Skip to content

Willowbrook School Case Study

Willowbrook School is a small private school that has retained your services as a systems analyst to assist in the development of a new information system for the school’s administrative needs.

The Willowbrook School staff accepted your interface, output, input, and data designs. Now you will determine the system architecture, which translates the logical design of an information system into a physical blueprint.

Tasks 1: Design a system architecture for Willowbrook School based on file server or client/server architecture? Discuss advantages and disadvantages that should be considered when making this decision within the context of Willowbrook School. Speak to the cost-benefit issues of file server and client/server designs.

Tasks 2: Based on your chosen architecture from task 1, what physical and logical network topology would you recommend for Willowbrook School?

Tasks 3: Now that you have developed a systems architecture and physical topology for the network, make a list of the hardware that will be required for Willowbrook. Review the background information in previous chapters to develop your list.

Tasks 4: Write a system design specification document for Willowbrook’s new information system.

The systems design has been completed and design specifications approved. You are now beginning the implementation phase of the SDLC, which includes application development, installation, and evaluation. One of the parents at Willowbrook has extensive experience with the database package as a Database Administrator at a local company, and has committed to providing 15 hours per week working with you to develop and test the project. You should assume that the server, switch, and workstations discussed in Part A have been purchased, installed, and networked.

Tasks 5: Choose an application development methodology for the Willowbrook system. Discuss the advantages and disadvantages of structured, object oriented, and agile development.

Task 6: What types of testing should be performed? What types of test data should be used?

Task 7: Identify the specific groups of people who need training on the new system. For each group, describe the type of training you would recommend and list the topics you would cover.

Task 8: Develop a plan for data conversion and system changeover that specifies which data items must be entered, the order in which the data should be entered, and which data items are the most time critical. Discuss what method should be used for system changeover.

Task 9: Presentation (cover sheet, clarity, and professionalism).

SYSTEM ANALYSIS AND DESIGN: WILLOWBROOK SCHOOL

Part A

Design of the System Architecture

The development of technology and the significant benefits and advantages that information systems offer to companies and organizations has forced most organizations and companies to develop and implement information systems. The system development process is a set of activities, methods, best practices, deliverables, and automated tools that stakeholders use in the development and maintenance of information systems and software. While these processes vary from one organization to another depending on the needs of these organizations, there are common characteristics that can be found. One of these characteristics is that the development process follows a seven-steps process including the identification of the problem, analyzing and understanding the problem, identification of the requirements and the expectations of the solution, identification of the different alternatives and selection of the most appropriate alternative, designing the selection solution, implementation of the solution and evaluation of the results with regard to the initial requirements (Whitten & Bentley, 2007). Willowbrook School is an institution seeking to develop a new information system for their company.

The Willowbrook School seeks to develop a new information system in order to handle the requirements of the institution as well as the students and staff. The system should allow students and staff to access the information resources of the institution as well as allow the management of information and data. In light of these requirements, a client server architecture favors this form of systems in a significant manner. Though a file-server architecture would also work for the particular case, it will limit the flexibility and the scalability of the system. Furthermore, it is important to note that there are many data transmission and storage required due to the expected use of the system by both the students as well as the staff members.

In a client-server system, most of the processing and data access control processing is performed by the server (Zhang, 2013). The clients send requests to the server to access specified information from the server. The server then processes the request and either grants access to or denies access to the file based on the set configurations. In a client-server architecture, the files are stored in a central location which makes the administration of management operations easy for the information technology specialists. Secondly, the network peripherals are controlled from a central location. This centralization of both resources as well as data makes the administration and administration operations easy to control.

Based on the discussion and explanation provided by Oluwatosin (2014), the following diagram demonstrates a client-server system architecture. The clients can only access the data and the network resources through the server. The server acts as an interface between the client applications and the main data storage.

In comparison to the file server system, client server offers a significantly high performance in processing and replying to the requests by the client applications. According to Lin (2011), the clients request for services from the server which then processes the data and the request and then sends back the results of the processing work back to the clients who requested for services. High performance systems are required in the servers and as such, the client machines required may not be as powerful and costly as the servers. In comparison, processing operations are performed in the user machines in a file server system. This means that the system becomes more and more expensive as more and more users need to connect to the system.

Logical and Physical Topology

Based on the requirements of the network system, I would recommend the application and implementation of a hybrid topology. Hybrid topology is implementation and combination of more than one network topology. As Bisht & Singh (2015) explains, each network topology has its advantages and disadvantages. For instance, the bus topology is easy to implement and scale but has a major bottleneck because heavy network traffic can significantly slow down the entire network system. The star topology offers good performance and is easy to scale but is totally dependent on the central hub, a single point of failure. The combination of these different network topologies results in more powerful and superior network topology that combines the advantages of each of the network topology. A hybrid network topology is reliable, scalable, flexible and highly effective and does not introduce the single point of failure that is inherent in other network topologies.

Hardware requirements of the System

As explained in the introduction, the information system of Willowbrook School will follow the client-server approach and the hybrid topologies for the subnetworks. Another main consideration that needs to be taken care of during the design is the issue of network security. According to the research conducted by Prabakar, Marikkannan & Karthik (2012) though network systems provide benefits and advantages such as the freedom of mobility and enabling users to connect to devices and systems far away, they also bring in more threats to the companies than the traditional models of communication. As such, network security is essential in every network system. As such, the following are the hardware requirements of the proposed network system:

Two routers: The router connects the organizational network system to the internet. The use of a single router introduces the single point of failure in the network system and this using two routers to connect to the internet will eliminate the single point of failure challenge.

Three firewall systems: As explained above, security of the network system is essential. A firewall is a hardware device used to reinforce security policies (Taluja & Dua, 2012). It does this by filtering content into or out of the organizational network based on the content of the traffic.  These firewalls will be used in the implementation of a dual-firewall demilitarized zone for the security of the network system.

Switches: Based on the total number of client devices required in each department, switches that effectively connect all the devices on the department. Each department will be considered as a subnetwork and thus will need at least one switch.

Access point: Being an institution, most of the students attend classes with handheld devices such as tablets, laptops and smart phones. The Access point will be used to connect these devices through a wireless connection.

Communication medium: The institution’s network system will be comprised of both cabled network system and a wireless communication. To connect devices in the offices, CAT5E network cables will be used.

Servers: As explained above, servers services the requests from the clients. Some of the main servers required in the network include a database server, email servers, HTTP servers and others as may be required by the institution.

Client computers: These are the computer systems that are used by the staff and students at the company. Computers with a minimum configurations of 1.6 GHz processors, 2GB random access memory and a 40 GB hard drive will be sufficient for the institution.

Fiber optic cable: To ensure high performance of the network system, a fiber optic cable will be used as the backbone of the network system, connecting the various departments and buildings.

System Design Specification Document

Overview:

This is a system design specification that details on the network system for the Willowbrook School to be used to connect the staff members as well as the students to the institution’s resources. The network is to be designed following the client-server architecture with each department forming a subnetwork of the entire network system.

Development tools:

The main software system that will be used in the development is packet tracer software. Packet tracer will be used during the design and implementation of the network system. SQL system will also be used for the implementation of the database system of the institution.

Interface design:

Though a software system for the administration of the network system can be developed from the beginning, this will not be cost-efficient. Today, the market has many cheap off-the-shelf software systems for the management of network.  The most appropriate for this network system is the PRTG Network Management Software that offers services for monitoring the bandwidth, the availability of the different resources, performance and load monitoring (Paessler AG, 2016). The interface will be developed by NetBeans Java software development platform.

Database design:

An SQL database will be developed to store data for the institution. However, depending on the needs of each department, different database systems will be developed for each department. A library database will be developed for the library, an accounting database will be developed for the accounts and finance department and a student’s database will be developed for the student registration department.

System security:

The registration of users of the network system will be done by the network administrator. Each user will be provided with a unique set of username and password through which they will gain access to the network resources. Network firewalls and demilitarized zones will be implemented to ensure security of the network system.

Implementation:

The system would be implemented as a secure, reliable and accessible system for all the authorized users.

Part B

Selection and Justification of Methodology

There are numerous different software development methodologies that are applicable in the development of a software systems. However, each of these development methodologies is applicable and most suitable for specified problems. As it was earlier explained, the institution’s system can be broken down into several sub-systems and phases. As such, the iterative and incremental methodology is the most suitable for this project. This methodology seeks to develop the application one step at a time in the form of an expanding model (Duggana & Thachenkaryb, 2004). Basic on the initial instructions and specifications of the project, an initial model of the application is developed. After its evaluation, the basic model is expanded until the final system is completed. Unlike prototyping, the first prototype of the system is not discarded. The feedback of the project owner is received after each of the iteration meaning that the system development follows the required direction in meeting the objectives of the system developer. The primary advantage of this methodology is that it mainly emphasizes on the design rather than the documentation and deviations from the main research objectives can be depicted earlier in the development phase (Despa, 2014).

Testing

Verification and validation are some of the main phases in system design and implementation. According to Sommerville (2007), validation answers the question of whether the right product is being developed while verification answers the question of whether the system is being developed in the right manner. To ensure validation and verification, two types of testing shall be conducted including system testing and release testing. Under system testing, the developers will conduct performance testing to evaluate the performance of the system, unit testing to evaluate the operations of each component and integration testing to ensure that the components operate as required when integrated. Under release testing, the developers will conduct requirement-based testing to ensure all the requirements have been met.

Training

Three groups of people will need training in this system. The students will need training on how to access and make use of the institution’s resources during their learning. To achieve these, on class training will be done as well as the production of training manuals for the students.

The other group is the group of institution’s staff members. The staff members in the institution will not only be required to insert data into the system but will also be responsible for managing the data stored in the system. As such, they will require training to be in a good position to carry out their operations in an effective and efficient manner.

Finally, the last group that will require to be trained is the group of information technology specialists and the members of the IT department in the institutions. As was explained, these are the main administrators in the system. They can do all the operations that other people can perform.

Change over

There are mainly four different types of changeover techniques that can be applied in conversion of one information system to another. These include the direct changeover, pilot changeover, phased changeover and the parallel changeover. Each of these techniques has its advantages and disadvantages and is suitable for some instances and not in others. The direct cutover is the direct approach in which the services of the old system are directly cut and taken over by the new system (Mallach, 2009). This approach is significantly risky and may involve losses in data. In parallel changeover, the two systems are allowed to execute and be used until the new system is verified to be operating as required, after which the old system is eliminated. In pilot changeover, the new system is allowed to operate at a specified section of the organization while the old system continues operation in the other sections of the organization (Mallach, 2009). After the system proves successful in the pilot site, in is implemented fully in the rest of the organization. As it was explained earlier, this is a new system that is expected to replace the existing system. Failure of correct operation of the new system can have substantial impacts to the institution. As such, parallel changeover is the most appropriate for this system. The two systems are allowed to operate until the new system is verified to be operating correctly after which the old system is removed from operation.

References;
  • Bisht, N. and Singh, S. (2015). Analytical Study of Different Network Topologies. International Research Journal of Engineering and Technology, [online] 2(1), pp.88-90. Available at: https://www.irjet.net/archives/V2/i1/Irjet-v2i120.pdf [Accessed 28 May 2016].
  • Despa, M. (2014). Comparative study on software development methodologies. Database Systems Journal, 3(1), pp.34-56.
  • Duggana, E. & Thachenkaryb, C. (2004). Integrating  nominal  group  technique  and joint  application  development  for improved  systems  requirements determination. Information & Management, 41(4), pp. 399–411, DOI:  10.1016/S0378-7206(03)00080-6
  • Lin, J.-C. (2011). Various Approaches for Systems Analysis and Design.
  • Mallach, E. (2009). Information System Conversion Strategies: A Unified View. International Journal of Enterprise Information Systems, 5(1), pp.44-46.
  • Oluwatosin, H. (2014). Client-Server Model. IOSR Journal of Computer Engineering, 16(1), 67-71.
  • Paessler AG, (2016). Network management software – PRTG Network Monitor. [Online] Paessler.com. Available at: https://www.paessler.com/solutions [Accessed 28 May 2016].
  • Prabakar, D., Marikkannan, M. & Karthik, S. (2012). Various Security Threats and Issues in Wireless Networks: A Survey. International Journal of Advanced Research in Computer Engineering & Technology, 1(10), 296-300.
  • Sommerville, I. (2007). Software Engineering. 8th ed. New York: Pearson Education Limited, pp.516-520.
  • Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, 30(2), 109-116.
  • Taluja, S. & Dua, R. (2012). Survey on Network Security, Threats & Firewalls. International Journal of Advanced Research in Computer Engineering & Technology, 1(7), pp. 53-58.
  • Whitten, J. and Bentley, L. (2007). System Analysis and Design Methods. 7th ed. New York: McGraw-Hill/Irwin., pp.28-35.
  • Zhang, H. (2013). Architecture of Network and Client-Server model. arXiv preprintarXiv:1307.6665.

New York State Association for Retarded Children v. Carey

A watershed case in the evolution of the legal rights of people with disabilities to live in dignity arose out of public awareness of the horrific conditions under which children and adults with disabilities were living at the Willowbrook State Developmental Center in New York. This case set important precedents for the humane and ethical treatment of people with developmental disabilities living in institutions. This, in turn, served as the impetus for accelerating the pace of community placements for people with developmental disabilities, expanding community services, increasing the quality and availability of day programs, and establishing the right of children with disabilities to a public education.

Inhumane Conditions at Willowbrook

Willowbrook was a complex of buildings on Staten Island housing children and adults with developmental disabilities. At its highest population, in 1969, 6,200 residents were living in buildings meant to house 4,000. Understaffed, overcrowded and underfunded, Willowbrook was little more than a “human warehouse,” according to William Bronston, a physician at Willowbrook. The institution’s overcrowding fostered abuse, dehumanization, and a public health crisis. Hepatitis was so rampant that several researchers took advantage of the situation to use residents as participants in a controversial medical study in which residents were intentionally exposed to the deadly virus, without their consent, in order to test the effectiveness of various vaccines.
In 1965, Senator Robert Kennedy paid an unannounced visit to Willowbrook. He found thousands of residents “living in filth and dirt, their clothing in rags, in rooms less comfortable and cheerful than the cages in which we put animals in a zoo.” Kennedy went on to describe the institution as a “snake pit.”[1] The visit put conditions at Willowbrook into the national spotlight and the state of New York responded by developing a five-year improvement plan. However, after making minor adjustments, conditions at the institution quickly reverted to the inhumane conditions that had thrust it into public consciousness.

In 1972, ABC News investigative reporter Geraldo Rivera again drew national attention to Willowbrook with a television exposé that was watched by millions. Willowbrook: The Last Disgrace, exposed the institution’s serious overcrowding, dehumanizing practices, dangerous conditions and regular abuse of residents. The public was again outraged. However, this time, the outrage served to spur parent advocacy groups to take action in federal court.

The Willowbrook lawsuit

Following the Rivera exposé, parents of Willowbrook residents filed a class action suit in U.S. District Court for the Eastern District of New York on March 17, 1972. The lawsuit alleged that conditions at Willowbrook violated the constitutional rights of the residents. Parents outlined multiple violations, including:

  • Confining residents for indefinite periods;
  • Failing to release residents eligible for release;
  • Failing to conduct periodic evaluations of residents to assess progress and refine goals and programming;
  • Failing to provide habilitation for residents;
  • Not providing adequate educational programs, or services such as speech, occupational, or physical therapy;
  • Failure to provide protection from theft of personal property, assault, or injury;
  • Inadequate clothing, meals, and facilities, including toilet facilities;
  • Confining residents to beds or chairs, or to solitude;
  • Lack of compensation for work performed;
  • Inadequate medical facilities; and
  • Understaffing and incompetence in professional staff.

The lawsuit sought immediate injunctive relief to improve conditions at Willowbrook, including hiring more staff, providing adequate medical care, prohibiting the use of seclusion and improper physical and chemical restraints, and providing adequate and appropriate clothing and physical conditions for residents. The plaintiffs alleged that the existing conditions violated the residents’ constitutional right to treatment under the Due Process Clause of the Fourteenth Amendment, and that their denial of a public education violated the Equal Protection Clause of the Fourteenth Amendment.

In April 1973, U.S. District Court Judge Orrin G. Judd rejected the plaintiffs’ arguments that the Due Process Clause guaranteed a right to treatment and that the denial of public education violated the Equal Protection Clause. However, he did find that the conditions in Willowbrook violated the constitutional right of persons living in state custodial institutions to be protected from harm. According to Judge Judd, the plaintiffs’ constitutional right to protection from harm in a state institution meant that the residents of Willowbrook were “entitled to at least the same living conditions as prisoners.”[2] This right, he continued, “may rest on the Eight Amendment, the due process clause of the Fourteenth Amendment or the equal protection clause of the Fourteenth Amendment (based on irrational discrimination between prisoners and innocent mentally retarded persons).”[3] Accordingly, Judge Judd granted much of the requested injunctive relief, including prohibiting the use of seclusions and restraints, increasing medical, therapeutic and recreational staffing, requiring maintenance, and requiring regular progress reports.

With this injunctive order in place, the case proceeded to trial on October 1, 1974, with the parties continuing negotiations for months afterwards. The case was settled on April 30, 1975, when Judge Judd signed the Willowbrook Consent Judgment: New York State Association For Retarded Children, Inc., et al., v. Hugh L. Carey, 393 F. Supp. 715 (1975).

The Willowbrook Consent Judgment

The Willowbrook Consent Judgment set forth guidelines and requirements for operating the institution and established new standards of care for all Willowbrook residents at the time of the settlement. These standards of care were “not optimal or ideal standards, nor . . . just custodial standards.” They were based on the recognition that people with developmental disabilities, “regardless of the degree of handicapping conditions, are capable of physical, intellectual, emotional and social growth, and upon the further recognition that a certain level of affirmative intervention and programming is necessary if that capacity for growth and development is to be preserved, and regression prevented.”[4] The Consent Judgment outlined specific procedures and instructions for treatment of residents, covering issues such as resident living, the environment, programming and evaluation, hiring of personnel, education, recreation, food and nutrition, dental and medical care, therapy services, use of restraints, conditions for residents to provide labor to the facility, and conditions for research and experimental treatment. Significantly, the Consent Judgment also declared as the primary goal of the institution and the New York Department of Mental Hygiene to “ready each resident…for life in the community at large”[5] and called for the placement of Willowbrook residents in less restrictive settings. The Consent Judgment set a goal of reducing the number of residents living at Willowbrook to no more than 250 by 1981[6] although this did not prove feasible.

Although the parties ended up in Court many more times in disputes over the ongoing implementation of the Consent Decree, it was, in a sense, fully implemented in 1987, when the Willowbrook State School and Hospital officially closed.

What Happened Next?

The political reaction to this case led to the enactment of legislation such as:

The Developmental Disabilities Assistance and Bill of Rights Act and CRIPA were the first federal civil rights laws protecting people with disabilities, leading to the enactment of the Americans with Disabilities Act (ADA).


From Daily News, April 9, 2107

The atrocities that once consumed the halls of Willowbrook School

The horrors of Willowbrook consumed nearly three decades.  From the day the Willowbrook doors were opened in 1942 until they finally closed in 1987, this New York City warehouse, that Senator Robert Kennedy referred to as a “snake pit,” housed individuals with developmental disabilities under the cruelest conditions.  Geraldo Rivera’s investigation led to the class action lawsuit that revealed what really transpired inside this institution.
http://www.nydailynews.com/news/national/atrocities-consumed-halls-willowbrook-school-article-1.3030716


Willowbrook Resources and References

Videos and Multimedia Resources

Willowbrook Photo Essay, Minnesota Governor’s Council on Developmental Disabilities

Timeline of the Willowbrook Lawsuit, Minnesota Governor’s Council on Developmental Disabilities

Parallels in Time II, Minnesota Governor’s Council on Developmental Disabilities

Willowbrook Exposé: Touring Willowbrook

Public Hostage: Public Ransom, Inside Institutional America by Dr. William Bronston

Public Hostage: Public Ransom, Inside Institutional America. Photographs by Dr. William Bronston

ADA Legacy Project: Willowbrook Leads to New Protections of Rights

Articles and Other Secondary Sources

This article was originally printed in the December 2012 issue of The Federal Lawyer and is used with permission.

Opinions

District Court
Initial Injunctive Relief: New York State Association for Retarded Children v. Rockefeller, 357 F. Supp. 752 (1973)

Approval of Consent Decree: New York State Association for Retarded Children v. Carey, 393 F. Supp. 715 (1975)

Consent Decree

US Court of Appeals, Second Circuit decisions concerning implementation of Consent Decree:


References

  1. ^The Minnesota Governor’s Council on Developmental Disabilities, The ADA Legacy Project, Willowbrook Leads to New Protections of Rights, Moments in Disability History 9, 2013. Can be found at: http://mn.gov/web/prod/static/mnddc/live/ada-legacy/ada-legacy-moment9.html
  2. ^New York State Ass’n for Retarded Children, Inc. v. Rockefeller, 357 F. Supp. 752, 764 (1975).
  3. ^Id
  4. ^New York State Association For Retarded Children, Inc., et al., v. Hugh L. Carey,. 393 F. Supp. 715 (1975) at ¶1.
  5. ^Id. at Appendix A, ¶ V. 9
  6. ^Id. at Appendix A, ¶ V.1