Discuss The Transaction Process Cycle
Discuss The Transaction Process Cycle
Read the information below and make out the answer and what ever
you don’t understand do please ask me to explain to you.
In the context of transaction processing, the acronym ACID refers to the four key
properties of a transaction: atomicity, consistency, isolation, and durability.
Commit and rollback
To assure the ACID properties of a transaction, any changes made to data in the
course of a transaction must be committed or rolled back.
Units of work
These topics describe the basic concepts of CICS distributed transaction processing
(DTP) and what you must consider when designing DTP applications.
Business transactions
CICS continually records information about the state of the region and about the
state of each unit of work in the region. This information is preserved and used when
a region is restarted, thus enabling CICS to restart with no loss of data integrity.
Once the transaction is processed, certain output needs to be generated. The output may
be some documents like sales invoices, pay slips etc. Or screen displays or the output data may
used to update related databases. Files and databases have to be updated with each transaction or
each batch of transactions. In case of applications that are not time critical, the transactions may
be processed in batch mode. Certain systems like airline reservation require updating with every
transaction for giving status information in real time. Direct data entry devices have to be used
to capture transaction data and update related files and databases to provide current information
to users.
Inquiry processing is another activity of transaction processing system which involves
providing information on current status like inventory levels, customer credit limit, dues from a
particular customer, inbound supply, et. The inquiry response is pre-planned and the on-screen
display or output is formatted for the convenience of the requester.
A business transaction with a customer involves a good or service that a customer want
and the business provides for a price. The TPS supports the delivery process.
To complete a transaction with an external entity like customer, supplier etc. a series of
activities is involved such as checking of account, current inventory balance, delivery time and
price.
For instance, the transaction at a bank counter involves checking of account balance,
withdrawal of money or deposit of money. In the case of some transactions, an activity serves as
a trigger and a series of activities follow it. For example, a sales order from a customer is
followed by a number of activities; some of these are queries like:
2. Value chain
Starbucks As An Example Of The Value Chain Model. ... A value chain is a series
of activities or processes that aims at creating and adding value to an article
(product) at every step during theproduction process.
MORE
Credit: stoatphoto/Shutterstock
Entering a new era of innovation, businesses are competing for unbeatable prices, fine
products, successful marketing strategies and customer loyalty. One of the most valuable
tools, the value chain analysis, allows businesses to gain an advantage over their
competition.
According to Smartsheet, a value chain analysis helps you recognize ways you can reduce
cost, optimize effort, eliminate waste and increase profitability. A business begins by
identifying each part of its production process, noting steps that can be eliminated and other
possible improvements.
In doing so, businesses can determine where the best value lies with customers, and expand
or improve said value, resulting in either cost savings or enhanced production. At the end of
the process, customers can enjoy high-quality products at lower costs.
Value chain management is the process of organizing these activities in order to properly
analyze them. The goal is to establish communication between the leaders of each stage to
ensure the product is placed in the customers' hands as seamlessly as possible.
Inbound logistics are the receiving, storing and distributing of raw materials used in the
production process.
Operations is the stage at which the raw materials are turned into the final product.
Outbound logistics is the distribution of the final product to consumers.
Marketing and sales involves advertising, promotions, sales-force organization, distribution
channels, pricing and managing the final product to ensure it is targeted to the appropriate
consumer groups.
Service refers to the activities needed to maintain the product's performance after it has been
produced, and includes things like installation, training, maintenance, repair, warranty and after-
sale services.
The support activities help the primary functions and comprise the following:
Procurement is how the raw materials for the product are obtained.
Technology development can be used in the research and development stage, in how new
products are developed and designed, and in process automation.
Human resource management includes the activities involved in hiring and retaining the proper
employees to help design, build and market the product.
Firm infrastructure refers to an organization's structure and its management, planning,
accounting, finance, and quality-control mechanisms.
The Value Chain The term ‘Value Chain’ was used by Michael Porter in his book "Competitive
Advantage: Creating and Sustaining superior Performance" (1985). The value chain analysis
describes the activities the organization performs and links them to the organizations
competitive position. Value chain analysis describes the activities within and around an
organization, and relates them to an analysis of the competitive strength of the organization.
Therefore, it evaluates which value each particular activity adds to the organizations
products or services. This idea was built upon the insight that an organization is more than a
random compilation of machinery, equipment, people and money. Only if these things are
arranged into systems and systematic activates it will become possible to produce
something for which customers are willing to pay a price. Porter argues that the ability to
perform particular activities and to manage the linkages between these activities is a source
of competitive advantage. Porter distinguishes between primary activities and support
activities. Primary activities are directly concerned with the creation or delivery of a product
or service. They can be grouped into five main areas: inbound logistics, operations,
outbound logistics, marketing and sales, and service. Each of these primary activities is
linked to support activities which help to improve their effectiveness or efficiency. There are
four main areas of support activities: procurement, technology development (including
R&D), human resource management, and infrastructure (systems for planning, finance,
quality, information management etc.).
The basic model of Porters Value Chain is as follows: The term ‚Margin’ implies that
organizations realize a profit margin that depends on their ability to manage the linkages
between all activities in the value chain. In other words, the organization is able to deliver a
product / service for which the customer is willing to pay more than the sum of the costs of
all activities in the value chain.
Some thought about the linkages between activities: These linkages are crucial for corporate
success. The linkages are flows of information, goods and services, as well as systems and
processes for adjusting activities. Their importance is best illustrated with some simple
examples: Only if the Marketing & Sales function delivers sales forecasts for the next period
to all other departments in time and in reliable accuracy, procurement will be able to order
the necessary material for the correct date. And only if procurement does a good job and
forwards order information to inbound logistics, only than operations will be able to
schedule production in a way that guarantees the delivery of products in a timely and
effective manner – as pre-determined by marketing. In the result, the linkages are about
seamless cooperation and information flow between the value chain activities. In most
industries, it is rather unusual that a single company performs all activities from product
design, production of components, and final assembly to delivery to the final user by itself.
Most often, organizations are elements of a value system or supply chain. Hence, value
chain analysis should cover the whole value system in which the organization operates.
Within the whole value system, there is only a certain value of profit margin available. This is
the difference of the final price the customer pays and the sum of all costs incurred with the
production and delivery of the product/service (e.g. raw material, energy etc.). It depends
on the structure of the value system, how this margin spreads across the suppliers,
producers, distributors, customers, and other elements of the value system. Each member
of the system will use its market position and negotiating power to get a higher proportion
of this margin. Nevertheless, members of a value system can cooperate to improve their
efficiency and to reduce their costs in order to achieve a higher total margin to the benefit of
all of them (e.g. by reducing stocks in a Just-In-Time system). A typical value chain analysis
can be performed in the following steps: · Analysis of own value chain – which costs are
related to every single activity · Analysis of customers value chains – how does our product
fit into their value chain · Identification of potential cost advantages in comparison with
competitors · Identification of potential value added for the customer – how can our product
add value to the customers value chain (e.g. lower costs or higher performance) – where
does the customer see such potential Organizations Value Chain Supplier V
In most industries, it is rather unusual that a single company performs all activities from
product design, production of components, and final assembly to delivery to the final user
by itself. Most often, organizations are elements of a value system or supply chain. Hence,
value chain analysis should cover the whole value system in which the organization
operates. Within the whole value system, there is only a certain value of profit margin
available. This is the dif
As a small business owner, you need to use value chain models for doing
strategic cost analysis (which investigates how your costs compare to your
competition's costs).
Most businesses analyze their own internal cost structures but most do not
analyze their competitor's structures.
Analyze your value chains for your business and then compare to the
competitors in your industry that have (in total) up to 80% of the market share -
do not spend a lot of time analyzing the smaller competitors unless you believe
they are up and coming.
This type of industry analysis will be invaluable for developing and implementing
new competitive strategies.
Labor costs are often a large overall cost in most businesses - at least, you will
be able to estimate if they are higher or lower than you.
The value chain identifies, and shows the links, or chain, of the distinct activities
and processes that you perform to create, manufacture, market, sell, and
distribute your product or service. The focus is on recognizing the activities and
processes that create value for your customers.
The importance of value chain analysis is that it can help you assess costs in
your chain that might be reduced or impacted by a change in one of the chain's
processes. By comparing your value chain to your competitors, you can often
find the areas or links of the chain where they might be more efficient than you;
that points the direction for you to improve.
Expect your competitors to have a value chain quite different than yours;
because their business grew from a different set of circumstances and a different
set of operating parameters than your business.
How to do a Value Chain Analysis:
(I like to do this type of analysis in a spreadsheet, so that I can add, delete,
amend, and sort easily and see the comparative data clearly.)
Each value chain analysis will be specific to the business and the industry it is in.
In your business, you may need to consider your upstream suppliers (are you
getting the best deal, the best quality, etc.) and the downstream end use of the
product or service. End-users often have a strong role to play in specifying who
gets the business - you need to understand what they value, as well as
understand what your direct customers value.
This information will then lead you to develop strategic actions to reduce or
eliminate your weaknesses or disadvantages. Focusing on taking action from the
results of your value chain analysis will help your business become more
profitable, and may even earn you more market share.
Value Chain Analysis Example Using Primary
Activities
Kiesha Frue Dec 7, 2016
We can’t shove businesses into customers’ faces and expect bucket loads of sales
anymore.
Now, business is about the feedback. Communication. And adding genuine value to a
customer’s life.
By using the value chain analysis, you leverage customer desires and give the value
they need. Doing this builds trust and by proxy, sales.
We’ll look at a value chain analysis example to see how value works and why it works.
But first, we’ve got to go into the basics.
Value chain analysis looks at what benefits (value) a company’s products and services
offer. Then you analyze how to use this value to reduce costs. Or leverage the value to
stand out from their competition.
Say you’ve got great margins — it costs you $5 to build your product but you retail it
for $25.99. You can offer lower shipping costs than your competitor whose margins are
less than boastful.
1. Inbound logistics: Suppliers are vital. Because they’re necessary for receiving,
storing, and distributing products. Without the supplier, you’re limited in the
product development stage.
2. Operations: When you take products and offer them to the public, this is where
operations come into play. The systems you use can be invaluable.
3. Outbound logistics: When you provide the product to your customer. The
systems at play focus on distribution, storage, and collection of your services.
4. Sales/marketing: Goes without saying but how you get customers to say, “Yes!”
to your product is important. Here, you’ll highlight product benefits and persuade
these customers to keep their wallets away from the competition. Benefits are the
value.
5. Service: Do you have good customer service or rancid customer service? The
value you offer pre and post-sale to the customer decides whether they become a
repeat customer. Or not.
The more value you can create and use, the higher your success with said product will
be. But again, it’s all about leveraging. So, let’s get to the value chain analysis example
— finally!
Starbucks: The world renowned coffee mogul
We know Starbucks. The whole world knows Starbucks. And for good reason. Using
the above chain of operations, let’s see how Starbucks uses the five primary principles
to expand worldwide.
1. Inbound logistics — premium coffee beans…
Starbucks uses high-quality coffee beans for its drinks. They don’t outsource the
retrieval of these beans from Latin America, Asia, and Africa isn’t outsourced.
Starbucks handles the buying, transportation, and storage of beans. This is how they
keep full control on the quality of their beans.
Why this matters: Customers want the best. And to know where the beans are coming
from. Starbucks maintaining control of their coffee beans — compared to a randomly
named corporation — leaves a lasting impression in coffee drinkers’ minds.
2. Operations — outbound stores across the globe…
Starbucks is everywhere. They own several other beverage shops (Teavana and
Seattle’s Best Coffee, for example) which generate sales. Starbucks coffee shops are in
over 21,000 stores worldwide. The main stores still make the most revenue while the
licensed shops bring in less than 10% of their revenue.
Why this matters: Starbucks offers services around the world, ensuring they build a
strong consumer base and keep their name well-known. Customers order this premium
service while Starbucks sees massive sales each year. A value win-win for everyone.
3. Outbound logistics — Barely selling in retails…
Truthfully, Starbucks doesn’t sell their products outside their licensed shops. This is
where they’re lacking. If you want their coffee beans or packaged goods, you’ll must
go to their shops and pick them up. While they are planning to sell single-origin coffees,
it’s a small move by Starbucks.
Why this matters: If Starbucks products were in retail, customers could pick up their
favorite drink or mug while finishing up errands. Making it easier for Starbucks to
expand into the home. But they’ve dropped the ball here. You can use value chain
analysis to see disadvantages too and, with the right research, flip it into an advantage.
4. Sales/marketing — the quality is loud…
The high-quality products speak for themselves.
Starbucks relies heavily on quality rather than aggressive marketing tactics. Social
proof, like customers recommending drinks — even the joke articles about Starbucks
“secret menu” — are marketing methods Starbucks doesn’t pay for. The customers take
care of it.
Why this matters: Starbucks uses its reputation to their advantage. This reputation is
built on premium quality beans and service. Because of this, customers recommend
drinks, post selfies online, and write blog posts about the coffee stores. Customers see
the value and promote Starbucks themselves.
5. Service — building relationships…
Most of Starbucks sales ventures goes towards exceptional customer service in each of
their stores.
Writing names on glasses isn’t just a way for customers to know when to pick up their
drink. It’s a method to learn about a customer — temporarily, sure — and build up a
relationship between barista and customer.
Why this matters: Customers want to be important. They want to be recognized by the
companies they buy into. And Starbucks creates a comfy, familiar, and acknowledged
environment for their customers. This builds loyalty, credibility, and trust. This is
the Starbucks Experience. Combined with their unique drinks, Starbucks makes
customer retention look easy.
Now…
You’ve seen how a hugely successful company like Starbucks uses value chain analysis
correctly. You can use it to your advantage as well. Outline how your firm uses each
step and create a plan to implement positive changes.
4. Categories of computers:
The computer age has brought about many advances in technology, including the increasing
miniaturization of computers and components. However, the earliest computers were large
machines, taking up lots of floor space and consuming large amounts of electricity. As computer
technology has advanced there are more categories of computers, each with specific qualities
and purposes. What once required a large room now fits in your hand and connects to other
computers around the world.
Supercomputers
Super computers are large computing machines that have enormous computing power, with
many processors and large amounts of memory. These machines are typically used for scientific
purposes, as they are great number crunchers. Their strength is in their speed, achieving
exponential numbers of floating point operations per second, a typical computing measurement
scale. Titan, one of the world’s fastest supercomputers, has performed at 17.59 quadrillion
calculations per second.
Mainframes
At a slightly lower level than the supercomputer is the mainframe. Mainframes, contrary to much
popular thought, are not dead, but are thriving in American businesses. Large insurance and
financial firms rely on these large computers to process the massive volumes of transactions in
each business day. Mainframes were the computer of choice in the 1960s and 1970s.
Mainframes are distinguished by their speed and use of complex, powerful operating systems,
easily serving thousands of users simultaneously.
Servers
The 1980s saw the advent and growth of smaller computers, often called microcomputers. As
networks began to grow in companies, technology workers realized the need for centralizing data
storage, email and print services, giving rise to the departmental server. Servers are much
smaller than mainframes and more powerful than desktop workstations. They can serve
hundreds of users at the same time and typically provide services to websites and company
departments.
Personal Computers
Another development of the microcomputer wave of computing was the personal computer.
Workstations provide individuals with computing power at the desk, using applications such as
spreadsheets, word processors and presentation software. Laptops are essentially portable
personal computers that have batteries for power and a screen that folds down into a compact
book-like form. Workstations have become more powerful with advances in processor technology
to the point that most desktop computing power is vastly underutilized.
5. Database information
All the three managers are using the same database; hence, any report using the information
will not be inconsistent.
All the three managers can view the database as per their needs.
The data validation and updating will be once and same for all.
The data security and privacy can be managed and ensured because the data entry in the
database occurs once only and is protected by the security measures.
Since the database is storage of the structured information, the queries can be answered fast
by using the logic of the data structures.
← Previous
Next →
Chapter 1. Introduction to the Module
Table of contents
Module objectives
Chapter objectives
Introduction
Motivation for data storage
Traditional file-based approach
The shared file approach
The database approach
o ANSI/SPARC three-level architecture
The external schema
The conceptual schema
The internal schema
Physical data independence
Logical data independence
o Components of a DBMS
DBMS engine
User interface subsystem
Data dictionary subsystem
Performance management subsystem
Data integrity management subsystem
Backup and recovery subsystem
Application development subsystem
Security management subsystem
o Benefits of the database approach
o Risks of the database approach
Data and database administration
o The role of the data administrator
o The role of the database administrator
Introduction to the Relational model
o Entities, attributes and relationships
o Relation: Stationery
Discussion topic
Additional content and activities
The purpose of this chapter is to introduce the fundamental concepts of database systems. Like
most areas of computing, database systems have a significant number of terms and concepts
that are likely to be new to you. We encourage you to discuss these terms in tutorials and online
with one another, and to share any previous experience of database systems that you may have.
The module covers a wide range of issues associated with database systems, from the stages
and techniques used in the development of database applications, through to the administration
of complex database environments. The overall aim of the module is to equip you with the
knowledge required to be a valuable member of a team, or to work individually, in the areas of
database application development or administration. In addition, some coverage of current
research areas is provided, partly as a stimulus for possible future dissertation topics, and also to
provide an awareness of possible future developments within the database arena.
Module objectives
At the end of this module you will have acquired practical and theoretical knowledge and skills
relating to modern database systems. The module is designed so that this knowledge will be
applicable across a wide variety of database environments. At the end of the module you will be
able to:
Understand and explain the key ideas underlying database systems and the database
approach to information storage and manipulation.
Design and implement database applications.
Carry out actions to improve the performance of existing database applications.
Understand the issues involved in providing multiple users concurrent access to
database systems.
Be able to design adequate backup, recovery and security measures for a database
installation, and understand the facilities provided by typical database systems to support
these tasks.
Understand the types of tasks involved in database administration and the facilities
provided in a typical database system to support these tasks.
Be able to describe the issues and objectives in a range of areas of contemporary
database research.
Chapter objectives
At the end of this chapter you should be able to:
Explain the advantages of a database approach for information storage and retrieval.
Explain the concepts of physical and logical data independence, and describe both
technically and in business terms the advantages that these concepts provide in
Information Systems development.
Understand the basic terminology and constructs of the Relational approach to database
systems.
Introduction
In parallel with this chapter, you should read Chapter 1 and Chapter 2 of Thomas Connolly and
Carolyn Begg, "Database Systems A Practical Approach to Design, Implementation, and
Management", (5th edn.).
This chapter sets the scene for all of the forthcoming chapters of the module. We begin by
examining the approach to storing and processing data that was used before the arrival of
database systems, and that is still appropriate today in certain situations (which will be
explained). We then go on to examine the difference between this traditional, file-based
approach to data storage, and that of the database approach. We do this first by examining
inherent limitations of the file-based approach, and then discuss ways in which the database
approach can be used to overcome these limitations.
A particular model of database systems, known as the Relational model, has been the dominant
approach in the database industry since the early '80s. There are now important rivals and
extensions to the Relational model, which will be examined in later chapters, but the Relational
model remains the core technology on which the database industry worldwide is based, and for
this reason this model will be central to the entire module.
Figure 1.2
The introduction of shared files solves the problem of duplication and inconsistent data across
different versions of the same file held by different departments, but other problems may emerge,
including:
File incompatibility: When each department had its own version of a file for processing,
each department could ensure that the structure of the file suited their specific
application. If departments have to share files, the file structure that suits one department
might not suit another. For example, data might need to be sorted in a different sequence
for different applications (for instance, customer details could be stored in alphabetical
order, or numerical order, or ascending or descending order of customer number).
Difficult to control access: Some applications may require access to more data than
others; for instance, a credit control application will need access to customer credit limit
information, whereas a delivery note printing application will only need access to
customer name and address details. The file will still need to contain the additional
information to support the application that requires it.
Physical data dependence: If the structure of the data file needs to be changed in some
way (for example, to reflect a change in currency), this alteration will need to be reflected
in all application programs that use that data file. This problem is known as physical data
dependence, and will be examined in more detail later in the chapter.
Difficult to implement concurrency: While a data file is being processed by one
application, the file will not be available for other applications or for ad hoc queries. This
is because, if more than one application is allowed to alter data in a file at one time,
serious problems can arise in ensuring that the updates made by each application do not
clash with one another. This issue of ensuring consistent, concurrent updating of
information is an extremely important one, and is dealt with in detail for database
systems in the chapter on concurrency control. File-based systems avoid these problems
by not allowing more than one application to access a file at one time.
Review question 1
What is meant by the file-based approach to storing data? Describe some of the disadvantages
of this approach.
Review question 2
How can some of the problems of the file-based approach to data storage be avoided?
Review question 3
What are the problems that remain with the shared file approach?
Figure 1.3
Components of a DBMS
The major components of a DBMS are as follows:
DBMS engine
The engine is the central component of a DBMS. This component provides access to the
database and coordinates all of the functional elements of the DBMS. An important source of
data for the DBMS engine, and the database system as a whole, is known as metadata.
Metadata means data about data. Metadata is contained in a part of the DBMS called the data
dictionary (described below), and is a key source of information to guide the processes of the
DBMS engine. The DBMS engine receives logical requests for data (and metadata) from human
users and from applications, determines the secondary storage location (i.e. the disk address of
the requested data), and issues physical input/output requests to the computer operating system.
The data requested is fetched from physical storage into computer main memory; it is contained
in special data structures provided by the DBMS. While the data remains in memory, it is
managed by the DBMS engine. Additional data structures are created by the database system
itself, or by users of the system, in order to provide rapid access to data being processed by the
system. These data structures include indexes to speed up access to the data, buffer areas into
which particular types of data are retrieved, lists of free space, etc. The management of these
additional data structures is also carried out by the DBMS engine.
Relation: Stationery
Figure 1.4
Here, the attributes are item-code, item-name, colour and price. The values for each attribute for
each item are shown as a single value in each column for a particular row. Thus for item-code
20217, the values are A4 paper 250 sheets for the item-name, Blue for the attribute colour, and
<=2.75 is stored as the price.
Question: Which of the attributes in the stationery relation do you think would make a suitable
key, and why?
The schema defines the 'shape' or structure of a relation. It defines the number of attributes, their
names and domains. Column headings in a table represent the schema. The extension is the set
of tuples that comprise the relation at any time. The extension (contents) of a relation may vary,
but the schema (structure) generally does not.
From the example above, the schema is represented as:
Figure 1.5
The extension from the above example is given as:
Figure 1.6
The extension will vary as rows are inserted or deleted from the table, or values of attributes (e.g.
price) change. The number of attributes will not change, as this is determined by the schema.
The number of rows in a relation is sometimes referred to as its cardinality. The number of
attributes is sometimes referred to as the degree or grade of a relation.
Each relation needs to be declared, its attributes defined, a domain specified for each attribute,
and a primary key identified.
Review question 7
Distinguish between the terms 'entity' and 'attribute'. Give some examples of entities and
attributes that might be stored in a hospital database.
Review question 8
The range of values that a column in a relational table may be assigned is called the domain of
that column. Many database systems provide the possibility of specifying limits or constraints
upon these values, and this is a very effective way of screening out incorrect values from being
stored in the system. It is useful, therefore, when identifying which attributes or columns we wish
to store for an entity, to consider carefully what is the domain for each column, and which values
are permissible for that domain.
Consider then for the following attributes, what the corresponding domains are, and whether
there are any restrictions we can identify which we might use to validate the correctness of data
values entered into attributes with each domain:
Attribute: EMPLOYEE_NAME
Attribute: JOB (i.e. the job held by an individual in an organisation)
Attribute: DATE_OF_BIRTH
External schemas can be used to give individual users, or groups of users, access to a part of
the data in a database. Many systems also allow the format of the data to be changed for
presentation in the external schema, or for calculations to be carried out on it to make it more
usable to the users of the external schema. Discuss the possible uses of external schemas, and
the sorts of calculations and/or reformatting that might be used to make the data more usable to
specific users or user groups.
External schemas might be used to provide a degree of security in the database, by making
available to users only that part of the database that they require in order to perform their jobs.
So for example, an Order Clerk may be given access to order information, while employees
working in Human Resources may be given access to the details of employees.
In order to improve the usability of an external schema, the data in it may be summarised or
organised into categories. For example, an external schema for a Sales Manager, rather than
containing details of individual sales, might contain summarised details of sales over the last six
months, perhaps organised into categories such as geographical region. Furthermore, some
systems provide the ability to display data graphically, in which case it might be formatted as a
bar, line or pie chart for easier viewing.
The ability to exchange data and communicate efficiently is the main purpose of networking computers. But we
have to consider beyond these points to evaluate the feasibility of networking for our own advantages.
A computer network can be identified as a group of computers that are interconnected for sharing data between
them or their users. There is a wide variety of networks and their advantages and disadvantages mainly depend
on the type of network.
It is very easy to communicate through a network. People can communicate efficiently using a network with a
group of people. They can enjoy the benefit of emails, instant messaging, telephony, video conferencing, chat
rooms, etc.
3. Sharing Hardware
Another important advantage of networking is the ability to share hardware. For an example, a printer can be
shared among the users in a network so that there’s no need to have individual printers for each and every
computer in the company. This will significantly reduce the cost of purchasing hardware.
4. Sharing Software
Users can share software within the network easily. Networkable versions of software are available at
considerable savings compared to individually licensed version of the same software. Therefore large companies
can reduce the cost of buying software by networking their computers.
5. Security
Sensitive files and programs on a network can be password protected. Then those files can only be accessed by
the authorized users. This is another important advantage of networking when there are concerns about security
issues. Also each and every user has their own set of privileges to prevent them accessing restricted files and
programs.
6. Speed
Sharing and transferring files within networks is very rapid, depending on the type of network. This will save
time while maintaining the integrity of files.
Disadvantages of Networking
1. Breakdowns and Possible Loss of Resources
One major disadvantage of networking is the breakdown of the whole network due to an issue of the server.
Such breakdowns are frequent in networks causing losses of thousands of dollars each year. Therefore once
established it is vital to maintain it properly to prevent such disastrous breakdowns. The worst scenario is such
breakdowns may lead to loss of important data of the server.
2. Expensive to Build
Building a network is a serious business in many occasions, especially for large scale organizations. Cables and
other hardware are very pricey to buy and replace.
3. Security Threats
Security threats are always problems with large networks. There are hackers who are trying to steal valuable
data of large companies for their own benefit. So it is necessary to take utmost care to facilitate the required
security measures.
4. Bandwidth Issues
In a network there are users who consume a lot more bandwidth than others. Because of this some other people
may experience difficulties.
Although there are disadvantages to networking, it is a vital need in today’s environment. People need to access
the Internet, communicate and share information and they can’t live without that. Therefore engineers need to
find alternatives and improved technologies to overcome issues associated with networking. Therefore we can
say that computer networking is always beneficial to have even if there are some drawbacks.
What is a computer network? Advantages of Network .
BY DINESH THAKUR Category: Computer Network
A computer network consists of two or more computers that are linked in order to
share resources such as printers and CD-ROMs, exchange files, or allow electronic
communications. The computers on a computer network may be linked through
cables, telephone lines, radio waves, satellites, or infrared light beams.
Computer network can be classified on the basis of following features :
By Scale: Computer networks may be classified according to the scale :
• Local Area Network (LAN)
• Metropolitan Area Network (MAN)
• Wide Area Network (WAN)
By Connection Method: Computer networks can also be classified according to the
hardware technology that is used to connect the individual devices in the network such
as Optical fibre, Ethernet, Wireless LAN.
• Client-Server
• Peer-to-Peer Architecture
By Functional Relationship (Network Architectures) : Computer networks may be
classified according to the functional relationships which exist between the elements
of the network. This classification also called computer architecture. There are two
type of network architecture
By Network Topology: Network Topology signifies the way in which intelligent devices
in the network see their logical or physical relations to one another. Computer
networks may be classified according to the network topology upon which the network
is based, such as :
• Bus Network
• Star Network
• Ring Network
• Mesh Network
• Star-Bus Network
• Tree or Hierarchical Topology Network
Advantages of Network
The following are the distinct notes in favor of computer network.
a. The computers, staff and information can be well managed
b. A network provides the means to exchange data among the computers and to make
programs and data available to people
c. It permits the sharing of the resources of the machine
d. Networking also provides the function of back-up.
e. Networking provides a flexible networking environment. Employees can work at
home by using through networks ties through networks into the computer at office.
System Development Life Cycle (SDLC) is a series of six main phases to create a
hardware system only, a software system only or a combination of both to meet or
exceed customer’s expectations.
System is a broad and a general term, and as per to Wikipedia; “A system is a set of
interacting or interdependent components forming an integrated whole” it’s a term
that can be used in different industries, therefore Software Development Life Cycle is
a limited term that explains the phases of creating a software component that
integrates with other software components to create the whole system.
Below we’ll take a general look on System Development Life Cycle phases, bearing in
mind that each system is different from the other in terms of complexity, required
components and expected solutions and functionalities:
1- System Planning
The Planning phase is the most crucial step in creating a successful system, during
this phase you decide exactly what you want to do and the problems you’re trying to
solve, by:
Defining the problems, the objectives and the resources such as personnel and costs.
Studying the ability of proposing alternative solutions after meeting with clients, suppliers,
consultants and employees.
After analyzing this data you will have three choices: develop a new system, improve
the current system or leave the system as it is.
2- System Analysis
The end-user’s requirements should be determined and documented, what their
expectations are for the system, and how it will perform. A feasibility study will be
made for the project as well, involving determining whether it’s organizationally,
economically, socially, technologically feasible. it’s very important to maintain strong
communication level with the clients to make sure you have a clear vision of the
finished product and its function.
3- System Design
The design phase comes after a good understanding of customer’s requirements,
this phase defines the elements of a system, the components, the security level,
modules, architecture and the different interfaces and type of data that goes through
the system.
A general system design can be done with a pen and a piece of paper to determine
how the system will look like and how it will function, and then a detailed and
expanded system design is produced, and it will meet all functional and technical
requirements, logically and physically.
In the Software Development Life Cycle, the actual code is written here, and if the
system contains hardware, then the implementation phase will contain configuration
and fine-tuning for the hardware to meet certain requirements and functions.
6- System Maintenance
In this phase, periodic maintenance for the system will be carried out to make sure
that the system won’t become obsolete, this will include replacing the old hardware
and continuously evaluating system’s performance, it also includes providing latest
updates for certain components to make sure it meets the right standards and the
latest technologies to face current security threats.
These are the main six phases of the System Development Life Cycle, and it’s an
iterative process for each project. It’s important to mention that excellent
communication level should be maintained with the customer, and Prototypes are
very important and helpful when it comes to meeting the requirements. By building
the system in short iterations; we can guarantee meeting the customer’s
requirements before we build the whole system.
Many models of system development life cycle came up from the idea of saving
effort, money and time, in addition to minimizing the risk of not meeting the
customer’s requirement at the end of project, some of theses models are SDLC
Iterative Model, and SDLC Agile Model.
Just getting started? Whether you’re looking to become a cloud engineer or you’re a manager
wanting to learn more about this industry, learn the basics about cloud computing here.
Are you wondering about how cloud computing actually works? I’ll
explain the basic principles behind this technology. Cloud computing
presents an ever-expanding universe that intimidates even the smartest
among us.
Take heart. The journey of a thousand miles begins with a single step.
Even if you’ve only just begun to get acquainted with technology and
computing, you’ve almost certainly heard cloud computing being brought
up as a hot topic in conversations. The information below will inform you
about this popular technology and help you understand why it such
dominant topic of conversation in our tech-driven society.
Plus, we’ll look at what you can expect from the future of cloud
computing.
What Is Cloud Computing?
Cloud computing may seem like a foreign concept, but you probably use it
every day without even realizing it. Here are some familiar tasks that are
made possible through cloud computing:
There are several factors that set cloud computing technology apart from
other options, and which make it especially attractive for business use. For
starters, cloud computing technology provides a managed service so you
can just focus on whatever task you’re doing that’s supported by the
service.
When using your “local” version of Microsoft Word, you have to go into
the program’s preferences and specify you want versions of your files to
be periodically saved. Once you’ve done that, you can breathe easy
knowing that, if you have a sudden power outage or other crisis that results
in lost work, you’ll at least have a version of your file that was saved
within the last few minutes. Even then, there’s always the chance your
hard drive might crash, causing you to lose your work, despite taking the
time to tweak settings so your versions are automatically saved.
Many cloud computing services are available on-demand and are quite
scalable. If your needs vary from one month to the next, its likely you can
simply pay more or less depending on how your usage changes.
Traditionally, there was always the risk of buying a pricey computer
network and realizing it was larger than you needed, or perhaps
discovering that the setup you have is much too small for what you’re
trying to do. Cloud computing makes these scenarios less likely because
you may subscribe to most cloud computing services without getting
locked into lengthy contracts.
Like any other type of technology, cloud computing has both good and bad
attributes. Although we touched on a few advantages in the previous
section, let’s go into more depth about the benefits of cloud technology,
and then examine the potential downsides.
Things move very quickly in the cloud computing world. In early 2006,
Amazon became the first provider of a public cloud computing service.
Now, a decade later, the online retailer is still a massive force in the cloud
computing industry, but is no longer the lone entity.
Let’s look at some of the things analysts think are likely to happenas the
cloud computing industry continues to grow and evolve, according to the
Wikibon 2015 Future of Cloud Computing survey:
Now you have a general overview of how cloud computing works, why it
has become a desirable type of service and what the future may hold for
this technology. The next step is acquiring a greater technical
understanding of specific providers like AWS, Microsoft Azure, or Google
Cloud Platform. Cloud Academy offers myriad resources for profitable
cloud journey. Their video courses focus on practical subjects that move
students along quickly. They boast a considerable stable of experienced IT
professionals turned educators who share their hard-earned knowledge
freely.