Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

It216 Systems Analysis And Design Assessment Answers

Add a section to the report for web services and the cloud that might be used for the new system. How will the web service(s) be tested and deployed?

Apply knowledge and understanding of what constitutes the concept of a distributed system by being able to analyze and design a system based on customer requirements supported by the application of object-oriented design and analysis, e.g., use case analysis
 
Apply knowledge and understanding of how to architect the various components of a distributed system based on their defined baseline requirements and design models supported by the application of Unified Modeling Language (UML) constructs and models
 
Apply knowledge and understanding of how to develop, test, and deploy a distributed system and the various components that compose this system based on their architected components supported by the application of object-oriented programming, e.g., J2EE/Java, C#, ColdFusion, Scripting, etc.

Answer:

Distributed System:

Description and Selection of Distributed System: 

The distributed system can also be referred as the distributed computing. It is a set of computers function, react and represented as a huge large computer device. In this type of system, the elements of a computer application is distributed among the computers that are installed in the system. This allows the system to enhance the performance and efficiency. In order to support the distributed computing, the distributed systems needed to be installed in the distributed computing environment (Bal et al., 2016).

Peer-to-peer Distributed System: The peer-to-peer distributed system is considered as the computing that divide tasks among the peers. In peer-to-peer system, the nodes are generated in peer-to-peer network. Regarding the SME or house use, the Peer-to-peer networks is the best option. The features of the peer-to-peer system is designed for supporting approximately ten client stations (workstations) before the system initiates experiencing the poor effects of few reliable execution as well as management issues. Normally, distributed systems are generated of an buildup of clients that run either Windows 98 or Windows NT Workstation. Windows 95, Windows 3.11, and Windows 2000 Professional similarly support distributed systems management (Wu et al., 2013).

Client Server Distributed System: There are a basically unbounded combination of customer/server frameworks, yet every one of them have a couple of things in like way. For a specific something, all have joined security databases that control access to conveyed resources on servers. In the domain of Windows, the server when in doubt runs NetWare, Windows NT, or one of the Windows 2000 Server things (Oluwatosin, 2014). The server contains a summary of usernames and passwords. Customers cannot sign on to the framework unless they supply significant usernames and passwords to the server. Once marked on, customers may get to only those benefits that the framework manager empowers them to get to.

Now if both the data regarding both type of distributed system then it can be stated that the client server model is the best option. This will allow the organization to control the client systems through the server system. The reasons behind selecting the client server model are as following.

  1. Centralization:Through this, a centralized control can be established. This will assist in administrating the complete distributed system in the Book-R-U. The access rights can be implemented by the server computers.
  2. Appropriate Management:The files in a client server distributed system is stored in a single location. This single location file saving process allows to manage data properly (Oluwatosin, 2014).
  3. Data Backup and Recovery is Present:As the data and information will be saved in the server, it will be less complex to backup and restore data.
  4. Upgradation:The organization, Book-R-U, can upgrade the whole system through upgrading the server only. Additional devices and computers can be added if required with minimal changes in the system (Chernyi, 2015).

Client Server Distributed System Recommendation and Challenges:

Recommendations: The recommendations for the client-server system of Book-R-U are as following.

  1. Data Storage Implementation:Implementing the data storage with a connection to the server computer is the most crucial thing to do. Without this process, carried out properly, it is not possible to implement the access authorization feature.
  2. System:The server will have six core Xeon CPU or better, 16GB DDR4 Ram, total 10 TB of Sata HDD, power supply, I/O devices and Windows server 2010 operating system. The client systems will have windows 10 system, 4 GB ram, 1 TB hdd and Power supply.
  3. Network:The network must be redundant and reliable. As all the important processes will be done through communicating with the server computer, the network must be on 24*7.

Challenges: The challenges of implementing the Client Server Distributed System are as following.

  1. The Congestion in the Network:The biggest challenge in the client server distributed model is that the congestion in the network is a frequent case. As all the client requests are sent to the server computer, the connection to the server computer sometimes overload (Barri, Roig & Gine, 2016).
  2. Cost:The cost is one of the main reasons the client server model is avoided in many cases. The server computers are cost way more than the regular computers and the network is so complex that a lot of capital is needed to invested for having a good network.
  3. Maintenance:The system must be put under maintenance 24*7. Book-R-U must hire professionals for maintaining the system. As the system is very complex, each issues must be resolved as soon as possible, otherwise one issue can lead to another one then the whole system may stop without leaving any trace of the root (Lazarova, 2013).

Additional Information:

The software maintenance in the distributed system is more complex than the centralized system. This happens because the distributed system contains software in greater quantities, faster pace of change and variety.

The protocols that are constructed around the client server model are such as DNS or domain name system, SMTP or simple main transfer protocol, telnet and HTTP or hypertext transfer protocol.

Architecture Model:

Selection of Architecture Model:

Two-Tier Architecture: In a tow tier architecture, connection between the client and server is installed directly (Moniruzzaman & Hossain, 2014). This allows the tow-tier architecture to run fast in a tightly coupled environment. In a two-tier architecture, there is no intermediate layer between the client and server. If two-tier application is installed for Book-R-U’s system then the application will hold the client layer and server layer.

Three-Tier Architecture: In a three tier architecture, similarly there is client and server layer but there is also a intermediate layer. After the intermediate layer checks and approve the requests, these requests are sent to the server system (Grozev & Buyya, 2014). In a three tier architecture, the security is a string point.

Selection: The selection process is based on the following points.

  1. The two-tier architecture is always easy to modify
  2. The communication is faster in two tier architecture than others
  3. In three tier architecture, the performance is high quality
  4. In three tier architecture, the persistent objects are lightweight
  5. Enhanced scalability can be achieved through three tier architecture
  6. The three tier architecture can be reused

Now from the above discussion of both the architectures, it is clear that three tier architecture is the best solution for Book-R-U.

Requirements of Thee Tier Architecture:

The three tier architecture distributed system will be implemented using two server computers. Client systems will be connected to the network. The client system requests will be sent to the server that represent as the intermediate level. This server process the request and validate the requests. The server requirements are 16GB DDR4 RAM, Octacore processor, Main memory, cache memory of relatively bigger size and many more (He & Xu, 2014). The network is also a crucial factor in the system as the connection quality and reliability relies on the network.

Most Effective Model:

The three-tier model will be most effective, as this will allow the distributed system to use more secure procedures. Though the system cost will increase, the system will be performing comparatively way better than the two tier architecture model.

Networking and Security: 

Setting-Up Stores:

The stores will have several devices connected to a central system or computer. This will computer will calculate the processes done by the various devices like printer, barcode scanner and many others. The central computer will serve as a node in the big chain of network.

Network Type:

There are options like Local Area Network, Wide Area Network and Metropolitan Area Network. The LAN is used for only in the situations when the computers are connected to the server in a short area. The Wide Area Network is the solution for connecting various computers that are separated from each other in a very large geographical area. The WAN make use of LAN in the lowest level (Stallings, 2015). Therefore, as per the organization need the best solution in this case is the WAN as it will effectively connect all the computers in the system.

Use of Wireless Connectivity:

The wireless connectivity has several advantages such as connection to remote location within the coverage area. Extension of coverage area through several routers are possible. The network redundancy can be achieved easily. Though, there are some serious flaws in the wireless connectivity such as vulnerable to the cyber attacks, the connection error can occur if the routers are not properly configured and setting up wireless connectivity can be a complex process. Now if the organization wants to make use of the network opportunities completely then the use of wireless network in various sections of the network is a great solution.

WAN as a Good Solution:

The wireless area network is a great choice for Book-R-U because of the following reason.

  1. It is compatible with the client server distributed system as WAN also provides the option of implementing the centralized IT infrastructure (Subramanian et al., 2015)
  2. The WAN will allow the organization to send all the data to all over the network without the need of transferring those data to the internet. The internet, as all know, is a very vulnerable space.
  3. Book-R-U will be using the leased lines rather than the broadband connection. Only the Wide Area Network allow this feature (Stallings, 2015).

Network Security Setup:

IPSec: The IPSec system is a group of IETF standards that gives for secure data transmission over networks that are unsecured. The IPSec can also be utilized for securely tunneling data traffic among mobile devices or remote access and a VPN gateway. IPSec provides protection against security vulnerabilities, which are IP spoofing such as session hacking and traffics. IPSec services use the data transmission encryption. The data transmission encryption, the host device may encrypt packets former to transmission. Data integrity validation refers that the receiving host is capable of authenticating every packet transferred to make sure the real data that was sent and received (Raza et al., 2014).

Router Security: To empower security on router, secret key ought to be incited on the grounds that without watchword it goes about as an open system. In the event that remote director is empowered, it enables anybody to view or change the router setting. So arrange security prescribes remote overseer ought to be incapacitated (Farik & Ali, 2015). When you need to interface another gadget to your system you need to physically enter your novel SSID (Niemietz & Schwenk, 2015).

Object-Oriented Development Environment:

Selection of Development Environment:

The selected development environment for the distributed system is object oriented environment. Object-Oriented Programming (OOP) enables you to configuration programs in a way that all the more intently matches this present reality (Turk, France & Rumpe, 2014). On the planet, we are encompassed by articles. These items can be thought of as having a place with various classes, for instance pens and pencils. These can thus be thought as having a place with bigger, more broad classes, for example, composing executes. Similarly, an object-oriented program includes programming based items.

Reason behind Selection:

  1. Reduced Maintenance:  The significant objective of protest-situated enhancement is the authentication that the system will appreciate an extended lifetime at the time of having distant smaller maintenance charges (Dennis, Wixom & Tegarden, 2015).
  2. Real-World Modeling:  The Object-oriented system are likely to visualize this existing reality in an improved complete manner than do general methods. The diagram is depending upon components, as in opposition to on management and information (Turk, France & Rumpe, 2014).
  3. Improved Reliability and Flexibility: The system, Object-rented, guarantees to be crucially sound in comparison conventional systems. Practices may be gleaned from super-classes, and great practices might be incorporated without interfering present systems capabilities (Dennis, Wixom & Tegarden, 2015).
  4. High Code Reusability:  At the point when another protest is made, it will consequently acquire the information traits and attributes of the class from which it was brought forth..

The Cloud:

As all the required data sharing process can be achieved through the WAN network features, there is no need for the organization to invest additional capital in getting cloud solution.

References

Bal, H., Epema, D., de Laat, C., van Nieuwpoort, R., Romein, J., Seinstra, F., ... & Wijshoff, H. (2016). A medium-scale distributed system for computer science research: Infrastructure for the long term. Computer, 49(5), 54-63.

Barri, I., Roig, C., & Gine, F. (2016). Distributing game instances in a hybrid client-server/P2P system to support MMORPG playability. Multimedia Tools and Applications, 75(4), 2005-2029.

Bibinagar, N., & Kim, W. J. (2013). Switched Ethernet-based real-time networked control system with multiple-client–server architecture. IEEE/ASME transactions on Mechatronics, 18(1), 104-112.

Can, A. B., & Bhargava, B. (2013). Sort: A self-organizing trust model for peer-to-peer systems. IEEE transactions on dependable and secure computing, 10(1), 14-27.

Chernyi, S. (2015). The implementation of technology of multi-user client-server applications for systems of decision making support. Metallurgical and Mining Industry, 3, 60-65.

Dennis, A., Wixom, B. H., & Tegarden, D. (2015). Systems analysis and design: An object-oriented approach with UML. John Wiley & Sons.

Farik, M., & Ali, S. (2015). Analysis Of Default Passwords In Routers Against Brute-Force Attack. International Journal of Scientific and Technology Research, 4(9).

Grozev, N., & Buyya, R. (2014). Multi-cloud provisioning and load distribution for three-tier applications. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 9(3), 13.

He, W., & Da Xu, L. (2014). Integration of distributed enterprise applications: A survey. IEEE Transactions on Industrial Informatics, 10(1), 35-42.

Lazarova, V. (2013). Classical Web-Based Client-Server Systems and the ACID Principles of the Transactional Approach. In Proceedings of International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE) (p. 23). International Conference on Application of Information and Communication Technology and Statistics and Economy and Education (ICAICTSEE).

Moniruzzaman, A. B. M., & Hossain, S. A. (2014). A Low Cost Two-Tier Architecture Model for High Availability Clusters Application Load Balancing. arXiv preprint arXiv:1406.5761.

Niemietz, M., & Schwenk, J. (2015). Owning your home network: Router security revisited. arXiv preprint arXiv:1506.04112.

Oluwatosin, H. S. (2014). Client-server model. IOSR Journal of Computer Engineering (IOSR-JCE), 16(1), 67-71.

Raza, S., Duquennoy, S., Höglund, J., Roedig, U., & Voigt, T. (2014). Secure communication for the Internet of Things—a comparison of link?layer security and IPsec for 6LoWPAN. Security and Communication Networks, 7(12), 2654-2668.

Stallings, W. (2015). Gigabit Ethernet: from 1 to 100 Gbps and beyond. Internet Protocol J, 18(1), 20-32.

Subramanian, S. G., Kannan, G., Lillypet, S., Geetha, P., & Prathiba, G. (2015). Analysis And OSPF Behaviour Performance Of IPV 6 Enterprice Network In Different Environment. International Journal of Scientific Research and Engineering Studies (IJSRES), 2(3).

Turk, D., France, R., & Rumpe, B. (2014). Limitations of agile software processes. arXiv preprint arXiv:1409.6600.

Wu, X., Tavildar, S., Shakkottai, S., Richardson, T., Li, J., Laroia, R., & Jovicic, A. (2013). FlashLinQ: A synchronous distributed scheduler for peer-to-peer ad hoc networks. IEEE/ACM Transactions on Networking (TON), 21(4), 1215-1228.


Buy It216 Systems Analysis And Design Assessment Answers Online


Talk to our expert to get the help with It216 Systems Analysis And Design Assessment Answers to complete your assessment on time and boost your grades now

The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.


Get Online Support for It216 Systems Analysis And Design Assessment Answers Assignment Help Online


); }
Copyright © 2009-2023 UrgentHomework.com, All right reserved.