You are on page 1of 7

CHAPTER 5

By : Cornelius Susanto / 016201200005 / IR 2

5.1 Data Arrangement and Access


A system of computer manages data in a hierarchy that starts from bits, bytes, fields, records, files, and finally
databases. Which also can be illustrated like a chart below :
Data Arrangement within a Database

File

Record

Field

Byte

Record

Field

Field

Byte

Byte

Bit

Field

Bit

Bit

Byte

Bit

Which in addition some parts can be assumed as another same meaning, such as :

Replace File with Table


Replace Field with Column

Every record in a file should contain at least one field that uniquely identifies that record so that the record can be
retrieved, updated, and sorted, which this kind of field is called as the primary key, for example: every
student in university has a different number of student number. And also there are Secondary keys that are
other fields that have some identifying information, for example: every students has a last name that might be
same with other students.
Also in Storing and accessing records, there are 2 ways of accessing method, they are:

1. Indexed sequential access method (ISAM) that uses an index of key fields to locate individual
records
2. Direct file access method that uses the key field to locate the physical address of a record.

5.2 The Traditional File Environment


Over time, organizations developed many applications, each with an associated, application-specific data file. For
example: a university has many kind of application, which every administration need has their own specific
application, such as an application involving students, that including registration, fee payment, grades, and others.
Whereas, in a file management environment, each of these applications has a specific data file related to it, and this
kind of approach is considered as traditional approach or also can be called as approach 1.
There are some problems related to this traditional approach, such as :
1. Data redundancy which this problem caused a duplication of the same piece of information in a several
places, for example in university there will be a data that contain records about students whom will be also
represented in other data files.
2. Data inconsistency means that the various copies of the data is no longer agreed.
3. Data isolation which means that file organization also leads to difficulty in accessing data from different
applications.

5.3 The Modern Approach of Databases


Unlike the traditional approach, in which different programs access the different data files, the database is arranged
so that one set of software programs (called as Database Management System or DBMS) provides access to all the
data. So finally those problems such as data redundancy, inconsistency, and isolation are minimized and the security
and data integrity will be increased.
The modern approach or also considered as approach 2 has some points, such as :
1. One file consists more than one tables
2. One table can used in many files
3. Table = collection of records

5.4 Database Management System


The software program that provides access to a database is known as DBMS, which DBMS permits an organization
to store data in one location from which it can be updated and retrieved. There are four main components in DBMS:
the data model, data definition language, data dictionary, and data manipulation
language (DML)

Also, many people are confused the different between database and DBMS, heres a different between it
Database
Collection of file
Using one name

DBMS
Database Management System (the Software)
A SOFTWARE to manage database ex: Ms.
Word
Users INSTALL DBMS
The managing one

Users CREATE database


The managed ones

DBMS bring many advantages to the organization, such as: improved strategic use of corporate
data, improved security, enhanced data integrity, and etc.

5.5 Logical Data Models


There are 3 most common data models: hierarchical, network, and relational. Using these models,
database designers can build logical or conceptual views of data that can then be physically implemented into
virtually any database with any DBMS.

Hierarchical Database Model rigidly structures data into an inverted tree in which records contain a key
field and a number of other fields. All records have only one parent and each parent may have many children.
This structure characterized by one to many relationships among data.
In Network Model records can be linked to more than one parent, allowing many-to-many relationship among
the data.
And the Relational Model uses tables to capitalize on characteristics of rows and columns of data that are
consistent with real world business situations.
Hierarchical and Network
Database Model

Relational Database

Advantage
Processing Efficiency,
which means that database
model relatively easy for users
to understand because they
reflect the pattern of many real
world business relationships.
High Flexibility in regard
to ad hoc queries, power to
combine information from
different sources,
simplicity of design and
maintenance.

Disadvantage
Have low flexibility,
time-consuming,
difficult to install,
difficult to remedy if
design errors occur.
They are relatively low
processing efficiency.

5.6 Data Warehouse


Data warehousing approaches can range from simple, the data mart, to complex, the enterprise data warehouse.
These approaches differ in scale and complexity. A data mart is a scaled won version or a data warehouse that
focuses on a business requirement of a specific department or business process. The enterprise data
warehouse provides an enterprise wide, consistent, and comprehensive view of the company with business users
employing common terminology and data standards throughout the firm.

CHAPTER 6
By : Cornelius Susanto / 016201200005 / IR 2

6.1 The Telecommunication System


Telecommunications systems are composed of computers (both client on the desktop and host computers, such
as servers and mainframes), communications processors, communications media, and
communications software.
There are five basic types of communications media. Those media are:

Twisted-pair wire
Coaxial cable
Fiber optic cable
Microwave
Satellite transmission

Hardware
Level

CO M PUTER

1.
2.
3.
4.
5.

Cable Media

Broadcast
Media
Hierarchy
of Computer and Host

HOST
HOST

Software
Level

HOST

6.2 Network
Network Categorization

Networ
k

Networ
k

Networ
k

Public

Global

Wired

Private

Local

Wirele
ss

Network can be also categorized into more than categorization, such as public and global, private and
local, and so on. For example: Internet is a public and global network because it can be used by many
people and its available for people from around the world. But Wifi network isnt a global, its a local
network even its a public network, because it can only used in specific areas.
Heres some list of network hardware:
1.
2.
3.
4.

Antenna
Bluetooth hardware
SIM Card
Cellphone

5.
6.
7.
8.

Tablet
Telephone
Access Point
Router

9. Switch
10. Network Wire
11. Network Board

12.

13. 6.3 Network Communications Software


14. Communications software provides many functions in a network, including message formatting, error checking,
data security and privacy, and etc.
15. These functions are performed by various parts of network communications software which inludes:
16.
17. Network Operating Systems is systems software that controls the hardware devices, software, and
communications media and channels across a network.
18. Network Management Software reduce time spent on routine tasks, such as remote, electronic installation of
new software, and etc.
19. Protocol is a set of rules and procedures governing transmission across a network, and it works in a formal way.
20. Whereas, protocol has stacks that refer to some points, they are:

Collection of protocols in several layers


Several layers (stacks)
Several protocols in the same layer dont constitute a protocol stack

21. Finally protocols are made in layers because it is too complex if protocols are in one layer.
22.

The 7 layer of OPI Model

23.

Application Layer
Transport Layer

Software
Layers

Network Layer
Data Link Layer
Physical Layer
24.

Hardware
Layers

You might also like