Description of the stock control system
The stock control system would be of essential need for the enterprise and would enhance their logistics and purchasing department to understand the stock levels, stock re-order levels for ordering purpose. The three attributes which would be essentially possessed by the stock control system are as follows: 1. Maintainability: The stock control system is flexible to adopt itself to the changing demands of the customer and the services they are to deliver; it lays importance to the design so that it can be modified to get the job done. 2.
Efficiency: The stock control system should be more responsive, optimize processing time, better use of memory, maintain stock requirements and various caterings they are to provide, etc. 3. Usability: Software must have a user friendly interface and proper documentation. The look and feel of the software would make sure that all the depth functionalities are understood and analyzed for performing the operations. (Sommerville, 2005). b. IS Development Process with justification: This is one of the challenging tasks in the entire process.
The system to be built would require a definite process so that good engineering principals would make the system cover all the business functions and platforms. After thorough analysis of the
Need essay sample on "Description of the stock control system"? We will write a custom essay sample specifically for you for only $ 13.90/page
The process to be complied with would make sure that the requirements are fully captured and updated with time. The combination of spiral and Rapid Application Development (RAD) methodology would make sure that the process runs fast and effectively covers the business modalities. It would make the department’s envelope all the functionalities which would be available using the RAD technology (Pressman, 2003). The combination of the above two processes would make the software development feasible according to the complexities involved in the business.
The stages of compliance would be the following: • Systems planning and requirements gathering: This is the stage where the requirements which need to be represented in the system must be gathered with the help of interviews, JAD sessions, questionnaires and other formal and informal discussion with the business heads (Rajaraman, 2002). Onsite view and talking with the ground level employees would make the scenario deep and information could be best represented and utilised.
Enough planning would make the system greatly comply with feasibility studies, economic conditions and schedule maintenance. • Systems analysis and design: After all the requirements are gathered it must be placed in the right placeholder so that data in given a representation in the business scenario. The data must be analyzed keeping in mind the flow of the information in the context of business and among the departments. The exact track of data would make the system comply with the business processes.
The design of the software begins at this stage, where the data flow diagram is the first instance of the design. After the DFD is developed it is broken down to further micro modules so as to get a bird’s eye view of the entire processes. At this stage we compartmentalize the business functions into separate modules to get an inside of the workings of the process. • Systems implementation and maintenance: After the design is clear, the next process is the implementation phase where the entire system is put into action with the help of software tools and programming languages.
After the software is built it is tested for verification and validation where it is checked whether the requirements must be fulfilled. The system installation would be the next step where the fully tested system would be installed at the client side. c. IS Methodology with justification The methodology to be selected for MBL would be Object Oriented Development (OOD). It would clearly depict the entire business scenario and the integration of the various departments into the information system so that no information is missed and every requirement and penetration is captured.
The OOD concept depicts the entire design document into a real world entity and all the correct implications of the design would be enveloped in the same (Hoffer, 2002). It is the best suitable case for MBL as the complexity must be addressed with fine depiction of organisation and its association with several other parts. The Unified Modelling Language (UML) is primarily used to depict the nature of information flow and the relationship ratio between the two entities (Hoffer, 2002). 4. TASK 3 a. Network
Having appropriate network would make the software function across all departments so that information can be shared and effective networking would make the availability of the data at all times (Tanenbaum, 2003). The network technology would be quite similar to the client server and star topology blended into it. It would be a little expensive but would make sure that information always flows and all the network resources are utilised to its optimum level. The centralised database server would be responsible for storing the data managed by the network users.
It stands as a communication platform and interface for all the stakeholders of the system and all the departments are interconnected with it. The departments and interconnected with star topology so that the route of the data to be either forwarded or received by the user. The hub is an intelligent device that takes care of the forwarding of data for the nodes. (Forouzan, 2003) The security is provided through the use of login credentials for each department and thus provides an efficient way to access data belonging to the particular area of concern (Forouzan, 2003).
Figure 6: Network Diagram b. Use of Wireless The use of wireless would enable the organization to be less dependent on the physical damages of the wired network. The sales personnel would be provided with PDAs and cell phones which are linked with the organization firewall and the super computer to enhance the ability of the network and prove its strength. As they are required to travel frequently, they are most often concerned with various organizational data which they may fetch from the organization central server.
Their PDAs and capable of fetching information from server and managing the information. Wireless communications offer organizations and users many benefits such as portability, flexibility and lower installation costs. Wireless technologies cover a broad range of capabilities toward different uses and needs. Wireless local area network (WLAN) devices, for instance, allow users to move their laptops from place to place within their offices and homes without the need for wires and without losing network connectivity.
However, risks are natural in any wireless technology. The most significant source of risks in wireless networks is that the technology’s underlying communications medium such as the airwave, is open to intruders. Unauthorized users may gain access to network systems and information, corrupt the agency’s data, consume network bandwidth and launch attacks that prevent authorized users from accessing the network. Wired LANs use Ethernet cables and network adapters where it uses central devices like hubs, switches, or routers to accommodate more computers.
It is difficult and very expensive to installing Ethernet cables because cables must run under the floor or through walls. However, it is extremely reliable and only common failure is when there are loose cables. Wired LANs gives fast and superior performance by providing close to 100 mbps bandwidth, which is sufficient for file sharing, gaming, and high-speed Internet access. As for security, wired LAN hubs and switches do not have their own firewalls but external firewall software products can be installed. Whereas, wireless LANs uses three main Wi-Fi communication standards such as 802.
11b, 802. 11a and 802. 11q. 802. 11b was the first slandered used in wireless LANs and 802. 11a is a slandered used in business networks because it is faster. The 802. 11q slandered combines 802. 11b and 802. 11a making it an expensive home networking. Wireless adapters and access can be three or four times expensive compared to Ethernet cable adapters and the performance of the wireless depends on the slandered used as well as distance covered. Wireless LANs are less secure than wired LANs because the signals travel through air with many types of interceptions.
A wireless network seems to be a good option for the company due to the difficulty of cabling the company buildings. Since the system is implemented is an electricity company, security is more important issue compared to cost or other issues. Wireless is easier to install, more reliable and mobility is excellent where as wired is more difficult to install with limited mobility. c. Wireless Security An increasing number of government agencies, businesses, and home users are using wireless technologies in their environments.
There are many wireless security technologies that can be implemented for better security, for example, WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and VPN (VPN). d. Use of Bar Graphs It would enhance the product to be tracked using RFiD technology in case of shipping across geographical locations. It would standardize the use of products. 5. TASK 4 With the creation of the World Wide Web and web browsers the internet was transformed from a mere communication tool into a certifiably revolutionary technology.
There are many web browsers in the world. They are Mozilla firebox, opera, Internet explorer, fast browser and many more. a. E-commerce: E-business involves the use of electronic platforms for example intranets, extranets, and the Internet. To conduct a company’s business these things are needed. The Internet and other technologies now help companies carry on their business faster, more precisely and over a wider range. Countless companies have set up web sites to inform about and promote their products and services.
They have created intranets to help employees communicate with each other and access information found in the company’s computers. They have set up extranets with their major suppliers and distributors to assist information exchange, orders, transactions and payments. Companies such as Cisco, Microsoft, and oracle run almost entirely as e-business. In which memos, invoices, and engineering drawing by cad or cam, sales and marketing information virtually everything happens over the Internet instead of on paper. Figure 7: Internet Model for Payment
MBL can also use this e-business or e-commerce as their vital tool for communication. E-commerce is more specific than e-business. E-business includes all electronics based information exchanges within or between companies and customers. In contrast, e-commerce involves buying and selling processes supported by electronic means. Primarily the Internet, e-markets are market spaces rather than physical market places. Sellers use e-markets to offer their products and services online. Buyers use them to search for information identifies what they want and place orders using credit or other means of electronic payment.