Professional Documents
Culture Documents
Ipt HSC Notes Final
Ipt HSC Notes Final
Ipt HSC Notes Final
● Journals
○ Detail of day to day progress, plus forthcoming milestones or deadlines
○ Keeps track of decisions and events, as well as allows new members to understand what has
happened since the project started
○ Important decisions
○ Journals include a more detailed analysis and reflection on recent events (meetings, phone calls)
● Diaries
○ Meetings, appointments, tasks and other events can be recorded in advance
○ Organizational tool and memory aid
● Funding management plan
○ The procedure for relocating
○ Ensures the project is developed within budget.
○ Each development task be allocated sufficient funds at the correct time and that these funds are
spent wisely
○ Will funds be given fully before the task begins? Progressively during the task? Or after?
● Communication management plan
○ Specifies how team members will communicate with each other during systems development.
○ Strategies in the plan provide a structure that supports and reinforces effective ongoing
communication between all team members throughout the project’s development.
○ This includes the communication medium used, lines of communication, method of monitoring the
progress of SDLC and changing/emerging requirements
❖ Identifying Social and Ethical Issues
● Workplace Health and Safety
○ The ergonomic design of furniture, appropriate lighting and noise levels, varied work routines, and
also procedures for reporting and resolving potential Occupational Health Safety problems.
● Effect on employment
○ Job losses where technology replaces humans
○ Job gains where humans are required to design, maintain and operate technology
○ Retraining where new technology cannot be operated by current staff due to lack of education
● Security of data and information
○ Mechanisms and techniques to protect against loss of regular offsite backups, physical barriers,
restricted access to authorised personnel with passwords, encryption and assigning different levels
of access.
○ Development systems should also be protected against virus attack.
● Copyright
○ Team members are required to sign a contract to hand over all copyrights to the development
company.
○ Obtaining permission and documenting the use of copyrighted material during development,
including the software used to assist development and also software that is incorporated within the
solution.
● Respect for the rights and needs of individual team members
○ Respecting a person’s right to privacy such as individuals deciding how much of their private life
they wish to reveal
❖ Requirements Reports
○ It is produced in Understanding Problem stage and used in Planning stage (also every other stage)
○ Defines the precise nature of the problem, basically determining what needs to be done
○ 2 different versions are produced for client and the technical developers
○ Details the time frame, Details the subprojects and the time frame for them, Identifies
participants , Identifies relevant information technology, Identifies data/information, Identifies the
needs of users
● Systems Analyst
○ Analyses existing systems, determines the requirements and designs the new information system
● Requirements prototypes
○ Working model of an information system, built to understand the requirements of the system
○ Used to obtain further information relevant to the production of the Requirements Report
○ Used when the problem is not easily understood
○ Repetitive process of prototype modification and participants’ feedback until the problem is
understood
○ Can be the basis for further system development
Planning
Designing
● Decision tables
○ Tools for documenting the logic upon which decisions are made.
○ The table is divided vertically into conditions and actions, and
then horizontally into rules
Implementing
❖ Acquiring information technology and making it operational
● Hardware
○ Network cabling needs to be installed
○ Buying, installing and configuring new hardware (e.g. servers)
○ Training the participants and users to use the hardware
● Software, customised or developed
○ Install or customise the new software to suit the system's needs
○ Convert the old data to the new system
○ Train participants and users to use the software
❖ An implementation plan that details:
● Implementation Plan specifies
○ Participant training (many Q’s surrounding these things)
○ Conversion method
○ System testing
○ Conversion of data
● Participant training
○ Ensures that participants can use the new system and understand its benefits
○ It’s vital for successful training to require motivated learners
● Training Techniques
➔ Traditional group training sessions
○ Trainer can be a member of the system development team or an outsourced specialist trainer
○ If software purchased has little modifications → outsourced trainer (intimate knowledge of it)
○ If software is customised → member of development team
○ There’s onsite and offsite training
➔ Peer training
○ One or more users undergo intensive training in regard to the operation and skills needed by
the new system
○ Also learns to teach others to use it
○ One-to-one process that’s essentially an onsite expert guiding them
➔ Online training such as tutorials and help systems
○ Allow users to learn new skills at their own pace and as they are needed
○ Common for larger systems to be provided with a complete tutorial system
○ They include sample files and databases that can be changed without actually altering stuff
● The method for conversion
➔ Direct conversion
○ Old system completely dropped and new system completely implemented at one time
○ The old system is no longer available
○ Must be sure that the new system will operate
correctly and meet all requirements because it might
fail, problems may occur and there is no backup
○ Minimal cost, time and effort
○ The system is up and running immediately
○ Best suited for smaller companies and paper-based
systems
➔ Parallel conversion
○ Operating both the old and new systems together for a period of time
○ Problems encountered can be solved before the old
system is discontinued, so no lost data
○ Users have time to familiarise themselves with the new
system
○ Participants need to operate both systems = additional
workload for participants
○ Increased chance of confusion over which system has
correct data
○ Best used for processing that is very important and may result in dire consequences
○ Can compare two systems and obtain a good understanding of the differences between them
○ Eventually old system will stop but only when the new system has been proven to work
➔ Phased conversion
○ Gradual introduction of the new system while the old system is progressively discarded
○ Introducing new parts of the new product one at a time while the older parts being replaced
are removed
○ For large organisations, the conversion process is
also much more manageable
○ Users can gradually get used to the new system
○ Staff training can be done in stages
○ If there is a problem with a certain operation, it is
possible to switch back to the old system
➔ Pilot conversion
○ New system is first of all piloted in one part of
the business (an office, a department)
○ Once it runs successfully, the new system is
introduced to the rest of the company
○ If something goes wrong with the new system,
only a small part of the company is affected and
there is no backup for them
○ Staff who were part of the pilot scheme can
help train other staff
○ Useful for systems with a large number of users as it ensures the system is able to operate
● How the system will be tested
○ When will it be tested (what stage in the development process)?
○ Who will test the system?
○ What methods will be used?
● Conversion of data for the new system
○ How will existing data be converted from the old format to the new format so it is compatible with
the new system?
○ Data entry operators are required to convert between analogue and digital data
○ Data conversion software can be used to convert between digital forms of data
❖ Need for an operation manual detailing procedures participants follow when using the new
system
● Operation Manuals
○ Describes step-by-step instructions specific to the new system for participants such as performing
certain tasks, troubleshooting and FAQs
○ It’s continually updated
○ It identifies and details tasks
➔ Why they are required
➔ How tasks relate to one another
➔ Who performs tasks
➔ When a task is to be completed
➔ How to complete tasks
○ Technical support staff assists participants with the new system and an operation manual details
procedures they follow when using the new system
Information Systems
○ Information processes:
○ Cover the seven processes; collecting, organising, analysing, storing and retrieving,
processing, transmitting and receiving, displaying.
❖ The Roads and Traffic Authority holding information on automobiles and holders of drivers
licences
○ Environment:
○ NSW vehicle owners, government (NSW department of transport), police and courts.
○ Purpose:
○ To manage registration of all drivers and motor vehicles in NSW.
○ To provide information to drivers/applicants on matters such as licensing, vehicle
registration, etc. as well as statistical information to government and other authorities.
○ Data/information:
○ Drivers’ details (contact, payment, driving history, license information), vehicle details
(registration numbers, make of car, etc.)
○ Participants:
○ Data entry operators, administration staff at offices, police department
○ Information technology:
○ Hardware: Computers, cameras, barcode scanners, networking between computers
○ Software: Operating system, database software
○ Information processes:
○ Cover the seven processes; collecting, organising, analysing, storing and retrieving,
processing, transmitting and receiving, displaying.
❖ Video stores holding information on borrowers and videos
○ Environment:
○ Staff, customers around the area, suppliers, other chain stores, head office.
○ Purpose:
○ Allowing customers to hire videos for a period of time, keeping an accurate record of
rentals and stock.
○ Data/Information:
○ Customer details, current loans and overdue items, rental records (in stock/on loan),
rental fees, video details, barcodes, receipts
○ Participants:
○ Staff, head management
○ Information technology:
○ Hardware: Computers, barcode scanners
○ Software: Operating system, database software
○ Information processes:
○ Cover the seven processes; collecting, organising, analysing, storing and retrieving,
processing, transmitting and receiving, displaying
Organisation
Advantages Disadvantages
Non-Computer ○ Does not require any power ○ Inflexible layout (eg. cannot be
Based ○ Portable reorganised alphabetically when a
○ No training required new record is added)
○ Cheaper as it doesn’t require ○ Limited access
computer hardware and ○ Larger amounts of physical storage
software space
○ One person only can access it at one
time
○ Longer to organise, analyse,
manipulate and retrieve the data
❖ Logical organisation of flat-file databases, including:
➢ Organises all data into a single table where rows are divided into fields and is suitable for small
applications with basic processing
➢ A database stored into a single table (single file)
➢ Most appropriate when tasks require basic processing and end users have low ICT skills
● Files
○ A block of data, when finished work on the computer it is stored in a file
○ It’s divided into a set of related records
○ E.g : Address database is a file
● Records
○ Collection of facts about one specific entry
in a database (rows)
○ It’s divided into one or more related fields
○ E.g: the information about a person’s name,
address and home phone
● Fields/Attribute
○ Specific category of data in a database
(columns)
○ Data items in a field are made up of
characters
○ E.g: Postcode, Suburb, Given Name
● Key fields (Primary Key)
○ Field which uniquely identifies a specific record
○ E.g : Student ID = unique for everyone in school
● Characters
○ Smallest unit of data that people can use.
○ E.g: letters, numbers, symbols
● Problems
○ Stored in a single table
○ Causes redundant data
❖ Logical organisation of relational databases
➢ A collection of 2D tables that organises data through relationships to provide flexibility in
manipulating data. It allows you to manage multiple DBs and manipulate data by searching and
sorting
● Schemas/Entity Relationship Diagrams (ERDs)
○ It’s an organised plan of the entire database and shows the logical relationship of the data
● Entities
○ Specific thing about which information is collected and stored
○ Separate tables in schema indicate the entities
○ E.g: Student, Teacher, Employee
● Attributes
○ Defined property (characteristics) of an entity
○ Attributes are the same as fields in a flat file database.
○ E.g: First Name, Last Name
● Relationships
➔ One to one (Seldom Used)
○ Each record in the first entity is related to only one other in the second entity
○ E.g: Primary school teacher to one class
➔ One to many (Often Used)
○ Each record in the first entity is related to several records in the second entity
○ E.g: One teacher to many students
➔ Many to many
○ Each record in the first entity relates to many records in the second entity, and each record in
the second entity is related to many records in the first entity.
○ E.g: Each student studies many subjects and many students study each subject
● Tables as the implementation of entities consisting of:
➔ Attributes
○ Information in a column (field) of the table is the attribute of the entity and represents the
field
➔ Records/Tuple
○ A row in the table is called a tuple of an entity and represents a record
● Linking tables using primary and foreign keys
➔ Primary Keys
○ A field that stores data that uniquely identifies the record
➔ Foreign Keys
○ An attribute which is the primary key for another table
➔ Hierarchical
○ Sequential path in a top-down design - user moves
down through the website finding more and more
info
○ Suited to information that falls into categories and
sub-categories (Government sites)
➔ Non-linear
○ Allows maximum flexibility of design, but users can get lost in a maze of screens
○ E.g: Games with multiple endings
➔ Composite/Combination
○ Combination of all three methods, with different parts of the site having characteristics of
each
➔ Full Backup
○ Usually done once a week
○ Backing up all files
○ Time-consuming and often require a lot of disk or tape capacity
➔ Incremental Backups
○ Only back up the data that has changed since the previous backup
➔ Differential Backup
○ Contains all of the data that has changed since the last full backup
● Security
○ Security is an important database issue.
○ Data can be stolen, destroyed, or maliciously modified and there is a greater risk when data is
accessible via a network
○ Usernames and passwords can be used restrict access
○ Can be used to secure individual files, directories and entire storage devices
○ Levels of access can be used to allow only certain users to make changes to the database
○ Physical security measures such as locking the room (keys,passes,biometric)
○ Record locking prevents two people from trying to change a record simultaneously
○ Transaction and master files involves placing daily changes in a temporary ‘transaction file’ and
leave the original database (master file) unaltered. Master file is updated at intervals
○ Firewall restricts unauthorised access from the Internet. It checks the data entering/leaving system.
Checks the password of anyone entering the system
○ Virus protection software protects data from deliberate and malicious electronic attack
❖ Tools for database storage and retrieval, including:
● Extracting relevant information through searching and sorting a database
➔ Searching
○ The process of examining the database to retrieve data based on a search criteria
➔ Sorting
○ The process of arranging the database data in a particular order.
○ Makes the data easier to use by arranging it in a meaningful order
○ Querying is a common method of searching for records that meet a certain condition
● Selecting data from a relational database using Query by Example (QBE) and Structured Query
Languages (SQL) commands, including:
● SQL
➔ Select
○ The data to be displayed
○ E.g : SELECT Students.FirstName, Students.LastName
➔ From
○ The source of the data
○ E.g : FROM Students, Scores
➔ Where
○ The query/search criteria
○ E.g: WHERE LastName = “Mullins
○ If multiple tables, Students. LastName=”Chen” AND Scores.Mark > 1000
➔ Order by
○ Order in which the results are to be displayed
○ E.g: ORDER BY LastName DESC
➔ Wildcards
○ *= more than 1 or 0
○ E.g: J* =Jess, John, jonathan
○ ?= just one character
○ E.g: J?m = Jim, Jem, Jam
○ Logical Operators : AND, OR
○ Relational Operators : <,>,=,<=,>=
● QBE
○ A visual technique for specifying a database query.
○ Users don’t need to understand SQL but can use a
simplified form to find data
● Calculation of storage
○ Add all the field sizes x no. of records/1024= Kb
❖ Displaying
● Reporting on relevant information held in a database
○ A report is formatted and organised presentation of data and are designed to be an easy way to
present printed output from a database.
○ E.g: invoices, sales reports, performances, reports and telephone lists
○ DBMS contains report generators allowing users to have control over what data is displayed in
different formats
● Constructing different views of a database for different purposes
○ Purpose of the report determines its content, format and style
○ E.g. invoice and inventory reports will have differing data formats and layouts
○ Forms are used to view, enter and modify data in a database
➔ Design principles
○ Headings that identify the purpose of the report and columns
○ Efficient layout
○ Consistency of style
○ White space
○ Page numbers and date
Communication Systems
❖ Communication systems as being those systems which enable users to send and receive data and
information
○ Communication systems enable people and systems to share and exchange data and information
electronically
○ Many communication systems transport data over a network such as a LAN or the Internet
○ E.g: Cup and String, Smoke signals, Email
❖ Framework in which communication systems function
➔ Proxy Server
○ It acts as a temporary store for data moving between a LAN and other networks, such as the
internet
○ The main function is to cache/store frequently accessed data
○ Tries to perform the request itself without bothering the real server
○ Receives all web requests from all clients. If the files are found in the proxy server’s cache
then there is no need to retrieve it from the original remote web server
○ Provide connectivity between the LAN and the Internet
Examples of Communication Systems
❖ Teleconferencing systems
➢ A multi-location, multi-person conference where audio, video and/or other data is communicated
in real time to all participants
➢ Use of an electronic transmission to allow a meeting to occur at the same time in different
locations
● Audio Conferencing
○ A single telephone call involving three or more people at different locations
○ Audio data is transmitted/received using existing telephone lines or through internet
● Video Conferencing
○ A meeting that allows people in different locations to see video images of each other on a screen +
hear speech
○ May require special communication arrangements because of the high bandwidth required to
transmit video and hardware requirements
○ Audio and video are difficult to transmit due to the large amount of data as well as the
synchronisation of audio
● Uses of teleconferencing
○ Distant education - teachers & students don’t need to pay for travel/accommodation to attend
lectures
○ Business meetings - meetings and conferences can be held in any city, national, internationally,
without the need for participants to be in the same location
○ Job interviews - possible to interview a job applicant located at a remote location
○ General/personal teleconferencing - with an inexpensive webcam and internet, teleconferencing is
possible (skype)
❖ Messaging systems
➢ Used to send messages to people in different locations who may receive the msg at a later time
● Email
○ Allows communication with other email users by sending and receiving messages using a computer
○ It requires a computer that is linked to the Internet, an account with an ISP or an account with a
web-based service (e.g. gmail), an email address and email software
○ Email addresses consists of the name of the account (which is unique on the domain), an '@'
symbol, and the domain name (the location of the person's account on the internet)
○ E.g: johnsmith@hotmail.com
○ Email messages contain two main parts - header and the body
○ The header contains the
➔ Email address of the recipient (to:),
➔ Carbon copy (cc) - sends same message to non-main recipients (optional),
➔ Blind carbon copy (bcc) - sends to other recipients without revealing that other people
got it
➔ Subject (brief description or topic)
○ The body contains the message itself
➔ The process
○ To create and send a message, the sender logs on to the network with a mail server or email
program, creates a message, and sends the message
○ The email goes to the server of the recipients domain, then when the recipient logs on, it
downloads the message into their own inbox. (is temporarily stored on the domain server)
➔ Advantages:
○ Fast (can travel around the world in minutes)
○ Economical and convenient to send messages
○ Easy to organise
○ Easy to read on the go (due to the portability of devices nowadays)
➔ Disadvantages:
○ Requires internet access
○ Not spoken
○ Virus and security issues (spam)
○ Size can affect data transmission speed
● Voice mail
○ Sending:
➔ Voice mail allows communication with other people by storing and forwarding spoken
messages
➔ The sender dials a voice mail number and records a message
➔ The message is digitally stored on a computer system, usually as a sound file, and can only
be retrieved by the intended recipient of the message
○ Receiving:
➔ To retrieve the message, you dial into the voice mail system using any telephone and
enter an account number and password
➔ In the voice mail system, you can listen/delete/save/send messages
➔ Normally used when a caller rings and the receiver is unable to answer, redirecting the
caller to voicemail
➔ It combines the features of a telephone answering system and some concepts of an email
➔ Advantages:
○ Spoken message
○ Expresses the message more clearly
○ Easier access (more people have more access to phones rather than to computer with
internet)
➔ Disadvantages:
○ Cannot communicate complex information (only one-way message and cannot transfer
different types of data e.g. image, video)
○ Can't send different data types
○ Time consuming to sort through and listen to messages
● Voice over Internet Protocol (VOIP)
○ VOIP is a system which allows users to send messages like a telephone over the internet
○ It requires broadband connection and is used to transfer telephone calls using IP addresses
○ VOIP can allow calls to PSTN (Public Switched Telephone Network)
○ VOIP servers translate normal telephone numbers into IP addresses
○ A cheap and easy alternative to transmitting voice messages over the traditional telephone line
○ The sender of the message can connect with the service by plugging a conventional telephone into
a modem that supports VOIP, or can rely on the ISP to provide this support.
○ Alternatively, they can install the appropriate software (VOIP client) onto their computer, and
communicate from there.
○ Recipients do not need a computer as VOIP can interface with the PSTN if necessary.
➔ Advantages:
○
Low costs for long distance calls
○
Saves money
○
No extra cabling required
○
Digital services like voice mail available
○
Conference calls easy to facilitate (as data is digital)
○
Can call from anywhere as long as there’s a connection
➔
Disadvantages:
○
Needs good and reliable internet
○
Traffic and delay of connectivity may result in poor quality
○
Relies on internet connection
○
Can't make emergency calls where there’s a power failure as VOIP relies on broadband
internet
○ Overall, more unreliable than PSTN
❖ Other systems dependent on communication technology such as:
● E-commerce
○ The buying and selling of goods and services via the internet
○ Includes most financial transactions that occur over a communication network, such as ATM's,
EFTPOS, electronic banking and shopping on the internet
➔ Advantages:
○ 24-hour availability
○ Global reach
○ Cheaper for both customer and provider
○ The ability to interact and provide customer information
➔ Disadvantages:
○ Subject to fraud
○ Affecting customer trust and loyalty
○ Power failures and internet down-time prevents system from being available
○ User must have a computer and an internet connection
○ Impacts local shops and banks in remote communities
● EFTPOS
○ EFTPOS (Electronic Funds Transfer at Point-Of-Sales) is a system which allows people to purchase
goods and services using a credit card or debit card.
○ It is the electronic transfer of money from the customer's bank account to the retailer's bank
account
○ Point of Sale terminals are linked to the computer of the customer's bank using the account
number on the card.
○ The PIN number is a security measure to identify the customer.
○ When a connection is made and approved, the money is immediately transferred
➔ Information Technology Used:
○ Screen and keypad for input
○ Screen and printer for output
○ Communication with financial institutions occur via phone line in shop
○ Wireless connection via mobile network
○ Ethernet connection to the internet
○ Public encryption key used for security
➔ Advantages:
○ Makes shopping easier for customers
○ Retailers immediately receive payment for goods
○ Less cash dealing and hence more secure (In terms of cash handling)
➔ Disadvantages:
○ Security issues (can be hacked)
○ Relies on connection to the server (otherwise transaction won't occur)
● Electronic banking
○ Allows customers to view an online interface that in which they can view account balances,
transaction history, transfer money between accounts and make payments
○ Customer's web browser (e.g. internet explorer, chrome) connects directly to the bank's web
server using HTTPS protocol for security (https essentially http protocol + security protocols
(SSL/TLS protocols) in the middle level of protocol stack, using public key encryption)
➔ Advantages:
○ It provides banking services 24/7
○ Physically safe as no money needs to be carried
○ Fast and accessible
➔ Disadvantages:
○ Cannot cater for cash/cheque withdrawals
○ Security issues (may be prone to hacking and network viruses)
➔ Microwaves
○ High frequency radio signal sent through space in a straight line from one antenna to another
○ Transmits both voice and data
○ To relay high frequency signals over large distance, stations are built on mountains/buildings
○ Weather conditions or objects such as trees and buildings obstruct the signal and affect
transmission
○ Can transmit over ragged terrain
➔ Satellite
○ Specialised transmitter and receiver that orbits around the earth
○ A signal is sent from one ground station to the satellite dish, and then the signal is transmitted
to another ground station
○ Used for weather forecasting, television broadcasts
(foxtel), international telephone signals, radio
communications and internet communications
○ Satellite Internet is only used in remote locations
○ Noticeable lag in conversations and so primarily for
emergency land and marine applications
○ High production and launch cost
○ Global Positioning Satellite (GPS) has 24+ of them
to create a grid around earth sending signals to
cars and hand-held navigators
➔ Radio
○ Uses a direct line of sight or a wide area
transmission
○ Direct line of sight = Increased security + energy is saved from not sending in all directions
○ Wide area spread spectrum transmission uses more than one frequency at a time.
○ Spread spectrum radio signals jump from one frequency to another, increasing security and
reduces interference
○ Can be detected in wide area around transmitter
○ Cheap and easy to install but limited range and restricted speed of transmission (6Mbps)
○ Used for contactless smart card readers, remote control toys
➔ Infrared
○ Uses waves with a higher frequency than microwave (for communication purposes), and is
used between portable devices (smartphones), computers as well as remote controls
○ Requires a direct line of sight so it has short range (10m) as it cannot transmit through objects
○ Does not interfere with the transmission of signals from other devices
○ Simple and inexpensive
○ Security is not strong as light pulses which represent binary signals can be easily replicated
and sunlight can interfere with signal
➔ WIFI/WLAN
○ WLANs communicate using microwaves with frequencies in the vicinity of 2.4GHz
○ Form of radio communication and can be used to connect different devices together
○ Is wireless and can connect multiple devices together making it accessible
○ It is more expensive than wired counterparts, but overall will save cost and labor as wires
need maintenance
○ Can be highly susceptible to environmental influences (electromagnetic radiation from
household appliances)
○ Limited area coverage and is not secure if multiple people know the password
○ Speed is limited to 54 Mbps and does not match speeds found in wired transmission methods
(100 Mbps - several Gbps in coaxial or optic fibres), however one of the fastest wireless
transmission speeds
➔ Bluetooth
○ A communication system for short-range transmission and designed to replace the cables
that connect portable devices
○ E.g: car and home audio systems, laptop computers, portable speakers etc
○ First handshaking occurs to establish connection between devices
○ Then frequency hopping occurs, causing the signal to hop over a wide band of frequencies to
minimise interference and if interference does occur, it will occur for longer than 1/1600th of
a second
○ Bluetooth packets include different error checks depending on the connection being used –
some types use a CRC calculated over the entire packet whilst others include error checks
over just the packet’s header data.
❖ Characteristics of media in terms of speed, capacity, cost and security
● Speed
○ Refers to how fast data is sent
○ Bits per second (bps) = number of bits transferred each second
○ It is the speed of binary data transmission
○ Baud rate is the number of signals transferred each second
○ Bandwidth refers to telecommunication in which a wide band of frequencies is able to transmit
information
● Capacity
○ Refers to the max. rate at which data can be transmitted over a given communication path and also
how much can be stored
● Cost
○ Looks at the amount of money required to set up and maintain
○ E.g. optic fibres are expensive to set up and maintain
● Security
○ Refers to protection against interference and interception
○ E.g. optic fibres are immune to interference from electrical signals
➔ Twisted pair
○ 10 mbps to 100 mbps (megabit) , cost is cheap and has some protection from interference
➔ Coaxial Cable
○ Up to 10 Mbps (megabyte), cost Is moderate, substantial protection from interference
➔ Optic fibre cable
○ 10 Mbps to 1 Gbps, cost is expensive, security is high (cannot tap into an optic fibre
transmission without disrupting the signal), completely unaffected by EM interference
➔ Microwave
○ 2-100 Mbps, faster than coaxial cabling and telephone line but inferior to fibre optic, security
is limited (people can intercept easily)
● Gateways
○ Connects 2 networks together that have different protocols
○ A translator for data passing between networks using different protocols
○ Used to connect LAN to internet and the IP address of the gateway is known to all nodes
● Hubs
○ When it receives data from other nodes, it retransmits the data back along the cables on the
network to all computers
○ They’re known as multi-port repeaters and are dumb devices that operate at the physical layer of
the OSI model
○ They make no attempt to identify the destination node for each message
○ All nodes connected to a central hub share the same transmission channel
○ The postmaster taking every piece of mail to every address, asking the resident to pick out the ones
addressed to him/her
○ Causes a lot of traffic and congestion
● Routers
○ Directs messages between different networks with similar protocols over their most efficient path
to the destination
○ Stores information about surrounding networks with similar protocols and the paths it can use to
access them
○ As conditions change (e.g. path congested or drops out), router updates its database so that it can
send data over another path
○ Includes security features such as blocking access to and from website and IPs, preventing data
entering/leaving a network
○ Allows multiple computers in a LAN to connect to the internet
○ Connects networks together
● Switches
○ Sets up a direct connection between sender and receiver and identifies where the data (MAC
address) is to go and sends it to the destination node
○ The intelligent hub, is central connecting point for cables in a star network
○ Reduces the amount of traffic flowing over each cable, resulting in improved data transfer speeds
○ They create a LAN network as they connect all the devices
○ Able to simultaneously receive and forward messages from and to multiple pairs of nodes.
○ Switch is like mail being pre-sorted and then the carrier only brings you what is addressed to you
● Repeater
○ Any device that receives a signal, amplifies it and then transmits the amplified signal down another
link
○ Used to increase the physical range of the transmission media
● Bridge
○ Bridges can connect two LANs together in a simple network topology
○ The bridge enables two devices attached to different LANS that use the same protocol
○ While a switch is between nodes on a network, a bridge is between network/network
segments
● Wireless Access Point (WAP)
○ Central node on a wireless LAN which broadcasts all data packets to all wireless nodes
in the local area (Wireless hub)
○ Connects nodes wirelessly in the covered area and sends data to them
● Digital Data
○ Digital data is represented in the form of 1s and 0s digits
○ Numbers, text and other characters are naturally in digital form
○ Information technology works with data in a digital form
● Analog data to analog signal
○ The wave shape of the data is encoded into the signal
○ If the signal is corrupted, there is no way of restoring the original analog data
○ E.g: Microphone converts a soundwave into an analogue electrical signal, telephone encodes
analog data in the form of sounds into analog signals suitable for the telephone line
● Analog data to digital signal
○ Analog information is transmitted by modulating a continuous transmission signal by amplifying a
signal's strength or varying its frequency to add or take away data
○ The wave shape of the data is encoded into a series of 0s and 1s
○ This process of generating digits or numbers is called digitising
○ Transmitting audio and video data within all types of communication networks are examples of
analog data to digital signal
● Digital data to analogue signal
○ Digital data, in the form of 1s and 0s, is encoded into a continuous analog wave.
○ A modem modulates the digital data from a computer into an analog signal for the telephone line,
does the reverse on the receiving end
➔ Amplitude modulation: varies amplitude to show 1/0, reliable up to 1200bps
➔ Frequency modulation: higher for 1, lower for 0, more tolerant of noisy lines
➔ Phase modulation: changes the phase of the signal cycle when there is a change
● Digital data to digital signal
○ A series of 0s and 1s is transmitted by sending it through a channel as a series of on and off pulses
digital data is encoded into a digital signal by the device which translates it to a series of on/off
pulses (e.g. electrical pulses, light in fibre optics)
○ Digital data can be changed to a digital signal using different voltage levels.
➔ Non return to zero-level (NRZ-L) represents 0 as high voltage, 1 as low voltage
➔ Non return to zero - invert on ones (NRZ-I) uses voltage change at the beginning of a one and
no voltage change at the start of a 0.
➔ Manchester encoding changes signal in the middle of the bit. e.g. 1 starts with a high voltage,
then drops to low. Vice versa.
● Formation of data packets
○ Formed unit of data used for transmission, which is encoded by the protocols installed in a system
for transmission across the network and/or internet
○ Each protocol adds a header and a trailer that may include:
➔ Start bit pattern
➔ Packet number
➔ Address of sender/receiver
➔ Protocol
➔ Error checking code
➔ End bit pattern
● Routing
○ Process of selecting paths in a network along which to send network traffic
○ Finds and uses the best possible route to maximise speed of transmission
❖ Displaying such as:
● Phone as the display device with voice mail
○ Phone displays the received audio though the speaker
● EFTPOS terminal as a display device for electronic banking
○ The EFTPOS terminal displays the requested account details on the screen or prints it in a physical
form (receipt)
➔ Account balance
➔ Transaction details
○ For electronic banking, the EFTPOS terminal will display the type of account selected, amount of
cash to be withdrawn and/or the amount that you wish to spend on the transaction.
○ It asks for the PIN number, displaying messages regarding current processes being performed
within the terminal and then whether the transaction is approved or not
Managing Communication Systems
❖ Network Administration Tasks such as:
➢ Responsible for the ongoing maintenance of network hardware and software.
● Adding/removing users
○ Setting up new user accounts and services and removing old users
○ Allows new users to access the system
○ Reduces clutter by removing older users
● Assigning users to printers
○ Printers can be assigned to specific work stations or to specific users
○ Manages security for printers
○ E.g. protection against intercepting of sent documents
● Giving users file access rights
○ File access rights are also known as permissions.
○ File access rights determine the processes a user can perform on a file or directory at the file
○ level (e.g. which files they can access).
○ Network admin assigns these permissions to ensure that people access what they need to access
○ Permissions are stored on the NOS within an Access Control List (ACL) - specifies who created file
and who has permission to access.
● Installation of software and sharing with users
○ Admins must install appropriate software on each individual workstation so that all/appropriate
users can have access to the software which are used to complete their individual tasks
○ NOS are able to automate the installation of software to multiple users = Saves time for admins
○ Specialised applications can be installed for particular users when the user next logs on
● Client installation and protocol assignment
○ Creation of a client involves installing networking software on a stand-alone computer to allow it to
access the file server on the network
➔ Ensures the system has a compatible network interface card
➔ Ensures operating system is compatible with network operated software
➔ Installing protocols
➔ Connects network with the network interface card
● Logon and logoff procedures
○ Logon used to gain access to a network. The user is identified by entering their ID and password
○ Once verified, the user is granted the level access specific to their account
○ It’s vital for network security, and reduce the risk of unauthorised persons gaining access to the
network.
○ Can also be required when using resources such as printers, modems and certain files.
○ Logoff procedures ensures that all data is correctly saved and programs are closed in the correct
manner
○ Prevents the user's data from being open to others (if not logged off).
○ Some systems may have automatic logoff if they have not used the workstation for a period of time
○ The network must keep passwords secure - password file should be encrypted and protected from
unauthorised access, password change frequently
● Network-based applications
○ Network based applications involve the use of a thin client.
○ It is a network/personal computer without any disk drives
○ It uses a network file server to store all its software and data files to minimise storage usage on
individual machines
○ Since application is stored on the file server, and shared among all the users, there is only one copy
that has to be installed, updated and maintained
Issues Related to Communication Systems
❖ Security
○ Security involves protecting data and individual property from accidental or deliberate abuse
○ Back-up and Lock-up
➔ Negative
○ Security of data must be considered as transferring data over a communication system can
pose security issues if data is intercepted or damaged along the way (use encryption and
backing up data to combat this)
○ Security software – to track and/or disable the smart phone in the event of it being stolen.
○ Smart phone theft – may increase due to the use of the wireless technology
➔ Positive
○ Communication systems have made it more secure to transmit information in some cases,
when compared to physically transmitting information (using electronic banking rather than
shipping money)
○ Communication systems allow this type of information to be transmitted easily and safely (with
safeguards such as encryption)
❖ Globalisation
○ Communication systems are a reason for globalisation
○ Globalisation = removal of physical boundaries, allowing individuals and organisation to be
connected around the globe.
➔ Positive
○ Virtual Communities can be created without regard to geographical location.
○ These can arise due to interest, collaboration purposes or to form relationships.
○ E-commerce is a form of globalisation which allows people to buy overseas, and
communication systems make this possible
○ Telecommuting is where work and employment can be done at a global level while residing
only at home
○ Political power is where communication systems have allowed people from around the globe
to get behind a global cause hence empowering people. A larger amount of people are able to
have their voices heard
➔ Negatives
○ Impacts on local business as globalisation allows larger companies to trade with partners
across the world, but smaller agents and communities may feel disempowered by this
○ Ambiguity of identity - difficult to determine if online businesses are real
○ Language barriers restricts user's ability to understand and communicate with other cultures.
○ Opportunities for E-crime - criminal activity and evasion of tax law can occur due to
exploitation of globalisation
❖ Changing nature of work
○ Communication systems lead to a change in the nature of work
○ E.g: Telecommuting and E-business
➔ Positive
○ Telecommuting allows flexibility for workers
○ Benefits for physically impaired people
○ New jobs are created to manage the systems
➔ Negatives
○ Less interaction with social and professional contact
○ Jobs are lost, no more phone cards
○ Maintenance of the IT equipment needed
❖ Interpersonal relationships
○ Changed the way many form relationships
○ Lack of non-verbal clues (e.g. smiling, winking, laughter etc.) restricting the ability to form
meaningful personal relationships
○ Online dating sites are different to meeting them irl
○ Misinterpretation of reading text msgs and emails rather than hearing it in person
○ Relationships can be affected by access to data/information e.g. private emails and data files
○ Everyone is equal when communicating electronically (disabilities are disregarded)
❖ E-crime
○ There are more opportunities to commit e-crimes like phishing, frauds, scams and spam
○ People are prone to scams and frauds from those who use the anonymity of the internet to hide
their identities
○ Fraud - is a criminal offence but internet fraud is hard to be convicted with and it’s very common
○ Spam - mail/messages convincing users to purchase goods at extremely cheap prices. Users enter
their bank/credit card details, which are stolen by fraudsters
○ Identity theft - form of fraud where someone assumes the identity of someone else.
○ Criminal obtains personal details about the person to convince organisations that they are the
person, enabling the criminal to take out loans, make transactions, purchase goods, withdraw
money from bank etc.
○ Phishing - form of spam where the email contains a message that pretends to be from a trusted
source. Common scam is where the criminal offender pretends to be a particular organisation and
asks recipients to update their details by clicking on the hyperlink. The hyperlink leads to a false
site, which collects the username/password and forwards it to the real criminal organisation's site.
❖ Legal
○ Legal issues such as copyright and ownership of material can arise.
○ Communication systems rely on private and government organisations to provide backbone
connections and data switching systems, so they control the information
○ These corporations have a large amount of power due to their control over much of the world's
news and entertainment media
○ Criminal law – applies in the case of money and/or personal information being stolen or misused.
○ Identity theft – when a person’s identity information is misused to gain financial advantage
○ Criminal activities which break security and legal considerations are identified as e-crime
❖ Virtual communities
○ Communication systems allow the formation of groups across the world.
○ However, activities like on-line dating and media-sharing activities can have negative
consequences.
○ Virtual communities can be created without regards to geographical location.
➔ People with common interests can connect
➔ Collaboration on large projects can occur
➔ Relationships can be formed with people geographically distant
○ However, there can be legal implications such as criminal activities
❖ Current and Emerging Trends in Communications
● Blogs
○ Essentially a journal that is made public by placing it on the web.
○ People regularly update blog to express their personal views/opinions or detail their day-to-day
activities.
○ They’re mostly in date order and is common for people to include a blog on their personal website
● Wikis
○ A website where users are able to freely add new content and edit existing content.
○ Well-known and largest wiki is Wikipedia; an online encyclopaedia created and edited by members
of the public.
○ Information within a wiki is produced by the general public it should never be accepted on face
value; rather alternative sources should be used to verify the accuracy of the information.
● RSS feeds (Really Simple Syndication)
○ Syndication is a process to have content published in many different places.
○ E.g: Neighbours produced in Australia but is syndicated and shown in many other countries.
○ RSS implements a syndication process over the internet - users subscribe to the feed and receive
the data whenever it is published
● Podcasts
○ An audio RSS feed that is automatically downloaded to your computer and copied to your MP3
player as a collection of MP3 files
○ Podcasts deliver audio files in a compressed format - an ideal method for communication over the
internet
○ Podcasts allow users to be in control of what they listen to, when, how and where
○ Typically, podcasters create radio-like audio content on a regular basis, or as a series of programs
Categories of decision-making
❖ Structured
● Decisions are automated
● Decision support systems are not required
○ Problems where ALL variables are known and decisions are automated
○ Solution is reached using an algorithm (a series of steps that will solve the problem in a finite time)
○ Always result in the same solution if the values of the parameters remain the same
○ Do NOT require a DSS
❖ Semi-structured
● There is a method to follow
● Requirements are clear cut
○ They follow a method to reach a decision, but the correct decision is not guaranteed.
○ The requirements are clear cut, but there are too many factors or some unknown factor that may
affect the decision.
○ Requires some degree of subjective judgement
○ Financial investment, weather prediction, horse racing
❖ Unstructured
● There is no method to reach the decision
● Judgements are required
● Requires insights into the problem
○ DSS are used as a guide but will not generally give a definite answer/solution
○ Requires insight into the problem
○ Unstructured decisions require human intuition, feelings, emotions and insight
○ No structured method for reaching a decision, too many variables, many are unknown and their
interactions are highly complex and poorly understood
Examples of decision support
❖ Semi-structured situations, such as:
● A bank officer deciding how much to lend to a customer
○ They assess the risk involved in lending the money and make a decision on the most suitable loan
1. The customer’s income is sufficient to meet the regular repayments
2. The customer’s income will continue at current levels for the term of the loan
3. The bank will be able to recover their funds if the customer is unable to meet their
repayment obligations
● Fingerprint matching
○ Automated fingerprint identification system used to help fingerprint experts match prints
○ It generates a list of possible matchers , but an expert is still sometimes required to make a
decision and use judgement regarding the degree of similarity between the 2 prints
❖ Unstructured situations, such as:
● Predicting stock prices
○ Info. on share prices is stored in a spreadsheet or database used to predict future stock prices
○ Unforeseen events occur which affect decisions made, therefore decisions cannot be guaranteed
○ Data inputs to stock market prediction decision support systems include:
➔ Past sale prices and quantity of shares traded for each public company’s shares
➔ Data specific to individual companies
➔ Industry specific data
➔ Overall historical measures of stock market performance
➔ Advice and predictions from politicians and stock market experts.
● Disaster relief management
○ Disasters unexpected and thus relief organisations generally respond after disaster has occurred
○ Decision making in these situations determine the effectiveness of the response to the disaster
○ DSS’s can
➔ Store data describing the details of the disaster
➔ Actions required to relieve the situation and resources available to perform these actions
❖ Use of systems to support decision making, including:
● Spreadsheets
○ Organises data into one or more worksheets within a grid of columns and rows
○ Valuable for performing “what-if” analysis to alter inputs and view the effect on the outputs
Overall Adv. Businesses Scientists
➔ Calculations are quick and ➔ Perform cost-structure and ➔ Compiling statistical data
accurate with the large break-even analysis ➔ Produce graph results
range of in-built functions ➔ Produce reports ➔ Test and simulate a range
➔ Data is easily formatted ➔ Show and forecast trends of variable conditions
and can be presented with ➔ Prepare and store budgets ➔ Build scientific models of
a variety of graphs/charts ➔ Compile profits and loss data
➔ Data can be copied and statements
integrated with other ➔ Produce and store invoices
programs ➔ Perform ‘What if’ trials
➔ Storage of data + retrieval
is faster and takes up less
space
○ 3 basic types of data to be entered
1. Labels - non-numeric data, text
2. Values - numeric data used in calculations
3. Formulas - carry out calculations
● Databases
○ They enable users to access large amounts of data to make a decision.
○ Retrieving data to make a decision usually requires the use of a query (QBE).
○ Data warehouse is a database that collects information from different data sources. It is a storage
area of raw data that can be analysed to assist organisations to make decisions.
○ Data Mart focuses on a single subject or functional organization area and summarises the data
➔ Meet the needs of an individual system or department in an organisation
○ Data Mining is funding unobvious patterns to make relationships and predictions
➔ Decision Tree Algorithm
➔ Rule Induction
➔ Non-Linear Regression
➔ K-Nearest Neighbour
● Expert systems
○ They provide information and solve problems that would otherwise require a person experienced
in that field (an expert).
○ A software application that simulates the knowledge and experience of a human expert
○ Their conclusions are not guaranteed so it’s up to the user to accept or reject the decision.
○ Low cost compared with the expense of paying an expert specialist team.
○ Two important components are:
○ The knowledge base and the inference engine – a set of general facts and if-then rules supplied by
an expert.
○ The system generates questions using the knowledge base and carries out reasoning using the
inference machine
○ Errors can occur as the expert system cannot adapt to a changing environment
● Neural networks
○ A DSS that uses artificial intelligence to make decisions with the capability of learning
○ An attempt to simulate the complex structure and processes performed by the human brain
○ They process things by going through the input layer, hidden layer, and output layer
○ Trained using sets of sample inputs together with known outputs
○ Once trained the network is able to determine the most likely outputs based on new unseen input
data from interacting with new users
○ They have to ability to match, generalise, cope with new situations
○ Well suited to unstructured situations but need lots of processing time
○ Neural networks have applications in numerous fields including:
➔ Economic forecasting by financial firms
➔ Decision support systems for business, government, research and science
➔ Weather forecasting systems
➔ Voice recognition systems
➔ Predicted sales of products
➔ Handwriting recognition
● Group decision support systems (GDSS)
○ An electronic meeting system designed for large groups of people wanting to collaborate about
complex decision-making issues
○ Each participant at the meeting has access to a computer and can enters their ideas anonymously
for each topic
○ The computer sorts the ideas and displays the results so people can vote for the ideas
○ Can provide participants with a meeting summary at the end by storing, categorising and then
printing out all the ideas, comments and vote tallies
○ Time is saved during the meeting as discussions can occur while the computer is collating results
= increase in the productivity and efficiency of the group.
● Geographic Information Systems (GIS)
○ Represent geographical real world data using maps
○ The system collects data from various sources and interprets it and displays the result on the map
○ Areas of research that benefit from GIS technology include managing resources, scientific
investigations, and planning future developments
○ Used in industries like transport, real estate, surveying and mining
○ Assists users to uncover patterns, relationships and trends by letting users look, and understand,
question and interpret data in a variety of ways
● Management Information Systems (MIS)
○ Summarise data within an organisation’s systems into information to assist in the management of
the organisation’s day-to-day operations
○ Can provide past, present and prediction information to help in decision making
○ Helps the organisation to run more efficiently
○ Solve structured problems
Organising and decision support
❖ Designing Spreadsheets
● Creating a pen and paper model
○ Useful in the first step in planning and constructing a spreadsheet, particularly for deciding on the
layout and design of the interface
● Identifying data sources
○ Data is collected for a spreadsheet from a variety of data sources
○ Sources of data include:
➔ Internet – web sites and newsgroups
➔ Interviews and surveys
➔ Observations and measurements
○ Data should be gathered in an organised way to ensure nothing is omitted
○ After collection, it must be carefully interpreted to ensure the resulting information is valid
● Planning the user interface
○ A spreadsheet must be well designed and easy to use
○ No correct way to design a spreadsheet – each particular problem has its own design requirements
○ Well designed spreadsheet has four areas:
○ Instruction area: provides information about the spreadsheet or directions for the use of the
spreadsheet. Usually at the top and includes a title, description, the authors and the
creation/revision date.
○ Input area: includes labels for headings and the values on which calculations are based.
○ Calculation area: contains the formulas and functions that complete the work of the spreadsheet.
○ Output area: displays the results of the spreadsheet
● Developing formulas to be used
○ A formula is an instruction to perform a calculation.
○ Whenever values are changed, the formulas are recalculated and produce new results.
○ Built-in functions are more effective than user-developed formulas
○ When a formula is copied, the content in its new location may change or it may remain exactly the
same depending on the use of absolute and relative referencing
○ Absolute referencing: the formula is copied exactly, with the cell references the same, using $ to
separate it. So (B9*C3)*$E1$, (B10*C4)*$E1$, (B11*C5)*$E1$
○ Relative referencing: result is based on the location of the input that you entered. So it is just
B9*C3, B10*C4, B11*C5 etc
❖ The knowledge base of if-then rules in an expert system
○ A set of general facts and if-then rules supplied by an expert
○ If the condition is true, then a certain deduction
○ Knowledge base is often constructed using expert system shells that are a ready-made expert
system except that they contain no knowledge
○ They provide an interface to assist the user in creating an expert system. A majority of shells
represent knowledge using if-then rules.
○ When a set of if-then rules is completed, the shell builds a knowledge base and an inference
engine. They allow quick development
○ E.g: IF it has four legs AND it has a tail AND it has fur AND it barks THEN it is a dog
Processing and decision support
● Production Scheduling
○ The timely allocation of resources for the production of all the components
○ All the resources should be present in the required numbers and configurations to allow the
scheduled production to commence at the designated time and be completed within the allocated
time frame
○ Information from sensors is fed to the controlling computers then determine whether everything is
in order for production to proceed on schedule
● Actual production
○ Occurs while sensors are continuously feeding information back to the controlling computers
○ Also interacting with the controlling computers are the actuators, which receive command data
from the controlling computers to activate or deactivate some automated process
❖ The direct users of these systems as
● Supervisors overseeing operation
○ Responsible for overseeing operations and dealing with routine problems; makes sure production
does not fall behind schedule.
○ Monitors system operation in a control room through information provided by the system
○ Are deemed direct users as their task is dependent on the system to provide information
○ They help to reduce cost through assisting the operation to run smoother with less wasted work
and increased final quality.
● People whose task is dependent on the system for information
○ Production supervisors: See above
○ Production planners: analyse information provided by the system to match system production to
customer demands
○ Production designers: use the information system to design the products produced by the AMS,
perhaps using CAD/CAM software
○ Maintenance engineers: fix problems based on detected errors or diagnostic reports
○ People who operate machinery: those who work alongside the machinery to produce the final
product
❖ Ability of these systems to collect data from the environment through a wide range of sensors,
process this data into information and use this information to complete a physical task
● Collecting
○ An input device such as a sensor is used to measure environmental factors
○ Motion, Light, Temperature, Flow
● Processing
○ Microprocessors are used to receive data from sensor and changes the information so it can be
understood
○ E.g: Analog to digital convertor or digital to analog converter
● Performing
○ Actuators are used to carry out the work
○ Take a signal from the controller and create physical motion
○ Accurate positioning is needed at each stage of the assembly line
❖ Use of microprocessors in these systems as the controller
○ Controllers are devices that regulate the operation of the system.
○ Most are microprocessors allowing computer control of input data from sensors, processing of this
data, and signals being sent it to actuators to make changes to the manufacturing process
○ A microprocessor is a computer processor that incorporates the functions of a CPU on a single
integrated circuit, or at most a few integrated circuits
❖ Block diagrams as a tool for describing the interactions between information technology items
within these systems
○ Graphical method used to show the relationships between the processes, controller, sensors and
actuators of an AMS
○ Processes and controller are placed in rectangular boxes
○ Sensors and actuators are represented by circles
○ Arrows show the flow of data or processes between these components
Examples of automated
manufacturing systems
❖ Specific Examples
● Assembly line production such as the car industry
○ Chassis moves along a conveyor belt so that all components are attached in succession, with the
correct rate of supply and correct positioning of all parts
○ Along the line are workstations. Each workstation is assigned a set of processes.
○ As the work in progress moves along the line, more components are assembled and fixed to the
gradually constructed product
● Materials and production scheduling
○ Involves the component materials of a product being assembled and the product itself being put
together while moving along a production line with workstations
○ Participants include the warehouse and assembly line workers, IT staff and so on, who use the
information technology incorporating the robotic and computer hardware and the CAM software
○ Any assembly line production requires sensitive monitoring equipment to detect any breakdown
problems along the line and assess the levels of material supply at each workstation
○ If a workstation suffers a mechanical or electrical breakdown, or doesn’t have enough material the
sensors should detect it
○ Controlled by special computers called programmable logic controllers
○ Programmed to respond to different environments
○ Used for data capture, actuator control and to perform timing and sequencing functions
○ Information needs to be kept about production times, machine maintenance, faults in production
and total number of cars produced
○ Assembly line production maintains good quality control as well as reducing the cost of production,
machines do not need good working conditions, workers are safer
● Automated Warehouse
○ Automated warehouses are used to store and dispatch products where all the stored stock may be
barcoded
○ Each section of the warehouse would be mapped onto central computers where quantity of type of
stock and its location would be recorded in a database, allowing the stock to be easily located
when required
○ By automatically tracing all stock entering and leaving the warehouse, the system is able to inform
management of the following matters:
➔ When stock parts in the warehouse are running low
➔ The turnover rate of particular stocks
➔ Availability of stock for customer orders-some retailers do not stock certain items in shop but
place customer orders for such products directly from the warehouse
➔ Utilise warehouse space efficiently
○ Participants include the warehouse workers and IT staff who use the information technology
incorporating the robotic and computer hardware and software programs
○ Most supervision is still performed by people, with managers and supervisors overseeing the
smooth running of operations.
○ Operators are still needed to carry out certain tasks, but not to the same extent as before
automated warehouses existed
○ The managerial staff may act as operators when the system is for maintenance and provide
management with instant Up-to-date information on stock movement, both inwards and outwards,
as well as about how the warehouse capacity is being used
○ Reasons for automating include better utilisation of warehouse space, safety, productivity gains,
and the resultant cost reductions
● CAD (Computer Aided Design System) /CAM (Computer Aided Design Manufacturing)
○ CAD software allows the user to create drawings of an object to scale and allows for three-
dimensional imaging
○ Architects using CAD software can enter the latitude and longitude of a proposed building and it
can illustrate the light and shadow effects at any season and time of day
○ Engineers or designers may assign different materials to each part and the CAD system is able to
model the properties of each object
○ CAM systems can take a CAD design and translate the design into instructions and data that
computer- controlled machinery can understand
○ The greater the complexity of a CAM system, the greater the flexibility that system offers in the
types of materials and design processes it may be able to handle
○ CAD/CAM systems are a combination of computer- aided design and computer-aided
manufacturing systems.
○ They’re popular in the fashion industry where patterns can be designed using CAD systems
○ The CAM systems control the robot fabric .cutters, cutting many patterns with minimal material
waste
○ Some reasons for using CAD/ CAM systems are
➔ CAD systems provide precise positioning and drawing tools
➔ CAD systems allow designers and engineers to model 'what scenarios with different designs and
materials
➔ CAM systems can take a CAD design and translate it into a series of instructions for computer-
controlled machinery
➔ CAD and CAM systems lead to reduced safety hazards for workers
➔ Consistent quality control is feasible
○ Operator can determine the amount of waste material that will be generated from the operation
○ A disadvantage is that operators require a very high level of training
● CNC (Computer Numerical Control)
○ Converts the design produced by CAD, into numbers to be the coordinates of a graph and they
control the movement of the cutter
○ The computer controls the cutting and shaping of the material
● Rapid prototyping
○ An additive technique used to create physical models of a physical part using 3D CAD data.
○ Prototype is defined as a model of a concept or part, built in order to understand the product
better
○ Software takes a design, and slices it into multiple layers (many digital cross sections)
○ Design sent to the machine where it builds a physical model layer by layer, with a liquid/powder
plasticky material
○ Adds upon each successive layer until final physical 3D model is complete.
● Mail sorting
○ Automated mail sorting requires scanning devices that use OCR and barcode' reader software to
scan postcodes on the mail items
○ Large organisations generates their own barcode
○ Bar-coding mail items ensures faster sorting and delivery times through the postal system
○ Mailed items without postcodes are diverted for human handling
○ Reasons for the automation of mail sorting are:
➔ Faster mail sorting times by program
➔ Cost reduction
➔ Automated systems have the capacity to handle large volumes of mail
➔ Reduction of repetitive tasks
➔ Reduced safety hazards
➔ Quality control
○ Disadvantage = fewer jobs for unskilled labor and automated system cannot cope with mailed
items that lack postcodes
○ The participants include the sorting and loading workers and IT staff who use the information
technology incorporating the robotic hardware and the scanning software.
❖ Reasons for automation
❖ Systems that collect data and information from participants via computer aided design (CAD)
software and directly link this to the rest of the system through computer aided manufacture (CAM)
○ CAD/CAM systems rely on data needs to be collected, processed in the design stage and passed on
to the manufacturing stage
○ The integration of CAD and CAM enables the manufacturing process to be fully automated
○ Some data is collected from participants CAD software and linked to for use by CAM software
○ Other data is collected V18 sensors.
❖ Identification of the data to be collected and the most appropriate input device
○ Identifying the types and forms of data to be collected is a critical element when planning the most
appropriate input device for an automated system
○ If the automated system is to replace a manual or only partly automated one, then the human
workers and their supervisors are often the best source of useful information about the strengths
and weaknesses of existing systems and the requirements of proposed ones
❖ Physical operation and scientific principle(s) underlying sensors used to collect data, including:
● Sensors/Transducers
○ Sensors are input devices that measure data from the environment
○ They convert input provided by the environment into a signal that can be communicated to a
control program.
○ They convert one physical quantity into another
● Temperature
○ Temperature sensors are devices that measure the temperature of the air, a fluid or an object
○ Temperature is detected using the resistance of a conductor
➔ Thermostats
○ Two different types of metal strips (bimetallic) which
adhere to each other
○ Bends as it heats up (bent and contact broken) or cools down (strip straight and in contact),
due to the different expansion rates of the two metals
○ Switches that respond and remain open until
a certain adjustable temperature threshold is
reached, upon which the switches close
○ switch can turn mains electrical power on and
off when the temperature moves beyond the
set level. E.g. refrigerators and stoves
➔Thermistors
○A resistor that changes resistance in response to changing temperature
○Thermistors are connected to electrical circuitry that enables devices to be turned on or off
○Resistance drops lower as temperature increases
➔Thermocouples
○Consists of two different metals welded together
joined at two points
○ When heated, a small electric voltage is generated,
proportional to the heat increase
➔ Semiconductors
○ Which are silicon chips that improve their electrical
conductivity as the temperature increases
○ Used to sense temperature in devices such as DVD players
● Pressure
○ Since pressure may need to detected in liquid, gases, and solids, sensors
were created
➔ Manometre
○ Uses a U-shaped tube to detect gas pressure differences between
points 1 and 2
➔ Diaphragms
○ Based on an elastic component which alters
its shape as the pressure pushing on it alters
○ As the pressure increases the is deformed
more and the electric signal increases
➔ Piezoelectric crystals
○ Quartz crystals are placed between two
plates to produce an electric current when deformed by pressure
○ Greater the pressure, the larger the current generated
➔ Strain Gauges
○ Operate via a thin metal strip being deformed by pressure and
altering its electrical resistance as a result
● Motion
○ Motion sensors, or velocity sensors, are devices that measure the rate
of change of position. They calculate how far an object has moved from a starting position
➔ Linear Potentiometer
○ Generally uses a layer of resistive material in proportion to its length
○ As the sliding part moves, the resistance alters, reducing as the slider moves to the right
○ If the linear potentiometer is curved around into a circle, we call it a tachometer, and it
measures revolutions of the slider or arm
○ If we place several of these at right angles to each other, then rotation in two dimension can
be accurately measured, as in the detection if ball roll direction in a computer mouse
➔ Magnetic Transducers
○ Are devices in which the magnetic field is altered in proportion to the size of the movement,
when one part moves relative to the
another
○ As the metal arm moves through the wire
coil, the magnetic field strength is
changed measurably on the meter
➔ Accelerometer
○ Operates on the effect of inertia of the object (its resistance to motion) to produce a
measurable force
○ This can be achieved using a strain gauge to detect the change in velocity or acceleration
➔ Gyroscope
○ Consists of a rapidly spinning wheels set in three directions
○ Once again, the inertia allows detection if changes in motion in any of the dimensions
➔ Contacts
○ On and off switches that require a small amount of pressure to close, like reed switches
attached to doors and windows in home security systems
● Proximity Sensors
○ Used to determine when two objects are getting close to each other
○ E.g. Lift and the floor at which it would stop
➔ Optical or Light Sensors:
○ works in two main ways
○ First, moving object breaks a light beam (or series of
them) and thus its position is known
○ Second, a light beam is directed at the object and the
degree of reflected light is measured by the light sensor
❖ Damping as the process that modifies the signal to the output device based on the input signal
○ A technique used to control the operation devices (actuators) and process of modifying the signal
to the output device based on the input sensor signals
○ Important aspect of damping is the rate at which the system responds to the controller
○ Controller responds to the sensor input and adapts the output to the actuator/s quickly = feedback
○ Too rapid feedback = system output to fluctuate wildly
○ The controller is too slow at malting changes to the output = system takes too long to return to
correct operations
❖ Types of Damping
➢ Purpose = modify the magnitude of response in an actuator such as a motor that opens and closes
a gate. Ensures the smooth operation of the components, minimising severe or jerky movements,
decreased vibration, bouncing or potentially damaging acceleration during movement.
● Underdamping
○ A quick response to change leading to rapid fluctuations
○ The change or command to stop is received too late and the target is overshot
○ E.g: door closes too quickly hitting someone’s heels
● Overdamping
○ A slow response to change without fluctuations
○ Sensors data is modified too much so the actuator takes longer to reach the desired target point
○ E.g: door closes too slowly causing flies to come in
● Critical damping
○ A quick response to change and quick return to stability
○ Damping level is such that a desired rate of change occurs in the output of the system
○ Effective removal of fluctuations enable AMS to return to its normal state
○ E.g: door closes at the right moment so no flies and no hits
Other information processes in manufacturing systems
Glossary:
Actuators = Specialised display devices that perform a mechanical action under the control of the system.
They perform the actual work of the system and are output devices
Sensors = Sensors are input devices. They detect light, heat, pressure etc. Sensors need to receive the
data in order to activate an actuator to work
Controller = Controllers process the data given by the sensor and send sout the resulting signals to
actuators in order to make changes to the manufacturing process
Relational Database = collection of 2D tables that organises data through relationships to provide
flexibility in manipulating data. It allows you to manage multiple DBs and manipulate data by searching
and sorting.
Flat-file Database = Organises all data into a single table where rows are divided into fields and is suitable
for small applications with basic processing