All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Website Migration Project, Term Paper Example

Pages: 11

Words: 2981

Term Paper

The core plan for constructing a website that can handle all of the expectations of Tony’s Chips and backup the company to convert all data over from the original location all starts with setting up a system development Life Cycle.

System Development Life Cycle

The System Development Life Cycle (SDLC) deals with information system development specifically as it relates to developing information system projects (“archives.gov,” 2012).  It is a standard strategic process that utilizes record management (RM) to track progress of information system development. As it relates to Tony’s Chips and the development of a back-up site, Tony’s Chips 2, an essential part of following the project through the SDLC process will be to track progress through the Systems Development Life Cycle Method as seen below.

Systems Development Life Cycle Method

(Archives.gov. ,2012)

Website Architecture

Establishing a backup website for Tony’s Chips is not an easy task as there have been massive developments in both web protocol as well as standards for business online. Garland and Shaw note that, “As the size of software systems increases, the algorithms and data structures of

the computation no longer constitute the major design problems.  When systems are constructed from many components, the organization of the overall system—the software architecture—presents a new set of design problems (Garland & Shaw, 1994).” They note that the complexity of designing multilayered sites with interconnected pages, the ability to stream content through RSS, or have content easily shareable through the use of social network tabs can get very messy if not handled correctly. Another aspect of website architecture that must be taken into careful consideration is the style of the site. The authors note that “An architectural style, then, defines a family of such systems in terms of a pattern of structural organization.  More specifically, an architectural style determines the vocabulary of components and connectors that can be used in

instances of that style, together with a set of  constraints  on how they can be combined (Garland & Shaw, 1994).” The fluidity of how each page functions in relations to each corresponding page, as well as how the visitor responds to these factors all boils down to the use of architectural style.

Disaster recovery Solutions

There are numerous approaches to reducing disaster through website architecture a Garland and Shaw note the method through which data is pipelined can largely effect how a site functions, especially in cases of cyber attack. They say, “Common specializations of this style include  pipelines, which restrict the topologies to linear sequences of filters; bounded pipes, which restrict the amount of data that can reside on a pipe; and typed pipes, which require that the data passed between two filters have a well-defined type. (Garland & Shaw, 1994). In addition to designing web infrastructure in a way that is most convenient for security, there are numerous computer forensic tools, like Scapel, or Foremost, that can assist a web developer in tracking errors that could potentially crash systems.

Operating System

Tony’s Chips needs to able to run well on knowledge application based file systems r Operating systems like Windows, DOS, OS/2, UNIX, and Macintosh based operating systems all have file systems. Knowledge application based file system incorporate the use of theories like Locard’s Exchange Principle, As noted by Carvey, “Locard´s Exchange Principle, an analysis concept that has been addressed and discussed in a number of resources.  Locard was a French scientist who discovered  that, “when two objects came into contact, material from each was transferred to the other (Carvey, 2011) .” With knowledge based application file systems, little work is necessary on the part of the user, but these file systems can also be more vulnerable to corruption. Tony’s Chips must be able to function on operatin systems like this because otherwise the system it is run on will be vulnerable to corruption. Carvey further notes that, “In short, any interaction between two entities (one being the computer operating system) results in the transfer or creation of data (Carvey, 2011).” This is basically the core design of the internet in that through interaction of knowledge based systems data is actually created. An example of this would be a visitor comes to Tony’s Chips and purchases chips, from that interaction a receipt is given to the visitor, and their purchase is documented.

Evaluate alternatives to the company self-hosting the site.What are the home hosting alternatives?

Static IPs

The current recognized tool for self hosting is to use a static IP. The user obtains a static IP address and then they buy a domain and have the url they select for the domain name mapped to the IP.  A static IP address is usually defined as a fixed address.  Standard internet Protocol network addressing is dynamic addressing (DHCP). Technical users prefer this method as opposed to spending money for a less efficient option. The prices for these forms of address, statis IP, range from $10 per month to about $15 per month depending on the provider.

Dynamic DNS

Dynamic DNS provide a solution where the domain name is maintained by constantly pointing to the IP address.  This allows the user to not have to invest in a static IP. Assoftware IP periodically updates the DNS map through the Dynamic DNS provider.  The only problem with using this method is that it tends to have time lags. The lags come from the fact that the IP changes or resets every time the user disconnects and then reconnects to the internet. Dynamic DNS servers update mapping  almost every minute, but time lags are still an issue. During these time lags, visitors will not be able to use the site.

Reverse Proxy

The way people get around the issue caused by Dynamic DNS is they incorporate a reverse Proxy. This connects a home based computer to the network but reverse the domain name back to a Reverse Proxy, which appears as an alternative IP address.

A common Reverse Proxy Variation is the use of the tool PurpleNova. Many people use PurpleNova, because they believe it offers a higher level of security.

Build a Gantt chart using Microsoft Project or equivalent software, showing all tasks associated with implementing the Website.

Gantt chart

Gantt chart 1

Gantt chart 2

Gantt chart 3

Gantt chart 4

Gantt chart 5

Gantt chart 6

The chart should include a minimum of five (5) tasks, each with three (3) sub-tasks.

The Critical Path is noted in red.

The Critical Path is noted in red.

Explain and justify the system architecture you have selected.

There are a wide range of system architecture styles to chose. For the purpose of Tony’s Chips, the main goal is to sell product. After reviewing the following system architecture patterns: All in One, Flat, Index, Hub and spoke, Strict Hierarchy, Multi-Dimensional Hierarchy and Search, I have come to the conclusion that the hub and spoke daisy model is the best choice for Tony’s Chips.

All in One: This is the easiest and most recognizable architectural style. All of the information is placed on one main site and the visitor can access it on their own without any real guidance. This method is gaining in popularity. The problem with this method is that is results in having very few extended pages for searchable results. This ultimately leads to having a lower ranking even with compelling content.

Flat: A flat design involves all pages being arranged like peers. This means every page is accessible from every other page on the site. This is probably the most common and simple and it’s what most visitors are accustomed to but it is best for sites, where there are just basic topics, such as Home, About Us, Contact Us, and Products. It’s also recognized as may also ‘monocline grouping.’ The reason why this method would not suite Tony’s Chips is because it lacks creativity and the ability for expansive exposure. In addition to being able to promote cutting edge content, or simply viral video ads promoting the product, Tony’s can host a forum using a more accommodating style.

Index: An index structure is very similar to the flat structure in that it just lists content. It is not very appealing to the eye, and for the purpose of enticing a consumer to purchase products off the site, it might not be the best choice. Sometimes, indexing data onto a site can make the information easier to find. The visitor does not have to sort through content just to get to one specific bit of information. Examples of this architectural style can be found by visiting online dictionaries, phone books, and other sites that benefit from posting giant indexes.

Hub-and-spoke (daisy) pattern: The prime example of this style would be an e-mail account. The Hub-and-spoke model allows users to work through a distinct linear workflow routine, where they sort through pages of content but eventually find their way back to the original source. This is the architectural structure I will be utilizing for Tony’s Chips as it has a wide range of uses outside of just is standard structure. This is the best model for Tony’s Chips because it takes advantage of not being confined by opening the site up to the ability to lead visitors to multiple types of content while keeping the product always in their mind’s eye. When certain data is

Strict hierarchy:  Is a website architectural structure that only allows visitors to access pages that are connected t a parent location. This is confining method and is not worth deeper analysis other than noting Tony’s Chips currently uses this method.  This method requires deep consideration of user’s goals. The key example of strict hierarchy is that of a forum. In this case, Tony Chips would be incorporating one for the purposes of being able to build endless back-links, and enhance search ability.

Multi-dimensional hierarchy: A multi-dimensional hierarchy has one parent page with multiple extensions that track back. A prime example of this would be Amazon. There is one main Amazon hoe, but for the most part visitors browse books and find themselves clicking from one book to another without very really tracking back to the home page. When a visitor wishes to checkout they click on the product they are viewing and purchase it.

Search: Is a form of architectural structure in that it’s a built in tool that allows users to access large amounts of indexed content without having to sort through tabs, or designated pages.  Tony’s Chips is not a search engine, so this style can not apply.

Illustrate the system architecture using Visio or equivalent software.

Below you see the Hub and spoke Daisy model of website architecture. The benefit of using a structure like this is that the home page is a beacon for information but there are still layers to the site where visitors are not strictly confined while trolling pages.

system architecture using Visio

 Use Case

In this use case, a visitor comes to the Tony’s Chips home page and is essentially directed to a product. No matter what page the visitor loads while visiting the site he will be directed to a product, or sales copy, which will direct to a product. Every page essentially promotes the Tony’s Chips company culture. The goal of the website is to turn the visitor into a customer. This process needs to be as simple as possible, because lack of simplicity could complicate the sale. The main pattern of the use case is as follows, Visitor comes to Tony’s Chips website and views sales copy, clicks a link that leads them to a product, clicks a link confirming they want to buy the product, performs a secure transaction and checks out. Once the visitor is transitioned to being a customer, they are then redirected back to a product page of a similar product they might enjoy.

The use case should include a graphical representation using Visio or equivalent software and a text description of the events.

text description of the events

Discuss the support operations that the internally hosted Website will require after implementation.

The advantage of internally hosting a website is that the user is given more oversight and control over the functionality of the site. The problem is there can be many security threats and the upfront cost of purchasing servers and other equipment, as well as employing an IT department to support the network.  For enhanced security requiring virtual iD or secured payments through systems like VeriSign could be beneficial to the visitor and the service provider.  The cost of employing an IT department specifically for the purpose of building and managing an internal hosting network, could result in added benefits, when the site starts to bring in profits, but initially this will be a costly endeavor and it will require added security to maintain.  The use of VirtualiD it ensure customers are secure, or that staff members managing site material are held accountable is also a smart idea. Virtual iD is a tool designed to secure access to personal information, but to also verify identity online.  Users can manage their personal information on a virtual  Personal information is only mentioned once and from that initial registration, a unique Virtual iD code is generated. Once this number is generated, the user simply uses their Virtual iD to any participating service provider and once authorized by yourself the service provider can access all your information.

Explain how you will evaluate the performance of the new site and the success of your project.
There are a wide range of analytical systems that can be incorporated to monitor the success of the sales as well as the site’s. Google Analytics is the most common tool used . The tool measures performance by assessing bounce rates, which tell a the person in charge of monitoring traffic  All web masters, bloggers, and business owners looking to get the word out about the content all have the same question. How to you draw traffic? The problem is they are overwhelmed with solutions. Google, SEO, SEM, website optimization, or viral marketing and an endless array of advertisements pop up.

Focus on Content

Interesting sites draw attention, keep attention, and increase the desire for individuals to consume their new content. When a blogger comes across your content and likes it, they are more likely to stream the information to their blog with a back-link leading to your site, or reference you as the creator of the content and build interest in your brand. Incorporating key words is an essential part of creating content as well. Being selective with word use has its advantages to distinguishing your content from that of similar sites, but more importantly, the use of key words to optimize your sites potential to get ranked high by search engines is an invaluable tool when optimizing traffic. Google AdWords provides a key word tool that can assist SEO managers in enhancing the search ability of the sites, but also to see how their sites stack up against the comeptiton in their market.

Optimize Image Use

There is much more to using images to boost the appeal of a website than just adding it as a part of a particular post or article. Using the exact image necessary to convey the meaning of the content, or an image that is easily identifiable with a particular topic can be complicated at times. It is also worth it because it  heightens the search ability of a site. Often images can’t be displayed in the size or resolution they are obtained. Utilize the ‘alt” attribute to specify alte

Build In-bound Links

Enhancing the share-ability of a site, through incorporating a tag for people to subscribe to your RSS Feed, having a Twitter, or Facebook tab. Having a tab for social networks where people can seamlessly share site content with their friends without ever leaving their page is smart and fast way to have people link-back.

Monitoring these efforts

Google analytics and other analytic tools allow web masters, and business owners to monitor their site optimization efforts with e-commerce charts that reveal detailed conversion rates, as well as unique traffic charts that tell how long visitors stay on a website. There are also numerous system security providers that offer website audit reports so system managers can see how many broken links a site might be producing. Ultimately, the only real measure of the site’s performance will be its online sale servers those that come from brick and mortar locations.

Work Cited

archives.gov. (2012, January 03). Retrieved from http://www.archives.gov/records-mgmt/initiatives/sdlc-checklist.pdf

Carvey, H. (2011). Windows forensic analysis dvd toolkit. Syngress.

Garland, D., & Shaw, M. (1994). An Introduction to Software Architecure.  Advances in Software Engineering.  Retrieved from http://www.cs.cmu.edu/afs/cs/project/vit/ftp/pdf/intro_softarch.pdf

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Term Paper Samples & Examples

5 Ways Intersectionality Affects Diversity and Inclusion at Work, Term Paper Example

I have always been interested in politics and how the government functions as a young man. I now have a plethora of information and understanding [...]

Pages: 5

Words: 1355

Term Paper

Combating Climate Change Successfully Through COP26 Glasgow 2021, Term Paper Example

The 26th conference of the parties COP26 held in Glasgow in 2021 was a significant moment in global politics to pursue the participation of various [...]

Pages: 9

Words: 2580

Term Paper

Telehealth, Term Paper Example

Telehealth technology has been increasingly used as a means of providing healthcare services to patients, especially during the COVID-19 pandemic. The use of telehealth technology [...]

Pages: 3

Words: 848

Term Paper

Impact of Spanish, Mexican, and Anglo Social Ordering on Mexican-American Culture in California, Term Paper Example

Since California has been ruled by the Spanish, the Mexicans, and the English, the culture of Mexican Americans in the state has evolved at various [...]

Pages: 7

Words: 1809

Term Paper

Empowerment and Social Change, Term Paper Example

The films Calendar Girls (2022) and Raise the Bar (2021) explore empowerment and social change themes. Both films revolve around female protagonists who challenge stereotypes [...]

Pages: 2

Words: 642

Term Paper

Directed Energy Ethics, Term Paper Example

Introduction The use of directed energy weapons is controversial, with many arguing for and against them. Directed energy weapons are a type of weapon that [...]

Pages: 18

Words: 4973

Term Paper

5 Ways Intersectionality Affects Diversity and Inclusion at Work, Term Paper Example

I have always been interested in politics and how the government functions as a young man. I now have a plethora of information and understanding [...]

Pages: 5

Words: 1355

Term Paper

Combating Climate Change Successfully Through COP26 Glasgow 2021, Term Paper Example

The 26th conference of the parties COP26 held in Glasgow in 2021 was a significant moment in global politics to pursue the participation of various [...]

Pages: 9

Words: 2580

Term Paper

Telehealth, Term Paper Example

Telehealth technology has been increasingly used as a means of providing healthcare services to patients, especially during the COVID-19 pandemic. The use of telehealth technology [...]

Pages: 3

Words: 848

Term Paper

Impact of Spanish, Mexican, and Anglo Social Ordering on Mexican-American Culture in California, Term Paper Example

Since California has been ruled by the Spanish, the Mexicans, and the English, the culture of Mexican Americans in the state has evolved at various [...]

Pages: 7

Words: 1809

Term Paper

Empowerment and Social Change, Term Paper Example

The films Calendar Girls (2022) and Raise the Bar (2021) explore empowerment and social change themes. Both films revolve around female protagonists who challenge stereotypes [...]

Pages: 2

Words: 642

Term Paper

Directed Energy Ethics, Term Paper Example

Introduction The use of directed energy weapons is controversial, with many arguing for and against them. Directed energy weapons are a type of weapon that [...]

Pages: 18

Words: 4973

Term Paper