Consider a real world scenario of a university system. We are going to develop a security information system for employees so that there may be no chances of error or illegal access of an employee record or account. To complete this system we will divide this whole project in small assignment chunks (probably 4 to 5) and will try to cover every phase of the database development life cycle from scratch to implementation (SQL Queries). Scenario of the Security information system is given below.
The top management of the university wants to computerize the university employee’s records for security reason. The security information system will comprise of three sub applications.
- Fingerprint system (deployed through a biometric device)
- Online Employee Record Management (ERM) that will be a web based application deployed on a central server and access able through LAN
- Live Activity Monitoring System (LAMS) deployed through security camera (CCTVs) installed on various location in university premises.
Detail of each application is given below:
To achieve this task the management wants to fix an automated fingerprint identification system for employee’s attendance. This system automatically matches fingerprints against a database of known prints. Attendance system uses biometrics to guarantee the accuracy in reporting. Attendance system works by having an employee place their finger on a small scanner upon entering and exiting the office, the attendance record is stored in the database. This information can later be checked by the management to track the employee’s check in, checkout times and location as well.
To guarantee security, the employee’s are provided with a web account. Employees are provided with the user name and password so that no one can access his / her record. Using their account, employees can mark attendance, apply for leave, apply for loan, manage his/her bank account or see salary slip. Employee can also generate a new password by using the “Forgot your password?” link on the login page.
Live Activity Monitoring System (LAMS):
To better enhance the security system, management wants to install the security cameras to monitor the employee’s activities more closely, to keep an eye on precious assets and properties of the university. With the help of security cameras unauthorized and illegal activities are controlled. The security cameras capture images and record videos. These records are stored in the database. The management can view all the details about their employees at any time to monitor the productivity and job related skills of employees. Further than case use the information to ensure that he/she might not indulge in any immoral activities.
Note that all the three applications share a central database (as shown in figure-1), deployed on a dedicated database server.
This Assignment is starting phase and in this assignment you will focus only on the tasks given below:
Part1. You are required to identify all the processes in the system. (4 Marks)
Part2. Find out all the external entities interacting with the system. (4 Marks)
Part1. Create a Context level DFD (4 Marks)
Part2. Create Detailed DFD of the system (8 Marks)
Note: In Task-2 Part2 decompose the DFD up to level-1 i.e. after context draw level-0 and then further decompose up to level-1
Important things to consider:
- As happens in real world that everyone visualize a problem in different way so the solutions of all students should be according to their own thinking not taken from some source.
- As this is preliminary phase of our system so it is recommended that you identify as much processes and their relationships as you can (some of them may be eliminated in coming assignments).
Download here Assignment Solution CS403_Solution_assignment01_Spring_2013