0% found this document useful (0 votes)
11 views

MIS Report

The document discusses two topics: foundations of business intelligence including databases and information management, and telecommunications, the internet, and wireless technology. It provides an overview of these topics, including discussing database design, data modeling, data warehousing, and more. It also explores the history and evolution of communication technologies and their impact.

Uploaded by

Hassaan Gull
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

MIS Report

The document discusses two topics: foundations of business intelligence including databases and information management, and telecommunications, the internet, and wireless technology. It provides an overview of these topics, including discussing database design, data modeling, data warehousing, and more. It also explores the history and evolution of communication technologies and their impact.

Uploaded by

Hassaan Gull
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Marketing Information System

REPORT
Topic:
 Foundations of Business Intelligence: Databases and Information
Management
 Telecommunications, the Internet, and Wireless Technology

Submitted by:
 Hassaan Gull 2019-CS-01

Submitted to:
Sir Bilal Khan

BS Computer Science 2019

ACKNOWLEDGEMENTS
On completion of this dissertation, I would like to express my
appreciation to my advisor, Sir Bilal Khan, for his outstanding assistance
and support throughout this whole semester. I would also like to thank
my group members for all the support and work they have done to
complete this. Finally, I want to thank my family members. Only they
continuously gave me support during my most difficult days. Without
their support and encouragement, my accomplishment would not be
possible.

ii
ABSTRACT
Foundations of Business Intelligence: Databases and Information
Management teaches the fundamentals of database design, data
modeling, data warehousing, data mining, and data visualization, all of
which are crucial for success in the field of business intelligence.
Telecommunications, the Internet, and Wireless Technology explores the
history and evolution of communication technologies, including the
internet and wireless systems. Students learn about protocols, security
issues, and the impact of these technologies on society and business,
including legal and ethical concerns. The course provides a
comprehensive understanding of modern communication systems and
their influence on our world.

iii
1. Foundations of Business Intelligence: Databases and
Information Management

1.1 Organizing Data in a Traditional File Environment

An effective information system provides users with accurate, timely,


and relevant information. Accurate information is free of errors.
Information is timely when it is available to decision makers when it is
needed. Information is relevant when it is useful and appropriate for the
types of work and decisions that require it. You might be surprised to
learn that many businesses don’t have timely, accurate, or relevant
information because the data in their information systems have been
poorly organized and maintained. That’s why data management is so
essential. To understand the problem, let’s look at how information
systems arrange data in computer files and traditional methods of file
management.

1.1.1 Problems with the Traditional File Environment


The traditional file environment, where data is stored in individual files
on local or networked storage devices, can have several problems,
including:
Data redundancy: In a file-based system, data may be duplicated in
multiple files, leading to data redundancy, which can waste storage
space and cause data inconsistency issues.
Data inconsistency: If multiple users access the same file
simultaneously, it can lead to data inconsistency. For example, one user
may update the file while another user is still using an old version of the
same file.

iv
Limited data sharing: Sharing data across applications can be
challenging in a file-based system, as each application has its own set of
files, and sharing data between them requires a significant amount of
effort.
Security issues: In a file-based system, it can be challenging to manage
security, as each file may have its own set of permissions, and it can be
difficult to ensure that sensitive data is appropriately protected.
Limited scalability: As the amount of data grows, it can become
challenging to manage it in a file-based system. It can be difficult to add
new files, manage file organization, and ensure that data is accessible
when it is needed.
These problems can be overcome by using a modern database
management system (DBMS), which provides a more organized and
secure way to manage data. A DBMS offers a central repository for data,
enabling easier data sharing and more robust security controls.

1.2 The Database Approach to Data Management


Database technology cuts through many of the problems of traditional
file organization. A more rigorous definition of a database is a
collection of data organized to serve many applications efficiently by
centralizing the data and controlling redundant data. Rather than storing
data in separate files for each application, data are stored to appear to
users as being stored in only one location. A single database services
multiple application. For example, instead of a corporation storing
employee data in separate information systems and separate files for
personnel, payroll, and benefits, the corporation could create a single
common human resources database.

v
1.2.1 Relational DBMS
A Relational Database Management System (RDBMS) is a type of
database management system that organizes data into one or more tables
or relations. In an RDBMS, data is stored in a structured manner, and
relationships between different tables can be defined to establish logical
connections between them.
The most used language for managing data in an RDBMS is SQL
(Structured Query Language). SQL provides a standardized syntax for
creating, updating, and querying data in a relational database. An
RDBMS also provides mechanisms for managing data consistency,
ensuring data integrity, and enforcing data security.
Some of the benefits of using an RDBMS include:
 Data consistency: Data in an RDBMS is typically well-organized
and follows a predefined structure, making it easier to ensure data
consistency and accuracy.
 Scalability: An RDBMS can handle large amounts of data, and it
can scale to accommodate growing data needs.
 Data security: An RDBMS provides robust security mechanisms
for controlling access to data and ensuring data privacy.
 Data sharing: Data in an RDBMS can be easily shared across
multiple applications and users, making it a valuable resource for
collaborative work.
 Querying: The structured nature of data in an RDBMS makes it
easier to query and analyze data using SQL, which provides a
powerful and flexible means of working with data.
Examples of popular RDBMS systems include Oracle, Microsoft SQL
Server, MySQL, and PostgreSQL.

vi
1.2.2 OOP DBMS
An Object-Oriented Database Management System (OOPDBMS) is a
type of database management system that is based on the principles of
object-oriented programming. In an OOPDBMS, data is represented in
the form of objects, which are instances of classes or templates that
define the structure and behavior of the data.
In OOPDBMS, data is organized into object classes, which define the
attributes and methods of the objects that can be created from them. The
objects themselves are instances of these classes, and they can be
manipulated through their methods.
Some of the benefits of using an OOPDBMS include:
 Improved data modeling: Object-oriented programming principles
can provide a more natural way to model data, as objects map
closely to real-world entities.
 Data consistency: An OODPBMS provides a way to enforce data
consistency, as objects are created from classes that define their
structure and behavior.
 Data sharing: Objects in an OOPDBMS can be shared across
multiple applications and users, making it a valuable resource for
collaborative work.
 Flexibility: An OOPDBMS provides a high degree of flexibility, as
objects can be created and modified dynamically, without the need
to change the underlying data schema.
 Performance: An OOPDBMS can provide improved performance
for complex data structures and relationships, as queries can be
optimized for object traversal.

vii
Examples of OOPDBMS include Object Store, Objectivity/DB,
Gemstone, and db4o. However, OOPDBMS has not gained widespread
popularity due to its complexity and high implementation costs.

1.3 Using Databases to Improve Business Performance and


Decision Making
Businesses use their databases to keep track of basic transactions, such
as paying suppliers, processing orders, keeping track of customers, and
paying employees. But they also need databases to provide information
that will help the company run the business more efficiently, and help
managers and employees make better decisions. If a company wants to
know which product is the most popular or who is its most profitable
customer, the answer lies in the data.
For example, by analyzing data from customer credit card purchases,
Louise’s Trattoria, a Los Angeles restaurant chain, learned that quality
was more important than price for most of its customers, who were
college educated and liked fine wine. Acting on this information, the
chain introduced vegetarian dishes, more seafood selections, and more
expensive wines, raising sales by more than 10 percent.
In a large company, with large databases or large systems for separate
functions, such as manufacturing, sales, and accounting, special
capabilities and tools are required for analyzing vast quantities of data
and for accessing data from multiple systems. These capabilities include
data warehousing, data mining, and tools for accessing internal
databases through the Web.

1.3.1 Data Warehouse


A data warehouse is a large, centralized repository of data that is
designed to support business intelligence (BI) activities such as

viii
reporting, data analysis, and data mining. Data warehouses are used to
store and manage large amounts of data from multiple sources, such as
transactional databases, external data sources, and legacy systems.
A data warehouse is typically designed to be optimized for querying and
analysis rather than transaction processing. It may employ different
techniques to improve performance, such as indexing, partitioning, and
data aggregation. The data in a data warehouse is organized in a way that
is optimized for querying and analysis, typically using a star or
snowflake schema.
Data warehouses are used to support a wide range of business
intelligence activities, including:
 Reporting: Data warehouses can be used to generate standard and
ad-hoc reports, such as financial statements, sales reports, and
customer profiles.
 Data analysis: Data warehouses can be used to perform complex
data analysis, such as trend analysis, forecasting, and
segmentation.
 Data mining: Data warehouses can be used to discover patterns and
relationships in large datasets, which can be used for predictive
modeling and decision making.
 Business performance management: Data warehouses can be used
to support performance management activities, such as budgeting,
forecasting, and score carding.

Data warehouses can be implemented using different technologies, such


as SQL-based relational databases, columnar databases, and NoSQL
databases. They can be deployed on-premises or in the cloud, and they
can be integrated with other BI tools such as reporting and analytics
software.

ix
1.4 Managing Data Resources
Setting up a database is only a start. To make sure that the data for your
business remains accurate, reliable, and readily available to those who
need it, your business will need special policies and procedures for data
management.
Managing data resources involves a set of activities aimed at ensuring
that data is properly collected, stored, processed, and used in an
organization. Here are some key steps to effectively manage data
resources:
Develop a data strategy: Define your organization's data goals and
objectives and establish a data management strategy that aligns with
these goals. This will help ensure that data resources are being used
effectively to support business needs.
Establish data governance: Implement policies and procedures that
govern how data is collected, stored, processed, and used in your
organization. This includes defining data quality standards, data security
protocols, and data retention policies.
Create a data inventory: Identify all the data resources available within
your organization, including data sources, data types, data storage
locations, and data access points. This will help you get a better
understanding of your data landscape and how data is being used.

Ensure data quality: Implement processes and tools to ensure that data is
accurate, complete, and consistent. This includes data validation checks,
data cleansing, and data normalization.
Implement data security measures: Protect data resources from
unauthorized access, theft, and corruption. This includes implementing
access controls, encrypting sensitive data, and monitoring data usage.

x
Establish data backup and recovery procedures: Implement processes for
backing up data resources and recovering data in the event of a data loss
or disaster.
Train staff in data management best practices: Ensure that employees are
trained on data management best practices, including data quality, data
security, and data governance.
Effective data management requires ongoing attention and effort. By
implementing these steps, organizations can ensure that their data
resources are being used effectively to support business objectives, while
also minimizing risks associated with data management.

1.5 Hands-On MIS Projects


The projects in this section give you hands-on experience in analyzing
data quality problems, establishing company-wide data standards,
creating a database for inventory management, and using the Web to
search online databases for overseas business resources.
Managing decision problems involves a systematic approach to
identifying and resolving complex problems using data and analytics.
Here are some key steps to effectively manage decision problems:
 Identify the problem: Clearly define the problem and the desired
outcome. Understand the root cause of the problem and gather
relevant data that can help identify possible solutions.
 Gather data: Collect and analyze data that can help inform the
decision-making process. This may involve gathering data from
multiple sources, such as customer feedback, sales data, and
market research.
 Evaluate options: Once you have gathered the necessary data,
evaluate different options, and identify potential solutions to the

xi
problem. Use analytical techniques, such as decision trees or cost-
benefit analysis, to compare the pros and cons of different options.
 Decide: Based on the analysis of options, make a decision and
develop an action plan. Consider the risks and benefits of each
option and develop a plan that is aligned with the organization's
goals and resources.
 Monitor and adjust: Implement the action plan and regularly
monitor progress. Adjust the plan as necessary based on changing
circumstances or new data.
 Communicate the decision: Communicate the decision to
stakeholders, including employees, customers, and partners.
Clearly explain the rationale behind the decision and any actions
that will be taken as a result.
 Learn from the process: After the decision has been implemented,
evaluate the results, and learn from the process. Identify areas for
improvement and adjust your decision-making process
accordingly.
Effective decision problem management requires a structured approach
that considers data, analysis, and stakeholder input. By following these
steps, organizations can make informed decisions.

xii
2. Telecommunications, the Internet, and Wireless
Technology

2.1 Telecommunications and Networking in Today’s Business World


If you run or work in a business, you can’t do without networks. You
need to communicate rapidly with your customers, suppliers, and
employees. Until about 1990, businesses used the postal system or
telephone system with voice or fax for communication. Today, however,
you and your employees use computers and e-mail, the Internet, cell
phones, and mobile computers connected to wireless networks for this
purpose. Networking and the Internet are now nearly synonymous with
doing business.

2.1.1 What is a Computer Network?


A computer network is a collection of interconnected computers and
other devices that can communicate and share resources with each other.
These devices can be in the same building or spread across different
geographical locations.
Computer networks work by enabling devices to communicate and share
resources with each other through a variety of hardware and software
components. Here is a high-level overview of how a computer network
works:
1. Devices are connected: Devices such as computers, servers, printers,
and other network-enabled devices are physically or wirelessly

xiii
connected to each other through network cables, switches, routers, or
wireless access points.
2. Data is transmitted: Data is transmitted between devices over the
network in the form of packets. Packets are small units of data that
are wrapped with headers and trailers containing information about
the source and destination of the data, as well as other routing and
control information.
3. Data is routed: When a device sends a packet of data, the packet is
routed through the network to the destination device. Routers and
switches are used to direct the packets to their intended destination
based on the addressing information contained in the packet headers.
4. Data is received: The destination device receives the packet and
processes the data. If the packet contains information that is meant to
be shared with other devices on the network, the device may forward
the data to other devices.
5. Resources are shared: Devices on the network can share resources
such as files, printers, and internet connections. This is typically
done through protocols such as File Transfer Protocol (FTP), Simple
Mail Transfer Protocol (SMTP), or Hypertext Transfer Protocol
(HTTP).
6. Network security is maintained: To ensure the security of the
network, various security measures are implemented, such as
firewalls, access controls, encryption, and authentication.
Overall, a computer network enables devices to communicate and share
resources with each other, allowing for more efficient and collaborative
use of technology.

2.2 Types of Networks


There are several types of computer networks, each with different
characteristics and purposes. Here are some of the most common
types:
xiv
Local Area Network (LAN): A LAN is a network that typically
covers a small geographic area, such as a building or a campus.
Devices in a LAN are connected by wired or wireless connections,
and the network is typically managed by a central server. LANs are
commonly used in businesses and schools for sharing resources such
as printers, files, and internet connections.
Wide Area Network (WAN): A WAN is a network that covers a
large geographic area, such as a city, country, or even the entire
world. WANs are typically used to connect multiple LANs or other
networks together, and they rely on telecommunication services such
as fiber-optic cables, satellite links, and radio waves.
Metropolitan Area Network (MAN): A MAN is a network that
covers a larger geographic area than a LAN but smaller than a WAN,
typically a city or a campus. MANs are commonly used to connect
multiple buildings or campuses together, and they may rely on a
combination of wired and wireless connections.
Personal Area Network (PAN): A PAN is a network that covers a
very small area, typically within a few meters. PANs are commonly
used for connecting personal devices such as smartphones, tablets,
and laptops to each other or to other devices such as printers and
speakers.
Wireless Local Area Network (WLAN): A WLAN is a type of LAN
that uses wireless communication instead of wired connections to
connect devices. WLANs are commonly used in homes and
businesses, and they rely on Wi-Fi technology to enable devices to
communicate with each other and with the internet.
Storage Area Network (SAN): A SAN is a specialized network that
is designed for storage and retrieval of large amounts of data. SANs
are typically used by businesses and organizations that need to store

xv
and access large amounts of data, such as medical records or financial
data.
Virtual Private Network (VPN): A VPN is a secure network that
enables users to connect to a private network over the internet. VPNs
are commonly used by businesses and individuals to protect their data
and to access resources that are not available on the public internet.
These are just a few of the many types of computer networks that
exist, and each type has its own advantages and disadvantages
depending on the specific needs of the users.
2.3 The Global Internet
We all use the Internet, and many of us can’t do without it. It’s become
an indispensable personal and business tool. But what exactly is the
Internet? How does it work, and what does Internet technology have to
offer for business? Let’s look at the most important Internet features.
The Internet is a global network of interconnected computer networks
that allows for communication and information sharing between devices
all over the world. It is a decentralized network, meaning that there is no
central controlling authority or server that manages the entire network.
Instead, the Internet is made up of a vast number of interconnected
networks, each of which is managed independently.
The Internet works by using a set of communication protocols that
enable devices to exchange data with each other. These protocols include
the Transmission Control Protocol (TCP) and the Internet Protocol (IP),
which define how data is transmitted and routed over the network. Other
protocols, such as the Hypertext Transfer Protocol (HTTP) and the File
Transfer Protocol (FTP), are used to enable users to access and share
resources such as websites and files.
The Internet has revolutionized the way that people communicate,
access information, and conduct business. It has enabled new forms of

xvi
communication such as email, instant messaging, and social media, and
it has made it possible for people to access a vast array of information
and services from anywhere in the world. However, the Internet also
presents several challenges, such as cybersecurity threats, privacy
concerns, and issues related to the accuracy and reliability of
information.

2.3.1 Internet Addressing and Architecture


Internet addressing and architecture are key components of the Internet's
infrastructure, which enables devices to communicate with each other
across the network.
Internet addressing refers to the way that devices on the Internet are
identified and located. Every device on the Internet has a unique Internet
Protocol (IP) address, which is a numerical identifier assigned to it by its
Internet Service Provider (ISP). IP addresses are used to route data
packets between devices on the network, and they are essential for
communication over the Internet.
There are two versions of the IP addressing system in use today: IPv4
and IPv6. IPv4 uses 32-bit addresses, which allows for approximately 4
billion unique addresses. However, with the growth of the Internet, this
number is no longer sufficient to meet the demand for IP addresses.
IPv6, which uses 128-bit addresses, was developed to address this issue
and can accommodate a virtually unlimited number of unique addresses.
Internet architecture refers to the way that the Internet is structured and
organized. The Internet is a decentralized network that is composed of a
vast number of interconnected networks, each of which is managed
xvii
independently. This structure allows for a high degree of flexibility and
redundancy, which makes the network more resilient to failures and
outages.
At the core of the Internet architecture are a set of protocols and
standards that govern how devices communicate with each other over
the network. These protocols include the TCP/IP protocol suite, which
defines the rules for sending and receiving data packets over the
Internet, and the Domain Name System (DNS), which is used to map
domain names to IP addresses.
Overall, the Internet's addressing and architecture are critical
components of its infrastructure that enable it to function as a global
network of interconnected devices. As the Internet continues to evolve
and grow, these components will continue to be refined and improved to
ensure that the network remains reliable, secure, and accessible to all.

2.3.2 Internet Addressing and Architecture


The Domain Name System (DNS) is a decentralized system used to
translate human-readable domain names, such as "google.com", into IP
addresses that can be understood by computers. DNS is essentially a
global directory service that translates domain names into numerical IP
addresses that are used to route data across the Internet.
When a user enters a domain name into their web browser, the browser
sends a DNS request to a DNS server. The DNS server then looks up the
IP address associated with the domain name and returns it to the
browser, which can then use the IP address to connect to the desired
website. This process is known as a DNS lookup.
The DNS system is organized hierarchically, with different levels of
DNS servers responsible for different parts of the domain name space.
At the top of the hierarchy are the root servers, which contain

xviii
information about the top-level domains (TLDs) such as .com, .org,
and .net. Below the root servers are the TLD servers, which are
responsible for translating domain names into IP addresses for their
respective TLDs. For example, the .com TLD servers would be
responsible for translating domain names ending in .com into IP
addresses.
Below the TLD servers are the authoritative name servers, which are
responsible for translating domain names for specific websites into IP
addresses. Each domain name has its own authoritative name server,
which is responsible for storing information about the IP address
associated with the domain name.

When a DNS server receives a request for a domain name that it is not
authoritative for, it will forward the request to another DNS server. This
process continues until the authoritative name server for the domain
name is located and returns the IP address to the requesting DNS server.
DNS is a critical component of the Internet infrastructure and is essential
for the proper functioning of the World Wide Web. Without DNS, users
would need to remember the numerical IP addresses of every website
they wanted to visit, which would be impractical and inconvenient. DNS
enables users to access websites using easy-to-remember domain names,
and it also plays a key role in ensuring the security and stability of the
Internet by helping to prevent cyber-attacks and other malicious
activities.

2.3.3 The WEB


The web, short for the World Wide Web, is a global network of
interconnected documents and resources that are accessed via the
Internet. It is a collection of web pages, websites, multimedia content,

xix
and other digital resources that are linked together using hyperlinks and
URLs.
The web was invented by British computer scientist Sir Tim Berners-Lee
in 1989 while he was working at CERN, the European Organization for
Nuclear Research. Berners-Lee's vision was to create a decentralized
system for sharing information that could be accessed from anywhere in
the world using a simple, user-friendly interface.
The web is based on a set of standards and protocols, including
Hypertext Transfer Protocol (HTTP), which defines how data is
transmitted over the web, and Hypertext Markup Language (HTML),
which is used to create web pages. Other key technologies used in the
web include Cascading Style Sheets (CSS) for styling web pages, and
JavaScript for adding interactivity and dynamic content to web pages.
Today, the web is a vast and diverse collection of resources that cover
virtually every topic imaginable. It has become an essential tool for
communication, education, commerce, and entertainment, and has
fundamentally changed the way that people access and share
information. With the continued growth of the Internet and
advancements in web technologies, the web is likely to continue to
evolve and expand in new and exciting ways in the years to come.

2.3.4 WEB 2.0


Web 2.0 is a term that describes a second generation of web
development and design, emphasizing user-generated content,
collaboration, and social networking. The term was coined in the early
2000s to distinguish this new generation of the web from the first
generation, which was primarily focused on static web pages and one-
way communication from website owners to users.
The key features of Web 2.0 include:

xx
 User-generated content: Unlike the first generation of the web,
which was primarily a one-way communication channel, Web 2.0
platforms allow users to create, publish, and share their own
content. Examples of user-generated content include blogs, wikis,
social media posts, and video-sharing platforms.
 Collaboration: Web 2.0 platforms emphasize collaboration and
sharing between users. Users can work together to create and edit
content, and they can communicate with each other in real time
using tools such as instant messaging and video conferencing.
 Social networking: Social networking is a major feature of Web
2.0. Platforms such as Facebook, LinkedIn, and Twitter allow users
to connect with each other, share information and ideas, and build
online communities around common interests.
 Rich user interfaces: Web 2.0 platforms use rich user interfaces to
make the user experience more engaging and interactive. This
includes the use of multimedia content such as video and audio, as
well as advanced graphical user interfaces that make it easier for
users to interact with web applications.
 Web applications: Web 2.0 platforms often include web
applications that allow users to perform complex tasks online.
Examples include online office suites, project management tools,
and e-commerce platforms.
Overall, the key idea behind Web 2.0 is that the web is no longer just a
one-way communication channel. Instead, it has become a dynamic and
interactive platform that allows users to create, share, and collaborate on
content in real time. Web 2.0 has had a profound impact on the way that
people communicate, work, and socialize online, and has paved the way
for many of the online services and tools that we use today.

2.4 The Wireless Revolution

xxi
If you have a cell phone, do you use it for taking and sending photos,
sending text messages, or downloading music clips? Do you take your
laptop to class or to the library to link up to the Internet? If so, you’re
part of the wireless revolution! Cell phones, laptops, and small handheld
devices have morphed into portable computing platforms that let you
perform some of the computing tasks you used to do at your desk.
Wireless communication helps businesses more easily stay in touch with
customers, suppliers, and employees and provides more flexible
arrangements for organizing work. Wireless technology has also created
new products, services, and sales channels.
If you require mobile communication and computing power or remote
access to corporate systems, you can work with an array of wireless
devices, including cell phones, smartphones, and wireless-enabled
personal computers. In addition to voice transmission, they feature
capabilities for e-mail, messaging, wireless Internet access, digital
photography, and personal information management. The features of the
iPhone and BlackBerry illustrate the extent to which cellphones have
evolved into small mobile computers.

2.4.1 Cellular Systems


Cellular systems are a type of mobile communication system that allows
users to communicate wirelessly using radio waves. Cellular systems
divide a geographic area into a network of cells, with each cell served by
a base station that communicates with mobile devices in that cell. By
using multiple base stations, cellular systems can provide continuous
coverage over a large geographic area, allowing mobile devices to stay
connected to the network as they move from cell to cell.
The basic components of a cellular system include:

xxii
1. Mobile devices: These are the devices used by end-users to
communicate wirelessly, such as smartphones, tablets, and laptops.
2. Base stations: These are the radio transmitters and receivers that
communicate with mobile devices in a given cell. Base stations are
typically mounted on tall structures such as towers or buildings to
provide maximum coverage.
3. Switching center: This is the central hub of the cellular network
that connects all the base stations and manages the flow of data and
voice traffic between mobile devices and the public switched
telephone network (PSTN).
4. Control center: This is the component that manages the overall
operation of the cellular system, including network planning,
configuration, and monitoring.
In a cellular system, each cell is assigned a unique frequency band to
prevent interference between cells. When a mobile device moves from
one cell to another, it switches to a new frequency band assigned to the
new cell, allowing for seamless handoff between cells.
Cellular systems can operate on different frequency bands, including the
2G, 3G, 4G, and 5G standards, each with different capabilities and
performance characteristics. 5G networks, for example, provide higher
data rates, lower latency, and improved network capacity compared to
earlier generations of cellular systems.
Overall, cellular systems have revolutionized the way that people
communicate and stay connected, enabling mobile devices to work
seamlessly across a large geographic area. The continued evolution of
cellular technology is expected to bring even greater improvements in
speed, capacity, and reliability, driving the growth of mobile
communication in the years to come.

2.4.2 RFID & Wireless Sensor Products

xxiii
RFID (Radio Frequency Identification) and Wireless Sensor Networks
(WSNs) are two types of wireless communication technologies that are
used in a variety of applications, ranging from inventory management to
environmental monitoring.
RFID is a wireless technology that uses radio waves to read and capture
information stored on tags or labels attached to objects. RFID tags
consist of a microchip and an antenna, which can be attached to an
object or embedded in a product. When an RFID reader emits radio
waves, the tag responds with its unique identification number, which can
be used to track the location and movement of the object.
RFID technology is widely used in supply chain management, inventory
control, and asset tracking, as it enables real-time monitoring of goods
and assets. RFID tags can be used to track the movement of products
through a manufacturing process, monitor inventory levels in a
warehouse, or track the location of valuable assets such as vehicles or
equipment.
WSNs, on the other hand, are wireless networks of small, low-power
sensors that are used to collect and transmit data about the environment.
WSNs consist of many sensors that are distributed over a wide area,
such as a field or a forest. Each sensor in the network can collect data
such as temperature, humidity, light, or motion, and transmit the data to
a central location for analysis.
WSNs are widely used in environmental monitoring, agriculture, and
smart city applications, where they can be used to monitor air quality,
detect forest fires, or optimize energy consumption in buildings. WSNs
can also be used in industrial settings, where they can be used to monitor
the condition of machinery and predict maintenance needs.
Overall, RFID and WSNs are two types of wireless communication
technologies that are used in a variety of applications to enable real-time
monitoring and data collection. While RFID is used primarily for

xxiv
tracking objects and assets, WSNs are used to collect data about the
environment and enable smarter decision-making in a variety of
industries.

CONCLUSION
Databases and data warehouses serve as the foundation for storing and
managing large amounts of data, while data mining and analytics enable
organizations to extract valuable insights and make informed decisions.
The topic also emphasizes the importance of data quality, integration,
and governance, which are necessary for ensuring the accuracy and
reliability of business intelligence systems. These technologies have
enabled unprecedented levels of connectivity, empowering people to
work and communicate from anywhere in the world. As these
technologies continue to evolve and advance, they will undoubtedly
continue to shape the way people interact with one another and with the
world around them. The future of telecommunications, the internet, and
wireless technology is exciting, and will undoubtedly continue to drive
innovation and improve the way people live and work.

xxv
xxvi

You might also like