Blog

Data Communication and Networking

Data Communication and Networking

Data Communication and Networking

Author

Institution

Introduction

Anderson & Reilly Law Firm wishes to upgrade its data communication and network systems from a legacy platform to a web-based operating system. It is, therefore, seeking a bidder who will oversee the entire process so as to ensure seamless operationalization of the new system with little or no data loss. This is the statement of work for the Request for Proposal.

Statement of Work

Project Scope

This project requires the bidders to oversee the full implementation of the web-based platform right from the purchase of hardware and software required for the transition to the setting up, data transfer and full operationalization of the new system.

During the implementation process, the successful bidder will collaborate with the law firm’s IT department so as to come up with the most appropriate software applications at the best price possible. Considering that most employees are used to the legacy system, the successful bidder will be required to undertake the training of the employees, as well as full orientation to ensure that they are properly conversant with the system (Schwalbe, 2010). On the same note, it is the duty of the successful bidder to undertake the data transfer from the legacy system to the web-based system, as well as safe archiving and storage of data with no loss of data. This transition should be done with minimum disruptions to the operations of the law firm.

Period of performance

The project will be carried out for not more than two months from 30th June to 31st August 2013. This period is divided into different phases that will guide the project right from the beginning to the end, with the specific tasks to be carried within that time. The management board should be notified at the last day of every phase as to the progress made.

Project Timeline:

June 30th to July 10th- PROJECT INITIATION PHASE- the winning bidder will work in collaboration with the IT department in the law firm to determine the specific needs with regards to hardware and software applications needed to carry out the upgrade. Measurements will be carried out to determine the length of cables required, alongside evaluations to determine the items needed (Schwalbe, 2010). The law firm’s management board will be notified after two weeks about the entire list of hardware and software.

July 16th – July 31st MARKET RESEARCH- All items needed for the migration will be identified and bought within this period. These include 23 computers, routers, switches, network adapters, network software, legal management software, cable connectors, power supply and the identified network mediums. The winning bidder will carry out comprehensive market research to determine the most appropriate hardware and software while being mindful of the cost, both in the long-term and the short-term. Every software and hardware required should be purchased by the end of this phase.

August 1st – August 15th – Installation and setting up of the Local Area Networks and full operationalization of the new computers. In addition, the contractor will undertake the backing up of the system and archiving the data stored. A temporary legacy system will be set up to prevent disruption of operations.

August 16th – August 20th – setting up of the web-based platform and filling the necessary data of the law firm. The system will be tested and troubleshooting capabilities evaluated.

August 21st –August 25th – Training of the employees of Anderson and Reilley Advocates law firm on the functioning of the web-based system.

August 26th – August 31st- The contractor will undertake full internalization of the platform and the full archiving of the legacy system leaving the web-based platform as the only one in operation.

Project manager: Dr. Rilley Barnie.

Title: Manager IT Department

Evaluation Criteria

The bidder will have to provide a list of referees and testimonials from previously completed projects. Experience in the field will be considered in evaluating the qualifications of the bidder. It is imperative that the bidder provide a list of the workers alongside their qualifications. On the same note, a statement of cost including costs pertaining to any subcontractors should be included in the bid

Physical location: the project will be carried out in the premises of Anderson & Rilley Law Firm in Ellicott Square Building located in Buffalo, NY 14225

References

Schwalbe, K. (2010). Information technology Project Management. Boston, MA: Course Technology/Cengage Learning.

Posted in Uncategorized

Network Design Consultation

Network Design Consultation

Network Design Consultation

Student’s Name

Professor’s Name

Course title

Date

Introduction

The network consultation guides one through the process of designing a network for the small business. A typical network of this sort includes three computer users, two laptops, a server, one quality networked printer and access to wireless network. The main aim is to build and design the best network for the organization, with top degree of functionality and security at the same time maintaining a low and reasonable cost. The business scale should be flexible so that as the business grows the network should also grow with it. A Small business has a reserved networking and computing requirements. The business may have a number of computers and laser printers. The network for the small office network should allow the members to share data, and printers as well as other peripherals. The computing requirements in small organizations may be met by use of a single LAN with one to two servers, and using off-the-shelf components. A small business LAN is usually managed by one person with a moderate experience and technical knowledge (Gregory, 2002).

Network design for a small billing business

A network design that allows one server to control the networking, filter internet and serve printers is the easiest since the owner can manage his business at a single point. It should have easy connections that grow with the business. Web and mail servers could be used from a hosted service and thus having one internet connection. This is recommended since it is a cost effective and is efficient for a small business. The recurring cost of maintenance could be reduced by a big rate. In this business, the owner will consider using the following devices for his billing business.

The modem serves as a network adapter that configures the internet technology on the business operating system. For proper networking, the modem is first installed before the other software to confirm compatibility. The modem is connected to an AP router that is used when transmitting data between wired and wireless networking devices. The two laptops use wireless networking from the router to access network while the workstations and the other 3 users use LAN and are connected to the main server via the switch box. The two working stations are placed in a local area network which is secure to protect data and the working stations themselves.

The LAN’s IP addresses are private and available to the local network only. The workstations and the network printers are given an IP address automatically by the server, as well as to the wireless network that hook the three users and the laptops.  The IP Addresses may be allocated permanently to the printers and workstations for easy locations accessibility. Therefore it is vital for the business owner to give an IP address to the LAN available depending on the type of business. A Switch is a mechanical device that is used for separation of machines to prevent data from going to machines that are not intended on the network. By using it, the network usage is reduced and the security of every machine is separated from the traffic created by other machines. It controls the network hard drive that transfers files to all the other computers.

The basic configuration recommended for a secure computing environment.

For a secure computing environment, the user should establish different security policies to protect data and threats. Implementing a basic firewall that manages threats and protects the system and the use of basic Antivirus software or even an anti-spyware program that protects from virus is the main methods used by business owners to protect information and the devices. Since there will be a wireless connection, a robust password is advised since wireless traffic is highly detected by software. Review of the router and firewall logs helps to identify any abnormal network connections as well as any Internet traffic. Use passwords are encouraged for all accounts.

Diagram of the network configuration

18757908445500

-800100-714375112395-19050 SEQ Figure * ARABIC 1

00 SEQ Figure * ARABIC 1

-1128395212344000-1515745221932500-1971675207645000-86677515938501014095-87185595251143000-8763002362200CABLE MODEM

00CABLE MODEM

-939802732405001838325923925SWITCH BOX

00SWITCH BOX

200025013335000466090137795000-885190215328500181927537623752 WORKSTATIONS

002 WORKSTATIONS

23336252847975952500284797547498002952750NETWORK HARDRIVE FOR FILE SHARING

00NETWORK HARDRIVE FOR FILE SHARING

474980024288751943102276475AP

ROUTER

00AP

ROUTER

952514478003800475-238125SERVER

00SERVER

3038475-790575413385054292551435001019175NETWORK PRINTER

00NETWORK PRINTER

1114425182245

108648513462000157226010985500756285628650014204951346200012560304318000

15430505905500

36703094615005314959461500

53149501206500201930012700002019300120650031527751206500

The 3 users

Network architecture and Internet access configuration

Network architecture, is the structural and logical layout of the network that consists of transmission devices, hardware and software as well as communication protocols and mode of transmission such as wireless or wired and connectivity between components. LAN is the best network type that can be used in a small business. The other computers are served by only one server (Gregory, 2002).

The networking consultation applies to the fundamental networking concepts solutions and terminology on computer networking. The networking allows one to implement network using the physical media and data links created. Ethernet and Wi-Fi deploy the LANs as they guide on the network design to be used on any business.

Hardware recommendations and related costs

This are the tangible devices required by the user to access either through a dial up connection or direct connection to a host computer. Connecting cable lines enable connection to the Internet bringing about increase in users and speed of connections on the web. A router is recommended as it is the main part of the architecture. It transmits information from one place to another in data grams. A switchbox is required as it is the central control of all the actions taking place; it distributes traffic based on application or load content. Printer prints data from the connected computer. Pc is has components such as the key board, mouse monitor, data storage, hard drive and the system unit. A Modem is used to configure and to set up the internet technology on the operating system.

Cost Table listing all the items needing purchasing and the associated cost.

Item Cost Quantity Total Cost

2working station $150 2 $300

2laptops $400 2 $800

Printer $300 1 $300

Cables $100 1 $100

Router $100 1 $100

Switch box $100 1 $100

Network hard drive $100 1 $100

Software’s (Microsoft office) $500 1 $500

(Operating System) $600 1 $600

(Timer) $50 1 $50

Cost of installation $300 1 $300

Internet Expenses $200 1 $200

Electricity Expenses $100 1 $100

Modem $100 1 $100

Business License $200 1 $200

Miscellaneous Expenses(telephone etc) $1,000 1 $1,000

$4,850

balance $150

Software recommendations and related costs

Software is the intangible utilities and Operating System that allows the computer to function, and the programs that do real work for users. For instance: windows 7&8, word processors and database, spreadsheets. Management systems and timers as well as any other software found in the ROM memory are software

Deployment in bandwidth, distance, and number of users

Network is a classification of devices that are linked to each other. Networks can be grouped into a variety of uniqueness, such as the topology, means used to transport the data, scale communications protocol used, advantage, and organizational scope. Different technologies are organized in different framework of networking for instance in topology which has bus, ring star, tree and mesh classification. Topology is a crucial part of network design theory. One can build a small business computer network without perception of the difference between star design and a bus design, but when familiar with the typical topology provides one with a better understanding on the essentials of networking concepts such as routers, hubs, and broadcasts. Bandwidth is rate of data transfer within a band of wavelengths in a computer network. It is said to be the volume of data an internet connection can handle per second. The rate/speed of bandwidth is measured in bits per second (bps). An internet connection with a larger bandwidth can move a huge amount of data in a short span compared to an internet connection with a bandwidth that is relatively low. Network failure and a large decrease in the signal strength can hinder the bandwidth rate.

Characteristics of various communication protocols

A communications protocol is a structure of rules for data switch between computers. A protocol should define the semantics, syntax and synchronization of communication. The character depends on how it is independently implemented. It can be implemented as software or hardware and even as both. A technical standard should be developed to bring the protocol into an agreement.

Deploy a basic Ethernet LAN and compare it to other network topologies

Network topologies are ways in which network elements are connected, thus the logical and physical arrangement of network nodes. Ethernet topology compared to other topologies has the simplest connection and has less network nodes. It is only preferred to a less load to avoid traffic.

Ethernet LAN network topology is cost effective mode of achieving high speed LAN transmissions since it can operate with as low as 10 to 100MB/s as compared to other topologies that are expensive. It supports various writing configurations and works best with a huge number of LAN as well as the micro-to-main frame applications. It is the easiest to install as compared to other network topologies. When compared to other network topologies, Ethernet is not a high-level performer when it comes to high-load environments. This protocol Carrier Sense Multiple Access/Collision Detection slows down significantly when many workstations compete for the one cabling trunk. It has a linear bus decentralized control which may complicate isolation of problems (Ekert, 2004).

Use technology and information resources to research issues in networking

The Networking and Information Technology Research issues are done to support technology leadership, science, and engineering and bolster economic competitiveness. The research focuses on identifying issues that will help the countries out-educate, out-innovate and out-build the world. Networking and information technology assists in Cyber security and information assurance from any attacks. High-confidence software and systems have priorities such as; Management of autonomous and complex systems; Development of science and technology for creation of cyber-physical systems (CPS); Development of technology assurance; Improvement of quality of high-confidence real-time system and software; as well as the improvement of CPS education to expand a new generation of experts (Edgar, 2005).

Reference

Gregory, R. (2002). Securing wireless networks. The Internet Protocol Journal, 5(3).

Edgar, D. (2005). Ieee 802.11. The Internet Protocol Journal, 5(1).

Ekert , V. L. (2004). An ontology for network security attacks. Lecture Notes in Computer

Science, 317-323. doi: Lecture Notes in Computer Science 3285.

Posted in Uncategorized

Data collection is a very important aspect for an organization

Data collection is a very important aspect for an organization

Statistics

Name

Institutional affiliation

Date

Introduction

Data collection is a very important aspect for an organization. The type of data an organization aspires to get determines the kind of research which will be used. Data collection can be classified into two. These types of data include qualitative and quantitative. These two methods have differences in the way data is collected and analyzed. The method used for data collection depends on the results that the organization aspires to achieve. These two types of data have their own strengths and limitations. Qualitative data involves the use of narratives and words. This method ensures that numerical information is used. The use of statistical analysis is used and this helps the organization conduct better analysis. Data achieved through this method is used to provide meaning and also ensure that there is an understanding involving the data. The use of qualitative involves classifying data in terms of quality (Bernard, 2002).

Quantitative data involves numeric and can be analyzed mathematically. This data can also be quantified. This data is very useful as it provides clear information about what is needed. The collection of this data involves the use of trial and questionnaires among other methods. The use of interviews can be used in the collection of this data. Quantitative involves classification of data in terms of quantity. The use of the two methods of data collection is very important. There are differences between the two methods of data collection. Some of the differences are that qualitative data provides differences in data because the methods of interpretation also differ. Quantitative data is said to be the same as the methods used for collection are similar (Johnson, & Christensen, 2008).

The Ballard Integrated Managed Services did collect data that was used to help it understand what is leading to its decrease. The company decided to gather data from another company. The company used both methods of qualitative and quantitative methods of data collection. These methods are what made the company identify where they are failing. There are two types of variables. They include categorical and continuous variables. Categorical involves binary, practical and ordinal. Continuous involves ratio and interval. The method of variable that BIMS used was continuous variables.

Conclusion

Data is very important to an organization. The method of data used determines the kind of data got. The organization should ensure that both qualitative and quantitative methods are used. Data should be carefully handled to ensure that the correct information needed for the organization is achieved. The organization should ensure that they plan well on what information is needed so that they can ensure that the correct method is used.

References

Bernard, H. R. (2002). Research methods in anthropology: Qualitative and quantitative methods. Walnut Creek, CA: AltaMira Press.

Johnson, B., & Christensen, L. B. (2008). Educational research: Quantitative, qualitative, and mixed approaches. Los Angeles: Sage Publications.

Posted in Uncategorized

Network Design Consultation. Network design for a small billing business

Network Design Consultation. Network design for a small billing business

Network Design Consultation

Student’s Name

Professor’s Name

Course title

Date

Introduction

The network consultation guides one through the process of designing a network for the small business. A typical network of this sort includes three computer users, two laptops, a server, one quality networked printer and access to wireless network. The main aim is to build and design the best network for the organization, with top degree of functionality and security at the same time maintaining a low and reasonable cost. The business scale should be flexible so that as the business grows the network should also grow with it. A Small business has a reserved networking and computing requirements. The business may have a number of computers and laser printers. The network for the small office network should allow the members to share data, and printers as well as other peripherals. The computing requirements in small organizations may be met by use of a single LAN with one to two servers, and using off-the-shelf components. A small business LAN is usually managed by one person with a moderate experience and technical knowledge (Gregory, 2002).

Network design for a small billing business

A network design that allows one server to control the networking, filter internet and serve printers is the easiest since the owner can manage his business at a single point. It should have easy connections that grow with the business. Web and mail servers could be used from a hosted service and thus having one internet connection. This is recommended since it is a cost effective and is efficient for a small business. The recurring cost of maintenance could be reduced by a big rate. In this business, the owner will consider using the following devices for his billing business.

The modem serves as a network adapter that configures the internet technology on the business operating system. For proper networking, the modem is first installed before the other software to confirm compatibility. The modem is connected to an AP router that is used when transmitting data between wired and wireless networking devices. The two laptops use wireless networking from the router to access network while the workstations and the other 3 users use LAN and are connected to the main server via the switch box. The two working stations are placed in a local area network which is secure to protect data and the working stations themselves.

The LAN’s IP addresses are private and available to the local network only. The workstations and the network printers are given an IP address automatically by the server, as well as to the wireless network that hook the three users and the laptops.  The IP Addresses may be allocated permanently to the printers and workstations for easy locations accessibility. Therefore it is vital for the business owner to give an IP address to the LAN available depending on the type of business. A Switch is a mechanical device that is used for separation of machines to prevent data from going to machines that are not intended on the network. By using it, the network usage is reduced and the security of every machine is separated from the traffic created by other machines. It controls the network hard drive that transfers files to all the other computers.

The basic configuration recommended for a secure computing environment.

For a secure computing environment, the user should establish different security policies to protect data and threats. Implementing a basic firewall that manages threats and protects the system and the use of basic Antivirus software or even an anti-spyware program that protects from virus is the main methods used by business owners to protect information and the devices. Since there will be a wireless connection, a robust password is advised since wireless traffic is highly detected by software. Review of the router and firewall logs helps to identify any abnormal network connections as well as any Internet traffic. Use passwords are encouraged for all accounts.

Diagram of the network configuration

-800100-714375 SEQ Figure * ARABIC 1

-86677515938501014095-87185595251143000CABLE MODEM

SWITCH BOX

2 WORKSTATIONS

233362528479759525002847975NETWORK HARDRIVE FOR FILE SHARING

47498002428875AP

ROUTER

95251447800SERVER

3038475-7905754133850542925NETWORK PRINTER

1114425182245

The 3 users

Network architecture and Internet access configuration

Network architecture, is the structural and logical layout of the network that consists of transmission devices, hardware and software as well as communication protocols and mode of transmission such as wireless or wired and connectivity between components. LAN is the best network type that can be used in a small business. The other computers are served by only one server (Gregory, 2002).

The networking consultation applies to the fundamental networking concepts solutions and terminology on computer networking. The networking allows one to implement network using the physical media and data links created. Ethernet and Wi-Fi deploy the LANs as they guide on the network design to be used on any business.

Hardware recommendations and related costs

This are the tangible devices required by the user to access either through a dial up connection or direct connection to a host computer. Connecting cable lines enable connection to the Internet bringing about increase in users and speed of connections on the web. A router is recommended as it is the main part of the architecture. It transmits information from one place to another in data grams. A switchbox is required as it is the central control of all the actions taking place; it distributes traffic based on application or load content. Printer prints data from the connected computer. Pc is has components such as the key board, mouse monitor, data storage, hard drive and the system unit. A Modem is used to configure and to set up the internet technology on the operating system.

Cost Table listing all the items needing purchasing and the associated cost.

Item Cost Quantity Total Cost

2working station $150 2 $300

2laptops $400 2 $800

Printer $300 1 $300

Cables $100 1 $100

Router $100 1 $100

Switch box $100 1 $100

Network hard drive $100 1 $100

Software’s (Microsoft office) $500 1 $500

(Operating System) $600 1 $600

(Timer) $50 1 $50

Cost of installation $300 1 $300

Internet Expenses $200 1 $200

Electricity Expenses $100 1 $100

Modem $100 1 $100

Business License $200 1 $200

Miscellaneous Expenses(telephone etc) $1,000 1 $1,000

$4,850

balance $150

Software recommendations and related costs

Software is the intangible utilities and Operating System that allows the computer to function, and the programs that do real work for users. For instance: windows 7&8, word processors and database, spreadsheets. Management systems and timers as well as any other software found in the ROM memory are software

Deployment in bandwidth, distance, and number of users

Network is a classification of devices that are linked to each other. Networks can be grouped into a variety of uniqueness, such as the topology, means used to transport the data, scale communications protocol used, advantage, and organizational scope. Different technologies are organized in different framework of networking for instance in topology which has bus, ring star, tree and mesh classification. Topology is a crucial part of network design theory. One can build a small business computer network without perception of the difference between star design and a bus design, but when familiar with the typical topology provides one with a better understanding on the essentials of networking concepts such as routers, hubs, and broadcasts. Bandwidth is rate of data transfer within a band of wavelengths in a computer network. It is said to be the volume of data an internet connection can handle per second. The rate/speed of bandwidth is measured in bits per second (bps). An internet connection with a larger bandwidth can move a huge amount of data in a short span compared to an internet connection with a bandwidth that is relatively low. Network failure and a large decrease in the signal strength can hinder the bandwidth rate.

Characteristics of various communication protocols

A communications protocol is a structure of rules for data switch between computers. A protocol should define the semantics, syntax and synchronization of communication. The character depends on how it is independently implemented. It can be implemented as software or hardware and even as both. A technical standard should be developed to bring the protocol into an agreement.

Deploy a basic Ethernet LAN and compare it to other network topologies

Network topologies are ways in which network elements are connected, thus the logical and physical arrangement of network nodes. Ethernet topology compared to other topologies has the simplest connection and has less network nodes. It is only preferred to a less load to avoid traffic.

Ethernet LAN network topology is cost effective mode of achieving high speed LAN transmissions since it can operate with as low as 10 to 100MB/s as compared to other topologies that are expensive. It supports various writing configurations and works best with a huge number of LAN as well as the micro-to-main frame applications. It is the easiest to install as compared to other network topologies. When compared to other network topologies, Ethernet is not a high-level performer when it comes to high-load environments. This protocol Carrier Sense Multiple Access/Collision Detection slows down significantly when many workstations compete for the one cabling trunk. It has a linear bus decentralized control which may complicate isolation of problems (Ekert, 2004).

Use technology and information resources to research issues in networking

The Networking and Information Technology Research issues are done to support technology leadership, science, and engineering and bolster economic competitiveness. The research focuses on identifying issues that will help the countries out-educate, out-innovate and out-build the world. Networking and information technology assists in Cyber security and information assurance from any attacks. High-confidence software and systems have priorities such as; Management of autonomous and complex systems; Development of science and technology for creation of cyber-physical systems (CPS); Development of technology assurance; Improvement of quality of high-confidence real-time system and software; as well as the improvement of CPS education to expand a new generation of experts (Edgar, 2005).

Reference

Gregory, R. (2002). Securing wireless networks. The Internet Protocol Journal, 5(3).

Edgar, D. (2005). Ieee 802.11. The Internet Protocol Journal, 5(1).

Ekert , V. L. (2004). An ontology for network security attacks. Lecture Notes in Computer

Science, 317-323. doi: Lecture Notes in Computer Science 3285.

Posted in Uncategorized

Data and methods. In this chapter, we outline the various research methodologies that were used for our study.

Data and methods. In this chapter, we outline the various research methodologies that were used for our study.

Methodology

In this chapter, we outline the various research methodologies that were used for our study. The study employed a combination of both quantitative and qualitative methodologies (mixed research strategy) in order for use to realize a realistic outcome of the study. More specifically, the chapter explores the range of techniques employed by the researcher in executing the study, research philosophy, research methods and strategies used in obtaining data and finally, data analysis and interpretation. A review of literature indicates that a several authors have in the employed the mixed research strategy in exploring the impact of TQM on organizational performance (Gherbal et al., 2012; Hansson, 2003; Irani et al, 2001; Nyame-Asiamah & Patel, 2009).

Research Philosophy

Research philosophy adopted for this study is a positivist one. Positivism is a philosophy that has its roots in empiricism. In other words, our study will rely purely on observable and measurable/quantifiable facts. The basic principle or philosophy behind this approach is that all knowledge that is factual in nature is ultimately based on positive information that is acquired from all sorts of observable occurrences and experience. Any idea that falls beyond this philosophy of provable fact is regarded as metaphysical in nature. In this case, only analytical assertions are treated as true via a process of reason as indicated in the work of Davies (2007) . For a positivist approach, a deductive approach that involves the advancement of a theoretical or conceptual framework is adopted prior to the testing of the hypotheses via an elaborate empirical observation. Following a deductive approach the basis for my research is the hypothesis that TQM was successful for XYZ’s business. Based on the data analysis and other findings, the work presented proof for and against the research hypotheses.

Research strategy

A research strategy refers to the actual plan that the researcher adopts in carrying out the research. In this case, the research strategy was case study approach. The research aimed at investigating TQM implementation in an Aluminum manufacturing firm in the Middle East. According to the work of Davies, (2007), case study is the process of developing a detailed, and yet intensive knowledge a single case, or a limited number of related cases. The main advantage of employing a case study technique is the realization or achievements of very detailed observations regarding a given case. This allows us a chance to study different elements while also scrutinizing them relative to one another. This allows us to observe the process within its natural environment. Consequently, case study helps us in realizing a more realistic and holistic view of a given research paradigm.

Research population as well as sample

The study was conducted at the XYZ’s Aluminium manufacturing plant in the Middle East. Since the studies was aimed at reviewing TQM implementation and evaluate the potential benefits it has brought to the facility.The management was used in representing the entire community. The respondent for the sample survey were selected purposefully from the plant and included only staff members who knew a lot TQM requirements, benefits and implementation. The sample was made up a 76 respondents that included XYZ’s quality assurance team, quality as well as production managers, production supervisors as well as a management representative (MR) in the plant’s quality council.

Data Collection techniques

Quantitative

The collection of data for this study involved the use of questionnaires as well as semi-structured interviews. The questionnaires were used in eliciting reactions and investigating TQM implementation in the Aluminum manufacturing facility. The semi-structured interviews were used in carrying out interviews with the plant’s General as well as TQM managers and were therefore, aimed at helping the researcher in gaining a better understanding of the themes that emerged from the earlier supplied questionnaire. For the sake of understanding the plant’s performance, its customers were also interviewed.

Questionnaires were the tools for data collection in this research. These questionnaires had three parts. Demographic details of the respondent made up the first part. The second part was specially designed in order to measure the extent of TQM implementation in the facility. The third part of the questionnaires was specially designed to capture the facility’s productivity index.

The questionnaires for measuring the implementation of TQM at the facility were designed on the basis of ten factors that were to be investigated. These included the commitment of top management, existence of quality structure as well as excellent communications structures, employee training and empowerment, quality control and benchmarking, customer satisfaction, continuous improvement, organizational culture, quality information systems, nature of supplier’s relationships and policy and strategic planning.

Qualitative

For the qualitative part of this study, unstructured interviews with the facility’s managers, customer service representatives, supervisors, financial controllers as well as operators were conducted in order to evaluate their views on TQM implementation. The interviews were useful for understanding from each one’s perspective how they view TQM and it will help capture significant information such as body language and tone of voice which would have be missed in the surveys.The interviews were conducted in peaceful environments and were at comfort of the interviewees to avoid making them feel intimidated.

The personal interviews were aimed at eliciting the participants’ reactions and views on;

The possible options considered before it was decided to implement TQM at XYZ

The challenges and hindrances faced during this process and how were they overcome

To evaluate if Quality Information System (QIS) implemented as part of TQM and how it helped

The interviews were mainly unstructured in order to allow the research to obtain various clarifications on certain variables that demanded an in-depth analysis and investigation. Due to the sensitivity of some of the issues (due to trade secrets in the aluminum manufacturing industry and other legal issues), the interviews were carried out informally. This also helped in eliminating bias on the respondents’ part.

Data presentation as well as analysis

Quantitative

In this study, SPSS was employed in analyzing the quantitative data. The data analysis was conducted in three distinct stages. The initial stage involved the checking of reliability by means of Cronbach’s Alpha . This method was employed in measuring the degree of internal consistency and to gauge the correlation of all items in our survey instrument. The second stage involved the use Persons correlation. This was used in assessing the strength of the association or relationship between the study’s dependent and independent variables. The third and last stage involved the use of multiple regressions in checking of multicollinearity (the association among the variables) as well as the degree of variance.

Qualitative

Ideally, qualitative data analysis took place concurrently during the data collection process. This allowed the researchers an opportunity to generate an emergent understanding of the various research questions. These reactions are what informed the sampling as well as subsequent questions that were asked. This was done iteratively until such a point that no new theme emerged. This point was referred to as a saturation point and it marked the end of data collection in this study. The main challenge that was faced while applying qualitative data analysis techniques from the unstructured interviews was the fact that different questions led to different answers. This meant that that the researcher had to apply great effort in systematic analysis of the responses in order for a patter to be identified (Patton, 2002)

Data Triangulation

The use of the various methods above coupled with literature review amounts to ‘triangulation’ which is increasingly being used to refer to a process of cross-checking findings deriving from both quantitative and qualitative research (Deacon et al, 1998). The use of qualitative and quantitative research in conjunction may often allow the researcher access to different levels of reality (Bryman and Bell, 2007). Thus, the researcher was able to focus the research from multiple angles and present conclusions and findings in a structured manner.

Results

Posted in Uncategorized

Network bridges and Routers

Network bridges and Routers

Network bridges and Routers

A brouter or a network bridge is generally a network device, which works as a router and as a bridge. In this case, the network bridges packets for the protocols, which are known, and then simply forward the rest of the packets just like the bridge would do. Routers operate at the data link layer especially for the non-routable protocols and for the routable protocols(Perlman, 2000). Recent years has seen networks continue to become complex hence the non-routable and the routable protocols mix have led to network bridges and routers combined features need. Network Bridge can handle the non-routable and the routable features by substituting as routable protocols routers and non-routable protocols bridges (Systems 2001). The bridged protocol tends to propagate throughout the network. However, techniques including learning and filtering are important in reducing potential congestion. Generally, brouters or Network Bridge are used as devices for connecting in a networking system.In doing this, they act as a network bridge and as an intern router (Perlman, 2000).

Remote wireless bridges

A remote wireless bridge is generally a hardware component, which is essential in connecting more than two network segments. In this case, the network segment tends to be logically and physically separated. A wireless bridge is important because of its ability to cut the bandwidth by almost half. Remote wireless bridge is also convenient in that a person can pick the signal anywhere and jump online (Perlman, 2000). In this case, an individual can extend his roaming with the modern repeaters and bridges. However, the remote wireless bridge has limited security and speed especially when the signal is transmitted on air. Additionally, the remote wireless bridge is unreliable in dead spots (Perlman, 2000).

.Switches/wireless switches

Just like the remote wireless bridges, the wireless switch is also an important appliance due to its convenience.However, the wireless switch has limited security and speed in its operation hence making it insecure.

Bridging versus routing

The bridging and the routing mode present two different applications modes, which are different in terms of how they both perform their roles. In this case, the bridge mode device will tend to act as a bridge, which is transparent and operates in Layer 2 of the Mac layer while the Router mode or routing device will operate in the third Layer to perform routing(Olenewa, 2014).While the bridge mode does not block multi cast or broadcast, the router mode blocks or even provides protection against multi cast or broadcast storms. Additionally, bridging or the bridge mode plays an important role in passing the Non-IP protocols whereas the routing models only passes the IP protocol which is supported. While the bridging mode allows the PPPOE protocol to pass through, the routing model does not allow the PPPOE protocol to pass through (Olenewa, 2014).

In most cases, bridging model allows the transportation of the VLAN tagging while the routing model fails to support VLAN. Lastly, bridging models does not have network segmentation in that there is only one domain. This aspect is completely opposite of the routing model whereby there is network segmentation(Olenewa, 2014). Both the routing and the bridging models are essential in connectivity or transportation of various aspects. However, the models are not reliable in some applications hence cannot be relied upon while performing certain duties.

Reference

Olenewa, J. (2014). Guide to wireless communications. Boston, MA: Course Technology/Cengage Learning.

Perlman, R. (2000). Interconnections: Bridges, routers, switches and internetworking protocols.Reading, Mass. [u.a.: Addison-Wesley.

Systems Cisco.(2001). Internetworking troubleshooting handbook.Indianapolis: Cisco.

Posted in Uncategorized

Data Analysis and Critical Appraisal of Evidence

Data Analysis and Critical Appraisal of Evidence

Data Analysis and Critical Appraisal of Evidence

Insert Name

Course Name

Date:

 

A research study may result in either qualitative data or quantitative data. If it is quantitative, it is numerical in form of numbers and thus the first tools of analyzing the data are the descriptive statistics. These are very essential in providing a summary of the pattern of findings. Descriptive statistics tools include measures of central tendency and measures of spread. Moreover, if the data collected is not in numerical form, then it has to be analyzed qualitatively. Whichever type of analysis adopted, the validity and reliability of the information produced from the analysis are very important (Golafshani, 2003). The reliability and validity of the measures used in research are significant indicators of the quality of the instruments used in the study. Relaibility is an important measure of the quality of the intsrumentation used since it helps in reducing the error as much as possible. According to DeVon et al (2007), validity of the instrument must be assessed to ensure that the instrument measures what it is supposed to measure. The instrument must be both valid and reliable. It must be correclty calibrated to be reliable. The number of subjects involved is of great importance since a large sample size reduces the error factor thereby increasing reliability and quality of the measures. This necessitates conducting power analysis to determine the effect that should be anticipated from the study- whether it will be significant or not. If the effect anticipated is large then the sample size must also be large enough.

As seen from the discussion above, the data collected could be either qualitative or quantitative. Qualitative analysis would require a highly experienced individual since the validity and reliability in this case may highly depend on the experience of the individual interprating the information or data. It would thus be appropriate to consult with an experienced individual in the nursing research. For my nursing practise, I would wish to investigate the relationship between nurse staffing and the patient outcome. This will mean that data must be collected and then anlyzed to draw a relationship between the two variables. This would imply that a data anlyst with experience must be consulted to provide guidence on whether the hypotheses are well set.

Reference:

DeVon H. A., Block M. E., Moyle-Wright P., Ernst D. M., Hayden S. J., Lazzara D. J., Savoy S. M, & Kostas-Polston E. (2007). A psychometric toolbox for testing validity and reliability. The Journal of Nursing Scholarship, 39 (2), 155–164. Retrieved from http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?did=1303899241&sid=1&Fmt=3&clientId=70192&RQT=309&VName=PQD

Golafshani, N. (2003) Understanding Reliability and Validity in Qualitative Research The Qualitative Report, 8, 4, 597-607

Posted in Uncategorized

Network administration

Network administration

Network administrator

Student’s Name

Affiliation

Course

Date

Abbreviations

NAS –Network Area Storage

SAN- Storage Area Network

IP-Internet Protocol

TCIP-Transit Communication Interface Profiles

Introduction

The primary function of the server is to store, retrieve and send files and data to other computer on its network. The servers run on client server architecture and are programs set to run for serving the requests of other programs. The growth rate was mostly influenced by the smooth run of the available database servers and storage space. Increase in student growth is directly proportional to increase in Network Attached Storage space thus need be to redesign the system as a whole. There are various factors that affect the database management of a computer operation system with many servers. These issues are usually caused by rapid growth of storage in this case student enrollment which will clog the system. (Hunt, 1998)

Primary problems

The NAS head handles traffic between network computers and server storage. It handles the management of network storage, sharing of files and access priority issues that occur. This is an advanced file –server that supports multiple network file systems that operate on Ethernet networks using TCIP/IP which makes it somewhat inefficient.

The server maybe overwhelmed by different administrators at the same time and can be caused by limited bandwidth. NAS is shared storage which without enforcing quotas can cause a hog in all the storage at expense of others (Gary Shelly, Misty Vermaat, 2008) .The solution could be more processing power or change network to allow greater bandwidth. The IP Network might get congested if operations like huge data backup are done during business hours. This can always be resolved by a Storage Area Network that uses its own protocols that is meant for huge enterprises and data centers where volume of data stored is huge.

Centralized storage is easier and cheaper to maintain, back up and administer. The centralized point makes it more expensive than local byte costs basis. The NAS could also be inefficient if it is a central data storage unit in the organization and the best solution would be mirroring the information to multiple units. Routines of back up would also be an ideal way to curb the single failure point.

NAS servers use small specialized and proprietary operating systems in an organization it would be efficient to use a server that can in compose Operating Systems (OS) such as UNIX and Windows NT. Growth can be made efficient by SAN which operates on data as a block rather than file. The architectural design is based on gigabit Ethernet equipment as opposed to the present 100 terabytes used.

The use of a Network Area Storage of 100 terabytes is effective since it is a standalone file server and can free up other servers to run applications and can be administered remotely which will assisted in managing the database. The disadvantage of using of NAS is less effective than traditional servers since most database systems are blocked based and are therefore incompatible with file based server. (Hunt, 1998)

Recommendations

Increase in growth means an increase in data distributed through the network and this means the network system has to be upgraded. The NAS server was effective in that network documents, work files and other data were stored on the NAS server linked to network. This had the advantage of not using up hard drive space for computers for the data that was available.

The best solution to assist in the situation would be to acquire a storage application that would meet the storage requirement. It should have a high performance and should be blocked based to increase performance as well as offload main communications. It should be reliable and should unapproved access to the data by an unauthorized user. The only set back if we implement the SAN would be cost of installing maintenance and implementing. This back end storage networks can be geographically distributed over vast area and operate at gigabyte speeds. It is appropriate for data transfer applications and for storing large amounts of data. (Gary Shelly, Misty Vermaat, 2008)

In text we can also use Jumbo Frames instead of normal Ethernet frame to communicate with storage device. This method reduces the number of packets that need to be processed resulting in higher efficiency and effective throughput.

It is also depends on the universities available budget, data security requirements, network infrastructure, data availability requirements. Upgrading will be preferred when growth occurs and the server will get slower, and then the server will eventually become noisy and if more time is spent on dealing with server problem much money will be spent doing so. It is usually much less risky proposition.

Reference

Gary Shelly, Misty Vermaat. (2008). Discovering computers. (pp. 475-503). New York:

Cengage Learning.

Hunt Craig (1998). Windows nt tcp/ip network administration. (pp. 12-69). California: “O’Reilly Media, Inc.”.

Posted in Uncategorized

Darwins Darkest Hour

Darwins Darkest Hour

Institution

Instructor

Course

Student

Darwin’s Darkest Hour

This movie is a dram that shows the greatest personal crisis of Charles Darwin on his decision to publicize his evolution theory. His point of making the decision is seen as a crisis since he has no clear idea about the public reaction by making the theory public having spent years refining the theory ideas as well as the great efforts he spent in writing about the origin of species (Goldsmith). Darwin wishes to have his efforts and ideas to go public, but he is bothered by a conflict between religious values of the orthodox religion.

These religious values should not have been a source of conflict that would make Darwin shy off from publishing his theory. Instead of waiting for the same ideas to be published by another person in another version, he would have done it without hesitation. His final decision to publish his work was caused by Alfred Wallace when Darwin learned that Wallace was about to sell ideas similar to his own (Schafersman). This case was absurd to Darwin, and he could have avoided it.

Notably, most people take advantage of the efforts established by others and Darwin should not have waited until a threat was posed to his hard work. It is unreasonable to see that the initial delays were in attempt avoid the church fury. His wife religious background was strongly embedded to the church (Goldsmith). He should have considered that if his life cared for him, she would not base their relationship to the church foundations. His fear of creating a rift with his wife was reasonable, but it should not have generated that much heat. As long as evolution existed, and it could be proven by scientific facts, Darwin should not have seen the church as a threat to his discoveries. This theory has shaped a great deal in science, and the Darwin’s Darkest Hour portrays the challenges facing the publication of the theory (Schafersman).

Works Cited

Darwin’s Darkest Hour. By John Goldsmith. Perf. Henry Ian Cusick. NOVA, Boston. 7 Oct 2009.

Schafersman, Steven. Darwin’s Darkest Hour: A Review of the Television Drama. 7 Oct 2009 . 19 May 2013 <http://www.texscience.org/reviews/darwin%27s-darkest-hour-2009Oct7.htm>.

Posted in Uncategorized

Netflix Uses Publicly Open Innovation Strategy

Netflix Uses Publicly Open Innovation Strategy

Netflix Uses Publicly Open Innovation Strategy

The American company, Netflix, embraces a publicly open innovation strategy to handle complex problems and encourage development of its products and services. Netflix Prize is the innovation challenge that Netflix used to encourage the general public to compete in generation of a suitable filtering algorithm that would improve user series or movie suggestions by about 10 percent. Precisely, the competition was open for every person other than those who were professionally linked with Netflix. Accordingly, Netflix would offer a grand prize of one million USD for the winner.

In less than two years, more than 40, 000 teams from at least 186 nations had participated in the competition. Subsequently, Netflix found the most effective solution within 3 years after participation of 51,051 contestants. Besides, two teams provided suitable solutions but only one won the prize. However, Netflix opted to utilize an alternative solution that attracted and improvement rate of 8.43 percent since adoption of the algorithm of the grand-prize winner was too costly. Therefore, Netflix emerged victorious by using talented programmers from a wide pool of individuals in the public domain.

Even so, the participants in the project embraced the use of teams to facilitate better creativity and inn ovation. Professional programmers gained synergy for developing and refining their algorithms by working in teams. Luckily, the relatively large number of contestants suggests that the publicly open innovation strategy enjoys contributions from a wide array of professionals. Besides, Netflix managed to acquire an appropriate solution on time because contestants had the freedom to choose their most preferred partners.

Serko

Serko is a New Zealand firm that relies on intercompany innovation strategy to facilitate development and resolution of problems. In July 2019, Serko sought support and contributions from FaceMe to develop a digital travel assistant. The two companies teamed up to develop better solution for handling travel services. Luckily, each firm made vital contributions following their expertise and competence in their different areas of specialization. Serko strives to develop the most appropriate solutions for handling corporate travel and management of expenditures. On the other hand, FaceMe focuses on digital human technology. Consequently, the team created a digital, visual representation of a human assistant.

Serko used its original online travel booking platform called Zeno as the baseline for the new development. According, the innovation would effectively work with the existing infrastructure. Fortunately, the digital human assistant communicates and interact with travelers in a human-like version. Specifically, FaceMe’s Intelligent Digital Human platform powers and improves Zeno’s functionality. Thus, the team emerged successful by developing the first digital human travel assistant that offer personalized booking services.

Hence, it could be impossible for either Serko or FaceMe to develop a working digital human travel assistant since each firm has unique capabilities. That is, the innovation demanded contributions from a firm with advance skills and knowledge in Artificial Intelligence (FaceMe) as well as that in the tours and travel industry (Serko). Accordingly, Serko offers Zeno, a next-generation online booking tool that processes over 20,000 bookings per day with lots of efficiency and accuracy.

Effectiveness of Netflix’s Publicly Open Innovation Strategy

Netflix realized its target goal of developing a suitable algorithm for filtering recommendations by its clients. Moreover, the company reached out to numerous persons, thus expanding its popularity. Thus, the publicly open strategy could serve as a marketing tool for firms that target at the general public. However, Netflix is not a hundred percent successful because it (Netflix) chose an algorithm that compromises with privacy of customers.

Effectiveness of Serko’s Intercompany Innovation Strategy

Serko’s intercompany innovation strategy is highly-effective because it resulted in the development of a digital human travel assistant that integrates well with its existing online booking platform. Besides, Serko’s corporate clients are enjoying seamless booking services and better interactions and communications. Likewise, FaceMe enjoys an improved reputation following its contributions on matters about Artificial Intelligence. Moreover, each firm finds hidden expertise in their partners. Serko could probably not understand and appreciate FaceMe’s expertise in AI if not for the engagement. Similarly, FaceMe could probably not apprehend and acknowledge Serko’s expertise in online booking systems if not for the joined venture. Fortunately, the two companies gain synergy by exploring their collective knowledge.

Moreover, Serko enjoys high-financial prosperity with an operating revenue growth of 28 percent. By the end of 2019, Serko was working with an operating revenue of $23.4M.

References

https://digital.hbs.edu/platform-digit/submission/the-netflix-prize-crowdsourcing-to-improve-dvd-recommendations/https://www.pymnts.com/news/b2b-payments/2019/serko-faceme-digital-human/https://cdn2.hubspot.net/hubfs/4389989/Serko%20-%20Investor%20Centre/Reports/FY19%20Full/Full%20Year%20Results/2019-annual-report-final.pdf

Posted in Uncategorized