Documente Academic
Documente Profesional
Documente Cultură
Information Technology:
• Video On Demand
• Multimedia Conferencing
• Inventory Control
REFINING
OF
INFORMATI
Data:
Information:
Types of Information:
• Strategic Information
• Tactical Information
2
o Use only short term decisions.
• Operational Information
• Accurate
• Complete
• Timely
• Relevant
• Summarized
• Up to Date
• Easy to Use
• User – Targeted
• Cost beneficial
• Authoritative
Information System:
3
• Organized collection of Hardware, Software, Human,
Database & Communication Equipment in which person
processes, controls and communicate information.
o Lower Level
o Middle Level
System Analyst
Programmer
Technician
Engineer
Network Manager
o Manual
4
Components of CBIS:
• Users
• Software
• Database
5
o To develop efficient I S it is necessary to design good
database .
• Set of Methods
6
197 Mainframe computers were used. Programming in
0s COBOL
Computers and data were centralized
systems.
• Expert System
o Batch Processed I S
8
Different transactions are queued and executed
one after the other.
o Real Time T P S
9
Request retrieve and storing data is online. Any
error is a costly affair, recovery from failure is time
consuming.
• Rapid Response
• Reliability
• Inflexibility
• Controlled Processing
• Short transactions
• High Normalization
• Master File
• Transaction File
• Report File
• Work File
10
• Program File
• Advantages of MIS:
o Facilitates planning
o Brings Coordination
11
• Systems are based on certain rules that control the flow of
task
• Advantages:
• Decision
• Support
• System
12
• It requires to prepare information specific formats.
• Advantages of DSS:
13
o Complete control by decision makers
Expert Systems:
14
conclusion from basis of information stored in knowledge
base.
• Advantages
• Disadvantages
Components of E I S:
• Hardware
o Output Devices
• Software
o Database
o Graphic Base
o Model Base
• User Interface
• Telecommunication
Applications of EIS:
• Manufacturing
• Marketing
• Financial
Advantages of EIS:
Disadvantages of EIS:
o Identifying problems
o Feedback
Forms of Information:
• Text
• Image
17
• Graphics
• Audio
• Video
• Animation
• Globalization
Value of Information:
o Normative Value
o Subjective Value
o Realistic Value
Need of Information:
19
• To maintain relationship with management, customer,
government and suppliers.
System:
Elements of System:
• Input
• Output
• Processing
20
o It is the process that converts input into output.
• Controlling
• Feedback
MANAGEMEN
T FEEDBACK
STANDARD 21
OUTPUT
Characteristics of System:
• Organization
• Interaction
• Interdependency
22
o It means the part of organization or computer system
depends on one another.
• Integration
• Central Objective
23
• Distributed development of software and information system
also named as Global Software Development, driven by
Globalization of companies.
• It aims at:-
• Geographical Distance
• Temporal Distance
o Concentrates on
Dislocation in time
Execution time
Response time
Working Hours
25
fundamental difference of the system of values that
governs our lives.
• Organizational Distance
• Technological Distance
• Knowledge Distance
26
o However, it can also cause many problems. We define
the knowledge distance as divergence of knowledge
that two entities have in some particular application
domain and for the realization of some particular task,
while this knowledge is necessary for the realization of
their work, communication and coordination of their
activities
• Communication
• Control
• Coordination
• Development
• Maintenance
INTERNET:
Evolution of INTERNET:
• Packet Switching
28
o Method of slicing digital messages into packets and
sending these
packets.
• Routers
• TCP
• IP
• IP Address
• DNS
• URL
29
REQUESTS
CLIEN SERVER
T RESPONDS
INTERNET Protocols:
• HTTP
• SMTP
• POP
• IMAP
• FTP
30
o Permits users to transfer files from server to Client and
Vice versa.
• SSL
• TELNET
• PING
• FINGER
• IAB
• ICANN
• IESG
31
o Internet Engineering Steering Group
• IETF
• WWW
Types of Connections:
• Dial Up Connection
• Broadband Connection
Domain Names:
• .org (Organizations)
• .in (India)
• .au (Australia)
• .fr (France)
Networking Components:
Application Layer
Repeaters:
A REPEATE D
R
B C
Bridges:
A B C A B C
BRIDGE BRIDGE
34
D E D E
A–D A–
C
Routers:
• They just take incoming packets from one line and forward
them to another line, but lines may belong to different
networks.
Gateway:
APPLICATIO
SMTP FTP TELNET
DNS MESSAGE
36
NFS RPC TFTP
SNMP
PRESENTATI
SESSION
TRANSPORT H
TCP UDP
SEGMENT/
USER
DATAGRAM
ICMP
IP
H
ARP RARP
NETWORK
DATAGRAM
DATA LINK LAYER
H
PRTOCOLS DEFINED BY
UNDERLYING LAYER
FRAMES
PHYSICAL
BITS
IP v 4:-
HEADER
DATA 37
VERSION HLEN SERVICE TYPE
TOTAL LENGTH
FLAG
FRAGMENTATION IDENTIFICATION 3 BITS
OFFSET
16 BITS
13 BITS
SOURCE ADDRESS
DESTINATION ADDRESS
Parts of IP v 4:
• VER
o Version Number of I P.
• HLEN
o Header Length
o Multiple of 4B
38
• SERVICE TYPE
• TOTAL LENGTH
• IDENTIFICATION
• FLAGS
• FRAGMENTATION OFFSET
• TIME TO LIVE
• PROTOCOL
• SOURCE ADDRESS
• DESTINATION ADDRESS
• OPTIONS
IP v 6:
• No more broadcast.
SOURCE ADDRESS
ver
40
DESTINATION ADDRESS
• I P v 6 addressing rules are covered by RFCs (Request For
Comments) RFC 3513, 2373.
• Address Types:
o Unicast
One – One
o Anycast
One – Nearest
o Multicast
1 to many
41
No broadcast only muticast is used.
• I P v 6 Header
• Routing Header
• Fragment Header
OSI Model
Application
Presentation
Session
42
Transport
Network
Data Link
Physical
Application
TCP/IP:-
• Divided into:
43
o TCP
o IP
o Hypertext
o Hypermedia
45
• In 1994, number of web servers drastically increased. W3C
consortium (World Wide Web) gave list of standards for web
communication.
• HTTP
• TCP
• IP
o Internet Protocol
• UDP
• FTP
• TELNET
o TelNet
• ICMP
46
o Internet Control Message Protocol
• IGMP
• SNMP
• SMTP
• POP
• POP v 3
• IMAP
• ARP
• RARP
• Software
• Hardware
• Network
47
• Research
• User Interface
• Security
• Buffer Overflows
• Injection Flaws
o Passing of parameters
• Insecure Storage
• Denial of Service
Bluetooth:
48
• Supports multipoint
Aims:
• Global usage
• Small Size
Attacks:
• Blue Jacking
• Blue Bugging
• Blue Snarfing
Modes of Operation:
49
• Multi Slave Operation
• Scatternet Operation
Applications:
• 3 – Way phases
• Digital Camera
Future:
• Sniff Subrating
• Simple Pairing
• QOS Improvements
Information Security:
o Integrity
o Confidentiality
• Non Repudiation
• Authenticity
• Risk Management
51
o Process of identifying vulnerabilities & threats to
information resources used by organization in achieving
business activities.
• Physical Threats
• Accidental Errors
52
• Unauthorized Access
• Malicious Misuse
53
o Modification means when unauthorized users change the
information held in computer and server system
Laptop Security:
o Physical Security
Information Classification:
o Is an iterative process
o Why classification:
54
o Protection of sensitive information
o Classification levels:
o Red
Highly sensitive
o Amber
Sensitive
Named groups
o Green
Normal business
o White
Public
Public distribution
Making changes as
business needs
56
57