Networking Technology Project Management Report

Exclusively available on Available only on IvyPanda® Written by Human No AI

Introduction

In the effort to open a new division in Scottsdale, Arizona, J. Smith & Associates must arrange to move furniture and equipment in the new location, including networking of technology and setting up of communication services. This paper presents a project summary on the area of networking technology as one of the costs and time-constrained activities that my company must fulfill to ensure that about 500 people who work at the multi-story complex meet the needs of its clients in different satellite divisions. Since the building is equipped with modern telecommunications infrastructure, the main task of the project entails creating interactivity and interconnectedness of various remote networks of different floors and with satellite offices.

Project Summary

The primary objective of the project entails facilitating the 500 employees at the office to attend the needs of customers within different divisions, including the satellite divisions. For this goal to be realized, the network systems of my organization should meet the capacity need thresholds while having optimal systems reliability and availability. Therefore, part of the project should involve system evaluation and monitoring to enhance its availability to meet the planned capacity needs. Equally important is the networking project is resource planning. Planning for network architectural design and implementation constitutes a critical activity in any networking technology.

Network Design and Implementation

The implementation of the project initiates with the analysis of project requirements. The organization will first distribute all information together with proposals to the relevant authenticating authorities. Wysoki (2013) asserts that it is important to analyze the technical and functional needs of all projects consistent with the established codes within different jurisdictions.

Project design and implementation requires the input of human resources, including technical staff and project administrators. These resources can be recruited in-house. Alternatively, my company may consider contracting second-party agents to execute the task of setting up the organization’s network systems, including ensuring that they adequately learn to operate within the acceptable availability and reliability thresholds.

The second alternative has been adopted. This decision is based on the knowledge that any recruited second parties are well acquitted with codes and acceptable practices within the new division in Scottsdale compared to the company’s employees. Therefore, the risk of noncompliance, review, and subsequent auditing of the network design to ensure compliance is eliminated. This situation has a cost reduction effect. However, my company has the obligation of supplying the second party agents with necessary system performance design constraints to ensure that the design meets its capacity needs.

The next phase of the implementation process encompasses exporting the clients’ information from the existing systems and network infrastructure. Depending on the hierarchical structures, the appropriate assignment of electronic signatures is executed. Since electronic data is prone to exposure to a variety of risks that may lead to its loss, particularly when the network systems are availed to the employees, it becomes crucial to implement systems for tracking data and maintaining data backups. When this goal is accomplished, the next approach involves completing the functionality of the system tests and the appropriateness of the user interfaces.

Evaluation

While planning for the implementation, the best outcomes are achieved with full knowledge of the network load. This goal may be achieved through benchmarking of bandwidth utilization within the network infrastructure. The evaluation may also be based on the development of test environments in which simulations are conducted on the capacity requirements of all network users in the entire new divisions’ complex.

Before deployment, the designed new network requires inventory analysis. The process includes access types such as DSL and VPN, domain names, and any deployable bandwidths for the internet. Jigeesh (2012) addresses the importance of “Assessing WAN bandwidth between Internet egress location and network locations, which use that egress point” (p.43). Determination of peak and average usage for proxy servers firewall appliances, DNS servers, and bandwidths constitutes a crucial activity in the evaluation process before the new network system becomes fully deployed within the new division. All system users and clients should always have the ability to reach hostnames. This process should be facilitated by testing ICMP connectivity.

Monitoring

Continuous monitoring is critical in ensuring network system reliability. However, some reliability tests are highly intrusive. They influence the performance of networks (Jigeesh, 2012). For example, TCP or UDP commands should be executed over off-hours to ensure minimal negative effects on the network when under full load. Monitoring also aims at providing clear guidelines for conducting network maintenance work together with troubleshooting in case problems are registered on full deployment.

Conclusion: Resource Planning

It is impossible to plan or execute a project without the commitment of resources. Money and time resources are limited in their supply. Therefore, the two resources act as the most crucial constraining factors to any project, including technology-networking projects. Money is required in the design of the networking systems, hiring of the implementing agents, project implementation and administration costs, training personnel on the successful implementation of the project, and/or sourcing the project analysis experts (Kostelac, Matrjan, & Dobovicek, 2011). Financing these resources is the responsibility of my company. The contractor will assume the costs of hiring the employees who will be charged with the responsibility of executing various work structures, which while combined constitute the completed project.

Reference List

Jigeesh, N. (2012). Selection of Project as Important Beginning for Information Technology Project Management. IUP Journal of Operations Management, 1(1), 41-49.

Kostelac, D., Matrjan, D., & Dobovicek, S. (2011). Relationship between Processes and Project Management. International DAAAM, 22(1), 1119-1120.

Wysoki, R. (2013). Effective Project Management: Traditional, Agile, Extreme. Hoboken, NJ: Wiley & Sons.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, June 13). Networking Technology Project Management. https://ivypanda.com/essays/networking-technology-project-management/

Work Cited

"Networking Technology Project Management." IvyPanda, 13 June 2020, ivypanda.com/essays/networking-technology-project-management/.

References

IvyPanda. (2020) 'Networking Technology Project Management'. 13 June.

References

IvyPanda. 2020. "Networking Technology Project Management." June 13, 2020. https://ivypanda.com/essays/networking-technology-project-management/.

1. IvyPanda. "Networking Technology Project Management." June 13, 2020. https://ivypanda.com/essays/networking-technology-project-management/.


Bibliography


IvyPanda. "Networking Technology Project Management." June 13, 2020. https://ivypanda.com/essays/networking-technology-project-management/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1