* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download File2
Network tap wikipedia , lookup
Distributed firewall wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Wireless security wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Airborne Networking wikipedia , lookup
Remote Desktop Services wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Systems Analysis and Design Systems Design System Architecture Introduction An effective system combines elements into an architecture, or design, that is flexible, cost-effective, technically sound, and able to support the information needs of the business  System architecture translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods  2 System Architecture Checklist  The analyst must consider seven specific issues that will affect the architecture choice  Enterprise resource planning (ERP)  Initial and total cost of ownership (TCO)  Scalability  Web integration  Legacy system interface requirements  Processing options  Security issues 3 System Architecture Checklist  Enterprise Resource Planning (ERP)  The objective of ERP is to establish a company-wide strategy for using IT resources.  Describes a specific hardware environment, also called a platform  Supply chain management (SCM) concept extends internal ERP to suppliers and customers 4 System Architecture Checklist  Initial Cost and TCO  During the final design stage, you make decisions that will have a major impact on the initial costs and TCO for the new system  You should review all previous cost estimates 5 System Architecture Checklist  Initial Cost and TCO  Ask questions like the following: If in-house development was selected as the best alternative initially, is it still the best choice?  If a specific package was chosen initially, is it still the best choice?  Have any new types of outsourcing become available?  Have any significant technical developments occurred?   Answers might affect the initial cost and TCO for the proposed system 6 System Architecture Checklist  Scalability  Scalability, also called extensibility, refers to a system’s ability to expand, change or downsize easily to meet the changing need of a business enterprise  Especially important in implementing systems that are volume-rated, such as transaction processing systems  Important for dynamic, growing business 7 System Architecture Checklist  Web Integration  Web-centric architecture  Avoids many of the connectivity and compatibility problems that typically arise  E-marketplaces is the term describing Internet-based solutions for buyers and sellers. 8 System Architecture Checklist  Legacy System Interface Requirements  The new system might have to interface with one or more legacy systems (older systems)  Interfacing a new system with a legacy system involves analysis of data formats and compatibility  The analyst must know if the new application eventually will replace the legacy system 9 System Architecture Checklist  Processing Options  In planning the architecture, designers also must consider how the system will process data - online or in batches  Provision must be made for backup and speedy recovery in the event of system failure 10 System Architecture Checklist  Security Issues  Security threats and defenses are a major concern to a systems analyst  The analyst must consider security issues that relate to system design specifications and determine how the company will address them  Web-based systems introduce additional security concerns 11 Planning the Architecture Every information system involves three main functions: data storage and access methods, application programs to handle the processing logic, and an interface that allows users to interact with the system  Depending on the architecture, the three functions are performed on a server, on a client, or are divided between the server and the client  12 Planning the Architecture  Servers  Server  Clients  Mainframe architecture where the server performs all processing  A systems analyst should know the history of mainframe architecture to understand the server’s role in the modern system design 13 Planning the Architecture  Servers  Mainframe History In addition to centralized data processing, early systems performed all data input and output at a central location, often called a data processing center  Users had no input or output capability, except for printed reports that were distributed by a corporate IT department  14 Planning the Architecture  Servers  Server-based processing Terminal (keyboard and display units)  In a centralized design, the remote user’s keystrokes are transmitted to the mainframe, which responds by sending screen output back  As server technology evolved, terminal technology also changed dramatically  15 16 Planning the Architecture  Clients  As PC technology exploded in the mid1980s and 1990s, powerful microcomputers quickly appeared on corporate desktops  Users found that they could run their own word processing, spreadsheet, and database applications  Companies linked the stand-alone computers into networks 17 Planning the Architecture  Clients  Stand-Alone Computing Stand-alone computing was inefficient and expensive  Maintaining data on individual workstations raised major concerns about data security, integrity, and consistency  It was impossible to protect and back up valuable business data, and companies were exposed to enormous risks  This led to data inconsistency and unreliability  18 Planning the Architecture  Clients  Local and wide area networks Companies resolved the problems of standalone computing by joining clients into a local area network (LAN)  A wide area network (WAN) spans long distances and can connect LANs that are continents apart.  19 20 21 Planning the Architecture  Clients  Local and wide area networks The network is transparent because user sees data as if it were stored on his/her own computer  Compared to mainframe architecture, distributed systems increase concerns about data security and integrity  22 Planning the Architecture  Clients  Client-based processing In a typical LAN, clients share data stored on a local server  In a file server design, also called a file sharing architecture, an individual LAN client has a copy of the application program installed locally, while the data is stored on a central file server  A file server design requires significant network resources  23 24 Client/Server Architecture Today’s interconnected world requires an information architecture that spans the entire enterprise  Whether you are dealing with a departmental network or a multinational corporation, as a systems analyst you will work with a distributed computing strategy called client/server architecture  25 Client/Server Architecture  Overview  Client/server architecture refers to systems that divide processing between one or more networked clients and a central server  The client submits a request for information form the server, which carries out the operation and responds to the client  Many early client/server systems did not produce expected savings 26 27 28 Client/Server Architecture  Overview  Many companies had an installed base of mainframe data, called legacy data, which was difficult to access and transport to a client/server environment  The client/server concept continues to expand to include clients and servers outside the organization 29 Client/Server Architecture  Client/Server Design Styles  Client/server designs can take many forms, depending on the type of server and the relationship between the server and the clients  In each case, the processing is divided between the server and the clients 30 31 Client/Server Architecture  Fat and Thin Clients  Fat client - thick client locates all or most of application processing logic at the client  Thin client locates all or most of application processing logic at the server  Most IT experts agree that thin client designs provide better performance, because program code resides on the server, near the data  In contrast, a fat client handles more of the processing and must access and update the data more often 32 33 Client/Server Architecture  Client/Server Tiers  Two-tier design; UI on client, data on server, application on both or on each  Three-tier design; UI on client, data on server, application on middle layer (application server), because it provides the application logic, or business logic  Three-tier designs also are called n-tier designs  The middle layer is more efficient and costeffective in large-scale systems 34 35 36 Client/Server Architecture  Middleware  Enables the tiers to communicate and pass data back and forth  Provides a transparent interface that enables system designers to integrate dissimilar software and hardware  Can integrate legacy systems and Web-based applications 37 Client/Server Architecture  Cost-Benefit Issues  Client/server systems enable the firm to scale the system in a rapidly changing environment  Client/server computing also allows companies to transfer applications from expensive mainframes to less expensive client platforms  Client/server systems reduce network load and improve response times 38 Client/Server Architecture  Client/Server Performance Issues  Client/server architecture does involve performance issues that relate to the separation of server-based data and networked clients  In contrast to the centralized system, a client/server design separates applications and data  Client/server systems must be designed so the client contacts the server only when necessary and makes as few trips as possible 39 Client/Server Architecture  Client/Server Performance Issues  Distributed database management system (DDBMS)  Data stored closer to users can reduce network traffic  The system is scalable, so new data sites can be added without reworking the system design  The system is less likely to experience catastrophic failure 40 Internet-Based Architecture The Internet has had an enormous impact on system architecture  The advantages of Internet-based architecture are changing fundamental ideas about how computer systems should be designed, and many IT experts are shifting their focus to a total online environment  41 Internet-Based Architecture  Developing E-Commerce Solutions InHouse  If you decide to proceed with an in-house solution, you must have an overall plan to help achieve your goals  An in-house solution usually requires a greater initial investment, but provides more flexibility for a company that must adapt quickly in a dynamic e-commerce environment 42 43 Internet-Based Architecture  Packaged Solutions and E-commerce Service Providers  Many vendors offer turnkey systems for companies  Use an application service provider (ASP) that provides applications or access to applications  Use managed hosting; implement, update, troubleshhot, patch, monitor, administer, backup data  Consider the experience of other companies in the same industry, success stories 44 Internet-Based Architecture  Corporate Portals A portal is an entrance to a multifunction Web site  A corporate portal can provide access for customers, employees, suppliers, and the public 45 Internet-Based Architecture  Cloud Computing; cloud often represents Internet A user’s computer does not perform processing or computing tasks  Effectively eliminates compatibility issues  Scaling on demand; matches resources to needs  Requires significantly more bandwidth  Advances continue to make cloud computing more feasible, desirable, and secure 46 47 Internet-Based Architecture  Web 2.0  Envisions a second generation of the web that will enable people to collaborate, interact, and share information more dynamically  Wiki; web-based repository that anyone can access, contribute and modify  Internet operating system are layers of information added (text, sound bytes, images, video clips) and shared 48 Processing Methods  Online Processing  An online system handles transactions when and where they occur and provides output directly to users  Because it is interactive, online processing avoids delays and allows a constant dialog between the user and the system  Online processing also can be used with fileoriented systems 49 50 Processing Methods  Online Processing  Online processing systems have four typical characteristics: 1. 2. 3. 4. The system processes transactions completely when and where they occur Users interact directly with the information system Users can access data randomly The information system must be available whenever necessary to support business functions 51 Processing Methods  Batch Processing  In a batch processing system, data is collected and processed in groups, or batches  The IT operations group can run batch programs on a predetermined schedule, without user involvement, during regular business hours, at night, or on weekends; and batch programs require significantly fewer network resources than online systems 52 Processing Methods  Combined Online and Batch Processing  Even an online system can use batch processing to perform certain routine tasks  Also can be used with file-oriented systems  Online processing offers an inherent advantage because data is entered and validated as it occurs 53 54 Processing Methods  Combined Online and Batch Processing  Online processing is more expensive  Backup and recovery for online processing are more difficult  In many situations, batch processing is costeffective, less vulnerable to system disruption, and less intrusive  Many information systems will continue to use a combination 55 Network Models A network allows the sharing of hardware, software, and data resources in order to reduce expenses and provide more capability to users  The OSI (Open System Interconnection) Reference Model   Consists of seven layers where each layer performs a specific function  Offers a set of design standards that can promote interoperability among networks and products that are based on the OSI model 56 57 Network Models  Network Modeling Tools  As you translate the OSI logical model into a physical model of the networked system, you can use software tools, such as Microsoft Visio, which is a multipurpose drawing tool, to represent the physical structure and network components 58 59 Network Models  Network Topology  The way a network is configured is called the network topology  LAN and WAN networks typically are arranged in four patterns: hierarchical, bus, ring, and star 60 Network Models  Network Topology  Hierarchical network it mirrors the actual operational flow in the organization  One disadvantage of a hierarchical network is that if a business adds additional processing levels, the network becomes more complex and expensive to operate and maintain  61 62 Network Models  Network Topology  Bus network Devices can be attached or detached from the network at any point without disturbing the rest of the network  Overall performance declines as more users and devices are added, because all message traffic must flow along the central bus  Today, the bus design is much less popular  63 64 Network Models  Network Topology  Ring network Can be thought of as a bus network with the ends connected  One disadvantage of a ring network is that if a network device fails (such as a PC or a server), the devices downstream from the failed device cannot communicate with the network  The physical wiring can resemble a star pattern using a central device called Multistation Access Unit (MAU) wiring workstations into a logical ring  65 66 Network Models  Network Topology  Star network Has a central networking device called a switch  Disadvantage of the star design is that the entire network is dependent on the switch  However, in most large star networks, backup switches are available immediately in case of hardware failure  67 68 Network Models  Routers  Routers differ from switches in that they work at a higher OSI level  Gateway can connect to a larger, dissimilar network, such as the Internet  Proxy server provides Internet connectivity for internal LAN users 69 70 Network Models  Network Protocols  The network must use a protocol  A popular network protocol is Transmission Control Protocol/Internet Protocol (TCP/IP)  A familiar example of a TCP/IP protocol is the file transfer protocol (FTP) 71 Network Models  Network Licensing Issues  When considering a network design, it is important to take into account software licensing restrictions  You also must carefully investigate the capabilities of network software to ensure that it can handle the anticipated system traffic 72 Wireless Networks A wireless local area network, or WLAN  Wireless Network Standards   802.11 developed by Institute of Electrical and Electronics Engineers (IEEE)  Speed is measured in Mbps (megabits per second) 73 74 Wireless Networks  Wireless Network Topologies  Basic Service Set (BSS) – infrastructure mode  Central wireless device, access point, is used to serve all wireless clients 75 Wireless Networks  Wireless Network Topologies  Extended Service Set (ESS) can expand access over a wide area  Roaming automatically allows client to associate with stronger access point 76 Wireless Networks  Wireless Network Topologies  Independence Service Set (ISS) – peer-to-peer mode does not use access point  Wireless clients connect to each other directly 77 Wireless Networks  Wireless Trends  Wi-Fi (wireless fidelity) Alliance certify products that meet requirements as Wi-Fi compatible  BlueTooth is popular for short distance wireless communication  On addition to 802.11 protocols for LANs, IEEE is working on 802.16 standards for MANs (metropolitan area networks) which is called WirelessMAN™ or WiMAX (30 miles of range) 78 Systems Design Completion Now, based on a clear definition of system requirements and design, software applications can be developed, documented, and tested as part of the systems implementation phase of the SDLC  The final activities in the systems design phase are preparing a system design specification, obtaining user approval, and delivering a presentation to management  79 Systems Design Completion  System Design Specification  The system design specification is the baseline against which the operational system will be measured  A typical system design specification uses a structure similar to the following: 1. 2. 3. 4. 5. 6. Executive summary System components System environment Implementation requirements Time and cost estimates Appendices 80 Systems Design Completion  User Approval  Users must review and approve the interface design, report and menu designs, data entry screens, source documents, and other areas of the system that affect them  Other IT department members also need to review the system design specification  When the system design specification is complete, you distribute the document to a target group of users, IT department personnel, and company management 81 Systems Design Completion  Presentations  The presentations give you an opportunity to explain the system, answer questions, consider comments, and secure final approval  The first presentation is to the systems analysts, programmers, and technical support staff members  Your next presentation is to department managers and users from departments affected by the system 82 Systems Design Completion  Presentations  The final presentation is for company management  Key objective: to obtain management’s approval and support for the next development step  Management might reach one of three decisions: proceed with systems development, perform additional work on the systems design phase, or terminate the project 83
 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                            