Você está na página 1de 16

1

ADL 06 Computers in Management V2


1. Explain information system? Discuss arious information systems aaila!le in any organi"ation.
A.1 #n a ery !roa$ sense% t&e term information system is fre'uently use$ to refer to t&e interaction !et(een people%
processes% $ata an$ tec&nology. #n t&is sense% t&e term is use$ to refer not only to t&e information an$ communication
tec&nology )#C*+ an organi"ation uses% !ut also to t&e (ay in (&ic& people interact (it& t&is tec&nology in support of
!usiness processes.
,ome ma-e a clear $istinction !et(een information systems% #C* an$ !usiness processes. #nformation systems are $istinct
from information tec&nology in t&at an information system is typically seen as &aing an #C* component. #nformation
systems are also $ifferent from !usiness processes. #nformation systems &elp to control t&e performance of !usiness
processes.
Alter argues for an information system as a special type of (or- system. A (or- system is a system in (&ic& &umans
an$.or mac&ines perform (or- using resources )inclu$ing #C*+ to pro$uce specific pro$ucts an$.or serices for customers.
An information system is a (or- system (&ose actiities are $eote$ to processing )capturing% transmitting% storing%
retrieing% manipulating an$ $isplaying+information
/
.
0art of t&e $ifficulty in $efining t&e term information system is $ue to agueness in t&e $efinition of relate$ terms suc& as
system an$ information. 1eynon2Daies argues for a clearer terminology !ase$ in systemics an$ semiotics. 3e $efines an
information system as an example of a system concerne$ (it& t&e manipulation of signs. An information system is a type
of socio2tec&nical system. An information system is a me$iating construct !et(een actions an$ tec&nology.
As suc&% information systems inter2relate (it& $ata systems on t&e one &an$ an$ actiity systems on t&e ot&er. An
information system is a form of communication system in (&ic& $ata represent an$ are processe$ as a form of social
memory. An information system can also !e consi$ere$ a semi2formal language (&ic& supports &uman $ecision ma-ing
an$ action.
#nformation systems are t&e primary focus of stu$y for t&e information systems $iscipline an$ for organisational
informatics.
3o(eer% as ne( information tec&nologies &ae !een $eelope$% ne( categories of information systems &ae emerge$%
some of (&ic& no longer fit easily into t&e original pyrami$ mo$el. ,ome examples of suc& systems are4
Various Information system in an organistaion:
Data (are&ouses 4 Data warehouse is a repository of an organi"ation5s electronically store$ $ata. Data (are&ouses are
$esigne$ to facilitate reporting an$ analysis.
A $ata (are&ouse &ouses a stan$ar$i"e$% consistent% clean an$ integrate$ form of $ata source$ from arious operational
systems in use in t&e organi"ation% structure$ in a (ay to specifically a$$ress t&e reporting an$ analytic re'uirements.
Enterprise Resource Planning )ERP+ is a term usually use$ in con6unction (it& E70 soft(are or an E70 system (&ic& is
inten$e$ to manage all t&e information an$ functions of a !usiness or company from s&are$ $ata stores.
An E70 system typically &as mo$ular &ar$(are an$ soft(are units an$ 8serices8 t&at communicate on a local area
net(or-. *&e mo$ular $esign allo(s a !usiness to a$$ or reconfigure mo$ules )per&aps from $ifferent en$ors+ (&ile
presering $ata integrity in one s&are$ $ata!ase t&at may !e centrali"e$ or $istri!ute$
Enterprise systems )ES+ are large2scale% integrate$ application2soft(are pac-ages t&at use t&e computational% $ata storage%
an$ $ata transmission po(er of mo$ern information tec&nology )#*+ to support processes% information flo(s% reporting% an$
$ata analytics (it&in an$ !et(een complex organi"ations. #n s&ort% E, are pac-age$ enterprise application soft(are
)0EA,+ systems% (&ere all t&ree a$6ecties% 8pac-age$8% 8enterprise8% an$ 8application8% in com!ination% restrict t&e set of
t&ings t&at can !e calle$ E,
An expert system is soft(are t&at attempts to proi$e an ans(er to a pro!lem% or clarify uncertainties (&ere normally one
or more &uman experts (oul$ nee$ to !e consulte$. Expert systems are most common in a specific pro!lem $omain% an$ is
a tra$itional application an$.or su!fiel$ of artificial intelligence. A (i$e ariety of met&o$s can !e use$ to simulate t&e
performance of t&e expert &o(eer common to most or all are 1+ t&e creation of a so2calle$ 8-no(le$ge!ase8 (&ic& uses
some -no(le$ge representation formalism to capture t&e ,u!6ect Matter Expert5s ),ME+ -no(le$ge an$ 2+ a process of
gat&ering t&at -no(le$ge from t&e ,ME an$ co$ifying it accor$ing to t&e formalism% (&ic& is calle$ -no(le$ge
engineering.
*&ere is a ariety of $efinitions an$ un$erstan$ings of a 9lo!al #nformation ,ystem )9#,% 9L#,+% suc& as
2
A global information system (!IS" is an information system (&ic& is $eelope$ an$ . or use$ in a glo!al
context.
/1:

A global information system )9L#,+ is any information system (&ic& attempts to $elier t&e totality of
measura!le $ata (orl$(i$e (it&in a $efine$ context. );,<+
*&e term 9lo!al #nformation ,ystem &as t&e same acronym is t&e same% t&e meaning is $ifferent from t&e term 9eograp&ic
#nformation ,ystems.
#ffice automation refers to t&e arie$ computer mac&inery an$ soft(are use$ to $igitally create% collect% store%
manipulate% an$ relay office information nee$e$ for accomplis&ing !asic tas-s an$ goals. 7a( $ata storage% electronic
transfer% an$ t&e management of electronic !usiness information comprise t&e !asic actiities of an office automation
system.
/1:
=ffice automation &elps in optimi"ing or automating existing office proce$ures.
*&e !ac-!one of office automation is a LA>% (&ic& allo(s users to transmit $ata% mail an$ een oice across t&e net(or-.
All office functions% inclu$ing $ictation% typing% filing% copying% fax% *elex% microfilm an$ recor$s management% telep&one
an$ telep&one s(itc&!oar$ operations% fall into t&is category. =ffice automation (as a popular term in t&e 1?@0s an$ 1?A0s
as t&e $es-top computer explo$e$ onto t&e scene.
/2:
2. Explain t&e concept !e&in$ 1atc& processing an$ transaction processing system.
A.2 1atc& processing is execution of a series of programs )86o!s8+ on a computer (it&out manual interention.
1atc& 6o!s are set up so t&ey can !e run to completion (it&out manual interention% so all input $ata is preselecte$ t&roug&
scripts or comman$2line parameters. *&is is in contrast to 8online8 or interactie programs (&ic& prompt t&e user for suc&
input. A program ta-es a set of $ata files as input% process t&e $ata% an$ pro$uces a set of output $ata files. *&is operating
enironment is terme$ as 8!atc& processing8 !ecause t&e input $ata are collecte$ into !atc&es on files an$ are processe$ in
!atc&es !y t&e program.
1atc& processing &as t&ese !enefits4
#t allo(s s&aring of computer resources among many users an$ programs%
#t s&ifts t&e time of 6o! processing to (&en t&e computing resources are less !usy%
#t aoi$s i$ling t&e computing resources (it& minute2!y2minute mannual interention an$ superision%
1y -eeping &ig& oerall rate of utili"ation% it !etter amorti"es t&e cost of a computer% especially an expensie one.
#n computer science% transaction processing is information processing t&at is $ii$e$ into in$ii$ual% in$iisi!le operations%
calle$ transactions. Eac& transaction must succee$ or fail as a complete unitB it cannot remain in an interme$iate state.
*ransaction processing is $esigne$ to maintain a computer system )typically% !ut not limite$ to% a $ata!ase or some mo$ern
filesystems+ in a -no(n% consistent state% !y ensuring t&at any operations carrie$ out on t&e system t&at are inter$epen$ent
are eit&er all complete$ successfully or all cancele$ successfully.
<or example% consi$er a typical !an-ing transaction t&at inoles moing C@00 from a customer5s saings account to a
customer5s c&ec-ing account. *&is transaction is a single operation in t&e eyes of t&e !an-% !ut it inoles at least t(o
separate operations in computer terms4 $e!iting t&e saings account !y C@00% an$ cre$iting t&e c&ec-ing account !y C@00.
#f t&e $e!it operation succee$s !ut t&e cre$it $oes not )or vice versa), t&e !oo-s of t&e !an- (ill not !alance at t&e en$ of
t&e $ay. *&ere must t&erefore !e a (ay to ensure t&at eit&er !ot& operations succee$ or !ot& fail% so t&at t&ere is neer any
inconsistency in t&e !an-5s $ata!ase as a (&ole. *ransaction processing is $esigne$ to proi$e t&is.
*ransaction processing guar$s against &ar$(are an$ soft(are errors t&at mig&t leae a transaction partially complete$% (it&
t&e system left in an un-no(n% inconsistent state. #f t&e computer system cras&es in t&e mi$$le of a transaction% t&e
transaction processing system guarantees t&at all operations in any uncommitted )i.e., not completely processe$+
transactions are cancelle$.
*ransactions are processe$ in a strict c&ronological or$er. #f transaction n+1 intends to touc& t&e same portion of t&e
$ata!ase as transaction n, transaction n+1 $oes not !egin until transaction n is committe$. 1efore any transaction is
committe$% all ot&er transactions affecting t&e same part of t&e system must also !e committe$B t&ere can !e no D&olesE in
t&e se'uence of prece$ing transactions
F. ,&o( (it& reference !loc- $iagram t&e arious components of a computer systems in $etail.
F
A$% &loc' Diagram of (omputer:
GH
A computer can process $ata% pictures% soun$ an$ grap&ics. *&ey can sole &ig&ly complicate$ pro!lems 'uic-ly an$
accurately.
Input )nit:
Computers nee$ to receie $ata an$ instruction in or$er to sole any pro!lem. *&erefore (e nee$ to input t&e $ata an$
instructions into t&e computers. *&e input unit consists of one or more input $eices. Iey!oar$ is t&e one of t&e most
commonly use$ input $eice. =t&er commonly use$ input $eices are t&e mouse% floppy $is- $rie% magnetic tape% etc. All
t&e input $eices perform t&e follo(ing functions.
Accept t&e $ata an$ instructions from t&e outsi$e (orl$.
Conert it to a form t&at t&e computer can un$erstan$.
,upply t&e conerte$ $ata to t&e computer system for furt&er processing.
Storage )nit:
*&e storage unit of t&e computer &ol$s $ata an$ instructions t&at are entere$ t&roug& t&e input unit% !efore t&ey are
processe$. #t preseres t&e interme$iate an$ final results !efore t&ese are sent to t&e output $eices. #t also saes t&e $ata
for t&e later use. *&e arious storage $eices of a computer system are $ii$e$ into t(o categories.
1. 0rimary ,torage4 ,tores an$ proi$es ery fast. *&is memory is generally use$ to &ol$ t&e program !eing currently
execute$ in t&e computer% t&e $ata !eing receie$ from t&e input unit% t&e interme$iate an$ final results of t&e program. *&e
primary memory is temporary in nature. *&e $ata is lost% (&en t&e computer is s(itc&e$ off. #n or$er to store t&e $ata
permanently% t&e $ata &as to !e transferre$ to t&e secon$ary memory.
*&e cost of t&e primary storage is more compare$ to t&e secon$ary storage. *&erefore most computers &ae limite$
primary storage capacity.
2. ,econ$ary ,torage4 ,econ$ary storage is use$ li-e an arc&ie. #t stores seeral programs% $ocuments% $ata !ases etc. *&e
programs t&at you run on t&e computer are first transferre$ to t&e primary memory !efore it is actually run. J&eneer t&e
results are sae$% again t&ey get store$ in t&e secon$ary memory. *&e secon$ary memory is slo(er an$ c&eaper t&an t&e
primary memory. ,ome of t&e commonly use$ secon$ary memory $eices are 3ar$ $is-% CD% etc.%
*emory Si+e:
All $igital computers use t&e !inary system% i.e. 0Ks an$ 1Ks. Eac& c&aracter or a num!er is represente$ !y an A !it co$e.
*&e set of A !its is calle$ a !yte.
A c&aracter occupies 1 !yte space.
A numeric occupies 2 !yte space.
1yte is t&e space occupie$ in t&e memory.
*&e si"e of t&e primary storage is specifie$ in I1 )Iilo!ytes+ or M1 )Mega!yte+. =ne I1 is e'ual to 102L !ytes an$ one
M1 is e'ual to 1000I1. *&e si"e of t&e primary storage in a typical 0C usually starts at 16M1. 0Cs &aing F2 M1% LAM1%
12A M1% 2M6M1 memory are 'uite common.
#utput )nit:
*&e output unit of a computer proi$es t&e information an$ results of a computation to outsi$e (orl$. 0rinters% Visual
Display ;nit )VD;+ are t&e commonly use$ output $eices. =t&er commonly use$ output $eices are floppy $is- $rie%
&ar$ $is- $rie% an$ magnetic tape $rie.
Arithmetic !ogical )nit:
All calculations are performe$ in t&e Arit&metic Logic ;nit )AL;+ of t&e computer. #t also $oes comparison an$ ta-es
$ecision. *&e AL; can perform !asic operations suc& as a$$ition% su!traction% multiplication% $iision% etc an$ $oes logic
operations i"% N% H% O% Petc. J&eneer calculations are re'uire$% t&e control unit transfers t&e $ata from storage unit to
AL; once t&e computations are $one% t&e results are transferre$ to t&e storage unit !y t&e control unit an$ t&en it is sen$ to
t&e output unit for $isplaying results.
(ontrol )nit:
#t controls all ot&er units in t&e computer. *&e control unit instructs t&e input unit% (&ere to store t&e $ata after receiing it
from t&e user. #t controls t&e flo( of $ata an$ instructions from t&e storage unit to AL;. #t also controls t&e flo( of results
from t&e AL; to t&e storage unit. *&e control unit is generally referre$ as t&e central nerous system of t&e computer t&at
control an$ sync&roni"es its (or-ing.
L
(entral Processing )nit:
*&e control unit an$ AL; of t&e computer are toget&er -no(n as t&e Central 0rocessing ;nit )C0;+. *&e C0; is li-e !rain
performs t&e follo(ing functions4
Q #t performs all calculations.
Q #t ta-es all $ecisions.
Q #t controls all units of t&e computer.
A 0C may &ae C0;2#C suc& as #ntel A0AA% A02A6% A0FA6% A0LA6% Celeron% 0entium% 0entium 0ro% 0entium ##% 0entium ###%
0entium #V% Dual Core% an$ AMD etc.
L. J&at $o you un$erstan$ !y classification of computers? Descri!e (it& example.
A$, Computers are aaila!le in $ifferent s&apes% si"es an$ (eig&ts% $ue to t&ese $ifferent s&apes an$ si"es t&ey perform
$ifferent sorts of 6o!s from one anot&er.
*&ey can also !e classifie$ in $ifferent (ays. All t&e computers are $esigne$ !y t&e 'ualifie$ computer arc&itectures t&at
$esign t&ese mac&ines as t&eir re'uirements.
A computer t&at is use$ in a &ome $iffers in si"e an$ s&ape from t&e computer !eing use$ in a &ospital. Computers act as a
serer in large !uil$ings% (&ile t&e computer also $iffers in si"e an$ s&ape performing its 6o! as a (eat&er forecaster.
A stu$ent carrying a laptop (it& &im to &is college is $ifferent in s&ape an$ si"e from all t&e computers mentione$ a!oe.
3ere (e are going to intro$uce $ifferent classifications of computers one !y one. Je (ill $iscuss (&at are in classifications
an$ (&at 6o! t&ey perform.
,uper computer
*&e !iggest in si"e% t&e most expensie in price t&an any ot&er is classifie$ an$ -no(n as super computer. #t can process
trillions of instructions in secon$s. *&is computer is not use$ as a 0C in a &ome neit&er !y a stu$ent in a college.
9oernments specially use t&is type of computer for t&eir $ifferent calculations an$ &eay 6o!s. Different in$ustries also
use t&is &uge computer for $esigning t&eir pro$ucts.
#n most of t&e 3olly(oo$Ks moies it is use$ for animation purposes. *&is -in$ of computer is also &elpful for forecasting
(eat&er reports (orl$(i$e.
Mainframes
Anot&er giant in computers after t&e super computer is Mainframe% (&ic& can also process millions of instruction per
secon$ an$ capa!le of accessing !illions of $ata.
*&is computer is commonly use$ in !ig &ospitals% air line reserations companies% an$ many ot&er &uge companies prefer
mainframe !ecause of its capa!ility of retrieing $ata on a &uge !asis.
*&is is normally to expensie an$ out of reac& from a salary2!ase$ person (&o (ants a computer for &is &ome.
*&is -in$ of computer can cost up to t&ousan$s of $ollars.
Minicomputer
*&is computer is next in &e line !ut less offers less t&an mainframe in (or- an$ performance. *&ese are t&e computers%
(&ic& are mostly preferre$ !y t&e small type of !usiness personals% colleges% etc.
0ersonal computers
Almost all t&e computer users are familiar (it& t&e personal computers. *&ey normally -no( (&at t&e personal computer
is an$ (&at its functions are.
*&is is t&e computer mostly preferre$ !y t&e &ome users. *&ese computers are lesser in cost t&an t&e computers gien
a!oe an$ also% small in si"eB t&ey are also calle$ 0Cs in s&ort for 0ersonal computers.
*&is computer is small in si"e an$ you can easily arrange it to fit in your single !e$room (it& its all accommo$ation. *o$ay
t&is is t&oug&t to !e t&e most popular computer in all.
>ote!oo- computers
3aing a small si"e an$ lo( (eig&t t&e note!oo- is easy to carry to any(&ere. A stu$ent can ta-e it (it& &im.&er to &is.&er
M
sc&ool in &is.&er !ag (it& &is.&er !oo-.
*&is is easy to carry aroun$ an$ preferc.2re$ !y stu$ents an$ !usiness people to meet t&eir assignments an$ ot&er necessary
tas-s.
*&e approac& of t&is computer is also t&e same as t&e 0ersonal computer. #t can store t&e same amount of $ata an$ &aing a
memory of t&e same si"e as t&at of a personal computer. =ne can say t&at it is t&e replacement of personal $es-top
computer.
M. J&at $o you mean !y D1M, along (it& t&e facilities aaila!le? Also mention t&e role of $ata!ase
a$ministrator.
A.M (omputer memory refers to $eices t&at are use$ to store $ata or programs )se'uences of instructions+ on a
temporary or permanent !asis for use in an electronic $igital computer. Computers represent information in !inary co$e%
(ritten as se'uences of 0s an$ 1s. Eac& !inary $igit )or 8!it8+ may !e store$ !y any p&ysical system t&at can !e in eit&er of
t(o sta!le states% to represent 0 an$ 1. ,uc& a system is calle$ !ista!le. *&is coul$ !e an on2off s(itc&% an electrical
capacitor t&at can store or lose a c&arge% a magnet (it& its polarity up or $o(n% or a surface t&at can &ae a pit or not.
*o$ay% capacitors an$ transistors% functioning as tiny electrical s(itc&es% are use$ for temporary storage% an$ eit&er $is-s or
tape (it& a magnetic coating% or plastic $iscs (it& patterns of pits are use$ for long2term storage.
Computer memory is usually meant to refer to t&e semicon$uctor tec&nology t&at is use$ to store information in electronic
$eices. Current primary computer memory ma-es use of integrate$ circuits consisting of silicon2!ase$ transistors. *&ere
are t(o main types of memory4 olatile an$ non2olatile.
A.6 A Database *anagement System )D&*S+ is a set of computer programs t&at controls t&e creation% maintenance% an$
t&e use of t&e $ata!ase in a computer platform or of an organi"ation an$ its en$ users. #t allo(s organi"ations to place
control of organi"ation2(i$e $ata!ase $eelopment in t&e &an$s of $ata!ase a$ministrators )D1As+ an$ ot&er specialists. A
D1M, is a system soft(are pac-age t&at &elps t&e use of integrate$ collection of $ata recor$s an$ files -no(n as
$ata!ases. #t allo(s $ifferent user application programs to easily access t&e same $ata!ase. D1M,s may use any of a
ariety of $ata!ase mo$els% suc& as t&e net(or- mo$el or relational mo$el. #n large systems% a D1M, allo(s users an$
ot&er soft(are to store an$ retriee $ata in a structure$ (ay. #nstea$ of &aing to (rite computer programs to extract
information% user can as- simple 'uestions in a 'uery language. *&us% many D1M, pac-ages proi$e <ourt&2generation
programming language )L9Ls+ an$ ot&er application $eelopment features. #t &elps to specify t&e logical organi"ation for a
$ata!ase an$ access an$ use t&e information (it&in a $ata!ase. #t proi$es facilities for controlling $ata access% enforcing
$ata integrity% managing concurrency controlle$% restoring $ata!ase.
-atabase a-ministrator )D&A+ is a person responsi!le for t&e $esign% implementation% maintenance an$ repair of an
organi"ation5s $ata!ase. *&ey are also -no(n !y t&e titles Database Coordinator or Database Programmer% an$ is closely
relate$ to t&e Database Analyst% Database Modeler% Programmer Analyst% an$ Systems Manager
*&e $uties of a $ata!ase a$ministrator ary $epen$ing on 6o! $escription% corporate an$ #nformation *ec&nology )#*+
policies an$ t&e tec&nical features an$ capa!ilities of t&e D1M, !eing a$ministere$. *&ey inclu$e $isaster recoery
)!ac-ups an$ testing of !ac-ups+% performance analysis an$ tuning% $ata $ictionary maintenance% an$ $ata!ase $esign.
7oles of t&e D1A inclu$e4
#nstallation of ne( soft(are R #t is t&e 6o! of t&e D1A to install ne( ersions of D1M, soft(are% application
soft(are% an$ ot&er soft(are relate$ to D1M, a$ministration. #t is important t&at t&e D1A or ot&er #, staff
mem!ers test ne( soft(are !efore it is moe$ into a pro$uction enironment.
Configuration of &ar$(are an$ soft(are (it& t&e system a$ministrator R #n many cases t&e system soft(are can
only !e accesse$ !y t&e system a$ministrator. #n t&is case% t&e D1A (or-s closely (it& t&e system a$ministrator
to perform soft(are installations% an$ to configure &ar$(are an$ soft(are so t&at it functions optimally (it& t&e
D1M,.
,ecurity a$ministration R =ne of t&e main $uties of t&e D1A is to monitor an$ a$minister D1M, security. *&is
inoles a$$ing an$ remoing users% a$ministering 'uotas% au$iting% an$ c&ec-ing for security pro!lems.
Data analysis R *&e D1A analy"es $ata store$ in t&e $ata!ase an$ ma-es recommen$ations relating to
performance an$ efficiency of t&at $ata storage. *&is inclu$es t&e effectie use of in$exes% ena!ling 80arallel
Suery8 execution% or ot&er D1M, specific features.
6
Data!ase $esign )preliminary+ R *&e D1A can !e inole$ at t&e preliminary $ata!ase2$esign stages% eliminating
many pro!lems t&at mig&t occur. *&e D1A -no(s t&e D1M, an$ system% can point out potential pro!lems% an$
can &elp t&e $eelopment team (it& special performance consi$erations.
Data mo$eling an$ optimi"ation R 1y mo$eling t&e $ata% it is possi!le to optimi"e t&e system layouts to ta-e t&e
most a$antage of t&e #.= su!system.
Assignment &
S1. J&at is meant !y >et(or- topology along (it& $ifferent net(or- mo$els?
A.1 .etwor' topology is t&e p&ysical interconnections of t&e elements )lin-s% no$es% etc.+ of a computer net(or-. A local
area net(or- )LA>+ is one example of a net(or- t&at ex&i!its !ot& a p&ysical topology an$ a logical topology. Any gien
no$e in t&e LA> &as one or more lin-s to one or more ot&er no$es in t&e net(or- an$ t&e mapping of t&ese lin-s an$ no$es
in a grap& results in a geometrical s&ape t&at may !e use$ to $escri!e t&e p&ysical topology of t&e net(or-. Li-e(ise% t&e
mapping of t&e $ata flo(s !et(een t&e no$es in t&e net(or- $etermines t&e logical topology of t&e net(or-. *&e p&ysical
an$ logical topologies may or may not !e i$entical in any particular net(or-.
Any particular net(or- topology is $etermine$ only !y t&e grap&ical mapping of t&e configuration of p&ysical an$.or
logical connections !et(een no$es. *&e stu$y of net(or- topology uses grap& t&eory. Distances !et(een no$es% p&ysical
interconnections% transmission rates% an$.or signal types may $iffer in t(o net(or-s an$ yet t&eir topologies may !e
i$entical.
*&e stu$y of net(or- topology recogni"es four !asic topologies4
1us topology
,tar topology
7ing topology
*ree topology
*&ere are also t&ree !asic categories of net(or- topologies4
p&ysical topologies
signal topologies
logical topologies
*&e terms signal topology an$ logical topology are often use$ interc&angea!ly% t&oug& t&ere is a su!tle $ifference !et(een
t&e t(o
Bus
1us net(or- topology
#n local area net(or-s (&ere !us tec&nology is use$% eac& mac&ine is
connecte$ to a single ca!le. Eac& computer or serer is connecte$ to t&e single
!us ca!le t&roug& some -in$ of connector. A terminator is re'uire$ at eac&
en$ of t&e !us ca!le to preent t&e signal from !ouncing !ac- an$ fort& on t&e
!us ca!le. A signal from t&e source traels in !ot& $irections to all mac&ines connecte$ on t&e !us ca!le until it
fin$s t&e MAC a$$ress or #0 a$$ress on t&e net(or- t&at is t&e inten$e$ recipient. #f t&e mac&ine a$$ress $oes not
matc& t&e inten$e$ a$$ress for t&e $ata% t&e mac&ine ignores t&e $ata. Alternatiely% if t&e $ata $oes matc& t&e
mac&ine a$$ress% t&e $ata is accepte$. ,ince t&e !us topology consists of only one (ire% it is rat&er inexpensie to
@
implement (&en compare$ to ot&er topologies. 3o(eer% t&e lo( cost of implementing t&e tec&nology is offset !y
t&e &ig& cost of managing t&e net(or-. A$$itionally% since only one ca!le is utili"e$% it can !e t&e single point of
failure. #f t&e net(or- ca!le !rea-s% t&e entire net(or- (ill !e $o(n
Star
,tar net(or- topology
#n local area net(or-s (&ere t&e star topology is use$% eac& mac&ine is connecte$ to a
central &u!. #n contrast to t&e !us topology% t&e star topology allo(s eac& mac&ine on
t&e net(or- to &ae a point to point connection to t&e central &u!. All of t&e traffic
(&ic& transerses t&e net(or- passes t&roug& t&e central &u!. *&e &u! acts as a signal
!ooster or repeater (&ic& in turn allo(s t&e signal to trael greater $istances. As a
result of eac& mac&ine connecting $irectly to t&e &u!% t&e star topology is consi$ere$
t&e easiest topology to $esign an$ implement. An a$antage of t&e star topology is t&e
simplicity of a$$ing ot&er mac&ines. *&e primary $isa$antage of t&e star topology is
t&e &u! is a single point of failure. #f t&e &u! (ere to fail t&e entire net(or- (oul$ fail as a result of t&e &u! !eing
connecte$ to eery mac&ine on t&e net(or-.
Ring
7ing net(or- topology
#n local area net(or-s (&ere t&e ring topology is use$% eac& computer is
connecte$ to t&e net(or- in a close$ loop or ring. Eac& mac&ine or computer
&as a uni'ue a$$ress t&at is use$ for i$entification purposes. *&e signal passes
t&roug& eac& mac&ine or computer connecte$ to t&e ring in one $irection.
7ing topologies typically utili"e a to-en passing sc&eme% use$ to control
access to t&e net(or-. 1y utili"ing t&is sc&eme% only one mac&ine can
transmit on t&e net(or- at a time. *&e mac&ines or computers connecte$ to
t&e ring act as signal !oosters or repeaters (&ic& strengt&en t&e signals t&at
transerse t&e net(or-. *&e primary $isa$antage of ring topology is t&e failure of one mac&ine (ill cause t&e
entire net(or- to fail.
Tree
*ree net(or- topology
Also -no(n as a hierarchical networ'.
*&e type of net(or- topology in (&ic& a central 5root5 no$e )t&e top leel of t&e
&ierarc&y+ is connecte$ to one or more ot&er no$es t&at are one leel lo(er in t&e
&ierarc&y )i.e.% t&e secon$ leel+ (it& a point2to2point lin- !et(een eac& of t&e secon$
leel no$es an$ t&e top leel central 5root5 no$e% (&ile eac& of t&e secon$ leel no$es t&at are connecte$ to t&e top leel
central 5root5 no$e (ill also &ae one or more ot&er no$es t&at are one leel lo(er in t&e &ierarc&y )i.e.% t&e t&ir$ leel+
connecte$ to it% also (it& a point2to2point lin-% t&e top leel central 5root5 no$e !eing t&e only no$e t&at &as no ot&er no$e
a!oe it in t&e &ierarc&y )*&e &ierarc&y of t&e tree is symmetrical.+ Eac& no$e in t&e net(or- &aing a specific fixe$
num!er% of no$es connecte$ to it at t&e next lo(er leel in t&e &ierarc&y% t&e num!er% !eing referre$ to as t&e 5!ranc&ing
factor5 of t&e &ierarc&ical tree.
A
A.2 Data transmission% is t&e p&ysical transfer of $ata )a $igital !it stream+ oer a point2to2point or point2to2multipoint
transmission me$ium. Examples of suc& me$ia are copper (ires% optical fi!ers% (ireless communication me$ia% an$
storage me$ia. *&e $ata is often represente$ as an electro2magnetic signal% suc& as an electrical oltage signal% a ra$io(ae
or micro(ae signal or an infra2re$ signal.
J&ile analog communications represents a continuously arying signal% a $igital transmission can !e !ro-en $o(n into
$iscrete messages. *&e messages are eit&er represente$ !y a se'uence of pulses !y means of a line co$e )baseband
transmission+% or !y a limite$ set of analogue (ae forms )passband transmission+% using a $igital mo$ulation met&o$.
Accor$ing to t&e most common $efinition of $igital signal% !ot& !ase!an$ an$ pass!an$ signals representing !it2streams
are consi$ere$ as $igital transmission% (&ile an alternatie $efinition only consi$ers t&e !ase!an$ signal as $igital% an$ t&e
pass!an$ transmission as a form of $igital2to2analog conersion.
ransmission media are t&e p&ysical pat&(ays t&at connect computers% ot&er $eices% an$ people on a net(or-Rt&e
&ig&(ays an$ !y(ays t&at comprise t&e information super&ig&(ay. Eac& transmission me$ium re'uires speciali"e$
net(or- &ar$(are t&at &as to !e compati!le (it& t&at me$ium. Tou &ae pro!a!ly &ear$ terms suc& as Layer 1% Layer 2%
an$ so on. *&ese refer to t&e =,# reference mo$el% (&ic& $efines net(or- &ar$(are an$ serices in terms of t&e functions
t&ey perform. )*&e =,# reference mo$el is $iscusse$ in $etail in C&apter M% 8Data Communications 1asics.8+ *ransmission
me$ia operate at Layer 1 of t&e =,# mo$el4 *&ey encompass t&e p&ysical entity an$ $escri!e t&e types of &ig&(ays on
(&ic& oice an$ $ata can trael.
#t (oul$ !e conenient to construct a net(or- of only one me$ium. 1ut t&at is impractical for anyt&ing !ut an extremely
small net(or-. #n general% net(or-s use com!inations of me$ia types. *&ere are t&ree main categories of me$ia types4
(opper cable/*ypes of ca!le inclu$e uns&iel$e$ t(iste$2pair );*0+% s&iel$e$ t(iste$2pair ),*0+% an$ coaxial ca!le.
Copper2!ase$ ca!les are inexpensie an$ easy to (or- (it& compare$ to fi!er2optic ca!les% !ut as you5ll learn (&en
(e get into t&e specifics% a ma6or $isa$antage of ca!le is t&at it offers a rat&er limite$ spectrum t&at cannot &an$le t&e
a$ance$ applications of t&e future% suc& as teleimmersion an$ irtual reality.
0ireless/Jireless me$ia inclu$e ra$io fre'uencies% micro(ae% satellite% an$ infrare$. Deployment of (ireless
me$ia is faster an$ less costly t&an $eployment of ca!le% particularly (&ere t&ere is little or no existing infrastructure
)e.g.% Africa% Asia20acific% Latin America% eastern an$ central Europe+. Jireless is also useful (&ere enironmental
circumstances ma-e it impossi!le or cost2pro&i!itie to use ca!le )e.g.% in t&e Ama"on% in t&e Empty Suarter in ,au$i
Ara!ia% on oil rigs+.
*&ere are a fe( $isa$antages associate$ (it& (ireless% &o(eer. 3istorically% (ireless solutions support muc& lo(er
$ata rates t&an $o (ire$ solutions% alt&oug& (it& ne( $eelopments in (ireless !roa$!an$% t&at is !ecoming less of an
issue )see 0art #V% 8Jireless Communications8+. Jireless is also greatly affecte$ !y external impairments% suc& as t&e
impact of a$erse (eat&er% so relia!ility can !e $ifficult to guarantee. 3o(eer% ne( $eelopments in laser2!ase$
communicationsRsuc& as irtual fi!erRcan improe t&is situation. )Virtual fi!er is $iscusse$ in C&apter 1M%
8JMA>s% JLA>s% an$ J0A>s.8+ =f course% one of t&e !iggest concerns (it& (ireless is security4 Data must !e
secure$ in or$er to ensure priacy.
?
1iber optics/<i!er offers enormous !an$(i$t&% immunity to many types of interference an$ noise% an$ improe$
security. *&erefore% fi!er proi$es ery clear communications an$ a relatiely noise2free enironment. *&e $o(nsi$e
of fi!er is t&at it is costly to purc&ase an$ $eploy !ecause it re'uires speciali"e$ e'uipment an$ tec&ni'ues.
A.F #n computing% a )niform Resource !ocator ))R!+ is a su!set of t&e ;niform 7esource #$entifier );7#+ t&at specifies
(&ere an i$entifie$ resource is aaila!le an$ t&e mec&anism for retrieing it. #n popular usage an$ in many tec&nical
$ocuments an$ er!al $iscussions it is often incorrectly use$ as a synonym for ;7#.
/1:
#n popular language% a ;7# is also
referre$ to as a !eb address.
The components of a URL
A ;7L );niform 7esource Locator+ is a specific type of ;7# );niersal 7esource #$entifier+. A ;7L normally locates an
existing resource on t&e #nternet. A ;7L is use$ (&en a Je! client ma-es a re'uest to a serer for a resource.
*&e concepts of t&e ;7# an$ t&e ;7L are $efine$ !y t&e #nternet ,ociety an$ #E*< )#nternet Engineering *as- <orce+
7e'uest for Comments $ocument 7<C 2F?6% "niform #esource $dentifiers %"#$)& 'eneric Synta(
)&ttp4..(((.ietf.org.rfc.rfc2F?6.txt+. 1riefly% a ;7# is $efine$ as any c&aracter string t&at i$entifies a resource. A ;7L is
$efine$ as t&ose ;7#s t&at i$entify a resource !y its location or !y t&e means use$ to access it% rat&er t&an !y a name or
ot&er attri!ute of t&e resource.
A ;7L for 3**0 )or 3**0,+ is normally ma$e up of t&ree or four components4
1. A scheme$ *&e sc&eme i$entifies t&e protocol to !e use$ to access t&e resource on t&e #nternet. #t can !e 3**0
)(it&out ,,L+ or 3**0, )(it& ,,L+.
2. A host$ *&e &ost name i$entifies t&e &ost t&at &ol$s t&e resource. <or example% (((.example.com. A serer
proi$es serices in t&e name of t&e &ost% !ut t&ere is not a one2to2one mapping !et(een &osts an$ serers. 3ost
names explains more a!out &ost names.
3ost names can also !e follo(e$ !y a port number. 0ort num!ers explains more a!out t&ese. Jell2-no(n port
num!ers for a serice are normally omitte$ from t&e ;7L. Most serers use t&e (ell2-no(n port num!ers for
3**0 an$ 3**0,% so most 3**0 ;7Ls omit t&e port num!er.
F. A path$ *&e pat& i$entifies t&e specific resource (it&in t&e &ost t&at t&e Je! client (ants to access. <or example%
.soft(are.&tp.cics.in$ex.&tml.
L. A 2uery string$ #f a 'uery string is use$% it follo(s t&e pat& component% an$ proi$es a string of information t&at
t&e resource can use for some purpose )for example% as parameters for a searc& or as $ata to !e processe$+. *&e
'uery string is usually a string of name an$ alue pairs% for example% 'O!lue!ir$.
*&e sc&eme an$ &ost components of a ;7L are not $efine$ as case2sensitie% !ut t&e pat& an$ 'uery string are case2
sensitie. ;sually% t&e (&ole ;7L is specifie$ in lo(er case.
*&e components of t&e ;7L are com!ine$ an$ $elimite$ as follo(s4
sc&eme4..&ost4port.pat&?'uery
*&e sc&eme is follo(e$ !y a colon an$ t(o for(ar$ slas&es.
#f a port num!er is specifie$% t&at num!er follo(s t&e &ost name% separate$ !y a colon.
*&e pat& name !egins (it& a single for(ar$ slas&.
Ja#f a 'uery string is specifie$% it is prece$e$ !y a 'uestion mar-.
Synta( of an )P "#*
.24A022222.
NN2&ttp4..22U2+ost name22U22U222222222U22.22pat+ component222222N
52$P address25 52422port25
N22U22222222222222222U22222222222222222222222222222222222222222NH
10
52?22,uery string25
'r
*&is is an example of an 3**0 ;7L4
&ttp4..(((.researc&.i!m.com.soft(are.&tp.cics.in$ex.&tml
#f a port num!er (as specifie$% t&e ;7L (oul$ !e4
&ttp4..(((.researc&.i!m.com410F0.soft(are.&tp.cics.in$ex.&tml
A.4 Threats to Computer Security
,ource4
aa('yaaia'o'fS$saa'r'tt'p'o'o'At''Aa'pa'''aay'ViA'u&Ao'oA'ap'Sa''=Sa'(at'''a
a''gaaaAA'apa'ia''aASSa'a'A'pa('ar'a'apAa
f'''g'y'o'
'l'(a'''Af'r'a('
'a(''Va'(afa'a'e''ay('S'('
'a'&''g'=WaaSSA(
a'Ja'S's'a'S(A'rS9'AuA'A An $ntroduction to Computer Security& +e -$S )andboo.
>ational #nstitute of ,tan$ar$s an$ *ec&nology
*ec&nology A$ministration
;.,. Department of Commerce
,pecial 0u!lication A00212
Computer systems are ulnera!le to many t&reats t&at can inflict arious types of $amage resulting in significant losses.
*&is $amage can range from errors &arming $ata!ase integrity to fires $estroying entire computer centers. Losses can stem%
for example% from t&e actions of suppose$ly truste$ employees $efrau$ing a system% from outsi$e &ac-ers% or from careless
$ata entry cler-s. 0recision in estimating computer security2relate$ losses is not possi!le !ecause many losses are neer
$iscoere$% an$ ot&ers are 8s(ept un$er t&e carpet8 to aoi$ unfaora!le pu!licity. *&e effects of arious t&reats aries
consi$era!ly4 some affect t&e confi$entiality or integrity of $ata (&ile ot&ers affect t&e aaila!ility of a system.
1. Errors and Omissions
Errors an$ omissions are an important t&reat to $ata an$ system integrity. *&ese errors are cause$ not only !y $ata entry
cler-s processing &un$re$s of transactions per $ay% !ut also !y all types of users (&o create an$ e$it $ata. Many programs%
especially t&ose $esigne$ !y users for personal computers% lac- 'uality control measures. 3o(eer% een t&e most
sop&isticate$ programs cannot $etect all types of input errors or omissions. A soun$ a(areness an$ training program can
&elp an organi"ation re$uce t&e num!er an$ seerity of errors an$ omissions.
;sers% $ata entry cler-s% system operators% an$ programmers fre'uently ma-e errors t&at contri!ute $irectly or in$irectly to
security pro!lems. #n some cases% t&e error is t&e t&reat% suc& as a $ata entry error or a programming error t&at cras&es a
system. #n ot&er cases% t&e errors create ulnera!ilities. Errors can occur $uring all p&ases of t&e systems life cycle.
2. Fraud and Theft
Computer systems can !e exploite$ for !ot& frau$ an$ t&eft !ot& !y 8automating8 tra$itional met&o$s of frau$ an$ !y using
ne( met&o$s. <or example% in$ii$uals may use a computer to s-im small amounts of money from a large num!er of
financial accounts% assuming t&at small $iscrepancies may not !e inestigate$. <inancial systems are not t&e only ones at
ris-. ,ystems t&at control access to any resource are targets )e.g.% time an$ atten$ance systems% inentory systems% sc&ool
gra$ing systems% an$ long2$istance telep&one systems+. Computer frau$ an$ t&eft can !e committe$ !y insi$ers or
outsi$ers. #nsi$ers )i.e.% aut&ori"e$ users of a system+ are responsi!le for t&e ma6ority of frau$.
,ince insi$ers &ae !ot& access to an$ familiarity (it& t&e ictim computer system )inclu$ing (&at resources it controls
an$ its fla(s+% aut&ori"e$ system users are in a !etter position to commit crimes. #nsi$ers can !e !ot& general users )suc& as
cler-s+ or tec&nical staff mem!ers. An organi"ation5s former employees% (it& t&eir -no(le$ge of an organi"ation5s
operations% may also pose a t&reat% particularly if t&eir access is not terminate$ promptly.
11
. Emp!oyee Sa"ota#e
Employees are most familiar (it& t&eir employer5s computers an$ applications% inclu$ing -no(ing (&at actions mig&t
cause t&e most $amage% misc&ief% or sa!otage. *&e $o(nsi"ing of organi"ations in !ot& t&e pu!lic an$ priate sectors &as
create$ a group of in$ii$uals (it& organi"ational -no(le$ge% (&o may retain potential system access )e.g.% if system
accounts are not $elete$ in a timely manner+. *&e num!er of inci$ents of employee sa!otage is !eliee$ to !e muc& smaller
t&an t&e instances of t&eft% !ut t&e cost of suc& inci$ents can !e 'uite &ig&.
Common e$amp!es of computer%re!ated emp!oyee sa"ota#e inc!ude&
$estroying &ar$(are or facilities%
planting logic !om!s t&at $estroy
programs or $ata%
entering $ata incorrectly%
8cras&ing8 systems%
$eleting $ata%
&ol$ing $ata &ostage% an$
c&anging $ata.
4. Loss of 'hysica! and (nfrastructure Support
*&e loss of supporting infrastructure inclu$es po(er failures )outages% spi-es% an$ !ro(nouts+% loss of communications%
(ater outages an$ lea-s% se(er pro!lems% lac- of transportation serices% fire% floo$% ciil unrest% an$ stri-es.
). *a!icious +ac,ers
*&e term malicious &ac-ers% sometimes calle$ crac-ers% refers to t&ose (&o !rea- into computers (it&out aut&ori"ation.
*&ey can inclu$e !ot& outsi$ers an$ insi$ers. Muc& of t&e rise of &ac-er actiity is often attri!ute$ to increases in
connectiity in !ot& goernment an$ in$ustry. =ne 1??2 stu$y of a particular #nternet site )i.e.% one computer system+
foun$ t&at &ac-ers attempte$ to !rea- in at least once eery ot&er $ay. *&e &ac-er t&reat s&oul$ !e consi$ere$ in terms of
past an$ potential future $amage. Alt&oug& current losses $ue to &ac-er attac-s are significantly smaller t&an losses $ue to
insi$er t&eft an$ sa!otage% t&e &ac-er pro!lem is (i$esprea$ an$ serious.
-. (ndustria! Espiona#e
#n$ustrial espionage is t&e act of gat&ering proprietary $ata from priate companies or t&e goernment for t&e purpose of
ai$ing anot&er company)ies+. #n$ustrial espionage can !e perpetrate$ eit&er !y companies see-ing to improe t&eir
competitie a$antage or !y goernments see-ing to ai$ t&eir $omestic in$ustries. <oreign in$ustrial espionage carrie$ out
!y a goernment is often referre$ to as economic espionage. ,ince information is processe$ an$ store$ on computer
systems% computer security can &elp protect against suc& t&reatsB it can $o little% &o(eer% to re$uce t&e t&reat of aut&ori"e$
employees selling t&at information.
.. *a!icious Code
Malicious co$e refers to iruses% (orms% *ro6an &orses% logic !om!s% an$ ot&er 8uninite$8 soft(are. ,ometimes
mista-enly associate$ only (it& personal computers% malicious co$e can attac- ot&er platforms. Actual costs attri!ute$ to
t&e presence of malicious co$e &ae resulte$ primarily from system outages an$ staff time inole$ in repairing t&e
systems. >onet&eless% t&ese costs can !e significant.
*a!icious Soft/are& A Fe/ 0ey Terms
Virus4 A co$e segment t&at replicates !y attac&ing copies of itself to existing executa!les. *&e ne( copy of t&e irus is
execute$ (&en a user executes t&e ne( &ost program. *&e irus may inclu$e an a$$itional 8payloa$8 t&at triggers (&en
specific con$itions are met. <or example% some iruses $isplay a text string on a particular $ate. *&ere are many types of
iruses% inclu$ing ariants% oer(riting% resi$ent% stealt&% an$ polymorp&ic.
3ro4an 5orse4 A program t&at performs a $esire$ tas-% !ut t&at also inclu$es unexpecte$ )an$ un$esira!le+ functions.
Consi$er as an example an e$iting program for a multiuser system. *&is program coul$ !e mo$ifie$ to ran$omly $elete one
of t&e users5 files eac& time t&ey perform a useful function )e$iting+% !ut t&e $eletions are unexpecte$ an$ $efinitely
un$esire$X
12
0orm4 A self2replicating program t&at is self2containe$ an$ $oes not re'uire a &ost program. *&e program creates a copy
of itself an$ causes it to executeB no user interention is re'uire$. Jorms commonly use net(or- serices to propagate to
ot&er &ost systems.
1. Threats to 'ersona! 'ri2acy
*&e accumulation of ast amounts of electronic information a!out in$ii$uals !y goernments% cre$it !ureaus% an$ priate
companies% com!ine$ (it& t&e a!ility of computers to monitor% process% an$ aggregate large amounts of information a!out
in$ii$uals &ae create$ a t&reat to in$ii$ual priacy. *&e possi!ility t&at all of t&is information an$ tec&nology may !e
a!le to !e lin-e$ toget&er &as arisen as a specter of t&e mo$ern information age.
Fire/a!!s Ad2anta#es
1. A feeling of increase$ security t&at your 0C an$ contents are !eing protecte$.
2. 7elatiely inexpensie or free for personal use.
F. >e( releases are !ecoming user frien$ly.
L. Tou can monitor incoming an$ outgoing security alerts an$ t&e fire(all company (ill recor$ an$ trac- $o(n an
intrusion attempt $epen$ing on t&e seerity.
M. ,ome fire(alls !ut not all can $etect iruses% (orms% *ro6an &orses% or $ata collectors.
6. All fire(alls can !e teste$ for effectieness !y using pro$ucts t&at test for lea-s or pro!e for open ports.
A.M Electronic Data Interchange )EDI+ refers to t&e structure$ transmission of $ata !et(een organi"ations !y electronic
means. #t is use$ to transfer electronic $ocuments from one computer system to anot&er% i.e. from one tra$ing partner to
anot&er tra$ing partner. #t is more t&an mere E2mailB for instance% organi"ations mig&t replace !ills of la$ing an$ een
c&ec-s (it& appropriate ED# messages. #t also refers specifically to a family of stan$ar$s% inclu$ing t&e Y12 series.
3o(eer% ED# also ex&i!its its pre2#nternet roots% an$ t&e stan$ar$s ten$ to focus on A,C## )American ,tan$ar$ Co$e for
#nformation #nterc&ange+2formatte$ single messages rat&er t&an t&e (&ole se'uence of con$itions an$ exc&anges t&at ma-e
up an inter2organi"ation !usiness process.
ADVA.3AES #1 EDI
Companies use ED# to exc&ange information for a ariety of $ifferent reasons% mainly increase$ efficiency an$ cost
saings. <or example% ED# allo(s !usiness transactions to occur in less time an$ (it& fe(er errors t&an $o tra$itional%
paper2!ase$ means. #t re$uces t&e amount of inentory companies must inest in !y closely tying manufacturing to actual
$eman$% allo(ing for 6ust2in2time $eliery. 1y $oing a(ay (it& paper forms% ED# also re$uces postage costs an$ t&e
expenses an$ space consi$erations inole$ in paper2!ase$ recor$ storage. ,ome companies &ae seen $ramatic
improements in t&eir !usiness processes% suc& as t&e s&ortening of $eliery times from $ays to &ours. 3o(eer% ot&er ED#
users &ae continue$ to experience snags. #n Planet $, 0rocter Z 9am!le% a lea$ing pac-age$ goo$s manufacturer%
reporte$ t&at it foun$ errors in more t&an F0 percent of its electronic or$ers% alt&oug& t&ese (ere mainly $ue to &uman
mista-es.
Alt&oug& many companies $on5t ie( ED# as a strategic (eapon% it certainly can !e use$ as one. 3aing t&e capa!ility to
engage in ED# is a mar-eting tool% !ecause it ma-es suppliers attractie to retailers an$ ot&er companies (&o !uy goo$s
an$ serices. #n a situation (&ere seeral suppliers offer similar pro$ucts% !eing ED#2ena!le$ can !e an important
$ifferential. ED# also can !e use$ to form alliances !et(een companies t&at proi$e a$antages oer competitors in seeral
1F
(ays% inclu$ing t&e a!ility to offer t&e lo(est mar-et prices an$ t&e !est customer serice. ,uc& alliances also can lea$ to
ne(er or more innoatie serices.
Disadvantages:
*&ere are a fe( !arriers to a$opting electronic $ata interc&ange. =ne of t&e most significant !arriers is t&e accompanying
!usiness process c&ange. Existing !usiness processes !uilt aroun$ slo( paper &an$ling may not !e suite$ for ED# an$
(oul$ re'uire c&anges to accommo$ate automate$ processing of !usiness $ocuments. <or example% a !usiness may receie
t&e !ul- of t&eir goo$s !y 1 or 2 $ay s&ipping an$ all of t&eir inoices !y mail. *&e existing process may t&erefore assume
t&at goo$s are typically receie$ !efore t&e inoice. Jit& ED#% t&e inoice (ill typically !e sent (&en t&e goo$s s&ip an$
(ill t&erefore re'uire a process t&at &an$les large num!ers of inoices (&ose correspon$ing goo$s &ae not yet !een
receie$.
Anot&er significant !arrier is t&e cost in time an$ money in t&e initial set2up. *&e preliminary expenses an$ time t&at arise
from t&e implementation% customi"ation an$ training can !e costly an$ t&erefore may $iscourage some !usinesses. *&e -ey
is to $etermine (&at met&o$ of integration is rig&t for your company (&ic& (ill $etermine t&e cost of implementation. <or
a !usiness t&at only receies one 0.=. per year from a client% fully integrate$ ED# may not ma-e economic sense. #n t&is
case% !usinesses may implement inexpensie 8rip an$ rea$8 solutions or use outsource$ ED# solutions proi$e$ !y ED#
8,erice 1ureaus8. <or ot&er !usinesses% t&e implementation of an integrate$ ED# solution may !e necessary as increases
in tra$ing olumes !roug&t on !y ED# force t&em to re2implement t&eir or$er processing !usiness processes.
*&e -ey &in$rance to a successful implementation of ED# is t&e perception many !usinesses &ae of t&e nature of ED#.
Many ie( ED# from t&e tec&nical perspectie t&at ED# is a $ata formatB it (oul$ !e more accurate to ta-e t&e !usiness
ie( t&at ED# is a system for exc&anging !usiness $ocuments (it& external entities% an$ integrating t&e $ata from t&ose
$ocuments into t&e company5s internal systems. ,uccessful implementations of ED# ta-e into account t&e effect externally
generate$ information (ill &ae on t&eir internal systems an$ ali$ate t&e !usiness information receie$. <or example%
allo(ing a supplier to up$ate a retailer5s Accounts 0aya!les system (it&out appropriate.
c&ec-s an$ !alances (oul$ !e a recipe for $isaster. 1usinesses ne( to t&e implementation of ED# s&oul$ ta-e pains to
aoi$ suc& pitfalls.
#ncrease$ efficiency an$ cost saings $rie t&e a$option of ED# for most tra$ing partners. 1ut een if a company (oul$ not
c&oose to use ED# on t&eir o(n% pressures from larger tra$ing partners )calle$ &u!s+ often force smaller tra$ing partners to
use ED#. An example of t&is is Jal2Mart[s insistence on using ED# (it& all of its tra$ing partnersB any partner not (illing
to use ED# (it& Jal2Mart (ill not !e a!le to $o !usiness (it& t&e company.
Components of EDI
*&e follo(ing components an$ tools are necessary for performing ED#.
rade Agreement 2 a legally !in$ing tra$e agreement !et(een you an$ your tra$ing partner.
Standard Document /ormat 2 t&e stan$ar$ agree$ upon format for t&e $ocument to !e electronically transmitte$.
0D$ ranslation Management Soft1are 2 soft(are use$ to conert t&e $ocument your application5s format into t&e
agree$ upon stan$ar$ format. <or optimum performance t&e translation soft(are s&oul$ !e on t&e same platform
as your !usiness application.
Communications Soft1are 2 a programming tool t&at ena!les you to (rite communications protocols% or a separate
application. #t can !e a mo$ule to t&e translator or a separate soft(are application.
Modem 2 a &ar$(are $eice use$ to transmit electronic information !et(een computer systems. *&e &ig&er t&e
!au$ rate% t&e faster t&e communications (ill !e.
2A- 2 stan$s for Value A$$e$ >et(or-. A net(or- to (&ic& you can connect to transmit $ata from one computer
systems to anot&er. =ne net(or- can act as a gate(ay to anot&er.
Point3to3Point 2 a $irect communication lin- from one computer to anot&er. ,ome tra$ing partners offer a $irect
connection to t&eir ED# computer. *ra$ing partners may opt for t&is met&o$ of communication instea$ of using a
VA>
1L
Case stu$y
A.1 t&ere are certain steps t&at company can ta-e to re$uce t&e cost. Company can use more internet facility for
conferencing an$ getting $etails on t&e net !ecause it is c&eaper t&en t&e telep&one cost (&ic& is coming out C 1M0%000 per
year. *&ey can $eploy some main employees at t&e sig&t only to re$uce t&e ot&er cost li-e counseling p&otocopies an$
telep&one cost. <rom FM oerseas at least 20 can !e place$ to t&e sites to re$uce t&e cost.
A.2 *&e !est (ay to sen$ing t&e $ata is t&roug& t&e internet as $iscusse$ in earlier 'uestion as it is c&eaper t&en t&e
telep&one. #t is !est as it can use for recor$s an$ ei$ence in future. *&ere (ill !e no fear of $ata loss an$ (rong
information. Company can use s-ype connection (&ic& gies free call as (ell as $ata transfer in t&is (ay t&ey can sae lots
of money.
A.F t&ey can use scanning mac&ine to re$uce t&e p&otocopy cost. *&ey can scan t&e $ocument an$ sen$ it num!er of
people t&roug& mail. #n t&is (ay t&ey can re$uce p&otocopy cost.
1M
0art C
1. 1
2. A
F. C
L. C
M. 1
6. A
@. A
A. C
?. A
10. D
11. A
12. C
1F. D
1L. A
1M. 1
16. C
1@. D
1A. D
1?. A
20. A
21. 1
22. A
2F. 1
2L. D
2M. 1
26. A
2@. D
2A. D
2?. A
F0. D
F1. A
F2. 1
FF. 1
FL. 1
FM. D
F6. C
F@. D
16
FA. C
F?. 1
L0. D

Você também pode gostar