System Analysis - B
System Analysis - B
System Analysis - B
A MATERIAL DEVELOPED
BY
DR. O. R. VINCENT
COURSE DETAILS:
Course Coordinator: Dr. (Mrs.) O. R. Vincent NCE, B. Sc., M. Sc.,
PhD
Email: Vincent.rebecca@gmail.com
Office Location A105, UNITY BUILDINGS
Other Lecturers xxxxx
1
COURSE CONTENT:
Introduction to the Concept of Systems – Types of systems, the need for system
Analysis and design, Qualities of a System Analyst, roles of a system Analyst,
System Development Life Cycle - Phase of System Development Life Cycle
System Analysis Approaches- Model-Driven Analysis Approach, Unified
Modeling Language (UML), Accelerated System Analysis Approaches
Modeling System Requirements with Use Case - System Concepts for Use-Case
Modeling, Relationship, Association and Extends
System Description Techniques ---Types of Data, Flowchart and Data flow
diagram (DFD), Decision Tables and decision Trees
System Development Methodologies - Data Processing Systems, Centralized
and Decentralized, Information System, Multi-user environment, Networking
and file server system
COURSE REQUIREMENTS:
This is a compulsory course for all students in Computer Science and Statistics
the end of the Course and present a seminar to defend their proposal.
READING LIST:
2
SYSTEM ANALYSIS AND DESIGN
1.0 INTRODUCTION
Systems are created to solve problems. One can think of the systems approach
are three major components in every system, namely input, process and output.
In a system the different components are connected with each other and they are
We are also bound by many national systems such as political system, economic
system, educational system etc. The objective of the system demand that some
Types of Systems
Knowledge Work System (KWS) support work at the knowledge level. Higher
3
level systems include Management Information Systems (MIS) and Decision
Support Systems (DSS). Expert Systems apply the expertise of decision makers
found the executive support systems (ESS). Group Decision Support Systems
unstructured varieties.
frequently causes the system to fall into disuse. System analysis and design
endeavour that might otherwise have been done in a haphazard system analysis
analyst must be able to work with people of all descriptions and be experienced
in working with computers. The analyst plays many roles, sometimes balancing
several at the same time. The three primary roles of the systems analysts are
business. Such hiring can be an advantage because outside consultants can bring
with them a fresh perspective that other members of the organization do not
culture can never be known to an outsider. As a consultant, you will rely heavily
5
on the systematic methods to analyze and design appropriate information
where he/she is regularly employed in some system capacity. In this role, the
software and their uses in the business. This work is often not a full-blown
single Department. As the support expert, the system analysts are not managing
the project; he is merely serving as a resource person for those who are. If you
responsible role that the analyst takes is that of agent of change, whether
whenever you perform any of the activities in the systems development life
cycle and are present in the business for an extended period and expansion. An
agent of change can be defined as a person who serve as a catalyst for change,
develops a plan for change, and works with others in facilitating that change.
Your presence in the business changes it. As a systems analyst, this fact must be
recognized and should be used as a starting point for your analysis. Hence, you
6
must interact with the users and management from the very beginning of the
If change, that is, improvement to the business that can be realized through
Information Systems, seems warranted after analysis, the next step is to develop
a Plan for the change along with the people who must enact the changes. You
teach users the process of change because of the awareness that changes in the
information system do not occur independently but can also change the other
Successful systems analyst must possess a wide range of qualities: The system
necessary, the analyst must be able to systematically tackle the situation at hand
through skillful application of tools and technique. The analyst must also be a
It is appropriate at this time for you to reflect on the personal and professional
ethics you bring to a consulting relationship. Clarify the values that you
embrace as you build relationship with users and team members. Self-
knowledge can help you to become a better analyst, and code of conduct of
provides a reasonable context for examining your ethical beliefs. The systems
System study
Feasibility study
System analysis
System design
Coding
8
Testing
Implementation
Maintenance
The different phases of software development life cycle is shown in
Fig.1.1
Fig. 2.1 Different phases of Software development Life Cycle
Let us now describe the different phases and the related activities of system
development life cycle in detail.
System study is the first stage of system development life cycle. This gives a
clear picture of what actually the physical system is? In practice, the system
study is done in two phases. In the first phase, the preliminary survey of the
system is done which helps in identifying the scope of the system. The second
phase of the system study is more detailed and in-depth study in which the
identification of user’s requirement, the limitations and problems of the present
system are studied. After completing the system study, a system proposal is
prepared by the System Analyst (who studies the system) and placed before the
user. The proposed system contains the findings of the present system and
recommendations to overcome the limitations and problems of the present
system in the light of the user’s requirements.
9
To describe the system study phase more analytically, we would say that system
study phase passes through the following steps:
On the basis of result of the initial study, feasibility study takes place. The
feasibility study is basically the test of the proposed system in the light of its
workability, meeting user’s requirements, effective use of resources and .of
course, the cost effectiveness. The main goal of feasibility study is not to solve
the problem but to achieve the scope. In the process of feasibility study, the cost
and benefits are estimated with greater accuracy.
10
Functional hierarchy showing the functions to be performed by the new
system and their relationship with each other.
Function network which are similar to function hierarchy but they
highlight the functions which are common to more than one procedure.
List of attributes of the entities - these are the data items which need to be
held about each entity (record)
Based on the user requirements and the detailed analysis of a new system, the
new system must be designed. This is the phase of system designing. It is the
most crucial phase in the development of a system. Normally, the design
proceeds in two stages:
There are several tools and techniques used for designing. These tools and
techniques are:
Flowchart
Data flow diagram (DFDs)
Data dictionary
Structured English
Decision table
Decision tree
Each of the above tools for designing will be discussed in detailed in the next
lesson.
11
(e) Coding
After designing the new system, the whole system is required to be converted
into computer understandable language. Coding the new system into computer
programming language does this. It is an important stage where the defined
procedures are transformed into control specifications by the help of a computer
language. This is also called the programming phase in which the programmer
converts the program specifications into computer instructions, which we refer
as programs. The programs coordinate the data movements and control the
entire process in a system.
It is generally felt that the programs must be modular in nature. This helps in
fast development, maintenance and future change, if required.
(f) Testing
Before actually implementing the new system into operations, a test run of the
system is done removing all the bugs, if any. It is an important phase of a
successful system. After coding the whole programs of the system, a test plan
should be developed and run on a given set of test data. The output of the test
run should match the expected results.
Using the test data following test run are carried out:
Unit test
System test
Unit test: When the programs have been coded and compiled and brought to
working conditions, they must be individually tested with the prepared test data.
Any undesirable happening must be noted and debugged (error corrections).
System Test: After carrying out the unit test for each of the programs of the
system and when errors are removed, then system test is done. At this stage the
test is done on actual data. The complete system is executed on the actual data.
At each stage of the execution, the results or output of the system is analysed.
During the result analysis, it may be found that the outputs are not matching the
expected output of the system. In such a case, the errors in the particular
programs are identified and are fixed and further tested for the expected output.
When it is ensured that the system is running error-free, the users are called with
their own actual data so that the system could be shown running as per their
requirements.
12
(g) Implementation
After having the user acceptance of the new system developed, the
implementation phase begins. Implementation is the stage of a project during
which theory is turned into practice. During this phase, all the programs of the
system are loaded onto the user's computer. After loading the system, training of
the users starts. Main topics of such type of training are:
After the users are trained about the computerized system, manual working has
to shift from manual to computerized working. The following two strategies are
followed for running the system:
i. Parallel run: In such run for a certain defined period, both the systems
i.e. computerized and manual are executed in parallel. This strategy is
helpful because of the following:
i. Pilot run: In this type of run, the new system is installed in parts. Some
part of the new system is installed first and executed successfully for
considerable time period. When the results are found satisfactory then
only other parts are implemented. This strategy builds the confidence and
the errors are traced easily.
(h) Maintenance
Structured analysis
Information Engineering
14
3.1.1 Structured Analysis
existing system, define business requirements for a new system or both. The
models are pictures that illustrate the system’s component pieces, processes and
their associated inputs, output and files. Structured Analysis focuses on the flow
that the emphasis in this technique is on the process building blocks in the
information system framework. Over the years, the technique has evolved to
secondary emphasis. Data flow diagrams are used to depict the existing or
proposed processes in a system along with their inputs, outputs and files.
that illustrate and synchronize the system’s data and process. IE focuses on the
structure of stored data within a system. The data models in IE are called entity
differ only in the choice of model it draws first. IE draws data models first
Object is the encapsulation of both data and the methods. The data are called
properties that describe a discrete person, object, place, events or things with all
of the processes (called methods) that are allowed to use or update the data
properties. The only way to access or update the object data is to use the object
this artificial separation of data and processes. Instead of specifying the data and
data and processes into constructs called objects. The only way to create, read,
processes (methods). OOA models are pictures that differentiate the system’s
objects from the objects. The modeling standard for OOA is the Unifier
of objects.
16
3.2 Unified Modeling Language (UML)
UML provides a useful tool set for systems analysis and design. As with any
product created with the help of tools, the value of the UML variables in a
project depends on the expertise with which the systems analyst wields the tools.
The analyst will initially use the UML toolset to break down the system
requirements into a use case model and an object model. The use case model
describes the use cases and actors. The object model describes the objects and
Class Diagram
17
Component Diagram
Deployment Diagram
Object Diagram
Package Diagram
Profile Diagram
Composite Structure Diagram
Use Case Diagram
Activity Diagram
State Machine Diagram
Sequence Diagram
Communication Diagram
Interaction Overview Diagram
Timing Diagram
18
diagrams shows what should happen in a system. They describe how the
Class Diagram: Class diagrams are arguably the most used UML diagram type.
It is the main building block of any object oriented solution. It shows the classes
in a system, attributes and operations of each class and the relationship between
each class. In most modeling tools a class has three parts, name at the top,
systems with many related classes, classes are grouped together to create class
19
UML Class Diagram with Relationships
Component Diagram: A component diagram displays the structural relationship
of components of a software system. These are mostly used when working with
each other using interfaces. The interfaces are linked using connectors. Below
Deployment Diagram
20
A deployment diagrams shows the hardware of your system and the software
in those hardware. Deployment diagrams are useful when your software
solution is deployed across multiple machines with each having a unique
configuration. Below is an example deployment diagram.
Object Diagram
Object Diagrams, sometimes referred as Instance diagrams are very similar to
class diagrams. As class diagrams they also show the relationship between
objects but they use real world examples. They are used to show how a system
will look like at a given time. Because there is data available in the objects
they are often used to explain complex relationships between objects.
21
UML Object Diagram Example
Package Diagram
As the name suggests a package diagrams shows the dependencies between
different packages in a system. Check out this wiki article to learn more about
the dependencies and elements found in package diagrams.
22
Package Diagram in UML
Profile Diagram
Profile diagram is a new diagram type introduced in UML 2. This is a diagram
type that is very rarely used in any specification. For more detailed technical
information about this diagram type check this link.
23
A simple Composite Structure Diagram
24
Use Case diagram showing Actors and main processes
Activity Diagram
Activity diagrams represent workflows in a graphical way. They can be used
to describe business workflow or the operational workflow of any component
in a system. Sometimes activity diagrams are used as an alternative to State
machine diagrams. Check out this wiki article to learn about symbols and
usage of activity diagrams.
25
Activity Diagrams with start, end, processes and decision points
26
State Machine diagram in UML, sometime referred to as State or State chart
diagram
Sequence Diagram
Sequence diagrams in UML shows how object interact with each other and the
order those interactions occur. It’s important to note that they show the
interactions for a particular scenario. The processes are represented vertically
and interactions are show as arrows. This article explains the purpose and the
basics of Sequence diagrams.
27
Sequence Diagrams in UML shows the interaction between two processes
Communication Diagram
Communication diagram was called collaboration diagram in UML 1. It is
similar to sequence diagrams but the focus is on messages passed between
objects. The same information can be represented using a sequence diagram
and different objects. Click here to understand the differences using an
example.
28
Communication Diagram in UML
29
Interaction overview diagram in UML
Timing Diagram
Timing diagrams are very similar to sequence diagrams. They represent the
behaviour of objects in a given time frame. If it is only one object the diagram
is straight forward but if more than one object is involved they can be used to
show interactions of objects during that time frame as well.
30
Timing Diagram in UML
Mentioned above are all the UML diagram types. The links given in each
section explains the diagrams in more detail and covers the usage, symbols etc.
UML offers many diagram types and sometimes two diagrams can explain the
same thing using different notations. Check this blog post to learn which UML
diagram best suits you.
31
3.2.1 Importance of using UML for modeling
UML is a powerful tool that can greatly improve the quality of your systems
analysis and design, and it is hoped that the improved practices will eventually
systems analysis, you can achieve a greater understanding between the business
team and the IT team regarding the system requirements and the processes that
need to occur within the system to meet those requirements. The first iteration
objectives and validate the requirements through use case analysis. Identify the
actors and defined the initial use case model are part of this first iteration.
the development of use case scenarios, class diagrams, sequence diagrams, state
chart diagrams, and so on. Each iteration takes a successively more detailed
look at the design of the system is clearly and precisely defined within the UML
documents.
describes what a system does without describing how the system does it. The
primary components of UML are called “things” structural things are most
common; they include classes; interfaces, use cases, and many other elements
32
that provide a way to create models. Structural things allow the user to describe
work, the group things are used to define boundaries while things permit the
A use case model partitions system functionality into behaviours (called use
cases) that are significant to the users of the system (called actors).
Relationships are the glue that holds the things together. Structural relationships
UML diagrams are of two types: structural diagram and behavioural diagram.
the requirement from the perspective of the users in a manner that they can
for the success of the project. One of the primary challenges of vital importance
to any information system development team is the ability to elicit the correct
and necessary system requirement from the stakeholders and specify them in a
has played information technology community for long. In the past, we had
tools like data models, process models, prototypes and requirement specification
that we used but they were hard to understand for any user who wasn’t educated
in software development practices. USE case modeling has its roots in object
user and stakeholder’s perspective and it’s now widely recognized as the best
which is one of the primary critical success factors for ensuring project success.
There are two primary artifacts involved when performing USE case modeling.
The first is the USE CASE diagram graphically depicts the system to the
collection of USE cases, actors (users) and their relationships. This diagram
communicates at a high level the scope of the system event that must be
The second artifact is the USE case narrative which describes the details of each
business event and how the users interact with the system.
34
A USE case
System
USE case
Actor 1
Actor 3
USE case
USE case
USE case
Actor 2 Fig 3.4.1: USE case diagram
USE case modeling identifies and describes the system function by using a tool
called USE cases. USE cases describe the system functions from the perspective
of external users and in a manner and terminology they understand. A high level
business or system event is needed. USE cases are the results of decomposing
functionality. They are represented graphically by the horizontal ellipse with the
name of the USE case appearing above, below or the ellipse. A USE case
represents a single goal of the system and describes the sequence of activities
and user interactions in trying to accomplish the goal. USE cases are initially
defined during the requirement stages of the life cycle and will be additionally
35
ACTORS
Actor is anything that needs to interact with the system to exchange information.
Actors are external users that initiate or trigger USE cases. An actor initiates
system activity for the purpose of completing some business tasks that produces
value.
The PBA may or may not initiate the business event for example, the system
involving the payment of an employee using a pay slip for the online
registration. The system is both the Primary Business Actor and Primary System
Actor (PSA).
with the system to initiate or trigger the system event. PSAs may interact with
PBAs for the purpose of hiring the actual system e.g. banking system. They
facilitate the event than the direct use of the system for the benefit of a PBA.
Examples are clerk in a grocery store, telephone operator. The PBA and PSA
may be the same person for events where the business actor interfaces with the
- External Receiver Actor: This is the stakeholder that’s not the primary
actor but receives something of measurable value from the USE case.
RELATIONSHIPS
diagram. The meaning of the relationships may differ depending on how the
ASSOCIATIONS
This is a kind of relationship between an actor and a USE case whenever the
solid line connecting the actor and the USE case. An association that contains
i) That the USE case was initiated by the actor on the other end of the line
ii) An interaction between the USE case and an external server or receiver
actor.
When an actor is associated with a USE case, we say the actor communicates
37
Initiator
Make call
Communication Company
(ESA or power actor)
Telephone operator
PSA
Figure 3.4.2: Bi-directional Association
Extends
making the USE case logic difficult to understand. For the purpose of sampling
the USE case and making it more easily understood, one can extract the more
complex steps into their own USE case. The resulting USE case is called an
extension. USE case in that it extends the functionality of the original USE case.
The relationship between the extension USE case and the USE case it’s
extending is called extends relationship. A USE case may have many extends
relationship but an extension USE case can be invoked only by the USE case
it’s extending.
38
Extension
Extension
USE case
Validate all Calculate the
deductions allowances
Generate Pay
slip
of prototypes that identify the business, the users and the managers. Prototypes
prototype will not include the error checking, the input data validation, security
DISCOVERY PROTOTYPING
simpler tools like MICROSOFT ACCESS. The aim is to develop the final new
approaches attempt to express user requirements for the new system either as
requirements for systems are dependent on the analyst ability to discover the
problems and opportunities that exist in the current system. There are different
essential skill for all systems’ analyst. The facts-finding techniques include
memos.
JRP is the use of facilitated workshops to bring together all of the system
owners, users and analysts and some system designers and builders to jointly
system that will be designed, constructed and implemented. The basic tasks to
be performed are
analyze, and understand what the user’s requirements are or what the users want
the system to do. The process techniques that a systems analyst uses to identify,
discovery. One of the best ways to get requirement discovery done is to talk to
the people who are directly or indirectly involved in the different parts of the
etc. Another way to find out about the current system is to gather copies of
amount of time interviewing people about their work, the information they use
to carry out their work and the types of information processing that might
supplement their work. During interviewing, you will gather facts, opinions and
speculations and observe body language, emotions and other signs of what
people want and how they assess current system. Some of the points to be kept
questions.
4. Be neutral.
Open-ended questions are usually used to probe for information for which you
do not know the precise question to ask. An example is this: what will you say
is the best thing about the info-system you currently use to do your job or list
the three most frequently needed data? One advantage of open-ended questions
in main interview is that previously unknown information can surface. You can
Open-ended questions also often put the interviews at ease because they are able
to respond in their own words using their own structure. Open-ended questions
43
give interview more of a sense of involvement and control in the interview. A
Closed-Ended Questions
may choose. The interviewee is to choose only one option. They are (the range)
Interview Guidelines
(Be sure to ask for permission first). The answers may contain extremely
important information for the project. Also, this may be the only chance
4. Once the interview is over, go back to your office and type up your notes
within 48hrs, your memory of the interview will fade quickly. As you
organize your note, write down any additional questions that might arise
Finally, make sure you thank the person for his/her time.
5. Be careful during the interview not to set expectations about the new or
replaced system. Let the respondent know that their ideas will be
carefully considered along with what is technically possible but that due
have experience with the current system. You want to understand all
The first document the analysts may wish to seek for is the organization chart.
An organization chart serves to identify key individual owners and users for a
project of their reporting relationships. The analyst may also want to trace the
history that led to the project. To accomplish this, the analyst should collect and
45
review documents that describe the problem. Also, there are documents that
describe the business function being stored or designed. This may include
This technique has to do with researching the problem domain thoroughly. Most
problems are not completely unique, that is, other people have solved them
before us. Computer journals and reference books are a good source of
This is an effective fact finding technique where in the systems Analyst either
This technique is often used when the validity of data collected through other
46
Observation can be a very useful and beneficial that finding technique provided
that you have the ability to observe all aspects of the work being performed by
the users and that the work is being performed in the usual manner.
techniques
Disadvantages
3. Some tasks may not always be performed in the manner in which they are
4. People may let analyst see what they want him to see
An analyst should plan to observe a site when there is “typical workload”. The
1. Determine the who, what, where, when, why and how of the observation
VI. Questionnaires
These allow the analyst to collect facts from a large number of people while
5.0 NORMALISATION
6.1 INTRODUCTION
6.2 FLOWCHARTS
48
involved in designing a system. Some of the boxes which are used in flowcharts
are:
System flowcharts
Run flowcharts
Program flowcharts
System flowchart describes the data flow for a data processing system. It
provides a logical diagram of how the system operates. It represents the flow of
documents, the operations performed in data processing system. It also reflects
the relationship between inputs, processing and outputs. Following are the
features of system flowcharts:
the sources from which data is generated and device used for this purpose
various processing steps involved
the intermediate and final output prepared and the devices used for their
storage
49
Figure 5.1 is a sample of system flowchart for the following algorithm:
50
Run flowcharts are used to represent the logical relationship of computer
routines along with inputs, master files, transaction files and outputs. Figure 5.2
illustrates a run flowchart.
Figure 5.3 represents a program flowchart for finding the sum of first five
natural numbers ( i.e. 1,2,3,4,and 5).
51
Fig 6.3 Program Flowchart
Data flow diagrams are the most commonly used way of documenting the
process of current & required systems. As their name suggests they are a
pictorial way of showing the flow of data into, around & out of a system.
Graphical representation of a system’s data and how the processes transform the
data is known as Data Flow Diagram (or DFD). Unlike, flowcharts, DFDs do
not give detailed descriptions of modules but graphically describe a system’s
data and how the data interact with the system.
external entries
data stores
processes and
data flows
52
(i) External Entities
External entities represent the source of data as input to the system. They are
also the destination of system data. External entities can be called data stores
outside the system. These are represented by squares.
Data stores represent stores of data within the system. Examples are computer
files or databases. An open-ended box represents a data/store – data at rest or a
temporary repository of data.
(iii) Process
Data flows represent the movement of data from one component to the other.
An arrow identifies data flow – data in motion. It is a pipeline through which
information flows. Data flows are generally shown as one-way only. Data Flows
between external entities are shown as dotted lines.
Consider the figure30.4. It is clear from the figure that orders are placed, orders
are received, the location of ordered parts is determined and delivery notes are
dispatched along with the order.
Fig 6.4
53
It does not however tell us how these things are done or who does them. Are
they done by computers or manually and if manually who does them ? A logical
DFD of any information system is one that models what occurs without
showing how it occurs.
A physical DFD shows, how the various functions are performed? Who does
them? Consider the following figure:
Fig 6.5
The figure 30.5 is opposite, it shows the actual devices that perform the
functions. Thus there is an "order processing clerk", an "entry into computer
file" process and a "run locate program" process to locate the parts ordered.
DFD that shows how things happen or the physical components are called
physical DFD(s).
Typical processes that appear in physical DFDs are methods of data entry,
specific data transfer or processing methods.
have no data flows that split up into a number of other data flows
have no crossing lines
not include flowchart loops of control elements
not include data flows that act as signals to activate processes.
54
6.4 DECISION TABLES AND DECISION TREES
Decision tables and trees were developed long before the widespread use of
computers. They not only isolate many conditions and possible actions but they
help ensure that nothing has been overlooked.
The decision table is a chart with four sections listing all the logical conditions
and actions. In addition the top section allows space for title, date, author,
system and comment as shown in the fig.30.6
TITLE :
DATE :
Author :
System :
Comments :
Condition Stub Condition Entry
Action Stub Action Entry
The condition stub contains a list of all the necessary tests in a decision table.
In the lower left-hand corner of the decision table we find the action stub where
one may note all the processes desired in a given module. Thus Action
Stub contains a list of all the processes involved in a decision table.
The upper right corner provides the space for the condition entry - all possible
permutations of yes and no responses related to the condition stub. The yes and
no possibilities are arranged as a vertical column called rules. Rules are
numbered 1, 2, and 3 and so on. We can determine the rules in a decision table
by the formula:
55
The Condition entry contains a list of the entire yes/no permutations in a
decision table. The lower right corner holds the action entry. X’s or dots
indicate whether an action should occur as a consequence of the yes/no entries
under condition entry. X’s indicate action; dots indicate no action.
Thus Action entry indicates via dot or X whether something should happen in a
decision table. Let us consider the following example of book order illustrated
by figure 30.7
No discount is allowed
Then discount is 5%
No discount is allowed
56
Table 6.2: Decision Table
The decision tree defines the conditions as a sequence of left to right tests. A
decision tree helps to show the paths that are possible in a design following an
action or decision by the user. Figure 30.8 illustrates the concept of decision tree.
Decision tree turns a decision table into a diagram. This tool is read from left to
right, decision results in a fork, and all branches end with an outcome. Figure 6
illustrates the decision tree for the book order decision table we saw earlier.
57
Figure 6.7: Decision Tree for Book Order
7.1 INTRODUCTION
Data processing techniques are very much dependent on the kind of applications
and the working environment. The activities involved in the data processing are
along departmental lines and are application based such as Store Management,
Production Planning & Control, Sales Accounting, Financial accounting,
Student Information System, and so forth. The basic input data are the real
resource of the data processing. With the increase of the technologies the
concept of the integrated data processing also came into being where the output
data of one application can be used as the input of another application.
Depending upon the application area, working environment and the needs of the
management there are basically two approaches of data processing:
58
Decentralized data processing
With the increasing use of computer based data processing, there has been a
growing tendency in the minds of management to centralize the data processing
activities. A separate department EDP (Electronic Data Processing) department
is established to carry out the data processing work of different department in
the organization. Many a times the data processing is also done by hiring the
services of the outside agencies and with the passage of time and experience in-
house set is developed for data-processing.
59
organization may adopt the decentralized data processing approach to provide
data security of their work
The integrated information system is based on the presumption that the data and
information are used by more than one system in the organization and
accordingly, the data and information are channeled into a reservoir or database.
All the data processing and provision of information is derived and taken from
this common database. The development of an integrated information system
60
requires a long-term overall plan, commitment from management at all levels,
highly technical personnel, availability of sufficient fund, and sophisticated
technology. It also requires adequate standby facilities, without which the
system is doomed to failure. Because of its integrated component, the
modification to the system is quite difficult and the system development takes a
fairly long time.
61
It is possible to consider several alternative approaches, which fall between the
two extremes - a completely integrated information system and a totally
independent sub-system. It is to be studied carefully what degree of integration
is required for developing an information system. It depends on how the
management wants to manage the organization, and the level of diversity within
the organization.
In a Local Area Network, all the data and programme files are stored in a file
server. A file server is the central node in the network. All the users connected
to the file server through different nodes can access the data and information
stored in the fileserver simultaneously. The file server in a LAN acts as a central
hub for sharing peripherals like, printers, modems, etc. In a LAN, an application
running on a workstation reads and writes files on the file server. In many cases
the entire files are pumped across the network on behalf of the operations taking
place on LAN PCs. A file server does not involve in processing of an
application. It simply stores files for applications that run on LAN PCs. For
example, you might have a personal database manager and then request
information in a file on the on the file server. The file server sends all or part of
the data file across the network to your workstation. As you work with your
personal database manager and the database on your workstation, the file server
does not take part at all when you save the file back to the file server across the
network.
Two flaws limit a file server system for multi-user applications. First, the file
server model does not deliver the data concurrency (simultaneous access to a
single data set by more than one user), that is required frequently by multi-user
applications. The reason behind it is that the file server operates in files, which
are set of large number of data records and prevent a user from sharing a file
when another user has it locked out. Second, if many workstations request and
62
send many files in a LAN, the network can quickly become saturated with
traffic, creating a bottleneck that degrades overall system performance.
The limitations of the network/file server system have led to the genesis of the
client/server system. It delivers the benefits of the network-computing model
along with the stored data access. Any local area network could be considered
as client/server system, since workstations (clients) request services such as data,
program file or printing from server.
A server (or "back end") manages the resources such as database, efficiently and
optimally among various clients that simultaneously request the server for the
same resource. Database server mainly concentrates on the following tasks:
A client application (the "front end") is the part of the system that users apply to
interact with data. The client application in a client/server model focus on the
following job:
Presenting an interface between the user and the resource to complete the
job.
Managing presentation logic.
Performing application logic
Validating data entry
Managing the request traffic of receiving and sending information from a
database server.
63
7.12 Network
References
[1] Bentley Whitten (2013), System Analysis and Design Methods, 7th Edition,
Mcgraw Hill Irwin, Lisbon London.
[2] Nishadha (2012), The Complete Guide to UML Diagram Types with
Examples, http://creately.com/blog/diagrams/uml-diagram-types-examples/
64