.

Tuesday, May 5, 2020

Professional Skills for System Analysis International Business Machin

Question: Discuss about theProfessional Skills for System Analysis for International Business Machines Corporation. Answer: Introduction Willowbrook School is a small and private school in the Midwest United States. The IT Consultant of the school recommends implementing a new computer information system to handle both financial as well as administration works. It increases the enrollment applications of the programs. Due to increase in students application, coupling with increasing demand for the after school care leads to increase in high workload over the staffs as well as administrative staffs. For this reason, the Director, Victoria Owens discusses with the IT consultant about the possibility to set up a computer system to reduce the workload. The report is based on eight parts. It gives the justification of the system design architecture for Willowbrook School. The report reflects on physical as well as logical network topology. A list of hardware for the designed network topologies is given to become familiar with the used hardware for the new information system. A system design specification document is analyzed to identify the goal and purpose of the system design report. An application development methodology is discussed for the Willowbrook School. Testing plan is given to test the systems requirements for the school. The training plan is given to training the staffs, teachers as well as volunteers based on the needs of the users groups. Data conversion as well as system changeover method is developed for successfully implement the system for the school. Architecture for Willowbrook School Proposed System Architecture Figure 1: System Architecture for Willowbrook School (Source: Chernyi 2015, pp-62) Justification on the System Architecture The architecture of the Willowbrook School information system is proposed as client based server architecture. The client server architecture of the school consists of a network architecture in which each of the computers on the network is either client or server. Using this server, the client computer can send resources request to the server over the network connection, when the resources are delivered to the client (Chernyi 2015). The client sets up a connection to the server over the local area network such as an internet. A three-tier architecture is suggested as the best option for the school. It has three tiers such as presentation, application, and data tier. Firstly, the presentation tier engages the top level as well as shows the information related to the service (Power, Sharda and Burstein 2015). It converses with the other layers by sending results to the browser. Secondly, the application tier controls the application functionality by performing a processing (Venkatesh, Thong and Xu 2012). Thirdly, the data tier houses the database servers where the information is stored. Data are kept independent of the application servers. Advantages and Disadvantages of the Proposed System Architecture Advantages Disadvantages Using the client server architecture, Willowbrook School will increase their productivity throughout the use of cost-effective user interfaces, enhancing the data storage as well as consistent application services (Devine, Shifrin and Shoulberg 2015). Due to a huge number of client's request, the servers are getting overloaded, and it forms traffic congestion. Use of SQL supports open access from the client, as well as gives transparency within the network services, represent that comparable data are shared among the users. As the client based server is centralized, therefore if the server fails then the client requests are not proficient (Dennis, Wixom and Tegarden 2015). Client server has better control access to make certain that only authorized person can access the data, as well as server updates, are to be controlled professionally (Chang et al. 2015). The server is quite expensive to purchase. The software, as well as hardware used for the server, is very critical. Specific hardware, as well as software, is used, and it results in increasing the cost. Cost Benefits Issues The issues regarding the cost benefit are to reduce the load on the network as well as make changes in the response time from the service provider side (Mithas et al. 2012). Willowbrook School needs an expansion in their information system network. Physical and logical topology Physical Topology Figure 2: Physical Bus Topology (Source: Oluwatosin 2014, pp-67) The physical bus topology consists of computers as well as servers that are associated to a single cable with the assist of interface connectors. The central cable is the backbone of the network (Oluwatosin 2014). Each of the workstations is communicated with other device by means of a bus. A signal from the source is broadcasted, and it travels to the workstations associated with the bus cable. A terminator is connected to prevent the bouncing of signals. Logical Topology Figure 3: Logical Bus Topology (Source: Oluwatosin 2014, pp-67) The LAN that eliminates a logical bus topology delivers the signal generated by the transmitter towards the attached devices (Oluwatosin 2014). Within this network topology, none of the end devices is required in order to regenerate signal for other attached devices in order to receive it. It is the method that the data are passed throughout the network from one of the devices to the other based on the physical interconnection of the devices. Ethernet is reflected as the logical bus topology for the particular proposed system. List of Hardware for Designing the Topologies Web Server Database Server CPU and RAM Router Access point to connect with the internet Application Server Network Hardware System Design Specification Document Project Scope The scope of the project is that the Willowbrook School includes the ability to increase the enrollment of the student without hiring of any extra staffs. The new information system tracks the enrollments, aftercare billing as well as payments. The proposed system monitors the process of tracking, reviewing the cost as well as reporting (Schwalbe 2015). The system can individually track the billing details of the individual students. System Design The resources used to implement the new information system are Web Server, Database Server, CPU and RAM, Router, Access point to connect with the internet, Application Server and Network Hardware. The new information system is proposed as client based server architecture (Vaishnavi and Kuechler 2015). A three-tier architecture is suggested as the best option for the school. Component and Process Design At first, the user is identified when they give their ID login details. Only the registered user can login into the system (Reynolds 2015). The user can connect the client server and then the registered user can authenticate throughout the token. After getting proper username and password, the server allows the users to use the system for financial and administration tasks (Haimes 2015). The user should use an internet connection to access the system. As the system stores the data of the students, therefore it is required to use server authentication to prevent the data from any unauthorized use. SQL database is used that supports open access from the client, as well as gives transparency within the network services, represent that comparable data are shared amongst the users (Dingsoyr et al. 2012). Data Design The data are at first use the direct cutover method but due to some problems, it uses the phrased operation method for aftercare billing (Power, Sharda and Burstein 2015). User Displays The users conducted those are involved with the implementation of the system are administrative staffs, principal, vice principal, teachers, students, and parents. Prototype Description Prototype 1 It allows the staffs to log in to the Willowbrook School using a user name, employee number as well as password. An essential employee login will view all the information of the student. Prototype 2 It allows the parents to log in to the Willowbrook School using username, student number as well as the password (Hwang, Kettinger and Mun 2015). An essential employee login will view all the information of the student. After the login, the parent clicks on the information of the student; they can able to view the address as well as a phone number of the student. System Development and Project Management Schedules After the set up of the architectural design phase for the system, some of its system specifications areas are updated such as detailed design, prototype testing phrase (Olsson, Bosch and Alahyari 2013). Therefore, it requires more time to complete the implementation task of the new information system for Willowbrook School. Project Extensions It takes extra four weeks to complete the entire implementation process of the system. Application Development Methodology The application development methodology is used to plan as well as control the process of developing the new information system. For the Willowbrook School, Agile Software Development Methodology is used to minimize the risks within the school by developing new information system (Givoni et al. 2013). This method emphasizes real time communication as well as overwritten documents. Using this methodology, the school can build small client approved as well as deliver large application at the end of the implementation process. Advantages and Disadvantages of Various Application Development Methodologies Structured Approach Object Oriented Approach Agile Methodology Advantages Disadvantages Advantages Disadvantages Advantages Disadvantages It minimizes the complexity of the new proposed system (Valacich, George and Hoffer 2015). It takes a lot of time as well as finance to analyze the new information system. It reduces the maintenance cost. This approach is best suited for the interactive as well as dynamic environment (Park and Sabir 2015). The information system applications such as payroll, accounting are not benefited from this approach. The needs of the resources for this methodology are minimum. There are some issues regarding the maintenance of the system. It gives future direction towards the system. Changes within the system take more time to analyze (Chernyi 2015). It gives a high level of the flexible system as the objects are to be accessed dynamically. The development of the object oriented approach is not done by all the vendors (Nelson 2013). It delivers the development process within the estimated timeline in a proper manner (Dillon 2014). It requires documentation generation as it has a high level of dependency among the individuals. It focuses on the logical system to perform the task. Staffs are required to give training when there are any changes in the system. The objects are provided with a roadmap when the application is scalable. As this approach is using complex data types, therefore it is difficult to implement. It gives teamwork with proper training to the staffs to train about handing the information system. This methodology is not able to handle compound dependencies. Testing Plan for Suitable Data Set Types of testing Description of testing for suitable data set System Testing System Testing is done to verify the login, verify the close registration, and maintain the information of the student as well as a professor. It also verifies the view report, register for the courses and selection of courses to teach (Paroni, Geremia and Valeri 2016). The system error results into logged off the system. Therefore, the fatal system errors result in shutdown of the system. User Interface Testing It verifies the navigation through a sample set of screens that conforms to GUI standards. The system can easy to use as well as accurate for the target market of the students as well as teachers (Devine, Shifrin and Shoulberg 2013). Performance Testing It verifies the response time in order to access the finance system and for submittal of registration for courses. Security and Access Control Testing It verifies the login from the local PC and verifies the username as well as password mechanism. Configuration Testing It checks for the configuration that if the client component of the system is configured properly with the network (Artzi et al. 2013). As the integrated system is functional, therefore the proposed system is to be tested based on its new operating system, network as well as PCs. Training Plan and Procedures Based on users Group Needs After the testing of the new information system, the staffs, teachers as well as other management members required training so that they can handle the system properly. The following are the user groups those are required to train on the new system as follows: Teachers of the Willowbrook School: The teachers are required to train as they teach the students and play a vital role in the school. The training topics those are required to consider are startup and shutdown the information system (Oluwatosin 2014). The teachers are required to use the system, as they require functioning the system. Therefore, they are also trained to fix the issue as well as troubleshooting. Staffs of Administrative Department: The principal of the Willowbrook School, Kathy and the vice principal, Susan requires to train on the entire system. They are the essential administrative staffs for the school (Chang et al. 2015). If they are trained on the system, then they can give best customer support before they call to get the service support. The training topics those are covered include preparation of documents and administrative reports; enter the details of the teachers and staffs, requesting enhancement as well as user training. Volunteers: The school requires volunteers so that they can work on the event of fundraising. Therefore, they are trained to fundraise for the system. The topic includes how to motivate the individuals to give fund for the school, how to convince the individuals, what to say and how to collect the fund (Devine, Shifrin and Shoulberg 2015). Those volunteers are trained by both the essential staffs of the school such as principal as well as vice principal. Data Conversion and System Changeover Method Data Conversion for Willowbrook School System In the existing process of data entry, the Willowbrook School uses a spreadsheet as well as word to enter the data. After the implementation of the proposed system, the data are required to export into the new information system (Sinha and Isaac 2015). At first, the data of the students such as the name of the student, their contact details, etc., and then the monthly billing of the student is done. After entering the billing, data for the parents, block as well as total attendance of the student is done. The following is the data conversion table to store the data of the students: Data Entry Order 1 2 3 4 5 Information of the Student Name of the Student Student ID Address of the house Contact Details of the student Total course fee of the student Billing System Name of the Student Student ID Number of days late Date of paying the fee Bill dates Information of the parent and address Information of the student Name of the parents Address of the house Contact Number Block Information of the student Year Student Number Total attendance of the particular student Name of the Student Student ID Block ID Total number of days present Total number of days absent System Changeover Method According to the billing process of Willowbrook School, their fixed fee billing process should complete within the month of April, and a new session will begin in the month of July. However, their aftercare billing process does not end up in the second week of the month of June. Within this period, the systems are required to install such as within a month or half of it. The school takes the decision to use the direct cutover method around their academic year. Using the direct cutover method, the old system of the school is cut as well as it is overwriting by a new information system (Dennis, Wixom and Tegarden 2015). It causes the changeover from the old system to a new system when the new system becomes operational. However, the school identifies that this method involves a high risk of loss of data. With the use of this method, the company is unable to change the old system as a backup option. Due to this reason, the IT Consultant recommends the phased operation to us. Phased operation process is working into various phrases. The implementation of the new system is done into modules. The entire system is provided to the some of the authorized users. As the previous approach faces risks, therefore the phrased operation reduces errors as well as failures to the implemented module. This phrased operation is also less expensive. The phased operation for the Willowbrook School consists of two phases such as billing and system. In the billing phase, the financial works are done. It starts at the month of April; it is installed within one, and half months before the aftercare billing process is completed. The system phase allows a timeframe of one and half month to do the functional billing, testing of the entire system, etc. Conclusion It is concluded that the IT Consultant of the Willowbrook School recommends the requirement of client server architecture for their school. The architecture should be three-tier so that it can easily handle the administrative as well as financial functions. The new information system tracks the enrollments, aftercare billing as well as payments. The proposed system monitors the process of tracking, reviewing the cost as well as reporting. As an application development methodology, Agile methodology is used as it delivers the development process within the estimated timeline in a proper manner. As the changeover process, phase operation is used in order to install the new information system for the school. Various types of testing are done such as system, user-interface, performance, security and access control as well as configuration testing to completely implement the system for the school. After the testing of the system, the staffs of the administrative department, teachers as well as volunteers are required to train so that they can handle the entire system efficiently. Data conversion is required as previously the administrative department uses a spreadsheet as well as word to enter the details of the students. References Artzi, S., Dolby, J., Pistoia, M., Tip, F. and Tripp, O., International Business Machines Corporation, 2013.Detecting and localizing security vulnerabilities in client-server application. U.S. Patent 8,516,449. Chang, J., Faraboschi, P. and Ranganathan, P., Chang and Jichuan, 2015.Vertically-Tiered Client-Server Architecture. U.S. Patent 20,150,350,381. Chernyi, S., 2015. The implementation of technology of multi-user client-server applications for systems of decision making support.Metallurgical and Mining Industry,3, pp.60-65. Dennis, A., Wixom, B.H. and Tegarden, D., 2015.Systems analysis and design: An object-oriented approach with UML. John Wiley Sons. Devine, C.Y., Shifrin, G.A. and Shoulberg, R.W., Verizon Business Global Llc, 2013.Secure server architecture for web based data management. U.S. Patent 8,495,724. Devine, C.Y., Shifrin, G.A. and Shoulberg, R.W., Verizon Patent and Licensing Inc., 2015.Secure server architecture for web based data management. U.S. Patent 8,935,772. Dillon, D.M., Dillon Software Services, Llc, 2014.Data store interface that facilitates distribution of application functionality across a multi-tier client-server architecture. U.S. Patent 8,676,808. Dingsoyr, T., Nerur, S., Balijepally, V. and Moe, N.B., 2012. A decade of agile methodologies: Towards explaining agile software development.Journal of Systems and Software,85(6), pp.1213-1221. Givoni, E., Ravitz, N., Ravitz, Z., Nguyen, T.Q. and Nguyen, T., Smartesoft, Inc., 2013.Automated software testing and validation system. U.S. Patent 8,347,267. Haimes, Y.Y. ed., 2015.Risk modeling, assessment, and management. John Wiley Sons. Hwang, Y., Kettinger, W.J. and Mun, Y.Y., 2015. Personal information management effectiveness of knowledge workers: conceptual development and empirical validation.European Journal of Information Systems,24(6), pp.588-606. Mithas, S., Tafti, A.R., Bardhan, I. and Goh, J.M., 2012. Information technology and firm profitability: mechanisms and empirical evidence.Mis Quarterly,36(1), pp.205-224. Nelson, D., 2013. Next gen web architecture for the cloud era.Saturn. Olsson, H.H., Bosch, J. and Alahyari, H., 2013. Towards RD as innovation experiment systems: A framework for moving beyond Agile software development. InProceedings of the IASTED(pp. 798-805). Oluwatosin, H.S., 2014. Client-server model.IOSR Journal of Computer Engineering (IOSR-JCE),16(1), p.67. Park, Y. and Sabir, K.S., International Business Machines Corporation, 2015.Stream processing using a client-server architecture. U.S. Patent 9,043,382. Paroni, A., Geremia, P. and Valeri, S., 2016. Introducing a new Client-Server framework for large CFD models. Power, D.J., Sharda, R. and Burstein, F., 2015.Decision support systems. John Wiley Sons, Ltd. Reynolds, G., 2015.Information technology for managers. Nelson Education. Schwalbe, K., 2015.Information technology project management. Cengage Learning. Sinha, A. and Isaac, R.K., 2015. A Compressed Technique to Optimize the Processing of Real Time Data in Centralized and Client-Server Data Base Systems.International Journal of Computer Applications,115(9). Vaishnavi, V.K. and Kuechler, W., 2015.Design science research methods and patterns: innovating information and communication technology. Crc Press. Valacich, J.S., George, J.F. and Hoffer, J.A., 2015.Essentials of systems analysis and design. Pearson Education. Venkatesh, V., Thong, J.Y. and Xu, X., 2012. Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology.MIS quarterly,36(1), pp.157-178.

No comments:

Post a Comment