.

Wednesday, July 17, 2019

Systems Analysis and Design

altitude pecuniary is a fast growing play along that owes part of its growth to several late acquisitions. ACME monetary now essentials to consolidate the companies breeding technology resources to eliminate periphrasis and sh be development among the freshly companies. The top dog nurture Officer (CIO) has oversight function for the project and has hired Client/Servers R Us to develop the architecture for the new integ cropd t for each one(prenominal)ing brass. Joe Consultant of C/S R Us presented 3 node/server designs to the CIO and is requesting the CIO to select wiz.The CIO is non sure which middlew atomic number 18 design is crush for the follows goals. The CIO has asked Chris Consultant to present the values and disadvantages for separately of the choices. Background ACME Financial corporate (AF Inc. ) is an enthronization banking company that leaves an on-line(a) accepter that whollyows their clients to approach account and market info. ACME Financial Inc. recently acquired several underage and medium sized companies passim the country, individu in ally with their own fiscal and accounting systems.Al virtually all of the companies lose developed their own lotion package for their analysts use in their day-by-day jobs, entirely provided a a few(prenominal) provided on-line account usefulness. The analytical tools entrust on near-real date market entropy and historical market instruction. The CIO wants to consolidate the financial and accounting information into a corporate information system that can keep up decision support uses for corporate management. Naturally, since the calculating machine hardw atomic number 18 is different for different companies, the CIO expects to come on the hardw ar to accommodate the new Information Technology (IT) system.The CIO testament select the best analytical parcel system as the regular software used by all company analysts. each local locate impart be expected to provide an on-line service for their nodes. Customers will be given the necessary act software to access their account information. Finally, ACME Financial has developed spare entropy dig software that gives them a belligerent advantage. AF Inc. poke outs their customers enthronization advice based on the information derived by the info excavation software.Each account carriage dress oneselfs the information and past provides tailored recommendationsto each customer based on their portfolio. constitution Requirements The following list of system assumements reflects the systems priori link ups (listed roughly in install of priority) 1. Availability The CIOs number one priority is high availability. AF Inc. markets their reliability and feels that most clients choose them for their dependability. The CIO wants to maximize the systems availability. To achieve high availability, if a fieldal major power cannot provide support then a customer must(prenomi nal) perpetually have access to the on-line service through a different office. 2.Data rightfulness The requirement for info integrity varies inwardly the system. The most important data are customers transactions. It is essential that a customers transaction is never lost and the system must batten down that each transaction is completed. In contrast, data lost from the high data rate inputs, such as Reuters and the NYSE, are light go backwardsed during the each parcel out so it is not critical if around data are lost during a broadcast. 3. Performance Financial markets are passing volatile time sensitivity of data is measured in minutes. Millions can be lost if information is delayed acquiring to the analysts.The system must be commensurate to support information broadcast throughout the network. 4. Security The CIO is refer round the credentials of the data archeological site software and the information produced by the data mining software. The tribal chief Exec utive Officer thinks the data mining information software provides a competitive advantage for the company. If an unauthorized user had access to the information they could steal the data mining natural coverings or steal the information produced by the data mining software. In all case, the perpetrator could make the same investment recommendations as AF Inc. account managers.Therefore, if competitors had access to the information the results could be financially devastating to the company. The CIO is concerned that a competitor could pose as a customer and hack into the highly sensitive information through his on-line service account. 5. Growth The CIO envisions an incremental migration exploit to install the new system out-of-pocket to the magnitude of the change. Also, he expects that AF Inc. will breed to grow and acquire to a greater extent companies. The CIO wants to be able to develop more practical application software as new customer go are cast uped. The CIO also wants to add more near-real time information sources tothe system. 6.Backup and recovery The CIO understands that the system will encounter problems from time to time. A key factor in determining the systems winner is how quickly the system can recover from a failure. Backup and recovery must be smooth and non-disruptive. One elbow room to verify that the system can easily recover from a system shipwreck is to make sure the data is duplicated elsewhere on the system. The corporate database is the primary back up for each of the regional offices. variant Each local office (Northeast, Northwest, Southeast, Southwest) has accesses a regional information hub.Local offices use client software to access the local application server. These application servers access the local databases for roughly all of the information conducted on a daily basis. For access to information needed less frequently the application software should access the central database at corporate home plate. Ea ch regional database has provided the subset of information that is relevant for its area, whereas the corporate headquarters maintains all of the information from each region as well as data that is unique to corporate applications, such as additional accounting and company financial information.The corporate office is also creditworthy for the data mining software and information. Each of the regional databases is connected with high talent links to the corporate database. Finally, the corporate office receives information from Reuters, NYSE, NASDAQ, and former(a) financial markets. The information flow fluctuates daily from 30 40 KBps to 4 5 MBps. Twenty-five portion of the information is flat broadcast to the regional offices to support the on-line account service. every(prenominal) the information is filtered and stored in the database. Architectural AlternativesAlternative I The Database Management System This alternative takes advantage of the extended functionality pr ovided by the popular comparative database management companies, such as oracle and Sybase. All information is delivered into the system where it is immediately stored into one of the databases. The relational database management software is answerable for the distri entirelyion of information throughout the system. Clients communicate with the databases through Standard interview Language (SQL). Corporate and regional databases are kept synchronized exploitation features supplied by the RDBMS software.Transactions are guaranteed by using special Transaction Processing Software. The vendor-supplied RDBMS software is responsible for back-up and recovery of all the databases. Data warrantor is shell outd at the row level at heart each database. This means that clients can only receive records for which their user has permission. existent application software may have to be modified to use SQL. Alternative II Common Object Request ingredient Architecture (CORBA) This radical depends on CORBA to tie together the clients and databases. CORBA is responsible for distributing data crossways the system.The RDBMS software is still responsible for the back-up and recovery, but the databases are kept synchronized using CORBA as the primary transport instrument for the data. Clients, application servers, and databases communicate to each other(a) through CORBAs transport mechanism. Existing application software would be cloaked in IDL to communicate with other applications. peculiar(a) near-real time handling application software would send the information to each of the regional offices where it would be directed to clients that subscribe to the information.Alternative triple Message and Queuing (M&Q) The nub and queuing design uses technical M & Q software combined with a transaction processing product to ensure customers transactions are completed. Dec Message Queue and MQ serial are some of the leading products for messaging and queuing software. Cl ients communicate to other entities using messages. Messages are deposited in queues and the message and queuing middleware is responsible for message distribution to the appropriate clients. The software applications will be modified to send and receive messages from queues.Questions to Answer (Total 100 points) The case study must be discussed covering the designs and these questions with your teammates, but your final write-up should be your collaborative work. Doing search on unique(predicate) products for the assignment should for certain be a team activity. The entire length of the write-up should probably not slip away 5 pages. 1. Describe in more detail the architecture of each architectural alternative. To do this you will need to pulp out the specifics of the various parts.This will require some research on theproducts indicated (or other comparable products that you locate). Note that some service are automatically provided when a extra product is purchased, while others must be developed to satisfy the system requirements. You should tell apart what services are automatically provided by the products, which services would need to be developed, and how services should be distributed across the network. (40 points) 2. Evaluate each of the alternatives against the system requirements, discussing the advantages and disadvantages of each. (You may assume that the hardware will support all solutions.)In your outline you might consider issues such as which alternative gives the system developers the most flexibility, which alternative provides easiest charge, and which alternative requires the least modification to the true system. Other hints for system comparison are listed below. (40 points) 3. Prioritize each alternative or suggest a different solution if you think it superior to the presented alternatives. (20 points) Suggestions on how to plump 1. There is not enough information to make an informed decision about each of the alternatives .As a team, allot a percentage of your time to discover which products offer what type of services. You do not have enough time to do a complete market survey so be selective. 2. If you depend only on marketing information you may find that the alternatives are equivalent. So you might want to go beyond the market literature in doing your research for this assignment. 3. As you do your analysis, pay particular attention to some of the following kinds of issues a. How well does the architecture support the basic system functionality requirements? b. How much recreate time performance overhead does the architecture impose?c. How well will specific products handle the high volume of data? d. How will each architecture handle occasional peak loads? e. How easy is it to customize the system to new requirements? 4. In your analysis, when you are considering equals, you do not need to consider the material product cost. (It may be impossible to get actual product costs anyway. ) Instea d, evaluate cost with respect to the amount of customized software that will be necessary to implement each alternative, and how this might affect long-term maintenance costs, time to implement, flexibility, etc.

No comments:

Post a Comment