The project stayed on schedule throughout each phase. There were minor setbacks due to me working on another project that required a lot of my time. I was still able to adjust hours and utilize resources that were allocated for possible project delays.
All network and adjunct equipment associated with user usage work as configured. The network fiber and back up wireless links work to standard. All current and emergency backup configurations work as designed.
Training on the kiosk raised more awareness of the project. The keep it simple approach to the systems operating systems navigations allowed for better understanding of how to use the system. The integration of language and speech recognition software was successful.
The surveys
…show more content…
I had to reconsider my connection plan due to Wi-Fi not being the more reliable form of comminuting. I had to ensure that there is constant communication from the kiosk to the network. It is not always bout what is the least cost effective way of accomplishing a task but what makes since to accomplish the task.
Modification Strategies and Actionable Steps
Modification Strategies
In the event modifications are identified and needed:
1. Modification needed needs to be documented with reason why it is needed, a viable solution and completion time.
2. Modification request will be analyzed to see if it is feasible to do.
3. Modification request need to be approved by the project manager, network manager, and project upper management.
4. Resources need to be allocated to implement the modification
5. Modifications will be assigned to a specific team.
6. All modification will be managed by the network manager.
7. Prototypes will be constructed to include modification to ensure the modification will work.
8. All modifications will happen during a designated time.
9. The day of modification completion all systems will be backed up completely. The network will use the backup system to operate off of in the event the modification cause any unforeseen issues.
Actionable Steps
Once the system is up and running there will be user surveys conducted for the first 60 days after a request / transaction is completed by a user.
| All amendments involving changes to IRB approved protocols must be reviewed and approved in advance of implementation, unless changes must be put in place immediately to respond to an unexpected risk or problem arising during
Any attempts to change aspects pertaining to this project will be completed using an official memorandum for record. This document must meet the approval of the Project manager.
2. Disaster recovery: A great disaster recovery plan will be added to the SLA. We will have a team in place with 24 hours support if the system is compromised. We will promise to have systems back up in running in 36 hours. Data will be back
Routers and switches will be utilized to route network signals to all areas of this large network. Telephony systems will be introduced to serve the VOIP located at each location to assist with communication needs. Wireless technologies will also be needed to assist with mobility and other devices such as printers, laptops, fax machines, etc. Lastly, a physical firewall will be enforced at each location to protect the network from internal and external intruders.
There are various types of equipment that the company should look for when considering this network. The first item to look at when considering equipment is the Operating system and software that we would need. Next, the group took into consideration the type of server the company needs to make this network a reality. Another thing that we looked at is the possibility of having ThinClients over regular desktops for all workstations. Of course, it was taken into consideration that some employees would not want ThinClients. So, we show the type of tower we plan to place into those spaces, along with any peripheral device for both. Then, we will look at the network devices that will go into each building that include switches, routers, repeaters, hubs, and wireless access points. Finally, the group will note guidelines for choosing a local ISP at each site. Each Item outlined helps to build a network based on the specifications given by the company.
1 Why is this technology appropriate for this scenario? The laptop is not tied to any cables and is using an access point located in the building.
Main Building – will require 7 computer stations with the most recent version of Operating System to ensure compatibility and networking capabilities between each stations and the ability to communicate between the two locations. They will require three servers, one for web hosting, one for database management and one for emergency failure of any one server. These stations should be networked to communicate with one another for proper data connection especially in the event of any one computer station crashing. Each work station will need to be linked to each server for web hosting and data backup. The cabling used for inside the main building should be 100Base TX cat 5 UTP, for Wi-Fi and WLAN with guest access that is highly secure and reliable, we recommend a device that is capable of supporting up to 15 different users with 450 Mbps. There needs to be 4 printer services in this building. Printer 1 should have
Given the following proposed circuit an are required to re-implement is functionality using the minimum umber of gates possible. Using K-maps to achieve this outcome.
the solution is deployed. Hence, many of the details of implementation must be planned ahead of
Something that really struck out to me was the topic of networking. In Chapter 2, author, Don Raskin goes into depth about the importance of networking. What Raskin says about networking really makes a lot of sense because it is much easier for companies to make hiring decisions based on recommendations from a trusted source than hiring someone through the interviewing process. Employers can get an idea of who the interviewees are, but having people recommended to them makes their job way easier. Networking is something that I will definitely do to my fullest when I look for an internship/job. Getting to know many influential people that will help me better my career will really set me aside from others. Having as many connections as possible
4. Discuss the impact of cost and time constraints on networking techniques and project schedules.
When a CPU is composed of two or more processors, each one is referred to as a(n) ________.
Brief summary description of the project proposal: Describe problem addressed, proposed solution, expected results, intended beneficiaries and reason(s) why assistance is requested from the Voluntary Fund.
Local area networks (LANs). DEFINITION The concept of local area networks (LANs) is not new. It represents a logical development of computer technology. With the advent of microcomputers in the 1980s many office workers began bringing their own disks into work, compromising data integrity.
The project team must comply with their project managers (and the timeline) or else there can be delays leading to the issues mentioned above.