7th term- it & is for construction management

Upload: shreedhar

Post on 09-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 7th Term- IT & IS for Construction management

    1/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 1

    MCM 713 : IT & IS FOR CONSTRUCTION MANAGEMENT.

    Que : What is Programming language ?

    A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks. Theterm programming language usually refers to high-level languages, such as BASIC, C, C++,

    COBOL, FORTRAN, Ada, and Pascal. Each language has a unique set of keywords (words that it

    understands) and a special syntax for organizing program instructions.

    High-level programming languages, while simple compared to human languages, are more

    complex than the languages the computer actually understands, calledmachine languages. Each

    different type of CPU has its own unique machine language.

    Lying between machine languages and high-level languages are languages called assembly

    languages. Assembly languages are similar to machine languages, but they are much easier toprogram in because they allow a programmer to substitute names for numbers. Machine

    languages consist of numbers only.

    A programming language is a notation for writing programs, which are specifications of a

    computation or algorithm.[1]Some, but not all, authors restrict the term "programming language" to

    those languages that can express allpossible algorithms.[1][2]Traits often considered important for

    what constitutes a programming language include:

    Function and target: A computer programming language is a language[3] used to write

    computer programs, which involve a computer performing some kind of computation[4] or

    algorithm and possibly control external devices such as printers,disk drives,robots,[5]and

    so on. For example PostScript programs are frequently created by another program to

    control a computer printer or display. More generally, a programming language may

    describe computation on some, possibly abstract, machine. It is generally accepted that a

    complete specification for a programming language includes a description, possibly

    idealized, of a machine or processor for that language.[6] In most practical contexts, a

    programming language involves a computer; consequently programming languages are

    usually defined and studied this way.[7] Programming languages differ from natural

    languages in that natural languages are only used for interaction between people, whileprogramming languages also allow humans to communicate instructions to machines.

    There are thousands of computer programming languages. These are listed in various ways:

    Educational programming language

    Generational list of programming languages

    History of programming languages

    List of object-oriented programming terms

    List of programming languages

    List of programming languages by category by general usage and context

    List of programming languages for artificial intelligence

    Non-English-based programming languages

    Timeline of programming languages

    http://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/H/high_level_language.htmlhttp://www.webopedia.com/TERM/B/BASIC.htmlhttp://www.webopedia.com/TERM/C/C.htmlhttp://www.webopedia.com/TERM/C/C_plus_plus.htmlhttp://www.webopedia.com/TERM/C/COBOL.htmlhttp://www.webopedia.com/TERM/F/FORTRAN.htmlhttp://www.webopedia.com/TERM/A/Ada.htmlhttp://www.webopedia.com/TERM/P/Pascal.htmlhttp://www.webopedia.com/TERM/L/language.htmlhttp://www.webopedia.com/TERM/K/keyword.htmlhttp://www.webopedia.com/TERM/S/syntax.htmlhttp://www.webopedia.com/TERM/P/program.htmlhttp://www.webopedia.com/TERM/I/instruction.htmlhttp://www.webopedia.com/TERM/M/machine_language.htmlhttp://www.webopedia.com/TERM/M/machine_language.htmlhttp://www.webopedia.com/TERM/M/machine_language.htmlhttp://www.webopedia.com/TERM/C/CPU.htmlhttp://www.webopedia.com/TERM/A/assembly_language.htmlhttp://www.webopedia.com/TERM/A/assembly_language.htmlhttp://www.webopedia.com/TERM/P/programmer.htmlhttp://www.webopedia.com/TERM/N/name.htmlhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Algorithmhttp://en.wikipedia.org/wiki/Programming_language#cite_note-Aaby_2004-0http://en.wikipedia.org/wiki/Programming_language#cite_note-Aaby_2004-0http://en.wikipedia.org/wiki/Programming_language#cite_note-Aaby_2004-0http://en.wikipedia.org/wiki/Programming_language#cite_note-Aaby_2004-0http://en.wikipedia.org/wiki/Programming_language#cite_note-Aaby_2004-0http://en.wikipedia.org/wiki/Programming_language#cite_note-Aaby_2004-0http://en.wikipedia.org/wiki/Programming_language#cite_note-Fischer-2http://en.wikipedia.org/wiki/Programming_language#cite_note-Fischer-2http://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Programming_language#cite_note-sigplan-3http://en.wikipedia.org/wiki/Programming_language#cite_note-sigplan-3http://en.wikipedia.org/wiki/Algorithmhttp://en.wikipedia.org/wiki/Printer_%28computing%29http://en.wikipedia.org/wiki/Disk_drivehttp://en.wikipedia.org/wiki/Robothttp://en.wikipedia.org/wiki/Programming_language#cite_note-robots-4http://en.wikipedia.org/wiki/Programming_language#cite_note-robots-4http://en.wikipedia.org/wiki/Programming_language#cite_note-robots-4http://en.wikipedia.org/wiki/PostScripthttp://en.wikipedia.org/wiki/Programming_language#cite_note-nara2-5http://en.wikipedia.org/wiki/Programming_language#cite_note-nara2-5http://en.wikipedia.org/wiki/Programming_language#cite_note-nara2-5http://en.wikipedia.org/wiki/Programming_language#cite_note-6http://en.wikipedia.org/wiki/Programming_language#cite_note-6http://en.wikipedia.org/wiki/Programming_language#cite_note-6http://en.wikipedia.org/wiki/Natural_languagehttp://en.wikipedia.org/wiki/Natural_languagehttp://en.wikipedia.org/wiki/Computer_programminghttp://en.wikipedia.org/wiki/Programming_languagehttp://en.wikipedia.org/wiki/Educational_programming_languagehttp://en.wikipedia.org/wiki/Generational_list_of_programming_languageshttp://en.wikipedia.org/wiki/History_of_programming_languageshttp://en.wikipedia.org/wiki/List_of_object-oriented_programming_termshttp://en.wikipedia.org/wiki/List_of_programming_languageshttp://en.wikipedia.org/wiki/List_of_programming_languages_by_categoryhttp://en.wikipedia.org/wiki/List_of_programming_languages_for_artificial_intelligencehttp://en.wikipedia.org/wiki/Non-English-based_programming_languageshttp://en.wikipedia.org/wiki/Timeline_of_programming_languageshttp://en.wikipedia.org/wiki/Timeline_of_programming_languageshttp://en.wikipedia.org/wiki/Non-English-based_programming_languageshttp://en.wikipedia.org/wiki/List_of_programming_languages_for_artificial_intelligencehttp://en.wikipedia.org/wiki/List_of_programming_languages_by_categoryhttp://en.wikipedia.org/wiki/List_of_programming_languageshttp://en.wikipedia.org/wiki/List_of_object-oriented_programming_termshttp://en.wikipedia.org/wiki/History_of_programming_languageshttp://en.wikipedia.org/wiki/Generational_list_of_programming_languageshttp://en.wikipedia.org/wiki/Educational_programming_languagehttp://en.wikipedia.org/wiki/Programming_languagehttp://en.wikipedia.org/wiki/Computer_programminghttp://en.wikipedia.org/wiki/Natural_languagehttp://en.wikipedia.org/wiki/Natural_languagehttp://en.wikipedia.org/wiki/Programming_language#cite_note-6http://en.wikipedia.org/wiki/Programming_language#cite_note-nara2-5http://en.wikipedia.org/wiki/PostScripthttp://en.wikipedia.org/wiki/Programming_language#cite_note-robots-4http://en.wikipedia.org/wiki/Robothttp://en.wikipedia.org/wiki/Disk_drivehttp://en.wikipedia.org/wiki/Printer_%28computing%29http://en.wikipedia.org/wiki/Algorithmhttp://en.wikipedia.org/wiki/Programming_language#cite_note-sigplan-3http://en.wikipedia.org/wiki/Computerhttp://en.wikipedia.org/wiki/Computer_programhttp://en.wikipedia.org/wiki/Programming_language#cite_note-Fischer-2http://en.wikipedia.org/wiki/Programming_language#cite_note-Aaby_2004-0http://en.wikipedia.org/wiki/Programming_language#cite_note-Aaby_2004-0http://en.wikipedia.org/wiki/Programming_language#cite_note-Aaby_2004-0http://en.wikipedia.org/wiki/Algorithmhttp://en.wikipedia.org/wiki/Computer_programhttp://www.webopedia.com/TERM/N/name.htmlhttp://www.webopedia.com/TERM/P/programmer.htmlhttp://www.webopedia.com/TERM/A/assembly_language.htmlhttp://www.webopedia.com/TERM/A/assembly_language.htmlhttp://www.webopedia.com/TERM/C/CPU.htmlhttp://www.webopedia.com/TERM/M/machine_language.htmlhttp://www.webopedia.com/TERM/I/instruction.htmlhttp://www.webopedia.com/TERM/P/program.htmlhttp://www.webopedia.com/TERM/S/syntax.htmlhttp://www.webopedia.com/TERM/K/keyword.htmlhttp://www.webopedia.com/TERM/L/language.htmlhttp://www.webopedia.com/TERM/P/Pascal.htmlhttp://www.webopedia.com/TERM/A/Ada.htmlhttp://www.webopedia.com/TERM/F/FORTRAN.htmlhttp://www.webopedia.com/TERM/C/COBOL.htmlhttp://www.webopedia.com/TERM/C/C_plus_plus.htmlhttp://www.webopedia.com/TERM/C/C.htmlhttp://www.webopedia.com/TERM/B/BASIC.htmlhttp://www.webopedia.com/TERM/H/high_level_language.htmlhttp://www.webopedia.com/TERM/C/computer.html
  • 8/7/2019 7th Term- IT & IS for Construction management

    2/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 2

    Introduction to C Programming Language

    C is a general-purpose computer programming language developed in 1972 by Dennis Ritchie at

    the Bell Telephone Laboratories for use with the Unix operating system.

    Although C was designed for implementing system software, it is also widely used for developing

    portable application software.

    C is one of the most popular programming languages.It is widely used on many different software

    platforms, and there are few computer architectures for which a C compiler does not exist. C has

    greatly influenced many other popular programming languages, most notably C++, which

    originally began as an extension to C.

    Que : What is the concept of Operating system ?

    The most important program that runs on a computer. Every general-purpose computer must have

    an operating system to run other programs. Operating systems perform basic tasks, such as

    recognizing input from the keyboard, sending output to the display screen, keeping track of files

    and directories on the disk, and controlling peripheral devices such as disk drives and printers.

    For large systems, the operating system has even greater responsibilities and powers. It is like a

    traffic cop -- it makes sure that different programs and users running at the same time do not

    interfere with each other. The operating system is also responsible for security, ensuring that

    unauthorized users do not access the system.

    Operating systems can be classified as follows:

    multi-user : Allows two or more users to run programs at the same time. Some

    operating systems permit hundreds or even thousands of concurrent users.

    multiprocessing: Supports running a program on more than one CPU.

    multitasking: Allows more than one program to run concurrently.

    multithreading: Allows different parts of a single program to run concurrently.

    real time: Responds to input instantly. General-purpose operating systems, such as

    DOS and UNIX, are not real-time.

    Operating systems provide a software platform on top of which other programs, calledapplicationprograms, can run. The application programs must be written to run on top of a particular

    operating system. Your choice of operating system, therefore, determines to a great extent the

    applications you can run. For PCs, the most popular operating systems are DOS, OS/2, and

    Windows, but others are available, such as Linux.

    As a user, you normally interact with the operating system through a set of commands. For

    example, the DOS operating system contains commands such as COPY and RENAME for

    copying files and changing the names of files, respectively. The commands are accepted and

    executed by a part of the operating system called the command processor or command lineinterpreter. Graphical user interfaces allow you to enter commands by pointing and clicking at

    objects that appear on the screen.

    http://www.webopedia.com/TERM/P/program.htmhttp://www.webopedia.com/TERM/R/run.htmhttp://www.webopedia.com/TERM/C/computer.htmhttp://www.webopedia.com/TERM/I/input.htmhttp://www.webopedia.com/TERM/K/keyboard.htmhttp://www.webopedia.com/TERM/O/output.htmhttp://www.webopedia.com/TERM/D/display_screen.htmhttp://www.webopedia.com/TERM/F/file.htmhttp://www.webopedia.com/TERM/D/directory.htmhttp://www.webopedia.com/TERM/D/disk.htmhttp://www.webopedia.com/TERM/P/peripheral_device.htmhttp://www.webopedia.com/TERM/D/disk_drive.htmhttp://www.webopedia.com/TERM/P/printer.htmhttp://www.webopedia.com/TERM/U/user.htmhttp://www.webopedia.com/TERM/S/security.htmhttp://www.webopedia.com/TERM/S/security.htmhttp://www.webopedia.com/TERM/A/access.htmhttp://www.webopedia.com/TERM/M/multi_user.htmhttp://www.webopedia.com/TERM/M/multi_user.htmhttp://www.webopedia.com/TERM/M/multiprocessing.htmhttp://www.webopedia.com/TERM/M/multiprocessing.htmhttp://www.webopedia.com/TERM/S/support.htmhttp://www.webopedia.com/TERM/C/CPU.htmhttp://www.webopedia.com/TERM/M/multitasking.htmhttp://www.webopedia.com/TERM/M/multitasking.htmhttp://www.webopedia.com/TERM/M/multithreading.htmhttp://www.webopedia.com/TERM/M/multithreading.htmhttp://www.webopedia.com/TERM/R/real_time.htmlhttp://www.webopedia.com/TERM/D/DOS.htmhttp://www.webopedia.com/TERM/U/UNIX.htmhttp://www.webopedia.com/TERM/S/software.htmhttp://www.webopedia.com/TERM/P/platform.htmhttp://www.webopedia.com/TERM/A/application.htmhttp://www.webopedia.com/TERM/A/application.htmhttp://www.webopedia.com/TERM/A/application.htmhttp://www.webopedia.com/TERM/P/PC.htmhttp://www.webopedia.com/TERM/O/OS_2.htmhttp://www.webopedia.com/TERM/W/Windows.htmhttp://www.webopedia.com/TERM/L/Linux.htmhttp://www.webopedia.com/TERM/C/command.htmhttp://www.webopedia.com/TERM/C/copy.htmhttp://www.webopedia.com/TERM/N/name.htmhttp://www.webopedia.com/TERM/E/execute.htmhttp://www.webopedia.com/TERM/C/command_processor.htmhttp://www.webopedia.com/TERM/G/Graphical_User_Interface_GUI.htmhttp://www.webopedia.com/TERM/C/click.htmhttp://www.webopedia.com/TERM/O/object.htmhttp://www.webopedia.com/TERM/O/object.htmhttp://www.webopedia.com/TERM/C/click.htmhttp://www.webopedia.com/TERM/G/Graphical_User_Interface_GUI.htmhttp://www.webopedia.com/TERM/C/command_processor.htmhttp://www.webopedia.com/TERM/E/execute.htmhttp://www.webopedia.com/TERM/N/name.htmhttp://www.webopedia.com/TERM/C/copy.htmhttp://www.webopedia.com/TERM/C/command.htmhttp://www.webopedia.com/TERM/L/Linux.htmhttp://www.webopedia.com/TERM/W/Windows.htmhttp://www.webopedia.com/TERM/O/OS_2.htmhttp://www.webopedia.com/TERM/P/PC.htmhttp://www.webopedia.com/TERM/A/application.htmhttp://www.webopedia.com/TERM/P/platform.htmhttp://www.webopedia.com/TERM/S/software.htmhttp://www.webopedia.com/TERM/U/UNIX.htmhttp://www.webopedia.com/TERM/D/DOS.htmhttp://www.webopedia.com/TERM/R/real_time.htmlhttp://www.webopedia.com/TERM/M/multithreading.htmhttp://www.webopedia.com/TERM/M/multitasking.htmhttp://www.webopedia.com/TERM/C/CPU.htmhttp://www.webopedia.com/TERM/S/support.htmhttp://www.webopedia.com/TERM/M/multiprocessing.htmhttp://www.webopedia.com/TERM/M/multi_user.htmhttp://www.webopedia.com/TERM/A/access.htmhttp://www.webopedia.com/TERM/S/security.htmhttp://www.webopedia.com/TERM/U/user.htmhttp://www.webopedia.com/TERM/P/printer.htmhttp://www.webopedia.com/TERM/D/disk_drive.htmhttp://www.webopedia.com/TERM/P/peripheral_device.htmhttp://www.webopedia.com/TERM/D/disk.htmhttp://www.webopedia.com/TERM/D/directory.htmhttp://www.webopedia.com/TERM/F/file.htmhttp://www.webopedia.com/TERM/D/display_screen.htmhttp://www.webopedia.com/TERM/O/output.htmhttp://www.webopedia.com/TERM/K/keyboard.htmhttp://www.webopedia.com/TERM/I/input.htmhttp://www.webopedia.com/TERM/C/computer.htmhttp://www.webopedia.com/TERM/R/run.htmhttp://www.webopedia.com/TERM/P/program.htm
  • 8/7/2019 7th Term- IT & IS for Construction management

    3/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 3

    Operating System Functions

    At the simplest level, an operating system does two things:

    1. It manages the hardware and software resources of the system. In a desktop computer,

    these resources include such things as the processor, memory, disk space and more (On a

    cell phone, they include the keypad, the screen, the address book, the phone dialer, the

    battery and the network connection).

    2. It provides a stable, consistent way for applications to deal with the hardware without

    having to know all the details of the hardware.

    The operating system's tasks, in the most general sense, fall into six categories:

    Processor management

    Memory management

    Device management

    Storage management Application interface

    User interface

    While there are some who argue that an operating system should do more than these six tasks,

    and some operating-system vendors do build many more utility programs and auxiliary functions

    into their operating systems, these six tasks define the core of nearly all operating systems. Next,

    let's look at the tools the operating system uses to perform each of these functions.

    Que : What is a digital computer ?

    A device that processes numerical information; more generally, any device that manipulates

    symbolic information according to specified computational procedures. The term digital

    computeror simply, computerembraces calculators, computer workstations, control computers

    (controllers) for applications such as domestic appliances and industrial processes, data-

    processing systems, microcomputers, microcontrollers, multiprocessors, parallel computers,

    personal computers, network servers, and supercomputers.

    A digital computer is an electronic computing machine that uses the binary digits (bits) 0 and 1 to

    represent all forms of information internally in digital form. Every computer has a set of instructions

    that define the basic functions it can perform. Sequences of these instructions constitute machine-

    language programs that can be stored in the computer and used to tailor it to an essentially

    unlimited number of specialized applications. Calculators are small computers specialized for

    mathematical computations. General-purpose computers range from pocket-sized personal digital

    assistants (notepad computers), to medium-sized desktop computers (personal computers and

    workstations), to large, powerful computers that are shared by many users via a computer

    network. The vast majority of digital computers now in use are inexpensive, special-purposemicrocontrollers that are embedded, often invisibly, in such devices as toys, consumer electronic

    equipment, and automobiles. See alsoBit; Computer programming; Embedded systems.

    http://computer.howstuffworks.com/pc.htmhttp://computer.howstuffworks.com/microprocessor.htmhttp://computer.howstuffworks.com/computer-memory.htmhttp://electronics.howstuffworks.com/cell-phone.htmhttp://www.answers.com/topic/supercomputershttp://www.answers.com/topic/tailorhttp://www.answers.com/topic/notepadhttp://www.answers.com/topic/bithttp://www.answers.com/topic/embedded-systemhttp://www.answers.com/topic/embedded-systemhttp://www.answers.com/topic/bithttp://www.answers.com/topic/notepadhttp://www.answers.com/topic/tailorhttp://www.answers.com/topic/supercomputershttp://electronics.howstuffworks.com/cell-phone.htmhttp://computer.howstuffworks.com/computer-memory.htmhttp://computer.howstuffworks.com/microprocessor.htmhttp://computer.howstuffworks.com/pc.htm
  • 8/7/2019 7th Term- IT & IS for Construction management

    4/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 4

    The main data-processing elements of a computer reside in a small number of electronic

    integrated circuits (ICs) that form a microprocessor or central processing unit (CPU). Electronic

    technology allows a basic instruction such as add two numbers to be executed many millions of

    times per second. Other electronic devices are used for program and data storage (memory

    circuits) and for communication with external devices and human users (input-output circuits).

    Nonelectronic (magnetic, optical, and mechanical) devices also appear in computers. They are

    used to construct input-output devices such as keyboards, monitors (video screens), secondary

    memories, printers, sensors, and mechanical actuators.

    Functions of digital computer

    A general purpose computer has four main components: the arithmetic logic unit (ALU), the control

    unit, the memory, and the input and output devices (collectively termed I/O). These parts are

    interconnected by busses, often made of groups of wires.

    All digital computers, no matter what size or shape, have certain similarities in the way they are

    organized. A computer must be able to read or accept instructions and data, remember the

    problem solved and the data to use, perform arithmetical calculations and logical manipulations on

    the data, read out the results, and control the entire operation.

    Inside each of these parts are thousands to trillions of small electrical circuits which can be turned

    off or on by means of an electronic switch. Each circuit represents a bit (binary digit) of information

    so that when the circuit is on it represents a "1", and when off it represents a "0" (in positive logic

    representation). The circuits are arranged in logic gates so that one or more of the circuits may

    control the state of one or more of the other circuits.

    The control unit, ALU, registers, and basic I/O (and often other hardware closely linked with these)

    are collectively known as a central processing unit (CPU). Early CPUs were composed of many

    separate components but since the mid-1970s CPUs have typically been constructed on a single

    integrated circuit called amicroprocessor.

    1.Control unitDiagram showing how a particular MIPS architecture instruction would be decoded by the control

    system.

    The control unit (often called a control system or central controller) manages the computer's

    various components; it reads and interprets (decodes) the program instructions, transforming them

    into a series of control signals which activate other parts of the computer.[24]Control systems in

    advanced computers may change the order of some instructions so as to improve performance.

    A key component common to all CPUs is the program counter, a special memory cell (a register)

    that keeps track of which location in memory the next instruction is to be read from.

    http://www.answers.com/topic/microprocessorhttp://en.wikipedia.org/wiki/Arithmetic_logic_unithttp://en.wikipedia.org/wiki/Control_unithttp://en.wikipedia.org/wiki/Control_unithttp://en.wikipedia.org/wiki/Computer_data_storagehttp://en.wikipedia.org/wiki/Bus_%28computing%29http://en.wikipedia.org/wiki/Wirehttp://en.wikipedia.org/wiki/Electrical_networkhttp://en.wikipedia.org/wiki/Transistorhttp://en.wikipedia.org/wiki/Bithttp://en.wikipedia.org/wiki/Logic_gatehttp://en.wikipedia.org/wiki/Central_processing_unithttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Microprocessorhttp://en.wikipedia.org/wiki/Microprocessorhttp://en.wikipedia.org/wiki/Microprocessorhttp://en.wikipedia.org/wiki/MIPS_architecturehttp://en.wikipedia.org/wiki/Computer#cite_note-23http://en.wikipedia.org/wiki/Computer#cite_note-23http://en.wikipedia.org/wiki/Computer#cite_note-23http://en.wikipedia.org/wiki/Program_counterhttp://en.wikipedia.org/wiki/Processor_registerhttp://en.wikipedia.org/wiki/Processor_registerhttp://en.wikipedia.org/wiki/Program_counterhttp://en.wikipedia.org/wiki/Computer#cite_note-23http://en.wikipedia.org/wiki/MIPS_architecturehttp://en.wikipedia.org/wiki/Microprocessorhttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Central_processing_unithttp://en.wikipedia.org/wiki/Logic_gatehttp://en.wikipedia.org/wiki/Bithttp://en.wikipedia.org/wiki/Transistorhttp://en.wikipedia.org/wiki/Electrical_networkhttp://en.wikipedia.org/wiki/Wirehttp://en.wikipedia.org/wiki/Bus_%28computing%29http://en.wikipedia.org/wiki/Computer_data_storagehttp://en.wikipedia.org/wiki/Control_unithttp://en.wikipedia.org/wiki/Control_unithttp://en.wikipedia.org/wiki/Arithmetic_logic_unithttp://www.answers.com/topic/microprocessor
  • 8/7/2019 7th Term- IT & IS for Construction management

    5/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 5

    The control system's functions is as followsnote that this is a simplified

    description, and some of these steps may be performed concurrently or in a different

    order depending on the type of CPU:

    1. Read the code for the next instruction from the cell indicated by the program

    counter.

    2. Decode the numerical code for the instruction into a set of commands orsignals for each of the other systems.

    3. Increment the program counter so it points to the next instruction.

    4. Read whatever data the instruction requires from cells in memory (or perhaps

    from an input device). The location of this required data is typically stored

    within the instruction code.

    5. Provide the necessary data to an ALU or register.

    6. If the instruction requires an ALU or specialized hardware to complete, instruct

    the hardware to perform the requested operation.7. Write the result from the ALU back to a memory location or to a register or

    perhaps an output device.

    8. Jump back to step (1).

    2.Arithmetic/logic unit (ALU)

    The ALU is capable of performing two classes of operations: arithmetic and logic.

    The set of arithmetic operations that a particular ALU supports may be limited to adding and

    subtracting or might include multiplying or dividing, trigonometry functions (sine, cosine, etc.) and

    square roots. Some can only operate on whole numbers (integers) whilst others use floating point

    to represent real numbersalbeit with limited precision. However, any computer that is capable of

    performing just the simplest operations can be programmed to break down the more complex

    operations into simple steps that it can perform. Therefore, any computer can be programmed to

    perform any arithmetic operationalthough it will take more time to do so if its ALU does not

    directly support the operation. An ALU may also compare numbers and return boolean truth

    values (true or false) depending on whether one is equal to, greater than or less than the other ("is

    64 greater than 65?").

    3. MemoryMagnetic core memory was the computer memory of choice throughout the 1960s, until it was

    replaced by semiconductor memory.

    A computer's memory can be viewed as a list of cells into which numbers can be placed or read.

    Each cell has a numbered "address" and can store a single number. The computer can be

    instructed to "put the number 123 into the cell numbered 1357" or to "add the number that is in cell1357 to the number that is in cell 2468 and put the answer into cell 1595". The information stored

    in memory may represent practically anything. Letters, numbers, even computer instructions can

    be placed into memory with equal ease. Since the CPU does not differentiate between different

    http://en.wikipedia.org/wiki/Trigonometryhttp://en.wikipedia.org/wiki/Square_roothttp://en.wikipedia.org/wiki/Integerhttp://en.wikipedia.org/wiki/Floating_pointhttp://en.wikipedia.org/wiki/Real_numberhttp://en.wikipedia.org/wiki/Truth_valuehttp://en.wikipedia.org/wiki/Truth_valuehttp://en.wikipedia.org/wiki/Magnetic_core_memoryhttp://en.wikipedia.org/wiki/Magnetic_core_memoryhttp://en.wikipedia.org/wiki/Truth_valuehttp://en.wikipedia.org/wiki/Truth_valuehttp://en.wikipedia.org/wiki/Real_numberhttp://en.wikipedia.org/wiki/Floating_pointhttp://en.wikipedia.org/wiki/Integerhttp://en.wikipedia.org/wiki/Square_roothttp://en.wikipedia.org/wiki/Trigonometry
  • 8/7/2019 7th Term- IT & IS for Construction management

    6/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 6

    types of information, it is the software's responsibility to give significance to what the memory sees

    as nothing but a series of numbers.

    The CPU contains a special set of memory cells called registers that can be read and written to

    much more rapidly than the main memory area. There are typically between two and one hundred

    registers depending on the type of CPU. Registers are used for the most frequently needed data

    items to avoid having to access main memory every time data is needed. As data is constantly

    being worked on, reducing the need to access main memory (which is often slow compared to theALU and control units) greatly increases the computer's speed.

    Computer main memory comes in two principal varieties: random-access memory or RAM and

    read-only memory or ROM. RAM can be read and written to anytime the CPU commands it, but

    ROM is pre-loaded with data and software that never changes, so the CPU can only read from it.

    ROM is typically used to store the computer's initial start-up instructions. In general, the contents

    of RAM are erased when the power to the computer is turned off, but ROM retains its data

    indefinitely. In a PC, the ROM contains a specialized program called the BIOS that orchestrates

    loading the computer's operating system from the hard disk drive into RAM whenever thecomputer is turned on or reset. In embedded computers, which frequently do not have disk drives,

    all of the required software may be stored in ROM. Software stored in ROM is often called

    firmware, because it is notionally more like hardware than software. Flash memory blurs the

    distinction between ROM and RAM, as it retains its data when turned off but is also rewritable. It is

    typically much slower than conventional ROM and RAM however, so its use is restricted to

    applications where high speed is unnecessary.

    4.Input/output (I/O)

    Hard disk drives are common storage devices used with computers.

    I/O is the means by which a computer exchanges information with the outside

    world.[29] Devices that provide input or output to the computer are called

    peripherals.[30]On a typical personal computer, peripherals include input devices like

    the keyboard and mouse, and output devices such as the display and printer. Hard

    disk drives, floppy disk drives and optical disc drives serve as both input and output

    devices. Computer networking is another form of I/O.

    Often, I/O devices are complex computers in their own right with their own CPU and

    memory. A graphics processing unit might contain fifty or more tiny computers that

    perform the calculations necessary to display graphics, Modern desktop computers

    contain many smaller computers that assist the main CPU in performing I/O.

    Its ridiculous to live 100 years and only be able to remember 30 million bytes. You know, less than a compact disc. The human condition

    is really becoming more obsolete every minute.

    http://en.wikipedia.org/wiki/Processor_registerhttp://en.wikipedia.org/wiki/Random-access_memoryhttp://en.wikipedia.org/wiki/Read-only_memoryhttp://en.wikipedia.org/wiki/BIOShttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Embedded_systemhttp://en.wikipedia.org/wiki/Firmwarehttp://en.wikipedia.org/wiki/Flash_memoryhttp://en.wikipedia.org/wiki/Hard_disk_drivehttp://en.wikipedia.org/wiki/Computer#cite_note-28http://en.wikipedia.org/wiki/Computer#cite_note-28http://en.wikipedia.org/wiki/Computer#cite_note-28http://en.wikipedia.org/wiki/Peripheralhttp://en.wikipedia.org/wiki/Computer#cite_note-29http://en.wikipedia.org/wiki/Computer#cite_note-29http://en.wikipedia.org/wiki/Computer#cite_note-29http://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/Mouse_%28computing%29http://en.wikipedia.org/wiki/Computer_monitorhttp://en.wikipedia.org/wiki/Printer_%28computing%29http://en.wikipedia.org/wiki/Hard_disk_drivehttp://en.wikipedia.org/wiki/Hard_disk_drivehttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Optical_disc_drivehttp://en.wikipedia.org/wiki/Computer_networkinghttp://en.wikipedia.org/wiki/Graphics_processing_unithttp://en.wikipedia.org/wiki/Desktop_computerhttp://en.wikipedia.org/wiki/Desktop_computerhttp://en.wikipedia.org/wiki/Graphics_processing_unithttp://en.wikipedia.org/wiki/Computer_networkinghttp://en.wikipedia.org/wiki/Optical_disc_drivehttp://en.wikipedia.org/wiki/Floppy_diskhttp://en.wikipedia.org/wiki/Hard_disk_drivehttp://en.wikipedia.org/wiki/Hard_disk_drivehttp://en.wikipedia.org/wiki/Printer_%28computing%29http://en.wikipedia.org/wiki/Computer_monitorhttp://en.wikipedia.org/wiki/Mouse_%28computing%29http://en.wikipedia.org/wiki/Personal_computerhttp://en.wikipedia.org/wiki/Computer#cite_note-29http://en.wikipedia.org/wiki/Peripheralhttp://en.wikipedia.org/wiki/Computer#cite_note-28http://en.wikipedia.org/wiki/Hard_disk_drivehttp://en.wikipedia.org/wiki/Flash_memoryhttp://en.wikipedia.org/wiki/Firmwarehttp://en.wikipedia.org/wiki/Embedded_systemhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/BIOShttp://en.wikipedia.org/wiki/Read-only_memoryhttp://en.wikipedia.org/wiki/Random-access_memoryhttp://en.wikipedia.org/wiki/Processor_register
  • 8/7/2019 7th Term- IT & IS for Construction management

    7/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 7

    Que : Types of Information Systems

    Information systems differ in their business needs. Also depending upon different levels in

    organization information systems differ. Three major information systems are

    1. Transaction processing systems

    2. Management information systems

    3. Decision support systems

    The information needs are different at different organizational levels. Accordingly the information

    can be categorized as: strategic information, managerial information and operational information.

    Strategic information is the information needed by top most management for decision making. For

    example the trends in revenues earned by the organization are required by the top management

    for setting the policies of the organization. This information is not required by the lower levels in

    the organization. The information systems that provide these kinds of information are known as

    Decision Support Systems.

    The second category of information required by the middle management is known as managerial

    information. The information required at this level is used for making short term decisions and

    plans for the organization. Information like sales analysis for the past quarter or yearly production

    details etc. fall under this category. Management information system (MIS) caters to such

    information needs of the organization. Due to its capabilities to fulfill the managerial information

    needs of the organization, Management Information Systems have become a necessity for all big

    organizations. And due to its vastness, most of the big organizations have separate MIS

    departments to look into the related issues and proper functioning of the system.

    The third category of information is relating to the daily or short term information needs of the

    organization such as attendance records of the employees. This kind of information is required at

    the operational level for carrying out the day-to-day operational activities. Due to its capabilities to

    provide information for processing transaction of the organization, the information system is known

    as Transaction Processing System or Data Processing System. Some examples of information

    provided by such systems areprocessing of orders, posting of entries in bank, evaluating overdue

    purchaser orders etc.

    Transaction Processing Systems

    TPS processes business transaction of the organization. Transaction can be any activity of the

    organization. Transactions differ from organization to organization. For example, take a railway

    reservation system. Booking, canceling, etc are all transactions. Any query made to it is a

    transaction. However, there are some transactions, which are common to almost all organizations.

    Like employee new employee, maintaining their leave status, maintaining employees accounts,

    etc.

    This provides high speed and accurate processing of record keeping of basic operational

    processes. These include calculation, storage and retrieval.

    Transaction processing systems provide speed and accuracy, and can be programmed to follow

    routines functions of the organization.

    http://www.freetutes.com/systemanalysis/types-of-information-system.html#transaction-processing-systemshttp://www.freetutes.com/systemanalysis/types-of-information-system.html#management-information-systemshttp://www.freetutes.com/systemanalysis/types-of-information-system.html#decision-support-systemshttp://www.freetutes.com/systemanalysis/types-of-information-system.html#decision-support-systemshttp://www.freetutes.com/systemanalysis/types-of-information-system.html#management-information-systemshttp://www.freetutes.com/systemanalysis/types-of-information-system.html#transaction-processing-systems
  • 8/7/2019 7th Term- IT & IS for Construction management

    8/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 8

    Management Information Systems

    These systems assist lower management in problem solving and making decisions. They use the

    results of transaction processing and some other information also. It is a set of information

    processing functions. It should handle queries as quickly as they arrive. An important element of

    MIS is database.

    A database is a non-redundant collection of interrelated data items that can be processed throughapplication programs and available to many users.

    Decision Support Systems

    These systems assist higher management to make long term decisions. These type of systems

    handle unstructured or semi structured decisions. A decision is considered unstructured if there

    are no clear procedures for making the decision and if not all the factors to be considered in the

    decision can be readily identified in advance.

    These are not of recurring nature. Some recur infrequently or occur only once. A decision support

    system must very flexible. The user should be able to produce customized reports by giving

    particular data and format specific to particular situations.

    Summary of Information Systems

    Catagories of Information System Characteristices

    Transaction Processing System Substitutes computer-based processing for manual

    procedures.

    Deals with well-structured processes. Includes

    record keeping applications.

    Management information system Provides input to be used in the managerial decision

    process. Deals with supporting well structured

    decision situations. Typical information requirements

    can be anticipated.

    Decision support system Provides information to managers who must make

    judgements about particular situations. Supports

    decision-makers in situations that are not well

    structured.

    Most software today is very much like an Egyptian pyramid with millions of bricks piled on top ofeach other, with no structural

    integrity, but just done by brute force and thousands of slaves.

  • 8/7/2019 7th Term- IT & IS for Construction management

    9/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 9

    What is DBMS ?(DATABASE MANAGEMENT SYSTEM)

    As one of the oldest components associated with computers, the database management

    system, or DBMS, is a computer software program that is designed as the means of

    managing all databases that are currently installed on a system hard drive or network.

    Different types of database management systems exist, with some of them designed for

    the oversight and proper control of databases that are configured for specific purposes.

    Here are some examples of the various incarnations of DBMS technology that are

    currently in use, and some of the basic elements that are part of DBMS software

    applications.

    As the tool that is employed in the broad practice of managing databases, the DBMS is

    marketed in many forms. Some of the more popular examples of DBMS solutions include

    Microsoft Access, FileMaker, DB2, and Oracle. All these products provide for the creation

    of a series of rights or privileges that can be associated with a specific user. This meansthat it is possible to designate one or more database administrators who may control each

    function, as well as provide other users with various levels of administration rights. This

    flexibility makes the task of using DBMS methods to oversee a system something that can

    be centrally controlled, or allocated to several different people.

    There are four essential elements that are found with just about every example of DBMS

    currently on the market. The first is the implementation of a modeling language that serves

    to define the language of each database that is hosted via the DBMS. There are several

    approaches currently in use, with hierarchical, network, relational, and object examples.Essentially, the modeling language ensures the ability of the databases to communicate

    with the DBMS and thus operate on the system.

    Second, data structures also are administered by the DBMS. Examples of data that are

    organized by this function are individual profiles or records, files, fields and their definitions,

    and objects such as visual media. Data structures are what allows DBMS to interact with

    the data without causing and damage to the integrity of the data itself.

    A third component of DBMS software is the data query language. This element is involved

    in maintaining the security of the database, by monitoring the use of login data, the

    assignment of access rights and privileges, and the definition of the criteria that must be

    employed to add data to the system. The data query language works with the data

    structures to make sure it is harder to input irrelevant data into any of the databases in use

    on the system.

    Last, a mechanism that allows for transactions is an essential basic for any DBMS. This

    helps to allow multiple and concurrent access to the database by multiple users, prevents

    the manipulation of one record by two users at the same time, and preventing the creation

    of duplicate records.

    http://www.wisegeek.com/what-is-a-computer.htmhttp://www.wisegeek.com/what-is-a-hard-drive.htmhttp://www.wisegeek.com/what-is-a-query.htmhttp://www.wisegeek.com/what-is-a-query.htmhttp://www.wisegeek.com/what-is-a-hard-drive.htmhttp://www.wisegeek.com/what-is-a-computer.htm
  • 8/7/2019 7th Term- IT & IS for Construction management

    10/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 10

    Que: APPROACHES TO SYSTEM DEVELOPMENT

    Learning Objectives

    Explain the purpose and various phases of the systems development life cycle

    (SDLC)

    Explain the differences between predictive SDLC and adaptive SDLC

    Explain the differences between a model, a tool, a technique, and a methodology

    Describe the two overall approaches used to develop information systems: the

    traditional method and the object-oriented method

    The Systems Development Lifecycle

    u Systems development life cycle (SDLC)

    l Provides overall framework for managing systems development process

    u Two main approaches to SDLC

    I. Predictive approach assumes project can be planned out in advance

    II. Adaptive approach more flexible, assumes project cannot be planned out in

    advance

    uAll projects use some variation of SDLC

    Choosing the Predictive vs. Adaptive Approach to the SDLC

    I.Traditional PredictiveApproach to the SDLC

    u Project planning initiate, ensure feasibility, plan schedule, obtain approval for project

    u Analysis understand business needs and processing requirements

    u Design define solution system based on requirements and analysis decisions

    u Implementation construct, test, train users, and install new system

    u Support keep system running and improve

  • 8/7/2019 7th Term- IT & IS for Construction management

    11/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 11

    Waterfall model Approach to the SDLC

    Basic Principles:

    1. Project is divided into sequential phases, with some overlap and splashback acceptable

    between phases.

    2. Emphasis is on planning, time schedules, target dates, budgets and implementation of an

    entire system at one time.

    3. Tight control is maintained over the life of the project through the use of extensive written

    documentation, as well as through formal reviews and approval/signoff by the user and

    information technology management occurring at the end of most phases before eginning

    the next phase.

    Strengths:

    1. Ideal for supporting less experienced project teams and project managers, or project teams

    whose composition fluctuates.

    2. The orderly sequence of development steps and strict controls for ensuring the adequacy of

    documentation and design reviews helps ensure the quality, reliability, and maintainability

    of the developed software.

    3. Progress of system development is measurable.

    4. Conserves resources.

    Weaknesses:

    1. Inflexible, slow, costly and cumbersome due to significant structure and tight controls.

    2. Project progresses forward, with only slight movement backward.

    3. Little room for use of iteration, which can reduce manageability if used.

    4. Depends upon early identification and specification of requirements, yet users may not be

    able to clearly define what they need early in the project.

    5. Requirements inconsistencies, missing system components, and unexpected

    developmentneeds are often discovered during design and coding.

    6. Problems are often not discovered until system testing.

    7. System performance cannot be tested until the system is almost fully coded, and under-

    capacity may be difficult to correct.

    8. Situations where most appropriate:

  • 8/7/2019 7th Term- IT & IS for Construction management

    12/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 12

    9. Project is for development of a mainframe-based or transaction-oriented batch system.

    10. Project is large, expensive, and complicated.

    11. Project has clear objectives and solution.

    12. Pressure does not exist for immediate implementation.

    13. Project requirements can be stated unambiguously and comprehensively.

    14. Project requirements are stable or unchanging during the system development life cycle.

    15. User community is fully knowledgeable in the business and application.

    II . Newer Adaptive Approaches to the SDLC Based on spiral model

    o Project cycles through development activities over and over until project is complete

    o Prototype created by end of each cycle

    o Focuses on mitigating risk

    Iteration Work activities are repeated

    o

    Each iteration refines previous resulto Approach assumes no one gets it right the first time

    o There are a series of mini projects for each iteration

    The Spiral Life Cycle Model

    This is a recent model that has been proposed by Boehm. As the name suggests, the activities in

    this model can be organized like a spiral. The spiral has many cycles. The radial dimension

    represents the cumulative cost incurred in accomplishing the steps dome so far and the angular

    dimension represents the progress made in completing each cycle of the spiral. The structure of

    the spiral model is shown in the figure given below. Each cycle in the spiral begins with the

    identification of objectives for that cycle and the different alternatives are possible for achieving the

    objectives and the imposed constraints.

    The next step in the spiral life cycle model is to evaluate these different alternatives based on the

    objectives and constraints. This will also involve identifying uncertainties and risks involved. The

    next step is to develop strategies that resolve the uncertainties and risks. This step may involve

  • 8/7/2019 7th Term- IT & IS for Construction management

    13/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 13

    activities such as benchmarking, simulation and prototyping. Next, the software is developed by

    keeping in mind the risks. Finally the next stage is planned.

    The next step is determined by remaining risks. For example, its performance or user-interface

    risks are considered more important than the program development risks. The next step may be

    evolutionary development that involves developing a more detailed prototype for resolving the

    risks. On the other hand, if the program development risks dominate and previous prototypes have

    resolved all the user-interface and performance risks; the next step will follow the basic waterfallapproach.

    The risk driven nature of the spiral model allows it to accommodate any mixture of specification-

    oriented, prototype-oriented, simulation-oriented or some other approach. An important feature of

    the model is that each cycle of the spiral is completed by a review, which covers all the products

    developed during that cycle, including plans for the next cycle. The spiral model works for

    developed as well as enhancement projects.

    Spiral Model Description

    The development spiral consists of four quadrants as shown in the figure above

    Quadrant 1: Determine objectives, alternatives, and constraints.

    Quadrant 2: Evaluate alternatives, identify, resolve risks.

    Quadrant 3: Develop, verify, next-level product.

    Quadrant 4: Plan next phases.

    Although the spiral, as depicted, is oriented toward software development, the concept is equally

    applicable to systems, hardware, and training, for example. To better understand the scope of

    each spiral development quadrant, lets briefly address each one.

    Quadrant 1: Determine Objectives, Alternatives, and Constraints

    Activities performed in this quadrant include:

    1. Establish an understanding of the system or product objectivesnamely performance,

    functionality, and ability to accommodate change.

    2. Investigate implementation alternativesnamely design, reuse, procure, and procure/

    modify

    3. Investigate constraints imposed on the alternativesnamely technology, cost, schedule,

    support, and risk. Once the system or products objectives, alternatives, and constraints are

    understood, Quadrant 2 (Evaluate alternatives, identify, and resolve risks) is performed.

  • 8/7/2019 7th Term- IT & IS for Construction management

    14/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 14

    Quadrant 2: Evaluate Alternatives, Identify, Resolve Risks

    Engineering activities performed in this quadrant select an alternative approach that best satisfies

    technical, technology, cost, schedule, support, and risk constraints. The focus here is on risk

    mitigation. Each alternative is investigated and prototyped to reduce the risk associated with the

    development decisions. Boehm describes these activities as follows:

    . . . This may involve prototyping, simulation, benchmarking, reference checking,

    administering user

    questionnaires, analytic modeling, or combinations of these and other risk resolution

    techniques.

    The outcome of the evaluation determines the next course of action. If critical operational

    and/or technical issues (COIs/CTIs) such as performance and interoperability (i.e., external

    and internal) risks remain, more detailed prototyping may need to be added beforeprogressing to the next quadrant. Dr. Boehm notes that if the alternative chosen is

    operationally useful and robust enough to serve as a low-risk base for future product

    evolution, the subsequent risk-driven steps would be the evolving series of evolutionary

    prototypes going toward the right (hand side of the graphic) . . . the option of writing

    specifications would be addressed but not exercised. This brings us to Quadrant 3.

    Quadrant 3: Develop, Verify, Next-Level Product

    If a determination is made that the previous prototyping efforts have resolved theCOIs/CTIs, activities to develop, verify, next-level product are performed. As a result, the

    basic waterfall approach may be employedmeaning concept of operations, design,

    development, integration, and test of the next system or product iteration. If appropriate,

    incremental development approaches may also be applicable.

    Quadrant 4: Plan Next Phases

    The spiral development model has one characteristic that is common to all modelsthe

    need for advanced technical planning and multidisciplinary reviews at critical staging orcontrol points. Each cycle of the model culminates with a technical review that assesses

    the status, progress, maturity, merits, risk, of development efforts to date; resolves critical

    operational and/or technical issues (COIs/CTIs); and reviews plans and identifies

    COIs/CTIs to be resolved for the next iteration of the spiral.

  • 8/7/2019 7th Term- IT & IS for Construction management

    15/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 15

    Que :ACTIVITIES OF EACH SDLC PHASE (SYSTEMS DEVELOPMENT LIFE CYCLE)

    1. Predictive or adaptive approach use SDLC

    2. Activities of each phase are similar

    3. Phases are not always sequential

    4. Phases can overlap

    1. Activities of Planning Phase of SDLC

    a. Define business problem and scope

    b. Produce detailed project schedule

    c. Confirm project feasibility

    i. Economic, organizational, technical, resource, and schedule

    d. Staff the project (resource management)

    e. Launch project official announcement

    2. Activities of Analysis Phase of SDLCa. Gather information to learn problem domain

    b. Define system requirements

    c. Build prototypes for discovery of requirements

    d. Prioritize requirements

    e. Generate and evaluate alternatives

    f. Review recommendations with management

    3. Activities of Design Phase of SDLC

    a. Design and integrate the networkb. Design the application architecture

    c. Design the user interfaces

    d. Design the system interfaces

    e. Design and integrate the database

    f. Prototype for design details

    g. Design and integrate system controls

    4. Activities of Implementation Phase of SDLC

    a. Construct software components

    b. Verify and test

    c. Convert data

    d. Train users and document the system

    e. Install the system

    5. Activities of Support Phase of SDLC

    a. Maintain system

    i. Small patches, repairs, and updates

    b. Enhance system

    i. Small upgrades or enhancements to expand system capabilitiesii. Larger enhancements may require separate development project

    c. Support users

    i. Help desk and/or support team

  • 8/7/2019 7th Term- IT & IS for Construction management

    16/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 16

    What are Methodologies?

    Comprehensive guidelines to follow for completing every SDLC activity

    Collection of models, tools, and techniques

    What Are Models?

    Representation of an important aspect of real world, but not the same as real thing

    Abstraction used to

    separate out aspect

    Diagrams and charts

    Project planning and

    budgeting aids

    Some Models Used in System

    Development

    What Are Tools?

    Software support that helps create models or other required project components

    Range from simple drawing

    programs to complex CASE

    tools to project managementsoftware

    What Are Techniques?

    Collection of guidelines that help analysts complete a system development activity or task

    Can be step-by-step

    instructions or just

    general advice

  • 8/7/2019 7th Term- IT & IS for Construction management

    17/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 17

    Two Approaches to System Development ?

    u Traditional approach

    l Also called structured system development

    l Structured analysis and design technique (SADT)

    l Includes information engineering (IE)

    u Object-oriented approachl Also called OOA, OOD, and OOP

    l Views information system as collection of interacting objects that work together to

    accomplish tasks

    TRADITIONAL APPROACH

    1.Structured System Development

    I. Structure Programming

    II. Top-down Programming

    III. Structured Design

    IV. Structured Analysis

    I. Structured Programming

    a. Improves computer program quality

    b. Allows other programmers to easily read and modify code

    c. Each program module has one beginning and one ending

    d. Three programming constructs (sequence, decision, repetition)

    II. Top-Down Programming

    a. Divides complex programs into hierarchy of modules

    b. The module at top controls execution by calling lower level modules

    c. Modular programming

    i. Similar to top-down programming

    d. One program calls other programs to work together as single system

    III. Structured Design

    a. What the set of programs should be

    b. What each program should accomplish

    c. How the programs should be organized into a hierarchy

  • 8/7/2019 7th Term- IT & IS for Construction management

    18/32

  • 8/7/2019 7th Term- IT & IS for Construction management

    19/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 19

    Object-Oriented Approach

    1. Completely different approach to information systems

    2. Views information system as collection of interacting objects that work together to accomplish

    tasks

    o Objects things in computer system that can respond to messages

    o Conceptually, no processes, programs, data entities, or files are defined just objects3. OO languages: Java, C++, C# .NET, VB .NET

    Terminologies of O-O Approach

    1. Object-oriented analysis (OOA)

    2. Object-oriented design (OOD)

    3. Object-oriented programming (OOP)

    1. Object-oriented analysis (OOA)

    a. Defines types of objects users deal with

    b. Shows use cases are required to complete tasks

    2. Object-oriented design (OOD)

    a. Defines object types needed to communicate with people and devices in system

    b. Shows how objects interact to complete tasks

    c. Refines each type of object for implementation with specific language of environment

    3. Object-oriented programming (OOP)

    Writing statements in programming language to define what each type of object does

  • 8/7/2019 7th Term- IT & IS for Construction management

    20/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 20

    MANAGEMENT INFORMATION SYSTEM ( MIS) CONCEPT

    The concept of the MIS has evolved over a period of time comprising many different facets of the

    organizational function. MIS is a necessity of all the organizations.

    The initial concept of MIS was to process data from the organization and present it in the for of

    reports at regular intervals. The system was largely capable of handling the data from collectionto processing. It was more impersonal, requiring each individual to pick and choose the

    processed data and use it for his requirements. This concept was further modified when a

    distinction was made between data and information. The information is a product of an analysis of

    data. This concept is similar to a raw material and the finished product. What are needed are

    information and not a mass of data. However, the data can be analyzed in a number of ways,

    producing different shades and specifications of the information as a product. It was,

    therefore, demanded that the system concept be an individual- oriented, as each individual

    may have a different orientation. Towards the information. This concept was further

    modified, that the system should present information in such a form and format that it creates

    an impact on its user, provoking a decision or an investigation. It was later realized then even

    though such an impact was a welcome modification, some sort of selective approach was

    necessary in the analysis and reporting. Hence, the concept of exception reporting was imbibed in

    MIS.

    MIS DEFINITION

    The Management Information System (MIS) is a concept of the last decade or two. It has

    been understood and described in a number ways. It is also known as the Information

    System, the Information and Decision System, the Computer- based information System.

    The MIS has more than one definition, some of which are give below.

    1. The MIS is defined as a system which provides information support for decision making in

    the organization.

    2. The MIS is defined as an integrated system of man and machine for providing the information

    to support the operations, the management and the decision making function in the

    organization.

    3. The MIS is defined as a system based on the database of the organization evolved for thepurpose of providing information to the people in the organization.

    4. The MIS is defined as a Computer based Information System.

    ROLE OF THE MANAGEMENT INFORMATION SYSTEM

    The role of the MIS in an organization can be compared to the role of heart in the body. The

    information is the blood and MIS is the heart. In the body the heart plays he role of supplying

    pure blood to all the elements of the body including the brain. The heart works faster and

    supplies more blood when needed. It regulates and controls the incoming impure blood,

    processes it and sends it to the destination in the quantity needed. It fulfills the needs of blood

    supply to human body in normal course and also in crisis.

  • 8/7/2019 7th Term- IT & IS for Construction management

    21/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 21

    The MIS plays exactly the same role in the organization. The system ensures that an appropriate

    data is collected from the various sources, processed, and sent further to all the needy

    destinations. The system is expected to fulfill the information needs of an individual, a group

    of individuals, the management functionaries: the managers and the top management.

    The MIS satisfies the diverse needs through a variety of systems such as Query Systems,

    Analysis Systems, Modeling Systems and Decision Support Systems the MIS helps in

    Strategic Planning, Management Control, Operational Control and Transaction Processing.

    The MIS helps the clerical personnel in the transaction processing and answers their queries

    on the data pertaining to the transaction, the status of a particular record and references on a

    variety of documents. The MIS helps the junior management personnel by providing the

    operational data for planning, scheduling and control, and helps them further in decision making

    at the operations level to correct an out of control situation. The MIS helps the middle

    management in short them planning, target setting and controlling the business functions. It is

    supported by the use of the management tools of planning and control. The MIS helps the top

    management in goal setting,strategic planning and evolving the business plans and their implementation.

    Implementation of MIS

    The choice of the system or the sub-system depends on its position in the total MIS plan, the size

    of the system, the user understands of the system and the complexity and its interface with other

    systems.

    The designer first develops systems independently and starts integrating them with other systems,

    enlarging the system scope and meeting the varying information needs.

    Determining the position of the system in the MIS is easy. The real problem in the degree of

    structure, and formalization in the system and procedures which determine the timing and duration

    of development of the system. Higher the degree of structured ness and formalization, greater is

    the stabilization of the rules, the procedures, decision making and the understanding of the overall

    business activity. Here, it is observed that the users and the designer interaction are smooth, and

    each others need are clearly understood and respected mutually. The development becomes a

    methodical approach with certainty in input-process and outputs.

    MIS is generally used by medium and larger scale organizations. However, small organizations

    are yet to understand its application. There is dire need to build up computer culture by properly

    disseminating information about computer applications and its benefits.

    Implementation of MIS can be achieved by using any of the methods such as direct, parallel,

    modular or phase in.

  • 8/7/2019 7th Term- IT & IS for Construction management

    22/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 22

    Direct Approach

    Direct installation of the new system with immediate discontinuance of the old existing system is

    reffered as cold turnkey approach. This approach becomes useful when these factors are

    considered.

    1. The new system does no replace the existing system.

    2. Old system is regarded absolutely of no value

    3. New system is compact and simple.

    4. The design of the new system is inexpensive with more advantages and less risk involved.

    Parallel Approach

    The selected new system is installed and operated with current system. This method is expensive

    because of duplicating facilities and personal to maintain both the systems. In this approach a

    target date must be fixed when the operations of old system cease and new one will operate on its

    own.

    Modular Approach

    This is generally recognized as Pilot approach, means the implementation of a system in the

    Organization on a piece-meal basis.

    This has few advantages / merits

    1. The risk of systems failure is localized

    2. The major problem can be easily identified and corrected before further implementation.

    3. Operating personal can be trained before system is installed in a location.

    Phase-in-Implementation

    This approach is similar to modular method but it differs because of segmentation of system,

    however, not the organization. It has advantages that the rate of changes in a given Organization

    can be totally minimized and the data processing resource can be acquired gradually over a

    period of time. System exhibits certain disadvantages such as limited applicability, more costs

    incurred to develop interface with old system and a feeling in the Organization that system is never

    completed.

  • 8/7/2019 7th Term- IT & IS for Construction management

    23/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 23

    Implementation Procedures

    Planning the Implementation

    After designing the MIS it is essential that the organization should plan carefully for

    implementation. The planning stage should invariably include the following:

    1. Identification of tasks of Implementation

    Planning the implementation activities, acquisition of facilities, procedures development,

    generating files and forms, testing the system and evaluating and maintenance of the system.

    2. Relationship establishment among the activity

    Network diagram must be prepared to correlate concurrent and sequential activities.

    3. Establishing of MIS

    For monitoring the progress of implementation and for proper control of activities, efficient

    information system should be developed.

    4. Acquisition of Facilities

    For installation of new system or to replace current system the manager should prepare a

    proposal for approval from the management by considering space requirement movement ofpersonal and location for utility outlets and controls.

    5. Procedure Development

    This is an important stop for implementation of the system including various activities such as

    evaluation selection of hardware, purchase or development of software, testing and

    implementation strategies.

    6. Generating Files and Forms

    The MIS manager should generate files and formats for storing actual date. This requires checklist

    data, format date storage forms and other remarks in data base.

    7. Testing of the System

    Test should be performed in accordance with the specifications at the implementation stage

    consisting of component test sub system test and total system test.

  • 8/7/2019 7th Term- IT & IS for Construction management

    24/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 24

    Evaluation and maintenance of MIS system

    The performance should e evaluated in order to find out cost effectiveness and efficacy of the

    system with minimum errors due to designs environmental changes or services.

    Software Maintenances

    The proper maintenance is the enigma of the system development and it holds software industry

    captive lying up programming resources. There are some problems in maintenance such as

    regarding it as non rewarding non availability of technicians and tools no cognizance of users

    about maintenance problem and cost lack of standard procedures and guidelines. Most

    programmers feel maintenance as low level drudgery. If proper attentions is paid over a period of

    time eventually less maintenance is required.

    Types of Maintenance

    The maintenance of system are classified into corrective/adaptive/perfective. Corrective

    maintenance means repairing process or performance failures. Adaptive maintenance means

    changing the programming function whereas perfective maintenance deals with enhancing theperformance or modifying the program.

    Primary Activities of a Maintenance Procedure

    Documentation is major part of maintenance in system development. Maintenance staff receives

    requests from the authorized user. Programming library should be maintained.

    Reduction in Maintenance Costs

    Several organizations having MIS generally go in for reducing maintenance costs and it consists of

    three major phases.

    1. Maintenance management audit through questionnaires and interviews.

    2. Software system audit.

    3. Software modification.

    Evaluation Methods

    Evaluation of the MIS in an organization is integral part of the control processes. There are severalevaluation approaches such as quality assurance review compliance of audits budget

    performance review computer personal productivity assessment computer performance evaluation

    service level monitoring user audit survey post installation review and cost benefit analysis.

    Evaluation performance measurement can be classified into two classes as effectiveness and

    efficiency. The relationship between effectiveness and efficiency is that the format is a measure of

    goodness of out put and the latter is a measure of the resources required to achieve the output.

  • 8/7/2019 7th Term- IT & IS for Construction management

    25/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 25

    ISO-OSI 7-Layer Network Architecture

    This lecture introduces the ISO-OSI layered architecture of Networks. According to the ISO

    standards, networks have been divided into 7 layers depending on the complexity of the

    fucntionality each of these layers provide. The detailed description of each of these layers is given

    in the notes below. We will first list the layers as defined by the standard in the increasing order of

    function complexity:

    1. Physical Layer

    2. Data Link Layer

    3. Network Layer

    4. Transport Layer

    5. Session Layer

    6. Presentation Layer

    7. Application Layer

    Physical LayerThis layer is the lowest layer in the OSI model. It helps in the transmission of data between two machines

    that are communicating through a physical medium, which can be optical fibres,copper wire or wireless etc.

    The following are the main functions of the physical layer:

    1. Hardware Specification: The details of the physical cables, network interface cards, wireless

    radios, etc are a part of this layer.

    Coaxial Cable Hybrid Cable Wireless Card Network Card

    2. Encoding and Signalling: How are the bits encoded in the medium is also decided by this layer.For example, on the coppar wire medium, we can use differnet voltage levels for a certain time

    interval to represent '0' and '1'. We may

    use +5mV for 1nsec to represent '1' and -

    5mV for 1nsec to represent '0'. All the

    issues of modulation is dealt with in this

    layer. eg, we may use Binary phase shift

    keying for the representation of '1' and '0'

    rather than using different volatage levels

    if we have to transfer in RF waves.

    Binary Phase Shift Keying

    http://www.cse.iitk.ac.in/users/dheeraj/cs425/lec01.html#physicalhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec01.html#physicalhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec01.html#datalinkhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec01.html#datalinkhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec01.html#networkhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec01.html#networkhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec01.html#transporthttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec01.html#transporthttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec02.html#sessionhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec02.html#sessionhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec02.html#presentationhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec02.html#presentationhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec02.html#applicationhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec02.html#applicationhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec02.html#applicationhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec02.html#presentationhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec02.html#sessionhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec01.html#transporthttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec01.html#networkhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec01.html#datalinkhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/lec01.html#physical
  • 8/7/2019 7th Term- IT & IS for Construction management

    26/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 26

    3. Data Transmission and Reception: The transfer of each bit of data is the responsibility of this

    layer. This layer assures the transmissoin of each bit with a high probability. The

    transmission of the bits is not completely reliable as their is no error correction in this layer.

    4. Topology and Network Design: The network design is the integral part of the physical

    layer. Which part of the network is the router going to be placed, where the switches will be

    used, where we will put the hubs, how many machines is each switch going to handle, what

    server is going to be placed where, and many

    such concerns are to be taken care of by the

    physical layer. The variosu kinds of

    netopologies that we decide to use may be

    ring, bus, star or a hybrid of these topologies

    depending on our requirements.

    Data Link Layer

    This layer provides reliable transmission of a packet by using the services of the physical layer

    which transmits bits over the medium in an unreliable fashion. This layer is concerned with :

    1. Framing: Breaking input data into frames (typically a few hundred bytes) and caring about

    the frame boundaries and the size of each frame.

    2. Acknowledgment : Sent by the receiving end to inform the source that the frame was

    received without any error.

    3. Sequence Numbering : To acknowledge which frame was received.

    4. Error Detection : The frames may be damaged, lost or duplicated leading to errors.The

    error control is on link to link basis.

    5. Retransmission : The packet is retransmitted if the source fails to receive

    acknowledgment.

    6. Flow Control : Necessary for a fast

    transmitter to keep pace with a slow

    receiver.

    Data Link Layer

  • 8/7/2019 7th Term- IT & IS for Construction management

    27/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 27

    Network LayerIts basic functions are routing and congestion control.

    Routing: This deals with determining how packets will be routed (transferred) from source to destination. It

    can be of three types :

    Static : Routes are based on static tables that are "wired into" the network and are rarely changed. Dynamic : All packets of one application can follow different routes depending upon the topology of

    the network, the shortest path and the current

    network load.

    Semi-Dynamic : A route is chosen at the start of

    each conversation and then all the packets of the

    application follow the same route.

    Routing

    The services provided by the network can be of two

    types :

    Connection less service: Each packet of an application is treated as an independent

    entity. On each packet of the application the destination address is provided and the packet

    is routed.

    Connection oriented service: Here, first a connection is established and then all packets

    of the application follow the same route. To understand the above concept, we can also

    draw an analogy from the real life. Connection oriented service is modeled after the

    telephone system. All voice packets go on the same path after the connection isestablished till the connection is hung up. It acts like a tube ; the sender pushes the objects

    in at one end and the receiver takes them out in the same order at the other end.

    Connection less service is modeled after the postal system. Each letter carries the

    destination address and is routed independent of all the others. Here, it is possible that the

    letter sent first is delayed so that the second letter reaches the destination before the first

    letter.

    Congestion Control: A router can be connected to 4-5 networks. If all the networks send packet

    at the same time with maximum rate possible then the router may not be able to handle all the

    packets and may drop some/all packets. In this context the dropping of the packets should be

    minimized and the source whose packet was dropped should be informed. The control of such

    congestion is also a function of the network layer. Other issues related with this layer are

    transmitting time, delays, jittering.

    Internetworking: Internetworks are multiple networks that are connected in such a way that they

    act as one large network, connecting multiple office or department networks. Internetworks are

    connected by networking hardware such as routers, switches, and bridges.Internetworking is a

    solution born of three networking problems: isolated LANs, duplication of resources, and the lack

    of a centralized network management system. With connected LANs, companies no longer haveto duplicate programs or resources on each network. This in turn gives way to managing the

    network from one central location instead of trying to manage each separate LAN. We should be

  • 8/7/2019 7th Term- IT & IS for Construction management

    28/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 28

    able to transmit any packet from one network to any other network even if they follow different

    protocols or use different addressing modes.

    Network Layer does not guarantee that the packet will reach its intended destination. There are

    no reliability guarantees.

    Transport Layer

    Its functions are :

    Multiplexing / Demultiplexing : Normally the transport layer will create distinct network

    connection for each transport connection required by the session layer. The transport layer

    may either create multiple network connections (to improve throughput) or it may multiplex

    several transport connections onto the same network connection (because creating and

    maintaining networks may be expensive). In the latter case, demultiplexing will be required

    at the receiving end. A point to note here is that communication is always carried out

    between two processes and not between two machines. This is also known as process-to-

    process communication.

    Fragmentation and Re-assembly : The data accepted by the transport layer from the

    session layer is split up into smaller units (fragmentation) if needed and then passed to the

    network layer. Correspondingly, the data provided by the network layer to the transport

    layer on the receiving side is re-assembled.

    Types of service : The transport layer also decides the type of service that should be

    provided to the session layer. The service may be perfectly reliable, or may be reliable

    within certain tolerances or may not be reliable at all. The message may or may not be

    received in the order in which it was sent. The decision regarding the type of service to be

    provided is taken at the time when the connection is established.

    Error Control : If reliable service is provided then error detection and error recovery

    operations are also performed. It provides error control mechanism on end to end basis.

    Flow Control : A fast host cannot keep pace with a slow one. Hence, this is a mechanism

    to regulate the flow of information.

    Connection Establishment / Release : The transport layer also establishes and releases

    the connection across the network. This requires some sort of naming mechanism so that a

    process on one machine can indicate with whom it wants to communicate.

  • 8/7/2019 7th Term- IT & IS for Construction management

    29/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 29

    Session Layer

    It deals with the concept of Sessions i.e. when a user logins to a remote server he should be

    authenticated before getting access to the files and application programs. Another job of session

    layer is to establish and maintain sessions. If during the transfer of data between two machines

    the session breaks down, it is the session layer which re-establishes the connection. It also

    ensures that the data transfer starts from where it breaks keeping it transparent to the end user.

    e.g. In case of a session with a database server, this layer introduces check points at various

    places so that in case the connectoin is broken and reestablished, the transition running on the

    database is not lost even if the user has not committed. This activity is called Synchronization.

    Another function of this layer is Dialogue Control which determines whose turn is it to speak in a

    session. It is useful in video conferencing.

    Presentation Layer

    This layer is concerned with the syntax and semantics of the information transmitted. In order to

    make it possible for computers with different data representations to communicate data structures

    to be exchanged can be defined in abstract way alongwith standard encoding. It also manages

    these abstract data structres and allows higher level of data structres to be defined an exchange.

    It encodes the data in standard agreed way(network format). Suppose there are two machines A

    and B one follows 'Big Endian' and other 'Little Endian' for data representation. This layer ensures

    that the data transmitted by one gets converted in the form compatibale to othe machine. This

    layer is concerned with the syntax and semantics of the information transmitted.In order to make it

    possible for computers with different data representations to communicate data structures to be

    exchanged canbe defined in abstract way alongwith standard encoding. It also manages these

    abstract data structres and allows higher level of data structres to be defined an exchange. Other

    functions include compression, encryption etc.

    Application Layer

    The seventh layer contains the application protocols with which the user gains access to the

    network. The choice of which specific protocols and their associated functions are to be used at

    the application level is up to the individual user. Thus the boundary between the presentation layer

    and the application layer represents a separation of the protocols imposed by the network

    designers from those being selected and implemented by the network users.For example

    commonly used protocols are HTTP(for web browsing), FTP(for file transfer) etc.

  • 8/7/2019 7th Term- IT & IS for Construction management

    30/32

    S.R.P** 7TH- TERM- IT & IS FOR CONSTRUCTION MGMT Page 30

    What is Network Layer?

    The network layer is concerned with getting packets from the source all the way to the destination.

    The packets may require to make many hops at the intermediate routers while reaching the

    destination. This is the lowest layer that deals with end to end transmission. In order to achieve its

    goals, the network layer must know about the topology of the communication network. It must also

    take care to choose routes to avoid overloading of some of the communication lines while leavingothers idle. The network layer-transport layer interface frequently is the interface between the

    carrier and the customer, that is the boundary of the subnet. The functions of this layer include :

    1. Routing - The process of transferring packets received from the Data Link Layer of the

    source network to the Data Link Layer of the correct destination network is called routing.

    Involves decision making at each intermediate node on where to send the packet next so

    that it eventually reaches its destination. The node which makes this choice is called a

    router. For routing we require some mode of addressing which is recognized by the

    Network Layer. This addressing is different from the MAC layer addressing.

    2. Inter-networking - The network layer is the same across all physical networks (such as

    Token-Ring and Ethernet). Thus, if two physically different networks have to communicate,

    the packets that arrive at the Data Link Layer of the node which connects these two

    physically different networks, would be stripped of their headers and passed to the Network

    Layer. The network layer would then pass this data to the Data Link Layer of the other

    physical network..

    3. Congestion Control - If the incoming rate of the packets arriving at any router is more than

    the outgoing rate, then congestion is said to occur. Congestion may be caused by many

    factors. If suddenly, packets begin arriving on many input lines