StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Software Development Life Cycle - Assignment Example

Cite this document
Summary
There are two use cases to be emphasized in this study. Correspondingly, the proposed operations in the considered Software Development Life Cycle (SDLC) framework include a web-server and database server hosting protocol and a firewall protection configuration…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Software Development Life Cycle
Read Text Preview

Extract of sample "Software Development Life Cycle"

? Assignment of the proposed operation/system There are two use cases to be emphasized in this study. Correspondingly, the proposed operations in the considered Software Development Life Cycle (SDLC) framework include a web-server and database server hosting protocol and a firewall protection configuration. Description of the operation The planned web-server and database server hosting protocol needs to operate on the basis of certain requirements which entail a common browser which invokes a particular URL that can be operated through a PC or a notebook or even a mobile device. The protocol is able to support a variety of web pages and web applications ranging from basic to complex programming of computer games. To be supported in the web-server and data server hosting system, these web pages can be developed through various tools, as per its abilities, such as Dreamweaver and Front Page applications for developing simple web pages and similarly, Java, ICEFaces or .Net for developing complex applications. As per the referred use case, the information sharing process starts with the collection of raw sources from the internet which is then stored in the database servers prior to its transmission to the web servers. From the web servers, the information passes on to the routers and subsequently, the encrypted information is transferred to the end users through LAN, WAN and other internet servers. Before the information passes on to the web servers, as planned in the use case, it needs to pass through a web barrier, i.e. the firewall that restricts sharing of personal and unauthenticated information. System Analysis and Design System analysis and design principally refers to the systematic approach towards the designing and analysis of information transition systems or communication software. This particular approach is often regarded as Structured Systems Analysis and Design Method (SSADM) (Shere2000, 2001). In the referred use case, it can be observed that the designed SSADM intends to be operated by connecting external end users and internal end users on the basis of a complex web-server and database server system which will further be protected with a firewall application. Notably, a router has been considered to support the interface operations, in the SSADM. Theoretically, there are various stages which need to be followed when developing a SSADM. Fundamentally, six stages can be identified in the SSADM process, as listed below, Stage 1: Investigating the current problems associated with the systems operations to identify the need of SSADM Stage 2: Specifying the requisite features in the SSADM to evaluate and finalize optional methods in developing the system Stage 3: Selecting the most applicable technical options which can be appropriate to support the services required to be hosted by the information system Stage 4: Data designing to determine the range of data or information that can be served through the protocol Stage 5: Elaboration and feasibility check of the data transmission process planned on the basis of the developed SSADM through process design Stage 6: Designing the physical structure of the entire SSADM process (Shere2000, 2001) Database In the referred use case, appropriate procurement of relevant information is very much required in order to encrypt the information and its appropriate transition through the complex designing of the entire information system. Under such circumstances, new database server will be required to support the wide variety of schemas or tables. It is in this context that the different schemas will be required to support the vast range of information hosted by the web servers. However, the client will have another option of sharing databases over internet, using the systems of Microsoft SQL server and/or Oracle. Even though such mechanisms may be considered as useful in expanding the versatility of the server, it might also raise threats to data leakage being shared through cloud. Also, if the server application tends to use and XML methodology, it might further have to witness certain shortcomings in controlling effective external and internal end user interfaces (Seligman, & Rosenthal, 2001). Hence, it can be suggested that it shall be more beneficial for the client if the database server is replaced with a new one rather than being expanded through database sharing. Additionally, the new data base should consist of those features that should have proper data capacity storage to support the various schemas required in the developed SSADM. It should have the capacity of storing all the relevant data that will be later converted into information and forwarded to the end users through the web server. Also, the data storage facilities should be free of those instances whereby data to be transmitted may face risks of getting lost. All data storage devices should be authentic and should be able to obtain appropriate data without any loss by controlling external and internal end user interfaces. Programming For the purpose of the referred use case, use of very sophisticated programming language is required owing to the fact that it intends to host a variety of schemas through the database server along with a vivid range of web pages to be hosted through the web-server. For example, C++ programming language can effectively be utilized for creating various computer programs and similarly, the AWK command language can also be utilized for the purpose for making appropriate manipulations of the collected data as per the requirements. Networking As the referred use case shall be operating through multiple interface systems including the web-server and database servers including both the external end users and the internal end users, primary firewall protection is very essential to secure the information system. In this SSADM, the data transmission process can be controlled through a router which must be capable to facilitate effective information transmission along with provide adequate security to the client’s information. Also, primary importance should be laid upon the effective procurement of information from the customers by the client, which should consist of proper security features to help maintaining secrecy of the customers. In this regard, firewall security shall provide excellent services of blocking harmful websites and procuring information to the client. Web For delivering proper services in the referred use case, one those web servers are needed to be used which can provide the effective results in delivering the services. The web servers to be used in the referred case should be able to provide proper connectivity and support to the client. It should also be free of errors and improper connectivity. The web server should be able to serve all the requests of Hypertext Transfer Protocol (HTTP) chosen by the client to be operated through any of his/her devices ranging from simple news web pages to complex gaming programs. Apache HTTP server is well known for its extensive features and hence can be utilized in this case. Any of the latest technologies, such as HTML5, CSS3 and Javascript API’s, which can support the use of upgraded computer languages along with improved versions of servers and data storage are needed to be used. For delivering maximum information, the web pages should further be designed in such a way that it can serve the client with multiple information and numerous options to choose from. Considering the vast applicability of the web-server and the database server, the selected and hosted web pages should include all types of web pages including fields, help and graphics. Where fields category of web pages will assist in hosting simple web pages, on the other hand, help and graphics category web pages can be used to decode complex programs such as gaming. Additionally, there are various types of validation methods that can be used in this use case. As can be observed, the use case will have to operate numerical and record data, perform comparison of the data transmitted to serve the appropriate schema and also conduct data-type checks, the system will have to focus on multiple validation tests. In this regard, allowed character checks, cardinality checks, cross-system consistency checks and data type checks shall be included in the SSADM developed for the use case (Peng, 2005). References Peng, F. (2005). %IsNum, A Macro Function Checks Data Type In Data Step. Retrieved from http://www.lexjansen.com/pharmasug/2005/coderscorner/cc01.pdf Seligman, L. & Rosenthal, A. (2001). XML’s Impact on Databases and Data Sharing. Retrieved from http://www.mitre.org/work/best_papers/01/seligman_xml/seligman_xml.pdf Shere2000. (2001). An Introduction to the Structured Systems Analysis and Design Methods (SSADM). Retrieved from http://www.shere2000.co.uk/pdf/ssadm01.pdf Appendix A: Use case 1 Use Case Name Web-server and database server hosting Description A web-server development which can run on multiple devices and support a variety of simple as well as complex programming. A database server development which will function on multiple schemas. System Analysis and design The web-server and database server design needs to be appropriate to support the information transition needs of the client, which further entails multiple interfaces. A six stage methodology shall be used in this use case. Correspondingly, the first stage will comprise a feasibility check by identifying the current problems associated with the SSADM structure of the case, accordingly moving forth to gain a more precise understanding of the requisite features in the desired protocol. The methodology will then focus on the designing, elaboration and re-assessment of the entire SSADM. Database Sharing a database to support multiple schemas shall raise issues related with the security of the data transmitted. Thus, developing a new database shall be required in this use case. A complex data model is needed to support the use case along with the application of XML or other similar versatile methodologies. Microsoft SQL server and Oracle can also be regarded as noteworthy options in this case. Programming C++ or AWK programming languages can be used in this use case as these languages are developed to support a variety of complex data models as needed in this SSADM Networking A firewall protected networking system will be used in this use case which will align and transmit data within internal and external end user interfaces. Web a) The networking system will be able to support all the web page requests from HTTP owing to which Apache HTTP web-server can be regarded as a noteworthy option. b) HTML5, CSS3 and Javascript API’s technology to use when producing the web page. c) As the use case needs to support a wide variety of web-servers and database servers, fields, help, and graphics will be taken into concern d) Allowed character checks, cardinality checks, cross system consistency checks and data type checks will be used in this section to validate the data transmitted. Appendix B: Use case 2 Use Case Name Firewall Description To secure the data transmitted within the external and the internal end users System Analysis and design The firewall protection will be applied accompanied with a router in the interface system. The same six stage methodology, as used in the case of previous application, will be applied in this case. Database This use case can be supported with the new database to be developed as per the design of the web-server and database server system Programming Firewall can be supported with C++ programming language, which is being applied in the previous use case, as it can reduce complexities. Networking A basic networking model will be used in the firewall application where the data obtained from the external users will be transmitted to the internal end users and vice-versa in a secured and uninterrupted manner. Web The web-servers and the applications to be used for the firewall application will be same as the previous use case. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Software Development Life Cycle Assignment Example | Topics and Well Written Essays - 1250 words”, n.d.)
Software Development Life Cycle Assignment Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1482097-software-development-life-cycle
(Software Development Life Cycle Assignment Example | Topics and Well Written Essays - 1250 Words)
Software Development Life Cycle Assignment Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1482097-software-development-life-cycle.
“Software Development Life Cycle Assignment Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1482097-software-development-life-cycle.
  • Cited: 0 times

CHECK THESE SAMPLES OF Software Development Life Cycle

Comparison of Software Development Life Cycle Models

The paper "Comparison of Software Development Life Cycle Models" highlights that spiral project is mainly used in the development of large, complicated and costly projects since it facilitates the project to consider the uppermost dangers and risks at a minimal cost (Maheshwari and Jain, 2012)… Major large companies for internal institutional projects usually use the waterfall model, this is mainly because the developers are familiar with the environment and it is possible to understand clearly all the software requirements....
5 Pages (1250 words) Essay

Systems Development Life Cycle

In the paper “Systems development life cycle” the author looks at the estimation of time and work style.... Now if talking about the System development life cycle particularly then, it is a conceptual model used by the project management involving different steps to develop a project.... he cases above define may also be the examples of the system development life cycle as processing a group of steps every time to achieve a particular goal is said to be a system....
8 Pages (2000 words) Assignment

Courseware Management System

As the paper "Courseware Management System" outlines, Professional Colleges require to maintain an information system to work in an organized manner as keeping students information and respective profiles fills a number of files and make searches difficult manually.... hellip; A manual or automated system; organize to collect, process, transmit and maintain the data i....
8 Pages (2000 words) Assignment

Software Development Life Cycle Models

This is the first derivative of the classic Software Development Life Cycle model which goes through the processes of requirement capturing and analysis, System Analysis and Design, Code Generation, testing and maintenance.... Water fall model (Royce,1970) differs from the sequential Software Development Life Cycle in inserting iteration at the end of every phase to reduce large iterations over several phases which could turn out to be costly exercises.... This astonishing revelation tells us that most of the software projects are either ill managed or have not been understood properly. … Owing to its importance, software life cycle models have always been of great interest to people who wanted to deliver software out of a production line....
9 Pages (2250 words) Essay

Integration of Agile Practices into Traditional SoftWare Development Life Cycle

The traditional Software Development Life Cycle involved the traditional software development methodologies, which are Waterfall methods, V-Model, and Rup (Okoli & Carillo, 2010).... These practices could be integrated into the traditional Software Development Life Cycle to change how the project is run instead of completely changing to the new methods.... Another limitation of this study is the many ways in which agile practices could be integrated into the traditional Software Development Life Cycle....
8 Pages (2000 words) Research Proposal

The choice of PMM word report

he website for Solent University will be developed using the waterfall model for the Software Development Life Cycle (SDLC).... The Water fall model is the simplest Software Development Life Cycle.... It consists of 5 phases in the project's life cycle....
2 Pages (500 words) Coursework

System Engineering and Software Development Processes

It has the following processes, problem definition, value system design, system synthesis, system analysis, and optimization, decision making and planning… Software development process which is also referred to as Software Development Life Cycle (SDLC) is a structure that dictates the developmental process of a software product.... oftware development process which is also referred to as Software Development Life Cycle (SDLC) is a structure that dictates the developmental process of a software product....
1 Pages (250 words) Essay

Requirements Analysis and Design in Software Development

This essay "Requirements Analysis and Design in Software Development" presents a detailed analysis of the two most important stages of a traditional Software Development Life Cycle, these stages are: requirements analysis and software design.... hellip; This essay compares these two stages of the traditional Software Development Life Cycle with agile software methodologies.... However, the software development process is followed through a Software Development Life Cycle....
20 Pages (5000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us