• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12

Systems Analysis

Extracts from this document...

Introduction

Systems Analysis (P1) Task 1 Systems Life Cycle I will now discuss the various processes that make up the systems life cycle. Feasibility Study - Performing a feasibility study to judge whether a new computer system is feasible Analysis - Investigating and analysing the existing system to establish how things work currently Design - Designing the new system, specifying programs, hardware, and procedures to be followed � The hardware and software platform � The inputs & outputs � The user interface � The modular design of each program in the application � The test plan and test data � Conversion plan � Documentation including systems and operations documentation. Later, a user manual will be produced. Programming (development) - Programming, installation and maintenance � Programs written, tested and documented � Data loaded from old system to new system � May be parallel running of both systems for a while � Testing Installation (implementation) - Testing again and overseeing the installation of the new system * Staff trained on new system Maintenance (reviewing) - Making sure that all user and technical documentation is complete and system maintained by keeping it up-to-date, solving any problems and writing new programs when required The final stage in the systems life cycle is evaluating the performance of the new system to make sure it fulfils the requirements. Should this not be the case then the process is repeated if there are problems or further systems that have to be implemented to meet the requirements There are many reasons as to why the introduction of a systems analyst such as my self to be asked to analyse the current system � The current system may no longer be suitable for its purpose. � Technological developments may have made the current system redundant or outdated. � The current system may be too inflexible or expensive to maintain, or may reduce the organisation's ability to respond quickly enough to customer's demands. ...read more.

Middle

This is all under the one domain, being 'LIBRARY.com' and all nodes have their own internal IP address, connecting eventually to possibly 2 internet IP addresses that are connected to the ISA server, which splits my network up for internal use. Because there must be a physical link from any of the library workstation computers to every other device, there is the possibility that anyone and everyone can have unrestricted access to private information in which the library does not want to give library users access to. This is the worst case scenario and can easily be configured to prevent this from happening. It is possible, with the right security measures to make the whole network secure. By using 'permission rights' it is possible to control everybody's access patterns and privileges. For example the network administrator can give library users access ONLY to appropriate resources without them having any knowledge that the workstation is physically connected to any delicate information, because they wouldn't actually see the rest if the network under their security group in which they have been placed by the administrator. There are many other methods that are used for security of the network I want to put in place, including IPsec, which I will discuss later on along with other techniques. The only and main security feature I will be utilising is setting permissions for each user groups, this treats each user individually, without the trouble of having to configure them all separately. I will be showing this process of configuration in my practical part of this project. I am going to have to set the Windows 2000 Professional operating system to ask the user to input their user login that is found on the membership ID card, so that the system can authorize the user and decide what user group they are part of. This in turn sets up and loads the appropriate security policy for the users experience on the workstation. ...read more.

Conclusion

The same will apply for the staff computers. This will consist of around five workstations behind the main entrance desks in my library and will be connected to their own workgroup switch, which will be situated in the main office. This fact that there is a separate workgroup switch dos not affect its purpose, as it only provides the physical port connection to the network and devices. As I have stressed in my project plan, the access granted depends entirely the user group in which the user in. The office is the main station as to where my equipment will be joined together and maintained. The office will have the two switches connected directly to my server machine, which will be on constantly throughout the operation. There is no need for a scrabble of wires as these will be arranged neatly with cable ties and appropriate shielding. The shielding does not have to worry about electrical interference as there is no source around my library. All that is important is that I have chosen the correct media to transfer my data and that the equipment is organised so that should problems arise, things are simple to understand. Other equipment such as firewall and routers are also found in the office, so is the DSL connection and network attached storage. The placement of relevant servers is an important factor to consider, but so is the surrounding environment. I feel that my library office is sufficient enough for security and maintenance procedures that might take place in the future months after my system goes live. All servers, including interconnection devices should be correctly stored, preferably with a cool air flow and security on the door entrance. The rooms size must be spacious should the introduction of web servers be a reality in the future. I have everything on target at the moment, with my main server machine and its Windows 2000 Server OS controlling everything to do with configuration of my network including DHCP and sharing resources with permissions set. ?? ?? ?? ?? Unit 6 Sam McCullough Systems Analysis and Design 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    I have been asked to create an ICT solution for a local events and ...

    This led to many mistakes being made which then in turn had a negative impact on the business resulting in increased expenditure. This system was also highly inefficient again due to the large amount of time consumption that this procedure required.

  2. Marked by a teacher

    Ecommerce Case Study

    Although this does not sound high when applied to a single sale, this 6% over every and any sale will accumulate overtime and take a large chunk of any money of the sales. A lot of business use this when they first start up as it is less stress and

  1. I have been asked to write a report on current working practice and I ...

    The questions they ask help them to produce a good brief and specification. They create their animation by drawing it or by using the code to perform action. Compare to code the drawing is more time consuming than code. However using the code is complicated and need experience to write appropriate code to perform functions.

  2. Explain the functions of network management

    The amount of time taken by the network to respond to a user depends on the amount of traffic passing through the network. For example, if the majority of people in the UK try to go on the Yahoo.co.uk at the same time, which is requested from the user, the

  1. Personal Learning Plan for IT

    I found out how I need to organize my work. I can able to set up folder for each subject therefore I can able to separate my work. I can able to organize my folder and paper works, but sometimes I?m struggle with remember to put my work in the folder.

  2. BTEC IT Organisational Systems Security - outline of potential threats to an online business.

    There are several ways in which this could be achieved. Phishing: This is done via the use of emails which impersonate a legitimate business to try and persuade or trick users into providing personal or company details such as PIN numbers, passwords and credit card details, this is a type of social engineering.

  1. ICT revision notes - IT project management

    Iterative Development âThe idea here is to develop all aspects of the design simultaneously, making a little bit of progress at a time. Iterative Methods âIteration means repeating something over and over until you get the solution. âIterative methodologies have been developed to improve the waterfall model.

  2. Describe the future of the Internet.

    This feature of playing and communicating with others has added to the social aspect and has increased the use of the internet as many people can play with friends and also talk to them for free. People have become socially dependant on technology rather than speak to other they may

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work