Monthly Archives: October, 2016

Need Help: MATH238 COURSEWORK (Statistics)


MATH238 COURSEWORK (Statistics)

To be submitted to the Faculty Office by 13:00 on Monday 7th November 2016. You should work on this coursework in self-selected groups of three students, however if you prefer to work in a pair or individually then it is okay to do this. Students who work in a group for the coursework should only submit one piece of work, clearly labelled with all of their ID numbers. You should type set your coursework using Word. Your submission must consist of no more than 4 sides of A4 pages, with font of size 12. You should give due consideration to your personal time management to ensure that coursework is submitted in plenty of time prior to the deadline. Note that plagiarism will be treated according to University regulations. Please see http://www.plymouth.ac.uk/student-life/your-studies/essential-information/regulations/plagiarism This coursework is worth 30% of the overall coursework mark for this module, so it is worth 10.5% of the overall module mark. This assessment is designed to test your ability to:  Produce graphical displays of data  Calculate appropriate statistical quantities for a data set  Use regression analysis Your work will be assessed according to the following criteria:  Presentation of graphical displays  Correct application of statistical methods  Correct conclusions  Clear and concise presentation of your solutions Coursework set on Tuesday 18th October 2016. 1. One of the characteristics of bitumen for road mixes is its Softening Point Temperature (oC). According to BS EN 12591:2009, the preferred bitumen grade for use in highways in the UK should be between 38oC and 47oC. A sample of 34 shipments of bitumen delivered to a highway building site has been examined and their Softening Point Temperature recorded below. 46.4 45.6 44.9 42.2 45.9 44.1 44.2 48.5 42.2 44.0 43.7 43.6 45.8 44.0 47.9 45.5 46.8 42.4 46.0 45.9 44.3 44.2 44.8 43.0 46.4 49.9 47.6 44.0 41.9 45.5 44.0 43.9 46.6 42.8 (a) Using Excel, create a histogram of this data, with the classes (41.55, 42.75], (42.75, 43.95], …. . (b) Calculate appropriate measures of location and spread for the data. State why you have chosen to use these. (c) Construct a 95% confidence interval for the true mean of the Softening Point Temperature. In your workings, use the precision of at least 2 decimal places. (d) The manufacturer of the sampled bitumen claims that their bitumen has Softening Point Temperature of 45oC. Based on the collected data, is there any evidence, at the 95% confidence level, to dispute the manufacturer’s claim? (e) How large the sample of softening point temperatures would need to be in order for the maximum margin of error to be 0.5 oC, at the 95% confidence level. (20 marks) (Over…) 2. The table below gives the net profits, in thousands of pounds, of a small engineering company during the first 10 years that it has been in business. Year, x Net profit, y (£000) 1 33.5 2 46.3 3 49.6 4 56 5 74.6 6 89.5 7 118.5 8 142.5 9 195.8 10 248.1 (a) Use Excel to obtain a good regression model for this data, taking the net profit as the response variable and year as the explanatory variable. You should include and briefly discuss:  a scatter plot  initial use of trendlines to assess the possible models  the proportion of variation explained by your model  tests that the coefficients are significant  analysis of the residuals  the equation for the Net Profit in terms of the Year (b) Use your regression model to estimate the net profit: (i) in year 11 and (ii) in year 15. Comment on the reliability of the results you obtain. (30 marks)

Advertisements

Need Help-Computer Homework 7


Need Help-Computer Homework 7

Carefully read the instructions for Computer Homework 7and act accordingly. Carefully read the Late Assignment Submission Policy in the Syllabus. General Instructions: (a) Complete Computer Homework 7 based on Dataset For Computer Homework_Midterm Exam_Final Exam.xlsx in the Computer Homework Module under the Modules tab on CANVAS and based on the class discussions, lecture notes, and the assigned chapters for class 10. You are strongly advised to carefully read chapter 16 in Salkind, Neil J. Statistics for People Who (Think They) Hate Statistics (5th ed.). (Thousand Oaks, CA: Sage, 2014); and chapters 14 and 15 in Berman, Evan M. and XiaoHu Wang. Essential Statistics for Public Managers and Policy Analysts (3rd ed.). (Los Angeles, CA: Sage/CQ Press, 2012. You are strongly advised to watch the YouTube video “SPSS Aids on Regression with Dummy Variables” under the Announcements tab on CANVAS (b) You must use SPSS to complete Computer Homework 7, and must submit (1) all the generated SPSS outputs in one single PDF document and (2) all the properly numbered written interpretations/responses in one single Word document in the Computer Homework 7 folder under the Assignments tab on CANVAS by 12pm on October 25. (c) Use the question numbers to organize your responses in the required word document, without including the question words in your responses. (d) You should let your interpretations and explanations reflect what all the continuous variables in the Regression stand for, as defined in the excel sheet Variable Meaning in the Dataset. An explanation example that reflects what Air quality stands for in the Variable Meaning sheet of the Dataset: Given that the standard deviation is 15 and the mean is 100, it is possible to calculate the range of Air Quality scores within ±2 standard deviations as 100 –(2)(15) to 100 + (2)(15) = 100- 30 to 100+30 = 70 to 130. Since Air quality in the Variable Meaning of the Dataset is used to mean % SO2 emission concentration per year, the range of Air Quality scores within ±2 standard deviations is 70% to 130% SO2 emission concentration per year. (e) You will be deducted five points for each part of each question you did not answer. (f) You will be deducted two points for each wrong calculation and answer. (g) You will be deducted two points for each wrong interpretation. (h) You will score zero points for Computer Homework 7 if you fail to submit the specified PDF document and the specified Word document. Page 2 of 3 Computer Homework 7 i. Use your lecture notes and the assigned readings for class 10 to guide your interpretations. ii. Watch the CANVAS YouTube on “Regression with Dummy Variables” to recode Region in column A of the Dataset into four different dummy variables: Eastern Europe and Central Asia, Latin America and Caribbean, Middle East and North Africa, and Europe). If you are coding Region into Europe, Europe must be “1” and every other region must be “0”. Repeat the same process for every other specified region in (ii) above. iii. Use the most common region in column A in the Dataset as the reference dummy variable. A reference dummy variable must be omitted from the regression computation in SPSS. iv. In one single Regression Analysis at the risk level of 0.05, use SPSS to predict Education from the following independent variables: a. The three relevant dummy variables based on the information in (ii) and (iii) above. b. Sufficient Water c. Safe Sanitation d. GDP. e. Unemployment. Notes: Make sure you check standardized coefficients, if unchecked in SPSS. v. Use SPSS to calculate collinearity diagnostics for all the continuous independent variables. vi. In 100-300 total words, a. identify all the continuous variables from (iv) above b. explain why they are continuous variables. c. identify and explain the continuous variables that are independent variable(s) from (iv) above. d. identify and explain the continuous variables that are dependent variable(s) from (iv) above. vii. In 20-25 total words, use the information in (v) above to explain which of the continuous variables should be dropped from the Regression SPSS output for (iv) above and why. Note: In your explanation, use the real names of the continuous variables. Page 3 of 3 viii. In 20-25 total words, interpret the Adjusted R-square in the SPSS outputs for the Regression in (iv) above . ix. In 100-120 total words, interpret (a) the standardized Coefficient (Beta), (b) the Sig. value, and (c) the 95% Confidence Interval for B [in the Regression SPSS outputs in (iv) above] for each of the three relevant dummy variables in the Regression in relation to the reference dummy variable omitted from the Regression in the Regression SPSS outputs. Note: In your interpretation, use the real names of the dummy variables. x. In 100-120 total words, interpret (a) the Standardized Coefficient (Beta) and (b) the Sig. value [in the Regression SPSS outputs for (iv) above] for each of the continuous independent variables. Note: In your interpretation, use the real names of the continuous variables.

Need Help-Computer Homework 7

Need Help-Assignment 3 Case Study Report


Need Help-Assignment 3 Case Study Report

To get your Assignment/Homework solutions;

Simply Click ORDER NOW and your paper details. Our support team will review the assignment(s) and assign the right expert whose specialization is same to yours to complete it within your deadline. Our Editor(s) will then review the completed paper (to ensure that it is answered accordingly) before we email you a complete paper 

Email Us for help in writing this paper for you at: support@customwritings-us.com

Assignment 3
Case Study Report

Description Marks out of Wtg(%) Due date
ASSIGNMENT 3 100.00 50.00 25th October

 

 

Applicable course objective:

  • apply ethical research and inquiry skills and demonstrate an understanding of the social impact of information technology and the need for security, privacy and ethical implications in information systems usage;
  • demonstrate problem-solving skills by identifying and resolving issues relating to information systems and their components, and proficiently utilise different types of information systems software (especially gaining proficiency in utilising databases, spreadsheets, and presentation applications).
  • apply academic and professional literacy skills and demonstrate an understanding of the importance of and differences between information and computer literacy; the basic types of software including system software (operating systems and utilities) and applications software (proprietary, off-the-shelf software applications and cloud computing); the basic hardware components of a computer system, including system unit, storage, input and output devices and the way that they interact to form a single computing system; understanding computer-based telecommunications and networking concepts; the basic concepts surrounding databases, database management systems and understanding the need for information management; the concepts surrounding the Internet, e-commerce/e-business and supply chain activities, and business intelligence, knowledge management and other business information system tools (TPSs, ERPs, MISs, DSSs etc) widely used in organisations today; and the processes involved in information system project management;
  • apply written communication skills by understanding basic information, communication and technology (ICT) terminology for effective communication and applying it within a business environment.

 

 

Applicable graduate qualities and skills gained from this assessment instrument:

  • Problem Solving (Skill U2)
  • Written & Oral Communication (Skill U4)

This assignment is quite complex, and exposes you to many different components in Microsoft Word 2007/2010/2013, some or all of which might be very unfamiliar to you. The assignment description provides some explanation of how to use these components, but you are also expected to use available resources such as Online Help and the course discussion forums, as well as exploring and experimenting on your own.

Group Submissions

Students are encouraged to work in teams to complete the assignment as teamwork is an important skill required by industry. You may choose to work alone. If you opt to work as a team, the same marks will be awarded to both students. No team can exceed more than two students. It is up to you to find a team-mate and this can usually be achieved through a request on the Study Desk.

All students must email the Course Examiner by the 30th September 2016 the following information. If no email is received it will be assumed that you are working on Assignment 3 by yourself:

Subject: CIS5100 S1 2016 Assignment 3

Dear Course Team,

I have been working [individually / in a team] on CIS5100 Assignment 3 and [I / we] will be submitting the Assignment [by myself / as a team of two students]:

  1. [Enter Student Full Name] [Enter Student ID]
  2. [Enter Student Full Name] [Enter Student ID]

Submit only one assignment if you elect to work as a team to complete this assignment. Note that marks will be awarded on the basis of the student name(s) and student number(s) that appear in the file name and in the report introduction.

Referencing Requirements

References are required and the Harvard AGPS standard of referencing must be used. This standard is detailed on USQ Library Site <http://www.usq.edu.au/library/referencing>.

Plagiarism, collusion and cheating will be severely penalised. Refer to the USQ Policy Library for more details:

Ensure that your reports are fully referenced, including any reference to the text book. Your report should include in-text references and a List of References.

Do not repeat verbatim large slabs of information from other sources such as the text – you must put the ideas/information in your own words.

You must use at least ten (10) academically sound sources other than the textbook in completing this report.

 

Preamble

Dr Nikola Tesla was extremely impressed with our computing firm’s – Einstein Technologies – development of the Ye Olde Steampunk Emporium’s Database Management System (DBMS) utilising Microsoft Access (Assignment 1) and Decision Support System (DSS) utilising Microsoft Excel (Assignment 2).

Dr Nikola Tesla realises that the business has a lot to learn and that the business will need to invest considerable money to bring the business into the modern online business world, from their current single computer mail order set-up. Dr Nikola Tesla has contracted our firm to advise the business on how they can grow their mail order business into a cutting-edge online presence. The business has asked us to develop a report to provide them with information about the following topics that they see as key to their business’ growth:

  • What Information Technology Strategies should the Business consider to obtain / retain competitive advantage in their marketspace?

(Use Baltzan et al Chapters 1 & 9 Section 2 – Business Information Systems / Enterprise Information Systems: SCM)

  • How can the business move from mail order to being an online presence?

(Use Baltzan et al Chapters 2 & 3 – A Brave New Connected World / E-Business & Mobile Business to assist you in answering this topic)

  • What would be the benefits to the business of a solid enterprise architecture?

(Use Baltzan et al Chapter 7 Section 1 – Enterprise Architecture to assist you in answering this topic)

  • What would be the benefits to the business of implementing a customer relationship management system?

(Use Baltzan et al Chapter 10 Section 1 –Enterprise Information Systems: CRM to assist you in answering this topic)

  • What privacy issues should the business be aware of when embarking on an online presence?

(Use Baltzan et al Chapter 11 Section 1 – Ethics & Privacy to assist you in answering this topic)

You are expected to have access to the Baltzan et al 3rd Edition textbook as your starting point to answering all the above questions – use of Google search in place of the textbook may result in lower or failing marks.

www.steampunktribune.com, Karl Edwards Studios.

Mrs Ada Lovelace, your manager, has set up the following tasks for you to complete this project:

Refer to the marking criteria for details of mark allocations.

All phases in this project must be developed with professionalism and user-friendliness in mind.

Task 1: Journal (max. 400 words)                                                        10%

Prepare a journal that records your activities and progress related to completing this assignment. In date order, clearly list the following:

  • Date of research activity/discussion
  • Full description of research activity / discussion (at least 25 words)
  • List of all appropriate web sites visited to collect information; other references accessed (using Harvard AGPS Referencing style – submitted separate to the List of References in Task 2).
  • Time duration of the activity

If you are working in a team, clearly state the activities of each team member.

Submit this journal as an appendix to Task 2 (after the List of References and include in the Table of Contents).

Any references to web pages and online documents, such as white papers, should be listed at the end of the journal.

Task 2: Case study (max. 4000-4,500 words)                                       90%

Report Structure and Presentation                                                                                5%

Your report should include a professional title page, computer generated Table of Contents (including List of Tables and List of Figures) and Appendices.

Note: Make sure to state the names of all students involved in the report on the title page.

Report Letter of Transmittal, Executive Summary and Introduction                          5%

Your report should include a letter of transmittal, executive summary, and introduction to the report.

Report Section 1 – Business Strategy                                                                          10%

What Information Technology Strategies should the Business consider to obtain / retain competitive advantage in their marketspace?

  1. Using Porter’s Five Forces Model, discuss how each of the five forces relates to Dr Nikola Tesla’s business.
  2. What should be the business’s focus? Discuss the business’s focus in relation to Porter’s Three Generic Strategies.
  3. What are the benefits to the business of Supply Chain Management and the types of metrics should the business be using to measure the performance of their Supply Chain Management.
  4. Discuss what are the Upstream and Downstream steps involved in the business’s Supply Chain Management.
    1. Include a diagram of the business’s current Supply Chain based on the information you have from Assignment 1, 2 and 3.

(Use Baltzan et al Chapters 1 & 9 Section 2 – Business Information Systems / Enterprise Information Systems: SCM)

 

 

Report Section 2 – E-Business and Mobile Business                                                    10%

How can the business move from mail order to being an online presence?

  1. What are the benefits and challenges that the business should be aware of before becoming an e-business?
  2. What are the characteristics of Web / Business 2.0? How should the business address these characteristics when setting themselves up as an e-business?
  3. Which type(s) of e-business model(s) should the business be considering implementing? Why?
  4. What type of e-commerce tools should the business consider utilising to connect and communicate with their customers? Why?
  5. What tools should the business use to measure their e-business success?
  6. Should the business also consider implementing m-business? What are the benefits and challenges Dr Nikola Tesla will need to be aware of?

 

(Use Baltzan et al Chapters 2 & 3 – A Brave New Connected World / E-Business & Mobile Business to assist you in answering this topic)

Report Section 3 – Enterprise Architecture                                                                 10%

What are the benefits to the business of a solid enterprise architecture?

  1. How should the business maintain and secure its information architecture to support its business operations? Propose the steps that the business should follow.
  2. Before Dr Nikola Tesla acquires the hardware, software and networking infrastructure proposed in part 2, outline the seven (7) primary characteristics of a solid infrastructure architecture he should be aware of and how they may impact on the business.
  3. Cloud computing offers an alternative to some of the infrastructure architecture proposed in part 2.
    1. How could cloud computing be utilised to reduce the acquisition costs for the hardware, software and networking infrastructure to the business?
    2. What would be the benefits and challenges of these emerging cloud services to the Dr Nikola Tesla’s business?

(Use Baltzan et al Chapter 7 Section 1 – Enterprise Architecture to assist you in answering this topic)

Report Section 4 – Customer Relationship Management                                            10%

What would be the benefits to the business of implementing a customer relationship management system?

  1. How could the business support its customer facing day-to-day operations through the use of an operational customer relationship management system for marketing?
  2. How could the business support its customer facing day-to-day operations through the use of an operational customer relationship management system for sales?
  3. How could the business support its customer facing day-to-day operations through the use of an operational customer relationship management system for customer service?
  4. In what different ways could Dr Nikola Tesla use metrics from the business’s customer relationship management systems to track and monitor performance for sales, service and marketing.

(Use Baltzan et al Chapter 10 Section 1 –Enterprise Information Systems: CRM to assist you in answering this topic)

 

 

 

Report Section 5 – Privacy                                                                                           10%

What privacy issues should the business be aware of when embarking on an online presence?

  1. What Australian laws should Dr Nikola Tesla be aware of regarding privacy? How do these laws affect how the business collects and uses information collected from its customers?
  2. How should the business communicate its commitment to the privacy of customers? Provide two (2) examples of how similar businesses achieve this communication of commitment of customer privacy.
  3. As the business’s potential client base is international, what other global information privacy issues should Dr Nikola Tesla be aware of?

(Use Baltzan et al Chapter 11 Section 1 – Ethics & Privacy to assist you in answering this topic)

Report: Conclusions and Recommendations to the Business                                      10%

Your report should include separate conclusions and recommendations sections.

  1. Conclusions provide a summary of your key findings from the body of the report.
  2. Recommendations provide a summary of the recommendations to the business based on the research conducted in the report.

 

Report: Referencing and Appropriateness of Sources                                                20%

References are required and the Harvard AGPS standard of referencing must be used. This standard is detailed on USQ Library Site <http://www.usq.edu.au/library/referencing>.

 

Ensure that your reports are fully referenced, including any reference to the text book. Your report should include in-text references and a List of References.

Do not repeat verbatim large slabs of information from other sources such as the text – you must put the ideas/information in your own words.

You must use at least ten (10) academically sound sources other than the textbook in completing this report.

You are expected to have access to the Baltzan et al 3rd Edition textbook as your starting point to answering all the above questions – use of Google search in place of the textbook may result in lower or failing marks.

Note: the word count does not include letter of transmittal, executive summary, references or appendices.

 

 

Submission Guidelines

Attach the Word 2007/2010/2013 files using the naming convention below, to your online assignment submission in the Assignment 1 area on the CIS5100 StudyDesk before midnight Australian Eastern Standard Time (AEST) on the day the assignment is due.

  1. [1st student lastname] / [initial] _ [student number] _ & _ [2nd student lastname] / [initial] _ [student number] _ [course code] _ assign1.docx
    (eg. GenrichR_0050051005_&_ShresthaA_0050051555_cis5100_assign3.docx).

Note: Simply changing the file extension to .docx on a Word 2003 file will not result in a suitable submission. If the assignment files cannot be opened by the marker, it may be treated as late until a suitable replacement is received.

Upon completion of the submission process, check your uConnect email account for an automatically generated confirmation email (if you do not have an email account, print out the Submission Complete screen before exiting the Submission System).  You must check that the file name and file size are listed correctly – if there is a problem with either, please email the course leader immediately.

If you have difficulties submitting through the StudyDesk Assignments submission tool, please review the Student Instructions document listed also on the CIS5100 StudyDesk.  As a last resort only, email the course leader for instructions on an alternative course of action.

Please note that:

  • The following is the USQ Assessment – Assignment (Late Submission) and Compassionate and Compelling Circumstances procedure that relate to Extensions and Late Assignments. They can be found under the following links:
  • Students seeking extensions for any Assignment work must provide appropriate documentation to support their request before the due date of the assignment (see points 4.3 and 4.4 in the Assessment of Compassionate and Compelling Circumstances Procedures above to see what is considered as Compassionate and Compelling reason for an extension and the level of documentation that will be needed).
  • An Assignment submitted after the due date without an approved extension of time will be penalised. The penalty for late submission is a reduction by five percent (5%) of the maximum Mark applicable for the Assignment, for each University Business Day or part Business Day that the Assignment is late. An Assignment submitted more than ten (10) University Business Days after the due date will have a Mark of zero recorded for that Assignment.
    • The StudyDesk Assignments submission tool will accept late assignments up until 23:55pm on the 10th University Business Day after the due date.

Need Help-Assignment 3 Case Study Report

To get your Assignment/Homework solutions;

Simply Click ORDER NOW and your paper details. Our support team will review the assignment(s) and assign the right expert whose specialization is same to yours to complete it within your deadline. Our Editor(s) will then review the completed paper (to ensure that it is answered accordingly) before we email you a complete paper 

Email Us for help in writing this paper for you at: support@customwritings-us.com

Need Help-Assignments for CIS8010 for S2-2016


Assignments for CIS8010 for S2-2016

Due Date:   Assignment 3 (16 Sept)

Assignment 5 (Due 24 Oct )

Student requirements

The objective of this assignment is to assess your understanding of basic project management concepts and your proficiency in using project management software to produce project documentation. In particular, the assignment focuses on the following PMBOK knowledge areas:

Project integration management;

Project scope management;

Project time management, and;

Project cost management.

 

Your task is to develop a PowerPoint presentation (Assignment 3) followed by a report (Assignment 5) for a major Theme Park Company. This business has several parks around Australia and attracts approximately 200,000 families per month. The parks appeal to all types of individuals (both nationally and internationally) including children, adults, teenagers and senior citizens.

The existing corporate information systems are quite dated. Several of them utilise superseded or legacy technologies. Management reporting out of these systems is difficult to produce and

General growth is constrained by the limitations of these underlying systems.

Recognizing the fact that the systems are not meeting management, frontline staff or customer needs, the board has endorsed a “Digital Transformation” strategy, with the high level goal of modernizing its information systems.

As an initial project, you have been requested to initiate a replacement of the Customer Relationship Management system and associated “park pass”. The current application is a thick client (limited to operating on a PC), with no mobile or web capabilities. There is also no integration between the current CRM and “park pass” (a payment card that is used to access to rides and purchase refreshments and souvenirs while in the park). In addition, each park has their own customer systems, which are not integrated across parks or with other management systems. A team of analysts collate extracts monthly to produce overall performance reporting.

From the customer side, there is no way to reward families that are loyal visitors to multiple park brands. The board would like to see customer be able to use their park pass to book online and through a newly developed mobile app.

The immediate task on hand is to develop a business plan including financial modeling aspects, human resource requirements, scheduling tasks, and solution scope. The management board would like to see an integrated, up-to-date system being developed that is accessible anywhere and hosted externally, away from the company’s data centre (i.e. cloud).

 

There are 1500 employees, made up of:

250 back office (operations, finance, etc.) staff, who need insight to customer data and park performance from their primary work computers

50 park and corporate managers, who are highly mobile and primarily need performance information (e.g. customer profitability) on mobile devices

 

1200 park employees, who need customer insights such as cross sale and discount points at point of sale systems or on mobile devices at ride kiosks, etc.

 

Assignment 5 (35 % Marks) (Due Date 24 Oct 2016)

Need Help-Assignments for CIS8010 for S2-2016

 

Objectives Covered

 

  • understand the project life cycle: initiation, planning, executing, controlling and closing
  • describe project management knowledge areas and process groups
  • Apply project management software to help plan and manage information technology projects.

 

You are required to provide a professional business report to the CEO and board of directors such that they are able to formulate strategies and allocate resources for the implementation of the project. This is a report for the implementation plan and it must not exceed 2000 words. This is a business report, fully researched and developed with supporting arguments sourced from credible journals. This component should be validated through a plagiarism software. It must contain:

 

  1. a comprehensive pre and post implementation plan of the new customer systems for the organisation;
  2. An implementation plan detailing time, cost and resource schedules. This is a project management document and you must fully demonstrate your skills in presenting a project management plan;
  3. an identification of resources required to implement the above project plan;
  4. a highlighting of potential risks (including challenges) and how these risks can be mitigated;
  5. strategies to tracking project progress (including cost) for the project; and
  6. A set of recommendations as to how the project can be successfully implemented.

 

The above components are to be presented to the CEO, and therefore need to be succinct and meaningful. The assignment should be thoroughly researched, with evidence provided through references. The CEO is keen to see a well-argued case, highlighting insights as to the key aspects, and would like to see strong points arguing your case as to the tactics and strategies for project tracking.

The above documents should be developed clearly using project tools that are available to you. As per the presentation, use your imagination to make any assumptions necessary for your report (e.g. solution cost) – you are required to state your assumptions clearly and package the documents in a professional report to management for their consideration.

 

Assignment 5 Brief

Two main sections:

  • An Executive Report – utilising your knowledge identify some of your key recommendations on how to deliver the project successfully.
  • A Project implementation Plan – a project deliverable from the methodology that the organisation has, a brief plan on the Planning, Implementation & Closing Stages of the project.

Combine together into one document, submit as a PDF.

The Assignment Scenario & Requirements document highlighted 6 key requirements – which are matched to their applicable section in red.

Executive Report (Approx. 250 words total)

  • Management Report, written like a report
  • References!

Introduction (150 words)

  • Brief Background
  • Reference Presentation
  • Reference Financials

Recommendations (1000 words)

  1. a set of recommendations as to how the project can be successfully implemented.

4 – 8 key management tactics/strategies for successful implementation of the Project

  • External Quality Assurance
  • Scope Change Management
  • Communications Management
  • Organisational Change Management
  • Development Approach (e.g. Waterfall or Agile)
  • Team Formation (HR Management)
  • Any other item from the course you believe execution of will assist successful implementation
  • Sponsors/Steering Committee Roles, etc
  • Scheduling techniques
  • Any other area of study from the course you feel is important for successful project delivery!

Conclusion (100 words)

  • Brief Wrap-up

 

Project Implementation Plan (Approx. 550 words total)

  1. a comprehensive pre and post implementation plan of the new customer systems for the organisation;
  2. an implementation plan detailing time, cost and resource schedules. This is a project management document and you must fully demonstrate your skills in presenting a project management plan;
  • Plan covering the Planning, Implementation & Closing Process Groups
  • Concise Project Management document. Focus on clarify of communication (e.g. tables, Bullets, Numbered lists)
  • Referencing allowed, but likely most your referencing is in the previous section

Planning Assumptions

  • In house Build or Buy
  • Contract or Internal Staff

Plan Pre-requisites

  1. an identification of resources required to implement the above project plan;
  • Resources
  • Budget Allocation
  • Stakeholders

Monitoring and Control

  1. strategies to tracking project progress (including cost) for the project; and

How will the project schedule, budget, etc be monitored over the life of the project?

Plan Budgets

Covering time and cost, including provisions for risks and changes

Plan Risk Management

  1. a highlighting of potential risks (including challenges) and how these risks can be mitigated;

Identify Risks to the Plan and recommend mitigation strategies

  • Key Resources
  • External Vendor
  • Requirements Quality/Completeness

Schedule

  • Make sure you include Planning, Implementation & Closing Stages

 

References (not included in word count)

  • Standard USQ Style

 

Appendices (not included in word count)

  • Work Breakdown Structure/WBS Dictionary
  • Financial Analysis
  • Other Artefacts from Assignment 3 relevant to this document
  • Other models/etc

Need Help-Assignments for CIS8010 for S2-2016

Need Help-POLS210 Class Project:


Need Help-POLS210 Class Project:

POLS210 Class Project:

There are four parts to your class project: the first three are essays. The final part is a PowerPoint presentation that will display the combined work on the essays. For each assignment, there will be detailed instructions and rubrics with scoring criteria available in the “Assignments” section of the course.

 

OVERVIEW:

 

  1. You are a White House Staff Member working for a newly inaugurated President. The President is preparing the first “State of the Union” address to Congress which will outline the president’s vision for addressing current issues facing the United States.
  2. You will research issues to create the President’s address. The president is not a dictator. The proposals must consider the Constitution, relevant court rulings, and public opinion.

 

  1. After you have completed your research of the issues, you will then create a PowerPoint presentation reflecting your proposed State of the Union address. Think of it as your TV infomercial promoting your plan, and use it to grab the public’s attention.

 

  1. The President (your class instructor) will then review your PowerPoint presentation to make sure it accurately addresses the issues facing America within the context of what is allowed under the U.S. Constitution.

Issue essays

 

Using the “Assignments” section of the classroom, you will write three essays together with cited research sources—minimum of 300 words per essay on each of the following topics/issues:

 

  1. Healthcare (due at end of Week 2)
  2. Economy (due at end of Week 4)
  3. National Security (due at end of Week 6)

 

For each essay, choose a problem within the topic. What are two prominent competing solutions to this problem? Explain which one is better and why. How will the different levels of government be involved (federal, state and local)? This will require research into news recent news articles (published within four weeks of each assignment’s due date). For each respective week, include relevant information from the required readings for that week too.

 

PowerPoint presentation (due at end of Week 7)

 

After you have completed your research of the issues for the essays, you will design and build a presentation that represents each of the above issues and proposed solutions. This is an opportunity for you to use your creative side. You will use a minimum of three slides for each issue for a total of at least nine slides.

Need Help-POLS210 Class Project:

Help-Accounting Paper


Help-Accounting Paper

Continue to place your Order Now

  1. Rationale

The aim of this assignment is to evaluate students’ understanding of critical issues which have an impact on accountability of a firm particularly with reference to the effect of compliance or non-compliance of corporate governance principles. A secondary aim is to develop and assess students’ critical appreciation of how globalization impacts the accounting and auditing profession.

  1. The learning outcomes being assessed

ILO 4 will be assessed – The ability to appraise critically the role of accounting and auditing in the arena of corporate governance.

  1. Overview of assignment

Following the ‘Brexit’ referendum, the following blog appeared on the global website, Accounting Web:

“I hope we take back control of our accounting,” said  University Professor Stella Fearnley.

“Once we’re out of the EU, we won’t have to follow the directives if we don’t want to or comply to the letter with IFRS. So far the EU’s EFRAG committee has endorsed everything the IASB has done with almost no criticism.”

The UK has gone along with financial reporting and auditing decisions coming out of the EU – and the UK Financial Reporting Council (FRC) and BIS still hasn’t resolved the highly significant semantic differences with IFRS and UK company law such as the requirement for accounts to present a “true and fair” view and the definition of distributable profits.

“If we give ourselves the power to push back the IASB, it’s something other countries might follow.

“In the future if we want an Urgent Issues Task Force, we can have one and adapt IFRS to our own needs,” she said. “We can go with what the UK demands. It’ll give us more flexibility and we could call it ‘UK IFRS’ if we want.”

According to Fearnley, the big accounting firms were very enthusiastic about the global convergence project, partly because it would protect US standards-setters (and auditors) from the impact of the Enron scandal, and partly because those firms stood to make billions of dollars from IFRS adoption. “But the state boards and the Securities and Exchange Commission would never give up control of their accounting to a group like the IASB,” she said.

Based on the US model of stronger, more interventionist regulation, Fearnley would like to see the creation of an official UK Companies Commission to take over responsibility for reporting and auditing and investigation of misconduct from the FRC, which has recently been designated as a ‘single competent authority’ by the EU arising from its recent auditing directive.

“The FRC can only investigate UK-qualified accountants,” she said. “If a CFO is a South African accountant or MBA, they can’t go near them. And what about other managers or directors – who goes after them? We need an organisation that can call anyone to account and go in quickly and get on with investigating scandals in a more timely manner than the UK’s ridiculously fragmented system currently allows.”

Required –

With reference to the contents in the blog above, write a critical review of extant literature which covers the following requirements:

  1. Keeping in mind the sense of globalisation and the current Brexit status, critically analyse and discuss if it is reasonable for the UK to develop “UK IFRS” and the possible impact on the accounting and auditing profession.
  2. Critically evaluate corporate governance principles that should be addressed in the IASB to resolve the semantic differences and meet UK’s demand.

Word Count Guidance

The word count for this assignment is 2,000 words

What is included in the word count?

  • Footnotes, except where these are used ONLY to give references to your sources. The use of footnotes to expand upon points you have made in the body of your report will count towards the word limit.
  • Appendices – except where these merely reproduce material from your sources / calculations / tables / graphs / diagrams
  • Any additional explanation of terms / glossaries etc. WILL count towards the word limit.
  • Any tables pasted as picture (.jpeg for example) will be reviewed by the marker and word count added to the main body of the text.

What does not count towards the word limit?

  • Appendices exceptions noted above.
  • Brief quotes – about 5 lines is the maximum acceptable for each quote, and you should not have more than 6 quotes in your essay. You don’t need to include any at all if you don’t want to. If you do use quotes, it is important that you have a good reason for including it – the quote must be properly introduced, appropriately referenced and you must make some comments on each one.
  • References and bibliography

How the word  limit will be enforced:

Up to 50 words above  the limit – no penalty

For each additional 50 words (or part thereof) beyond that, 1 mark will be deducted from whatever mark would have given in the absence of a penalty.

Thus for an essay with a limit of 1250 words, which is actually 1430 words, which has marked at 65% initially, a penalty of 3% would then be applied, bringing the mark down to 62%.

  1. Assessment criteria and weightings

This assignment is an individual assignment and accounts for 40% of your total mark.  Elements of this assignment are being assessed as Assurance of Learning in accordance with AACSB standards.

You will be assessed on the critical content you can bring forth in your answers. Critical discussion on a topic is often improved by the following –

  • a clear and confident refusal to accept the conclusions of other writers without evaluating the arguments and evidence that they provide;
  • a balanced presentation of reasons why the conclusions of other writers may be accepted or may need to be treated with caution;
  • a clear presentation of your own evidence and argument, leading to your conclusion; and
  • a recognition of the limitations in your own evidence, argument, and conclusion.

The marking criteria have been clearly set out in a rubric appended to this assignment brief.

Help-Accounting Paper………..Continue to place your Order Now

Need Help-Assignment 3 Report and Presentation


Assignment 3 Report and Presentation based on CASE STUDY: PEOPLESHARZ.COM

(A fictitious analysis of a security breach), Length: 2700-3000 words approx. plus Appendices

Assignment 3 Report and Presentation based on CASE STUDY: PEOPLESHARZ.COM

(A fictitious analysis of a security breach), Length: 2700-3000 words approx. plus Appendices

This assignment assesses your understanding in relation to the following three course objectives:

  1. analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks
  1. explain why continual improvement is necessary to maintain reasonably secure information systems and IT infrastructure and to describe the role of disaster recovery and business continuity plans in recovering information and operational systems when systems and hardware fail
  1. Demonstrate an ability to communicate effectively both written and orally about the management of information security in organisations.

Case Study: PEOPLESHARZ.COM (A fictitious analysis of a security breach)

Background:

PeopleSharz is an Internet Start-up founded in late 2012 riding on the Social Media boom of the late 2000s. Established by former university colleagues Mark Bukerzerg (current CEO) and Peter Tweet (CTO), the company in early 2015 had over 1.2M signed-up users from across the Globe. While in the scheme of things, the user base numbers seem good, both Mark and Peter know, that to achieve a critical mass of users that will establish PeopleSharz as a “player” in the Social Media space, they will need to reach numbers upwards of 100M users.

Internet start-ups are springing up all the time – weekly, thousands of new Social Media applications are released on the Internet and while PeopleSharz has established a strong presence and following, the company is continually innovating and responding to user requirements, industry trends and competitive challenges. Mark and Peter’s 20 person Development Workshop based in Sydney’s upcoming Technology Hub, Redfern, is a busy and dynamic environment.

PeopleSharz is aiming to become financially self-sufficient by the end of 2016 at the latest. It is at this time that their venture capital funds will be exhausted but they estimate, once they hit the 50M user mark, and have deployed into production their new advertising revenue model, (both aggressively targeted for October, 2016), they will have positive financial results.

April 21st, 2016: Major New Media News Site Headlines: “New Start-up PeopleSharz Hacked – User Passwords Dumped on Pastebin”.

Waking up to news overnight that their site has been hacked and that the hacker has posted all their client details, including passwords on Pastebin has shocked Mark and Peter. Time is of an essence so an emergency teleconference is organised between Mark, Peter and Phil Jones, (the Technical Support Manager at HotHost1 – a cloud services company where the PeopleSharz environment is hosted).

The teleconference firstly confirmed that the information posted on Pastebin was in fact real. PeopleSharz seemingly has been hacked. From then on, the teleconference degenerated into blame games between PeopleSharz and the hosting provider HotHost1– each side blaming the other for the incident and each putting the onus of an incident response on the other’s shoulders – each side stating that they had no experience with security incident response and it was not their fault nor responsibility. BUT, all did agree that something had to happen quickly!

April 21st, 2016, 9:45am: Offices of HackStop Consulting

A quiet morning for you on April 21st, 2016 until 9:45am when a call reaches your desk. As a Senior

IT Security Consultant at HackStop Consulting, you’ve had calls like this many times. It’s time to get your game on again! Time to visit the offices of PeopleSharz. Their CEO, CTO and a Manager from their hosting provider HotHost1 are desperate to meet with you.

 

 

 

 

 

You’re Task

On return from your meeting, it’s time to quickly put together a proposed plan of work and a response for PeopleSharz. Given the nature of your assignment with PeopleSharz, an urgent response and work-plan is required that outlines your approach and methodologies to:

  • Assessing what went wrong – how might the hacker have compromised the PeopleSharz environment and stolen the user information?
  • How does PeopleSharz ensure it does not happen again?

At present, no other assumptions need to be made about the actual security issues/breach. This assignment is focused upon seeing if you, the student has built up an awareness of how security in Internet Websites can be assessed and analysed to assist businesses in improving their overall security position.

By being able to outline how you would go about reviewing the security breach outlined in the PeopleSharz case study and making recommendations on improving security practices and the appropriate controls that need to be put place to reduce the risks to an acceptable level, the markers will be able to assess your level of knowledge learned in this course and the additional research you have undertaken to complete this Assignment.

Any information not provided in the case study may be assumed, but make sure that your assumptions are stated and that the assumptions are plausible.

Importantly and in addition to your own study and research, there will be two specific discussion forum threads on the assignment discussion forum where you can ask questions of the main players in the case study scenario:

  1. Mark Bukerzerg and/or Peter Tweet (PeopleSharz)
  1. Phil Jones (HotHost1)

By actively participating in the forum discussions for this assignment, you will gain valuable information and insight into this case study that will be regarded highly by the markers.

Deliverables

The success of your engagement is based upon two deliverables:

  • Development of an Incident Response Work-plan
  • A business proposal to PeopleSharz Management in the form of a presentation that outlines how the organisation should be better focusing on Information Security.

In detail:

(1) Incident Response Work-plan report (WORD Document):

  • A journal
date time duration of activity activity researched or discussed
  • Executive Summary: half-page brief outlining purpose; scope, expectations and outcomes of the proposed plan of work. (250 words)

Structured Incident Response work plan for each section includes:

  • Background and problem analysis – What went wrong? How might a hacker have compromised the PeopleSharz web site environment and stolen user information ? (approx. 500 words)
  • Threat analysis -What is to be investigated and tested, how it will be done, what sort of potential issues you are looking for and deliverables PeopleSharz and/or HotHost1 can expect for each phase of work – (eg; the “deliverable” for the phase of work could potentially be a report containing the results of a vulnerability assessment test on the PeopleSharz server(s)). (approx. 1000 words)
  • Dependencies and critical success factors to the job, such as key stakeholders in this security breach – people to be interviewed or whose involvement in that phase of work is required. (Remember, you don’t always get free-rein access to systems and other information and because time is of importance, you won’t get a long time to master the environment. But, as you know, you cannot also always believe everything you are told). What is key to getting this job done efficiently and what support do you need to get this done, (from PeopleSharz and also the hosting provider). (approx. 500 words)
  • Set of recommendations for improving PeopleSharz’s current security practices and ensuring that an appropriate set of controls are put in place (approx. 750 words)
  • Reference list of key sources in particular technical references which support your approach (Not counted in word count)

This assignment is focused upon seeing if as a student in this course you have built up an awareness of how security in an environment should be set up and operated. By being able to outline how you would review and test the security of the fictional organisation, PeopleSharz, through assessment of the basics such as good policies, standards, procedures and controls in place, in addition to detection of incidents, the markers will be able to assess your level of knowledge learned from the course content and from your own additional research in relation to this case study.

 

Need Help-Assignment 3 Report and Presentation

Need Help-Hist 110


Need Help-Hist 110

Reading Journal for Hist 110:  America Since the Civil War

 

In the journal you will write observations and reflections on topics you find interesting in The American Promise and Reading the American Past.  You turn in the journal three times.  Each segment of the journal will relate to a few of the chapters we are discussing.  You do not actually have to write about every chapter.

 

Each time you turn in the journal, please include comments on at least three primary source documents in Reading the American Past.  When you use the documents, notice how they relate to the history we are learning in The American Promise.  You are also encouraged to use maps, special sections, or pictures that can help us gain insight into the time periods.

 

You will probably do your best work if you write about a few topics that you find interesting.  You may also devote some of your journal to sharing insights about your overall learning in the class, and how you are developing as a student and as a historical thinker.

 

You can earn 60 points for about four pages of good quality writing.  Please double space.  You may use any style, but please divide your writing into paragraphs so it is easy to read.

 

Keys to Success:

  • When you use a document, please mention it and put the title of the document in bold.
  • Relate the documents or other special features to the history you are learning in the chapter.
  • When you see a source from the past (or present), consider the author’s perspective.
  • Reflect on how the reading relates to your own knowledge, experiences, cultural attitudes, etc.

 

 

Suggested Journal Prompts (these are just suggestions):

 

  1. What did you learn from the documents in this section? What did you find surprising?  How does the material in this chapter relate to what you learned earlier, perhaps in other classes?

 

  1. What events do you see here that have shaped the world we live in today?

 

  1. If you did a movie set in the time period of this section, what would be the key elements in your movie? Tell how you imagine the characters, and what challenges they would deal with.

 

  1. How might we understand the history differently from someone living in the time period?

 

  1. How do the documents help you understand the era? What are some important factors to consider when looking at these documents?

 

  • How are these readings, or other activities in the class, helping you grow as a critical thinker?

Need Help-Hist 110

Need Help-CSC318 ASSIGNMENT


Need Help-CSC318 ASSIGNMENT

CSC318 ASSIGNMENT 1 1 COMPUTER SCIENCE AT THE UNIVERSITY OF TORONTO CSC318H1F THE DESIGN OF INTERACTIVE COMPUTATIONAL MEDIA

Assignment 1: Harness New Technology Google ATAP has been developing new technologies that allow us to interact with computational media in ways beyond the traditional interaction paradigms and closer to natural human movements and behaviours. Project Soli is one such endeavour. At the heart of this project is the development of a new interaction sensor that relies on radar technology to accurately and efficiently capture tiny and discrete hand motions. In essence, this sensor transforms the human hand into a control mechanism. The goal of this assignment is to imagine and propose a new application for this technology. This assignment is individual; pairs and teams are not allowed. Instructions: 1) Watch the videos below to learn more about Project Soli and the applications recently pursued by HCI people around the world: a. https://www.youtube.com/watch?v=0QNiZfSsPc0 b. https://www.youtube.com/watch?v=H41A_IWZwZI 2) Can you think of a creative, complex problem where this new interaction sensor may be a solution? Come up with a new application (not from either of the videos above!) that meets the following criteria for use of this sensor: a. Embedded in or involving an everyday object, such as a table, pencil, etc. b. Using tiny movements of the hand, including fingers, the wrist, etc. c. Transforming the hand into a control mechanism. 3) Outline the main task and 3-6 steps/interactions involved in completing the task. Be sure to describe the input and output at each step/for each interaction. You may use one of the following methods: a. Text description, that may be supplemented with visuals. b. Illustrations, with appropriate text descriptions. c. Animation and/or video (< 5 mins), demonstrating the task and steps. 4) Explain how your idea harnesses Project Soli’s new interaction sensor technology by referencing the criteria above. CSC318 ASSIGNMENT 1 2 Rubric: Criteria Weight Description of your idea (new application of the technology); ~½ page. 10% Description/illustration/demo of main task and steps/interactions; ~½ page. 50% Explanation of how criteria was met; ~½ page. 30% Proper formatting, conciseness, spelling, and grammar. 10% Deliverable: A single PDF file named A1-LASTNAME.pdf. 1” margins, Arial font, 12 pt, 1.5 line height. Structure as follows: § Title page with your name, UTORid, and preferred contact email. § Idea: o Description of your idea, § Main Task: o Description/illustration/demo of main task and steps/interactions, § Explanation: o Explanation of how criteria was met. If you created an animation or video, include the URL to the video (e.g., YouTube) where you would normally place a text description of the main task and steps/interactions. Due through MarkUs on: Monday Section: The Wednesday of Week 6 (Oct 19) at 11:59pm. Thursday Section: The Thursday of Week 6 (Oct 20) at 11:59pm.

Need Help-CSC318 ASSIGNMENT

Need Help-Hierarchical Network Design Assignment


Need Help-Hierarchical Network Design Assignment

Hierarchical Network Design Assignment

General Requirements

The college district is in the process of implementing an enterprise-wide network which will include Local Area Networks (LANs) at each site and a Wide Area Network (WAN) to provide data connectivity between all college sites.

Access to the Internet from any site in the college district is also an integral part of this implementation. Once the network is in place, the college district will implement a series of servers to facilitate online automation of all of the district’s administrative and many of the curricular functions.

Since this network implementation will have to continue to be functional for a minimum of 10 years, all design considerations should include a minimum of 20x (times) growth in the LAN throughput, 2x (times) growth in the WAN core throughput, and 5x (times) growth in the District Internet Connection throughput. The minimum requirement for initial implementation design will be Fast Ethernet to any host computer in the network and Gigabit Ethernet to any server host in the network.

 

 SECTION 1 – WIDE AREA NETWORK

The WAN will be based on a hierarchical model. Three (3) regional Hubs will be established at the Galway IT, Sligo IT and Letterkenny IT for the purpose of forming a fast WAN core network. College locations will be connected with
high-end, powerful routers. Access to the Internet or any other outside network connections will be provided through SligoIT with appropriate WAN links. For security purposes, no other connections will be permitted.

 

SECTION 2 – LOCAL AREA NETWORK & WIRING SCHEME

 

The LAN will include both wired and wireless connectivity.

Each Local Area Network (LAN) segment will use the appropriate Horizontal and Vertical Cabling which complies with TIA/EIA-568-A and TIA/EIA-569 standards.

Each College consists of 2000 student, 300 lecturers, 40 admin staff and 30 Network Technicians.  The LAN infrastructure will be based on Ethernet LAN switching. This will allow for a migration to faster speeds (more bandwidth) to the individual computers and between MDFs and IDFs without revamping the physical wiring scheme to accommodate future applications.

In each location a Main Distribution Facility (MDF) room will be established as the central point to which all LAN cabling will be terminated and will also be the point of presence (POP) for the Wide Area Network connection. All major electronic components for the network, such as the routers and LAN switches, will be housed in this location. In some cases an Intermediate Distribution Facility (IDF) room will be established, where horizontal cabling lengths exceed TIA/EIA-568-A recommended distances or where site conditions dictate. In such cases, the IDF will service its geographical area and the IDF will be connected directly to the MDF in a STAR or EXTENDED STAR topology.

Each room requiring connection to network will be able to support 24 workstations and be supplied with four (4) CAT 5 UTP runs for data, with one run terminated at the teacher’s workstation. These cable runs will be terminated in the closest MDF or IDF. All CAT 5 UTP cable run will be tested end-to-end for 100 Mbps bandwidth capacity. It will consist of a lockable cabinet containing all cable terminations and electronic components; i.e. data hubs and switches. From this location data services will be distribute within the room via decorative wire molding.

Wireless access should be secure allowing appropriate personnel to obtain connectivity with internet access.

SECTION 3 – DISTRICT SUPPLIED SERVERS AND FUNCTIONS

 

All file servers will be categorized as Enterprise or Workgroup type services, and then placed on the network topology according to function and anticipated traffic patterns of users.  You should select the appropriate files servers for the organisation along with the reasons for your selection.

SECTION 4 – ADDRESSING AND NETWORK MANAGEMENT

 

A complete TCP/IP addressing and naming convention scheme for all hosts, servers, and network interconnection devices will be developed and administered by the District Office. The implementation of unauthorized addresses will be prohibited. The District Addressing Scheme can be implemented in a number of ways. Ideas you should consider are Class A, B, and C Addresses with appropriate subnetting, Network Address Translation (NAT), and Private Network Numbers.

All computers located on the administrative networks will have static addresses, curriculum computers will obtain addresses by utilizing an appropriate server. Each site should use only addresses consistent with the overall District Addressing Scheme. A master network management host will be established at the Sligo IT college and will have total management rights over all devices in the network. This host will also serve as the router configuration host and maintain the current configurations of all routers in the network. Each region location will house a regional network management host to support its area. The management scheme for the data portion of the network will be based on the Simple Network Management Protocol (SNMP) standards. All routers will be pointed to the master Network Management host for the purpose of downloading new or existing configurations. The Sligo IT college will maintain the super user passwords for all network devices and configuration changes on these devices will be authorized from the District Office: i.e., Routers and LAN Switches.

 

 

SECTION 5 – SECURITY

External Threats – Internet Connectivity shall utilize a double firewall implementation with all Internet-exposed applications residing on a public backbone network. In this implementation all connections initiated from the Internet into the schools private network will be refused. Appropriate internal security should also be empolyed.

 

College Floor Plans

 

Each college floor plan is identical.   Make up your own plan based on the following.  Each college has 2 buildings 400 meters apart.

Building 1

2 floors

150 meters long

Each floor has 30 lecture theatres

POP is on floor 1

Building 2

1 floor

50 meters long

20 lecture theatres

Your task Plans

Your team of 4 students have been employed by the College district to design a network that suits their needs.  Internal employees will implement the design, there fore it must be documented efficiently.  Here are some examples (not all) of what is required.

Use appropriate hierarchical design including LAN design, WAN design, cut sheets, MDF and IDF layouts, Server and workstation details, User policies, Data recovery methods, Addressing, VLANs, Servers, Maps, Redundancy, Backup procedures, Security procedures, routing protocols, Internet connectivity, wireless etc…

Marks              15% of Continuous Assessment

Due                 Friday 14th of October

Warning           10% deduction per day late

 

 

LAN Design Steps Study Guide

 

First step in LAN design is to establish and document the goals of the design

 

Requirements of network design:

  1. Functionality – provide user-to-user and user-to-application connectivity with speed and reliability
  2. scalability – ability for network to grow without major changes to overall design
  3. adaptability – design can adapt and implement new technologies as they become available
  4. manageability – easy network monitoring and management to ensure on-going stability

 

Critical components of LAN design:

  1. function and placement of servers – should use 100 Mbps or more
    1. servers provide file-sharing, printing, communication, and application services
    2. servers run specialized operating systems (netware, windows NT, UNIX, LINUX)
    3. categorized into 2 classes
  1. enterprise servers – supports all the users on network by offering services (e-mail, DNS); should be placed in MDF
  2. workgroup servers – supports specific set of users, offering services such as word processing and file sharing; should be placed in IDF
  1. select correct devices to decrease collisions
    1. media contention – excessive collisions caused by too many devices
  2. segmentation – splitting a single collision domain into two or more collision domains
    1. use bridges or switches creates more bandwidth availability
    2. bridges and switches forward broadcasts not collisions
    3. bridges and switches broadcast = FF-FF-FF-FF-FF
  3. bandwidth vs broadcast domains
    1. bandwidth domain is everything associated with one port on a bridge or switch also known as a collision domain
    2. all workstations compete for the same LAN bandwidth resource

 

1st step in designing a network is to:

  • gather data about the organizational structure
    • history
    • current status
    • projected growth
    • operating policies and management procedures
    • office systems and procedures
    • viewpoints of employees
  • analyze requirements
    • availability – measures the usefulness of the network
      • throughput
      • response time
      • access to resources
    • determine network traffic load
    • cost

 

2nd step in designing a network is to develop LAN topology (star/extended star)

  1. Layer 1 – physical cabling
    1. Type of cable (cat 5 for horizontal runs, fiber for backbone and risers)
    2. Distance limitations
  1. 100 meters for cat 5
    1. 3 meters – computer to telecommunication outlet/wall plate
    2. 90 meters – wall to horizontal cross connect (patch panel)
    3. 6 meters – HCC to switch
  2. 2000 meters for fiber
    1. make a logical topology diagram
  1. location of MDF and IDF
  2. type and quantity of cabling
  • detail documentation of all cable runs
  1. Layer 2 – devices to use to provide flow control, error detection, error correction, and reduce congestion
    1. Bridges
    2. Switches
  1. Can microsegment
  2. Eliminates collisions
  • Reduces size of collision domains
  1. Can allocate bandwidth on a per-port basis
    1. Asymmetric switching – allows more bandwidth to vertical babbling, uplinks, and servers.  Provides switched connections between ports of unlike bandwidth
  1. Layer 3 – use routers which:
    1. Allows communication between segments based on layer 3 addressing
    2. Allows connectivity to WANS
    3. Stops broadcasts from reaching other LAN segments
    4. Provides scalability
    5. Adds structure to layer 3 addresses
    6. Filters data-link broadcasts and multicasts

 

3rd step in designing a network is to create logical and physical network maps – document, by site and network within the site, the IP addressing scheme

 

 

 

 

 

Components of network documentation – least performed task in a network

  1. Cut sheet diagrams
    1. Diagrams that indicate the path of the physical wiring layout
    2. Type of cable
    3. Length of each cable
    4. Type of termination for each cable
    5. Physical location of each wall plate or patch panel
    6. A labeling scheme for easy identification of each wire
  2. MDF & IDF layouts – contains a physical and logical layout
    1. Rack mounts
    2. Auxiliary equipment
    3. Servers
    4. Patch panels
  3. server and workstation configuration details – fill out about each host attached to the network
    1. make and model of computer
    2. serial number
    3. floppy drives
    4. hard drives
    5. DVD/CD-Rom drives
    6. Sound and network cards
    7. Amount of RAM
    8. Physical location, user, and network ID
    9. Purchase date and warranty information
  4. software listings – of standard and special software
    1. operating system software
    2. application software
  5. maintenance records – all repairs to all equipment included in the network
  6. security measures
    1. soft security – user rights, password definition, firewall support
    2. physical security – how MDF and IDF’s are locked, who has access, how hosts are protected
  7. user policies – how users can interact with the network and consequences

 

Security policies

  • minimum password length
  • maximum password age
  • unique passwords
  • times of logon
  • don’t use family or pet names for passwords
  • screensaver password protected

 

Data recovery methods – protecting data from loss

  • Tape backup – duplicating all stored data to magnetic tape.  Works with a flag or switch. Uses an archive bit which only backs up what has been changes
    • pros – low cost
    • cons – stores data sequentially; drains system resources (bandwidth, processor power)
  • Fault tolerant disk configurations
  • Use of uninterrupted power supplies (UPS)

 

5 types of backup operations:

  1. full backup – all files on the disk are stored on tape and the archive bit for all files is set to off
  2. incremental backup – backup all files that have been created or modified since full backup; only work in conjunction with a full backup
  3. differential backup – backup all files like incremental backup but the difference is that even though the file is saved to tape, the archive bit is not reset, so each time differential backup is done, all files modified or created since the last full backup will be stored again
  4. copy backup – backup user selected files to tape; does not reset archive bit to off
  5. daily backup – backup only the files that are modified on the day of the backup; doesn’t reset archive bit to off

 

Fault tolerant storage devices – a redundant set of devices categorized by RAID (Redundant Array of Inexpensive Disks) levels 0 – 5

 

RAID types:

  1. RAID 0 – stripes data across multiple disks, no parity, no redundancy.  Used for speed
  2. RAID 1 – disk mirroring writes data to two identical partitions on separate hard disks thus creating an automatic backup.  Provides full redundancy but requires twice as much storage space
  3. RAID 2 – writes data across multiple hard disks, with error checking.  No longer used
  4. RAID 3 – stripes data one byte at a time and has a dedicated parity drive.  Very expensive
  5. RAID 4 – stripes data one sector at a time and has dedicated parity drive. Expensive and slow
  6. RAID 5 – stripes data and parity across multiple disks (at least 3).  A separate parity disk is not required abut full data redundancy is achieved.  On NT system, the boot and system partitions cannot be located on a RAID 5 disk array.  Very fast; need at least 5 disks for full redundancy

 

The three RAID levels that are supported by most operating systems are RAID 0, RAID 1, and RAID 5

 

Volume – a physical unit of storage

 

Environmental factors that can affect a network:

  1. Static
    1. caused by lack of humidity
    2. make sure all equipment is off
    3. make sure you ground yourself before starting to install equipment
  2. Dust and dirt
  3. Heat
  4. Power conditioning – preventing electrical irregularities
    1. Isolating transformer – controls voltage spikes and high frequency noise
    2. Regulators – maintains a constant output voltage.  Handles brownouts and surges
    3. Line conditioner – a regulator with an isolating transformer built in
    4. Uninterruptible power supply – battery charger that charges a batter, that in turn powers the computer
  5. EMI and RFI
    1. EMI includes power supplies and monitors, florescent lights, large electric motors, electrical wiring
    2. RFI (Radio Frequency Interface) picked up by other equipment or improper shielded cables
  6. Software Viruses
    1. Worm – propagates itself across computers, usually by creating copies of itself in each computer’s memory
    2. Virus – “infects” computer files (usually exe files) by inserting in those files copies of itself
    3. Trojan Horse – disguised as a game, a utility, or an application

 

Network performance – a measure of a networks quickness and reliability

  • Measured by a baseline – performance level established after the network has been installed and configured properly. Use a fluke LAN meter for a baseline
  • Baselines should be periodically updated

 

Two types of networks

  1. Peer-to-peer (workgroup network) – designed for small numbers of workstations (<10)
    1. Advantages
  1. Cheaper to create and operate
  2. Users control own resources
  • Doesn’t require a dedicated server
  1. No additional software required
    1. Disadvantages
  1. No central point of management
  2. If user changes password, all passwords on shared resources must be changed individually
  • If a shared computer is turned off, those resources aren’t available
  1. No room for growth
    1. Examples
  1. Windows for workgroups
  2. Windows 95
  • Windows 98
  1. LANtastic
  1. Client-Server – network operating systems
    1. Advantages
  1. Provide centralized point of user, security, and resource management
  2. Provide access to resources with one ID and password
    1. Disadvantages
  1. Single point of failure
  2. Requires specially trained personnel to maintain
  • Takes special network software and hardware

 

Client-Server operating systems:

  • UNIX
    • Kernel based
    • Uses NFS
  • Novell Netware (versions 3.12, 4.11, 5.0)
  • Windows NT

 

Main function of network operating system is to control the network by establishing:

  • Network user
  • Rights
  • Login accounts
  • Passwords
  • Groups
  • System profiles and policies

 

Troubleshooting a network

  1. identify network/user problem
  2. gather data about problem
  3. analyze data to come up with a possible solution
  4. implement solution
  5. if problem isn’t solved, undo change and modify data
  6. go to step 3

Need Help-Hierarchical Network Design Assignment

 

%d bloggers like this: