Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

BMIS 530 Systems Analysis and Redesign Project: Phase 3 Assignment Instructions Overview Recall the three stages of the project: Phase 1: Introduction, problem statement, feasibility study, and...

1 answer below »

BMIS 530
Systems Analysis and Redesign Project: Phase 3
Assignment Instructions
Overview
Recall the three stages of the project:
Phase 1: Introduction, problem statement, feasibility study, and project plan
Phase 2: Methodology to compare the old and new systems and the systems analysis
Phase 3: Results of comparison of the old and new systems and the systems design
In Phase 3 you will use the methodology developed in Phase 2 to compare the old information system analysis and design to the new information system that is cloud-capable, highly available, scalable, and secure. You will use the scholarly supported computing framework and standards (e.g. ANSI, COBIT, ISO, ITU, NIST, HIPAA, PCI) to benchmark the systems analysis and design of the old and new system. Once you perform this comparison, you will detail the results.
Instructions
This report must contain the following elements:
I. See the grading ru
ic for all minimums.
II. Cover page
III. Table of Contents (TOC)
IV. Every section must be well supported with scholarly information systems journal articles.
V. Introduction and conclusion sections
a. Please update your previous introduction and conclusion sections as appropriate
. A succinct, high quality, and well supported introduction and conclusion should be written
c. It is necessary to highlight the objectives and conclusions of the project
d. Introduce the primary goals of this particular phase, the coinciding objectives, and the outcomes
e. The conclusion should be the last heading and conclude the cu
ent phase and state the upcoming objectives and deliverables in the next phase.
VI. Systems analysis and design results
a. Follows a well-supported methodology including at least one framework and appropriate standards from scholarly journal articles
. Uses objective standards accurately to benchmark the old system and the new system
c. Minimal comparison elements should include system:
i. Cloud/distributed computing capabilities
ii. High availability
iii. Scalability
iv. Security
v. Note, these are projected based upon the comparative benchmarked standards
d. A final updated financial analysis that projects associated costs of both systems once the final design is completed
e. Discuss the managerial implications of the results
f. Uses excel spreadsheets, graphs, figures, and tables to show the objective comparisons of the systems
VII. Systems design diagrams
a. A minimum of two diagrams (2) are necessary for each required type, one diagram represents the existing system and one diagram represents the new re-designed and improved system
. The following systems design diagrams are required that compare the old and new systems:
i. Entity relationship data model diagrams
ii. Class diagrams
iii. User interface forms
iv. Distributed computing network and system architecture diagrams
1. Design the complete information system architecture environment for the old and new environments
c. Screenshots are required for each diagram with a visible operating system date/time and unique desktop element showing that indicates it is your compute
i. No credit will be given for diagrams without screenshots
ii. Include the screenshots in appendices in the project report
d. Describe the systems analysis as you complete it in a na
ative form and link in each associated diagram referenced in the na
ative using an appendix
e. Each diagram will be assessed according to UML standards and a level of detail that excels beyond textbook examples
i. Note, textbook examples are simpler versions meant to learn and not as complex as industry diagrams often
ii. Our textbook is a graduate version of systems analysis and design. If you need more undergraduate textbook support we encourage you to use Safari e-books from the Liberty Li
ary. Our undergraduate textbook develops the more foundational SAD learning using the textbook:
1. Dennis, A., Wixom, B. H., & Tegarden, D XXXXXXXXXXSystems analysis & design: An object-oriented approach with UML (5th ed.). Hoboken, NJ: Wiley and Sons.
Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.
Page 2 of 2

School of , Liberty University
Author Note
I have no known conflict of interest to disclose.
Co
espondence concerning this article should be addressed to
Email:
Abstract
In this report we will discuss the organization which needs to have its system analyzed and redesigned. For this task I have selected the Relief International organization. It has offices in 16 different countries. The mission of the organization is to help the people who are living in fragile and vulnerable settings. This organization is known for helping the people by educating them on the word of the God and they help them to live in a righteous manner or we can say in an ethical manner. The ethics are very important in education because they can help the user to make system run very smoothly. this organization is still struggling to get all the necessary IT infrastructure in some of the countries so that it can provide adequate access of the applications to the company, especially since the paradigm shifted to work from home during the Covid 19 pandemic. The system analysis and redesign can be used to handle the service gap in some of the offices located in different countries.
        2
        1
Keywords: SD-WAN, MLPS, Ethics, Network, switch, router
Introduction
In this report we will discuss the organization which needs to have its system analyzed and redesigned. For this task I have selected the Relief International organization. It has offices in 16 different countries. The mission of the organization is to help the people who are living in fragile and vulnerable settings. In these fragile settings which are sometimes present in the remote areas, this organization is still struggling to get all the necessary IT infrastructure in some of the countries so that it can provide adequate access of the applications to the company, especially since the paradigm shifted to work from home during the Covid 19 pandemic. For example, in Iran some of the applications and document content tools are not accessible because of the sanctions. The system analysis and redesign can be used to handle the service gap in some of the offices located in different countries. With this report we will study about the methodology and the framework analysis we're implementing the solution. With this report we can easily understand the overall flow of the operations in the system and compare the old and new system on different aspects.
Literature Review
For this solution we are using software defined wide area network and it is known as the wide area network which uses software components for controlling the network operations. As per the definition there are some management software which utilizes the networking hardware in the same manner as done by the hypervisors and other components which are virtualizing the data center operations. It it is important to have a complete information and knowledge about the wide area network before understanding the working of software defined by data network. The wider network can be defined as the local area network which tries to be much more isolated so that it can confine themselves into the smaller networks in business offices or the homes. The wide area network is used to connect different smaller networks like the metro area network or local area network. With this connection we can allow the users and computers from one location to communicate with the users and computers present at different locations.
The software of the software defined wide and it work is able to control all the mechanics which can help the organization to manage all the different geographical pieces of the wide area network and it is done to improve the efficiency and performance of the system. There are some specific protocols which are implemented by the software defined wide area network and they are known for providing user intuitive interface and it also helps the wider network to handle overall network traffic. With the help of software defined wide area network we can easily support the gateways, firewalls, tools of the virtual private network and other features which can enhance the privacy, security and cyber resilience.
The software defined wide area network is known for offering the businesses and optimized experience of the application. This experience of the application includes different benefits like the more availability of critical applications in the organization, several hy
id active-active configuration and coupled with the predictable service. the software defined wide area network also allow the organization to have dynamic directing of the application traffic with the help of application aware routing and it provides the streamlined delivery and experience to the user.
The software defined wide area network is able to solve different types of the cross industry problems with the help of following capabilities for creating a new solution.
· The cloud based and central management controls allow the IT teams to set up configuration of the wider network across different locations and the virtual circuits. The software defined wide area network controller is also known for aggregating the data which includes e
or conditions and performance metrics which can be summarized in the format of reports, and they can be used for triggering alerts and sharing the trouble ticketing system.
· The end-to-end encryption can be achieved so that we can have boosted security with the help of Internet security protocol or some same encrypted tunnels which can create a automatic shield over the virtual private wide area network which is stretched across the public and shared networks.
· The multilink and multipath support along with the dynamic path selection can help to have bonding of multiple physical circuits into a single logical channel so that it can boost the aggregate reliability and the capacity.
· The local
eakout for the cloud services will allow direct routing and local inspection of all the traffic which is destined to the trusted cloud services. It is able to remove the requirement to stop all the traffic at the centralized location to perform the inspection and it will save the bandwidth utilization and also increase the usage of cheaper local direct Internet access. It does not compromise the cyber security.
Framework Analysis
In the initial stage of software defined by dahlia network there were some engineers who developed the flexible SD-WAN architecture son the basis of cloud management and the controllers. They also used the virtualized network function as routers. Their version of the network followed same architecture of the software defined as done by the digital network architecture of the Cisco which separate the data, management plans and the control to have maximum flexibility. This new architecture was created to make a natural extension of the intent-based networking vision of the Cisco.
Design Methodology
System Design Analysis
Use Case Diagram Old
Use Case Description
    Precondition
    The user needs to be a member of the system
    Post Condition
    The user can access all the operations
    Normal Flow
    The user should be a registered member of the system. Only the registered members will be able to log in with their verified credentials. The user will enter the username and password and system will verify whether they are authorized or not. If the
Answered 7 days After Feb 11, 2022

Solution

Neha answered on Feb 16 2022
97 Votes
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here