I. System Objectives
System objectives include: (1) the establishment of the network structure of the workstations of various departments of the enterprise, composed of enterprise network information system. (2) the establishment of sewage treatment plant information management, the realization of the rationalization of the application of enterprise resources, the establishment of the annual plan of the enterprise, the balance of material planning and production capacity plan, the dynamic tracking of the monthly production plan; supervision and control of process operation and the establishment of the financial computerization of the enterprise, the enterprise's manpower, equipment, materials, production methods of the four basic elements of the enterprise to carry out a comprehensive and balanced management, for the enterprise's production, business decisions to provide an accurate basis. Accurate basis for production and operation decision-making. (3) Provide a comprehensive information query system to provide analysis and solution basis for the decision-making level. (4) Establish the technical file database of sewage treatment industry. (5) Realize water quality monitoring and analysis. (6) Realize plant information management. (7) Realize enterprise information resources and equipment resources **** enjoy. (8) Establish enterprise office automation system. (9) The establishment of information communication platform with external enterprises, and gradually meet the enterprise's e-commerce needs.
Second, the information management system target setting
Information management system mainly includes production data management and analysis, material inventory management, production planning, fixed asset management, equipment management, human resource management, quality management, comprehensive query, file management and other sub-systems module. The specific objectives to be achieved by each system are as follows: (1) Data management and analysis. Real-time collection of production data; analyzing current production status through production data; managing historical production data. (2) Material inventory management. Improve the level of service to ensure that the supply of all kinds of materials required for production and operation is economically and reasonably met by equipping them on time, in quantity and in sets according to varieties; improve the management level of inventory, reduce the occupancy of inventory funds, and accelerate the turnover of working capital; reduce the consumption of materials, reduce the cost of products, and improve the utilization rate of materials. (3) Production planning. Guiding the smooth progress of production and operation activities, realizing the planning and control of the whole production and operation activities; using computer to deal with a large amount of information in the process of planning, so that the plan has a good resilience; coordinating the gap between the available resources and the demand for resources, i.e., realizing the management of optimal allocation of resources; rationally arranging the manufacturing resources, organizing the production in an efficient and low-consumption way; and realizing the querying of the relevant production plan through the network. (4) Fixed asset management. It mainly deals with the accounting of the increase, decrease and change of fixed assets, depreciation and registration of fixed assets, etc. Fixed asset items can be set up arbitrarily according to the needs. (5) Equipment management. Monitor the situation of equipment and establish equipment file management. (6) Human resource management. (7) Comprehensive inquiry. Query the data of each subsystem; different users are given different query rights. (8) File management. Category management, clerical file management, scientific and technological file management; modification, addition, deletion, insertion, categorization, serial number adjustment, etc. of all files according to the year, classification number and retention period and other grouping information.
Three, the system planning program
(a) system design principles
(1) system standardization and normalization. Standardization and normalization of the system is a key step in the construction of information systems, to achieve information **** enjoyment, it is necessary to standardize information technology standards. (2) the practicality, stability and reliability of the system. System construction should meet the business needs of the work as the primary goal, the construction program to the actual acceptable capacity as a yardstick, to avoid the blind pursuit of new technologies. The software, hardware and information resources in the system should meet the reliability design requirements, and the system must be able to operate safely for a long period of time, i.e., the design of the system must be under the condition of acceptable cost, and the system structure, design scheme, equipment selection, technical service and maintenance response capability of the manufacturer, spare parts supply capability and other considerations should be taken into account, so as to make it as possible that the possibility of system failure is as little as possible, and there are contingency work programs and countermeasures for various emergencies that may occur. The work program and countermeasures. (3) System security. Following the relevant information security standards, the system has a strong security and defense mechanism, and should provide multi-mode, multi-level and multi-channel security measures to prevent illegal intrusion and leakage of confidential information in various forms and ways, and to ensure the security of system information. (4) System flexibility and expandability. Computer technology is developing rapidly, changing rapidly, the system should be designed to ensure software compatibility, the use of minimum cost, so that the network system structure smooth transition to the new network structure system, can be flexibly expanded. The system should have a strong resilience, the realization of the program and processing data separation, processing data changes do not require modification of the application software, such as forms, data structure definition, both to meet the requirements of the higher levels, but also to meet the user's own special needs, the user can be flexibly defined and change.
(ii) network structure
The network is mainly composed of two parts: the enterprise intranet and information dissemination system. According to the needs of the enterprise user information management system, in the design of the network system, the use of advanced and mature Fast Ethernet technology, to optimize the performance-price ratio to achieve high performance and high reliability of the entire network system. In this way, users in the field can also access this information system through the public network. The objectives of the network design are: (1) the system adopts the star network structure, and the damage of a single machine has no effect on the whole system; (2) high fault-tolerant technology is adopted, and the system can be operated uninterruptedly; (3) the star cabling makes the site unrestricted, and the system does not shut down when the site is increased or decreased; (4) practical client/server and browser/server structures are adopted; (5) the server adopts the easy-to-manage Windows NT system; (6) the client uses the convenient and practical Windows 98, 2000 and XP.
(C) Intranet/Web open platform
Intranet is the internal network of the enterprise, which can either be independent of its own system, or it can be very convenient to become a part of the Intranet through the access method. The technical basis of Intranet is Web technology, since its inception, it has quickly developed into a collection of Intranet service functions, one of the advantages of its protocols and technical standards of openness, is not limited to any hardware platform or operating system, and can support a variety of models and operating system platforms at the same time.
Intranet is an internal network of enterprises, it can either be independent of its own system, or can be very convenient through the access method to become part of the Intranet. The Web uses the HTTP hypertext transfer protocol, using the document format is HTML. this document format ensures that the data in a variety of platforms, different browsers under the consistency of the Web browser has a very friendly user interface, anyone only need to move the mouse can roam in the ocean of information, and any one of the existing office automation software compared to the advantages of it is incomparable.
(D) system software
(1) operating system Windows NT Server. The system provides a complete program for the computing environment of various organizations. From file printing operations, to Intranet and Internet services, mission-critical application support, all services are embedded in the operating system. Starting from the basics, Windows NT Server is designed to be the most integrated, complete, and convenient server operating system, and provides the evaluation, reliability, and manageability necessary for mission-critical applications. (2) Database System SQLServer 2000.SQL Server 2000 is a comprehensive distributed management framework structure that centrally manages all database servers in an organization. With enhanced Windows-based management tools and powerful server-based job scheduling, it is possible to intuitively control multiple servers and automate the execution of remote operations consisting of distributed environment commands. With Internet integration in mind, SQL Server also provides a high-performance Web page information access mechanism. Its new component, Web Assistant, can promote Web services by utilizing SQL data in a variety of ways, allowing the distribution of company data on a private Intranet network or on the Web of a world-wide network (Internet). (3) Client system software. Client operating system can be used Windows NT Workstation 4.0 or Windows 98 Chinese version.
(E) system security strategy
Modern enterprise information systems require a strong security monitoring capabilities, not only against external intrusion, but also according to the degree of confidentiality of information, the internal user rights control. MRP2 adopts the overall system security strategy, from the user's awareness, the network system, the application system, and so on, to ensure that the information system to maximize the security of the operation.
(1) System security strategy design principles to ensure the security of the network system is a systematic project, the system design alone can not completely solve the problem, but also need to network system managers and users of close cooperation. Therefore, when considering the security strategy of MRP2, the following principles should be followed: to enhance the security awareness of leaders at all levels, system managers and all users, to formulate system security management specifications, and supervise the implementation of regular checks; to provide network security protection measures; to provide application system security protection measures.
(2) with the Internet connected to the enterprise intranet (Intranet) on the one hand, has a good openness, resource **** enjoy, protocol common and interconnection convenient, but at the same time brings a serious security problem, we must open the internal network of the enterprise to the outside world to protect the enterprise's confidential information from rivals, hackers and the invasion of the lawless elements. To this end, network-level security controls must be addressed. Generally, it can be considered from three aspects. The first is system security. System security includes the administrator's account and password, database access rights, E-mail and other aspects of the problem. In terms of operating systems and database management systems, manufacturers have made full consideration of security issues, the key is how users can strengthen management, such as access to important occasions, the quality of system administrators, account management strategy. The second is information security. It is mainly for special information encryption. The third is network security. Firewall technology is usually used to ensure. Firewall is a method to isolate the intranet from the Intranet. It can ensure that the internal network and the outside world communication with the same progress, reduce the virus from the outside world of the infestation. Firewalls are usually realized in two ways - packet filtering-based firewalls and proxy-based firewalls. Most routers support firewall software, and this router-based firewall software applies to the entire network.
(3) System-level security policies. The first is passwords. Password identification is a low-cost, easy-to-implement user identification technique that is widely used within information systems. In the password identification mechanism, the information system assigns each user a user identification and a user password. The user identification uniquely identifies a user and is public; the password is used to authenticate the user and is confidential. Users to register into the system, you must first submit its user identification and password to the system, the system according to the user's technical identification to determine whether it is a registered user, and then according to the password to decide whether to let it register. The second is access control. Access rights control technology is to protect the security of resources under the conditions to achieve resource **** enjoyment, in the form of access control tables to specify the user's access to files, databases, devices, etc. (read, write, save, delete, etc.) The third is to take full advantage of the security policies of Windows NT. Including domain user management, server mirroring and disk mirroring technology (to ensure data security) and so on. The fourth is the proxy (Proxy) security policy. The use of this policy can prevent unauthorized users from connecting to the corporate intranet; combined with NT user authentication, allowing administrators to set who uses the Intranet and which services; through the IP address or domain to prevent access to restricted sites. Fifth is to take full advantage of the security policies provided by the data management system. This includes user authentication, setting access rights to databases, and so on.
More about the engineering/service/procurement category of tender writing production, to enhance the winning rate, you can click on the bottom of the official website customer service free consultation:/#/?source=bdzd