Systems Analysis and Design

Submitted by: Submitted by

Views: 805

Words: 1223

Pages: 5

Category: Science and Technology

Date Submitted: 07/22/2012 07:13 PM

Report This Essay

Case Study 2: Application Architecture

Dwayne D. Jones Sr.

Dr Robert Joseph

Systems Analysis and Design CIS 210

28 May 2012

Architecture used

The type of architecture used in the payroll system is explained as following:

Users

The PAYROLL system should support multiple concurrent user activities. The users from different locations will remain connected to the server via network throughout the day.

Scalability

The system must be highly scalable. Different modules will be included in the proposed PAYROLL application. The system must have the provisions for new application modules to be incorporated into the system with minimum changes to the existing application parts. Change in business rules, database structure or the user interfaces may be done affecting only the pertaining sections. Thus the system will be highly resilient and stable to future changes.

Performance

Performance is another major issue for the PAYROLL product. The user interfaces for the PAYROLL product will be rich in graphics content that makes it both user-friendly and network resource hungry thereby degrading the overall system performance. The PAYROLL architecture designed in a way so as to reduce this performance bottleneck as much as possible. The PAYROLL system will be deployed over the Internet/ Intranet and utmost care has to be taken to reduce network traffic and server hits.

Proper communication methodologies with the objective of minimizing simultaneous connection to the server and also minimizing the network traffic should be devised and optimized for performance.

Security

Application security is one of the most challenging aspects of network security. Application-level security will ensure that PAYROLL application interacts with end users only in ways that the administrator will intend to. Application-level security will focus on preventing the unauthorized use of resources and PAYROLL information. User can able to enter the system by Login the application through...