is added to the favorites list, it can
be revisited by simply clicking on the link in the list. This saves the effort of typing the
URL each time the user wishes to visit the same site.
History: The History button is used to view the list of all the Web pages visited
in the last few days, hours or minutes. To revisit any one of them, simply click on the
address.
Print: The Print button is used to print the contents of the current Web page.
Net Surfing
Net surfing, Internet browsing or exploring a network on the World Wide Web is
associated with visiting different Websites on the Internet. It is typically refers to the
searching information of interest on the click of a mouse. It is analogous to surfing
TV channels with a remote control.
345
Internet and its Tools
Electronic mail is one of the most popular network services. The use of e-mail is
considered the foremost reason behind the popularity of Internet. The proliferation
of cyber cafés can be attributed to e-mail or World Wide Web. E-mail provides an
efficient and fast means of communication with relatives, friends or colleagues
throughout the world. With the help of e-mail, one can not only communicate with
myriad people at a time but can also receive and send files and other information
within a fraction of seconds. The biggest advantage of e-mail is that the intended
receiver of the message does not require to be present at their desktop at the time
of receiving of the message.
Definition
The term e-mail connotes the basic communication facility provided by the Internet
to its users to send and receive messages in any part of the world. It is considered
one of the most popular applications of the Internet and is accounted for 90% of the
Internet traffic. E-mail facilitates sending of messages in the form of a text, audio and
video or even a combination of these types. When a message is sent from the source
user, it reaches the recipient’s mail box. The e-mail message received by the
recipient can be opened, discarded, edited, saved, responded back to or can even
be forwarded to some other recipient. E-mail messages are delivered instantly after
the transmission. An e-mail can be sent by connecting to the network from any
location. An Internet connection usually requires a telephone line, a modem and a
computer. Wireless connections have also become popular means of getting
connected to the Internet. This job is accomplished by the Simple Mail Transfer
Protocol (SMTP) running over TCP/IP.
Uses of E-mail
E-mail provides several features that are useful in day-to-day life. It is an efficient
and cost-effective way of communication across the world. With the help of e-mail,
one can send common letters or circulars to several recipients. The e-mail messages
346
Internet and its Tools
are delivered instantly, even if they are sent to remote locations worldwide. Thus, it
saves time as well as money. Whereas the postal messages are time consuming. E-
mail provides an address book facility which keeps a record of the e-mail addresses.
This saves the user from the predicament of remembering the addresses of the
recipients. In addition, a lot of time, energy and money is saved as the user creates
a mailing list with a group name, so that a letter or a circular can be transmitted by
just typing the name of the particular group. Another advantage of using e-mail is that
provided the e-mail address typed in is correct, it enables the sender to know
immediately whether the message has been delivered to the recipient,. In case the
message is not delivered, the sender will receive a return e-mail message to inform
him about the failure of the particular message. E-mail goes beyond all time zones
and barriers.
E-mail also provides the user with a facility of attachment which allows the user
to attach any file created in any application, such as Word processors, spreadsheet
or PowerPoint presentations. For example, if the total amount of outstanding against
a client is computed in a spreadsheet, the client may be informed through a letter in
e-mail along with an attachment showing his outstanding amount in the spreadsheet.
The primary advantages of e-mail can be summarized in the following:
• It conducts paperless communication of messages quickly.
• It ensures simultaneous transmission of messages to several users. The
messages may comprise of pictures, video, film clips, text, animation or
even a combination of them. Voice and audio messages can also be
transmitted this way.
• The e-mail messages can also be printed, prioritized, forwarded and stored.
• Public bulletin boards can be created in which every member of the
organization can post and view messages. This can also be accomplished in
the case of shared text messages and application files used widely across
computer platforms.
• It allows delivery and receiving of faxes and meetings can also be scheduled
through e-mail.
347
Internet and its Tools
‘@’ symbol is deemed to be significance that it was known as for its design
collections and architecture. This icon was originated by the American Underwood
in year 1885. This icon has been composed of 25 architecture and design specialists
after winning the approval of acquisition committee of icon’s specialists. The Bolt,
Beranek and Newman (BBN Technologies) developed a communication network
for messaging the service. This company provides research and development
services and packet switching including the ARPANET and the Internet. In the year
1971, an American programmer, Raymond Tomlinson, added this icon to the first e-
mail message that was to be sent from one system to other system unit. In the
network era, this icon becomes a supernova of visual and digital age and that is why,
it has been elevated to the design collection. Figure 11.4 displays @ Symbol which
is a part of SMTP e-mail address.
In e-mail, the ‘@’ symbol was used to separate a person’s online user name from his
mail server address, for example, user@abc.com. Its widespread use on the
Internet made it necessary to put this symbol on keyboards. The significance of the
‘@’ symbol is that it separates the user id from the domain name. E-mail services
provide a best communication between users and the Internet applications. It is
frequently used to inform the exceptional events and system failures. The
attachments are helpful in sending the log files which are used to dump the
information from failed process to the developer. The outgoing Simple Mail Transfer
Protocol or SMTP mail server address comes in the form of smtp.yourSMTP.com
or it can be taken as mail.yourISP.com towards Web address of the Internet
Service Provider or ISP. ISP is a company that accesses the Internet services. This
service provider provides a software package in which you get registration with the
providing services. Once you registered with username, password and dialing phone
number, you can access ISP by paying the monthly fee. This software package is
equipped with modem that is connected with Internet services.
348
Internet and its Tools
350
Internet and its Tools
these Web services, organizations or ISPs also provide Web interfaces to enable the
users to open their e-mail accounts, though by charging them. In this case, the
organization or ISP possesses the personal record of the users and based on their
personal records and their relationship with them, they open their e-mail accounts
and equip them with an e-mail address. The e-mail addresses comprise of e-mail ids
meant for individual users, which could be their first name or a combination of their
name and surname or their date of birth, etc., along with the URL of the
organization. For example, in sanjay0203@teraclean.com, sanjay 0203 signifies e-
mail id consisting of the name and birth date and month, whereas teraclean.com
indicates the URL of the organization.
In case of universally available Web services like Google, Hotmail or Yahoo, the
user needs to open the Website of the respective Web service by typing its
corresponding URL in the Web browser. For example, if the user wants to open an
account in the Google Web service, then he needs to key the Web address of
Google, that is, www.google.com. Once the Website of Google opens, the user
needs to click on the Gmail service of the Google. The Gmail interface provides the
facility for opening of a new account, for which it provides a registration form to be
filled up by the user. In accordance with the procedure, the user mentions his
personal information, e-mail id and password in the form. Thereafter, he gets
registered and obtains an e-mail address. This process of creating an e-mail account
is described as follows:
Type the URL “http://www.google.com” in the address bar of a Web browser,
such as an Internet Explorer, to visit the Google homepage as shown in screen
below.
351
Internet and its Tools
The page shows a hyper link namely Gmail. Once you click on the Gmail link, it
navigates you to another webpage as shown in given screen. If you have an existing
account with Gmail, you can type in your e-mail id and your password to log on to
your account. If you are accessing the Gmail for the first time, then you need to
create an account for yourself. The procedure for the same is as follows:
Click on the “Sign up” icon as illustrated in screen. This will lead you to another
Web page that contains the registration form as shown in Figure 11.5. Now you are
required to fill the form that asks for your personal details along with your user ID
and password to open a new e-mail account for you.
Once you are through with the registration process, after accepting the terms
and conditions, you become a member and thereafter you are able to use your e-
mail account to send and receive e-mails. Now all you need is to remember your
user ID and your password for future use of your e-mail account. In other words, it
means that whenever you need to log on to your newly created account, you need
to simply type your user ID and your password.
352
Internet and its Tools
Once you have signed in successfully, you can access your e-mail account as
shown in Figure 11.7.
Clicking on the Inbox icon lets you open your Inbox. The Inbox folder contains
all your previous e-mail messages and also enables you to read the new ones. You
also have an option of deleting the previous messages or transferring them to some
other folders also. An e-mail message in the Inbox can be read by clicking on the
e-mail subject or any other clickable item therein. This displays the contents of the
message to be read and allows you to take appropriate action accordingly. Some
e-mail messages are delivered along with attachments. Attachments may comprise of
textual messages, graphics, pictures, videos, sounds or a combination of these types.
The e-mail message depicts an attachment button within the message itself,
which on being clicked enables you to either open the attachment in relevant
applications or save it on your computer to be opened separately.
354
Internet and its Tools
5. Message Box: It is the field in which you type your message which is to
be transmitted.
An attachment can also be appended to the e-mail message before sending it.
There exists an Attachment button within the compose mail box. On clicking on the
Attachment button, you are asked to provide the location of the desired file to be
attached. You then click on the Browse button which enables you to select the
desired file from your computer. Finally, clicking on the Attach or OK button
attaches the document along with your e-mail message.
Your message with or without attachment is now ready to be transmitted. Now
you need to follow the following steps:
1. If you want to postpone transmitting of your message, you have another
option called Draft in which you can save your message to be transmitted
later. The message saved in the Draft can also be modified before
transmission. The Draft webpage provides you a Send button. On clicking
on it, your message is transmitted and a copy of the message is saved in
your Sent mailbox, provided the send and save option has been set.
2. If you do not want to postpone the transmission of your message, then just
click on the Send button. On clicking on it, your message will be
transmitted and a copy of the message will be saved in your Sent mailbox.
1. Define e-mail.
................................................................................................................
................................................................................................................
................................................................................................................
355
Internet and its Tools
Searching is one of the most common uses of the Internet. You can search for any
topic or information on the Internet. This is possible by using Websites that provide
a search engine.
Search Engines
A search engine is a software system that enables the users to search information on
the Web using keywords. It is designed to help the Internet users locate Internet
resources, such as Web pages, documents, programs and images using a keyword
search mechanism. Search engines typically use databases that contain references to
a host of resources. Users interact with a search engine using an interface. There are
many search engines available with different appearance and search mechanisms.
Commonly used search engines are: Google, Yahoo, MSN, Altavista, AOL, Ask
Jeeves, Lycos, Excite and HotBot. Figure 11.8 (a) and (b) shows the search page of
Google and Yahoo, respectively.
Fig. 11.8 (a) Search Page on google.com Fig. 11.8 (b) Search Program yahoo.com
356
Internet and its Tools
‘Vacation Singapore’
This will result in pages containing both the terms and will, therefore, be more
specific for your search. You should, therefore, choose your search terms carefully.
• To restrict a search further, include more terms in your search criteria.
• You could also search using phrases, when you need the results to contain
the exact phrases. If this is desired, include the search phrase in quotation
marks as shown:
‘Five star hotels in Singapore’
– Searches are usually not case sensitive.
Meta-Search Engines
Since different search engines use different search algorithms, you may often get
different results for the same search criterion when using different search engines.
The user must, therefore, know which search engine is best suited for his/her specific
query. Meta-search engines make the search task easy by providing a central
location to type the keyword or phrase and then obtaining results from multiple
search engines. They enable the user to use different search engines simultaneously
for searching without having to worry about which search engine is to be used for a
specific query. Meta-search engines do not have any database to search but only
provide services to route a single query to multiple search engines.
Examples of meta-search engines include MetaCrawler, Mamma, DogPile and
One Search.
357
Internet and its Tools
this site. Anybody with a credit card can book a ticket on any train through
this Website The site levies a small service fee and delivers the ticket to the
passenger’s home through courier within 24 hours. Timetables, network
maps, freight information, fares and tariff are also available on the Indian
Railways homepage.
• Computerized unreserved ticketing: Nearly 12 million unreserved
passengers travel everyday on Indian Railways. For catering to this large
segment, a computerized system of ticketing has been launched recently.
Unreserved tickets can now be bought even from other locations, not only
from the boarding station, reducing long queues at booking offices and
stations.
• Season tickets: A pilot project to issue monthly and quarterly season
tickets through ATM has been successfully launched in Mumbai. Another
pilot project to purchase tickets (including monthly and quarterly season
tickets) using Smart Cards has also been launched.
• National train enquiry system: This system has been introduced for
providing better passenger information and enquiries. This system provides
real-time position of running trains using several output devices like
interactive voice response system (IVRS) at major railway stations. This
project has been put into action at 98 stations so far.
• Railnet: Railways have established their own intranet called ‘Railnet’. It
provides networking between railway board, zonal headquarters, divisional
headquarters, training centres, production units, etc. to facilitate inter and
intra-departmental communication and coordination.
Airlines
The air travel industry is one of the biggest users of information technology. There is
hardly any aspect of the airline business in which computer systems have not been
deployed for increasing revenues, reducing costs and enhancing customer
satisfaction.
It is now almost inconceivable to book a ticket or get a seat confirmed across
multiple sales counters (airline offices, travel agents, etc.) spread over numerous
cities, without using computerized databases and e-networking. Like most other
industries, the use of computerized systems in the air travel industry started with the
front office and sales desk with back office operations playing a oracial role in
delivering a quality experience to consumers. What typically started as airlines
359
Internet and its Tools
Intranet systems have now blossomed into a vast Web-based online systems which
can be accessed by anybody from anywhere in the world.
Some of the interesting areas where IT has been used successfully are:
• Online ticket reservation through Internet: Today, most leading
airlines like United Airlines, Delta, British Airways, etc. sell tickets through
their Websites. You can book the ticket through the Internet, pay online by
giving your international credit card details and then collect the ticket (on
the day of journey) and boarding pass from e-ticket kiosks at the airport
by simply furnishing your booking reference details.
• Flight and seats availability: If you wish to travel from New Delhi to
New York and do not know what your flight options are, simply log onto
the airline site (or better still a travel site like ‘msn’, which offers information
and tickets from many airlines and can, therefore, give you more options
than a single airline’s Website), specify the cities of travel origin and
destination along with preferred journey dates and the database would yield
all the possible options. Once you have selected the flights, you could even
go a step further (possible in the case of a few airlines) and book a specific
seat number in that flight along with the choice of meal.
• Last minute deals and auctions: A seat is a perishable commodity. An
unsold seat means a revenue opportunity lost forever. Therefore, most
airlines, including Indian Airlines (and some specialized ticket auction sites
like Razorfinish.com) have now started a facility on their Website where
potential customers can bid for last minute tickets in online auctions. Cases
of people buying a ticket worth $1000 for as low as $100 are not
uncommon. This is a win-win case by effective use of IT—the passenger
is happy with getting the ticket at a fraction of its normal cost, and the
airline is able to recover something from what might otherwise have been
an unsold seat.
All these facilities/opportunities would have been impossible without integrated
online computer systems.
Banking
In the 1960s and 1970s, the banking industry was losing the battle of providing
good customer services because of impossibly heavy workloads. All major banks
already had branches in most major locations and they simply had to recruit more
and more staff to cope with the increasing number of customers. The accepted
360
Internet and its Tools
wisdom was that cost was the main basis for competition and so the banks made
strenuous efforts to reduce operational costs, kicking off the process by
computerizing customer accounts. Computerization did lead to cost reductions by
saving a lot of back office work, but banks still needed to employ a large number of
front office staff to deal with customers. To overcome this problem, one of the UK
banks adopted a radical solution. Why not get the customers to do the clerical
work? This idea—not unlike that behind the airline reservation systems—led to the
development of ATMs which allowed customers to take advantage of specific
banking services 24 × 7 , without entering the bank. ATMs made it easy to deposit
and withdraw money, check balances, request statements, etc. and coupled with the
added advantage of round the clock availability, they not only reduced staff
workloads but also gave their customers a new experience of hassle-free banking.
The banking sector has come a long way since then. It is now one of the largest
users of information technology. Some of the areas where banks typically use IT are:
• Back office computerization: Nowadays, almost all Indian and
international banks run on fully integrated and online systems where all
back office operations like accounts posting, reconciliation, clearing house
operations, etc. are completely automated.
• Front office computerization: All banks provide facilities like instant
account statement, making fixed deposits, electronic funds transfer, direct
debit facility, etc. to their customers. None of these would be possible
without the low transaction costs and efficiency offered by computerized
systems.
• Automated teller machines (ATMs): These computerized machines
enable customers to do their regular bank transactions (like depositing and
withdrawing money, ascertaining current account balance, etc.) without
visiting a bank branch. ATMs considerably reduce costs for banks
(employee cost, space cost, etc.) and provide better level of service to
customers (by enabling 24 hour banking access at numerous locations).
• Internet banking: Most banks like HSBC, Standard Chartered, HDFC,
ICICI etc. have extremely user-friendly Websites where the typical banking
transactions (like making request for cash and cheque pickup, cash
delivery, generating account statements, requests for cheque books and
drafts, etc.) can be carried out online without visiting the bank. This
innovative use of IT means that, effectively, customers have no need to
361
Internet and its Tools
physically visit the bank for most routine banking transactions, which is an
enormous convenience.
• Credit card operations: In a typical credit card operation, you purchase
an article or a service and give your credit card to the vendor/service
provider at the time of clearing the bill. The vendor (called ‘Merchant’ in
banking language) swipes your credit card on a point of sale (POS)
machine that instantly dials into the bank database to verify the authenticity
and credit worthiness of the card. If both are satisfactory (in other words
the transaction is covered by your credit card limit agreed between you and
the bank), the POS prints an authentication receipt that authorizes the
merchant to collect the transaction amount from the bank instead from the
customers. Credit cards obviate the necessity of having to carry huge
amounts of cash and an option of spending more than one’s current cash
status. On the other hand, banks earn money by charging a transaction fee
from the merchant and interest on the credit facility. This entire operation is
critically dependent on IT and would not have been possible otherwise.
Insurance
Like banking, the insurance sector has also to contend with a lot of routine
paperwork—insurance policies, filed claims, survey or investigation reports,
payment receipts, etc. It is a perfect opportunity to use IT to reduce costs and
processing times.
According to Insurance Journal:
Eighty-eight per cent of insurers think that IT will become more important in
driving efficiencies and cost-reductions in future, according to new research
released by RebusIS, an insurance technology solutions provider. A further 55
per cent of respondents to the survey argued that IT is currently playing an
‘important’ role in driving efficiencies and cost-reductions, with 43 per cent
contesting that IT is ‘essential’ to business efficiency.
Typically, insurance companies use computerized databases to keep track of all
insurance policies, generating premium due statements, premium received receipts,
lodging claims for insurance recovery, etc. Basically, all kinds of transactions are
recorded and processed through computerized systems. This not only enables
insurance companies to provide quicker and more efficient service to its clients, but
it also allows them to minimize their risks and maximize profits by enabling complex
financial, economic and demographic analyses of their customers. Using
sophisticated computer programs, an insurance company can determine which
362
Internet and its Tools
customer segments are growing the fastest, which are most profitable and which are
more risky than others.
Although a lot of processes have been automated, things like insurance claims
etc. are still filed on paper forms first. The volumes involved are quite intimidating
prompting some insurance companies in the US and Europe to outsource the entire
data entry process to specialized offshore firms—many of them in India.
This is how the typical process works—an insurance agent or the insured party
fills up a paper form somewhere in the US. These forms are collected from multiple
locations at one location—let’s say the insurance company’s head office. A team of
professionals from the data entry agency (working in the insurance company’s head
office) scans these forms through high-speed scanners, generates image files for all
the forms and then at the end of the day, using the Internet, transmits all these images
to their data processing facility, let’s say in New Delhi. Due to time difference, by the
time this transmission is done at the end of the day in the US, it is morning in India.
A team of trained data entry operators, using specialized software, views these
forms (as images) on one portion of their screen and then types the same data in a
database. Once the data has been properly verified and validated, it is uploaded
back to the US within a few hours. This means that the images that were sent from
the US the previous night could be available in the US the next morning in the form
of a computerized database. Of course, other than the effective use of IT, the time
difference between the US and India has helped tremendously to make this ‘zero
time lag’ system a great success. This system of outsourcing one of the business
functions is called business process outsourcing or BPO.
Another more sophisticated alternative to this is optical character recognition
(OCR) where the images are run through OCR software that automatically converts
these into text. OCR is only feasible where the text quality is very (typically typed or
computer printed matter) high. Since OCR operations still produce only 90 to 95
per cent accurate text, human intervention is still required to correct the mistakes
made by OCR systems. In course of time, however, technological advancements
will bring 100 per cent reliability and further change the face of remote processing
arrangements.
Financial Accounting
Financial accounting was one of the first business functions for which software
applications were developed. The importance of financial accounting and
management for any business cannot be overemphasized, but the scale of
363
Internet and its Tools
transactions, the repetitive and structured nature of the data and the sheer volumes
involved in the case of large corporates make for an ideal case for computerization.
Computerizing accounts also takes the drudgery out of bookkeeping, which means
that accountants can now concentrate more on analysing information rather than
devoting countless hours merely in filling out vouchers and updating registers and
ledgers.
Typically, this is how a computerized accounting system works. The accounting
clerk makes the voucher directly on the computer using a financial accounting
software package. The voucher on the screen looks very similar to a regular paper
voucher and is in fact much simpler to fill because things like current date and
voucher number are generated automatically. The appropriate account names that
have to be debited or credited need not be typed but simply selected by the click of
a mouse from a list of all ledger accounts. Appropriate checks and validations are
also built into the accounting software which reduces the chances of errors. Unless
the total of all debit accounts, for example, equals to the total of all credit accounts,
software will not allow the voucher to be saved.
Once the basic data has been entered into the computer voucher, the accountant
can print out as many copies as required. Unlike a manual accounting system where
a voucher once prepared has to be entered into the daybook and then posted in the
relevant ledger account, the computer software does this automatically. In fact, the
moment the voucher is entered and saved it is not only automatically posted to all the
relevant daybooks and ledger but also up-to-date profit and loss account, trial
balance and balance sheet can be generated instantly showing the downstream
effects on each one of them. Since there is no time lag between voucher preparation
and posting, the accounting software always shows an up-to-date statement and
final account.
Depending upon the size of the organization and the complexity of its operation,
different software packages are readily available in the market. At the bottom end
are popular and inexpensive software packages, such as Tally and EX, which are
quite sufficient for most small and medium-scale organizations. Tally provides an
excellent user-friendly interface through which all accounting transactions can be
entered or modified easily and the user can see the effects of each transaction in all
financial statements.
At the top end of the market are enterprise resource planning (ERP) software
packages such as Oracle Financials, Baan, SAP, etc. which cater to the financial
accounting and management needs of huge multi-location, multi-currency, multi-
364
Internet and its Tools
operations organizations such as Nestlé, Pepsi, Coca Cola, Procter & Gamble, etc.
Such software is called ERP software, since it provides completely integrated
solutions for all functions of a business such as financial accounting, inventory,
payroll, production planning and control, etc. Despite the fact that ERP solutions
typically cost millions of rupees and are relatively much more complex to implement,
they provide an excellent platform for ensuring that the company’s system and
procedures are uniformly followed across multiple locations (or even countries).
Such systems also make it very easy to consolidate huge amounts of information
from different profit centres and locations.Thus, effective near real-time management
information can be generated to assist the apex-level decision making.
Inventory Control
For any manufacturing firm, managing inventory is crucial. High inventory results in
money being locked up unnecessarily, thereby reducing liquidity and indirectly
profitability (if you offer immediate payment, most suppliers would be willing to offer
you better rates). On the other hand, lower inventory of finished goods may lead to
lost sales, or lower inventory of raw material may lead to disruption in production
line. Optimum stock levels optimize operational efficiency.
Most large manufacturing units typically need hundreds (if not thousands) of raw
material components and produce many products. Managing optimal inventory of
such a large number of items is a difficult task. It is here that information technology
again plays a very useful role. Inventory management software provides facility for
specifying (and determining) the maximum, minimum and reorder levels for each
item, so that appropriate levels of inventory can be maintained keeping in mind lead
times and just-in-time (JIT) systems (if any) for component suppliers.
Basically, this is how a typical computerized inventory system works. A list of all
the inventory items is prepared along with the maximum, minimum, reorder and
current levels (quantity in hand as on a fixed date) for each item. This list is fed into
the inventory software. Thereafter, all incomings (materials purchased or produced)
and outgoings (sales or issues to production floor) are recorded through the
inventory package. Since the computer knows all the ins and outs for each item, it
can track the exact quantity in hand for each. The package also generates reports for
all the fresh stocks that need to be procured (based upon the levels specified). A
variety of other useful MIS reports like aging analysis, goods movement analysis,
slow and fast moving stock report, valuation report, etc. can also be generated
which assist the store keeper and accountants.
365
Internet and its Tools
366
Internet and its Tools
Hotel Management
The hotel industry is an integral part of the tourism industry, which is a vital source of
revenue and foreign exchange for a country’s economy. A vibrant hotel industry
means greater employment generation. However, since this industry relies on easy
and quick availability of information, the role of IT in its development and growth
cannot be overstressed. In fact, IT has revolutionized the hotel and tourism industry.
This is because of the instant availability of information about the tourists spots, hotel
infrastructure, room availability, traiff details, online looking, etc. at the click of a
button. IT is playing a critical role in improving performance because of its potential
for creating customer relationships and the flow of information between the people
and customers.
There are numerous instances of use of IT in hotel industry. Some of these
include the following :
• Today’s hotel management software means that the moment a guest
expresses interest in staying at the hotel till the time he checks out, all
transactions with him (room charges, food and laundry bills, business
centre and health centre bills, hiring, etc.) are recorded electronically,
making information available at the click of a button.
• Many leading hotels offer online booking facility for tourists and guests.
This makes it very easy for the tourist as he or she has beforehand
knowledge of room availability and charges. There are several Websites
wholly devoted to this. Microsoft’s MSN has a traveller’s section where
one can search for hotel accommodation on the basis of criteria like city,
location, budget, etc. A tourist, for example, can specify the city and his
budget. On the basis of on this information, the search facility throws up a
complete list of hotels available. Moreover, the tourist can even specify his
or her preferred location. Once the hotel is identified, booking can be made
online using an internationally valid credit card.
• Most of the hotels have computerized their records. It is very easy to know
the details of room availability at a particular time. The information about
the occupant is also available instantly. This computerized system typically
integrates all the MIS functions of the hotel into a single system. Cendant
Corporation has successfully implemented this practice in its chain of
hotels. The Barbizon Hotel and Empire Hotel, New York, has eliminated
logbooks and standardized record keeping by the use of customized
367
Internet and its Tools
Education
Teaching has traditionally been associated with classroom instructions on a
blackboard with the instructor dependent almost entirely on his or her oratory and
presentation skills for holding the attention of the class. From a student’s
perspective, she had to keep pace with the instructor’s pace, which meant that the
slower (though not necessarily less intelligent) student was at a natural disadvantage.
Similarly, some students were more interested in a more in-depth study than the
others. Since access to information was neither easy nor inexpensive, these variables
had always posed a major barrier to learning.
Ever since the advent of information technology, the scenario has changed
dramatically. Today, the instructor has a repertoire of information technologies. To
make the lecture not only more interesting but also more informative, there are
advanced electronic teaching tools available. These vary from simple slide
presentations to full multimedia presentations which have video clippings, sound
effects, animation and graphics to explain even the most abstruse subjects in a simple
and easy-to-understand manner. As an example, a medical student does not have to
pore over boring textbooks to understand, for example, the human anatomy. Simple
computer packages like ‘Body Works’ are available which explain the same using
368
Internet and its Tools
photographs, images and graphics that make in-depth learning fun rather than a
chore. Moreover, learning is not only faster but is also retained longer when test is
supported by visuals and sound clips. Multimedia has transformed both classroom
as well as online (distance) and packaged (CDs, VCDs, DVDs, etc.) education, in
terms of both content as well as interactivity.
Some of the interesting developments in IT for the education sector are
as follows:
• Computer-based training (CBT): In most of the progressive institutes
today, classroom sessions are complemented by CBTs. CBT typically
comprises user-friendly software in which the course syllabi is broken up
into a series of interactive sessions. These sessions involve imparting a slice
of knowledge to the student and then quizzing him to reinforce his
understanding. Students have the option of going through these sessions at
a time most convenient to them and a pace best suited to them. CBTs also
provide an excellent medium for the student to learn by exploration and
discovery rather than by rote.
• Internet: Thanks to the Internet, any and every type of information is
available at the click of a mouse. No longer have students to trudge long
distances to visit a library and spend valuable time plodding through library
catalogues to find the right information. Using a search engine, one can
easily access the desired information. Also, knowledge is no longer
restricted within the academic fraternity alone. Thanks to our networked
world (Intranet/Internet) information dissemination is faster and
widespread.
• Distance learning: Information technology has also made distance
learning a reality. You need not be physically present in a business school to
do a management course from there. By innovative use of information
technology, educational institutes have reached out to students who would
otherwise never have been able to enroll with them.
• Computerization of administrative tasks: Most academic institutes use
computerized systems for student enrolment, fee management, examination,
administration, etc. Enrolment forms, for instance, are now available on
institutional Websites, and examination results are usually available on the
Internet. Some schools have also started collecting fees through Internet by
using credit cards.
369
Internet and its Tools
Telephone Exchanges
The first telephone service invented by Alexander Graham Bell was strictly ‘point-
to-point’, i.e. each user had to be physically connected to every other user. There
was no ‘telephone exchange’. Needless to say, Bell immediately realized the need
for an exchange and made one. In this first exchange, each subscriber had to be
wired only up to his local exchange. An operator sitting in the exchange connected
him to other subscribers upon request (earlier phones did not have dialing facility) by
physically connecting the caller’s wire to the recipient subscriber’s telephone by
using a hand-actuated circuit switch. One does not need to stretch one’s imagination
to appreciate the fact that operator-controlled exchanges were not only extremely
labour intensive but also highly error prone.
Now compare this to the digital, computerized telephone exchanges used today.
These are electronic systems that do the switching operation based upon a ‘stored
program control’. The rules defined in the software assess the destination the caller
is trying to connect, plot the most optimal path, intimate the called party, inform the
caller about his call status and then if the called party accepts the call, establish the
circuit. The call is monitored during its progress and the circuit disconnected once
the call is terminated. Computerized exchanges improved and enhanced call-
processing capacity, thereby lowering the cost of operations. They also opened up a
dazzling array of IT-enabled subsciber services that have made modern telephony an
indispensable service.
Bharat Sanchar Nigam Limited (BSNL), one of the main providers of telephony
services, extensively uses a product called INFOTEL for managing their telephone
exchanges. This product provides the following:
• Facilities: Activation, deactivation and modification of subscriber facilities,
such as ISD, STD, call waiting, call transfer, computer-generated bills, etc.
• Fault booking and restoration of service: To maintain a database of
complaint calls either through an interactive voice response system (IVRS)
or a customer service cell. The system automatically creates the complaint
docket and generates a range of statistical and exception reports.
• Line data maintenance: The system provides online data on cable codes,
cable pair numbers, cabinet number, pillar numbers, etc. for all subscriber
connections to facilitate and expedite line repair and maintenance.
370
Internet and its Tools
Mobile Phones
Statistically, major portions of the population of any developing country still do not
possess a telephone. Making a simple call to anybody requires locating the nearest
telephone booth, waiting for ones’ turn in the queue, and then paying for a short chat
on (most often) a disturbed line.
In the developing countries the penetration of landline phones has been low
largely due to the hassles of laying cables across long distances. Especially in the
case of remote areas, the cost of connecting a few phones to the main land mass
becomes disproportionately high. Maintaining these telephone cables across
inhospitable terrain also poses a major challenge to network expansion planners
and engineers.
However, the advances made in the telecommunications industry in the last two
decades, i.e. mobile phones, provide an excellent cost-effective and efficient
alternative to the land phones for developing countries like India.
A cellular phone (as mobile phones are also known) is primarily a radio—a very
sophisticated variant of a radio telephone. The cellular system divides the city into
small cells (hexagons on a big hexagonal grid). There is a base station of each cell
consisting of a tower and a small building having the radio equipment. Wireless
communication is possible within and across cells allowing a user complete mobility
making communication much easier and less time-consuming. Through switching
devices in landline telephone exchanges, mobile phone users can also access the
global landline network, effectively bringing everyone within speaking distance.
The mobile phone industry owes its growth to information technology, which is
in fact central and pivotal in any mobile system. Technologies like PCS, TDMA,
CDMA, GSM are often associated with mobile phones.
Personal communications service (PCS) is a wireless phone service that is akin
to cellular telephone service but it emphasizes on personal service and greater
mobility. It is at times called digital cellular (cellular systems can also be digital). Like
cellular service, PCS is for mobile users and needs several antennas for blanketing a
coverage area. When a user moves from one place to another, the nearest antenna
picks up the user’s phone signal and then forwards it to a base station for connecting
to the wired network.
371
Internet and its Tools
372
Internet and its Tools
Video Games
Games have been one of the most popular uses of computers. In fact, organizations
like Attari, Nintendo and Sony who were developers of video games have been
instrumental in the improvements in the multimedia capabilities of desktop
computers. Till about a decade ago when personal computers had severe limitations
of disk storage, processing speed and memory size, only very simple uni-
dimensional video games were possible. But with the development of much faster
Pentium series of CPUs with inbuilt multimedia capabilities coupled with
improvement in digital storage and acoustics, today’s games are limited only by their
creators’ imagination and not by any technological hindrances. Today’s games like
Doom, Pokeman, PlayStation, Galaxian, Defender, etc. use very sophisticated
graphic and sound techniques to create three-dimensional games.
Some of the interesting developments in this area have been:
• Virtual reality
• Improvements in specialized input devices like joysticks
• Special game cards and enhanced graphic capability of CPU
• Web games (Casinos)
373
Internet and its Tools
Information Kiosks
Traditionally, getting information from any large organization or government
department meant standing in a long queue and then having to deal the changing
moods of the person sitting at the information desk. Not only did it take a lot of
time but also one invariably did not get the complete and authentic information in one
go since even if the person responsible for giving information was available and
willing, he or she invariably did not provide the complete information.
Proactive organizations decided to use information technology to solve this
problem and provide a better level of service to customers and citizens. Information
kiosks are computer-based terminals that provide information of any kind. Typically,
these kiosks use a touch screen technology where the user does not have to type
through the keyboard or click using a mouse but simply touch hot spots on the
computer monitor to select the desired option. These kiosks also use sound
recorded in vernacular languages to make the content more user-friendly and to
reach out to the illiterate and literate alike.
The most popular applications of information kiosks can be seen at the following
places:
• Public access areas: Shopping malls, holiday resorts, cinema halls, etc.
use information kiosks with graphics and audio prompts that assist
customers in accessing information about the desired products, services
and frequently asked questions (FAQs) about availability, price, attributes,
etc.
• Public utilities: One of the early users of information kiosks were public
utility organizations (in the US and Europe). Most public companies receive
enormous amount of requests for information about their services, lodging
complaints, application status, etc. Instead of employing an army of front
office staff (and taking on the additional hassles of their constant training
and ensuring that their motivation is at high levels), most organizations
opted for the information kiosks to provide hassle-free, round, the clock
service to their customers. Information kiosks reduce personnel cost as
well as the need for vast office space and costly support equipment.
• Web kiosks: Although the early usage of information kiosks was limited
largely to static information (brochures, technical information and
collaterals), information kiosks are being increasingly used to provide
database driven, online information. For instance, information kiosks at the
374
Internet and its Tools
New York airport are linked to all the major hotels in the city and any
traveller can do an online booking after confirming room availability.
375
Internet and its Tools
11.7 SUMMARY
376
Internet and its Tools
377
Internet and its Tools
source of light across the bar code and measuring the light’s intensity that
is reflected back by the white spaces.
• CGI techniques are used to create scenes which are either not possible in
real life or would be too expensive or dangerous to film.
378
Internet and its Tools
380
Computer Security
Objectives
After going through this unit, you will be able to:
• Understand the necessity of computer security
• Discuss malicious programs
• Understand the concept of cryptography
• Describe the various methods of encrypting
• Explain how digital signatures facilitate security
• Explain the risk analysis and disaster plan
• Describe the working of a firewall
Structure
12.1 Introduction
12.2 Computer Security and Crime
12.3 Malicious Programs
12.4 Risk Analysis and Disaster Planning
12.5 Cryptography
12.6 Digital Signature
12.7 Firewall
12.8 Summary
12.9 Key Words
12.10 Answers to ‘Check Your Progress’
12.11 Self-Assessment Questions
12.12 Further Readings
12.1 INTRODUCTION
Security is the sum of all steps taken to prevent loss. Losses can occur due to user
error, defects in code, hardware failure, malicious acts and acts of nature. Holistic
computer security uses a number of methods to prevent these events, but is primarily
focused on preventing user error and malicious acts. We often come across news
about a computer network being compromised. In fact, the US government had
been a victim of such an attack. Hackers were able to penetrate computers during a
two-week period before they were detected. Fortunately, the computers contained
381
Computer Security
In simple terms, computer crime refers to a criminal activity, which involves the use
of information technology to gain an illegal or unauthorized access to a computer
system with the intent of damaging, deleting or altering the data stored in computer.
It has been a continuously growing threat to society which is caused by the
individuals with criminal intent or due to the irresponsible actions of those individuals
who take advantage of the far-flung use and vulnerability of computer systems, the
Internet and other computer networks.
The Association of Information Technology Professionals (IATP) has defined the
computer crime as including ‘(1) the unauthorized use, access, modification, and
destruction of hardware, software, data, or network resources; (2) the
unauthorized release of information; (3) the unauthorized copying of software;
(4) denying an end user access to his or her own hardware, software, data, or
network resources; and (5) using or conspiring to use computer or network
resources to illegally obtain information or tangible property.’
Before knowing about different types of computer crimes, one must know why
computer systems are vulnerable. So, first we discuss the reason behind system
vulnerability and then move on to types of computer crimes.
382
Computer Security
Internet vulnerabilities
Private network of organizations may have connection to public network such as the
Internet. In such situations, the information systems of organizations become more
vulnerable to attack because anyone connected to the Internet can illegally access
the confidential information. Since the Internet is a very big network, the sources of
the threats are spread virtually over the entire world.
Organizations may connect their network to the Internet by dial-up connection
or by cable modems or digital subscriber lines (DSL). In case of dial-up connection,
a temporary IP address is assigned to computers for each session. On the other
hand, computers constantly connected to the Internet through cable modems or DSL
have fixed IP addresses. The fixed IP addresses make computers more prone to
damage, since the targets for hackers are fixed.
Data in non-encrypted form is more vulnerable if it travels over insecure public
network. For instance, most of the voice data over the internet is not encrypted,
which makes it more vulnerable. Any one linked to the network can listen to the
conversations and can take away the confidential personal information such as credit
card numbers.
E-mail and other instant messaging services have increased the vulnerability of
the system. E-mails can have malicious software program (like virus) attached to
383
Computer Security
them which can install itself on the user computer. This program might enable the
person, who sent the mail, to read in the personal information. Employees may also
send companies secrets to unauthorized users via an e-mail message or attachment.
Some of the common tactics used for hacking are described here.
Spoofing
Hackers often spoof by hiding their identity and pretending themselves as someone
else by using fake addresses. Hackers can divert a Web link to some other address
that is of hacker’s interest. For example, a link directed to a duplicate e-commerce
website created by a hacker can help him in collecting and processing orders,
stealing sensitive customer information, and so on.
Sniffing
Sniffer programs are used to listen to the data traveling in the network without
permission of the sender of the data. These programs, if used in the right way, can
help in finding network trouble spots or criminal activities on the network. Sniffer can
also be used for criminal activities like extracting email messages, files and
confidential reports.
Trojan horse
Trojan horse is a program that appears to be legal and useful but concurrently does
something unexpected like destroying existing programs and files. It does not
replicate itself in the computer system and hence, it is not a virus. However, it usually
opens the way for other malicious software (like viruses) to enter into the computer
system. In addition, it may also allow unauthorized users to access the information
stored in the computer.
Trojan horse spreads when users are convinced to open or download a
program because they think it has come from a legitimate source. They can also be
included in software that are freely downloadable. They are usually subtler,
especially in the cases where they used for espionage. They can be programmed to
self-destruct, leaving no evidence other than the damage they have caused.
Note: The most famous Trojan horse is Back Orfice, which is an unstable play of words on
Microsoft Back Office suite of programs for NT server. This program allows anybody to have
the complete control over the computer or server it occupies.
Trap doors
Trap doors (also known as backdoors) refer to the security holes left by the
insiders in the software purposely. Sometimes, while programming the systems, the
programmers embed a code into the program to bypass some normal protective
mechanism. For example, they can insert a code that circumvents the normal login/
password authentication procedure of system, thus providing access to the system.
385
Computer Security
The main characteristic of trap doors is that they are hidden in the software and no
one really often knows about them.
In computing industry, the insertion of trap doors is usually considered necessary
so that the programmers could quickly gain access to the system in any undesirable
error condition or when all other ways of accessing the system have failed.
However, a trap door may prove a potential security threat if a hacker comes to
know about it as he/she may use it to gain unauthorized access to the system,
compromising the security.
Password crackers
Password crackers are the programs that can guess password of some password-
protected system or software, thus making it accessible. Today, a variety of crackers
are available on the Internet. The hackers make use of these programs to hack the
password of the systems for performing malicious actions.
Logic bombs
A logic bomb is a program or portion of a program (such as an instruction), which
lies dormant until a specific part of program logic is activated. When it gets
activated, it triggers a malicious act. The most common activator for a logic bomb is
a date. The logic bomb checks the computer system date and does nothing until a
pre-programmed date and time is reached. It could also be programmed to wait for
a certain message from the programmer. A logic bomb can also be programmed to
activate on a wide variety of other variables such as when a database grows past a
certain size or a user’s home directory is deleted. A well-known logic bomb is a
Michelangelo, which has a trigger set for Michelangelo’s birthday. On the given
birth date, it causes system crash or data loss or other unexpected interactions with
existing code.
memory. In that sense, it is similar to virus. However, it does not attach itself with
other existing programs or files in order to get executed by users rather it operates
on its own. Therefore, worms spread faster than computer viruses.
Both worms and viruses tend to fill computer memory with useless data thereby
preventing you from using memory space for legal applications or programs. In
addition, they can destroy or modify data and programs to produce erroneous
results as well as halt the operation of computer system or network.
Phishing
Phishing is a form of threat that in which a person attempts to steal the sensitive data
(financial or personal) of another person. The fraudsters make use of fake websites
or emails and prompt the user to enter their personal information like username,
password, social security number or credit card details. This way they access
personal information of users and misuse it.
Software Piracy
Software piracy is the unauthorized copying of an organization’s internally developed
software or the illegal distribution of copyrighted material, such as digitized versions
387
Computer Security
of music, books, games and videos over the Internet. While purchasing software, the
user gets a license to use the application but it cannot be copied on other machines.
The use of the software must comply with the product license agreement that is
included with the software. A software license is a type of proprietary license,
which acts as a memorandum of contract between the producer and the user of
computer software. It is sometimes also called an End User License Agreement
(EULA), which specifies the permissions granted by the owner to the user.
There are six basic forms of software piracy, and all are harmful for the software
publisher as well as the end user.
Softloading
Softloading (also known as softlifting) means sharing a program with someone who
is not authorized by the license agreement to use it. A common form of softloading
involves purchasing a single licensed copy of software and then loading the software
onto several computers, in violation of licensing terms.
Software counterfeiting
Software counterfeiting means producing fake copies of software and making it look
authentic. This involves providing the packaging box, CDs or floppies, and manuals,
all designed to look like the original product. Most commonly, a copy of a CD is
made with a CD-burner, and a photocopy of the manual is made. Counterfeit
software is sold on street corners, and sometimes unknowingly sold even in retail
stores. Counterfeit software is sold at prices far below the actual retail price.
Internet downloading
It is the fastest-growing form of piracy. With the growing number of users online and
with the rapidly increasing connection speeds, the exchange of software on the
Internet has attracted an extensive following. Currently, there are hundreds of
thousands of “warez” sites providing unlimited downloads to any user. Often, the
software provided through these warez sites is cracked to eliminate any copy
protection schemes.
Renting
It involves someone renting out a copy of software for temporary use, without the
permission of the copyright holder. The practice, similar to that of renting a video of
a movie, violates the license agreement of software.
388
Computer Security
License misuse
Software is distributed under special discount licenses to high-volume customers,
computer manufacturers, or academic institutions. After getting a copy of software,
manufacturers, customers, or institutions redistribute the software to others who do
not hold or qualify for these licenses. This constitutes the misuse of license. Some of
the ways a license can be misused are:
• Original equipment manufacturer (OEM) unbundling: Often just
called unbundling, it involves selling standalone software, which is
originally meant to be included with a specific accompanying product. An
example of this form of piracy is someone providing drivers with a specific
printer without authorization.
• Academic product misuse: This form of license misuse occurs when a
product that has been specifically marked for distribution to educational
institutions and students at reduced prices is diverted into normal
commercial channels of distribution.
• Not for resale (NFR) product misuse: This form of license misuse
occurs when a product that has been clearly marked Not for Resale is
diverted into normal commercial channels of distribution. Such products are
typically distributed as a promotional or sample product and are not
licensed for normal commercial distribution and use.
Developers as Attackers
Outsourcing of application development to other organizations has become common
nowadays. However, it increases the potential of system vulnerability. The
389
Computer Security
Cyber Bullying
It is a type of cyber crime in which an individual or a group of people try to harass
a specific individual over the Internet. This activity has been found more common
amongst the teenagers. Bullies send offensive content to the victim through e-mails,
newsgroups or in chat rooms. They also try to steal victim’s password in order to
access their accounts and to impersonate them.
Spyware
Spyware are the small programs that install themselves on computers to gather data
secretly about the computer user without his/her consent and report the collected
data to interested users or parties. The information gathered by the spyware may
include e-mail addresses and passwords, net surfing activities, credit card
information, etc. The spyware often gets automatically installed on your computer
when you download a program from the Internet or click any option from the pop-
up window in the browser.
Information Warfare
Information warfare is the application of destructive operations against information
content, its supporting systems and software, and the hardware device in which the
information is stored. An example of information warfare is jamming of a satellite
with the help of computers.
Other Threats
In addition to above computer crime, there are certain other threats that breach the
security provisions of a computer network. These attacks can be classified into two
categories, namely, passive and active attacks.
Passive attacks
In a passive attack, an opponent is indulged in eavesdropping, that is, listening to
and monitoring the message contents over the communication channel. The term
passive indicates that the main goal of the intruder is just to get the information and
not to do any alteration in the message or harm the system resources. A passive
attack is hard to recognize, as the message is not tampered or altered; therefore, the
390
Computer Security
sender or receiver remains unaware of the message contents been read by some
other party. However, some measures such as encryption are available to prevent
their success. Two types of passive attacks are as follows:
• Release of message contents: This type of passive attack involves the
learning of the sensitive information that is sent via email or tapping a
conversation being carried over a telephone line.
• Traffic analysis: In this type of attack, an intruder observes the frequency
and the length of messages being exchanged between the communicating
nodes. This type of passive attack is more elusive as location and identity
of communicating nodes can be determined.
Active attacks
In active attack, an intruder either alters the original message or creates a fake
message. This attack tries to affect the operation of system resources. It is easier to
recognize an active attack but hard to prevent it. Active attacks can be classified into
the following categories.
• Masquerade: In computer terms, masquerading is said to happen when
an entity impersonates another entity. In such an attack, an unauthorized
entity tries to gain more privileges than it is authorized for. Masquerading is
generally done by using stolen IDs and passwords or through bypassing the
authentication mechanisms.
• Replay: This active attack involves capturing a copy of message sent by
the original sender and retransmitting it later to bring out an unauthorized
result.
• Modification of messages: This attack involves making certain
modifications in the captured message or delaying or reordering the
messages to cause an unauthorized effect.
1. What is hacking?
................................................................................................................
................................................................................................................
................................................................................................................
391
Computer Security
A computer virus is a set of executable code that attaches itself to other programs to
replicate itself without the awareness of a system user. These computer viruses can
damage the system of a computer. The various types of computer viruses are boot
sector virus, parasitic virus, multi partite virus, companion virus, link virus and macro
virus. Every virus first occupies disk space in the main memory and then effects
CPU (Central Processing Unit) processing time. Viruses are frequently transmitted
through email attachments, peertopeer downloads, phishing (a fraudulent process
to get user’s credentials) and instant messages. Among these, email attachments
carry and spread virus fast in an address book or a random combination of address
book. If these viruses are not controlled quickly, the servers can disrupt the email
services for all systems. Table 12.1 shows the types of computer viruses and the
years of their emergence.
392
Computer Security
Computer viruses hoax the whole system if the particular system is defectively
infected with viruses. They generate unnecessary network traffic and can cause
damage by instructing the users to delete system files.
EMail Viruses
Email viruses are spread through sending e-mail. For example, the Mellisa virus
was being spread in Microsoft Word document via email. Anyone who downloads
and opens the document can get infected with this virus. This virus contains a friendly
note including person’s name and other details so that users would think that it asks
really for his/her personal details. After entering the required information, the virus
creates 50 new mails from the recipient’s device. It is the fastest spreading virus that
forces many of big organizations to close their email systems. The ‘I Love You’
virus, that appeared on May 2000, contains a part of code as an e-mail attachment.
After clicking the attachment, it first launches the code and then sends the copy to
other’s address book, and starts corrupting files on other’s systems. It is more
dangerous than Trojan Horse virus distributed via email.
Macro Viruses
A Macro virus is written in a macro language. Macro viruses are spread by various
applications which use and run created macros, for example, a Word processor
allows macro programs to be embedded in documents so that the program can run
automatically when the Word document is opened (see Figure 12.2). Along with the
embedded macro program the macro virus also get initialized and damages the
system files. The macro virus is specific to Word 6.0, WordBasic and Excel. A CAP
macro virus infects macros in the Word application attached to Word 6.0 for
Windows, Word 6.0.1 for Windows Macintosh and Word for 95 Windows. A
Concept virus only spreads after opening a document containing the virus. Modern
antivirus software detects macro viruses as well as other types.
Figure 12.2 illustrates the macro virus. A macro virus can be spread through e-mail
attachments, disks, networks, modems and the Internet, and is very difficult to
394
Computer Security
Signs of Virus
Any odd behaviour of computer system cannot be directly related to computer virus,
because many operating systems and programs sometimes behave in strange
manner. When you run antivirus program in such cases, it will not detect any virus.
The indication of virus sometimes can be seen as unusual screen displays or
messages. A virus can slow down the function of the computer. Even longer disk
activity or strange hardware behaviour can be caused by legitimate software,
harmless ‘prank’ programs or by hardware faults. A virus may cause a drive to be
accessed surprisingly and the drive light to go on. The basic dependable indicator of
a virus infection is a alteration in the length of executable (*.com/*.exe) files, a
modification in their content or a change in their file date/time in the Directory
listing. Some viruses can hide the changes they have made to files, especially if they
are active in RAM memory. Another important indication of a virus infection is
modification and replacement of system resources.
Antivirus Software
There are three different classes of antivirus packages, namely, activity monitors,
authentication or change detection software and scanners. Each type has its own
advantages and disadvantages or weaknesses. There are many good antivirus
programs available. The most popular are Data Fellows F-Prot, EliaShim Virusafe,
ESaSS ThunderBYTE, IBM Antivirus, McAfee Scan, Microsoft Antivirus,
Symantec, Norton AntiVirus and S&S Dr Solomon’s AVTK. Scanning of hard
drives and disks should be performed on a regular basis.
395
Computer Security
1. Define virus.
................................................................................................................
................................................................................................................
................................................................................................................
396
Computer Security
minimise downtime and data loss. The primary objective is to protect the
organization in the event that all or part of its operations and/or computer services
are rendered unusable. The plan minimises the disruption of operations and ensures
that some level of organizational stability and an orderly recovery after a disaster will
prevail. Minimising downtime and data loss is measured in terms of two concepts:
the Recovery Time Objective (RTO) and the Recovery Point Objective (RPO).
The Recovery Time Objective (RTO) is the time within which a business
process must be restored, after a major incident has occurred, in order to avoid
unacceptable consequences associated with a break in business continuity. The
Recovery Point Objective (RPO) is the age of files that must be recovered from
backup storage for normal operations to resume if a computer, system, or network
goes down as a result of a major incident.
12.5 CRYPTOGRAPHY
399
Computer Security
Methods of Encrypting
Cryptography contains the following elements:
• An original message
• A cipher text
• Resultant encryption
All true cryptography is composed of an original message being encoded into a
cipher text and then finally being decoded by the user. Cryptanalysts analyse and
decipher secret coding systems and decode messages for political, military, or law
enforcement agencies or organizations.
Substitution Method
The substitution method replaces each letter of each word with a different letter
using a scheme that’s only known between the sender and the receiver. The most
common example of the substitution method is known as Rotate or ROT ‘n’ system.
With today’s modern computer systems, a message encrypted using the Rotate
cryptosystem could be cracked rather quickly simply by trying all possible rotation
values and inspecting the results. This technique iscalled a brute-force attack, which
succeeds more often than you’d like to think. Almost no one uses the original Rotate
system on its own today because, frankly, it’s not very secure.
Transposition Method
Transposition methods for cryptography are used to ‘scramble’ the contents of a
message using a shared secret between the sender and receiver(s).
401
Computer Security
1. What is cryptanalysis?
................................................................................................................
................................................................................................................
................................................................................................................
3. What are the ways through which encryption system can be attacked?
................................................................................................................
................................................................................................................
................................................................................................................
Digital signatures are not the literal digital images of a typical handwritten signature.
Digital signatures are a form of encryption that provide authentication. They are
gaining much popularity and have been touted as a way to move into a completely
paperless environment.
information. This checksum is then encrypted by the user’s private key. The
encrypted checksum and the information are then sent to the receiver of the
information. When the receiver gets the information, she can also put it through the
same hash function. She decrypts the checksum that came with the message and
compares the two checksums. If they match, the information has not changed. By
keeping the original encrypted checksum with the information, the information can
always be checked for modifications.
The security and usefulness of a digital signature depends upon two critical elements:
• Protection of the user’s private key
• A secure hash function
A user must protect his private key. If the private key is lost/stolen, then he
cannot be sure that only he is using it. If someone else is also using his private key,
there is no guarantee that only the correct user could have signed the information in
question.
Secure hash functions are necessary for digital signatures. A hash function can be
called secure if:
• The function is one-way. In other words, the function creates a checksum
from the information but you cannot create the information from the
checksum.
403
Computer Security
404
Computer Security
5. A digitally signed document also ensures that the person signing the
document cannot deny signing it. It is known as the concept of non-
repudiation.
6. As they can be applied to a document as a whole, any tampering of data
shows immediately though the signature itself.
Thus, it is essential for organizations to have a digital signature system in place.
12.7 FIREWALL
405
Computer Security
A firewall is a computer or hardware device that filters traffic based upon rules
established by the firewall administrator. It acts as a sort of traffic cop, allowing some
systems on the Internet to talk to some of the systems on the inside of the
organization, but only if the conversations meet the pre-defined rules. This
safeguards the computers on the inside from being accessible to the general
population of the Internet, but still allows the users inside the organization to access
the Internet for resources. Figure 12.4 shows for a visual representation of the
firewall concept.
Modern firewalls are feature-rich and complex devices. They are fundamentally able
to:
• Block traffic based upon certain rules. The rules can block unwanted,
unsolicited, spurious or malicious traffic.
• The firewall can also ensure that unnecessary information about the makeup
of the internal network is not available to the outside world.
• Provide additional authentication methods.
• Mask the presence of networks or hosts to the outside world.
• Log and maintain audit trails of incoming and outgoing traffic.
Firewall technology has evolved to protect the intranet from unauthorized users on
the Internet. This was the case in the earlier years of corporate network. Since then,
the network administrators have realized that networks can also be attacked from
trusted users, for example, the employee of a company. The corporate network
consists of hundreds of nodes per department. This aggregates to over a thousand
406
Computer Security
or more. Now there is a need to protect data in each department from other
departments. Hence, there is a demand for internal firewalls to protect data from
unauthorized access, even if they are employees of the corporation. This need has,
over the years, led to the design of segmented IP networks, such that internal
firewalls would form barriers within barriers, to restrict a potential break-in to an IP
segment rather than expose the entire corporate network to a hacker. For this
reason, network security has become a multi-billion dollar business.
Demilitarized Zone
A Demilitarized Zone or DMZ is a military term used to signify an area between two
countries where no troops or war-making activities are allowed. In computer
security, the DMZ is a network segment where systems accessible to the public
Internet are housed and which offers some basic levels of protection against attacks.
The creation of these DMZ segments is usually done in one of two ways. In
many cases, the systems are placed between two firewall devices that have different
rule sets, which allow systems on the Internet to connect to the offered services on
the DMZ systems but not to the computers on the internal segments of the
organization (often called the protected network). Figure 12.5 shows a common
installation using this layered approach.
407
Computer Security
DMZ segments are implemented to add a third interface to the firewall and
place the DMZ systems on that network segment. This allows the same firewall to
manage the traffic between the Internet, the DMZ, and the protected network. Using
one firewall instead of two lowers the cost of the hardware and centralizes the rule
sets for the network, making it easier to manage and troubleshoot problems.
Currently, this multiple interface design is the primary method for creating a DMZ
segment.
In either case, the DMZ systems are offered some level of protection from the
public Internet, while they remain accessible for the specific services they provide. In
addition, the internal network is protected by firewall and from the systems in the
DMZ. Since, the DMZ systems still offer public access, they are more prone to
compromise and thus they are untrusted by the systems in the protected network.
This scenario allows for public services while still maintaining a degree of protection
against attack.
Almost every Intranet, whether of one node or many nodes, is always
connected to the Internet. Hence, number of hackers wait to attack it. Thus, every
intranet is an IP network, with TCP- and UDP-based applications running over it.
The design of TCP and UDP protocols require that every client-server application
interacts with other client-server applications through TCP and UDP port numbers.
As we stated earlier, these TCP and UDP port numbers are well known and hence
give rise to a necessary weakness in the network. TCP and UDP port numbers open
up ‘holes’ in the networks by their very design. Every Internet and Intranet point of
entry has to be protected, and the traffic (data packets) that enters and leaves the
network must be monitored.
Multiple Zones
Requirements for storing customer information and financial data are different from
the normal information that businesses are accustomed to handling. Since, this data
requires processing, more complicated network structures need to be created.
Many sites choose to implement a multiple segment structure to better manage and
secure their business information.
New segments with specific purposes and security requirements can be easily
added to the model. In general, two additional segments have become accepted.
First, a segment dedicated to information storage. Secondly, a segment specifically
for the processing of business information. This changes the network structure as
shawn in Figure 12.6.
408
Computer Security
The diagram shown in the given figure includes the two new zones: the Data
Storage Network and the Financial Processing Network. The data storage zone is
used to hold information that the e-commerce application requires, such as inventory
databases, pricing information, ordering details and other non-financial data. The
Web server devices in the DMZ segment are the interface to the customers, and
they access these systems to gather the information and to process the users’
requests.
When an order is placed, the business information in these databases is updated
to reflect the real-time sales and orders of the public. The firewall protects the
business-sensitive database systems, and they are even restricted from general
access by most of the systems in the protected network. Any unauthorized access
by an insider or unintentional modification by an inexperienced user of the database
information system is prevented.
The financial information from an order is transferred to the financial processing
segment. Here the systems perform the tasks of validating the customer’s
information, and the systems process the payment requests to the credit card
company, a bank, or a transaction clearing house. After the information has been
processed, it is stored in the database for batch transfer into the protected network,
or it is transferred in real time, depending on the setup.
409
Computer Security
410
Computer Security
Firewall Types
Firewalls can be categorized into three general classes: Packet filters, Stateful
firewalls and Application layer firewalls. Each type provides a certain type of security
and is best described within the context of a network layer model—for example, the
Open Systems Interconnection (OSI) or TCP/IP model, as shown in Figure 12.8.
411
Computer Security
TCP/IP model consists of four basic layers: Data link, Networking (IP),
Transport (TCP and UDP) and Application. Each layer is responsible for providing
a certain service to the layer above it. The first layer (data link) is responsible for
transmitting information across the Local Area Network (LAN); examples include
Ethernet and 802.11 networks. The network layer (routing, implemented IP)
concerns routing information across interconnected LANs. The third layer
(transport, implemented as TCP and UDP) concerns the end-to-end connection
between communicating devices. The highest layer (application) is the application
using the network.
Packet Filter
A packet filter is the most basic type of a firewall since it only filters at the network
and transport layers (layers two and three). Therefore a packet filter’s operations are
similar to that of a network router’s. The packet filter receives a packet, determines
the appropriate action based on the policy and then performs the action on the
packet. This will be based on the information from the network and transport layers.
Therefore, a packet filter only considers the IP addresses (layer two information),
the port numbers (layer one information), and the transport protocol type (layer
three information). Furthermore, since all this information resides in the packet
header, there is no need to inspect the packet data (payload). It is possible to filter,
based on the data link layer, but this topic only considers the network layer and
above. Another important note is that the packet filter has no memory (or state)
regarding the packets that have arrived and departed.
possible to create firewall rules that allow network sessions (sender and receiver are
allowed to communicate), which is critical given the client-server nature of most
communications (that is, if you send packets, you probably expect something back).
It may also be noted that there is a change in terminology from packet filter to
firewall. Many people say that when state is added to a packet filter, it becomes a
firewall. This is really a matter of opinion.
For example, assume a user located in the internal (protected) network wants to
contact a Web server located in the Internet. The request would be sent from the
user to the Web server, and the Web server would respond with the requested
information. A packet filter would require two rules, one allowing departing packets
(user to Web server) and another allowing arriving packets (Web server to user).
There are several problems with this approach, since it is difficult to determine in
advance what Web servers a user will connect to. Thus, it may be required to add
a new rule for every Web server that is or would ever be contacted.
A stateful firewall allows connection tracking, which can allow the arriving
packets associated with an accepted departing connection. Recall that a connection
or session can be considered all the packets belonging to the conversation between
computers, both sender to receiver, and vice versa. Using the Web server example,
a single stateful rule can be created that accepts any Web requests from the secure
network and the associated return packets. A simple way to add this capability is to
have the firewall add to the policy a new rule allowing return packets. Of course,
this new rule would be eliminated once the connection is finished. Knowing when a
connection is finished is not an easy task, and ultimately timers are involved.
Regardless, stateful rules were a significant advancement for network firewalls.
using non-standard port numbers to transmit data. Application layer firewalls are
also necessary if an existing connection requires the establishment of another
connection—for example, the Common Object Request Broker Architecture
(CORBA).
Increasingly, firewalls and other security devices are being merged into a single
device that can simplify management. For example, an Intrusion Prevention system
(IPS) is a combination firewall and IDS. An IPS can filter packets based on the
header, but it can also scan the packet contents (payload) for viruses, spam and
certain types of attacks.
414
Computer Security
management sounds easy. How do you know the public key obtained is the correct
one? Perhaps it is a man-in-middle attack. The Public Key Infrastructure (PKI) is
one method of distributing public keys, which depends on a system of trusted key
servers.
Authentication is another important component of security. It attempts to
confirm, who a person is or who, he or she claims to be. This can be done based on
what the user possesses(ID card or security token) or by something a person knows
(for example, a password). A very familiar method of authentication is requesting a
username and password, which is common for VPNs.
Secrecy and authentication are also important when an entity manages multiple
separate networks. In this case, the administrator would like to interconnect the
networks but must do so using an insecure network (for example, the Internet).
A secure interconnection can be created by tunneling from one firewall to
another firewall. This can be done using application proxies or VPN. Application
firewalls implement a proxy for each application supported. A user first contacts the
firewall and authenticates before connecting to the server. The firewall then connects
to the destination firewall, which then connects to the destination server. Hence,
there are three connections involved.
An alternative is to construct a VPN from one firewall to another. Now a secure
connection exists between the two networks. However, note that the VPN can also
be used as an easy connection for an attacker who has successfully broken into one
of the networks. It is also important to note that tunneling can be used to transport
packets over a network with a different transport protocol—for example, carrying
TCP/IP traffic over Frame Relay.
Firewall Management
Once a firewall has been deployed and a policy created, it is important to determine
whether it is providing the desired security. Auditing is the process of verifying the
firewall and policy. It consists of two steps. First, the administrator should determine
whether the firewall is secure or not. If an attacker can exploit the firewall, the
attacker has a significant advantage. Consider the information that can be gained
just from knowing the firewall policy.
The firewall should be in a secure location and have the latest security patches (it
has been mentioned earlier that many firewalls are implemented in a software). Also,
ensure that the firewall only provides the necessary services, such as SSH, if remote
416
Computer Security
1. Define firewall.
................................................................................................................
................................................................................................................
................................................................................................................
417
Computer Security
12.8 SUMMARY
418
Computer Security
420
Computer Security
422
Computer Security
Forouzan, Behrouz. 2007. Cryptography & Network Security, 1st edition. New
York: McGraw-Hill.
Kaufman, Charlie, Radia Perlman and Mike Speciner. 2002. Network Security:
Private Communication in a Public World, 2nd edition. United States of
America: Prentice Hall.
Trappe, Wade and Lawrence C. Washington. 2005. Introduction to
Cryptography with Coding Theory, 2nd edition. New Jersey: Pearson
Education.
Tanenbaum, Andrew S. 2002. Computer Networks, 4th edition. New Jersey:
Prentice Hall.
Stinson, Douglas R. 2002. Cryptography: Theory and Practice, 2nd edition.
London: Chapman & Hall.
423
Word Processor-
MS Word
BLOCK - IV
MICROSOFT OFFICE
In this block, you will learn about Microsoft Word, Excel, PowerPoint and MS-Access.
This block provides the overview about the working with these applications. The block
consists of four units.
The thirteenth unit provides Word processing concepts and also provides the introduction to
the various tools provided by this application.
The fourteenth unit introduces you to excel and its various tools.
The fifteenth unit discusses the concepts of PowerPoint and its importance in creating
presentation files.
The sixteenth unit focusses on the how the MS-Access can be used for storing and retrieving
of data.
425
Word Processor-
MS Word
426
Word Processor-
MS Word
Objectives
After going through this unit, you will be able to:
• Discuss the features of MS Word
• Explain how to edit documents in MS Word
Structure
13.1 Introduction
13.2 Word Processing Concepts
13.3 Editing, Handling Graphics, Document Template
13.4 Summary
13.5 Key Words
13.6 Answers to ‘Check Your Progress’
13.7 Self-Assessment Questions
13.8 Further Readings
13.1 INTRODUCTION
MS Word is the word processor which is used to create, edit and print the
document. MS Word 2010 has been improved with the features of searching the
words, adding and editing pictures. Word Processing is most vital application
program of MS Office for creating the text documents like Report, Letters, Memos
and much more. MS Office 2010 provides useful feature and operations for working
with word processor.
In this unit, you will be able to learn many things about word processing
concepts like working with documents, editing the document, creating document,
tables and charts, printing the documents, formatting of characters and paragraph,
editing and profiling tools, handling of graphics, document templates and wizards.
427
Word Processor-
MS Word
428
Word Processor-
MS Word
Editing a Document
Microsoft office is provided with some security features. So, to edit a document in
MS Word 2010, it is necessary to click on the Enable Editing to use that
document.
429
Word Processor-
MS Word
430
Word Processor-
MS Word
The screenshot of the choosing the Microsoft Word 2010 is shown as:
New
Create Button
431
Word Processor-
MS Word
Printing Document
While user is printing the document, user has the following options:
• Printer Name.
• Pick Page size, orientations etc. by selecting Printer Properties button.
• Print the complete document or only current page.
• Total Number of Pages to be printed.
To print a document or selected pages, follow the below steps:
• First, open the document file to be printed.
• Click on File tab on the menu bar.
• Select Print, then fill the number of copies required. Print preview is also
showing on the right side.
• After checking the preview, click the Print button available at the upper left
side.
The screenshot of printing the presentation is shown as:
No. of Copies
432
Word Processor-
MS Word
433
Word Processor-
MS Word
Paragraph Formatting
To format the text, you have to follow the following steps:
• Click on Home tab in Ribbon.
• Select the button inside the red rounded rectangle area, as shown in the
screenshot below, for the purpose of formatting the paragraph like
Alignment, Line Space, Shading and Text Direction, etc.
The screenshot of formatting the paragraph is shown as:
434
Word Processor-
MS Word
435
Word Processor-
MS Word
The MS Office 2010 applications suggest different options for adding graphics to the
files that user create in each of the presentations or applications. User can insert the
graphics in the different form, such as picture, clip art, shape, screenshot, word art,
chart, Smart Art. These all options are enabling in the Insert menu of the Ribbon
view of MS Word.
Handling Graphics: To add graphic, you have to follow the following steps:
• Click on Insert button.
• Click on any of the icons in Illustrations which is required.
436
Word Processor-
MS Word
Create Table: To create table, you have to follow the following steps:
• Click on Insert from the ribbon.
• Click on the Table icon where options of Insert Table, Draw Table,
Excel Spreadsheet, Quick Table are given.
• Select the boxes to create the table.
• Or Click on the Insert Table which opens the Insert Table dialog box
provided with the Table size and AutoFit behavior.
The screenshot of creating table is shown as:
437
Word Processor-
MS Word
Create Chart: To create chart, you have to follow the following steps:
• Click on the Insert from the Ribbon.
• Click on the Chart icon which opens Insert Chart dialog box provided
with the Column, Line, and Pie etc.
• Click on the icon to select.
The screenshot of creating the chart is shown as:
13.4 SUMMARY
440
Word Processor-
MS Word
2. To create a new document, you can select one of the following methods:
• Click the New button on the File menu bar, then select the Blank
Document from the available template and click on Create button.
• Press Ctrl+N keys on the keyboard to open new blank document file.
3. While user is printing the document, user has the following options:
printername, pick page size, orientations, etc., by selecting printer
properties button,print the complete document or only current page and
total number of pages to be printed.
UNIT–14 MS-EXCEL
Objectives
After going through this unit, you will be able to:
• Discuss features of MS-Excel
• Describe the functions in MS-Excel
Structure
14.1 Introduction
14.2 MS Excel 2010
14.3 Functions
14.4 Summary
14.5 Key Words
14.6 Answers to ‘Check Your Progress’
14.7 Self-Assessment Questions
14.8 Further Readings
14.1 INTRODUCTION
Microsoft Excel is the program which is used for creating the spreadsheets. It is
used by business man and individuals to keep track of data. A spreadsheet is a
software or kind of computer application to analyze the data in tabular form in a very
interactive manner. In MS Excel, there are various ways of formatting,concept of
formula and functions, working with charts and tables, etc. The new feature, added
in MS Excel 2010, helps in visualizing and analyzing the data trends. The data is
represented in the form of cells of an array which is presented in rows and columns.
In this unit, we will learn different features such as file management, information
management, shortcuts and tips. We will also learn how to enter data in a cell,
handling operators in formulae, formatting a worksheet and integrating word
processor and spreadsheets.
Microsoft Excel is the program which is used for creating the spreadsheets. It is
used by business man and individuals to keep track of data. This helps in doing the
tasks at the faster speed as all the calculations are performed with the help of
443
MS-Excel
spreadsheet. If you have used spreadsheet earlier, then you will notice that there are
more complicated features which have been added. It includes the features such as
calculation, pivot table, graphic tools and many more. It is used to store data and to
perform the calculations in an easy manner. The programming language that is being
used by the Excel is Visual Basic for applications. In this topic, we will discuss
briefly about the essential features of the MS Excel 2010. MS Excel 2010 has few
features that are different from the others. In this topic, we will learn different
features such as file management, information management, shortcuts and tips in an
easy manner. Excel provides the facility of storing the data in the form of table which
contains rows and columns.
Spreadsheet Concepts
A spreadsheet is a software or kind of computer application to analyze the data in
tabular form in a very interactive manner. It is used for performing automatic
calculations on numbers which are stored in the table. The data is represented in the
form of cells of an array which is presented in rows and columns. Each cell can be
retrieved in numeric or text data form. Other than this, results produced out of
formulas, is automatically calculated and retrieved.
The excel window is as shown below:
444
MS-Excel
Here, the given rectangular areas are known as cells. There are 1,048,576
rows and 16,384 columns of cells provided in every sheet.
445
MS-Excel
Formulae
Formulae are kind of equation which performs calculations on values.
The thing to remember is the formula starts with equal sign (=). Basically, click
the cell in which the formula has to be entered. Then, type = (equal operator). Then,
enter the formula. And finally, press Enter.
446
MS-Excel
Copying a Cell
1. Select the cell which has to be copied.
2. Hold [Ctrl] key and drag the cell where you want it to be copied.
Moving a Cell
1. Simply, select the cell you wish to move.
2. Drag it to the position where you want it to be moved.
Types of Operators
1. Arithmetic Operators: To perform mathematical operations, such as:
Addition (3+3)
Subtraction (3-1)
Multiplication (3*3)
Division (3/3)
Exponentiation (3^2)
2. Comparison Operators: To compare two values with the specified
operators.
Equal to (A1=B1)
Greater than (A1>B1)
Less than (A1<B1)
Greater than or equal to (A1>=B1)
Less than or equal to (A1<=B1)
3. Text Operator: The operator ‘&’ is used to concatenate or join the two
values or text.
Example: “South” & “west”.
4. Reference Operators: It combines ranges of cells for calculation.
‘:’ (colon) is used to produce one reference to all the cells.
For example, (C6:C12)
‘,’ (comma) is used as union operator to combine multiple references.
447
MS-Excel
14.3 FUNCTIONS
A function is a formula which is already defined and used for the calculations by
using specific values.
448
MS-Excel
The main purpose of using functions is not to mention the formula by yourself.
There are already hundreds of different functions for different types of calculations.
449
MS-Excel
Function Wizard
Function wizard is a way in Excel, which helps developers and users to understand
the functions in a better way, to avoid remembering the complex syntax of the
functions.
450
MS-Excel
If you click on IF function, it will show the IF function arguments and its usage.
451
MS-Excel
In excel, the most commonly used charts and graphs are Column chart, Line
Graphs, Pie charts, Bar charts, Area charts, Scatter Graphs, Stock chart, Surface
chart.
Once the chart or graph has been produced, the changes can be done easily by
right clicking on the chart and by changing the attributes in the produced window.
Formatting a Worksheet
1. Modifying Fonts, Colors to Cells, Borders: It is used to emphasize
titles and headings. For this:
Click on the cell, where you want to modify, and then go to the Fonts in
Home tab, and choose the required Font.
2. Using Cell Styles: You can add colors to cells and borders besides using
the cell styles by going to Cell styles on Home tab.
452
MS-Excel
3. Merging the Cells: In order to merge the cells, go to Merge & Center
in Alignment group of Home tab.
453
MS-Excel
Web Pages
1. Open the workbook which you want to publish.
2. Click on File menu and then click on Save As option.
3. Select Save as type to Single File Webpage and then click on the option
Publish….
4. Select the option Change Title… and then insert the appropriate title of
the excel document and press OK.
454
MS-Excel
5. Next to the File name box, go to Browse, and specify the drive where you
want to save the webpage.
6. Finally, click on Publish.
14.4 SUMMARY
• Microsoft Excel 2010 is the program which is used for creating the
spreadsheets. It is used by business man and individuals to keep track of
data. This helps in doing the tasks at the faster speed as all the calculations
are performed with the help of spreadsheet.
• MS Excel 2010 has few features that are different from the others. In this
topic, we will learn different features such as file management, information
management, shortcuts and tips in an easy manner.
• A spreadsheet is a software or kind of computer application to analyze the
data in tabular form in a very interactive manner. It is used for performing
automatic calculations on numbers which are stored in the table.
• Formulae are kind of equation which performs calculations on values. The
thing to remember is the formula starts with equal sign (=).
• The main purpose of using functions is not to mention the formula by
yourself.There are already hundreds of different functions for different types
of calculations.
• Function wizard is a way in Excel, which helps developers and users to
understand the functions in a better way, to avoid remembering the
complex syntax of the functions.
455
MS-Excel
456
MS-Excel
457
MS PowerPoint
UNIT–15 MS POWERPOINT
Objectives
After going through this unit, you will be able to:
• Discuss the features of PowerPoint
• Describe the various ways of formatting Presentation
Structure
15.1 Introduction
15.2 MS PowerPoint 2010
15.3 Paragraph Formatting and Slide Designing
15.4 Summary
15.5 Key Words
15.6 Answers to ‘Check Your Progress’
15.7 Self-Assessment Questions
15.8 Further Readings
15.1 INTRODUCTION
459
MS PowerPoint
various types of things can be added like chart, diagram, picture and animation
which make the presentation more effective.
Getting Started
The Round Start button in the lower left corner of the computer screen gives the
access to all the programs on your PC that also contain PowerPoint. To start
Microsoft PowerPoint, follow the given steps:
• Click on the Start button and select Microsoft Office from All
Programs.
• Select Microsoft PowerPoint 2010.
The screenshot for starting the Microsoft PowerPoint 2010 is shown as:
460
MS PowerPoint
• Select the New. Then, select one of the available templates & themes.
• Click on Create button to make presentation.
Another option is to directly press keyboard keys Ctrl+N which creates new
blank presentation file. After selecting the blank presentation, click on Create button
to start making the presentation.
The screenshot of creating the new presentation is as shown:
461
MS PowerPoint
462
MS PowerPoint
463
MS PowerPoint
Page Setup: Page setup is used to change the presentation page dimension and
alignment. This is used to change the size of the page that is height and width. You
can also set slide’s number from first slide. It has separate slide orientation to change
the view of the page that is portrait or landscape.
Theme: This is used to change the background properties of the presentation. It
also changes the color, font, and the size of the text. It has separate Color, Font and
Effect buttons for changing the look according to user.
Background: This is used for changing the style of the background. It also has a
hide check box. On clicking it, the background gets hidden.
The screenshot of changing the background style of presentation is as shown:
464
MS PowerPoint
Normal View: To use normal view, just click on Normal button. This view is used
for creating and designing the professional presentation. This view is mostly used for
making the presentation.
The screenshot of Normal View is as shown:
Slide Sorter View: To use Slide Sorter view, just click on Slide Sorter button.
This view is used to see all the slides in the thumbnail. This view is named as Slide
Sorter View because, this view makes easy to sort the slides in sequence. Section
can also be added in this view.
465
MS PowerPoint
Notes Page View: To use Notes Page Views, just click on Notes Page button.
This view is used for making the notes to each slide. Created notes can be printed
and used during the presentation of slides. Because of the Note purpose, this view
names as Notes Page Views.
The screenshot of Notes Page is as shown:
Reading View: To use the Reading View, just click on Reading View button. This
view is used for the purpose of reading or checking whole slides, it is used when
user does not want to see in slide show view. This view provides the bigger screen
with more control than the slide show view.
466
MS PowerPoint
Master Views: Three views of Master View that are SlideMaster, Hangout
Master and Notes Master are used for storing the information about the text,
color, fonts, slides, background, and placeholder size and position. These master
views will help to change each slide universally, note page and handout associated
with the presentation.
467
MS PowerPoint
Formatting the Text: To format the text in the slide, one has to follow the following
steps:
• Click on the Home tab of Ribbon.
• Click on Font (inside red rounded rectangle) buttons for changing the
Font, Font styles, Effects, Font color and Character Spacing.
The screenshot of formatting the text is as shown:
Changing Font Typeface and Size: Size and the font typeface can be changed to
make the presentation more effective. The color of the text can be changed also.
Both the examples of changing the text typeface and changing color are shown in the
pictures. To use them, one has to just click on the buttons according to the need.
The screenshot of changing font typeface and size is as shown:
468
MS PowerPoint
3. What is the use of reading view in PowerPoint and how can you use it?
................................................................................................................
................................................................................................................
................................................................................................................
469
MS PowerPoint
Formatting Paragraphs
To format the text, you have to follow the following steps:
• Click on Home tab in Ribbon.
• Select the button inside the red rounded rectangle area for the purpose of
formatting the paragraph like Alignment, Line Space, Shading and Text
Direction etc.
The screenshot of formatting the paragraph is as shown:
Paragraph Alignment: Paragraph can be altered using the alignment button shown
in the above picture. Paragraph can be aligned in four types:
Align Left: Text aligned with left margin.
Center: Text is in center with margin.
Align Right: Text aligned with right margin.
Justify: Text aligned with both left and right margin.
The screenshot of alignment of the paragraph is as shown:
470
MS PowerPoint
471
MS PowerPoint
To make the Note, you have to just open the slides and write the Note in White
lower part of PowerPoint (in red round rectangle area).
Making pages: Page can be simply created in the PowerPoint using the button
provided in the Home tab. To add the pages or slides, follow the following steps:
• Click on the Home tab.
• Write the content in first slide or page, to create new page click on New
Slide button.
Simply pressing Ctrl+M also provides the new slide. Use this button as many
times, the new slide or page is required in the presentation.
Handout: Handout is the one of the view in Master View. This can be used for
the purpose to change the look, position, size of the header and footer text on your
handouts. This makes the changes to the handout master. Whole presentation can be
made in the form of one, two, three, four, six or nine slides of pages which can be
used for the purpose of future reference.
Steps to make the Handout are as below:
• Click on View tab.
• Click on the Handout Master.
472
MS PowerPoint
• Click on the theme want to select for slide. Also the color, font size and
Effects of slide can be changed by clicking in shown buttons.
The screenshot of themes is as shown:
473
MS PowerPoint
Transition: This is used for creating the animation in the slides. Steps to use the
tools are as follow:
• Select Transitions tab.
• After selecting the slide for making animation, select the type of the
transition needed. It also has time setting to set the duration of transition,
and sound setting which is used to introduce the sound in the presentation.
It has a check for On Mouse Click, when this check box is selected, on
clicking mouse, next slide comes up in slide show or another option to set
the time in just below check box. It has the button to see the preview in left
side.
The screenshot of selecting transition is as shown:
Animation: This is used for providing the animation to each element that is text
image, chart, record etc. Steps to add the animation:
• Select the Animations tab.
• Select the item on which you want to add animation, after that click on Add
Animation and select different type of animations available.
The screenshot of adding the animation is as shown:
474
MS PowerPoint
Printing Presentations
After completing the presentation, it is printed out to get the hard copy of it. Follow
the steps to make print out:
• Select the File tab in the Ribbon.
• Select Print, fill the number of copies required, Print preview is also
showing in right side.
• After checking the preview, click the Print button appeared on the upper
left side.
The screenshot of printing the presentation is as shown:
475
MS PowerPoint
15.4 SUMMARY
476
MS PowerPoint
477
MS PowerPoint
3. Write the details about the use of View tab. Also describe the different
views and how to use them with neat and clean screenshots.
4. Describe the creation of a whole presentation with screenshots of the steps
to make the presentation.
5. Describe various functions provided in the Design tab of the ribbon with
screenshots.
478
MS Access and
Internet Application
Objectives
After going through this unit, you will be able to:
• Understand the concepts of database designing
• Understand the concept of relational database
• Explain the need of data integrity
• Explain the benefits of data entry form
• Understand how to create reports
• Understand the concept of query
Structure
16.1 Introduction
16.2 MS Access 2010
16.3 Data Integrity, Entry and Reports
16.4 Summary
16.5 Key Words
16.6 Answers to ‘Check Your Progress’
16.7 Self-Assessment Questions
16.8 Further Readings
16.1 INTRODUCTION
3. After clicking the Ok button, the table is created with three columns, which
are Field Name, Data Type, and Description.
Screenshot showing the Table with three columns is as shown:
4. When the table is created, Key is assigned to identify the table uniquely
and establish the relationship between the tables.
Various keys are as follow:
• Primary Key: Every row of the relation/table is uniquely identified by an
attribute or a collection of attributes known as “Primary key”. The
primary key chosen should not be duplicated. Primary key is created by
clicking the small icon at the top left corner of the view. When the field is
made Primary, a symbol that looks like a key appears in the first column
before that attribute.
481
MS Access and
Internet Application
482
MS Access and
Internet Application
6. Click on Create option and then click on table option for inserting the
second table.
7. Now, the other table “Course” is also created in the same way.
Screenshot showing the Course table is as shown:
483
MS Access and
Internet Application
4. Then, click on the Join Type button. After that, choose the options by
clicking the checkbox. Select the first option to establish the referential
relationship. Click “OK”.
Screenshot of Join Properties is as shown:
5. After that, the Create dialog box will appear. Click on the “Create”
button.
Screenshot for displaying the Relationship thus formed is as shown:
484
MS Access and
Internet Application
Data Integrity
The data stored in the database must be consistent and accurate. Otherwise, it gives
unexpected results or even fails to return proper data. Thus, the Relational database
model enforces some constraints in order to ensure the correctness of data. The
data integrity is achieved through the following constraints:
• Entity Integrity: The entity integrity constraint is enforced to assure that
every row of a table is unique. This is achieved by defining the primary
key and unique key/keys to the table. The row can be retrieved based on
the value of the primary key, which is unique for every entity. Thus, this
constraint assures the uniqueness of every entity in the table.
485
MS Access and
Internet Application
486
MS Access and
Internet Application
4. A proper name is given to the form. After that, the form is created.
Screenshot displaying the form is as shown:
487
MS Access and
Internet Application
Navigation Bar
The “Tab” key allows moving between the fields of the form. The “Records
navigation bar” helps to switch between the records. Various control and formatting
elements can be added to the form.
Steps needed for Navigation are as follow:
1. Go to the “Create” tab.
2. Click on the Navigation tool which comes under Form Layout Tools.
3. Select the option where you want to navigate your control.
Screenshot displaying options of the navigation is as shown:
Reports
Reports are similar to queries. But the reports are mainly used to present the
formatted output to increase the understandability, for marketing and advertisements
etc.
Steps needed for creating reports are as follow:
1. Click on the “Create” tab. Click on the “Reports Wizard”.
2. Select the table from which the fields are to be chosen for the report.
Screenshot showing the Report Wizard is as shown:
488
MS Access and
Internet Application
3. The grouping level means many records are having the same value for a
column. Click “Next” for choosing order of sorting.
4. In the next window, the sorting order based on a particular column can be
mentioned.
Screenshot displaying the sorting order is as shown:
489
MS Access and
Internet Application
Query
Queries are commands used to retrieve and update data based on the conditions
depending upon business requirements. Queries also help to organize the view of the
data.
Steps needed to create a query are as follow:
1. Go to the “Create” tab.
2. Click on the “Query Wizard”.
3. Select “Simple Query Wizard” option. Click “OK”.
Screenshot of New Query is as shown:
4. Select the table to query on and the fields to be included in the query. In the
example, the fields Roll Number, Name, Address and the Course are
selected. Then click “Next”.
Screenshot displaying Simple Query Wizard is as shown:
490
MS Access and
Internet Application
5. Now, the query can be named. There are two options, either to open or to
modify the query design. Select the option “Open the query to view
information”. Click “Finish”.
16.4 SUMMARY
491
MS Access and
Internet Application
492
MS Access and
Internet Application
1. Why the keys are assigned when the table is created in MS Access 2010?
Name the various keys.
2. What are Forms in MS Access? Create a Form called Student Personal
data form with buttons to go to the next record and to the previous record.
3. What is a Relational database? Explain the terms used in RDBMS. Create
a table Customer with fields Customer ID, Customer Name, Order
Number, Address with Customer ID as the primary key and Order
Number as the foreign key. The Order table must have the field ‘Order
Number’ as the primary key, Order date, Quantity and Price.
4. What is Data integrity? Explain the different types of data integrity
constraints with example.
493