More Subjects
Table of Contents
TOC \o "1-3" \h \z \u 1.Introduction PAGEREF _Toc11219603 \h 1
1.1.Definitions and Acronyms PAGEREF _Toc11219604 \h 1
1.1.1.Definitions PAGEREF _Toc11219605 \h 1
1.1.2.Acronyms PAGEREF _Toc11219606 \h 1
2.SDD Organization PAGEREF _Toc11219607 \h 1
2.1.Business Component Design PAGEREF _Toc11219608 \h 1
2.1.1.Business Purpose PAGEREF _Toc11219609 \h 3
2.1.2.Activities PAGEREF _Toc11219610 \h 3
2.1.3.Resources PAGEREF _Toc11219611 \h 3
2.1.4.Governance PAGEREF _Toc11219612 \h 3
2.1.5.Business Services PAGEREF _Toc11219613 \h 4
2.2.Front End Design PAGEREF _Toc11219614 \h 4
2.3.Process & Workflow Design PAGEREF _Toc11219615 \h 5
2.4.Database Design PAGEREF _Toc11219616 \h 7
2.5.Security and Connectivity in Design PAGEREF _Toc11219617 \h 9
3.Conclusion PAGEREF _Toc11219618 \h 19
4.References PAGEREF _Toc11219619 \h 19
Introduction
The purpose of this documentation is to compile a Software Design process for development of an automated Inventory Management System. When developing multi-layered and complex applications such as IMS, it is important to graphically represent and document its components an module for better understanding, precise testing, and accurate development without any confusions.
For the respective project, we are developing an automated web-based IMS.
Definitions and Acronyms
Definitions
Supply Chain: A supply chain is the network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product, from the delivery of source materials from the supplier to the manufacturer, through to its eventual delivery to the end user.
Inventory Management System: software system for tracking inventory levels, orders, sales and deliveries.
Acronyms
IMS: Inventory Management System
SDD Organization
Respective section will briefly represent various aspects and dimensions of the project being developed.
Business Component Design
In order to better design the application, it is important to understand its components individually and distinctly. Following is the component diagram of our proposed IMS.
The above diagram shows that the main and fundamental components of the system are:
Front-end Interface
Manager
Server Database
For each of the above components following are the brief descriptions and details about their functionalities.
Business Purpose
Front-end Interface: The purpose of this front-end interface is to allow user-system interaction and perform essential functions that include user identification, login and verification.
Manager: The purpose of this component is to control and manage the available resources, traffic on system, and various other functionalities.
Server Database: The purpose of server database is to store data regarding the users, inventory items, and processing orders.
Activities
Front-end Interface: The front – end interface performs the activities including login and verification of the clients/users.
Manager: Manager is responsible for organizing clients and functions of the system.
Server Database: The server database manages the data and information.
Resources
Front-end Interface: The front-end is an interactive interface that requires the human-user to interact with the system.
Manager: Human resource department is required for managing the system.
Server Database: Physical storage and management location for keeping and securing the servers are required. Other than this a sophisticated security system an management systems is also required including authenticated and skilled personnel.
Governance
Front-end Interface: The back-end manages the verification and login processes.
Manager: The management and administrative department governs this component.
Server Database: The server database is governed and control by the dedicated staff.
Business Services
Front-end Interface: offers verifications and authentication i.e. security to the clients.
Manager: Offers quality, precision and reliability to the users.
Server Database: Offers secure data storage, retrieval and management.
Front End Design
Following are the mock-up prototypes for the front-end interfaces of the applications.
User Registration
User Account Details
User Login
Process & Workflow Design
Database Design
We can utilize enterprise database in light of the fact that, enterprise database uses authentication by method for an official server, which give the recommended security to a business, individual database is acceptable when you are utilizing it for your own utilization or family unit use, and it is not that safe regarding the matter of maintaining a business. Enterprise database likewise gives multi-user capacity, with this we can without much of a stretch communicate with the home office and let them think about the equipment being shipped.
Also, in this case, A decision support system is based on managing operations and arranging levels of an association so it can decide. It will be a considerable measure of accommodating when we have to settle on decision on classification of the items being transferred and to enhance the efficiency of the system over all. Without squandering much time, we can undoubtedly settle on decisions and we can have a competitive advantage.
The proposed Database system will be developed with following objectives:
Allows real time updating of the data and information
Accessible for all authorized individuals all over the world with efficient data display in required interfaces
No hassle of managing several database that are difficult to sync without replication or errors.
Aims of the Web-Based system will be:
Global accessibility
Security
Centralized virtual data center
Real time responsiveness
Automation
Precision and accuracy.
Rationale
Respective system is the need of time. Companies can no longer wait for data or information to arrive before making their decisions or choices. Therefore, owing to globalization, a web based inventory system will enhance the responsiveness, efficiency, collaboration and accessibility of the company for their consumers.
Security and Connectivity in Design
For organizations that require employees to work from different areas, it is the key significance for the remote staff to have admittance to company information. In like manner, our company needs WAN, as it gives network office over a broad area and then again figuring out how to give network in the assigned area too. This method of telecommunication will permit the business to adequately contact any area and keep a constant communication between the employees. With our company being a consulting business, we need to verify that, the consultants are being recorded for what they are doing and how they are dealing with the errands they are given. Through WAN, we can without much of a stretch see and even assist the employees when they may need assistance in a certain errand given. This permits the business to employ individuals quiet, as it encourages the employees to work notwithstanding when home and don't have a craving for coming to the workplace, or have some other low maintenance work they need to oversee.
It is not compulsory for our business to have the wireless network also yet it does spare the cost of purchasing a computer and assigning it for each employee when the employee has a portable workstation and can without much of a stretch connect to the wireless. For the most part in these companies, wireless network is not gave; in light of the fact that this business is just situated up for the employees who work here and they can be effortlessly connected with a straightforward router that can deal with the network between the computers that will be given to them. In spite of the fact that, on the off chance that we need to make matters quiet, we can introduce all computers with implicit wireless cards and in the event that we need to hire another employee and he needs to work.
e-commerce Security System
System Security
Stepwise Security System
The wireless communication can be further secured through VPN. A VPN is a secure network that gives communication to the remote clients to connect with the authoritative network. VPN is exceptionally helpful in this business and in such manner that the employees can be more remote and work for the association also. It can even give simple connectivity through phones and is useful in this business for communicating with any customer, any place it is conceivable to. With VPN we can guarantee the customers and certification the privacy they need. Then again, in the event that we consider our business to be a little consulting company, which the company really is, we don't need of any VPN, in light of the fact that it is an excessive amount of hustle for a business, first to have a rented telephone line for different clients to dial in on and the call-trafficking equipment will be expected to handle the incoming calls, this will make additional cost for dealing with this, which our company may not have the capacity to afford.
A data center is an ability used to host computer systems and joined mechanical assembly like telecommunications and stockpiling systems. It ordinarily incorporates reinforcement power supplies, abundance data communication associations, environmental controls and wellbeing devices.
IT operations are critical highlight of most modern operations; among which, business coherence is mentionable which permits companies to maintain their business relying upon their information system (Al-Fares, Loukissas & Vahdat, 2008). Along these lines, it is certain to get all accessible information of company's business techniques to run its internal and outside operations appropriately. It is mandatory to give a dependable infrastructure regarding both security and perseverance for IT operations to decrease any possibility of aggravation. A data center in this manner must keep elevated requirements for foreseeing the dependability and usefulness of its facilitated computer environment (Al-Fares, Loukissas & Vahdat, 2008). This can be attained to through legitimate counseling with specialists.
Policy: Associations need to control their employees' entrance to information and this could be possible just when information is plainly ordered or arranged. Limiting access to the Internet and depending on disengaged mainframe computers to store essential information assets are a couple of measures that ought to be joined in an association's Data Center Security policy (Jensen et al. 2009). In the corporate sector, lamentably, a lion's share of the security ruptures go unreported, dreading loss of client certainty.
The practice of not reporting security breaks and Data Center-law violations is a noteworthy impediment to the advancement of law requirement organizations in combating Data Center-wrongdoing. Without further ado, no dependable data is accessible on the nature and degree of security breaks. Absence of plans, poor mindfulness and practically no training in Info security practices are the other similarly basic zones where associations need to contribute, regarding both cash and labor.
Technology: Iterative security arrangements comprising brilliant cards, firewalls, intrusion location devices, encryption calculations and biometric systems are commercially accessible today, but at an expense. While the best of firewalls can be dodged and encryption codes split by hackers, technology itself can't give the response to a dolt verification security system.
Logical Security
This is the fundamental Data Center-security war zone where advanced information is being traded or put away. Each security measure that is performed by a non-human device in the computerized world is an individual from this gathering. There are numerous sub-fields here (Al-Fares, Loukissas & Vahdat, 2008):
Encryption.
Network security.
System security.
Application security.
Security observing and auditing.
Organizational Security: Regardless of the fact that information is fixed behind the impact entryways there may be a risk that some person would open the entryway and let the assailant take it. That is the reason security systems are set up to ensure that in the event that other security measures fizzle individuals would comprehend what to do and by taking after methodology ensure the security of the information (Ryan & Bernard, 2000). All the time in upsetting circumstances with absence of aptitude individuals have a tendency to accomplish more missteps than any time in recent memory. Methods are there to help individuals make the best decision regardless of the possibility that they don't realize what to do these rules would demonstrate to them industry standards to keep the most exceedingly bad.
Conclusion
Respective document has presented a detailed design overview of the IMS that is beging developed with a centralized server database accessed by various geographic locations and from remote branches. The system ensures confidentiality, integrity and security.
References
Kindberg, T., & Barton, J. (2001). A Web-based nomadic computing system.Computer Networks, 35(4), 443-456.
Salvo, J. J., Mackenzie, P. D., Bennett, J. S., Relyea, H. A., & Thomas, A. M. I. (2002). U.S. Patent No. 6,341,271. Washington, DC: U.S. Patent and Trademark Office.
Al-Fares, M., Loukissas, A., & Vahdat, A. (2008). A scalable, commodity data center network architecture. ACM SIGCOMM Computer Communication Review, 38(4), 63-74.
Ryan, G. W., & Bernard, H. R. (2000). Data management and analysis methods.
Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009). On technical security issues in cloud computing. In Cloud Computing, 2009. CLOUD'09. IEEE International Conference on (pp. 109-116). IEEE.
More Subjects
Join our mailing list
© All Rights Reserved 2024