ICT310 System Analysis and Design Task 2 ATMC Semester 2, 2019 ATMC ICT310 System Analysis and Design Task 2 Page 2 of 12 Assessment and Submission Details Marks: 35 % of the Total Assessment for the...

1 answer below »
please follow the rubric and the question.


ICT310 System Analysis and Design Task 2 ATMC Semester 2, 2019 ATMC ICT310 System Analysis and Design Task 2 Page 2 of 12 Assessment and Submission Details Marks: 35 % of the Total Assessment for the Course Due Date: Midnight Monday, Week 12 The assignment MUST be submitted on time. Assignments are to be submitted by SafeAssign. DO NOT SUBMIT THE ASSIGNMENT TO THE COURSE CO-ORDINATOR OR TUTOR. The task is an individual assignment and will be marked out of a total of 100 marks and forms 35% of the total assessment for the course. Once marked, ALL assignments will be checked for plagiarism and/or collusion between individuals. Refer to your Course Outline or the Course Web Site for a copy of the “Student Misconduct, Plagiarism and Collusion” guidelines. Academic Integrity Information. Note: Each student MUST make a second copy of the assignment and this copy MUST be produced within 24 hours of it being requested by the Course Co-ordinator. Failure to produce the second copy of the assignment when requested may result in loss of marks or a fail grade for the assignment. Assignment submission extensions will only be made using the official USC Guidelines. Requests for an extension to an assignment MUST be made prior to the date of submission and requests made on the day of submission or after the submission date will only be considered in exceptional circumstances. https://www.usc.edu.au/learn/student-support/academic-and-study-support/online-study-resources/academic-integrity ATMC ICT310 System Analysis and Design Task 2 Page 3 of 12 Case Study: Your IT Support Crowd Pty Ltd. Background: Your IT Support Crowd Pty Ltd (YITSC) is an Adelaide based Information Systems Support company. While also supporting various types of small to medium size businesses, YITSC specialises in supporting resort management, real estate and legal businesses with their specialist equipment and software requirements. These businesses have strict legal requirements around network security and data privacy because of their Trust Account management software and the sensitive client and guest data stored on the system including credit card details, and other very personal information. Roger Ben, a senior partner at YITSC, has been talking to clients about updating the security of their systems and how they back up their data. A legal requirement for Trust Account management is secure Offsite Backup of all trust account related data. Roger knows that while some clients are happy to backup to a third party ‘Cloud’, most are unsure of the security of cloud-based backups. Furthermore, some YITSC clients are part of corporate businesses or franchises who would like to backup centrally to their own servers. Roger and his partners discussed how they could cater for and all their client’s requirements and yet retain oversight and control of the backup system. They came up with the following concept (Figure 1): • CLIENT – the client’s system where the data is stored that requires backup. The ‘CLIENT Backup’ application is installed on any computer or server with data that needs to be transferred to a backup server • SERVER – there is a range of different backup storage options such as third-party cloud, YITSC servers, or an offsite corporate server. The ‘SERVER Backup’ application stored on these systems receives and stores data from the ‘CLIENT Backup’ application • CONTROLLER – YITSC central ‘CONTROLLER’ application system remotely sets up and runs the ‘SERVER Backup’ application and then remotely sets up and runs the ‘CLIENT Backup’ application to send data to the ‘SERVER Backup’. The ‘CONTROLLER’ will log and monitor the backups and shut down the SERVER and CLIENT Backups when the data has all been transferred to backup storage. Roger and his team have designed and tested the CLIENT and SERVER backup applications. For this they have adapted the rsync open source application which will take care of the efficient transfer of data for backup. Currently they can manually set the rsync based SERVER running and the rsync based CLIENT will successfully transfer data to the SERVER. However, while Roger and his team have worked out the secure virtual private networking (VPN) between CLIENT, SERVER and CONTROLLER, they are unsure as to how to design the central CONTROLLER application and organise the CLIENT and SERVER setup information on the CONTROLLER system. Roger has approached you and asked for your assistance. He has some idea about the process the CONTROLLER would use, but he is unsure how to design or model the new system. Roger has asked you to concentrate on designing and modelling the CONTROLLER system only. https://en.wikipedia.org/wiki/Rsync ATMC ICT310 System Analysis and Design Task 2 Page 4 of 12 Figure 1- YITSC Offsite Backup concept Roger stated that the typical CONTROLLER process would start by YITSC IT Team setting up and storing the business entity details. The business entity can be either the business client needing data backed up, or the supplier of data storage for the backed-up data. The backup task details for both the CLIENT and SERVER are entered and stored, and then the backup tasks are scheduled to run at a particular time and interval. The backup would be run according to the scheduled timing. The CLIENT will send data to the SERVER to be backed up. The CONTROLLER would receive a file transfer activity log and monitor that the backup was proceeding as normal. Roger would like the log activity to be stored in a log file for reference purposes, however whenever an error is logged he would like the CONTROLLER to notify him immediately by email. The final entry received in the log will notify the CONTROLLER when the backup is finished, at which point the CONTROLLER will first stop the CLIENT, then stop the SERVER and email a summary report to Roger. When a business client no longer requires the backup service Roger will remove the scheduled backup from the CONTROLLER and, after 6 months, will manually remove the client’s backed up data from SERVERs not owned by the client. At this stage Roger is only concerned with backing the data up. Although he would like to create a ‘restore data’ option on the CONTROLLER, he realises that this could be prone to error and decided not to include it in this project. ATMC ICT310 System Analysis and Design Task 2 Page 5 of 12 Business Processes: A JAD session with Roger revealed the following information. The business processes described below are the system requirements for modelling this information system solution: • Although there are many possible system entities, the core CONTROLLER system revolves around Business entities, computers that host SERVER and CLIENT backup applications and data (Data Host Controller Computers), backup tasks, and a task scheduler. • Business entities includes businesses wanting data backed up and businesses able to store the backed-up data. Roger would like Business Entity records to include contact name, business name, contact address, start date and business ABN • Data Host Controller Computers host the SERVER and CLIENT backup applications. They also have direct access to the data to be backed up (CLIENT Host computer) or the stored backed up data (SERVER Host computer). Your team has decided that data host controller computers will record a computer name, IP address, data version date and time, total data storage capacity, current storage size, data storage path, comments and a Boolean isCurrent attribute. • Each Business Entity must have one or more Data Host Controller Computers. Each Data Host Controller Computer must have one or more Business Entity objects. • Each Backup Task records a task name, task comment, and task type (‘server’ or ‘client’). These tasks are categorized as one of the following: o CLIENT Tasks – these tasks are the settings to send data to be backed up to a SERVER Task. Records kept include rsync dash option, rsync dash dash option, rsync module name, and Log file path. o SERVER Tasks – these tasks are the settings to receive data to be backed from the CLIENT Task. Records kept include server tcp port address, rsync module name, and Log file path. • Each SERVER Backup Task and each CLIENT Backup Task must have only one Business Entity Data Host Controller. This connects the Backup Tasks to the Business Entity and the Data Host Controller from which the Backup Task can access both the network Addresses and Business name. Each Business Entity Data Host Controller may have many SERVER Backup Tasks and CLIENT Backup Tasks. • Task Schedule records include a schedule name, status (in progress, scheduled, complete), start date and time and a latest finish date and time. • Each Task Schedule must have only two Backup Tasks – a CLIENT Task and a SERVER Task. Each Backup Task may have many Task Schedules. • The Task Schedule will match a CLIENT task with a SERVER task and schedules the tasks to run as a pair. End of Case Study ATMC ICT310 System Analysis and Design Task 2 Page 6 of 12 Part A – Essay Question 1: Essay Gabrielle is a business focused YITSC partner. Although Gabrielle understands project and event management from a business perspective, she has a limited understanding of IT projects. Gabrielle understands that competently managing the development of this backup CONTROLLER project will help ensure that the CONTROLLER service will work well as per the system requirement, will meet budget, and be developed and deployed in a timely fashion. However, her research on information system project management has confused her a little. She came across terms such as ‘Systems Development Life Cycle’ and ‘Agile’ and has asked you to explain how these relate to the CONTROLLER Project. The Systems Development Life Cycle (SDLC) defines six (6) core processes. a) Describe each of the: I. core processes (figure 10.5) in relation to the CONTROLLER project (15% marks) and II. core process activities (hints: Figures 11.5 and 11.12 as a start)
Answered Same DaySep 10, 2021ICT310University of the Sunshine Coast

Answer To: ICT310 System Analysis and Design Task 2 ATMC Semester 2, 2019 ATMC ICT310 System Analysis and...

Neha answered on Sep 30 2021
151 Votes
44346/~$Part b.docx
44346/Domain model class diagram.png
44346/Part b.docx
Event Table
        Event
        Event Type
        Trigger
        Source
        Activity/Use case
        System Response
        Destination
        Offsite backup
        External Event
        Backup at cloud
        Client
        Secure Offsite backup
        Backup of data at cloud
        cloud
        Send data
        External event
        Data for backup
        Client
        Transfer data to server
        Save data on server
        Server
        File transfer...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here