• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12

Systems Analysis

Extracts from this document...

Introduction

Systems Analysis (P1) Task 1 Systems Life Cycle I will now discuss the various processes that make up the systems life cycle. Feasibility Study - Performing a feasibility study to judge whether a new computer system is feasible Analysis - Investigating and analysing the existing system to establish how things work currently Design - Designing the new system, specifying programs, hardware, and procedures to be followed � The hardware and software platform � The inputs & outputs � The user interface � The modular design of each program in the application � The test plan and test data � Conversion plan � Documentation including systems and operations documentation. Later, a user manual will be produced. Programming (development) - Programming, installation and maintenance � Programs written, tested and documented � Data loaded from old system to new system � May be parallel running of both systems for a while � Testing Installation (implementation) - Testing again and overseeing the installation of the new system * Staff trained on new system Maintenance (reviewing) - Making sure that all user and technical documentation is complete and system maintained by keeping it up-to-date, solving any problems and writing new programs when required The final stage in the systems life cycle is evaluating the performance of the new system to make sure it fulfils the requirements. Should this not be the case then the process is repeated if there are problems or further systems that have to be implemented to meet the requirements There are many reasons as to why the introduction of a systems analyst such as my self to be asked to analyse the current system � The current system may no longer be suitable for its purpose. � Technological developments may have made the current system redundant or outdated. � The current system may be too inflexible or expensive to maintain, or may reduce the organisation's ability to respond quickly enough to customer's demands. ...read more.

Middle

This is all under the one domain, being 'LIBRARY.com' and all nodes have their own internal IP address, connecting eventually to possibly 2 internet IP addresses that are connected to the ISA server, which splits my network up for internal use. Because there must be a physical link from any of the library workstation computers to every other device, there is the possibility that anyone and everyone can have unrestricted access to private information in which the library does not want to give library users access to. This is the worst case scenario and can easily be configured to prevent this from happening. It is possible, with the right security measures to make the whole network secure. By using 'permission rights' it is possible to control everybody's access patterns and privileges. For example the network administrator can give library users access ONLY to appropriate resources without them having any knowledge that the workstation is physically connected to any delicate information, because they wouldn't actually see the rest if the network under their security group in which they have been placed by the administrator. There are many other methods that are used for security of the network I want to put in place, including IPsec, which I will discuss later on along with other techniques. The only and main security feature I will be utilising is setting permissions for each user groups, this treats each user individually, without the trouble of having to configure them all separately. I will be showing this process of configuration in my practical part of this project. I am going to have to set the Windows 2000 Professional operating system to ask the user to input their user login that is found on the membership ID card, so that the system can authorize the user and decide what user group they are part of. This in turn sets up and loads the appropriate security policy for the users experience on the workstation. ...read more.

Conclusion

The same will apply for the staff computers. This will consist of around five workstations behind the main entrance desks in my library and will be connected to their own workgroup switch, which will be situated in the main office. This fact that there is a separate workgroup switch dos not affect its purpose, as it only provides the physical port connection to the network and devices. As I have stressed in my project plan, the access granted depends entirely the user group in which the user in. The office is the main station as to where my equipment will be joined together and maintained. The office will have the two switches connected directly to my server machine, which will be on constantly throughout the operation. There is no need for a scrabble of wires as these will be arranged neatly with cable ties and appropriate shielding. The shielding does not have to worry about electrical interference as there is no source around my library. All that is important is that I have chosen the correct media to transfer my data and that the equipment is organised so that should problems arise, things are simple to understand. Other equipment such as firewall and routers are also found in the office, so is the DSL connection and network attached storage. The placement of relevant servers is an important factor to consider, but so is the surrounding environment. I feel that my library office is sufficient enough for security and maintenance procedures that might take place in the future months after my system goes live. All servers, including interconnection devices should be correctly stored, preferably with a cool air flow and security on the door entrance. The rooms size must be spacious should the introduction of web servers be a reality in the future. I have everything on target at the moment, with my main server machine and its Windows 2000 Server OS controlling everything to do with configuration of my network including DHCP and sharing resources with permissions set. ?? ?? ?? ?? Unit 6 Sam McCullough Systems Analysis and Design 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    If work practices have to be altered too drastically that the organization will not be able to comply, then we say that the project lacks operational feasibility and the project will not go any further. Obviously I don't expect my client to turn his business upside down and inside-out in order to accommodate my system.

  2. Marked by a teacher

    Assignment A: Analysis of Transactional Website

    3 star(s)

    from your card issuer asking you for your personal SecureCode, just like the bank does at the ATM. This shows that they have tried to build a secure but easy to use, navigational website, that contains many levels of security.

  1. Marked by a teacher

    Ecommerce Case Study

    should then begin to establish their own payment system should it be their own arrangement with a bank or a service similar to PayPal. If Cuckoo Games decide to begin using their own payment system such as their using a bank it is important to keep in mind that there

  2. Marked by a teacher

    I have been asked to create an ICT solution for a local events and ...

    This will give me a good impression as to what they will be dealing with on a day to day basis. Also observing the user will give me an accurate impression first hand as to the problems that they occur when using their current system.

  1. ICT - Definition of scope

    All the pages will include multimedia, pictures and information in clear english. There will also be a separate guide done in flash of the inside of a computer, when you move over a component, text will appear explaining what its function is.

  2. The Impact of Mobile Phones on social Interaction

    [4 March 2002] 4 - Growth of Mobile Phones Over the last decade, mobile phones have seen a forty fold increase and now account for one in three of all telephone lines (1) with predictions that by the end of this decade, they will overtake fixed line connections (1).

  1. Free essay

    ICT organisation project

    The cost of paper will also be a factor as the magazine is being produced on a mass scale of 20,000 copies. Software The software required for the new magazine is Microsoft Word to produce the magazine, this will allow for different text styles, images, headers, footers and borders to be included in the document.

  2. From the e-commerce strategy you gave me earlier I understand that by having a ...

    Update the information, archive the information or securely delete the information if it goes out of date. If you keep the information you have too long, this could have an adverse effect on the company, for instance, if you used the old information by mistake.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work