Blog

NEURAL COMMUNICATION

NEURAL COMMUNICATION

NEURAL COMMUNICATION

Introduction

A stroke is a medical condition which is characterized by rapid loss of brain function which is caused by interruption in the blood supply to the various parts of the brain. It can be due to a blockage and it’s known as thrombosis or lack of blood flow known as ischemia or a leakage of blood that is hemorrhage (Feigin, 2005). It results in the person’s inability to move certain parts of the body.

Case study

The brain is designed in such a way that the right hemisphere always controls the left side of the body while the left hemisphere controls the right side of the body. This explains why Joseph’s left part of the body got paralyzed even if not entirely. This also depends on the part of the right side of the brain that has restricted blood flow.

Joseph’s left face and hand has been paralyzed, but not the rest of his arm or his leg because of the restricted blood flow to a portion of his right precentral gyrus which is known to control moments of the muscles in the left face and hand and it is the right side that controls the left side.

What is preventing Joseph from moving his left hand is because of lack of communication between neurons that is between the central nervous system and motor neurons.

Motor neurons are neurons that transmit signals from the brain to the effector cells which include muscle cells. Motor neurons form synapses with effector cells. When an action potential reaches a synapse pore which are present in the cell membrane opens which in turn allows positively charged calcium ions into the pre synaptic terminal. This causes neural transmitters which are chemical in nature to be released in a gap between the two cells and this is known as the synaptic cleft. The neural transmitter is able to diffuse across the synaptic cleft and proceeds to interact with proteins called receptors which are usually embedded in the post synaptic membrane (Sherwood, 2001). The receptors serve as ion channels which allow charged atoms to pass through pores within their structure and this is propagated along the dendrite towards the soma.

The destruction of a neuron that communicates with the motor neuron prevents Joseph from moving his hand by disruption of the transmission process. The motor neuron is not able to receive signal from the central nervous system neuron and thus it is not able to propagate the signal to the effector muscle that is the hand (Garrett, 2011).

In an adult human being the brain takes longer time to redevelop damaged neurons because the neurons are fully developed and this is because why Joseph’s brain cannot simply replace the damaged neurons immediately (Altman, 1963). Compensation might allow Joseph to regain some of the lost movements. This occurs through the neurons that were not damaged and serve extra role of transmitting signals for the damaged neurons but this takes time and it is achievable through therapy. Experimental treatment that might improve Joseph’s movement of his left hand is by slowly exercising the hand through aided extension and constriction of the hand muscles. The exercises can be done from time to time and it impacts on his nervous system by using the existing motor neurons to transmit signals to the hand. His nervous system will slowly undergo rearrangement so that it can utilize the existing neurons to control the left hand.

Conclusion

It is possible for the nervous system to recover from damage through natural processes for example compensation and reorganization. These processes enable the recovery of impaired functions for example of limbs and hands or any other impaired part. There are also experimental treatments that facilitate the growth of new neurons in a mature nervous system. Through proper treatment and therapy patients who suffer stroke do not suffer permanent disability especially because of these processes. This has greatly aided patients who have suffered strokes to be able to regain function of the affected parts through therapy.References

Altman, J. (1963). Autoradiographic investigation of cell proliferation in the brains of rats and cats. Chicago: The Anatomical record.

Feigin VL. (2005). Stroke epidemiology in the developing world. USA: Lancet.

Garrett, B. (2011). Brain and Behavior: An Introduction to Biological Psychology (3rd ed.). Los Angeles: Sage.

Sherwood, L. (2001). Human Physiology: From Cells to Systems (4th ed.). Pacific Grove, CA: Brooks-Cole.

Posted in Uncategorized

Neugent v. Beroth and The Estate of Salome Duran case study

Neugent v. Beroth and The Estate of Salome Duran case study

Neugent v. Beroth and The Estate of Salome Duran case study

Summary of the existing Facts

Beroth on or before 1995, January began to sell to the plaintiff motor oil. Since then till November, 30th, 1995 the parties pursuant operated with plaintiffs Amoco DSA and Amoco leases, that Beroth, attained when he bought from Amoco, the oil stations. The motor oil prices were set by the Amoco DSA at their dealer buying price. These price changes immediately took effect, mainly in Amoco motor fuel sales facilitates that were by then in location, as the title to the mentioned products transferred to the dealer from Amoco. The controversy lay in the fact that Walter Beroth, the plaintiff stated that he was not aware of the price changes, made in the buying prices by the Amoco dealer. He argued that the defendant went against the Beroth DSA contract. His main contention is that the prices that Beroth was quoting were not initially in the agreement. This make up the basis of the case.

Issues/Problem Identification

The main issues in the case include the assigning of the courts trials as mistaken by the plaintiff on issues that included; summary judgment granting for defendants on claims of the plaintiff where there existed material fact issues that included; fraud, civil conspiracy, contract breach, and deceptive and unfair trade practice on their transactions.

Analysis/Evaluation

According to the plaintiff, the defendant automatically committed a breach on the 1994, October created contract by increasing the charges per gallon delivery to 1.427 cents. This perspective seems to be favoring the plaintiff however; further analysis disagrees with this since it is clear that there is failure by the evidence to prove that in the 1994, October meeting an oral contract was reached. Failure of plaintiff at bar, to prove the creation of an oral contract has aided in his failure to prove his case. There was a claim by plaintiff that Vernice Beroth or Walter at that meeting offered to the plaintiff the oil sales. However they have both denied this offer and state that they just discussed motor fuel prices. It can be viewed that he failed to avail proof for his claim. He failed in all accounts, to produce support for his accusations to counter those the alleged produced.

His evidence included showing that Beroth; acquired the said property from Mr. Peddycord, bought the station from Amoco, Assumed the Amoco DSA and Amoco lease, and on or about 18 January 1995, began supplying plaintiff motor fuel. In addition he does not have any tangible proof on the results of the meeting they had on October 1994. He was also wrong when he thought that they could be bound by the oral contract. UCC, regulations actually dictated that a contract for goods sales that exceeded above ($500.00) of five hundred dollars or more needs for some sufficient writing to indicate that a sales contract has been made and signed by those involved and those the petition is against. The analysis can conclude that since the records show that after the motor fuel started to be sold to the plaintiff by Beroth, pursuant to the Beroth DSA and Amoco, the motor fuel deliveries prices clearly exceeded $500.00. In this perspective we point out that since in the 1994, October meeting no formal contract was formed by those involved, it makes the case weak and thus, the rack price does not hold.

Recommendations

Recommendations would be on affirming that part of the courts trial should be on reviewing the plaintiffs initial claim of alleged oral breach of contract, indulge more on the counterclaim from Beroth on past due rents, also on possibility of basing a contract on oral standings that can further help bring new light to the Beroth case.

The Estate of Salome Duran case study

Summary of the existing Facts

In Taos , a widow named Macarita Sanchez owned 11.392 acres of land, she had five children and when she died in 1932, she intestate her property to her children. Cinesio, Evilia, Felipe and Donaciana, thereupon became cotenant owners they agreed on how they were going to share it orally. Salome, the mother’s brother later in 1945 took charge of the land and as such paid for the tract of land accumulated taxes and as such supposedly owned it. Since then until his death in 1998, Salome conveyed the property in joint, ownership between him and his wife, who took subsequent ownership until her death. Cinesio and Evilia after Salome’s death were the only surviving children of Macarita. They expressed an interest to the estate stating that to them the agreement had been void, since they had never confirmed if they could annul it, and this was their basis for their case.

Issues/Problem Identification

The main problem is that the uncle or guardian acquired their land through adverse possession mainly without stating clear intent. They petitioners argue that the decedent’s transfer of land to his wife was not legal and it had malice in it. In these grounds, since their kinship entitled them to have more claim, they argue that the property should be returned to them without the other parties having shares in the property.

Analysis/Evaluation

In evaluating such cases the statutes set include there being a requirement for parties claiming adverse position of land must not only give irrefutable but clear evidence of the claim, that include over ten years tax payment on the lands. The petitioners claim that even though the decadent’s possession was not more permissive than hostile, if looked at independently it is clear that the decedent still lacked a good faith color or good will on the title. In addition under the case law and the statutes interpretation it still lacked in some aspects, since many issues were unresolved. Thus it can be summed up that by denying the motion for a petition it was an error on the district courts part. That saw it pass its judgment that the decedent’s titles could only be acquired by the respondents through adverse possession.

Recommendations

With the above analysis the main problem lies, in the gap that is between the twenty years since the oral agreement was made between the five siblings. It would have been better for them to establish a more stable and recognize form of establishing their ownership as opposed to the verbal agreement. The deficiency in the verbal partition could have been sorted if the tact by then had been taken by the petitioners. By them simply doing or asserting acts that would affirm their entitleship and acceptance to the verbal or oral agreement. No such findings were ever found or made by the court or rather the district court.

In conclusion, the case should not be centralized on the extended passage of time and the hefty taxes as the grounds of dividing the property. However from the analysis of the court’s decision we can also draw our own conclusion and state that under these decisions were not in any way consistent with the Gurule requirements. These rules provide a clause for our precedent and voidable contract regarding the effect of the tax deeds issuance. It states that an issued tax deed to a person who initially had rights jointly with others to the property as a cotenant before the tax evasion or delinquency does not in any form destroy the initially held power of contingency, and it is with this understanding that it can be concluded that the petition on the property would not stand under any grounds based on these evidence.

Posted in Uncategorized

Networking

Networking

Networking

Student’s Name

Affiliation

Course

Date

Do you think the term routing congestion can be replaced by network congestion? Why

Congestion is when there is too much of something which prevents work from going on efficiently and effectively. Routing is the movement of data from one network to another, networking congestion is when data deteriorate because there are too many packets present in a subnet. This occurs when the number of packet data Sent to network has a great capacity than that of the network .routing congestion is a general term that is used to define the interference and difference between tracks from the supplied and the ones available. Network congestion is analogous to routing congestion because they both minimize congestion collapse in communication networks (Perlman, 2000).

The above stated definitions both describe congestion which occurs in intermediate node because of scarce resources when data is transmitted from source location to destination. In networking congestion occurs when the load on networks greater in capacity as compared to the network. This means that when there is too much traffic performance decreases and congestion increases. This means that when it reaches destination and will be dropped to intermediate routers. If routers have insufficient memory congestion increases and packet data will be lost. The only way routers respond to overloading is by dropping the packet data.

Routing congestion is similar to network congestion as networking is done through the LAN and WAN which use routers and when the number delivered is un proportional to number of packets sent the routers may not handle the extra load and packets are lost .Construction of routing table is efficient in routing to enable minimize congestion in the networks by increasing memory.

In your opinion, what is the purpose of no routable protocols? Is there a legitimate reason for having no routable protocols? Do you think they can be replaced and with another type of protocol or innovative system?

In general a protocol is a set of guidelines or rules that must be followed to help network communicate effectively. A routing protocol is a path that is assisted by a routing protocol to transmit data, share information and report changes. They are software’s that determine which route is best suited for a specific packet data to advertise (Perlman, 2000). They may include border gateway protocols (BGP) and interior gateway routing protocols (IGRP).Routed protocols are similar to Internet Protocols which is the data being transported from source to the destination. This is achieved by routers which connect two or more networks to enhance the speed of the routing process. Routers are ideal in identifying best metric routes which will assist in efficiently sending information when received. They include Interior Gateway protocols ( Duggan, 2011).

Routed protocols are safe faster and reliable to transfer data without this protocols alternative routes could not be identified if current one goes down. A no routed protocol is a communicational protocol that has no network and only addresses schemes from sending data between networks. The can only work in a routed environment if they are bridged since they are not functioned to being routed. Non routable devices have no unique network meaning can only be used between same network segments. Example is the TCP/IP (Duggan, 2011).

Non routable protocols are mostly used in the modern day world example of routed protocol internet which is highly appreciated. It does not require large time consumption to process or in overheads compact. This affects greatly the transmission of data which is faster as compared to other protocols. The main importance of using non routable protocol is because it is secure. This is maintained by the fact that is does not require additional overheads of network addresses making it fast and efficient. They check data in a data transmission for errors which assist in reducing memory lost in each data transmission.

The protocol uses less system resources and is used in Windows LAN manager for work groups to share information. Examples include Net BEUI which is Extended User Interface, Data Link Control (DLC) and Local Area Transport (LAT) .NetBEUI is a non routable protocol that is fast and was used in Microsoft networks. The Net BEUI is considered the fastest protocol in small LANS and is involved in identifying nodes and sharing information between available networks. It operates and has physical layers of OSI model.

NetBIOS is a non routable protocol that generates more traffic but with plenty of bandwidth and is essential in small networks. In routing information needs to be sent to establish link by using minimum number of segments which are held in a routing table which is assisted By Routing Information Protocol that is adapted in very router. The DLC allows communication between mainframe computers and mini computers to establish connection between computers on remote segments.

The best alternative for the non routable networks is routed networks such as TCIP/IP which allow connectivity (Duggan, 2011). .This allows for effective internet connectivity which means information can be routed anywhere and uses both systems of interior and exterior to transmit data. This protocol is best suit as it allows packet data to be taken from one source to a particular destination. This is done by gateways which are defined as layer protocol translation between devices. This model as opposed to no routable protocol is reliable, secure and was designed for scalability unfortunately it is not that fast due to traffic interference.

Internet is a major requirement in most offices today, meaning that the world has opened its eyes to the superhighway which is the worldwide web. Internet popularity has enabled the TCIP/IP protocol to be effective .In all computers at home the TCIP/IP has been connected without the owner realizing. This makes it the most widely used protocol in the world. Routers operate at operated protocol levels and they provide security but the more the routers filter down the lower the performance.

Routers are devices that are small in sizes and join multiple networks together. The device forward data between the computer networks and through information obtained from routing table it directs the packet data to the destination node. Routers are best suited in very large networks Wide area Network where information is passed over a vast distance .They use special languages such as Transfer Control Protocol or Internet protocol to identify which way is shortest and routes data packet in a network (Perlman, 2000). They are mostly used in home or small office routers to filter traffic, either incoming or outgoing based on the wired or wireless internet protocol (IP).

A routed protocol allows packet data to be forwarded and provides appropriate addressing information from one network to another. They also avoid routing loops and this gives them competitive edge over no routing protocols .They do this by using information about costs of hop, scalability, selection of preferred routes(Perlman, 2000).

Referencing

Perlman, R. (2000). Interconnections: Bridges, routers, switches, and internetworking protocols. (2 ed., pp. 20-64). US: Addison-Wesley Professional.

Duggan, M (2011) Ccie routing and switching v4.0 troubleshooting practice labs (Vol. 4, pp. 30-79) Indianapolis: Cisco Press.

Posted in Uncategorized

Networks Tolerance Fault

Networks Tolerance Fault

Network’s Tolerance Fault

Introduction

In the world of today, networking or linking of different computing devices in order for them to share data has become the convenient way to people who want to share their files or send their e-mails from different parts of the country. Most networks are built hand in hand with both the computer hardware and computer software (Cook, 2003, p103). This paper tries to analyze the network’s fault tolerance, the cabling and how to configure the basic router commands and the basic router configuration in a networking environment.

Portfolio 2

Activity 1 – Addressing Scheme (The packet tracer)

Switch

Server

Comp. 1

s

Comp. 5

naries

Comp. 3

Router

Hub

Hub

Comp. 6

naries

Comp. 2

naries

Comp. 4

naries

No Subnet First host Last host Broadcast Subnet mask

1 192.168.10.32 192.168.10.33 192.168.10.62 192.168.10.63 255.255.2555.224

2 192.168.10.64 192.168.10.65 192.168.10.94 192.168.10.95 /27

3 192.168.10.96 192.168.10.97 192.168.10.126 192.168.10.127 255.255.2555.224

4 192.168.10.128 192.168.10.129 192.168.10.158 192.168.10.159 255.255.2555.224

5 192.168.10.160 192.168.10.161 192.168.10.190 192.168.10.191 255.255.2555.224

6 192.168.10.192 192.168.10.193 192.168.10.253 192.168.10.254 255.255.2555.224

Activity 2 – Cabling

The link between the two routers (Vetinary and Rincewind) is a serial cable – one side has to be the DCE, meaning that it will provide the clock rate. Connect the DCE side (should be labelled as such) to Rincewind. Routers are specialised computers and as such, a crossover cable must be used for a direct computer to router connection (such as the one between Host 2 and Rincewind).

Activity 3 – Basic router commands

Command Function

1 logout Exit from the EXEC

2 ping Send echo messages

3 resume Resume an active network connection

4 show Show running system information

5 ssh Open a secure shell client connection

6 telnet Open a telnet connection

7 terminal Set terminal line parameters

8 traceroute Trace route to destination

Activity 4 – Basic router configuration

In order to configure routers one needs to be in the router global configuration mode. For this case, the prompt is normally written as Router (config) #. This can be achieved by typing “enable” to get into privilege mode, and then typing “configure terminal” to enter the global configuration mode. However, when one needs to move back to the previous mode, he/she can be achieved by typing exit. The router names should always be configured first as they can be achieved by using the hostname command which is Router (config) # hostname name.. The interfaces should be the next to be configured. This can be accomplished by entering interface configuration mode and using the “IP address” command followed by the address and subnet mask that one wishes to configure.

Portfolio 3

Activity 1 – Addressing Scheme

Switch

Server

Officers

Canaries

Scavengers

Router

Hub

Hub

Subnet First host Last host Broadcast Mask

Router link 192.168.42.24 192.168.42.25 192.168.42.49 192.168.42.50 255.255.255.224

Officers 192.168.42.30 192.168.42.31 192.168.42.61 192.168.42.62 255.255.255.224

Canaries 192.168.42.50 192.168.42.51 192.168.42.101 192.168.42.102 255.255.255.224

Scavengers 192.168.42.70 192.168.42.71 192.168.42.141 192.168.42.142 255.255.255.224

Activity 2 – Basic configuration

In order to configure routers one needs to be in the router global configuration mode. For this case, the prompt is normally written as Router (config) #. This can be achieved by typing “enable” to get into privilege mode, and then typing “configure terminal” to enter the global configuration mode. However, when one needs to move back to the previous mode, he/she can be achieved by typing exit. The router names should always be configured first as they can be achieved by using the hostname command which is Router (config) # hostname name.. The interfaces should be the next to be configured. This can be accomplished by entering interface configuration mode and using the “IP address” command followed by the address and subnet mask that one wishes to configure.

Basic router commands

Command Function

1 logout Exit from the EXEC

2 ping Send echo messages

3 resume Resume an active network connection

4 show Show running system information

5 ssh Open a secure shell client connection

6 telnet Open a telnet connection

7 terminal Set terminal line parameters

8 traceroute Trace route to destination

Portfolio 3

Router Operation Diagram

A diagram showing the relationship between the different modes of operations that was used in the course of the labs

Hub

Internet

Server

Router

Hub

Computer

Computer

Computer

How to improve the network’s fault tolerance

A network’s fault tolerance is the setup of networks or configurations that helps to prevent the computer or may be the network devices from either failing whenever it was least expected or fails when an unexpected error or problems occurred. The user can make the computer more fault tolerant by a way of thinking how the computer or the devices of the network may seems to fail as well as, taking the required steps so that the faults can be prevented whenever they occur. For this case, the steps to be followed when improving the network’s fault tolerance, and they include.

Power Failure

The user should by all the time have his or her computer or the networks running on the Uninterruptible Power Supply (UPS). UPS provides the backup power source when there is a power outage (blackout), or a power surge. UPS provides additional time for the computer to shut down by providing the power to the computer from where it was stored. However, the user should also have the system messages that are sent to every network so as to let the administrators know when the power goes off or when computer shut down because of the failure of the power (Beasley, 2009, p 104).

Power surge

If there is no UPS which is connected on the computer or the UPS fails to provide the surge fortification, the surge protector may be connected to the network devices or the computer so as to help prevent those devices fro failing during the power surge.

Data loss

The user should all the time run backups on the computer. Running of the backups may be done daily or at least every month if only the relevant information is stored in them. The user should make sure that he/she creates a mirror of data on the alternate location.

Device/Computer failure

There should be other devices a part from the ones which are used daily. The computer devices which are available when there are failures can help in preventing the long down time.

Unauthorized access

When the computer devices are connected to the network, the user should make sure that the firewall are set up. A firewall is normally the software utility that can limit the accessing of the network on the computer by blocking or restricting the ports. Firewalls are extremely significant since it helps preventing un-authorized members from accessing to the company network or a network which is at home. There should be a frequently checking for the updates for the operating system of the computer. Use of passwords as well as, lock devices always protect the computers when they are not in use, and it also stores the computer and the network devices in the secure areas where they can be locked.

Overload

The user should make sure that there are some alternate computer or network devices which are setup, and can be used as an alternative access point, in addition to sharing the load, through the setup of the round robin

Virus

Make sure the viruses are updated daily. Viruses are extremely dangerous to the computers because they sometimes can make the whole computer crash down or slows the speed to which the computer performs.

Fault Tolerant is essential in providing high levels of availability furthermore reliability in a connected network. When it is used with a network interface hardware which is redundant, Fault Tolerant may allow the user in maintaining the continual sessions when the hardware fails or change. The network interface hardware, which is redundant, may be required to use the feature.

Reflection of what I have learned from the exercised carried out in the lab

From the exercises that I have carried out in the lab I have learned a lot of things. The many things that I have learned some of them include; how I can address the schemes by calculating the subnet masks when I am provided by the subnet Internet Protocol (IP) address, how I can cable using the routers as well as, the hubs, some of the basic router commands, and the basic router configuration using router names and interfaces. It sometimes becomes easier to calculate the first and the second host when one is given the IP address to what should be located. The bits of every mask are denoted by zero and ones since the data is transferred into binary forms of bits (Elahi & Elahi, 2006, p 206). For the case, of cabling, here is what I learned from the example given in portfolio two of the addressing scheme exercise; the link between the two routers (Vetinary and Rincewind) is a serial cable – one side has to be the DCE, meaning that it will provide the clock rate. Connect the DCE side (should be labelled as such) to Rincewind. Routers are specialised computers, and as such, a crossover cable must be used for a direct computer to router connection (such as the one between Host 2 and Rincewind).

I cannot forget learning about the basic router commands and the basic router configurations. The basic router commands where some commands like the telnet functions in opening the telnet connection, the” ssh” command, its function is to open the secure shell client connection, and the terminal command functions as it sets the terminal line parameters. There are many more commands that i learned during the group work. However, in regard to the basic router configuration, I also gained some knowledge. This was particularly much interesting in that I started liking or becoming so much interested with the networking part of the practical that was being done in the lab. This is what I learned; In order to configure routers one needs to be in the router global configuration mode. For this case, the prompt is normally written as Router (config) #.

This can be achieved by typing “enable” to get into privilege mode, and then typing “configure terminal” to enter the global configuration mode. However, when one needs to move back to the previous mode, he/she can be achieved by typing exit. The router names should always be configured first as they can be achieved by using the hostname command which is Router (config) # hostname name. Where name is the name of the device Vetinary or Rincewind depending on which router one is configuring. The interfaces should be the next to be configured. This can be accomplished by entering interface configuration mode and using the “IP address” command followed by the address and subnet mask that one wishes to configure.

Conclusion

The paper analyzed different network fault tolerance that normally occurs and how they can be improved. The paper also analyzed some of the basic router configurations and commands.

List of References

Barnett, D., Groth, D., & McBee, J. (2004), cabling the complete guide to network wiring (3rd Ed.). New York: Sybex.

Beasley, J. S. (2009), Networking (2nd ed.). London: Prentice Hall.Cook, J. (2003), Networking. London: IBM International Technical Support Organization.

Elahi, A., & Elahi, M. (2006). Data, network, and Internet communications technology. London: Thomson Delmar Learning.

Espejo, R. (2008), should social networking web sites be banned. New York: Greenhaven Press.

Posted in Uncategorized

NETWORK UPGRADE

NETWORK UPGRADE

NETWORK UPGRADE

Institution

Student name

The primary considerations would be the size of the patient and employee data since the size of the patients will have increased, the storage will have to be considered. The activities will also increase so the servers speed will be a critical consideration so to avoid speed decrease (Ciccarelli, 2004). The network capacity will have increased in size and so the changes to accommodate this should be considered. Since Western Arizona Thoracic Hospital is distant, there will be primary consideration of wireless connectivity and this entails wireless devices and also considers necessary configurations

Security for the wireless connection will be a factor to be considered because wireless networks are vulnerable to external attacks and patient information should be secured.Wpa psk will be enough to start and this will safeguard this network and will be monitored by an administrator (Barrie, 2009).

The billing domain will be combined to one unit, for simplicity of monitoring billing information. WATCH internet site. The existing domain structure will have to change. For easier management of employee data, the WATCH website will be hosted by the apache SGH internet web server .This will enable employee information to be updated quickly and easily.

The patient records domain that exists in WATCH is sufficient to hold the patients records combined for both hospitals. This will require no change and so it will be integrated and will hold the records for both hospitals. The billing domain will remain intact but it will be hosted by the internet apache web server (Ciccarelli, 2004). This will enable the employees to access the billing information from both hospitals. This is because billing information applies for both hospitals and will be frequently accessed.60 client computers will suffice.

The WATCH Linux dns servers will be hosted by one of the Linux boxes at SGH hospital. This will simplify the network and minimize the amount of network devices that are used. The apache web server will host the employee information because there is a higher level of safety through authentication when hosting in intranet compared to internet.

The nursing domain will still remain intact because it is fundamentally important to host information regarding one hospital separate from the other (Barrie, 2009). This will help to keep track of this employee records in the hospitals and furthermore, these records will be more accessed in the hospitals concerned.

The admin domain will be hosted by the internet apache web server because it will assist the network administrators monitor and make changes to the websites, and also login to the intranet. The administrators can update the employee data; manage all servers from one centralized location (Ciccarelli, 2004). The internet will be hosted by the single apache internet web server, because it will minimize the troubleshooting process and also minimize the potential occurrence of networking problems.

The print server at WATCH will be hosted by the intranet apache web server because it is used only on the inside of the company. The book keeping domain will be hosted by the apache intranet web server since there is no need to host under the internet apache web server and also this confidential information that needs some level of security, so it will be hosted on the intranet where only authorized personnel are allowed, and also it can be accessed remotely and hence minimize the effort required to access it.

For authentication, the wireless network will be secured by WPA psk since some network devices are connected to internet devices like the apache web server for the internet.

References

Barrie, B. (2009). Networking Bible. Indianapolis: Wiley Publishing Inc publishers.

Ciccarelli, P. (2004). Networking foundations. United Kingdom: Sybex Inc publishers.

Posted in Uncategorized

Network Technology and Architecture

Network Technology and Architecture

Network Technology and Architecture

Students Name

Institution

Network Technology and Architecture

Network technology is an important component in the IT infrastructure. For a new medium-sized food store business the value of a stable and an efficient network is important. This is because the network architecture provides an access to the administrative and operational areas of any business or organizations. Executive management, Operations, Human Resources and Finance among other departments in an organizations are all connected directly to the network backbone (Druckrey,1996). This paper discusses the network technology and architecture that can be implemented for a new medium-sized food store to be opened in my hometown.

The name of the food store will be Tropical Lounge & Restaurant to be located in the booming and rapidly expanding City of Kelsey, Florida. Tropical Lounge & Restaurant will be a dining restaurant with a 20 seat lounge. The food store will be medium sized with one General Manager, two senior chefs, two accountants, one human resource manager, one marketing strategist and about 10 employees. The Chief Executive Officer (CEO) of the food store has expressed the desire to design a network architecture for the business. This design include configuration of hardware and software components of a networking architecture.

This paper discusses and summarizes the network technology and technology to be designed for the business.

Our objective for implementing the network is to facilitate sharing of the automated data processed by the hotel management system that will be implemented in the business. All the departments of the restaurant will include the hotel’s lodge, the mangers office and the accountant desk (Druckrey,1996). This means that three computers will be required and networked among these three departments. The information will include computation of daily orders and because the food store will include several guest houses, the computer based information system will enable the employees of the restaurant to see the rooms that have been checked in and those checked out. By this room reservation will be efficient by planning on the bookings. This information will be shared among the user or attendant who will be taking the orders and forward it to the accountant who after calculating the day’s transactions will give weekly report to the manager of the food store.

Based on these requirements a network technology is important in the organization in order to effectively share these information (Druckrey,1996).  The food store business will thus require to purchase 3 computers, network cables, a switch and the software required to develop the network. Since the networking type that Tropical Lounge & Restaurant will be running on is a Local Area Network (LAN), Ethernet or wired technology and Peer-to-peer network architecture would be the most appropriate for this business due to the reasons discussed below. First, it is important to understand that computer networks are classified according to the hardware and software technology used to interconnect the separate devices in the network. For this restaurant a wired technology will be used.

Ethernet Technology

The specific wired technology will be the twisted pair wire which is the most appropriate medium for telecommunication for this business. Twisted-pair wires consist of two insulated copper wires that are twisted into pairs to be used for both data transmission and voice communication within the network (Burkhardt, 2002). The two wires that are twisted together will help to reduce crosstalk in the network. The networking architecture of the Patton-Fuller hotel and restaurant will consist of a single major backbone of the network with a 1000 Base T using CAT6 cable.

Twisted pair cabling with four pairs of twisted wires connected to a RJ-45 plug at the end

Purpose of Networking

There are several reason for networking your computers. The purpose of the network is however dependant on the needs of the organization or business creating the network. Because the networks for Tropical Lounge & Restaurant will be for sharing business information as mention and other simple tasks such as sharing a printer, Peer-to-peer network architecture will be used (Burkhardt, 2002). There will be no need of a server because there are no or they can advanced applications involved such as use of internet and complex point-of-sale systems.

Peer-to-peer networking.

Peer-to-peer is the specific networking architecture that will be used for this business. This is because Peer-to-peer architecture provide a simple and low-cost network connection method for such a small business. The personal computers within the two departments will be networked via this architecture so as to allow files sharing between the manager and the accountant. Other resources such as the printer and a scanner will also be shared using this architecture (Druckrey,1996). One advantage of peer-to-peer networking is that it does not require a server, thereby reducing the expenses of purchasing an extra powerful computer to serve as the server. The network operating system that supports peer-to-peer networking is the only requirement needed to be installed in this type of architecture.

In a peer-to-peer computer architecture, a peer computer acts as both the client and the server computer. Peer computers have the ability to access resources within the network and supply network resources to the other peer computers(Druckrey,1996).. Each computer in a peer-to-peer network holds its resources although the other computers in the network can access these resources if the computer containing the resource is turned on.

971550170815

Advantages of Peer-to-peer network

Less initial expenses will be incurred as there will be no purchase of a dedicated server.

The architecture will not require a network administrator to run the machines as is the case with client server model where a network administrator runs the server machine. This reduces further on the costs.

It will be fast and inexpensive to setup and maintain the peer-to-peer network

Security issue is addressed by each PC being able to make backup copies of the data saved there and store in the other machines for security purposes.

Conclusion

Peer-to-peer network has some limitations as all the other networks. However, these is an issue that has been looked into before decided to implement this networking model. Peer to peer network supports limited number of computers not exceeding 15 computers. For a medium sized food store we don’t intend to increase the number of computers above five so this issue will not be a concern. When the business grows, the goal is to expand by opening new branches of the business and therefore peer-to-peer model is appropriate for my business. Security issues is a major issue with peer-to-peer networking but this would be addressed by having security resources such as antivirus programs and firewall on each machine. This is different from client/server model where the server is centralized and controls the client machines. Training of staff will be required as is true for all the other networks. This would be solved by setting a certain amount of cash to train the users of the machines.

References

Verma, P. K., & Saltzberg, B. R. (1990). ISDN systems: Architecture, technology, and applications. Englewood Cliffs, N.J: Prentice Hall.

Burkhardt, J. (2002). Pervasive computing: Technology and architecture of mobile Internet applications. Boston: Addison-Wesley.

Druckrey, T. (1996). Electronic culture: Technology and visual representation. New York: Aperture.

Posted in Uncategorized

Network Security SWOT Analysis

Network Security SWOT Analysis

Network Security SWOT Analysis

Vulnerabilities Threats Countermeasures

Send-Mail package, which is a default install, is one of the vulnerabilities. Its references are CVE-2006-0058 and RHSA-2006-0058. Send-Mail package has a flaw during the handling of asynchronous signals (Negus, 2003). This gives the attacker a chance to take advantage of the flaw to launch the execution of arbitrary codes as root To counter such threats it is important to prevent execution in all possible locations. Fortunately, there is software that addresses such issues. Execshield will order space for address to ensure the maximization of the no-exec area.

Having the references RHSA-2006:0164 and CVE-2005-3656, mod_auth_pgsql is another vulnerable package. Information of the package has flaws in its format strings allowing and attacker to take advantage of this by the execution of arbitrary codes as Apache user as they try to the package in the authentication processes (Shekhar, 2006). Once there is the implementation of malloc, there is the discovery of corruptible information. It ensures that there is the verification of list pointers and that there is comparison of size and surrounding to prevent overlaps.

RHSA-2005:627 and CVE-2005-2103 are the references of gaim package that does not install on default. There was the discovery of heap-based buffer overflows in its message processing of the application. Remote attackers might exploit this opportunity to send crafted messages to the user of that application while logged to ICQ or AIM. The result of this is triggering arbitrary code executions. Recognizing buffer overflows at an earlier stage could be helpful. This is possible through the reordering of the stack frame to enable the movement of character arrays on the frame top (Troubitsyna, 2011). To add on this, it is important to insert canary value between the return addresses and character arrays.

Kopete is another vulnerable application of Linux Red operating system. The installation of the application is default during the initial application. References of the program are RHSA-2005:639 and CVE-2005-1852. The description of this threat is that there is the discovery of numerous overflows in the processes involving the Gadu-Gadu messages (Barkakati, 2004). There is the threat of a remote user with malicious intentions sending Gadu-Gadu messages created in a special manner that could result to the crashing of the Kopete application and at times trigger arbitrary codes executions (Sery, 2005). Though arrays on heap will have variations with sizes, they are vulnerable to overflow (Jang, 2003). Reordering of the ELF files is a possible countermeasure of such a menace. Ensuring that ELF data, whose modification is at the startup stages, has write protection is another way of curbing the threat.

Though the product does not install as a default program during the initial installation of the product, gaim is a vulnerability to the operating system. The reference codes of this product are RHSA-2005:429 and CVE-2005-1261. In study of the Red operating system results indicated that gaim was under the threat of containing stack-based bug overflows. The threat is in the manner that the application will process messages that contains a URL. To trigger execution of arbitrary, remote attackers might send user messages designed in a manner that they can achieve that objective. One of the countermeasures is the randomization of addresses ensuring that the all-return addresses are absolute. This will prevent the execution of the stack. There is no maximum security in this case given that remote attackers have the capability of overriding such measures (Simpson, 2011).

References

Shekhar, V. (2006). Red Hat Linux – Study Guide. New York: Laxmi Publications

Jang, M. H. (2003). Mastering Red Hat Linux 9. Hoboken: John Wiley and Sons Publishers.

Negus, C. (2003). Red Hat Linux 9 bible. Hoboken; Wiley Publications.Barkakati, N. (2004). Red Hat Linux 9 Professional Secrets. Hoboken: Wiley Publications.

Troubitsyna, E. A. (2011). Software Engineering for Resilient Systems: Third International Workshop. California: Springer Publishers.

Sery, P. G. (2005). Red Hat Fedora Linux 3 for Dummies. Hoboken; John Wiley and Sons.

Simpson, M. T. (2010). Hands-On Ethical Hacking and Network Defense. Stamford: Cengage Learning.

Posted in Uncategorized

Data gathering analysis discussions and conclusions

Data gathering analysis discussions and conclusions

-914400-1133475

By: Mohammed Humaid Al Yammahi

(ID#: 091010061)

To instructor: Dr. Mounir Elkhatib

Data gathering analysis discussions and conclusions

Data analysisResearch Ethics Morals in research is an essential measure to consider particularly in situations where the philosophy includes the interest of individuals. This research means to study the reaction of individuals concerning effect of enhanced quality affirmation and control in the two front said Electromechanical Contracting and Maintenance Companies utilizing as a part of profundity talks with as method for essential information accumulation. Morals involves proper conduct in connection to the rights and opportunities of the members in the study. In this way, the specialist will look for morals approbation before the study initiates. The scientist expects to secure educated assent from the members earlier the study. This will be carried out by initially, the scientist doing acquaintances with the members. The respondents need to know the biographic, and in addition the expert foundation of the specialist. This will help the respondents to know how to contact the scientist just on the off chance that there is have to do so. In addition, semi-organized inside and out meetings oblige that the analyst works at very nearly an individual level with the respondents to guarantee that the respondents don’t hesitate to give data. Furthermore, the respondents will be educated about the study. This will incorporate the research subject, the purpose behind completing the exploration, the respondents’ part in the exploration, and the hugeness of the ensuing information. Thirdly, top to bottom meetings with educators, understudies and folks of the given schools can include touchy data that the respondents may not be ready to give out. With the end goal of affirmation, the privacy of the respondent’s input is considered. Fourth, the respondents’ investment is simply out of readiness and decision.

No respondent will be compelled to take an interest in the study, and just the individuals who have willfully concurred will be considered. In addition, the respondents will be given the decision to stop the interest in the event that it is out of their own advantage. On the other hand, they can pick not to answer addresses that they are not obliged to. This warrants that the scientist needs to be wary when examining the respondents for answers. It ought not get to uncomfortable levels; not one or the other ought to the respondents feel that they were power to give out data that they would rather not. Watching morals is imperative as it upgrades the believability and good estimation of the examination. Also, it evades certain disadvantages like claims, which can influence the achievement of the exploration.

Study LimitationsFor this kind of tasks there is no compelling reason to run with exploration technique so wide in procedure of gathering the information. So the impediment is fifteen review tests from clients of CIRTA and Topaz Companies, and additionally three meetings with key supervisors. This will be sufficient to concoct data sufficient for the research conclusion.

AnalysisInvestigation in this paper includes information acceptance and connection. That is; weighing the data assembled in the exploration to figure out if it is pertinent to the study. The information is initially deciphered to comprehend what it implies in layman’s dialect. It is from that point contrasted with the exploration question with show is pertinence. The investigation will incorporate disposing of the information that does not appear supportive to answer the speculation of this exploration. Researchers to it that the data that the exploration gives in this paper will empower answer the speculation. According to Selden (1998) it will help the individuals understanding it to comprehend the subject under exchange

Data analysis and hypothesis testingBefore breaking down information, it will be transformed to dispense with unusable information and decipher answers which would be vague and conflicting. Later, the information will be coded and put away electronically. The measurement bundle for social sciences (SPSS) will be utilized to break down the information. Information will be broke down quantitatively and subjectively to make findings, understandings, conclusions and conceivable suggestions. Quantitative information will be evoked from the shut finished inquiries in the polls where means, frequencies, and rates will be registered. Information will be displayed in tables, diagrams and charts. Subjective information will be gotten from the open finished areas of the polls and meetings. Information will be compressed and introduced in tables in books where citations for respondents will be referred to. Research of fluctuation (ANOVA) will be utilized to test the theory at the 0.5 level of hugeness (Alvaro, & Meria, 2009).

Result of data analyses

Interview

Amid the initially meeting with Alhamim Ibrahim, Projects Manage, of CIRTA Company, he was exceptionally ingenious, and he gave the accompanying data. He was reacting to a poll and he was helpful. Second visit to CIRTA saw a gathering with Assedik Bouamama, assignment General Manager, of CIRTA Electro Mechanical Contracting and Maintenance. He additionally ended up being asset and was extremely helpful in noting the inquiries in the survey.

In any case, the survey tried to know whether there are any difficulties that administrators confront in actualizing quality confirmation and control. Ibrahim said that, as an issue one of the primary difficulties that you face is to secure nonstop activities to the organization that can create enough comes back to take care of the running expense and to attain some enthusiasm to help the organization develop. The second test that administrators get is to verify that you got the right staff whom can execute the venture we have in the most ideal way imaginable so we can get the fulfillment of our customer and the individuals we work with this will help us getting compensated more ventures. As per Assedik, the difficulties we experience is needing to meet and even exceed expectations or past the prerequisites. Our Clients involves with each venture they honor to us. Likewise, being at the top past all the Competition that exists in the business we are coddling the business sector. The methodology of being honored of a certain venture is likewise a test. The procedure towards satisfying are the essential reports required is trying for there is not legitimate standard altered as parameters. Also, the survey tried to recognize what techniques the organization is utilizing to guarantee enhance quality certification and control. As per Alhamim CITRA is applying three methodologies so we can have a superior control on the result of each worker. These three techniques are as in particular beneath.

Initially we are attempting to appoint the right representative with the right capabilities and experience for the occupation so we guarantee that it will be carried out in more expert route with better quality

Second we verify we are doing a standard check and investigation to all the occupations we have and the individuals who are doing it so we verifying everything is going alright.

Third giving all our workers a particular errands and focus to be accomplished month to month and yearly

The test of achieving the necessities our Clients sets. This has been the test in light of the fact that there are no standard parameters that are given as rules for the execution of the undertaking as per Assedik.

In the survey, the third question tried to comprehend in the event that it is a test to get foremen and keep up them. It additionally tried to know, whether it is testing, what precisely the test is. As indicated by Alhamim it is a test on the grounds that so as to keep up them you have to get a decent fulfillment rate this oblige a constant work to safeguard that all the work is going and been carried out in the best building practice conceivable and with better quality that fulfill the agreement. Assedik avowed that all the workers at CIRTA are resolved to guarantee enhance quality this is showed on the way they show themselves and the quality administration they convey to our outer client. We discover that our Company objectives are attain by maintaining our Company’s Mission and Vision. To empower them, we give them aggressive compensation bundle. Fourth, the survey tried to know whether the representatives of CIRTA are submitted towards attaining enhanced quality confirmation and control. Alhamim said that they are all dedicated to guarantee and enhance work quality. That is a result of the organization’s arrangements, in the same way as we are verifying each work force is getting suitable compensation bundle that fulfill their needs so we verify they don’t stress over their life so they can focus all the more at work they have. Also, likewise we have motivational rewards that we disseminate when we accomplish the targets we are putting.

Additionally we are having an out of work exercises to guarantee that the representative have a solid connection with the organization and there administration. Additionally we have an open entryway approach so every worker have the opportunity to address his needs and concern to the ideal individual so to be tackled promptly. Assedik additionally affirmed that, the organization’s way towards enhanced quality certification has been built by the accomplishment we persistently acquire. One of the robust appearance we have achieved our prosperity are the ISO Certificates we have accomplished and the honors our organization has been offered with. All the more imperatively, we have measured our prosperity with the expanding number of tasks we obtained as the years progressed.

Fifth, the survey got some information about the accomplishment of CIRTA in actualizing enhanced quality confirmation and control. Alhamim said that it has been fruitful because of the administration enthusiasm of enhancing the nature of work and the fulfillment rate they get from the finished activities likewise by guaranteeing that the workers are getting the return they merit. The survey additionally looked to recognize what methodologies CIRTA would refer to as their one of a kind systems that have seen it to achievement in executing enhanced quality confirmation and control. Alhamim said that one of the arrangements that we are pleased with is Team work, we all considering the organization as our own so our fundamental concern is to create and verify we are doing the best. Assedik included that they don’t generally characterize it as our procedure, for our organization has been treating all its workers decently and legitimately; this is one of the key component on why has the organization achieved its prosperity. We make it a point that our inner clients are fulfilled, from there on; they can give quality administration to our outer clients taking care of business. This sticks the conviction that every single worker in our organization is as imperative as our Clients. In conclusion, the survey asked of the exhortation that Alhamim, as an issue of one of the best known electromechanical contracting organizations in the UAE, would provide for different organizations in that businesses. My recommendation is any work with no quality certification will never make due in this extremely focused environment and today showcase, nature of work is one of the main considerations of organizations’ prosperity and presence, in today advertise your notoriety and work quality is the thing that makes you survive all the emergency and business variances.

The research additionally got data from topaz Fabrication and Construction Company. There was a gathering with Adrian Paunescu Topaz manufacture and development lives up to expectations administrator. Paunescu was cooperatives and addressed the inquiries in the poll dependably. The same poll was utilized to ask data from chiefs from the two organizations. Paunescu said that electromechanical support requires suitable abilities accessible at the ideal time. Preparation of these abilities is an unquestionable requirement for the achievement of the organization and this will be key to keeping up a decent work build-up and run various activities in the meantime. He additionally said that Topaz works our business with Total Quality Management to guarantee enhanced quality confirmation and control. He gave the accompanying as the organization’s methods to execute enhanced quality affirmation and control.

Customer centered

Total representative contribution

Process-focused

Integrated frameworks

Strategic and precise methodology

Continual change Fact-based choice making

Communications

Paunescu said that there is no test in selecting execution builders gave the methodologies of prequalification and checking are taken after. He additionally said that Topaz take after the procedure of aggregate representative association. All workers take part in living up to expectations towards normal objectives. Thus, workers at Topaz work towards enhanced quality affirmation and control objective in the organization. On the off chance that any representative is not cooperatives measures are taken to see to it that the worker submits towards enhanced quality affirmation and control. Paunescu said that the adventure to enhanced quality certification and control has been fruitful, in spite of the fact that not straightforward or straight forward. “Ceaseless change prepare as a major aspect of the aggregate quality administration is our answer” he said. Accomplishment in this has come as an issue of constant change process. He likewise said that the exceptional technique that Topaz apply to guarantee achievement in actualizing enhanced quality affirmation and control is solidarity and collaboration. Topaz workers cooperate for a typical reason and we convey with quality, on time and with zero occurrences.In his separating shot, Paunescu said that chiefs ought to stress on remunerating workers association, accomplishments and collaboration. He additionally said that supervisors ought to quantify and systematize methodologies to lessen varieties, surrenders and process durations. The specialist gathered specimens from clients of the two organizations. The majority of the clients’ specimens depicted the same data. Clients said that they got fulfilling administrations from electromechanical and contracting organizations that apply enhanced quality certification and control. They likewise said that organizations that apply TQM offer impressively fulfilling administrations. Albeit a few clients said that there was a ton to be enhanced the administrations that electromechanical organizations offer. There were an aggregate of fifteen specimens from the clients, however there was just to reactions. That is; the clients either said they were fulfilled or they felt that the organizations required to enhance in the way they handle clients. A portion of the reactions that the scientist got from the clients appeared to have no particular stand or any understanding of the subject of talk. In this way, the scientist needed to reject such reactions as they were of no assistance in this study (Almeida, et al, 2007).

Interpretation of resultsThe senior executive’s reactions gave the exploration a perspective of administration on the issue of this study. That is; the specialist came to see how administration handles the issue of enhanced quality certification and control. Then again, clients tests, gave the exploration a seeing on the clients perspective on the issue. Albeit most clients don’t comprehend what acquires the distinction the administrations they get from these organizations; they can clarify or tell that there is an impressive contrast. Past materials on this subject affirm that enhanced quality affirmation and control enhances effectiveness in company. They additionally affirmed that it helps towards client fulfillment from the administrations that the company offer. These materials likewise proposed that it is trying to actualize this strategy, a proposal that the field exploration affirmed. The materials additionally proposed that it is vital to execute complete quality certification and enhanced quality affirmation and control simultaneously. According to Evans (1994) the documented study affirmed this, also. The data the scientist assembled from the field examination, affirmed the data he had accumulated from perusing past documentations on the point

Relationship (between findings and issue)The information that the analyst gathered demonstrate that it is conceivable to actualize enhanced quality confirmation and control in electromechanical and contracting organizations. The two organizations utilized as specimens with the end goal of this study gave an acceptable understanding on this approach works. In any case, the chiefs’ reactions unmistakably demonstrate that it is trying to actualize this approach in this field or industry. Also, it demonstrates that the most paramount technique of embedding enhanced quality confirmation and control in this industry and others is collaboration. That is; participation in the middle of administration and the representatives. This in way or the other will guarantee great working conditions for all. With great work space, it will be workable for both administration and representatives to work towards a typical objective. It is clear that for this approach to be fruitful in any organization, representatives must be submitted towards it. The results likewise recommended that this arrangement runs as an inseparable unit with aggregate quality administration. It is impractical to execute enhanced quality confirmation and control without executing aggregate quality administration. This is on account of; supervisors need to be on the fore front to execute this strategy and make it an achievable objective or a feasible dream in the organization. Furthermore, the clients’ reactions demonstrated that enhanced quality confirmation and control improve client fulfillment. Albeit most clients couldn’t clarify what causes the distinction they recognize in administration they get from diverse organizations; it was clear that the clients that execute enhanced quality certification and control offer fulfilling administrations to their clients than the rest. This obviously answers the inquiry in the speculation of this exploration. From the data that the scientist gathered, enhanced quality certification and control improve clients’ fulfillment. This information, which the specialist gathered amid the investigation of this exploration, answers the theory of the examination. The reactions the analyst got from both the administrators and the clients give solid data about the subject of study. Also, the data that the analyst got from perusing past materials on this theme helped him to think of a dependable finish of the subject under exploration (Roodenrijs, 2011).

Conclusion The privet and public sector:

The private area company appear to be applying enhanced quality confirmation and control and aggregate quality administration approaches than government or open division company. From the analyst’s perceptions, private area company are more concerned with client fulfillment and expense decrease than their partners, open segment company. People in general segment company need to draw up their socks and come to actualize these two polices that enhance the proficiency of company. Open part company scarcely apply add up to quality administration; accordingly, it is pointless to attempt and actualize enhanced quality certification and control. Administration at open divisions is low and undesirable; this needs to be checked and revised. Thereafter, the company can try to apply enhanced quality certification and control. In spite of the private division, the general population segment gets a large portion of it finances from the administration. This makes the interest for responsibility so tolerant that supervisors have a tendency to be flippant. Hence, a large portion of the chiefs in general society segment don’t take notice on quality administration or productivity at the company. This records for the low gainfulness in people in general area. All out quality administration and enhanced quality affirmation and control can undoubtedly take out this issue (Wagner, & Meisinger, 2006).

Conclusion

Taking everything into account, history has proven time and again that enhanced quality affirmation and control enhances effectiveness in company, and upgrade client fulfillment. This exploration likewise demonstrated that to actualize this approach obliges a considerable measure of administration duty and proficiency. There is no good thing that comes the easy way. This strategy lives up to expectations supernatural occurrences for the organizations that actualize it. This is not to say, it does take a shot at its own. It obliges the info of all at the association. All the strategy does it to empower smooth running and yielding of the exertions that representatives and administration put in work. The strategy gives a check framework that guarantees negligible escape clauses; therefore enhancing gainfulness. The study likewise demonstrated that for enhanced quality certification and control to be powerful, it must run as one with aggregate quality administration. This is on the grounds that; aggregate quality administration goes about as an issue framework for enhanced quality confirmation and control. In this manner, chiefs’ effectiveness is of incredible significance regarding the matter of executing enhanced quality affirmation and control. Enhanced quality affirmation and control is not a substitute for good administration, however a supplement. In this way, it can’t supplant administration at any one time. The exploration has additionally brought up the difficulties that chiefs confront in executing this strategy in electromechanical and contracting organizations. This ought to go about as an eye opener for chiefs of organizations that are not utilizing this approach. As indicated by the clients’ reactions, organizations that utilize this strategy offer solid administrations. This implies that these organizations will have a greater number of clients and even perpetual ones than those that don’t utilize this approach.

The recommendation

It is recommendable for company in general society area to grasp this headway in the businesses. In the event that company in the general population area grasp this arrangement alongside aggregate quality administration, their execution will enhance and proficiency won’t be an issue any longer. Enhanced quality confirmation and control is an unquestionable requirement rehearse arrangement for all company, whether in general society or private division. All company, whether charitable making or profitmaking association, need to be productive in their operations; Thus, actualizing enhanced quality affirmation and control is impossible. Proficiency is indispensable in all company; thus, all company ought to look to execute this strategy at all expense. To all company that have benefit making and shareholder riches amplification destinations; cost diminishment is a target, also. Enhanced quality affirmation and control is a measure that sees to it that organizations work at the negligible expense conceivable. Likewise, in these company, client fulfillment is an apparatus that ought to guarantee greatest offers of the organization’s items. Enhanced quality confirmation and control guarantees client fulfillment. Along these lines, all administrators ought to execute this strategy without the slightest hesitation. In conclusion, enhanced quality affirmation and control must run as an inseparable unit with aggregate quality administration. Accordingly, this will guarantee that the company welfare is at the heart of every last one of procedure of the association. Moreover, it is not difficult to accomplish objectives when administration is effective. Thus, these two strategies will see the accomplishment of the company in this industry and also others.

Reference listAlmeida, E. et al., (2007). A Component quality assurance processes. Foundations of Software Engineering,

Almeida, E. et al., (2007). A Component quality assurance processes. Foundations of Software Engineering,

Alvaro, A. & Meria, S., (2009) HYPERLINK “http://www.springerlink.com/content/q922ehvpaq49pw6q/” Accreditation and Quality Assurance: Journal for Quality, Comparability and Reliability in Chemical Measurement, HYPERLINK “http://www.elsevier.com/wps/find/journaldescription.cws_home/405859/description” Food Quality and Preference,

Alvaro, A. & Meria, S., (2009) HYPERLINK “http://www.springerlink.com/content/q922ehvpaq49pw6q/” Accreditation and Quality Assurance: Journal for Quality, Comparability and Reliability in Chemical Measurement, HYPERLINK “http://www.elsevier.com/wps/find/journaldescription.cws_home/405859/description” Food Quality and Preference,

Armstrong, J. (2008). Maintaining building services. London: Mitchell.

Armstrong, J., (2008) Maintaining building services. Mitchell, London.

Babbar, S. (1992). A dynamic model for continuous improvement in the management of service quality. International Journal of Operations and Production Management.

Babbar, S., 1992. A dynamic model for continuous improvement in the management of service quality. International Journal of Operations and Production Management

Barton, H. & Delbridge, R., 2002. Organizing for continuous improvement: Structures and roles in automotive components plants. International Journal of Operations & Production Management

Barton, H., Delbridge, R. (2002). Organizing for continuous improvement: Structures and roles in automotive components plants. International Journal of Operations & Production Management.

Becker, L. (1978). Joint effect of feedback and goal-setting on performance: A field study of residential energy conservation. Journal of Applied Psychology.

Becker, L., 1978. Joint effect of feedback and goal-setting on performance: A field study of residential energy conservation. Journal of Applied Psychology

Berger, A. (2000). Continuous improvement and kaizen: standardization and organizational designs. Integrated Manufacturing Systems, Vol. 8 Iss: 2, pp.110 – 117.

Berger, A.,2000. Continuous improvement and kaizen: standardization and organizational designs.

Bessant, J., & Francis, D., 1999. Developing strategic continuous improvement capability. International Journal of Operations & Production Management

Bessant, J., Caffyn, S., & Gilbert, J., 1996. Learning to manage innovation. Technology Analysis & Strategic Management

Bessant, J., Caffyn, S., Gilbert, J. (1996). Learning to manage innovation. Technology Analysis & Strategic Management.

Bessant, J., Francis, D. (1999). Developing strategic continuous improvement capability. International Journal of Operations & Production Management.

Chiu, K. (1999). Employee involvement in total quality management program: Problems in Chinese firms in Hong Kong. Managerial Auditing Journal.

Chiu, K., 1999. Employee involvement in total quality management program: Problems in Chinese firms in Hong Kong. Managerial Auditing Journal

Cianfrani, C. & West, J., (2009). HYPERLINK “http://books.google.com/?id=-XtbQNGhGmMC&pg=PA5&dq=quality+management+eight+principles+ISO+9001:2008” l “v=onepage&q=quality%20management%20eight%20principles%20ISO%209001%3A2008&f=false” Cracking the Case of ISO 9001:2008 for Service: A Simple Guide to Implementing Quality Management to Service Organizations (2nd ed.). Milwaukee: American Society for Quality.

Cianfrani, C. & West, J., (2009). HYPERLINK “http://books.google.com/?id=-XtbQNGhGmMC&pg=PA5&dq=quality+management+eight+principles+ISO+9001:2008” l “v=onepage&q=quality%20management%20eight%20principles%20ISO%209001%3A2008&f=false” Cracking the Case of ISO 9001:2008 for Service: A Simple Guide to Implementing Quality Management to Service Organizations (2nd ed.). Milwaukee: American Society for Quality.

Durand, P., & Eccles, G., 2007. Service recovery and improvement. Managing Service Quality

Durand, P., Eccles, G. (2007). Service recovery and improvement. Managing Service Quality.

Evans, J., (1994) HYPERLINK “http://www.flexstudy.com/catalog/schpdf.cfm?coursenum=9561a” Introduction to Statistical Processes Control, Fundamentals of Statistical Process Control

Evans, J., (1994) HYPERLINK “http://www.flexstudy.com/catalog/schpdf.cfm?coursenum=9561a” Introduction to Statistical Processes Control, Fundamentals of Statistical Process Control

Feingold, A. (1994). A meta-analysis. Psychological Bulletin.

Feingold, A., 1994. A meta-analysis. Psychological Bulletin

Feldman, S. (2005). Quality assurance, Wiley & Sons Publishers.

Friedlander, F. (2004). Comparative work value system. Personnel Psychology.

Friedlander, F., 2004. Comparative work value system. Personnel Psychology

Fukada, K. (1994). Foreign direct investment in China: Lessons from the Japanese experience. Chinese University of Hong Kong Faculty of Business Administration & Asia-Pacific Institute of Business.

Fukada, K., 1994. Foreign direct investment in China Lessons from Japanese experience.

Godfrey, A., (1999) “Juran’s Quality Handbook” New York Press

Hussey, E., (2006) Quality Improvement HYPERLINK “http://www3.interscience.wiley.com/journal/15634/home” The Quality Assurance Journal, HYPERLINK “http://en.wikipedia.org/wiki/John_Wiley_%26_Sons” o “John Wiley & Sons” John Wiley & Sons

Hussey, E., (2006) Quality Improvement HYPERLINK “http://www3.interscience.wiley.com/journal/15634/home” The Quality Assurance Journal, HYPERLINK “http://en.wikipedia.org/wiki/John_Wiley_%26_Sons” o “John Wiley & Sons” John Wiley & Sons

Imai, M. (1986). Kaizen: The Key to Japan’s Competitive Success. McGraw-Hill/Irwin.

Imai, M. (1999). Gemba: Low-Cost Approach to Management. McGraw-Hill.

Imai, M., (1986). Kaizen: The Key to Japan’s Competitive Success. McGraw-Hill/Irwin.

Imai, M., (1999). Gemba: Low-Cost Approach to Management. McGraw-Hill.

Kenneth, R., (2005). HYPERLINK “http://books.google.com/?id=b5F08Z0QRosC&pg=PA41&dq=Quality+management+quality+planning+quality+control” l “v=onepage&q=Quality%20management%20quality%20planning%20quality%20control&f=false” Project Quality Management: Why, What and How. Fort Lauderdale, Florida, Publishing.

Liker, J., & Choi, T., 1995. The role of process communication and orientation. Decision Science

Liker, J., Choi, T. (1995). The role of process communication and orientation. Decision Science.

Locke, E. A., Bandura, A. (2003). Goal effects and Negative self-efficiency. Journal of Applied Psychology.

Locke, E.A. & Bandura, A., 2003. Goal effects and Negative self-efficiency. Journal of Applied Psychology

Magee, H. (2006). Facilities Maintenance Management. R.S. Means.

Magee, H., (2006) Facilities Maintenance Management, R.S. Means

Mannu, T. & Priyavrat, T., (2007) HYPERLINK “http://www.themasb.org/common-language-project/” Marketing Activities and Metrics Project. MacMillan Publishers

Mannu, T. & Priyavrat, T., (2007) HYPERLINK “http://www.themasb.org/common-language-project/” Marketi

Posted in Uncategorized

Data Communications and Networking

Data Communications and Networking

Data Communications and Networking

Danielle Balfoort

Empire State College

Executive Summary

This business case provides an outline of how a Web-based platform would address communication and reporting concerns by Anderson & Reilly Law Firm, the benefits, goals, assumptions, performance measures, constraints, as well as alternative options. The shift to a centralized, web-based platform allows the law firm to manage its payroll and administrative tasks with enhanced efficiency. Such a shift would result in a reduction in overhead costs, as well as a reduction in errors and enhancement of accuracy in reporting.

As much as the company has a number of alternatives at its disposal, evaluation of the same has brought to the fore fundamental challenges pertaining to their adoption or retention. Not only does the shift to the Web-based platform result in enhanced efficiency, but it is also in line with the company’s goals and objectives.

Business Need and Current SituationProblem Statement

Anderson & Reilly Law Firm was started in 2003. At the time of its inception, the law firm was made up of three lawyers and a secretary. The law firm occupied an executive but single office, in which case its operations and business needs were relatively few. The management of its payroll, as well as other administrative functions could, therefore, be satisfactorily handled using the mainframe system.

However, the law firm has grown over the years to increase not only the number of lawyers and employees that it has but also the size of the office that it needs. Currently, the law firm is composed of 20 lawyers, as well as 7 paralegal assistants and 3 secretaries. In addition, a total of 3 departmental heads are incorporated, not to mention 4 workers in the IT department. These employees occupy two floors in a downtown building. Needless to say, the increase in the number of employees and workers in the office resulted in an increase in the burden for the company as far as the administrative activities and the employees’ payroll are concerned. On a monthly basis, Anderson & Reilly Law Firm outsources the services of Oliveri Consultants Inc. who will assist in the alignment of the payroll and financial reports.

One of the key problems in the law firm revolves around the making of financial reports. In line with the mainframe system all financial reports for the entire week and month have to be done manually by the three secretaries. Needless to say, not only does the manual generation of financial reports take too much time and effort, but it also comes with a higher probability that errors will be made in making the entries. This costs the law firm quite a lot in terms of finances and much needed workforce.

On the same note, the employees are currently required to report to the departmental heads as to the number of hours that they have worked every day, as well as raise any concerns that they may be having pertaining to administrative tasks or the payroll and billings. It goes without saying that the enormous burden weighs heavily on the secretary, especially considering that she is also expected to undertake her daily billable tasks. Maintaining a proper balance between the two tasks presents an enormous challenge on the secretaries.

Since the beginning, Anderson & Reilly Law Firm has been using legacy mainframe systems to undertake tasks such as payroll activities, reporting, as well as resource management. These have been rendered inadequate by the increased workforce, which has resulted in higher administrative costs, time wastage, as well as increased turnover of employees. These problems have made it necessary that Anderson & Reilly Law Firm instilsa web-based platform to replace the mainframe legacy platform. The implementation of the Web-based platform would allow employees to have an enhanced role in the management of their payroll and administrative issues, as well as allow the law firm to manage its administrative duties from a central platform. It eliminates redundancy in the workforce, allows for timely and accurate reporting, as well as increased efficiency.

Impact on Anderson & Reilly Law Firm

Migrating to the Web-Based platform would have a widespread impact on Anderson & Reilly Law Firm law firm, especially with regard to the time, effort and finances required to carry out certain administrative and payroll activities. On the same note, the migration will undoubtedly require input that alters the manner in which the organization is run, as well as the roles and responsibilities, tools and processes in the organization.

Tools: The implementation and operationalization of the web-based platform means the complete phasing out of the existing legacy operating system or platform. Having in mind that the platform is relatively new in the law firm, it is imperative that the employees are taken through some form of training or orientation on the use of the platform alongside other organizational tools.

Processes: The greatest impact of the web-based platform will be felt in the process aspect of the law firm especially with regard to the administrative and payroll activities. These will become streamlined and their efficiency enhanced, which will result in a reduction of the workload on the secretaries. In addition, the implementation of the system comes with an element of independence to the employees as far as the management of their payroll and administrative tasks is concerned.

Roles and Responsibility: The increased autonomy and efficiency, alongside the streamlining of some activities will result in a reduction of the magnitude of work, as well as the manpower required for its execution. In essence, as much as the law firm values its workforce and employees, it will have to reduce their numbers. This is especially with regard to outsourced services, as such activities would become redundant in the new system. The current workforce, with the new web-based platform, would have the capacity to handle the activities. This will undoubtedly result in a reduction in the expenses spent on outsourcing certain services, which will increase the law firm’s return on investment. As much as the platform is new, the current workforce in the IT department is sufficiently capable of putting it into place and operationalizing it.

Additional hardware: The initial capital investment will involve the purchasing of software, as well as obtaining of a license for the implementation of the project. However, it is imperative that the law firm buys additional servers in an effort to accommodate the web-based platform today and in the future.

Technology Migration

The migration of the existing data from the legacy operating system to a new Web-based operating system requires that disruption to the daily activities in administration and payroll are kept at a minimum. In essence, a phased approach incorporating 6 stages will be used. These stages include the following.

Stage I: Any software and hardware that will be required in the upgrade will be purchased. The Information Technology development group will undertake the creation and testing of the Web Platform in a web-based environment.

Stage II: A temporary legacy operating system that backs up the system and archives all data stored in the law firm’s mainframe will put in place. This legacy operating system will be used in the daily administration and payroll activities for the time being.

Stage III: At this stage, the IT team fills the Web-based operating system with all data pertaining to administration and payroll activities alongside end-of-a-pay cycle.

Stage IV: Considering that the web-based platform is a relatively new phenomenon in the law firm, it is unlikely that the employees are privy to its functioning. In essence, the IT team will take the employees through training on the functionality of the platform.

Stage V: This stage involves full internalization of the web-based platform, as well as the archiving of the legacy operating system. At this time, the web-based platform or operating system is the only one used in carrying out the varied administrative and payroll activities in the law firm.

Overview of the Web-based Platform Project

Project Description

The Web-Based Platform Project undertakes a review and analysis of likely products that would best replace the legacy platform that Anderson & Reilly Law Firm has been using with an entirely new web-based platform. The selection process involves the evaluation of programs with regard to the sufficiency with which they replace the current system while still allowing for the expansion for the next decade.

The new platform, on being selected, will be implemented in phases where the current system will be phased out and archived while the new platform becomes fully operational. The key objective of the project will be realized through enhanced efficiency in carrying out administrative, payroll and reporting activities, which will result in a significant reduction of the expense. On the same note, the increased independence and flexibility of employees is bound to result in enhanced job satisfaction, thereby reducing the turnover in the law firm.

In addition, the time spent undertaking redundant activities that do not bring any income to the law firm will be channeled to productive activities, thereby adding to the return on investment.

The IT department will issue an RFI so as to have clear knowledge of the products available in the market both in terms of software and hardware. The specifications of the products should be listed so as to determine the ones that would sufficiently replace the existing system, as well as meet the future needs of the law firm for at least the next decade. This will allow for evaluation, determination and acquisition of the best product, paving way for the implementation, as well as data population using internal resources.

Materials Required: Installation of the Local Area Network

Local Area Network requirements

Considering that the Law firm has grown to occupy two floors, its operations cannot continue being operated on Stand-Alone Computers. It is imperative that a local area network (LAN) is installed so as to allow for the migration from legacy systems to a web-based operating system. This is the only way that the operations of the law firm can be synchronized. A local area network has the advantage of enhancing file transfers and sharing resources such as printers, disks, and internet connection (Schwalbe, 2010). In cases where a wireless local area network is used, mobility is enhanced, not to mention allowing for discussions mainly when computers are remote. While the Law firm has the option of putting in place a wireless network (that uses WiFi technology), a wired network (founded on Ethernet Technology) would be recommended. The following items would be required.

23 new computers- as much as the company has computers, they would be incapable of supporting the new operating systems. While it is not required that “heavy” operating system be installed, current computers with high processor capabilities, RAM properties and storage capacities. The current computers may not have the necessary features to support these capabilities.

Network adapter- network adapters allows computers to connect to the network by converting computer data to electronic signals. Most present-day computers incorporate network adapters that are integrated in their motherboards. It is worth noting, however, that early computers such as the ones used in the law firm did not have this function in which case the network adaptor has to be bought separately and fitted to the expansion slot on their motherboards (Schwalbe, 2010).

Network medium- considering that the law firm will be using a wired network, it is required that cables whose length can allow for the connection of computers in both floors. The cable to be used, in this case, is the “Unshielded Twisted Pair” also called “Ethernet cable” or simply “Ethernet cable”.

Power supply- this would be needed irrespective of the type of network that the company chooses. It allows the cabled network to send data that is interpreted as electronic pulse.

Cable Connectors- RJ45 is the most commonly used form of connector in wired networks. Computers that have networking capabilities must have RJ54 ports, also called Ethernet port or network ports (Schwalbe, 2010).

Router/switch/ hub- considering that the local area network will essentially be a wired network, the computers would be unable to connect to the others without a splinter. Hubs are an advanced form of a splinter that repeats signals that come to one of the ports out to the other ports. Cables would then move from its ports to the computer. Switch comes as more sophisticated than hubs as they send signals to the computer than has the address written on the incoming message (Schwalbe, 2010). Routers, however, have the capacity to forward messages across the world. For this law firm, four routers would be needed each with 8 ports to ensure that each of the 23 computers has a cable connecting it to the network.

Network software- the network software on the communicating computer would package data into segments, as well as put the data into structures referred to as packets. The header of the packet has the destination and the source of the packet written on it. It is imperative that the receiving computer interprets the packets into meaningful data and take it to the appropriate application (Schwalbe, 2010).

Other Software Required: Cloud storage

Legal Management Software

In migrating the operations of the company from a legacy-based to a web-based platform, it is imperative that the law firm obtains legal management software that provides distinctive to enable automation of the core processes in its different departments or units. The components should have the capacity to work together in order to establish an end-to-end legal management process (Schwalbe, 2010). Alternatively, they may function as individual software applications that integrate with the existing payroll, accounting and case systems.

While varied software applications may be appropriate, it is recommended that the law firm obtains CLIO, a practice management, client collaboration, time & billing platform that allows for secure access to client data from anywhere. This would not only allow synchronization and accuracy in the billing and payroll operations, but also enhance accountability. It comes with six features that would be useful in enhancing the management processes in the web-based platform. It allows for time tracking, task scheduling, simplified billing, 256-bit SSL encryption for security, document management capabilities for ease and accuracy, not to mention the fact that it is entirely web-based.

Alternatively, it could obtain Rocket Matter, a web-based practice and time management software product that comes with capabilities such as calendaring, invoicing, expense, task, and time tracking, phone messaging, matter-based ledgering, mobile access, documentation management, conflict checking, contact management, mobile access and time-tracking timer among other features. Irrespective of the software chosen, it should have the capacity for Time, Billing and Invoicing, Electronic Signatures, client and case management, Virtual Law Office Services, document management, remote access, Online Document Storage and Backup, and Encrypted Email and Document Exchange (Schwalbe, 2010). These will ensure accuracy of the information in the payroll, tracking the activities of the lawyers and allowing for easy correction of any mistakes that may arise in the entries (Schwalbe, 2010). The lawyers would also have access codes through which they can log in and make any queries and entries pertaining to their billing and payroll, thereby enhancing satisfaction.

Goals and Objectives

The implementation of the Web-based Platform project is aimed at enhancing the capacity of Anderson & Reilly Law Firm to meet certain goals and objectives. These are especially with regard to enhancing its efficiency, reduce costs and enhance accuracy and timeliness.

Enhancing employee efficiency: The undertaking of administrative and payroll activities is bound to require a reduced number of employees, in which case the law firm will increase its efficiency as it will not need to outsource some of the services.

Enhanced accuracy and timeliness in reporting: all data pertaining to administrative and payroll activities will be reported in an accurate and timely manner.

Reduction in employee turnover: Enhanced flexibility and independence of employee allows for quick addressing of any concerns that the employees may be having, thereby enhancing their satisfaction. This results in a reduction in employee turnover.

Reduced expenses: The increased efficiency results in fewer employees and outsourcing being required by the law firm, in which case it saves on overheads and costs spent on these.

Project assumptions

The success of the project is built on a number of assumptions. However, these assumptions would be likely to change with time, especially as the scope of the project increases. Nevertheless, they make the fundamental basis upon which the business case is built. The key assumptions made include the following.

It is assumed that the funds needed for making the technological migration are available in Anderson & Reilly Law Firm law firm. This includes funding for the purchase of hardware, software, as well as training of the employees about the usage and functionality of the new platform.

It is assumed that all employees and members of staff will undergo sufficient training in line with their tasks pertaining to reporting, timesheet and data entry alongside other elements of functionality of the new web-based platform.

It is assumed that the executive is backing and in support of the project, as only then would the project be bound to be successfully implemented and incorporated. This will allow for the full participation and support of the project on its entirety.

Project Constraints

As much as the environment may be conducive for the implementation of the project, there are varied constraints that face the same. These constraints are undoubtedly bound to increase (or decrease) with the development of the project into more details. Nevertheless, these constraints form the basis upon which the business case is built and from which other constraints would follow after enhanced detailing. Any additional constraints that are identified in the course of the project will be added accordingly. Nevertheless, the key constraints revolve around the following constraints.

Limited commercial off the shelf products that will have the capacity to support the administrative and payroll activities.

On the same note, the project is limited in terms of the IT resources that would be available to support not only the WP project, but also other IT initiatives that the law firm is currently undertaking.

Software and hardware providers would be limited in terms of the support they render to the project, especially considering that the implementation process will not be done by product vendors or product developers rather it will be carried out internally.

Performance of the Project

The success of the project is founded on varied key processes or resources. Their likely and expected outcomes would be fundamental to the overall success of the project, in which case they may be used as the yardsticks upon which the performance of the entire Web-based project would be measured (Scwalbe, 2010). It is imperative that quantification of the impact of these performance measures is done so as to determine the real outcome. The table below presents the key resources or processes, and matches them up with the performance measures.

Key services/Processes/ Resources Measurement of Performance

Manpower, workforce, staff resources The project is bound to streamline the workforce especially considering that the work previously carried out by the three secretaries alongside other outsourced service vendors can be comfortably carried out by the secretaries alone. In essence, not only will the law firm cease to outsource varied services pertaining to the administrative and payroll activities, but also there will be a reduction of employees carrying out these activities by at least three members of the staff.

Reporting One of the areas that will be fundamentally affected is the reporting activity in Anderson & Reilly Law Firm Law firm. The Web-based platform will streamline reporting activities in the firm, ensuring that the information is entered in an accurate and timely manner. In addition, the timelines within which reconciliation of the reports is done will be depreciably reduced from monthly to twice a year.

Maintenance of the Software and the System There will be a reduction in the number of times that maintenance of the system and software is carried out. The new web-based platform will need to undergo maintenance twice a year, which is a reduction from the monthly maintenance that the system undergoes. Needless to say, there will be a reduction in the workforce that is needed to carry out routine maintenance. It is, however, impossible, to determine the reduction in the workforce needed for maintenance of the system and the software before implementation of the same.

Data entry As noted, the system gives employees more freedom as far as making their own entries is concerned. This results in a reduction (as well as elimination) of the redundant or non-billable activities that managers and secretaries undertake.

Cost Benefit Analysis

The viability of any project for any company is based on the savings that it incorporates for the company, not only in terms of manpower and human resources but also with regard to the cost or financial savings. In essence, the costs of the project have to be matched up against the savings (benefits) so as to determine the overall viability (Scwalbe, 2010). A cost benefit analysis has been done for the project for its first year, detailing the capital costs and constituent costs, alongside the benefits accruing in the same year. These are presented in monetary terms in the table below and net loss/savings presented at the end of the same.

Costs

Action Description Amount in Dollars ($)

Purchase Web-based product, hardware, software and licenses Initial costs pertaining to the web-based project. 390,000

Hardware alignment and Software installation The cost that the IT team incurs in the installing and implementation of the new Web-based platform, transferring information and data from the old system, archiving the legacy system and operationalizing the new system. 60,000

Staff training Training the employees on the functionality of the new web-based platform so as to allow for enhanced utility and success of the same. 70,000

Total costs ($) —————————————————————— 520,000

Savings

Action Description Amount in Dollars ($)

A reduction of the Payroll staff by 3 people. Elimination of the need to outsource activities to outside vendors. The reduction of the number of individuals working in the payroll and finance department will result in savings equal to their combined annual salaries and benefits. These are added to the savings made by the eliminated need for outsourcing the law firm’s activities. 345,000

Reduction in the frequency of system and software maintenance Previously, the system and software maintenance was done on a monthly basis. This has been reduced to only twice a year, which could result in savings as fewer IT resources would be used in such activities that do not generate income. 93,000

Non-billable payroll and administrative tasks eliminated from the realm of the departmental heads and secretaries. 5 departmental heads and secretaries have always been burdened with redundant and non-billable tasks pertaining to the payroll, as well as administration. The increased independence of employees eliminates this redundancy resulting in savings in the time (and money) dedicated to such redundant activities by 12 hours a week, billed at 34 dollars for the 5 departmental heads and secretaries. 106,080

A 15% reduction in employee turnover The increased efficiency and independence has resulted in enhanced satisfaction among employees thereby reducing turnover by 15%. This saves the law the money that it requires to recruit, hire, train and orient new employees. 64,000

Total savings —————————————————————————— 608,080

Difference (Loss or savings) ————————————————————- 88,080

The implementation of the project results in savings amounting to $88,080 in the initial year. This is undoubtedly bound to have a positive impact on the sustainability and profitability of Anderson & Reilly Law Firm law firm. It is worth noting that while the cost incurred in obtaining the licenses and software is a one-time affair, all benefits pertaining to the system are bound to be repeated every year. In essence, the amount of savings is bound to increase in the subsequent years, holding all factors constant.

Analysis of the Available Alternatives for Anderson & Reilly Law Firm

As much as it would be recommended that Anderson & Reilly Law Firm implement the web-based platform, it is worth noting that the company has varied alternatives that it could still explore. In fact, the choice or decision to implement this system should be based on the evaluation of all alternatives and weighing them against each other in terms of their pros and cons so as to determine the best alternative (Scwalbe, 2010). For this project, Anderson & Reilly Law Firm has the option of retaining the mainframe legacy platform, developing the software internally, as well as outsourcing the web-based platform implementation.

Retaining the mainframe legacy platform that Anderson & Reilly Law Firm use comes with a number of disadvantages. The system is not automated, in which case timely and accurate reporting would be difficult. In addition, it results in wastage of time and money as departmental heads undertake the non-billable tasks pertaining to payroll and administration. Turnover would likely remain high due to dissatisfaction of workers especially considering that they would think of the administration as nonresponsive to their concerns more so with regards to issues pertaining to payroll and administrative activities.

The development of the software internally faces the challenge of deficiency in the technical expertise in the law firm. In addition, the development would consume a lot of time to make and install. This is over and above the enormous investment in terms of financial resources needed to kick off the development to completion.

Outsourcing the platform, on the other hand, introduces an element of redundancy in the law firm, especially considering that the company has employees who have the capacity to implement the same. In essence, that would introduce duplicity, not to mention that it would be extremely expensive on the company. Enormous savings would be made by allowing the internal workers in Anderson & Reilly Law Firm to carry out the implementation, especially considering that they have knowledge about the internal workings of the law firm and its needs.

Approvals

The implementation of the platform would be guided by a project plan. These have to be examined and given the approval by the executive individuals in the law firm. These would be required to append their signatures against their names, which will serve as an indication that they have read the document and approved the content and would allow for the making of the project plan.

ReferencesSchwalbe, K. (2010). Information technology Project Management. Boston, MA: Course Technology/Cengage Learning.

Posted in Uncategorized

Network security- defense in depth

Network security- defense in depth

Network security- defense in depth

Name:

Number:

Course:

Lecturer:

The re a number of technologies that are associated with network security defense. Firstly are those technologies that supports wireless sensor network where many features of sensor networks might aid in tackling the challenge of building network that is secure. The unique feature of sensor network might permit fresh defenses that do not actually exist in conventional network. Some of the wireless technologies for network security defense include SPINS, TINYSEC, and LEAP (Singh, Singh & Singh, 2011).

The security protocol for sensor network (SPINS) is a security building block that is optimized for resource limited environments and communication using wireless technology. SPIN consists of two safety building blocks namely sensor network encryption protocol (SNEP) and µTESLA. SNEP is a technology used to offer data confidentiality, data authentication as well as freshness of data. µTESLA offers authenticated broadcast for extremely resource limited surrounding. To attain confidentiality and message authentication code (MAC), SNET employs encryption process which also enables it to obtain two party authentication and data integrity. SNEP offers many benefits like low overhead in communication, semantic security which avoids eavesdroppers from inferring the message content from the encrypted message, protection replay, message freshness as well as data authentication. TESLA authenticates the original information packet using the technology of digital signature. It uses only symmetric mechanisms and discloses the key once per period (Singh, Singh & Singh, 2011).

The TinySec technology is a link layer security design for wireless network which offers the same services as SNEP. The services include message integrity, confidentiality protection of replay and authentication. It offers the fundamental security features of message authentication and integrity by means of MAC, confidentiality of message via encryption, semantic security via initialization vector as well as replay protection. TinySec also supports two distinct security alternatives namely TinySec-AE which is the authenticated encryption and TinySec auth which is authentication only. For the case of TinySec-AE, the cipher block chaining (CBC) mode is employed for data encryption payload where the packets are authenticated using MAC. In TinySec auth mode, the TinySec authenticates the whole packet using MAC although the data payload in not encrypted n this case (Singh, Singh & Singh, 2011).

The localized encryption and authentication protocol (LEAP) technology is a major administration protocol used for sensor networks. It is mainly constructed for the purpose of supporting in-network processing and safe communication across sensor networks. LEAP therefore offers the fundamental security services like confidentiality and authentication. Moreover, LEAP is to meet various security and performance needs that are significantly extra difficult to sensor networks. IT supports the setting up of four types of keys for every sensor node. The keys include individual key to be shared with the base station, cluster key to be shared by several adjacent nodes, group key to be shared by all nodes in the network and pairwise key to be shared with another sensor node. LEAP also supports source authentication with no prevention of in-network processing and passive involvement. IT limits the security effect of node compromise to the immediate neighborhood network of the concession node (Singh, Singh & Singh, 2011).

There are also other technologies such as supervisory control and data acquisition (SCADA), cyber forensics intrusion detection system SIEM among others. Cyber forensics is used as a reactive and post mortem after cyber attack has taken place purposely to try to find out who might have been responsible for the attack within the network. It is actually different from intrusion detection system (IDS) which is used to plan for detection of cyber criminals prior to the attack. SIEM on the other hand is a network data collector used for network traces. Its function is highly dependent on its configuration. The network security approaches can also be adopted from technologies such as those of conventional network, embedded systems or sensor networks (Dacer et al., 2014).

Another related technology is the simulation which involves moving target defense (MTD) which has been hypothesized as the possible game changer in cyber defense plus the defense of computer networks. In MTD, a group of objective analytical models have to exist for prediction of effectiveness of MTD systems to secure computer networks. These analytical models are useful both at design and runtime. The inputs are provided to the simulation model where a group of objective metrics are needed that captures particular information associated with the features of the system. The metrics captures a number of things which include the area that an attacker have to search for the purpose of determining the configuration of the system, the modifiable features of the system and what is to change in the system arrangement including how speedy the arrangement is changing. In this case, the metrics are also related to the effort needed by an attacker to attack the system (Zhuang et al., 2012).

Depending on the arrangement of the network to be defended, the analytical model have to capture the fundamental steps required to attack the system and to determine the efficiency of MTD system to defeat attacks trying to exploit both known and unknown vulnerabilities. The design of the MTD should be based on knowing the present situation which is captured in a group of runtime models. The runtime models permits the system to reason over the present state of the system and generate adaptations in order to confuse and reject possible attackers. The use of MTD is effective for especially enterprise computer networks (Zhuang et al., 2012).

There are also other related technologies like the network address space randomization which permits the use of similar network address space randomization (NASR) scheme in order to prevent worms. The dynamic network address translation (DYNAT) is another technology that is an information assurance program. The main goal is to inhibit the ability of the attacker from mapping the network, thereby making network attack extra difficult. This technique makes it appear as though the network addresses and port numbers used by computers of the network changed dynamically via dynamic network translation (DYNAT). This disguises the host identity information in the transfer control protocol (TCP)/ internet protocol (IP) packets (Zhuang et al., 2012).

The datagram technology, also known as packets is also a way of protecting information that travels across the network. In this case information travels in form of packets that are formatted in particular ways. The packets contain the header information as well as the source and destination addresses. Only the receiver device/computer of the information packets is able to recognize the destination address attached to the message.

The technology of cloud computing and big data also helps in network security and the data that travels across it. The cloud service providers are normally responsible for ensuring that the customer/ client network and systems are free from cyber attacks such as hackers. They do this by setting user privileges at different levels for their customers. By so doing, the cloud service providers play an important role in network security defense for various company clients (Harrington, 2014).

The evaluation of network security can also be done by the help Markov game Model (MGM) which is a technique suitable for improving the awareness of the network security. The Markov model gains a normal data assets vulnerabilities and risks through fusing a number of system security data gathered by multi sensors. It analyzes the propagation rule of every threat and builds a threat propagation network. The use of Game theory to analyze the behavior of threat, users and administrators it sets up Markov Game Model. The MGM can thus evaluate system security in a dynamic way and offer the most excellent reinforcement schema for the administrator. The MGM technique is suitable for real network environment with precise and efficient assessment result in terms of the prevailing network security conditions (ZHANG et al., 2011).

References

Singh, S. K., Singh, M. P., & Singh, D. K. (2011). A survey on network security and attack defense mechanism for wireless sensor networks. Int. J. Comput. Trends Tech, 5-6.

Dacer, M. C., Kargl, F., König, H., & Valdes, A. (2014). Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292).

Zhuang, R., Zhang, S., DeLoach, S. A., Ou, X., &Singhal, A. (2012, June). Simulation-based approaches to studying effectiveness of moving-target network defense. In National Symposium on Moving Target Research.

Harrington, S. L. (2014). Cyber Security Active Defense: Playing with Fire or Sound Risk Management? Rich. JL & Tech., 20, 12-13.

ZHANG, Y., Tan, X. B., Cui, X. L., & XI, H. S. (2011).Network security situation awareness approach based on Markov Game model [J].Journal of Software, 3, 009.

Posted in Uncategorized