MIS Report
MIS Report
REPORT
Topic:
Foundations of Business Intelligence: Databases and Information
Management
Telecommunications, the Internet, and Wireless Technology
Submitted by:
Hassaan Gull 2019-CS-01
Submitted to:
Sir Bilal Khan
ACKNOWLEDGEMENTS
On completion of this dissertation, I would like to express my
appreciation to my advisor, Sir Bilal Khan, for his outstanding assistance
and support throughout this whole semester. I would also like to thank
my group members for all the support and work they have done to
complete this. Finally, I want to thank my family members. Only they
continuously gave me support during my most difficult days. Without
their support and encouragement, my accomplishment would not be
possible.
ii
ABSTRACT
Foundations of Business Intelligence: Databases and Information
Management teaches the fundamentals of database design, data
modeling, data warehousing, data mining, and data visualization, all of
which are crucial for success in the field of business intelligence.
Telecommunications, the Internet, and Wireless Technology explores the
history and evolution of communication technologies, including the
internet and wireless systems. Students learn about protocols, security
issues, and the impact of these technologies on society and business,
including legal and ethical concerns. The course provides a
comprehensive understanding of modern communication systems and
their influence on our world.
iii
1. Foundations of Business Intelligence: Databases and
Information Management
iv
Limited data sharing: Sharing data across applications can be
challenging in a file-based system, as each application has its own set of
files, and sharing data between them requires a significant amount of
effort.
Security issues: In a file-based system, it can be challenging to manage
security, as each file may have its own set of permissions, and it can be
difficult to ensure that sensitive data is appropriately protected.
Limited scalability: As the amount of data grows, it can become
challenging to manage it in a file-based system. It can be difficult to add
new files, manage file organization, and ensure that data is accessible
when it is needed.
These problems can be overcome by using a modern database
management system (DBMS), which provides a more organized and
secure way to manage data. A DBMS offers a central repository for data,
enabling easier data sharing and more robust security controls.
v
1.2.1 Relational DBMS
A Relational Database Management System (RDBMS) is a type of
database management system that organizes data into one or more tables
or relations. In an RDBMS, data is stored in a structured manner, and
relationships between different tables can be defined to establish logical
connections between them.
The most used language for managing data in an RDBMS is SQL
(Structured Query Language). SQL provides a standardized syntax for
creating, updating, and querying data in a relational database. An
RDBMS also provides mechanisms for managing data consistency,
ensuring data integrity, and enforcing data security.
Some of the benefits of using an RDBMS include:
Data consistency: Data in an RDBMS is typically well-organized
and follows a predefined structure, making it easier to ensure data
consistency and accuracy.
Scalability: An RDBMS can handle large amounts of data, and it
can scale to accommodate growing data needs.
Data security: An RDBMS provides robust security mechanisms
for controlling access to data and ensuring data privacy.
Data sharing: Data in an RDBMS can be easily shared across
multiple applications and users, making it a valuable resource for
collaborative work.
Querying: The structured nature of data in an RDBMS makes it
easier to query and analyze data using SQL, which provides a
powerful and flexible means of working with data.
Examples of popular RDBMS systems include Oracle, Microsoft SQL
Server, MySQL, and PostgreSQL.
vi
1.2.2 OOP DBMS
An Object-Oriented Database Management System (OOPDBMS) is a
type of database management system that is based on the principles of
object-oriented programming. In an OOPDBMS, data is represented in
the form of objects, which are instances of classes or templates that
define the structure and behavior of the data.
In OOPDBMS, data is organized into object classes, which define the
attributes and methods of the objects that can be created from them. The
objects themselves are instances of these classes, and they can be
manipulated through their methods.
Some of the benefits of using an OOPDBMS include:
Improved data modeling: Object-oriented programming principles
can provide a more natural way to model data, as objects map
closely to real-world entities.
Data consistency: An OODPBMS provides a way to enforce data
consistency, as objects are created from classes that define their
structure and behavior.
Data sharing: Objects in an OOPDBMS can be shared across
multiple applications and users, making it a valuable resource for
collaborative work.
Flexibility: An OOPDBMS provides a high degree of flexibility, as
objects can be created and modified dynamically, without the need
to change the underlying data schema.
Performance: An OOPDBMS can provide improved performance
for complex data structures and relationships, as queries can be
optimized for object traversal.
vii
Examples of OOPDBMS include Object Store, Objectivity/DB,
Gemstone, and db4o. However, OOPDBMS has not gained widespread
popularity due to its complexity and high implementation costs.
viii
reporting, data analysis, and data mining. Data warehouses are used to
store and manage large amounts of data from multiple sources, such as
transactional databases, external data sources, and legacy systems.
A data warehouse is typically designed to be optimized for querying and
analysis rather than transaction processing. It may employ different
techniques to improve performance, such as indexing, partitioning, and
data aggregation. The data in a data warehouse is organized in a way that
is optimized for querying and analysis, typically using a star or
snowflake schema.
Data warehouses are used to support a wide range of business
intelligence activities, including:
Reporting: Data warehouses can be used to generate standard and
ad-hoc reports, such as financial statements, sales reports, and
customer profiles.
Data analysis: Data warehouses can be used to perform complex
data analysis, such as trend analysis, forecasting, and
segmentation.
Data mining: Data warehouses can be used to discover patterns and
relationships in large datasets, which can be used for predictive
modeling and decision making.
Business performance management: Data warehouses can be used
to support performance management activities, such as budgeting,
forecasting, and score carding.
ix
1.4 Managing Data Resources
Setting up a database is only a start. To make sure that the data for your
business remains accurate, reliable, and readily available to those who
need it, your business will need special policies and procedures for data
management.
Managing data resources involves a set of activities aimed at ensuring
that data is properly collected, stored, processed, and used in an
organization. Here are some key steps to effectively manage data
resources:
Develop a data strategy: Define your organization's data goals and
objectives and establish a data management strategy that aligns with
these goals. This will help ensure that data resources are being used
effectively to support business needs.
Establish data governance: Implement policies and procedures that
govern how data is collected, stored, processed, and used in your
organization. This includes defining data quality standards, data security
protocols, and data retention policies.
Create a data inventory: Identify all the data resources available within
your organization, including data sources, data types, data storage
locations, and data access points. This will help you get a better
understanding of your data landscape and how data is being used.
Ensure data quality: Implement processes and tools to ensure that data is
accurate, complete, and consistent. This includes data validation checks,
data cleansing, and data normalization.
Implement data security measures: Protect data resources from
unauthorized access, theft, and corruption. This includes implementing
access controls, encrypting sensitive data, and monitoring data usage.
x
Establish data backup and recovery procedures: Implement processes for
backing up data resources and recovering data in the event of a data loss
or disaster.
Train staff in data management best practices: Ensure that employees are
trained on data management best practices, including data quality, data
security, and data governance.
Effective data management requires ongoing attention and effort. By
implementing these steps, organizations can ensure that their data
resources are being used effectively to support business objectives, while
also minimizing risks associated with data management.
xi
problem. Use analytical techniques, such as decision trees or cost-
benefit analysis, to compare the pros and cons of different options.
Decide: Based on the analysis of options, make a decision and
develop an action plan. Consider the risks and benefits of each
option and develop a plan that is aligned with the organization's
goals and resources.
Monitor and adjust: Implement the action plan and regularly
monitor progress. Adjust the plan as necessary based on changing
circumstances or new data.
Communicate the decision: Communicate the decision to
stakeholders, including employees, customers, and partners.
Clearly explain the rationale behind the decision and any actions
that will be taken as a result.
Learn from the process: After the decision has been implemented,
evaluate the results, and learn from the process. Identify areas for
improvement and adjust your decision-making process
accordingly.
Effective decision problem management requires a structured approach
that considers data, analysis, and stakeholder input. By following these
steps, organizations can make informed decisions.
xii
2. Telecommunications, the Internet, and Wireless
Technology
xiii
connected to each other through network cables, switches, routers, or
wireless access points.
2. Data is transmitted: Data is transmitted between devices over the
network in the form of packets. Packets are small units of data that
are wrapped with headers and trailers containing information about
the source and destination of the data, as well as other routing and
control information.
3. Data is routed: When a device sends a packet of data, the packet is
routed through the network to the destination device. Routers and
switches are used to direct the packets to their intended destination
based on the addressing information contained in the packet headers.
4. Data is received: The destination device receives the packet and
processes the data. If the packet contains information that is meant to
be shared with other devices on the network, the device may forward
the data to other devices.
5. Resources are shared: Devices on the network can share resources
such as files, printers, and internet connections. This is typically
done through protocols such as File Transfer Protocol (FTP), Simple
Mail Transfer Protocol (SMTP), or Hypertext Transfer Protocol
(HTTP).
6. Network security is maintained: To ensure the security of the
network, various security measures are implemented, such as
firewalls, access controls, encryption, and authentication.
Overall, a computer network enables devices to communicate and share
resources with each other, allowing for more efficient and collaborative
use of technology.
xv
and access large amounts of data, such as medical records or financial
data.
Virtual Private Network (VPN): A VPN is a secure network that
enables users to connect to a private network over the internet. VPNs
are commonly used by businesses and individuals to protect their data
and to access resources that are not available on the public internet.
These are just a few of the many types of computer networks that
exist, and each type has its own advantages and disadvantages
depending on the specific needs of the users.
2.3 The Global Internet
We all use the Internet, and many of us can’t do without it. It’s become
an indispensable personal and business tool. But what exactly is the
Internet? How does it work, and what does Internet technology have to
offer for business? Let’s look at the most important Internet features.
The Internet is a global network of interconnected computer networks
that allows for communication and information sharing between devices
all over the world. It is a decentralized network, meaning that there is no
central controlling authority or server that manages the entire network.
Instead, the Internet is made up of a vast number of interconnected
networks, each of which is managed independently.
The Internet works by using a set of communication protocols that
enable devices to exchange data with each other. These protocols include
the Transmission Control Protocol (TCP) and the Internet Protocol (IP),
which define how data is transmitted and routed over the network. Other
protocols, such as the Hypertext Transfer Protocol (HTTP) and the File
Transfer Protocol (FTP), are used to enable users to access and share
resources such as websites and files.
The Internet has revolutionized the way that people communicate,
access information, and conduct business. It has enabled new forms of
xvi
communication such as email, instant messaging, and social media, and
it has made it possible for people to access a vast array of information
and services from anywhere in the world. However, the Internet also
presents several challenges, such as cybersecurity threats, privacy
concerns, and issues related to the accuracy and reliability of
information.
xviii
information about the top-level domains (TLDs) such as .com, .org,
and .net. Below the root servers are the TLD servers, which are
responsible for translating domain names into IP addresses for their
respective TLDs. For example, the .com TLD servers would be
responsible for translating domain names ending in .com into IP
addresses.
Below the TLD servers are the authoritative name servers, which are
responsible for translating domain names for specific websites into IP
addresses. Each domain name has its own authoritative name server,
which is responsible for storing information about the IP address
associated with the domain name.
When a DNS server receives a request for a domain name that it is not
authoritative for, it will forward the request to another DNS server. This
process continues until the authoritative name server for the domain
name is located and returns the IP address to the requesting DNS server.
DNS is a critical component of the Internet infrastructure and is essential
for the proper functioning of the World Wide Web. Without DNS, users
would need to remember the numerical IP addresses of every website
they wanted to visit, which would be impractical and inconvenient. DNS
enables users to access websites using easy-to-remember domain names,
and it also plays a key role in ensuring the security and stability of the
Internet by helping to prevent cyber-attacks and other malicious
activities.
xix
and other digital resources that are linked together using hyperlinks and
URLs.
The web was invented by British computer scientist Sir Tim Berners-Lee
in 1989 while he was working at CERN, the European Organization for
Nuclear Research. Berners-Lee's vision was to create a decentralized
system for sharing information that could be accessed from anywhere in
the world using a simple, user-friendly interface.
The web is based on a set of standards and protocols, including
Hypertext Transfer Protocol (HTTP), which defines how data is
transmitted over the web, and Hypertext Markup Language (HTML),
which is used to create web pages. Other key technologies used in the
web include Cascading Style Sheets (CSS) for styling web pages, and
JavaScript for adding interactivity and dynamic content to web pages.
Today, the web is a vast and diverse collection of resources that cover
virtually every topic imaginable. It has become an essential tool for
communication, education, commerce, and entertainment, and has
fundamentally changed the way that people access and share
information. With the continued growth of the Internet and
advancements in web technologies, the web is likely to continue to
evolve and expand in new and exciting ways in the years to come.
xx
User-generated content: Unlike the first generation of the web,
which was primarily a one-way communication channel, Web 2.0
platforms allow users to create, publish, and share their own
content. Examples of user-generated content include blogs, wikis,
social media posts, and video-sharing platforms.
Collaboration: Web 2.0 platforms emphasize collaboration and
sharing between users. Users can work together to create and edit
content, and they can communicate with each other in real time
using tools such as instant messaging and video conferencing.
Social networking: Social networking is a major feature of Web
2.0. Platforms such as Facebook, LinkedIn, and Twitter allow users
to connect with each other, share information and ideas, and build
online communities around common interests.
Rich user interfaces: Web 2.0 platforms use rich user interfaces to
make the user experience more engaging and interactive. This
includes the use of multimedia content such as video and audio, as
well as advanced graphical user interfaces that make it easier for
users to interact with web applications.
Web applications: Web 2.0 platforms often include web
applications that allow users to perform complex tasks online.
Examples include online office suites, project management tools,
and e-commerce platforms.
Overall, the key idea behind Web 2.0 is that the web is no longer just a
one-way communication channel. Instead, it has become a dynamic and
interactive platform that allows users to create, share, and collaborate on
content in real time. Web 2.0 has had a profound impact on the way that
people communicate, work, and socialize online, and has paved the way
for many of the online services and tools that we use today.
xxi
If you have a cell phone, do you use it for taking and sending photos,
sending text messages, or downloading music clips? Do you take your
laptop to class or to the library to link up to the Internet? If so, you’re
part of the wireless revolution! Cell phones, laptops, and small handheld
devices have morphed into portable computing platforms that let you
perform some of the computing tasks you used to do at your desk.
Wireless communication helps businesses more easily stay in touch with
customers, suppliers, and employees and provides more flexible
arrangements for organizing work. Wireless technology has also created
new products, services, and sales channels.
If you require mobile communication and computing power or remote
access to corporate systems, you can work with an array of wireless
devices, including cell phones, smartphones, and wireless-enabled
personal computers. In addition to voice transmission, they feature
capabilities for e-mail, messaging, wireless Internet access, digital
photography, and personal information management. The features of the
iPhone and BlackBerry illustrate the extent to which cellphones have
evolved into small mobile computers.
xxii
1. Mobile devices: These are the devices used by end-users to
communicate wirelessly, such as smartphones, tablets, and laptops.
2. Base stations: These are the radio transmitters and receivers that
communicate with mobile devices in a given cell. Base stations are
typically mounted on tall structures such as towers or buildings to
provide maximum coverage.
3. Switching center: This is the central hub of the cellular network
that connects all the base stations and manages the flow of data and
voice traffic between mobile devices and the public switched
telephone network (PSTN).
4. Control center: This is the component that manages the overall
operation of the cellular system, including network planning,
configuration, and monitoring.
In a cellular system, each cell is assigned a unique frequency band to
prevent interference between cells. When a mobile device moves from
one cell to another, it switches to a new frequency band assigned to the
new cell, allowing for seamless handoff between cells.
Cellular systems can operate on different frequency bands, including the
2G, 3G, 4G, and 5G standards, each with different capabilities and
performance characteristics. 5G networks, for example, provide higher
data rates, lower latency, and improved network capacity compared to
earlier generations of cellular systems.
Overall, cellular systems have revolutionized the way that people
communicate and stay connected, enabling mobile devices to work
seamlessly across a large geographic area. The continued evolution of
cellular technology is expected to bring even greater improvements in
speed, capacity, and reliability, driving the growth of mobile
communication in the years to come.
xxiii
RFID (Radio Frequency Identification) and Wireless Sensor Networks
(WSNs) are two types of wireless communication technologies that are
used in a variety of applications, ranging from inventory management to
environmental monitoring.
RFID is a wireless technology that uses radio waves to read and capture
information stored on tags or labels attached to objects. RFID tags
consist of a microchip and an antenna, which can be attached to an
object or embedded in a product. When an RFID reader emits radio
waves, the tag responds with its unique identification number, which can
be used to track the location and movement of the object.
RFID technology is widely used in supply chain management, inventory
control, and asset tracking, as it enables real-time monitoring of goods
and assets. RFID tags can be used to track the movement of products
through a manufacturing process, monitor inventory levels in a
warehouse, or track the location of valuable assets such as vehicles or
equipment.
WSNs, on the other hand, are wireless networks of small, low-power
sensors that are used to collect and transmit data about the environment.
WSNs consist of many sensors that are distributed over a wide area,
such as a field or a forest. Each sensor in the network can collect data
such as temperature, humidity, light, or motion, and transmit the data to
a central location for analysis.
WSNs are widely used in environmental monitoring, agriculture, and
smart city applications, where they can be used to monitor air quality,
detect forest fires, or optimize energy consumption in buildings. WSNs
can also be used in industrial settings, where they can be used to monitor
the condition of machinery and predict maintenance needs.
Overall, RFID and WSNs are two types of wireless communication
technologies that are used in a variety of applications to enable real-time
monitoring and data collection. While RFID is used primarily for
xxiv
tracking objects and assets, WSNs are used to collect data about the
environment and enable smarter decision-making in a variety of
industries.
CONCLUSION
Databases and data warehouses serve as the foundation for storing and
managing large amounts of data, while data mining and analytics enable
organizations to extract valuable insights and make informed decisions.
The topic also emphasizes the importance of data quality, integration,
and governance, which are necessary for ensuring the accuracy and
reliability of business intelligence systems. These technologies have
enabled unprecedented levels of connectivity, empowering people to
work and communicate from anywhere in the world. As these
technologies continue to evolve and advance, they will undoubtedly
continue to shape the way people interact with one another and with the
world around them. The future of telecommunications, the internet, and
wireless technology is exciting, and will undoubtedly continue to drive
innovation and improve the way people live and work.
xxv
xxvi