Analysis of Tasmanian farmers and latest network technologies in Tasmania

Analysis of Tasmanian farmers and latest network technologies in Tasmania
17 mn read

Introduction

Technology is going through an evolution as it proposes itself as the architect of our intimacies. The technology in the modern world is undergoing a substitution that involves changing the way things used to be done. Automation and the virtual world are being experienced in social life, house, and avatar. Automation takes place in industries as well as in daily lives to make work easier. Also, technology has enhanced connectivity which leaves people in a lonely world though they are connected from different parts of the world. In the technology world, individuals have acquired experience which has helped them substitute the conventional ways of life to digital life. In this piece of work, the analysis of Tasmanian farmers is an illustration of what technology can do in the modern world regarding the latest network technologies in Tasmania.

Project Brief

In the context of performance, this system will allow decreasing the wastage of time and will support selecting an effective storage location promptly as time is money. Appropriate configuration of network devices will allow the farmer to develop an effective database .processing of orders. In the context of making it possible for the transporters and drivers to transport the wheat in real-time, alternatives to packet tracer will remain highly assistive.

The utilization of mobile phones will remain supportive to offer the facility of wireless technology as it is a hand-held device that supports to offer intermediate network facility. It also remains supportive to get connected from the internet and will allow the farmer to connect with the storage facility sellers. In like manner, it will also remain supportive to connect with the transporter and drivers. Wired technology can be used to handle the overall project while sitting at the place. Moreover, there is a need of utilising security for authentication and encryption as it will allow providing confidentiality, integrity, and authenticity and will offer assurance for data security (Todorović et al., 2015).

Consideration of Stakeholders

Stakeholders of any organization play a key role in the processes and operations of the organizations. The reason for this is the interest that the stakeholders have vested in the body of work that influences the company. In this project, there is a need of considering various stakeholders. The major stakeholders who need to be considered in this project are wheat farmers of Tasmania, storage facility sellers who are in Tasmania, grain transporters, and drivers who transport wheat. For this purpose, there is a need for computers, wireless mobile phones, internet connection, databases, packet tracer, IP clouds, etc. These considerations towards the stakeholders will remain supportive to purchase the proper storage space on an urgent basis and to direct the location communicated to the grain transporters promptly to direct them to the alternative storage facilities.

List of stakeholders:

  • Wheat farmer
  • Laborers
  • Storage facility sellers
  • Grain transporter/drivers
  • Security
  • Software firms
  • Administrator (management, planning team)
  • Employees
  • Tech company (sensor, database management, transmitters and receivers, camera, data storage cloud)
  • Technicians and Engineers
  • Government
  • Buyers
  • Fertilizer and crops suppliers (disinfectant)

The Priority and Severity Matrix

Brainstorming

According to the various researchers already concluded, project management is a process that involves various activities that are aimed towards accomplishing specific goals of an organization. Being a process, various tools are mostly used to implement the various activities. It is in the project planning phase that the project manager comes up with a work breakdown structure (WBS) which shows in fine detail how the various activities will be accomplished. Work breakdown structure gives the flow of the various activities and the personnel who are supposed to implement the various activities.

Image result for project management

Consideration of possible methods

In the context of possible methods, it is identified that utilizing of existing technologies will remain highly assistive for this wheat farmer to eliminate the current challenge. In support of this, according to the views of Serra and Kunc (2015), Information and communication technology (ICT) in agriculture remains highly supportive for the farmers to develop and apply innovative ways. This method remains supportive of offering a wide range of solutions to agricultural challenges. It offers the facility of enhancing agricultural and rural development through improved information and communication processes. By using this technology, this wheat farmer becomes able to encompass all the information and communication technologies while including devices, mobiles, networks, services, and applications (Stevenson and Hojati, 2007).

It will remain supportive for the farmer to get the advice of experts as well and will also offer to get the benefit of innovative internet-era technologies and sensors while including other pre-existing aids, like televisions, radios, satellites, and many more. Svejvig and Andersen (2015) stated that utilization of ICT remains supportive for the farmers to get the solutions in different eras related to agriculture. So, it will not only support the farmer to get the solution of this storage issue but also remain supportive for resolving further agriculture issues. Moreover, ICT will back to offer the provisions of standards, norms, methodologies, individual and institutional capacities, policy support; government norms regarding agriculture, etc. which will remain supportive for the farmer to eliminate this challenge.

The utilization of mobile phones will remain supportive to offer the facility of wireless technology as it is a hand-held device that supports to offer intermediate network facility. It also remains supportive to get connected from the internet and will allow the farmer to connect with the storage facility sellers. In like manner, it will also remain supportive to connect with the transporter and drivers. Wired technology can be used to handle the overall project while sitting at the place. Moreover, there is a need of utilising security for authentication and encryption as it will allow providing confidentiality, integrity, and authenticity and will offer assurance for the data security (Todorović et al., 2015).

In the context of performance, this system will allow decreasing the wastage of time and will support selecting an effective storage location promptly as time is money. Appropriate configuration of network devices will allow the farmer to develop an effective database .processing of orders. In the context of making it possible for the transporters and drivers to transport the wheat in real-time, alternatives to packet tracer will remain highly assistive.

ICT will allow controlling the overall supply chain system while utilizing IP clouds (Too and Weaver, 2014). There is a need of involving the expert in the project as their advice will remain supportive of increasing the project viability while decreasing the risk. For planning the overall project, there is a need of involving all the stakeholders to create the team structure.

Project Initiation Document

Our Project Initiation Documentation consists as follows:

  • Defines our project and its scope.
  • Justifies our project.
  • Secures financial supporting the project, if necessary.
  • Defines the roles and responsibilities of project participants.
  • Gives people the data they necessitate to be productive and effective right from the outset.

Project Background

Within this section I will be explaining what the prime context of the project is, briefly explain the ideas and why is the work needed?

As far as the context is concerned, the pinnacle of reaching the creativity of the project is about the installation of the current simulation. The primary motive can be considered a successful operation of a farm under the vision of network communication. The accessibilities are made sure way before the initiation of the project ranging from farm site, storage, and vehicle parking. The farm site and storages have access to sensors such as wind sensors, temperature sensors, humidity sensors and more. Stakeholders who are involved have got various responsibilities to be concerned about.

Project Definition

  • Purpose – This project concentrates on the welfare of farming and for the profit of the stakeholders.
  • Objectives – it will be visible at the end of completion that there is quick raise in farm security and farm implements.
  • Constraints – Limitations can be disagreements with stakeholders, loss of contracts, lack of laborers during the period of work, and then deadline push. There could also be technical errors such as data loss.
  • Assumptions – The assumptions can be expected as follows as promised finances and quantity and quality of crops, deadlines, and the number of stakeholders.
  • Cost and Timescale – The estimated amount for 40 hectares of barren land in Tasmania costs about AUD 147487.8 (£8.3 Million), and the estimated timescale could be around 11 months. In this section, we will be providing the total cost of this project and relevant financial details

Risk Analysis

  • Risk Identification- Within this section, we will be detailing the risks within the project
  • Risk Prevention- We will describe what we are going to do to manage risks.
  • Risk Management- Where you can’t prevent risks, what are your contingency plans for dealing with them? What actions will you take should the risk materialize?
  • Risk Monitoring- What processes do you have in place to routinely assess the risks associated with your project?

Roles and Responsibilities

  • Project Organization Structure- Create a diagram that shows the lines of authority and reporting for each project team member.
  • Project Sponsor- Who has the ultimate authority and control over the project and its implementation?
  • Project Manager- Who is the Project Manager, and what are his or her responsibilities?
  • Project Team- Who are the key members of the project team? What are their roles and job descriptions? What are their phone numbers and email addresses? What is their original department or organization? And to whom do they report on a daily basis?

Initial Project Plan

  • Assignments- What major tasks will be completed during the project?
  • Schedule- Provide a report of the estimated time involved in the project Example provide a Gantt chart or similar schedule, so the PID simply summarises the anticipated schedule.

Work-Breakdown Structure

The team that is in control of the management process within an organization is the once that are ones that are responsible for the success and failure of the project. The management team to manage their employees properly seek to monitor the activities closely, but following the workers everywhere in the company was not possible and likewise measuring and understanding the risks in managing a company is critical.

The work breakdown structure is a structure that helps in following up the activities of a group. This Brainstorming structure is in a chart form and gives an account of the role every individual plays in the project. Its estimation is a bottom-up process of planning. This model is instrumental in helping the project manager to choose to form the base of the project by creating a complete project schedule with dependencies, which can be instrumental in helping the project manager follow each role of activity with an idea of its role, its efforts and its performance (Lock. D. Project Management, 2007). This helps the project manager to keep the project under control and allows him or her to monitor the activities of the employees and the process of the project.

The work breakdown structure of this project is as follow 🙁 Here is my opinion which I am not sure if it’s correct or not )

Planning Stage

Documentation—

Project details—

Considering the stakeholders’ needs—

Task management—

Development Stage

Technical planning—

Designing of the wireless communication system—

Software requirement specification—

Prototyping software—

Implementation Stage

Software or Wireless device coding—

Unit coding software—

Debugging—

Execution Stage

Unit testing—

Errors finding related to the software—

Software testing (in case of wireless device failure)—

User acceptance testing—

Closeout Stage

Release of software or wireless device—

Software Maintainance—

Related image

Project Considerations

Wireless technology

Usage of the cell phones will stay steady to offer the office of remote innovation as it is a hand-held gadget which backings to offer middle system office. It additionally stays steady to get associated with the web and will enable the rancher to interface with the storeroom dealers. In like way, it will likewise stay strong to associate with the transporter and drivers. Wired innovation can be utilized to deal with the general undertaking while at the same time sitting at the place. Also, there is a need for using security for verification and encryption as it will permit giving privacy, trustworthiness, and genuineness and will offer confirmation for the information security

Wired technology

Wired LAN controllers, routers delivering comprehensive network services, integrated switches, and other platforms are the components necessary for the unification of the network. The Network Unification Infrastructures functions smoothly across different platforms. They include Cisco Catalyst 6500 Series (WiSM), Wired LAN controller Module in integrated service routers, Cisco 4400 series, Cisco Catalyst 3750 series with Integrated Wired LAN controller, and 2000 series with WLAN controllers (Roshan and Leary, 2004).

Security

System Security is paramount in any organizational data and the organization at large, and it requires that the measures taken should ensure that it covers what is relevant and bridges that security gap available in the system. Due to the technological revolution that is taking place in the 21st century, businesses are becoming more prone to attacks since various technological tools are released that can be used to get access to information systems whether legitimately or illegitimately. When an attack occurs in a system, it causes downtime on the operations of the organization which cost furthers the business and makes it run at a loss. The development of security policies does not guarantee that technology infrastructure will be secure unless they are implemented, and a follow-up is done. In this piece of work, the concentration will be on five areas in which the organization can make significant strides in ensuring that security measures that are applied meet the threshold of network security. The five areas of concern will be on establishment and maintenance of relevant and meaningful security policy, ensuring that the security policies have teeth and that are enforced, provision of tools that help the stakeholders in Tasmania implement the security policy, closure of the network backdoor which are becoming increasingly popular, and finally ensuring that security holes are plugged in situations that are co-hosting.

Three questions require being answered while surveying this cuts across almost all the functions of every regular employee in an organization. It is an important question whether there is a need to give a second person an understanding whenever a first-person is violating the security of the system. Also, there is a need to question if the first employee would report a violation in the system. In case the first person reports a violation would there be a clear procedure to report the violation regarding the contact person. If the answers to these questions are provided, corporate culture would have been accurately looked into, and fostering inculcating a culture of network and system security will be easy (Rhodes-Ousley, 2013). Corporate Security culture entails considering values that are associated with daily business activities both externally and internally.

Performance

Cost-effective tools required for network management will help at the central locations to help for easier planning, configuration, and planning. The central location will help to create a network unification that can help in future developments and procurement frameworks. The World-Class Management Systems visualize and help in securing the airspace via Cisco WCS. The choice of Cisco WCS is a result of the high performance and compatibility issues experienced. Most of the equipment that will be used in this Network infrastructure is provided by Cisco and thus found the most appropriate.

Applications

Big data development not only allowed for organizations to improve decision-making and service delivery, but the use of big data has also helped organizations to cater to customer demands and also identify and solve the pain points about customer complaints. The big data availability allows for organizations to identify the areas that customers need improving. This, in turn, provides for the adoption of measures that solves customer problems, hence enhancing their experience. For example, the IT Department can receive complaints of customers’ lost luggage when on transit. Through the different information provided by the customer complaints, the department can devise a solution to the problem by adopting the ‘Track My luggage’ feature on their phones. This process, not only has it allowed the organization to solve client problems but also manages to provide the best customer service to the customers.

Appropriate configuration of network devices

The most common approach to communication is Point-to-point Tunneling protocol PPTP when creating a secure Wireless LAN (RefeBing, 2002). The protocol is more natural to configure and implement than Wired Equivalent Privacy (WEP). However, PPTP user authentication has questionable encryption and is insecure; analysis conducted during this project showed that the weaknesses could be exploited. Internet-based security solutions, therefore, provide better security levels than the options provided in the project.

The organization requires that two sites should be connected using secure wireless technology. Since no wireless network can operate within a 15-mile distance, point to point connection will be used to render services for the institution. However, there will be bridging of the wireless network across the organization for Mobility Purposes.

The business case for developing such systems

The most crucial step towards arriving at the intended solution of the system is educating the employees on what security is all about while in the organization. Orientation to security measures that are essential to the working of computer systems and the organization at large points out some of the loopholes that had been created by the employees. Orientation should be carried out in various groups to develop policies that are related to a particular group of employees. Also, after the orientation, the employees are expected to respond in a particular way since they are affected by the policies that will be implemented. The various groups in Tasmanian Farmer Grain Storage and particularly related to information systems should be involved in the development of the policies. These groups include Design, Information systems, accounts, operations and sales, and marketing.

Alternatives to Packet Tracer

To understand the impact of the WLAN expected for the Network developed from the current system it is important to use evaluation tools for WLAN. The OPNET evaluation tool is the best alternative for this network since it will predict the effectiveness of the system. The choice of OPNET was stimulated by the high versatility power in the evaluating of the behavior and performance of any network system.

What system simulation is required to show

The network set aims to improve the current system with security given priority. It is of great importance that the system security is of high order due to confidentiality, and integrity maintained. Also, intruders from outside the network are restricted and filtered by the use of the firewalls, and the gateway in that only secure connections are allowed. This project aims to fulfill four fundamental network goals namely, scalability, availability, security, and manageability. The scalable network design will later include the new user groups and support future applications.

Project viability/risk management

For the project team to identify security risks as well as establish guidelines for acceptable behavior, the organization needs a security policy that is concise, clear, and relevant to the activities carried out by the organization on a daily basis. The security policies should ensure that they cover not only the activities of the business regarding productivity but also the employees and the network. To ensure that the “security culture” of the Tasmanian Farmer Grain Storage system is covered and understood, a simple survey should be conducted and questions regarding the network and the role played by every employee regardless of the rank addressed independently (Tipton & Krause, 2003). The conducting of the survey is important because every employee while in the network conducts themselves freely and tends to reason differently as they try to achieve secure themselves from malicious attacks.

Project planning/team structure

Most human activities across the globe have adverse effects on technological applications. In this respect, researchers have been actively advancing ways to modify the practices or opt for new methods to solve human problems without causing these problems to the surrounding. One of the areas that have gained a lot of interest is regarding new developments in automation (Tavsan & Sonmez, 2015). This has triggered research on sustainable Automation practices. However, sustainable architectural practices are yet to be fully developed. The application of technological concepts has, therefore, been seen as the solution towards the development of sustainable architectural practices. Through the application of the concept in architecture, practices that seek to minimize the adverse environmental impacts can be realized. In this regard, efficiency will be achieved concerning the moderation of materials, energy, as well as the entire ecosystem. Biomimicry brings the idea of sustainable ecological design that facilitates environmental practices that don’t affect or inhibit the opportunity for the future generation (Berkebile & McLennan, 2004). It has also been noted that the world has been facing significant developments that call for more architectural activities particularly building and construction. There have been significant developments of the developing nations thereby a need for more construction activities.

IP clouds

In the 1960s, IBM Company performed its first virtualization experiment with the establishment of a virtual machine on its operating systems. In 2007, the company started to create a plan for cloud computing. It declared that it aimed at developing clouds for enterprise customers and services to seal the current cloud environments’ gap. IBM later collaborated with Google with the aim of promoting and teaching about cloud computing in learning institutions. By 2011, companies like Aviva and Frito-Lay had started to use IBM cloud services and software. IBM acquired SoftLayer in June 2013 to develop a cloud service division.

Cloud distribution options offered by the company include public clouds, private clouds, and hybrid clouds. However, customization of a cloud is enabled in the IBM cloud. IBM takes part in adverse cloud standards initiatives, which aim at enhancing cloud security and interoperability. To assist in upgrading its cloud computing enterprise, IBM has currently established a cloud research facility, data center, core cloud facility, and a cloud authorization program.

Design and Topology

The research will use a theoretical analysis and approach that concerns itself with critical differentiation of materials as well as energetic interventions that have evolved from the mutual feedback relationship as well as the speculations regarding the relationship of the social and spatial arrangements. In this regard, the research analysis will use a morphogenesis approach that focuses on the processes that control the spatial distribution of materials and how they influence nature. Researchers like Zari (2009) argued that architectural designs can be applied to biological analogs that improve sustainability. The research will, therefore, examine the validity of such critical arguments and investigate how biomimicry approaches can be used to solve the prevalent ecological problems.

Topology of the Project

Implementation

Implementation of the project and its functions are critical to the success of the project. This is the case in not one but in every business project. For the implementation of the overall project, there is a need of involving all the stakeholders related to the project so that they can give their feedback regarding the effectiveness of the system. Moreover, there is a need for time-to-time checking the efficiency of the system at every stage of WBS (Svejvig and Andersen, 2015). In like manner, while implementing the system, there is a need of analysing that this system will remain supportive to achieve the project goal or not or there is a need for improvement.

Test Description and Procedures

Project scheduling involves allocating the project activities time estimations. Project scheduling is a task that entails considering the amount of work that is associated with a particular activity. The weight of the activity is a factor that dictates the amount of time required, the human resource needed, and the cost associated with it. Scheduling techniques such as PERT and CPM have proved to be valuable in creating an adequate schedule of project activities. Using the project scheduling techniques, the various complex activities are segmented into discrete activities to ensure that Earliest Start and latest start are indicated to show the timeline between when a project activity can commence. Also, the latest and earliest finish times are reported which shows the possible times when the project can be completed. Slag activities can be identified, and the right measures can be defined.

The project is controlling as an element of the project management involves ensuring that the implementation of the project activities lay within the stipulated time and utilized the required resources bridging the gaps of variation in the project management. In the controlling process, project managers keep watch on the various activities, and whenever unexpected issues are discovered, the required response actions are taken.

Questions that should be given priority in the process of project management

  1. What are the limitations of using the various scheduling Techniques? For a project manager to utilize the various scheduling techniques, proper skills and knowledge should be incorporated which is a limitation.
  2. What is the difference between dummy activities and actual implementation? Dummy activities give a chance to the project managers to simulate particular activities putting all the variables to identify the effectiveness of actual implementation.
  3. What is it important to have a critical path network in project management? Critical path network illustrates how the various activities follow each other and the alternatives that can be used.
  4. What are the various technological tools that can be used in project management? Software and hardware tools such as Gantt Charts are used for project management.
  5. What are the emerging issues in project management? The majority of the activities are utilizing one or more technological tools which make project management efficient.

Anticipated/Actual Results

Although the system is not able to link to an existing design project, it offers the potential for future work regarding project development. The research topic will be advanced through materials towards a more sustainable technological application practice. Besides, the findings will aid the establishment of artificial technological practices in computational designs in architecture. This project aims to give more insight regarding more sustainable system implementation practices. For example, the research aims at evaluating the possibility of applying biomimicry technological principles in the emerging sciences to establish sustainable as well as regenerative architectural practices with the potential of increasing technological impact. It should be noted that very few architectural technologists can benefit from the technical advances regarding sustainable System implementation (El Ahmar, 2011). In this regard, the project will enable the participation of these professionals considering that they form the target audience.

Review & Conclusion

The development of computing Networks has enabled organizations and individuals to shift from old software business models. The adoption of cloud computing has facilitated organizations to incur less cost in performing their operations. Companies like IBM have developed cloud networks that offer services and products for purchase by customers. IBM cloud has shown diverse advancements and expansions of services it offers in its cloud. It allows customers to customize their cloud or obtain the services available in the cloud. Orientation to security measures that are essential to the working of computer systems and the organization at large points out some of the loopholes that had been created by the employees. Orientation should be carried out in various groups to develop policies that are related to a particular group of employees. Also, after the orientation, the employees are expected to respond in a particular way since they are affected by the policies that will be implemented. It is prudent to conclude that risk management is a process that is determined by making critical decisions concerning the approaches to the identification of risks and the conditions likely to cause such risk; the prioritization of these risks depending on their probability and effects; comparing the current risks with the predetermined risk containment ability; making a decision on the relevant course of action against the uncertainties as to whether avoid them, retain them or share them with other parties. Once these have been decided upon, significant decisions have been made on the resources channeled towards risk control measures. Finally, the risks management system has to be monitored, and a strategy for monitoring and taking appropriate corrective measures has to be set up.

Leave a Reply

Your email address will not be published. Required fields are marked *

Reading is essential for those who seek to rise above the ordinary.

MyArticles

Welcome to MyArticles, an author-oriented website. A place where words matter. Discover without further ado our countless community stories.

Build great relations

Explore all the content from MyArticle community network. Forums, Groups, Members, Posts, Social Wall and many more. You can never get tired of it!

Become a member

Get unlimited access to the best stories and articles on MyArticles, support our lovely authors and share your stories with the World.