• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12

Systems Analysis

Extracts from this document...

Introduction

Systems Analysis (P1) Task 1 Systems Life Cycle I will now discuss the various processes that make up the systems life cycle. Feasibility Study - Performing a feasibility study to judge whether a new computer system is feasible Analysis - Investigating and analysing the existing system to establish how things work currently Design - Designing the new system, specifying programs, hardware, and procedures to be followed � The hardware and software platform � The inputs & outputs � The user interface � The modular design of each program in the application � The test plan and test data � Conversion plan � Documentation including systems and operations documentation. Later, a user manual will be produced. Programming (development) - Programming, installation and maintenance � Programs written, tested and documented � Data loaded from old system to new system � May be parallel running of both systems for a while � Testing Installation (implementation) - Testing again and overseeing the installation of the new system * Staff trained on new system Maintenance (reviewing) - Making sure that all user and technical documentation is complete and system maintained by keeping it up-to-date, solving any problems and writing new programs when required The final stage in the systems life cycle is evaluating the performance of the new system to make sure it fulfils the requirements. Should this not be the case then the process is repeated if there are problems or further systems that have to be implemented to meet the requirements There are many reasons as to why the introduction of a systems analyst such as my self to be asked to analyse the current system � The current system may no longer be suitable for its purpose. � Technological developments may have made the current system redundant or outdated. � The current system may be too inflexible or expensive to maintain, or may reduce the organisation's ability to respond quickly enough to customer's demands. ...read more.

Middle

This is all under the one domain, being 'LIBRARY.com' and all nodes have their own internal IP address, connecting eventually to possibly 2 internet IP addresses that are connected to the ISA server, which splits my network up for internal use. Because there must be a physical link from any of the library workstation computers to every other device, there is the possibility that anyone and everyone can have unrestricted access to private information in which the library does not want to give library users access to. This is the worst case scenario and can easily be configured to prevent this from happening. It is possible, with the right security measures to make the whole network secure. By using 'permission rights' it is possible to control everybody's access patterns and privileges. For example the network administrator can give library users access ONLY to appropriate resources without them having any knowledge that the workstation is physically connected to any delicate information, because they wouldn't actually see the rest if the network under their security group in which they have been placed by the administrator. There are many other methods that are used for security of the network I want to put in place, including IPsec, which I will discuss later on along with other techniques. The only and main security feature I will be utilising is setting permissions for each user groups, this treats each user individually, without the trouble of having to configure them all separately. I will be showing this process of configuration in my practical part of this project. I am going to have to set the Windows 2000 Professional operating system to ask the user to input their user login that is found on the membership ID card, so that the system can authorize the user and decide what user group they are part of. This in turn sets up and loads the appropriate security policy for the users experience on the workstation. ...read more.

Conclusion

The same will apply for the staff computers. This will consist of around five workstations behind the main entrance desks in my library and will be connected to their own workgroup switch, which will be situated in the main office. This fact that there is a separate workgroup switch dos not affect its purpose, as it only provides the physical port connection to the network and devices. As I have stressed in my project plan, the access granted depends entirely the user group in which the user in. The office is the main station as to where my equipment will be joined together and maintained. The office will have the two switches connected directly to my server machine, which will be on constantly throughout the operation. There is no need for a scrabble of wires as these will be arranged neatly with cable ties and appropriate shielding. The shielding does not have to worry about electrical interference as there is no source around my library. All that is important is that I have chosen the correct media to transfer my data and that the equipment is organised so that should problems arise, things are simple to understand. Other equipment such as firewall and routers are also found in the office, so is the DSL connection and network attached storage. The placement of relevant servers is an important factor to consider, but so is the surrounding environment. I feel that my library office is sufficient enough for security and maintenance procedures that might take place in the future months after my system goes live. All servers, including interconnection devices should be correctly stored, preferably with a cool air flow and security on the door entrance. The rooms size must be spacious should the introduction of web servers be a reality in the future. I have everything on target at the moment, with my main server machine and its Windows 2000 Server OS controlling everything to do with configuration of my network including DHCP and sharing resources with permissions set. ?? ?? ?? ?? Unit 6 Sam McCullough Systems Analysis and Design 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    In the theory last year I covered topics such as Data, Information Systems, Relational Databases, Software and System Development life cycles, which are very relevant to the coursework. Last year I achieved 82/90 in my first exam and 90/90 in my second, so I feel confident that I know these topics well and am ready to apply this knowledge confidently.

  2. Marked by a teacher

    Ecommerce Case Study

    will be a monthly fee from the bank in order to have the debit machine available to them. Although this fee will usually equate to a small fraction of the total sales for that month. Using a bank to have a payment system may result in other fees if payments are rejected or sent back.

  1. Marked by a teacher

    I have been asked to create an ICT solution for a local events and ...

    Furthermore this was time consuming and highly inefficient. Also there was a lack of accuracy within the business this was as it was controlled manually rather than automatic. This can also be applied to the financial aspects of the business as well; the accuracy was low due to human centralisation.

  2. The Impact of Mobile Phones on social Interaction

    4.1 - Changing Culture The growth of technology in the 1990's which saw the Internet and personal computer boom offset a technological culture where people were making increased use of new technology in their daily lives and felt that they had to "keep up to date" with the latest technology to compete with "the Johnson's next door".

  1. ICT - Definition of scope

    All the pages will include multimedia, pictures and information in clear english. There will also be a separate guide done in flash of the inside of a computer, when you move over a component, text will appear explaining what its function is.

  2. From the e-commerce strategy you gave me earlier I understand that by having a ...

    ask them to update any data, have a notice saying, "If any information is incorrect, please notify us" and/or have a notice saying if any of your information changes, you should let us know. Make it clearly visible where you get your sources from, e.g., a website, TV or publications, etc.

  1. Expert Systems are used in all sectors of organizations to help aid users with ...

    It decided what components were needed in order to assemble a complete computer system. It outputted this information as a set of diagrams to technicians who physically assemble the computer system. In 1986 Companies such as DuPont, General Motors, and Boeing relied heavily on expert systems.

  2. Health Book

    Steam's 'Steam Cloud' feature is one of its major features attracting a lot of attention and being one of the foundations it is succeeding in the gaming industry. This feature allows gamers to upload their personalized settings, game saves and gamer profiles to an offshore central server, giving the gamer

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work