As part of your job, you must complete a 10-to-15 page paper that follows this project.

Anonymous
timer Asked: Jun 6th, 2018
account_balance_wallet $10

Question description

Tony’s Chips has recently been sold to a new independent company. The new company has hired you to manage a project that will move the old Website from an externally hosted solution to an internal one. The company’s leadership is very concerned about redundancy for their site, insisting that a back-up site be available as a failover in case the main site goes down. In addition, they want the site redesigned to allow customers to order products online.



As part of your job, you must complete a 10-to-15 page paper that follows this project through the system development life cycle (SDLC). This assignment will require you to do the following:
•Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure the site is always available..
◦The Web architecture should describe and justify operating system choices (i.e., Linux, Apache, MYSQL, PHP, Windows, IIS, SQL, etc.)..
.
•Evaluate alternatives to the company self-hosting the site..
•Build a Gantt chart using Microsoft Project or equivalent software, showing all tasks associated with implementing the Website..
•The chart should include a minimum of five (5) tasks, each with three (3) sub-tasks..
•Explain and justify the system architecture you have selected..
•Illustrate the system architecture using Visio or equivalent software..
•Create a use case that documents the event of a customer ordering a bag of chips from the new Website..
•The use case should include a graphical representation using Visio or equivalent software and a text description of the events..
•Discuss the support operations that the internally hosted Website will require after implementation..
•Explain how you will evaluate the performance of the new site and the success of your project..
The specific Course Learning Outcomes associated with this assignment are: •Design high-level logical system characteristics (user interface design, design of data, and information requirements)..
•Use contemporary CASE tools in process and data modeling..
•Use technology and information resources to research issues in systems analysis and development..
•Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions..

Tutor Answer

Owenrayns
School: Cornell University

Attached.

PROJECT PAPER.

SYSTEM DEVELOPMENT LIFE CYCLE.

Network Reference Model Comparison of open systems interconnection and transport control
protocol/internet protocol.
The diagram below describes the role of each layer my retail store.

Data item

OSI

TCP/IP

Application

Application

This is the item in stock

It involves the pricing system
Presentation

Session

Segment

Transport

Transport

Packet

Network

Internet

Frame

Data link

Network access

Bit

Physical

cloud

The diagram below shows:

TCP/IP LAYER

HARDWARE AND SOFTWARE

Application

Data item stored on computer cloud or hard
drive storage is retrieved
The pricing system software is used in
selection.

Transport

Computer drivers enables transmission of data
items on request from pricing system
Data cables, wireless are used here

Internet

Wi-Fi or network Reuters are used here.

Network Layer

Enables IP addresses of different computers to
communicate.
Ethernet
ARP system.

The diagram below describes a data flow diagram:
OSI data flow diagram
Cashier number 2

Cashier number 1

Database

Switch

Firewall
Reuter 1

Concentrator

Reuter 2

Reuter 3

hub
Customer 2
Customer 1

TCP/IP data flow diagram

Customer

Cashier’s
computer
Application
server

internet

Mobile network

Wi-Fi

Multipath

Impact on encapsulation

Encapsulation is the process of protecting data by depicting its essential features.
In these models, encapsulation is seen to have provided adequate response and service the ever
layer below and above it.

Analysis.
The comparison between the two network models give the utmost intention to use any of
these models depending on the functionality. Otherwise stated TCO/IP model comes out to be
the easiest and least complicated to use compared to OSI model.

DATABASE ADMINISTRATION.
Data administration is the process by which database administrators' use specified programs to
analyze, organize and provide data storage.
Roles of database administration.
1. Data Security
This is the primary role of database administration. Data security is the most crucial task of
database administration, protecting data from loss, corruption or any other interruption is the
main concern. This is done by auditing data flow activities.
2. Data recovery and Data backup
Database systems are prone to weaknesses, due to this data should be backed up in a cloud
storage system and in case anything malicious happens to the data, it can be easily recovered
from the backup systems.
3. Data storage and Management
This role is purposely available when accessing, receiving, sending and sharing of data. It is
required that data should be shared with the right audience and stored in the required files. This
will enable fast execution of data.
Privileges of database administration.
Database administration privileges are acquired when you (the user) is the data administrator.
Such privileges include:1. Perform database statements such as Start, drop and roll forward when executing data.
2. Make changes to objects, folders, and files irrespective of its origin or owner's discretion
advice.
3. Performs tasks such as drawing tables, creating views and adding indexes to be owned by
users.
4. The database administrator can offer database privileges to other users.

RECOMMENDATIONS ON PERSONAL EXPERIENCE AND RESEARCH.
The story in question involves the major source of problems in many municipalities.
Communication is such a very important factor in any society. It delivers; sanity by clearing
doubts in the resident's hearts, acceptance of the current situation to the residents. A single lapse
in concrete information might compromise peace in a society. According to my personal
experience and research, the municipality in the story above should have strategized on the type
of network that would serve them efficiently and if not should at least cause a lesser evil. The
MAN (Metropolitan Area Network) was the best decision according to the area of coverage.
Although, this kind of network should be flourished with adequate resources during its
development stages. The management would have looked for ways to accumulate resources from
various department including reducing its budgeted cost for that financial year. This move would
have given them access to financial freedom in acquiring resources for this network. The
municipal directorate made a very non-strategic means of acquiring financial resources for
increasing parking and tickets offenses, instead they could have strategized on sponsorship from
resident companies with an exchange of future tax waivers.
On another recommendation; the network topology, architecture designs and public awareness
should have been factored into their strategy. This is explained below on the relevance of
network design considerations and how they can be affected.

RELEVANCE OF NETWORK DESIGN CONSIDERATIONS AND THEIR
IMPLEMENTATIONS
Network topology and architecture
Network topology involves the interrelations and positioning of links and nodes of a
communication network between two or more parties. Its structure can only be determined by
your user needs and this can be either logically or physically. Its modification comes in terms of
links and nodes whereby the link is placed between two nodes which are the communicating
parties. In this case, the MAN will be viewed as a big LAN, therefore, the network topologies
that can be implemented include; ring, star, bus, and mesh.
The relevance of this consideration of a network is that;
1.

It improves networking, this takes place when the path used by the data packet
is well specified by its capacity.
2.
Network topology used determines the quality and type of medium used in
cabling of the network peripherals.

3.

On a specified type of network that needs a classified security of its information
on networks of which there is a wide range of access methodologies on different
types of topologies.
4.
Different network topologies have different cost levels of network cabling

Network architecture design.
This is a blueprint of a communication network which entails physical framework of components
and how they are organized in a network. This is a major concept in telecommunication. The
recommendations to be made in the problem in question on network architecture of the MAN
network is that each element of th...

flag Report DMCA
Review

Anonymous
Awesome! Exactly what I wanted.

Similar Questions
Hot Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors