SlideShare a Scribd company logo
Systems Analysis and Design

Elements of Systems Design

1
Topics
n
n
n
n
n
n
n
n
n
n
n

Elements of Design
Inputs for System Design
Design and Integrate the Network
Design the Application Architecture
Design the User Interfaces
Design the System Interfaces
Prototype for Design Details
Deployment Environment
Software Application Functions
Internet and Web-Based Application
WebArchitecture
Middleware

2
Elements of Design
n

Design is process of describing, organizing,
and structuring system components at
architectural design level and detailed
design level
Focused on preparing for construction
Like developing blueprints

n

Three questions
What components require systems design?
What are inputs to and outputs of design
process?
How is systems design done?
3
Components Requiring Systems
Design

4
Inputs for System Design
n

Design
Converts functional models from analysis into models
that represent the solution
Focused on technical issues
Requires less user involvement than analysis

n

Design may use structured or OO approaches
Database can be relational, OO, or hybrid
User interface issues
5
Analysis versus Design

6
Traditional
Structured
and ObjectObjectOriented
Models

7
SDLC Phases with Design Phase
Activities

8
Design Phase Activities and Key
Questions

9
Design and Integrate the Network
n

Network specialists establish network based on
strategic plan

n

Project team typically integrates system into
existing network

n

Technical requirements have to do with
communication via networks

n

Technical issues handled by network specialists
Reliability, security, throughput, synchronization
10
Design the Application Architecture
and Software
n

Specify how system use cases are carried
out

n

Described during system analysis as logical
models of system activities

n

After design alternative is selected, detailed
computer processing is designed as
physical models

n

Approach varies depending on development
and deployment environments
11
Design the User Interfaces
n

User interface quality is critical aspect of system

n

Design of user interface defines how user interacts
with system
GUI

windows, dialog boxes, mouse interaction

Sound, video, voice commands
n

To user of system, user interface is the system

n

User interface specialists interface designers,
usability consultants, human factors engineers
12
Design the System Interfaces
n

System interfaces enable systems to share
and exchange information
Internal organization systems
Interfaces with systems outside organization
New system interfaces with package application
that organization has purchased and installed

n
n

System interfaces can be complex
Organization needs very specialized
technical skills to work on these interfaces
13
Design and Integrate the Database
n
n
n
n

System analysis data model used to create
physical database model
Collection of traditional computer files, relational
databases, and/or object-oriented databases
Technical requirements, such as response times,
determine database performance needs
Design work might involve
Performance tuning
Integration between new and existing databases

14
Prototype for Design Details
n
n

Continue to create and evaluate
prototypes during design phase
Prototypes confirm design choices
Database
Network architecture
Controls
Programming environment

n

Rapid application development (RAD)
design prototypes evolve into finished
system
15
Design and Integrate the System
Controls
n

n

Final design activity to ensure system has
adequate safeguards (system controls) to
protect organizational assets
Controls are needed for all other design
activities
User interface limit access to authorized users
System interface protect from other systems
Application architecture record transactions
Database protect from software/hardware
failure
Network design protect communications
16
Network Design
n
n
n
n

Integrate network needs of new system
into existing network infrastructure
Describe processing activity and network
connectivity at each system location
Describe communications protocols and
middleware that connects layers
Ensure that network capacity is sufficient
Data size per access type and average
Peak number of access per minute or hour
17
Computer Networks
n
n
n

n

n

Set of transmission lines, specialized
hardware, and communication protocols
Enables communication among different
users and computer systems
Local area network (LAN) less than one
kilometer long connects computers
within single building
Wide area network (WAN) over one
kilometer long implies much greater,
global, distances
Router directs information within
network
18
A Possible Network Configuration
for RMO

19
The Internet, Intranets, and
Extranets
Internet global collection of
networks that use TCP/IP networking
protocols
n Intranets
n

Private networks using same TCP/IP
protocols as the Internet
Limited to internal users
n

Extranets
Intranets that have been extended
outside the organization

20
Network Diagram for RMO
Customer Support System

21
Deployment Environment
n

Deployment environment definition
bridges analysis and design
Hardware
System software
Networking

Common deployment environments
in which system will operate
n Related design patterns and
architectures for application software
22
n
Application Architecture
n

Complex hardware/networks require more
complex software architectures

n

There are commonly used approaches
(patterns) for application architecture
Client/server architecture
Three-layer client/server architecture
Web services architecture
Internet and Web-based application
architecture

23
Software Application Functions
n
n
n
n
n

Presentation logic (i.e. HCI)
Application logic (i.e. the processing of business
rules processing)
Data access logic (i.e. the processing required
to access data database queries in SQL)
Data storage (i.e. data files)
There are several alternatives for the processing
environment:
Centralized systems
Distributed computing
24
Centralized systems
Prior to the early 1970 s there was only one technological environment
the mainframe computer system at a central location
The only options focused around kinds of input/output (e.g., keypunch,
key-to-tape, or interactive input using video display terminal) and
whether input/output devices would be placed in remote locations
Although they are no longer the preferred platform for deploying ISs,
they are still widely used as a subsystem of a larger, sometimes
distributed information system or for large-scale batch processing
applications (e.g., banking, insurance, government, etc.) where:
Some input transactions don t need to be processed in real time
On-line data-entry personnel can be centrally located
Large numbers of periodic outputs are produced by the system
There are three types of centralized systems: single, clustered and
multicomputer architectures
25
Single Computer Architecture
Places all information system resources on a single computer system
and its directly attached peripheral devices
Users interact with the system via simple input/output devices directly
connected to the computer
Requires all users be located near the computer
All 4 software application functions are realized on a mainframe
computer (server host) server-based architecture
Advantage:
Simplicity of maintenance: relatively easy to design, build and operate
Disadvantage:
The capacity limits make single computer impractical or unusable for
large ISs: cannot provide all the required processing, data storage, and
data retrieval tasks. However, many systems require more computing
power than one single machine can provide (a clustered or
multicomputer architecture is required)
26
SingleSingle-Computer, Clustered, and
Multicomputer Architectures

27
ServerServer-based Architecture

28
Clustered Architecture
Clustered architecture is a group (or cluster) of computers
of the same type that have the same operating environment
and share resources
Computers from the same manufacturer and model family are
networked together
Application programs may be executed on any machine in the
cluster without modification due to similar hardware and
operating systems
Cluster acts like a single large computer system (program
movement and access to resources on other machines occur
quickly and efficiently due to rapid and direct communication
at the operating system level)
Often one computer may act as entry point and the others
function as slave computers
29
Multicomputer Architecture
Multicomputer architecture is a group of dissimilar computers that
are linked together but the hardware and operating systems are not
required to be a similar as in the clustered architecture
Hardware and software differences do not allow movement of
application programs between computers (instead, resources are
exclusively assigned to each computer system)
System still functions like one single large computer
Can have central computer and slave computers
Main computer may execute programs and hold database
The front-end computer may handle all communication lines with
other computers or simple terminals
Notes on Centralized Systems
Clustered architectures may be cost efficient and provide greater total
capacity if similar operating system and hardware are used
Multicomputer architectures are good when the centralized system
can be decomposed into relatively independent subsystems (each
possibly with its own operating system and/or hardware platform) 30
Distributed Architecture
n

Distributes system across several
computers and locations distributed
computing

n

Relies on communication networks for
geographic connectivity

n

Client/server architecture dominant
model for distributed computing
31
Client/Server Architecture
The dominant architectural model for distributing information
resources
Two-tire architecture divides the information system
processes into two classes:
Server: manages system resources and provides access
to those resources and services to other computers on the
network
Client computer: uses communication interface to
requests services from other computers on the network
Computer software that implements communication protocols
on the network is called middleware
n

Advantage

deployment flexibility

Location, scalability, maintainability
n

Disadvantage

complexity

Performance, security, and reliability
32
Interaction Among Multiple
Clients and a Single Server

33
Client/Server Architecture: shared
printer

34
Fat Client Architecture

35
Fat Server Architecture

36
ThreeThree-Layer Client/Server
Architecture
The data layer is a layer on a client-server configuration that
manages stored data implemented as one or more databases
The business logic layer contains the programs that
implement the rules and procedures of business processing
(or program logic of the application)
The view layer contains the user interface and other
components to access the system (accepts user input, and
formats and displays processing results)
n

n

This approach is called tree-layer architecture
The IS divided into three layer is relatively easy to distribute
and replicate across a network (interactions among the layers
are always have a form of either request or response)
It makes the layer relatively independent of one another, thus
they can be placed on different computer systems with
network connections and middleware serving
37
ThreeThree-Layer Architecture

38
ThreeThree-Layer Architecture Software
Application Functions

39
N-Layer Client/Server Architecture
When processing requirements or data resources are complex, threelayer architecture can be expanded into a larger number of layers (nlayer or n-tiered architecture)
Next slide shows an example in which the data layer is split into two
separate layers: the combined database server and servers that control
the individual databases (marketing, production, accounting).
The business logic layer interacts with a combined database server that
provides a unified view of the data stored in several different
databases.
The responses from the individual database servers are then combined
to create a single response to send to the business logic layer.

40
N-Layer Architecture

41
FourFour-Tier Architecture

42
Internet and Web-Based
WebApplication Architecture
Web is complex example of
client/server architecture
n Can use Web protocols and browsers
as application interfaces
n Benefits
n

Accessibility
Low-cost communication
Widely implemented standards
43
Negative Aspects of
Internet Application Delivery
n

Breaches of security

n

Fluctuating reliability of network
throughput

n

Throughput can be limited

n

Volatile, changing standards
44
Web Services Architecture
A client/server architecture
n Packages software functionality into
server processes ( services )
n Makes services available to
applications via Web protocols
n Web services are available to internal
and external applications
n

Developers can assemble an application
using existing Web services
45
Web Services Architecture
(continued)

46
Middleware
n

Aspect of distributed computing

n

Connects parts of an application and enables
requests and data to pass between them

n

Transaction process monitors, object request
brokers (ORBs), Web services directories

n

Designers reply on standard frameworks and
protocols incorporated into middleware
47

More Related Content

What's hot

SAD Chapter1
SAD  Chapter1SAD  Chapter1
SAD Chapter1
ilysantiano
 
System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)
United International University
 
Introduction to System analysis part1
Introduction to System analysis part1Introduction to System analysis part1
Introduction to System analysis part1
DrMohammed Qassim
 
System Analysis and Design (SAD)
System Analysis and Design (SAD)System Analysis and Design (SAD)
System Analysis and Design (SAD)
Sachith Perera
 
System analysis and design chapter 2
System analysis and design chapter 2System analysis and design chapter 2
System analysis and design chapter 2
Einrez Pugao
 
Over view of system analysis and design
Over view of system analysis and designOver view of system analysis and design
Over view of system analysis and design
Saroj Dhakal
 
SAD
SADSAD
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
Joel Briza
 
System analysis and design logical design
System analysis and design  logical designSystem analysis and design  logical design
System analysis and design logical design
GirdharRatne
 
Sad chapter-1
Sad chapter-1Sad chapter-1
Sad chapter-1
Navdeep Kumar
 
analysis and design of information system
analysis and design of information systemanalysis and design of information system
analysis and design of information systemRenu Sharma
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
LOKESH KUMAR
 
Lesson 1 System Analysis and Design
Lesson 1 System Analysis and DesignLesson 1 System Analysis and Design
Lesson 1 System Analysis and Design
perly pantojan
 
Introduction to system analysis and design
Introduction to system analysis and designIntroduction to system analysis and design
Introduction to system analysis and designTwene Peter
 
System Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU EthiopiaSystem Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU Ethiopia
Debre Tabor University
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
Yohan Gunathilaka
 
System engineering analysis and design
System engineering analysis and designSystem engineering analysis and design
System engineering analysis and design
Dr. Vardhan choubey
 
System design
System designSystem design
System design
Gheethu Joy
 

What's hot (20)

SAD Chapter1
SAD  Chapter1SAD  Chapter1
SAD Chapter1
 
System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)
 
Introduction to System analysis part1
Introduction to System analysis part1Introduction to System analysis part1
Introduction to System analysis part1
 
System Analysis and Design (SAD)
System Analysis and Design (SAD)System Analysis and Design (SAD)
System Analysis and Design (SAD)
 
System analysis and design chapter 2
System analysis and design chapter 2System analysis and design chapter 2
System analysis and design chapter 2
 
Over view of system analysis and design
Over view of system analysis and designOver view of system analysis and design
Over view of system analysis and design
 
SAD
SADSAD
SAD
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
System analysis and design logical design
System analysis and design  logical designSystem analysis and design  logical design
System analysis and design logical design
 
Sad chapter-1
Sad chapter-1Sad chapter-1
Sad chapter-1
 
DESIGN OF A COMPUTER SYSTEM FOR AN INFORMATION SYSTEM
DESIGN OF A COMPUTER SYSTEM FOR AN INFORMATION SYSTEMDESIGN OF A COMPUTER SYSTEM FOR AN INFORMATION SYSTEM
DESIGN OF A COMPUTER SYSTEM FOR AN INFORMATION SYSTEM
 
analysis and design of information system
analysis and design of information systemanalysis and design of information system
analysis and design of information system
 
System design
System designSystem design
System design
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Lesson 1 System Analysis and Design
Lesson 1 System Analysis and DesignLesson 1 System Analysis and Design
Lesson 1 System Analysis and Design
 
Introduction to system analysis and design
Introduction to system analysis and designIntroduction to system analysis and design
Introduction to system analysis and design
 
System Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU EthiopiaSystem Analysis and Design slides by yared yenealem DTU Ethiopia
System Analysis and Design slides by yared yenealem DTU Ethiopia
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
System engineering analysis and design
System engineering analysis and designSystem engineering analysis and design
System engineering analysis and design
 
System design
System designSystem design
System design
 

Viewers also liked

System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
Aamir Abbas
 
Chapter7
Chapter7Chapter7
Chapter7
Ahmed Magdy
 
161001 手機短片實作進階班
161001 手機短片實作進階班161001 手機短片實作進階班
161001 手機短片實作進階班
宜樹 李
 
PM Pirelli GP3 Monza.pdf
PM Pirelli GP3 Monza.pdfPM Pirelli GP3 Monza.pdf
PM Pirelli GP3 Monza.pdf
unn | UNITED NEWS NETWORK GmbH
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
Rangga Ananto
 
Ch15ed12romney
Ch15ed12romneyCh15ed12romney
Ch15ed12romneywoyaoni
 
Fact finding techniques
Fact finding techniquesFact finding techniques
Fact finding techniques
imthiyasbtm
 
System Analysis Fact Finding Methods
System Analysis Fact Finding MethodsSystem Analysis Fact Finding Methods
System Analysis Fact Finding Methods
Moshikur Rahman
 
System concepts, elements and types of systems ppt
System concepts, elements and types of systems pptSystem concepts, elements and types of systems ppt
System concepts, elements and types of systems ppt
Shobhit Sharma
 
Dfd and flowchart
Dfd and flowchartDfd and flowchart
Dfd and flowchartMir Majid
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
Heritage Institute Of Tech,India
 

Viewers also liked (11)

System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
Chapter7
Chapter7Chapter7
Chapter7
 
161001 手機短片實作進階班
161001 手機短片實作進階班161001 手機短片實作進階班
161001 手機短片實作進階班
 
PM Pirelli GP3 Monza.pdf
PM Pirelli GP3 Monza.pdfPM Pirelli GP3 Monza.pdf
PM Pirelli GP3 Monza.pdf
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
 
Ch15ed12romney
Ch15ed12romneyCh15ed12romney
Ch15ed12romney
 
Fact finding techniques
Fact finding techniquesFact finding techniques
Fact finding techniques
 
System Analysis Fact Finding Methods
System Analysis Fact Finding MethodsSystem Analysis Fact Finding Methods
System Analysis Fact Finding Methods
 
System concepts, elements and types of systems ppt
System concepts, elements and types of systems pptSystem concepts, elements and types of systems ppt
System concepts, elements and types of systems ppt
 
Dfd and flowchart
Dfd and flowchartDfd and flowchart
Dfd and flowchart
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 

Similar to Elements of systems design

Elements of Systems Design.ppt
Elements of Systems Design.pptElements of Systems Design.ppt
Elements of Systems Design.ppt
KRISHNARAJ207
 
CPIS351-chapter9.ppt contains about system analysis and design
CPIS351-chapter9.ppt contains about system analysis and designCPIS351-chapter9.ppt contains about system analysis and design
CPIS351-chapter9.ppt contains about system analysis and design
NaglaaAbdelhady
 
Moving to Design
Moving to DesignMoving to Design
Moving to Design
Henhen Lukmana
 
Software engg. pressman_ch-10
Software engg. pressman_ch-10Software engg. pressman_ch-10
Software engg. pressman_ch-10Dhairya Joshi
 
Unit_4_Software_Design.pptx
Unit_4_Software_Design.pptxUnit_4_Software_Design.pptx
Unit_4_Software_Design.pptx
taxegap762
 
09 si(systems analysis and design )
09 si(systems analysis and design )09 si(systems analysis and design )
09 si(systems analysis and design )
Nurdin Al-Azies
 
Distributed architecture (SAD)
Distributed architecture (SAD)Distributed architecture (SAD)
Distributed architecture (SAD)
Khubaib Ahmad Kunjahi
 
00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf
aminnezarat
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system
Sarvesh Meena
 
Infrastructure student
Infrastructure studentInfrastructure student
Infrastructure student
John Scrugham
 
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and OptimizeISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
Christoph Adler
 
Object oriented sad-5 part i
Object oriented sad-5 part iObject oriented sad-5 part i
Object oriented sad-5 part i
Bisrat Girma
 
0 introduction to computer architecture
0 introduction to computer architecture0 introduction to computer architecture
0 introduction to computer architectureaamc1100
 
Models of Distributed System
Models of Distributed SystemModels of Distributed System
Models of Distributed System
Ashish KC
 
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
KumarSuman24
 

Similar to Elements of systems design (20)

Elements of Systems Design.ppt
Elements of Systems Design.pptElements of Systems Design.ppt
Elements of Systems Design.ppt
 
CPIS351-chapter9.ppt contains about system analysis and design
CPIS351-chapter9.ppt contains about system analysis and designCPIS351-chapter9.ppt contains about system analysis and design
CPIS351-chapter9.ppt contains about system analysis and design
 
Moving to Design
Moving to DesignMoving to Design
Moving to Design
 
Software engg. pressman_ch-10
Software engg. pressman_ch-10Software engg. pressman_ch-10
Software engg. pressman_ch-10
 
Ch12
Ch12Ch12
Ch12
 
Unit_4_Software_Design.pptx
Unit_4_Software_Design.pptxUnit_4_Software_Design.pptx
Unit_4_Software_Design.pptx
 
09 si(systems analysis and design )
09 si(systems analysis and design )09 si(systems analysis and design )
09 si(systems analysis and design )
 
Distributed architecture (SAD)
Distributed architecture (SAD)Distributed architecture (SAD)
Distributed architecture (SAD)
 
Computers in management
Computers in managementComputers in management
Computers in management
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Par com
Par comPar com
Par com
 
00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system
 
Infrastructure student
Infrastructure studentInfrastructure student
Infrastructure student
 
Chap13
Chap13Chap13
Chap13
 
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and OptimizeISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
ISBG 2015 - Infrastructure Assessment - Analyze, Visualize and Optimize
 
Object oriented sad-5 part i
Object oriented sad-5 part iObject oriented sad-5 part i
Object oriented sad-5 part i
 
0 introduction to computer architecture
0 introduction to computer architecture0 introduction to computer architecture
0 introduction to computer architecture
 
Models of Distributed System
Models of Distributed SystemModels of Distributed System
Models of Distributed System
 
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
WINSEM2023-24_BCSE429L_TH_CH2023240501528_Reference_Material_III_S3-Homoheter...
 

Recently uploaded

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Elements of systems design

  • 1. Systems Analysis and Design Elements of Systems Design 1
  • 2. Topics n n n n n n n n n n n Elements of Design Inputs for System Design Design and Integrate the Network Design the Application Architecture Design the User Interfaces Design the System Interfaces Prototype for Design Details Deployment Environment Software Application Functions Internet and Web-Based Application WebArchitecture Middleware 2
  • 3. Elements of Design n Design is process of describing, organizing, and structuring system components at architectural design level and detailed design level Focused on preparing for construction Like developing blueprints n Three questions What components require systems design? What are inputs to and outputs of design process? How is systems design done? 3
  • 5. Inputs for System Design n Design Converts functional models from analysis into models that represent the solution Focused on technical issues Requires less user involvement than analysis n Design may use structured or OO approaches Database can be relational, OO, or hybrid User interface issues 5
  • 8. SDLC Phases with Design Phase Activities 8
  • 9. Design Phase Activities and Key Questions 9
  • 10. Design and Integrate the Network n Network specialists establish network based on strategic plan n Project team typically integrates system into existing network n Technical requirements have to do with communication via networks n Technical issues handled by network specialists Reliability, security, throughput, synchronization 10
  • 11. Design the Application Architecture and Software n Specify how system use cases are carried out n Described during system analysis as logical models of system activities n After design alternative is selected, detailed computer processing is designed as physical models n Approach varies depending on development and deployment environments 11
  • 12. Design the User Interfaces n User interface quality is critical aspect of system n Design of user interface defines how user interacts with system GUI windows, dialog boxes, mouse interaction Sound, video, voice commands n To user of system, user interface is the system n User interface specialists interface designers, usability consultants, human factors engineers 12
  • 13. Design the System Interfaces n System interfaces enable systems to share and exchange information Internal organization systems Interfaces with systems outside organization New system interfaces with package application that organization has purchased and installed n n System interfaces can be complex Organization needs very specialized technical skills to work on these interfaces 13
  • 14. Design and Integrate the Database n n n n System analysis data model used to create physical database model Collection of traditional computer files, relational databases, and/or object-oriented databases Technical requirements, such as response times, determine database performance needs Design work might involve Performance tuning Integration between new and existing databases 14
  • 15. Prototype for Design Details n n Continue to create and evaluate prototypes during design phase Prototypes confirm design choices Database Network architecture Controls Programming environment n Rapid application development (RAD) design prototypes evolve into finished system 15
  • 16. Design and Integrate the System Controls n n Final design activity to ensure system has adequate safeguards (system controls) to protect organizational assets Controls are needed for all other design activities User interface limit access to authorized users System interface protect from other systems Application architecture record transactions Database protect from software/hardware failure Network design protect communications 16
  • 17. Network Design n n n n Integrate network needs of new system into existing network infrastructure Describe processing activity and network connectivity at each system location Describe communications protocols and middleware that connects layers Ensure that network capacity is sufficient Data size per access type and average Peak number of access per minute or hour 17
  • 18. Computer Networks n n n n n Set of transmission lines, specialized hardware, and communication protocols Enables communication among different users and computer systems Local area network (LAN) less than one kilometer long connects computers within single building Wide area network (WAN) over one kilometer long implies much greater, global, distances Router directs information within network 18
  • 19. A Possible Network Configuration for RMO 19
  • 20. The Internet, Intranets, and Extranets Internet global collection of networks that use TCP/IP networking protocols n Intranets n Private networks using same TCP/IP protocols as the Internet Limited to internal users n Extranets Intranets that have been extended outside the organization 20
  • 21. Network Diagram for RMO Customer Support System 21
  • 22. Deployment Environment n Deployment environment definition bridges analysis and design Hardware System software Networking Common deployment environments in which system will operate n Related design patterns and architectures for application software 22 n
  • 23. Application Architecture n Complex hardware/networks require more complex software architectures n There are commonly used approaches (patterns) for application architecture Client/server architecture Three-layer client/server architecture Web services architecture Internet and Web-based application architecture 23
  • 24. Software Application Functions n n n n n Presentation logic (i.e. HCI) Application logic (i.e. the processing of business rules processing) Data access logic (i.e. the processing required to access data database queries in SQL) Data storage (i.e. data files) There are several alternatives for the processing environment: Centralized systems Distributed computing 24
  • 25. Centralized systems Prior to the early 1970 s there was only one technological environment the mainframe computer system at a central location The only options focused around kinds of input/output (e.g., keypunch, key-to-tape, or interactive input using video display terminal) and whether input/output devices would be placed in remote locations Although they are no longer the preferred platform for deploying ISs, they are still widely used as a subsystem of a larger, sometimes distributed information system or for large-scale batch processing applications (e.g., banking, insurance, government, etc.) where: Some input transactions don t need to be processed in real time On-line data-entry personnel can be centrally located Large numbers of periodic outputs are produced by the system There are three types of centralized systems: single, clustered and multicomputer architectures 25
  • 26. Single Computer Architecture Places all information system resources on a single computer system and its directly attached peripheral devices Users interact with the system via simple input/output devices directly connected to the computer Requires all users be located near the computer All 4 software application functions are realized on a mainframe computer (server host) server-based architecture Advantage: Simplicity of maintenance: relatively easy to design, build and operate Disadvantage: The capacity limits make single computer impractical or unusable for large ISs: cannot provide all the required processing, data storage, and data retrieval tasks. However, many systems require more computing power than one single machine can provide (a clustered or multicomputer architecture is required) 26
  • 29. Clustered Architecture Clustered architecture is a group (or cluster) of computers of the same type that have the same operating environment and share resources Computers from the same manufacturer and model family are networked together Application programs may be executed on any machine in the cluster without modification due to similar hardware and operating systems Cluster acts like a single large computer system (program movement and access to resources on other machines occur quickly and efficiently due to rapid and direct communication at the operating system level) Often one computer may act as entry point and the others function as slave computers 29
  • 30. Multicomputer Architecture Multicomputer architecture is a group of dissimilar computers that are linked together but the hardware and operating systems are not required to be a similar as in the clustered architecture Hardware and software differences do not allow movement of application programs between computers (instead, resources are exclusively assigned to each computer system) System still functions like one single large computer Can have central computer and slave computers Main computer may execute programs and hold database The front-end computer may handle all communication lines with other computers or simple terminals Notes on Centralized Systems Clustered architectures may be cost efficient and provide greater total capacity if similar operating system and hardware are used Multicomputer architectures are good when the centralized system can be decomposed into relatively independent subsystems (each possibly with its own operating system and/or hardware platform) 30
  • 31. Distributed Architecture n Distributes system across several computers and locations distributed computing n Relies on communication networks for geographic connectivity n Client/server architecture dominant model for distributed computing 31
  • 32. Client/Server Architecture The dominant architectural model for distributing information resources Two-tire architecture divides the information system processes into two classes: Server: manages system resources and provides access to those resources and services to other computers on the network Client computer: uses communication interface to requests services from other computers on the network Computer software that implements communication protocols on the network is called middleware n Advantage deployment flexibility Location, scalability, maintainability n Disadvantage complexity Performance, security, and reliability 32
  • 33. Interaction Among Multiple Clients and a Single Server 33
  • 37. ThreeThree-Layer Client/Server Architecture The data layer is a layer on a client-server configuration that manages stored data implemented as one or more databases The business logic layer contains the programs that implement the rules and procedures of business processing (or program logic of the application) The view layer contains the user interface and other components to access the system (accepts user input, and formats and displays processing results) n n This approach is called tree-layer architecture The IS divided into three layer is relatively easy to distribute and replicate across a network (interactions among the layers are always have a form of either request or response) It makes the layer relatively independent of one another, thus they can be placed on different computer systems with network connections and middleware serving 37
  • 40. N-Layer Client/Server Architecture When processing requirements or data resources are complex, threelayer architecture can be expanded into a larger number of layers (nlayer or n-tiered architecture) Next slide shows an example in which the data layer is split into two separate layers: the combined database server and servers that control the individual databases (marketing, production, accounting). The business logic layer interacts with a combined database server that provides a unified view of the data stored in several different databases. The responses from the individual database servers are then combined to create a single response to send to the business logic layer. 40
  • 43. Internet and Web-Based WebApplication Architecture Web is complex example of client/server architecture n Can use Web protocols and browsers as application interfaces n Benefits n Accessibility Low-cost communication Widely implemented standards 43
  • 44. Negative Aspects of Internet Application Delivery n Breaches of security n Fluctuating reliability of network throughput n Throughput can be limited n Volatile, changing standards 44
  • 45. Web Services Architecture A client/server architecture n Packages software functionality into server processes ( services ) n Makes services available to applications via Web protocols n Web services are available to internal and external applications n Developers can assemble an application using existing Web services 45
  • 47. Middleware n Aspect of distributed computing n Connects parts of an application and enables requests and data to pass between them n Transaction process monitors, object request brokers (ORBs), Web services directories n Designers reply on standard frameworks and protocols incorporated into middleware 47