• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

Systems Analysis

Extracts from this document...


Systems Analysis (P1) Task 1 Systems Life Cycle I will now discuss the various processes that make up the systems life cycle. Feasibility Study - Performing a feasibility study to judge whether a new computer system is feasible Analysis - Investigating and analysing the existing system to establish how things work currently Design - Designing the new system, specifying programs, hardware, and procedures to be followed � The hardware and software platform � The inputs & outputs � The user interface � The modular design of each program in the application � The test plan and test data � Conversion plan � Documentation including systems and operations documentation. Later, a user manual will be produced. Programming (development) - Programming, installation and maintenance � Programs written, tested and documented � Data loaded from old system to new system � May be parallel running of both systems for a while � Testing Installation (implementation) - Testing again and overseeing the installation of the new system * Staff trained on new system Maintenance (reviewing) - Making sure that all user and technical documentation is complete and system maintained by keeping it up-to-date, solving any problems and writing new programs when required The final stage in the systems life cycle is evaluating the performance of the new system to make sure it fulfils the requirements. Should this not be the case then the process is repeated if there are problems or further systems that have to be implemented to meet the requirements There are many reasons as to why the introduction of a systems analyst such as my self to be asked to analyse the current system � The current system may no longer be suitable for its purpose. � Technological developments may have made the current system redundant or outdated. � The current system may be too inflexible or expensive to maintain, or may reduce the organisation's ability to respond quickly enough to customer's demands. ...read more.


This is all under the one domain, being 'LIBRARY.com' and all nodes have their own internal IP address, connecting eventually to possibly 2 internet IP addresses that are connected to the ISA server, which splits my network up for internal use. Because there must be a physical link from any of the library workstation computers to every other device, there is the possibility that anyone and everyone can have unrestricted access to private information in which the library does not want to give library users access to. This is the worst case scenario and can easily be configured to prevent this from happening. It is possible, with the right security measures to make the whole network secure. By using 'permission rights' it is possible to control everybody's access patterns and privileges. For example the network administrator can give library users access ONLY to appropriate resources without them having any knowledge that the workstation is physically connected to any delicate information, because they wouldn't actually see the rest if the network under their security group in which they have been placed by the administrator. There are many other methods that are used for security of the network I want to put in place, including IPsec, which I will discuss later on along with other techniques. The only and main security feature I will be utilising is setting permissions for each user groups, this treats each user individually, without the trouble of having to configure them all separately. I will be showing this process of configuration in my practical part of this project. I am going to have to set the Windows 2000 Professional operating system to ask the user to input their user login that is found on the membership ID card, so that the system can authorize the user and decide what user group they are part of. This in turn sets up and loads the appropriate security policy for the users experience on the workstation. ...read more.


The same will apply for the staff computers. This will consist of around five workstations behind the main entrance desks in my library and will be connected to their own workgroup switch, which will be situated in the main office. This fact that there is a separate workgroup switch dos not affect its purpose, as it only provides the physical port connection to the network and devices. As I have stressed in my project plan, the access granted depends entirely the user group in which the user in. The office is the main station as to where my equipment will be joined together and maintained. The office will have the two switches connected directly to my server machine, which will be on constantly throughout the operation. There is no need for a scrabble of wires as these will be arranged neatly with cable ties and appropriate shielding. The shielding does not have to worry about electrical interference as there is no source around my library. All that is important is that I have chosen the correct media to transfer my data and that the equipment is organised so that should problems arise, things are simple to understand. Other equipment such as firewall and routers are also found in the office, so is the DSL connection and network attached storage. The placement of relevant servers is an important factor to consider, but so is the surrounding environment. I feel that my library office is sufficient enough for security and maintenance procedures that might take place in the future months after my system goes live. All servers, including interconnection devices should be correctly stored, preferably with a cool air flow and security on the door entrance. The rooms size must be spacious should the introduction of web servers be a reality in the future. I have everything on target at the moment, with my main server machine and its Windows 2000 Server OS controlling everything to do with configuration of my network including DHCP and sharing resources with permissions set. ?? ?? ?? ?? Unit 6 Sam McCullough Systems Analysis and Design 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    the theory was fairly basic, it provided some foundation and framework in the subject that could be expanded upon. I have gained much more knowledge and experience from last year's AS level ICT that will be of help to me this year.

  2. Marked by a teacher

    Assignment A: Analysis of Transactional Website

    3 star(s)

    The structure and navigation of the site is relatively easy to use and is well set out. The webpage has numerous navigation tools and links to other parts of the website, that all seem to work. The customer user interface works well, and overly is presented well with a good flow to it.

  1. Marked by a teacher

    I have been asked to create an ICT solution for a local events and ...

    It will also improve the business and benefit the client by increasing accessibility. Accessibility to this information will be done virtually. This allows the information to be accessed by a larger majority of people, as most people use e- products to view information.

  2. The Impact of Mobile Phones on social Interaction

    Similarly, this technological culture had a direct impact on the work environment as the boundaries of time and space were removed and the 24 hour work place was born. This new culture in the work environment was perfectly suited to mobile phones with the introduction of phones with email, personal organiser, voicemail, fax, Internet access, etc.

  1. The data Processing Cycle and processing methods

    Another reason why this is possible is because the processing tasks consists more of input and output data so it leaves the CPU to do other tasks. This type of processing was mainly used in large organisations. Task 3 Choice of data handling methods It is important to choose the correct data handling method.

  2. Free essay

    This research report will present a brief history of the Internet, focusing on some ...

    The system worked by allowing users to connect to a network via a PSS (Packet Switch Stream) modem, or an X.25 PAD (Packet Assembler/Disassembler), as well as, a dedicated PSS line. Subsequently, users could then access a variety of online databases and mainframe systems.

  1. ict as level coursework

    Once the desired products are highlighted the user clicks on the 'Insert' tab and scrolls down to the 'Name' tab and should click the 'Define' tab. After this a dialogue should appear. Then the name of what you would like to define has to be keyed in, once this is complete press the OK button.

  2. Free essay

    ICT organisation project

    Wigan Council could make more use of this logo and make it more recognisable throughout the Borough by including it on more pages throughout the magazine to reinforce the sense of community. Type of paper The magazine states that it is printed on paper from renewable sources with the recognised

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work