The System Architecture for Tonys Chips Company

Date:  2021-03-22 17:36:01
5 pages  (1261 words)
Back to categories
logo_disclaimer
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
logo_disclaimer
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Since Tonys Chips Company is a small company, it does not require a big, comprehensive and thorough Web Architecture; it just requires a simple one which will work efficiently with its present website. The management that has taken over has instructed the need for redundancy in the new system and as such, this will be deliberated upon and planned it. A built-in redundancy system will need more equipment which will have to be purchased; it will also require a new infrastructure to enable its effective running. As such, the Web Architecture will need to have two main web servers, two main database servers together with a duplicate server which will be installed to ensure that there is a support program and system redundancy to deal with the primary system has either broken down or closed down. It is also essential to establish connectivity with a telecommunications network or computer network that is able to extend over a large geographical distance. This will enable many clients to be able to access its website globally, not just locally. A computer system or network designed to block unauthorized access while permitting outward communication will be installed and this will protect the site from hackers. A DMZ (Demilitarized) A physical network or logical sub network that contains and exposes an organizations external facing services to a usually larger and untrusted network, usually the internet will be created. This will grant access to products information to the customers and enable them to make orders. The database servers together with the duplicate server, which are to be stationed behind networks, both hardwares and softwares, that are designed to stop any unauthorized access to or from private networks. The main purpose of this firewall is to protect the website and forestall or debar private users who want to access the database servers. It will also debar hackers from gaining unauthorized access to data and manipulating it for their own benefits.

All the systems software which are needed in the creation of the site is to stem from an open source web development platform (these have their source codes publicly available). The open source web is known as LAMP. This is an archetypal model of web service solution stacks and it contains four open source components. These are the Linux operating system, the PHP (Hypertext Preprocessor) programming language, MySQL relational database management system together with the Apache HTTP server.

MySQL is an open source relational database management system and are mostly used in the development of web applications. Linux is an open source operating system that is modeled on UNIX. PHP is an open source, server side; HTML embedded scripting language that is used in the creation of dynamic Web pages while Apache HTTP is web server software. Each of these elements is made freely available and may be redistributed and modified. Because they are free, they will cut on costs incurred in the implementation and installation of the system. Using the Windows Model for the same purpose will increase costs as it is not an open-source.

Other than cutting on costs, using a system that uses Linux provides better security features that those current present in the Windows Model. It is critical to ensure that migration of the site to an internally hosted site, from its previous external hosted site, will be conducted with little downtime advance groundwork. Before the migration is launched, the new servers must be fully operational and functioning and all set for access. There will be the application of pilot operations in the migration process, these make the transition to be without hitches and hindrances. All the relevant and essential data and information should be loaded into the new serves before the commencement of the migration process. The duplicate server should be working correctly and satisfactorily to guarantee the duplication of transactions from the former site that is hosted externally to the new current site which is hosted internally. A built in redundancy system must be incorporated in the Web Architecture to provide a suitable disaster recovery technique.

Another important aspect is to ensure these is backup for all the primary hardware. This will see to it that the database and web servers are easily accessible. Other than a backup for the database server and the web server, a duplicate server should be installed in the Web Architecture to ensure that the databases on every server are simulated and reproduced by the other. Proper planning and implementation will ensure that even when the primary servers break down, the customers will still be able to access the site, order for goods and products and make purchases online.

Evaluate alternatives to the company self-hosting the site.

There are several alternatives which the new management could use instead of self-hosting the website. The first one is hosting the site using an external server. This external server should have servers together with services already installed. The main disadvantage of this option is that it limits the level of control and power the company has in the administration of the site.

The second option is using a Web Hosting Company. These companies offer several options, either renting and lease holding whole servers which are online. The servers are stored in the site of the web hosting company rather than at Tonys Chips Company. The main advantage of this option is that it gives the management power over the servers and they don't have to store them. It also saves on maintenance costs as this is the responsibility of the Web hosting company. The second advantage is that downtime is lowered. Most of these Web Hosting Companies run 24/7, their security system is top-notch, they have highly qualified skilled security personnel, they provide an efficient infrastructure and will save Tonys Chips Company on costs they would incur in coming up with their own system.

Build a Gantt chart using Microsoft Project software, showing all tasks associated with implementing the Website.

Gantt chart

The Gantt chart above indicates that all the tasks carried out during the migration process, to a new internal hosted system from the current external host system, take place at the same time, running parallel. An example is that the installation of the web server can be taking place while the database server is being installed as well. However, the assumption here is that both servers are operating on two distinct machines.

The chart should include a minimum of five (5) tasks, each with three (3) sub-tasks

As can be seen from the chart, here are five tasks: Planning and Analysis, Physical Setup, Software Installation, Code Replication and Data Migration and each has three sub-tasks.

Explain and justify the system architecture you have selected.

The System Architecture that I have chosen will give primary web servers, database servers together with an additional server which acts as a backup web server. The system architecture will also have two firewalls and this will grant the clients access to the main web servers. These firewalls will also debar external users from having the ability to get to the web servers, the database servers together with the duplicate servers.

The above system will also allow for the internal hosting of the Website, provide options and abilities for backup, enable clients to make orders and purchase goods online, make the system more secure through the prohibition of any unauthorized entry into the database and duplicate servers and reduce downtime. The new management wanted a backup site where even in a shutdown, customers would still be able to access their services and site, and this has been catered for...

logo_essaylogo_essay

Request Removal

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal: