cse307 – artefact

Author: waqarali180

Post on 07-Apr-2018

225 views

Category:

Documents


0 download

Embed Size (px)

TRANSCRIPT

  • 8/6/2019 CSE307 ARTEFACT

    1/17

    HCI

    CSE307ARTEFACT

    Prepared By:

    Name: SHAHZAD IDREES

    Student ID: 109059820/1

    Date: April 2011

    Alpha Meridian College

    BScUniversity of Sunderland

  • 8/6/2019 CSE307 ARTEFACT

    2/17

    Table of Contents

    Table of Contents ............................................................................................................................ 0Introduction ..................................................................................................................................... 2

    Why JustRite? ........................................................................................................................... 2Project Scope ................................................................................................................................... 3Proposed Solution ............................................................................................................................ 4

    Solution Objectives ................................................................................................................... 4Main Features of System ................................................................................................................. 4Hardware Requirements .................................................................................................................. 5Software Requirements ................................................................................................................... 5Implementation Approach ............................................................................................................... 6Project Schedule .............................................................................................................................. 7Deliverables ..................................................................................................................................... 8Costs ................................................................................................................................................ 9

    Validity of Proposal .................................................................................................................. 9

    Payment Schedule and Terms ....................................................................................................... 10Appendix A: Resumes of Key Resources...................................................................................... 11Appendix B: CPM - Critical Path Method .................................................................................... 12Appendix B: Risk List ................................................................................................................... 15

  • 8/6/2019 CSE307 ARTEFACT

    3/17

    Page 2 of 17

    All right [email protected] JustRite

    Introduction

    Why JustRite?JustRite believes that it is uniquely positioned to provide the optimal services to Law Enforce

    Agency due to our vast experience as an IT Solutions Provider, our technical capabilities andknowledge base, methodology and processes, our strong positioning as a Microsoft GoldCertified Partner and we are also ISO certified.The value proposition of working with JustRite includes:

    Leveraging vast experience technology turnkey rollouts in diverse and complexenvironments

    Access to a large team of TK based consulting team for review of architecture, designand rollout related work items

    Extensive experience of application design and implementation in technologies likeMicrosoft Systems Management Server, Microsoft Operations Manager, MicrosoftIdentity Integration Server, Microsoft Rights Management Server, and Microsoft OfficeSharePoint Server and Microsoft Project Server, which are planned on the Law Enforce

    Agency infrastructure upgrade roadmap. This experience can be leveraged to align theinfrastructure with future needs

  • 8/6/2019 CSE307 ARTEFACT

    4/17

    Page 3 of 17

    All right [email protected] JustRite

    Project Scope

    Scope for this software project is to develop the system of Law Enforce department based on new

    technology that will be used for faster & efficient processing instead of manual system.

    The developed software project is totally based on the requirements of the end users, and will beused onwards for the better data manipulation than before. It will enhance the data reliability,

    security in a user-friendly graphical environment. In this way, the user would not be sick of using

    the software. It will enhance the work capability of the end user and the management will

    obviously like to use the software, as it is easy to uses.

  • 8/6/2019 CSE307 ARTEFACT

    5/17

    Page 4 of 17

    All right [email protected] JustRite

    Proposed Solution

    Solution Objectives The developed system will be user friendly, developed using the graphical user interface. The developed system will be efficient with respect to report generation and searching. The developed system will minimize the chance of data redundancy. The developed system will provide a reliable data manipulation, which will reduce the

    chance of mistake.

    The developed system will provide the improved mechanism for new entry system. The developed system will provide an easy and quick way to search and maintain

    records.

    The developed system will be capable of storing the address and contact numbers.. The developed system will be capable of report generation case progress

    Main Features of System

    This system will be designed by using Microsoft technologies having below features

    The new system is based on new technology. In the new system data security should be available in order to protect from unauthorized

    persons or accidental loss or destruction of data. Suggested system should contain error-free information that should ensure accurate

    record keeping.

    The new proposed system is totally based on graphics. In the new proposed system, the easy to use help is designed which is for the feasibility

    of the end user.

  • 8/6/2019 CSE307 ARTEFACT

    6/17

    Page 5 of 17

    All right [email protected] JustRite

    Hardware Requirements

    Following section presents hardware requirements to implement this solution. Costs areintentionally left blank on the assumption that is well positioned to procure thishardware at a competitive price using its direct procurement channel.

    Hardware RequirementsHardware Quantity Assumptions

    Database Server 1 Core I 7 FSB with 4 MB cache, RAM 4 GB 667 MHZ, Harddisk 500 GB

    Application Server 1 Core I 7 FSB with 4 MB cache, RAM 4 GB 667 MHZ, Harddisk 500 GB

    Software Requirements

    Following section presents software licensing requirements to implement this solution. Costs areintentionally left blank on the assumption that client is well positioned to procure these licenses ata competitive price using its direct procurement channel.

    Software Requirements

    SoftwareQuantity(License) Assumptions

    Microsoft SQAServer2008

    1 License Allocation:1 license per PC

    Microsoft VisualStudio2008

    1 License Allocation:1 license per PC

    Crystal Reports 1 License Allocation:1 license per PC

    Microsoft Operationsystem Windows 7

    2 License Allocation:2 license per PC

  • 8/6/2019 CSE307 ARTEFACT

    7/17

    Page 6 of 17

    All right [email protected] JustRite

    Implementation Approach

    JustRite will use the following phased approach towards designing, implementation and roll-outof up graded infrastructure at Law Enforcement Agency. We will use Waterfall modeldevelopment methodology for this project. Also have an independent Quality Assurance

    department which will inspect the software at all levels of development.1. Planning2. Identify System Requirements3. Design System4. Code the System Components and Test Them Individually5. Integration6. System Testing7. Deploy the System & Maintenance (if required)

    Planning

    Requirements

    Design

    Code & Test

    Integration

    SystemTesting

    Delivery &

    Maintenance

    Advantages of Waterfall model1. Most appropriate when requirements are completely, correctly, and consistently

    defined2. Customer receives system functionality all at once3. Fairly accurate cost and schedule estimates can be made when applied correctly4. Straightforward, simple to understand and use.5. Deliverables are frozen at the end of each phase and serves as the baseline for the

    following phases.

  • 8/6/2019 CSE307 ARTEFACT

    8/17

    Page 7 of 17

    All right [email protected] JustRite

    Project Schedule

    The project duration estimate is comprised of the following phase estimates:

    Project Phase Duration (Estimate)Planning 2 weeks

    Assessment Identify System Requirements 2 week

    Design System 1month

    Implementation 2-3 month

    Testing 1 month

    Total Project Duration 5 to 6 months

  • 8/6/2019 CSE307 ARTEFACT

    9/17

    Page 8 of 17

    All right [email protected] JustRite

    Deliverables

    JustRite team will generate the following deliverables on this project:

    Project Plan and schedules Project status updates Technical design document consisting(if required) Installation and configuration of in scope infrastructure components Test plan and test cases and test results (if required) Training of infrastructure support team Operations guide

  • 8/6/2019 CSE307 ARTEFACT

    10/17

    Page 9 of 17

    All right [email protected] JustRite

    Costs

    This section presents only project implementations costs related to consulting services offered byJustRite. Other costs including hardware and software related costs are not part of this section.These numbers represents best estimates based on the initial representation made to JustRite

    consultants by client personnel. It is suggested that a contingency budget of 15% to be considercovering the risk of project overruns.

    Services Cost

    Service Effort (man hrs) Cost

    Project management 100 300

    Assessment/Requirement gathering andanalysis

    100200

    Infrastructure Design 150 300

    Solution Implementation 400 500

    System Testing 100 300

    Training and Post Implementation Support 200 300

    Total Services Cost

    1900

    Services Cost: $

    Pricing Model: Fixed Cost

    Terms of Payment: All invoices to be paid using Net-7 payment terms.

    Validity of Proposal

    The Proposal is valid for thirty (30) days from the date imprinted below.

    __10-April-2011__

  • 8/6/2019 CSE307 ARTEFACT

    11/17

    Page 10 of 17

    All right [email protected] JustRite

    Payment Schedule and Terms

    JustRite will invoice based on successful completion of the various phases of the project as perthe following details:

    Phase Deliverable Payment

    Initiation a. Project team allocation 25%Assessment

    a. Existing infrastructure layoutb. Desired state layoutc. Roadmap of infrastructure upgrade 25%

    Designa. Technical design documentb. Test plan and test cases 20%

    Implementationa. Implementation of in scope infrastructure

    components in Productionb. Test results 20%

    Closinga. Operations guideb. Training of infrastructure support team 10%

  • 8/6/2019 CSE307 ARTEFACT

    12/17

    Appendix A: Resumes of Key Resources

  • 8/6/2019 CSE307 ARTEFACT

    13/17

    Page 12 of 17

    All right [email protected] JustRite

    Appendix B: CPM - Critical Path Method

    Name Task Predecessor Duration (Days)

    A Feasibility Study None 5

    B Cost Estimation None 3

    C Project Planning A,B 10

    D Requirement Gathering C 7

    E Write Use Case F 5

    F Analyze the requirement D 6

    G Design System E 15

    H Design Database F 5

    I Coding G,H 30

    J Unit Testing I 7

    K System Testing J 4

    L Deployment Installation K 2

  • 8/6/2019 CSE307 ARTEFACT

    14/17

    Page 13 of 17

    All right [email protected] JustRite

    START

    A B

    C

    G

    F

    E

    D

    H

    K

    J

    I

    L

    End

    5 3

    10

    7

    6

    15

    5 5

    30

    7

    4 2

  • 8/6/2019 CSE307 ARTEFACT

    15/17

    Page 14 of 17

    All right [email protected] JustRite

    Activity Duration ES EF LS LF TS FS

    A 5 0 5 0 5 0 0

    B 3 0 3 2 5 2 2

    C 10 5 15 5 15 0 0

    D 7 15 22 15 22 0 0

    E 6 22 28 22 28 0 0

    F 15 28 43 28 43 0 0

    G 5 43 48 43 48 0 0

    H 5 43 48 43 48 0 0

    I 30 48 78 48 78 0 0

    J 7 78 85 78 85 0 0

    K 4 85 89 85 89 0 0

    L 2 89 91 89 91 0 0

    There are two critical paths, which are as follows:

    1- A->C->D->E->F->G->I->J->K->L2- A->C->D->E->F->H->I->J->K->L

  • 8/6/2019 CSE307 ARTEFACT

    16/17

    Page 15 of 17

    All right [email protected] JustRite

    Appendix C: Risk List

    Risk ID Risks description Category Probability

    1 Scope of the project is not

    so clear.

    Project Risks 10%

    2 Ambiguous requirements Requirements Risks 30%

    3 There are requirements that

    are technically difficult to

    implement.

    Technical Risks 30%

    4 Larger no. of users than

    planned

    Business Risk 5%

    5 Problem in team member

    collaboration

    Staff size and

    experience

    20%

    The possibility of suffering harm or loss in terms of danger is called risk. We are excepting

    following threads and we are trying to prevent our system from the following threads. These

    threads are Virus attacking, Hacking, and electricity failure.

    Virus Attacking

    Virus is an important factor when we are talking about computerized system. Because

    management will use internet also. Many new viruses are introduces day by day.

    Preventing Technique:

  • 8/6/2019 CSE307 ARTEFACT

    17/17

    Page 16 of 17

    All right [email protected] JustRite

    We will maintain and install high level anti-software for preventing the system from viruses.

    Hacking:

    Our system is desktop so there is a little chance of data hacking.

    Preventing Technique:

    A user can not be login without user name and Password

    Data Crash

    It is possible that our data is crash in any reason so we have to be prepare ourselves for such

    situation.

    Preventing Technique:

    We can save them in such situation by creating back of data. Or in case if it is also be lost then

    use the recovery software for recovering the data.

    Electricity Failure:

    Being a Pakistani we know failure of electricity is not a big problem. So we have to ready for this

    kind of problem.

    Preventing Technique

    We can save by using the UPS.