Form Four Computer Notes
Form Four Computer Notes
Chapter outline
1.1 Introduction
1.2 Definition of terms used in networking
1.3 Types of computer networks
1.4 Purpose and limitations of networking
1.5 Elements of networking
1.6 Network topologies
1.7 Network security
Definition of terms used in networking.
A computer network can be defined as a collection of computers linked together using
transmission media for the purpose of communication and resource sharing. The term
transmission media refers to any physical or non-physical link between two or more
computers and in which a signal can be made to flow from source to destination. Some of
the shared resources include programs, printers,storage devices, communication links
etc.
Data communication
Data communication refers to the process of transmitting data signal from one point to
another through the network. If all aspects related to data communication are taken into
consideration, computer networking is the most recent, efficient and reliable means of
transmitting data.
Page 1 of 87
share a single cable laid between the two towns hence save cost. The different
frequencies create what is called different logical channels in the medium. .
Bandwidth: A bandwidth is the maximum amount of data that a transmission medium can
carry at anyone time. For example, a certain cable may have a bandwidth of 100 Mbps
(Mega bits per second).
Baseband signal: Baseband signal is a digital signal that is generated and applied to the
transmission medium directly without modulation. The signal takes the form of voltages
of different magnitudes applied to the medium. The baseband signal utilises the full
capacity of the transmission medium, hence at anyone time; only one signal can be sent.
However, multiple signals can be sent at different times if they are multiplexed.
Broadband transmission: In broadband transmission, an analog signal is sent over the
transmission medium using a particular frequency. This means that several data signals
can simultaneously be sent through the same medium but at different frequencies.
Frequency bands between these data signals prevent them from overlapping.
Attenuation: This is the decrease in magnitude and energy as a signal progressively
moves along a transmission medium. If the signal is not boosted, it will totally be .lost
along the way and may never reach the destination. Attenuation or signal loss is usually
corrected by placing signal amplifiers also called repeater stations along the medium at
appropriate distances in order to receive the weak signal, clean it, amplify it then
retransmit it.
Page 2 of 87
Local area network (LAN)
Local area network is a computer network that spans a relatively small geographical area
like in one building or a school. One local area network can be connected to other local
area network over any distance via data transmission lines or wireless media.
Most local area networks connect personal computers and server computers on a small
network. A server computer is a computer dedicated to servicing requests for resources
from other computers (workstations) on a network. Most local area networks are
configured such that each workstation has its own central processing unit with which it
executes programs, but it is also able to access data and devices anywhere on the local
area network. Local area networks enable many users- to share expensive devices, such
as laser printers, as well as data. Users can also use the local area network to
communicate with each other, by sending messages or engaging in chat sessions.
Local area networks are capable of transmitting data at very fast rates, much faster than
data transmitted over telephone lines. .
Purpose of networking
Some of the reasons for setting up computer networks include: resource sharing, remote
communication, distributed processing facilities, cost effectiveness and reliability.
Resource sharing
A resource in the network environment means data/information, files, printers, modems,
communication links, storage devices, fax machines, application programs and any other
component that can' be attached to the network for access by users.
Take for example an office setup where a number of users in a small business require
access to. Common information. As long as all the computers are connected, they can
share their files, exchange mail, send,
Faxes, schedule meetings and print documents from any point on the network. Users do
not need to transfer files via removable storage but would send the work to a network
Page 3 of 87
printer. This centralised access to data and information leads to less waste of time and
hence greater productivity.
Imagine the benefits of a user being able to directly fax a document from the softcopy in
his/her word processor, rather than having to print it out, and then feed it into the fax
machine.
In most network arrangements, the shared resources may be attached to a network server.
The other computers on the network that send requests to the server are referred to as
clients or workstations. Network servers run a special program called the server software
which controls computers on the network and listens to client requests to service them
over the network. For example, a print server will give permission for a particular client
to print documents on the network printer. Figure 1.2 shows a simple diagram
representing a computer network that is controlled by a server.
Remote communications
In the present computing environment, computer engineers are faced with two basic
problems.
1. Roaming of officers who by virtue of their work keep on covering long distances away
from the workplace.
2. Access to the organization’s information resources so that they can have up-to-date
data or at least update the information servers with the status quo in the field.
Initially, the problem of roaming was addressed by the development of portable
computers like laptops. But problem of access to the network's information server
remained! However, both problems have been addressed by remote communication.
Remote communication refers to the transmission of data signals between two
communication devices located at different geographical locations. A computer that tries
to access resources from another computer on the network is called a remote client while
the computer being accessed is called a remote host. Remote communication has been
made possible by use of wireless transmission media such as radio waves, microwave and
satellite as will be discussed in details later.
It is through remote communications that people can be able to share ideas and pass
messages over the Internet.
Therefore, remote communications give a lot of freedom to the network users which
translates to more productivity. Imagine continuing to work from home just as if you
were in your office.
Page 4 of 87
were sent from the dumb terminal (workstation with no processing power) for processing
and storage in a central computer. It therefore followed that processing of data, release of
information and decision making was centralised too.
However, with distributed processing, files reside on the user's computer rather than on a
central computer. Branch offices in a large organization have their own servers that store
data, information and other resources required for their daily operations. These servers
would then periodically update the central computer.
This model of data processing has a number of advantages. These include:
1. The failure of the central computer does not affect the operations of the other
terminals.
2. Processing load is shared equally hence no time wastage.
Cost effectiveness
Networks are cost effective in the organization. Although the initial purchase and lying
down of network components may be expensive, the savings experienced and the value
added to service delivery make them a ready choice for enterprising managers.
One good thing about a network is that it greatly increases the efficient use of scarce
resources. Imagine a large organization that has stand alone computers only. In such a
case, the management has to buy a printer for each computer. However, with a network,
only one printer is sufficient. The same applies to other resources like fax machines,
optical drives, files and applications.
It should also be noted that computer networks have enhanced daily communication by
providing a paperless communication environment. Users can send electronic messages
and mail to each other instead of having to bear the cost of stamp duty or delivery
charges. On the same note, company executives may not need to travel across continents
to hold meetings. They can hold electronic video conferences instead and save the fare.
Reliability
A computer network is reliable in two ways especially when communicating or accessing
information:
1. Data can be transferred with minimum error from source to destination.
2. In case one computer breaks down, a user can still access data and information from
the other computers using another computer on the network.
Limitations of networking
Although networking has many advantages it also offers many challenges that are
associated with implementation and human factors. Some of the limitations and
disadvantages of networking include security issues, high initial installation cost, moral
and cultural effects, spread of terrorism and drug trafficking and over reliance on
networks among others.
Security issues
Data and information held on a network is prone to more illegal access threats than if the
computer was not on the network. For example, a stand alone computer may be accessed
by only a few people at home or in the office environment. However, once the computer
is connected to the network, especially the Internet, many people can access it not only
Page 5 of 87
physically but also virtually over the network. Apart from this, when information is sent
over the network from source to destination, it can be tapped or listened to by
unauthorized parties.
Organisations find it very challenging to guard information systems from constant threats
of illegal access. One of the common methods of data protection in a networked
environment is encryption. This is the scrambling of information into a complex
unintelligible form. Encrypted data cannot be understood by people who illegally access
it unless they have the decryption key.
Over-reliance on networks
Modem organisations have phased out most manual operations this means that all
business processes and the society depend on computer networks. The disadvantage of
this over reliance is that if by any chance the network fails or goes down, then many
systems in the society can be brought to a halt! For instance, imagine the chaos if mobile
phone services were to be abruptly brought to a halt. However, proper systems and
network planning should be made to avoid such occurrences.
Elements of networking
A computer network is made up of several standard elements (components) which can be
classified into three major categories namely:
1. Data communication media.
2. Communication devices.
3. Networking software.
Page 6 of 87
A data signal cannot be sent from one place to another without a medium of
communication. A data communication medium is a pathway used for carrying data and
information from one point to another. The communication medium will more often than
not dictate the type of signal that will be used to transmit a message. In essence, data
communication media can be divided into two:
1. Communication using cable (bounded media)
2. Wireless communication (unbounded media)
Page 7 of 87
Twisted pair cables are categorised into five groups according to the type of data
transmitted and maximum rate of transmission, as shown below.
Table 1.1
Coaxial cables
A coaxial cable resembles the cable that is used to connect television antenna to a
television set. This cable has a central copper core which may be of solid or stranded
wires surrounded by a dielectric material (insulator). The dielectric material is then
surrounded by a hollow mesh conductor which is covered by a shield making the cable
more resistant to electromagnetic interference than the twisted pair cable.
The braid (or mesh conductor) is made of copper or aluminium and serves as the ground
for the carrier wire. Together with the insulation and any foil shield, the braid shield
protects the carrier wire from radio frequency interference (RFI) and electromagnetic
interference (EMI). However, although the cable has better protection against electrical
interference than the twisted pair cables, it has a moderate protection against magnetic
interference. The diameter of the centre core or conductor determines the attenuation rate.
The thinner the core, the higher the attenuation rate. Data is carried on the cable using
direct current (dc).
Page 8 of 87
Coaxial cables have bandwidths of up to 1 Gbps (Gigabits per second). Hence, they are
installed in a network to form the network backbone (a link that connects two or more
separate local area networks). A good example where this cables are used is connecting
different networks between buildings and routing trunk calls in telecommunication
companies. There are two types of coaxial cables:
1. Thin coaxial cable (Thinnet). It has one dielectric insulator
2. Thick coaxial cable (Thicknet). It has two dielectric insulators around the core and is
thicker than the thinnet
The advantages of coaxial cables include:
1. They are very stable even under high loads.
2. They have a large bandwidth (up to I Gbps) compared to twisted pair.
3. They can carry voice, data and video signal simultaneously.
4. They are more resistant to radio and electromagnetic interference than twisted pair
cables.
The disadvantages of coaxial cables include:
1. Thick coaxial cable is hard to work with.
2. Coaxial cables are relatively expensive to buy and to install as compared to twisted
pair.
Fiber optic cables
This is one of the latest types of bounded transmission media to be developed. Instead of
carrying or transmitting data signals using electronic signals, the fiber optic cable utilises
light to transmit data from one point to another on the network. The electrical signals
from the source are converted to light signals, and then propagated along the fiber optic
cable. To convert an electric signal to light, you need a Light Emitting Diode (LED) at
the transmitter. At the receiving end, a photosensitive device can be used to convert the
light signals back to electric signals that can be processed by the computer.
The fiber optic cable is made up of the core, cladding, buffer, strength members and the
jacket. .
The core: The core is the central part of the cable and is made of a hollow transparent
plastic or glass.
Cladding: This is a single protective layer surrounding the core. It has some light bending
characteristics in that, when the light tries to travel from the core to the cladding, it is
redirected back to the core. This is why even if a fiber optic cable is bent into coils and a
light signal is inserted at one end it will still be seen coming out from the other end.
Buffer: The buffer surrounds the cladding and its main function is to strengthen the cable.
The jacket: It is the outer covering of the cable.
Fiber optic cables are of two types namely:
1. Single mode fiber.
2. Multimode fiber.
The single mode fiber cable has a very narrow centre core the light in the cable can
therefore take only one path through it. Because of this, it has a very low attenuation rate
and is preferred for long distance transmission. It has a bandwidth of 50 Gbps which is
higher than that of the twisted pair's 100 Mbps. Single mode fiber is very expensive and
requires very careful handling during installation.
Page 9 of 87
A multimode fiber has a thicker core than the single mode it allows several light rays to
be fed in the cable at an angle. Because of multiple light signals navigating the cable at
the same time, distortion of the signal is possible. Multimode cables have a high
attenuation rate and are usually used for shorter distances than single mode.
The light signal travels through the core, through a process referred to as total internal
reflection. The process that causes total internal reflection is called refraction. Refraction
is the bending of light when it crosses the boundary of two mediums that have different
density. When light signal is inserted into the cable, it tries to cross from the core to the
cladding. The light is bent back into the core hence propagates along the length of the
cable
The advantages of fiber optic cabling include:
1. It is immune to electromagnetic interference and eavesdropping.
2. It is fast and supports high bandwidth.
3. Large distance can be covered because it has low attenuation.
4. Can be used in hazardous places (highly flammable) because they do not generate
electrical signal.
5. It is smaller and lighter than copper cable hence ideal for space limited situations.
The disadvantages of fiber optic cabling include:
1. Connectivity devices and the media are expensive.
2. Installation is difficult because the cable must be carefully handled.
3. It is relatively complex to configure.
4. A broken cable is difficult and expensive to repair.
Wireless communication (unbounded media)
Wireless or unbounded media, is a type of media that is used to transmit data from one
point to another without using physical connections. In this case transmitting antenna and
receiver aerial facilitate the communication. Examples of wireless transmission media
include microwaves, radio waves, and infrared transmission all use different frequencies
of the electromagnetic spectrum. All these waves travel at the speed of light.
Microwave transmission
Microwave frequencies range from about 3GHz to 40GHz on the electromagnetic
spectrum. Due to their small wavelength, they easily release their energy in water as heat
hence they are also used in making microwave ovens used as domestic kitchen
appliances. However, in networking, microwaves are very suitable for point to point
transmissions. This means that a signal is directed through a focused beam from
transmitter to the receiver station.
Satellite communication
A satellite is a microwave relay station. The microwave earth stations have parabolic
dishes with an antenna fixed on them in order to focus a narrow beam towards the
satellite in space. A satellite transmission system has three main components:
1. Transmitter earth station that would set up an uplink to the satellite in order to transmit
data. The uplink will have a unique frequency.
2. A satellite that is somewhere in an orbit that receives, amplifies and retransmits the
signal to a receiving earth station via a downlink frequency that is different from that of
the uplink so as to avoid interference with the uplink signal.
3. Receiving earth station that would receive the sent signal on the other side of the
globe.
Page 10 of 87
A communication satellite is usually launched into space about 36 000 km above the
earth in such a manner that its speed will be relatively equal to the rotation speed of the
earth. An observer on earth will therefore, see as if the satellite is stationary in space.
These types of satellites are called geostationary satellites. They are convenient because
the need to keep on moving the parabolic dish in a bid to track the line of sight is
eliminated. A geostationary satellite offers a large constant line of sight to earth stations.
The area on earth where the line of sight can easily be located is called the satellites
footprint. The satellite transmits the signal to many recipient earth stations to form a point
to multipoint transmission. In multipoint transmission the transmitted signal spreads out
in all directions forming a cell of access radius.
The new trends in microwave transmission have seen the use of very small aperture
terminal (VSAT) technology. This very small aperture terminal refers to a very small
satellite dish used both in data, radio and TV communication. Many businesses are
adopting this new technology because it enables direct access to satellite communication
instead of having to go through the state owned or licensed satellite gateways.
The satellite produces strong signals that can be received by a satellite dish antenna of
only about 2 metres in diameter. The signals are decoded using a decoder that is plugged
directly to a television set or a computer.
Radio communication
Radio waves travel just like surface water waves, i.e. they are omnidirectional. This
means that they start from a central point and spread outwards in all directions. As they
travel outwards, their energy spreads outwards over the covered area. The waves are
radiated into the atmosphere by a radio frequency antenna at constant velocity. Radio
waves are not visible to the human eye. Radio waves are used in radio and television
broadcasts. Data can also be transmitted over radio waves communication channels. For
example, instead of laying telephone cables between two towns that are geographically
separated, radiowave transmission can be used to connect the two towns. Radio waves
can be of high frequency, very high frequency or ultra-high frequency.
The high frequency (HF) radio waves signal is propagated by directing it to the
ionosphere of the earth. The ionosphere will reflect it back to the earth's surface and the
receiver will pick the signal. Before the advent of satellite communication, high
frequency radio was the only way of communication beyond the horizon such as
communicating to a ship that is on the high seas or communication between continents.
The biggest challenge of high frequency communication is the danger of signal
interception by unauthorised parties.
Very high frequency (VHF) radio waves are transmitted along the earth's surface. Due to
the curvature of the earth, the signal will most likely attenuate at the horizon. This means
that repeater stations have to be placed strategically to maintain a line of sight in order to
receive, amplify and propagate the signal from one area to another. This technology is
popular for the hand held radio devices like "walkie-talkie" radios. The range of very
high frequency is limited but it is preferred to high frequency where no major
obstructions are encountered on the landscape. This is because with very high frequency,
it is possible to make the wave to follow a narrower and more direct path to the receiver.
To overcome the obstructions on the earth surface like mountains and buildings, repeater
stations are built on raised areas.
Page 11 of 87
Ultra high frequency (UHF) radio waves are like very high frequency when it comes to
the line of sight principle. This means that there should be no barrier between the sending
and the receiving aerial. However, they require smaller aerials. Notice that the television
aerial for very high frequency is bigger than the one for ultra high frequency radio waves.
This is because; ultra high frequency radio waves can be made to follow an even
narrower and direct path to the receiver than very high frequency radio waves. Therefore
ultra high frequency is popular for horizon limited broadcasts.
One of the latest radio transmission technologies is called Bluetooth technology.
Bluetooth is a worldwide and short-range radio technology that enables people to use
hand held communication devices such as cell phones and personal digital assistants to
access the Internet. The main idea behind Bluetooth communication is to try and define
one standard that will allow all personal communication devices regardless of their
differences or size to be able to communicate with each other and through wireless
technology. The main component in Bluetooth is a small low power two-way radio
transceiver, small enough to be inserted in small devices. A network of bluetooth-enabled
devices is called a wireless personal area network (WPAN) or piconet. This is because
bluetooth networks are best suited for personal or hand held devices. This has made radio
transmission to become very popular in mobile communication and Internet connectivity.
Infrared transmission
Infrared waves fall just below the visible light on the electromagnetic spectrum. Just like
the radio waves, infrared waves are not visible to the human eye. Communication
through this medium is achieved by having infrared transmitters and receivers
(transceivers). Transceivers of infrared signals must be within a line of sight in the same
room. This is because unlike radio signals, infrared signals cannot penetrate obstacles like
walls. However, the signal can be reflected off surfaces like walls and ceiling until they
reach their destination.
Page 12 of 87
Communication devices
Computers and transmission media require communication devices for the network to be
fully operational. These devices are more or less used as interfaces or junctions between
the terminal devices. Terminal equipments are devices at both ends of the communication
link such as a computer. Some examples of data communication devices include network
interface cards (NIC), modems and codec’s, hubs, bridges, repeaters, routers, gateways,
switches and access points.
Network interface cards (NIC)
Network interface cards (NIC) create a physical link between the computer and the
transmission media. A network interface card is plugged into an empty expansion slot on
the motherboard. However, most computer motherboards today come ready with an
onboard network interface controller. The network interface cards have ports at the back
in which the terminated end of a network cable can be plugged.
Modems and codecs
A modem is an important device in the world of communication. It converts a signal from
digital to analog form for the purpose of transmission over the analog media, while a
codec converts an analog signal to digital form for transmission via a digital medium. A
modem can be external, an add-on card or built on the motherboard.
Hubs
A hub also called a concentrator is a component that connects computers on a network
and is able to relay signals from one computer to another on the same network. A hub
will usually connect networks that have a common architecture i.e. one that has the same
set of communication software usually called protocols. Protocols are a set of rules that
govern the communication between devices on a network. A hub transmits signals by
broadcasting them to all the computers on the network. After the signal is broadcasted,
the computer whose address is on the message picks the message from the network that is
part of the broadcast domain. Some hubs called intelligent hubs are able to monitor the
way computers are communicating on the network and keep the information in a small
database of their own called a management information base (MIB). The network server
can then use this information to fine-tune the network. Intelligent hubs can be able to
manage a network by isolating computers that are not functioning properly. Several hubs
can be connected together one after another to expand a network. However, this increases
the broadcast range which may lead to broadcast storms on the network. The term
broadcast storm refers to a condition where a network is overwhelmed with message
broadcasts due to malfunctioning of network interface cards or hub related problems.
Bridges
This is a network device that selectively determines the appropriate network segment for
which a message is meant for delivery through address filtering. Hence a bridge can
divide a busy network into segments to reduce network traffic. The purpose of using a
bridge therefore is to:
1. Extend the length and number of stations that a segment can support.
2. Reduce overall traffic flow by allowing broadcasts only in the destination segment of
the network.
Page 13 of 87
A bridge makes sure that packets that are not meant for a particular segment are not
broadcast in that segment.
Repeaters
A repeater receives a signal from one segment of a network, cleans it to remove any
distortion, boosts it and then sends it to another segment. Repeaters are the simplest way
to expand a network because they broadcast the same message to other network
segments. However, this is advisable due to broadcast storms that can develop. The
repeater enables the network to eliminate attenuation problems.
Routers
The router interconnects different networks and directs the transfer of data packets from
source to destination. Routing depends on network addresses. Each network has a unique
identifier or address called the network address. Network addressing is enabled because
of the use of a special internetworking protocol called the Internet Protocol (IP). Hence,
the network address is usually called the IP address. All the computers on the same
network have the same network address but different host numbers. The router receives a
packet from another router on the internet work and checks the destinations network
address. If the address is the same as the one on which the router is, it passes the data
packet to the destination host by reading the host address otherwise the packet will be
routed to the next network address. Some modem routing devices combine the
functionality of a bridge and router. Such a device is called a brouter.
Gateways
A gateway is any device that can be configured to provide access to wide area networks
or Internet. One such device is the router. Because of this reason most people confuse a
gateway and a router. However a gateway may not be necessarily a router, it may be a
computer configured to provide access the Internet. Figure 1.21 shows a logical diagram
of a local area network connected to a wide area network via gateways.
Switches
A switch, unlike a hub forwards a packet directly to the address node without
broadcasting. A node refers to data terminal equipment such as a workstation or computer
on the network. The switch does this by connecting two nodes point to point as if they
were linked by a direct cable between them. This reduces the broadcast problems on the
networks. It is important to note that some hubs also incorporate the switching
mechanisms. Such a hub is referred to as a switching hub.
Typically, switches are more expensive than hubs. This means that one switch may be
used as a bridge to connect several hubs in order to reduce collision problems caused by
broadcasts.
Wireless communication devices
For a long time, networks have been implemented using tangible transmission media like
cables. However, as the cost of wireless technology goes down and the quality of service
increases, it is becoming cost effective for companies and individuals to extend the
capability of wired networks by integrating wireless segments into their communications.
Some of the most common devices used in wireless communication include access points
and the antenna.
Access points (AP)
Page 14 of 87
The access point is one of the most common wireless network components As its name
suggests, it is an entry point into a bounded network for people who have wireless
devices such as personal digital assistants (PDA's), laptops and computers with wireless
links.
Wireless antennae
The access point needs to have antennas in order to detect signals in the surrounding. The
waves may be radio waves, microwave or infrared waves in nature. In most cases, access
points will have two antennas so that the one that receives the best signal at any particular
time can be used.
All these tasks would be impossible if network software was not available. These
software can be classified into two main groups namely:
1. Network operating systems.
2. Network protocols.
Page 15 of 87
4. Performance monitoring to ensure maximum throughput on the network.
Examples of network operating systems are Windows NT/2000/2003, UNIX, Linux and
Novell Netware.
NB: Internetworking devices like routers also have operating systems of their own and
hence they can be managed and configured for optimum performance. Note that routers
are special purpose computers.
Protocols
Protocols are set rules and procedures that govern communication between two different
devices or people. For example, a diplomat from a foreign country must adhere to the set
of rules and procedures of communication when representing his country in the host
country.
In computer networking, protocols are the rules and technical procedures that govern
communication between different computers.
Table 1.2
Layer Function
User applications run here and generate
7. Application layer requests for data transmission or open received
Information.
Adds formatting, display and encryption
6. Presentation layer
Information to the data being sent.
Sets up data transmission sessions between two
5. Session layer
Communicating devices.
Manages data transfer over the network to
4. Transport layer ensure
Reliability.
Address information is added to the data packet
3. Network layer
And routed to destination.
Page 16 of 87
Adds error checking information and prepares
2. Data link layer
Data for going onto the physical connection.
The data packets are finally transmitted via the
1. Physical layer network card through the transmission media in
form of bits
Application protocols work at the highest layer of the OSI model. They provide services
to application programs. An example of an application program is an e-mail editor
program that enables composing or reading of e-mail messages. Examples of protocols at
the application layer include:
1. Simple mail transfer protocol (SMTP) - An Internet protocol for transferring e-mails.
2. File transfer protocol (FTP) - An Internet protocol for file transfer.
3. Apple talk and apple share - Apple computers networking protocol suit.
Transport protocols ensure that data is passed between computers more reliably. Some
examples include:
1. Transmission control protocol (TCP): This is responsible for delivery of sequenced
data over the network.
2. Sequential packet exchange (SPX): This part of the Novell's internet work packet
exchange/sequential packet exchange (IPX/SPX) for sequenced data.
3. NetBEUI: A local area network protocol for Microsoft and 1MB networks that
establishes communication sessions between computers.
4. Apple transaction protocol (ATP): Apple computer's communication session and data
transport protocol.
Network protocols provide link services. They handle addressing and routing
information, error checking and retransmission of requests. Some examples of network
layer protocols include:
1. Internet protocol (IP): It does packet forwarding and routing.
2. Internetwork packets exchange: Netware’s protocol for packet forwarding and routing.
Network topologies
The term network topology refers to the way in which computers and other devices have
been arranged or how data is passed from one computer to another in the network.
Therefore network topology can be viewed in two ways namely logical and physical
topology.
Logical topology
Logical topology also called signal topology deals with the way data passes from one
device to the next on the network. Examples of logical topologies are Ethernet and token
ring. This means that two networks with different physical layout may have the same
logical topology.
Page 17 of 87
Ethernet topology
In Ethernet topology, all computers listen to the network media and can only send data
when none of the others is sending.
Physical topology
Physical topology refers to the physical layout or arrangement of components on the
network. Examples of physical topologies include star, bus, ring, mesh and
tree/hierarchical topology.
Star topology
In star topology, all devices are connected to a central hub. Nodes communicate across
the network by passing data through the hub. When the hub receives data from a
transmitting computer, it broadcasts the message to all the other nodes on the network.
Until recently, the star topology was found mostly in minicomputer and mainframe
environments. The topology consists typically of a system of terminals or personal
computers, each connected to a central server.
The advantages of star topology include:
1. It allows centralisation of key networking resources like concentrators and servers.
2. It gives the network administrator a focal point for network management. When
something goes wrong with the network, the administrator can troubleshoot it from one
place, usually a wiring closet, but possibly from a remote management terminal.
3. Star networks are easy to configure.
Bus topology
All devices are connected to a central cable called the bus or
backbone as shown in Figure 1.26. The sharing of the transmission media (or bus) has
several problems. Most importantly, it means that the cable can carry only one message at
a time and each workstation on the network must be capable of knowing when it can and
cannot transmit using this shared medium.
Page 18 of 87
A terminator is attached to each end of the cable to avoid signals from bouncing back and
forth on the cable causing signal distortion. As the data passes along the cable, each
station checks whether the data is addressed to it. If the address matches the machines
address, it receives the data otherwise it rejects it. The network addresses of computers on
a network are called the medium access control (MAC) address.
Ring topology
In a ring topology, all devices are connected to one another in the shape of a closed loop
each station is responsible for regenerating and retransmitting signals around the network
to its neighbour. A token is used to exchange data from one station to another. A token
can be viewed as an envelop or a bag where data is placed for transmission and carried
around the network.
The advantages of ring topology are:
1. They use a short length cable.
2. Ring topology is simple to install.
The disadvantages of ring topology are:
1. Modification may be difficult because adding or removing a device can disrupt the
entire network.
2. Troubleshooting can be difficult.
3. One device or media breakdown may affect the entire network.
However, this is not the case with IBM token ring where a device called Multi Station
Access Unit (MSA U) is used for station bypass in the event a station fails.
Mesh topology
This is the most common type of topology used in wide area network where there are
many paths between different locations. Devices are connected with many redundant
interconnections between the nodes. In a true mesh topology every node has a connection
to every other node in the network. This is a hybrid topology. Groups of star-configured
networks are connected to a linear bus backbone
Practical exercise
Page 19 of 87
This practical activity is a step by step guide on how to set up a simple local area
network. The following are some of the requirements you need.
Hardware requirements
1. A computer running on any version of Microsoft Windows especially Windows 9x /
2000 / ME / Windows XP.
2. Network Interface card. Some computers may have it already installed onboard so that
you do not have to purchase one.
3. A hub or a switch.
4. Transmission media preferably unshielded twisted pair category 5. 5. RJ45 connectors.
Tools
1. Crimping tool
2. Cable tester
3. Screw drivers.
Installing a network card
The network interface card acts as the physical interface or connection between the
computer and a properly terminated transmission cable. As mentioned earlier, some
motherboards come with on-board network interface cards hence you may not need to
plug in a separate add-on card.
To physically install an add-on card:
1. Disconnect the computer from the power source.
2. Open the system unit and identify an empty expansion slot on the motherboard.
3. Insert the card and screw it into place. Some little force may be needed to push the card
into place squarely. Make sure that all the conductor points of the card sink into the
expansion slot. Avoid touching the golden conductor points and chips on the card with
your bare hands.
NB: Some cards are slotted into Industry Standard Architecture (ISA) slots while others
are designed for Peripheral Components Interconnect (PCI) slots. Make sure you install
in the right slot and then screw into place.
4. Replace the casing then connect the computer to the power supply and boot it up. If
you are using Microsoft Windows 9x and above, the computer will detect the new
hardware because of the plug and play feature found in the operating system. It may
install the protocols and device software needed for the proper operation of the network
interface card automatically! If there is a problem of the card being detected, you may
have to configure the card manually using software on a disk that comes with the card.
Page 20 of 87
Adding protocols
1. Make sure the Network dialog box is open.
2. Click ADD then protocol
3. Click Microsoft, select TCP/IP and NetBEUI from the protocol list then ok
4. Click Apply
Page 21 of 87
4. Using the wiring diagram, place the wires in the correct order and trim the edges to
make them even.
Key
1. Green striped 2. Green
3. Orange striped 4. Blue
5. Blue striped 6. Orange
7. Brown striped 8. Brown
5. Insert the wires into the RJ45 connector; plug it in their correct order and then push it
into the crimping tool.
6. Squeeze the handles of the tool to make sure the wires are pierced and held tightly in
the connector.
7. Repeat steps 5 and 6 at the other end of the cable. Your cable should now be
terminated on both ends
8. You can then test the media for continuity and correct termination using the cable
tester.
Page 22 of 87
protect your data and information from intruders. In networking there are several ways of
enforcing security one of them is share level and the other is the user level security.
User-level security
User level security model is used on server based networks. A network administrator
assigns accounts to users. This means that each user is provided with a unique name and
password which he or she can use to access network resources. For more on user level
security, read documentations on operating system such as Microsoft Windows NT
4.0/2000/2003, UNIX, Novell Netware, Linux Fedora etc.
Page 23 of 87
APPLICATION AREAS OF INFORMATION AND COMMUNICATION
TECHNOLOGY (ICT)
Chapter outline
2.1 Introduction
2.2 Application areas of information and communication technology
2.3 Field work report
Introduction
Computers play an important role in every aspect of our society today. Hardly does a day
pass without one coming across a computer system that is used in offering services that
were initially done manually.
In this chapter, we shall look at how computers have been applied in the contemporary
society to add value to the information systems of various organizations. An information
system is a collection of specific human and machine efforts required to support the
decision making process, data processing, information output and presentation.
Financial systems
Financial systems enable organisations to manage their finances. They include:
1. Payroll systems.
2. Accounting systems.
3. Banking systems.
Payroll systems
The primary purpose of this system is to process the accurate information of employees
including gross pay, deductions and the net pay. Because money spent on human
resource is one of the largest operating expenses of a business, a payroll system is also
designed to produce several analysis reports e.g. a breakdown of payroll expenses against
production/income of the company.
Accounting systems
Accounting systems are popular in business management. There are six key business
accounting activities/subsystems:
1. Customer order entry and billing
2. Inventory management
3. General ledger accounting
4. Accounts receivable
5. Accounts payable
Page 24 of 87
Customer orders entry and billing
Customer orders entry and billing subsystem records incoming customer orders,
authorises delivery of items or services ordered and produces invoices for customers who
do not pay in advance or on cash basis.
Inventory management
Inventory management is used to keep track of the items in stock and help the
management determine which items to reorder. This helps the management to have
enough stock at all times to meet the needs of the customers.
Accounts receivable
Accounts receivable system keeps track or records of the amount owed by each customer.
This helps the management to make a follow-up by billing the customers for overdue
payments.
Accounts payable
Accounts payable system keeps track of the amount the business owes others e.g.
suppliers, tax organisations, transport e.t.c. Hence, it helps the management to produce
cheques for payment of these amounts.
Banking systems
The banking industry was one of the earliest consumers of information and
communication technology. The computerised banking services include:
1. Processing customer transactions.
2. Cheque clearing and processing.
3. Electronic funds transfer.
Processing customer transactions
Computers are used in banks to carry out financial transactions such as recording
deposits, withdrawals and calculating interests on savings and loans. Such systems also
generate reports on the current status of accounts. In most banks, these transactions are
entered via terminals, which are connected, to a central computer for centralised
processing. The tellers have revolutionised banking activity by offering 24 hour service
to customers and more flexibility in cash deposits and withdrawals.
Page 25 of 87
number and the amount of the cheque. Using a magnetic ink character reader, these
details are automatically entered into a computer for cheque processing. Manual
processing used to take lots of time but with computer systems, millions of cheques are
processed every day hence improving efficiency in service delivery to customers.
Retail systems
Computers are becoming more and more popular in retail stores such as supermarkets,
distributor outlets etc. Computers are used in such stores for:
1. Stock control
2. Transactions handling at the electronic point of sale terminals (EPOS)
Stock control
A computerised stock control system enables a user to manage his/her stock more
efficiently. This system is used to track what is in stock and what needs reordering so as
to reduce the risk of under stocking or overstocking. Overstocking ties up valuable space
and capital that could have been used for other valuable items. On the other hand under
stocking causes customer dissatisfaction.
Reservation systems
Page 26 of 87
Reservation systems are distributed networked systems that are used mainly to make
bookings in areas such as airlines, hotels, car-rental, theatres etc. Bookings are made
from a remote terminal connected to a centralised computer database. To access the
database, a customer makes enquiries via the remote terminal connected to the central
computer.
For example to make airline booking enquiries such as finding out the seats reservation a
customer uses a remote terminal in the nearest booking office. The response is
immediately available to the customer within a few seconds.
Such a computerised reservation system is referred to as online enquiry since an
individual directly requests for information through a terminal from a central computer
and receives an immediate response.
Educational systems
Initially most educational institutions used computers for administrative tasks such as
compiling examinational reports, writing memos and accounting purposes. Computers
are playing an increasingly important role in educational institutions in the following
ways:
1. Computer aided instruction (CAI)
2. Computer aided learning (CAL)
3. Electronic learning (e-Learning)
4. Computer based simulation
Page 27 of 87
also access learning material on the internet, sit for online examinations and receive
results the same way. Learners therefore do not need to go physically to a college.
Computer based simulation
Computer based simulation refers to the science of representing the behavior of a real-life
situation by using computerised models. Simulation has become very popular in learning
and training institutions. For example, in distant or e-Learning, where a learner is not in
physical contact with a trainer, simulation software can be used to provide the learner
with clear illustrations about a certain concept or skill.
Simulation programs are mostly used in educational areas where practical skills have to
be learnt like training drivers, pilots, engineers etc. have to be instructed using a virtual
environment.
Communication systems
Communication refers to the distribution of information or data from one person or
location to another. Effective and efficient data communication is achieved by use of
high-speed electronic devices such as computers, cell-phones, radios and television. This
integration of computerised electronic devices and telecommunication infrastructure for
the purpose of communication is referred to as information and communication
technology (lCT). Therefore ICT not only refers to computers but also all other devices
that are used for effective and efficient communication. Examples of communication
systems are:
1. Facsmile (Fax).
2. Radio.
3. Television set.
4. Video conferencing.
5. Telecommuting.
6. Internet.
Facsmile (Fax)
A facsmile machine, in short a fax, is a telecommunication device used to send
documents via telephone lines. A document is placed in the machine, scanned and
converted into analog form then transmitted over the telephone line. The receiving fax
machine converts the analog data into the original softcopy and prints a hardcopy.
To send fax over the Internet, a special modem, called a fax modem is attached to the
sending and receiving computers. This eliminates the need for a stand alone fax machine.
Radio communication
Computers can be used in radio broadcasting stations to do the following:
1. Record and manage radio programmes meant for broadcasting.
2. Manage the radio transmission and track performance. Most transmissions equipment
are computerized for easy troubleshooting and operation.
3. Automate the running of the selected programmes.
4. Create slides, simulated objects and sound effects when preparing electronic and
printed media advertisements.
5. Download information from Internet that can be used in preparing programmes such as
international news.
Television sets
Page 28 of 87
Television sets (TV) have become increasingly important in information and
communication technology because they are much more available at homes and many
places than computers. Data or information is transmitted via a TV channel the same way
the channel is used to broadcast conversional TV programs. The most common types of
data transmitted via TV include: teletext (ceefax) and videotex (view data).
Teletext
Teletext refers to a computerised service whereby news and other information are
provided on television screens to subscribers. A TV is configured using a special add-on
card or adapter. The subscriber can browse for information using a remote controlled
device. However teletext is a one way communication (simplex) which means that the
subscriber cannot communicate back to the service provider.
Video conferencing
Video conferencing refers to the use of computers, a digital video camera, audio
capturing equipment and communication networks to enable people in different locations
to see and talk to one another.
Each participant's computer is attached with a video camera (camcorder), speakers and a
microphone. With such devices and appropriate communication software, a person can
participate in a virtual conference room. In such a room, all participants can see each
other on the computer screen as if they were seated in a real conference room.
Page 29 of 87
World wide web refers to a collection of web pages, which may be made up of text,
images, animations, sounds and video held on web servers. One can access the
information using a computer or any other communication device such as a mobile
phone. However, for a mobile phone to be used to access the Internet, it must have the
wireless application protocol (WAP). A computer connected to the Internet or a WAP-
enabled mobile phone allows the user to access a wide range of information such as
news, entertainment, banking, reservations, business news, e-mails among others.
E-mail
This is a very fast and efficient means of sending and receiving messages, data, files or
graphics. Once you subscribe for Internet services through a service provider, you can
send or receive e-mails to or from anyone connected to the Internet using a computer or a
WAP-enabled cellular phone.
Industrial system
The application of computer technology in industrial or manufacturing processes has
become one of the most effective methods of automated production. This has resulted in
tremendous improvement in productivity.
Industrial plants such as motor vehicle manufacturers, chemical plants, refineries and
mining plants use computer systems in a number of ways. Some include:
1. Computer aided design and manufacturing.
2. Simulation.
3. Process control.
Page 30 of 87
Process control
Computerised process control refers to the use of a computer system to control an
ongoing physical process especially in manufacturing. Such process controls may include
regulating temperature, pressure, fluid flow etc. Computerised process control is mostly
used in petroleum refineries, chemical plants and other manufacturing companies to
manage machine intensive processes.
Medical research
In health sciences, health professionals use computer technology for diagnosis, keeping
patients' records, inventory control etc. Computers are now being used to control devices
that help to care for the handicapped such as the deaf, blind, bed ridden etc. In some
health institutions, a more specialised computer system referred to as an expert system
may be in use. An expert system is an interactive system that generates conclusions from
captured data by comparing it with a set of rules held in a database called a knowledge
base. The system emulates the reasoning of a human expert in a narrow field of
specialisation. Expert systems have been developed to help medical professionals
diagnose illnesses more accurately in the absence of human experts.
Page 31 of 87
Library systems
Libraries use computerised systems for a number of tasks. Examples are:
1. Lending system
2. Inventory control system.
3. Cataloguing system.
Lending system
The library lending system manages the issuance and return of borrowed reading
materials. Books, magazines, journals, reports etc. are given unique identification
numbers or codes. Once a member borrows a book, his/her details are recorded. When
the book is returned the borrower's record is updated to reflect the new status.
Inventory control
This involves use of computers to manage stock, which includes checking for books
currently in the shelves and those on high demand for the purpose of adding more.
Similarly, books that have become obsolete can be retired to the archives.
Cataloguing
A catalogue is a collection of cards with information about each book or reference
materials found in the library. These cards may be kept in a drawer sorted in alphabetic
order either by title or author name. To enhance service delivery and efficiency,
computerised cataloguing has replaced the manual cards catalogue. This electronic
catalogue is updated constantly when new reference materials are acquired.
Entertainment systems
The advancement in multimedia technology has produced computers that can be used in
recreational and entertainment. Some application areas of computers in recreation and
entertainment include:
1. Games
2. Music and video
Games
Games have come a long way from the simple solitaire to modem simulated 3D games.
Digital video disks (DVDs) and three-dimensional (3D) multimedia games are now
possible on personal computers. There are computer games that simulate sports such as
driving, war combat etc. such games gives the player maximum pleasure in a virtual
environment on the screen.
Although some games can be played using other accessories e.g. on the TV screen using
a game console, such games have been developed using computers.
Page 32 of 87
In music industry, computers are used in recording, synthesizing, editing and adding
special effects to music.
In video industry, computers are used to produce highly simulated and animated movies,
generate scenes and actors. Some movies use a lot of computer generated images that
make the movie interesting.
Transportation systems
Computers play an increasingly important role in transportation industry in areas such as:
1. Automobile traffic control
2. Air traffic control
Shipping control
Computers are widely used to control and guide the paths taken by spaceships and water
vessels as they travel to distant lands. The geographical positioning system is also used in
shipping control.
Home use
Because microcomputers are nowadays affordable, most people are using computers at
home for preparing domestic budgets, entertainment, research and teaching children on
educational concepts.
Page 33 of 87
Marketing
Without proper marketing, a business cannot survive in a competitive environment; hence
computers are being used in a number of ways to enhance marketing. These include:
1. Electronic commerce or e-business
2. Electronic presentations
3. Advertising
Electronic commerce/e-business
E-commerce is a new way of doing business where the transactions are carried out
electronically without physical interaction between the seller and buyer. For example a
customer may decide to buy an item through the Internet by visiting the supplier's web
site, selecting the item and placing it in a virtual shopping tray. The website tracks the
whole session as the customer chooses various items and calculates the total bill.
Payment is then made through a cheque, credit card or through electronic funds transfer.
Once the payment is made, the item is shipped to the customer.
This method of trade has enabled people to do business without much movement hence
saving money and time.
Electronic presentation
Using computers, marketing agents can create exciting presentations concerning the
products of a business and present them to the audience using presentation software.
Electronic presentation adds value to traditional marketing techniques because they are
attractive.
Advertising
Using simulation, presentation and animation software, it is possible to design catchy
advert materials and video clips. Such materials can then be displayed on billboards,
broadcasted over a television or placed on the Internet.
Page 34 of 87
A boom is an alternative to the often-uncomfortable head gear. Screen, optical and sound
systems are housed in a box. The user looks into the box through the two screens to see
the virtual world.
Gloves
Gloves worn on the hands allow the user to navigate through the virtual world and
interact with virtual objects. The gloves have sensors that collect data about the
movement of the hands and relay the data into the system. They give the wearer a sense
of touch in the virtual world.
Body suit
A body suit, worn during virtual reality session is made up of conductor wires wound in a
rubber suit. The wires sense the body movement and relay the data into the virtual reality
system which in turn adjusts the position of the user in the virtual reality world.
Page 35 of 87
2. Table of contents
3. Introduction
4. A detailed description of information and communication technology implementation
in the area of field work study
5. Conclusion
Chapter outline
3.1 Introduction
3.2 Issues resulting from the use of information and communication technology
3.3 Evolution of computer systems
Introduction
This era of information and communication technology (ICT) continues to influence our
lifestyle both positively and negatively. This chapter seeks to explain some of the issues
that result from the use of ICT in the society.
Effects on employment
The introductions of computers in the workplace have resulted in creation of new jobs,
replacement of computer illiterate workers and displacement of jobs that were formerly
manual.
Job creation
ICT has introduced new employment opportunities that never existed before. The use of
computers in financial institutions, reservation systems, educational institutions,
communications etc. has created new job titles such as computer operators, programmers,
network administrators, information technology or infof?1ation science managers,
database administrators, software developers, system analysts etc.
Job replacement
Since the introduction of ICT in workplaces, some clerical and repetitive tasks that
required a large number of employees have been made redundant. Computer illiterate
people have been replaced with those who have the desired computer skills. The question
Page 36 of 87
in the mind of workers and managers is whether computers will in future take over all the
work currently being done manually by human workers.
Displacement
Unlike in replacement where an employee may lose the job, in displacement an employee
is moved to another place or department where computer skills are not required. For
example, a clerk may end up being an office messenger if computers are introduced at the
workplace and such a person is not willing to acquire new skills of using the
computerised system.
Automated production
A number of manufacturing industries such as vehicle assembly plants, oil refineries and
food processing companies are using computers to automate their processes with an aim
of increasing production. Computer controlled robots and assembly lines are a common
feature in manufacturing industries.
The advantages of using automated production are:
1. Increased efficiency due to the balancing of workload and production capacity.
2. Improved customer service. Adequate and high quality goods are produced in time.
3. Efficient utilisation of resources such as raw materials, personnel and equipment
hence less operating expenses are incurred.
However, automated production has its disadvantages too. These are:
1. High initial cost of setting up 1an automated system. For example, the cost of buying
one industrial robot is high compared to employing human resource.
2. Automated production may lead to unemployment in some areas that are labour
intensive. For example, what would have been done by thirty people may be done by one
person using a machine.
Page 37 of 87
characterised by eye strain, headaches, double vision and other problems caused by the
improper use of the monitors. The solution to this problem is to use monitors with good
resolution and fitted with an antiglare screen that filters excess light. A computer user at
all times must adjust the brightness of the screen to the intensity that is comfortable to the
eyes.
Electromagnetic emissions
Electromagnetic field emissions are waves of electrical and magnetic energy that are
emitted by current carrying conductors. Computer users are advised to use low emission
devices in order to avoid exposing themselves to excess emissions.
Environment issues
Some of the environmental effects of information and communication technology include
energy consumption and radiation, pollution, paper consumption and disposal.
Environmental pollution
Information technology has also contributed to environmental pollution. For example,
huge garbage dumps of dead computer parts, printers, ink toner cartridges, monitors and
other computer accessories are disposed in landfills hence causing environmental
pollution. There has been concern on the disposal of Nickel - Cadmium laptop batteries
that contain toxic cadmium which when buried in a landfill can leak into underground
water tables and catchments areas.
Cultural effects
The rapid growth of information technology does not only provide us with different ways
of working, playing and thinking but also presents challenges to our moral and cultural
values. It is the moral standards that help in guiding human behavior. Information and
communication technology has changed the way we talk, affected our privacy, human
rights and integrity. For example Internet users are exposed to a form of communication
called flaming. Flaming is writing on-line messages that use derogatory, obscene or of
dirty language. Also through the Internet, one can view pornographic materials that affect
moral values negatively. These free flows of immoral information have negatively
influenced the behaviour of both the young and old in the society.
Computer related crimes such as hacking, eavesdropping, piracy are on the increase.
This has been accelerated by the free for all Internets. Therefore, a lot has to be done to
improve on privacy and security of information.
To some extent, people with eroded integrity have used computers as a tool to
accomplish their vices. Take for example where a person would use a computer to forge
Page 38 of 87
certificates, passport and other documents. This means that the person is cheating and
therefore his/her moral integrity has been compromised.
However, ICT has its advantages too especially where it has been used as a campaign
platform against diseases like AIDS and drug abuse.
Page 39 of 87
Expert systems
This is software designed to make a computer operate at the level of a human expert in a
specific narrow area of specialisation. Such software simulates the reasoning process of
experts in certain well defined areas such as medical diagnosis, financial forecasting etc.
An expert system consists of three components namely:
Knowledge base: This is the expert system's database of knowledge about a particular
subject. It contains relevant facts, beliefs, assumptions and procedures for solving a
particular problem.
Inference engine: This is the software that controls the search for knowledge in the
knowledge base and produces conclusions. It takes the problem posed by the user and
seeks to analyse it in order to arrive at a conclusion.
User interface: This is the display screen that enables the user interact with the system.
An example of an expert system is MYCIN developed at Stanford University, USA.
MYCIN is used in diagnosis of blood and meningitis infections. Another application area
of expert systems is in predicting mineral deposits in a particular geographical area by
analysing composition of soil samples.
Natural language processing
Natural languages are ordinary human languages such as Kiswahili, English, French etc.
The problem of natural languages is that they are ambiguous and may be interpreted
differently by different people. For example the word 'sack' has two meanings i.e. "a type
of bag" and "the act of dismissing a worker from gainful employment". Computer
languages on the other hand are clearly defined.
Page 40 of 87
the wrong hands, hence take appropriate security measures even before loss of the card is
reported.
Robotics
A robot is a computer controlled device that emulates a human being in carrying out tasks
that would otherwise be dangerous and difficult. Although robots are being used in
workplaces research is going on in order to come up with robots that will incorporate
perception systems.
Perception systems are sensing devices that emulate the five common senses of a human
being i.e. sight, hearing, touch, smell and taste. Such devices would operate under the
control of a microprocessor. This development will give robots artificial senses. Such
artificial senses include feeling the shape of an object, listening to ultrasound; detecting
smell of a leaking gas or chemicals tasting food is quality and seeing using two miniature
video cameras
Expanded information superhighway
Expanded information superhighway involves the integration of cabled and wireless
technologies for the purpose of data and information transmission. In line with
advancement in the other areas of information and communication technology, there is
vast increase in throughput of various transmission media like fiber optic and wireless
technologies. Scientists have demonstrated a fiber optic cable whose diameter is the size
of a single strand of hair which is capable of carrying a trillion bit per second
Internet is growing tremendously causing what is generally referred to as a growth of the
information superhighway to digital explosion or hurricane.
Page 41 of 87
CAREER OPPORTUNITIES IN INFORMATION AND COMMUNICATION
TECHNOLOGY
Chapter outline
4.1 Introduction
4.2 Description of career opportunities in information and communication technology
4.3 Further educational opportunities in information and communication technology
Introduction
The era of computers and automated information and communication technology has
brought both blessings and disappointments in the workplace. Some people have acquired
very well paying jobs while others have lost theirs. For example an ordinary typist has
been replaced by one who can create documents using a computer. Many new jobs have
been created in areas like banking, manufacturing, educational institutions,
communication and other service industries.
Computer operator
Some of the responsibilities of a computer operator include:
1. Entering data into the computer for processing.
2. Keeping up-to-date records (log files) of all information processing activities.
Computer technician
Given that computers require regular maintenance, upgrading as well as emergency
repairs, demand for computer technicians continues to grow as more and more people
computerise their workplaces and homes.
Some of the responsibilities of a computer technician are:
1. Troubleshooting computer hardware and software related problems.
2. Assembling and upgrading computers and their components.
3. Ensuring that all computer related accessories such as printers, modems, storage media
and devices are in good working condition.
4. In developed countries, technicians help hardware engineers in designing and creating
some computer components such as storage devices, motherboards etc.
System analyst
This is a person who is responsible for analysing a company's needs or problems then
designs and develops a computer based information system. A good system analyst is one
who has at least the following attributes:
Page 42 of 87
1. Good problem solving skills and creativity i.e. must have wide experience in solving
problems.
2. Good communication skills: The analyst must be able to communicate clearly and
precisely both in writing and in speech. He/she must be able to talk to different groups of
people e.g. managers, operators, attendant and general public.
3. Must have business knowledge: The analyst must clearly understand the environment
for which the system is being developed.
4. Technical knowledge: A system analyst must be well trained in relevant areas of
computer science such as hardware, software and programming knowledge.
Some of the responsibilities of a system analyst include:
(a) Reviewing the current manual or redundant information system and making
recommendations on how to replace it with a more efficient one.
(b) Working with programmers to construct and test the system.
(c) Coordinating training for users of the new system.
Computer programmer
Large organisations such as insurance companies, banks, manufacturing firms and
government agencies hire programmers to work together with system analysts in order to:
1. Write in-house application programs or system programs.
2. Customise commercial application packages to suite the organisations needs.
3. Test, debug, install and maintain programs developed or customised for the
organization.
Software engineer
A software engineer is one who is skilled in software development and technical
operation of computer hardware. Some of the responsibilities of the software engineers
are:
1. Developing system and application software.
2. Developing user and technical documentations for the new software.
3. Maintaining and updating the software to meet day-to-day requirements while
overcoming challenges.
Computer engineer
Computer and electronic engineers are coming up with new and more efficient
technologies in information and communication technology almost daily. Since
computers are electronic devices, hardware designers must be good in electronic
engineering in order to be able to:
1. Design and develop computer components such as storage devices, motherboards and
other electronic components.
2. Determine the electrical power requirement of each computer component:
3. Re-engineer computer components to enhance its functionality and efficiency.
4. Design and develop engineering and manufacturing computer controlled devices such
as robots.
Page 43 of 87
information system (MIS), the manager can test the impact that an alternative course of
action might have on the business.
Other responsibilities of an information system manager include:
1. making sure that all tasks in the IT department are done correctly and on time in order
to support business planning, control and decision making processes.
2. Preparing budgets for the department.
3. Keeping the department inventory records up-to-date.
4. Managing the human resource within the department.
Database administrator (DBA)
The major purpose of computerising organisations or institutions is to store data in an
organised way for easy access, retrieval and update. The organization requires a person
who should be responsible for updating records in an information system database. For
this reason, a database administrator is responsible for:
1. Designing and developing database applications for the organization.
2. Setting up security measures needed to control access to data and information.
3. Keeping the database up-to-date by adding new records, modifying or deleting
unnecessary records.
Computer trainer
Due to the dynamic nature of computers and information technology, there is a high
demand for qualified ICT trainers. Some of the responsibilities of an ICT trainer are:
1. Training people on how to use a computer and various application programs.
2. Developing training reference materials.
3. Guide learners on how to acquire knowledge through carrying out research.
4. Advising the learners on the best career opportunities in the broad field of ICT.
5. Preparing learners for ICT examinations.
Web administrator/webmaster
Internet is one of the areas of information and communication technology that has drawn
the interest of most people. Thus people are able to exchange messages, search for
information and do business through the Internet.
Business organisations, educational institutions and individuals put information on the
Internet by developing websites. Most organisations hire the services of a web developer
who is given the role of the company's web administrator also referred to as a webmaster.
A web administrator is responsible for:
1. Developing and testing websites.
2. Maintaining, updating and modifying information on the web site to meet new
demands by the users.
3. Monitoring the access and use of internet connection by enforcing security measures.
4. Downloading information needed by an organization or institution from Internet
websites.
Page 44 of 87
Self employment can be achieved by using computers or other ICT devices such as
mobile phones to start bureau services, Internet services, consultancy services and
computer hardware and software vendor business.
Network administrator
A network administrator is a specialist whose responsibilities are to:
1. Set-up a computer network.
2. Maintain and enforce security measures on the network.
3. Monitor the use of network resources.
4. Maintain and troubleshoot network related problems.
Computer sales representatives
Computer sales representative should have good knowledge in information and
communication technology. This would helps them to analyse customer needs and advice
them accordingly. A good computer salesman needs to be self confident, persuasive and
proficient in business communication.
Further educational opportunities in ICT
Most computer related educational opportunities offered at post-secondary level are
relatively new and dynamic in nature compared to other disciplines. It is therefore
difficult for most institutions that offer ICT courses to update their ICT curricula in order
to accommodate these rapid changes. These changes also make it difficult for aspiring
ICT professionals to identify the best career opportunities and training institutions. ICT
courses are offered in the following tertiary institutions:
1. Universities
2. Polytechnics
3. Colleges
Universities
A university is considered as the highest institution in formal education. In most
countries, universities are categorised into two major groups’ namely public and private
universities.
Public universities
Public universities are established by the state through the award of a charter and are run
by a state appointed management team. However, current trends in educational
management point to the fact that even state universities should be allowed to operate in
an autonomous manner. Admission to such a university is controlled by either the state or
a recognised body. However, most universities in developed countries do their own
independent admissions.
Private universities
Private universities are self-sponsored institutions set up by individuals, churches or any
other organization. Such universities are privately run and students' enrolment depends
on whether the student is capable of sponsoring himself/herself. However, for these
universities to operate they must be registered or accredited by the commission of higher
education or any other quality assurance body that is recognised worldwide.
Accreditation leads to public acceptance and confirmation evidenced by the grant of
charters by the state or accrediting bodies.
Page 45 of 87
Universities are authorised to offer approved diploma, undergraduate and postgraduate
programmes. Some of the ICT related degree programs offered at university level courses
include Bachelor of Science in computer science, Bachelor of Information
Technology/Systems, Bachelor of Science in Computer Engineering etc.
Research institutions
Although for a long time universities have been considered as centers for research and
excellence, other specialised research institutions that concentrate on narrow fields of
study such as computer or ICT technology, agriculture and space science exist. There is a
lot of research being undertaken in the field of computing such as artificial intelligence. It
is possible to enroll in such institutions as a research trainee.
Polytechnics
These are institutions of higher learning that mostly offer diploma and certificate courses'
in technical fields such as ICT, mechanics, food production etc. A polytechnic may also
be accredited by a university or the state to offer degree programmes.
Some of the ICT courses offered at polytechnic level are diploma and certificate in
computer studies, computer repair and assembly, computer operator, management
information system etc.
Colleges
Just like the polytechnics, middle level colleges offer diploma, certificate and craft
courses in many disciplines such as technical, ICT, teacher training, business
management etc.
Most public and private colleges are now offering ICT related courses both at certificate
and diploma level.
The most important consideration to make before you join a college to pursue an ICT
course is:
1. Whether it offers ICT courses recognised both locally and internationally.
2. The cost of training with such an institution.
Page 46 of 87
techniques learnt in Form 3. We shall address each step that is required in developing a
working information system.
5.2 . Preamble
Due to your expertise and experience in system development, you have been hired to be
the head of Information Technology (IT) at Bukuma Limited, a company that runs a
supermarket. Your first task is to develop a computer based information system that
would ensure that:
1. Stock control and monitoring is efficient and effective.
2. Customers' orders are processed accurately within the shortest time possible and
invoices sent in time.
3. Purchase orders are processed accurately in time t~ avoid delays in items delivery.
4. Data entry screens or forms are easy to use hence eliminating data entry errors.
5. On-demand reports by the management are generated within the shortest time possible.
6. Communication between the branches is efficient.
7. Company data and information is secure from unauthorised users and only certain
company employees can access certain reports.
8. The overall operating cost is reduced by at least 40%.
By the end of this case study, we shall have demonstrated how to:
I. Carry out the initial study.
2. Carry out fact finding.
3. Define system hardware and software requirements.
4. Design a system using system and program flowcharts.
5. Construct a system that would allow:
(a) Inputting of data through forms.
(b) Updating, modification, deletion of existing data.
(c) Carrying out of input validation and integrity checks.
(d) Search or filter specific records, query and retrieve specific records.
(e) Generate various transaction reports.
(f) Set up database security, menus and other startup options.
6. A sample user manual has been provided to help the student identify some components
of a good user manual.
Identification and definition of the problem
The problem at hand is to develop a computer based transaction processing system (TPS)
that would capture and process data about business transactions. The system should also
do data maintenance i.e.
provide for ability to update stored data. Some features of this system include:
I. Input data collected from transactions products, orders etc.
2. Output in the form of invoices, pay vouchers etc.
3. The system is also supposed to produce a variety of reports that are to be used for
managerial purposes. Such reports include inventory levels, sales reports, payroll,
expenses etc.
Reports produced by the system can be classified according to purpose. These are:
I. Summary reports - Shows totals and trends such as total sales by category.
2. Track stock levels and automatically alert the purchases department when restocking is
necessary.
3. Produce monthly product sales and purchases reports.
Page 47 of 87
In a nutshell, the following project charter outlines the objectives, preliminary
investigation report and other pertinent issues that will be considered before embarking
on system development:
Page 48 of 87
5. Competition from other companies threatens the survival of the company unless there
is a change in management strategies.
6. Many orders are bouncing due to poor stock control. The orders that bounce are not
given priority when new stock arrives.
7. The management is not exploiting the Internet as a marketing and service delivery
channel.
Scope of the system
The proposed computerised system will support the following internal business functions:
1. Sales and customer order transaction processing.
2. Inventory control and procurement processing.
Team vision
The strategic information management team has come up with the following
recommendations for the new system.
1. Adoption of automated data capture technology and methods e.g. using bar-coding as a
means of capturing product stock records and sales, which is an automatic identification
system currently being implemented in many modem business organisations.
2. Triple the order processing capacity of the unit by the end of fiscal year.
3. Reduce order response time by 50% by the end of fiscal year.
4. Rethink any underlying business processes, procedures and policies that have any
visible impact on member satisfaction and complaints.
5. Provide improved marketing and promotion programs.
6. Provide improved follow-up mechanisms for orders and backorders.
Feasibility of the proposed system
The feasibility analysis of the proposed system centered on the following:
Feasibility report
1. Schedule: The system would take 9 months to develop.
2. The technology required to develop the new system is readily available in the market.
.
3. The system users are happy with the proposal to develop the new system.
Cost benefit analysis
(a) Costs: The entire development and operational costs can be estimated as
follows:
(i) Development - Kshs 20 000 000
(ii) Monthly operational costs - Kshs 1 000000
(iii) Total lifetime of the new system - 5 years
Total lifetime costs = 20 000 000 + (12 x 1 000 000) x 5
= Kshs 80 000 000
(b) Benefits:
(i) Profit from increased sales per month - Kshs 100 000 000 (ii) Savings from
introduction of paperless mail
Kshs 1 000 000
(iii) Savings from reduced travelling costs - Kshs 20000000
Total monthly benefits. Kshs 121 000000
Total lifetime benefits = Kshs (121 000000 x 12 x 5) = Kshs 7 260 000 000
Conclusion
Page 49 of 87
The development of the new system is cost effective and beneficial to the company
because lifetime benefits greatly outweigh the costs.
Team resolutions
In order to develop the system within the shortest time possible, the team made the
following resolutions:
1. The team will hold weekly status meetings, chaired by the project manager (system
analyst). All project status meetings minutes and reports will be shared with
management and all IT directors.
2. Team members will be communicating through e-mails, dialogue and written memos
to keep in touch on project development.
Conclusion
This report is intended to help the management to make decisions about undertaking the
project.
Although the system seems expensive it will contribute positively towards corporate
objectives when implemented in the future. Its benefits will outdo the costs by billions of
shillings throughout its operational lifetime.
Thanks.
Jane Okindia System analyst.
Fact finding
The management has responded and given the system development team an okay to start
developing the information system. The next task now is
to discover user requirements of the new system through collection of facts. The
members have been given the responsibility to carry out a detailed fact finding activity
through the following:
1. Documentations study.
2. Interviews.
3. Observation.
4. Questionnaires.
Documentions study
A number of manual documents were analysed. These include products catalogue,
invoices, purchase orders, sales reports etc.
Interviews
Various interviews were conducted which involved the management, employees in the
company, customers and suppliers. For each of the interviewee an interview guide was
used. Figure 5.1 shows a sample interview guide used with one of the staff at Bukuma
distributors.
Interviewee.name.' Interviewer
Date:.
Time: .
Subject.;
Page 50 of 87
Allocate Question or Response
d Objective
I to 2 Objective
min. Open the interview:
-introduce ourselves
.. Thank Mr.&&&for his valuable time
State the purpose of the interview- to
obtain an existing
credit..checking.policies.
5min Question. I
What conditions determine whether a
customer's order is approved for delivery?
Follow-up
5inin Question 2
What are the possible actions that might
be taken once
These conditions have been evaluated?
Follow-up'
3 min Question3
How are customers notified when stock is
unavailable
for their order?
Follow-1.Ip
Lmin Question 4
After a new order is received,
approximately how long
Does it take to process it and put the order
under shipment?
Question5
lmin
Who are the individuals that perform the
credit checks? Follow-up
1 -3min Question 6
May 1 please have permission to
interview all the people
who carry out credit checking?
Follow-up
If so When would be the best time to meet
with each of them?
1 min Objective
Conclude. The
interview:
Thank Mr. &&& for his cooperation and
Page 51 of 87
assure him that
He will be receiving. a copy of what
transpired during the
interview.
21 min Time allotted for base questions and
objectives
.9min Time allotted for. follow-up questions and
redirection
30min Total time allocated for interview
(2.00 p.m,to 3:00 p,m)
Fig,5.1: Sample interview guideline
Questionnaires
In our preliminary investigation of the business operations we decided to prepare some
que.stionnaires that would help us seek some classified information without the
respondent feeling threatened. Below is an extract of one of the questionnaires used.
Page 52 of 87
(b) Description analytical techniques used.
3. The current system (about 5 pages)
Models of the current system in terms of:
(a) Data entry techniques e.g. form.
(b) Files and data storage methods and media.
(c) Informatiol1processsingandmethods used.
4. Analysis Of the current system communication (about 5.10 pages)
(a) Performance, problems, causes and opportunities.
(b) Economic Problems, causes and opportunities
(c) Security and control problems, causes and opportunities
(d) Efficiency and service problems, causes and opportunities
5. Detailed recommendations (about 5-10 pages)
(a) Reason for the current system improvement.
(b) Limiting problems (recommendations).
(c) Proposed implementation plan for the new system:
(i) Scope and refinement.
(ii) Master plan.
(iii) Plan for the design phase.
6. Appendixes
(a) System models.
(b) Other appropriate documents.
Page 53 of 87
1. Output design.
2. Input design.
3. Files and data stores design.
4. Hardware and software requirements.
Output design
This design of both screen and printed output. The output requirements for Bukuma
distributors system include: Picking lists, invoices, payment vouchers, inventories, sales
reports. However in this design we shall only consider invoices, payment vouchers and
sales reports.
Invoices
The sample invoice below is one of the reports that the system is expected to produce
after delivery of goods to a customer. Notice that it is designed carefully to display all
details necessary to seal a transaction.
BUKUMADISTRIBUTORS LTD.
Industrial area, Funzi Road Box 30307, Nairobi Kenya
Phone:257-020655147 Fax: 02065551418
Invoice
Bill To:
Company name……………. Contact name …………….
Destination city……………….. Postal code Sent via………………
Date due………………… Country……………….
Order Customer Order date Required Date shipped
number name date
Subtotal
Freight cost
Total
Payment voucher
This is almost similar to an invoice only that it is used to authorise payments to the
suppliers.
BUKUMA DISTRIBUTORS Industrial area, Funzi Road Box 30307, Nairobi Kenya
Phone: 257-020655147 Fax: 02065551418
Voucher
Payment To:
Supplier name---------- Contact title------------
Postal address----- Region----------
City------------ Country-------
Sent via--------
Purchase ID Supplier Date ordered Date Date
name required received
Page 54 of 87
Subtotal
Freight cost
Total
Sales report
Sales report gives a summary of sales made with a period of time such as weekly,
monthly or annually. Below is a sample sales report design.
BUKUMA DISTRIBUTORS
Product sales for the year Category name
Order ID Customer name Product Amount
Total sales
All other output reports were designed as per system requirements collected during the
fact finding stage.
Input design
The quality of system input determines the quality of output. Well designed forms or
screens should be effective, easy to use, attractive and consistent. The forms for data
entry for Bukuma system should be clearly captioned and easy to use. Some
examples of data entry forms
needed for this system are invoice processing form, products entry form, : customer entry
form etc. Likewise all other entry forms should be appropriately designed according to
the requirements collected.
Inventory and products entry form
Categories entry form is a compound form that should allow the user to enter or view
both category and products in that category. This means that the products details should
be a sub form in the categories main form. Below is the lay out of the categories and
products entry sub form.
Category Details
Category ID ……………….
Category Name ……………..
Description…………………..
Products details subform
Product ID Product name Quantity per Price Unit in stock
unit
Page 55 of 87
Since the fields for the customers are too many for one columnar form, they can be
grouped into company information and personal information. The two categories will be
implemented using a tab control form.
Company info tab Personal info tab
Employee ID Address
Last Name City
First Name Country
Title Date of Birth
Hire Date Telephone
Invoice processing entry form
This form is intended to be a compound form used to enter customer details in the main
form and the items purchased in the products sub form.
Bill To:
Customer ID …………………
Order number…………………
Contact name………………..
Title …………………
Country………………
Destination name
Date ordered
Date required
Date dispatched
Freight cost
Product Unit price Quantity Discount Amount
name shipped
Page 56 of 87
Company Name Address City
Contact Name Region Postal Code
Contact Title Country Phone Fax
Contact tab
Transporter entry form
Entry form for companies offering transport services to Bukuma may have the following
controls:
Vehicle Number
Company Name
Postal Address
Phone
Files and data stores design
After designing the input and output, the last detailed design step is that of files or data
store. The files and data store are considered the heart of any information system.
There are two methods of data storage in a computer namely flat files and databases.
Flat files
In flat files, records are stored in separate files each with particular details. The use of
such separate files means that the same data is often stored in more than one place as
illustrated by the tables below.
File A
Product Product Name Quantity Price
Number
File B
Product Product Supplier ID Supplier
Number Name Name
Database systems
A database is a centrally controlled store of data. It allows different users who share the
database to have access to different data. This method of storage eliminates the validation
problems of the flat file system.
In Bukuma Distributors Information System, the database approach is used. This will
ensure that the following objectives are achieved:
1. Sharing of data among the users of the system.
2. Maintaining accurate and consistent data.
3. Availability of data required for current and future applications.
4. Giving users easy access to data.
Designing tables /tiles structures
The following points are considered before designing a file or a table structure:
1. The types of files to be constructed - is the file a master, transaction or report file?
2. Data access method in the file i.e. is it random, sequential or indexed sequential. .
3. The size of the files hence the storage media to be used.
Data structures allow the system analyst to produce a view of the elements that make up
the data structure. In our system, the basic data structure that will be used to store data
elements of the various entities is the record.
Page 57 of 87
The initial data structure design that shows only "what" the records will contain e.g.
Name, Address etc. is called the logical design. This design would then eventually be
converted to the physical design which specifies how the various data elements in the
record will be implemented such as
1 Many 1 Many
Fig. 5.3: Entity relationship diagram
Page 58 of 87
Interpretation
One customer may place several orders but each individual order can be placed by only
one customer (one-to-many relationship). Each order placed by customers may contain
many products. However, many products can be contained in one order.
. Hardware and software requirements
After studying the detailed system design specifications and recommendations, the
management of Bukuma decided to settle for a computer based system. This means that
the development team must start looking for all the required hardware and software
resources.
Hardware and software specialists in the team have already visited various suppliers in
major towns and brought quotations and price lists for most
Table 5.1
Hardware facility Example Estimated cost (Ksh)
1 Computer IBM desktop Documents
Computer collected from
2 Storage media Optical disks, various suppliers'
magnetic disks Quotations.
3 POS terminal Wand reader,
equipments magnetic card
reader, bar code
printer etc.
4 Printers Laser printer,
Matrix printer
5 Scanner
6 Others
of the required resources. Table 5.1 below gives a sample summary of the hardware
requirements recommendations for Bukuma Distributors information system.
Table 5.2 below gives a summary of the software requirements for Bukuma distributor’s
information system.
Table 5.2
Software Example initial cost
I GUI based MS- Windows 9x, 2000,
Operating System XP; Mac OS9, X etc.
2 Application MS-Office Suite, Lotus Documents
programs Suite, Corel Word collected from
perfect Suite various suppliers'
3 Antivirus software Norton, MacAfee, AVG. Quotations.
Constructing Bukuma information system
Since relational databases store data in a series of two-dimensional tables, the first step in
designing the information base is to design tables that are related to each other via
primary and foreign keys. Throughout this section the following shorthand’s will be
encountered:
1. PK - Primary key
2. FK- Foreign key
Customer Customer ID (PK), Customer name……….
Page 59 of 87
Sales order Sales ID (PK), Customer ID (FK), ......
Product Product ID (PK), Sales ID (FK), Inventory ID CFK) ......
Purchase order purchase ID (PK), Inventory ID (FK), Supplier ID (FK).......
Supplier Supplier ID (PK), Supplier name . . . . . .
Transporter Transporter ID (PK), Supplier ID(FK) ......
Inventory Inventory ID……….
When the table is displayed in data entry mode (datasheet fonn), you simply select from
the list as shown in Figure 5.6 below.
Referential integrity
Page 60 of 87
Referential integrity governs the nature of records in a one-to-many relationships
between tables in the database. All foreign keys in the child table must have a matching
record in the parent table. Referential integrity is implemented in the following ways:
1. Restricted database- The system deletes or updates a parent record if there are no
matching child records. A parent record is the one that has the primary key of the
relationship while a child record is the one that has the foreign key of the relationship in
the second table.
2. Cascaded database- Cascaded database will delete or update all matching child
records when the parent record is deleted or updated. The cascade approach is better
when changing records. For example if the customer ID changes, all foreign keys in
the child records are updated as well. Figure 5.8 shows how to set up referential
integrity between customer and orders table in Bukuma database.
Domain integrity
In databases, the term domain is used to refer to the acceptable range of values an
attribute can have. This ensures that no field takes on a value outside the range of valid
values. For example in the Purchase Orders table, the date of items received is always
less than or equal to the current date <=Now() as shown in the validation rule property
box in Figure 5.9. Now() is a function that returns the current date.
Fig. 5.9: Setting domain values
Page 61 of 87
The main factors to be considered in creating primary forms are:
1. The general form properties e.g. record source that is, the underlying table.
2. Control properties for each of the objects.
3. Command buttons and their underlying event procedures and codes.
Customers form
It was designed as a columnar form as shown in Figure 5.10.
MsgBox Err.Description
End Sub
Private Sub deleterecord – Click()
Exit Sub
Page 62 of 87
MsgBox Err.Description
End Sub
Private Sub addcustomer – Click()
DoCmd.GoToRecord" acNewRec
Exit Sub
MsgBox Err.Description
Resume Exit addcustomer Click
End Sub
Private Sub SearchRecord - ClickO
Screen.PreviousControl.SetFocus
DoCmd.DoMenultem acFormBar, acEditMenu, 10,, acMenu Ver70
Exit Sub
MsgBox Err.Description
End Sub
Categories form
The categories table has many products. Hence, the fonn has the products list subfonn
which shows the items in each category as shown in Figure 5.11.
Page 63 of 87
The main form is a columnar form. It is populated with data from the categories table. It
has command buttons New Category, Search, close and Delete. In this case, the
categories are the same as the inventory ID.
The subform is a data sheet form embedded in the categories form. It gets its data from
the products table.
Products form
This is a single columnar form as shown in Figure 5.12.
Page 64 of 87
The form is populated with data from the transporter table. The four command buttons
are Add New, Delete and Close.
Creating advanced forms
As stated earlier, these are the forms which draw data from underlying queries. This
section not only analyses the form properties but also gives illustrations of the underlying
queries in design view and any event procedure used to automate the forms and controls.
The advanced forms are further classified into groups namely:
1. Data entry and manipulation forms.
2. User interface forms.
Forms for data entry and manipulation
These are the forms used for entering and manipulating data in the underlying query.
These forms include the customers invoice and suppliers' pay voucher.
Customers invoice data entry form
This is a compound form that has the purchase orders subform contained within it as
shown in Figure 5.15.
Page 65 of 87
, inform the user and cancel the entry made in the subform.
If DataErr > 0 Then
If IsNull(Me.Parent!CustomerID) Then
MsgBox "Select a Customer to bill to before entering order details info. "
RunCommand acCmdUndo
Me.Parent!CustomerID.SetFocus
Response = acDataErrContinue
Else
Response = acDataErrDisplay
End If
End If
End Sub
The ProductID in the subform is a lookup control that enables the user to select an item
from the dropdown list. This control also has an event procedure used to automatically
fill the UnitPrice control from the products table once an item is selected. This minimises
errors that may result from erroneous unit price entry. The code listing for the UnitPrice
lookup event procedure as shown below.
Private Sub ProductID – AfterUpdate()
On Error GoTo Err _ProductID - AfterUpdate
Dim strFilter As String
, Evaluate filter before it's passed to DLookup function.
strFilter = "ProductID = "& Me!ProductID
, Look up product's unit price and assign it to UnitPrice control.
Me!UnitPrice = DLookup("UnitPrice", "Products", strFilter)
Exit _ProductID - AfterUpdate:
Exit Sub
Err _ProductID - AfterUpdate:
MsgBox Err.Description
Resume Exit _ProductID - AfterUpdate
End Sub
Command buttons that have been used include Print Preview invoices, Print and Close.
Their underlying event procedures are similar to those generated in the other forms
discussed earlier.
Suppliers voucher details entry form
This is almost similar in functionality to the customers' invoices entry form but it is
intended to process payment vouchers for goods supplied to Bukuma. Figure 5.18 shows
the voucher processing form.
Page 66 of 87
supplier details are automatically filled by selecting the supplier name from the lookup
combo box of the Supplier control. Figure 5.19 shows the source query in design view.
Page 67 of 87
Response = acDataErrContinue
Else
Response = acDataErrDisplay
EndIf
EndIf
End Sub
The command buttons used to control the form are New Voucher, Print Voucher, and
Close.
User-interface forms
These are forms that enable the user to access, manipulate, display and print other forms
and reports. Two such forms used in Bukuma System are sales report dialog and the
main switchboard.
Sales report dialog form
As shown in Figure 5.21 this form is mainly designed using unbound controls such as
radio buttons, a text box and command buttons.
The three groups of controls are tied together using the code listing shown below.
Page 68 of 87
Err_Preview _Click:
Resume Exit_Preview _Click End Sub Private Sub Cancel- Click() ,
This code created by Command Button Wizard.
On Error Go To Err Cancel Click
, Close form.
DoCmd. Close
Exit Cancel Click:
Exit Sub
Err Cancel Click:
MsgBox Err.Description
Resume Exit - Cancel_Click
End Sub
Private Sub Preview – Click()
, Preview selected report. This procedure uses the PrintReports
, Sub procedure defined in (General) section of this module.
PrintReports acPreview
End Sub
Private Sub Print – Click()
, Print selected report. This procedure uses the PrintReports
, Sub procedure defined in (General) section of this module.
PrintReports acNormal
End Sub
Private Sub ReportToPrint – AfterUpdate()
, Enable SelectCategory combo box if user selected Sales by Category
, report.
Const conSalesByCategory = 4
If MefReportToPrint. Value = conSalesByCategory Then
MefSelectCategory.Enabled = True
Else
MefSelectCategory.Enabled = False
End If
End Sub
Main form (Switchboard)
The main form also referred to as the switchboard is the user-interface or main menu that
is loaded when an application is started. The form mainly contains command buttons that
enables the user to select the task to work on. Figure 5.22 shows the main form in design
view used in Bukuma information system.
Page 69 of 87
Fig. 5.22: Switchboard in design view
Creating reports
Reports present information to system users. These are the most visible components of a
working system.
This section focuses on some of the reports expected from Bukuma information system.
The main features to be highlighted in creation of reports are:
1. General report properties and data source.
2. Control properties, grouping and event procedures.
3. The report in design view.
4. Layout of report needed.
Sales by category
This is a comprehensive report that gives sales details for each product in each category
group shown in Figure 5.23.
Page 70 of 87
Fig. 5.26: Category sales query design
Summary sales by date
On opening this report, the user is prompted to enter the beginning and ending date. Once
the valid dates are entered, the sales for the duration are displayed as shown in Figure
Invoice to customers
This is a report sent to the customer showing detailed description of what is to be paid
for, the total payment and the due date. Figure 5.30 shows a sample invoice to one of the
customer’s ofBukuma Distributors.
Page 71 of 87
The report draws its data from invoice to customers query. Figure 5.31 shows the source
query in design view.
Subtotal: = Sum([amount])
Total:= sum([amount])+ [freight]
Payment voucher
This is similar in design to the invoice, only that it is meant for the processing of
payments for the suppliers of Bukuma Distributors. Figure 5.32 shows a sample pay
voucher report to one of the suppliers.
Page 72 of 87
To set up any of these security options, click the Tools menu, point to security and then
select the type of security you want to setup.
Password protection
This is the simplest security set-up that can be implemented using any Microsoft
Windows operating system. A password to open or edit the database file is set for any
user who wishes to do this action.
User and group permissions
Some operating systems like Windows New Technology (NT) lets an administrator
assign permission to users on database objects such as queries, forms and reports. These
permissions include opening and running the object, modifying etc.
The user and group accounts dialog box is used to assign accounts to the database users.
However, this can only be done by a user who is a member of the Administrators group.
User-level security
This feature is used to assign permissions to users in order to limit user access to certain
database objects. For example, the order entry clerk may not have access to payroll
information. Figure 5.34 shows the log on dialog box used to log into Bukuma
information system.
Page 73 of 87
2. Staff training - This is done without interfering with the business operations.
3. Security control and contingency planning incase the system breaks down
4. Changing over from the old system to the new system using the most appropriate
method.
Once the system has been installed and is running, the programming team must ensure
that it is working as expected through a follow up evaluation. The evaluation report for
Bukuma information system shows that apart from a few minor issues concerning the
screen forms, the following issues have been addressed:
1. Out of stock problems have been addressed satisfactorily.
2. Stock transfer between warehouses is running smoothly.
3. Store managers, accounts clerks and order processing managers feel that they are in
full control of the system.
The programming team has promised to address the minor emergent problems
encountered during the system maintenance phase.
Page 74 of 87
You activate a submenu by clicking on its button. Figure 5.38 shows the
customers submenu.
Page 75 of 87
value because the required property in the field is set to true. Description:You are trying
to proceed to another record or field yet you have not selected the product name of the
record in focus.
Solution: Select the product before proceeding to the next record. Error message: The
value you entered isn't valid for this field. Description: You are trying to enter an invalid
data type in the field. For example, you are entering text in a numeric field or an invalid
date such as 46/34/2005
Solution: Enter the correct data type.
Error message: Select a customer to bill to before entering order details info.
Description: You are trying to enter order details before selecting a customer.
Solution: Select or enter the customer before entering order or invoice details.
Incase you may experience other data entry related problems, please consult the system
administrator.
Project appendix
Below is a sample appendix of the project report.
Test data used in Bukumu information system
Although a variety of test data was used to test each operation of our system, we have
given only two test data tables to emphasize the need to provide test data in system
development. In real situation, you are expected to provide as many test data as possible
to prove the functionality of your system.
Inventory table
Table 5.3
Inventory Inventory Name Description
1 Beverages Soda
3 Washing Powders For Washing
4 Maize Flour For Ugali
5 Daily Products Milk, butte r, etc.
Order details query results
Table 5.4
Bibliography
Below is a sample bibliography of the project report.
The bibliography shows a list of books and reference materials used in
developing Bukuma information system.
1. Sarah E.H, Glen J. c.: Microsoft Access 2000 Complete Edition, McGraw-Hill, 2000.
2. Kendal E.K, Kendal J.E: System Analysis and Design, 5th Ed, Prentice-Hall (Now
Pearson Education inc), 2002.
3. Taylor G.: GCSE Computer Studies, Macmillan Press Limited, 1991.
4. Jeffrey L. W etel: System Analysis and Design Methods, McGraw Hill, 2000
5. Williams BK: Using Information Technology: A practical introduction to computers
and communications, IRWIN, 1995,
6. Saleemi N.A.: Systems Theory and Management Information systems, N.A. Saleemi
Publishers, 1997 & 2000,
7. Gareth W: Student Handbook. ICT, Pearsons Publishing, 2000.
8. Microsoft Access 2000: Northwind sample database, 1999.
Page 76 of 87
DEVELOPING A PROJECT USING VISUAL BASIC
PROGRAMMING LANGUAGE
Chapter outline
6.1 Introduction
6.2 Preamble
6.3 Problem recognition and definition
6.4 Developing algorithms
6.5 Developing the system in Visual Basic
Introduction
In this chapter, we shall undertake a case study entitled A school canteen management
system. The objective of this case study is to help the students to apply the programming
techniques learnt in Form 3
Preamble
A school canteen operator sells confectionaries and toiletries to the students. The canteen
operator requests you to develop a canteen management system that will accomplish the
following:
1. Allow storage of stock records in a file.
2. Enable searching of a file to retrieve a particular record for editing and adding new
stock.
3. Process sales transactions and calculate the total bill and change due to a customer.
4. Generate daily sales report showing all the items sold for a particular day.
Problem recognition and definition
A careful analysis of the above scenario reveals that the system will need the following
tasks:
1. Entering stock records and storing them in a file.
2. Searching for the stock file to retrieve records.
3. Processing of daily transactions.
4. Recording of any sale transactions in a transaction file.
5. Generating sales reports for a specified date.
Developing algorithms
Before coding, the programmer needs to develop algorithms for each task. These
algorithms will enable the programmer to develop the code for each of the processes.
Algorithm for entering new stock records
The new stock module should enable the user of the system to continually enter new
stock records in the file until he/she is through with the process. Therefore, the computer
should request the user to key in records until the last item is entered. The following
pseudocode extract can be used to represent the algorithm:
Output "Enter a new item?" Enter "yes" or "no"
Input reply
Page 77 of 87
While Reply <> No
Output "Enter stock item details"
Write to stock file
Output "Are you through with entering the records Yes/No"
Input Reply
loop
End While
Algorithm for searching for a record
This process will enable the user to access the records in a stock file and retrieve a
particular record. The record search can be done as per the identification number of each
record i.e. record ID. The search algorithm can be represented as follows:
Begin
Enter the code of the record
Open stock file for reading
While Not end of file Begin
If code entered = record itemcode Then
Output record details
Else
Output 'Record not found'
End if loop End while Close file End
Algorithm for processing sales
Sales processing requires that the stock file be opened in order to read details of the items
bought. The sales module then calculates the amount of the sale and the change owed to
the customer. The module should also update the quantity of the items in stock. The
following algorithm will be used:
Begin
Retrieve item from stock file by record ID
Specify quantity to be sold
Compute bill and customer change
Save transaction in sales file
END
Saving a sales transaction
After selling an item, the sales details must be stored in the system for future reference. In
our case, the current transaction has to be stored in a file which we shall refer to as a sales
file.
Constructing the system in Visual Basic
Open Visual Basic and create a new project called Canteen.vbp. Create five forms in the
project window i.e. Form1, Form2….Form5. To create a form, simply Click Project then
Add Form command. Save the forms with the following names:
Page 78 of 87
Form Name
Form I UserInterface
Form2 AddNewStock
Form3 SellItem
Form4 SearchItem
Form5 SalesReport
Remember while saving that all Visual Basic forms have the extension .frm. After saving,
change the Name property for each form in the properties window to start withfrm e.g.
frmCanteenManagementSystem for Form 1. Change the captions for each form as you
proceed through the project. At the end of this activity, the forms in your project should
look as shown in Figure 6.1 in the Project Explorer window.
NB: Simply click the Project explorer icon to view this window. Alternatively, click View project
Explorer on the menu.
It is now time to start placing objects on the forms and entering the code associated to
each of the objects.
Creating the user-interface form
1. Double click UserInterface.frm in the project explorer window and design it as shown
in Figure 6.2.
NB: Change both the Name and caption properties of the command buttons as shown
below:
Page 79 of 87
1. Click the File menu then command Exit. Notice that the code window for the Exit
command opens on the screen. Type the word "End" in the body of the event procedure
as shown below:
Private Sub mnuExit – click()
End
End Sub
This means that when the Exit command is clicked, the program will stop executing.
Save and close this code window.
2. Double click the "Add New Stock Record" button and add the code below in the body
of the event procedure as shown:
Private Sub cmdAddNewStock- Click()
Load frmAddNewStock
frmAddNewStock Show
End Sub
This code loads frmAddNewStock form and display it on the screen when the user
clicks Add New Stock record command button.
3. Double click the "Sell Item" button and add the following code in the body of the event
procedure as shown:
Private Sub cmdSellltem – Click()
Load frmSellltem
frmSellltem.Show
End Sub
4. Double click the "Generate Sales Report" button and add the following code in the
body of the event procedure as shown:
Private Sub cmdGenerateReport – Click()
Load frmDailySaleReport
frmDailySalesReport.Show
End Sub
5. Double click the "End Program" button and add the following code in the body of the
event procedure as shown:
Private Sub cmdEnd – Click()
End
End Sub
Designing and adding code to the" Add New Stock to File" form
Design your AddNewStock form to look like Figure 6.4 below:
6. Double click the "Click Here to Add New Stock Item" button and add the following
code in the code window that appears. Ignore the line numbers.
1 Private Type Item
2 ID As Integer
3 ItemName As String * 20
4 Q As Integer
5 CostPrice As Integer
6 SellPrice As Integer
7 End Type
Page 80 of 87
8 Private Sub cmdAddStock- ClickO
9 Dim ItemRecord As Item
10 Dim Old File As String
11 Dim Count As Integer
12 Dim Number As Integer, Reply As String
13 'CommonDialog 1. CancelError = True
14 'CommonDialog1.Filter = ''Data file (*.dat)l*.dat"
15 'CommonDialog 1.ShowOpen
16 'Old File = CommonDialog1.FileName
17 Open "c:\Program FilesIMicrosoft Visual
Studio I VB98 \ Old File. dat" For Random As #1 Len = Len (ItemRecord)
18 Reply = "No"
19 Do While Reply <> "Yes"
20 ItemRecord.ID = InputBox("Enter Record ID If”,"ItemRecord.ID '')
21 ItemRecord.ItemName = InputBox("Enter Record Name","ItemRecord.Name '')
22 ItemRecord.Q = InputBox("Enter Quantity","ItemRecord. Q'')
23 ItemRecord.CostPrice = InputBox("Enter the Cost Price","ItemRecord. CostPrice'')
24ItemRecord.SellPrice = InputBox("Enter the Selling Price","ItemRecord.SellPrice '')
25 Put # 1, , ItemRecord
26 Reply = InputBox("Are you through with record entry? Yes/ No", "Reply")
27 Loop
28 Close #1
29 EndSub
Explanations
Line 1: Declares a user defined data type called Item. The data type is a record.
Lines 2 - 6: Declares the fields in the record.
Line 7: Ends the type declaration.
Line 8: Declares an event procedure or subroutine which is executed on clicking a button
called AddNewStockltem. You double click this button in order to get the code window.
Lines 9 - 12: Variable declarations.
Lines 13 -16: Notice that they are commented off, hence the computer will not execute
them. However, if they are not commented, they would display the Open dialog box
when the button is clicked
Line 17: It opens a file called OldFile.dat stored on the disk. This is the file in which all
stock records are kept. Notice that the full path to the file has to be specified. This
eliminates the need for an Open dialog box. The whole statement should be on the same
line.
Lines 18 - 19: It sets a looping condition that will stop only when the variable Reply has a
value of "Yes". Each numbered statement should be on the same line.
Lines 20 - 24: Displays an input box on the screen which requests the user to input the
various data elements of the record such as the ID, Name etc. Note the syntax of display a
standard input box.
Line 25: It outputs a record to the file. The blank (, ,) ensures that the next record is
written after the last Put operation. However if you want the record to be written to a
Page 81 of 87
particular position in the file, then you can specify e.g. Put # 1 ,1, ItemRecord, which
means write the record at position 1 in the file.
Line 27: It encloses all the code that will be repeatedly executed in the loop.
Line 28: Closes the file after writing to it.
Line 29: Ends the event procedure.
7. Double click the "Click Here to Update Existing Record" button and add the following
code:
Private Sub cmdUpdateRecord – Click()
Load frm UpdateRecordDetails
frm UpdateRecordDetails, Show
End Sub
Save the code and exit from the code window.
Designing and adding code to sell Item form
In the Project Explorer window, double click frmSellItem and design it as shown in
Figure 6.5. Remember that this form is loaded by
CostPrice As Integer
SellPrice As Integer
End Type
Private Sub mnuOpen – Cliek()
Dim ItemReeord As Item, Quantity As String, Last As Integer
Dim Target As Integer, Current As Integer, First As Integer
CommonDialog 1. CaneelError = True
CommonDialog1.Filter = "Datafile (*.dat)/*.dat"
CommonDialog 1.ShowOpen
Old File = CommonDialog 1.FileName
Open "c: \Program Files \Microsoft Visual Studio \ VB98 \ Old File. dat"
For Random As #1 Len = Len(ItemRecord)
First = 1
Page 82 of 87
Target = InputBox("Please Enter ItemID of Item to be sold", "Target”
Quantity = InputBox("How many units are you selling", "Quantity”)
Last = LOF(1)/ Len (ItemRecord)
Do While First < = Last
Get #1, First, ItemRecord
Current = ItemRecord.ItemID
If (Current = Target) Then
txtItemID. Text = ItemRecord.ItemID
txtItemName. Text = ItemRecord.ItemName
txtUnitPrice. Text = ItemRecord.SellPriee
txtQuantitySold. Text = Quantity
txtQuantityInStoek. Text = ItemRecord. Q - Quantity
ItemRecord. Q = Int(txtQuantityInStoek.Text)
End If
First = First + 1
Loop
Close #1
End Sub
Explanation
This code enables the user to open a file on the disk called OldFile.dat by selecting it in
the open dialog box. The use can then select a particular record from the file by entering
its identification number (ID).
To sell another item after the first, you need to search for it in the file again. You can add
the "Sell Next" button on the form having the same code as the one for the mnuOpen
command.
Add the following code to the mnuSave _Transaction command that enables the user to
save the details in the transaction file called SaleFile.dat
Private Type ItemSold
ItemID As Integer ItemName As String * 20
QSold As Integer
Sell Price As Integer DateSold As String * 9
Sale Value As Integer
End Type
Private Sub mnuSave - Transaction – Click()
Dim Sale As ItemSold
Dim First As Integer, Last As Integer
Open "c:\Program FilesIMicrosoft Visual
Studio \VB98 \SalesFile. dat" For Random As #2 Len = Len(Sale)
Last = LOF(2) / Len (Sale)
RecordNumber = Last + 1
Sale.ItemID = Int(txtItemID. Text)
Sale.ItemName = txtItemName. Text
Sale. QSold = Int(txtQuantitySold. Text)
Sale.SellPrice = Int(txtUnitPrice. Text)
Sale.DateSold = txtTodaysDate. Text
Sale. Sale Value = Val(txtBill. Text)
Page 83 of 87
Put #2, RecordNumber, Sale
Close #2
End Sub
Double click the compute totals button and then add the code listing below in its event
procedure.
Private Sub cmdComputeTotals – Click()
Dim Cashgiven As Integer, ItemRecord As Item
txtBill. Text = txtQuantitySold * txtUnitPrice. Text
Cashgiven = InputBox("How much money has the customer given", "Cashgiven'')
IblChange. Caption = Cashgiven - txtBill. Text
Open "c: \Program FilesIMicrosoft Visual
Studio\VB98\0IdFile.dat"
For Random As #1 Len = Len(ItemRecord)
ItemRecord.Q = Int(txtQuantityInStock.Text)
Close #1
End Sub
Finally double click the "Cancel" button and then add the code listing below in its click
event procedure
Private Sub cmdCancel- Click()
Unload frmSellItem
End Sub
Designing and adding code to controls on Search Item form
This form lets the user add or edit the fields of an existing record in the stock file. For
example, when you buy some more items, you enter the item quantity in the quantity
control. Design the form as shown in Figure 6.6.
Page 84 of 87
Get #1, First, ItemRecord
Current = ItemRecord.1temID
If (Current = Target) Then
Label3.Caption = "Search successful: Now edit details and Click Save"
txtName. Text = ItemRecord.1temName
txtQuantity. Text = ItemRecord.Q
txtCostPrice. Text = ItemRecord.Cost Price
txtSellingPrice. Text = ItemRecord.SellPrice
Stock Value = txtCostPrice. Text * txtQuantity.Text
IblStockValue. Caption = Stock Value 'display total value of item in stock"
End if
First=First+1
Loop
Close #1
End Sub
Explanation
The code searches for a record whose ID is typed in the Record ID text box. After editing
the retrieved record, the changes can be saved by clicking the "Save" button. Below is the
code for save button:
Private Sub cmdSave – Click()
Dim ItemRecord As Item, Stock Value As String
Open "c: \Program FilesIMicrosoft Visual Studio \ VB98\OldFile.dat"
For Random As #1 Len = Len(ltemRecord)
Target = Int(txtRecordID.Text)
First = 1 'first record in file is at position 1
Last = LOF(1) / Len (ItemRecord) 'length of file equals record length
Do While First <= Last
Get #1, First, ItemRecord 'get the record that was edited
Current = ItemRecord.ID
If (Target = Current) Then 'search whole file for correct record
ItemRecord.ID = Int(txtRecordID. Text)
ItemRecord.ItemName = txtName. Text
ItemRecord. Q = Int(txtQuantity. Text)
ItemRecord. Cost Price = Int(txtCostPrice. Text) 'save fields as record
ItemRecord.SellPrice = Int(txtSellingPrice. Text)
Put #1, First, ItemRecord
Stock Value = txtCostPrice. Text * txtQuantity. Text
IblStockValue. Caption = Stock Value
End If
First = First + 1
Loop
Close #1
End Sub
Explanation
Page 85 of 87
The code takes the contents in the text boxes of the form and saves them as a record in
the file. Code for the cancel button is
Private Sub cmdCancel- Click()
Unload frmUpdateRecordDetails
End Sub
Designing and adding code to controls on Sales Report form
This form is used for displaying the daily transactions when the user specifies a particular
date in the fomart mm/dd/yyyy. Design the report interface as shown in Figure 6.7.
Page 86 of 87
Before doing anything else, we need to create two files on drive C and enter all the
records for the stock available. This program accesses the files in a folder called VB98
through the path:
c: \Program Files \Microsoft Visual Studio \ VB98
Open Microsoft Windows Notepad and save two blank files in the folder
VB98 having the names: OldFile.dat and SalesFile.dat
1. Click the “Add New StockRecord” button and add the following records to the file that
will hold all stock. This should be the OldFile.dat that you created on drive C. Enter the
following records:
ID Name Quantity Cost Price Selling Price
100 Bread 120 25 30
200 Milk 50 20 40
300 Jelly 200 40 50
400 Cake 300 15 30
500 Biscuit 1000 10 20
Figures 6.9 (a) to (f) shows sample input boxes for an item for sale. After entering all the
records, type Yes in the input box (f) to stop this process.
Page 87 of 87