System Architecture for Willowbrook School
Question:
Write a report about the Willowbrook School that accepts its system interfaces, outputs, inputs as well as data designs for their new information system.
Willowbrook School is one of the private schools in the Midwest of the United States. After the five years of the operations within the United States, the school offers after school care services to the population of the United States. These aftercare services are not given to only to the students of the Willowbrook School, but the services are also given to the schools within this particular area. The IT consultant of the Willowbrook School specializes in order to develop the IT solutions for their small businesses. The consultant of the school discusses the IT requirements with the director of the school, Victoria Owens. After analyzing the entire business operations of the school, the director, as well as IT consultant, discusses that they are required to set up a computer system so that their employees can be able to handle administrative and financial tasks for the school. With the use of IT system, they can reduce the workload of the staffs as well as teachers. It also makes their business operations more easily as well as time-consuming.
The report is based on the Willowbrook School that accepts its system interfaces, outputs, inputs as well as data designs for their new information system. The system architecture is designed that changes the logical design of the new information system into the physical design. The report gives the system architecture for the school based on the client server architecture. Advantages, as well as disadvantages of the client server architecture, are also reflected in this report so that the IT consultant makes sure that the chosen architecture is better for the school. Based on the system architecture, physical and logical network topology is recommended for the new information system of the school. System specification document is given to understand the hardware and software and other requirements for the school. An application development methodology is chosen for the system so that it should be implemented successfully for the school. Testing and training plan is discussed so that the staffs, as well as teachers, should become familiar with the use of the new information system. Apart from this, data conversion plan, as well as system changeover is specified so that the IT consultant identifies the changes make for the implementation of the information system.
Figure 1: System Architecture
(Source: Arvidsson, Holmstrom and Lyytinen 2014, Pg-965)
The best option to design the new information system for Willowbrook School is the client server architecture. After investigating the entire business operations of the school, the IT consultant recommends this architecture for the school. It is chosen for the school as it divides the workloads of the staffs as well as teachers between the service providers such as servers as well as service requesters such as clients (Bajdor and Grabara 2014). The clients, as well as the server, communicate with each other over the network on various hardware; otherwise, both the client as well as server resides within the same information system. With this particular architecture, the clients are not able to share the information of the school such as student’s details to any other sources. The client is requested for the content of the server. The clients are then initiating a communication session with the servers that wait for incoming requests.
Client-Server Architecture for New Information System
The best architecture is the three-tier architecture that consists of three different layers, and those three different layers are running on various platforms. Firstly, the users are running on the user’s computer. Secondly, the application layer consists of the functional modules that can use to process the data (Brown and Hinchey 2012). This middle tier runs on the server. Thirdly, the database server consists of the data management systems that are required to store the data those are needed by the middle tier. This tier runs on the second servers that are known to the database server. The three-tier architecture is better for the school as it adds modularity as well as makes it easier to modify one tier without influencing on any other tiers. The other advantage is that it separates the application functions from the functions of the database in order to implement a load balancing (Chitchyan et al. 2015). Based on the business operations of the Willowbrook School, the client server architecture is flexible as well as it increases the productivity of the school and makes profitability for them. The data are to be stored close to the persons those are using the server to do their task. Even the hardware, as well as software, used to implement the server should be integrated with flexibility such that the new information system should be installed successfully.
2.2.1 Advantages of the client server architecture
The following are the advantages of the client server architecture that helps the IT Consultant of Willowbrook School to take the decision to install a new information system in order to carry out the financial as well as administration tasks for the school:
- The client applications have no responsibility to perform the data processing. It only concentrates on appealing inputs from the users, requesting preferred data from the server as well as investigating the data based on the abilities of the workstation of the client (Ackermann 2012).
- The architecture is designed with no such dependence on the physical location of the data. When the data such as the details of an employee as well as a student are moved as well as distributed to the other databases, then the client application continues its functioning with little modification.
- The workstations of the client are optimized to present the data. The servers are optimized in order to process as well as storage of data.
- With the use of the client server architecture, the data are shared on the servers, rather than with the use of computers within the system (Abubakre, Ravishankar and Coombs 2015). It makes the operations of the school easier as well as efficient so that the director can be able to manage concurrent access to the data.
- Using the SQL statements, the client applications are submitted to the database requests to the client server. After the receiver of the database request, the SQL statements are to be processed by the use of the server as well as that database request is returned to the client application (Bibinagar and Kim 2013). The traffic of the network is to be kept minimum as both the requests as well as results are transmitted over the network.
- Due to an installation of this client server architecture, the performance of the staffs, as well as employees changes and it, becomes better than previous. As the database is stored successfully within the database server of the three-tier architecture, therefore it reduces the time of request as well as waiting for the clients (Blethyn and Parker 2014). Due to a reduction in the waiting time, both the operational, as well as maintenance cost of the school, also reduces. Therefore, it benefits the school.
The following are the disadvantages of the client server architecture that helps the IT Consultant of Willowbrook School to take the decision of not installing a new information system in order to carry out the financial as well as administration tasks for the school:
- Due to the use of the client server architecture, it causes network congestion as too many requests from the client leads to congestion over the network (Borger and Stark 2012). The overload over the network leads to a breakdown of the servers.
- This architecture is not robust. If there is any failure within the server, then the entire network goes down. At the time of download of the file from the server and due to an occurrence of an error, the download stops.
- The client-based server architecture is very expensive in order to install as well as manage (Bowen and Hinchey 2012). Even professional IT staffs are required in order to maintain the servers as well as other technical networks.
- The client-based server architecture has a lack of scalability, so they are very hard to manage as well as maintain by the staffs as well as teachers of the school.
- Due to an addition of extra nodes, the bandwidth of the network increases. Therefore, the entire bandwidth of the network is to be roughly computed due to a sum of the bandwidths of each of the nodes within that network. Due to this reason, it is difficult for the school to install it.
Within the business operations of the Willowbrook School, some of the cost benefit issues are raised as this client server architecture reduces the load on the network as well as develops over the response time of the staffs (Catthoor et al. 2013). Before the installation of the system, the clients face issues of delay in the transfer of data from one person to another person. Due to an expansion of the network, the operations becomes more easily as well as time-consuming. There is no requirement of any such server that can be the alteration of the existing server for the new information system for the school.
3.1 Physical Topology
The physical topology is the physical layout of the devices on the system of the school. The LAN has a topology that the devices on the network are prearranged as well as communicated with each other (Cetinkaya et al. 2013). The workstations are linked to the network using cables that can broadcast the data with the physical structure of the network. This topology refers to the structure of the LAN. It connects with the physical devices on the network with the use of cables. The physical network topology comprises of PCs and servers that are related to a solitary link with the help of interface connectors. Each of the workstations is spoken with another device by a method for transport. A sign from the source is shown, and it goes to the workstations connected with the transport link. An eliminator is associated with keep the skipping of signs.
Advantages and Disadvantages of Client-Server Architecture
Figure 2: Physical Network Topology
(Source: Chitchyan et al. 2015, Pg-345)
It is the arrangement of the devices on the computer network as well as how it is communicated with each other. The devices are to be connected to the network using the actual cables that can transmit those data. It shows how the system is communicated across the physical topologies (Davenport 2013). The LAN within the network eliminates the transport topology conveys the sign produced by the transmitter towards the devices. Inside this system topology, none of the end devices is required with a specific end goal to recover a signal from other connected devices keeping in mind the end goal to get it. The techniques the information is passed all through the system from one of the devices to the next in light of the physical interconnection of the attached devices. Ethernet is reflected as the consistent network topology for the specific proposed framework.
Figure 3: Logical Network Topology
(Source: Cooling 2013, Pg-456)
From the above discussion on the physical as well as logical network topologies, the differences among the two network topologies are demonstrated within the shared Ethernet network. It employs the hubs instead of the switches. With the connection to the network, the logical topology reveals the bus shape connection. It shows that each of the nodes connects with the central hub on the network (Clark and Jackson 2015). The logical topologies are bounding on the network protocols as well as it describes that the data are moved across the network. It is also analyzed that all the systems have the ability to access the physical layout when it is required. The main advantage of the physical, as well as logical topologies for the client server architecture, is that using this particular architecture, the systems have unrestricted access to the physical media. Within the physical network topology, Ethernet is used as the protocol that is used to avoid the problem of collision among the data (Dastrup et al. 2014). If there is no collision among the data, then this architecture is successfully installed for the Willowbrook School so that the management team can perform the administrative as well as financial tasks.
According to the previous tasks, the school needs a client server architecture that will incorporate three tiers of architecture within a scaling mode. Moreover, the architecture contains some aspects like flexible basic architecture, improvement of productivity, configurable data processing system and integration of hardware and software system. Hence, for fulfilling all these aspects, the following hardwares are required:
Serial Number |
Hardware required for the proposed information system |
1 |
Database server |
2 |
Router |
3 |
Web server |
4 |
Application server |
5 |
Access point for the internet |
6 |
CPU |
7 |
RAM |
8 |
Networking hardware |
Database Server – A database server is a computer software program that provides database administrations to other computing projects or computer systems, which is the basic application of a client–server model. The term may likewise denote a computer that is devoted to run a similar project (Davis, Bollinger and Dijkema 2016). Database management frameworks often give database server utility, and some DBMSs (e.g., MySQL) depend only on the client–server model for access of database (Dingsoyr, Nerur, Balijepally and Moe 2012).
Three-tier Architecture
Such a server is used for either through a “front end” running on the client’s computer, which shows queried data, or the “back end” which keeps executing on the server and is used to handle projects, for example, information operations and storage systems.
According to the basic objective of a master slave model, database specialized servers are primary and essential areas of data while database slave servers are synchronized reinforcements of the master, denoted and referred as intermediaries (Dennis, Wixom and Tegarden 2015).
The vast majority of the Database servers work on the basis of Query language. Every Database realizes its query language, proselytes it to the server meaningful frame, and operates it to recover the outcomes.
A few cases of exclusive database servers are Oracle, DB2, Informix, and Microsoft SQL Server. Examples of GNU General Public License database servers are Ingres and MySQL. Each server utilizes its own question rationale and structure. The SQL question language is pretty much the same in all social database servers. DB-Engines records more than 200 DBMSs in its positioning (Dingsoyr, Nerur, Balijepally and Moe 2012).
Router – A router is a network connections device that moves information packets between computing systems. Routers play out the role of “movement coordinating” actors on the internet (Olsson, Bosch and Alahyari 2013). An information packet is normally sent starting from one router to the next through the systems that constitute the internetwork until it achieves its destination node.
The most commonly used routers are home and small office routers that basically transfer information, for example, website links as well as pages, emails, IM and recordings between the home computers with the help of the internet. A case of a router would be the proprietor’s link or DSL router, which interfaces with the Internet through an ISP (Dennis, Wixom and Tegarden 2015). More refined routers, for example, project routers, interface expansive business or ISP systems up to the capable center routers that forward information at fast along the optical fiber lines of the Internet spine. In spite of the fact that routers are normally devoted equipment gadgets, utilization of programming based routers has developed progressively regular (Dingsoyr, Nerur, Balijepally and Moe 2012).
Web Server – A web server is a computer network system that processes requests using HTTP, the basic network protocol used to distribute information on the World Wide Web. The term refers to the entire system, or specifically to the software that is used to accept and supervise the HTTP requests.
The essential function of a web server is to store, handle and convey site pages to customers. The correspondence amongst customer and server happens utilizing the Hyper Text Transfer Protocol (HTTP) (Olsson, Bosch and Alahyari 2013). Pages conveyed are most much of the time HTML reports, which may incorporate pictures, templates and scripts notwithstanding content substance.
While the primary objective is to serve content, a full implementation of HTTP additionally includes methods for receiving data or information from the customers (Dennis, Wixom and Tegarden 2015). This element is utilized for submitting network frames, including transferring of documents.
Cost Benefit Issues
Application Server – An application server is a software structure that gives both facilities for making web applications and a server domain to run them.
Application Server Frameworks contain an extensive administration layer model. An application server goes about as an arrangement of segments available to the product engineer through an API characterized by the stage itself. For Web applications, these parts are normally performed in the same running environment as their web server(s), and their primary occupation is to bolster the development of element pages (Dingsoyr, Nerur, Balijepally and Moe 2012). In any case, numerous application servers target substantially more than simply Web page era: they execute administrations like grouping, come up short over, and load-adjusting, so designers can concentrate on actualizing the business rationale.
On account of Java application servers, the server acts like an augmented virtual machine for running applications, straightforwardly taking care of associations with the database on one side, and, regularly, associations with the Web customer on the other.
Different employments of the term may allude to the administrations that a server makes accessible or the PC equipment on which the administrations run.
Access Point for the Internet – Internet Access Points are needed to provide to provide internet services to the computers used in the organization. These points may include a common router, modem, LAN network and others.
CPU – A central processing unit (CPU) is a device (electronic hardware gadget) inside a computer that helps to complete guidelines of a computer program by playing out the essential calculations, legitimate, control and input/output (I/O) operations specified by the instructor (Valacich, George and Hoffer 2015). The device has been used as a part of the computer business since the mid 1960s. Traditionally, the expression “CPU” denotes a processor and more particularly, to its preparing unit and control unit (CU), recognizing these center components of a PC from outside segments, for example, primary memory and I/O hardware.
RAM – Random access memory is a type of computer data storage syste,. A random access memory gadget permits information things to be gotten to (read or written) in nearly the same measure of time independent of the physical area of information inside the memory (Olsson, Bosch and Alahyari 2013). Interestingly, with other direct-access to information storing media, for example, hard discs, CD-RWs, DVD-RWs and the old drum memory, the time required to read and write information data differs fundamentally relying upon their physical areas on the recording medium, because of mechanical impediments, for example, media rotation speeds and arm movement.
Networking Hardware – Networking Hardware, otherwise called network equipment or computer organizing gadgets, are physical gadgets which are required for correspondence and cooperation between gadgets on a computer system (Dingsoyr, Nerur, Balijepally and Moe 2012). In particular, they intervene information in a computer system. Units, which are the last beneficiary or create information are called hosts or information terminal gear.
5.1 System Design Document
Purpose of the Document |
The objective behind this record is to store the framework outline determinations details of the new data framework for Willowbrook School. The new framework ought to track the enlistments of the understudies, educational cost, and installment and in addition aftercare charging (Yan et al. 2014). This archive gives the extent of the new data framework with a diagram of the segments, modules, framework configuration, structure and connections, client interface issues and the calendar. It helps the undertaking group to convey forward the implementation procedure inside the school. |
Scope of the Development Project |
With the utilization of new data framework, it makes adjustable reports in the framework and afterward takes out the prerequisite to trade the information into the outside spreadsheets. The complete documentation is done in the framework and dispensed with the utilization of Word documents (Wolf 2012). The new data framework screens the record for following, reporting and also auditing the expenses. It has the capacity to audit the individual exchanges of the understudies with full subtle elements data inside parity for more productivity cost examination (Hsieh and Lin 2016). |
Overview of the Components/Modules |
In the proposed data framework for Willowbrook School, it comprises of three parts, for example, educators, authoritative and understudies. The key modules of the three key segments are: After login into the information system, 1. School Admin is responsible for managing the details of the student and the payment process. 2. Teachers are responsible for managing the details of the examinations as well as the subjects to be taught within the school campus (West, Nanz and Meyer 2015). 3. The students are responsible for managing the details of the subjects and amount of the course fee is to be managed by the system. |
System Design for the Information System of Willowbrook School |
The framework is outlined utilizing the equipment, for example, database server, switch, web server, application server, an entrance point for the web association, Networking equipment, CPU, and RAM. The physical and coherent system topology in view of the framework design is transport topology. The proposed framework depends on three-level customer server design. The three sections of the three-level outline comprise of the customer application, server application, and database identified with dealing with the details of the student (Diamond 2016). This framework engineering makes simpler for the school to advance the application according to the necessities and in addition open doors for Willowbrook school. The current framework is forever held with the utilization of new three-tier architecture. |
Structure and Relationships |
There are some needs among the units such as: All the students, teachers as well as school administration must depend on the provided login module. There are two types of users within the login module such as: 1. Registered users: These are the users who have already registered with the school login page. 2. Unregistered users: These are the guest users who have not yet registered. |
User Interface Issues |
There are two of the interfaces inside the execution of the data framework are the clients and additionally the overseer. It has a bit of expectation to learn and adapt, and it is anything but difficult to utilize. The login module permits the clients to secure access to the information (Bowen and Hinchey 2012). After the preparatory examination on the whole framework outline, the clients and administration groups can convey both times and a cost gauge for the whole usage arrangement. |
Proposed Process |
Component: Login
5. Depending on the data of login, the server will allow the user to access the system. 6. In order to perform the financial as well as administrative obligations, the user must have a reliable internet connection. 7. The most important factor is that, the server authentication is needed to prevent the data from accessed by any unauthorized person (Wasson 2015). 8. My SQL database is also required within the system. |
6.1 Software Implementation Structure for Willowbrook system
The project team of the Willowbrook School is making use of agile software development technique for implementing along with releasing and delivering the system. In agile development the processes that are to be done are divided into small subprocesses. The development methodology is established on the basis of iteration (Dyba and Dingsoyr 2015). While working on developing an application, agile provides the opportunity to change the scope of the project continuously. In addition with that, Willowbrook authorities will be able to rank the product features and functionalities at the beginning of individual iterations. The key ideas that underlies in the agile methodology are transparency, analysis and adaption. While the authorities introduce new features in the system, the prioritization of the features and functions are highly important (Visser et al. 2014). The development and management team of the project relies on an empirical approach. This procedure advances constant emphasis of improvement and also testing through the advancement of the product life cycle of the undertaking (Eckstein 2013). With the utilization of coordinated improvement philosophy, the undertaking requires taking care of the current prerequisites to best suit with the necessities of the venture. Inside the nimble improvement approach, the errands are to be conveyed with particular components for the discharge.
Physical Network Topology
The advantages of the structured approach are as following.
- Reduces the intricacy of the new data framework
- It gives a future introduction of the new data framework
- Focuses on the perfect or sensible framework (Farber et al. 2012)
The disadvantages of structured approach are as following.
- If there are any adjustments in the prerequisites of the new framework, then the framework examination ought to be done once more.
- Using the organized methodology, it takes a ton of time and additionally cash for the Willowbrook School so as to investigate the framework (Gajski et al. 2012).
- If there are colossal changes inside the framework, then the staffs ought to be given preparing that is wastage of both times and also cash.
The advantages of Object Oriented approach.
- Lower maintenance effort: The main goal of the object oriented development is that it allows the system a longer life with lesser maintenance cost (Vieru and Rivard 2014). It is because encapsulation of most of the tasks is already done in this approach and because of it the behaviors may implement into fresh behaviors and reused.
- Enhanced code reusability: The basic concept of the object oriented development is that the newly created abject will incorporate all the characteristics of the class of which’s it is a instance (Galliers and Leidner 2014). If a user will create a new widget and the it automatically gets all the predefined characteristics within it.
The disadvantages of Object Oriented approach.
- Issue with acceptance: The major vendors in the market are not currently making use of the object oriented approach. Furthermore, they are not looking forward to use the approach in future (Gandomani et al. 2013).
- It is not a technology: Though the object oriented approach is favored by many but the reality is that it is not a particular technology rather it can be seen as a methodology which is related to problem solving.
The advantages of agile development approach.
- Engagement of Stakeholder: The team and the stakeholders get various opportunities before, during and after individual sprint. The management team can gain a high degree of collaboration through incorporating the Willowbrook authority at every phase of the project (Givoni et al. 2013).
- Predictable delivery: Through the use of the time boxed, constant schedule Sprints of one to four weeks the team will be able to quickly deliver the new features.
The disadvantages of the agile development approach.
- Continuous change of requirements: In the agile development, the requirements of the project get updated or changed frequently. Without proper flexibility the project can collapse (Gualberto et al. 2016).
- Insufficient requirements: The requirements of the agile methodology are not sufficient enough.
- Testing: Though testing an essential part of any project but in the agile development the testing have to be done throughout the lifecycle. Because of that reason the resources allocation and the cost increases.
7.1 Detail Testing Plan Regarding Proper Data Set:
Ordinarily, the COMBINATORIAL TEST DESIGN strategy is connected in the accompanying stages. To start with the analyzer builds the framework model by giving the arrangement of executable situations. In the wake of picking the scope necessities, the second stage is developing a test arrangement, i.e., proposing an arrangement of tests over the framework model, so that full scope is accomplished. By and by, considering the human variable, blunders are conceivable at both of these stages (Hsieh and Lin 2016). Additionally, mistake revelation in the test arrangement may bring about the analyzer to come back to the display and refine it, and the other way around. To mirror the iterative and incremental nature of the two phases of combinatorial test design, we propose the term ‘dexterous test arranging’. This idea depends on the supposition that the analyzer’s activity is not error proof: mistakes can happen, both in the model and the test arrange, and ought to be considered. Accordingly, we don’t expect full accuracy of the model or of the test arrangement, or maybe they are both refined interactively by the analyzer until going to a lucid arrangement (Jan et al. 2016). In deft test plan, the analyzer determines all the while the combinatorial model of the framework , the arrangement of all conceivable tests and an arrangement of proposed tests for it, fulfilling some picked strategy of scope such as pair wise scope. The fundamental unit controlled by the analyzer is a test. A test is spoken to by a vector of qualities allocated to frameworks’ parameters. The framework model is an arrangement of all tests which portray conceivable (or executable) practices of the framework (Kaya et al. 2014). A test arrangement is an arrangement of tests out of the framework model space which fulfill some picked scope strategy, (for example, pairwise testing). We isolate the space of tests into three fundamental sorts, as indicated by the data accessible from the analyzer:
- Approved – these are the tests that the analyzer affirmed as executable (as indicated by some picked affirmation system).
- Rejected – these are the tests that the analyzer rejected as incomprehensible, either by expressly expelling them from the model, or by giving a coherent condition that tenets them out (Koponen et al. 2014).
- Questionable – these are the tests for insufficient data has been given to group them as accepted/rejected.
We allude to these sorts as hues: green, red and yellow separately. Lithe test configuration is an iterative process, the objective of which is to accept or dismiss every conceivable test, landing at a lucid combinatorial model of the framework, together with a test arrangement fulfilling the picked scope (Van Gigch 2013). At the end of the day, the objective is dispensing with all yellow tests by bringing up a progression of issues to the analyzer, which figure out whether tests are lost from test arrangement or the combinatorial model (Leau et al. 2012). The procedure portrayed above takes into consideration an awesome measure of adaptability, both for client questioning techniques, and for approval/dismissal systems. Case in point, we might need to minimize the time it takes the analyzer to land to a rational arrangement, or the intellectual heap of the analyzer by introducing him just little packets of tests in individual iterations.
8.1 Training Plan and Activities on the basis of User Group:
The training will be conducted through ITS or intelligent tutoring system with the outcome in system based on production rule or SBPR.
8.1.1 Intelligent Tutoring System:
To be viewed as a savvy framework, the framework must have three qualities that shows insight:
- The subject ought to be surely sufficiently understood all together for the framework to make deductions about the space or tackle issues that are in their extent of activity;
- Must have the capacity to assess the understudy;
- It must give instructing systems that minimize the distinction between the disciple and the expert (Levin et al. 2012).
An ITS has the area information barely and plainly verbalized, utilizing the understudy’s information to adjust instruction, the arrangement of instructing is not pre-decided, perform indicative strategies most appropriate to the understudy and permit the guide understudy communication (Marabelli and Galliers 2016). It has in its conventional engineering four utilitarian segments: the subject that educates the ones that describe the understudy, student module to give individualized direction, the systems for educating such as mentor or showing module and the correspondence module, which ought to be all around arranged and simple controlled to support the coach understudy correspondence as showed in figure 1.
Tutor Intelligent System Module
(Source: Gualberto et al. 2016)
This framework comprises of an utilization of an ITS for preparing of medicinal services experts working in the NICU. Its object is to help an educator in the preparation assignment of another client then again even experienced clients with the end goal of preparing and upgrade in connection to the neonatal hatchery use mode in basic and unfavorable conditions and its cautions (Olsson, Bosch and Alahyari 2013). The apparatus created tries to encourage the demonstrating of new cases, as well as the presentation of new scenes in the framework. The model incorporates the accompanying components:
- User amicable interface for displaying new cases: the designer gives another option to the case definition models, empowering the making of models that depict a script for a scene (McCauley et al. 2013).
- User-accommodating interface for entering cases: utilize the information characterized in the calendars to offer diverse blends of trait values in the insertion of new cases.
- Similarity measures: it computes comparability that has a given case for all different cases that take after the same model;
- Model perspectives and Cases: looks the cases that were demonstrated in the framework furthermore the cases as of now entered on it (Rahman and Boutaba 2013).
Utilizing the SBPR is conceivable to set up an information base (details and elements of the neonatal hatchery), based on meetings with specialists in the issue space. The SBPR is incorporated with a database of chronicled information values comparing to the association with clients and witch serve it to the representation of the hazards simultaneously (Reddy and Prasad 2015). Accordingly it is conceivable that the deductions brought on by different associations are recognized and clarified with total accuracy, permitting the utilization of manmade brainpower methods to surmise the events emerging from collaborations and their working methodology.
The working cycle of the SBPR are the certainties (cautions and occasions) that are gathered from the procedure through the correspondence program created in Java that before long, are investigated and executed with the premises of the standards in OPS5, empowering them and after that the finishes of the standards that are displayed to the client by the framework.
This current framework’s principle reason for existing is to be a graphical and userfriendly interface with the social insurance proficient. Its most imperative exercises are:
- Provide to wellbeing experts every single operational strategy of neonatal hatchery (determinations, capacities, operations, alerts, and so on.) from a hypermedia and intelligent interface;
- Present genuine circumstances of precariousness utilizing the data contained in the database gave by the Data Capturing Arrangement of the procedure (Sadagopan 2014);
- Present determination of antagonistic circumstances, and in addition conceivable moves to be made by wellbeing experts with a specific end goal to make the proper activity keeping in mind the end goal to right it;
- Allow to the human services proficient association with the framework with a specific end goal to encourage the preparation of institutionalized techniques to revise unfriendly circumstances;
- Evaluate the human services proficient learning with a specific end goal to find their shortcomings and encourage their preparation at these focuses.
9.1 Development of a Data conversion plan
The basic parts of a data conversion plan is as follows,
Overview – Prepare a description for the background of data along with process and the context in the high level.
Risks – Make the documentation of the risks that surrounds the strategy of data conversion. The items that are to be considered has the inclusion of the scope, environmental testing, usage of tools etc. There should be an identification of the risks and management of the contexts in the overall plan of risk management (Salmela et al. 2016). The risk plan’s identified activities should be shifted to the schedule of the project.
Scope – This section should be used for the description of the types that are required for conversion. It actually takes into consideration of the information in the tables, databases, paper and data files (Valacich, George and Hoffer 2015). The importance of scope is there that there are many files needed for conversion and there is the importance for understanding the files that are different in case of companies or organizations.
Approach – A description of the approach of the high level will be there to capture and convert the data. A discussion on the overall conversion effort will be done. It will emphasize the conversion procedure of the files and its high level timing. If there is the complications of data conversion then provide a description for the sequence to convert the data (Schadow 2013). Normally the conversion of data is been done before the movement of the components towards the production. It actually makes the validation of the data convert timing and the solution components movements towards the status of production.
Security – A discussion will be done whether the data requires handling in special manner due to its security. The security feature has the importance regarding the process of conversion as there is access and manipulation of the data for production. A description will be there for the ensuring that accessing data of sensitivity has been restricted to the personnel who are considered to be inappropriate.
Synchronization and integrity of data – A description of the high level will be given for validation of the data to check whether the conversion has been correctly done. It actually make an inclusion of some audit types and will make the controlling of the reports for ensuring the data which are important and relevant (Scheerer et al. 2013). Those data are actually represented in the data that is converted. There is also the issues regarding synchronization of data. There will an importance that the data that is been converted in the earlier times should remain in synchronization with the data that are produced until the overall solution has the movement to the production.
Recovery and back up of data – There will be a thought process for recovering of the problems which has the occurrence towards the process of data conversion. There may be a requirement for stopping the movement towards the production, but there will be no such luxury. There may be a requirement for the data that is going forward but still there will be continuation of the process of implementation. Whatever the recovery may be, it will be the exact time for thinking regarding the options.
There will be a data maintained in excel of Willowbrook school that should have export in the system of new information (Seth and Goyal 2015). The proposed system will contain the exported data. The student’s information is the significant data for system entry. A student’s monthly billing will be done as its data is entered. The entered data are block information along with student attendance.
Order of data entry |
Student |
Section of bill |
Guardian information |
Block segment |
Status of Attendance |
1 |
Student name |
Date of pay |
Number of household |
Year |
Student information |
2 |
Number of student |
Student data |
Student data |
Number of student |
Id of the block |
3 |
Fee that is fixed |
Dates of bill |
Number of contacts |
||
4 |
Number of household |
||||
5 |
Parent information |
||||
6 |
Number for contacts |
As per the change of the technologies, many organization find a need to modify their information systems based on computers. Upgradation of such systems actually provides help for the optimization of their efficiency and makes them competitive (Sharma, Sarkar and Gupta 2012). Making decision for opting the technique of changeover will work in the best level for the company that has the dependency regarding its risk and changeover type.
The Willowbrook School makes a request of the method that is of direct cutover which has a timing for a single academic year (Simpson, Schraeder and Borowski 2015). The school makes a scheduling for the purpose of the billing where it is planned that the billing that is scheduled should have to be completed within the month of April and commence from July. The ending of the billing of dropin aftercare will not finish till June’s second week. This time approves a system to be functional for one and half month (Stephens et al. 2013). There will be a cutover method that is direct to be used by the school for the system.
There may be issues, which are significant that will be raised in the system due to implementing this method. The time to allocate for completing the changeover is not the important amount for testing and rectification of the issues, which are potential (Syriani et al. 2013). The recommendation from the system analyst will not state to use the method for cutover for the information system that is new.
The analyst will give a recommendation to use the phased operation for allowing the system to be installed in the different phases and will give extensive time for testing the system and rectification of the issues (Tomanek, Cermak and Smutny 2015). There will be a fixed fee billing phase to perform the school’s financial tasks. The phase in the preliminary level will have a start during April after clearance of the first fee bill. The system for phasing will allow the installation of the whole system as well as testing in 2 months before the billing of aftercare is been done. As the aftercare billing gets finished, the phasing of the system will be installed properly and then tested. Overall, the allowed time for the aftercare billing to be fully functional is one and half months through the installation and testing of the integral system.
10.0 Conclusion
From the above discussion, a conclusion may be drawn that the Willowbrook school’s latest information system does require an architecture on client server framework. There will also be a three-tier framework for the school’s mode of scaling. The applicant of the client should have execution in the computer, that is same and it will lead to more effective and efficient system. In such system, both the client and the server will have execution through the computer that is connected through the usage of the network. The system that is used for Willowbrook School for development of the application uses a methodology that is very agile. The operation of phase has a usage of the method for changeover for the system that is new for the completion of the installation of the information system that is new for transactional activities. The procedure for testing has been done for making certain that the system, which is new should have the assembling of the goals of the school of Willowbrook. The teacher, the staffs and the member of the other management have the training for handling the system for making sure there is an understanding of the system as well as the functionality of the system.
References
Abubakre, M.A., Ravishankar, M.N. and Coombs, C.R., 2015. The role of formal controls in facilitating information system diffusion. Information & Management, 52(5), pp.599-609.
Ackermann, J., 2012. Sampled-data control systems: analysis and synthesis, robust system design. Springer Science & Business Media.
Arvidsson, V., Holmström, J. and Lyytinen, K., 2014. Information systems use as strategy practice: A multi-dimensional view of strategic information system implementation and use. The Journal of Strategic Information Systems, 23(1), pp.45-61.
Bajdor, P. and Grabara, I., 2014. The Role of Information System Flows in Fulfilling Customers’ Individual Orders. Journal of Studies in Social Sciences, 7(2).
Bibinagar, N. and Kim, W.J., 2013. Switched ethernet-based real-time networked control system with multiple-client–server architecture.Mechatronics, IEEE/ASME Transactions on, 18(1), pp.104-112.
Blethyn, S.G. and Parker, C.Y., 2014. Designing information systems. Butterworth-Heinemann.
Borger, E. and Stark, R., 2012. Abstract state machines: a method for high-level system design and analysis. Springer Science & Business Media.
Bowen, J.P. and Hinchey, M.G., 2012. High-integrity system specification and design. Springer Science & Business Media.
Catthoor, F., Wuytack, S., de Greef, G.E., Banica, F., Nachtergaele, L. and Vandecappelle, A., 2013. Custom memory management methodology: Exploration of memory organisation for embedded multimedia system design. Springer Science & Business Media.
Çetinkaya, E.K., Broyles, D., Dandekar, A., Srinivasan, S. and Sterbenz, J.P., 2013. Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: A simulation-based approach. Telecommunication Systems, 52(2), pp.751-766.
Chitchyan, R., Rashid, A., Sawyer, P., Garcia, A., Alarcon, M.P., Bakker, J., Tekinerdogan, B., Clarke, S. and Jackson, A., 2015. Survey of aspect-oriented analysis and design approaches.
Cooling, J.E., 2013. Software design for real-time systems. Springer.
Dastrup, D., Ferreira, G., Zacharial, D., Natter, D., Kellum, L., Davis, B., Alexander, M. and Selck, J., 2014. A Plan for Conversion of Stormwater to Groundwater Recharge on the Utah Valley University Main Campus, Orem, Utah. 2013 NCUR.
Davenport, T.H., 2013. Process innovation: reengineering work through information technology. Harvard Business Press.
Davis, C., Bollinger, L.A. and Dijkema, G.P., 2016. The state of the states: Data-driven analysis of the US Clean Power Plan. Renewable and Sustainable Energy Reviews, 60, pp.631-652.
Dennis, A., Wixom, B.H. and Tegarden, D., 2015. Systems analysis and design: An object-oriented approach with UML. John Wiley & Sons.
Diamond, D.J., 2016. A RELOAD AND STARTUP PLAN FOR CONVERSION OF THE NIST RESEARCH REACTOR (No. BNL–112005-2016-IR). Brookhaven National Laboratory (BNL), Upton, NY (United States).
Dingsoyr, T. and Moe, N.B., 2013. Research challenges in large-scale agile software development. ACM SIGSOFT Software Engineering Notes, 38(5), pp.38-39.
Dingsoyr, T., Nerur, S., Balijepally, V. and Moe, N.B., 2012. A decade of agile methodologies: Towards explaining agile software development. Journal of Systems and Software, 85(6), pp.1213-1221.
Drutskoy, D., Keller, E. and Rexford, J., 2013. Scalable network virtualization in software-defined networks. Internet Computing, IEEE, 17(2), pp.20-27.
Dyba, T. and Dingsoyr, T., 2015, May. Agile project management: from self-managing teams to large-scale development. In Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on (Vol. 2, pp. 945-946). IEEE.
Eckstein, J., 2013. Agile software development with distributed teams: Staying agile in a global world. Addison-Wesley.
Farber, F., Cha, S.K., Primsch, J., Bornhövd, C., Sigg, S. and Lehner, W., 2012. SAP HANA database: data management for modern business applications. ACM Sigmod Record, 40(4), pp.45-51.
Gajski, D.D., Dutt, N.D., Wu, A.C. and Lin, S.Y., 2012. High—Level Synthesis: Introduction to Chip and System Design. Springer Science & Business Media.
Galliers, R.D. and Leidner, D.E., 2014. Strategic information management: challenges and strategies in managing information systems. Routledge.
Gandomani, T.J., Zulzalil, H., Ghani, A.A.A., Sultan, A.B.M. and Nafchi, M.Z., 2013. Obstacles in moving to agile software development methods; at a glance. Journal of Computer Science, 9(5), p.620.
Givoni, E., Ravitz, N., Ravitz, Z., Nguyen, T.Q. and Nguyen, T., Smartesoft, Inc., 2013. Automated software testing and validation system. U.S. Patent 8,347,267.
Gualberto, D.R., Custódio, R.A.R., Dias, A.R.P., da Silva, G.B., Eboli, C.G. and Ramos, A.C.B., 2016. Software Project and Analysis of a Training Screen Based System for Healthcare Professionals Working in the NICU in Brazil. In Information Technology: New Generations (pp. 1219-1230). Springer International Publishing.
Hsieh, F.S. and Lin, J.B., 2016. A self-adaptation scheme for workflow management in multi-agent systems. Journal of Intelligent Manufacturing,27(1), pp.131-148.
Jan, S.R., Dad, F., Amin, N., Hameed, A. and Shah, S.S.A., 2016. Issues in Global Software Development (Communication, Coordination and Trust) A Critical Review. training, 6(7), p.8.
Kaya, F., Eken, S., İlhan, Z., Kavak, A., Sayar, A., Kocasaraç, U. and Sahin, S., 2014, February. A comparative study of signaling protocols for data management and synchronization in fatih project with school level cloud proxy server deployment. In Network Cloud Computing and Applications (NCCA), 2014 IEEE 3rd Symposium on (pp. 133-136). IEEE.
Koponen, T., Amidon, K., Balland, P., Casado, M., Chanda, A., Fulton, B., Ganichev, I., Gross, J., Ingram, P., Jackson, E. and Lambeth, A., 2014. Network virtualization in multi-tenant datacenters. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)(pp. 203-216).
Leau, Y.B., Loo, W.K., Tham, W.Y. and Tan, S.F., 2012. Software development life cycle AGILE vs traditional approaches. In International Conference on Information and Network Technology (Vol. 37, No. 1, pp. 162-167).
Levin, D., Wundsam, A., Heller, B., Handigol, N. and Feldmann, A., 2012, August. Logically centralized?: state distribution trade-offs in software defined networks. In Proceedings of the first workshop on Hot topics in software defined networks (pp. 1-6). ACM.
Marabelli, M. and Galliers, R.D., 2016. A reflection on information systems strategizing: the role of power and everyday practices. Information Systems Journal.
McCauley, J., Panda, A., Casado, M., Koponen, T. and Shenker, S., 2013. Extending SDN to large-scale networks. Open Networking Summit, pp.1-2.
Olsson, H.H., Bosch, J. and Alahyari, H., 2013. Towards R&D as innovation experiment systems: A framework for moving beyond Agile software development. In Proceedings of the IASTED (pp. 798-805).
Rahman, M.R. and Boutaba, R., 2013. SVNE: Survivable virtual network embedding algorithms for network virtualization. Network and Service Management, IEEE Transactions on, 10(2), pp.105-118.
REDDY, P.G. and PRASAD, Y.R., 2015. MULTIPLE CLIENT–SERVER ARCHITECTURE NETWORKS BASED ON IEEE 802.3. traffic, 4(2).
Sadagopan, S., 2014. Management Information Systems. PHI Learning Pvt. Ltd..
Salmela, E., Happonen, A., Hirvimäki, M. and Vimm, I., 2016. Is Time Pressure an Advantage or a Disadvantage for Front End Innovation–Case Digital Jewelry. Journal of Innovation Management, 3(4), pp.42-69.
Schadow, G., 2013. Systems and methods for software specification and design using a unified document. U.S. Patent 8,347,276.
Scheerer, A., Schmidt, C.T., Heinzl, A., Hildenbrand, T. and Voelz, D., 2013. Agile Software Engineering Techniques: The Missing Link in Large Scale Lean Product Development. In Software engineering (pp. 319-330).
Seth, R.K. and DP Goyal, M., 2015. Identification of Critical Success Factors for the Implementation of Supply Chain Management Information System through SEM Approach. Global Journal of Management And Business Research, 15(6).
Sharma, S., Sarkar, D. and Gupta, D., 2012. Agile processes and methodologies: A conceptual study. International journal on computer science and Engineering, 4(5), p.892.
Simpson, J., Schraeder, M. and Borowski, M., 2015. Enhancing the value of training: creating closer time linkages between training acquisition, application and compensation. Development and Learning in Organizations: An International Journal, 29(5), pp.16-18.
Stephens, C., Coventry, L., Welsh, R.J., Sturrock, D.A., Strachan, A., Chiba, M. and Orr, A., Lifescan Scotland Limited, 2015. Analyte testing method and system. U.S. Patent 8,958,991.
Syriani, E., Vangheluwe, H., Mannadiar, R., Hansen, C., Van Mierlo, S. and Ergin, H., 2013. AToMPM: A Web-based Modeling Environment. InDemos/Posters/[email protected] MoDELS (pp. 21-25).
Tomanek, M., Cermak, R. and Smutny, Z., 2015. A Conceptual Framework for Web Development Projects Based on Project Management and Agile Development Principles. arXiv preprint arXiv:1502.04297.
Valacich, J.S., George, J.F. and Hoffer, J.A., 2015. Essentials of systems analysis and design. Pearson Education.
Van Gigch, J.P., 2013. System design modeling and metamodeling. Springer Science & Business Media.
Vieru, D. and Rivard, S., 2014. Organizational identity challenges in a post-merger context: A case study of an information system implementation project. International Journal of Information Management, 34(3), pp.381-386.
Visser, A., Eppich, G., Bibby, R., Singleton, M., Hillegonds, D., Moran, J. and Esser, B., 2014. California GAMA Special Study: Archival Data Conversion & Upload (No. LLNL-TR-650040). Lawrence Livermore National Laboratory (LLNL), Livermore, CA.
Wasson, C.S., 2015. System Engineering Analysis, Design, and Development: Concepts, Principles, and Practices. John Wiley & Sons.
West, S., Nanz, S. and Meyer, B., 2015. Efficient and reasonable object-oriented concurrency. ACM SIGPLAN Notices, 50(8), pp.273-274.
Wolf, M., 2012. Computers as components: principles of embedded computing system design. Elsevier.
Yan, Y., Xiong, S., Lou, X., Xiong, H. and Miao, Q., 2014. Design and Implementation of Educational Administration Information Access System Based on Android Platform. In Frontier and Future Development of Information Technology in Medicine and Education (pp. 2525-2533). Springer Netherlands.