Posted: March 8th, 2022
Lawrence Berkeley National Laboratory Implementation Plan
Introduction and Business strategies
Lawrence Berkeley National Laboratory continully receives increasing competition in the information services industry. To reinstate the effectiveness and generate consumer satisfaction, as well as company presence in the market, a proactive strategy must be formed to increase functionality and service, as well as generate a wider consumer base, all while minimizing overhead and operational cost. Along with this aim, an implementation plan must be executed. The plan will consist of a five-step problem-solving model. This model will identify and address concerns, while establishing a process of improvement for Lawrence Berkeley National Laboratory and create increases in the company’s wireless service efficacy. “The 5-Step model is a process to; categorize the situation, label and frame the central issue, articulate final goals, possible alternatives, and evaluate those alternatives” (Kundra, United States, & Chief Information Officers Council (U.S.),2010, p. 12)
The model as mentioned, involves five steps and follows an incremental format. The advantages of using this model were to formulate and convey in accruments after chartering an overall architecture. Eight deliverables are classified as crucial in meeting the goals to increase effiacy in Lawrence Berkeley National Laboratory.
1) Increase capacity for wireless service in shuttle buses within three years.
2) Generate a strategy to increase research towards advancing the high speed networking divison
3) Start notifying customers of updates in service.
4) Align Technologies Workers Union with Lawrence Berkeley National Laboratory restructuring objectives three months after the strategy is implemented.
5) Show decrease in overhead expense three-month after financial growth strategy is developed and implemented.
II. Implementation Plan
Project Description
The reason for the creation of this project is to accommodate wireless Internet access to all (student, researchers, employees, and business travelers) using the Lab adminstered shuttle bus service.
The primary difficulty of this project is the installation and maintenance of wireless technology on the shuttle buses without causing a decline in shuttle service.
The aim is to increase and augment productivity for all who utilize the company’s bus shuttles.
Measurable Organizational Value (MOV)
The main measure of value an increase in Lab shuttle bus use which wll minimize chances of overcrowded parking lots and allow for convenient use of web services. This will bolster productivity within the facility and traveling to it as well as added employee and consumer satisfaction. Evaluations of satisfaction will help improve the organization’s ability to provide
Safeguards
Safeguards must be in place in order to prevent over-usage of the wireless network as well as data hacking. A password assisted login will keep guests from overloading the network and minimize who uses it who is not woring or studying in the organization. Routine maintenance including firewall and software updates will allow for a better measure of security. Many people will be using the wirless networks on a daily basis. It is imperative safeguards are in place to protect a person’s personal data. The possiblity of leaked research or financial documents can lead to a loss of business or possible legal problems in the future.
Media-access control or MAC address filtering is an excellent tool in limiting access to only identifiable network cards with approved MAC addresses. “A MAC address is a hardware code unique to each PC and network device” (Martin, 2008, p. 50). It is not the strongest baseline defense, due to clear broadcast of MAC addresses, but it is a suitable safeguard. In addition to MAC protocols, encryption may also ensure access to sensitive date to only authorized receivers.
An example of encryption is WPA, a security standard, and it use of TKIP. “TKIP is an open protocol that includes a rekeying feature, a message integrity ceck, and packet key mixing” (Ward & Peppard, 2002, p. 32). It allows for greater control over security measures. Inclusion of VPN’s or Virtual Private Networks allows for human safeguards. Workers who wish to access the company’s networ from an unsecure location, for instance on the shuttle bus heading away from the facility or towards it, will have to follow protocol in order to keep data secure.
Project Scope
All of the sixteen passenger vehicles apart of the Lawrence Berkeley National Laboratory will have wireless access points installed and maintained in order to provide wirless internet service to all who board the shuttle buses and vans. Lawrence Berkeley National Laboratory owns ten shuttle buses and six passenger vans currently in function.
Vehicles that will not have wirless access points installed are lab owned cars, long-term use vans, and electric vehicles. The scope of this project to provide working internet access solely in passenger transport vehicles.
Project Schedule Summary
Project start date: September 1, 2013
Project end date: October 04, 2013
Timeline of project developments and breakthroughs:
All materials expected to be delivered on September 1, 2013
The first of sixteen vehicles installed with wireless access point on September 10, 2013
Milestone — Successful test run of first 2 vehicles with wireless Internet
Next 2 vehicles in with installed with wireless access point on September 11, 2013
Milestone — Successful installation and testing
Next 2 vehicles outfitted with wireless access point on September 12, 2013
Milestone — Successful installation and testing
Next 2 vehicles outfitted with wireless access point y on September 13, 2013
Milestone — Successful installation and testing
Next 2 vehicles outfitted with wireless access point on September 14, 2013
Milestone — Successful installation and testing
Next 2 vehicles outfitted with wireless access point on September 15, 2013
Milestone — Successful installation and testing
Next 2 vehicles outfitted with wireless access point on September 16, 2013
Milestone — Successful installation and testing
Next 2 vehicles outfitted with wireless access point on September 17, 2013
Project Goal — Successful installation and testing on all sixteen vehicles
Continual testing, maintenance, and passenger evaluation to calculate satisfaction with new wireless Internet service on Lab shuttles
Project Completion — October 04, 2013
Project Budget Summary
Total project budget – $36,220
Budget broken down by development:
Acquisition of hardware for wireless access points: $27,200 ($1,500 per vehicle)
IT Installation and testing: $7,200 ($450 per vehicle installation)
Transportation: $1,820 (Wage cost of driver required to move Class B vehicles)
Quality Issues
Out-sourcing of IT installation could potentially lead to higher security risk. Installation process was done by a company outside of the control of the organization.
Following a strict schedule is imperative to keep budget concerns to a minimum.
Testing is crucial in predicting successful outcome of project and must meet or exceed Lab wireless protocol standards.
Requirements for Out-sourcing
Need to meet budget limit:Outsourced transpotation to move Class B vehicles decreased cost of project and let organization focus on other facets of the project, particularly the in-sourcing of the wireless network.
Out-sourcing of IT installation also achieved same goal to keep within budget and increase focus on wireless newtork
Requirements for In-sourcing
Need for increased security: The wireless network is important due to control over information sent and received and possible problems between users and support.
Resources Required
Workers — Two Information Technology staff (acting manager Mr. Peach), One Transportation driver with Class B Passenger license (outsourced)
Technology — Technology requirements consist of wireless technology including: wireless access points, virtual private network, encryption and virus protection, IT staff will provide the assistance to identify and measure the success of the implementation plan.
Facilities — The maintenance yard suited for Lab vehicles makes the ideal environment for the completion of tasks. It will also allow for quick resolution to possible vehicle maintenance issues.
Resources to be provided
One Global Electric Motorcar
Facilities (responsible manager Mr. Llewellyn)
Needed from September 1, 2013 to October 4, 2013
Assumptions and Risks
Assumptions used to formulate estimates
IT staff’s ability to finish two wireless installations per day
Key risks, chance of occurrence, and effect
Probability of vehicles needed for back-up during wireless installation
Maintenance requirements may hinder pace of installation schedule
Chance of key staff used for other mission critical Lab responsibilities
Limits
Project cannot hinder or prevent any and all IT departments daily duties or the operation of the organization owned shuttle service
Possible utilization of areas within or outside the organization
The IT staff must perform job duties without it affecting the shuttle service. Time of operation must not confluct with shuttle operation.
Project Administration
Communications plan
The aim is to advertise the new wireless Internet on Lab passenger vehicles and shuttle buses. This will achieved utilizing a number of methods. The Today at Berkeley Lab newsletter will be notified to run daily advertisements/notifications to ride the shuttle service. Bus drivers will also have given to them papers that will be posted inside the vehicles concerning the new service along with instructions how to access the wireless service. Finally, the Facilities Resource Manager agreed to send a mass email notifying the staff about the changes. The email will also include an invite for more users to utilize the shuttle service.
Scope management plan
The main objective of the scope management plan is for the Logistics and Site Services managers to deliver assurance all single passenger vehicles have wireless service installed and do not come into problems due to budget constraints and concerns over safety.
Implementation and project closure plan
The technical implementation of the wireless Internet for all chosen vehicles will be equipped with security features mentioned earlier that will safeguard riders from information theft. These safeguards include user login and encryption among others.Warnings will be posted on buses about information sensitivity while on access.
Glossary
Anti-Virus Software
Anti-virus software will protect your computer from viruses encountered on the Web. New viruses are born every day, so it’s important to update your anti-virus software regularly. What to do: Information Technology Services (ITS) provides students, faculty and staff at the university with security software at no additional cost through the BevoWare Web site. BevoWare includes Symantec anti-virus, firewall and firewall products. Download, install and run security software from BevoWare on your own personal computer today.
Authentication
The process of confirming a claimed identity. All forms of authentication are based on something you know, something you have, or something you are.
Something you know’ is some form of information that you can recognize and keep to yourself, such as a personal identification number (PIN) or password.
Something you have’ is a physical item you possess, such as a photo ID or a security token
Something you are’ is a human characteristic considered to be unique, such as a fingerprint, voice tone, or retinal pattern.
Authorization
Authorizations allow individuals to access specific features or functions of a system. Similarly structured authorizations are grouped together under a single attribute.
Each authorization is comprised of up to two values: Field1 and Field2. The values for the fields are static strings pre-defined by the application owner, or they can be freeform (insert text here format). The freeform values may or may not have audits to ensure proper values.
Authorizations must be approved by the authorization administrator.
Encryption
The process of converting data into a cipher or code in order to prevent unauthorized access. Encryption obfuscates data in such a manner that a specific algorithm and key are required to interpret the cipher or code. The keys are binary values that may be interpretable as the codes for text strings, or they may be arbitrary numbers. The purpose of encryption is to prevent unauthorized access to data while it is either in storage or being transmitted.
User
An individual, automated application or process that is authorized by the owner to access the resource, in accordance with the owner’s procedures and rules. Has the responsibility to (1) use the resource only for the purpose specified by the owner, (2) comply with controls established by the owner, and (3) prevent disclosure of confidential or sensitive information. The user is any person who has been authorized by the owner of the information to read, enter, or update that information. The user is the single most effective control for providing adequate security.
References
Haugen, D.M., Musser, S., & Lovelace, K. (2009). Outsourcing. Detroit: Greenhaven Press.
Kundra, V., United States, & Chief Information Officers Council (U.S.) (2010). 25 point implementation plan to reform federal information technology management. Washington [D.C.: The White House, [Chief Information Officers Council.
Lacity, M.C., & Hirschheim, R.A. (1995). Beyond the information systems outsourcing bandwagon: The insourcing response. Chichester: Wiley.
Laudon, K.C., & Laudon, J.P. (2002). Management information systems: Managing the digital firm. Upper Saddle River, N.J: Prentice Hall.
Martin, L. (2008). Introduction to identity-based encryption. Boston: Artech House.
Saltzer, J.H., & Schroeder, M.D. (1973). The Protection of Information in Computer Systems. Proceedings of The IEEE.
Ward, J., & Peppard, J. (2002). Strategic planning for information systems. Chichester, West Sussex: J. Wiley.
Whitman, M.E., Shackleford, D.M., & Shackleford, D. (2002). The Information Security Lab Manual. [email protected] State University.
World Markets Research Centre (2001). Wireless technology. London: WMRC – World Markets Research Centre.
Wysocki, T., Dadej, A., & Wysocki, B.J. (2005). Advanced wired and wireless networks. New York: Springer Science+Business Media.
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.
Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.
Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!
While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.
Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.
In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.
Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.
We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!
We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.
Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.
We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.
Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.
There is a very low likelihood that you won’t like the paper.
Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.
We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.
You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.
We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!
Place an order in 3 easy steps. Takes less than 5 mins.