ICT Fundamentals Report

download ICT Fundamentals Report

of 49

Transcript of ICT Fundamentals Report

  • 8/8/2019 ICT Fundamentals Report

    1/49

    GROUP 1BSCE 2C

  • 8/8/2019 ICT Fundamentals Report

    2/49

    DIFFERENT NETWORK TOPOLOGIES

    Topology in Network Design

    Think of a topology as a network's virtual shape orstructure. This shape does not necessarily correspond to theactual physical layout of the devices on the network. Forexample, the computers on a home LAN may be arranged in acircle in a family room, but it would be highly unlikely tofind a ring topology there.

    Network topologies are categorized into the followingbasic types:

    bus

    ring

    star

    tree mesh

    More complex networks can be built as hybrids of two ormore of the above basic topologies.

  • 8/8/2019 ICT Fundamentals Report

    3/49

    Bus Topology

    Bus networks (not to be confused with the system bus of a

    computer) use a common backbone to connect all devices. A single

    cable, the backbone functions as a shared communication medium that

    devices attach or tap into with an interface connector. A device

    wanting to communicate with another device on the network sends a

    broadcast message onto the wire that all other devices see, but

    only the intended recipient actually accepts and processes the

    message.

    Ethernet bus topologies are relatively easy to install and don't

    require much cabling compared to the alternatives. 10Base-2

    ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet

    cabling options many years ago for bus topologies. However, bus

    networks work best with a limited number of devices. If more than a

    few dozen computers are added to a network bus, performance

    problems will likely result. In addition, if the backbone cable

    fails, the entire network effectively becomes unusable.

  • 8/8/2019 ICT Fundamentals Report

    4/49

    Ring Topology

    In a ring network, every device has exactly two neighbors

    for communication purposes. All messages travel through a ring

    in the same direction (either "clockwise" or

    "counterclockwise"). A failure in any cable or device breaks

    the loop and can take down the entire network. To implement a

    ring network, one typically uses FDDI, SONET, or Token Ring

    technology. Ring topologies are found in some office buildings

    or school campuses.

  • 8/8/2019 ICT Fundamentals Report

    5/49

    Star Topology

    Many home networks use the star topology. A star network

    features a central connection point called a "hub" that may be

    a hub, switch or router. Devices typically connect to the hub

    with Unshielded Twisted Pair (UTP) Ethernet. Compared to the

    bus topology, a star network generally requires more cable, but

    a failure in any star network cable will only take down one

    computer's network access and not the entire LAN. (If the hub

    fails, however, the entire network also fails.)

  • 8/8/2019 ICT Fundamentals Report

    6/49

    Tree Topology

    Tree topologies integrate multiple star topologies

    together onto a bus. In its simplest form, only hub devices

    connect directly to the tree bus, and each hub functions as the

    "root" of a tree of devices. This bus/star hybrid approach

    supports future expandability of the network much better than a

    bus (limited in the number of devices due to the broadcast

    traffic it generates) or a star (limited by the number of hub

    connection points) alone.

  • 8/8/2019 ICT Fundamentals Report

    7/49

    Mesh Topology

    Mesh topologies involve the concept of routes. Unlike

    each of the previous topologies, messages sent on a mesh

    network can take any of several possible paths from source to

    destination. (Recall that even in a ring, although two cable

    paths exist, messages can only travel in one direction.) Some

    WANs, most notably the Internet, employ mesh routing. A mesh

    network in which every device connects to every other is called

    a full mesh. As shown in the illustration below, partial mesh

    networks also exist in which some devices connect only

    indirectly to others.

  • 8/8/2019 ICT Fundamentals Report

    8/49

    NETWORKING DEVICES/CABLES

    NETWORK DEVICES

    Network Card

    Often referred to NIC (network interface card), these are

    used with PCs, Servers and printers to allow communication on

    the network take place. Every single NIC has an address burned

    onto a chip that sits on the card. This address is known as a

    hardware or MAC address.

  • 8/8/2019 ICT Fundamentals Report

    9/49

    Hub

    The most basic piece of networking equipment is a hub. A

    hub simply allows several networking devices to speak to each

    other. Each device plugs into a port on the hub. The simplest

    network you can build will be with some PCs connecting into a

    hub. Hubs have no memory or hard drive so they can never

    remember which device is plugged into which port. This causes a

    lot of unnecessary traffic to pass on the network.

  • 8/8/2019 ICT Fundamentals Report

    10/49

  • 8/8/2019 ICT Fundamentals Report

    11/49

    Router

    A router can be considered to be a large directory of

    networks. Rather than concerning itself about which PC is

    where, a routers job is to find out where different networks

    are. It then sends the traffic via the best path, be it the

    fastest, most reliable or shortest. If the router does not know

    how to get to its intended destination it will either drop the

    packet or forward it to another router who should know how to

    get there.

    It is important to remember that by default, routers do

    not forward broadcasts. If they did we would find that most

    networks including the internet would be extremely slow because

    of all the broadcasts passing across them.

  • 8/8/2019 ICT Fundamentals Report

    12/49

    Bridge

    A data-link bridge is a device that connects two similar

    networks or divides one network into two. It takes frames from

    one network and puts them on the other, and vice versa. As it

    does this, it regenerates the signal strength of the frames,

    allowing data to travel further. In this sense, a data-link

    bridge incorporates the functionality of a repeater, which also

    regenerates frames to extend a LAN. But a bridge does more than

    a repeater. A bridge is more intelligent than a repeater. It

    can look at each frame and decide on which of the two networks

    it belongs. Repeaters simply forward every frame from one

    network to the other, without looking at them.

    A bridge looks at each frame as it passes, checking the

    source and destination addresses. If a frame coming from

    Station 1 on LAN A is destined for Station 5 on LAN B, thebridge will pass the frame onto LAN B. If a frame coming from

    Station 1 on LAN A is destined for Station 3 on LAN A, the

    bridge will not forward it; that is, it will filter it.

  • 8/8/2019 ICT Fundamentals Report

    13/49

    Bridges know which frames belong where by looking at the

    source and destination addresses in the Medium Access Control

    (MAC) layer information carried in the frame. The MAC layer,

    which is part of the second layer of OSI Model, defines howframes get on the network without bumping into each other. It

    also contains information about where the frame came from and

    where it should go. Because bridges use this level of

    information, they have several advantages over other forms of

    interconnecting LANs.

  • 8/8/2019 ICT Fundamentals Report

    14/49

    Repeaters

    Repeaters connect multiple network segments together. They

    amplify the incoming signal received from one segment and send

    it on to all other attached segments. This allows the distance

    limitations of network cabling to be extended. There are limits

    on the number of repeaters which can be used. The repeater

    counts as a single node in the maximum node count associated

    with the Ethernet standard [30 for thin coax].

    Repeaters also allow isolation of segments in the event of

    failures or fault conditions. Disconnecting one side of a

    repeater effectively isolates the associated segments from the

    network. Using repeaters simply allows you to extend your

    network distance limitations. It does not give you any more

    bandwidth or allow you to transmit data faster.

  • 8/8/2019 ICT Fundamentals Report

    15/49

    Gateway

    A node on a network that

    serves as an entrance to another

    network. In enterprises, the gateway

    is the computer that routes the

    traffic from a workstation to the

    outside network that is serving the

    Web pages. In homes, the gateway is

    the ISP that connects the user to

    the internet. In enterprises, the

    gateway node often acts as a proxyserver and a firewall. The gateway

    is also associated with both a

    router, which use headers and

    forwarding tables to determine where

    packets are sent, and a switch,

    which provides the actual path for

    the packet in and out of the

    gateway.

    A computer system located on

    earth that switches data signals and

    voice signals between satellites and

    terrestrial networks.

    An earlier term for router,

    though now obsolete in this sense as

    router is commonly used.

  • 8/8/2019 ICT Fundamentals Report

    16/49

    Firewall

    A system designed to prevent unauthorized access to or

    from a private network. Firewalls can be implemented in both

    hardware and software, or a combination of both. Firewalls are

    frequently used to prevent unauthorized Internet users from

    accessing private networks connected to the Internet,

    especially intranets. All messages entering or leaving the

    Intranet pass through the firewall, which examines each message

    and blocks those that do not meet the specified security

    criteria.

  • 8/8/2019 ICT Fundamentals Report

    17/49

    NETWORK CABLE

    Cable is the medium through which information usually

    moves from one network device to another. There are severaltypes of cable which are commonly used with LANs. In somecases, a network will utilize only one type of cable, othernetworks will use a variety of cable types. The type of cablechosen for a network is related to the network's topology,protocol, and size. Understanding the characteristics ofdifferent types of cable and how they relate to other aspectsof a network is necessary for the development of a successfulnetwork.

    The following sections discuss the types of cables used innetworks and other related topics.

    Unshielded Twisted Pair (UTP) Cable

    Shielded Twisted Pair (STP) Cable

    Coaxial Cable

    Fiber Optic Cable

    Wireless LANs

    Installing Cable - Some Guidelines

  • 8/8/2019 ICT Fundamentals Report

    18/49

    Unshielded Twisted Pair (UTP) Cable

    Twisted pair cabling comes in two varieties: shielded andunshielded. Unshielded twisted pair (UTP) is the most popular

    and is generally the best option for school networks (See fig.

    1).

    Fig. 1 Unshielded Twisted Pair

  • 8/8/2019 ICT Fundamentals Report

    19/49

    The quality of UTP may vary from telephone-grade wire toextremely high-speed cable. The cable has four pairs of wires

    inside the jacket. Each pair is twisted with a differentnumber of twists per inch to help eliminate interference from

    adjacent pairs and other electrical devices. The EIA/TIA(Electronic Industry Association/Telecommunication Industry

    Association) has established standards of UTP and rated five

    categories of wire.

    Categories of Unshielded Twisted Pair

    TYPE USE

    CATEGORY 1 Voice Only (Telephone Wire)

    CATEGORY 2 Data to 4 Mbps (Local Talk)

    CATEGORY 3 Data to 10 Mbps (Ethernet)

    CATEGORY 4 Data to 20 Mbps (16 Mbps Token Ring)

    CATEGORY 5 Data to 100 Mbps (Fast Ethernet)

  • 8/8/2019 ICT Fundamentals Report

    20/49

    One difference between the different categories of UTP isthe tightness of the twisting of the copper pairs. The tighterthe twisting, the higher the supported transmission rate andthe greater the cost per foot. Buy the best cable you canafford; most schools purchase Category 3 or Category 5.Category 5 cable is highly recommended.

    If you are designing a 10 Mbps Ethernet network and areconsidering the cost savings of buying Category 3 wire insteadof Category 5, remember that the Category 5 cable will providemore "room to grow" as transmission technologies increase. Bothcategory 3 and category 5 UTP have a maximum segment length of

    100 meters. In Florida, Category 5 cable is required forretrofit grants. 10BaseT refers to the specifications forunshielded twisted pair cable (category 3, 4, or 5) carryingEthernet signals.

  • 8/8/2019 ICT Fundamentals Report

    21/49

    Unshielded Twisted Pair Connector

    The standard connector for unshielded twisted pair cabling

    is an RJ-45 connector. This is a plastic connector that looks

    like a large telephone-style connector (See fig. 2). A slot

    allows the RJ-45 to be inserted only one way. RJ stands for

    Registered Jack, implying that the connector follows a standard

    borrowed from the telephone industry. This standard designates

    which wire goes with each pin inside the connector.

    Fig. 2 RJ-45 connector

    Unshielded Twisted Pair cable used

    in Category 5 looks like:

  • 8/8/2019 ICT Fundamentals Report

    22/49

    Category 5 cable uses 8 wires. The length of exposed wires is very

    critical; the standard limits this to less than 1/2" an inch. The

    various jack connectors look like:

    The patch cord which connects the workstation to the wall jack looks like:

    In 10BaseT, each PC is wired back to a central hub using its own cable.

    There are limits imposed on the length of drop cable from the PC network

    card to the jack, the length of the horizontal wiring, and from the jack

    to the wiring closet.

    This is obviously a physical STAR configuration, in that

    each PC is wired back to a central point (the Hub).

  • 8/8/2019 ICT Fundamentals Report

    23/49

    Ethernet 10Base-T wiring specifies an 8 position

    jack, but uses only two pairs.

    TWISTED PAIR ETHERNET HORIZONTAL WIRING (Solid 24Awg)

    PIN COLOR SIGNAL

    1 White/orange Tx data +

    2 Orange/white Tx data -

    3 White/green Rx data +

    4 Blue/white --

    5 White/Blue --

    6 Green/white Rx data -

    7 White/brown --

    8 Brown/white --

  • 8/8/2019 ICT Fundamentals Report

    24/49

    Shielded Twisted Pair (STP) Cable

    A disadvantage of UTP is that it may be susceptible to

    radio and electrical frequency interference. Shielded twisted

    pair (STP) is suitable for environments with electricalinterference; however, the extra shielding can make the cables

    quite bulky. Shielded twisted pair is often used on networks

    using Token Ring topology.

    Coaxial Cable

    Coaxial cabling has a single copper conductor at its

    center. A plastic layer provides insulation between the center

    conductor and a braided metal shield (See fig. 3). The metal

    shield helps to block any outside interference from fluorescent

    lights, motors, and other computers.

    Fig.3. Coaxial cable

  • 8/8/2019 ICT Fundamentals Report

    25/49

    Although coaxial cabling is difficult to install, it ishighly resistant to signal interference. In addition, it cansupport greater cable lengths between network devices thantwisted pair cable. The two types of coaxial cabling are: thickcoaxial and thin coaxial.

    Thin coaxial cable is also referred to as thinnet. 10Base2refers to the specifications for thin coaxial cable carryingEthernet signals. The 2 refers to the approximate maximumsegment length being 200 meters. In actual fact the maximumsegment length is 185 meters. Thin coaxial cable is popular inschool networks, especially linear bus networks.

    Thick coaxial cable is also referred to as thicknet.10Base5 refers to the specifications for thick coaxial cablecarrying Ethernet signals. The 5 refers to the maximum segmentlength being 500 meters. Thick coaxial cable has an extraprotective plastic cover that helps keep moisture away from thecenter conductor. This makes thick coaxial a great choice whenrunning longer lengths in a linear bus network. One

    disadvantage of thick coaxial is that it does not bend easilyand is difficult to install.

  • 8/8/2019 ICT Fundamentals Report

    26/49

    Coaxial Cable Connectors

    The most common type of connector used with coaxial cables

    is the Bayone-Neill-Concelman (BNC) connector (See fig. 4).

    Different types of adapters are available for BNC connectors,

    including a T-connector, barrel connector, and terminator.

    Connectors on the cable are the weakest points in any network.

    To help avoid problems with your network, always use the BNC

    connectors that crimp, rather than screw, onto the cable.

    Fig.4. BNC

    connector

  • 8/8/2019 ICT Fundamentals Report

    27/49

    Fiber Optic Cable

    Fiber optic cabling consists of a center glass core

    surrounded by several layers of protective materials (See fig.

    5). It transmits light rather than electronic signals,

    eliminating the problem of electrical interference. This makes

    it ideal for certain environments that contain a large amount

    of electrical interference. It has also made it the standard

    for connecting networks between buildings, due to its immunity

    to the effects of moisture and lighting.

    Fiber optic cable has the ability to transmit signals

    over much longer distances than coaxial and twisted pair. It

    also has the capability to carry information at vastly greater

    speeds. This capacity broadens communication possibilities to

    include services such as video conferencing and interactive

    services. The cost of fiber optic cabling is comparable tocopper cabling; however, it is more difficult to install and

    modify. 10BaseF refers to the specifications for fiber optic

    cable carrying Ethernet signals.

    Fig.5. Fiber optic cable

  • 8/8/2019 ICT Fundamentals Report

    28/49

    Facts about fiber optic cables:

    Outer insulating jacket is made of Teflon or PVC.

    Kevlar fiber helps to strengthen the cable and prevent

    breakage.

    A plastic coating is used to cushion the fiber center.

    Center (core) is made of glass or plastic fibers.

    Fiber Optic Connector

    Fiber Optic Connector

    The most common connector used with fiber optic cable is

    an ST connector. It is barrel shaped, similar to a BNC

    connector. A newer connector, the SC, is becoming more

    popular. It has a squared face and is easier to connect in a

    confined space.

    Ethernet Cable Summary

    Specification Cable Type Maximum length

    10BaseT Unshielded Twisted

    Pair

    100 meters

    10Base2 Thin Coaxial 185 meters

    10Base5 Thick Coaxial 500 meters

    10BaseF Fiber Optic 2000 Meters

  • 8/8/2019 ICT Fundamentals Report

    29/49

    Installing Cable - Some Guidelines

    When running cable, it is best to follow a few simplerules:

    Always use more cable than you need. Leave plenty ofslack.

    Test every part of a network as you install it. Even ifit is brand new, it may have problems that will bedifficult to isolate later.

    Stay at least 3 feet away from fluorescent light boxesand other sources of electrical interference. If it is necessary to run cable across the floor, overthe cable with cable protectors.

    Label both ends of each cable.

    Use cable ties (not tape) to keep cables in the samelocation together

  • 8/8/2019 ICT Fundamentals Report

    30/49

    NETWORK CONNECTIONS

    Wired Network

    The most common type of network connection is a wired

    connection. This is the jack in the wall that you plug your

    computer into for network access. Usually these jacks are

    labelled with a room number followed by a sequence number and

    are near the telephone jack. The network jack is similar in

    shape to the phone jack in your home only bigger. Phone jacks

    at Missouri State University are also the larger size and they

    are usually white or beige in color. Network jacks, however,

    are usually orange (for older wiring) or yellow.

  • 8/8/2019 ICT Fundamentals Report

    31/49

    Wireless Network

    Wireless data networks exist in such number and variety as to

    be difficult to categorize and compare.

    Some wireless data networks run over wireless voice networks,such as mobile telephone networks. CPDP, HSCSD, PDC-P, and GPRS are

    examples. Other wireless networks run on their own physical layer

    networks, utilizing anything from antennas built into handlheld

    devices to large antennas mounted on towers. 802.11, LMDS, and MMDS

    are examples. A few wireless networks are intended only to connect

    small devices over short distances. Bluetooth is an example.

    Wireless networks which run over other wireless networks oftenutilize the lower layer networks to provide security and

    encryption. Stand-alone wireless networks either provide their own

    security and encryption features or rely upon VPN's (Virtual

    Private Networks) to provide those features. In many cases,

    multiple layers of security and encryption may be desirable.

    Some wireless networks are fixed, meaning that antennas do not

    move frequently. Other wireless networks are mobile, meaning thatthe antenna can move constantly. This is sometimes a feature of the

    specific implementation and antenna design, instead of an inherent

    limitation of the wireless network specification.

    Wireless networks may operate on licensed or unlicensed

    portions of the frequency spectrum.

  • 8/8/2019 ICT Fundamentals Report

    32/49

    Some Types of Wireless Network:

    Bluetooth

    Bluetooth technology is named after Harald Bluetooth, a Danish

    king who managed to consolidate Denmark and a part of Norway in the

    1900s. The choice for the name of this technology is a

    manifestation of how influential and central the companies from

    this region are to the telecommunications industry.

    Bluetooth is a networking technology that does not rely on

    user control or large amounts of power. By keeping the transmission

    power to an extremely low setting (1 milliwatt), Bluetooth is ideal

    for mobile battery operated devices. Moreover, Bluetooth does not

    rely on the user since it can automatically detect and communicate

    with other Bluetooth devices without any user input.

    Bluetooth technology relies on two things, a radio frequency

    technology and the protocol software enabling it to transmit data

    to other devices. Bluetooth-capable devices can transmit data to

    other devices not within the line of sight of the user. It also

    enables different devices to communicate using certain rules suchas the amount of data that will be sent, the type of communication

    between the devices and the radio frequency or frequencies this

    communication will take place. These protocols ensure that

    Bluetooth devices experience the least amount of interference from

    other Bluetooth capable objects while communicating with each

    other.

  • 8/8/2019 ICT Fundamentals Report

    33/49

    Wi-fi

    Wi-Fi is a trademark of the Wi-Fi Alliance for certified

    products based on the IEEE 802.11 standards. This certification

    warrants interoperability between different wireless devices.In some countries the term Wi-Fi is often used by the

    public as a synonym for IEEE 802.11-wireless LAN (WLAN).

    Not every IEEE 802.11 compliant device is certified by the

    Wi-Fi Alliance, which may be because of certification costs

    that must be paid for each certified device type. The lack of

    the Wi-Fi logo does not imply that a device is incompatible to

    certified Wi-Fi-devices.

    Wi-Fi is used by most personal computer operating systems,

    many video game consoles, laptops, smartphones, printers, and

    other peripherals.

  • 8/8/2019 ICT Fundamentals Report

    34/49

    Infrared

    IR data transmission is also employed in short-range communication

    among computer peripherals and personal digital assistants. These

    devices usually conform to standards published by IrDA, the InfraredData Association. Remote controls and IrDA devices use infrared light-

    emitting diodes (LEDs) to emit infrared radiation which is focused by a

    plastic lens into a narrow beam. The beam is modulated, i.e. switched on

    and off, to encode the data. The receiver uses a silicon photodiode to

    convert the infrared radiation to an electric current. It responds only

    to the rapidly pulsing signal created by the transmitter, and filters

    out slowly changing infrared radiation from ambient light. Infrared

    communications are useful for indoor use in areas of high populationdensity. IR does not penetrate walls and so does not interfere with

    other devices in adjoining rooms. Infrared is the most common way for

    remote controls to command appliances.

    Free space optical communication using infrared lasers can be a

    relatively inexpensive way to install a communications link in an urban

    area operating at up to 4 gigabit/s, compared to the cost of burying

    fiber optic cable.

    Infrared lasers are used to provide the light for optical fiber

    communications systems. Infrared light with a wavelength around 1,330 nm

    (least dispersion) or 1,550 nm (best transmission) are the best choices

    for standard silica fibers.

    IR data transmission of encoded audio versions of printed signs is

    being researched as an aid for visually impaired people through the RIAS

    (Remote Infrared Audible Signage) project.

  • 8/8/2019 ICT Fundamentals Report

    35/49

    Microwave

    Microwave communication is the transmission of signals via

    radio using a series of microwave towers. Microwave

    communication is known as a form of line of sightcommunication, because there must be nothing obstructing the

    transmission of data between these towers for signals to be

    properly sent and received.

    Microwave communication takes place both analog and

    digital formats. While digital is the most advanced form of

    microwave communication, both analog and digital methods pose

    certain benefits for users.

  • 8/8/2019 ICT Fundamentals Report

    36/49

    DATABASE SYSTEM

    A Database Management System (DBMS) is a set of computer

    programs that controls the creation, maintenance, and the use

    of the database of an organization and its end users. It allows

    organizations to place control of organization-wide database

    development in the hands of database administrators (DBAs) and

    other specialists. DBMSs may use any of a variety of database

    models, such as the network model or relational model. In largesystems, a DBMS allows users and other software to store and

    retrieve data in a structured way. It helps to specify the

    logical organization for a database and access and use the

    information within a database. It provides facilities for

    controlling data access, enforcing data integrity, managing

    concurrency controlled, restoring database.

  • 8/8/2019 ICT Fundamentals Report

    37/49

    DBMS Building Blocks

    A DBMS includes four main parts: modeling language, data

    structure, database query language, and transaction mechanisms:

    Components of DBMS

    DBMS Engine accepts logical request from the various other DBMS

    subsystems, converts them into physical equivalent, and actually

    accesses the database and data dictionary as they exist on a storage

    device.

    Data Definition Subsystem helps user to create and maintain the data

    dictionary and define the structure of the files in a database.

    Data Manipulation Subsystem helps user to add, change, and delete

    information in a database and query it for valuable information.

    Software tools within the data manipulation subsystem are most often

    the primary interface between user and the information contained in

    a database. It allows user to specify its logical information

    requirements.

    Application Generation Subsystem contains facilities to help usersto develop transactions-intensive applications. It usually requires

    that user perform a detailed series of tasks to process a

    transaction. It facilities easy-to-use data entry screens,

    programming languages, and interfaces.

    Data Administration Subsystem helps users to manage the overall

    database environment by providing facilities for backup and

    recovery, security management, query optimization, concurrency

    control, and change management.

  • 8/8/2019 ICT Fundamentals Report

    38/49

    Modeling Language

    A data modeling language to define the schema of each

    database hosted in the DBMS, according to the DBMS database

    model. The four most common types of models are the: hierarchical model,

    network model,

    relational model, and

    object model.

    Inverted lists and other methods are also used. A given

    database management system may provide one or more of the four

    models. The optimal structure depends on the natural

    organization of the application's data, and on the

    application's requirements (which include transaction rate

    (speed), reliability, maintainability, scalability, and cost).

    The dominant model in use today is the ad hoc one embedded

    in SQL, despite the objections of purists who believe this

    model is a corruption of the relational model, since it

    violates several of its fundamental principles for the sake of

    practicality and performance. Many DBMSs also support the Open

    Database Connectivity API that supports a standard way for

    programmers to access the DBMS.

  • 8/8/2019 ICT Fundamentals Report

    39/49

    Before the database management approach, organizations relied on

    file processing systems to organize, store, and process data files. End

    users became aggravated with file processing because data is stored in

    many different files and each organized in a different way. Each file

    was specialized to be used with a specific application. Needless to say,

    file processing was bulky, costly and nonflexible when it came to

    supplying needed data accurately and promptly. Data redundancy is an

    issue with the file processing system because the independent data files

    produce duplicate data so when updates were needed each separate file

    would need to be updated. Another issue is the lack of data integration.

    The data is dependent on other data to organize and store it. Lastly,

    there was not any consistency or standardization of the data in a file

    processing system which makes maintenance difficult. For all these

    reasons, the database management approach was produced. Database

    management systems (DBMS) are designed to use one of five database

    structures to provide simplistic access to information stored in

    databases. The five database structures are hierarchical, network,

    relational, multidimensional and object-oriented models.

    The hierarchical structure was used in early mainframe DBMS.Records relationships form a treelike model. This structure is simple

    but nonflexible because the relationship is confined to a one-to-many

    relationship. IBMs IMS system and the RDM Mobile are examples of a

    hierarchical database system with multiple hierarchies over the same

    data, RDM Mobile is a newly designed embedded database for a mobile

    computer system. The hierarchical structure is used primary today for

    storing geographic information and file systems.

  • 8/8/2019 ICT Fundamentals Report

    40/49

  • 8/8/2019 ICT Fundamentals Report

    41/49

    Data Structure

    Data structures (fields, records, files and objects)

    optimized to deal with very large amounts of data stored on a

    permanent data storage device (which implies relatively slowaccess compared to volatile main memory).

    Database Querry Language

    A database query language and report writer allows users

    to interactively interrogate the database, analyze its data and

    update it according to the users privileges on data. It also

    controls the security of the database. Data security preventsunauthorized users from viewing or updating the database. Using

    passwords, users are allowed access to the entire database or

    subsets of it called subschemas. For example, an employee

    database can contain all the data about an individual employee,

    but one group of users may be authorized to view only payroll

    data, while others are allowed access to only work history and

    medical data.

    If the DBMS provides a way to interactively enter and

    update the database, as well as interrogate it, this capability

    allows for managing personal databases. However, it may not

    leave an audit trail of actions or provide the kinds of

    controls necessary in a multi-user organization. These controls

    are only available when a set of application programs are

    customized for each data entry and updating function.

  • 8/8/2019 ICT Fundamentals Report

    42/49

    Transaction Mechanism

    A database transaction mechanism ideally guarantees ACID

    properties in order to ensure data integrity despite concurrent

    user accesses (concurrency control), and faults (faulttolerance). It also maintains the integrity of the data in the

    database. The DBMS can maintain the integrity of the database

    by not allowing more than one user to update the same record at

    the same time. The DBMS can help prevent duplicate records via

    unique index constraints; for example, no two customers with

    the same customer numbers (key fields) can be entered into the

    database. See ACID properties for more information (Redundancyavoidance).

  • 8/8/2019 ICT Fundamentals Report

    43/49

    SOFTWARE DEVELOPMENT

    The largely growing body of software development organizations

    implement process methodologies. Many of them are in the defense

    industry, which in the U.S. requires a rating based on 'process models'

    to obtain contracts.

    The international standard for describing the method of selecting,

    implementing and monitoring the life cycle for software is ISO 12207.

    A decades-long goal has been to find repeatable, predictable

    processes that improve productivity and quality. Some try to systematize

    or formalize the seemingly unruly task of writing software. Others apply

    project management techniques to writing software. Without project

    management, software projects can easily be delivered late or over

    budget. With large numbers of software projects not meeting their

    expectations in terms of functionality, cost, or delivery schedule,effective project management appears to be lacking.

    Organizations may create a Software Engineering Process Group

    (SEPG), which is the focal point for process improvement. Composed of

    line practitioners who have varied skills, the group is at the center of

    the collaborative effort of everyone in the organization who is involved

    with software engineering process improvement.

  • 8/8/2019 ICT Fundamentals Report

    44/49

    Software Development Activities:

    1. Planning

    The important task in creating a software product is

    extracting the requirements or requirements analysis. Customerstypically have an abstract idea of what they want as an end

    result, but not what software should do. Incomplete, ambiguous,

    or even contradictory requirements are recognized by skilled and

    experienced software engineers at this point. Frequently

    demonstrating live code may help reduce the risk that the

    requirements are incorrect.

    Once the general requirements are gleaned from the client,

    an analysis of the scope of the development should be determined

    and clearly stated. This is often called a scope document.

    Certain functionality may be out of scope of the project

    as a function of cost or as a result of unclear requirements at

    the start of development. If the development is done externally,

    this document can be considered a legal document so that if there

    are ever disputes, any ambiguity of what was promised to the

    client can be clarified.

  • 8/8/2019 ICT Fundamentals Report

    45/49

    2. Design

    Domain Analysis is often the first step in attempting to design a

    new piece of software, whether it be an addition to an existing software, a

    new application, a new subsystem or a whole new system. Assuming that thedevelopers (including the analysts) are not sufficiently knowledgeable in

    the subject area of the new software, the first task is to investigate the

    so-called "domain" of the software. The more knowledgeable they are about

    the domain already, the less work required. Another objective of this work

    is to make the analysts, who will later try to elicit and gather the

    requirements from the area experts, speak with them in the domain's own

    terminology, facilitating a better understanding of what is being said by

    these experts. If the analyst does not use the proper terminology it islikely that they will not be taken seriously, thus this phase is an

    important prelude to extracting and gathering the requirements.

    Specification - Specification is the task of precisely describing the

    software to be written, possibly in a rigorous way. In practice, most successful

    specifications are written to understand and fine-tune applications that were already

    well-developed, although safety-critical software systems are often carefully specified

    prior to application development. Specifications are m ost important for exter nal

    interfaces that must remain stable. A good way to determine whether the specifications

    are sufficiently precise is to have a third party review the documents making sure that

    the requirements and Use Cases are logically sound.

    Architecture - The architecture of a software system or software architecture

    refers to an abstract representation of that system. Architecture is concerned with

    making sure the software system will meet the requirements of the product, as well as

    ensuring that future requirements can be addressed. The architecture step also

    addresses interfaces between the software system and other software products, as well

    as the underlying hardware or the host operating system.

  • 8/8/2019 ICT Fundamentals Report

    46/49

    3. Implementation, testing and documenting

    Implementation is the part of the process where software

    engineers actually program the code for the project.

    Software testing is an integral and important part of the

    software development process. This part of the process ensures

    that bugs are recognized as early as possible.

    Documenting the internal design of software for the

    purpose of future maintenance and enhancement is done throughout

    development. This may also include the authoring of an API, be itexternal or internal.

  • 8/8/2019 ICT Fundamentals Report

    47/49

    4. Deployment andMaintenance

    Deployment starts after the code is appropriately tested, is approved

    for release and sold or otherwise distributed into a production environment.

    Software Training and Support is important because a large percentage of

    software projects fail because the developers fail to realize that it doesn't

    matter how much time and planning a development team puts into creating software

    if nobody in an organization ends up using it. People are often resistant to

    change and avoid venturing into an unfamiliar area, so as a part of the

    deployment phase, it is very important to have training classes for new clients

    of your software.

    Maintenance and enhancing software to cope with newly discoveredproblems or new requirements can take far more time than the initial development

    of the software. It may be necessary to add code that does not fit the original

    design to correct an unforeseen problem or it may be that a customer is

    requesting more functionality and code can be added to accommodate their

    requests. It is during this phase that customer calls come in and you see whether

    your testing was extensive enough to uncover the problems before customers do. If

    the labor cost of the maintenance phase exceeds 25% of the prior-phases' labor

    cost, then it is likely that the overall quality, of at least one prior phase, ispoor. In that case, management should consider the option of rebuilding the

    system (or portions) before maintenance cost is out of control.

    Bug Tracking Systemtools are often deployed at this stage of the

    process to allow development teams to interface with customer/field teams testing

    the software to identify any real or perceived issues. These software tools, both

    open source and commercially licensed, provide a customizable process to acquire,

    review, acknowledge, and respond to reported issues.

  • 8/8/2019 ICT Fundamentals Report

    48/49

    GROUP 1

    MEMBERS

    JAIME ARDEN E. OLBES

    ALGIE G. ALBURO

    JOSE LEO D. DICHOSO

    ARVIE PHILLIP A. LUDOVICE

    TRISHIA MAE A. GROSPE

    KEVIN E. ESPINEDA

    ALBERT D. ESPINAS

    ARNULFO M. VIRTUCIO

    ERNUEL RIGIE Q. REMPILLO

    RONNEL C. LORENZO

  • 8/8/2019 ICT Fundamentals Report

    49/49

    Thats All

    Folks!