Website migration project 09Mar19 Essay

Website Migration

John Gentilini

Professor Hofkin

Systems Analysis and Development


Mar 09, 2019

Website Migration

Website migration is the transfer or a website from one hosting network to another. This requires the careful transfer of all essential files from one host to the next. The reasons some might want to transfer to a different hosting network may include dissatisfaction with what the original hosting network has to offer (memory space, bandwidth, security, features, downtime, etc.). In cases of transferring a website from an external host to an internal host, the webmasters might want to have more control of the website which could reduce costs, faster maintenance, control of security features, adding additional website features, and depending on the type of server they use for the website they could have expanded disk space for essential website files.

Kaye (2002)

Don't use plagiarized sources. Get Your Custom Essay on
Website migration project 09Mar19 Essay
Order Essay

Hosting Solutions

The migration process of a website from external hosting to internal hosting is not easy but it could be done effectively. There are several steps involved in this process.

First thing that has to be done is to schedule the migration. It’s best to schedule the migration at a time when the website is known to have very little traffic. Tony’s Chips most likely uses its websites for to create orders for other businesses and the traffic is usually slow during the weekend because most business happens during the week. It also recommended that the company notifies all customers, employees, stockholders, and any others who rely on the website about the scheduled migration because the system may be turned off for a specific period of time for the transfer. This will help them get any business they need to get done through the website before the scheduled migration in case the system needs to be shut down due to problems with the migration process. Kaye (2002)

Migrating the System

The next step that needs to be done is to make sure that all the website related data has been backed up. These include all files, images, multimedia, special features and anything else involved with the website. In case any problems should occur during the transition some or all of the data could be lost. An external hard drive is one of the best methods for backing up the files. Backing up all the files isn’t just for website migration, it is also important to back up the files on a regular scheduled basis so that the information would always be protected in case something happens to the server. It is also recommended that the website remains unchanged for a specific time period before the migration begins in order to allow more time to back up the files without work that there are more data, features, etc., will be forgotten or it would cause a delay in the scheduled migration. Kaye (2002)

The next step involves implementation. First of all, it is recommended that the original website under the original external hosting site should still remain with that hosting site for a period of 3 to 6 months, although the site will be inactive with them. This is in case if any problems occur with the website migration the company could still have their original website ready to be reactivated. Kaye (2002)

The internal host server will be an SQL database server. SQL (structured query language) is a language that allows PC users to communicate with servers and mainframes. A database server processes individual SQL commands. Shelly & Rosenblatt (2012)

SQL makes it easier for servers to store data and make it easy to modify such as updating new data or deleting irrelevant or wrong data. It also makes it easier for the user to retrieve the information needed. When attaching a website to an SQL server the database will go through many changes which will allow the users to fill the database with the essential data without having to create separate databases for the changes. Also, in cases of business activities, the SQL Database can store both public and private information and guide the user based on their level of access to which information they are allowed to access. Davis & Rajkumar (2004)

After implementing the website into the new server it should now go through a testing phase. Here is where you can make sure everything is running as how the original website would’ve been and test any added new features. Every aspect needs to be tested thoroughly to determine if there are any defects that need to be fixed. This includes access to data, links, multimedia, email system, ordering system, etc. This will also be a good time to test the security controls to make sure the data that is stored in the database can only be access by those who are allowed to view it. Kaye (2002)

Also, testing the security can make sure that the system won’t be easily accessed by hackers or susceptible to viruses, malware, or other potentially dangerous programs that could negatively affect the system. An adequate firewall system needs to be in place before the website becomes activated. A firewall isolates a private network from a public network by controlling how clients (computers that users use to interact with the server) from outside can access the internal servers. Often, the firewall software runs on a router or a bastion host (a host compute that is directly linked to the internet and therefore fully exposed to attacks, so a bastion host is never recommended) that sits between the host server and the Internet and blocks potentially dangerous or questionable transactions from getting in or out. Davis & Rajkumar (2004)

Once it has been determined that the website is working perfectly and there are no problems that can be determined, the original website can be safely shut down (but still remain with the original hosting site as discussed earlier) and the new website in the internal company server will be activated. Sometimes this can happen almost immediately. The website will still need to be carefully watched in case of any unforeseen problems which the IT staff or Database Administrator (DBA) can fix. Kaye (2002)

Evaluate alternatives to the company self-hosting the site.

There are several web hosting techniques that someone can choose from depending on the type of website that you need a hosting site for. The following are just four types of hosting methods that are considered very popular and are suitable for businesses such as Tony’s Chips.

The type of hosting that was just described is typically called dedicated hosting in which the server only hosts one website. This is mostly used for online businesses; it can be used as either external or internal hosting, although it would be more expensive externally because there’s a lot more for the external hosts to do to manage the system while an internal dedicated server can be controlled by the company personnel, such as the IT staff, DBA, or those who may have some technical knowledge of servers and website control. With no other website sharing the server it would allow for more disk space to be used for the files and won’t slow down the performance and speed of the one hosted website. Pederson (2002)

The opposite of the dedicated hosting, and considered the most popular web hosting method, is shared web hosting, in which multiple websites are simultaneously hosted on the same server. This is mostly used by external hosting sites such as Go Daddy. This is what Tony’s Chips previously had. This is mostly popular with individuals who run blogs or small businesses online and it cost them very little a month, depending on the hosting site. The problem is that you won’t have full control of the website and sometimes won’t get any fast responses if there are any performance issues. Pederson (2006)

Another web hosting option is a virtual private sever (VPS). It’s considered an in-between option of dedicated hosting and shared hosting. The server is separated into several smaller servers where the website is split between all of them but combines in the same way to make the website whole. It is considered to be more secure than shared hosting and is mostly used by small businesses, marketing firms, and some individuals who have the technical knowledge to do it themselves. This is considered to be more efficient than dedicated or shared hosting because it would have more resources for the website to take advantage of. However, the main disadvantage is that because its separated into several virtual servers there is limited disk space and memory available, even for hosting just one website, whereas dedicated hosting would have plenty. Pederson (2006)

Cloud hosting is somewhat similar to VPS, except that instead divided the server between several virtual servers, cloud hosting actually uses a multi-server system. These connected servers form a cloud computing system and through this the websites can utilize the resources of all the servers at once such has processing capabilities, memory, disk space, etc. A big advantage is that if one server shuts down the websites would just use the resources from the other servers. Pederson (2006)

There are two forms of cloud hosting, public and private. Public cloud hosting is less expensive than private and the resources are more available to the public. The only problem is that it has some serious security issues and can be exposed to hackers or malicious software. Private cloud hosting is more secure but it costs more to use. Also, public doesn’t allow much customization of websites, but private offers more customization and more control of the data to the users. Pederson (2006)

There are a few other disadvantages of cloud computing. First websites will suffer some downtime if the connections between servers are working properly. It’s still not widely used and not easy for all companies to create an internal cloud-computing system so they will more likely have to rely on an outside service. Also, in most cases you will have to rely on a third party to handle the security which is risky and costly. Pederson (2006)

Gantt chart


This architecture was chosen because it follows the requirements that the company needs for the website’s implementation. It follows seven specific issues that are essential in creating a necessary and successful architecture that are part of a checklist for users to focus on when creating the architecture. Those issues are described as follows:

Enterprise Resource Planning (ERP) – This planning establishes a company-wide strategy for using IT resources including data, processing, network and user interface design, and describes specific platform for the hardware and software that ensures connectivity and easy integration of future systems, including in-house software and commercial packages.

Initial Cost and TCO – This architecture shows that it could be economically feasible for the company.

Scalability – This architecture shows that it could expand, change, or downsize easily to meet the changing needs of the company.

Web Integration – The architecture shows that it could easily include all of the websites applications associated with the website into the system.

Legacy System Interface Requirements- the new system can interface easily with the legacy systems.

Processing Options – Shows that the system and website can process data – online or in batches. It also shows that the data in the system can be backed up and recovered easily in case of any failures to the system.

Security Issues – Shows that all security concerns are taken care of. Security controls include Intrusion detection systems, password protection for all users, firewalls in routers and server, software to protect against hackers and malicious software, etc.

Shelly & Rosenblatt (2002)

System Architecture Diagram:

Use Case Diagram:


If there was ever a problem with a website on an external hosting site you would call that company to explain the problem and have them solve it. For internal hosting the responsibilities for solving and preventing any problems to the website is more on the company’s IT staff and DBA. The responsibilities include:

System Support – resolving any issues pertaining to the systems operations which could include servers, operating systems, software and applications. As well as keeping up to date with the systems software and hardware.

Security – keeping the firewalls and security software up to date. As well as resolving and preventing any security issues. As well as protecting private information from unauthorized users.

Backup and Recovery – Making sure the database is periodically backed up and data can easily be recovered in event of system failures or lost data. Kaye (2002)


The performance of the new system holding the migrated website can easily be assessed if it passes the following guidelines:

Must support over 25 users online simultaneously.

Response time must not exceed four seconds.

System must be operational seven days a week, 365 days a year.

Accounts receivable system must prepare customer statements by the third business day of the following month.

Online inventory control system must flag all low-stock items within one hour after the quantity falls below predetermined minimum. Shelly & Rosenblatt (2012)


Shelly, Gary B. & Rosenblatt, Harry J. (2012). Systems Analysis and Design (9th edition) Mason, OH; Cengage Learning

Davis, William S. & Rajkumar, T. M. (2004). Operating Systems (6th edition) Oxford, Oh; Pearson Education, Inc.

Kaye, Doug (2002). Strategies for Web Hosting and Managed Services (1st edition) New York City, NY; John Wiley & Sons

Pederson, Aric (2006). Web Host Manager Administration Guide (1st edition) Birmingham, B27 6PA, UK; Packt

Still stressed from student homework?
Get quality assistance from academic writers!