Sie sind auf Seite 1von 14

Centre for Continuing Education Executive MBA (POWER Management) Batch: __2011-2013_____________________ Semester: ________II_______________ Name: _MUDDAMALLE PAUL

PRANEETH Sap No/Regn No: ____500019813__ Assignment 1 Subject: IT Application in Power Subject code: MBPI 901

University of Petroleum & Energy Studies

Section A
Write short notes on: a) Switches: A network switch or switching hub is a computer networking device that connects network segments or network devices. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (layer 3) and above are often referred to as layer-3 switches or multilayer switches. A switch is a telecommunication device which receives a message from any device connected to it and then transmits the message only to that device for which the message was meant. This makes the switch a more intelligent device than hub (which receives a message and then transmits it to all the other devices on its network.) The network switch plays an integral part in most modern Ethernet local area networks(LANs). Mid-to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO) applications typically use a single switch, or an all-purpose converged device such as a residential gateway to access small office/home broadband services such asDSL or cable internet. In most of these cases, the enduser device contains a router and components that interface to the particular physical broadband technology. User devices may also include a telephone interface for VoIP. An Ethernet switch operates at the data link layer of the OSI model to create a separate collision domain for each switch port. With 4 computers (e.g., A, B, C, and D) on 4 switch ports, A and B can transfer data back and forth, while C and D also do so simultaneously, and the two conversations will not interfere with one another. In the case of a hub, they would all share the bandwidth and run in half duplex, resulting in collisions, which would then necessitate retransmissions. Using a switch is called microsegmentation. This allows computers to have dedicated bandwidth on a point-to-point connections to the network and to therefore run in full duplex without collisions. Switches may operate at one or more layers of the OSI model, including data link and network. A device that operates simultaneously at more than one of these layers is known as a multilayer switch. In other cases, the switch is used to create a mirror image of data that can go to an external device. Since most switch port mirroring provides only one mirrored stream, network hubs can be useful for fanning out data to several read-only analyzers, such as intrusion detection systems and packet sniffers.

b) Network Attached Storage (NAS): Network-attached storage (NAS) is file-level computer data storage connected to a computer network providing data access to heterogeneous clients. NAS not only operates as a file server, but is specialized for this task either by its hardware, software, or configuration of those

elements. NAS is often made as a computer appliance a specialized computer built from the ground up for storing and serving files rather than simply a general purpose computer being used for the role.[nb 1] As of 2010 NAS devices are gaining popularity, as a convenient method of sharing files among multiple computers.[1] Potential benefits of network-attached storage, compared to file servers, include faster data access, easier administration, and simple configuration.[2] NAS systems are networked appliances which contain one or more hard drives, often arranged into logical, redundant storage containers or RAID arrays. Network-attached storage removes the responsibility of file serving from other servers on the network. They typically provide access to files using network file sharing protocols such as NFS, SMB/CIFS, or AFP. A Network Attached Storage (NAS) unit is a computer connected to a network that only provides file-based data storage services to other devices on the network. Although it may technically be possible to run other software on a NAS unit, it is not designed to be a general purpose server. For example, NAS units usually do not have a keyboard or display, and are controlled and configured over the network, often using a browser.[3] A fully featured operating system is not needed on a NAS device, so often a stripped-down operating system is used. For example, FreeNAS, an open source NAS solution designed for commodity PC hardware, is implemented as a stripped-down version of FreeBSD.

c) Windows 2000 Windows 2000 is a line of operating systems produced by Microsoft for use on personal computers, business desktops, laptops, and servers. Windows 2000 was released to manufacturing on 15 December 1999[3] and launched to retail on 17 February 2000.[4] It is the successor to Windows NT 4.0, and is the final release of Microsoft Windows to display the "Windows NT" designation.[5] It was succeeded byWindows XP for desktop systems in October 2001 and Windows Server 2003 for servers in April 2003. Windows Me was released seven months after Windows 2000 and one year before Windows XP, but Windows Me was not intended to be, nor did it serve as the successor to Windows 2000. Windows Me was designed for home use, while Windows 2000 was designed for business.[6] Four editions of Windows 2000 were released, listed here in increasing ranking:Professional, Server, Advanced Server, and Datacenter Server.[7] Additionally, Microsoft sold Windows 2000 Advanced Server Limited Edition and Windows 2000Datacenter Server Limited Edition, which ran on 64-bit Intel Itanium microprocessorsand were released in 2001.[8] While each edition of Windows 2000 was targeted at a different market, they shared a core set of features, including many system utilities such as the Microsoft Management Console and standard system administrationapplications.

d) Optical Fiber An optical fiber (or optical fibre) is a flexible, transparent fiber made of a pure glass (silica) not much thicker than a human hair. It functions as a waveguide, or light pipe[1], to transmit light between the two ends of the fiber.[2] The field of applied science and engineering concerned with the design and application of optical fibers is known as fiber optics. Optical fibers are widely used in fiber-optic communications, which permits transmission over longer distances and at higherbandwidths (data rates) than other forms of communication. Fibers are used instead of metal wires because signals travel along them with less loss and are also immune to electromagnetic interference. Fibers are also used for illumination, and are wrapped in bundles so that they may be used to carry images, thus allowing viewing in confined spaces. Specially-designed fibers are used for a variety of other applications, including sensors and fiber lasers. An optical fiber junction box. The yellow cables are single mode fibers; the orange and blue cables are multi-mode fibers: 50/125 m OM2 and 50/125 m OM3 fibers respectively. Optical fibers typically include a transparent core surrounded by a transparent cladding material with a lower index of refraction. Light is kept in the core by total internal reflection. This causes the fiber to act as a waveguide. Fibers that support many propagation paths or transverse modes are called multi-mode fibers (MMF), while those that only support a single mode are called single-mode fibers (SMF). Multi-mode fibers generally have a wider core diameter, and are used for short-distance communication links and for applications where high power must be transmitted. Single-mode fibers are used for most communication links longer than 1,050 meters (3,440 ft). Joining lengths of optical fiber is more complex than joining electrical wire or cable. The ends of the fibers must be carefully cleaved, and then spliced together, either mechanically or by fusingthem with heat.

SECTION B
Q1)describe wireless banking. Wireless Internet banking, commonly called wireless banking, allows customers to access account information and perform transactions over the Internet using a mobile phone or a personal digital assistant (PDA) instead of a personal computer. Wireless banking is relatively new and rapidly evolving. Mobile phone service can connect to your bank in a variety of ways. In some cases, your mobile phone uses your Internet service provider to dial up and connect to a Web server located at your bank. Alternatively, you may be given a special access telephone number to dial, and your bank may act as the Internet service provider. In either case, once you are connected, you enter your request using the keypad of your mobile phone or PDA. Wireless banking provides most of the services on-line banking provides, and may also include:

Information notification and alerts prompting you to view balances, see whether checks have cleared, and receive e-mail messages about deposits and other changes to accounts On-demand transactions allowing you to transfer money from one account to another, make electronic payments, and perform transactions just as in on-line banking, but by using a mobile phone or PDA

Wireless banking involves the same security and privacy issues as on-line banking with a PC. Unlike PCs, however, mobile phones and PDAs are small and easily lost or stolen, making it even more important that a password be required to access account information or perform transactions. In addition, check to ensure that the information being sent to you is encrypted. The implementation choices a bank makes once it decides to enter mobile banking from a strategic point of view focuses fundamentally on customer usability and security. In all of these decisions, it is important to remember that technology choices can condition the customer experience, the banks operational processes, the relative bargaining power between bank and mobile operator, and service interoperability. Technical Decision #1: Wireless bearer The wireless bearer is the communications channel that is used to transmit data to and from the mobile terminal over the air. The choice of bearer channel is important because it affects the speed, the reliability, the cost and the security of the mobile banking application. Technical Decision #2: Encryption standards Adequately protecting the data on the transmission channel is essential both to provide for the necessary customer trust and to limit the potential liability to the bank. Technical Decision #3: Application environment The application environment is the software platform that controls how the service is presented

to the users handset and the interactions between the user and the banks server. The choice of the application environment affects the user interface, the speed of service, the ease of set up and the ease of upgrading.The main types of mobile banking implementations in the market today are summarized in the table below:

Account information 1. Mini-statements and checking of account history 2. Alerts on account activity or passing of set thresholds 3. Monitoring of term deposits 4. Access to loan statements 5. Access to card statements 6. Mutual funds / equity statements 7. Insurance policy management 8. Pension plan management 9. Status on cheque, stop payment on cheque 10. Ordering cheque books 11. Balance checking in the account 12. Recent transactions 13. Due date of payment (functionality for stop, change and deleting of payments) 14. PIN provision, Change of PIN and reminder over the Internet 15. Blocking of (lost, stolen) cards Payments, deposits, withdrawals, and transfers 1. Domestic and international fund transfers 2. Micro-payment handling 3. Mobile recharging 4. Commercial payment processing 5. Bill payment processing 6. Peer to Peer payments 7. Withdrawal at banking agent 8. Deposit at banking agent Investments 1. Portfolio management services 2. Real-time stock quotes 3. Personalized alerts and notifications on security prices Support 1. Status of requests for credit, including mortgage approval, and insurance coverage 2. Check (cheque) book and card requests 3. Exchange of data messages and email, including complaint submission and tracking

4. ATM Location Content services 1. General information such as weather updates, news 2. Loyalty-related offers 3. Location-based services

Q3) List the major characteristics of Functional Information Systems. Describe role of HR System in Power Sector. Traditionally, IS were designed within each functional area to increase their internal effectiveness & efficiency This may not suit some organizations, because certain processes may involve activities that are performed in several functional areas Solution 1: Reengineer the organization o For example, the company can create cross-functional teams, each responsible for performing a complete business process. Solution 2: The integrated approach (e.g. Colonial on pg 276). Keeps the functional departments but creates a supportive information system to help communication, coordination, and control. Characteristics of Functional IS: A functional information system consists of several smaller information systems that support specific activities performed in the functional area. The specific IS applications in any functional area can be integrated to form a coherent departmental functional system, or they can be completely independent Functional information systems interface with each other to form the organization-wide information system. Some organizational information systems interface with the environment. Information systems applications support the three levels of an organizations activities: operational, managerial, and strategic.

Human Resource Systems in power sector: Developments in Web-based systems increased the popularity of human resources information systems (HRISs) as of the late 1990s. Initial HRIS applications were mainly related to transaction processing systems. o However, in the last decade we have seen considerable computerization activities in the managerial and even strategic areas Using the Web for Recruitment o With millions of resumes available online, companies are trying to find appropriate candidates on the Web. Position Inventory o Large organizations need to fill vacant positions frequently. An advanced intranet-based position inventory system keeps the position inventory list current & matches openings. Employee Selection o To expedite the testing and evaluation process and ensure consistency in selection, companies use information technologies such as expert systems Performance Evaluation

o Once digitized, evaluations can be used to support many decisions, ranging from rewards to transfers to layoffs. Training and Human Resources Development o IT can support the planning, monitoring, and control of training and retraining activities by using workflow applications. o Intelligent computer-aided instruction (ICAI) and application of multimedia support for instructional activities. o Training can be improved using Web-based video clips & virtual reality. Personnel Planning o Large companies develop qualitative and quantitative workforce planning models, which can be enhanced if IT is used to collect, update, and process the information LaborManagement Negotiations o Some companies have developed computerized DSS models that support negotiations o These models can simulate financial & other impacts of fulfilling any demand made by employees and provide answers to queries in seconds Benefits Administration o Using computers for benefits selection can save a tremendous amount of labor and time Some companies have automated benefits enrollments

Q4) components and process of a TPS. A transaction processing system is a type of information system. TPSs collect, store, modify, and retrieve the transactions of an organization. A transaction is an event that generates or modifies data that is eventually stored in an information system. To be considered a transaction processing system the computer must pass the ACID test. The essence of a transaction program is that it manages data that must be left in a consistent state, e.g. if an electronic payment is made, the amount must be both withdrawn from one account and added to the other; it cannot complete only one of those steps. Either both must occur, or neither. In case of a failure preventing transaction completion, the partially executed transaction must be 'rolled back' by the TPS. While this type of integrity must be provided also for batch transaction processing, it is particularly important for online processing: if e.g. an airline seat reservation system is accessed by multiple operators, after an empty seat inquiry, the seat reservation data must be locked until the reservation is made, otherwise another user may get the impression a seat is still free while it is actually being booked at the time. Without proper transaction monitoring, double bookings may occur. Other transaction monitor functions include deadlock detection and resolution (deadlocks may be inevitable in certain cases of cross-dependence on data), and transaction logging (in 'journals') for 'forward recovery' in case of massive failures. Transaction Processing is not limited to application programs. The 'journaled file system' provided with IBMs AIX Unix operating system employs similar techniques to maintain file system integrity, including a journal. Transaction Processing Systems (TPS) The information system that support business processes, mainly accounting & finance transactions, with some sales, personnel, & production activities as well TPS is the backbone of an organizations information systems It monitors, collects, stores, processes & disseminates information for all routine core business transactions. These data are input data to functional information systems applications, DSS, and CRM

Contrasted with batch processing Batch processing is a form of transaction processing. Batch processing involves processing several transactions at the same time, and the results of each transaction are not immediately available when the transaction is being entered;[1] there is a time delay. Transactions are accumulated for a certain period (say for day) where updates are made especially after work. Online transaction processing is the form of transaction processing that processes data as it becomes available. Real-time and batch processing

There are a number of differences between real-time and batch processing. These are outlined below: Each transaction in real-time processing is unique. It is not part of a group of transactions, even though those transactions are processed in the same manner. Transactions in real-time processing are stand-alone both in the entry to the system and also in the handling of output. Real-time processing requires the master file to be available more often for updating and reference than batch processing. The database is not accessible all of the time for batch processing. Real-time processing has fewer errors than batch processing, as transaction data is validated and entered immediately. With batch processing, the data is organised and stored before the master file is updated. Errors can occur during these steps. Infrequent errors may occur in real-time processing; however, they are often tolerated. It is not practical to shut down the system for infrequent errors. More computer operators are required in real-time processing, as the operations are not centralised. It is more difficult to maintain a real-time processing system than a batch processing system. Any transaction processing system (TPS) that uses the Kernel Transaction Manager (KTM) and the Common Log File System (CLFS) should contain the following important components: A transaction manager (KTM) KTM tracks the state of each transaction and coordinates recovery operations after a system crash. One or more resource managers Resource managers, which you provide, manage the data that is associated with each transaction. One or more CLFS log streams The transaction manager and resource managers use CLFS log streams to record information that can be used to commit, roll back, or recover a transaction. One or more transactional clients Typically, each transactional client of your TPS can create a transaction, perform operations on data within the context of the transaction, and then initiate either a commit or rollback operation for the transaction.

Q6. Assume youre interested in buying a car. You can find information about cars at autos.msn.com. Go to autoweb.com or autobytel.com for information about financing and insurance. Decide what car you want to buy. Configure your car by going to the car manufacturers website. Finally, try to find the car from autobytel.com. What information is most supportive of your decision-making process? Write a report about your experience. Information technology provides a platform for a company to connect the global world with Internet. Internet has a wide range of customers, buyers, service providers, technical staff, etc.

Information system and technology provide various channels to communication like E-mail, Instant messages, SMS servers, etc to all employees at any time all over the world. This type of software helps to saving time and cost. Of the company Software are very important for a company for instant Information of stocks, assets valuation, sales, purchases, and service. Decision making is very easy to the management after IT because its provide latest information to the management for employee, stocks, sales, purchase, and services, etc

The availability of insurance company choices on the internet is great and has helped the insurance consumer learn more about insurance and make more informed choices. However, sometimes the insurance choices and availability can be overwhelming and a good number of insurance consumers choose to just stick with a local agent. Deciding to purchase insurance online or with an agent can be a tough decision. There are advantages to getting ones insurance online. Getting insurance online does open up more choices and can sometimes save time. Also, the ability to get instant insurance quotes from multiple insurance companies can help one get the best price on the insurance plan they want. On going to the multiple financing sites many new options for financing at different favorable prices of interest & payback periods gives a viable option to buy a car.

Q7. Case Study 1. What is the primary driver behind the Web upgrade activities of Microsoft and Dell? Probably the major driver is to become more responsive to customer needs. Tied to that are other activities supporting that goal, such as: Improving the functionality of the websites up to desktop-application standards as opposed to traditional web computing (limited functionality, static pages, etc) Developing a variety of communication avenues, both to push information to interested parties and to learn about their needs and worries Creating a consistent one-look interface that can accommodate dynamic content without ever losing its consistency Fine-tuning the back-end to improve response times and scale activities throughout the organization, freeing resources for more value-added activities 2. What is the business value of Microsofts Web-based, live feedback program? The main payoff from that program is the communication to and from selected users, those who are either technically up-to-date and will be making recommendations, and those who will be making decisions when purchase-time comes. Microsoft is able to push new initiatives to them and also garner well-informed feedback. That is why this program is restricted to handpicked users. 3.What lessons on developing successful e-commerce projects can be gained from the information in this case? Examples could include: Focus on what the customer needs as opposed to what the company wants to provide Successful e-commerce projects are those that develop once and take advantage of economies of scale and mass-customization to provide localized content within a globalized infrastructure As the capabilities of the Web increase (in terms of what is able to do as opposed to its traditional role) companies need to meet new standards of functionality above and beyond static web pages and slow response times

Das könnte Ihnen auch gefallen