I am working on my senior seminar and I am in need of help writing my paper.

The project proposal will include: 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  1. your CIS concentration Internetworking
  2. project description – adding a library automated system from manual library cataloging
  3. team members I have the team members which are the project manager, network administrator St. Network System Analyst and a Account Manager
  4. detailed time-line describing goals of each week- I need help fromt this step forward.I should be working on my ppt presentation but that will come with the hlep of this paper if someone can help me PLEASE
  5. data schema
  6. graphical interface design
  7. report design
  8. testing plan
  9. deployment plan
  10. support plan
  11. schematics
  12. other relevant information required for project planning in each concentration.

Each project proposal must be at least ten to twenty page.  All proposals must be written in APA format

(

Worthy& Heatley Networking

Kimberly N. Worthy

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

CIS 499-Senior Seminar

July 22, 2012

Professor Jimmie Flores

Running head: WORTHY & HEATLEY NETWORKING

1

27

Table of Contents Comment by CC: Kimberly- Use the Table of Content creator that MS word offers. Also Left align all text below the Table of Contents Title. This should mirror the APA guide that was provided in discussion.

Executive Summary

———————————————————————————- pg. 2

Objective————————————————————————————————pg. 2

Team Members and their responsibilities——————————————————–pg..3

Four Phases of Project Management Implementation—————————————-pg 3-5

1. Initiation Phase

2. Project Installation Phase

3. Enterprise-Level Installation Phase

4. Maintenance Phase

Physical and Logical Designs————————————————————————pg.5-6

Figure 1.1- Typical Diagram of Enterprise Internetworking Infrastructure————– pg.7

Figure 1.2 Components used when designing an Enterprise Networking infrastructure pg.8

Figure 1.3 How communication is related between Corporate and the Frame Relay— pg 9

Closing—————————————————————————————————-pg.10

Software Attachment———————————————————————————-pg 12

Schematics———————————————————————————————–pg.13

Worthy&Heatley Networking

-Executive Summary Comment by CC: Adjust Running head

Executive Summary

Worthy & Heatley University has been usingused a manual library system since September of 1993. Due to the huge response of students that registered for the summer quarter, which was unexpected, the project manager has found finds it hard to provide current information for the instructors to make sure they have all of the required textbooks for their discipline of study. Comment by CC: Provide specifics. We want to create a baseline to start. “Huge” is too vague.

The management team proposed a solution which is to computerize the library system so that it will lessen the work load of the librarian. The student’s will be able to log into their accounts via a secure website and display book information for the present quarter. There will be different screens which will allow the students to update files and information will be updated within 24 hours. Comment by CC: Please review this for grammar. Ending a sentence with “ok” is not a formal ending to professional writing. I suggest having a peer review further submissions for other suggestions.

Worthy & Heatley University has accomplished a great deal in our community, so it gives me great pleasure to show how different parts of the operation functioned. It is due time to enhance the logical and physical design, and other network functions so that we can continue to serve efficiently. This correspondence outlines the complete scope of business, including any objectives, procedures, identification of responsibilities, and any estimated fees. If there are any questions or concerns please do not hesitate to contact me ok.

Objective

As a CIS major with a concentration in Internetworking and a minor in Homeland Security, I would just like to take this time to confirm the outcome of this project which entails the configuration of the library database which will allow

Worthy & Heatley Networking

to set up a production-like IP network. The network in which we are configuring consists of a set of (internal) hosts, a firewall, and internal/external network services such as DHCP/SSH. There will also be a set of hosts which will be represented by the Internet on the network. The installation of the relevant network services on the virtual machines will also be included. The IP network has an option of running a IPv4 and IPV6 configuration. Please see Figure 1.1 for the different components that will assist with the library automation.

Team members and responsibilities

Project manager

– Responsibilities include answering questions, leading and attending meetings, reviewing schedules, budgets, and the details of the project The project manager will implement and balance the time, direction and budget for their assigned project.

Network Administrator= maintaining the library’s connection to the library system’s system-wide automated network, including on-line catalogs. The administrator also provides system support through troubleshooting, diagnosis and resolution of problems in the operation of networks, workstations and audio visual equipment. Comment by CC: Let’s be consistent. Do you plan on using “-“ or “=”?

Software Engineer – responsibilities include front end graphical user interface design, software testing and quality assurance. This position also supports, maintains, and documents software functionality

Account manager – responsible for sales methods and any account activity for students within the university

Sr. Library System Analyst- performs professional and technical duties in support of the digital library and library maintenance of the online catalog while answering any questions from students and other users as deemed necessary.

A phased approach to implementation allows the allotted time during the initial phases in order to gather first-hand information about the characteristics of the project at hand, and personnel so that the expected outcome can be tailored accordingly.

The Four Phases of Project Management Implementation

1. Initiation Phase: This phase is when consultants like myself use projects they can test in order to build process momentum, overcome natural resistance to change, along with gaining first-hand knowledge of your organization. The main purpose of this phase is to successfully collect your organization, rectify any current at-risk projects, and set the stage for the next two installation phases. This phase is also where the software training as well as the project management methodology is bought up so you can become more familiarized with everything you should be associated with your team. This phase is where the key tools are created which will be put well to use during the remaining installation phases.

2. Project Level Installation Phase: The information which is gathered from the previous phase is used to roll-out structured project planning and control processes for all remaining projects. This phase can include but not excluded from a web-based activity update system, a project web site, and formal guidelines for project planning/control. When we come to the end of this phase the heart of the project management office is in-place and everyone that needs to be trained for their specific areas of interest will be ready to begin modifications from one role of supporting project team requirements supporting me as the project management officer and the remainder of the staff.

3. Enterprise-Level Installation Phase: This phase focuses on tools which manage an organization’s entire collection of projects. Some of the tools could include: enterprise performance metrics, a management “dashboard” which is used to gain summary-level visibility to project status, and project scheduling which would be based on the amount of the resources and how much priority this project has. When you look at the intentions of each one of these tools are to (1) provide management with accurate information about the projects that are being ran by the organization and (2) support business decision-making that influences the completion of projects such as: changes to funding, workload, and project prioritization.

4. Maintenance Phase: The most important transition of the project management office is the final phase and this is because it does a complete 360 degree turn back to the organization. With this phase the staff will now become the main focus for providing the enterprise-level information and analysis required by management. Numerous success stories have been communicated, all projects that have been processed via the Internet have well-developed project plan. With this stage being in completion it creates long-term continuity by putting the necessary policies and incentives into play and permanently coach project management into the culture of the organization.

Physical and Logical Design Comment by CC: Ensure this is left aligned to 1”.

Here at Worthy & Heatley we have carefully outlined a plan that should be suitable for your needs. As your company will see we have prepared a timeline that we can go over together so we can strive to meet these goals and the deadlines as expected. You are entitled to whichever option you would like so we have set up this time for you to review and let us know here at Worthy&Heatley Networking because we are here to service your needs. When reviewing the Systems Architecture, the two types of automation systems available are traditional, client-server based. This is when the software is purchased from the vendor and it is physically installed on your library computer. The data will be kept in the database within the library. The other automation system that I would like to bring to your attention to is called the Application Service Provider (ASP) solution and this stands for Application Service Provider, which is similar to the Internet Service Provider (ISP). Whichever one is chosen is the provider which stores all the data on their specific server and only the client is installed on the library’s computer. Also note that the client is also a web browser. One of the greatest benefits is that the ASP takes care of all of the technical support. I must state that if we are trying to stay on some type of budget then the suggestion would be to go with ASP because some vendors offer unlimited access to the web, while others only a limited number of users such as 4. From my understanding this is a University in which we are preparing this proposal for 4. Comment by CC: Run-on Comment by CC: Address the name in a similar way you did with ISP. This is good. Comment by CC: Your ideas are good, Kimberly. We need to concentrate on eliminating excessive run-on sentences. Too many ideas are presented in one sentence.

Depending on the status of your the information, data conversion services may be an option for your company. Because you do not seem to have an extreme amount of information on your library records they may not be in MARC format. If this is the case you will need retrospective conversion services. There are other companies that work with your records and will oormat them according to your system. Once these records have been formatted to your likings they will be inserted into your new ILS upon delivery. For your convenience, some businesses can have smart barcodes placed on them after the conversion has been processed. The uniqueness of this barcode is that the title of the book or the item is attached to this barcode so that this item can be referenced under the new catalogue system. The majority of our systems when it comes down to installation are self-explanatory like other traditional software. If for some reason that installation is needed or desired for any reason you must be made aware that this will be an extra cost and it could range between several thousands of dollars. Comment by CC: Name it. Comment by CC: Vague… what counts as extreme? Comment by CC: Spell check, please.

The next requirement will be the requirements gathering and this basically means that Worthy&Heatley would like to confirm that the needs of your Corporation and the software we will be installing (ILS), are compatible with each other. The way we go about this task is developing a library profile which contains the company’s collection size, material format, an estimate number of patrons, the number of staff who will be using the system and the annual circulation (in/out), etc. Once the requirements gathering has taken place and the library profile has taken place we recommend you developing use cases for the existing functions within the library which you may choose to automate. Use cases are simply workflow analysis documents and they outline the steps needed to finish a task. An example would be something such as checking out a book, or renting a periodical. There are two different formats in which they can be created and that is in list or narrative but these cases should not only include the steps taken on the computer but they should also include other steps such as photocopies of patron licenses as well.

While it may seem like a lot of detail, by having this documentation it helps determine the specific requirements the software your company should have at the minimum. Your company will be very upset to say the least if it cannot do at least what your computer system was capable of doing prior to this transition. Some of the questions that we may ask from a functionality point of view are as follows:

· What functions does your company want to automate

· Cataloging, Circulation, Serials management, Acquisitions, etc.

· Is the software compatible with MARC records?

· Does the software need to be Z139.50 compliant

· Is the software an OpenURL compliant?

· Does it have the ability to attach book jacket images for display in the OPAC?

Just like there are cons to these requirements if your system could not meet the requirements, if your company does meet the requirements, we will have one quick meeting to assign the use case work with the subcommittee which you can find detailed on the timeline enclosed and one meeting to discuss the necessary functional requirements following the document analysis. Comment by CC: This is a lengthy sentence.

As we move forward the next requirements and considerations we need to discuss are the technical requirements. The questions that we need to discuss are listed below for your review:

· Is the computer’s compatibility meant for a PC or Mac or both?

· What service architecture will your corporation be using? Traditional Client-server or ASP?

· How many users are concurrent and necessary?

· How many workstations are required?

· How many simultaneous OPAC users are necessary?

Two meeting should be more than enough to straighten out any misfortunes along the way.

Last but not least is the business requirements and the majority of these requirements may sound similar; however they are far from being the same. The considerations that must be considered are as follows:

· Would you like a web-based OPAC?

· Would you like your patrons to be able to reserve their own items?

· Can the new system being reviewed support the size that it is estimated to be in the next 5 years?

· Will you ever want to create an image library/ Comment by CC: Grammar/spell check

· Will interlibrary loan ever develop in the near future?

When working with a large, enterprise-level Internetwork it is imperative to choose the correct routing protocol. Networks change like there is no tomorrow and they grow enormously while it affects the best path for routing packets through an Internetwork. Protocols are responsible for keeping a look out for changes that may be occurring on the network and they also share their changes with routers throughout the network. There are two major types of routing protocols, and they are distance vector and link state. Link-state protocols are designed to operate in large enterprise-level networks and these protocols are OSPF and NLSP. They are very complex, and they are harder to configure, troubleshoot, and maintain than the other protocol which is named distance vector. Link state protocols establish a neighbor-relationship with directly connected peers routing information with its neighbors only when there are changes in the network topology, and link state protocols only send updates to neighboring topology. Link state protocols only send updates to neighboring routers, whereas distance vector protocols send the complete routing table (Horner, 2012) Comment by CC: This is okay in conversation, but not in formal writing. Comment by CC: Vague

One of the most critical components of business continuity is IT network support. There is not one organization which should be without some type of startup plan. This will allow the organization to see that they are equipped with the technology and tools in order to deal with a highly certified team which deals with your IT infrastructure. This also allows your workforce to communicate and collaborate wherever and whenever you are gone or within distance. The support plan will help improve the ability of your network to function at the highest level so that the company can meet the business needs as outlined. The support plan which is outlined below has a few highlights that need to be addressed and I would to keep you informed by pointing this information out so that the company is aware of how this support plan can be beneficial. They are listed below for your review: Comment by CC: Review sentence structure here. You can say “Successful organizations begin projects implementing startup plans.”

· Hi-Tech lab for staging & proof of concept before remediation.

· Multiple Internet lease lines, VPN,VoIP & PRI circuits from different providers for redundancy

· Robust tools for monitoring, management and audits

· NMS & application servers in failover cluster to ensure business continuity

· secure facility with 100% power backup (Network Implementers, 2011)

The Access Control list gives access to or denial of service by which it controls. It has a single security class as its type, and it grants privileges to principals, to control access to protected data or functionalities, and it can grant only the privileges that are defined in its security class (Oracle, 2002).

Figure 1.1- Typical Design of an Enterprise Network

Figure 1.2 Components used when designing an Enterprise Networking infrastruct

This project demands significant involvement by your accounting personnel. The amount of success is dependent on how much effort is placed into this project. To achieve a successful operation, it will be your responsibility to perform the following activities:

1) Gather an up-to-date trial balance for all accounts as of the conversion date.

2) collect a complete list of all vendors and grants available, including amounts outstanding (by invoice), addresses, phone numbers, vendor terms, vendor classes (if any), and any other necessary vendor or grant information. Total amounts outstanding on the vendor listing should agree with total accounts payable from trial balance

3) Create a complete list of existing endowments, with balances as of the conversion

4) Enclose a copy of the financial statements format desired by the organization for the balance sheet, income statement, and other financial reports.

Benefits

When this project has reached its completion stage, having converted from the manual library system to the computerized database, these benefits will include a high level of accuracy, ease of data entry, and timely flexible reporting. Throughout the plans that have been put forth

Software costs and Professional fees

Software costs and fee estimates can be found in the attached files folder. These files will only become effective provided (a) the accounting records provided are in good order and (b) a staff member can devote full time to the operation process. We will not incur any additional hours without gaining permission. The software which we will install does not include any modifications. Worthy & Heatley networking does require a fifty percent deposit on software cost before we begin any manual labor. Once the loading of software has begun the balance for the software will be due. All of our professional fees are billed on a weekly basis.

Closing

Worthy&Heatley appreciate the opportunity to satisfy your computer software needs. If you choose to accept this proposal, please sign one copy and return with a fifty percent deposit of the software costs.

Sincerely,

Worthy&Heatley Networking
Project manager

Response

This letter correctly sets forth the understanding of the neighboring group of Worthy&Heatley Networking

_________________________________________________________________________ Accepted by Title Date (pick the date)

Worthy&Heatley Networking

1517 Copperplate Road

Charlotte, N.C. 28216

______________________________________________________________________________

[Pick the Date]

______________________________________________________________________________

Software: Model Sixty

Software Cost

Library Multi-Record Including Report Master $1255

General Ledger $850

Accounts Payable $850

Import Master $645

Total Software Cost $3600

Professional Services Costs

Hourly Fee $90

Total Estimated Hours 77

Total Professional Services/Cost $6930.00

Itemized Task List and Associated Hours

Task Nine Hours

Installation Plan

1. Identify responsibilities

2. Establish schedule

3. Select conversion date

Software attachment 1.1

Please find attached below the schematics for my Enterprise-level Internetworking

Figure 1.4-Schematics of Enterprise-level Internetworking infrastructure

References Comment by CC: Please review reference page requirements for APA format.

Cox, Kerri (n.d.) e How. Challenges of Library Automation. Retrieved 2012 July 25 from

http://www.ehow.com/list_6932611_challenges-library-automation.html

La Crosse Public Library (n.d.) Retrieved 2012 July25 from

http://www.lacrosselibrary.org/index.asp

Oracle (2002) Oracle® XML DB Developer’s Guide. 27 Access Control Lists and Security Classes Retrieved 2012 July 25 from

http://docs.oracle.com/cd/B28359_01/appdev.111/b28369/xdb21sec.htm

.

Network Implementers. (2011). Network Implementers Online Network Consulting Support. Network Implementers-The IT Support Company Retrieved 2012 July 25 from

http://www.networkimplementers.com/aboutus.php3

Horner. (2012). Bucket Brain. What is a Router? Retrieved 2012 July 25 from http://www.bucketbrain.com/whatisroute

r/

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER