Week #9

advertisement
Systems Analysis I
System Implementation
ISYS 200
Glenn Booker
ISYS 200
Week #9
1
System Implementation

Now we get to actual creation of the system
we’ve designed


Notice the text covers this fairly quickly,
since many other courses are needed to cover
the skills and concepts needed for implementation
Key aspects of implementation include
how the information is distributed,
providing user training, and choosing
a good conversion strategy
ISYS 200
Week #9
2
Implementing Distributed
Systems

Variations of client/server (C/S) networks
have been widespread since the 1980’s,
and continue to evolve


ISYS 200
In basic form, C/S refers to some system
processing being done by a PC-based client
application, while other parts are done on
the server
Now we tend to have many types of specialized
servers instead of just one
Week #9
3
Implementing Distributed
Systems

Servers can include many varieties




File servers, to hold shared files
Print servers, to manage print jobs
Database servers, to run a shared
database system
Now we might add web servers to control
access to our system, and various kinds
of application servers
ISYS 200
Week #9
4
Types of Networks

The basic types of networks include



ISYS 200
LAN – Local Area Network, a typical home
or office-sized network
WAN – Wide Area Network, a corporate
network which spans continents
WLAN – Wireless LAN, a LAN which uses
wireless (Wi-Fi) connections
Week #9
5
Network Connections

Common network connections include



ISYS 200
Ethernet cable, an 8-wire cable (RJ-45 plugs)
similar to 4-wire phone lines (RJ-11)
Fiber optic cable, for Gigabit and faster networks
“Thick” and “thin” Ethernet cables are
pretty obsolete
Week #9
6
Organizing Networks

There are four major topologies (structures)
for a physical computer network





Bus
Ring
Star
Hierarchical
They may be combined in some cases, such
as a hierarchical top level structure, and stars
used locally
ISYS 200
Week #9
7
Network Topology - Bus



A key function to achieve connectivity
among computers is definition of the
network topology
The “bus” is the simplest topology - it
connects computers along a single line
A peer-to-peer (server-less) network uses the
bus topology, with AppleTalk or Ethernet
ISYS 200
Week #9
8
Ring Topology

The ring topology connects computers in a
loop, and passes packets of data from one
computer to the next


IBM’s Token Ring is the most famous example
Bad if a computer falls off the network – hard
to tell who “dropped” the packet
ISYS 200
Week #9
9
Star Network




Many clients may be connected to each
server across a star network
The middle of each star is a server
Servers are connected to each other
Very common – think of using a server for
each department, and be able to control
which departments can see each other
ISYS 200
Week #9
10
Hierarchical Network



This is a set of nested star networks, looks
kind of like an organization chart
Generally the servers get smaller the further
down the hierarchy
Sometimes used in very large corporations,
where the biggest servers store companywide or division-wide data
ISYS 200
Week #9
11
Network Modeling

A network for a system or an organization is
developed to meet a need-to-know basis



Ensure people who need to see data can get to it
And those who don’t need to, can’t
Networks are generally broken into portions
or segments which correspond to
organizational units

ISYS 200
One segment is the Accounting dept., another
is the Human Resources dept., and so on
Week #9
12
Network Modeling

Segments of the network are separated from
each other by network hardware


Routers, switches, hubs, bridges, and other toys
are the hardware involved*
The type of hardware is chosen based on



The protocols involved
The distances between segments
The amount of logic or processing needed
for isolation
* Cisco has some nice tutorials to help explain the hardware in more detail
ISYS 200
Week #9
13
Network Modeling


Based on the type of network topology
chosen, a network decomposition diagram
(p. 628) can be developed to show the parts
of a network, and who they can talk to easily
Different symbols can be used to show hubs
at the center of each segment, key types of
users, groups of related workstations, and
external networks
ISYS 200
Week #9
14
Network Modeling


In contrast, a hub connectivity diagram shows
the hubs of your network, and how far they
are from each other
A more detailed version is the workstation
connectivity diagram, which examines one
segment (hub) and looks at the distances
involved in its connections
ISYS 200
Week #9
15
Distribution

Since computers were invented, the amount
of distribution of data and processing
functions has tended to go up without end


The ultimate incarnation is web-based computing,
where both data storage and processing are
distributed across possibly hundreds of computers
While this allows more flexibility and often
better use of resources, it adds reliability
and security issues
ISYS 200
Week #9
16
Training Users


As a system is being implemented, several
key aspects of training need to be managed
While end user training is often considered,
there may be other kinds of training needed



ISYS 200
Training for other user roles, including managers
Training for support staff of the operational
system (help desk, and system maintainers)
Training for those who will train users (train-thetrainer), if there are many end users
Week #9
17
Training Users


Training may also be needed on commercial
components of the system, so vendors may
need to provide training on how their OS or
bridge works
Training may be conducted by systems
analysts, consultant trainers, or training
staff within your organization
ISYS 200
Week #9
18
Conducting Training

Training needs to be planned carefully




Need to determine its objectives and methods
Need to determine where to conduct training
Need to develop training materials, and keep
them consistent with the actual system
User training needs to be done before the
system is implemented, but not so long that
they forget what they learned!
ISYS 200
Week #9
19
System Conversion Strategies


To implement a new information system, you
are presumably replacing whatever existing
system (if any) and processes (whether
manual and/or automated) that are currently
performing the system’s functions
Need to choose a conversion strategy

ISYS 200
How to convert from doing things the old way
to using the new system
Week #9
20
System Conversion Strategies

There are about five types of conversion
strategies to choose from (p. 636)


ISYS 200
Direct changeover means the old system is used
until a stated date and time, after that, the new
system is used
Parallel conversion means that the old and new
systems are used together for some period of
time, until you’re okay to shut off the old system
Week #9
21
System Conversion Strategies



ISYS 200
Gradual conversion tries to slowly phase in the
percent of transactions handled by the new
system, until it does everything
Modular prototype conversion means that the new
system is developed in chunks of functionality;
when a set of functions are ready to be released,
it becomes operational and that part of the old
system is shut down
The distributed conversion strategy works
geographically – convert sites one group at
a time until they are all done
Week #9
22
Security Concerns


Both traditional and web-based systems
have security and privacy issues
Security concerns can be divided into
physical, logical, and behavioral

ISYS 200
Physical security is making sure the computer
facilities aren’t broken into, the computers don’t
get stolen, backup tapes don’t grow legs, etc.
Week #9
23
Security Concerns

Logical security is within the system software





ISYS 200
To ensure that users are validated,
Passwords expire and don’t get reused,
Passwords are sufficiently complex
User access to system functions really is controlled by
their security profiles
Firewalls on public Internet access points also fit into
this category
Week #9
24
Security Concerns

Behavioral security is avoiding compromise of
your system from inside – by its users







ISYS 200
Screening potential employees
Making security policies clear
Monitor behavior which may compromise the system
Limit number of incorrect sign-on attempts
Monitor your own software activity and look for
suspicious activities
Control distribution and/or encrypt system outputs
Shred discarded system outputs
Week #9
25
Internet Security

Basic aspects of Internet security include






Use and maintain virus protection software
Filter email from spam
Restrict Internet access by employees
Monitor network connections to the public
Encrypt anything passing through the Internet
The Rainbow Series of reports by the
NIST is a widely used set of computer
security standards
ISYS 200
Week #9
26
Privacy Concerns

Privacy has become a key public issue





ISYS 200
Establish clear privacy policies, and follow them
Only get required information
Make personal information optional, if you
must ask for it
Use anonymous sources about clients
where possible
Be ethical
Week #9
27
System Evaluation

Once the new system is fully operational,
it is important to evaluate its success


Go back to the system objectives developed
from the problems and opportunities analysis
Measure the quantities described in the objectives


ISYS 200
Customer satisfaction, system throughput, number
of transactions, number of bad transactions, …
Compare the measurements to the predicted
values, and analyze differences between them
Week #9
28
Download