Tuesday, March 24, 2009

DATA FLOW DIAGRAM (DFD)

Data flow diagram (DFD) is used to show how data flows through the system and the processes that transform the input data into output. Data flow diagrams are a way of expressing system requirements in a graphical manner. DFD represents one of the most ingenious tools used for structured analysis. It is also known as a bubble chart.

In the normal convention, logical DFD can be completed using only four notations.














The DFD at the simplest level is referred to as the ‘CONTEXT ANALYSIS DIAGRAM’. These are expanded by level, each explaining its process in detail. Processes are numbered for easy identification and are normally labeled in block letters. Each data flow is labeled for easy understanding.

Steps to Construct Data Flow Diagrams

Four steps are commonly used to construct a DFD

  1. Process should be named and numbered for easy reference. Each name should be representative of the process.

  1. The direction of flow is from top to bottom and from left to right.

  1. When a process is exploded in to lower level details they are numbered.

  1. The names of data stores, sources and destinations are written in capital letters.

Salient feature of DFD

Q The DFD shows flow of data, not of control loops and decision are controlled considerations do not appear on a DFD.

Q The DFD does not indicate the time factor involved in any process whether the data flows take place daily, weekly, monthly or yearly.

Q The sequence of events is not brought out on the DFD.

Behavioral feasibility

People are inherently resistant to change, and computers have been known to facilitate change. An estimate should be made about the reaction of the user staff towards the development of a computerized system. Computer installations have something to do with turnover, transfers and changes in job status. The introduction of a candidate system requires special effort to educate, sell and train the staff for conducting the business.

The candidate system was found to be technically, economically, and behaviorally feasible. The system was developed user friendly, needless training and improves the working environment. Justification for any capital outlay is that it will increase profit, reduce expenditure or improve the quality of service or goods, which in turn may be expected to provide increased profits. Disregarding the initial expenses, the candidate system was assessed to be feasible in all ways.

Technical feasibility

The assessments of technical feasibility centers on the existing system and to what extent it can support the proposed addition. This was based on an outline design of system requirements in turns of inputs, files, programs, procedures, and staff. It involves financial considerations to accommodate technical enhancement.

Economic feasibility

Economic analysis is the most frequently used method for evaluating the effectiveness of a candidate system. It is more commonly known as cost benefit analysis, the procedure to determine the benefits and saving that are expected from a candidate system and compare them with costs. If the benefits outweigh costs then a decision is made to design and implement the system. Otherwise make alterations in the proposed system.

FEASIBILITY ANALYSIS

Feasibility analysis is the procedure for identifying the candidate system, evaluating and electing the most feasible system. This is done by investigating the existing system in the area under investigation or general ideas about a new system. It is a test of a system proposal according to its workability, impact on the organization, ability to meet user needs, and effective use of resources. The objective of feasibility study is not to solve the problem but to acquire a sense of its scope. Feasibility analysis involves the following steps:

Ø Form a project team and appoint a project leader.

Ø Prepare system flow charts.

Ø Enumerate potential candidate system.

Ø Describe and identify characteristics of candidate systems.

Ø Determine and evaluate performance and cost effectiveness of each candidate system.

Ø Weigh system performance and cost data.

Ø Select the best candidate system.

Ø Repair and report final project directive to management.

Three key considerations are involved in the feasibility analysis:

R Economic

R Technical

R Behavioral.

SQL SERVER 2005

SQL Server 2005 the database for the Internet computing provides advanced tool to manage all type data in website. It is much more than a simple relational database model. The Internet File System combines the power of SQL Server 2005 with the ease of use of file system.
It allows all users to move all of their data in to SQL Server 2005 database, where it can be stored and managed efficiency.
SQL Server 2005 intermediate allows users to web enabling their multimedia-included image text, audio and video data. SQL Server 2005 includes robust intermediate and scalable with in the server in all tiers applications.
SQL Server offers a comprehensive high performance Internet platform for e -commerce and data warehousing. This integrated platform includes everything needed to develop and manage Internet applications.
SQL Server offers wide variety the most advanced Graphical User Interface driven development tool to build the business applications as well as an image suit of S/W applications for many areas of business and industry, stored procedure functions and packages can be written by using SQL, PL/SQL.

WEB SERVER (Internet Information Services 6.0)

A new generation of Web applications puts a greater demand on performance and scalability attributes of Web servers. For example, the Web server is expected to increase the speed at which HTTP requests are processed, but still allowing more applications and sites to run on one server. This also means that very few servers are needed to host a site, allowing the existing hardware investments to sustain longer while being able to handle greater capacity. Another important aspect of the Web server is its reliability. IIS 6.0 has been designed from the ground up to allow us to create reliable applications. For example, in IIS 6.0, you can isolate each application or Web site to run in its own process space. By doing this, you can ensure that applications are isolated and problems in one site do not affect the rest of the applications on the same server

Microsoft's Internet Information Services (IIS) is one of the most popular Web servers in use on the Internet and in intranets throughout the world. A Web server is a common point of vulnerability to hackers because—by necessity—it exposes itself to the Web. IIS 6.0 is no longer installed by default on Windows Server 2003 servers (with the exception of the Web Server Edition). When administrators do install IIS, it's initially configured in a high security mode. Security is a priority in this new version. Consequently, administrators must explicitly enable a number of important Web services features which worked automatically in previous versions. This new focus on security means administrators must familiarize themselves with the changes to provide the Web server services needed on their networks.

IIS 6.0 is the next generation of Web server available in the Windows Server 2003 platform. IIS 6.0 provides several enhancements over IIS 5.0 that are mainly intended to increase reliability, manageability, scalability, and security. IIS 6.0 is a key component of the Windows Server 2003 application platform, using which you can develop and deploy high performance ASP.NET Web applications, and XML Web Services. The new features of IIS 6.0 are new scalable HTTP request processing architecture, the ability to store IIS configuration settings in XML file, improved reliability by means of application pools, and so on.