IT Project Management Project

Decent Essays
Project goal: is to design and install a local area network (LAN) for the city of Meridian’s social welfare agency.
Budget: not to exceed $ 90,000.
Team size risk: one trans professional and two interns from a local university. I think it is great to work with the three personnel to accomplish the project. Alternatively, there is also great risk with the two interns because they need to focus on their class work too.
Budget risk: not to exceed $ 90,000. The biggest problem with setting up a LAN system is the compatibility. For instance, if I brought less costly hardware and software then it will present problems.
Timeline risk: project needs to complete in one month, LAN (delivery and testing).
External access risk: security issues (wired vs. wireless).
Account risk: log in problems, database access problems.
The Key to success of this project is to realize the difficulty of the project scope, asses the risks, and inquiring about possible solutions. In my opinion, I think that the risk associated with the low number of personnel could cause the project to affect the projected timeline, budget, and customer satisfaction. The risk register tables help pinpoint the areas of concern.
Risk event Impact
…show more content…
This course helped me to learn the key phases of a project lifecycles including: how to initiating a project, planning a project, executing a project, controlling a project and closing out a project. It also helped me to understand and learn the ten knowledge areas of project management in depth from various class activities such includes: project scope, cost, time, integration, quality, communication, risk, human resources, procurement and stakeholder’s management. In my opinion, the four traits/skills associated with an effective IT project manager are: time management, personal integrity, communication, systems thinker, and team

Related Documents

  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Interrupts are most important as they give user the better control over the computer. Without interrupts, a user have to wait for a given task to complete in a specific time management with the higher priotity. This ensures that the CPU will charge the process immediately. 2. What is a trap?…

    • 681 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    The essential requirements of the organization is voice correspondence on which the whole business depends. In this way, the administration needs to pick the alternative which can improve the execution of the voice correspondence alongside the system versatility, cost adequacy and adaptability. As indicated by the given situation, the organization is offering for two alternatives, an exchanged Ethernet 100-Base – T network or Wi-Fi network. Both of these choices have their advantages and disadvantages and should be picked by the necessity. The organization can likewise concentrate on introducing voice only lines which may have better reliability and high performance for voice transfer.…

    • 234 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    List the classification of network in detail according to the area covered. Also explain each classification of network in detail with its application. LAN – (Local Area Network) A LAN is a network that covers a relatively small area. It is a network that mostly links computers within a single building.…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    ¥ 1. An IP address is an identifier for devices on a TCP/IP network. Usually, an IP address could be assigned using a 32-bit numeric address written as four numbers separated by periods. Each number can go from being zero to 255. For example, 1.160.10.240 could be an IP address.…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Remote access is the one which helps us to get access to a computer or network form a remote distance. In many organizations branch offices, telecommuters, and people who are traveling may need access to the corporation’s network. Home clients gain admittance to the internet through remote access to an Internet Service provider(ISP). Dial-up association through work area, scratch pad, or handled PC modem over general phone lines is a typical technique for remote access. Remote access is additionally conceivable utilizing a committed line between a PC or a remote neighborhood and the central or main corporate local area network.…

    • 354 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    In the profession of IT a key component in your job will be looking after networks keeping them operational (for the users whom use the network), safe (clean out any corrupt files, check security measures, look for a virus. Etc…) and secure (making sure only authorise users are accessing the network). But first what is a network in a general meaning? A network consists of two or more computers that are connected in order to share resources (such as printers), exchange files, or electronically communicate. The computers on a network can be linked through various ways such as cables, telephone lines, radio waves, satellites, or infrared light beams.…

    • 673 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Technology Framework Design In this section, we combine the user domain needs described in Part 1 of this proposal, the physical framework requirements described in Part 2, and the technology selections described in Part 3 to create the final Digital Edge Manufacturing network infrastructure proposal. Choosing the Cabling Used in the Network We considered infrastructure costs, speed, and reliability for cabling and adaptors. Our network employed hybrid type of network sine we use Ethernet cable, Wi-Fi and fiber optic as our media.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    The decisions our team made affected how our team placed in comparison to the other teams in the class. The first day the that simulation began, our team payed close attention to what Dr. Clough was doing and speculated about what his purchases must have been to get his results. This may not have been the most effective way to purchase machines because there was no way to know when his next purchase was going to be. The decisions made were mostly qualitative, and based on prior assumptions. To make decisions easier on the entire group, we decided early on that if a purchase was to be made, consult the group and come to a majority vote.…

    • 558 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Perfect Pizza, Inc.

    • 1254 Words
    • 6 Pages

    It is a very effective tool for long term planning and trouble shooting. This study should most essentially support the financial information of an organization. It helps organizations to determine whether the technical resources meet capacity and whether the team is capable of translating the ideas into working systems. Technical feasibility also involves evaluation of the hardware, software, and other technology requirements of the proposed system. Operational Feasibility:…

    • 1254 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    While conducting research of project management and one of the process groups – monitoring and controlling – there are 11 processes within that group that span all 12 knowledge areas (PMBOK, 2013). The PMBOK illustrates a great foundation for project managers to build a concrete framework for successful monitoring and controlling. That foundation includes inputs, tools and techniques, and outputs needed for success. A Project Manager may face challenges along the life cycle of a project but being able to effectively monitor and control activities with tools, mechanisms and knowledge can reduce those challenges and turn them into opportunities. This paper will outline the definition of monitoring and controlling, lessons learned and challenges a project manager may face with monitoring and controlling a project.…

    • 885 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    1-What factors will help you decide if the existing internetwork is in good enough shape to support new enhancements? keeping a track of round trip response time, regular checkups of major routers, firewalls and switches, identifying sources and destinations of network traffic, analyzing its direction and balancing the data travel between source and destination are the some important factors. Documentation should be done for Data stores and traffic flows, the number of stations, average time a station is idle between sending frames and the time required to transmit a message once the medium access is granted, along with traffic behavior are essential factors to determine whether the existing internetwork is in good shape to support new enhancements. 2-When considering protocol…

    • 670 Words
    • 3 Pages
    Improved Essays