APPLICATION AND USES OF COMPUTER

The advent of every technology may have its imp[acts that greatly change the life styles of people living in a human society. This is due to the reason that as science and technology are concerned, their development i.e. new discoveries and inventions have brought dramatic improvement in the way certain tasks were performed before. Thus we can give the example of atomic technology that can be used in a number of fields like atomic power houses to generate power, agricultural experiments to introduce with new highly productive seeds for certain crops, medical purposes like X-Rays and many other beneficial purposes.
As IT is a computer based technology that makes the latest information available to people almost about every field of their social, economic, political and cultural activities, it has been proven to be a great horizon in bringing the nations close to each other on global level. Like the two sides of a coin, each technology may have most of its merits alongwith more or less demerits and IT may also have the same. Now we discuss the basically concerned with various IT factors that may play their vital role for the betterment of human society.
Opportunities:
The uses of computers are so many that no one can deny from their opportunities for overcoming daily life problems. Yet we can talk about some areas in which computers are offering their major opportunities. Computer may have their opportunities in the following areas:
    1. Computer Based Training:
      Computer Based Training may be abbreviated at CBT and it means training through computer system. This may be a business PC or a terminal linked with a mini or mainframe computer system. It may be used to train people in several hundreds different skills from using a word processing package to learning how to fly a jumbo jet.
      Benefits of CBT: CBT may be having a lot of benefits few of which are given below:
      • A major benefit of CBT for an employer is cost. The employers don't have to pay for accommodations, traveling or salaries for the trainers while the staff attends a course. The investment in the suitable training package may quickly pay for itself especially in case when suitable hardware is already available.
      • An advantage from the staff members' point of view is that staff can train when they want, often at their own desks on the computer, which they will eventually be using. Without CBT, when the new members of staff join a company, they may have to wait until there are sufficient members to justify a course for them. With CBT, they can start on their training immediately.
      • Another advantage for students is that they can study at their own pace and repeat sections of materials that they find difficult. Some CBT products have build-in checks so that they can monitor the individual performance of each student.
      • Real life situations can be simulated and the student or trainee can learn without the danger of performing live experiments such as Aircraft simulator. Particular dangerous but rare situations such as the effects of ice forming on the wings in the sub-zero temperature can be modeled to give pilots experience without being in life threatening situation.
    2. Computer Aided Learning:
      Computer Aided Learning (abbreviated as CAL) packages are increasingly being used in schools, colleges and industry. These packages generally fall into one of the following categories:
      *     Tutorials
      *     Drills and Practice
      *     Simulation
      *     Games
      *     Test
      Many software packages have their tutorial disks which help users to learn the using of a software e.g. a spreadsheet tutorial disk puts a simple spreadsheet on the computer screen and instructs the users where to enter the given figures or labels and informs them in case when he/she is going wrong. A series of lessons guide the users through basic features of the spreadsheet.
      No amount of explaination in this case can act as a substitute for experience so the user has to look for the tutorials options on the spreadsheet, word processor or database and try them out. Some other tutorial packages include software to teach mathematics, languages, computing and certain other skills from dentistry to driving a car. 
    3. Authoring Software:
      Authoring packages such as Authorware Professional and Tencore are available which allow courseware designers to write sophisticated Interactive Multimedia Training System (abbreviated as IMTS). The term multimedia implies that the coursware will include some or all of the text, graphics, animated graphics sequences, video clips, scanned photographs and sound either tapped or synthesized. Authoring software allow to the programmer to:
      *     Quickly design screen layout and user-friendly interfaces including push buttons and 'hotspots' that the user can p[oint to using a mouse.
      *     Incorporate questions and IF-THEN-ELSE structure according to the answers given by the eventual users.
      *     Import graphics, sounds and video clips.
      *     Design animated graphics sequences.
      Designing and implementing such courseware is a length and expensive process, requiring a team of people including a subject matter expert, an instructional designer, graphics designer, a programmer and a project manager. An example of such a courseware may be a periodic table of elements using which the user can get chemistry related information about different elements and can also have a view over the atomic structure in a graphical form.
      Note:
      In order to implement an IMTS, a multimedia PC' is needed. This implies PC with a large hard disk ( as graphic images and sound use up huge amounts of disk space), lots of memory at least 8MB RAM, a sound card such as Sound Blaster and speakers for playing back sound, a high resolution screen with the ability to display about 32,000 colours and usually CD-ROM driver. Software such as Windows Media Player or video for Windows allows video clips to be replayed. In order to capture the video and digitize it, a video recorder needs to be connected to a computer with a video capture card, but no special hardware is required to replay the stored video clip.

    4. Computer in Education:
      Computer are increasingly being used in schools and educational institutions in five main areas
      *     As a teaching aid in many different subjects.
      *     To access the Internet and get information almost on any subject.
      *     In monitoring the progress and testing pupils.
      *     For Electronic Mailing purpose both inside the organisation and also to communicate with other organisations.
      *     For career advice or helping to find a place of admission in a college or university.
      *     Online results that can be highly useful for the students.
    5. Computer and the Disabled:
      New computer technology can dramatically improve the quality of life of disable people in order to enable them to communicate and increase their opportunities for independence and employment. Today there are systems based on PCs that can talk, listen, teach, communicate and translate. People with control over just an eyelid or a toe, for example can communicate by means of proper equipments attached to a PC. Some of such equipments are
      1. Voice Synthesizer:
        These are special equipments manufactured which those people can use to learn how to speak? who are either unable to speak or have become profoundly deaf from an early age. IBM's Speech Viewer software runs on a PC and consists of twelve modules accessible from a main menu. It is a tool for speech therapists and teachers of the deaf. It provides visual feedback on a screen for elements of speech such as loudness, pitch and timing. This enables people who have speech disorders or impaired hearing to see visual representations of their speech. Patterning modules use graphical displays so that the students can match their speech with the correct patterns.
        For people who are unable to speak, a wide variety of speech synthesizers have revolutionized their ability to achieve and communicate their full potential. A different type of device called "Touch Talker" is available to help disable people of all ages and abilities. It consists of portable computer in the form of a 'table' about 13 by 9, onto which different picture overlays can be placed. The computer enable the users to store information their choices and recall it at will to be spoken by the voice synthesizer.
      2. Computer for People with Severely limited movements:
        Devices such as 'Touch Talkers' are also designed for people without capabilities who have a simple body movement that can be utilized e.g. head movement, brow wrinkle or the raising of a finger or a knee. Letters from the users of these devices testify to the dramatic improvement they can bring to a disabled person's life.
        Special word processing packages are available for the people who can not easily type at a keyboard. In one such package, a cursor moves down a grid of letters and the user indicates when it is opposite of the row with the desired letter. The cursor then moves along this row until the user selects a letter, which is then displayed in the different area of the screen. At this point, the computer starts to gusess the word or phrase. If "th" has been typed, the computer might guess "thank you" or "the" or "they" etc and the user can confirm it or select the next character.
      3. Computer for the Blind:
        There are some interesting system for enabling the blind and visually impaired people to read screens and written text. One such device is called 'Optacon' which is a compact, portable reading system which converts images of the printed letter or symbol into a tactile form that can be felt with one's finger.
        Different types of styles, symbols and languages can be read into the Optacon because it reproduces exactly what is printed in enlarged vibrating form, which is felt as a "buzzing" sensation by a user. A special attachment on a type-writer enables a blind person to read what is being typed and other lens modules allow a VDU screen or a calculator to be read. Access to terminals by blind people has opened up an enormous number of job opportunities, as well as enabling them to carry out everyday tasks such as reading a bill or bank statement, recipe book or telephone directory.
    6. Telecommunication Equipment:
      Electronic mail and chatting are useful alternatives to the telephone for deaf people. Profoundly deaf people can also communicate using the text terminals, typing a message to another person with similar equipment and seeing both the incoming and outgoing messages displayed on the screen. Fax (facsimile transmission is another example of visual image transmission.
      A system in which a video camera and digitiser is connected to a telephone line, so that a person can communicate over the p[hone with someone who has the similar equipment using sign language or lip-reading. The digitised picture of the person's hand or face is sent down the telephone line and displayed on the receiver screen.
    7. Computer Aided Design and Manufacture:
      Computer Aided Design (abbreviated as CAD) systems generally consist of complete hardware and software packages, ranging from microcomputers to sophisticated systems used in aircraft. These system act as tools for the designers, not replacing their skills but aiding them in the fast and accurate production of drawings. The benefits of CAD can be summed up as accuracy, repeatability, speed and flexibility of production. In the similar fashion, Computer Aided Manufacture (abbreviated as CAM) packages may be used to control and monitor the automatic manufacturing processes like assembling the parts of arms in an ordinance factory.
    8. Computers in Industry:
      Special purpose computers are used in industry to control all of the manufacturing process. These computers are specified for the only purpose for which they are made. Special purpose computers not only monitor all the manufacture process but also check the quality and accuracy of the manufactured process but also check the quality and accuracy of the manufactured products. In case of industry based, on robot system, all of the robotic controls are given to these computers. These computers have been found very efficient where they are under usage. 
    9. Computer in Office:
      The advent of personal computers PCs has brought about a revolution in office life. Following are some important features of an electronic office:
      • Word processing and Desktop publishing allows easy editing and retrieval of documents as well as the production of high quality newsletters, brochures or manuals within the organisation where previously the work would have to have been sent out to a printer for layout and typesetting. Scanners may be used to capture graphics, photographs or text from other resources.
      • Database have largely replaced manual filing systems, providing fast and easy access to information that in the past would have been time consuming or impossible to obtain.
      • Spreadsheets, accounting software, job scheduling software and numerous other application packages have made the job of planing, budgeting, monitoring and accurate record keeping far easier.
      • Local Area Networks means that people can share software, data and hardware such as MODEM, LASER printers and so on.
      • Wide Area Networks allow people to communicate across the world via electronic mail and access online databases any where in the world.
      • Video Conferencing enables people in different location perhaps on the other side of the world to hold meetings and be able to see each other on their PC screens. A video camera at each end captures the image and transmits it to the person at the other end via a MODEM and a phone link, while a microphone captures the sound and transmits it simultaneously. Compression Techniques and ISDN or DSL lines are needed to be able to send the video images in the real time.
    10. The Impacts of Internet:
      Several social benefits of Internet are:
      • Electronic Mail and Chatting to send instant images quickly.
      • Newsgroups providing latest news providing latest news on almost any topic.
      • Files of software, photographs, games etc can be download one's own hard disk.
      • Electronic shopping and Banking called E-Business & E-Commerce respectively.
      • Access to online databases all over the world via a "Web Browser" like "Internet Explorer".
Impacts of IT on Society:
Nos one it the modern society is unaffected by the computer. In the supermarkets, banks, libraries, hospitals, travel agencies and so one, we have their presence for granted. Computerised bills and statements, personalised letters inviting us to participate in the different activities of live both nationally and internationally reminds us that our names are store on computer databases all over the world. Different types of computised system are encountered in every day life such as.
*     PCs used in homes and small offices or business.
*     Portable Laptops that can be very easily kept in a brief case and used anywhere.
*    Mini and  Mainframe computers used in larger and commercial business and offices such as stock exchange.
*     Different special-purpose and general-purpose computers used in industry for production, monitoring, control and efficient record keeping.
*     Internet is used in education, business, research and many other fields.
*     Super Computers can perform very amount of tedious computation in the least span of time usually Pico second. These computers are mostly used by government agencies for very sensitive operation like firing a Missile, Rocket-space mission and so on.

These computers are not used to replace the employees at all rather they are used to assist their users as they can::
*     Produce accurate results without time-consuming.
*     Provide greater security to stored data or information.
*     Repeat a tedious process over and over for any number of times.
*    Greatly help the users to decrease their burden of work.

Computer Assistance in Simplifying our work practices:
Now a days a field may hardly be found in existence where computer is not applicable. Computers are intelligent amplifiers that perform operations on data in a more efficient, faster and accurate manner. Thus it makes humans free to use their times in activities involving creativity and making decisions. Computers are capable to simplify our work practices in day-to-day tasks due to their certain characteristics that are listed one by one below:
  1. Speed:
    Computer was initially invented as a very high speed calculator and its further improvements helped in completing many scientific projects that were previously impossible. In normal life for example, we would have taken a lot of time in making the arrangements for our flights abroad if computers were not there to book our seats so fast and easily. This ability of getting our needed result so fast makes one capable to take action according to the circumstances in real time due to which real time computing is possible. Electrical pulses travel at incredible speeds and the computer being an electronic machine works on these pulses, so its speed is virtually instantaneous. When we are talking about speed of computations, we actually mean nano (10-9) second. A computer can add and subtract numbers, compare letters to determine alphabetical sequences, move and copy numbers and letters, store and retrieve data or information efficiently in the shortest span of time.
    As such there is nothing profound in computation operation. What is significant is the speed with which computers carry out these operations. One can imagine very well about the speed of the computers by fact that a computer can add two 18-digits long number in 3 to 4 nanoseconds. This means that it is capable of doing 3 million calculations per second. A small computer is capable to evaluate thousand of machine operations within a second.
  2. Accuracy:
    Computers are highly accurate in their operations. They seldom make mistakes. This accuracy is because of their physical circuits and due to the reason that their circuits have no mechanical parts. Even if the computers make mistakes, it might be due to bugs in programs or due to feeding incorrect data or poorly designed systems. The highly efficient error detecting techniques may be implemented to prevent it from producing inaccurate result.
  3. Storage:
    A human mind acquires some knowledge and after it has used it, it might keep it in its subconscious mind or might even forget it after some time.However computers are capable to store massive amounts of information. This information can be used and reused again and again for several years unless something goes wrong with the hardware or one erase it. Today computers have such disks that have the capacities of storing billions of characters. This is big enough to store a very huge encyclopedia, dozens of computer programs or applications, thousand recitations of the Holy Quran, huge databases, all the projects we have ever done in our life and much more. all types of necessary updating for the stored information are also facilitated in a computer system.
  4. Versatility:
    This means that computers are capable of performing any type of task, provided that the activity could be put into valid logical steps. It can be used in numerous application ranging from a simple world processor to huge business information systems. In today's world, it is difficult to imagine even a single field in which computer is not playing its key role.
  5. Automation:
    A computer is much more than just a calculator in which we need to give the instruction at every step. It is an intelligent electronic system which when programmed for any type of activity it keeps on doing it till it finishes without any human intervention.
  6. Diligence:
    Computer being a machine never shows any signs of fatigue, tiredness, lack of concentration or lost of interest during its computation operations. The speed, accuracy and quality would be absolutely the same in first and last calculation, even in case when a computer performs millions of calculation. Computers will never complain even once that they are bored of the over and over repetitive operation as humans do. Thus it is the best especially for monotonous and voluminous work to assist humans in performing their tedious task.
  7. Reliability:
    Generally the computer output is highly reliable subject to the condition that the input given to the computer is correct and the program of instruction is also reliable and correct. Incorrect data input and unreliable programs gives us computer errors and wrong result. These qualities of computers make them reliable and also make us too dependent on them. They can be run for years without any loss of data or any other problem.
    Although there are many characteristics of computers, the only limitation one could find is that computers are not creative by themselves. They are designed and run by human only. They might make the exact copy of Picasso's paintings but actually can't give the world their original creations. They might printout numberless books of Shakespeare but can never write anything on its own. They might replicate the Taj Mahal, seventh wounder of the world but will never be able to create architecture like that without being operated by humans. Thus we must be happy for that as human beings, we are still superior to computers because of our God gifted qualities.


DATA COMMUNICATION

We have discussed about networks and their basic terminologies. Certain important concepts about computer networks and the ways they are established were also described. However the question that what are mechanisms behind working of computer network or simply a network of computers?  was not answered. Now in this article we will be discussed all those criteria that are used for working of computer based information or data communication networks. In this discussion data communication is a most frequently used term. It is the process of data transmission from one computer to another across a network. This transmission of data involves sending and receiving data signals to or from other computers with the help of communication channels. Communication channels may be some sort of cable i.e. a telephone line or a wireless media such a microwave or a communication satellite link. The entire system responsible for such transmission of data among computers is called Data Communication System.
A data communication system involves a sender computer or device, channel encoder (or MODEM), a set of specific type of communication channel, channel decoder (or MODEM) and the receiving computer or device. The word device means that data communication phenomena is a very wide concept that is not limited to computer networks only rather this term may be used for any type of communication e.g. radio or television transmission, telephonic calls, mobile communications and so many other types of transmissions. The diagram representation of a typical data communication system may be given as under:


The following steps are accomplished during this communication:

  • Sender forwards data signals to channels encoder. These signals are in digital form at this time. 
  • The channel encoder converts signals from digital to a form which can pass through channels.
  • Communication channel passes the encoded data signals from sender point to receiver point.
  • Channel decoder again converts signals of data from channel-encoded form into digital form which is understandable for receiving computer.
  • The decoded signals of data are passed to receiving computer.

Analogue & Digital Data:

Computer is capable to process the digital and analogue data. Let us see basic differences between these two types of data. Analogue data means data in a continuous wave from so that there are infinite points between any two positions on the wave. Analogue data is not cent percent accurate as it is based on approximation however it can represent any measurement.
Digital data on the other hand is discrete in nature and there are zero points in between two well-known positions i.e. 0s and 1s. Accuracy in digital data is 100% however it can be used to represent certain mathematical measurements like infinity etc. Digital computer use digital data that is composed of binary 0s and 1s. However the transmission of digital data requires its conversion in to analogue form or another form that is capable to pass through channels of the networking media. This conversion is performed with the help of channels encoder that is shown in the above diagrammatic representation. At the receiver end, data is converted again to its digital form. Channel decoder performs this for decoding the data
Both the analogue and digital data are diagrammatically represented below:




Types of Data:

Another key factor that has its impacts on transmission of data is the size of data i.e. number of bits occupies by a specific amount of data. If a specific data occupies more bits in memory then its transmission will be time-consuming  and vice versa. Depending on transmission speed due to size there are four main types of data that can be communicated from one computer to another. These types are described one by one below.
    1. Textual Data:
      Textual or character data includes characters i.e. numbers, alphabets and symbols present on key board or coded into memory. This data include numbers from 0,1,2,3,4,5,6,7,8,9; alphabets from A,.............Z and a,.......................z and special character like +,_,*,/,(),{},[],^,;, and so on. Communication of textual data takes place within a short span of time because it doesn't increase the network traffic as compared to other types of data. The reason behind its fast transmission is that no extra information bits are required reason behind its fast transmission is that no extra information bits are required alongwith it there are some coding representation like ASCII and EBDIC for this type data. It can be easily represented in binary number system and this representation doesn't enlarge the number of bits too much.
    2. Graphical Data:
      Graphical data is composed of pixels. Pixels are tiny dots or computer screen and are called picture elements. These dots are plotted with specific colours to make a graphical image, textual effect or animation.There are thousands of pixels in a graphical shape and a very large number of information bits are associated with each pixel describing its colour code, coordinates on x-axis and y-axis of the screen and other features. The transmission of such data is slow due to large number extra information bits and requires a high capacity of medium to communicate it. This capacity of communication medium is called band width i.e. number of data bits transmitted per second. The reason for higher bandwidth is that extra information bits are needed which can represent pixels colours and location where they are to be plotted on the screen. Each pixel in the picture must have these information bits due to which the number of bits increases enormously for all pixels. Such a high number of bits considerably enhance the network traffic over communication medium.
    3. Phonic Data:This data may also be called voice or audio data and is most commonly communicated in case of voice chatting, telephone calls, radio or television news and mobile communication. Communication in this case demands more medium capacity or bandwidth as in addition to voice; bits representing the frequency or pitch of sound and loud or whispering voice are also needed.
    4. Video Data:
      This data include bits associated with live images, Video chatting taking place through cameras at sending and receiving points is a good example of communicating video data. In such circumstances; cameras at both sender and receiver ends catches continuously images of the persons or other objects in front and passes them to computers. These computers then communicate bits of video data to each other.
      As video data is composed of live images and a very huge amount of bits in needed for transmission of such data, the communication is very slow in case of conventional telephone lines. An ISDN or a DSL line is more suitable for the better transmission this type of data.

Data Encoding:

Data encoding and decoding are very important processes that are performed at the sender and receiver points of a data communication system respectively.  Data encoding may be called as compression or packing of data whereas decoding may be called as decompression or unpacking of data whereas decoding may be called as decompression or unpacking of data. Encoding and Decoding are opposite of each other.
Data encoding or compression is frequently used when transmitting large quantities of data thereby reducing of number of blocks transmitted and thus reducing the cost as well as the probability of transmission errors. It basically works by replacing the repeated bytes by one copy of the byte plus an count of the repetitions.  However there are many more compression techniques with many more complicated procedures involved within them.
Graphical images can also be compressed. In order to compress a black and white image that is coded as collection of 0s (for black) and 1s (for white), the combination 0s and 1s may simply be replaced with a set of integers with a set of integers representing the total number of 0s and 1s explicitly. For example a matrix of graphical representation with black and white pixels is given below. It is compressed as 9 0s and 16 1s.



Compression ranges from 90% or more down to 5% depending on the type of file and the amount of repetition of characters or blocks of spaces or colour etc. Utility programs such as PKZIP and PKUNZIP for compressing and decompressing files are readily available. The data is compressed or packed when it is forwarded to the communication channel from the sender whereas it is decompressed or unpacked when it is forwarded to the receiving computer. Two important benefits of data encoding or compression are:
    1. The packed data can be easily transmitted through all small bandwidth capacity of the medium and is mostly received in error free form at the receiving end of data communication system.
    2. If an illegal person attempts to steal the transmitted data, the compressed data will, not be understandable for him / her. It is due to the anonymous encoding of data that can't be decoded without the respective decoder.

Transmission Media:

Transmission media is a very important  component of data communication system. It provides channels for the transmission in the form of a network. Media is the plural of medium and thus communication media is a collection of different medium. Media are used for the exchange of data among computers. A network is established with the help of communication media. The media is composed of communication channels that are links between computers and are followed by the data signals during their flow from one computer to another one. There are two broad categories of communication or transmission media. These are described belo:
    1. Cabling System or Guided Media:A cabling system or guided media comprise cables-based data communication channels within a bounded area. Bounded area is the region confined by data communication capacities of specific cable media. Types of cabling has a major bearing on the network's speed, performance, cost and practically e.g. a very tick cable being much harder to lay in or along walls. Cabling system includes:

        1. Twisted Pair Cable (both shielded (STP) and unshielded (UTP),. The shield is made of aluminum or polyester and is covering the original cable. An example of this may be the telephone wire that is the cheapest but has slow transmission rates and suffers from Electro-Magnetic Interference(EMI) easily if it is a UTP. The copper wire is used to provide communication channels. Copper wire transmits the data in the form of pulses of electric current.

  Merits:
  • UTP has the lowest cost. STP is also less costly than thick coaxial and fiber optic cables.
  • The bandwidth capacity of STP is theoretically upto 500 MbPs, few can support 155 MBPS and most of them support 16 MbPS whereas aUTP can support 1-155 MbPS. MbPS stands for Mega Bits Per and MBPS for Mega Bytes Per Seconds.
  • The nod capacity of both STP and UTP cables is 2 computers.
In both UTP and STP cables, attenuation is 100 meters which means that the signal can travel without degradation up to 100 meters

Demerits:
    • UTP is very much susceptible to Electro-Magnetic Interface i.t. EMI however STP is less susceptible to EMI due to its shielding effect. Anyhow more or less, the EMI may may its susceptibility on both UTP and STP cable.
  • Coaxial Cable:Coaxial cables are high quality and well-installed cables. They can transmit data much faster and more accurately than twisted pair cables. The central cable shares a common axis and is therefore called coaxial or simply coax. There are two types of coaxial cables:
    1. Baseband Coaxial:Baseband coaxial carries one signal at a time. A bit of 0 or 1 value is sent by the presence or absence of voltage in the cable. Base band signals can travel very fast but can only be send over short distances. Over about 1000 feet, special booster equipments are needed for Baseband coaxial cables.
    2. Broadband Coaxial:Broadband coaxial can carry multiple signals on a fixed carrier wave, with signals for 0s and 1s send as variations on this wave. Data, Audio and Video transmission can take place simultaneously using broadband coaxial cables.
Merits:
    • Coaxial cables (also called Coax) are relatively inexpensive. Thin Coax is less expensive than STP however it is less expensive than fiber optic cable.
    • The installation is simple and it has higher potential of bandwidth capacity.
    • The node capacity depends on the type of coaxial cable. Thick Coax can connect 100 devices. Thin Coax such as RG-58 can afford 30 computers.
    • Attenuation of RG-8 that is used in thick Ethernet is 500 meters whereas the attenuation of RG-58 that is used in thin Ethernet is 185 meters.
Demerits:
    • Though coaxial cable offers much better resistance to EMI due to its shielding effect, even then the transmission speed is less than that of fiber optic cable,
  • Fiber Optics cables represent the latest technological developments, being very fine cables that can carry several hundred thousands voice communication simultaneously. A single fiber optic is a glass or hand transparent plastic having diameter equal to that of the human hair and it carries data in the form of pluses of light. A single fiber optic cable may contain thousands of fiber. The glass or plastic fiber is called a core and it has a cladding. Cladding protects the light traveling through core from external prismatic effects or any possible dispersion in the form of rainbow when the whether is rainy. These cables are capable of transmitting the data free of any Electro-Magnetic Interference (EMI) effecs
Merits:
  • Fiber optic cable can provide extremely high bandwidth capacity which ranges from 100 MbPS to GbPS (Giga bits Per Second).
  • Fiber optic has much lower attenuation because its light particle photon is chargeless and massless and can therefore transmit signals upto kilometers.
  • Fiber optic is not subject to EMI as light particles photons are chargeless.
'Demerits:
  • Though fiber optic is not subject to EMI, another problem that is known as the chromatic dispersion of light may occure due to the prismatic effects.
  • Fiber optic cable and associated equipment such as hubs and cards are highly expensive. 
  • Installation of fiber optic is much more diffixult because connections must be set carefully to avoid any loss of light in its path.Cabling System or Guided Media:

Wireless or UnGuided Media:

Cabling systems are used for communication wide a bounded area whereas using wireless or unguided media the data communication takes place across an unbounded area. In this case data communication is performed through waves such as:
  • Satellite Transmission using satellite-dish and communication satellite. It is possible to send the signals over very long distances. Communication satellites are placed about 22000 miles above the earth in Geo-Synchronous orbit. In this orbit these satellites continuously rotate with the earth. 
  • Microwaves Transmission is that type of transmission that takes place through microwaves are similar to Radio waves and can be used to transmit the data between microwaves stations. These microwaves travels in a straight line i.e. line of sight. Due to this reason the transmission distance between stations is limited to about 30 miles because of the earth surface's curature. The microwave stations are usually located at the hilltops or towers.
  • Mobile Communication takes place through mobile sets. In modern mobile sets there are a number of facilities like digital camera in addition to the voice transmission facilities. Now a days mobiles may be used for a number of purposes such as mobile E-commerce, mobile telephone set and mobile set digital cameras for the transmission of video data.

Role of MODEM in Data Communication:

In the very beginning  of this chapter, we have studied that a data communication system needs channel encoder and channel decoder at its sending and receiving ends. Proper equipments are required for these activities. Such equipment may be MODEM that means Modulator-Demodulator. These are computer hardware specified for communication through telephone ISDN lines and through fiber optics also (where available). Thus the type of MODEM strictly depends on the channels of communication medium.
The telephone lines were originally designed for speech that is transmitted in the analogue or waveform. In order to send digital data through telephone line, it is first converted (modulated) into analogue form at the sending end and after its transmission it is converted back ( demodulated) into its digital form at the receiving end. This conversion i.e. modulation and demodulation takes place with the help of a MODEM. MODEMs can transmit data at speeds between and about 40000 bits per second. Following are the main categories of a MODEM:

  • Internal MODEM is highly suitable for a standalone PC and it is fixed within the computer CPU.
  • External MODEM is used for a LAN and it is attached to the server for providing the Internet services to the entire network. It is more powerful in terms of transmission speed than internal modem but is also more expensive.
  • In the case of fiber optics the sending device must be equipped with a light source so that the transmission could occur, and the receiving device must be equipped with a photo sensitive cell (called photodiode) capable of translating the received light into current usable by a computer. The light source may be either a Light Emitting Diode (LED) or an Injection LASER Diode (ILD). This equipment may be considerably expensive but is high fast too.
  • ISDN MODEM is the most powerful and the most expensive MODEM having extremely high bandwidth and most suitable for video conferencing.

    A MODEM contains both the modulator and demodulator in it. As the Internet service is mostly available through connections to telephone lines in our country that is why a MODEM is basically used for connecting us to the Internet. The above diagrammatic representation is used for the phenomenon of modulation and demodulation through a MODEM.

Transmission Modes:

The term transmission mode used to define the direction of signal flow between two linked devices. Depending upon the time intervals in the process of transmission and the number of bits to be transmitted, following transmission modes are the common:
  1. Asynchronous Transmission Mode:
    In this mode the individual characters are transmitted a irregular intervals for example as soon as the user types them, they get transmitted. The bits representing individual characters are types them, they get transmitted. The bits representing individual characters are enclosed by start and stop bits. Parity bits are also added to the character code for providing a check against incorrect transmitted i.e. start bit, 7 bits for the character code (in case of 2or 128 characters), a parity bit and a stop bit. This mode of transmission is used for lower-speed transmission e.g. on a local area network consisting of a number of linked PCs. A major shortcoming of this data transmission mode is that start, stop and parity bits with every individual character considerably increase the network traffic and this mode is therefore not suitable for long-rang transmission of data..
    Here parity bit is a special bit that counts the numbers of 0s and 1s in the binary code of a character to be transmitted. Two types of parity may be even and odd parity e.g. in the 8-bit representation of a character, 10010011 has even parity of 0s as well as 1s whereas 110010011 has odd parity for 0s and 1s. This parity value is checked for verifying that if it remains the same after transmission as was before transmission then there is no transmission error at all however if the parity changes from even to odd or the number of 0s and 1s contained within the binary code changes, then the receiver requests sender to attempt for another transmission of same data as the current transmission was erroneous.
  2. Synchronous Transmission Mode:
    In this mode of data transmission the timing signals synchronize the transmission at the sending and receiving ends so that there is no need for start stop bits alongwith each individual character. However these start and stop bits may be used at the beginning and end of the whole block of character. This mode of transmission is more suitable for longer transmission like remote job entry however it requires more expensive and sophisticated equipments.\

Type of Transmission Modes:

Depending upon the direction of data transmission, the given types of data transmission are described one by one below:
  1. Simplex Transmission:
    Simplex transmission may also be called one-way transmission as it takes place only in a single direction. This type of transmission could be used in case when the sending devices such as temperature sensor never require a response from the receiving computer. Common examples of this type of transmission are television and radio transmissions that take place from their stations in one direction and are not responded to by a TV or radio set.
  2. Half Duplex Transmission:
    In this case data transmission may take place in both directions but not at the same time as for example Walkie-Talkie. This type of data transmission may mostly be found between central computer and their terminals.
  3. Full Duplex Transmission:
    In full duplex transmission data is sent in both directions at the same time such as phone calls. Most interactive computer applications use full duplex transmission of data.

COMPUTER NETWORK

Another key element of information technology is computer network. You know the information technology is the merger of computer and communications so that easy and quick information may be provided to the different users for their day-to-day task. Now a network is a source of communicating data or information among a set of computers either using some sort of cable or wireless media. In case of cable media, we will be using the communication channels of fiber optic cables or twisted pair cables (both shielded and unshielded or coaxial cables (including both thin and thick coax) and fiber optic. On the other hand, if wireless media is used for communication, then Satellite transmission, radio waves, infra-red waves, microwaves, mobile communication or any other such medium will be used to provide its channels for the communication of information.

A network may be defined as "the environment in which two or more computers are connected together with the help of certain specific media, which can transmit data and information to each other." As there are differences between data and information, the network that is responsible for the communication of information among a set of computers is called computer network whereas the one with the help of which simple data is communicated among inter-networked computer is called data communication network. As information technology specifically belongs to the delivery of information to users, computer networks are highly associated to this technology. A good example of computer network is the Internet and World Wide Web.

This is belongs to techniques of communication of information across an information network so that users in each section of a business organisation may be benefited. These communication techniques, their fundamentals and uses are discussed in the topic below.

  1. Technology of Workgroup Computing:
    Workgroup Computing is an important technique. It is used for communication of information within the boundaries of some business organisation. Using this technique, different departments of an organisation may have information in time. This technique is used to arrange a set of computers in a logical manner is such a way that this set is identified by a unique name. This unique name may be any name e.g. name of the organisation or some other proposed name. Due to workgroup computing, its members can access resources shared by other computers within the same workgroup.
    Each computer in a workgroup is responsible for its own security. An example of workgroup may be a network established among the different departments of an organisation e.g. a bank. One department can get benefit from information stored on workgroup member computer of another department of the same bank. Workgroup computing technology is very helpful in the communication of information through computer network. Thus sharing of information is easy for computer based information system. Some network operating system that are most appropriate for workgroup computing are Windows 95 and Windows 98.
  2. The Benefits of Email;
    One of several benefits that workgroup provides to its user is Email, which means electronic mail. Using this facility, the user of a workgroup can send or receive their messages regarding business or other interests of their employer / organisation. It is considerably beneficial when the organisation spread over a large area and direct meetings with one another are time consuming. Special websites of the Internet / World Wide Web servers are Yahoo, Hotmail, Lycos and so on.
    Using email facility, the users can:
    *     Send or receive messages to / from other users of computer networks.
    *     Attache important document, pictures, audios and videos with their mails and send them to other people living anywhere in the wold through Internet.
    *     Get the latest information about any topic of interest e.g. jobs, admission, market, sports, stock exchange and what so ever by having membership of specific newsgroup.
    There are many more benefits of Email, however using Email services the most important advantage is that information we want to send or receive may be transmitted within seconds across thousands of miles even from one continent to another in the world. The Email facility can be achieved through subscription to an Email server and making an account in it. This subscription takes place through a form that is provided by Email server filling and submitting which grants the user his / her Email account and address.
    Email is also called offline communication. The receiving person doesn't need to be online or connected to Internet at the time of Emailing rather he / she can receive the message after days or months as long as his / her email account exists. The Email message remains stored on the specified email server computer. The receiving person gets it as soon as he / she connects the Internet and opens his / her email account. Chatting on the other hand is an example of online communication of information. Both sending and receiving persons must be online during the chatting. It is therefore considered as direct communication among the users of a computer network.
  3. Internet:
    A good example of global computer is the Internet i.e. a network of almost all computer networks in the world. It is thus working as a huge computer network. It is considered as the backbone  of modern information technology. Now a days it contains World Wide Web (www) which is collection of several millions uploaded websites that exist in the world. These websites contain information about different fields of life. This information can be easily accessed if someone is connected to the Internet. The useful characteristics of Internet and World Wide Web are:
    *     Latest news about different matters of life may be obtained easily.
    *     Researchers are capable of reading the up[loaded research papers and other materials of scholars in a particular field to put forward their research work.
    *     Email and chatting may be used to send or receive instant messages to friends or relatives living far away in the world.
    *     Business companies are capable of advertising their products and services to the entire world.
    There are many more advantages of Internet but in short, Internet is a very cheap source of gaining the latest information about the world.
  4. LAN & WAN:
    One of the important considerations of establishing a computer network is that of area in which the network will perform it functions. On the basis of this, there are two different types of computer networks i.e. LAN stands for (Local Area Network) and WAN stands for (Wide Area Network).
    1. Local Area Network (LAN):
      A Local Area Network (abbreviated as LAN) is a collection of computers and peripherals that are usually connected together by cables and is confined or bounded to one building, site, campus or a city. A LAN offers a mean of pooling network resources and information between a number of users. A central mini computer or mainframe computer with a number of "dumb" terminals attached to it is one form of LAN, but the term is most frequently used to describe a number of interlinked Personal Computer (PCs), often with a more powerful computer controlling the network.

      A Local Area Network has several advantages over a collection of standalone minicomputers with respect to:
      *     Sharing of resources such as disk storage, printers and possibly a large powerful computer called server.
      *     Sharing of information held on disk drives that are accessible by all users of network.
      *     Sharing of installed software.
      *     Ability to communicate with other users on the network. This is not important when all computer are in the same room but can be very useful in case when the computers are distributed around a large building.

      Components of LAN:
      All LANs must have at least three basic components that are:
      1. Workstation which are actually PCs or terminals
      2. File Servers or Disk Servers, which are special PCs or larger computers. Shared software resources are stored on them including networking software for monitoring the entire network operations.
      3. Cabling and connection hardware link the computers together. A special interface card or printed circuit board has to be inserted into each computer on the network. This card is used to give a unique identity and allow it is interact with other computers of the network. This card is called Network Interface Card (NIC) or LAN Card.

        LAN may also have additional hardware such as printers and extra disk storage. Network printers are connected to computer designated as file server if files stored on it are shared by all other workstations. Each workstation on network may have its own processing power and disk storage (Floppy or Hard Disk) and printer but these are additional hardware.
    2. Wide Area Network (WAN):
      A Wide Area Network (abbreviated as WAN) is a network of computers over the wide geographical area possible across several continents. The communication may be via microwave or a satellite link. It also takes place through ordinary telephone lines or a computers from sender to receiver.
      The use of global networks (including Internet) has increased enormously over the past few years due to:
      *     Changeover the telephone networks from old-style analogue to high-speed digital-technology.
      *     Reduction in cost of connecting to and using networks.
      *     Improved compression techniques for faster transmission of text and graphics.
      The implementation of information supper highway is also expected in future. This will use a combination of telephone lines, satellite links, computer networks and multimedia to bring interactive two-way communication to many homes. The distinction between a television, a microcomputer and a telephone may become blurred when we cand ialup and download videos or TV programs on request, send electronic mail and browse the World Wide Web all from the same piece of equipment.
      Such a network that is capable to sup[port voice, video and computer data communication is called an Integrated Services Digital Network (abbreviated as ISDN). An ISDN needs high-speed digital connections with a high band width to send video data for example for Video Conferencing or net-meetings in real time. A category of ISDN now a days is a DSL (stands for Digital Subscriber Line) which provides a mean of faster transmission of Audio, Video and Textual data or information. It must be noted that ISDN or DSL connections are provided by Tele-communication organisations of a country such as PTCL in Pakistan on payment of very high charges. Thus these lines are highly expensive.
  5. Networking Concepts:
    Following are some of the important networking concepts that must be known for establishment of computer network:
    Client:
    A client may also be called terminal. It is an application installed on workstation computers which requests for services or resources from the network server. In some network operating system such as Windows NT and Windows 2000, these applications are called clients whereas in some others like UNIX or  LINUX, such applications are called terminals.
    Server:
    A server may also be called console. It is an application used to provide services or resources of computer network to client workstation on their requests. In Windows operating system, such computers on which servers are installed are called servers whereas from UNIX or LINUX point of view the are called consoles. As server computers are having various network resources and centeralised controls over the entire network, the entire client-server networks under the control of servers.
    Peers:
    Peers are servers as well as clients. The reason behind this is that in some operating systems, like Windows-95 or Windows 98, there is no central control due to absence of client and server applications. In such cases, the computers called peers share their resources in a cooperative manner. For example, if one peer has printer resource and the other one has scanner resource then these resources can be associatively shared between them.
    1. Network Modals:
      In the networking concepts we have discussed the different roles computers may play in a network. A network operating system also plays its vital rol to make a computer client, server or peer. Now depending on the types of network operating system and their network applications i.e. clients, servers or peers following are the different networking models:
      1. Client- Server Model:
        Different network operating system like Windows-NT, Windows 2000, UNIX and LINUX are used for client-server networks. Higher security measures and a centralised control of server on set of various network resources make the network strongly secure and safe for protection of information. However certain shortcomings also exist in client-server networks as such networks require the services of a network administrator for its proper look after. In case if server of the network fails due to any reason then entire network operations are badly suffered. Such networks are mostly used in a situation where security and privacy of data or information is a critical issue. Each user may have his / her rights of using the network. The network administrator gives these rights so that one user can't get the private data or information from account of another user without his / her permission.
      2. Peer-to-Peer Modal:
        Some operating systems like Windows-95 and Window-98 are used for working with such networks. There is a central control due to absence of server and client software. Each computer (peer) is a server with respect to its own resources and a client with respect to resources of another computer. All of administration work is on part of the users. Thus expensive services of a network administrator are not required. However the major shortcoming of peer-to-peer networking is that there is less security and privacy of data or information than client-server architecture.
      3. Hybrid Network Modal:
        The word hybrid means a mixture of two opposite qualities in one and the same thing. Now when both the client-server and peer-to-peer networking features exist in a network then such a network will be called hybrid network. The advantages of client-server network cancel the disadvantages of peer-to-peer may cancel the disadvantages of client-server whose services are still required due to the presence of client-server characteristics. Keep a network administrator may be expensive and that is a major drawback.
    2. Networking Standards:
      Standards are actually documented agreements containing technical specifications or other precise criteria to be used consistently as rules, guidelines or definition of characteristics in order to ensure that materials, products, processes and services are fit for their purposes. For example the format of credit cards, phone cards and smart cards are derive from International Standard Organisation (ISO). According to the standards for example 0.76mm thickness of card means that these cards can be used worldwide with same thickness. These International standards make life simple; increase the reliability and effectiveness of services and goods that we are using.
      Different types of network standards may be used. For example.
      *     The number of switches in a hub or router.
      *     Licensing criteria for the number of computers to use a specific network operating system.
      *     Standards for cable media or bandwidth of communication channels etc.
      These standards make networking more successful, efficient and reliable. Two wide categories of standards are:
      1. De Facto Standards:
        De fecto means "by fact" or "by convention". These standards are not approved by organised bodies however they have been adopted as standards through their widespread uses. De facto standards are often established originally by manufactures seeking to define the functionality of a new product or technology.
      2. De Jure Standards:
        De jure means "by law" or "by regulation" and as its name refers, these standards have been properly legislated by an officially recognised body.
        Certain famous standards making bodies or organisation are listed one by one below:
        • The International Standards Organisation (ISO) 
        • The International Telecommunication Union-Telecommunication Standards Sector (ITU-T, formerly the CCITT).
        • The American National Standards Institute (ANSI).
        • The Institute of Electrical and Electronic Engineers (IEEE).
        • The Electronic Industries Association (EIA) and
        • Telcordia.
    3. Network Typologies:
      The topology of a network may be defined as its physical layout i.e. the way in which computers and other equipment are connected. There are different basic layouts or typologies for networks. Following are the most commonly used typologies.

      1. Star Topology:
        Each node (computer or other device in star topology is connected to a central minicomputer which controls the network. Network signals travel from server to the stations along each individual station's cable. There is a polling system involved in which the file server pools each station in turn to see if it has a signal to send. The server then handles the signals as they are received. Star topology may also use a central platform in the form of a hub where cables from different computers are plugged and thus providing a mean of signal transmission.

        These individual stations connected to the central platforms are also called node or devices. The topology has following advantages over its other counterparts:
        1. If one cable fails then other stations are not affected by this failure.
        2. The performance of network is consistent even in case when the network is heavily used.
        3. There is no problem of collision among data signals as each station has its own individual cable to central platform i.e. server or hub.
        4. It is very easy to add new station to star network with out disrupting the network.
          Few  drawbacks may be found in this topology are:
          1. Entire network is badly suffered when central server fails.
          2. Cable cost increases due to a large number of cables from individual stations to a central server or hub.
      2. Bus Topology:
        A bus topology is that is which all of the devices or computers share a single cable. Information can be transmitted in either direction from any PC to any other. As several stations may want to transmit down the same line simultaneously, a popular scheme called "Ethernet" uses a collision system known as "Garrier Sense Multiple Access with Collision Detection" (abbreviated as CSMA-DC)to aviod collision among data signals. The mechanism of CSMA-CD is that before a station begins to transmit a signal of data, it conforms that the channel is not busy. In case when channel is busy, the station has to wait before transmission can begin. Once it begins transmission, it listens for other nodes which are beginning their transmission. IF the transmitted message collides with another transmitted message, both stations abort and wait for a random period of time before trying again. This all activity is controlled by the CSMA-CD protocol.
        The diagrammatic representation of a bus network is in figure below.
        In this diagram there are two terminators at the ends of cable connecting computers. These terminators are actually resistors and are used to absorb signal in case of ringing condition. Ringing condition arises when the signal send by a computer does not reach its target and thus creates disturbance in the network by moving here and there. The major advantages of this topology over other typologies are:
        1. It is very easy and inexpensive to install as it needs and the least amount of cable and is simple too.
        2. More stations or computer can easily be added without disrupting the network.
          The main shortcomings of this topology are given as:
        • The whole network goes down if main cable fails at any point.
        • Cable'e failure is difficult is isolate.
        • The network performance degrades under heavy loads.

          Ethernet is a famous real world network scheme of this topology. An Ethernet may be physically star or bus logically it is a bus and uses CSMA-CD for its working. Using this scheme only a single user can use the same communication line at a time and if there is a chance of collision then user has to wait till the line becomes clear for his / her data to be communicated. An example of this may be dialing a telephone number. If the phone line is busy mean that required phone number is engaged in communication then user may be to wait until that telephone connection line becomes free. In case when telephone line is engaged in communication there is a chance of collision. This is avoided by specific tone indicating that the phone line is busy in communication with someone else.
      3. Ring Topology:
        In ring network there is no central computer or hub. Each computer or station may communicate with any other in the ring with messages being specifically addressed to destination computer. A famous scheme called "token passing" is used in a token ring system. This scheme is used to pass a "message token" from one node to another one. A "message token" is actually a unique character sequence. Each node has a designated time a which it can removed token and adds message with address of the receiving node, sending node and some control bits. A receiving node i.e. computer or device acknowledges the receipt of a message by inverting a 1 bit field i.e. changes the bit from 1 to 0. The diagrammatic representation of ring network is given as under.

        The arrows show that flow of takes place in a single anti-clockwise direct in a ring. There is no collision among message tokens passing in a ring.|
        Certain advantages of ring network are:
        1. There is no dependence on a central computer or file server and each node controls transmission to / from itself.
        2. Transmission of messages around the ring is relative simple with messages traveling in a single anti-colckwise direction.
        3. Very high transmission rates are possible in ring networks.

          Few shortcoming that exist in this networking topology are:
        • The transmission between any two devices in network is disrupted with the breakdown of a single station. The reason is that each station regenerates the signal incase when it is not addressed for it.
        • The entire network is disrupted in order to add new stations to the ring network.

          Some real world networks based on this topology are Token-Ring and FDDI i.d. Fiber Distributed Data Interface. FDDI is implemented as a dual ring

      4. Mesh Topology:
        Mesh is that topology in which multiple links exist among network computers. Mesh networks may be found into one of the following types:

        1. True Mesh:
          In true mesh the total number of links for "n" computers are "n(n-1)2" and every two computers in this network are directly connected to each other. When the total number of computer "n" is 6 then there will be total 15 links among them as demonstrated in the following diagram.

          In this diagram representation there is a two-way communication of data across each link.
        2. Hybrid Mesh:
          In hybrid mesh total links are less then n(n-1)/2 for "n" computers. Each computer is not directly connected with each other computer in the network. If for example the total number of computers "n" is 6 and there are 9 links instead of 15 then such a network will be hybrid mesh.
          This topology is based on multiple links between any two computers in the network and it has the following major advantages over other typologies.
          1. Mesh network has high fault tolerance due to multiple links.
          2. Due to multiple links mesh network can work fine even under severe loads.
          3. Troubleshooting of mesh network is easy as compared to other networks. If data is not communicated between any two computers then it means that there is some fault in direct links between them.
            Some shortcomings of this topology are given below:

          • Cable cost is too high due to multiple links. This cable cost may even be more than a star network in case of true mesh network among a large number of computers.
          • It is also very difficult to maintain a true mesh for a large number of computers.


            Even Mesh networks are rare in real world due to their shortcomings however a good example of Mesh network is the Internet in which every computer can be connected to every other computer directly (if we are connected with Internet).
  6. Data Communication Protocol:
    Up till now, we have discussed about the different mechanisms that are used for data communication from one computer to another one. However there are also some software that take an active part in the communication of data. In order to allow equipments from different suppliers to be networked, a strict set of rules (protocols) has been devised covering standards of physical connections, cabling mode of transmission, speed, data format, error detection and correction etc. Any equipment that uses the same communication protocols can be connected together. In other words we can say that the data communication software used to control the transmission of data is called a protocol. Some common examples of protocols are TCP/IP (Transmission Control Protocol/Internet Protocol), FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol) and so on.
    Manufactures are gradually incorporating these standards in some of their products however it is unlikely that total standardisation will be achieved for sometime, if ever. Where two devices have different protocols they can sometimes communicate via  a protocol conversion computer.
    The OSI Reference Model:
    The working procedure of data communication protocols and other software can be fully described by OSI seven layers reference model. OSI seven layers reference model. OSI is a non-tangible model and is very useful in understanding how equipments from one manufacturer could be connected with totally different equipments from some other manufacturer. This model is under the process of development since 1977. OSI stands for Open System Interconnection and here the openness means that every detail about the working of the data communication software can be understood by studying this model. This model has devised a hierarchy of the following seven layers so that each layer is a service or procedure according to which the data to be communicated is processed and is forwarded to the lower level layers at the sending point or the higher level layer at the receiving point.
    The upper three layers of this model are called high-level layers as they are concerned with the software whereas the lower four layers are called low-level layers because they are concerned with the functions of different networking hardware. These layers are described one by one below in detail:
    1. Application Layer:
      It is the first high-level layer and is closest to the users. It is used for providing support to the phenomena of the transfer of information between end-users, application programs and devices. Several types of protocols that exist in this layer are covering specific and general applications such as accounting, entry control and user identification.
    2. Presentation Layer:
      This is the second high-level layer and accepts the processed data from application layer for further processing. The purpose of protocols in this layer is to ensure that different devices using data in different formats can communicate with each other for example, handling the conversion between ASCII and EBCDIC codes. It may also be used to carry out encryption to ensure the security of data during its transmission.
    3. Session Layer:
      This the third and last high-level layer of the OSI reference model and is actually the user interface to the network. When a user requests for a particular service from the network, this layer handles the dialogue.
    4. Transport Layer:
      This layer is the last low-level layer and fourth layer of the OSI reference model. This layer handles the data transmission between host computers by performing addressing and error controls to ensure a high quality data transmission service for the network.
    5. Network Layer:
      This the third low-level layer and fifth layer in the OSI reference model which has the function of performing tasks like routing of information around the network, connecting adjacent nodes in the network and also carrying out accounting functions to enable the network's owners to charge the users.
    6. Data Link Layer:
      This the second low-level and sixth layer of the OSI reference model. This layer is used to handle the data transmission errors caused by the corruption of data due to different types of interferences that affects physical data transmission media used in the networks. The techniques used for the receipt and acknowledgements of data by a receiver are handled through this layer.
    7. Physical Layer:
      This the last layer of OSI reference model and is the first low-level layer as it is closest to the hardware. This layer is concerned with standards for mechanical, electrical and procedural aspects of the interface devices. An example of such standards may be the number of pins contained within a network's connector. This layer is especially concerned with how the binary data is transmitted along the communication channels.
      The diagrammatic representation of this layer-by-layer architecture of entirely different networking products and the way data is sent and received by them is given as follows:
      1. OSI reference model gives a clear understanding about the working of communication software and equipments.
      2. OSI reference model when followed make different networking software capable to transmit their data with each other.
      3. This model provides a standard for the quality of communication between similar or different networking equipments.

BASIC OF INFORMATION TECHNOLOGY

Information Technology is the key to development s in the modern era of today's computerized world. It merges the computer and communications in order to make the easy availability of latest information to every one. Different business organizations may not work if they don't have the required data and information  for running their business activities. An example of this may be that an airline reservation company that may not be able to prepare the passengers list for its various flights if the required data about passengers is not available or a bank may never perform its banking functions without the data and information regarding its customers and other business perspectives.

As computer is a very important tool for quick and accurate production of our needed information, it is therefore the central topic of information technology, that how a computer performs its computation functions. The other element of IT is called communication, which actually means that how computers r receive the same from them.

In many business organizations, IT plays a significant role mostly in the form of computer based information system like Management Information System (MIS), Decision Support System (DSS), Executive Information System (EIS), Operational Information System (OIS) and so on. The detailed discussion about information system is out of the scope of this however the meanings of information technology may be clarified that is the technology based upon the use of computer based information system having the objective of easy and quick information production, distribution among its end-users, storage, retrieval and use. This information is obtained from the data collected from different data sources in many business organizations.

The benefits of Information Technology are highly adequate, challenging and outstanding. IT now a days is playing its role in almost all aspects of our social, national and international life affairs and in a very true sense, latest information is highly crucial for the betterment of a nation.

  1. Components of Computer System:
    A computer is not an ordinary machine but it is a complete functional system that exists due to the integration of two basic components i.e. hardware and software. Hardware is the physical component whereas software is the nonphysical component of the computer system. Here physical component means the one that can be seen and touched directly, where the adverse of this is the nonphysical i.e. the one which can not be seen and touched directly but can be found responsible for running the computer system. An example of this may be the living human body in which there is soul, wisdom, power and other characteristics that exist but can not be touched and seen physically. On the other hand, the different physical organs of the human body can seen and touched but they can't work without soul. In the similar way, computer system will be no more than collection of different equipments without the software. The basic definitions of these two components are given below:
    • Hardware is the collection all those parts of computer system, which are actually working during the processing of data to get information.
    • Software is a set of instructions (programs), which is responsible for monitoring the different tasks of the computer hardware during the processing of data into information.

      Command examples of hardware are processor. RAM, ROM, Hard Disk, Floppy Disk, Keyboard, Printer and so on. Whereas all those programs like operating system, device drivers, commands and computer programming languages etc, which are used to direct the computer hardware about the computational tasks that they perform, are examples of software. The types of hardware and software components will be studied in a great detail in the coming chapters of this book however ti will be better to discuss to main categories of computer hardware and software so that one could be able to understand the way in which the computer system is working.
    1. Main Categories of Computer Hardware:
      Computer hardware falls into the following main categories:

      • Processor
      • Main Memory composed of RAM & ROM
      • Secondary Memory composed of mass storage devices such as Hard Disk, Floppy Disk, Magnetic Disk, Compact Disk (CD), USB (Flash or Data Traveler)
      • Input and Output devices like Keyboard, Mouse Printer, Scanner, Digital Camera, Microphone, Speaker and so on.
      • Sources of interconnections among the above four components e.g. ports, buses, cables and connectors etc.
      • Other networking hardware used to connect one computer with another one, such as MODEM, Bridge, Router, Hub, different types of cable media and so on.

        In these categories of computer hardware, the above 5 categories are highly necessary for a computer system in a working condition whereas the last category of hardware is required only in case of establishing a computer network. The first 3 categories of hardware are contained within the Central Processing Unit (abbreviated as CPU box) whereas the Input and Output devices are out of the CPU box and are connected to it through their cables. The main memory which is composed of RAM and ROM is directly connected with the computer processor and is thus called online to the processor whereas the mass/secondary storage and Input / Output devices are connected to the processor through main memory especially through RAM and are therefore called peripheral devices or offline to processor. 


        In the above figure, the bi-directional arrows mean the transfer of data in both directions whereas the unidirectional arrows mean the transfer of data in just single direction. The way in which the computer work may be described in the following steps:
        1. Data is sent into RAM (Random Access Memory) from the input devices. 
        2. For processing, the data present in RAM is given to the processor from where it is sent back to RAM after necessary processing.
        3. Data can also be stored permanently in secondary memory (if required) from where it can be retrieved back into the RAM.
        4. The output i.e. information obtained after the processing of data can be displayed through output devices.
    2. Main Categories of Computer Software:
      There are two broad categories of computer software, which are described one by one below:
      • System Software runs and monitors various hardware devices during their functions. The orientation of system software is towards the computer hardare and makes it available to the computer users for their computation tasks.
      • Application Software or  packages are used for working in a particular area of application like Engineering, Graphics, Documentation, Accounting and so on. These software are applicable only in their specific field of application and can't be used everywhere.
    3. Data and Information:
      The basic objective of hardware and software component of a working computer system is that they process the data accepted as input and convert it into output called information. If hardware performs actual computational work, software directs computer hardware about the way to perform.

      The difference between data and information is that data is just a collection raw facts and figures and it can't be used for decision making whereas information the processed form of data on the basis of which one can make decisions. Data is input to the computer where information is output from the computer system. An example of this may be the data obtained from admission forms of students. The college administration can't decide about which students should be admitted and which not on the basis of this data. However if this data is properly processed according to a set of procedure (software), the clerical staff and machinery equipment (hardware), it is converted into students merit list on the basis of which one can easily decide about student admission. This transformation of data into information is the basic goal of a computer based information system comprising necessary hardware and software components.
  2. Input & Output Devices:
    As a computer system processes the data i.e. raw facts and figures into their information products, specific devices are used for input of data and display or output of information. These enable the computer system to interact with its users. These devices are also called input/output peripherals. Examples of input devices are keyboard, mouse, jay-stick, scanner, digital camera and microphone etc whereas common examples of output devices are monitor, printer, plotter and speaker etc. 
  3. Operating System and Computer Programs:
    The data that is input to computer system may be processed and transformed into information products. These computational activities of data input, processing and information output are performed with the help of various hardware devices under the supervision of a set of computer programs i.e. operating system and other application or system software. An operating system is the most significant kind of system software that contains certain distinctive characteristics like:
    • Managing the software and hardware resources of the computer system.
    • Controlling the functionalities of all hardware and software resources in addition to their management.
    • Providing user-friendly interfaces that enable users to operate the compute system.A system software that is equipped with all of such feathers will be an operating system however if any of these features is missing within a system software then it will be an ordinary system software or an application software have their important roles in the computational activities of transforming data into information.
  4. Data Storage and Memory:
    Storage of data is important computational process that is carried out in order to use the data for future needs. Two types of data memories are associated with the data storage i.e. primary memory (RAM & ROM) and secondary memory (Hard Disk, Floppy Disk, and Magnetic Tape etc). The former i.e. primary memory also called internal memory is online to the processor and is composed of RAM and ROM. RAM is the only part of the primary memory that can be used for storing the users data temporarily whereas ROM can't be used for storage of user data as it is read only and we are unable to write or store our data into the ROM. On the other hand RAM (Random Access Memory) also called Read/Write Memory may be used to store the data temporarily as long as the computer is on. As soon as the computer system is shutdown, the data present into the RAM is washed away. RAM is the only way of users data to the processor because processor is directly connected to RAM and picks data from RAM to process it.
    The other type of computer memory is called secondary memory or external memory or auxiliary memory or mass memory. It stores the data permanently with the help of magnetic mechanisms however unlike primary memory, it is connected to the processor through RAM i.e. the data from the secondary memory is carried to RAM before it is processed. That is why secondary storage is also an offline or peripheral device of the computer system.
    1. Basic Unit of Data Storage:
      The basic and smallest unit of computer memory is called bit that stands for binary  digits. As we know that computer internally represents its data in the form of binary zeros and ones, these bits are the primary sources of such representations. A bit may have two possible states i.e. 0 or 1. 0 is used for circuit off whereas 1 is used for circuit on. Thus a single bit may have two possible representation of data 0 and 1. Some other larger units of computer memory are given below:
      • Nibble:
        One nibble is the combination of 4 bits. It can have 16 possible representations of data as 24=16. An example is the Hexadecimal number system, which is composed of numbers from 0 i.e. 0000 to F i.e. 1111.
      • Byte:
        A byte may be defined as "the memory required to store a single alphanumeric character of data." Here alphanumeric character may be any digit from 0,1,2,3,.......0 or an alphabet from a to z or A to Z or any other special symbol like , : / ? + - * etc. A byte is a combination of 8 bits or 2  nibbles. As a single bit can have 21=2 possible representation i.e. 0 and 1, therefore a Byte i.e. a combination of 8 bits can 2=256 possible representations of data in the form of 0s and 1s.
        Some commercial units of data storage that are composed of bytes are described in the table below:
        Name of Unit
        Abbreviation
        Numbers of Bytes
        Kilo Byte
        KB
        (2)10
        Mega Byte
        MB
        (2)20
        Gega Byte
        GB
        (2)40
        Tera Byte
        TB
        (2)80

        Example: Calculate the total number of Bytes and Kilo Bytes in 256 MB of RAM.

        Solution:
        This problem can be solved as:

        Number of Bytes in 1 MB = 220 Bytes
        So total number of Bytes in 256 MB of RAM 256 x 220 Bytes = 268435456 Bytes
        Similarly, the number of Kilo Bytes within 1 MB =220 KB or 1024 KB
        So the total number of Kilo Bytes within 256 MB RAM = 256 x 1024 = 262144 KB
      • Word:
        A word is a combination of 2 Bytes. Some machine instructions need computer words comprising 16 bits. However the larger units that are composed of words are described in the table below:
        Name of Unit
        Abbreviation
        Number of words
        Number of Bytes
        Double Word
        DW
        2
        4
        Quad Word
        QW
        4
        8
        Double Quad Word
        DQ
        8
        16
        Example: Calculate the total number of Words, Double Words and Quad Words in a hard disk having a storage capacity of 40GB.
        Solution:
                       In order to solve this problem, we will have to find:
                      Total number of Bytes in 1 GB =  240 Bytes
                      Total number of Bytes in 40 GB = 40 x 240 Bytes
                      Number of Words contained in 2 Bytes = 1 W
                      Number of Words contained in 40 GB = 40 / 2 x 240 Words= 20 x 240 DW
        Similarly
                        Number of Double Words contained in 4 Bytes = 1 DW
                        Number of Double Words contained in 40 GB=4x240DW=10x240DW
        and in this way
                        Number of Quad words contained in 8 Bytes=1QW
                        Total number of QW in 40 GB=40/8x240QW=5x240QW
        Example: Calculate the total number of characters possibly represented by a single Byte.
        Solution:
        It is to be noted that one Byte can represent just a single alphanumeric character at a single time. As a character is a combination of 0s and 1s in binary form, this problem can be solved as:
                                  Total possible states of a single bite =2 i.e. 0 and 1
        This means that a single bit may represent 2possible states. Since a Byte is a combination of 8 bits in usual conditions, the total number of possible representation of 0s and 1s by a single Byte are 2representations. Thus 2or 256 possible representations characters may be represented by a single Byte, which in other words means that 256 characters may possibly be represented by a single Byte.
  5. System Development:
    After discussing the fundamental concepts about the computer system and its working. Lety us study computer based information system briefly. A system in a wide sense may be define as "an integration of components or parts linked together according to some specific scheme to achieve certain common objective". According to this definition, some systems are natural, some are man-made and some are computer based. Here emphasis is the computer based information system i.e. the system that uses computers and communication equipments for the delivery of information to the different levels of end-users in a business organisation. These computer based information system play and vital role in information technology and their potential uses are so many that will be out of the scope of this discussion. However a brief overview of computer based information system development is useful to know how the software development process for an information system is performed.

    Developing an information system is not an easy task rather it may be troublesome in some respects as it involves several distinct phases each of which must be completed before a subsequent task can begin. For this purpose, the system development life cycle is adopted so that a successful information system may be achieved. A system development life cycle is a repetitive process in which a system may be created, upgraded, matured, in its operations and may die  with the introduction of new hardware and software technologies, environmental changes (like government policies or customer demands) and so the introduction of a new information system before. The system development life cycle is composed of the following phases:

    1. Problem Definition: 
      It is also called problem identification and is somewhat similar to the famous saying that necessity is the mother of invention and it tend to find out the problem and its reasons that motivate the huge projection of information system development. This is the first and the most crucial step in system development. The whole system depends upon this step because the actual problem due to which the system development is initiated is identified in this step and all of the future work will be correct if the definition of the problem is correct or otherwise all of the future efforts, money, time and other assets used for development will be wasted. The reason behind the dependence of system development will be wasted. The reason behind the dependence of system development on correct problem definition is that if a problem is correctly identified, it means that it has been solved almost about 50% and the rest of the solution will depend upon the practical work in correct direction whereas if a problem is identified with inaccuracy in its definition then it means that the direction of solution is wrong from its very beginning and the process of system development will miss its target if continued this way.
      The reasons behind problem definition and new system development may be:

      *     Current system is difficult to use.
      *     Current system doesn't work according to the expectation of its users or it is producing inaccurate result.
      *     The current system needs to be improved for making it more efficient.

      Once any of such things happens and the problem is realised, the system analyst is requested for change in the current system improve its outcome. The system analyst begins a preliminary investigation to find out the problem and its sources accurately. The definition of the problem results into the submission of report that is put before the management of the business organisation and about problem definition may contain.

      *     The correct definition of the problem.
      *     The rough cost estimation for solution to the problem.
      *     The amount of time taken by this development project or project duration.
      *     Staff required e.g. programmers, project managers, operators and so on.
      *     The hardware and software technologies needed.

      On the basis of this report, management of the organisation may decide whether to approve the development project or not.
    2. Analysis:
      When the authorities or management of the business organisation take a decision to proceed with the solution of the problem, the next step is to thoroughly investigate the entire current information system. The system analyst has to work very close to people directly facing the problem and finds out how it can be solved. In this phase, the present system is studied in depth to collect all the available information about the current system. The most commonly used techniques are:
      • Review of Existing Records:
        This means that all the available written or computer-stored material about current system may be collected and studied.
      • Interviews:
        An interview is the face-to-face communication between two persons. It can be used to arrange meetings with the users of current system. It may be very useful as it produces upto-date information that can not be documented officially. The system analyst may also be able to judge the truth of answers from expressions of the interviewee.
      • Questionnaire:
        In this technique, a set of proposed questions with a proper space among them is arranged for the collection of information about the current system. It is usually used in case when the business organisation is spreaded over a wide geographical area and interviews take a lot of time and cost.
      • Observation:
        As its name indicates, it is that technique with the help of which it is observed that what people at a place e.g. in the different sections of business organisation are doing and what actions are taking place over there. This means that we have to observe the people at work. This is very useful in checking the truth of information collected through interviews and questionnaires.
        After all the information is collected about the system, the system analyst has to analyse the information and purpose a set of solutions to the problem. A typical solution may include:
        *     What should be the output given by the system?
        *     What should be input into the system?
        *     What should be the hardware and software of the system?
        *     What tools are needed for the system?
        Throughout analysis the focus remains on "What the system must do?" and "How the system is to be developed?" After all the solutions are defined, these are given to organisation for selecting the best possible solution. These solutions are identified on the basis of constraints, budgets, resources and schedule of the organisation.
    3. Design:
      In this phase the project team develops software for information system. The best solution selected from the set of alternative solution or candidates found in analysis phase and is programmed. Here emphasis is the practical or physical design of solution to the problem. This design include input design, process design, file design and output design i.e. the different component of the information system are designed in this phase. There are two types of system design.
      • Logical Design:
        In which different algorithms and system flowcharts are designed. One has a clear understanding about how proposed information system will perform its functions and how it will be free of the problems existing in the current system. This design is very important because it provides a road map for the proposed information system to work and it also has its impacts on the later coming physical design so great care must be taken in logical design.
      • Physical Design:
        Physical design or coding in which software for proposed information system and its components is prepared in the light of algorithms and flowcharts obtained from logical design process. The outcome of physical is the information system software in its crude form. The actual work of information system development takes place in this phase to create a newly proposed system software solution in its practical form.
    4. Testing & Debugging:
      The newly created information system may contain serious bugs in it that need t be properly refined so that it may be able to smoothly handle the business activities of organisation. For this purpose, a detailed software testing criteria is adopted to check its quality, performance, speed and working in real world situations. The software is tested with dummy data and if it works correctly, it is recommended for other tests. If all the test are satisfactorily cleared then it is finally tested for acceptance. Successful clarification of this test will bring it into its practical implementation. Any weakness or bugs found in testing process are attempted to be removed and the system is properly refined to make it capable of working with original data of business organsiation.
    5. Implementation:
      In this phase of system development life cycle the system analyst and his/her project team puts the developed system into practice after thorough testing and debugging. Implementation may consist of several steps like purchase of necessary hardware and other materials required for system, installation of new hardware and software, conversion of data files to use them in the current system and so on.

      After installation conversion takes place, which is the process of moving from the old system to newly developed system. These conversion phenomena may be accomplished according to the following four methods:
      1. Direct Conversion:
        Direct Conversion or Abrupt Cutover is that method of conversion in which users immediately stop using the old system and begin using the new system. This method is fast but is highly risky and in case when some problem occurs in working of the new system, entire business of organisation will badly suffer and there will be no way to go back to use the old system for recovery.
      2. Parallel Conversion:
        Parallel Conversion is that method in which both new and old system are used for some time. Outputs of both of these systems are compared and in case if they match together, then we switch from the old system to the newly created information system. This method is safe but it is highly time consuming and expensive as the organisation has to run two systems at same time.
      3. Phased Changeover:
        Phased Changeover is the method of conversion into new system in a component-by-component fashion so that first component of the newly developed system is installed first and if it works accurately then the other components will be installed in sequence.
      4. Pilot Conversion:
        This method is adopted in case when organisation is spread over multiple locations. The newly developed system is tested in single pilot phase and if it works correctly then the entire organisation switches from old system to newly developed information system in all of its locations.

        It must be notified that proper training and personnel support play important role during the conversion or changover phenomena. These people deliver lectures, hands on training and computer training to the end-users of the newly developed system.
    6. Maintenance: 
      This phase is also called post-implementation as after the implementation of the new system, the Information System Department (i.e. the developers of new system continue to provide their support to the new system in order to ensure that it works properly. It involves:
      *     Corrections of errors that occur in the newly implemented system.
      *     Changes due to changes in the organisation.
      *     Changes or upgrades or improvements in the system.
      Post-implementation or maintenance guarantees the long life of the system in the business organisation and it ensures that the newly implemented system may work fine for longer times. A detailed documentation is also accomplished starting from problem definition to the post-implementation phases of system development life cycle so that it may provide detailed information about the system if at any time problems arise in the newly implemented system. This may be specifically helpful for other system analysts or IT professional (who will join the Information Department later on) to understand the newly implemented system and maybe capable of handling any problem in it.
      The system development life cycle is diagrammatically represented in figure below:


      From this diagrammatic representation of system development life cycle, it is clear that as soon as the newly implemented information system becomes old after a fixed period of its life, problems will arise in its operations. Consequently development of another information system becomes crucial. This process will again take a start from Problem Definition phase of the system development life cycle and will end at Post-Implementation or Maintenance phase. That is why system development is continuously repetitive or cyclic process that takes place over and over with the introduction of new hardware and software of computer system certain other factors.

THE IMPACT OF AI ON THE FUTURE OF HUMAN LIFE

Artificial Intelligence (AI) is rapidly transforming the world, and its influence will continue to grow in the coming decades. From healthca...