Systems Analysis and Design5th EditionChapter 7. The .ppt

上传人:arrownail386 文档编号:389569 上传时间:2018-10-14 格式:PPT 页数:62 大小:1.44MB
下载 相关 举报
Systems Analysis and Design5th EditionChapter 7. The .ppt_第1页
第1页 / 共62页
Systems Analysis and Design5th EditionChapter 7. The .ppt_第2页
第2页 / 共62页
Systems Analysis and Design5th EditionChapter 7. The .ppt_第3页
第3页 / 共62页
Systems Analysis and Design5th EditionChapter 7. The .ppt_第4页
第4页 / 共62页
Systems Analysis and Design5th EditionChapter 7. The .ppt_第5页
第5页 / 共62页
亲,该文档总共62页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、Systems Analysis and Design 5th Edition Chapter 7. The Design Phase, Design Strategy, and Architecture Design,Roberta Roth, Alan Dennis, and Barbara Haley Wixom,7-0, Copyright 2011 John Wiley & Sons, Inc.,Chapter 7 Outline,Transition from requirements to design.System acquisition strategies.- Custom

2、 development.- Packaged software.- Outsourcing. Influences on the acquisition strategies. Selecting an acquisition strategy., Copyright 2011 John Wiley & Sons, Inc.,7-1,Chapter 7 Outline, cont.,Elements of an architecture design. Creating an architecture design. Hardware and software specification.,

3、 Copyright 2011 John Wiley & Sons, Inc.,8-2,INTRODUCTION,The design phase decides how the new system will operate. The design phase develops the system requirements that describe details for building the system. We also describe three alternative strategies for acquiring the system., Copyright 2011

4、John Wiley & Sons, Inc.,7-3,INTRODUCTION, cont.,Architecture design Plans for how the system will be distributed across multiple computers and what hardware, operating system software, and application software will be used for each computer. Key factors in architecture design Nonfunctional requireme

5、nts developed early in the analysis phase play a key role in architecture design. Hardware and software specification Defines what hardware and software are needed for the new system., Copyright 2011 John Wiley & Sons, Inc.,8-4,TRANSITION FROM REQUIREMENT TO DESIGN,The purpose of the analysis phase

6、is to figure out what the business needs. The purpose of the design phase is to decide how to build it.During the initial part of design, the business requirements are converted into system requirements that describe the technical details for building the system. System requirements are communicated

7、 through a collection of design documents and physical process and data models., Copyright 2011 John Wiley & Sons, Inc.,7-5,(contd),Activities of the design phase, Copyright 2011 John Wiley & Sons, Inc.,7-6,(contd),At the end of the design phase, the final deliverable called system specification is

8、created. System specification outline, Copyright 2011 John Wiley & Sons, Inc.,7-7,SYSTEM ACQUISITION STRATEGIES,There are three primary ways to approach the creation of a new system: 1. Develop a custom application in-house. 2. Buy a packaged system and (possibly) customize it; and 3. Rely on an ext

9、ernal vendor, developer, or service provider to build or provide the system., Copyright 2011 John Wiley & Sons, Inc.,7-8,Custom Development,Custom development building a new system from scratch. Pros of custom development:- It allows developers to be flexible and creative in the way they solve busin

10、ess problems.- It allows to take advantage of current technologies that can support strategic efforts.- It builds technical skills and functional knowledge within the organization., Copyright 2011 John Wiley & Sons, Inc.,7-9,(contd),Cons of custom development:- It requires a dedicated effort that in

11、clude long hours and hard work.- It requires a variety of skills, but high skilled IS professionals are difficult to hire and retain.- The risks associated with building a system from the ground up can be quite high., Copyright 2011 John Wiley & Sons, Inc.,7-10,Packaged Software,Many organizations b

12、uy packaged software that has been written for common business needs. It can be much more efficient to buy programs that have already been created and tested, and a packaged system can be bought and installed quickly compared with a custom system. Packaged software can range from small single-functi

13、on tools to huge all-encompassing system such as ERP (enterprise resource planning) applications., Copyright 2011 John Wiley & Sons, Inc.,7-11,(contd),One problem of packaged software is that companies utilizing packaged software must accept the functionality that is provided by the system. Most pac

14、kaged applications allow for customization or the manipulation of system parameters to change the way certain features work. A custom-built add-on program that interfaces with the packaged application, called a workaround, can be created to handle special needs., Copyright 2011 John Wiley & Sons, In

15、c.,7-12,(contd),Systems Integration refers to the process of building new systems by combining packaged software, existing legacy systems, and new software written to integrate them. The key challenge in systems integration is finding ways to integrate the data produced by the different packages and

16、 legacy systems., Copyright 2011 John Wiley & Sons, Inc.,7-13,Outsourcing,Outsourcing means hiring an external vendor, developer, or service provider to create or supply the system. Outsourcing firms called application service providers (ASPs) supply software applications and/or services over the In

17、ternet. Software as a service (SaaS) is an extension of the ASP model. Outsourcing has many advantages such as a low cost of entry and a short setup time., Copyright 2011 John Wiley & Sons, Inc.,7-14,(contd),Risks of outsourcing: Compromising confidential information Losing control over future devel

18、opment Losing important skills of in-house professionals. You should never outsource what you do not understand.Carefully choose an outsourcing firm with a proven track record., Copyright 2011 John Wiley & Sons, Inc.,7-15,(contd),Three types of outsourcing contracts:- Time and arrangements: pay for

19、whatever time and expenses are needed to get the job done.- Fixed-price contract- Value-added contract: the outsourcer reaps some percentage of the completed systems benefits., Copyright 2011 John Wiley & Sons, Inc.,7-16,(contd),Outsourcing Guidelines, Copyright 2011 John Wiley & Sons, Inc.,7-17,INF

20、LUENCES ON THE ACQUISTION STRATEGY,Project characteristics that influence the choice of acquisition strategy, Copyright 2011 John Wiley & Sons, Inc.,7-18,Business Need,If the business need for the system is common and the technical solutions already exist, packaged software is a solution. A custom s

21、olution should be explored when the business need is unique. Outsourcing is used in situations where the business need is not a critical element of company strategy., Copyright 2011 John Wiley & Sons, Inc.,7-19,In-House Experience,If in-house experience exists for all the functional and technical ne

22、eds of the system, it will be easier to build a custom application. A packaged system may be a better alternative for companies that do not have the technical skills to build the desired system., Copyright 2011 John Wiley & Sons, Inc.,7-20,Project Skills,The skills that are applied during projects a

23、re either technical (e.g., SQL) or functional (e.g., e-commerce). Different design alternatives are more viable, depending on how important the skills are to the companys strategy., Copyright 2011 John Wiley & Sons, Inc.,7-21,Project Management,Custom applications require excellent project managemen

24、t and a proven methodology. There are so many things that can push a project off track, such as funding obstacles, staffing, and overly demanding business users., Copyright 2011 John Wiley & Sons, Inc.,7-22,(contd),The project team should choose to develop a custom application only if it is certain

25、that the underlying coordination and control mechanisms will be in place. Packaged and outsourcing alternatives also must be managed; however, they are more shielded from internal obstacles., Copyright 2011 John Wiley & Sons, Inc.,7-23,Time Frame,When time is a factor, the project team should probab

26、ly start looking for a system that is already built and tested. If a custom alternative is chosen, and the time frame is very short, consider using techniques like timeboxing to manage the problem. An outsourcing solution could take as long a custom development initiative., Copyright 2011 John Wiley

27、 & Sons, Inc.,7-24,SELECTING AN ACQUISITION STRATEGY,To implement the strategies, additional information is needed.- What tools and technologies are needed for a custom development project?- What vendors make products that address the project needs?- What service providers would be able to build thi

28、s application if outsourced? One helpful tool is the request for proposal (RFP), a document that solicits a formal proposal from a potential vendor, developer, or service provider., Copyright 2011 John Wiley & Sons, Inc.,7-25,(contd),RFPs describe in detail the system or service that is needed, and

29、vendor respond by describing in detail how they could supply those needs. For smaller projects with smaller budgets, a request for information (RFI) may be sufficient, as it is shorter and less detailed. When a list of equipment is so complete that the vendor needs only provide a price, a request fo

30、r quote (RFQ) may be used., Copyright 2011 John Wiley & Sons, Inc.,7-26,Developing an Alternative Matrix,The alternative matrix combines several feasibility analyses into one matrix. It contains technical, economical and organizational feasibilities for each system candidate, pros and cons, and othe

31、r information. The matrix is a grid with alternatives across the top and different criteria along the side., Copyright 2011 John Wiley & Sons, Inc.,7-27,(contd),Sometimes, weights and scores are added to create a weighted alternative matrix. The score assigned is a subjective assignment. To avoid a

32、biased analysis, each analyst develops ratings independently., Copyright 2011 John Wiley & Sons, Inc.,7-28,(contd),Sample Alternative Matrix Using Weights, Copyright 2011 John Wiley & Sons, Inc.,7-29,ELEMENTS OF AN ARCHITECTURE DESIGN,The objective of architecture design is to determine how the soft

33、ware components of the information system will be assigned to the hardware devices of the system., Copyright 2011 John Wiley & Sons, Inc.,7-30,Architectural Components,The major architectural components of any system are the software and the hardware. All software systems can be divided into four ba

34、sic functions:- Data storage.- Data access logic: the processing required to access stored data.- Application logic: the logic documented in the DFDs, use cases, and functional requirements.- Presentation logic: the display of information to the user and the acceptance of the users commands., Copyri

35、ght 2011 John Wiley & Sons, Inc.,7-31,(contd),The three primary hardware components:- Client computers: Input-output devices employed by users (e.g., PCs, laptops, handheld devices, smart phones)- Servers: Larger multi-user computers used to store software and data.- The network: Connects the comput

36、ers., Copyright 2011 John Wiley & Sons, Inc.,7-32,Client-Server Architectures, Copyright 2011 John Wiley & Sons, Inc.,7-33,Client-server architectures balance the processing between client devices and one or more server devices. The client is responsible for the presentation logic, whereas the serve

37、r is responsible for the data access logic and data storage. A thick or fat client contains all or most of application logic; whereas a thin client contains a small portion of the application logic.,(contd), Copyright 2011 John Wiley & Sons, Inc.,7-34,(contd),Client-server architectures have four im

38、portant benefits.- Scalable - Can support different types of clients and servers through middleware. - The presentation logic, the application logic, and the data processing logic can be independent.- If a server fails, only the applications requiring that sever are affected.The major limitation of

39、client-server architectures is their complexity., Copyright 2011 John Wiley & Sons, Inc.,7-35,Client-Server Tiers,There are many ways in which the application logic can be partitioned between the client and the server. The arrangement in Figure 7-7 is called two-tiered architecture., Copyright 2011

40、John Wiley & Sons, Inc.,7-36,(contd),Three-tiered architecture, Copyright 2011 John Wiley & Sons, Inc.,7-37,(contd),n-tiered architecture, Copyright 2011 John Wiley & Sons, Inc.,7-38,Less Common Architectures,Server-Based Architectures, Copyright 2011 John Wiley & Sons, Inc.,7-39,Client-Based Archit

41、ectures, Copyright 2011 John Wiley & Sons, Inc.,7-40,Advances in Architecture Configurations,Advances in hardware, software, and networking have given rise to a number of new architecture options.- Virtualization.- Cloud computing., Copyright 2011 John Wiley & Sons, Inc.,7-41,Virtualization,Virtuali

42、zation refers to a creation of a virtual device or resource, such as a server or storage device.Server virtualization involves partitioning a physical server into smaller virtual servers.Storage virtualization involves combining multiple network storage devices into what appears to be single storage

43、 unit., Copyright 2011 John Wiley & Sons, Inc.,7-42,Cloud Computing,Cloud computing everything from computing power to computing infrastructure, applications, business processes to personal collaboration can be delivered as a service wherever and whenever needed. The “cloud” can be defined as the se

44、t of hardware, networks, storages, devices, and interfaces that combine to deliver aspects of computing as a service., Copyright 2011 John Wiley & Sons, Inc.,7-43,(contd),Cloud computing can be implemented in three ways:- private cloud,- public cloud, and- hybrid cloud.At this time, cloud computing

45、is in its early stage of development., Copyright 2011 John Wiley & Sons, Inc.,7-44,(contd),Advantages of cloud computing 1. The resources allocated can be increased or deceased based on demand. 2. Cloud customers can obtain cloud resources in a straightforward fashion. 3. Cloud services typically ha

46、ve standardized APIs (application program interfaces). 4. The cloud computing model enables customers to be billed for resources as they are used., Copyright 2011 John Wiley & Sons, Inc.,7-45,Comparing Architecture Options,Most systems are built to use the existing infrastructure in the organization

47、, so often the current infrastructure restricts the choice of architecture. Each of the architectures discussed has its strengths and weaknesses. Client-server architectures are strongly favored on the basis of the cost of infrastructure., Copyright 2011 John Wiley & Sons, Inc.,7-46,CREATING AN ARCH

48、ITECTURE DESIGN,Creating an architecture design begins with the nonfunctional requirements. Refine the nonfunctional requirements into more detailed requirements for the selection of architecture. The nonfunctional requirements and the architecture design are used to develop the hardware and softwar

49、e specification., Copyright 2011 John Wiley & Sons, Inc.,7-47,Operational Requirements, Copyright 2011 John Wiley & Sons, Inc.,7-48,Performance Requirements, Copyright 2011 John Wiley & Sons, Inc.,7-49,Security Requirements, Copyright 2011 John Wiley & Sons, Inc.,7-50,Cultural and Political Requirem

50、ents, Copyright 2011 John Wiley & Sons, Inc.,7-51,Designing the Architecture,In many cases, the technical environment requirements as driven by the business requirements define the application architecture. If the technical environment requirements do not require the choice of a specific architecture, then other nonfunctional requirements become important for designing the architecture.,

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 教学课件 > 综合培训

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1