Essay Undergraduate 2,118 words Human Written

Lawrence Berkeley National Laboratory Implementation Plan Introduction

Last reviewed: ~10 min read Other › Electric Vehicle
80% visible
Read full paper →
Paper Overview

Lawrence Berkeley National Laboratory Implementation Plan Introduction and Business strategies Lawrence Berkeley National Laboratory continully receives increasing competition in the information services industry. To reinstate the effectiveness and generate consumer satisfaction, as well as company presence in the market, a proactive strategy must be formed...

Writing Guide
How to Write a Strong Essay Introduction with Examples

Introduction An essay introduction establishes tone and sets course. Every journey starts with one—whether you’re getting on a plane, starting out a new school year, joining a new club, or moving to a new neighborhood. The introduction is the welcome mat: it tells a lot about...

Related Writing Guide

Read full writing guide

Related Writing Guides

Read Full Writing Guide

Full Paper Example 2,118 words · 80% shown · Sign up to read all

Lawrence Berkeley National Laboratory Implementation Plan Introduction and Business strategies Lawrence Berkeley National Laboratory continully receives increasing competition in the information services industry. To reinstate the effectiveness and generate consumer satisfaction, as well as company presence in the market, a proactive strategy must be formed to increase functionality and service, as well as generate a wider consumer base, all while minimizing overhead and operational cost. Along with this aim, an implementation plan must be executed. The plan will consist of a five-step problem-solving model.

This model will identify and address concerns, while establishing a process of improvement for Lawrence Berkeley National Laboratory and create increases in the company's wireless service efficacy. "The 5-Step model is a process to; categorize the situation, label and frame the central issue, articulate final goals, possible alternatives, and evaluate those alternatives" (Kundra, United States, & Chief Information Officers Council (U.S.),2010, p. 12) The model as mentioned, involves five steps and follows an incremental format.

The advantages of using this model were to formulate and convey in accruments after chartering an overall architecture. Eight deliverables are classified as crucial in meeting the goals to increase effiacy in Lawrence Berkeley National Laboratory. 1) Increase capacity for wireless service in shuttle buses within three years. 2) Generate a strategy to increase research towards advancing the high speed networking divison 3) Start notifying customers of updates in service. 4) Align Technologies Workers Union with Lawrence Berkeley National Laboratory restructuring objectives three months after the strategy is implemented.

5) Show decrease in overhead expense three-month after financial growth strategy is developed and implemented. II. Implementation Plan Project Description The reason for the creation of this project is to accommodate wireless Internet access to all (student, researchers, employees, and business travelers) using the Lab adminstered shuttle bus service. The primary difficulty of this project is the installation and maintenance of wireless technology on the shuttle buses without causing a decline in shuttle service. The aim is to increase and augment productivity for all who utilize the company's bus shuttles.

Measurable Organizational Value (MOV) The main measure of value an increase in Lab shuttle bus use which wll minimize chances of overcrowded parking lots and allow for convenient use of web services. This will bolster productivity within the facility and traveling to it as well as added employee and consumer satisfaction. Evaluations of satisfaction will help improve the organization's ability to provide Safeguards Safeguards must be in place in order to prevent over-usage of the wireless network as well as data hacking.

A password assisted login will keep guests from overloading the network and minimize who uses it who is not woring or studying in the organization. Routine maintenance including firewall and software updates will allow for a better measure of security. Many people will be using the wirless networks on a daily basis. It is imperative safeguards are in place to protect a person's personal data. The possiblity of leaked research or financial documents can lead to a loss of business or possible legal problems in the future.

Media-access control or MAC address filtering is an excellent tool in limiting access to only identifiable network cards with approved MAC addresses. "A MAC address is a hardware code unique to each PC and network device" (Martin, 2008, p. 50). It is not the strongest baseline defense, due to clear broadcast of MAC addresses, but it is a suitable safeguard. In addition to MAC protocols, encryption may also ensure access to sensitive date to only authorized receivers. An example of encryption is WPA, a security standard, and it use of TKIP.

"TKIP is an open protocol that includes a rekeying feature, a message integrity ceck, and packet key mixing" (Ward & Peppard, 2002, p. 32). It allows for greater control over security measures. Inclusion of VPN's or Virtual Private Networks allows for human safeguards. Workers who wish to access the company's networ from an unsecure location, for instance on the shuttle bus heading away from the facility or towards it, will have to follow protocol in order to keep data secure.

Project Scope All of the sixteen passenger vehicles apart of the Lawrence Berkeley National Laboratory will have wireless access points installed and maintained in order to provide wirless internet service to all who board the shuttle buses and vans. Lawrence Berkeley National Laboratory owns ten shuttle buses and six passenger vans currently in function. Vehicles that will not have wirless access points installed are lab owned cars, long-term use vans, and electric vehicles. The scope of this project to provide working internet access solely in passenger transport vehicles.

Project Schedule Summary Project start date: September 1, 2013 Project end date: October 04, 2013 Timeline of project developments and breakthroughs: All materials expected to be delivered on September 1, 2013 The first of sixteen vehicles installed with wireless access point on September 10, 2013 Milestone -- Successful test run of first 2 vehicles with wireless Internet Next 2 vehicles in with installed with wireless access point on September 11, 2013 Milestone -- Successful installation and testing Next 2 vehicles outfitted with wireless access point on September 12, 2013 Milestone -- Successful installation and testing Next 2 vehicles outfitted with wireless access point y on September 13, 2013 Milestone -- Successful installation and testing Next 2 vehicles outfitted with wireless access point on September 14, 2013 Milestone -- Successful installation and testing Next 2 vehicles outfitted with wireless access point on September 15, 2013 Milestone -- Successful installation and testing Next 2 vehicles outfitted with wireless access point on September 16, 2013 Milestone -- Successful installation and testing Next 2 vehicles outfitted with wireless access point on September 17, 2013 Project Goal -- Successful installation and testing on all sixteen vehicles Continual testing, maintenance, and passenger evaluation to calculate satisfaction with new wireless Internet service on Lab shuttles Project Completion -- October 04, 2013 Project Budget Summary Total project budget - $36,220 Budget broken down by development: Acquisition of hardware for wireless access points: $27,200 ($1,500 per vehicle) IT Installation and testing: $7,200 ($450 per vehicle installation) Transportation: $1,820 (Wage cost of driver required to move Class B vehicles) Quality Issues Out-sourcing of IT installation could potentially lead to higher security risk.

Installation process was done by a company outside of the control of the organization. Following a strict schedule is imperative to keep budget concerns to a minimum. Testing is crucial in predicting successful outcome of project and must meet or exceed Lab wireless protocol standards. Requirements for Out-sourcing Need to meet budget limit:Outsourced transpotation to move Class B vehicles decreased cost of project and let organization focus on other facets of the project, particularly the in-sourcing of the wireless network.

Out-sourcing of IT installation also achieved same goal to keep within budget and increase focus on wireless newtork Requirements for In-sourcing Need for increased security: The wireless network is important due to control over information sent and received and possible problems between users and support. Resources Required Workers -- Two Information Technology staff (acting manager Mr.

Peach), One Transportation driver with Class B Passenger license (outsourced) Technology -- Technology requirements consist of wireless technology including: wireless access points, virtual private network, encryption and virus protection, IT staff will provide the assistance to identify and measure the success of the implementation plan. Facilities -- The maintenance yard suited for Lab vehicles makes the ideal environment for the completion of tasks. It will also allow for quick resolution to possible vehicle maintenance issues. Resources to be provided One Global Electric Motorcar Facilities (responsible manager Mr.

Llewellyn) Needed from September 1, 2013 to October 4, 2013 Assumptions and Risks Assumptions used to formulate estimates IT staff's ability to finish two wireless installations per day Key risks, chance of occurrence, and effect Probability of vehicles needed for back-up during wireless installation Maintenance requirements may hinder pace of installation schedule Chance of key staff used for other mission critical Lab responsibilities Limits Project cannot hinder or prevent any and all IT departments daily duties or the operation of the organization owned shuttle service Possible utilization of areas within or outside the organization The IT staff must perform job duties without it affecting the shuttle service.

Time of operation must not confluct with shuttle operation. Project Administration Communications plan The aim is to advertise the new wireless Internet on Lab passenger vehicles and shuttle buses. This will achieved utilizing a number of methods. The Today at Berkeley Lab newsletter will be notified to run daily advertisements/notifications to ride the shuttle service. Bus drivers will also have given to them papers that will be posted inside the vehicles concerning the new service along with instructions how to access the wireless service.

Finally, the Facilities Resource Manager agreed to send a mass email notifying the staff about the changes. The email will also include an invite for more users to utilize the shuttle service. Scope management plan The main objective of the scope management plan is for the Logistics and Site Services managers to deliver assurance all single passenger vehicles have wireless service installed and do not come into problems due to budget constraints and concerns over safety.

Implementation and project closure plan The technical implementation of the wireless Internet for all chosen vehicles will be equipped with security features mentioned earlier that will safeguard riders from information theft. These safeguards include user login and encryption among others.Warnings will be posted on buses about information sensitivity while on access. Glossary Anti-Virus Software Anti-virus software will protect your computer from viruses encountered on the Web. New viruses are born every day, so it's important to update your anti-virus software regularly.

What to do: Information Technology Services (ITS) provides students, faculty and staff at the university with security software at no additional cost through the BevoWare Web site. BevoWare includes Symantec anti-virus, firewall and firewall products. Download, install and run security software from BevoWare on your own personal computer today. Authentication The process of confirming a claimed identity. All forms of authentication are based on something you know, something you have, or something you are. Something you know' is some form of information that you can.

424 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
11 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Lawrence Berkeley National Laboratory Implementation Plan Introduction" (2013, October 15) Retrieved April 21, 2026, from
https://www.paperdue.com/essay/lawrence-berkeley-national-laboratory-implementation-124709

Always verify citation format against your institution's current style guide.

80% of this paper shown 424 words remaining