• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12

Systems Analysis

Extracts from this document...

Introduction

Systems Analysis (P1) Task 1 Systems Life Cycle I will now discuss the various processes that make up the systems life cycle. Feasibility Study - Performing a feasibility study to judge whether a new computer system is feasible Analysis - Investigating and analysing the existing system to establish how things work currently Design - Designing the new system, specifying programs, hardware, and procedures to be followed � The hardware and software platform � The inputs & outputs � The user interface � The modular design of each program in the application � The test plan and test data � Conversion plan � Documentation including systems and operations documentation. Later, a user manual will be produced. Programming (development) - Programming, installation and maintenance � Programs written, tested and documented � Data loaded from old system to new system � May be parallel running of both systems for a while � Testing Installation (implementation) - Testing again and overseeing the installation of the new system * Staff trained on new system Maintenance (reviewing) - Making sure that all user and technical documentation is complete and system maintained by keeping it up-to-date, solving any problems and writing new programs when required The final stage in the systems life cycle is evaluating the performance of the new system to make sure it fulfils the requirements. Should this not be the case then the process is repeated if there are problems or further systems that have to be implemented to meet the requirements There are many reasons as to why the introduction of a systems analyst such as my self to be asked to analyse the current system � The current system may no longer be suitable for its purpose. � Technological developments may have made the current system redundant or outdated. � The current system may be too inflexible or expensive to maintain, or may reduce the organisation's ability to respond quickly enough to customer's demands. ...read more.

Middle

This is all under the one domain, being 'LIBRARY.com' and all nodes have their own internal IP address, connecting eventually to possibly 2 internet IP addresses that are connected to the ISA server, which splits my network up for internal use. Because there must be a physical link from any of the library workstation computers to every other device, there is the possibility that anyone and everyone can have unrestricted access to private information in which the library does not want to give library users access to. This is the worst case scenario and can easily be configured to prevent this from happening. It is possible, with the right security measures to make the whole network secure. By using 'permission rights' it is possible to control everybody's access patterns and privileges. For example the network administrator can give library users access ONLY to appropriate resources without them having any knowledge that the workstation is physically connected to any delicate information, because they wouldn't actually see the rest if the network under their security group in which they have been placed by the administrator. There are many other methods that are used for security of the network I want to put in place, including IPsec, which I will discuss later on along with other techniques. The only and main security feature I will be utilising is setting permissions for each user groups, this treats each user individually, without the trouble of having to configure them all separately. I will be showing this process of configuration in my practical part of this project. I am going to have to set the Windows 2000 Professional operating system to ask the user to input their user login that is found on the membership ID card, so that the system can authorize the user and decide what user group they are part of. This in turn sets up and loads the appropriate security policy for the users experience on the workstation. ...read more.

Conclusion

The same will apply for the staff computers. This will consist of around five workstations behind the main entrance desks in my library and will be connected to their own workgroup switch, which will be situated in the main office. This fact that there is a separate workgroup switch dos not affect its purpose, as it only provides the physical port connection to the network and devices. As I have stressed in my project plan, the access granted depends entirely the user group in which the user in. The office is the main station as to where my equipment will be joined together and maintained. The office will have the two switches connected directly to my server machine, which will be on constantly throughout the operation. There is no need for a scrabble of wires as these will be arranged neatly with cable ties and appropriate shielding. The shielding does not have to worry about electrical interference as there is no source around my library. All that is important is that I have chosen the correct media to transfer my data and that the equipment is organised so that should problems arise, things are simple to understand. Other equipment such as firewall and routers are also found in the office, so is the DSL connection and network attached storage. The placement of relevant servers is an important factor to consider, but so is the surrounding environment. I feel that my library office is sufficient enough for security and maintenance procedures that might take place in the future months after my system goes live. All servers, including interconnection devices should be correctly stored, preferably with a cool air flow and security on the door entrance. The rooms size must be spacious should the introduction of web servers be a reality in the future. I have everything on target at the moment, with my main server machine and its Windows 2000 Server OS controlling everything to do with configuration of my network including DHCP and sharing resources with permissions set. ?? ?? ?? ?? Unit 6 Sam McCullough Systems Analysis and Design 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    The contractual and legal ramifications of the system must be understood fully, such as copyright law, code ownership, and the Data Protection Act of 1998. If going ahead with a project means breaking the law, then it is said to be lacking in legal feasibility.

  2. Marked by a teacher

    Assignment A: Analysis of Transactional Website

    3 star(s)

    Also they are categorised in easy categories so that you can find your product quick and then it has a search so you can find your product just like that. The navigation of the website is very complex but put in a simple way, this makes the customer feel that

  1. Marked by a teacher

    Ecommerce Case Study

    Although this does not sound high when applied to a single sale, this 6% over every and any sale will accumulate overtime and take a large chunk of any money of the sales. A lot of business use this when they first start up as it is less stress and

  2. ict as level coursework

    I have added the other list boxes and the buttons on the bottom right hand side. As show previously the exit button has already been linked. I will link the following buttons 'proceed', 'back' and 'go back to main menu'.

  1. Feasibility Report

    will enable customers to view menus, careers, a map showing the location and even place their online via the Online Order Form. Lastly if the Perfect Pie Company was to invest in a Back Up System for each of their computer systems, if the inevitable was to happen, for example

  2. ICT - Definition of scope

    All the pages will include multimedia, pictures and information in clear english. There will also be a separate guide done in flash of the inside of a computer, when you move over a component, text will appear explaining what its function is.

  1. Free essay

    ICT organisation project

    The cost of paper will also be a factor as the magazine is being produced on a mass scale of 20,000 copies. Software The software required for the new magazine is Microsoft Word to produce the magazine, this will allow for different text styles, images, headers, footers and borders to be included in the document.

  2. ICT revision notes - IT project management

    Disadvantages âGreater user involvement may cause problems as users are taken away from their day-to-day activities âGreater user involvement may mean that the user will want increased functionality from the system and this can involve greater cost and could cause delays in project completion.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work