SlideShare a Scribd company logo
CLASS NAME:MIS600
PROFESSORS NAME:
STUDENTS NAME:
PROJECT NAME: NETWORK DESIGN
Content
Topic
Page No.
Cover Page
1
Content
2
Executive summary
3
Project Charter
3
Earn Value Statement 11
Executive Summary
Network under a set of confined region is known as Intranet. It
uses an IP protocol and IP-based tools like the file transfer
application and web browsers that is provided by the server to
only assigned IP address. Computer network communication is
an important installation in a contemporary organization
organisation. As the organization's service provision is
improved through the reliable communication, its competition
with related firms is enhanced and, therefore, valued
competence. Ultimate network design as a mode of flow of
information among employees and stakeholders in promotes
coordination in the management, team work and services the
business offer. This automatically improves the performance of
the organisation at the good will of all workers.
It should be noted that an organisation's communication systems
alone holds a large percentage in its performance that it should
not be compromised, even on the slightest default. This would
mean that the organisation would require an Information System
that when a default occurs at any single point in the connection
system, it would be easier to detect and reach that point as soon
as possible. The design should be design with backbone network
so temporally technical problem with not upset the performance
of network communication. This is more appropriate in big
organisations to maintain their data and communication
confidentiality, integrity and accessibility. In networking design
approach, the choice of device should be intelligently selected
for the desired function, this will enhance performance in terms
of managing security, traffic, errors in storage and transmitting
information.
Documents and programs that are sensitive are run through LAN
security domain system to create passwords for their protection
against cybercrimes. The protected file would then be accessed
by authorised personnel only. This would be an important idea
where security of flowing information is paramount. Each set of
the employee has got a privilege to prevent the access of any
restricted file in the company.
Project Charter
Project Name
Network Design
Project Number
DW2
Project Team
Sponsor: Robert Elson
Author : Jacobs Adam
Manager: Joyce Robert
Prioritization
To design network that will provide information and
communication confidentiality, integrity and accessibility
Owner(s)
Jacobs Adam
Start Date
11/09/15
Scheduled Completion Date
12/15/15
Mission/ Purpose
Based on customer’s statistical report, we are designing network
that will provide faster, with increased security assurance and
24/7 direct online support platform.
Project
Description and Project Product
It is assured to increase online communication and coordination
between sales services and customers.
Optimize the customer choice to online shopping.
Additional capacity with be added to the design to align the
company’s current market demand.
Rejuvenating company network infrastructure, plan and trend
through the network design. Incorporating additional features
and the new branches that are currently established.
Objectives
Increase sales through the utilizing the speed of the network.
use
Business NeedSince customers are the main financial sponsors
of the company, and by popular request, we intend to recreate
the website to meet the following criteria:· Mobile friendly·
Enhance information security
· Add new functionality
· Improve usability
· Keep up to date and shake things
Milestones
Network is expected to be mobile friendly i.e. with Wi-Fi
capabilities
By 11/30/15 midway of the project is evaluated according to
standard.
Last revision date by 12/07/15
Budget
Estimated Labor
$150000.00
Estimated Materials
$12000.00
Estimated Contractors
$20000.00
Estimated Equipment and Facilities
$21000.00
Estimated Travel
$8500.00
Total Estimated Cost
$211500.00
User Acceptance Criteria
User friendly and security assurance network structure is the
minimum success criteria as defined by the key stakeholders.
Contractors and customers will be in charge of testing and
evaluating the quality network and feedback will be collected
through employees and document report from contractors.
High-Level Project Assumptions
It is anticipated that similar project will be taken in about eight
years’ time, since vulnerability of network increase with time,
and technology will keep changing, preference will keep
changing based on factors like the economy, climate or
influence from our competitors market strategy. The network
design will create feasible working environment.
High-Level Project ConstraintsCreating perfect network
communication structure to suit both customer and business
needs.Providing fraud free network, customers are expect to
create online account with sensitive information such as social
security number, credit card and address. Project must be
completed on time to avoid exceeding budget.
Exclusions and Boundaries
Creating perfect network environment to suit both customer and
business needs.
Software interface is limited to be compatible to existing
hardware.
Project must be completed at most not more than a week after
stipulated deadline.
Budget must not increase more than 5% of the stipulated
budget.
Network technical support unit will be decentralized to
accommodate influx calls that will expected from employees
who may encounter technical problem. Feedback from users
should use during in the designing process.
Major Risks
Provide a written description of software process and hard
process.
Regular technical review to ensure that design meets standards.
Budget is expected to rise if design do not meet specification
and thee the need to fix flaws.
Experts are required to answer question about the tools used in
design.
Establishing a procedure for tracking and reviewing contractors
Documentation is required for all formal, informal procedure
and deliverables. Availability of testing tool.
KEY STAKEHOLDERS
Project Manager Authority Level
CEO: Robert Elson , (makes final financial decision of the
project)
Project Core Team
Author : Jacobs Adam
Owner/Sponsor: Robert Elson
Head of Contractors : Peter Christian
Manager : Joy Roberts
Subject Matter Experts (SMEs)
Programmers and software tester and equipment’s tools:·
Functionality testing· Usability testing· Interface testing·
Compatibility testing· Performance testing· Security testing
APPROVALSType NameSignatureDate
Project Manager Approval
Robert Elson
09/01/15
Customer/Sponsor Approval
Jacobs Adam
09/01/15
Earn Value Statement
Statement of Work—Project Description and
Project Product
The project intends to design easy to use network design that
will accommodate shareholder demand and leverage the
company on competitive edge against its rival.
Specification of the network is based on collective inquiry,
user’s feedback and sponsors request, and the priority is meet
the national regulation standard.
Scrum agile method approach will be employ in this design
development project, this will allow the product use by the
development team, while in design is in process, so that
feedback will be used to make correction on inherent and
apparent weakness that will be detected at the early stage..
The project team will be group in three, the developers, the
testers and the users. The user group will consist of
shareholders and designated team professional. Strong chain of
feedback mechanism will be establish between users and the
developers to report any fault at the early development stage.
However early glitch may also be detected at the testing level
and reported to the developers.
Project DeliverablesNetwork design will be will have about
500sqft Wi-Fi capability, encryption tool for the protection of
sensitive’s information of inputs made by client when hosting
on the network. Users will be authenticated. .
Project Objectives
The Objectives is to design company’s network to incorporate
additional features and also correct inherent apparent weakness
that have been reported on major cases by shareholders. It is
also intended to give competitive advantage over business
rivals. Project is schedule to complete in three commencing
from 09/09/15 to 12/15/15.
50% of the total budget will be disbursed for the comment of
the project and the remaining 50% will be disbursed at the
midway of the project. Provision of 5% increase of the original
budget is made available in the budget coffers to accommodate
anticipated increase project cost.
However, with the introduction of improved working tools,
project is expected to compete within budget.
Project Assumptions
Work space will be required to accommodate all working station
(i.e. developers, testers and users team station) and team
members.
Project is likely to take longer than will be expected since the
sponsors are part of the design process with direct influence on
the project, sponsors preference might keep changing.
In addition to the testers and the users who may report design
flaws ,experts or outsourced team may be required to
independently assess performance, evaluate and test network,
feedback may be employ to make to make required changes
when the need arise to extend service or employ feedback from
auditors to make any changes.
Other opportunities may be consider to affect design during
process if it will give competitive advantage over business
rivals.
Project ConstraintsOver security is concern like authentication
process may discourage and prolong access to network facility
.Project cascaded team and process may slow work. Project
design needs dedicated and reliable server, free from threat and
can host all team members time. Daily project routine needs to
be documented and review by head of project before going to
the next step, the procedure sometimes slow down development
process. Team are expected to have long meeting with legal
advisor before of the work begins.
Exclusions
Based on available spaces and tools, only 8 members are
required to the task.
Acceptance Criteria The network must operational or
compatible to the major internet devices protocols.
APPROVALSType NameSignatureDate
Project Manager Approval
Robert Elson
11/9/15
Customer or Sponsor Approval
Jacobs Adam
11/9/15
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx

More Related Content

Similar to CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx

Eethamakula_Manikanta_Guidewire_042015
Eethamakula_Manikanta_Guidewire_042015Eethamakula_Manikanta_Guidewire_042015
Eethamakula_Manikanta_Guidewire_042015Manikanta Choudhary
 
Questioning Strategies Part 1 Questioning StrategiesSocial .docx
Questioning Strategies Part 1 Questioning StrategiesSocial .docxQuestioning Strategies Part 1 Questioning StrategiesSocial .docx
Questioning Strategies Part 1 Questioning StrategiesSocial .docx
audeleypearl
 
Information Systems CapstoneCo.docx
Information Systems CapstoneCo.docxInformation Systems CapstoneCo.docx
Information Systems CapstoneCo.docx
jaggernaoma
 
A research on- Sales force Project- documentation
A research on- Sales force Project- documentationA research on- Sales force Project- documentation
A research on- Sales force Project- documentation
Pasupathi Ganesan
 
Project Plan And Estimation
Project Plan And EstimationProject Plan And Estimation
Project Plan And Estimation
Rajan Srivastava
 
Pmw2 k3ni 1-1a
Pmw2 k3ni 1-1aPmw2 k3ni 1-1a
Pmw2 k3ni 1-1ahariclant1
 
Checklist to cost your software development accurately in 2022
Checklist to cost your software development accurately in 2022Checklist to cost your software development accurately in 2022
Checklist to cost your software development accurately in 2022
IndusNetMarketing
 
Determining Client And Networking Requirements
Determining Client And Networking RequirementsDetermining Client And Networking Requirements
Determining Client And Networking RequirementsSteven Cahill
 
Shraddha_Gaherwar_Data_Analyst1
Shraddha_Gaherwar_Data_Analyst1Shraddha_Gaherwar_Data_Analyst1
Shraddha_Gaherwar_Data_Analyst1shraddha gaherwar
 
Web engineering cse ru
Web engineering cse ruWeb engineering cse ru
Web engineering cse ru
Hossain Md Shakhawat
 
Arx mindbusinessportfolio
Arx mindbusinessportfolioArx mindbusinessportfolio
Arx mindbusinessportfolio
pankaj joshi
 
TechOut Solutions, LLC - A Short Introduction to Our Services and Processes
TechOut Solutions, LLC - A Short Introduction to Our Services and ProcessesTechOut Solutions, LLC - A Short Introduction to Our Services and Processes
TechOut Solutions, LLC - A Short Introduction to Our Services and Processes
Kabeed Mansur
 
ShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business AnalystShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business AnalystShivam Thakur
 
Daffodil Software-Sharepoint Capability Document
Daffodil Software-Sharepoint Capability DocumentDaffodil Software-Sharepoint Capability Document
Daffodil Software-Sharepoint Capability Document
Ashok Surendran
 
Raju 5.7 java
Raju 5.7 javaRaju 5.7 java
Raju 5.7 java
Raju G P
 
Rohit Oza_CV_2015
Rohit Oza_CV_2015Rohit Oza_CV_2015
Rohit Oza_CV_2015Rohit Oza
 

Similar to CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx (20)

Eethamakula_Manikanta_Guidewire_042015
Eethamakula_Manikanta_Guidewire_042015Eethamakula_Manikanta_Guidewire_042015
Eethamakula_Manikanta_Guidewire_042015
 
Questioning Strategies Part 1 Questioning StrategiesSocial .docx
Questioning Strategies Part 1 Questioning StrategiesSocial .docxQuestioning Strategies Part 1 Questioning StrategiesSocial .docx
Questioning Strategies Part 1 Questioning StrategiesSocial .docx
 
Information Systems CapstoneCo.docx
Information Systems CapstoneCo.docxInformation Systems CapstoneCo.docx
Information Systems CapstoneCo.docx
 
A research on- Sales force Project- documentation
A research on- Sales force Project- documentationA research on- Sales force Project- documentation
A research on- Sales force Project- documentation
 
3_5
3_53_5
3_5
 
Project Plan And Estimation
Project Plan And EstimationProject Plan And Estimation
Project Plan And Estimation
 
Pmw2 k3ni 1-1a
Pmw2 k3ni 1-1aPmw2 k3ni 1-1a
Pmw2 k3ni 1-1a
 
Checklist to cost your software development accurately in 2022
Checklist to cost your software development accurately in 2022Checklist to cost your software development accurately in 2022
Checklist to cost your software development accurately in 2022
 
PraveenResume_TIBCO
PraveenResume_TIBCOPraveenResume_TIBCO
PraveenResume_TIBCO
 
Guruprasad_Srinivasamurthy - CV
Guruprasad_Srinivasamurthy - CVGuruprasad_Srinivasamurthy - CV
Guruprasad_Srinivasamurthy - CV
 
Determining Client And Networking Requirements
Determining Client And Networking RequirementsDetermining Client And Networking Requirements
Determining Client And Networking Requirements
 
Shraddha_Gaherwar_Data_Analyst1
Shraddha_Gaherwar_Data_Analyst1Shraddha_Gaherwar_Data_Analyst1
Shraddha_Gaherwar_Data_Analyst1
 
Web engineering cse ru
Web engineering cse ruWeb engineering cse ru
Web engineering cse ru
 
Arx mindbusinessportfolio
Arx mindbusinessportfolioArx mindbusinessportfolio
Arx mindbusinessportfolio
 
TechOut Solutions, LLC - A Short Introduction to Our Services and Processes
TechOut Solutions, LLC - A Short Introduction to Our Services and ProcessesTechOut Solutions, LLC - A Short Introduction to Our Services and Processes
TechOut Solutions, LLC - A Short Introduction to Our Services and Processes
 
Online cinematicketingdocx
Online cinematicketingdocxOnline cinematicketingdocx
Online cinematicketingdocx
 
ShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business AnalystShivamThakur_CV_Business Analyst
ShivamThakur_CV_Business Analyst
 
Daffodil Software-Sharepoint Capability Document
Daffodil Software-Sharepoint Capability DocumentDaffodil Software-Sharepoint Capability Document
Daffodil Software-Sharepoint Capability Document
 
Raju 5.7 java
Raju 5.7 javaRaju 5.7 java
Raju 5.7 java
 
Rohit Oza_CV_2015
Rohit Oza_CV_2015Rohit Oza_CV_2015
Rohit Oza_CV_2015
 

More from monicafrancis71118

1. Discuss Blockchains potential application in compensation system.docx
1. Discuss Blockchains potential application in compensation system.docx1. Discuss Blockchains potential application in compensation system.docx
1. Discuss Blockchains potential application in compensation system.docx
monicafrancis71118
 
1. Describe the characteristics of the aging process. Explain how so.docx
1. Describe the characteristics of the aging process. Explain how so.docx1. Describe the characteristics of the aging process. Explain how so.docx
1. Describe the characteristics of the aging process. Explain how so.docx
monicafrancis71118
 
1. Dis. 7Should we continue to collect data on race and .docx
1. Dis. 7Should we continue to collect data on race and .docx1. Dis. 7Should we continue to collect data on race and .docx
1. Dis. 7Should we continue to collect data on race and .docx
monicafrancis71118
 
1. Differentiate crisis intervention from other counseling therapeut.docx
1. Differentiate crisis intervention from other counseling therapeut.docx1. Differentiate crisis intervention from other counseling therapeut.docx
1. Differentiate crisis intervention from other counseling therapeut.docx
monicafrancis71118
 
1. Despite our rational nature, our ability to reason well is ofte.docx
1. Despite our rational nature, our ability to reason well is ofte.docx1. Despite our rational nature, our ability to reason well is ofte.docx
1. Despite our rational nature, our ability to reason well is ofte.docx
monicafrancis71118
 
1. Describe the ethical challenges faced by organizations operating .docx
1. Describe the ethical challenges faced by organizations operating .docx1. Describe the ethical challenges faced by organizations operating .docx
1. Describe the ethical challenges faced by organizations operating .docx
monicafrancis71118
 
1. Describe in your own words the anatomy of a muscle.  This sho.docx
1. Describe in your own words the anatomy of a muscle.  This sho.docx1. Describe in your own words the anatomy of a muscle.  This sho.docx
1. Describe in your own words the anatomy of a muscle.  This sho.docx
monicafrancis71118
 
1. Describe how your attitude of including aspects of health literac.docx
1. Describe how your attitude of including aspects of health literac.docx1. Describe how your attitude of including aspects of health literac.docx
1. Describe how your attitude of including aspects of health literac.docx
monicafrancis71118
 
1. Choose a behavior (such as overeating, shopping, Internet use.docx
1. Choose a behavior (such as overeating, shopping, Internet use.docx1. Choose a behavior (such as overeating, shopping, Internet use.docx
1. Choose a behavior (such as overeating, shopping, Internet use.docx
monicafrancis71118
 
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
monicafrancis71118
 
1. Cryptography is used to protect confidential data in many areas. .docx
1. Cryptography is used to protect confidential data in many areas. .docx1. Cryptography is used to protect confidential data in many areas. .docx
1. Cryptography is used to protect confidential data in many areas. .docx
monicafrancis71118
 
1. Compare and contrast steganography and cryptography.2. Why st.docx
1. Compare and contrast steganography and cryptography.2. Why st.docx1. Compare and contrast steganography and cryptography.2. Why st.docx
1. Compare and contrast steganography and cryptography.2. Why st.docx
monicafrancis71118
 
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
monicafrancis71118
 
1. compare and contrast predictive analytics with prescriptive and d.docx
1. compare and contrast predictive analytics with prescriptive and d.docx1. compare and contrast predictive analytics with prescriptive and d.docx
1. compare and contrast predictive analytics with prescriptive and d.docx
monicafrancis71118
 
1. Creating and maintaining relationships between home and schoo.docx
1. Creating and maintaining relationships between home and schoo.docx1. Creating and maintaining relationships between home and schoo.docx
1. Creating and maintaining relationships between home and schoo.docx
monicafrancis71118
 
1. Compare and contrast Strategic and Tactical Analysis and its .docx
1. Compare and contrast Strategic and Tactical Analysis and its .docx1. Compare and contrast Strategic and Tactical Analysis and its .docx
1. Compare and contrast Strategic and Tactical Analysis and its .docx
monicafrancis71118
 
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
monicafrancis71118
 
1. Company Description and Backgrounda. Weight Watchers was cr.docx
1. Company Description and Backgrounda. Weight Watchers was cr.docx1. Company Description and Backgrounda. Weight Watchers was cr.docx
1. Company Description and Backgrounda. Weight Watchers was cr.docx
monicafrancis71118
 
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
monicafrancis71118
 
1. Choose a case for the paper that interests you. Most choose a .docx
1. Choose a case for the paper that interests you.  Most choose a .docx1. Choose a case for the paper that interests you.  Most choose a .docx
1. Choose a case for the paper that interests you. Most choose a .docx
monicafrancis71118
 

More from monicafrancis71118 (20)

1. Discuss Blockchains potential application in compensation system.docx
1. Discuss Blockchains potential application in compensation system.docx1. Discuss Blockchains potential application in compensation system.docx
1. Discuss Blockchains potential application in compensation system.docx
 
1. Describe the characteristics of the aging process. Explain how so.docx
1. Describe the characteristics of the aging process. Explain how so.docx1. Describe the characteristics of the aging process. Explain how so.docx
1. Describe the characteristics of the aging process. Explain how so.docx
 
1. Dis. 7Should we continue to collect data on race and .docx
1. Dis. 7Should we continue to collect data on race and .docx1. Dis. 7Should we continue to collect data on race and .docx
1. Dis. 7Should we continue to collect data on race and .docx
 
1. Differentiate crisis intervention from other counseling therapeut.docx
1. Differentiate crisis intervention from other counseling therapeut.docx1. Differentiate crisis intervention from other counseling therapeut.docx
1. Differentiate crisis intervention from other counseling therapeut.docx
 
1. Despite our rational nature, our ability to reason well is ofte.docx
1. Despite our rational nature, our ability to reason well is ofte.docx1. Despite our rational nature, our ability to reason well is ofte.docx
1. Despite our rational nature, our ability to reason well is ofte.docx
 
1. Describe the ethical challenges faced by organizations operating .docx
1. Describe the ethical challenges faced by organizations operating .docx1. Describe the ethical challenges faced by organizations operating .docx
1. Describe the ethical challenges faced by organizations operating .docx
 
1. Describe in your own words the anatomy of a muscle.  This sho.docx
1. Describe in your own words the anatomy of a muscle.  This sho.docx1. Describe in your own words the anatomy of a muscle.  This sho.docx
1. Describe in your own words the anatomy of a muscle.  This sho.docx
 
1. Describe how your attitude of including aspects of health literac.docx
1. Describe how your attitude of including aspects of health literac.docx1. Describe how your attitude of including aspects of health literac.docx
1. Describe how your attitude of including aspects of health literac.docx
 
1. Choose a behavior (such as overeating, shopping, Internet use.docx
1. Choose a behavior (such as overeating, shopping, Internet use.docx1. Choose a behavior (such as overeating, shopping, Internet use.docx
1. Choose a behavior (such as overeating, shopping, Internet use.docx
 
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
 
1. Cryptography is used to protect confidential data in many areas. .docx
1. Cryptography is used to protect confidential data in many areas. .docx1. Cryptography is used to protect confidential data in many areas. .docx
1. Cryptography is used to protect confidential data in many areas. .docx
 
1. Compare and contrast steganography and cryptography.2. Why st.docx
1. Compare and contrast steganography and cryptography.2. Why st.docx1. Compare and contrast steganography and cryptography.2. Why st.docx
1. Compare and contrast steganography and cryptography.2. Why st.docx
 
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
 
1. compare and contrast predictive analytics with prescriptive and d.docx
1. compare and contrast predictive analytics with prescriptive and d.docx1. compare and contrast predictive analytics with prescriptive and d.docx
1. compare and contrast predictive analytics with prescriptive and d.docx
 
1. Creating and maintaining relationships between home and schoo.docx
1. Creating and maintaining relationships between home and schoo.docx1. Creating and maintaining relationships between home and schoo.docx
1. Creating and maintaining relationships between home and schoo.docx
 
1. Compare and contrast Strategic and Tactical Analysis and its .docx
1. Compare and contrast Strategic and Tactical Analysis and its .docx1. Compare and contrast Strategic and Tactical Analysis and its .docx
1. Compare and contrast Strategic and Tactical Analysis and its .docx
 
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
 
1. Company Description and Backgrounda. Weight Watchers was cr.docx
1. Company Description and Backgrounda. Weight Watchers was cr.docx1. Company Description and Backgrounda. Weight Watchers was cr.docx
1. Company Description and Backgrounda. Weight Watchers was cr.docx
 
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
 
1. Choose a case for the paper that interests you. Most choose a .docx
1. Choose a case for the paper that interests you.  Most choose a .docx1. Choose a case for the paper that interests you.  Most choose a .docx
1. Choose a case for the paper that interests you. Most choose a .docx
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx

  • 1. CLASS NAME:MIS600 PROFESSORS NAME: STUDENTS NAME: PROJECT NAME: NETWORK DESIGN Content Topic Page No. Cover Page 1 Content 2 Executive summary 3 Project Charter 3 Earn Value Statement 11
  • 2. Executive Summary Network under a set of confined region is known as Intranet. It uses an IP protocol and IP-based tools like the file transfer application and web browsers that is provided by the server to only assigned IP address. Computer network communication is an important installation in a contemporary organization organisation. As the organization's service provision is improved through the reliable communication, its competition with related firms is enhanced and, therefore, valued competence. Ultimate network design as a mode of flow of information among employees and stakeholders in promotes coordination in the management, team work and services the business offer. This automatically improves the performance of the organisation at the good will of all workers. It should be noted that an organisation's communication systems alone holds a large percentage in its performance that it should not be compromised, even on the slightest default. This would mean that the organisation would require an Information System that when a default occurs at any single point in the connection system, it would be easier to detect and reach that point as soon as possible. The design should be design with backbone network so temporally technical problem with not upset the performance of network communication. This is more appropriate in big organisations to maintain their data and communication confidentiality, integrity and accessibility. In networking design approach, the choice of device should be intelligently selected for the desired function, this will enhance performance in terms of managing security, traffic, errors in storage and transmitting information. Documents and programs that are sensitive are run through LAN security domain system to create passwords for their protection against cybercrimes. The protected file would then be accessed by authorised personnel only. This would be an important idea
  • 3. where security of flowing information is paramount. Each set of the employee has got a privilege to prevent the access of any restricted file in the company. Project Charter Project Name Network Design Project Number DW2 Project Team Sponsor: Robert Elson Author : Jacobs Adam Manager: Joyce Robert Prioritization To design network that will provide information and communication confidentiality, integrity and accessibility Owner(s) Jacobs Adam Start Date 11/09/15 Scheduled Completion Date 12/15/15 Mission/ Purpose Based on customer’s statistical report, we are designing network that will provide faster, with increased security assurance and 24/7 direct online support platform. Project
  • 4. Description and Project Product It is assured to increase online communication and coordination between sales services and customers. Optimize the customer choice to online shopping. Additional capacity with be added to the design to align the company’s current market demand. Rejuvenating company network infrastructure, plan and trend through the network design. Incorporating additional features and the new branches that are currently established. Objectives Increase sales through the utilizing the speed of the network. use Business NeedSince customers are the main financial sponsors of the company, and by popular request, we intend to recreate the website to meet the following criteria:· Mobile friendly· Enhance information security · Add new functionality · Improve usability · Keep up to date and shake things Milestones Network is expected to be mobile friendly i.e. with Wi-Fi capabilities By 11/30/15 midway of the project is evaluated according to standard. Last revision date by 12/07/15 Budget Estimated Labor $150000.00
  • 5. Estimated Materials $12000.00 Estimated Contractors $20000.00 Estimated Equipment and Facilities $21000.00 Estimated Travel $8500.00 Total Estimated Cost $211500.00 User Acceptance Criteria User friendly and security assurance network structure is the minimum success criteria as defined by the key stakeholders. Contractors and customers will be in charge of testing and evaluating the quality network and feedback will be collected through employees and document report from contractors. High-Level Project Assumptions It is anticipated that similar project will be taken in about eight years’ time, since vulnerability of network increase with time, and technology will keep changing, preference will keep changing based on factors like the economy, climate or influence from our competitors market strategy. The network design will create feasible working environment. High-Level Project ConstraintsCreating perfect network communication structure to suit both customer and business needs.Providing fraud free network, customers are expect to create online account with sensitive information such as social security number, credit card and address. Project must be completed on time to avoid exceeding budget.
  • 6. Exclusions and Boundaries Creating perfect network environment to suit both customer and business needs. Software interface is limited to be compatible to existing hardware. Project must be completed at most not more than a week after stipulated deadline. Budget must not increase more than 5% of the stipulated budget. Network technical support unit will be decentralized to accommodate influx calls that will expected from employees who may encounter technical problem. Feedback from users should use during in the designing process. Major Risks Provide a written description of software process and hard process. Regular technical review to ensure that design meets standards. Budget is expected to rise if design do not meet specification and thee the need to fix flaws. Experts are required to answer question about the tools used in design. Establishing a procedure for tracking and reviewing contractors Documentation is required for all formal, informal procedure and deliverables. Availability of testing tool. KEY STAKEHOLDERS Project Manager Authority Level CEO: Robert Elson , (makes final financial decision of the project)
  • 7. Project Core Team Author : Jacobs Adam Owner/Sponsor: Robert Elson Head of Contractors : Peter Christian Manager : Joy Roberts Subject Matter Experts (SMEs) Programmers and software tester and equipment’s tools:· Functionality testing· Usability testing· Interface testing· Compatibility testing· Performance testing· Security testing APPROVALSType NameSignatureDate Project Manager Approval Robert Elson 09/01/15 Customer/Sponsor Approval Jacobs Adam 09/01/15
  • 8. Earn Value Statement Statement of Work—Project Description and Project Product The project intends to design easy to use network design that will accommodate shareholder demand and leverage the company on competitive edge against its rival. Specification of the network is based on collective inquiry, user’s feedback and sponsors request, and the priority is meet the national regulation standard. Scrum agile method approach will be employ in this design development project, this will allow the product use by the development team, while in design is in process, so that feedback will be used to make correction on inherent and apparent weakness that will be detected at the early stage.. The project team will be group in three, the developers, the testers and the users. The user group will consist of shareholders and designated team professional. Strong chain of feedback mechanism will be establish between users and the developers to report any fault at the early development stage. However early glitch may also be detected at the testing level and reported to the developers.
  • 9. Project DeliverablesNetwork design will be will have about 500sqft Wi-Fi capability, encryption tool for the protection of sensitive’s information of inputs made by client when hosting on the network. Users will be authenticated. . Project Objectives The Objectives is to design company’s network to incorporate additional features and also correct inherent apparent weakness that have been reported on major cases by shareholders. It is also intended to give competitive advantage over business rivals. Project is schedule to complete in three commencing from 09/09/15 to 12/15/15. 50% of the total budget will be disbursed for the comment of the project and the remaining 50% will be disbursed at the midway of the project. Provision of 5% increase of the original budget is made available in the budget coffers to accommodate anticipated increase project cost. However, with the introduction of improved working tools, project is expected to compete within budget. Project Assumptions Work space will be required to accommodate all working station (i.e. developers, testers and users team station) and team members. Project is likely to take longer than will be expected since the sponsors are part of the design process with direct influence on the project, sponsors preference might keep changing. In addition to the testers and the users who may report design flaws ,experts or outsourced team may be required to independently assess performance, evaluate and test network, feedback may be employ to make to make required changes when the need arise to extend service or employ feedback from auditors to make any changes. Other opportunities may be consider to affect design during process if it will give competitive advantage over business
  • 10. rivals. Project ConstraintsOver security is concern like authentication process may discourage and prolong access to network facility .Project cascaded team and process may slow work. Project design needs dedicated and reliable server, free from threat and can host all team members time. Daily project routine needs to be documented and review by head of project before going to the next step, the procedure sometimes slow down development process. Team are expected to have long meeting with legal advisor before of the work begins. Exclusions Based on available spaces and tools, only 8 members are required to the task. Acceptance Criteria The network must operational or compatible to the major internet devices protocols. APPROVALSType NameSignatureDate Project Manager Approval Robert Elson 11/9/15 Customer or Sponsor Approval Jacobs Adam 11/9/15