Free Essay

Crc Computations

In:

Submitted By logger
Words 2530
Pages 11
Introductıon to telecommunıcatıon - cse040 | Lab Project Report | Cyclic Redundancy Check | | 0701020045 Berat Özbay | 25/4/2012 |

Contents 1. Introduction: The Need for Error Detection 3 1.1 Error detection process 3 1.2 Types of errors 4 1.2.1 Single bit error 4 1.2.2 Burst error 4 2. Cyclic Redundancy Check 4 2.1 Background 4 2.2 Idea behind the CRC 5 2.3 CRC Algorithm 5 2.3.1 Modulo 2 Arithmetic 6 2.3.2 Polynomial representation 8 2.3.3 Digital Logic 9 2.4 Why CRC works 10 3. The Generator Polynomial and Error Detection Capabilities 10 3.1 Kinds of error CRC detects 10 4. References 11

1. Introduction: The Need for Error Detection
In communication systems, data transmitted over a channel will be exposed to transmission impairments. The most significant impairments are attenuation, delay distortion and noise. These impairments cause the received signal to be different than the transmitted signal which is not a desired situation. An error detection technique allows the receiver to determine if the received data is corrupted or not.
1.1 Error detection process
To enable detection of errors, an error detection technique appends (n - k) extra bits to k data bits to be transmitted, creating an n bit frame. Appended bits are called redundant bits because they do not change the data bits and discarded by the receiver as soon as the integrity of the data bits is determined. Redundant bits (also called the checksum) are computed as a function of data bits to be sent. Receiver applies the same function used by the transmitter to data bits and compares the result to redundant bits. If they match there is no error, if they do not match an error is detected.

1.2 Types of errors
There are two general types of errors which an error detection technique must consider.
1.2.1 Single bit error
A single bit error means only 1 bit of a given message is flipped. Single bit errors are least likely to happen in serial transmission systems. For example, an impulse noise event that last 0.5 microseconds on a cable at a data rate of 100Mbps would cause 0.5/0.01 = 50 consecutive erroneous bits. To have a single bit error at 100Mbps duration of the noise event must be 0.01 microseconds, which is very hard to happen.
1.2.2 Burst error
Burst error is defined as a group of two corrupted bits that are separated by k bits. Intermediate bits do not have to be erroneous. In the above example an impulse noise event that last 0.5 microseconds on a cable at a data rate of 100Mbps caused 0.5/0.01 = 50 consecutive erroneous bits. That is a burst error of size 50. Higher data rates cause the effects of burst errors to be greater.
2. Cyclic Redundancy Check
Cyclic redundancy check (CRC) is a very common and powerful error detecting technique for digital data. CRC follows the common error detection process. It generates (n - k) redundant bits (called frame check sequence) to a given k bit message, resulting in an n bit frame that is exactly divisible by some predetermined number.
2.1 Background
The simplest error detection technique, parity checking, makes the total number of ‘1’s in a bit sequence even or odd. If a message sent with even parity, number of ‘1’s including the parity bit is even. If a message sent with odd parity, number of ‘1’s including the parity bit is odd. The parity bit can be generated easily with XOR gates.
An example of a transmission sent using even parity is as follows: * Suppose station A wants to transmit the bit sequence 0100 to station B. * A computes the parity bit:

* A appends the parity bit to the message and sends 01001.
Notice that the sent message has even number of ‘1’s. * B receives corrupted bit sequence 11001. Corrupted message has odd number of ‘1’s!

* B computes parity of the received message and determines that the received data has odd number of ‘1’s instead of even number of ‘1’s.

* B request retransmission of the message.
Parity check can detect all odd number of single bit errors but fails if even number of errors occurs. It can be seen that parity checking is not a good method for detecting burst errors which happens more often at high data rates. These disadvantages of parity check method leads to necessity of a more capable error detection method. Cyclic redundancy code is developed to satisfy that necessity.
2.2 Idea behind the CRC
The idea behind the cyclic redundancy check is actually a very simple one. Assume the message to be transmitted is a binary number. Divide that number by a predetermined divisor. Remainder of the division operation is the frame check sequence (FCS). Receiver divides whole frame by the same predetermined binary number. If it the remainder is zero there are no errors. If it is not zero an error (or more than one error) has occurred. Because CRC is an error detection algorithm, it only adds just enough redundant bits to determine whether an error occurred or not, location of the erroneous bits are irrelevant.
2.3 CRC Algorithm
Before starting some definitions must be made: * T = n-bit frame to be transmitted * D = k-bit block of message to be sent, the first k bits of T * F = (n – k)-bit FCS, the last (n - k) bits of T * P = pattern of n – k + 1 bits; this is the predetermined divisor. Also called the generator. First and last bits must be 1.

1. Multiply D by2(n-k). This will ensure that every bit of D will be processed.
This is equivalent to padding D with (n - k) zeros. 2. Divide 2(n-k)D by P using modulo 2 arithmetic.
Remainder of the division operation is the F. 3. Replace the last (n - k) bits of 2(n-k)D with F
Resulting binary sequence is the T. 4. Send T to receiver.
T = 2(n-k)D+F 5. Receiver divides T by P. If the remainder is zero there is no error. If it is not an error is detected.
The reason modulo 2 arithmetic used is because it always gives a remainder of length less than the generator polynomial. It is also easy to implement in digital logic.
CRC process can be expressed in 3 equivalent ways: Modulo 2 arithmetic, polynomials, and digital logic.
2.3.1 Modulo 2 Arithmetic
Modulo 2 arithmetic uses binary arithmetic with no carries. Without carries, there are only four cases for addition and subtraction operations. This is equivalent to XOR operation.
0 + 0 = 0 0 – 0 = 0
0 + 1 = 1 0 – 1 = 1
1 + 0 = 1 1 – 0 = 1
1 + 1 = 0 1 – 1 = 0
It can be seen that both addition and subtraction operation yields the same result. With these properties, even it is clear that (11100)2 is greater than(100)2, it is not possible to say (11100)2 is greater than(11010)2 in modulo 2 arithmetic. Because both (11100)2-(110)2 =(11010)2 and (11100)2+(110)2=(11010)2 give the same result. This is characteristic of modulo 2 arithmetic be defined as: For a number to be same or greater than another number, its highest bit position which holds a ‘1’ must be the same or greater than the other number’s highest bit position which holds a ‘1’.

2.3.1.1 Example CRC computation

D = 100011011 (k = 9 bits)
P = 11001 (n – k + 1 = 5 bits)
F = to be calculated (n - k = 4 bits)
T = to be calculated (n = 13 bits)

Transmitter: 1. 24D=1000110110000

Quotient is not important _ _ _ _ _ _ _ _ _ 2. 11001 | 1000110110000 11001 | | | | | | | | 10001 | | | | | | | 11001 | | | | | | | 10000 | | | | | | 11001 | | | | | | 10011 | | | | | 11001 | | | | | 10101 | | | | 11001 | | | | 11000 | | | 11001 | | | 10 | | 00 | | 100 | 000 | 1000 <- F

3. T = 1000110111000

Receiver divides the frame by P:
Quotient is not important

_ _ _ _ _ _ _ _ _
11001 | 1000110111000 11001 | | | | | | | | 10001 | | | | | | | 11001 | | | | | | | 10000 | | | | | | 11001 | | | | | | 10011 | | | | | 11001 | | | | | 10101 | | | | 11001 | | | | 11001 | | | 11001 | | | 00 | | 00 | | 000 | 000 | 0000 <- F

Because T divided by P resulted in 0, frame is not corrupted.
2.3.2 Polynomial representation
Another way of representing the CRC process is to use polynomials with binary coefficients. The coefficients of the polynomials are the bits, and the power of the variable shows the position of the bit in the message D. If we redefine the variables for polynomial representation * T(X) = n-bit frame to be transmitted becomes degree of n-1 polynomial.
T(X) = Xn-kDX+F(X) * D(X) = k-bit block of message to be sent, the first k bits of T becomes degree of k-1 polynomial. * F(X) = (n – k)-bit FCS, degree of less than (n - k) polynomial. * P(X) = pattern of n – k + 1 bits becomes degree of (n – k) polynomial, it is called the generator polynomial. Must have non-zero constant term.

2.3.2.1 Example CRC computation
D(X) = 110111 = X5+X4+0X3+X2+X+1 (degree of 5)
P(X) = 11101 = X4+X3+X2+0X+1 (degree of 4)
F(X) = to be calculated (degree of less than 4) (in modulo 2 arithmetic F is 0010 so F(x) should be X1+0X0 = X)
T(X) = to be calculated (degree of 9)

1. X4DX= X9+X8+0X7+X6+X5+X4

X5+X3+X 2. X4+X3+X2+0X+1 ) X9+X8+0X7+X6+X5+X4 X9+X8+X7+0X6+X5 X7+X6+0X5+ X4 X7+X6+ X5+ 0X4+X3 X5+X4+X3 X5+X4+X3+0X2+X X <- F(x)

3. T(x) = X9+X8+X6+X5+X4+X = 1101110010
Extra zeros are added on the left to make the FCS field have length (n - k) bit

2.3.3 Digital Logic
If the division operation in the section “2.3.1.1 Example CRC computation” examined, it can be seen that we only XOR’ed (same thing as subtracting in modulo 2 arithmetic) various shifts of the generator polynomial with the message until the message is less than the generator polynomial (producing the remainder). This operation can be implemented with a circuit consisting of a shift register and XOR gates.(A group of flip-flop connected in a row forms a shift register)
A CRC circuit consists of: * A shift register of (n - k) bits (flip-flops), same as the degree of the generator polynomial, which is also the length of the FCS. * Excluding the terms Xn-k and 1, coefficients of the generator polynomial determines the numbers and locations of the XOR gates. The constant term 1 means the message will XOR’ed before feeding it to the register. Output of the register’s last bit(most significant bit) goes back into all XOR gates, this way the polynomial XOR’ed (subtracted in modulo 2) to the bits in the register when the value of the bits in register is greater or equal to the generator polynomial.

2.3.3.1 Example circuit design for CRC-8-CCITT
CRC-8-CCITT is used for the calculation of the header error control field (i.e. the FCS) in ATM cells.
CRC-8-CCITT: X8+X2+X+1
So, to implement a CRC circuit for the above polynomial we need an 8-bit shift register and XOR gates at the outputs of the first and second flip flop. And the constant term 1 requires an XOR gate at the input.
X2
X

2.4 Why CRC works
Message to be transmitted after the CRC computation is TX=Xn-kDX+F(X) and we want TX mod P(X)=0.
In the second step of the CRC algorithm Xn-kD(X) is divided by P(X). This operation gives a quotient of Q(X) and a remainder of F(X) so, we can say Xn-kD(X)=P(X)QX+ F(X) which gives us TX=PXQX+ FX+FX= PXQX+2FX. However, all operations in CRC computations use modulo 2 arithmetic so the last equations becomes: TX=PXQX+0FX=PXQ(X). If divide T(X) by P(X) we got,
T(X)P(X)=PXQ(X)P(X)=Q(X) and no remainder.
3. The Generator Polynomial and Error Detection Capabilities
The generator polynomial directly affects the error detection capabilities of the CRC method; to understand that we should see the relationship between errors and the generator polynomial.
An error in a bit cause that bit to flip, i.e. 1 becomes 0 and vice versa. This reversal of bits is equivalent to adding 1 to a bit in modulo 2 arithmetic. This way, it is possible to show errors as a separate polynomial E(X).
Assume that T(X) = X3+X2+1= 1101 and the receiver gets the message as X3+1 = 1001. In another way, received message is T(X) + E(X) =(X3+X2+1) + X2 = 1101 + 0100 = 1001. Receiver divides the received message T(X) + E(X) by the generator polynomial P(X). We know that TX mod P(X)=0 then TX+EX mod PX=EX mod PX. This shows us if E(X) is a multiple of P(X), the error will be undetected.
If we assume that P(X) =X = 1, in the example above, the error E(X) =X2=100 will be undetected.
The generator polynomial P(X) is selected in such a way, it multiples are dissimilar to the error polynomial E(X) created by the transmission impairments.
3.1 Kinds of error CRC detects
Any errors not divisible by the generator polynomial P(X) will be detected. * All single bit errors will be detected if P(X) has more than one non-zero term. * All double bit errors will be detected if P(X) has a factor with at least three terms * All odd bit errors will be detected if P(X) has the factor (x + 1) * Any burst error of length less than the length of the generator polynomial. * A fraction of error bursts of length equal to the length of the generator polynomial.
Fraction equals to 1-2-(n-k-1) * A fraction of error bursts of length greater than the length of the generator polynomial.
Fraction equals to 1-2-(n-k)
4. References

1. Stallings, William. Data and computer communications. Boston London: Pearson, 2011. 214-223.

2. Peterson, W.W.; Brown, D.T.; , "Cyclic Codes for Error Detection," Proceedings of the IRE , vol.49, no.1, pp.228-235, Jan. 1961
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4066263&isnumber=4066234

3. http://en.wikipedia.org/wiki/Cyclic_redundancy_check

4. http://www.cs.jhu.edu/~scheideler/courses/600.344_S02/CRC.html

5. http://ceng2.ktu.edu.tr/~cevhers/ders_materyal/bil311_bilgisayar_mimarisi/supplementary_docs/crc_algorithms.pdf

6. http://en.wikipedia.org/wiki/Computation_of_CRC

7. http://www.users.cloud9.net/~stark/ctappd.pdf

8. http://www.mathworks.com/matlabcentral/fileexchange/19565-polynomial-division-by-convolution-quotient-and-reminder

9. http://www.mathworks.com/help/toolbox/comm/ref/bsc.html

10. http://en.wikipedia.org/wiki/Binary_symmetric_channel

Similar Documents

Premium Essay

Mentorship

...the letter as it is a formal declaration of your circumstances, if you do not complete the signature we cannot process your claim. 6. Send the completed forms to the address below Post your claim form to: URGENT – UNIFORM TAX REBATE PAYE - CUSTOMER OPERATIONS PO BOX 1970, LIVERPOOL L75 1WX All claims are screened through HM Revenue and Customs to determine if a refund is due. This process typically takes between 4 and 12 weeks. Once this process is complete, if a refund is due, you will receive directly from HMR&C notification of the amount of any refund. If you are sent P800T tax computations the amount of the total refund will be stated at the bottom of the computation for the most recent tax year. This amount will INCLUDE any refunds listed in tax computations for earlier years. Brought forward refunds can be found on the “C –Adjustments” section of the computation. Confirmations of any changes to your tax code will be sent under...

Words: 407 - Pages: 2

Premium Essay

Modern Day Accounting

...has changed. There had been a lot of changes over the years. The changes include the following: * The existence of Computers and Internet Access: Computers have enabled the works of accountants to be less tedious. The usage of computers is also time-saving. Via internet access, managers of companies can be up-to-date about the financial statements and records of their many branches scattered all over the country without the need to travel to those branches. This is possible through networking and tele-conferencing. * The presence or existence of accounting software packages: accounting packages have also been developed for modern-day accountants to suit their organizational needs for quick decision-making. It ensures the easy computation and analysis of financial data. It also helps to locate and eliminate errors. It helps to produce a lot of records at a time. These accounting software packages include but are not limited to Peachtree, Sage 50, and QuickBooks. * Accounting Standards: these standards are put in place by reputable accounting bodies (which vary between countries) to ensure that modern-day accountants prepare records in line with the guiding laws of the land. They also help to facilitate tax...

Words: 728 - Pages: 3

Premium Essay

The Pentium Flaw

...Pentium flaw is that on certain input data, the floating point divide instructions on the Pentium processor produce inaccurate results. Intel quoted an error rate of about 1 in 8.77*10^9 random divisions. The exact frequency depends on the type and precision of the operands; single-precision reciprocals, for example, are always returned correctly. (Nicely, 2011) This was first reported by Professor Thomas Nicely in October of 1994 by computing the sum of the reciprocals of a large collection of prime numbers on his Pentium-based computer. (Nicely, 2011) Checking his computation, he found the result differed significantly from theoretical values. He got correct results by running the same program on a computer with a 486 CPU, and finally he tracked the error to the Pentium itself. (Janeba, 1995) Pentium originally refused to replace the faulty chips unless the user proved a need for high end computations as the flaw is rare and data-dependent. Although they did eventually agree to replace the product for any who requested it. (Janeba, 1995) I believe that Intel made several mistakes with the handling of this first, releasing a the product that was not 100% accurate all of the time into the market, secondly not heeding Professor Nicely when he advised them of the issue, and third by refusing at least initially to replace the faulty processors. The combination of these injured Intel, both in their reputation in the business world and financially as well. I think that...

Words: 339 - Pages: 2

Free Essay

Quantum

...manipulating those qubits with a fixed sequence of quantum logic gates. The sequence of gates to be applied is called a quantum algorithm. The calculation ends with a measurement, collapsing the system of qubits into one of the 2^n pure states, where each qubit is zero or one, decomposing into a classical state. The outcome can therefore be at most n classical bits of information. Quantum algorithms are often non-deterministic, in that they provide the correct solution only with a certain known probability. Quantum computing studies theoretical computation systems (quantum computers) that make direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data. Quantum computers are different from digital electronic computers based on transistors. Whereas digital computers require data to be encoded into binary digits (bits), each of which is always in one of two definite states (0 or 1), quantum computation uses quantum bits (qubits), which can be in superpositions of states. A quantum Turing machine is a...

Words: 391 - Pages: 2

Free Essay

Technical Writing

...D-Wave Computer's Solution Raises More Questions Sophie Bushwick An experimental computer made by a Canadian company has proved its ability to solve increasingly complex mathematical problems. But the question remains — just how much of this calculating power is actually due to the strange properties of quantum mechanics? In theory, quantum computers can perform calculations far faster than their classical counterparts to solve incredibly complex problems. They do this by storing information in quantum bits, or qubits. At any given moment, each of a classical computer's bits can only be in an “on” or an “off” state. They exist inside conventional electronic circuits, which follow the 19th-century rules of classical physics. A qubit, on the other hand, can be created with an electron, or inside a superconducting loop. Obeying the counterintuitive logic of quantum mechanics, a qubit can act as if it’s “on” and “off” simultaneously. It can also become tightly linked to the state of its fellow qubits, a situation called entanglement. These are two of the unusual properties that enable quantum computers to test multiple solutions at the same time. But in practice, a physical quantum computer is incredibly difficult to run. Entanglement is delicate, and very easily disrupted by outside influences. Add more qubits to increase the device's calculating power, and it becomes more difficult to maintain entanglement. Instead of struggling to keep ever-larger numbers of qubits...

Words: 1002 - Pages: 5

Free Essay

Business Implications of Quantum Computing

...Business Implications Quantum computing has been explained and even the potential of this technology has been explained. Now the question that arises is, what business implications will quantum computing have? The main implications that were mentioned were security and speed. Security is mentioned when people began talking about computing. When quantum computing comes into the realm of computing it becomes an even bigger issue. The leap in computing power may create a big gap between businesses equipped with the latest technologies and those who aren’t (Raisinghani, 2001). Businesses will have to take extra measures to make sure that their systems have the latest security. Because quantum computing is sensitive to changes in the environment, it can make it a lot easier for hackers to damage or disable systems (Raisinghani, 2001). Security within businesses will have to increase which means that internet access may become stricter just to make sure that the businesses’ information is safe. Even though people may think it is too much, the business has to make sure that they protect themselves or they could be in a heed of trouble. A new position may even need to be created to help tack the security issue. An Information Security Manager may be created help with security to make sure that the business is doing the best they can to protect themselves (Raisinghani, 2001). It may not be a new hire but someone who just changes positions for a time period until the business feels...

Words: 583 - Pages: 3

Premium Essay

Computer Science

...From an early age I’ve always been deeply interested in computing. It was my dad, introducing me to the computer systems at his work place that first sparked this interest. I can always remember the feeling of wanting to know just how computers worked, why they worked and what else they could do. This interest never left me, only growing more profound and passionate with every new discovery I made. From communicating with an artificial intelligence to seeing the wonders of the Internet for the first time, computers have left me fascinated with just how much power yet mystery they hold. My studies have all helped me to develop my understanding of the subject. While Computing has given me a greater insight into the business aspects of the computer industry, 
Physics have helped to improve my analytical and evaluative skills. My interest in computing has not been restricted to the classroom. Within the last few months I’ve used the knowledge that I’ve gained over the past twelve years to set up my own computer related business. This has given me a totally new perspective on how certain things function, and how business operates. The writing of a business plan was a totally alien experience for me, but over the course of three months I researched and planned, and finally when the plan was complete I was rewarded with the satisfaction of knowing that I had completed something that most people would never have the chance to do especially at my age. As well as spending time both...

Words: 357 - Pages: 2

Free Essay

Quantum Computer

...For the last fifty years computers have grown faster, smaller, and more powerful, transforming and benefiting our society in ways too much to count. But like any exponential explosion of resources, this growth known as Moore's law must soon come to an end. Research has already begun on what comes after our current computing revolution. This research has discovered the possibility for an entirely new type of computer, one that operates according to the laws of quantum physics, a quantum computer. A quantum computer would not just be a traditional computer built out of different parts, but a machine that would exploit the laws of quantum physics to perform certain information processing tasks in a better and more efficient manner. One demonstration of this potential is that quantum computers would break the codes that protect our modern computing infrastructure the security of every Internet transaction would be broken if a quantum computer were to be built. This potential has made quantum computing a national security concern. Yet at the same time, quantum computers will also revolutionize large parts of science in a more benevolent way. Simulating large quantum systems, something a quantum computer can easily do, is not practically possible on a traditional computer. A technology of quantum computers is also very different. For operation, quantum computer uses quantum bits (qubits). Qubit has a quaternary nature. Quantum mechanic’s laws are completely different from the laws...

Words: 488 - Pages: 2

Premium Essay

Computers Will Replace Human Teachers

...Computers Will Replace Human Teachers (Final Essay) Mao Mao Professor Barzso English 105 4 May 2006 Image this: a student sits in front of a computer at home, looking at the screen. On the screen, there is a simulation of computer climate and crop model. The simulation predicts that excess rainfall may cause an estimated loss of $5 billion in agricultural production. In addition, a “virtual” (virtual: created, simulated, or carried on by means of a computer or computer network. (Online Degree Zone)) teacher provides a clear guidance. That student enjoys the lively class, and could learn both geography and economics at the same time. This situation will come to true in several years, and at that time, learning could be much easier and more interesting. There is no doubt that technology can improve our lives. Historically, humans have used a range of technologies to mediate between themselves and the world. Technologies such as writing, printing, telegraphy, radio, film, television and computers have improved communications and have become a normal component of daily life. (Russell) In the late 20th Century, the rapid development of computers and their use in school education has received a lot of attention. Recently, a range of applications has come to school, such as simulations, games and learning information by the World Wide Web. Beside these, a number of educational providers have launched various forms of “virtual” schools. In the future, students may study...

Words: 2558 - Pages: 11

Premium Essay

Seminar

...Covering Page: CDGI’S CHAMELI DEVI SCHOOL OF ENGINEERING (CDSE), INDORE ULTRABOOK by MAYANK YADUWANSHI (0832CS141084) Mr. DHARMENDRA GUPTA (FACULTY) DEPARTMENT OF COMPUTER SCIENCE ENGINEERING 2015 – 2016 November 2015. CDGI’S CHAMELI DEVI SCHOOL OF ENGINEERING (CDSE), INDORE Topic name by Name of the student (RGTU Enrollment Number) Name of Guide (Designation) DEPARTMENT OF ________ ENGINEERING 2014 – 2015 November 2014. Certificate: CDGI’S CHAMELI DEVI SCHOOL OF ENGINEERING (CDSE), INDORE DEPARTMENT OF COMPUTER SCIENCE ENGINEERING 2015 – 2016 CERTIFICATE Certified that this is the bonafide record of the seminar report on ULTRABOOK Carried out by MAYANK YADUWANSHI(0832CS141084) of 3rd semester (Department of computer science Engineering) during the academic year 2014 – 15. He / She has satisfactorily completed the seminar report and presentation as prescribed by the Rajiv Gandhi Technical University, Bhopal, in partial fulfillment towards the award of B. Tech. Degree in computer science Engineering. Signature of Guide ...

Words: 653 - Pages: 3

Free Essay

El-Alamein

...Prepared by: Sta maria, John Paul Llamas, Lara Francine Paglinawan, Leah May Bautista, John Henry Presented to: Mr. Sawahi Malik Professor INTRODUCTION Background of the study The College of Information Technology and Computer Studies (CITCS) is a full-grown society. Evidently through the huge number of students who decided to take the course of Bachelor of Science in Computer Studies (BSCS), Bachelor of Science in Information Technology (BSIT) and Associate Computer technology (ACT) in Pamantasan ng Lungsod ng Muntinlupa (PLMun). Considering the existing the University’s Disciplinary Measure, CITCS decided to make a violation system that will use for storing information about violations and information about violators. In line with this fact a problem of having a record of all the CITCS students as possible violators raise in. also having a problem in recording violations rise in. The developed violation system is a system that will solve the existing problems by having records of all the CITCS students as possible violators and having a smooth flow of recording violations. The system also includes storing students record, modifying students records, deleting student record, printing student record, recording certain violations and indicates if the recorded violation is already served by the intended violators or not. The CITCS department is currently using a violation information system but still using a manual violation record that leads...

Words: 2110 - Pages: 9

Premium Essay

Information Systems in Global Business Today

...Information systems (IS) is the study of complementary networks of hardware and software (see information technology) that people and organizations use to collect, filter, process, create, and distribute data.[1][2][3][4][5] The study bridges business and computer science using the theoretical foundations of information and computation to study various business models and related algorithmic processes within a computer science discipline.[6][7][8][9][10][11][12][13][14] Computer Information System(s) (CIS) is a field studying computers and algorithmic processes, including their principles, their software and hardware designs, their applications, and their impact on society[15][16][17] while IS emphasizes functionality over design.[18] Any specific Information System aims to support operations, management and decision making.[19] In a broad sense, the term is used to refer not only to the information and communication technology (ICT) that an organization uses, but also to the way in which people interact with this technology in support of business processes.[20] Some authors make a clear distinction between information systems, computer systems, and business processes. Information systems typically include an ICT component but are not purely concerned with ICT, focusing instead on the end use of information technology. Information systems are also different from business processes. Information systems help to control the performance of business processes.[21] Alter argues...

Words: 352 - Pages: 2

Premium Essay

Social Impact of Computers

...Computers are ubiquitous. As our society grows towards being a culture connected through the Internet, and as prices of these machines gradually decrease, more and more have been purchased by families for their homes and as a result, children are beginning to learn to use the computer at an earlier age. Even if computers are not presently available at the home, a child will almost certainly be exposed to one at school or the library, among other places. Adults today are amazed at the amount of knowledge a child has at such an early age – children generally find that computers gives them a sense of power and accomplishment. “A computer is nothing more than a box of circuits that perform software level tasks for a user. Even the software is little more than instructions to the hardware to perform specified tasks. Therefore, a computer, in and of itself is, neither positive nor negative. Its inherent goodness or badness is determined by the user.” With that being said, there are many positive, with as many negative associations that come along with owning a computer. From a positive... ... middle of paper ... ... they’ve had a bad day at school or work. While I support this positive attitude towards computers everyday, I find, in myself even, that I’ve become slightly addicted, causing me to not get as much sleep as needed or allowing me to do my homework without distraction. Overall, however, I’ve found computers have made me more knowledgeable, even if not pertaining...

Words: 268 - Pages: 2

Premium Essay

Career Options

...Plan B Career Option: I.T. Systems Administrator My Plan B career option would be to go to school for Information Technology and become a Computer Systems Administrator because I am interested in learning about Computer Operations and I know a few people in the Information Technology field who enjoy it and make a good living. I think the most rewarding aspect of being a Computer Systems Administrator would be to be a part of an Information Technology team and help my organization to keep the lines of communication open to help organize the company’s workflow. The least rewarding to me would be putting in a lot of hard work and not being able to see the results firsthand from a client’s point of view. The best opportunities for someone entering into the Information Technology field would be a Systems Administrator because most companies with a network infrastructure need someone to help run and maintain their systems. Such opportunities could be with organizations such as banks, hospitals, and military installations. The outlook for this career is that it is projected to grow 12 percent from 2012-2022, about the average for all occupations. Growth will be highest at companies that offer Cloud Computing Technology. There is not an oversupply of people in this field and not so much a shortage either and since the Information Technology field is always steadily growing I would definitely choose this field if I had a chance to make the decision again. Most Systems Administrators...

Words: 448 - Pages: 2

Free Essay

Theory of Computation

...Theory of Computation [Name of the Writer] [Name of the Institute] Theory of Computation It is a set of rational, systematic, and functional knowledge, focusing on the study of the abstraction of the processes occurring in reality in order to play using formal systems, i.e. through character codes and Instructions logical, recognizable by humans, capable of being modelled on the limitations of devices that process information and perform calculations, such as the computer. For this it relies on the theory of automata to simulate and standardize these processes, as well as to formalize the problems and solve them (Manna, 2012). Automata Theory This theory provides mathematical models that formalize the concept of computer or simplified algorithm and broadly enough so that they can analyse their capabilities and limitations. Some of these models play a central role in several applications of computer science, including word processing, compilers, hardware design and artificial intelligence. There are many other types of robots such as random access machines, cellular automata, abacus machines and abstract state machines; but in all cases it has been shown that these models are not more general than the Turing machine, and then the Turing machine has the ability to simulate each of these automata. This leads to think that the Turing machine as the universal computer model (Manna, 2012). Computational Complexity Theory Even when a problem is computable, it may not be...

Words: 405 - Pages: 2