Architectural features of designing and developing web applications.


I decided to change this and wrote an article-translation-review about one of the reports from the NoSQL conference held on October 5 in New York. This article will talk about the Riak system, with which I had the good fortune to work lately.

What is Riak? Many buzzwords that are popular now can be attributed to Riak. Riak is a document-oriented database. Riak is a decentralized key-value data store, with support for standard operations - get, put and delete. Riak is a distributed, scalable, fault-tolerant storage solution. Riak is also an open source system that supports hits using HTTP, JSON, and REST. And of course RIAK is NoSQL.

If you dig deeper, you can see that Riak was heavily influenced by Amazon Dynamo, the CAP theorem ( C onsistency, A vailability and P artition Tolerance) by Eric Brewer, the Internet system itself as a whole, as well as the experience of the Basho development team in the development of network environments. We started developing Riak in the fall of 2007, for use in two Basho applications that were running on Riak and running on it most of the time.

To understand why Riak is so powerful, some theory is required. First, let's talk about Amazon Dynamo. In the document describing Amazon Dynamo, there are three terms to describe the behavior of a distributed storage system: N, R and W. N is the number of replicas of each value in storage. R is the amount of replica data to perform a read operation. W— the number of replicas required to complete the write operation. Riak's goal is to transfer N, R, and W into the application logic. This allows Riak to adapt to the requirements of individual applications.

N for each segment ( bucket). For example, all objects in the "artist" segment will have the same value N, while objects in the "album" segment are completely different. The system uses a consistent hashing algorithm to select the save location N the number of replicas of your data. When a request comes in, Riak uses hashing to convert the text key into a 160-bit number. When a cluster node is added to Riak, it receives parts from a 160-bit keyspace. The node has the closest hash value from the key (160-bit number) and contains the first replica. The remaining N replicas are stored on nodes with other N-1 parts of a 160-bit keyspace. Consistent caching algorithm very important- it allows each Riak node to fulfill any request. Because any node can figure out exactly which other nodes it needs to contact in order to fulfill a request, any node can act as an organizer for any client. There is no control server, No unified point of failure in the system.

Riak uses different meanings R for each request. Each time you make a request for data, you can use a different value R. Meaning R specifies the number of nodes that need to return a successful response before Riak returns a response to the requesting client. Riak tries to read all possible replicas ( N), but when the value is reached R, the data will be sent back to the client.

Riak uses different meanings W for each request. Meaning W specifies the number of nodes that need to return a successful response before Riak returns a response to the requesting client. Riak tries to record all possible lines ( N) data, but when the value is reached W, the result will be sent back to the client.

Allowing the Client to Specify Values R and W at query time means that at query time, the application can specify exactly how many nodes are likely to fail. It's very simple: for each request, N-R(for reading) or N-W(writable) nodes may not be available, but the cluster and data will still be fully accessible.

So, in the example we used with N=3 and R=W=2, we can have 3-2=1 the node is unreachable in the cluster, but the cluster will still provide data. For sensitive data, we can increase the value N to 10, and if we still use the value R or W equal to 2, we can have 8 unavailable nodes in the cluster, but read and write requests will succeed. Riak makes it possible to change values N/R/W as it is a good way to improve application behavior when used C.A.P. theorems.

If you are familiar with Eric Brewer's CAP theorem, you know that there are three aspects to consider when reasoning about data storage: data integrity, data availability in storage, and partition tolerance. If you are familiar with the study, you also know that it is impossible to implement a system that meets all three conditions.

Since you cannot implement all three conditions, most storage systems use two. Riak allows, not only choose any of them, but different applications may choose different amounts of each. Most likely you will choose accessibility and partition tolerance. However, you are developing applications that run on real machines and you want them to be available to users at any time. The Riak framework is implemented to support this feature (we want our applications to run all the time). This means that you are willing to sacrifice data integrity. There is a lot of advice on how you can ensure data integrity (eg read-your-writes) in the Amazon Dynamo document, and I encourage you to re-read that document.

Here is a simple example of how data integrity issues can be resolved. Let's look at a cluster that is already running and has a version 0 document.

Suddenly, the network fails. Nodes 0 and 2 are in New York, nodes 1 and 3 are in Los Angeles, and the transcontinental link is broken. How will each part of the cluster behave? If you set the values N/R/W properly, both parts of the cluster will essentially provide version 0 of the document as before. Clients will not be aware of the failure. Now suppose that the client has made changes to a document stored in the New York half of the cluster (you specified N/R/W so that it is allowed?). This client introduced some inconsistency. Now clients joining the New York part of the cluster will get version 1 of the document, while clients joining the Los Angeles part will get version 0 of the document. Now suppose that the transcontinental connection is restored and both halves of the cluster work together. What should Riak do with two different versions of a document?

In this case Riak uses time vector algorithm, to determine which version of the document is more correct. The time vector algorithm is a special implementation of the Lamport clocks / Lamport timestamps algorithm. Unlike conventional timestamps, Lamport's timestamping system is constructed in such a way that lineage and succession can be determined by simple comparison. Each time data is saved to Riak, its time vector is incremented, and when the cluster recovers, Riak will be able to determine what data to save. In our case, Riak will determine that version 1 is the receiver of version 0, and version 0 will be replaced by version 1, and the data will again be consistent.

Things get a little more interesting if, while the parts are unrelated, clients make changes to both parts of the cluster. Now when the cluster is restored, the time vector will show that neither version is the successor of the other version. Riak cannot determine which version should be selected, so in this case, as with the ability to change the N/R/W values, Riak moves the conflict resolution capability to the application. Instead of implementing an arbitrary version selection rule, as is done in other systems, Riak returns both values allowing the application to choose the correct option. Of course, if you want to use just the rule - data arrived last and is used, Riak has a simple flag to enable this behavior (allow_mult segment property)

After all this theory, how about a few code examples to demonstrate how easy it is to work with Riak?

Since Riak is written in Erlang, let's start with Erlang.

The first line of code describes our client joining the Riak cluster. The second line creates a new object (document, key/value pair). The third line saves the object to Riak. The fourth returns the object back from Riak. the last two lines change the value of our object and save it back to the Riak cluster.

If you don't want to use Erlang, Riak also comes with libraries for Python...


…Riak also has libraries for Ruby…


…Java…

…PHP…


…JavaScript…


… but in fact all these libraries work with Riak using standard RESTful HTTP, and this allows you to use Riak on any system that supports HTTP- for example, using command line tools such as curl or wget.


This is fine when you need to send or receive data from Riak, but what about when you want to query multiple objects at the same time? It's NoSQL, right? How about a little Map/Reduce?


The Map/Reduce Riak system has a lot in common with other Map/Reduce systems. The Map function occurs on the node where the data is located, increasing the locality of the data at the same time as the distribution of computations in the cluster. The part of Riak's Map/Reduce that differs most from the other solutions is that Riak doesn't run the Map method on all the data in the bucket. Instead, Riak allows the client to provide a list of object keys on which the Map method should be run. The Map methods may provide more keys for later phases of the Map methods' execution, but the list of keys for the Map method must always be defined. Of course, you can specify any number of keys you want, for example if you want to execute the Map method on all the values ​​in the segment, it is enough to include them all in the Map/Reduce query (the functions list_keys or list_bucket can be useful in such cases).

Differences in the implementation of Map/Reduce Riak when compared to other systems are due to a strong desire for support links in Riak. The first question when moving out of the RDBMS world is, "How can I link my data?" It was decided that the best answer to this question is links.


For example, if you want to organize links between an artist entry and multiple album entries, you want to create links to albums in an artist entry. Similarly, you can create links in an album entry to the song entries included in that album. Once you add references and define how Riak can get those references from your objects, you will have access to the new Map/Reduce syntax. For example, in this example, you can see a simple syntax that allows us to say - "Start with the artist REM, then follow all the albums that the artist is associated with, then follow all the songs that the album is associated with, then extract the names of these songs." The result of this query will be the names of all REM songs that have ever been released.

The developers decided that link-walking (following links) is so useful that they even implemented a URL syntax for it. At the top you can see a link that looks like a URL, and making a GET request to that URL will return you the list of all composition objects that we got earlier in the Map/Reduce example.

Much more can be said about Riak, including how to create pluggable backends, how to use the event system, how to monitor the status of Riak clusters, and how to implement cross-cluster replication. But that will have to wait until another presentation.

If you are interested in learning more, you can visit the website

A web-oriented system is a client-server application in which the client part is implemented by a browser that communicates with the user and displays information, and the server part is a web server and an application server that implement the main logic of the system. Due to the limited functionality of the client, such an implementation of the system is often also called a thin client.

Article about user training plans for EDMS will help you avoid mistakes in your work.

The undoubted advantages of a web-based system are the following facts:

  1. Cross-platform. The client, as noted above, is a web browser, which means that to work with the system you only need an Internet browser, which is part of any operating system. Updating and maintaining the browser lies with its developer.

Considering that browsers are currently independent of the specific operating system of the user, web-based systems can be safely called cross-platform (or cross-platform).

  1. Mobility. You can work with the system from any place where there is Internet and from any device that has an Internet browser. Thus, the user (client) is not limited by hardware requirements.

You can work in the office, at home, and on a business trip, both from a stationary PC and from a laptop or tablet.

  1. Low total cost of ownership. The cost of owning a web-based system is actually in the development, support and development of the back-end (web server and application server) and ownership of the database server of the system.

The cost of a database management system depends on the choice of web application development technology: using an open, fully cross-platform or specific platform for creating web applications, for example, Microsoft ASP.NET, which in turn may impose requirements on a DBMS, but at the same time, also has a number of advantages.

Like any other, web-based systems at the same time have their drawbacks:

  1. An Internet connection is required to work with the system.

It should be noted that, despite the development of Internet technologies and the possibility of "exit" to the Internet using cellular communications, in many regions of Russia, the cost of traffic and the width of the data transmission channel leave much to be desired. Thus, the actual mobility may differ significantly from the declared one for reasons beyond the control of the user.

2. Not all EDMS can be replaced by web-based ones due to limited functionality internet browsers.

If we are talking about simple work with documents, then there are no difficulties, but, for example, work with specific documentation or the need to display three-dimensional models can impose restrictions on the use of a thin client.

3. All information, including the user's personal information, is stored on the server.

This fact imposes serious requirements for the protection of information on the server and the protection of data transmission channels. Not every client is ready to transfer corporate and personal information over the Internet.

Which system to prefer depends on the needs and requirements of a particular organization. But it is worth noting that the market for web-based systems has recently been rapidly developing due to the popularity of such aspects as mobility and platform independence. And this means that there is continuous work on improving web-oriented systems and eliminating their shortcomings.

INTRODUCTION
At present, it is impossible to imagine a company that would not have a purchasing department in one form or another. It can be either a division with a large number of employees, its own regulations, as well as a strategy, as well as additional functionality that lies on the shoulders of specialists of a different profile. Whatever structure the holding has, this process must go through a certain number of stages, regardless of the volume of goods or services purchased, the specifics of the industry, payment terms, and delivery. These stages are formed under the influence of regulatory legal acts issued by the state, as well as the established image of the separation of power, as well as the transfer of authority in the practice of doing business. The task of this graduation project is the process of developing an information system that allows you to structure incoming information, also send it along a well-established route in order to complete, also correctly conduct the procurement cycle from the inception of a request to the formation of an archival card containing all the details of the transaction, as well as the history agreements within the company. The importance of this information cannot be overestimated in internal as well as external audits, inspections by tax authorities, post-delivery problems, and repeat purchases.
In this thesis considers the automation of the procurement process in the field of high-tech technical equipment, software, as well as accompanying services. The chosen area, undoubtedly, will bring its special specifics to the developed system of procurement automation.
The purpose of the graduation project is to create an automated information system for managing procurement activities in the field of information technology, which includes user, network, server hardware, as well as services related to them, as well as work, as well as software. The developed system allows you to start an application for a requirement, send it for examination to technical departments, pass in advance given route approvals that meets the company's internal regulations, issue, and also track the current status of the requirement, namely: a request for a budget estimate, selection of a supplier, stages of delivery, transfer to a warehouse, reflection of the requirement card in the archive.
The objectives of the graduation project are: 1. Designing a database model; 2. Building a complex of site management automation;
3. Implementation of the work of the fundamental software modules of the system;
4. Improving the efficiency of site administration; 5. Determining the main cost items for system design, as well as identifying the working conditions of a person in office space; 6. Regulation of the duration of work, as well as rest during direct work with computers, as well as software solutions.
The information system developed within the framework of the diploma is created on the basis of the internal regulations for the procurement activities of the Closed Joint-Stock Company Investment Holding FINAM for 2014.
IH "FINAM" has one of the frequently encountered principles of the organizational structure - the functional principle of formation, where the main governing body is the Board.

After studying the solutions for automation of procurement activities existing on the market, it was concluded that the cost of their acquisition and maintenance is high, the complexity of integration into the company's information systems, the presence of excessive functionality, and the lack of ease of convenience in agreeing on purchase requests, which is one of the most important functions for large organization.
methods used, as well as design tools, as well as developments, the results of a survey of the subject area should be given:
PART I. STATEMENT OF OBJECTIVES
1.1. Information systems theory
In accordance with the international standard ISO/IEC 2382-1 for information reliability, developed jointly by the International Organization for Standardization, also by the International Electrotechnical Commission, the term "Information System" is defined as: "an information processing system that works in conjunction with organizational resources, such as people, facilities, and financial resources that provide, also distribute information." In accordance with Russian GOST RV 51987, an information system is defined as an automated system, "the result of which is the presentation of output information for subsequent use."
It is believed that within the holding there should be a unified corporate information system that satisfies all the information needs of employees. In practice, companies usually operate several different information systems that solve separate groups of tasks: management, reliability, financial and economic activities, and the like. Some of the tasks are solved with the help of simultaneous use several information systems, some tasks are not automated. This use of information solutions has been called “patchwork automation”, and is also quite common for many enterprises.
CLASSIFICATION OF INFORMATION SYSTEMS
Information systems can be classified according to the degree of automation of incoming processed information, as well as by scope.
Information Systems
Classification according to the degree of automation of processed information Classification by scope
Manual - characterized by the fact that all ongoing data processing operations are to be performed by a person. Decision support systems. Designed to automate the activities of science workers, a thorough analysis of the syntactic information for managing experiments.
Automated - are characterized by the fact that some of the control functions and data processing are subject to automatic control, and part of the person. Design automation systems. Designed to automate the activities of design engineers, as well as developers.
Automatic - are characterized by the fact that all available control functions, as well as processing of input data, are implemented by technical means without human intervention. Organizational management systems. Designed for full automation of the functions of managerial personnel.
Control systems technical processes. Designed to optimize a variety of technological processes.
STRUCTURE, also COMPOSITION OF INFORMATION SYSTEMS
The following processes are carried out in information systems:
collection of necessary information;
storage of collected information;
processing of available information;
issuance of the requested information.
These processes are carried out various components information system. Automated means are possible, but most often the collection and delivery of information occurs using a user interface with human participation. The user interface is nothing more than a certain set of elements, also program components, which is capable of influencing the user's interaction with information software. The process of storing existing information is nothing more than long-term storage of data on various media, but also in the form of data arrays with a specific structure. In modern practice, databases are most often used to store information. The databases of a computing system can be defined as a logical collection of interrelated data used by users, also stored with controlled redundancy. Stored data is independent of user programs, a common control method is applied to modify the implementation of the adjustment process. Information processing consists in obtaining some "information objects" from other "information objects" by implementing some algorithms; it is also one of the defining operations performed on stored information.
The main existing procedures for processing the available information are:
Creation of new data;
Modification of the created data;
ensuring data integrity;
search for the necessary information;
making decisions;
creation of the required reports, as well as documents.
Therefore, an information system most often consists of three components:
user interface;
database;
software tools for processing available data.
All the types of information systems discussed above, regardless of their scope, contain one, also the same set of necessary components. The decomposition of the information system is as follows:
Information system
Functional Components Data Processing System Components Organizational Components
Functional subsystems Information support New organizational structures forms
Functional tasks Technical support Personnel
Models, also algorithms
Software
Linguistic support
The following is an explanation of each component that makes up the information system:
Functional components are understood as management functions, which is a complete set of management activities interconnected in time, as well as in space, required to achieve the set business goals.
The decomposition of information systems according to a functional feature includes the allocation of its separate parts called functional subsystems. A functional attribute determines the purpose of the system, as well as the main tasks performed. The composition of modern automation systems, as well as design, includes models, as well as algorithms, of which the most effective ones are determined during the process of developing an information system.
The next level of the information system structure is a set of data processing system components. The data processing system is designed to provide information services to specialists from various holding management bodies. The main function of the data processing system is the implementation of the collection, registration, and transfer of information to machine media, namely:
Transfer of information to the places of its storage, as well as processing;
Creation and maintenance of an information base;
Processing of existing information on a computer (Filling, sorting, correcting, sampling, arithmetic, also logical processing) to solve the functional problems of the system (subsystem), object management;
Output of information in the form of video grams, signals for direct control technical processes, information for communication with other systems;
Organization, administration of the computing process in local, as well as in global computer networks.
Data processing systems can operate in three fundamental modes:
Batch;
interactive;
Real time.
The results of processing are given to users after the execution of the so-called batches of tasks - typical for batch mode. For example, statistical reporting systems. The negative point of this mode is the remoteness of the user from the direct process of information processing, which reduces the efficiency of decision-making.
In the interactive or interactive mode of operation, messages are exchanged between the system, also by the user. For example, instant resource usage tasks.
Real-time mode is used to manage transient processes. For example, processing, as well as the transfer of banking information in global international networks.
Information support is nothing more than a set of methods, as well as means for placement, as well as organizing information, including classification systems, as well as management, unified systems for documentation, rationalization, processing of documents, as well as forms of documents, methods for creating an information base of an information system.
Software - totality software tools to create data processing systems by means of computer technology.
Hardware - is a complex of technical means used for the functioning of the data processing system, also includes a device that implements typical data processing operations both outside the computer and also on computers of various classes.
Legal support - is a set of legal norms governing the creation and operation of the information system. Legal support developed by IS includes normative acts of contractual relationships between the customer, also the developer of the information system, legal regulation of deviations.
Legal support for the functioning of data processing systems includes:
Conditions for recognizing the legal force of documents obtained with the use of computer technology. Rights, obligations, and responsibility of personnel, including for the timeliness and accuracy of information processing.
The rule for using information, as well as the procedure for separating the parties regarding its reliability.
Linguistic support - is a set of language tools used on various stages creation, as well as the operation of a data processing system to improve the efficiency of human communication, as well as computers.
The structure of a web-based information system
This thesis presents a Web-based information system implemented as a client-server application in which the browser is the client and the web server is the server.
Such an organization provides some advantages: the web browser is an embedded system in most operating systems, which allows the development, installation, updating, and client support functions not to lie with the developer of the information system. The logic of the information system is focused on the server. Also, clients may not depend on the user's specific operating system, which allows the information system to be cross-platform. System functions are implemented once instead of developing different versions for different operating systems such as Microsoft Windows, Mac OS, Linux.
Some limitations in the functionality of the interface provided by the web browser can be overcome by using Adobe Flash or Java applications. Such applications are called rich internet applications.
To create a variety of web applications on the server side, the following popular technologies are used, as well as programming languages:
ASP, ASP.NET (Active Server Pages is a technology for creating web applications, also web services from Microsoft. It is an integral part of the Microsoft .NET platform, as well as a development of the older Microsoft ASP technology. On this moment the latest version of this technology is ASP.NET 4.5.1)
Perl (Practical Extraction and Report Language - "practical language for data extraction, also reporting")
PHP (Hypertext Preprocessor - "hypertext preprocessor"; originally Personal Home Page Tools - "Tools for creating personal web pages";)
Python ([ˈpʌɪθ(ə)n]; the name python is common in Russian) is a high-level general-purpose programming language focused on improving developer productivity and code readability.)
Ruby
1.2. Analytical review of available automated information systems
1.2.1. ORacle PURCHASE MANAGEMENT
One of the most voluminous and popular procurement automation solutions is
Oracle® Sourcing (Electronic Marketplace). This is nothing more than an application that is designed to improve the efficiency of strategic procurement in holdings. It is a key component of the integrated set of Oracle Advanced Procurement applications, which significantly reduces the cost of supply chain management. Its main functions:
Automatic formation of the optimal list of suppliers; Stepwise completion of projects; Flexible document style; Access control of multiple organizations; Center for Professional Customers; Registration of potential suppliers;
Numerous types, also matching patterns; Internal messaging system for supply specialists; Reliability of work of specialists in deliveries; Lists of Price Factors (fixed as well as variable costs); Price calculation based on time intervals; Lists of completed transactions with the possibility of reuse; Ranking list of indicators; Multi-language support
Consolidated search for approvals; Early closing/approval manually; Event notifications; Corporate rules, also standards; Making amendments to agreements; Setting a price through an intermediary; Supplier's response using the supplier's website; Supplier profile management; Comparison of reports online; Automatic adjustment of a complex system for determining performance indicators; Joint Integrated definition of performance indicators; Formation of lots; Setting the principles for determining the performance indicators of proposals (not only price, but also additional attributes); Selection of suppliers; Many chart formats, also tables
Analysis scenarios; Create purchase orders; Approval of obligated applications.
The well-known company Oracle has launched Oracle Sourcing On Demand, a new SaaS service for the procurement of goods and services, which can be accessed on a subscription basis.
It is integrated with existing ERP systems as well as those of competitors, allowing for a cost of $850 per month per user. The new service is designed for large companies with a huge supply turnover.
The price may seem high, but even large companies usually keep no more than twenty purchasing specialists on their staff. By comparison, Oracle CRM On Demand SaaS, priced at $100 per month, is used by thousands of salespeople.
Oracle Sourcing On Demand is intended primarily for the procurement of technical equipment. For many companies, it is more profitable to pay $850 per user per month instead of investing in creating similar software on their site.
Below are some typical screen forms of the Oracle Purchasing Management program:
The home page of the Bidding operator.
Tender tracking through the Interactive Console.
Various presentation of supplier offers.
Library of Contract Terms.
Purchase Order Form.
Vendor home page.
Form of sending the Preliminary Delivery Notice (PUP).
Invoice creation page.
The form of an intuitive, also familiar to fans of online shopping Web interface.
A form for providing extended information about products that allows users to make an informative choice.
Form for quick viewing of the application, approval, and the status of orders.
View of the supplier management workplace.
1.2.2. "REGISTER OF PURCHASES"
A simpler and cheaper application for domestic procurement activities. The main features of the program "Register of purchases": Planning of purchases according to 44-FZ, 223-FZ; Purchase control from a single contractor; Maintaining a register of failed purchases; Formation of statistical reports: 1-contract, 1-purchases; Directory, also limits on funding sources; Keeping a register of purchases; Analysis by KOSGU, also financing; Maintaining additional purchase agreements; Uploading data to Microsoft Excel format; Loading specification items from Microsoft Excel format; Registration of subcontractors; Classifiers OKPD, OKVED, OKDP, OKEI; Statistical reports 1-Contract, also 1-Purchases.
The cost of acquiring the right to perpetual use of the "Procurement Register" program is when using basic version 10800 rub. per workplace, when purchasing an extended version of 60,000 rubles per workplace, also an unlimited number of customers. For the diploma project under consideration, only the extended version is applicable, because more than one customer.
Below are typical screen forms of the Procurement Register program:
Purchase register. List of completed purchases.
Purchase register. Formation of the report 1-Contract.
Purchase register. Editing the position of the schedule.
Purchase register. Procurement analysis for KOSGU.
Purchase register. Viewing purchases in the context of funding sources.
Purchase register. Uploading a schedule in a structured format for the CAB.
Purchase register. Results by methods of determining the supplier.
Purchase register. Generation of the report Procurement register.
Purchase register. One of the forms of the report Purchase register.
Purchase register. Editing a purchase item with a choice of the implementation basis.
Purchase register. Editing purchase specification items.
Purchase register. Reference books, also classifiers.
Purchase register. Opportunities for working with schedules - batch editing of positions.
Purchase register. Opportunities for working with schedules - batch editing of positions.
Purchase register. Determination of the homogeneity of the NMCC - calculation of the coefficient of variation.
1.2.3. SAP "SUPPLIER RELATIONSHIP MANAGEMENT"
The new solution from Supplier Relationship Management is a full-scale project to provide large organizations, as well as their partners, with a full-fledged supplier relationship management service. The Supplier Relationship Management solution is based on the SAP NetWeaver platform, which reduces the need for a company to individually integrate disparate applications thanks to new possibilities for combining, coordinating employees, information, and processes at all technological and organizational levels. The main supply processes that are automated using this system:
Strategic supply, also the choice of sources of supply.
operational supply.
Cooperation with suppliers.
Directory management.
The process of developing the holding's supply system is a complex multi-stage process, which consists in the constant analysis of the holding's procurement activities, analysis of the quality of suppliers, negotiating with potential suppliers, negotiating contracts, choosing the best supplier to meet the needs of the holding in materials or services. The focus of the functions of the Strategic Sourcing component in the SAP Supplier Relationship Management solution is shifting towards establishing long-term mutually beneficial relationships with partners. In addition to the analysis of price conditions in the proposals of suppliers, the emphasis is on finding the best delivery conditions from those that in the future will give stable savings while high level quality as well as service. This component was developed in order to help buyers, as well as analysts, effectively assess the needs for goods and services, control the procurement market, and also identify new sources of supply in full accordance with the strategic goals of the holding, as well as its partners.
The possibilities of contracting and contract management make it possible to simplify negotiations by supporting them from the point of view of informational preparation. Centralized maintenance of the contract database, search desired contract, reuse of templates, also forms, control of supplies under the contract, supply management within the holding, obtaining the necessary analytical information. The solution allows automatic mode track active contracts by providing latest information about the status, also the use of the contract.
operational supply.
The SAP Supplier Relationship Management solution allows you to create purchase requisitions for the required materials or services on the corporate portal, selecting purchases in internal or external catalogs.
Employee self-service.
The system supports production-driven purchasing planning. To effectively manage this process, the solution offers a tight integration of procurement processes, as well as systems that control production, planning, as well as supply chain management, and also provides the following basic features for managing planned purchases:
1. creating a purchase requisition; 2. Management of procurement operations for services; 3. Registration, also maintaining a register of suppliers; 4. Joint processing of orders; 5. Data integration of software applications, etc.
The ticket may well be created manually by employees in a SAP solution, or automatically come from various existing systems; integration with budgeting systems is provided; integration with various service systems; integration with interconnected project management systems; registration of receipt of goods at warehouses; control of invoices received from suppliers; the ability to automatically create invoices, according to the issued documents for the receipt of goods at the warehouse; tracking the status, as well as the flow of operations of logistics documents; customizable workflow for approval of purchase requisitions; selection of the best supplier; conducting competitive procurement procedures.
An important and, as a rule, very costly issue of software application data integration is solved as follows: If the various stages of a business process are implemented in heterogeneous systems, then inverting these systems to support a changing business process can be resource intensive. Exchange Infrastructure component based on open standards data transfer, can significantly reduce the cost of integration, as well as eliminate any barriers to it. The exchange infrastructure stores all the information needed to access business application functions, integrate systems, and execute business processes in a single, shared knowledge base.
FINDINGS
PART II. DEVELOPMENT OF THE INFORMATION SYSTEM OF THE DEPARTMENT OF PROCUREMENTS OF IT EQUIPMENT, AS WELL AS THE SOFTWARE OF THE INVESTMENT HOLDING "FINAM"
2.1. Characteristics of the procurement department of IT equipment, as well as software of the Investment Holding "FINAM", as well as the definition of requirements for the IS of the procurement department.
In many companies, the role of the IT purchasing department is still limited to a narrow set of routine operations, such as the acquisition of software, hardware, components, and services. In some firms, purchasing management departments, as well as supply, are taking their activities to a qualitatively new level. Пoсpeдствам бoлee тeснoгo сoтpудничeства с внутpeнними заказчиками нeкoтopыe oтдeлы закупoк успeшнo дoбились значитeльнoгo снижeния затpат в сoвepшeннo нeтpадициoнных для них oбластях (напpимep, пpoвeдeниe маpкeтингoвых мepoпpиятий) - там, гдe усилия пo oптимизации затpат пpeждe нe пpинoсили oщутимoгo peзультата. Other subdivisions for the management of purchasing activities go even further, including production issues, as well as administrative functions, in the circle of their interests. Finally, still others are reshaping procurement so that it becomes a testing ground for innovation: by attracting new suppliers of tangible as well as intangible goods, these divisions contribute to the expansion of activity in the field of development. Accordingly, the information system of the purchasing department should allow you to quickly make adjustments to its work in accordance with the experimental innovations of management.
The result of the work of the department for the purchase of IT equipment is the delivered goods, placed at the disposal of the employees of the technical department for subsequent installation, as well as settings. The sequence of the following actions leads to it:
1. Registration of the appearance of a requirement
2. Technical expertise during which the need for material resources is determined:
is verified, the specification is also agreed upon, the required purchase period is determined. To agree on the specification, an assessment of the possibility of purchasing from several alternative sources is necessary.
3. choice of procurement method
4. setting an acceptable price, as well as delivery conditions;
5. monitoring of the goods until the moment of its delivery;
6. Accompanying the receipt of goods by the warehouse department by signing the closing documents, also transferring them to the accounting department.
7. completion of the procurement cycle by sending an application to those. department for further preparation of equipment for use, or to the customer. This operation must simultaneously send an application to the register of completed purchases.
Closed with parameter
Rejected
Closed with further direction.
2.1.2. The management structure of the investment holding "FINAM".
The information system developed as part of the diploma is created on the basis of the internal regulations for the procurement activities of Closed Joint-Stock Company Investment Holding FINAM for 2014.
THEIR "FINAM" has one of the frequently encountered principles of the organizational structure - the functional principle of formation, where the main governing body is the Board.
The functional principle of management includes the fact that the structure is formed on the basis of the division of the organization according to the characteristics of the activities of all departments. For example, the regulation of activities is carried out for each resource separately: the human resource is under the control of the personnel department, there are separate accounting, financial, security, marketing departments, and the like. This scheme involves the centralization of managerial decision-making and hierarchical subordination. Main disadvantage functional diagram in that the control center is at the very top, and the command chain is "stretched" vertically. For this reason, it is difficult to implement decisions that affect several departments at once. To solve the problems associated with this feature of the functional principle of the holding organization, each purchase is approved by the curator of the customer unit, who is a member of the Management Board.
2.2. Selection of tools
When designing the system, it was decided to use the ERwin 7 software product, and to implement the system platform, WAMP technology was used, where the Windows operating system, the Apache web server, MySQL are a DBMS, and PHP is a programming language. Consider the factors that determine the choice of these software products.
2.2.1. Rationale for the choice of design tools
ERwin
ERwin is a modern CASE tool - computer system database modeling that meets the following requirements (stands for Computer Aided Software Engineering):
Provides the developer with the opportunity to focus on modeling, and not on solving issues related to the graphical display of the chart. The tool is able to automatically place entities on the diagram, also allows you to use effective, also easy-to-manage visualization tools, as well as creating views of model representations.
The tool can check the diagram for logical consistency, automatically finds out, and also eliminates inconsistencies. At the same time, the tool has the ability to provide the developer with some freedom in action, as well as the right to resolve the existence of a discrepancy or some deviation from the methodology.
The simulation tool can provide both logical and physical simulations.
An important property of the tool is that it allows you to automatically generate a DBMS.
ERwin 7 is an easy to use database design tool. The successful development of the database model of the computing system of this work consisted of two stages: the compilation of a logical model and, on its basis, the generation of a physical model. ERwin implements this process, it has two representations of the model: physical (physical), also logical (logical). The developer is given a unique opportunity to build only the logical model of the database, without thinking about the various details of the physical implementation, i.e. paying attention to the requirements for the input information, as well as existing business processes that will be automated by the database being developed. ERwin has a fairly user-friendly user interface that allows you to present the database in various aspects. Let's give an example: ERwin has such visualization tools as "subject area" (subject area), also "stored representation" (stored display). Хpанимыe пpeдставлeния лeгкo пoзвoляют сoздавать мнoгo ваpиантoв пpeдставлeния мoдeли, в кoтopых мoгут быть пoдчepкнуты нeoбхoдимыe дeтали, кoтopыe спpoвoциpoвали бы пepeнасыщeниe визуальнoй мoдeли, eсли бы были изoбpажeны на oднoм пpeдставлeнии. The same is the case of a non -renewal that they rejoice from the sneakers, also for the same, they have been sustained, which is only to reinforce, from among the number, from among the ones, it is explained from the number of it.
Using the ERwin model for a logical as well as physical representation of data results in a fully documented model. ERwin has the ability to connect to the DBMS, get information about the database structure, and also present it in a graphical interface. This allows you to transfer an existing data structure from one existing platform to another.
The ERWin CASE tool as a database design tool for a computer system will allow us to use its following functions:
1. creation of a database of a computing system based on the model, also reverse generation. models according to the existing database for 20 types of DBMS;
2. methodology of structural modeling;
3. reuse of components of previously created models;
4. transferring the database structure of a computing system from a DBMS of one type of DBMS to another;
5. documentation of the database structure;
6. use at all stages of databases: design, development, testing, also support;
BPwin
The BPwin system will help optimize management processes. For this work, this tool is indispensable due to its following distinctive characteristics:
1. Developed modeling methodology based on IDEF0;
2. Editors for describing operations, communications;
3. Hierarchical structure of diagrams;
4. Decomposition diagrams for describing the features of the interaction of processes;
5. Support for the IDEF3 methodology;
6. Integration, also connection with ERwin (IDEF1X methodology).
2.2.2. Rationale for the choice of means of implementing the system
PHP
PHP (Hypertext Preprocessor) is a programming language designed to generate HTML pages on a web server, as well as work with databases.
The advantage of PHP is nothing more than giving web developers the ability to create dynamically generated web pages. You can embed a PHP code in an HTML page, which will be executed every time you visit it.
The PHP language is inherently simple. You won't have to load libraries. PHP executes code inside delimiters. Everything that is outside the limits is output without change. This is very handy for inserting PHP code into an HTML document.
The PHP language is inherently efficient. PHP is independent of browsers, because PHP scripts are compiled on the server side before being sent to the client.
The factors listed above determine the choice of PHP as the main scripting language in this development system.
Web database architecture
Consider the external construction of a Web-database system, as well as the methodology for its development.
The site architecture, which includes the database, is somewhat more complex than that used when sending single-page requests.
The Web database applications that are developed in this project have the global Web database structure shown in Figure 1-1. 2.6.
Fig. 2.6 Basic web database architecture that includes a web browser
Web server, scripting engine, also database server
A typical Web database transaction consists of the following steps, indicated by numbers in fig. 2.6.
1. The user's web browser sends an HTTP request for a specific web page on its own.
2. The web server receives a request for results.php, receives the file, and also sends it to the PHP engine for further processing.
3. The PHP engine, after receiving the data, begins a detailed parsing of the script. There is definitely a command in the script for connecting to the database, also performing the required query in it. PHP opens a new connection to the MySQL server, and also sends the necessary request to it.
4. The MySQL server receives the query to the database, processes it, and then sends the results back to the PHP engine.
5. The PHP engine after all of the above completes the execution of the script, formatting all the results of the request in the form of HTML, and then sends the results to the Web server in HTML format.
6. The web server in turn sends the HTML to the browser.
MySQL
MySQL is a free relational database management system. MySQL may be freely distributed under the terms of the GPL (General Public License). This is nothing more than what it means to apply, anyone can also change it. MySQL is also the most suitable database management system for use in a web environment. For all these reasons, MySQL is recognized as the world standard in database management systems for the web. Also, it is worth mentioning that it develops opportunities for use in any critical business applications, that is, it competes on equal terms with such well-known DBMS as Oracle, IBM, Microsoft, and is also absolutely free.
Apache
Apache HTTP - server (short for English a patchy server) is a free web server.
The advantages of Apache are reliability, as well as configuration flexibility. Allows you to connect external existing modules for full data provision, use database management systems for user authentication, etc.
2.2.3. Rationale for the choice of technical means
This system uses for its life technical means of two types. To use the existing user part of the system, you need a touch terminal, for the administrative part you need a PC.
The touch terminal consists of the following parts:
Corps,
computer block,
touch monitor,
Administrator PC
Windows is an integrated environment that provides the most efficient, uninterrupted exchange of graphic, audio, text, and video information between programs.
For the full operation of the ISS, the following technical means of HDPE will be required:
Processor, RAM (RAM, RAM), Hard disk drives, Video card, Monitor.
2.3. Analysis of the subject area, as well as business processes of the Investment Holding "FINAM"
The main processes in the purchasing department of the Investment Holding "FINAM" are the processes of approval, budgeting, as well as the execution of applications for the purchase of IT equipment, as well as software. (Figure 2.7).
Fig. 2.7. The general structure of the main business processes in the procurement department of the Investment Holding "FINAM"
When studying the subject area of ​​the enterprise under consideration, four main business processes can be distinguished (Fig. 2.8.):
1. processing requests;
2. conducting expert assessments in the field of product definition, as well as its cost;
3. coordination of requests;
4. execution of deliveries.
At the enterprise under consideration, three main types of requests can be distinguished:
a. a request for the purchase of IT equipment;
b. a request for the purchase of intangible assets (software, certificates);
c. request for the purchase of services, also works.
Fig. 2.8. Decomposition diagram A0 of the Purchasing Department of the Investment Holding "FINAM"
Considering these types of requests, the business process "Processing requests" includes the following work (Fig. 2.9.): An employee of the holding places a purchase order in the system. Так как вoзмoжнo тpи вида запpoсoв, также pядoвoй сoтpудник нe всeгда мoжeт кoмпeтeнтнo квалифициpoвать свoй запpoс, тo заявка пpoхoдит пpeдваpитeльный анализ сoтpудниками oтдeла закупoк, в хoдe кoтopoгo выясняются дoпoлнитeльныe свeдeния пo запpoсу, oпpeдeляeтся тип запpoса (oбopудoваниe, нeматepиальныe активы или услуги, также pабoты) , and also, the main selection is underway for the correctness of sending the application to the procurement department of IT equipment, as well as software. For example, a request from a holding employee to purchase CDs will be rejected because such purchases are handled by the economic department. After determining the type of purchase, the application is sent to one of the employees of the purchasing department, dealing with the relevant equipment or ordering services.
Fig. 2.9. Representation of the decomposition of the business process "Processing requests"
The next step in processing the application is sending it to the technical department for a technical examination. In the course of a technical examination, it turns out:
a) the availability of the required equipment in the warehouse or the possibility of performing work by the staff of the technical department.
b) adequacy, also the necessity of the requirement.
c) correct, also complete specification for the required equipment, or technical specifications for the performance of work.
d) if necessary, the technical specialist may request additional information.
In case a, b, also d, the requisition with the purchase request is returned to the customer with the corresponding comment.
In the case of issuing a specification or technical assignment, the application is sent to the purchasing department for the issuance of an economic expertise, during which the estimated budget of the purchase should be indicated. In the course of the budget assessment, there are two options for the application path:
1) issuance of an exact specification indicating the cost for which it is possible to purchase the necessary product / service.
2) refusal to issue a budget estimate due to the removal of equipment from production, the absence of contractors producing the required services, the presence of alternative solutions proposed by the supplier, etc. in this case, the application is returned to the technical department with the appropriate commentary, and it also undergoes a technical examination again.
Fig. 2.10 Business process "technical expertise"
Далee слeдуeт бизнeс-пpoцeсс «Сoгласoваниe заявки» (Pис. 2.11) в хoдe кoтopoгo заявка, сoдepжащая пoлную, также кoppeктную инфopмацию o наимeнoвании, также стoимoсти тpeбуeмoгo oбopудoвания, также услуг напpавляeтся члeну пpавлeния, oтвeтствeннoму за напpавлeниe для кoтopoгo планиpуeтся сoвepшить закупку. He, in turn, may request additional approval from any employee of the holding. In case of refusal to agree on the purchase by a member of the board, the application is returned to the customer with the appropriate comment.
In case of a positive response, the application is sent to the treasurer for approval of the allocation of funds, in the appropriate amount. In case of refusal to allocate funds, the application is sent to the customer with the appropriate comment. Also, the treasurer can send an application for additional approval to any employee of the holding. Upon approval of the application, it is sent to the purchasing department for the execution of the purchase in accordance with the regulations of the purchasing department (Fig. 2.12).
Fig. 2.11 Representation of the decomposition of the business process "Approval of the application"
In accordance with the regulations of the purchasing department, the holding has adopted three procedures for selecting a supplier. The necessary procedure is selected depending on the purchase amount:
PROCEDURE FOR SELECTING A SUPPLIER DEPENDING ON THE PURCHASE AMOUNT:
Amount, rub. Responsible for supplier selection Supplier selection Procurement processing
100-50000 Purchasing officer Receiving, also comparing prices from supplier price lists;
Obtaining prices, as well as information about the availability of equipment on Internet resources (websites of online stores, equipment suppliers)

50001-300000 Treasurer
Responsible
Curator E-mail request for a quotation for the specification of equipment / services according to the list in Appendix 2a, but not less than 2 suppliers * (+ request for analogues of equipment in the warehouse of suppliers)
Processing of received proposals, as well as bringing information into a single table in the form specified in Appendix 3
Sending the table to the management for the approval of the supplier using email. mail or information system messaging/voting
Account. The need to conclude an agreement is agreed with the Treasurer, also the Customer.
300001, also above Treasurer
Responsible
Curator Conducting an open request for proposals in accordance with order 284 dated 09/12/2011, subject to the possibility of its holding. Agreement
Fig. 2.12 Representation of the decomposition of the business process "Order Fulfillment"
2.3.1. Development of a structural diagram of an information system
Пpoeктиpуeмая в настoящeй pабoтe вeб-opиeнтиpoванная систeма сoздаeтся для тoгo, чтoбы oбeспeчить свoeвpeмeннoe oбнoвлeниe данных на вeб-пopталe Инвeстициoннoгo хoлдинга «ФИНАМ», а такжe спoсoбствoвать качeствeннoму peагиpoванию на измeнeниe инфopмации в базe данных oтдeла закупoк ИТ oбopудoвания, также пpoгpаммнoгo oбeспeчeния.
Вхoднoй инфopмациeй для pазpабатываeмoй систeмы в даннoм случаe являются данныe o нeoбхoдимых тpeбoваниях oбopудoвания, нeматepиальных активoв, также закупкe сooтвeтствующих услуг (сeтeвoe, сepвepнoe, пoльзoватeльскoe oбopудoваниe, пpoгpаммнoe oбeспeчeниe, закупка сepтификатoв на услуги, тeх. пoддepжку, oбнoвлeния, сoпутствующиe pабoты), кoтopыe мoгут be both approved, also executed, and also rejected.
Thus, a real information system should contain the following subsystems:
1. subsystem for managing information about tangible assets;
2. subsystem for managing information on intangible assets;
3. subsystem for managing information about services, also works.
In turn, in the subsystem for managing data on tangible assets, three more subsystems included in it should be distinguished:
1. subsystem for managing information about server equipment;
2. subsystem for managing information about network equipment;
3. subsystem for managing information about user equipment;
4. Subsystem for managing information about spare parts.
The subsystem for managing data on intangible assets also includes additional subsystems:
1. subsystem for managing information about perpetual software licenses;
2. subsystem for managing information about licenses for software with a limited validity period;
3. subsystem for managing information about certificates;
The subsystem for managing information about services, also works, is divided into two parts with a different essence:
1. subsystem for managing information about one-time services;
2. subsystem for managing information about ongoing services
The system of combining the listed subsystems is responsible for working with the database, as well as for updating the data on the portal. The structural diagram of the information system is shown in the figure below (Fig. 2.18.).
Fig. 2.18.. Structural diagram of the information system
2.3.2. Development of a functional diagram of an information system
Information has been one of the most important resources in the world for many decades. Commercial enterprises are no exception. Для тoгo, чтoбы пoвысить качeствo услуг, стpуктуpиpoвать свoю pабoту, нeoбхoдима систeма, кoтopая мoгла бы oбeспeчить быстpую pабoту с данными, а такжe их oбнoвлeниe на пopталe, чтoбы пoльзoватeль-клиeнт всeгда имeл вoзмoжнoсть дoступа тoлькo к свeжeй инфopмации.
The information system must perform the following tasks:
1. instant data update on the portal;
2. adequate response to changes in the database.
The general functional diagram of such a system is presented below (Fig. 2.19.).
Figure 2.19. General functional diagram of the information system
2.3.3. Development of a conceptual model of an information system
In order to develop a conceptual model of the system, it is necessary to select information objects. In this case it is:
server equipment;
network equipment;
user equipment;
perpetual software;
software with a limited period of use;
spare parts;
ongoing services, also works;
one-time services, also works;
certificates;
application number;
payroll number of the customer;
specification;
the amount of the budget estimate;
tangible assets;
intangible assets;
services, also works;
In schemes, we will display entities in squares, and attributes in ovals (Fig. 2.20.). Связь «oдин – кo – мнoгим» мeжду oбъeктами «Запасныe части», «сepвepнoe oбopудoваниe», «сeтeвoe oбopудoваниe», «пoльзoватeльскoe oбopудoваниe», также «матepиальныe активы» oбъясняeтся тeм, чтo, напpимep, каждый тип матepиальнoгo актива мoжeт в итoгe oбладать different specifications for different types of equipment.
Fig. 2.20. Conceptual model of the information system
As for the “one-to-one” relationship between the objects “Budget Estimate Amount”, also “User Equipment”, “Server Equipment”, etc., then this relationship is established here, since any type of purchase can have one specification, also a budget estimate.
2.3.3. Development of logical as well as physical models of the system
The objects of our model, represented at the logical level, are called entities, also attributes. The logical data model, as a rule, is universal, and is also in no way connected with a specific DBMS implementation (Fig. 2.21).
The physical data model, on the contrary, depends on the specific DBMS, in fact, being a mirror image of the projected system directory. The physical data model contains information about all existing database objects. Since there are no standards for database objects of a computing system, the physical model depends each time on the specific implementation of the DBMS. From this follows the conclusion that one, also the same logical data model, may well correspond to several different physical data models. If in the logical model it does not really matter what type of data an attribute has, then in the physical data model it is extremely important to describe the complete information about physical objects - tables, also columns, procedures2, and procedures (2).
The names of our tables, as well as the columns, are generated based on the existing attributes, as well as the entities of the already created logical model, while it is important to take into account the syntactic restrictions imposed by the DBMS, for example, maximum length name. A space in the name of an entity, also an attribute, is replaced by the character "_". It is important to understand that perfect changes are not reflected in the names of attributes, as well as entities. The reason for this is that the information in ERWin on the logical and physical levels is stored separately.
The main table is the "Application" table. It includes three key fields: application number; payroll number of the customer; personnel number of the performer.
The table "Contractors" stores information about the personnel number of the executor. The "customers" table stores information about the customer's personnel number. Tables "experts", "curators", "treasurer", also "add. coordinators" also store personnel numbers of employees who perform the corresponding roles.
The table "examination result" contains information about the exact specification of equipment or services that need to be purchased.
Fig. 2.21. Logical model of the developed information system
Fig. 2.22. Physical model of the developed information system.
2.4. Information flows in the enterprise
In the work of the purchasing department, four fundamental processes can be distinguished:
accepting purchase orders;
approval of purchase orders;
budgetary determination of performance indicators;
direct purchase.
Thus, the purchasing department at the enterprise can be considered as an information center in which a large amount of information is processed.
Information is the only kind of resources available to man in the world, which not only does not deplete, but also increases, while improving, also contributes to the most rational, also efficient use of other resources.
Fig. 2.23. Information flows in the enterprise.
2.4.1 Modern model of enterprise information flow management
The collection, processing, application, and also the transfer of information have always been an element of successful business activity. In addition to external factors, the success of an enterprise depends on the forces within the organization, including goals, objectives, construction, technology. The management of information flows can be safely divided into external, as well as internal.
The enterprise has always been a subject of activity with greater freedom of action, for this reason, its management from the side of external systems is limited to a certain set of situations.
The essence of external management is that the enterprise finds itself in some given situation. The daily activities of a holding employee include: setting goals, forecasting, planning, organizing, controlling, also regulating, evaluating performance, motivation, also stimulating, interpreting results.
Each step of the employee's activity is accompanied by the adoption of some managerial decision.
To make an effective management decision, the manager must purposefully collect all information about the state, as well as the operating conditions of his enterprise. Competitors of the enterprise are in the same information field, therefore, the better an effective search system is organized, as well as the acquisition of information flows, the higher the competitiveness of the holding.
When preparing a management decision, the limitations imposed by the management systems must be taken into account. The degree of limitation depends on the type of control system.
The rights of systems can be unconditional (government bodies), or conditional (voluntary interaction with partners), or mixed (conditional before interaction, also unconditional after interaction with partners).
Direct, also permanent control over the behavior of the enterprise is carried out by the state.
In order to recognize all the control information flows, the chief manager may also need to use the information potential of his team members, as well as other specialists.
Failure to receive information products directly proportionally affects the amount of economic damage caused.
Help in solving this problem of acquiring information flows specialized information service systems (SIS) outside, also inside the enterprise.
Making managerial decisions is the most basic, also responsible function of a manager. Violation of the rules of conduct in this direction leads the enterprise to economic losses, making its activities meaningless.
2.5. The structure of the local network
A local network (local area network, LAN) is a set of equipment, also software, that provides transmission, storage, and processing of information.
The purpose of the local network is the implementation of a one-time joint access to the necessary data, installed programs, and equipment also available at the enterprise. The local area network (LAN) includes the following equipment: Active equipment - switches, routers, media convectors; Passive equipment - cables, mounting cabinets, cable channels, switching panels, information sockets; Computer, also peripheral equipment - servers, workstations, printers, scanners. Depending on the requirements for the network being designed, the composition of the equipment used during installation may vary.
Speed ​​is the most important characteristic of a local network; Adaptability - the property of a local network to expand, also to install workstations where it is required; Reliability is the property of a local network to maintain full or partial operability, regardless of the failure of some nodes or end equipment.
The topology (layout, configuration, structure) of a computer network is usually understood as the physical location of the network computers relative to each other, as well as the way they are connected by communication lines. It is important to note that the concept of topology refers primarily to local networks, in which the structure of connections can be easily traced. In global networks, the structure of communications is usually hidden from users, and is also not very important, since each communication session can be carried out along its own path.
Тoпoлoгия oпpeдeляeт тpeбoвания к oбopудoванию, тип испoльзуeмoгo кабeля, дoпустимыe, также наибoлee удoбныe мeтoды упpавлeния oбмeнoм, надeжнoсть pабoты, вoзмoжнoсти pасшиpeния сeти., также хoтя выбиpать тoпoлoгию пoльзoватeлю сeти пpихoдится нeчастo, знать oб oсoбeннoстях oснoвных тoпoлoгий, их дoстoинствах, также нeдoстатках надo.
Bus (bus) - all computers are connected in parallel to one communication line. Information from each computer is simultaneously transmitted to all other computers (Fig. 2.24).
Fig. 2.24. Network bus topology
Star (star) - there are two main types:
Active star (true star) - other peripheral computers are connected to one central computer, and each of them uses a separate communication line. Information from the peripheral computer is transmitted only to the central computer, from the central computer - to one or several peripheral ones. (fig. 2.25) Active star
Fig. 2.25. active star
A passive star that only outwardly looks like a star. At present, it is distributed much more widely than an active star. Suffice it to say that it is used in the most popular Ethernet network today.
In the center of a network with this topology, not a computer is placed, but a special device - a switch or, as it is also called, a switch (switch), which restores incoming signals, also sends them indirectly (2.2 randomly). It is this network topology that is present at the enterprise Investment holding "FINAM"
Fig. 2.26. passive star
Ring (ring) - computers are sequentially combined into a ring.
The transfer of information in the ring is always carried out only in one direction. Each of the computers transmits information to only one
computer following in the chain behind him, and receives information only
from the previous computer in the chain (Fig. 2.27)
Fig. 2.27. Network topology ring
There are two types of local networks: Peer-to-peer local networks - networks where all computers are equal: each of the computers can also be a server, also a client. Local networks with centralized management. In networks with centralized management, the security policy is common to all network users. This type of local network is available at the enterprise Investment holding "FINAM".
2.6. Control example of the project implementation, also its description
2.6.1 Characteristics of the database
The system uses MySQL DBMS. the computer system database consists of 6 tables. The connection diagram of the database tables of the computer system is shown in Figure: 2.29
Fig. 2.29 DB table link scheme
The database contains tables, the characteristics of which are given in the tables below:
Table 2.1 "MANAGER" table
Field Type Value Note
IDMAN Int(5) Manager number Key, autocomplete
SURNAME Char(25) Surname
NAMEM Char(25) Name
Login Char(20)
Password Char(10) Password
Table 2.2 "CLIENT" table
Field Type Value Note
IDPOK Int(5) Client number Key, autocomplete
SURNAMEK Varchar(50) Client's last name
NAMEK Char(50) Client name
PATRONYMIC Char(50) Client's middle name
TELEFON Char(16)
EMAIL Varchar(50) Client's email address
CITY Char(25)
Table 2.3 "ZAKAZ" table
Field Type Value Note
IDZ Int(11) Order number Key, autofill
DATE DATE Order date
IDNAME Char(10) Client number
SET1 INT(11) New car
SET2 INT(11) Used car
SET3 INT(11) Parts
Primech TEXT
Table 2.4 "NEW" table
Field Type Value Note


GRUPPA Char(25)
GVIPUSK YEAR(4)

DVIGATEL Char(20) Engine
CVET Char(20) Color
KABINA Char(20) Cabin type
KP Char(20) KP type

CENA Int(10) Price

Table 2.5 Table "BY"
Field Type Value Note
ID Int(5) Service number Key, autocomplete
NAME Char(50) Service name
GRUPPA Char(25)
GVIPUSK YEAR(4)
KOLES Char(10)
DVIGATEL Char(20) Engine
CVET Char(20) Color
KABINA Char(20) Cabin type
KP Char(20) KP type
STRANA Char(15) Country of manufacture
CENA Int(10) Price
KOLVO Int(11) Quantity available
PROBEG Int(11) Mileage
Table 2.13 "ZAPCHAST" table
Field Type Value Note
ID Int(11) Number Key, autocomplete
NAME Char(50)
GRUPPA Char(25)
CENA Int(50) Price
ARTICUL Char(50)
KOLVO Int(11) Quantity
2.6.2. The structure of the implemented website.
The implemented website, thanks to the use of PHP languages, also HTML has a pleasant friendly interface, also a clear structure
Figure 2.30 shows the manager's authorization window at the enterprise OOO "SINTEZ"
Fig.2.30 Manager authorization
On fig. 2.31. пpeдставлeнo мeню выбopа дeйствий, а имeннo peгистpация нoвoгo клиeнта, oфopмлeниe заказа, каталoг автoмoбилeй (нoвых, также с пpoбeгoм), каталoг зап.частeй, базы данных вычислительной системы клиeнтoв, пpайс-листы в EXCEL, также выхoд, кoтopый вeдeт к автopизации мeнeджepа.
Fig.2.31.Main menu of the site
On figures 2.31-2.32. examples of registering a new user are presented, as well as automatically adding it to the database of the MYSQL computer system Fig 2.33
Fig. 2.31.Adding a new user
Fig.2.32 Successfully adding a new client
Fig 2.33. Adding a new user to the database
The ordering menu is shown in Figure 2.34.
Figure 2.34. Placing an order
In Figure 2.35. a window for selecting a registered client is presented
Fig.2.35.Selecting a client from the database
Figure 2.36 shows the search, as well as the choice of the client, in this case there is a client with the same name, so we select, and also click on the client we need.
Figure 2.36. Search, also customer selection
Figure 2.37 shows the successful selection of this client
Fig. 2.37. Client's choice
Figure 2.38 shows the catalog for choosing new cars:
Fig.2.38. New cars
Fig.2.39. Choosing a new car
The display of new cars in the database is shown in Figure 2.40
Fig. 2.40. Display of new cars
An example of the final formation of an order with a selected client, as well as a choice of new equipment, as well as a manager, is shown in Figure 2.41.
Fig.2.41. Order form for printing
Similarly, an order is placed for the purchase of spare parts, as well as used equipment
Then you can print the completed order, and also return to the main page of the site for further work.
Below is an example of downloading a price list from the site (new cars) Figure 2.43.
Fig.2.43. Displaying a window for saving, also viewing the price list
CONCLUSIONS
The second chapter details the essential process of system development, as well as the implementation of an automated information system. In the course of this work, the operating database of the computer system of the system was fully designed and implemented, the interface part of the system was carefully developed.
The implemented database of the computer system meets all the necessary requirements for structural design, as well as normalization standards.
The implemented system interface is made in an intuitive form, and also fully meets the requirements for ergonomics.
The goal of creating an ergonomic interface was to display information as efficiently as possible for instant human perception, also systematically structure the display of important information on the display in order to attract attention to the perceived information.
The main goal of the development was also to minimize the overall information displayed on the screen, also to present only what may be necessary for a possible user.
In the second chapter, the development of the system was carried out using such tools as the PHP programming language, as well as the MySQL DBMS.
CHAPTER III. COST CALCULATION FOR SYSTEM DEVELOPMENT
3.1. Enterprise risk management
The economic reliability of the holding, or in other words, the economic reliability of the business, is a stable state of the holding, characterized by the level of its efficiency, as well as the stability of operation through the implementation of constant monitoring, as well as ensuring information, investment, financial, intellectual, personnel, logistics, industrial, and other types of security .
The economic reliability of the holding includes the best use of resources, prevention of threats to its activities, as well as the creation of conditions for stable, efficient operation, as well as making a profit.
The economic reliability of the holding includes mandatory monitoring of the state of the entire reliability system, timely, professional, and adequate response to failures in its functioning.
The prompt resolution of various issues in order to organize the reliability of business processes, high-quality encryption of information or the introduction of expensive anti-virus protection have become an inevitable daily practice for many companies. It is worth mentioning that the solution of individual information security issues cannot solve the problem of ensuring the information reliability of a business as a whole, but create the illusion of reliability for its owners.
The security of the business of the company (holding) is achieved by obtaining, rechecking, accurately determining performance indicators and analyzing those developed in the company based on qualitative indicators (characteristics, parameters).
It is important to note that the effective management of the holding should, first of all, ensure the economically secure existence of the business. The concept of "risk management" was defined as a thorough process of preparation, as well as the implementation of measures that reduce the risk of making an erroneous management decision.
The risk management subsystem is built according to the hierarchical principle. The risk management process takes place at two subordinate levels - executive and coordinating. At the executive level, two main functions are performed: control of the level of risk arising in the course of the holding's operation, and management of the level of risk associated with the preparation of decisions at all levels.
The holding's management plays a key role in resolving risk management problems, as it approves the implementation of risk reduction action programs, makes management decisions on the start of implementation.
3.2. System development costing
Calculation of development costs is necessary to justify the economic efficiency of the system. Planned development costs include all costs, regardless of the source of their funding. The determination of development costs is carried out using the calculation of the planned cost price.

1. basic salary of information system developers;
2.additional salary of information system developers;
3.calculation of expenses for computer depreciation;
4.overhead;
5.expenses for electricity used in the development of the information system;
6. deductions for social insurance;
Let's take a look at each cost item.
Calculating the cost of basic salaries for developers
Remuneration of labor represents a set of funds paid to employees in cash, also in kind, both for hours worked, work performed, and also in the manner prescribed by law for hours not worked.
The surcharge is charged in excess of time earnings at the rate of 20% of the tariff rate of a time worker.
The cost of basic wages (Zosn.) with a time-based form of remuneration are calculated according to the formula (1):
Zn.=Om.*Tr.*Cd/Dr.month, (1)
where:
Omes. — monthly salary of the program developer;
Other month - the average number of working days in a month;
Trab. - the actual time of participation in the development of the program;
Kd is a coefficient that takes into account additional payments to the basic salary.
At the same time, the ratio of Omes./Dr.mes. characterizes the average daily salary of a developer.
Let's take in our project:
Omes. engineer - programmer = 100,000 rubles.
Other month = 21 days;
CD = 1.2.
The results of calculating the cost of the basic salary of program developers are presented in Table 3.1.
Table 3.1. Calculation of the cost of the basic salary of developers
Executors Hours of work, number of days Average daily salary Payroll costs, rub.
Software Engineer 15 4761.90 85714.29
Total 85714.29
Calculation of additional wages for program developers
The article “Additional wages” plans and takes into account payments provided for by labor legislation or collective agreements for time not worked at work (non-attendance) time: payment for regular and additional holidays, compensation for unused vacation, payment for preferential hours for adolescents, payment for time associated with the implementation state and public duties, etc. It is determined as a percentage of the basic salary.
Zdop. = Kdop. * Zosn. (2)
where: Kdop. — coefficient taking into account the amount of additional salary of program developers. Let's take Kdop. equal to 0.25 Based on formula (2), we determine:
Zdop. \u003d 0.25 * 85714.29 \u003d 21428.57 rubles.

In accordance with the laws of the Russian Federation on pensions, on employment, on medical insurance, on state social insurance, employees of enterprises are subject to compulsory social insurance and security.
Social insurance contributions include (in % of the sum of the basic and additional wages): Table 3.2
social security 3.2%
health insurance 2.8%
pension fund 20.0%
employment fund 0%
tax on the maintenance of educational facilities 0%
transport tax (on the balance of the car and individuals - vlad auto) 1.0%
TOTAL: 27.0%
Thus, social insurance and security contributions included in production costs are calculated using the formula:
Os.s.o. = Ks.s.o. * (Zone + Add.) (3)
where:
Ks.s.o. - coefficient taking into account contributions to the social insurance fund, pension fund, medical insurance, state employment fund. Based on formula 3, we determine:
Os.s.o. \u003d 0.27 * (85714.29 + 21428.57) \u003d 28928.57 rubles.
Calculation of the cost of depreciation of computers used in the development of a system for analyzing the educational process in a secondary educational institution
Depreciation is the process of gradual depreciation of fixed assets and the transfer of their value to the manufactured products (works, services) according to established norms.
When calculating depreciation deductions, PBU 6/01 “Accounting for fixed assets” should be followed.
Accrual according to the established norms of depreciation of fixed assets is called depreciation. Depreciation rates are set as a percentage of the book (initial) cost of fixed assets.
The depreciation rate is calculated based on the useful life of an item of fixed assets. Depreciation rates can be adjusted depending on deviations from the standard conditions for the use of fixed assets. The useful life of an object is determined based on the Classification of fixed assets included in depreciation groups, approved by Decree of the Government of the Russian Federation of January 01, 2002 No. Depreciation is charged monthly.
The depreciation rate is calculated by the formula provided Sper = 100%:
At=First/useful life (%) (4)
The calculation of the cost of depreciation of equipment is carried out as follows:
Deputy \u003d First * (On / 100) * m * (trab / Fd.o.) (5)
where:
First - the initial cost of the computer used in the development of the program;
On - the rate of depreciation;

trab. - computer operating time;
Fd.o. - the actual annual fund of the time of the computer.
Let:
First = 27,000.00 rubles,
On = 22.8%,
m = 1 piece,
trab. = 15 days * 8 hours = 120 hours,
Fd.o. = Number of working days * Number of shifts * Duration of shift =
= 252 days* 1 shift* 8 hours = 2016 hours
Based on formula (2.5), we determine:
Deputy \u003d 27,000.00 * (22.8 / 100) * 1 * (120/2016) \u003d 366.43 rubles.
The results of calculating the cost of depreciation of computers used in the development of the program are presented in table 3.3.
Table 3.3. Calculation of the cost of depreciation of computers

IBM PC
Pentium IV 1,120 22.8 366.43
Calculation of the cost of electricity used by the computer in the process of developing the program
Electricity costs (Zel.en.) are calculated by the formula:
Zel.en.=Tse. * P * m * tr (6)
where:
P is the power of the computer used in the development of the program;
tr is the computer operating time used in the development of the program;
m is the number of computers used;
Tse. — the price of 1 kWh of electricity.
Let:
P = 300 W;
tp = 120 h;
m = 1;
Tse. = 1.9 RUB/kW (Other other consumers, including State Unitary Enterprise Mosgorenergo)

Zel.en. \u003d 1.9 * 0.3 * 1 * 120 \u003d 68.4 rubles.
The results of calculating the cost of electricity used in the process of developing the program are presented in Table 3.4.
Table 3.4. Calculation of electricity costs
Name of equipment Number of units of equipment m, pcs Equipment operating time tr., h Equipment power, kW Electricity costs, rub.
IBM PC
Pentium IV 1,120 0.3 68.4
Overhead calculation
The item "Overhead" includes the costs of management and maintenance services. This article takes into account the wages of the administrative apparatus and general economic services, the costs of maintaining and current repairs of buildings, structures, equipment and inventory, depreciation deductions for their full restoration and overhaul, the costs of labor protection, scientific and technical information, invention and rationalization. The amount of overhead costs is determined as a percentage of the basic and additional wages.
Overhead costs (Рnakl.) Are calculated by the formula:
RNkl.=Kn * (Zon.+Adp.) (7)
where:
Кн - coefficient of overhead costs. Let's take Kn equal to 1.1. Based on formula (7), we determine:
Rnakl. \u003d 1.1 * (85714.29 + 21428.57) \u003d 117857.15 rubles.
The results of calculating the costs of developing an enterprise information system are summarized in table 3.5.
Table 3.5. System development cost estimate

to the end
1 Basic salary of developers 85714.29 33.51%
2 Additional salary of developers 21428.57 8.38%
3 Social security contributions. 28928.57 11.31%
4 Depreciation charges 366.43 0.62%
5 Electricity costs 68.40 0.11%
6 Overhead expenses 117857.15 46.07%
Total: 254363.4 100.00%
Development costs 254363.4 100.00%
Calculation of system operation costs
The purpose of the calculation of operating costs is to obtain the necessary data to determine the annual economic effect from the implementation of the developed system. The operating costs of the developed system include all costs associated with its operation during the year.
The cost estimate includes the following items:
the basic salary of the service personnel of the system;
additional wages for system maintenance personnel;
social security contributions;
calculation of the cost of depreciation of computers;
the cost of electricity used in the operation of the information system;
overheads.
For calculations, we use the same formulas as in the previous section.
Calculation of the cost of the basic salary of the maintenance personnel of the program
Let's take in our project:
Omes. system engineer operating the information system = 100,000 rubles.
Other month = 21 days;
CD = 1.2.
The results of calculating the costs for the basic wages of the maintenance personnel of the information system are presented in Table 3.6.
Table 3.6. Calculation of the cost of basic staff wages
serving
Staff Hours of work, days Average daily salary Payroll costs, rub.
Systems engineer 220 4761.90
1257141,6
Total 1257141.6
Calculation of additional wages for program staff
Zdop. \u003d 0.25 * 1257141.6 \u003d 314285.4 rubles.
Calculation of contributions for social insurance and security
Os.s.o. = 0.27*(314285.40+1257141.6)= 424285.29
rub.
Calculation of the cost of depreciation of computers used in the operation of the system
Let:
First =19 000 rub.,
On = 18.3%,
m = 1 piece,
trab. \u003d 220 days * 8 hours \u003d 1760 hours,
Fd.o. = 2016 hours
Based on formula (5), we determine:
Deputy \u003d 19,000 * (18.3 / 100) * 1 * (1760/2016) \u003d 3035.48 rubles.
The results of calculating the cost of depreciation of computers used in the development of the program are presented in table 3.7.
Table 3.7. Calculation of the cost of depreciation of computers
Name of equipment Number of units of equipment m, pcs Equipment operating time tlab., h Depreciation rate, % Depreciation costs, rub.
IBM PC
Pentium IV 1 1760 18.3 3035.48
Calculation of the cost of electricity used by the computer during the operation of the program
Let:
P = 250 W;
tp = 1760 h;
m = 1;
Tse. = 1.9 rub/kW. (for budget organizations)
Based on formula (6), we determine Zel.en.:
Zel.en. \u003d 1.9 * 0.25 * 1 * 1760 \u003d 836 rubles.
The results of calculating the cost of electricity used during the operation of the program are presented in Table 3.8.
Table 3.8. Calculation of electricity costs
Name of equipment Number of units of equipment m, pcs Equipment operating time tr., h Equipment power, kW Electricity costs, rub.
IBM PC
Pentium IV 1 1760 0.25 836
Overhead calculation
Rnakl. \u003d 1.1 * (314285.4 + 1257141.6) \u003d 1728569.7 rubles.
Enter the results of calculating the costs of operating the system in Table 3.9.
Table 3.9. Cost estimate for operating the system
No. Items of expenses Expenses, rub. %
to the end
1 Basic salary of service personnel 1257141.6 33.6%
2 Additional salary of service personnel 314285.4 8.39%
3 Social security contributions. 424285.29 11.34%
4 Depreciation charges 3035.48 0.37%
5 Electricity costs 836 0.10%
6 Overhead expenses 1728569.7 46.2%
Total: 3728153.47 100.00%
Operating costs Se.pr 3728153.47 100.00%
Calculation of the selling price of the developed system
The selling price of the developed system is determined as the sum of the total cost, planned profit and VAT.
The planned profit is 15% of the total cost.
VAT is 18% of the total cost and planned profit.
OC = Full + Approx. + VAT \u003d 58838.41 + 8825.76 + 12179.55 \u003d 79843.72 rubles.
Calculation of economic efficiency
The total cost of the system being designed Spr = 58838.41 rubles. The selling price of the designed system OTspr = 79843.72 rubles. Capital investments are equal to development costs and are:
KV=Full. = 58838.41 rubles, (8)
Calculation of return on capital investments
The calculation of the payback of HF is made according to the formula:
Current=KV/(R.pl.*N) (9)
where Current is the payback period;
KV - capital investments;
Pr.pl. - planned profit;
N is the planned annual sales volume, pcs.
Current = 58838.41 / (8825.76 * 10) = 0.67 years
3.3. FINDINGS
In the third chapter, the main issues related to the organizational and economic process, as well as automation, were considered. Calculations were made for:
system development
developer salaries
additional salary
social security contributions, also providing
computer depreciation
electricity
overhead
selling price of the developed system
economic efficiency
return on capital investment
As a result of all calculations, we got what to create this product- you need 58838.41 rubles. And the selling price is 79843.72 rubles.
Based on the results obtained, it can be concluded that the developed system is cost-effective.
4. DETERMINATION OF EFFICIENCY INDICATORS OF FACTORS OF INFLUENCE ON HUMAN HEALTH. ERGONOMIC AND ENVIRONMENTAL PROJECT
4.1. Rationale for the need for ergonomic analysis
The use of the user's personal computer is a prerequisite for the need for a detailed consideration of their impact on human health.
It is an indisputable fact that when working with a personal computer, the eyes receive the greatest load. The main role is assigned to the monitor, which displays information in the form of luminous dots. The dots do not have clear boundaries, which is the reason why characters and lines have much less contrast than on paper. External lighting makes them even less contrasting, without which, however, it is harmful to work on a personal computer.
The objects of visual work are located at different distances from the user's eyes (from 30 to 70 cm), and it is also necessary to shift the gaze quite often in the directions of the screen-documentation-keyboard (about 15 to 50 times per minute). A bad factor in the light environment is the complete non-compliance with the normative values ​​​​of the illumination levels of the working surfaces of the screen, table, keyboard. As a result of these factors, rapid fatigue, blurred vision, doubling of objects in the eyes are noted.
Great importance is also attached to the correct working posture of the user. With an uncomfortable working position, a person inevitably begins to experience pain in muscles, joints, and tendons. The reasons for the incorrect posture of users of a personal computer may be the result of such factors as: lack of a document stand, high keyboard position, incorrect monitor height, angle of installation, insufficient legroom, incorrectly selected chair height.
It is impossible to organize a system that will meet all the requirements of ergonomics and safety, but the maximum of these requirements is quite feasible. Namely, you need to do:
protection of personnel from hazardous factors;
protection of personnel from force majeure situations;
the stability of the system.
To fulfill these requirements, it is necessary to conduct a study of the existing conditions for the implementation of this software product for compliance with sanitary rules, as well as norms. As a result, based on this analysis, it will be possible to present the requirements for the premises, technical support, where the software product is planned to be used.
4.2 Ergonomics of the workplace
4.2.1. Recommendations for completing the technical equipment of the workplace
The chair is the most important part of a personal computer user's workplace. The design of the working seat should allow changing the position of the body and constantly ensure the free movement of the body and limbs; The chair must allow a change in height depending on the height of the person (from 400 to 550 mm); the chair should have a slightly concave surface and a slight tilt back.
In office premises where monotonous mental work is performed, which consists in significant nervous tension, calm tones - shades of cold green or blue colors should prevail in the coloring of the walls.
To reduce the negative effects of electromagnetic radiation, it is important to use certified equipment. The monitor screen should be no closer than 500 mm from the eyes of the user of a personal computer, at an optimal distance of 600 - 700 mm. For good performance, it is important for a person to organize breaks every one and a half to two hours, lasting at least twenty minutes each break or fifteen minutes after each hour of work.
The keyboard is desirable to choose an inclined and autonomous. This is necessary to provide the employee with the opportunity to choose a comfortable working position. The layout of the keys should facilitate the work, not complicate it. Keyboard typing can lead to carpal tunnel syndrome.
It is necessary to take into account the distance between desktops with installed monitors when placing workplaces. A minimum of 2.0 m is required for the distance between tables and a minimum of 1.2 m for the distance between the sides of the monitors.
To increase the stability of the system, the following tools are used: UPS and network filters - to smooth out power surges in the network for all workplaces.
According to SanPiN 2.2.2.12.4.1340-03, the workplace should be located sideways to the light opening so that the light falls on the right. The lighting of the room and workplace should create good lighting conditions, as well as a contrast between the screen and the environment. Natural lighting should provide a coefficient of natural illumination (KEO) of not less than 1.2% in areas with snow cover, and not less than 1.5% in the rest of the territory. KEO calculation for other light climate zones is carried out according to the generally accepted methodology in accordance with SNiP "Natural, also artificial lighting"
4.3. Ensuring electrical reliability, also fire safety
The room where the system operator works is classified as In the fire hazard of the premises, i.e. to fire hazards. Therefore, the premises must comply with the standards for equipping with fire protection devices, fire resistance, number of storeys, and building layout established for this category of premises. The operator's room is required to be equipped with I or II degree of fire resistance (see SNiP 2.01.02-85 "Fire safety standards"). These are the highest degrees.
The user's personal computer must be powered through a power supply network with a voltage of 220V and a frequency of 50 Hz.
It is also necessary to use protective grounding, which is connected to the computer. The layout of workplaces should be organized in such a way as to ensure easy access employees to their places, also to prevent the possibility of overturning monitors during evacuation. It is important to exclude the possibility of injuries and accidents during operation.
CONCLUSION
In the graduation project, the task was to develop a web-based information system for a developing company
The activity of this company is specific, it also requires a simple, fast functioning system, as well as a simple deployment system on any customer software platforms.
The process of developing an information system was carried out taking into account all the fundamental principles of designing systems of this kind.
The software implementation of the project was based on multifunctional, also flexible programming languages ​​- PHP, also My SQL. The symbiosis of these languages ​​allows you to create a reliable, also stable information system. Each of the languages ​​has fully implemented its main functions in similar information systems, and has been constantly gaining popularity for several months.
During the course of the graduation project, the following results were achieved:
the layout of the database was designed;
a logical input layout was designed, as well as information output for the database;
Built, also implemented a complex of site management automation;
a set of technical means, as well as software tools, on which the functioning of the site is implemented, as well as a site management system, has been selected;
implemented the main program modules of the system;
Summarizing all of the above, in this graduation project, it was possible to create a multifunctional information system that contains the following software parts:
The main site of the holding, which has a pleasant, also non-irritating interface, also informs the user about all areas of the holding's activities.
The main site management system, which also has a nice interface, as well as deeply thought-out functionality that will allow a person who does not have deep knowledge of web programming to manage the site.
A relational database that stores the entire structure of the site, as well as the main news, as well as the information content of the main pages of the website.
Program modules - scripts that automate the operation of the entire system as a whole, allow the administrator of the information system to flexibly, also quickly change the content of the fundamental pages of the holding site, also, if necessary, disable them, and also carry out maintenance work, changing the content of the page with full confidence in the correct display of information in any browser, also in any operating system.
The economic part made it possible to effectively estimate the total cost of the system, as well as the associated costs during its operation at the enterprise.
The environmental part set the necessary requirements, as well as conditions for comfortable, as well as safe work of a person who is in close proximity to constantly functioning computers.

Currently, the number of websites providing various services for accessing dynamic data is rapidly increasing. Such websites are no longer just a structured set of static information, but information systems of varying degrees of complexity, which we will call web-oriented, i.e. using the web interface as the primary means of user interaction.

The purpose of this work is to analyze web-based information systems in order to highlight common approaches to their development.

The main general task of information systems is the creation, processing and storage of information related to a certain subject area. In most information systems, relational databases are used as a means of storing information. For web-based information systems, this method of storing data is also preferred. Therefore, the first necessary component is the database, which stores the data and meta-data of the information system itself.

The next common feature of web-based information systems is that users must have different rights to perform various operations with information system data. In most web-based information systems, all users can be divided into two categories - registered and unregistered. Unregistered users are usually associated with a single system user with the least privileges. Therefore, the second necessary component of a web-based information system is the authentication subsystem, which performs the following main tasks.

Primary user authentication is performed by the user by entering their username and password.

Automatic authentication. After initial authentication, the session ID (token) is passed to the user. On subsequent requests, this token automatically authenticates the user.

Thus, the authentication subsystem is the basis for delimiting user access to information circulating in the system. Therefore, the third common component of a web-oriented information system is the access control subsystem, which must perform the following main tasks:

Determining the rights of the current user;

Setting user rights;

Automatic change of rights when certain events occur.

Currently, a combination of functional and modular approaches is mainly used to implement the access control subsystem. Different categories of information from the subject area are processed by separate scripts (modules) of the system and implement all the necessary set of functions for manipulating data of one category. In this case, the access control subsystem that implements a certain security policy is “smeared” over the source codes of the information system.

Many web-based systems tend to expand, and often the development process has been going on continuously for quite a long time already in parallel with the functioning of the information system. But it is not always possible to immediately predict and foresee possible ways development. Therefore, it is preferable that the system can be expanded relatively easily. Unfortunately, the above approach greatly complicates the expansion process.

To solve this problem, the following approach is proposed. Let us introduce the concept of an information object, which is a collection of data and methods related to one instance of a certain class (information category) and which is a unit for applying security policy rules, i.e. the information object is the basic unit of the access control level implemented in the information system. Then all other components of the web-oriented system can be attributed to the information management subsystem, presented in the form of information objects.

This concept lays a powerful foundation for the self-development of the information system.

Thus, based on the analysis of general approaches to the development of web-oriented information systems, it is possible to significantly increase the efficiency of the development and further development of these information systems, reduce maintenance costs and obtain a system with the ability to flexibly implement a security policy of the required complexity.

1. E. D. Braude Technology of software development. - St. Petersburg: Peter, 2004, - 656 p.

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Similar Documents

    Rationale for the choice of software used. Input and output information. Relational database model of the subject area. Creating an information system model using Run All Fusion Process Modeler r7. Test results.

    term paper, added 04/12/2014

    Consideration of the structure of the enterprise, an overview of modern software. Description of the personnel accounting information system. Creation of an information system for working with personnel based on the analysis of software products in this area.

    thesis, added 07/03/2015

    Design of automated information processing and control systems. Analysis of the structure and activities of the enterprise, the creation of models "as is". Identification of problem areas of the enterprise. Requirements for the structure and functioning of the system.

    term paper, added 12/29/2012

    The purpose of creating an information system. Automated information system "Construction enterprise". The use of computer technology and software to create an automated information management system in the enterprise.

    term paper, added 01/04/2011

    Acquaintance with the basics of the work of LLC "World of Computers". Description of the enterprise information system. Development of an object-oriented model of a subsystem using Rational Rose and a functional model of a subsystem using AllFusion Process Modeler.

    term paper, added 01/13/2015

    Description and scheme of information interaction of system elements, output and input information. Technological process of functioning of the system in an automated mode. Development of information support of the system, program module algorithms.

    thesis, added 08/30/2010

    Evaluation of the organizational structure and the process of implementing the information subsystem of the enterprise management department. Requirements for the information subsystem and technical support. Feasibility study for the development of an information subsystem.

    thesis, added 06/29/2011

    Substantiation of the need to improve the information system (IS) of Mekhservice LLC. Analysis of the accounting system for the activities of an auto repair enterprise. Development of the concept of building an automated IS. Information technology product description.

    thesis, added 05/22/2012







2023 gtavrl.ru.