Analysis of Qatar Softs Company Term Paper

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

The Middle East has been one of the fastest developing regions in the modern world. According to economist’s projections, the region’s rapid growth is expected to remain constant and rapid over the next couple of decades. As a result of this prompt growth experienced in the Middle East various industries have emerged that were not in existence earlier in this region. This includes, the building industry due to the rapid establishment of modern settlements as a result of exploding populations and the information and technology industry that has developed as a result of technological advancement in the region among other industries.

Qatar is among the countries that have thus emerged in recent years as a result of the rapid growth in the Middle East. As all other sectors of the economy grow in this country the I.T industry has witnessed slackened growth over the years. This paper will look at Qatar Softs Company; an I.T firm based in Qatar and is one of the 20 I.T firms based in this country. The core aim of this project is to design a system that will be adopted by the company for use in their new soon to be opened headquarters.

Aim and objectives

Several purposes can be propagated as to why it is important to develop this system. One is to ensure that proper research is carried out to facilitate the development of proper architecture for Qatar Softs. The other key objective to be achieved on the development of the system is to warrant that Qatar Softs is equipped with the appropriate tools to ensure it fully functions as a stand-alone and self-sufficient software development company. This in-turn gives the company an edge over its competitors. Another key aim of developing an efficient system for Qatar Softs is to ensure that customer’s needs and expectations are met in time and to the customer’s satisfaction.

Security standards need to be met within any system which is also another aim of developing this system. This proposed system must ensure that transactions within Qatar Softs are safe and secure. This is another aim of developing this system for Qatar Softs. Ensuring security within the system will safeguard that the system is out of reach for malicious characters whose aim is to destroy organisations through theft of information. A secure system further guarantees that employees are safe to share information within the system.

Overview

Qatar Softs is a mid-sized IT company that specializes in web design software development. It is a relatively new company in the market but has displayed exemplary performance in the market for the short time it has been in existence. Qatar Softs is on a mission to set up a new headquarters to base all its operations. It is expected that the headquarters will house between 50-100 employees who will be in-charge of different departments ranging from designers, administrators, finance controllers, as well as technical support staff. The only way to communicate in between all the sections in the company is through implementation of a well-designed network with several servers.

To facilitate the implementation of a running communication network that is also secure, several things must be ensured; a proxy server to maintain and ensure internet connection, web filtering and firewall to ensure maximum security is maintained and the most important communication tool exchange server. Currently the company only relies on telephone communication between different departments however with the opening of the new headquarters new secure modes of communication have to be designed for the company.

Deliverables for the system

Qatar Softs before anything else requires a strategic business location in a good geographical landmark where the headquarters should be set. This gives credibility to the company and increases its competitiveness in the market. It is further mandatory for the company to provide a 24 hour technical support system to assist in solving customer issues. This can either be achieved through telephone conversations, online chats, e-mail or messages on phone. To achieve this efficient communication system both for internal and external outreach certain technical requirements must be satisfied;

  • On call technical support to be available all the time to support customer.
  • Implementing Server/ Client environment to manage the employee activities through an AD.
  • Internet Connectivity for intranet and external communication.
  • Implanting exchange server

Capturing user requirements

Capturing of the users requirements for a system is a key part of any system development process. It is the first step that must be undertaken before any system is developed. This process is divided into three basic stages; one is the eliciting of requirements stage. This is where all the system requirements are captured by the developers from the users directly. Various methods are used to achieve this but the most efficient and commonly used methods are questionnaires and interviews. The next step is the validating of requirements where the developer determines whether a requirement is achievable or not. The final step is whereby all the captured requirements which are achievable are recorded and taken to the implementation phase.

Primary research

The main aim of carrying out primary research is to ensure that the requirements stated by the system users are necessary and that they are the key needs of the system. Various research methods were applied to capture the user’s requirements efficiently this include the use of questionnaires, carrying out personal interviews with the system users and lastly there is the use of site visits to carry out observations which enable the developers capture the user requirements.

All the system users were required to fill out certain questionnaires that were prepared based on the nature of work one does. This enabled the developers capture the specific requirements required for each department as well as the general requirements that were captured through personal interviews and site visits. On carrying out primary research various results were revealed which displayed the advantages that will be obtained on installing this new system;

  • It will be cheaper as communication costs will be greatly reduced
  • Enhanced security as communication will be more secure and protected
  • Better handling and storage of information
  • Improved sharing of information and files on implementation of the electronic archiving system within the new proposed system
  • Secure storage of information within the system by implementation of the file encryption technology in the new system

Secondary research

A secondary research is for most part carried out to test the implement ability and feasibility of the system requirements that have been captured in the primary research. It is necessary as it looks into detail as to how each of the requirements will be ensured and implemented into the new system, the implications that the new system will have, costs, benefits, pros and cons and other similar information. A secondary research was indeed carried out for this system. The general benefits that come with this system have been identified as those witnessed during the primary research. Enhanced security, better communication, better file storage and management and improved information sharing are the main benefits that will come with the installation of this new system.

Expected minimum requirements

Software requirements

On a fundamental level all servers will require a server operating system for the efficient control of the system. Windows Server 2008 will be installed on all servers to carry out this duty. It is the latest release of operating systems for servers, and it uses the command line interface for its operations. The advantage of this server operating system over its predecessor is the fact that it is multi-componentized in that it has a variety of components installed within it hence does not require external facilities for operation (Microsoft Support 2011).

It also has improved its hot patching abilities. This essentially means that the non-kernel patches automatically occur without the need for a reboot within the server which in-turn disrupts processes (Richard 2010). It further is advantageous in that it can actively partition hardware and allocate to different processes (Hynes 2006).

These are but a few of the improvements on this server operating system. The client computers will run on a regular operating system such as windows 7 premium which is the latest operating system release from Microsoft. The main advantage of this operating system over its previous versions from windows is its superior user friendly abilities as well as the enhanced sharing capabilities that have been added on to it (Nawaz n.d). This will improve interaction and facilitate further certain routine activities such as data organization and planning.

Hardware requirements

Qatar Softs will have to purchase three servers to be in command of controlling the network that will be created within the new headquarters. A cisco Catalyst 6509-E switch is among the required equipment to create a network. This is an advancement of its precursor the cisco catalyst 6509 switch. This 9-slot switch offers high port densities useful for distribution, data center deployments, wiring and core networks (Cisco 2011).

The system configuration also requires three cisco catalyst 6500 series. These are vital in the implementation of the intranet network for the system. They will among others provide double firewall services to further enhance network security, automate the workflow system via the artificial intelligence is built in them, save energy as they are energy saving, enhance application performance, among other key functions (Hardware Store n.d). Second Cisco Catalyst 6500 Series Firewall Services Module is also necessary in ensuring that security will be enhanced in the system (Mosaic Security Research 2010).

One Cisco Catalyst 6500 or a Cisco 7600 Router Anomaly Guard Module must also be included in this system. This is necessary to additionally supplement security for the system. It achieves this by filtering traffic and blocking or keeping out unidentified content that is malicious. A Cisco Aironet 1200 series access point is also a necessity to ensure that wireless networks to be run within the company all work smoothly. The system also requires two cisco 4400 series wireless Local Area Network controllers which work in conjunction with the Aironet 1200 to boost wireless networks strength and control the working of the Local Area Network (Berkeley 2004 & Andy 2007).

Deliverables

Some core necessities must be implemented to operate Qatar Softs in a proper way. One is the implementing of a Server/ Client environment to manage the employee’s activities through AD. This will ensure that the intra network communication is enabled to facilitate the proper sharing of information between networks which will in-turn improve efficiency. Internet Connectivity for outside relaying must be ensured. This is particularly very necessary as it provides the channel for external communication with the outside world. It is the main necessity that will ensure that the online chat communication for solving technical issues is up and running.

An external connection is also the link for the company with the outside. This is more so in the case of a website which acts as the face for Qatar Softs to the world at large. In view of the few factors mentioned above the company needs to have an internet connection. In a bid to ensure that the employees have an easy time with sharing of information as well as common storage of information it is vigorous to implant an exchange server. This will provide the root point for information sharing between different company branches. The above mentioned are but a few of the requirements that must be implemented, to establish the whole scenario for implementing the network and management solution and whatever else might be required for the efficient operation of Qatar Softs.

Focus on the deliverables

Implementing Server/ Client environment to manage the employee’s activities through an AD is the first major step. Any company would require some sort of administration level to operate and monitor employee activities. For this duty Microsoft active directory should be implemented in a small or Mid-range Company like Qatar Softs. A domain called QatarSofts.local will be installed and configured for use in this company.

This will be the fundamental access point for all communication. The windows server 2008 will be the domain controller for this domain as it is the latest server technology in the market with very superior capabilities. This DC will be the main controller for the network and since there will be more than one department within the company then each department will be having an OU with its privileges and policies applied respectively. The network created therein will ensure that users, printers, groups will all be objects in this forest and a proper design will be sketched and implemented.

Internet connectivity for outside relaying

As mentioned earlier an internet connection is very core for the company and this service one local Internet Service Provider will be contacted to provide internet connectivity to the company proxy server. It will then be the duty of the company I.T department to manage the internet connections for each machine on the network. They will also have the role of troubleshooting for any problems witnessed in this network. Intranet solution to internally connect the employees

The intranet solution is one of the best aspects of this project as the employees will require a tool to upload / share documents and information through the network. For this service Microsoft SharePoint is the most appropriate resource as it is client friendly as it is easy to use for all users (Microsoft Share Point 2010). It will be installed and configured in the system for use within the company and also a web server will be implemented to run the SharePoint portal application. Microsoft IIS server is the most appropriate as the program running the sharing application as it is compatible with it. Document libraries, news management, and calendars will be synced among all employees accessing the SharePoint portal this will ensure compatibility for all users.

Implanting exchange server

The communication in between employees and clients will be routed through a common exchange server which will be implemented and configured to run further assisting this goal. The windows server 2008 operating system will be used to run the server machine. Its implementation will for the greatest part ensure that information sharing is at a peak.

Quality management

This is a very necessary part of project creation. The main purpose of quality management is to check whether all the functions of the system that were captured in the primary research are functional. This is will be performed before the system is released to its users and any errors detected will first be corrected before release. The main areas of the system that will be tested include;

  • Connectivity capabilities
  • Bandwidth test to determine the speeds
  • File transfer
  • Security checks

Selecting an appropriate design methodology

Various system development methods have been proposed to use for the development of this system. This include; waterfall model which is a significantly controlled process that depends on planning and a set of arranged steps that run with each other like a waterfall (One Stop Testing n.d), Scrum is the other method that has been proposed. It is a relatively modern process. Projects undertaken using the scum method are precisely identified as result of their product backlog.

This is a list of tasks that prematurely end whilst the process is underway (Rudolf 2007). The Rational Unified Process (RUP) is a heavy process that needs adapting and changing to confirm the development process (IBM n.d & Reagan 2005). It is a step by step process that allows the developer to customise needs for the customer. The RUP is divided into different processes of software development;

  1. Inception is the initial stage.
  2. Elaboration stage is the presiding stage; here the projects requirements are all specified in every detail.
  3. Construction stage is where the actual software is developed; it is followed by a vigorous testing process.
  4. Transition stage is the final stage under the RUP software development process. This is the process where the software is introduced to the market for the actual users. Any corrections are made during this stage and the users are trained on its use (Serhiy 2009).

For this project I decided to use the sashimi methodology. This is another type of the waterfall model which is slightly different from the conceptual waterfall model. The difference is most pronounced in terms of steps taken in the software development process. When using the sashimi method it is allowed to overlap the steps taken and carry out one step before the other. The traditional waterfall model is very strict in that processes should occur in a step by step basis and no one step can be started before its predecessor is complete. The reason main reason why I preferred this method to all the other development methodologies is it flexibility.

It allows the developer test requirements way ahead of the step thus a developer will be able to identify loopholes before they occur. Using this method will allow me to test the viability of certain requirements before their implementation as opposed to implementing first then having to start all over again.

Conclusion

This paper has tried to explain and breakdown the whole system of Qatar Softs and all its requirements. It has further tried to give a broad view of the requirements for the system and all that is required for its implementation. It is expected that the management at Qatar Softs will look at this report and be able to make an appropriate decision concerning the system to be implemented.

References

Andy, C. (2007) Graphic Cisco 4400 Wireless Controllers, Cacti. Web.

Berkley, A. (2004) Cisco Aironet 1200 series, PCMag. Web.

Cisco. (2011) Cisco Catalyst 6509-E Switch, Cisco. Web.

Hardware Store. (n.d) Cisco Catalyst 6500 Series Switches, Hardware. Web.

Hynes, B. (2006) The Future of Windows, TechNet Magazine. Web.

IBM. (n.d) Rational Unified Process, IBM. Web.

Microsoft Share Point. (2010) Microsoft Share Point 2010, Microsoft Share Point. Web.

Microsoft Support. (2011) Windows server 2008, Microsoft Support Centre. Web.

Mosaic Security Research. (2010) Cisco Catalyst 6500Series Firewall Service Module, Mosaic Security Research. Web.

Nawaz, S. (n.d) Advantages of Windows 7, Buzzle. Web.

One Stop Testing. (n.d) Waterfall Model, One Stop Testing. Web.

Richard, R. (2010) Windows Server 2008 Review, Supersite for Windows. Web.

Reagan, B. (2005) Waterfall Model, Merttol. Web.

Rudolf, A. (n.d) what is scrum? Mountain Goat Software. Web.

Serhiy, K. (2009)EVP Consulting Services, Executive brief. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 26). Analysis of Qatar Softs Company. https://ivypanda.com/essays/analysis-of-qatar-softs-company/

Work Cited

"Analysis of Qatar Softs Company." IvyPanda, 26 Mar. 2022, ivypanda.com/essays/analysis-of-qatar-softs-company/.

References

IvyPanda. (2022) 'Analysis of Qatar Softs Company'. 26 March.

References

IvyPanda. 2022. "Analysis of Qatar Softs Company." March 26, 2022. https://ivypanda.com/essays/analysis-of-qatar-softs-company/.

1. IvyPanda. "Analysis of Qatar Softs Company." March 26, 2022. https://ivypanda.com/essays/analysis-of-qatar-softs-company/.


Bibliography


IvyPanda. "Analysis of Qatar Softs Company." March 26, 2022. https://ivypanda.com/essays/analysis-of-qatar-softs-company/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1