Paper that proposes a telecommunications solution

Assignment Help Basic Computer Science
Reference no: EM13928477

Introduction

This is an individual project. Each student must complete a White Paper that proposes a telecommunications solution to address a communications problem for a business organization. The target audience will be the organization's Chief Information Officer (CIO). The White Paper deliverable is an MS Word document. If you have never written a white paper, you should conduct some research and review sample white papers to understand the content and format associated with these professional documents.

The completed White Paper deliverable is due by 11:59 PM Eastern Time on the due date shown in the Course Schedule. See the Additional Information section of the syllabus for the penalty for late or missed assignments and projects.

The White Paper is valued at 12% of the course grade.
Scenario

Ullman, Manly, & Ulysses Corporation

With 75,000 customers worldwide, 250 employees working in four locations in the United States and three European offices, and a catalog of more than 100,000 parts, Ullman, Manly & Ulysses Corporation (UMUC) relies on its network for its survival. In the past decade, UMUC has seen its business grow from just one location and a few local customers to the worldwide supplier it is today. But in the process of growing exponentially, it has overwhelmed its telecommunications network, which is currently managed by an outside telecommunications network management company. The network crashes frequently, resulting in customer service and e-mail interruptions that are costly to the company. The network management company is not responsive to UMUC, a relatively small customer, and often disagrees that there is even a problem. Since the contract with the service provider is about to expire, UMUC has decided to seek a better network solution.

The Chief Information Officer (CIO) has outlined the key requirements for a new network for UMUC. He has explained to the executive board that a new network would have the following characteristics:

1. Availability: Business operations require maximum uptime, and quick repairs when needed.
2. Reliability: The network must function as designed and produce accurate results.
3. Scalability: UMUC continues to grow at a rapid rate, and there are plans for acquisition of several small parts suppliers; the network must support this growth.
4. Security: The confidentiality and integrity of UMUC's data is of great importance, as is the protection of its customers' data.
5. Flexibility: The new network must be responsive to the changing needs of the business.
6. Performance: The network must provide quick access for employees and customers.
7. Manageability: The network must be designed and implemented so that it can be managed by a small team of centrally located IT specialists.
8. Economic efficiency: The ongoing operations and maintenance costs should offset the initial investment costs, reducing the long-term total cost of ownership of the network.

UMUC's executives have agreed that they need a business network with higher reliability, security, and scalability, but with lower costs, than the existing externally managed network. The CIO has proposed that UMUC design and implement its own network, using advanced technologies for high availability, efficiency, and security management, that can be operated by a very small IT department. He proposes to use virtual private network technologies to connect remote offices and users securely and to facilitate company expansion.

The Deliverable

The CIO has asked you to develop a 3-page white paper that provides the following:
· definition of the business or technical problem
· discussion of the problem within the context of the scenario
· recommendation of the application of technology, processes, and policies that solve the problem
· discussion of the impact or risks of the applied solution within the context of business strategy and managerial perspective
· identification, analysis, and mitigation of risks of the recommended solution

Briefly define the business problem, and discuss it in the context of the scenario. Briefly describe the proposed technology solution, processes, and policies to solve the problem. You should demonstrate your critical thinking as you incorporate the course concepts and explain the business needs and solutions. Then discuss the impact or risks of the applied solution within the context of the business strategy and managerial perspective. Then discuss the challenges and security risks that result from implementing the proposed solution. Propose mitigation strategies for the challenges and risks identified. The bolded attributes in the Scoring Rubric (see below) must be used as the section headings in the white paper.

Your deliverable will be a white paper three pages in length, not counting the cover page and references page. At least two (2) external sources (other than the assigned readings and other course materials) must be used, and citations and references must be in APA format. Your paper will be scored according to the Scoring Rubric below. Be sure you have incorporated all required aspects of the assignment.

Scoring Rubric

Attribute
Full points
Partial points
No points
Possible Points
The business problem

The business problem is defined and discussed in sufficient depth to set the stage for the proposed solution, and demonstrates critical thinking and understanding of the course concepts.
The business problem is partially defined and/or discussed; it may not adequately set the stage for the proposed solution and/or may not demonstrate critical thinking and understanding of course concepts.
The business problem is not defined.

Proposed technology solution
The proposed technology solution appropriately addresses the business scenario/problem, and demonstrates understanding of course concepts, analysis, and critical thinking.
The proposed technology solution somewhat addresses the business scenario/problem; it may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking.
No technology solution is proposed.

Proposed processes and policies
Processes and policies relevant to the proposed solution are presented; work demonstrates understanding of course concepts, analysis, and critical thinking.
The processes and policies somewhat address the business scenario/problem; work may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking.
No proposed processes or policies are presented.

Business and managerial impacts and risks
Impact and risks relevant to the proposed solution and the business strategy are presented from a managerial perspective; work demonstrates understanding of course concepts, analysis, and critical thinking.
Impact and risks are somewhat relevant to the proposed solution and/or the business strategy; they may or may not be presented from a managerial perspective; and they may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking.
No impact or risks are presented.

Cybersecurity challenges and risks identified
Cybersecurity challenges and risks of the proposed solution are appropriately identified; work demonstrates understanding of course concepts, analysis, and critical thinking.
Cybersecurity challenges and risks of the proposed solution are partially identified and/or explained; work may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking.
Cybersecurity challenges and risks are not included, or do not apply to the proposed solution.

Mitigation strategies
Appropriate mitigation strategies are provided and thoroughly explained. All risks of the proposed solution are addressed.
Mitigation strategies are somewhat appropriate and/or partially explained. They may only partially address the risks of the proposed solution.
No mitigation strategies are provided.

External research
More than two sources other than the assigned readings and course materials are incorporated and used effectively.
One or two sources other than the assigned readings and course materials, but they are not properly incorporated or used and/or are not effective or appropriate.
No external research is incorporated.

Document format
The document reflects effective organization and correct sentence structure, grammar, and spelling; it is presented in a professional format; and references are appropriately incorporated and cited, using APA style.
The document is not well-organized, and/or contains grammar and/or spelling errors; and/or it does not follow APA style for references and citations.
The document is extremely poorly written and does not convey the information

Reference no: EM13928477

Questions Cloud

What do you mean by business environment : Q1. - What do you mean by business environment? Explain any four characteristics of it. Q2. - Discuss any five points of the importance of Business Environment.
Compute the amount of depreciation expense : Compute the amount of depreciation expense that is deductible under MACRS for 2013 and 2014, assuming that the equipment is classified as five year property.
Organizational design of bae systems : Discuss the environmental and strategic factors that affect the organizational design of BAE Systems.
Write paper on the furman vs georgia case : Write a 700- to 1,050-word paper on the Furman v. Georgia case. Be sure to include the following: Explain how racial discrimination is a consideration in the decision and the ultimate impact of the case. Provide applications and examples of the case ..
Paper that proposes a telecommunications solution : This is an individual project. Each student must complete a White Paper that proposes a telecommunications solution to address a communications problem for a business organization.
What is the current market value of this preferred stock : If you know that investors require a 15 percent pretax rate of return on this preferred stock, what is the current market value of this preferred stock?
Managing a large financial project : Your company has just hired a new CEO, and you make an appointment with her to discuss a large financial project that you have been managing. You make the following statement: "In our company, each project defines its own process and technology ar..
Why is the organization inventory policy important : What is the difference between the probability of a stock-out and the magnitude of a stock-out? Give example to support your response.2. Why is the organization's Inventory policy important?
Presenting descriptive statistics for the sample : Create an APA style table that presents descriptive statistics for the sample.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Importance of normalization in relation to this project

Continue working on Service Request SR-ht-003, due in Week Five, by completing Change Requests 4 and 5.Create documentation describing the principles and importance of normalization in relation to this project and the process by which this project ..

  Unix operating system

The UNIX operating system (and its variants, of which Linux is one) includes quite a few useful utility programs. One of those is wc, which is short for Word Count. The purpose of wc is to give users an easy way to determine the size of a text fil..

  Which command displays network activity statistics for tcp

Which command displays network activity statistics for TCP, UDP, and IP? a. telnet b. nbtstat-s c. ping -s d. netstat -s e. nslookup

  Write a program that reads a sentace and counts the number

write a program that reads a sentace and counts the number of alpha characters using the tolower or toupper function along with the isalpha function. Then count vowels using a switch statement. Then i have to give the total number of keystrokes.

  Draw the pipeline execution diagram for this code

Draw the pipeline execution diagram for this code, assuming full forwarding is used and the branch is determined in the EX stage. The pipeline always predicts branch taken.

  Write a module to determine mean of the grades

Write a module to print the student's id, name, and grade for student with highest grade and with lowest grade, respectively.

  What are cautions regarding use of bold type as text stimuli

What are the guidelines and cautions regarding the use of bold type as text stimuli?

  The planet venus is closer to the sun than earth

The planet Venus is closer to the sun than Earth and has a thick atmosphere of mostly CO2. Because of the greenhouse gas effect, the average surface temperature is about 475 degrees. What would the average temperature be if there were no atmosphere? ..

  Management prefers to get the server with the os

Management prefers to get the server with the OS already installed and wants to keep management tasks as simple as possible. which windows server 2012/r2 edition do you recommend? explain your answer please ?

  Questions how and why of at&t problems

Introduction-Include a brief introduction into the company and it's problem or situation.

  Human and nature dynamics (handy) model

This paper is centered around some results obtained from the Human and Nature Dynamics (HANDY) model. This model is equation 3 in their paper.

  Explaining mandatory access control implementation

How are Novell AppArmor and the Red Hat "targeted" SELinux policy similar? Is either a true Mandatory Access Control implementation. If not, explain why.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd