Digital Systems Virtual Local Area Network

The virtual local area network (VLAN) is a software concept that goes beyond a single traditional local area network (LAN) to a set of LAN segments being directed by particular configurations. Its arrangements are done fully in software as it is taken as a logical entity. For it being a software concept its identifiers and arrangements should be done properly for it to function effectively (Marschke and Reynolds, 236). The most effective identification and handling of VLAN are done by frame coloring. VLANs have currently replaced the traditional network designs to avoid the use of limited broadcast VLANs.

VLANS are mainly applicable also because of their capability of avoiding broadcast floods in larger networks from consuming resources or causing unnecessary service denials. The traditional network designs are made with several flaws, for ,instance relocations of personnel and departments can be very difficult tasks, especially in the cases where the original location maintains its network sub-sections. A VLAN saves the situation of the user when the network gets so large and is encountering much traffic (Yeung and Wong, 132). However, most of the people find themselves using VLAN because the network which they are operating with has been using it.

A VLAN is recommended when one has more than 200 devices in case LAN, incase of broadcast traffic on the LAN when group of users is in need of security or they want to be on the same broadcast domain if running the same applications. Most people have reported some benefits after using VLANs. Which includes, reduced administration expenses which are associated with moves, adds, and changes, enabled leveraging existing investments, having flexible and scalable divisions, and enjoying controlled broadcast activities.

There are different types of VLAN through which a switch can distinguish between VLANS. They VLANs VLAN membership by port, by MAC address, by protocol type, and by IP subnet Address (Minoli et al, 205). The VLAN membership by port makes it clear to the user to which VLAN each port belongs. For instance, if a switch has six ports, ports 1-3 may b defined with VLAN 1, and 4-6 with VLAN 2. This type is disadvantaged because if the user happens to move from one place to the other, switch port reconfiguration must be done.

Every workstation has a MAC address which is associated with VLAN in this type of membership by MAC. When a workstation relocates, the switch automatically discovers (Marschke and Reynolds, 475) membership by protocol type is whereby one may decide to link all IP traffic with VLAN1 and all IPX with VLAN 2. Finally, membership by IP subnet Address whereby membership is based on the layer 3 header. The switch reads the layer 3 address and gets linked to a VLAN.

Frame tagging is the criteria used to determine the logical grouping of nodes into a VLAN. The two known types of frame tagging are explicit and implicit methods. Implicit tagging is used to enable a packet to belong to a VLAN on basis of media access control address. Explicit tagging has added a field on the frame such that dividing the VLAN association. The effective performance of frame tagging is at layer 2 and it needs only a little processing or administrative overhead.

The ciscos proprietary frame tagging method enables high consistency in maintaining VLAN configuration across the whole network. Mainly it makes use of layer 2 trunk frames to manage the addition, deletion, and when one wants to rename. On the other hand, it synchronizes virtual local area networks information within a VTP domain and the chances of any need to configure the same VLAN information on each and every switch used (Lammle, 756). It as well minimizes the possibility of configuration problems which may arise when changes are being made. These problems are highly controlled as they may lead to security violations as VLANS can at times cross connect in cases where duplicate names are being used.

Through the use of Ciscos proprietary frame tagging method there are some benefits which are enjoyed by the user. For instance, there is VLAN configuration consistency across the network, mapping method which allows a VLAN to be trunked over several media (Castelli, 205). Moreover, more accurate tracking and monitoring of VLANS is made possible, improved reporting of added VLANS across the network is experienced, and finally the benefit of plug and play modeling when one is adding new VLANS.

However, this tagging method is also associated with some disadvantages which are mostly related to the spanning tree protocol which is the bridging loop connecting throughout he network. All the switches are operated by sharing the instructions with each other, and the switch can take part in only one domain. Switches which are found in different domain do not by any chance share VTP information.

In conclusion, the emergence and usage of virtual local area network has come to solve the limitations which were encountered by the use of the traditional network connections.

References

Castelli, Mathew. LAN switching first-step. Cisco Press, 2004.

Lammle, Todd. CCNA: Cisco Certified Network Associate Study Guide: Exam 640-802, John Wiley and Sons, 2007.

Marschke Doug and Reynolds Harry. JUNOS Enterprise Switching. OReilly Media, Inc., 2009.

Minoli, Emma. et al. Ethernet-based metro area networks: planning and designing the provider network. McGraw-Hill Professional, 2002.

Yeung Alan and Wong Angus. Network Infrastructure Security. Springer, 2009.

Information Security and Privacy

Introduction

At the dawn of the new technology and especially in this information age, protecting the same information is very crucial to it. The information technology is propelling development in every field of development including politics, healthcare, manufacturing and agriculture. The corporate world has also benefited a great deal. With such extensive knowledge and competition in place, there are risks that have come to exist and have necessitated the need of information security. This concept means to safeguard information from unlawful persons. This is to ensure that the information is cannot be accessed, used, modified, destroyed or disrupted by any means by unauthorized individual(s). The aim of security assurance for information is to guarantee confidentiality, discretion, attainability and integrity of authentic information.

The Basic Concept of Information Security

For over two decades now three main elements of information security have been developed to form the basis of safeguard information from illegal access. These basic principles include; availability  which refers to the appropriate and dependable access to authentic information and its subsequence usage (Kartalopoulos 34)  which is described as protecting information against inappropriate modification or destruction and this entails making sure that information is authentic and not subject to repudiation; and integrity  confidentiality  which is a principles that preserves authorized discretion on accessing and disclosing information and this also covers safeguarding individual privacy as well as proprietary information (Cheswick 83).

Prudence ascertains that information is not exposed to unauthorized people. This is a very important principle since the increased use of online shopping poses a great risk to personal information. For instance, today many people shop using their credit cards and this automatically means that they have to load in their pin numbers for the transactions to be successful (Kartalopoulos 34). There are databases that have been created to enforce confidentiality by reducing the locations that the number has to appear and encrypting the information (Cheswick 85). Nonetheless if an unauthorized individual finds access to the number, then this is breach of confidentiality despite the means used. Over the recent past hacking and subsequent information theft has been very rampant. However it should be noted that this is a serious offence punishable in a criminal court. Intrusion and breach of privacy need to be stopped (Kartalopoulos 37).

Integrity as an information security element is critical to honesty and validity of data. In the corporate world cases of breach of this element are also common for instance when a worker deletes very important information. This is violation of the law whether it was an error or by malicious intent (Cheswick 85). People can increase money on payrolls or delete criminal files. There are some cases when integrity is compromised without malevolent intention for instance a typology error or an automated machine producing numerous mistakes due to improper programming (Kartalopoulos 37).

The purpose of storing or creating information is to be able to access it whenever needed. This is why availability concept is very important. The storage systems should be able to retrieve information very fast and in the original way it was stored. Tampering with accessibility is breach of this principle (Kartalopoulos 39). Therefore unauthorized persons should not interfere with passwords or codes that lead to accessibility of crucial information. Its with the above principles that security tools were created to help preserve these principles. Firewall is one of the consequential inventions.

Firewalls

Firewalls are currently among the famous network security tools that are offering protection to information systems and continue to increase. Nonetheless these firewalls are most efficient when used in concert with other protective software like anti-viruses, intrusion detecting systems among others (Kartalopoulos 39). This requires a very efficient security plan that is properly designed to meet the requirements of security policy. Efficiency is enhanced this way. A firewall is essentially a set of components that together create a barrier between two networks (Cheswick 85).

These firewalls are able to filter the flow of data coming and leaving a system. The process utilized one or several sets of instructions for inspecting the network packets when they get in or out of the network connection (Kartalopoulos 39). After the assessment, the data can be allowed to come in or blocked accordingly. The instructions can assess one or several properties of the packets with inclusion and not limited to the kind of protocol, the source and target of the hosting system as well as the origin and target of the destination port.

Firewalls are very to a great extent beneficial to the security of the host systems or the said network. They can help in doing one or more functions including:

  • Protecting and insulating applications, services and components of interior network from redundant data from public internet (Kartalopoulos 39)
  • Limiting or disabling accessibility from hosts of the internal network to the open internet services (Kartalopoulos 39).
  • Supporting translation of network address that permits internal network to make use of private internet portals (IP) address and sharing single connection with open internet

Concepts of Firewall

Firewall rule set are often created by use of two methods namely inclusive and exclusive. Exclusive firewall permits all data to get in with the exception of those that match the rule set. Inclusive firewall on the other hand operates in then exact opposite, by allowing data to get in only if they match the rule set. All others that do not match are blocked (Brenton 56). This therefore implies that inclusive firewall is better placed to protect or control the outgoing data and hence the better option for systems that provide their services to the open network internet. This is also efficient in controlling the kind of traffic that originates from the public networks that could possibly gain entry into a private network (Cheswick 92). The data that does not conform to the rules is logged off by design (Brenton 56). The inclusive firewalls are hence safer since they considerably decrease the risk of permitting unwanted data to get in.

Tightening the security can be made possible through the use of the stateful firewall. This type helps to track the connections that are opened via firewall and discriminately permit data through when it matches the existing connection or creates a new opening(Cheswick 92). Nonetheless this has a major disadvantaged of being susceptible to service denial attacks when there are several new connections that are opened in a very short time or very fast (Brenton 56). Many firewalls allow combined use of stateful and other operations to create most advantageous firewall for the specific site.

Firewall Types

There are basically three categories of firewalls in sue. The different varieties are made to address different needs of various users.

Application Gateways: These are the primary firewalls, also referred to as proxy gateway. They are comprised of bastion hosts that operate unique software to function as the proxy server. The software operates as the application level of ISO reference system and therefore derived the name from this fact (Cheswick 92). Users behind firewall therefore have to known how to operate proxy for them to make use of the internet services (Brenton 56). Conventionally, they have been very secure since they do not permit anything to go through by mistake (by default), but they require programs designed and turned on for them to start allowing data to pass. Its also pertinent to note that these firewalls are also the slowest as they have to start a lot of processes for them to be able to carry out the requested service (Wright 11).

Packet Filter: this involves a system where the Access Control Lists located on the routers are switched on. In normal usage, routers just allow data through them without any restrictions. When ACLs are employed, security is enforced with regard to what types of access that permit accessing the public internet or vice versa (Brenton 56). There is little overhead in packet filtering compared to use of application gateways since aspect controlling access is carried out at a lower ISO/OSI. This is characteristically the session/transport layer.

Application Gateway
Figure 1: Application Gateway

Bearing in mind that the operation is at lower overhead and that the filtering is not done by routers (special design computers intended for networking duty), the packet filtering is usually quicker that later firewall (Brenton 56).

Packet Filtering Gateway
Figure 2: Packet Filtering Gateway

Hybrid System: in an effort to combine application security gateway with the fluid and faster packet filtering model, some experts have devised a system that uses aspects of both models. In a number of these new models, several connections have to be authenticated and supported at the level of application (Brenton 58; Cheswick 92). Once accomplished, the remaining connection is moved to the succeeding layer where the packet filters monitor the connections to make sure that data belonging only to the outgoing (authentic and permitted) conversations are allowed to pass. Other alternatives include use of both proxies (Brenton 56). The advantage here includes offering a measure of safety against systems that offer services to the internet and also offer security to application level to the local network. In addition, this model, an intruder cannot get in the local network unless by breaking the access router and other barriers like bastion host.

Virtual Private Network

This technology permits conditioning of local or private network for a company over the shared or public network like the internet. The internet in such structure is referred to as the VPN backbone and its used for transporting data to several VPNs and also to non-VPN systems (Cheswick 102). VPN is a very characteristic element of the security systems in networking. It ultimately offers security to two or more subnets connected top the internet (Brenton 56). Each of the subnets that are served has a specific gateway to the internet which is in turn connected through a protected port to the security gateway of another subnet. This VPN in the context of internet access had been very successful in making connections in office setup, field workers and even for business associates (Cheswick 102). VPN can find use in transfer of information at a smaller portion of the expense of very distinct calls or private hired connections. It offers resources through which corporate network accessible all over the world. Nonetheless, the public nature of the internet requires addressing several security issues (Brenton 56).

VPN Firewalls

A very critical accompaniment to the VPN security is a proper firewall plan or policy. Firewalls permit authorized staff in a company network to access other resources outside the local network through the internet whereas preventing outsider from accessing them company network (Wright 12). VPNs are thus secure in extending the company network beyond the firewall and allow trusted persons and networks restricted access back to the company network. Many organizations can find security services from both VPN and firewall and hence their information is not risked even with open access to the internet (Brenton 57).

There are risks of insecurity on the internet particularly the wide area network no matter how much innovation that is introduced to the security systems (Wright 12). The risks related to the authentication of users and unauthorized snoopers of sensitive information are always present. Nonetheless, internet use has magnified this despite its existence for years (Wright 13). In addition, internet use in transporting private corporate information has created keen disquiet among information managers and users. VPN makes use of the novel security machinery that integrate security network itself so offer answers for the worry concerning the general use of internet. An internet oriented VPN that makes use of this model is evidently safer (Brenton 58).

VPN Architecture

Designing a VPN into a company network plan ought to be carried out as an essential aspect of the corporation general information security arrangement. The arrangement has to appreciate that security of the company information is only good as the loose connections to safety (Wright 13). Loose connections characteristically involve individual and not the technology that is used. In practical use, its been discovered that many security breaches are as a result of inadequate training of the individuals anticipated to use these systems (Cheswick 102). VPN is only designed to safeguard the risk that is presented by using the internet to transfer information especially very sensitive information about a corporation and so on. Properly executed VPN offered the best security profile for networking (Brenton 58).

VPN and the Internet Security

Internet offers a far-fetched instrument for information sharing. Furthermore its cheap, flexible and dominant as offers simple accessibility through well defined system that is widespread. The only setback related to the use of internet net is its directness and hence does not have privacy and consequently a serious challenge for using the internet for carrying sensitive information (Wright 14). VPN has to be implemented properly and carefully to achieve reliability, confidentiality and validity.

Its possible to create some security measures by manipulation of the general Internet protocol (IP) address which is the communication protocol used by everybody for enable communication across the internet, its possible to create securities for specific information that travel through it (Cheswick 123). An IP security set has been developed by international experts of networking which conveys safe communication capacity. This extension is very critical in presenting a secure internet  oriented VPN. This design differs from the older models in that it works on the information already on the move by safeguarding the network itself rather than the applications beings used or individuals (Wright 14). The main presumption in this mode is that network divisions outside the users network are insecure. VPN has hence found extensive use as its safer than the conventional WAN and/or dial-in remote accessibility option.

The main aspect that enables secure communication through VPN is the ability to employ tunneling technique. This technique has been very consequential in transferring data through the public networks (Wright 14). This technique regards all the packets from private networks as information (payload) that has to be fetched across the public network. VPN acts as a tunnel that encapsulates the whole packet from private users in a new IP packet ahead of their transport across public lines (Wright 14). The new packets transporting the private addresses of the origin and destination of the data as simply targeted to a second VPN gateway which safeguards the other side of network transmission. The recipient receives decodes and disassembles the infused packet and then passes the contents to the right address on private network.

Conclusion

Despite increased knowledge of information security concern many people have not taken precaution considering that they are vulnerable to infringement as long as they use the internet. Yet so many people are not aware of how their personal information is stored and how much of it can be accessed by another person or get used by the organization they are in. people have no control over their private information. Code of practice however states that there shall not be any information system that uses personal data which is to be kept secret from the public. However there are social rights to information systems which when breached, result in ethical problems. Such rights comprise the right to information confidentiality, the right to owning a computer as well as the right to liberty.

Works Cited

Brenton, Chris and Hunt, Cameron. Mastering Network Security. New York, Wiley Publishers. 2002

Cheswick, William. Bellovin, Steven and Rubin, Aviel. Firewalls and Internet Security: Repelling the Wily Hacker, (2nd Ed). Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA 2003

Kartalopoulos, Stamatios. Security of Information and Communication Networks. New York, Wiley-IEEE Press. 2009

Wright, Marie. Virtual Private Network Security, Network Security, Vol. 2000, Issue 7, Pp 11-14 New York, Prentice Hall

Registration of Partner Webpage

Introduction

This project has been done in order to provide new web page on the company website where the potential partner can participate in a questionnaire which will indicate whether they have the necessary qualifications to be a partner in the Guest Program. This website saves a substantial number of steps in the partnership launch process and will also help source a much wider spectrum of partners, leading to a substantial increase in revenue for the Guest Program hence increases the companys revenue.

It has been a great task for the company to get partners. This is because there have been a number of steps in the partnership launch process. It has not been possible for the company to see the images of the aspiring partners. This has often resulted in wrong choice of partners.

The objective is to have a new web page on the company website where the potential partner can participate in a questionnaire that will indicate whether they have the necessary qualifications to be a partner in the Guest Program or not. This questionnaire will provide all the information in one step which is normally gathered only after an exchange of 2 to 10 emails and telephone calls over a period of time ranging from a week to a month according to the circumstances. So the desired outcome is to minimize the period of time as short as possible. The main objective of this system is to create a dedicated page inviting the partners. The partner can give the essential details like the geographic validity, product range and how guest program will benefit from them

The assumptions during development of the project are that the current activity is expected to be based on email and call history pertaining to the sourcing of new partners. The activity frequency is expected to be of at least 6 queries a month. This translates to 72 new partners in a year (Lee 139).

Research and data collection methods

Interviews were conducted and adequate information was gathered on the way the website which is currently on use is being operated. The interviews were resourceful and the details on the number of steps which the aspiring partner had to go through in order to successfully be accepted. The amount of information that the company gets from the aspiring partner through the website was inadequate. Listed below are the questions which were used to conduct the interview:

  • What is the process followed when a company needed to partner with this company?
  • What is the requirement for the company to be accepted as a partner?
  • Is it possible for the company to know the outlook of the aspiring company through the website?

Observation is another method which was used during the project development process. The developer spent some time with the users of the system and observed their daily tasks. Listening is another method which has been used in data collection. The developer listened to each of the system requirements. Members had a lot of complains about the existing system which is very slow in performance. After visiting various sites with relevant information about appropriate marketing website, substantial information which assisted in drawing logic to be used in the development of the website was achieved.

Planning and Scheduling Tools

The project planning technique that has been used in the development of this project includes the project management plan. Project planning involves putting down every step which is to be followed in order to accomplish a project. It is very important to devote enough time to project plan. Time spent in project plan is a time well spent. This means that the project development process is characterized by quality measures and tools which results in excellent project. The users and the management have specified the details of the project and the expectations thereof. The access to resources has been planned in such a way that the projects with high priority are considered first before those which are of lesser priority.

Project planning is done in such a way that the project objective and the project completion date are to be accomplished. This is the way results of the project are quantified. There is control on the scope of the project and the objectives which are being done during the development of the project. This is because the project manager had no idea of the contents of the project and all that it should deliver. In the development, the developer was faced by difficult organization environment. The developer did the best practices to allow the organization do things effectively despite the hardships undergone.

Project management Plan

Project Management process steps People to Engage in the Process Communication Techniques Final Plan information
Project Planning

  • Definition of Project Scope
  • Project Charter with Assumptions, Constraints and Risks,
The project developer,
executives, users , company managers
Use of questionnaires,
Interviews,
Use the PMP and Gantt chart
Project Work Breakdown Structure (WBS)
Requirements Gathering
Users , Developer, Executive and the management Use of questionnaires, interviews,
Estimation of resource requirements and task durations The executive and the management Discussions, questionnaires and interviewing $8000
Implementation Schedule
Using Gantt charts and optimization of the critical path
The developer, users, the executive, and the management Interviewing, questionnaire,
Assessment of the actual and make report Executive , user, the management, Discussion, interviewing, questionnaire

Gantt chart

Gantt chart is one of the tools which have been used to plan for the project. Gantt chart shows the distribution of activities throughout the development process:

TASK Week
1
Week
2
Week
3
Week
4
Week
5-6
Week
7
Week
8-9
Week
10
Week
11-12
Proposal
Research
Analysis
Feasibility study
Design
Test
User manual development
Coding

Work Break Down structure may be either product or process type. If it is of any of these two types, the WBS may be used. In WBS, all essentials are supposed to be numbered. The numbering of the essentials is not precise. The developer can arrange in any way that fits his/her own terms and desires. Sometimes dictionary should be written if the result would be used in a number of projects. The developer should also consider the organization of the WBS and its format to be the key in the development. In small project WBS may end up looking like the Gantt chart. Project management settings have specific principle for combination of items in a WBS. Having WBS that works for your particular project environment is a great challenge. WBS should be designed considering its expectations and functions. The targets of WBS are to make it compatible with the work that is being done. Make important or risky efforts visible enough for the user and any other person who is interested. Enable the mapping of necessities strategy, trying, and deliverables. This method is more practical and involving thus the outcome is always very nice.

Requirement modeling

This is where the users state what the system should do for them. Feasibility study and requirement analysis was performed to determine the cost-benefit of the system and evaluate if it is worth to implement the system. Cost benefit was based on the time and effort required to see the system implemented. This was done against the objectives of the proposed system.

After the clients stated their system requirements, requirement specification were performed and the system requirements were analyzed, one at a time to determine the one which was to be implemented and the one which is not worth it and needs to be discarded. Some requirements usually are ambiguous or irrelevant to a management information system like the one proposed.

The function specification is done in this stage and the way the functions will be performed by the system is determined at this point. Systems here are partitioned into components. Constructing model of the system by viewing logical elements apart from the physical components is the objective of this section.

The function specification was done in this stage and the way the functions will be performed by the system is determined at this point. Here system is partitioned into components. It is constructing model of the system by viewing logical elements apart from the physical components. The tools used in analysis are discussed below.

Data flow diagram

Data flow diagram illustrates the steps the data follows throughout the project.. It is important to draw the data flow diagrams before the actual system is made since it reduces the errors that can be made in the system development and it makes coding easier.

Flow charts

The flow chart shows the flow of process in the system. It shows the steps to be followed until the end of a single process is reached. It is important as it enables the developer to understand the system process well in a systematic manner.

The requirements include the system requirement, software requirement, functional requirement, non-functional requirement and user requirement. For the web page to be developed, there are functions which the system must accomplish. They are listed below.

  • A person willing to access information can only do that by use of password.
  • The system will be available to users every time and have minimal down time to avoid failures.
  • Upgrading and adding more features to the system will be easier and the system will be modified according to members needs.
  • The system will be composed of modules which can be modified to be used in other systems.
  • It will be possible to install and operate the proposed system to any windows based computer provided it meets the above stated requirements.
  • The system will be developed such that it will be user friendly

There were a number of functional requirement that were needed. Like the technical requirement which describes the implementation issues which are to be implemented. This is through the use of implementing a login dialogue box and login user interface. Verification requirement is another requirement which involves checking the users if they have the right to access the system. The system should be able to allow faster data entry, processing and ease data access process. The system should occupy relatively small space to avoid space wastage. There are many risks which are likely to occur hence there should be a process of reducing the risks. The system should be completed on time so as to avoid any delays (Wasson 274).

Minimizing the risk

Schedule: Publish weekly status reports

User interface: Develop user interaction scenarios that the final product must be able to handle.

SWOT analysis

In the analysis of the viability of the system SWOT analysis was used. This includes the strengths and weaknesses of the project. It also shows the opportunities and the threats. One of the strengths of the system is its capability to be developed within the set budget. The system also is checked whether the use of the project by the company would make it have a competitive advantage. The experience, knowledge of the users is considered whether they would be able to use the system appropriately or not. The system was well used by the users without any instances of difficulty.

The project also was analyzed for weaknesses. Project had a limited budget which limited the resources and people to be developed. In SWOT analysis project opportunities is also analyzed. The way the end users responded to the new product; the end users would like the webpage as it reduced the number of steps in the partnership launch process and will also help source a much wider spectrum of partners. Adoption of the system could support core business opportunities. The opportunities for the project development also will lead to attainment of various markets and many other people will be challenge on the web page and partake of it. This is very necessary for the development of the project. The developer will realize benefits as a result of the expansion of the number of the users accessed to the system.

Threats are major factors which should be analyzed. There could be a possibility of negative publicity if the project was adopted. The aspiring partners may upload an image that does not belong to their company. For a good SWOT analysis to be done there are six things to be considered. These things include product, process, customer, distribution, finance and administration.

Cost benefit analysis

Another tool that could be used in the analysis is the cost benefit analysis. It is commonly used because it is a simple for deciding whether to make changes as a result of the higher costs than the benefits. Using this method, it is necessary to first calculate the amount of change which will cost to make and then calculate the possible benefit. The time it will take the benefit to be repaid must also be calculated. This computation is done based on profit and expenses. The indescribable objects also are used in computerization. The issue of subjectivity is always brought into the analysis process. In this project the use of this method was very complex as the calculation of the indescribable objects is very hard.

Return on investment

This can also be used to study the project. It is used to assess the effectiveness of an investment or to weigh against the effectiveness of quantity of different investments. To compute Return on investment it is arrived at by dividing the net earnings by the total amount incurred for the respective venture then multiplied by a hundred. Return on investment is very common because it is simple and versatile. If an investment is of negative return on investment, or if on the other hand, other opportunities have higher return on investment then that investment should not be done.

This computation may be used in all circumstances basing on the profits and expenses. This analysis just tries to get the profitability of the investment. In projects, we compare two web pages, the old and the new by dividing the revenue that can be generated by each webpage. These were compared using different return on investment calculation. That is dividing the net income of the new project by the total value of all the resources that have been used to develop the project. This method is flexible so it can be manipulated to fit any type of application. To use this method well one must understand the inputs.

Project evaluation

The competitiveness of the company is based on the decisions on where to invest the companys resources. A lot of efforts should be put in order to choose the right project in order to avoid wasting companys resources. Project evaluation aims at analyzing research and developing projects, or activities. The main purpose of doing project evaluation is to get an overall understanding of the project. Understanding the project is very important as it will help the developer deliver a project that will be very useful to the user. Another reason for doing project evaluation is to make priorities among the set projects targets. This will enable the developer deliver the project on time as it has been set. Another thing is making a choice on whether or not to continue with the development. A project may need more resources than it had been estimated.

An evaluation technique that was used in this project is the checklist method. This is a list of things which are used in decision making. These methods may include the practical and money-making details. It may also include, study and monetary issue. Check list method is a very simple method. It needs a minimum effort in its application. The method can be easily adapted by any company. SWOT method is always used with this evaluation technique. This technique allows more analysis interaction. The response of this may be acquired by involving a less complex technology. A good thing with this technique is its simplicity. With a good choice of factors one can ensure that the all functional areas are dealt with. It provides an important conversation on the areas disagreed. It also shows the loyalty of the people involved, to the final result. Below is the check list table that was used in the project development.

Objective To produce a webpage where the partners can participate in a questionnaire.
Marketing and distribution Users acceptance
Project completion time.
Risk incurred during development of the project.
Research and development Cost, compatibility with the current system, development time
Available skills, availability o of R&D resources and facilities
Financial Profitability, rate of return on investment, utilization of assets

Cash flow analysis method

Another method that was used in evaluation is the cash flow analysis method. It is a very simple method.conclusion of a figure of the approximations of the predicted money in and out flows is necessary. This can be bone regularly especially for short projects. The importance of this regular completion is that the shorter the time to break even analysis the lesser the risks. However, the analysis does not consider the likely returns after the breakeven point. This is not a very high-quality pointer of the potential of the project. The use of the discounted cash flow is the easiest approach to be used. The price of resources is included to the computation which takes into relation the annual outflow. Most of the time one may not identify the true cost of capital and other people may prefer to use ROI.

Adoption of the project will increase savings in the workplace. Here it could save time, professional customer service and many more time. The creation of the dedicated page inviting partners to give essential details about their company/business helps the company in choosing the correct partner. The right partner will come with good plans hence the company will be more competitive.

The project saves a substantial number of steps in the partnership launch process and will also help source a much wider spectrum of partners, leading to a substantial increase in revenue for the Guest Program. Labor cost will decrease because the partnership application will be done through the website. No employee will be needed to follow up interviewing. This is because all information that is required is included in the web page. This information includes geographic validity, product range and how guest program will benefit from them.

Another method is the decision analysis method. Here we use the probability estimates. Integrating this into the evaluation process is through the use of possibility approximation methods. This can be done. For example, it is possible to use the calculations done by other methods using estimates of the probability of commercial success. The index is established by pt PB (B-C).

The changes in costs and benefits can be influenced by the time of finishing the project. This can also be influenced by the competitive environment. It can be done by the use of dissimilar approximation methods. The developer should consider the negative and the positive values. This method is majorly used in complex projects.

This approach is good although it ignore the multi stage course that is commonly used in major developments. The decision tree technique is mostly involved in demonstrating this method. The project can be terminated if the progress is not as expected. There are a number of problems that may arise through the use of this method. The developer might take the estimates as the exact future outcomes.

Fishbone

Fishbone

Risk management matrix was used to identify the non-financial implications that could arise as a result of this project. The main issue that the fish bone diagram seeks to check the quality of problem that could be encountered in the development and use of the project. The things which were analysed include Human being. How supervision is to be done so as to avoid the risks from arising. The way the developer relate with the users, the management and the executive. Poor relation between the developer and the user may result to a poor project which will be developed.

Measurement is another important issue. The quality of equipment being used should be in good condition to avoid it failing in the middle of the process. This equipment should be tested regularly and the faulty ones are fixed or replace. Another thing is the environment. The working environment should be conducive for the developer. The resulting project should as well be useful to the end user

The resources used were also considered. The resources used were economically viable. It did not exceed the benefit that resulted from the use of the system. The process used is another issue. The process used was of good design so as to avoid using too many resources. The machines used were in a good condition. The old and the worn out machines were replaced the good ones.

Mind map

Another risk management matrix used is the mind map. Mind map is the demonstration of writing and thoughts in drawing. They are used to picture and categorize thoughts. It helps in choice making.It also helps in problem solving.The basics in the mind map in relation to the significance of original ideas. The goal of this grouping and branches is to give a representation of semantic. Mind map enhances brainstorming by the use of graphs. This encourages understanding the concept hence understanding the project. The developer on the other hand understands the ser requirement. The difference between the mind mapping and concept mapping is based on the relationship of the various patterns. Mind mapping indicate the connection with mid prevailing concept.

Testing and Integration

Individual modules were tested using a true sample data. The modules were then be integrated to make sure that the complete system acquire the intended requirements. Testing here involved detecting and fixing errors that arose due to violation of syntax and semantic rules. Testing also verified the interoperability and runtime (efficiency) of the system to various operational environments. Various check types were employed in the checking stage of the system development. This ensured that the system is accurate and meets the user requirements. Tests to be conducted included: unit, integration, functional, system, and performance tests.

Part Test was done on each module independently. This ensured that each module performs the intended function accurately as documented in the requirements specification and that it accepts all defined inputs and gave expected results. Integration test was done to test the integrated application components to determine if they actually integrate appropriately to run as one program. Here testing was done as an event. This test was aimed at confirming that the components are individually satisfactory, as shown by successful unit testing, and they also combine to perform collective functions accurately (Chaffey, Ellis-Chadwick and Johnston 238).

Functional test was done to provide a clear demonstration that functions tested are available as specified by the technical requirements, system documentation, and user manuals; based on the application specialists perspective. System test was done ensure that the entire integrated application meets user requirements. It thus tested the information flow across the whole system.

Determination of the runtime performance of the application under certain conditions i.e. measure software parameters like processing speed, response time, resource consumption, throughput to determine the efficiency.

Limitation, conclusion and implementation

Time constraint

The research involved a lot of activities like traveling, reading, browsing the internet, analyzing data, coding, testing and documentation needed a lot of time. The time allocated for this project was quite short.

Resources constraint

The project was very involving in terms of finances and resources like stationery and this hindered the development stages as the available amount of money could not cater for all needs.

Familiarity of the development tools

At the beginning of the project, I was not fully familiar with validating fields; hence I had to learn leading to consumption of the time that could be dedicated to other development stages.

Financial constrain

The estimated cost was $8000 which was hard to be raised

Recommendations

This system can further be improved so as to increase its efficiency. The modules that can be included are as shown below:

  • Financial record module: This is because in this system it does not keep the financial record and does not generate the financial report.
  • Staff payroll Module: This should be included so as to generate report on the payments of the staff.

The time provided for the project was very short. Project time should long enough in order for the students to make all possible modules.

Conclusion

This web page will face out, which enables easy capturing of partners details. It will be very helpful if adopted by the company. Validation was also very important and thus using java script I was able to ensure accuracy alongside security of the system.

Works cited

Chaffey, Dave, Fiona, Ellis-Chadwick and Kevin Johnston. Internet Marketing: Strategy, Implementation and Practice. 4th ed. New Jersey: Prentice Hall, 2009.

Lee, In. Emergent strategies for e-business processes, services, and implications: advancing corporate frameworks. Hershey: Idea Group Inc (IGI), 2008.

Samset, Knut. Project evaluation: making investments succeed. Norway: Tapir Academic, 2003.

Wasson, Charles. System analysis, design, and development: concepts, principles, and practices. New Jersey: John Wiley and Sons, 2005

Sakht Hamandishan Aran Company: Work Experience

Introduction

This is my work experience report. It contains a brief report on the company and the engineering environment where I was employed. It will also include a summary of the work I did and the Key Learnings I had as well as their implications for my future employment. In essence this report will be the summation of all that I have done in my practicum

The Company and Engineering Environment

The company which I spent my three months with is called Sakht Hamandishan Aran Company (3A), A contractor which participates in gas piping projects across the Guilan province in Iran. Although the firm is not in the Aerospace industry Sakht Hamandishan Aram Company was engaged in gas piping which required considerable large amounts of fieldwork and practical engineering work to maintain. The business is fairly large where the engineers working the gas piping are just part and parcel of a larger organization which is committed to successfully constructing the gas pipe for the Guilan province. They work hand in hand with other workers to ensure the success of the project.

I have learned that the nature of the engineering profession necessitates field work. The clean-clear-cut environment of the class room is nothing like the rough and ready atmosphere in the field. There is a great need to be an expert in complex computations and engineering concepts because there is very little time to make computations and there is far less room for error. While in the classroom making mistakes has consequences only on my grades, in the field a mistake would cost valuable time and money. At worst an error in judgment could even result in the loss of life. Simply put in the field what was learned in the classroom must come automatically. The knowledge learned in school must become instinctive as that is the precise reason why the expertise of an engineer is needed.

On the other hand, I must acknowledge that the field of Aeronautical engineering is not as risky or as environmentally exposed as engineering in the gas lines. However, Aeronautical engineering is even more precise. Lives are at stake if, for example, we fail to properly maintain aircraft. Or if I end up in the R&D sector my skill is even more vital. Nevertheless, my experience in the Gas lines has given me a great appreciation of what is truly needed to excel in my chosen field.

Scope of Work Done and Key Learnings for Future Employment

My initial duties required me to stay at the office and be a productive member of the office staff. This included filing reports taking some phone calls, sorting documents, data entry and providing reports using different software such as MS Word, Excel, Project. In other words, my initial work made me thoroughly acquainted with the office work required at Sakht Hamandishan Aran Company.

A more narrow-minded individual would fail to see the relevance of office work to an engineer. However, my own perspective tells me that this experience has taught me a lot about the back-office and logistics required for Gas Pipe engineering. It has shown me that there are numerous support services required to keep the engineering teams out in the field. I now have a deeper understanding of what kinds of tasks are needed.

Not content with the ministerial works at the office I requested to be allowed to join the company engineers in fieldwork. There I was exposed to the climate conditions in the Iranian desert. There I gained an appreciation for the meticulous and precise tasks that had to be performed to ensure efficient construction of the pipeline and effective maintenance of existing pipes. It was here that I was able to gain practical application of what I had learned at school. I was not an idle follower then. My superiors soon began to gain an appreciation of my excellent knowledge of the academic aspects of engineering. This bodes well for me because I was able to compare the theoretical academic knowledge gained in the classroom with the practical applications to be found in the actual field.

Regrettably, my learning in the Sakht Hamandishan Aran Company exposes me to only a few aspects of what will later be required of me in Aeronautical Engineering. Granted that long hours of office work have given me a renewed appreciation of the professionalism and back-office skills needed to ensure the smooth function of field operations. Conceding that practical application of engineering concepts was the order of the day during fieldwork. However, the very technical aspects of aeronautical engineering were largely absent in my work in the Gas lines. The application of my learning was effective but was not symbolic of all the things I have truly mastered in school. For example, complex theories about the transition from subsonic to transonic to supersonic speeds and the resistances involved will never find application in the field I was in.

Only the positive side, the experience in working in an international firm has given me a wider perspective with respect to my field. I am now interested in finding work in an international firm. For example, I could find employment in an Airline where I will maintain Aircraft which will fly all over the world. This would give me continued exposure to other cultures and further broaden my understanding of the world. Additionally, I could also try to gain admittance to one of the Aircraft manufacturers such as Boeing or Airbus so that I may be able to contribute my knowledge to the design of newer more modern and efficient Aircraft.

Conclusion

In summary, my experience in Sakht Hamandishan Aran Company has taught me to love my chosen field more. I am deeply appreciative that whatever area of my field I chose I will not be as exposed to the elements and possible dangers and Line engineers are in the Gas lines. It has taught me valuable experience in engineering that I might not learn in the theoretical environment of the classroom. But most importantly Sakht Hamandishan Aran Company taught me that engineering does not exist in the vacuum of a clean classroom.

GTS & STS Concepts: The Social Ramifications of IT Projects and Decisions

Socio-technical is basically people and technology. When you put an information system into an organization, unfortunately its much harder to influence peoples behavior [than to simply install computers and load software on them]. People attach emotions to their tools, and they also have cultural norms of usage that become important. Once you add people to information system usage and change efforts, you magnify the complexityits an awful headache (Easing the information system headache where people and technology intersect, 2008).

The theory of sociotechnical systems (STS, sociotechnical systems theory) became popular in 1970-1980th years. Its development was caused by European experiments with work democratization from the one hand, and from the other  works of American scientists in engineering and sociology. According to the theory, the organization which wants to become successful should provide harmonious unity of social and technical systems taking into account the purposes of the organization and external conditions. The technical system is not only the equipment, but also corporate principles, standard working procedures. Every method introduced by management engineer is a part of technical system. The social system includes everything connected with head-hunting and development of the people working in the organization, their characteristics and cultural interaction. The term system describes set of the interconnected and co-operating components forming a single entity. It is impossible to understand, how the system works, without considering its parts separately. It is understandable only after learning the interaction of people and equipment. The system is dynamic, it changes after environment changes.

Lets browse how the STS system works for such well-known company as Toyota. What is the secret of its unprecedented success? Is it because Sakiti Toyoda borrowed some magic potion from ancient Samurais when he was founding a company for manufacturing automatic weaving looms? Or perhaps, its the army of super-engineers armed with expert-systems and brand-new super computers, who work for the company? No. Everything is much simpler. Toyotas top managers responsible for product development at the American enterprises, usually answer these questions with a short phrase that their work is based upon common sense. Unfortunately, the idea of common sense in Toyota and behind its borders differs quite often. The secret of Toyotas success cannot also be defined because there is no uniting answer of how to gather to one term all the parts: persistent work, talented engineers, culture of team work, the debugged processes, a complex of simple, but effective tools and Kai-dzen  continuous perfection of everything written above. In a word, Toyota is a real economical, sociotechnical system which constantly develops.

One of possible definition of STS can be found in its internal design  its the hierarchical structure of organizational divisions of different levels, each formed by cooperation of social roles personnel stuff, sending by means of modern technology specific individual (professional) activity, according to their positions, thus polarizing STS organization system to man-machine system. The organization  is a special type social object which cannot be limited by individual activities of its components. Specific features of these objects are considered within the limits of the organization and management theory which the engineering psychology in some cases can lean on. The term STS is better, than the term organization (which can be used as describing a process of organizing), it expresses the fact that such systems are first of all social, and thats why they are natural-artificial formations (Berniker, 1992, p. 4).

Industrial and sociocultural factors and relations are closely interlaced in STS system. Thats why their functioning is determined not only by natural laws, but those of social reality which possesses historical and mediate features. Such systems change not so much under the influence of natural factors and conditions, as artificial  partly or totally determined by motivated activities of human and society (Social-technical theory, 2008).

The main process is not functioning (single or repeated for reaching the goal), but the process of development. Artificial influence on the STS system can be successful only in case when it alters in natural influence on the system of one of its elements. Otherwise, this impact will become not organizing, though destabilizing factor.

Each part of STS system can be replaced by another which includes the present one and determines the way of performing of many processes and interactions for initial system. Therefore consistency and limits of such system are set considering not only its inner immanent characteristics, but also considering those systems including the given one. As usually there are several systems of that kind, there exist several consistencies and several contours of sociotechnical system (Principles of socio-technical design, n. d.).

STS is usually a multileveled formation. At that, on each level possesses its own specific principles. Thus, those of them, which are responsible for individual activity, differ from principles of group activities, though groups, associations and community exist on the results of activity of many individuals. In its turn, this fact determines multidirections and often polarity of tendencies and mechanisms peculiar for each of the levels.

One of the important characteristic of STS is the fact that it cannot be fully performed in manufacture. It includes also fragments of living activity (individual persons, groups, communities, etc) on basis of which social life of the systems exists. At that, each of such fragments possesses its own natural self-movement. Their integration in the united system is similar to the process of organizing and managing.

STS is a term which belongs to theoretical level of engineering psychology and explicit as it is not empiric, but ideal objects. But peculiarities of STS pointed before do not allow considering such system as a whole on the basis of an ideal object of engineering psychology, if considering psychology its basis (Myers, 2007, p. 30).

STS is the important part of organization. As it creates a whole living organism where all parts and levels are necessary, though some of their functions can be replaced. In some kind STS reminds Russian nested dolls, where each doll consists another sub-one. It will work even if some on the chains will be lacking, though to create perfectly working system all the necessary levels should be present. STS is strongly recommended if someone wants his/hers company run like clockwork. STS motivates people to do more as having a helping machine nearby work seems to be easier. Such cooperation of humans and machines reduces time limits necessary for different activities, thus increasing productivity of each single individual, group or community. STS is a big step forward into improving organizations life, productivity, profit and success. Principles of good organization are in good management, and STS surely adds a lot to it. And if someone wants to have his/her organization successful, he/she should take STS into account.

Reference List

Dr. Berniker, E. (1992). Some principles of sociotechnical systems analysis and design. Washington, DC: School of Business Administration Pacific Lutheran University Tacoma.

Easing the Information System Headache Where People and Technology Intersect, (2008). In Knowledge@Emory. Web.

Myers, K., & Lamb, R., (2007). For an IT manager, getting technical often means going social! n. a.

Principles of ST Design (2008). In Strategosinc. Web.

Socio-technical theory. (n.d.). In Association of Information Systems. Web.

Dulles Corridor Extension-Deed Research

Executive Summary

Dulles Corridor Extension is a complex capital intensive project to be completed in accordance with the Washington Metropolitan Area Transit Authority (WMATA) standards under the Project Management Plan (PMP) prepared by WMATA. Project implementation will be carried out by the Airports staff according to established engineering standards for the rail line to be in harmony with Metrorail standards to fit into the desired 103 miles rail extension. PMPT provided technical and management guidelines in the design and construction of the project.

Background

The two phases of the project included the first route with 11.6 miles long extension to Wiehle Avenue and the second phase on Route 772 with an extension to Dulles Airport (Dulles Metrorail Project Overview 1). The Airports Authority was one of the grant recipients with full grant agreement provided by the Federal Grant Agreement Authority according to the (Dulles Corridor Metrorail Project 2). Several agreements, memoranda of understanding, and amendments with a number of interested parties culminated in the August, 29 2008 Initial application for an FFGA and related documentation were submitted (Dulles Corridor Metrorail Project 4). The main advantage with PMP was its expertise and ability to manage large capital intensive projects coupled with demonstrated ability to address a variety of issues regarding environmental matters and corporate social responsibility issues. The design and implementation programs integrated in PMP incorporated project management plans in design and construction providing quality assurance, quality control, and safety measures (Dulles Corridor Metrorail Project 6).

Project Management Organization and Staffing

Stakeholder approaches to project implementation determines the timeliness and cost effectiveness of a project. Based on the functional organizational chart, various stakeholders participatory roles included the Project Sponsor and Grantee a role by the Airports Authority which was the federal grant applicant and recipient and will have direct responsibility for the day-to-day management of the Design-Build contract, the Final Design scope of work, the baseline schedule, the design and construction budget (Dulles Corridor Metrorail Project 7). According to Dulles Metrorail Project Overview (1) other stakeholders included the WMATA providing technical support, System Acceptance related to exhaustive testing and certification procedures, and operations and maintenance issues (Dulles Corridor Metrorail Project 8). Other stakeholders were DTP mandated with the design and construction with Fairfax Country as a local funding partner (Dulles Metrorail Project Overview 1).

Illustrates the project management structure
Illustrates the project management structure

According to Dulles Corridor Metrorail Project (13), the organizational chart provides a detailed account of the diversification of roles played by the Airports Authority Project Management. These include the Executive Project Director responsible for overall management, direction, control, and coordination of functions required to deliver the completed Metrorail system (Dulles Corridor Metrorail Project 15). In addition, others in the management team included the Project Director with the responsibility of overseeing project completion in particular responsible for service delivery, and the design and compliance to set benchmarks as envisaged in the (Dulles Corridor Proposal 1). The project director works with a team of experts on all aspects of design, construction and implementation and oversees complex issues and opportunities for increased safety, quality, efficiency, and cost savings (Dulles Corridor Metrorail Project 16). The Deputy Director on project implementation was entitled with the responsibility of overseeing real estate matters, provision of permits, environmental mitigations, overseeing the project before and after feasibility studies, coordinating various stakeholders, monitoring and evaluating performance related issues and scheduling of all design and construction tasks. The Deputy Director for Design was responsible for assessing, evaluating, and maintaining performance, schedules, corporate agreements, and maintaining design budgets within the appropriate budget (Dulles Corridor Metrorail Project 17).

According to Dulles Corridor Metrorail Project (18) other management staff included the deputy director of Project Finance responsible for overseeing financial matters regarding project implementation costs, developing, evaluating, coordinating, project finance activities and funding partners. The senior Project manager for design was responsible for coordinating project activities with all affected agencies by ensuring project complies with design and budget forecast. In addition, Dulles Metrorail Extension (1) asserts that project Administration was to provide support activities on staffing, personnel issues and administrative interfaces (Dulles Corridor Metrorail Project 18). The project Quality Assurance and Quality Control Supervisor was responsible for implementing among other quality issues, safety standards such as project audits. Other management staffs included the contracting officer, contracting administration officer, Manager of Rail communications, Grant Administrator, Senior Project Manager for Construction, and the Office of the General Counsel while the Human Resources Management comprised Project Management Support Services.

Design and Engineering Oversight

All aspects of design including Construction documents for the civil, structural, architectural, mechanical/electrical/plumbing, and systems design required for the Project was the responsibility of Dulles Transit Partners (DTP) (Dulles Corridor Metrorail Project 25). Design, modifications, benchmarking, technical reviews, and interface design between scopes was the sole responsibility of DTP. The Business diverse officer was responsible for ensuring DTP complied with the Airport Authoritys requirements in addition to overseeing contracting and sub contracting issues, among other responsibilities (Dulles Metrorail Project Overview 1).

Washington Metropolitan Area Transit Authority Organization

Another body of interest was the Washington Metropolitan Area Transit Authority Organization (WMATA). This government agency provided technical advice on the final design, construction, and other support activities culminating in full ownership of the project. According to Dulles Corridor Metrorail Project (30), other responsibilities included several deliverables: railcars, the communication link to central control, making the necessary upgrades to central control, supply of non-revenue vehicles, updating the system signage, supply and installation of the fare collection equipment, and Art-in-Transit (Dulles Corridor Metrorail Project 30) with the organizational structure illustrated hereunder.

The Office of Engineering and Capital Projects (WMATA)
The Office of Engineering and Capital Projects (WMATA)

In addition, (WMATA) incorporates issues of designing transit elements, reviewing of design drawings, coordination of technical and related interfaces, and repair and maintenance issues such as the provision of spare parts and other equipments for the construction process, manual reviews, and training schedules (Dulles Corridor Metrorail Project 30). The organizations experienced project managers were positioned at strategic points of interest to ascertain Quality Assurance and Quality measures and standards were adhered to (Dulles Corridor Metrorail Project 33). WMATA was solely responsible for milestones and other deliverables in the form of railcars in addition to others.

Project Controls Description

Dulles Corridor Metrorail Project (44) provides detailed description of the project in terms of management approaches, functional tasks, budget schedules, installation and testing approaches in addition to revenue collection activities. Besides all these, Dulles Corridor Metrorail Project (44) contends that the project was identified as the only viable local alternative with various modifications culminating in the final project design that was adopted for construction. Illustration:

Locally Accepted alternative
Locally Accepted alternative

With a capital cost of $3.044 billion, the construction process was to commence with the construction of the first phase under the able guidance of the Federal Transit Administration (FTA). The project budget amounted to $ 2.916 billion (including approximately $100 million spent on PE, Supplemental PE, and

Development activities) and $283.8 million in financing costs through 201 (Dulles Corridor Metrorail Project 56). Mary (4) asserts that the financing plan contains detailed information on sources of funds, financial forecasts, and other funding strategies (Dulles Corridor Metrorail Project 56). According to Dulles Corridor Proposal (14) quarterly financial reports will be demanded and provided through the Financial and Transit Administration (FTA), and how cost overruns were to be harmonized and shared among stakeholders. In addition, WMATA had other measures to ensure efficient funds utilization and cost evaluation methods before and after project completion.

Program and Project Management Responsibilities

The project management structures roles and responsibilities are sub-tasked according to each stakeholder. According to Dulles Corridor Metrorail Project (61), FTA/PMOC was entitled with task approvals, Airports authority prepares, WMATA, VDOT, and Fairfax County provided review support (Dulles Metrorail Extension 1). DTP provided expertise in support activities as allowed under NEPA. All these were in view of notice of intent, project management issues, design and development matters, review of designs, construction management, certification and benchmarking, and testing and commissioning activities (Dulles Corridor Metrorail Project 61).

Project integration activities were carried out by WMATA acceptable with Adopted Regional System (ARS) mandated with ensuring approval right were adhered to, conflict resolutions were done efficiently and effectively, and other reviews such as design were carried out effectively. In addition, WMATA was mandated to call weekly meetings to verify compliance with the set standards and requirements termed as access meetings, project coordination meetings, Track Rights meetings, and other routine supervisory roles (Dulles Corridor Metrorail Project 66).

Management and Project Controls

Project scope incorporated control components for ensuring project success. Adherence to the standards and requirements were scrutinized by WMATA through continuous evaluations and compliance by monitoring for any deviations to the project scope. According to (Dulles Corridor Metrorail Project Timeline 1), these included technical scope controls, Quality Assurance and Quality control measures, schedule control, progress payments, cost estimations, Cost Control and Job Accounting Systems, Tracking Federally Eligible Project Costs, Change Orders and Claims, Contingency Management and Control, Indexing Commodity Cost Controls, FTA Project Management Oversight, Document Control, and Progress Reporting and Report Management (Dulles Corridor Metrorail Project 100).

Labor Relations and Policy

The policies covered employee issues regarding Wage Rates, Job Classifications, Wage and Hour Requirements, Federal, State, and Local Regulations, No Strike Agreements, and Disadvantaged Business Enterprise Program. Such policies covered the most important asset in design and construction as the human resources formed the fundamental component in the construction process.

Risk Assessment

An evaluation report by the Airports Authority on risk aversion and management was based on risk scope, agreements, real estate acquisition, Allowances, Design process among others (Dulles Corridor Metrorail Project 80).

Risk assessment and evaluation form an important component in designing plans for risk aversion procedures.

Environmental Analysis and Mitigation

Project environmental impact assessment is vital and covers Environmental Impact Statement, Environmental Assessment and Amended Record of Decision, Supplemental NEPA Documentation, Mitigation Measures and Monitoring, and Transportation Management Plan (Dulles Corridor Metrorail Project 85).

Other Issues

Other issues covered included Procurement/Contract Administration, Design Program such as configuration management issues, and management of design among others. Real Estate Acquisition, Community Relations, Construction Management, Intergovernmental and Utility Agreements, conflict resolutions, Safety certifications, Planning for Operations Start-Up, General Joint Development Program, and project management procedures. Upon completion, the project could be a success.

Works Cited

Dulles Corridor Metrorail Project. 2008. Web.

Dulles Corridor Metrorail Project Timeline, 2008. Web.

Dulles Corridor Proposal, 2006, Web.

Dulles Metrorail Extension. The Washington Post, 2009. Web.

Dulles Metrorail Project Overview: Metropolitan Washington Airports Authority. 2010. Web.

Dulles Metrorail Project Overview: Metropolitan Washington Airports Authority, 2010. Web.

Mary, Peters, E. U.S. Department of Transportation: Federal Transit Administration. 1200 New Jersey Avenue, SE Washington DC, 20590, 2008.

Socio-Technical Issues and IT Project

Introduction

Information technology projects are subject to failure or success depending on several socio-technical issues. The success of a project depends on a developer, and the user or the customer. The main objective of the developer is to always meet the customers requirements which will deliver a working system. The users desirable demands should be met hence they will be satisfied.

Discussion

There are issues which affects the success and the failures of the projects such as the scope creeping which is the most common socio-technical issue. Scope defines the system and its boundaries. It also states what the system is expected to deliver. When the developers stick to the limits of the project, they will deliver a working project within the set project duration. Scope creeping makes the project too large to manage since it increases the system functionalities thus affecting the project timing. It is very crucial to go by the scope while developing so as to attain a good quality project. Scope creeping should be avoided by all means by the developer.

There is an issue of planning which involves having a clear plan for resources to be used in project development. Time is an essential factor and it should not be overlooked since proper time scheduling will lead to a good project. Every project activity must have a well defined time scale and resources needed. Planning gives define milestones to be undertaken in order to achieve the desired goals. A budget should be prepared as a planning tool which estimates the cost throughout the development process. Team motivation is an important factor during the development process which should be highly practiced (Berniker, 1992).

The project development team should always be encouraged so as to concentrate on the project work hence motivated team will strive to deliver what is best. Appreciating the efforts of the team and paying them well is the best way to encourage them. It has been seen with recent statistics that a team that has a good relationship with their team leader tend to be more productive. While the teams which do not have a good relationship with their team leader lacks motivation to work.

User involvement is another important issue in development process. The users should be involved throughout the development of the project since they are the ones who are going to use the system. Failure to include the user will make the dislike the system since they will perceive it as the developers. Every project should be ended when its duration has elapsed so as to avoid it taking more resources than it had been planned for earlier (Myers & Lamb, 2007).

The developer should ensure that the customers critical factors had been included in the project before its closure. If there is need to add more functionality to an already closed project, then it should be considered as another project. New resources should be allocated to it such as time, effort, money and labor.

Risk management is a very vital activity and should be considered at an early stage of development. It should be included in the project plan. A good risk management plan will result in good use of resources. Planning for risk management will help the developer to be ready to tackle any form of risk which may arise. Developers should always learn to refuse doing things which are beyond their understanding. For example it is wrong for a developer to promise the customer something which he/she cannot deliver. Providing reasons as to why a developer cannot handle a particular task increases the trust that the customers have on the developer.

Conclusion

According to Haughey (2001), well planned projects which put customer satisfactions into consideration are always successful. The developers who do not plan the projects well will not succeed. There are others who will not factor in the customer satisfaction. There should be customer satisfaction by the project developed; hence their demands should be prioritized.

References

Berniker, E. (1992). Some principles of sociotechnical systems analysis and design. Web.

Haughey, D. (2001). Eight Key Factors to Ensuring Project Success. Bingley: Emerald Group Publishing

Myers, K. & Lamb, R., (2007). For an IT Manager, Getting Technical Often Means Going Social. University of North Carolina: Charlotte

Going Online: Pornography in the Online Era

Outline

Every minute of the global day, there is a great deal of loneliness and fantasy fulfillment taking place or yearning for satisfaction. Patterson (106-7) offers this treatise about how adult Web site offerings have unalterably changed the nature of porn consumption.

Strong Support Offered for Primary Argument

As a teacher who inhabits the intersection between arts and digital culture, the author offers an analysis that is a mix of familiarity with information technology and interpreting human want and desire. He brings to the subject matter sustained exposure to the beginnings of Internet pornography; that much is obvious.

Perhaps the strongest argument Patterson offers for the altered experience of pornography is that intimacy on the Internet has expanded the boundaries of participation. Repeated references to amateur sites offering continuous access to A day in the life of ___ and to Web chat rooms inhabited by strippers are valid discoveries about remote intimacy never before available on any medium. But then, this ponderous academic piece was written long before Twitter proliferated in the world of Web 2.0.

A Critique of Weaknesses

Beyond the obvious quibble that, five years after the article in question was published, much has changed in the publics experience of the Internet, Patterson is afflicted by a lot of misconceptions about the nature of the pursuit of pornography and the role of Web access in this evergreen human desire.

With respect to the less important weaknesses of the article, the author shows himself decidedly overawed by art as a subject, by the illusion of sophistication being preferable to clarity in choice of words, and by the role of the computer as alien interface when it is in fact just one more medium for display of pornography.

Patterson stretches the Time magazine cover graphic as a metaphor for the alienation inherent in Internet porn and the power of machine over man. Why, he asserts in Categorization and the Truth of Desire, Web-based porn actually provokes a bodily response! But we are disappointed to discover he meant solely keystrokes and mouse glides.

The author is also quite mistaken in interpreting delayed gratification as vital to the consumption of pornography in this context. He ascribes undeserved importance to the sign-up process and to search for just the right class of fantasy one desires as intrinsic to sexual satisfaction. In the age of broadband access and YouTube, we know now that the author was merely rationalizing the narrow bandwidths of his Web 1.0 era. But the author is right about the ceaseless search for more and more pornography; he just gets the reason wrong.

In fact, the most damning evaluation one can make about this article is how the author overlooks the fact that all pornography is fantasy, no matter what medium it arrives in. In addition, voyeurism is central to any type of porn, not just the amateur sites, interactivity, or collapsed distance as proximity that Patterson would have us believe is specific to porn on the Internet. Quite simply, fantasy and voyeurism motivate the seriality and repetition that the author wrongly ascribes to Internet porn alone.

Works Cited

Patterson, Zabet. Going Online: Pornography in the Online Era. In Williams, Linda (ed.) Porn Shades, Duke University Press, 2004.

Earned Value of Project Measurement

System to Measure the Project Performance Using Earned Value Technique

Following are the phases of a successful implementation of Earned Value Technique in the construction of High Rise Building:

Phase 1: Developing Work Breakdown Structure (WBS)

The earned values techniques are more effective if the large project is divided into small workable and manageable segments of the project. These segments are figuratively expressed in a way similar to organization chart form. In high-rise building construction the whole building is divided into segments of floors. Then each floor is further divided into works like slab pouring, column erection, electrification, plumbing, floor, etc. The WBS should be developed to such a level to which the earned value performance management tactics can be incorporated. The finalization of the WBS for the application of EVPM techniques is a critical one as a small level of WBS may lead to excessive data and a higher level may lead to the concealment of very important facts. If we consult different views of experts, it is revealed that the WBS is composed of three to four levels to get precise data for the smooth operation of the EVPM system. Rarely, where the projects are complex, the WBS is composed of five to six levels.

House at Avenue Drive

Phase 2: Assign the Tasks

When step one is completed than next step that follows is the assignment of responsibility. As the project is divided into a number of relatively smaller segments, then these segments are given to the project personal. All well-settled organization throughout the world has an organization chart which is a pictorial description of the hierarchy of the organization. It also helps in determining that which individual is responsible for which department and how many staff are being supervised by that specific individual. Responsibility Matrix for every project is developed in order to make sure that the project activities are executed in a properly managed way and there is no conflict of job among the personal. Through this matrix, the responsible worker can be held responsible for any kind of defective work which was executed under his responsibility. Therefore the responsibility matrix also ascertains the quality control of the project. Responsibility Matrix plays a vital role as it is helpful in determining the level of responsibility of the people involved in the project who is responsible for the completion of the project.

Phase 3: Project Planning and Scheduling

Planning is one of the most important and critical parts of the project. With a smart plane targets can be achieved well before time and at the same time if the project is poorly planned then there are chances that the project may get late and accordingly, makes one liable for a penalty which is undesirable in projects such as high-rise building. Once the tasks are assigned then a work schedule is devised which gives complete information about the duration, tasks, important targets, and precedence of jobs involved in activities. For high-rise building construction projects, the job duration in the EVPM system is two to four weeks, however, sometimes this varies according to the requirement. Jobs and targets are associated with habituation, to make a schedule of such a form through which critical activities and critical paths can be identified and free time can be identified for every task and target. Combining the tasks with beginning and end targets proves beneficial in developing a closed working grid.

Phase 4: Devising a Time-Phased Budget

Bill of Quantities, BOQs and rate lists may be used for pricing. If possible, to impact the making of the Work Breakdown Structure, it is very beneficial to highlight how the cost schedule will show the schedule. The entire fund allocation for completion of the task, a portion of WBS, or the whole project is called Budget at Completion (BAC).

Phase 5: Objective Measure of Performance

The intended criterion of the achievement mainly relies on the works involved in the task, extent of task and time required to complete the task. As such there are no set standard techniques; however, mostly the approach of targets/ milestones is incorporated. Earned Value, EV, is only asserted when target a target is achieved and the target activities are accomplished. Another method is representing the work in terms of percentage completed. This term is used for achieved Vs planned progress when the target measurement of percentage accomplishment of task is feasible. The indexes of measurement of progress are planned with recurrence to ensure the precise measurement of performance. Different project management tools prove beneficial if incorporated in the project as they facilitate the updating of the progress with time but also help in tracking tasks that are completed, tasks that are currently executed, tasks that are critical and other information of similar nature. The building activities can be expressed in a coded form or through the description and a work schedule can be developed which will give information about which activities are lagging and which activities are ahead of the planned progress. Through such techniques, one can also crash the number of days if any urgency arises. Such techniques are also incorporated when there is a bonus for early completion or when projects are of important nature.

Phase 6: Setting out the Performance Baseline

A logical reference point needs to be developed and should appear logical when brought in comparison to the at-hand resources. The S-curve graph which is interpolated with funds against time is an easy way to evaluate. Investigation reveals that the S-graph for cash flow if properly developed can be accurate up to 88 to 99%. (Howes, 2000)

Phase 7: Observe, Report and Take Action

A precisely defined and assessed work plan is mandatory for achieving satisfactory performance standards. With time, as the project progresses and on-site details are gathered from time to time from the site staff, evaluation is done to know if the project being executed is according to the plan prepared. For data collection for determining the actual cost information and deviations, Labor Return Performa and financial reports are used. All the data collected is then given as input to the EVPM system which then determines the Key Performance Indicators (KPIs), like Schedule Performance Indicator (SPI), Cost Performance Indicator (CPI), Schedule Variance (SV= EV  PV) and Cost Variance (CV= EV  AC). The same is described in the figure below in a very clear way. When the EVPM generates a report then actions in the better interest of the projects are taken. When the work is trackable and documentary formalities are completed then a new reference point is devised. (Raby, 2000)

Report and Take Action

Earned value of project performance is well capable of measuring the works done against the works planned separately for every segment of the work. Therefore the implementation of such tools and techniques makes the project more planned and manageable with a little effort.

References

Howes,R. (2000). Improving the performance of Earned Value Analysis as a construction project management tool. Engineering, Construction and Architectural Management. 7 (4), 399-411

Raby,M. (2000). Project Management via Earned Value. Work-Study. 49 (1), 6-9

The Critical Operational and Strategic Need for ERP IT Project

Introduction

Several organizations have embraced technology in their operations. However, it is of paramount importance that entire operations of the organization are integrated. This calls for need of implementation of an Enterprise Resource Planning (ERP). According to Sheilds (8 -12), an ERP is a computer-based system used to manage internal and external resources including tangible assets, financial resources, materials, human resources and intangible resources such as customer relationship management, intra-organizational communication and supplier relations.

Budget request

For the ERP project succeed, it requires total of 102,500 US dollars, this amount is spread as follows: User and Software requirements Specification costs 2,500 dollars, ERP modules acquisition costs 54,000 dollars, system integration costs 20,000, dollars, system testing costs 5,000 dollars, user training costs 12,000 dollars, system installation and commissioning costs 4,000 dollars and annual system maintenance 0f 5,000. However, it is expected that the system shall save the organization 50,000 dollars annually for a period of six years from the installation date.

Organizational Contribution

The ERP shall contribute to integration of organizations operations since all systems shall utilize a centralized database and reduce data redundancy. It shall also contribute to operational cost reduction due to staff doing the same work; furthermore, ERP contributes to ease management of organizations resources such as human resources, monetary resources and assets. In addition, the ERP project shall improve the organizations total service delivery.

For the proposal to succeed, 360 degree influential communications issues includes:

Source factors

To be persuasive enough, the budget proposal should originate from a trustworthy source, where the recipients are fond of and appreciate the expertise of the writer. An expert in ERP should therefore be the person to prepare the budget proposal professionally and be able to address effectively, accurately and timely the concerns and recommendations from all concerned stakeholders.

Project Communication plan

Servaes (23 -25) argues that there should be an effective bidirectional communication strategy with all the involved stakeholders. The decision makers executives and corporate finance/ budget analysis committee have to be informed on the benefits and the competitive advantage of implementing an ERP such as reducing operational cost and creating a sense of ownership of the project. Communication with other departments is important; for them to understand that ERP shall be of great benefit to all departments in order to focus on the same organizational goal. Users have to be involved to get their training needs and IT department staff; in order to ascertain the available knowledge base. According to Mochal (42 -46), a communication plan affects a projects success and involves determining communication needs for each stakeholder, brainstorming how to meet the needs, mandatory communication and prioritizing communication options.

Message and audience factors

The understanding of the corporate finance/ budget analysis committee on the budget proposal affects the allocation. Occams razor principle argues that that the simplest explanation is usually the best. (Ariew 42 -47). The proposal should therefore be in simple and understandable language, to all the intended audience. All audience should be able to clearly understand that funding the ERP project shall benefit the entire organization to gain competitiveness.

Factual evidence/tools

Concrete unambiguous facts should offered to support the budget proposal, such as ERP outcome benefits versus cost charts, and evidences ERP has benefited other organizations. Graphical representations are included to offer visualized view. Appropriate communication tools which allow for feedback from stakeholders should be used as argued by Svendsen (42 -51).

Works cited

Ariew, Roger. Ockhams Razor: A Historical and Philosophical Analysis of Ockhams Principle of Parsimony. Champaign-Urbana: University of Illinois press, 1976.

Mochal, Tom. Lessons in Project Management. New York: Apress, 2007.

Servaes, J. Approaches to Development, Studies in Communication for Development. Paris: UNESCO, 2003.

Sheilds, Mureell G. E-Business and ERP: Rapid Implementation and Project Plannig. New Jersey: John Wiley and Sons Inc, 2001.

Svendsen, A. The Stakeholder Strategy: Profiting from Collaborative Business Relationships. San Francisco: Berrett-Kohehler Publishers, 1998.