DATA COMMUNICATION

We have discussed about networks and their basic terminologies. Certain important concepts about computer networks and the ways they are established were also described. However the question that what are mechanisms behind working of computer network or simply a network of computers?  was not answered. Now in this article we will be discussed all those criteria that are used for working of computer based information or data communication networks. In this discussion data communication is a most frequently used term. It is the process of data transmission from one computer to another across a network. This transmission of data involves sending and receiving data signals to or from other computers with the help of communication channels. Communication channels may be some sort of cable i.e. a telephone line or a wireless media such a microwave or a communication satellite link. The entire system responsible for such transmission of data among computers is called Data Communication System.
A data communication system involves a sender computer or device, channel encoder (or MODEM), a set of specific type of communication channel, channel decoder (or MODEM) and the receiving computer or device. The word device means that data communication phenomena is a very wide concept that is not limited to computer networks only rather this term may be used for any type of communication e.g. radio or television transmission, telephonic calls, mobile communications and so many other types of transmissions. The diagram representation of a typical data communication system may be given as under:


The following steps are accomplished during this communication:

  • Sender forwards data signals to channels encoder. These signals are in digital form at this time. 
  • The channel encoder converts signals from digital to a form which can pass through channels.
  • Communication channel passes the encoded data signals from sender point to receiver point.
  • Channel decoder again converts signals of data from channel-encoded form into digital form which is understandable for receiving computer.
  • The decoded signals of data are passed to receiving computer.

Analogue & Digital Data:

Computer is capable to process the digital and analogue data. Let us see basic differences between these two types of data. Analogue data means data in a continuous wave from so that there are infinite points between any two positions on the wave. Analogue data is not cent percent accurate as it is based on approximation however it can represent any measurement.
Digital data on the other hand is discrete in nature and there are zero points in between two well-known positions i.e. 0s and 1s. Accuracy in digital data is 100% however it can be used to represent certain mathematical measurements like infinity etc. Digital computer use digital data that is composed of binary 0s and 1s. However the transmission of digital data requires its conversion in to analogue form or another form that is capable to pass through channels of the networking media. This conversion is performed with the help of channels encoder that is shown in the above diagrammatic representation. At the receiver end, data is converted again to its digital form. Channel decoder performs this for decoding the data
Both the analogue and digital data are diagrammatically represented below:




Types of Data:

Another key factor that has its impacts on transmission of data is the size of data i.e. number of bits occupies by a specific amount of data. If a specific data occupies more bits in memory then its transmission will be time-consuming  and vice versa. Depending on transmission speed due to size there are four main types of data that can be communicated from one computer to another. These types are described one by one below.
    1. Textual Data:
      Textual or character data includes characters i.e. numbers, alphabets and symbols present on key board or coded into memory. This data include numbers from 0,1,2,3,4,5,6,7,8,9; alphabets from A,.............Z and a,.......................z and special character like +,_,*,/,(),{},[],^,;, and so on. Communication of textual data takes place within a short span of time because it doesn't increase the network traffic as compared to other types of data. The reason behind its fast transmission is that no extra information bits are required reason behind its fast transmission is that no extra information bits are required alongwith it there are some coding representation like ASCII and EBDIC for this type data. It can be easily represented in binary number system and this representation doesn't enlarge the number of bits too much.
    2. Graphical Data:
      Graphical data is composed of pixels. Pixels are tiny dots or computer screen and are called picture elements. These dots are plotted with specific colours to make a graphical image, textual effect or animation.There are thousands of pixels in a graphical shape and a very large number of information bits are associated with each pixel describing its colour code, coordinates on x-axis and y-axis of the screen and other features. The transmission of such data is slow due to large number extra information bits and requires a high capacity of medium to communicate it. This capacity of communication medium is called band width i.e. number of data bits transmitted per second. The reason for higher bandwidth is that extra information bits are needed which can represent pixels colours and location where they are to be plotted on the screen. Each pixel in the picture must have these information bits due to which the number of bits increases enormously for all pixels. Such a high number of bits considerably enhance the network traffic over communication medium.
    3. Phonic Data:This data may also be called voice or audio data and is most commonly communicated in case of voice chatting, telephone calls, radio or television news and mobile communication. Communication in this case demands more medium capacity or bandwidth as in addition to voice; bits representing the frequency or pitch of sound and loud or whispering voice are also needed.
    4. Video Data:
      This data include bits associated with live images, Video chatting taking place through cameras at sending and receiving points is a good example of communicating video data. In such circumstances; cameras at both sender and receiver ends catches continuously images of the persons or other objects in front and passes them to computers. These computers then communicate bits of video data to each other.
      As video data is composed of live images and a very huge amount of bits in needed for transmission of such data, the communication is very slow in case of conventional telephone lines. An ISDN or a DSL line is more suitable for the better transmission this type of data.

Data Encoding:

Data encoding and decoding are very important processes that are performed at the sender and receiver points of a data communication system respectively.  Data encoding may be called as compression or packing of data whereas decoding may be called as decompression or unpacking of data whereas decoding may be called as decompression or unpacking of data. Encoding and Decoding are opposite of each other.
Data encoding or compression is frequently used when transmitting large quantities of data thereby reducing of number of blocks transmitted and thus reducing the cost as well as the probability of transmission errors. It basically works by replacing the repeated bytes by one copy of the byte plus an count of the repetitions.  However there are many more compression techniques with many more complicated procedures involved within them.
Graphical images can also be compressed. In order to compress a black and white image that is coded as collection of 0s (for black) and 1s (for white), the combination 0s and 1s may simply be replaced with a set of integers with a set of integers representing the total number of 0s and 1s explicitly. For example a matrix of graphical representation with black and white pixels is given below. It is compressed as 9 0s and 16 1s.



Compression ranges from 90% or more down to 5% depending on the type of file and the amount of repetition of characters or blocks of spaces or colour etc. Utility programs such as PKZIP and PKUNZIP for compressing and decompressing files are readily available. The data is compressed or packed when it is forwarded to the communication channel from the sender whereas it is decompressed or unpacked when it is forwarded to the receiving computer. Two important benefits of data encoding or compression are:
    1. The packed data can be easily transmitted through all small bandwidth capacity of the medium and is mostly received in error free form at the receiving end of data communication system.
    2. If an illegal person attempts to steal the transmitted data, the compressed data will, not be understandable for him / her. It is due to the anonymous encoding of data that can't be decoded without the respective decoder.

Transmission Media:

Transmission media is a very important  component of data communication system. It provides channels for the transmission in the form of a network. Media is the plural of medium and thus communication media is a collection of different medium. Media are used for the exchange of data among computers. A network is established with the help of communication media. The media is composed of communication channels that are links between computers and are followed by the data signals during their flow from one computer to another one. There are two broad categories of communication or transmission media. These are described belo:
    1. Cabling System or Guided Media:A cabling system or guided media comprise cables-based data communication channels within a bounded area. Bounded area is the region confined by data communication capacities of specific cable media. Types of cabling has a major bearing on the network's speed, performance, cost and practically e.g. a very tick cable being much harder to lay in or along walls. Cabling system includes:

        1. Twisted Pair Cable (both shielded (STP) and unshielded (UTP),. The shield is made of aluminum or polyester and is covering the original cable. An example of this may be the telephone wire that is the cheapest but has slow transmission rates and suffers from Electro-Magnetic Interference(EMI) easily if it is a UTP. The copper wire is used to provide communication channels. Copper wire transmits the data in the form of pulses of electric current.

  Merits:
  • UTP has the lowest cost. STP is also less costly than thick coaxial and fiber optic cables.
  • The bandwidth capacity of STP is theoretically upto 500 MbPs, few can support 155 MBPS and most of them support 16 MbPS whereas aUTP can support 1-155 MbPS. MbPS stands for Mega Bits Per and MBPS for Mega Bytes Per Seconds.
  • The nod capacity of both STP and UTP cables is 2 computers.
In both UTP and STP cables, attenuation is 100 meters which means that the signal can travel without degradation up to 100 meters

Demerits:
    • UTP is very much susceptible to Electro-Magnetic Interface i.t. EMI however STP is less susceptible to EMI due to its shielding effect. Anyhow more or less, the EMI may may its susceptibility on both UTP and STP cable.
  • Coaxial Cable:Coaxial cables are high quality and well-installed cables. They can transmit data much faster and more accurately than twisted pair cables. The central cable shares a common axis and is therefore called coaxial or simply coax. There are two types of coaxial cables:
    1. Baseband Coaxial:Baseband coaxial carries one signal at a time. A bit of 0 or 1 value is sent by the presence or absence of voltage in the cable. Base band signals can travel very fast but can only be send over short distances. Over about 1000 feet, special booster equipments are needed for Baseband coaxial cables.
    2. Broadband Coaxial:Broadband coaxial can carry multiple signals on a fixed carrier wave, with signals for 0s and 1s send as variations on this wave. Data, Audio and Video transmission can take place simultaneously using broadband coaxial cables.
Merits:
    • Coaxial cables (also called Coax) are relatively inexpensive. Thin Coax is less expensive than STP however it is less expensive than fiber optic cable.
    • The installation is simple and it has higher potential of bandwidth capacity.
    • The node capacity depends on the type of coaxial cable. Thick Coax can connect 100 devices. Thin Coax such as RG-58 can afford 30 computers.
    • Attenuation of RG-8 that is used in thick Ethernet is 500 meters whereas the attenuation of RG-58 that is used in thin Ethernet is 185 meters.
Demerits:
    • Though coaxial cable offers much better resistance to EMI due to its shielding effect, even then the transmission speed is less than that of fiber optic cable,
  • Fiber Optics cables represent the latest technological developments, being very fine cables that can carry several hundred thousands voice communication simultaneously. A single fiber optic is a glass or hand transparent plastic having diameter equal to that of the human hair and it carries data in the form of pluses of light. A single fiber optic cable may contain thousands of fiber. The glass or plastic fiber is called a core and it has a cladding. Cladding protects the light traveling through core from external prismatic effects or any possible dispersion in the form of rainbow when the whether is rainy. These cables are capable of transmitting the data free of any Electro-Magnetic Interference (EMI) effecs
Merits:
  • Fiber optic cable can provide extremely high bandwidth capacity which ranges from 100 MbPS to GbPS (Giga bits Per Second).
  • Fiber optic has much lower attenuation because its light particle photon is chargeless and massless and can therefore transmit signals upto kilometers.
  • Fiber optic is not subject to EMI as light particles photons are chargeless.
'Demerits:
  • Though fiber optic is not subject to EMI, another problem that is known as the chromatic dispersion of light may occure due to the prismatic effects.
  • Fiber optic cable and associated equipment such as hubs and cards are highly expensive. 
  • Installation of fiber optic is much more diffixult because connections must be set carefully to avoid any loss of light in its path.Cabling System or Guided Media:

Wireless or UnGuided Media:

Cabling systems are used for communication wide a bounded area whereas using wireless or unguided media the data communication takes place across an unbounded area. In this case data communication is performed through waves such as:
  • Satellite Transmission using satellite-dish and communication satellite. It is possible to send the signals over very long distances. Communication satellites are placed about 22000 miles above the earth in Geo-Synchronous orbit. In this orbit these satellites continuously rotate with the earth. 
  • Microwaves Transmission is that type of transmission that takes place through microwaves are similar to Radio waves and can be used to transmit the data between microwaves stations. These microwaves travels in a straight line i.e. line of sight. Due to this reason the transmission distance between stations is limited to about 30 miles because of the earth surface's curature. The microwave stations are usually located at the hilltops or towers.
  • Mobile Communication takes place through mobile sets. In modern mobile sets there are a number of facilities like digital camera in addition to the voice transmission facilities. Now a days mobiles may be used for a number of purposes such as mobile E-commerce, mobile telephone set and mobile set digital cameras for the transmission of video data.

Role of MODEM in Data Communication:

In the very beginning  of this chapter, we have studied that a data communication system needs channel encoder and channel decoder at its sending and receiving ends. Proper equipments are required for these activities. Such equipment may be MODEM that means Modulator-Demodulator. These are computer hardware specified for communication through telephone ISDN lines and through fiber optics also (where available). Thus the type of MODEM strictly depends on the channels of communication medium.
The telephone lines were originally designed for speech that is transmitted in the analogue or waveform. In order to send digital data through telephone line, it is first converted (modulated) into analogue form at the sending end and after its transmission it is converted back ( demodulated) into its digital form at the receiving end. This conversion i.e. modulation and demodulation takes place with the help of a MODEM. MODEMs can transmit data at speeds between and about 40000 bits per second. Following are the main categories of a MODEM:

  • Internal MODEM is highly suitable for a standalone PC and it is fixed within the computer CPU.
  • External MODEM is used for a LAN and it is attached to the server for providing the Internet services to the entire network. It is more powerful in terms of transmission speed than internal modem but is also more expensive.
  • In the case of fiber optics the sending device must be equipped with a light source so that the transmission could occur, and the receiving device must be equipped with a photo sensitive cell (called photodiode) capable of translating the received light into current usable by a computer. The light source may be either a Light Emitting Diode (LED) or an Injection LASER Diode (ILD). This equipment may be considerably expensive but is high fast too.
  • ISDN MODEM is the most powerful and the most expensive MODEM having extremely high bandwidth and most suitable for video conferencing.

    A MODEM contains both the modulator and demodulator in it. As the Internet service is mostly available through connections to telephone lines in our country that is why a MODEM is basically used for connecting us to the Internet. The above diagrammatic representation is used for the phenomenon of modulation and demodulation through a MODEM.

Transmission Modes:

The term transmission mode used to define the direction of signal flow between two linked devices. Depending upon the time intervals in the process of transmission and the number of bits to be transmitted, following transmission modes are the common:
  1. Asynchronous Transmission Mode:
    In this mode the individual characters are transmitted a irregular intervals for example as soon as the user types them, they get transmitted. The bits representing individual characters are types them, they get transmitted. The bits representing individual characters are enclosed by start and stop bits. Parity bits are also added to the character code for providing a check against incorrect transmitted i.e. start bit, 7 bits for the character code (in case of 2or 128 characters), a parity bit and a stop bit. This mode of transmission is used for lower-speed transmission e.g. on a local area network consisting of a number of linked PCs. A major shortcoming of this data transmission mode is that start, stop and parity bits with every individual character considerably increase the network traffic and this mode is therefore not suitable for long-rang transmission of data..
    Here parity bit is a special bit that counts the numbers of 0s and 1s in the binary code of a character to be transmitted. Two types of parity may be even and odd parity e.g. in the 8-bit representation of a character, 10010011 has even parity of 0s as well as 1s whereas 110010011 has odd parity for 0s and 1s. This parity value is checked for verifying that if it remains the same after transmission as was before transmission then there is no transmission error at all however if the parity changes from even to odd or the number of 0s and 1s contained within the binary code changes, then the receiver requests sender to attempt for another transmission of same data as the current transmission was erroneous.
  2. Synchronous Transmission Mode:
    In this mode of data transmission the timing signals synchronize the transmission at the sending and receiving ends so that there is no need for start stop bits alongwith each individual character. However these start and stop bits may be used at the beginning and end of the whole block of character. This mode of transmission is more suitable for longer transmission like remote job entry however it requires more expensive and sophisticated equipments.\

Type of Transmission Modes:

Depending upon the direction of data transmission, the given types of data transmission are described one by one below:
  1. Simplex Transmission:
    Simplex transmission may also be called one-way transmission as it takes place only in a single direction. This type of transmission could be used in case when the sending devices such as temperature sensor never require a response from the receiving computer. Common examples of this type of transmission are television and radio transmissions that take place from their stations in one direction and are not responded to by a TV or radio set.
  2. Half Duplex Transmission:
    In this case data transmission may take place in both directions but not at the same time as for example Walkie-Talkie. This type of data transmission may mostly be found between central computer and their terminals.
  3. Full Duplex Transmission:
    In full duplex transmission data is sent in both directions at the same time such as phone calls. Most interactive computer applications use full duplex transmission of data.

COMPUTER NETWORK

Another key element of information technology is computer network. You know the information technology is the merger of computer and communications so that easy and quick information may be provided to the different users for their day-to-day task. Now a network is a source of communicating data or information among a set of computers either using some sort of cable or wireless media. In case of cable media, we will be using the communication channels of fiber optic cables or twisted pair cables (both shielded and unshielded or coaxial cables (including both thin and thick coax) and fiber optic. On the other hand, if wireless media is used for communication, then Satellite transmission, radio waves, infra-red waves, microwaves, mobile communication or any other such medium will be used to provide its channels for the communication of information.

A network may be defined as "the environment in which two or more computers are connected together with the help of certain specific media, which can transmit data and information to each other." As there are differences between data and information, the network that is responsible for the communication of information among a set of computers is called computer network whereas the one with the help of which simple data is communicated among inter-networked computer is called data communication network. As information technology specifically belongs to the delivery of information to users, computer networks are highly associated to this technology. A good example of computer network is the Internet and World Wide Web.

This is belongs to techniques of communication of information across an information network so that users in each section of a business organisation may be benefited. These communication techniques, their fundamentals and uses are discussed in the topic below.

  1. Technology of Workgroup Computing:
    Workgroup Computing is an important technique. It is used for communication of information within the boundaries of some business organisation. Using this technique, different departments of an organisation may have information in time. This technique is used to arrange a set of computers in a logical manner is such a way that this set is identified by a unique name. This unique name may be any name e.g. name of the organisation or some other proposed name. Due to workgroup computing, its members can access resources shared by other computers within the same workgroup.
    Each computer in a workgroup is responsible for its own security. An example of workgroup may be a network established among the different departments of an organisation e.g. a bank. One department can get benefit from information stored on workgroup member computer of another department of the same bank. Workgroup computing technology is very helpful in the communication of information through computer network. Thus sharing of information is easy for computer based information system. Some network operating system that are most appropriate for workgroup computing are Windows 95 and Windows 98.
  2. The Benefits of Email;
    One of several benefits that workgroup provides to its user is Email, which means electronic mail. Using this facility, the user of a workgroup can send or receive their messages regarding business or other interests of their employer / organisation. It is considerably beneficial when the organisation spread over a large area and direct meetings with one another are time consuming. Special websites of the Internet / World Wide Web servers are Yahoo, Hotmail, Lycos and so on.
    Using email facility, the users can:
    *     Send or receive messages to / from other users of computer networks.
    *     Attache important document, pictures, audios and videos with their mails and send them to other people living anywhere in the wold through Internet.
    *     Get the latest information about any topic of interest e.g. jobs, admission, market, sports, stock exchange and what so ever by having membership of specific newsgroup.
    There are many more benefits of Email, however using Email services the most important advantage is that information we want to send or receive may be transmitted within seconds across thousands of miles even from one continent to another in the world. The Email facility can be achieved through subscription to an Email server and making an account in it. This subscription takes place through a form that is provided by Email server filling and submitting which grants the user his / her Email account and address.
    Email is also called offline communication. The receiving person doesn't need to be online or connected to Internet at the time of Emailing rather he / she can receive the message after days or months as long as his / her email account exists. The Email message remains stored on the specified email server computer. The receiving person gets it as soon as he / she connects the Internet and opens his / her email account. Chatting on the other hand is an example of online communication of information. Both sending and receiving persons must be online during the chatting. It is therefore considered as direct communication among the users of a computer network.
  3. Internet:
    A good example of global computer is the Internet i.e. a network of almost all computer networks in the world. It is thus working as a huge computer network. It is considered as the backbone  of modern information technology. Now a days it contains World Wide Web (www) which is collection of several millions uploaded websites that exist in the world. These websites contain information about different fields of life. This information can be easily accessed if someone is connected to the Internet. The useful characteristics of Internet and World Wide Web are:
    *     Latest news about different matters of life may be obtained easily.
    *     Researchers are capable of reading the up[loaded research papers and other materials of scholars in a particular field to put forward their research work.
    *     Email and chatting may be used to send or receive instant messages to friends or relatives living far away in the world.
    *     Business companies are capable of advertising their products and services to the entire world.
    There are many more advantages of Internet but in short, Internet is a very cheap source of gaining the latest information about the world.
  4. LAN & WAN:
    One of the important considerations of establishing a computer network is that of area in which the network will perform it functions. On the basis of this, there are two different types of computer networks i.e. LAN stands for (Local Area Network) and WAN stands for (Wide Area Network).
    1. Local Area Network (LAN):
      A Local Area Network (abbreviated as LAN) is a collection of computers and peripherals that are usually connected together by cables and is confined or bounded to one building, site, campus or a city. A LAN offers a mean of pooling network resources and information between a number of users. A central mini computer or mainframe computer with a number of "dumb" terminals attached to it is one form of LAN, but the term is most frequently used to describe a number of interlinked Personal Computer (PCs), often with a more powerful computer controlling the network.

      A Local Area Network has several advantages over a collection of standalone minicomputers with respect to:
      *     Sharing of resources such as disk storage, printers and possibly a large powerful computer called server.
      *     Sharing of information held on disk drives that are accessible by all users of network.
      *     Sharing of installed software.
      *     Ability to communicate with other users on the network. This is not important when all computer are in the same room but can be very useful in case when the computers are distributed around a large building.

      Components of LAN:
      All LANs must have at least three basic components that are:
      1. Workstation which are actually PCs or terminals
      2. File Servers or Disk Servers, which are special PCs or larger computers. Shared software resources are stored on them including networking software for monitoring the entire network operations.
      3. Cabling and connection hardware link the computers together. A special interface card or printed circuit board has to be inserted into each computer on the network. This card is used to give a unique identity and allow it is interact with other computers of the network. This card is called Network Interface Card (NIC) or LAN Card.

        LAN may also have additional hardware such as printers and extra disk storage. Network printers are connected to computer designated as file server if files stored on it are shared by all other workstations. Each workstation on network may have its own processing power and disk storage (Floppy or Hard Disk) and printer but these are additional hardware.
    2. Wide Area Network (WAN):
      A Wide Area Network (abbreviated as WAN) is a network of computers over the wide geographical area possible across several continents. The communication may be via microwave or a satellite link. It also takes place through ordinary telephone lines or a computers from sender to receiver.
      The use of global networks (including Internet) has increased enormously over the past few years due to:
      *     Changeover the telephone networks from old-style analogue to high-speed digital-technology.
      *     Reduction in cost of connecting to and using networks.
      *     Improved compression techniques for faster transmission of text and graphics.
      The implementation of information supper highway is also expected in future. This will use a combination of telephone lines, satellite links, computer networks and multimedia to bring interactive two-way communication to many homes. The distinction between a television, a microcomputer and a telephone may become blurred when we cand ialup and download videos or TV programs on request, send electronic mail and browse the World Wide Web all from the same piece of equipment.
      Such a network that is capable to sup[port voice, video and computer data communication is called an Integrated Services Digital Network (abbreviated as ISDN). An ISDN needs high-speed digital connections with a high band width to send video data for example for Video Conferencing or net-meetings in real time. A category of ISDN now a days is a DSL (stands for Digital Subscriber Line) which provides a mean of faster transmission of Audio, Video and Textual data or information. It must be noted that ISDN or DSL connections are provided by Tele-communication organisations of a country such as PTCL in Pakistan on payment of very high charges. Thus these lines are highly expensive.
  5. Networking Concepts:
    Following are some of the important networking concepts that must be known for establishment of computer network:
    Client:
    A client may also be called terminal. It is an application installed on workstation computers which requests for services or resources from the network server. In some network operating system such as Windows NT and Windows 2000, these applications are called clients whereas in some others like UNIX or  LINUX, such applications are called terminals.
    Server:
    A server may also be called console. It is an application used to provide services or resources of computer network to client workstation on their requests. In Windows operating system, such computers on which servers are installed are called servers whereas from UNIX or LINUX point of view the are called consoles. As server computers are having various network resources and centeralised controls over the entire network, the entire client-server networks under the control of servers.
    Peers:
    Peers are servers as well as clients. The reason behind this is that in some operating systems, like Windows-95 or Windows 98, there is no central control due to absence of client and server applications. In such cases, the computers called peers share their resources in a cooperative manner. For example, if one peer has printer resource and the other one has scanner resource then these resources can be associatively shared between them.
    1. Network Modals:
      In the networking concepts we have discussed the different roles computers may play in a network. A network operating system also plays its vital rol to make a computer client, server or peer. Now depending on the types of network operating system and their network applications i.e. clients, servers or peers following are the different networking models:
      1. Client- Server Model:
        Different network operating system like Windows-NT, Windows 2000, UNIX and LINUX are used for client-server networks. Higher security measures and a centralised control of server on set of various network resources make the network strongly secure and safe for protection of information. However certain shortcomings also exist in client-server networks as such networks require the services of a network administrator for its proper look after. In case if server of the network fails due to any reason then entire network operations are badly suffered. Such networks are mostly used in a situation where security and privacy of data or information is a critical issue. Each user may have his / her rights of using the network. The network administrator gives these rights so that one user can't get the private data or information from account of another user without his / her permission.
      2. Peer-to-Peer Modal:
        Some operating systems like Windows-95 and Window-98 are used for working with such networks. There is a central control due to absence of server and client software. Each computer (peer) is a server with respect to its own resources and a client with respect to resources of another computer. All of administration work is on part of the users. Thus expensive services of a network administrator are not required. However the major shortcoming of peer-to-peer networking is that there is less security and privacy of data or information than client-server architecture.
      3. Hybrid Network Modal:
        The word hybrid means a mixture of two opposite qualities in one and the same thing. Now when both the client-server and peer-to-peer networking features exist in a network then such a network will be called hybrid network. The advantages of client-server network cancel the disadvantages of peer-to-peer may cancel the disadvantages of client-server whose services are still required due to the presence of client-server characteristics. Keep a network administrator may be expensive and that is a major drawback.
    2. Networking Standards:
      Standards are actually documented agreements containing technical specifications or other precise criteria to be used consistently as rules, guidelines or definition of characteristics in order to ensure that materials, products, processes and services are fit for their purposes. For example the format of credit cards, phone cards and smart cards are derive from International Standard Organisation (ISO). According to the standards for example 0.76mm thickness of card means that these cards can be used worldwide with same thickness. These International standards make life simple; increase the reliability and effectiveness of services and goods that we are using.
      Different types of network standards may be used. For example.
      *     The number of switches in a hub or router.
      *     Licensing criteria for the number of computers to use a specific network operating system.
      *     Standards for cable media or bandwidth of communication channels etc.
      These standards make networking more successful, efficient and reliable. Two wide categories of standards are:
      1. De Facto Standards:
        De fecto means "by fact" or "by convention". These standards are not approved by organised bodies however they have been adopted as standards through their widespread uses. De facto standards are often established originally by manufactures seeking to define the functionality of a new product or technology.
      2. De Jure Standards:
        De jure means "by law" or "by regulation" and as its name refers, these standards have been properly legislated by an officially recognised body.
        Certain famous standards making bodies or organisation are listed one by one below:
        • The International Standards Organisation (ISO) 
        • The International Telecommunication Union-Telecommunication Standards Sector (ITU-T, formerly the CCITT).
        • The American National Standards Institute (ANSI).
        • The Institute of Electrical and Electronic Engineers (IEEE).
        • The Electronic Industries Association (EIA) and
        • Telcordia.
    3. Network Typologies:
      The topology of a network may be defined as its physical layout i.e. the way in which computers and other equipment are connected. There are different basic layouts or typologies for networks. Following are the most commonly used typologies.

      1. Star Topology:
        Each node (computer or other device in star topology is connected to a central minicomputer which controls the network. Network signals travel from server to the stations along each individual station's cable. There is a polling system involved in which the file server pools each station in turn to see if it has a signal to send. The server then handles the signals as they are received. Star topology may also use a central platform in the form of a hub where cables from different computers are plugged and thus providing a mean of signal transmission.

        These individual stations connected to the central platforms are also called node or devices. The topology has following advantages over its other counterparts:
        1. If one cable fails then other stations are not affected by this failure.
        2. The performance of network is consistent even in case when the network is heavily used.
        3. There is no problem of collision among data signals as each station has its own individual cable to central platform i.e. server or hub.
        4. It is very easy to add new station to star network with out disrupting the network.
          Few  drawbacks may be found in this topology are:
          1. Entire network is badly suffered when central server fails.
          2. Cable cost increases due to a large number of cables from individual stations to a central server or hub.
      2. Bus Topology:
        A bus topology is that is which all of the devices or computers share a single cable. Information can be transmitted in either direction from any PC to any other. As several stations may want to transmit down the same line simultaneously, a popular scheme called "Ethernet" uses a collision system known as "Garrier Sense Multiple Access with Collision Detection" (abbreviated as CSMA-DC)to aviod collision among data signals. The mechanism of CSMA-CD is that before a station begins to transmit a signal of data, it conforms that the channel is not busy. In case when channel is busy, the station has to wait before transmission can begin. Once it begins transmission, it listens for other nodes which are beginning their transmission. IF the transmitted message collides with another transmitted message, both stations abort and wait for a random period of time before trying again. This all activity is controlled by the CSMA-CD protocol.
        The diagrammatic representation of a bus network is in figure below.
        In this diagram there are two terminators at the ends of cable connecting computers. These terminators are actually resistors and are used to absorb signal in case of ringing condition. Ringing condition arises when the signal send by a computer does not reach its target and thus creates disturbance in the network by moving here and there. The major advantages of this topology over other typologies are:
        1. It is very easy and inexpensive to install as it needs and the least amount of cable and is simple too.
        2. More stations or computer can easily be added without disrupting the network.
          The main shortcomings of this topology are given as:
        • The whole network goes down if main cable fails at any point.
        • Cable'e failure is difficult is isolate.
        • The network performance degrades under heavy loads.

          Ethernet is a famous real world network scheme of this topology. An Ethernet may be physically star or bus logically it is a bus and uses CSMA-CD for its working. Using this scheme only a single user can use the same communication line at a time and if there is a chance of collision then user has to wait till the line becomes clear for his / her data to be communicated. An example of this may be dialing a telephone number. If the phone line is busy mean that required phone number is engaged in communication then user may be to wait until that telephone connection line becomes free. In case when telephone line is engaged in communication there is a chance of collision. This is avoided by specific tone indicating that the phone line is busy in communication with someone else.
      3. Ring Topology:
        In ring network there is no central computer or hub. Each computer or station may communicate with any other in the ring with messages being specifically addressed to destination computer. A famous scheme called "token passing" is used in a token ring system. This scheme is used to pass a "message token" from one node to another one. A "message token" is actually a unique character sequence. Each node has a designated time a which it can removed token and adds message with address of the receiving node, sending node and some control bits. A receiving node i.e. computer or device acknowledges the receipt of a message by inverting a 1 bit field i.e. changes the bit from 1 to 0. The diagrammatic representation of ring network is given as under.

        The arrows show that flow of takes place in a single anti-clockwise direct in a ring. There is no collision among message tokens passing in a ring.|
        Certain advantages of ring network are:
        1. There is no dependence on a central computer or file server and each node controls transmission to / from itself.
        2. Transmission of messages around the ring is relative simple with messages traveling in a single anti-colckwise direction.
        3. Very high transmission rates are possible in ring networks.

          Few shortcoming that exist in this networking topology are:
        • The transmission between any two devices in network is disrupted with the breakdown of a single station. The reason is that each station regenerates the signal incase when it is not addressed for it.
        • The entire network is disrupted in order to add new stations to the ring network.

          Some real world networks based on this topology are Token-Ring and FDDI i.d. Fiber Distributed Data Interface. FDDI is implemented as a dual ring

      4. Mesh Topology:
        Mesh is that topology in which multiple links exist among network computers. Mesh networks may be found into one of the following types:

        1. True Mesh:
          In true mesh the total number of links for "n" computers are "n(n-1)2" and every two computers in this network are directly connected to each other. When the total number of computer "n" is 6 then there will be total 15 links among them as demonstrated in the following diagram.

          In this diagram representation there is a two-way communication of data across each link.
        2. Hybrid Mesh:
          In hybrid mesh total links are less then n(n-1)/2 for "n" computers. Each computer is not directly connected with each other computer in the network. If for example the total number of computers "n" is 6 and there are 9 links instead of 15 then such a network will be hybrid mesh.
          This topology is based on multiple links between any two computers in the network and it has the following major advantages over other typologies.
          1. Mesh network has high fault tolerance due to multiple links.
          2. Due to multiple links mesh network can work fine even under severe loads.
          3. Troubleshooting of mesh network is easy as compared to other networks. If data is not communicated between any two computers then it means that there is some fault in direct links between them.
            Some shortcomings of this topology are given below:

          • Cable cost is too high due to multiple links. This cable cost may even be more than a star network in case of true mesh network among a large number of computers.
          • It is also very difficult to maintain a true mesh for a large number of computers.


            Even Mesh networks are rare in real world due to their shortcomings however a good example of Mesh network is the Internet in which every computer can be connected to every other computer directly (if we are connected with Internet).
  6. Data Communication Protocol:
    Up till now, we have discussed about the different mechanisms that are used for data communication from one computer to another one. However there are also some software that take an active part in the communication of data. In order to allow equipments from different suppliers to be networked, a strict set of rules (protocols) has been devised covering standards of physical connections, cabling mode of transmission, speed, data format, error detection and correction etc. Any equipment that uses the same communication protocols can be connected together. In other words we can say that the data communication software used to control the transmission of data is called a protocol. Some common examples of protocols are TCP/IP (Transmission Control Protocol/Internet Protocol), FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol) and so on.
    Manufactures are gradually incorporating these standards in some of their products however it is unlikely that total standardisation will be achieved for sometime, if ever. Where two devices have different protocols they can sometimes communicate via  a protocol conversion computer.
    The OSI Reference Model:
    The working procedure of data communication protocols and other software can be fully described by OSI seven layers reference model. OSI seven layers reference model. OSI is a non-tangible model and is very useful in understanding how equipments from one manufacturer could be connected with totally different equipments from some other manufacturer. This model is under the process of development since 1977. OSI stands for Open System Interconnection and here the openness means that every detail about the working of the data communication software can be understood by studying this model. This model has devised a hierarchy of the following seven layers so that each layer is a service or procedure according to which the data to be communicated is processed and is forwarded to the lower level layers at the sending point or the higher level layer at the receiving point.
    The upper three layers of this model are called high-level layers as they are concerned with the software whereas the lower four layers are called low-level layers because they are concerned with the functions of different networking hardware. These layers are described one by one below in detail:
    1. Application Layer:
      It is the first high-level layer and is closest to the users. It is used for providing support to the phenomena of the transfer of information between end-users, application programs and devices. Several types of protocols that exist in this layer are covering specific and general applications such as accounting, entry control and user identification.
    2. Presentation Layer:
      This is the second high-level layer and accepts the processed data from application layer for further processing. The purpose of protocols in this layer is to ensure that different devices using data in different formats can communicate with each other for example, handling the conversion between ASCII and EBCDIC codes. It may also be used to carry out encryption to ensure the security of data during its transmission.
    3. Session Layer:
      This the third and last high-level layer of the OSI reference model and is actually the user interface to the network. When a user requests for a particular service from the network, this layer handles the dialogue.
    4. Transport Layer:
      This layer is the last low-level layer and fourth layer of the OSI reference model. This layer handles the data transmission between host computers by performing addressing and error controls to ensure a high quality data transmission service for the network.
    5. Network Layer:
      This the third low-level layer and fifth layer in the OSI reference model which has the function of performing tasks like routing of information around the network, connecting adjacent nodes in the network and also carrying out accounting functions to enable the network's owners to charge the users.
    6. Data Link Layer:
      This the second low-level and sixth layer of the OSI reference model. This layer is used to handle the data transmission errors caused by the corruption of data due to different types of interferences that affects physical data transmission media used in the networks. The techniques used for the receipt and acknowledgements of data by a receiver are handled through this layer.
    7. Physical Layer:
      This the last layer of OSI reference model and is the first low-level layer as it is closest to the hardware. This layer is concerned with standards for mechanical, electrical and procedural aspects of the interface devices. An example of such standards may be the number of pins contained within a network's connector. This layer is especially concerned with how the binary data is transmitted along the communication channels.
      The diagrammatic representation of this layer-by-layer architecture of entirely different networking products and the way data is sent and received by them is given as follows:
      1. OSI reference model gives a clear understanding about the working of communication software and equipments.
      2. OSI reference model when followed make different networking software capable to transmit their data with each other.
      3. This model provides a standard for the quality of communication between similar or different networking equipments.

BASIC OF INFORMATION TECHNOLOGY

Information Technology is the key to development s in the modern era of today's computerized world. It merges the computer and communications in order to make the easy availability of latest information to every one. Different business organizations may not work if they don't have the required data and information  for running their business activities. An example of this may be that an airline reservation company that may not be able to prepare the passengers list for its various flights if the required data about passengers is not available or a bank may never perform its banking functions without the data and information regarding its customers and other business perspectives.

As computer is a very important tool for quick and accurate production of our needed information, it is therefore the central topic of information technology, that how a computer performs its computation functions. The other element of IT is called communication, which actually means that how computers r receive the same from them.

In many business organizations, IT plays a significant role mostly in the form of computer based information system like Management Information System (MIS), Decision Support System (DSS), Executive Information System (EIS), Operational Information System (OIS) and so on. The detailed discussion about information system is out of the scope of this however the meanings of information technology may be clarified that is the technology based upon the use of computer based information system having the objective of easy and quick information production, distribution among its end-users, storage, retrieval and use. This information is obtained from the data collected from different data sources in many business organizations.

The benefits of Information Technology are highly adequate, challenging and outstanding. IT now a days is playing its role in almost all aspects of our social, national and international life affairs and in a very true sense, latest information is highly crucial for the betterment of a nation.

  1. Components of Computer System:
    A computer is not an ordinary machine but it is a complete functional system that exists due to the integration of two basic components i.e. hardware and software. Hardware is the physical component whereas software is the nonphysical component of the computer system. Here physical component means the one that can be seen and touched directly, where the adverse of this is the nonphysical i.e. the one which can not be seen and touched directly but can be found responsible for running the computer system. An example of this may be the living human body in which there is soul, wisdom, power and other characteristics that exist but can not be touched and seen physically. On the other hand, the different physical organs of the human body can seen and touched but they can't work without soul. In the similar way, computer system will be no more than collection of different equipments without the software. The basic definitions of these two components are given below:
    • Hardware is the collection all those parts of computer system, which are actually working during the processing of data to get information.
    • Software is a set of instructions (programs), which is responsible for monitoring the different tasks of the computer hardware during the processing of data into information.

      Command examples of hardware are processor. RAM, ROM, Hard Disk, Floppy Disk, Keyboard, Printer and so on. Whereas all those programs like operating system, device drivers, commands and computer programming languages etc, which are used to direct the computer hardware about the computational tasks that they perform, are examples of software. The types of hardware and software components will be studied in a great detail in the coming chapters of this book however ti will be better to discuss to main categories of computer hardware and software so that one could be able to understand the way in which the computer system is working.
    1. Main Categories of Computer Hardware:
      Computer hardware falls into the following main categories:

      • Processor
      • Main Memory composed of RAM & ROM
      • Secondary Memory composed of mass storage devices such as Hard Disk, Floppy Disk, Magnetic Disk, Compact Disk (CD), USB (Flash or Data Traveler)
      • Input and Output devices like Keyboard, Mouse Printer, Scanner, Digital Camera, Microphone, Speaker and so on.
      • Sources of interconnections among the above four components e.g. ports, buses, cables and connectors etc.
      • Other networking hardware used to connect one computer with another one, such as MODEM, Bridge, Router, Hub, different types of cable media and so on.

        In these categories of computer hardware, the above 5 categories are highly necessary for a computer system in a working condition whereas the last category of hardware is required only in case of establishing a computer network. The first 3 categories of hardware are contained within the Central Processing Unit (abbreviated as CPU box) whereas the Input and Output devices are out of the CPU box and are connected to it through their cables. The main memory which is composed of RAM and ROM is directly connected with the computer processor and is thus called online to the processor whereas the mass/secondary storage and Input / Output devices are connected to the processor through main memory especially through RAM and are therefore called peripheral devices or offline to processor. 


        In the above figure, the bi-directional arrows mean the transfer of data in both directions whereas the unidirectional arrows mean the transfer of data in just single direction. The way in which the computer work may be described in the following steps:
        1. Data is sent into RAM (Random Access Memory) from the input devices. 
        2. For processing, the data present in RAM is given to the processor from where it is sent back to RAM after necessary processing.
        3. Data can also be stored permanently in secondary memory (if required) from where it can be retrieved back into the RAM.
        4. The output i.e. information obtained after the processing of data can be displayed through output devices.
    2. Main Categories of Computer Software:
      There are two broad categories of computer software, which are described one by one below:
      • System Software runs and monitors various hardware devices during their functions. The orientation of system software is towards the computer hardare and makes it available to the computer users for their computation tasks.
      • Application Software or  packages are used for working in a particular area of application like Engineering, Graphics, Documentation, Accounting and so on. These software are applicable only in their specific field of application and can't be used everywhere.
    3. Data and Information:
      The basic objective of hardware and software component of a working computer system is that they process the data accepted as input and convert it into output called information. If hardware performs actual computational work, software directs computer hardware about the way to perform.

      The difference between data and information is that data is just a collection raw facts and figures and it can't be used for decision making whereas information the processed form of data on the basis of which one can make decisions. Data is input to the computer where information is output from the computer system. An example of this may be the data obtained from admission forms of students. The college administration can't decide about which students should be admitted and which not on the basis of this data. However if this data is properly processed according to a set of procedure (software), the clerical staff and machinery equipment (hardware), it is converted into students merit list on the basis of which one can easily decide about student admission. This transformation of data into information is the basic goal of a computer based information system comprising necessary hardware and software components.
  2. Input & Output Devices:
    As a computer system processes the data i.e. raw facts and figures into their information products, specific devices are used for input of data and display or output of information. These enable the computer system to interact with its users. These devices are also called input/output peripherals. Examples of input devices are keyboard, mouse, jay-stick, scanner, digital camera and microphone etc whereas common examples of output devices are monitor, printer, plotter and speaker etc. 
  3. Operating System and Computer Programs:
    The data that is input to computer system may be processed and transformed into information products. These computational activities of data input, processing and information output are performed with the help of various hardware devices under the supervision of a set of computer programs i.e. operating system and other application or system software. An operating system is the most significant kind of system software that contains certain distinctive characteristics like:
    • Managing the software and hardware resources of the computer system.
    • Controlling the functionalities of all hardware and software resources in addition to their management.
    • Providing user-friendly interfaces that enable users to operate the compute system.A system software that is equipped with all of such feathers will be an operating system however if any of these features is missing within a system software then it will be an ordinary system software or an application software have their important roles in the computational activities of transforming data into information.
  4. Data Storage and Memory:
    Storage of data is important computational process that is carried out in order to use the data for future needs. Two types of data memories are associated with the data storage i.e. primary memory (RAM & ROM) and secondary memory (Hard Disk, Floppy Disk, and Magnetic Tape etc). The former i.e. primary memory also called internal memory is online to the processor and is composed of RAM and ROM. RAM is the only part of the primary memory that can be used for storing the users data temporarily whereas ROM can't be used for storage of user data as it is read only and we are unable to write or store our data into the ROM. On the other hand RAM (Random Access Memory) also called Read/Write Memory may be used to store the data temporarily as long as the computer is on. As soon as the computer system is shutdown, the data present into the RAM is washed away. RAM is the only way of users data to the processor because processor is directly connected to RAM and picks data from RAM to process it.
    The other type of computer memory is called secondary memory or external memory or auxiliary memory or mass memory. It stores the data permanently with the help of magnetic mechanisms however unlike primary memory, it is connected to the processor through RAM i.e. the data from the secondary memory is carried to RAM before it is processed. That is why secondary storage is also an offline or peripheral device of the computer system.
    1. Basic Unit of Data Storage:
      The basic and smallest unit of computer memory is called bit that stands for binary  digits. As we know that computer internally represents its data in the form of binary zeros and ones, these bits are the primary sources of such representations. A bit may have two possible states i.e. 0 or 1. 0 is used for circuit off whereas 1 is used for circuit on. Thus a single bit may have two possible representation of data 0 and 1. Some other larger units of computer memory are given below:
      • Nibble:
        One nibble is the combination of 4 bits. It can have 16 possible representations of data as 24=16. An example is the Hexadecimal number system, which is composed of numbers from 0 i.e. 0000 to F i.e. 1111.
      • Byte:
        A byte may be defined as "the memory required to store a single alphanumeric character of data." Here alphanumeric character may be any digit from 0,1,2,3,.......0 or an alphabet from a to z or A to Z or any other special symbol like , : / ? + - * etc. A byte is a combination of 8 bits or 2  nibbles. As a single bit can have 21=2 possible representation i.e. 0 and 1, therefore a Byte i.e. a combination of 8 bits can 2=256 possible representations of data in the form of 0s and 1s.
        Some commercial units of data storage that are composed of bytes are described in the table below:
        Name of Unit
        Abbreviation
        Numbers of Bytes
        Kilo Byte
        KB
        (2)10
        Mega Byte
        MB
        (2)20
        Gega Byte
        GB
        (2)40
        Tera Byte
        TB
        (2)80

        Example: Calculate the total number of Bytes and Kilo Bytes in 256 MB of RAM.

        Solution:
        This problem can be solved as:

        Number of Bytes in 1 MB = 220 Bytes
        So total number of Bytes in 256 MB of RAM 256 x 220 Bytes = 268435456 Bytes
        Similarly, the number of Kilo Bytes within 1 MB =220 KB or 1024 KB
        So the total number of Kilo Bytes within 256 MB RAM = 256 x 1024 = 262144 KB
      • Word:
        A word is a combination of 2 Bytes. Some machine instructions need computer words comprising 16 bits. However the larger units that are composed of words are described in the table below:
        Name of Unit
        Abbreviation
        Number of words
        Number of Bytes
        Double Word
        DW
        2
        4
        Quad Word
        QW
        4
        8
        Double Quad Word
        DQ
        8
        16
        Example: Calculate the total number of Words, Double Words and Quad Words in a hard disk having a storage capacity of 40GB.
        Solution:
                       In order to solve this problem, we will have to find:
                      Total number of Bytes in 1 GB =  240 Bytes
                      Total number of Bytes in 40 GB = 40 x 240 Bytes
                      Number of Words contained in 2 Bytes = 1 W
                      Number of Words contained in 40 GB = 40 / 2 x 240 Words= 20 x 240 DW
        Similarly
                        Number of Double Words contained in 4 Bytes = 1 DW
                        Number of Double Words contained in 40 GB=4x240DW=10x240DW
        and in this way
                        Number of Quad words contained in 8 Bytes=1QW
                        Total number of QW in 40 GB=40/8x240QW=5x240QW
        Example: Calculate the total number of characters possibly represented by a single Byte.
        Solution:
        It is to be noted that one Byte can represent just a single alphanumeric character at a single time. As a character is a combination of 0s and 1s in binary form, this problem can be solved as:
                                  Total possible states of a single bite =2 i.e. 0 and 1
        This means that a single bit may represent 2possible states. Since a Byte is a combination of 8 bits in usual conditions, the total number of possible representation of 0s and 1s by a single Byte are 2representations. Thus 2or 256 possible representations characters may be represented by a single Byte, which in other words means that 256 characters may possibly be represented by a single Byte.
  5. System Development:
    After discussing the fundamental concepts about the computer system and its working. Lety us study computer based information system briefly. A system in a wide sense may be define as "an integration of components or parts linked together according to some specific scheme to achieve certain common objective". According to this definition, some systems are natural, some are man-made and some are computer based. Here emphasis is the computer based information system i.e. the system that uses computers and communication equipments for the delivery of information to the different levels of end-users in a business organisation. These computer based information system play and vital role in information technology and their potential uses are so many that will be out of the scope of this discussion. However a brief overview of computer based information system development is useful to know how the software development process for an information system is performed.

    Developing an information system is not an easy task rather it may be troublesome in some respects as it involves several distinct phases each of which must be completed before a subsequent task can begin. For this purpose, the system development life cycle is adopted so that a successful information system may be achieved. A system development life cycle is a repetitive process in which a system may be created, upgraded, matured, in its operations and may die  with the introduction of new hardware and software technologies, environmental changes (like government policies or customer demands) and so the introduction of a new information system before. The system development life cycle is composed of the following phases:

    1. Problem Definition: 
      It is also called problem identification and is somewhat similar to the famous saying that necessity is the mother of invention and it tend to find out the problem and its reasons that motivate the huge projection of information system development. This is the first and the most crucial step in system development. The whole system depends upon this step because the actual problem due to which the system development is initiated is identified in this step and all of the future work will be correct if the definition of the problem is correct or otherwise all of the future efforts, money, time and other assets used for development will be wasted. The reason behind the dependence of system development will be wasted. The reason behind the dependence of system development on correct problem definition is that if a problem is correctly identified, it means that it has been solved almost about 50% and the rest of the solution will depend upon the practical work in correct direction whereas if a problem is identified with inaccuracy in its definition then it means that the direction of solution is wrong from its very beginning and the process of system development will miss its target if continued this way.
      The reasons behind problem definition and new system development may be:

      *     Current system is difficult to use.
      *     Current system doesn't work according to the expectation of its users or it is producing inaccurate result.
      *     The current system needs to be improved for making it more efficient.

      Once any of such things happens and the problem is realised, the system analyst is requested for change in the current system improve its outcome. The system analyst begins a preliminary investigation to find out the problem and its sources accurately. The definition of the problem results into the submission of report that is put before the management of the business organisation and about problem definition may contain.

      *     The correct definition of the problem.
      *     The rough cost estimation for solution to the problem.
      *     The amount of time taken by this development project or project duration.
      *     Staff required e.g. programmers, project managers, operators and so on.
      *     The hardware and software technologies needed.

      On the basis of this report, management of the organisation may decide whether to approve the development project or not.
    2. Analysis:
      When the authorities or management of the business organisation take a decision to proceed with the solution of the problem, the next step is to thoroughly investigate the entire current information system. The system analyst has to work very close to people directly facing the problem and finds out how it can be solved. In this phase, the present system is studied in depth to collect all the available information about the current system. The most commonly used techniques are:
      • Review of Existing Records:
        This means that all the available written or computer-stored material about current system may be collected and studied.
      • Interviews:
        An interview is the face-to-face communication between two persons. It can be used to arrange meetings with the users of current system. It may be very useful as it produces upto-date information that can not be documented officially. The system analyst may also be able to judge the truth of answers from expressions of the interviewee.
      • Questionnaire:
        In this technique, a set of proposed questions with a proper space among them is arranged for the collection of information about the current system. It is usually used in case when the business organisation is spreaded over a wide geographical area and interviews take a lot of time and cost.
      • Observation:
        As its name indicates, it is that technique with the help of which it is observed that what people at a place e.g. in the different sections of business organisation are doing and what actions are taking place over there. This means that we have to observe the people at work. This is very useful in checking the truth of information collected through interviews and questionnaires.
        After all the information is collected about the system, the system analyst has to analyse the information and purpose a set of solutions to the problem. A typical solution may include:
        *     What should be the output given by the system?
        *     What should be input into the system?
        *     What should be the hardware and software of the system?
        *     What tools are needed for the system?
        Throughout analysis the focus remains on "What the system must do?" and "How the system is to be developed?" After all the solutions are defined, these are given to organisation for selecting the best possible solution. These solutions are identified on the basis of constraints, budgets, resources and schedule of the organisation.
    3. Design:
      In this phase the project team develops software for information system. The best solution selected from the set of alternative solution or candidates found in analysis phase and is programmed. Here emphasis is the practical or physical design of solution to the problem. This design include input design, process design, file design and output design i.e. the different component of the information system are designed in this phase. There are two types of system design.
      • Logical Design:
        In which different algorithms and system flowcharts are designed. One has a clear understanding about how proposed information system will perform its functions and how it will be free of the problems existing in the current system. This design is very important because it provides a road map for the proposed information system to work and it also has its impacts on the later coming physical design so great care must be taken in logical design.
      • Physical Design:
        Physical design or coding in which software for proposed information system and its components is prepared in the light of algorithms and flowcharts obtained from logical design process. The outcome of physical is the information system software in its crude form. The actual work of information system development takes place in this phase to create a newly proposed system software solution in its practical form.
    4. Testing & Debugging:
      The newly created information system may contain serious bugs in it that need t be properly refined so that it may be able to smoothly handle the business activities of organisation. For this purpose, a detailed software testing criteria is adopted to check its quality, performance, speed and working in real world situations. The software is tested with dummy data and if it works correctly, it is recommended for other tests. If all the test are satisfactorily cleared then it is finally tested for acceptance. Successful clarification of this test will bring it into its practical implementation. Any weakness or bugs found in testing process are attempted to be removed and the system is properly refined to make it capable of working with original data of business organsiation.
    5. Implementation:
      In this phase of system development life cycle the system analyst and his/her project team puts the developed system into practice after thorough testing and debugging. Implementation may consist of several steps like purchase of necessary hardware and other materials required for system, installation of new hardware and software, conversion of data files to use them in the current system and so on.

      After installation conversion takes place, which is the process of moving from the old system to newly developed system. These conversion phenomena may be accomplished according to the following four methods:
      1. Direct Conversion:
        Direct Conversion or Abrupt Cutover is that method of conversion in which users immediately stop using the old system and begin using the new system. This method is fast but is highly risky and in case when some problem occurs in working of the new system, entire business of organisation will badly suffer and there will be no way to go back to use the old system for recovery.
      2. Parallel Conversion:
        Parallel Conversion is that method in which both new and old system are used for some time. Outputs of both of these systems are compared and in case if they match together, then we switch from the old system to the newly created information system. This method is safe but it is highly time consuming and expensive as the organisation has to run two systems at same time.
      3. Phased Changeover:
        Phased Changeover is the method of conversion into new system in a component-by-component fashion so that first component of the newly developed system is installed first and if it works accurately then the other components will be installed in sequence.
      4. Pilot Conversion:
        This method is adopted in case when organisation is spread over multiple locations. The newly developed system is tested in single pilot phase and if it works correctly then the entire organisation switches from old system to newly developed information system in all of its locations.

        It must be notified that proper training and personnel support play important role during the conversion or changover phenomena. These people deliver lectures, hands on training and computer training to the end-users of the newly developed system.
    6. Maintenance: 
      This phase is also called post-implementation as after the implementation of the new system, the Information System Department (i.e. the developers of new system continue to provide their support to the new system in order to ensure that it works properly. It involves:
      *     Corrections of errors that occur in the newly implemented system.
      *     Changes due to changes in the organisation.
      *     Changes or upgrades or improvements in the system.
      Post-implementation or maintenance guarantees the long life of the system in the business organisation and it ensures that the newly implemented system may work fine for longer times. A detailed documentation is also accomplished starting from problem definition to the post-implementation phases of system development life cycle so that it may provide detailed information about the system if at any time problems arise in the newly implemented system. This may be specifically helpful for other system analysts or IT professional (who will join the Information Department later on) to understand the newly implemented system and maybe capable of handling any problem in it.
      The system development life cycle is diagrammatically represented in figure below:


      From this diagrammatic representation of system development life cycle, it is clear that as soon as the newly implemented information system becomes old after a fixed period of its life, problems will arise in its operations. Consequently development of another information system becomes crucial. This process will again take a start from Problem Definition phase of the system development life cycle and will end at Post-Implementation or Maintenance phase. That is why system development is continuously repetitive or cyclic process that takes place over and over with the introduction of new hardware and software of computer system certain other factors.

THE IMPACT OF AI ON THE FUTURE OF HUMAN LIFE

Artificial Intelligence (AI) is rapidly transforming the world, and its influence will continue to grow in the coming decades. From healthca...