Critically reflect on current project management ethics

Assignment Help Computer Networking
Reference no: EM131993507 , Length:

Network Project Management Assignment

Purpose of the assessment (with ULO Mapping) - The purpose of this assignment is to develop a well-researched project planning document based on the overall parameters of a networking related project, establish an appropriate project management plan, and quality environment required to complete the chosen project. Furthermore, analyse project issues, conduct post-project review (i.e., lessons learned) and make recommendations for improvements for future projects. It addresses the following learning outcomes:

  • demonstrate project leadership skills; identify and assess risk in designing, executing a major project;
  • critically reflect on current project management ethics, research, and theory and practice;
  • lead and manage projects effectively through planning, leadership, monitoring, teamwork, and global awareness;

Purpose of the Assessment -

The purpose of this assignment is to develop a well-researched project planning document based on the overall parameters of a networking related project, establish an appropriate project management plan, and quality environment required to complete the chosen project. Furthermore, analyse project issues, conduct post-project review (i.e., lessons learned) and make recommendations for improvements for future projects.

In this assessment task, you will present a proposal for the major project assignment as a team of 3-4 members. Proposal template is available on Moodle. The project must be selected from the networking or the telecommunication area.

The project duration should not be less than 12 Months. Before starting, seek approval for the proposed project from your laboratory tutor. Address all stages of Project Management as outlined in the unit. A suitable project management software (e.g. MS Project 2010 /2016) must be used.

Assignment Description -

The project report should include all phases of a project life cycle, i.e. Initiating, Planning, Executing and Closing. Project Management Plan helps the management team to maintain a constant focus towards delivering the project in accordance with the customer needs and expectations.

The development of such a plan begins with the business case (refined from the Project Charter), project objectives and goals, success criteria, scope, high-level schedule, stakeholder expectations, communication plan, benefits and costs, governance and resourcing, management approach, risk management plan, and potential ethical issues.

The project documents ensure a consistent understanding of the project, help to set expectations, and identify resources necessary to move the project to the next level of detailed planning. Every project must be delivered in a manner that captures the user's trust and confidence in the chosen projects ability to effectively and efficiently deliver quality services/products. In order to ensure project success, it is imperative that good project management principles are used early in the planning stages. As the project becomes more defined, the Project Management Plan becomes the tool by which the project is managed effectively.

Students should include all aspects of the project as if they were the Project Manager and it is a requirement of the subject that they include the use of software (e.g. Microsoft Project). Students are expected to show evidence of self-directed reading and research using credible resources including, but not limited to their prescribed text. The assignment will be marked on the basis of depth of analysis, research, references and integration of all aspects of project management.

Assessment will be on the basis of the realistic nature of the project and how well it is presented. You should present the final document in a form that would be consistent with the details of your chosen project, and written in Business English in a report format. Make sure that the timeline, the budget and the quality of the work is realistic, justifiable and sufficiently attractive to win a tender for a real project.

Requirements: Form a team of 3-4 members and work co-operatively to complete the chosen project. The project report must cover at least the following aspects:

A clear outline of the project including title, start and end date, goals and objectives, etc.

Project requirements (both functional and non-functional)

Project team members (title, skills/expertise, not names!)

Project plan, including:

  • Project scope
  • Work Breakdown Structure (WBS)
  • Estimated time-line
  • Resource needs
  • Gantt Chart and Network Diagram
  • Estimated cost
  • Quality plan
  • Stakeholder analysis
  • Communications plan
  • Risks management plan
  • Ethical issues analysis
  • Project deployment plan

Crash the total project duration by 2 weeks.

Use software (e.g. Microsoft Project) to complete WBS, allocate time and resources, apply cost, and prepare Gantt chart and Network Diagram.

Project Signoff (on a separate page)

Post project review and recommendations.

Sections to be included in the report -

Section-1: Executive summary, introduction, logical structure and conclusion

Executive summary, table of contents, introduction, logical flow of information and conclusion for the major project. The project should use a meaningful project title and a reasonable time period of 12 months or more.

Section-2: Project scope and project requirements. Project crashing.

Well focused project Scope, WBS, estimation of Time, Cost, Quality key stakeholder s' roles and responsibilities including project team. List of functional and non-functional requirements. Method for crashing the project time by 2 weeks.

Section-3: Project stakeholders, communications, risk management plan, and ethical issues.

Stakeholder analysis, communication matrix, risk matrix, and ethical issues.

Section-4: Project Management software outputs

The demonstration of scheduling, resourcing, and costing of different activities and tasks using a Project Management software. Required charts/graphs (Gantt chart, Network diagram, etc.) as extracted from the software.

Section-5: Project Deployment plan

Description of project deployment plan.

Section-6: Project signoff, project review and recommendations

Project signoff letter, post-project review and recommendations.

Section-7: Reference and appendices IEEE.

Attachment:- Assignment Files.rar

Verified Expert

In this assignment is to develop a researched project planning document based on the overall parameters of a networking related project, establish an appropriate project management plan, and quality environment required to complete the chosen project.

Reference no: EM131993507

Questions Cloud

Summarize the industrial hygiene sampling procedures : Summarize the industrial hygiene sampling procedures that were used in the study to evaluate a chemical hazard.
Relationship between wealth and talent to be compelling : Do you find Walzer's analysis of the relationship between wealth and talent to be compelling? Why or why not?
Calculate for fitzgerald pharmaceutical industries : Amy Dyken, controller at Fitzgerald Pharmaceutical Industries, a public company, calculate the following for Fitzgerald Pharmaceutical Industries.
Differences between workplace policy and title ix : What is the title of the harassment policy at your workplace? What are some of the similarities and differences between your workplace policy and Title IX?
Critically reflect on current project management ethics : MN601 Network Project Management Assignment. MELBOURNE INSTITUTE OF TECHNOLOGY. Critically reflect on current project management ethics and research
Risk reduction and bystander intervention tips in mind : What are some times in your lives when you feel you should keep the Risk Reduction and Bystander Intervention Tips in mind?
Define your chosen public health issue : A lot of thought goes into the grant application process before the actual decision is made to pursue the submission of a grant.
Determine weighted-average number of shares outstanding : Determine the weighted-average number of shares outstanding as of December 31, 2015.
Importance of sexual education : While infant mortality rates have dropped over the last three decades, the U.S. is still only ranked 27th among leading nations.

Reviews

len1993507

5/23/2018 5:33:52 AM

Total 1850 words, project must be related to computer network or telecommunication area fill out that template as well. Reference – IEEE. Level- POST graduate. Submission Guidelines - All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len1993507

5/23/2018 5:33:46 AM

Submission guidelines: The report should have a consistent, professional, and well-organized appearance. Create the report (Minimum 1800 Words) showing extensive use of MS Project. The report should include the following: A cover page listing students name and ID, tutor name, and Assignment-2 as title. The assignment must use 1.5 spacing, 11-pt Calibri (Body) font with appropriate section headings.

len1993507

5/23/2018 5:33:40 AM

The report must include all sections listed in the Marking Criteria, with appropriate heading and sub-headings to create a well-presented and readable repot. Reference sources (IEEE style) must be cited in the text of the report, and listed appropriately at the end in a reference list. The assignment must be submitted as a soft (electronic) copy under Moodle. The page number must appear on each page. All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated. Topics are relevant and soundly analysed.

Write a Review

Computer Networking Questions & Answers

  Document risk event-impact-probability and impact

Identify the top three risks in this situation. For each risk, document its risk event, impact, probability, impact rating/risk exposure, and mitigation strategy.

  Current network environment and services

You were hired as the manager for network services at a medium-sized firm. This firm has 3 offices in 3 American cities. Recently, the firm upgraded its network environment to an infrastructure that supports converged solutions

  Explain the primary principle of device failure protection

What are the most common security threats? What are the most critical? Why?- Explain the primary principle of device failure protection.

  Technical recommendation for addressing the security

Describe your technical recommendation for addressing the security requirements in the overall technical design of the ABC Healthcare network. This should include both internal and external (untrusted and trusted) aspects. Untrusted would include ..

  Is snort anomaly-based or signature-based

Is Snort an HIDS or an NIDS, how many sensors does Snort use and what does a preprocessor do?

  What is the terminal console password for lan

What is the terminal console password for LAN Switch 1 and LAN Switch 2?

  Describe the function and purpose of each component

Review the list of components The following list contains components you would find in both a wired and a wireless network.

  Find three standards developed by ansi

Research and find three standards developed by ANSI. EIA has developed some standards for interfaces. Research and find two of these standards. What is EIA 232?

  Compute the bitwise or of two binary input strings

Construct a finite-state machine that will compute the bitwise AND of two binary input strings. b. Write the output for the input sequence consisting.

  Differences in source code size and object code size

Compare the version of OSPF available under 4BSD UNIX to the version of RIP for the same system. What are the differences in source code size, Object code size.

  Effects of cryptographic tunneling

Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model

  A subnetted or hierarchical backbone can also be called

A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd