Professional Documents
Culture Documents
In selecting an architecture, the systems analysts must determine which transactions will
be handled online, and what functions, if any, can be carried out using a batch processing
method.
Online Processing
An online system handles transactions when and where they occur and provides output
directly to users. Online processing also can be used with file-oriented systems. Example is
when a customer uses an ATM to inquire about an account balance.
Step 1. After the ATM verifies the customer's card and password, the customer enters the
request.
Step 2. Then, the system accesses the account master file using the account number as the
primary key and retrieves the customer's record.
Step 3. The system verifies the account number and displays the balance.
Step 4. Data is retrieved and the system transmits the current balance to the ATM, which prints
it for the customer.
Real-World Examples
The system uses online processing to handle data entry and inventory updates, while
reports and accounting entries are performed in a batch. Why would any company choose a mix
of online and batch processing? The answer is that it makes good business sense. Consider the
following scenario in a typical retail store:
• During business hours, a salesperson enters a sale on a POS terminal, which is part of
an online system that handles daily sales transactions and maintains an up-to-date inventory
file.
•When the salesperson enters the transaction, online processing occurs.
•When the store closes, the system uses the sales transactions to produce the daily
sales report, perform the related accounting entries, and analyze the data to identify slow or
fast-moving items, sales trends, and related issues- such as store discounts for the next day.
NETWORK MODELS
A network allows the sharing of hardware, software, and data resources in order to
reduce expenses and provide the more capability to users.
The OSI Model
(Open Systems Interconnection) Model which describes how data moves from an
application on one computer to an application on another networked computer. The OSI model
consists of seven layers, and each layer performs a specific function.
Network Topology
The way a network is configured is called the network topology. Topology can refer to a
physical or a logical view of the network. For example, physical topology describes the actual
network cabling and connections, while logical topology describes the way the components
interact.
HIERARCHICAL NETWORK
In hierarchical network, one or more powerful servers control the entire network.
BUS NETWORK
In a bus network, a single communication path connects the central sever,
departmental servers, workstations, and peripheral devices. The bus network is one of
the oldest LAN topologies, and is a simple way to connect multiple workstations.
RING NETWORK
Although ring networks are still around, they are somewhat outdated. A ring
network resembles a circle where the data flows only in one direction from one device to
the next.
STAR NETWORK
A star network has a central networking device called a switch, which manages
the network and acts as a communications conduit for all network traffic. In the past, a
device known as hub was used to connect star networks, but a switch offers advanced
technology and much better performance.
MESH NETWORK
In the mesh networks, each node connects to every other node.
NETWORK DEVICES
Networks such as LANs or WANs can be interconnected using devices called
routers. A router is a device that connects network segments, determines the most
efficient data path, and guides the flow of data.
MODELING TOOLS
As you translate a network model into a physical version of the system, you can
use software tools, such as Microsoft Visio, which is a multipurpose drawing tool, to
represent the physical structure and network components.
` WIRELESS NETWORKS
Wireless Trends
Wireless technology has brought explosive change to the IT industry, and will continue
to affect businesses, individuals, and society. One of the most significant groups is the Wi-Fi
Alliance, which maintains a Web site at www.wi-fi.org.
In addition to Wi-Fi, another form of wireless transmission called Bluetooth is very
popular for short-distance wireless communication that does not require high power.
System architecture marks the end of the systems design phase of the SDLC.
Developers must also consider system management and support tools that can monitor system
performance, deal with fault management, handle backup, and provide for disaster recovery.
The final activities in the systems design phase are preparing a system design
specification, obtaining user approval, and delivering a presentation to management.
1. Management Summary
This is a brief overview of the project for company managers and
executives.
2. System Components
This section contains the complete design for the new system, including
the user interface, outputs, inputs, files, databases, and network specifications.
3. System Environment
This section describes the constraints, or conditions, affecting the system,
including any requirements that involve operations, hardware, systems software,
or security.
4. Implementation Requirements
In this section, you specify start-up processing, initial data entry or
acquisition, user training requirements, and software test plans.
6. Additional Material
Other material can be included at the end of the system design
specification. In this section, you might insert documents from earlier phases if
they would be helpful to readers.
User approval
Users must review and approve the interface design, report and menu designs, data
entry screens, source documents, and other areas of the system that affect them. The review
and approval process continues throughout the systems design phase. When you complete the
design for a report, you should meet with users to interview the prototype, adjust the design if
necessary, and obtain written approval.