Information Technology Infrastructure Module 5 (1)
Information Technology Infrastructure Module 5 (1)
Transaction Boundaries
Transactions have clear start (begin) and end boundaries. An application program may contain several
transactions, each clearly separated by its beginning and ending points.
Granularity of Data
Granularity refers to the size of a data item.
A data item can be as small as an individual field (or attribute), a value within a record, an entire
record, or even a whole disk block.
The basic concepts of data processing work the same way regardless of the size of the data item.
Advantages
Batch processing and real-time processing: Both modes are available.
Faster processing: Leads to reductions in processing time, lead time, and order cycle time.
Cost Reduction: Lowers inventory, personnel, and ordering costs.
Improved Productivity: Increases overall productivity and customer satisfaction.
Disadvantages :
High setup costs.
Lack of standard formats.
Hardware and software incompatibility.
Application processing:
Application processing" typically refers to the procedures and steps involved in handling and
evaluating applications submitted for various purposes, such as job applications, college
admissions, visa applications, etc. This process involves receiving, reviewing, and making
decisions on applications based on specified criteria or requirements.
Here are some common steps involved in application processing:
1. Receiving Applications: Applications are received through various channels such as
online portals, email, mail, or in-person submissions.
2. Initial Screening: Applications are initially screened to ensure that they meet basic
requirements or qualifications. This may involve checking for completeness, verifying
credentials, or ensuring that applicants meet minimum eligibility criteria.
3. Review and Evaluation: Qualified applications are then reviewed and evaluated based on
specific criteria relevant to the purpose of the application. This may involve assessing
qualifications, skills, experience, academic records, personal statements, or any other
relevant information provided by the applicant.
4. Decision Making: Based on the evaluation, decisions are made regarding the outcome of
the application. This could include accepting, rejecting, or placing applications on hold for
further review.
5. Communication: Applicants are notified of the decision through various communication
channels such as email, mail, or phone. Feedback may also be provided to unsuccessful
applicants.
6. Follow-up Actions: Depending on the outcome, further actions may be taken, such as
scheduling interviews, issuing offers of admission or employment, processing visas, or
providing additional documentation.
7. Record Keeping: Records of all applications and related correspondence are maintained
for future reference and auditing purposes.
Network:
A network is a group of two or more computers or other electronic devices that are
interconnected for the purpose of exchanging data and sharing resources
A computer network is a system that connects numerous independent computers in order to share
information (data) and resources. The integration of computers and other different devices
allows users to communicate more easily.
A computer network is a collection of two or more computer systems that are linked together.
A network connection can be established using either cable or wireless media. Hardware and
software are used to connect computers and tools in any network.
A computer network consists of various kinds of nodes. Servers, networking hardware,
personal computers, and other specialized or general-purpose hosts can all be nodes in a computer
network. Host names and network addresses are used to identify them.
1. Bus Topology
Structure:
All devices (computers, printers, etc.) are connected to a single central cable known as the bus or
backbone.
Data travels in both directions along the cable, and each device checks if the data is meant for it.
Advantages:
Easy to implement and extend.
Requires less cable than other topologies.
Ideal for small networks or temporary setups.
Disadvantages:
If the main cable fails, the entire network stops functioning.
Difficult to troubleshoot.
Performance degrades as more devices are added or network traffic increases.
Example Use:
Small office networks or temporary event setups.
⭐ 2. Star Topology
Structure:
All devices are connected to a central hub or switch.
The hub acts as a mediator, forwarding data to the correct device.
Advantages:
Easy to manage and expand.
If one device or cable fails, the rest of the network continues to function.
Efficient performance with centralized control.
Disadvantages:
If the central hub fails, the entire network goes down.
Requires more cable than bus topology.
Example Use:
Common in home and office LANs.
3. Ring Topology
Structure:
Each device connects to exactly two other devices, forming a circular path.
Data travels in one direction (unidirectional) or sometimes both directions (bidirectional).
Advantages:
Data collisions are rare because of the one-directional data flow.
Orderly network, with each device having access in turn.
Disadvantages:
If a single device or cable fails, it can disrupt the entire network.
Troubleshooting is more difficult compared to star topology.
Example Use:
Used in Token Ring Networks and some MANs (Metropolitan Area Networks).
4. Tree Topology
Structure:
A hierarchical structure where star topologies are connected to a main “root” bus.
Resembles a tree structure with branches and sub-branches.
Advantages:
Highly scalable and supports future expansion.
Easier maintenance due to hierarchical division.
Disadvantages:
If the root node or central backbone fails, it can bring down large sections of the network.
Complex configuration and cabling.
Example Use:
Large organizations or educational institutions with departmental divisions.
5. Mesh Topology
Structure:
Each device is connected to every other device in the network (fully connected).
Can also be partially connected in some cases.
Advantages:
Offers high redundancy and fault tolerance.
Data can take multiple paths to reach the destination — best for reliability.
Disadvantages:
High cost due to extensive cabling and configuration.
Complex to install and manage.
Example Use:
Mission-critical applications like military systems or banking networks.
6. Hybrid Topology
Structure:
A combination of two or more topologies (e.g., star + ring, star + bus).
Can be designed to suit specific network requirements.
Advantages:
Flexible and scalable.
Can be customized based on network needs.
Disadvantages:
Complex to design and manage.
Costly, especially in large implementations.
Example Use:
Large corporate networks, data centers, or campus networks.
Data communication:
Communication is defined as a process in which more than one computer transfers
information, instructions to each other and for sharing resources. Or in other words,
communication is a process or act in which we can send or receive data. A network of
computers is defined as an interconnected collection of autonomous computers.
Autonomous means no computer can start, stop or control another computer.
Therefore, there are some set of rules (protocols) that is followed by every computer connected
to the internet and they are:
IP(Internet Protocol): Do You ever wonder how computer determines which packet
belongs to which device. What happens if the message you sent to your friend is received
by your father? Scary Right. Well! IP is responsible for handling the address of the
destination computer so that each packet is sent to its proper destination.
🔄 Workflow Example:
1. User logs in via mobile app (Client Layer).
2. App sends request to server (Application Layer).
3. Server uses API (Service Layer) to request user data.
4. API queries database using SQL via Data Access Layer.
5. RDBMS fetches data from tables and returns it.
6. Result is shown back to user in UI.
✅ Advantages:
Clear separation of concerns
Easier to manage and scale
Enhances data integrity and security
Enables reusability and modularity
Supports multiple clients (web, mobile) accessing the same database
Data
This is the initial form of data which hasn't been processed yet. It includes:
Figures
Facts
Observations
Values
Statistics
These data elements are stored in a Database.
2. Data Processing
The raw data undergoes processing to convert it into meaningful information.
Data Processing is shown as a green block (though there's a typo: "DADA" should be "DATA").
It involves a software program that uses business logic to process the raw data.
The actual processing happens within a computer system designed for this purpose.
3. Information
Once processed, the raw data is transformed into Information.
Information is processed data – it is organized, structured, and meaningful.
This stage involves visualizations, analysis reports, and dashboards (represented by graphs, charts,
and search icons in the image).
Overall Flow:
RAW DATA → DATA PROCESSING → INFORMATION
Stored in a Database → Processed by a Computer System → Resulting in Useful Insights
Purpose in RDBMS:
In an RDBMS, structured data is stored in tables. The system enables:
Efficient storage and retrieval of raw data,
Application of business logic through queries and procedures,
Transformation of data into meaningful information for decision-making.
DBMS RDBMS
🧊 2. Data Mart
A Data Mart is a subset of a Data Warehouse, focused on a specific department or business area (e.g.,
sales, marketing).
Features:
Smaller and more focused than a full Data Warehouse.
Faster and cheaper to build.
Tailored for departmental use.
Can be dependent (linked to DW) or independent (stand-alone).
🏢 Example:
The sales data mart may contain only sales data, helping the sales team analyze regional performance.
🏢 Intranet
An Intranet is a private network used within an organization.
Only accessible by employees or authorized users with a username and password.
Used for:
o Sharing documents internally
o Accessing employee directories
o Internal communication
It's highly secure and not accessible to the public.
🌐 Extranet
An Extranet is a private network that allows external partners (like vendors or clients) to access certain
internal resources.
Requires login credentials (username & password)
Used for:
o Placing orders
o Checking status
o Sharing reports
It supports collaboration between different organizations.
🔁 Intranet vs Extranet
This makes it easy to access and understand data from any location, any time.
The system can connect with other services using APIs (tools to talk to other systems).
This allows automatic updates, real-time data sharing, and better system coordination.
o Passwords
o Two-step verification
o Data encryption
Users can chat, share documents, and work together in the system.
Built-in tools like notifications, messages, and shared files help in collaboration.
It handles more users and data smoothly by using cloud services and load balancing.
Interfaces are mobile-friendly or have dedicated apps so you can work on the go.