Featured Post

Floods in India and Its Control Essay

Nations flooded by a satisfactory stream framework are from numerous points of view favored. These streams help agribusiness, however they g...

Saturday, May 23, 2020

The Slavery Of African Slave Trade - 1039 Words

When we are so caught up in the moment it is hard to see the larger picture. We get excited and momentum starts to speed up, but this excitement and momentum blinds us from the feelings of others. This is exactly what happened with the practiced slavery that took place in Africa. Slavery included stripping humans of their identities and classifying them as property, forcing them to obey their masters. The slaves had no rights and humanity had fled their thinking. Some even claimed slaves to be aliens even though they were not. Slave’s masters could do what ever they pleased with the slaves including, making them do their dirty work, striking them whenever they pleased and abusing their slave sexually. The slave had no defense and responding to any violent act committed against them would amplify aggression causing the master to strike the perpetrator. The idea of someone taking complete control over another equal human makes many sick and today this is viewed as something terr ible, unjust, unethical and corrupt. The African slave trade should not have been something looked to as socially or morally acceptable. It crushed lives by stripping them from their freedom and replacing them with violence, it brought sorrow to families in the separation and destruction process and it brought lose to basic human rights. As humans we tend to get caught up in this daily routine that is not necessarily a bad thing. Some people get caught in this and succeed. But now imagine being inShow MoreRelatedThe Slavery Of The African Slave Trade1280 Words   |  6 PagesBritish slave trading begun in the late sixteenth century and grew remarkably during the seventeenth and eighteenth centuries. As a woman in society, she faced challenges herself; however, she addressed the humanity of slaves as human beings and not by the color of their skin. She believed that â€Å"non whites† were equal to â€Å"whites† and deserved the same human rights. She wrote her famous piece, â€Å"Slavery, a Poem† during the abolitionist movement to persuade others to partake in the anti-slavery campaignRead MoreSlavery And The African Slave Trade1449 Words   |  6 PagesWhen I think of the African slave trade, I realize that over 10 million people were removed from that continent in less than 500 years. Some s cholars believe it may be as large a number as 20 million. I would like to pose a few questions and attempt to answer them in this collection of writings and opinions. The evidence and historical documents will show some of the economic and social impacts the Slave Trade had on the African continent. Slavery has been around for the vast majority of human historyRead MoreAfrican Slavery And The Slave Trade Essay1795 Words   |  8 PagesIntroduction Slavery is the legalized economic activity under which people, especially the natives of a land, are treated as property by colonizers like the Spanish. Slavery was a system that lasted for many years before it was abolished and the Africans as well as the Indians went through a lot of suffering upon the hands of their masters. The slaves were meant to perform duties such as cultivation of the plantations, domestic chores and even mining activities and were on the constant watch ofRead MoreThe European Slave Trade And Intra African Slavery1511 Words   |  7 PagesThe European slave trade and intra-African slavery began with different intentions and goals held in mind. Although, they also shared similar aspects and ideals shown through how they functioned and were run. Intra- African slavery began before the European slave trade came to exist; this unpopular fact shows the beginning of such a gruesome and detrimental act began by the people of Africa, which, later in time, is what fuels and strengthens the European slave trade. African slaves were once capturedRead MoreThe Impact of Slavery on African Society Essay1149 Words   |  5 PagesThe Impact of Slavery on African Society Slavery has played a strong role in African society from as early as prehistoric times, continuing to the modern era. Early slavery within Africa was a common practice in many societies, and was very central to the country’s economy. Beginning around the 7th century, two groups of non-African slave traders significantly altered the traditional African forms of slavery that had been practiced in the past. Native Africans were now being forced to leave theRead MoreSlavery And Its Effects On Slavery1520 Words   |  7 Pages Slavery is a system under which people are treated as property. The people in the time of Renaissance enslaved people to use them as labourers and or do other types of labour. Should that be the reason of our change of knowledge towards slaves and how we perceive them. A slave is a human being or an â€Å"animal† (The Mission) classified as property and who is forced to work for nothing (The Abolition of Slavery Project, October 11, 2014). The word Slavery has a bitter taste flowing off the tongue.Read MoreAfrican American Slavery And The New World Essay1453 Words   |  6 Pagesfortunate which at the time beingbwere africans. These laborers brung unimaginable wealth to empires but were treated as objects and their entire life were in the hands of their buyers. Its not clear exactly how and why something so cruel such as taking someones like and belittling it for labor reasons could have happened for so long. With my class notes and leads from the textbook it seems thst the forces tgat best explain the emergence of african American slavery in the new world colonies of WesternRead MoreLEQ1206 Words   |  5 Pagestime period prior to the development of the Atlantic slave trade and the time period right after its introduction and assess the impact of its emergence. To what extent did African slavery change American society? You may want to consider social, economic, and geographical. Prior to the Atlantic slave trade, the arable land along the South Atlantic seaboard were owned by wealth landowners and farmed primarily by either Native American slaves or white indentured servants. Beginning in the late 16thRead MoreEssay on The Atlantic Slave Trade921 Words   |  4 PagesThe Atlantic Slave Trade The changes in African life during the slave trade era form an important element in the economic and technological development of Africa. Although the Atlantic slave trade had a negative effect on both the economy and technology, it is important to understand that slavery was not a new concept to Africa. In fact, internal slavery existed in Africa for many years. Slaves included war captives, the kidnapped, adulterers, and other criminals and outcasts. HoweverRead MoreEssay on Trans Atlantic Slave Trade1105 Words   |  5 PagesMarch 7, 2006 Trans Atlantic Slave Trade Slavery originated from Africa after the Bantu migrations spread agricultural to all parts of the continent. Africans would buy slaves to enlarge their families and have more power. Also, they would buy slaves in order to sell them to make a profit. It then spread out from Africa to Portugal and was said, it is estimated that during the four and a half centuries of the trans-Atlantic slave trade, Portugal was responsible for transporting

Tuesday, May 12, 2020

The Essential Preparation For Life And Career - 1597 Words

Ancient and medieval authors believed that the seven liberal arts were propaedeutic to the study of all topics and matters. Their belief remains evident in our school systems, as many universities and colleges focus on providing a liberal arts education. In fact, the Dedman College at Southern Methodist University mentions the importance of a liberal arts education in their mission statement, as it is the â€Å"essential preparation for life and career†. The understanding of the seven liberal arts inspires a broader and more focused study of materials often discussed in classes. Five of the seven liberal arts can be directly applied to the study of Rural Matters. An understanding of geometry, arithmetic, and astronomy is essential in gaining a deeper capacity for Rural Matters. Through Isidore of Seville’s Etymologies, we gain the understanding that without logic and grammar we would not be able to appropriately discuss rural matters. Isidore of Seville begins book seventeen of Etymologies, as he normally does, with the author and creator of the topic at hand. Isidore of Seville acknowledges the uncertainty of the creator by listing the different possibilities. According to the Greeks, Hesiod of Boeotia was the first to make skill in writing on rural matters a part of the liberal education. According to the Romans, Cato was the first to treat agriculture, Marcus Terence was the first to refine its study and Vergil exalted it with the skill of his poetry (PAGE). Isidore explainsShow MoreRelatedAnalysis Of The Fiction The Outliers 1629 Words   |  7 Pagesanswering the unit’s essential question: How much of what happens in our lives do we actually control, Gladwell most convincingly answers this question in his nonfiction story, â€Å"The Outliers† through forging his concrete argument through many different sources of credible evidence. On the other hand, in Epstein’s nonfiction text,  "The Sport’s Gene†, taking the opposing side, he answers the question in a less efficient way than Gladwell making his argument on the unit’s essential question less convincingRead MoreShould College Be For College?929 Words   |  4 Pagesinstances; â€Å"are people going to college to gain knowledge or for a good paying job?†, â€Å"with today s technology is a degree essential to ones life?† and â€Å" is school meant for everyone?† Education has a lot of connotations behind it which causes debates. The American society and students should be for college degrees because it expands academic knowledge, global exposure, and career preparation. The first reason is college is a place where people should go to gain knowledge, not just to focus on getting aRead More Child Psychology: A Difficult Career Essay502 Words   |  3 Pagesyou do doctor?† The psychologist’s heart is breaking with every tear shed from the young child’s big eyes. It takes a lot of strength to witness pain such as this. A child psychologist has to go through extensive schooling, mental and emotional preparation, and must have personal dedication. The first step to becoming a child psychologist is extensive schooling. The advanced degree required for success is a Doctorate, or a Ph.D. (meaning Doctor of Philosophy). When one receives this, they mustRead MoreImportance Of Necessary Education1061 Words   |  5 Pagesor university to achieve the necessary education and degree they require to get a job or to build a career. Having a good career is one of the main reasons people spend their time in colleges or universities but there are other reasons as well. The current society and its educational structures are far different than they had been a century back when a self-educated person could gain a good career and parents could arrange private tutors to ensure their children’s education. But in today’s worldRead MoreEngaged Couples Should Be Required to Take Marriage Preparation Classes for One Full Year before Their Wedding1018 Words   |  5 Pagesto family life and the responsibility costs expensive enough. I t may end in health loss, broken destiny, children without a father. This research is devoted to the importance of marriage preparation classes for one full year before wedding. Profession and marriage are often called the most important indicators of living conditions and well-being. But if you can master the profession for several years, preparing for the role of husband and wife over a short time is impossible. Preparation for marriageRead MoreEriksons Psychosocial Theory of Development: Young Adults Essay1494 Words   |  6 Pages This task theory can be examined using the normative crisis model. The knowledge of developmental tasks of the young adult can be beneficial to the nurse especially associated with their ability to relate to the young adult. One of the stages in life is the young adult, which suggests significant changes and an increase of responsibility. This stage of development is described as between twenty and forty years, where ...the potential for furtherance of intellectual, emotional and even physicalRead MoreEffective Preparation For Business Presentation844 Words   |  4 PagesIn the book Effective Preparation for Business Presentation, the author Dr. Jeff Lewis provides excellent guidelines and his personal success tips to prepare business presentations. The book consists of five chapters each building on one another. Dr. Lewis describes details in each chapter focusing on effective communication through presentations. This paper attempts to show the key takeaways from each chapter of the book. The first chapter titled â€Å"Importance of Communicating Well† emphasizes onRead MoreLoss of Humanities Should Not be a Sacrifice of Eduction Essay606 Words   |  3 Pagesconsiderable effect towards humanities we wont be getting the education which is important for us. Humanities offer students to obtain an efficient career thus reducing it will cause less students to take it and unemployment rates will accelerate rapidly. To continue, another disadvantage is that many students wont be qualified to be ready for their vocational life. The article says, At the University of Washington, for example, in recent years, as many as one-quarter of the students found they wereRead MoreHow Should FGCS Belong To The FGS Group?1324 Words   |  6 Pagesimproved early preparation programs improved preparation and increased FGS college participation. Likewise, this study is relevant because FGCS belong to the FGS group. FGCS lack the understanding of how to prepare for, apply to, plan for a degree, navigate college life, or meet college expectations. Although social networking with peer and knowledgeable staff could help FGCS become better informed when making choice concerning higher education, they lack the frame of reference to develop theseRead MoreImportance of Preparation for Sales Management1044 Words   |  5 PagesContents 1. Introduction 2. Key Preparation Issues 2.1 Product knowledge and benefits 2.2 Knowledge of competitors products and benefits 2.3 Sales presentation planning 3. Conclusion 4. References 1. Introduction Benjamin Franklin once said, ‘By failing to prepare, you are preparing to fail.’ This popular saying can be related to many aspects of life, however it can be especially apparent for sales people. Throughout their career, a sales person will rarely experience

Wednesday, May 6, 2020

Qualnet Free Essays

string(59) " packets to Exponential and change the Mean Interval to 0\." QualNet 5. 0 Tutorial (ELEC 6851) Part 1: Installation TODO: I would recommend getting AITS to provide the installation instructions as I’m sure the license restrictions will determine how/where QualNet gets installed. Part 2: The QualNet 5. We will write a custom essay sample on Qualnet or any similar topic only for you Order Now 0 Developer The QualNet Developer IDE is a GUI program for developing network scenarios that comes with QualNet 5. 0. It can be used to visually design network scenarios and then run simulations of these networks. Although networks can be designed and simulated in a command-line fashion as well, we will focus on the Developer IDE package. The first step is to open the Developer IDE program. Depending on the installation procedure, it can be opened via the start menu or by opening the directory where QualNet was installed. Double-click on the â€Å"QualNet Developer 5. 0. 1† icon on the desktop (this option is available only if you chose to install desktop shortcuts during installation). Part 3: Setting Up a Network – Basics The first task is to create a new network scenario. To do this, go to the File Menu -New. Save it in your local folder: File Menu -Save. Choose the local directory where you want to save the scenario. Enter a name for the new scenario (for example, â€Å"Example1†). Click Save. A grid should appear in the right hand window (see Fig 1). This is where we will deploy the nodes and create network connections. The left hand window has four panels: File System, Toolset, Visualization Control and Runtime Analysis (Toolset panel open). 1 Figure 1: A new scenario has just been created. To setup our first network, we will proceed by a simple example of a 15 node wireless network that accesses the channel using the CSMA/CA scheme defined by the 802. 11 protocol. The first step in creating a network is to deploy the nodes. This is done in the right hand window, the so-called Canvas Area. Nodes can be deployed manually according to an arbitrary topology by selecting Toolset - Device - Default (just a generic node), then clicking anywhere on the canvas area. In adhoc networking scenarios it is often assumed that the nodes are deployed randomly on the terrain and we will assume random deployment in this example. To randomly deploy the nodes we go to the Tool menu - Node Placement. The Automatic Node Placement Wizard will open (see Fig. 2). Figure 2: Node placement 2 We then enter the desired number of nodes we would like in our network. Node Placement Strategy: Random. It then asks for a seed value for the random number generator (leave it blank). Click OK. The Placement Wizard will close and the nodes will be deployed randomly on the grid in the Scenario Designer window (see Fig. 3). Location of a node may be changed by left clicking the mouse on the arrow button then left clicking it on the node and dragging it to the desired location. Figure 3: Random node deployment We now want to add these nodes to a wireless network. The first step is to select the nodes we wish to add to the wireless network. To do this we can use the selection tools (arrow or lasso in the View Toolbar). Select all of the nodes by using either of the selection tools and left clicking and dragging the mouse around the nodes. To connect these nodes to a wireless network, select Toolset - Network Components - Wireless Network. Now click anywhere on the area you selected earlier. A cloud should appear on the canvas area representing this wireless network and the nodes should be joined to this cloud with blue lines representing the newly formed wireless connections (see Fig. 4). 3 Figure 4: The nodes connected to the wireless network. Part 3a: Creation of Application Layer Connections After setting up the network, the next step is creation of application layer connections between the nodes. At any time, there may be several connections active simultaneously in the network. Each connection will have a source and a destination node. The source node generates traffic and transmits to a destination node. Let us create a connection between nodes 3 (source) and 4 (destination), Selection of the source node: Left click the mouse over the arrow selection tool and then left click it over the device symbol for node 3, the color of number 3 should turn to red. Next select a traffic source, the available pre-defined applications such as CBR (Constant Bit Rate), VBR (Variable Bit Rate), FTP Generic, VOIP, and Traffic-Gen are listed in the left window under the heading -Applications. We note that Traffic-Gen generates UDP traffic while FTP Generic generates TCP traffic. Let us select the Traffic Generator button mouse over it. by left clicking the – Creation of the connection: Now left click the mouse over node 3, hold, and drag it to node 4. When the mouse is released over node 4, a green arrow pointing from node 3 to node 4 will appear. This creates a basic Traffic Generation application between the nodes 3 and 4 as source and destination respectively. The next step is to choose the parameter values of this connection: Let us create a Poisson process of data packets at the source and make the packet length exponentially distributed. To do this, click Table View on the bottom of the right window, and select the Application tab. You should see the connection Traffic-Gen 3-4 listed. Double click the connection. A window of Traffic Generator Properties will show up (Fig. 5). Click on the 4 – Packet Size. Recall, we want the packet lengths to be exponentially distributed with mean packet length 2048 bytes. The default size is deterministically set to 512 bytes. Change the Data Size from Deterministic to Exponential. Then change the Mean Size to 2048 bytes. To make the source generate traffic according to a Poisson process, click on Interval from the Traffic Type menu for this connection. By default traffic is generated deterministically every 1 second. Change the distribution of the interval between successive packets to Exponential and change the Mean Interval to 0. You read "Qualnet" in category "Papers" seconds (recall that the inter-arrival times for a Poisson process are exponentially distributed). As well, set the Start Time of the connection to Exponential with mean 0. 5 seconds, and the Duration to Deterministic with fixed duration of 30 seconds. These steps have been summarized below, 1. Click on Packet Size Distribution. (The packet lengths are exponentially distributed with mean packet length 2048 bytes. ) Change the Data Size from Deterministic to Exponential. Then change the Mean Size to 2048 bytes. 2. Click on Packet Interval Distribution. The source generates traffic according to a Poisson process. ) Change the distribution of the interval between successive packets to Exponential and change the Mean Interval to 0. 5 seconds. 3. Click on Start Time Distribution Change the distribution to Exponential with mean 0. 5 seconds. 4. Click on Duration Distribution to Deterministic with fixed duration of 30 seconds. – – – Figure 5 Traffic Generator Properties 5 A wireless network with multiple connections is shown in Fig. 6. Figure 6 A wireless network with multiple connections Part 3b: MAC Protocol The default settings of the MAC protocol can be viewed by clicking on Table View in the bottom panel below the canvas. Click the network tab and double click Wireless Subnet (see Fig. 7). MAC 6 protocol determines how the nodes access to the physical channel to transmit their packets. We note that the default MAC protocol is 802. 11 standard. This standard has two modes of operations known as Distributed Coordination Function (DCF) and Point Coordination Function (PCF). The DCF is more popular in practice and based on the random access mechanism. Briefly, DCF function as follows, (see section 6. 10. 3 in the textbook for the description of this MAC protocol), DCF uses the CSMA protocol, thus a node, with a packet to transmit, first has to sense the channel. If the channel is busy the node backs off for a random amount of time. We note that the channel may be idle at the source but not at the destination node. If the source node senses the channel idle, it transmits a short request to send (RTS) packet. If the channel is also idle at the destination node and it receives the RTS packet then replies with clear to send (CTS) packet. After that the source transmits the data packet and destination node replies with an ACK packet if the packet is received error free which completes the transmission of the packet. If the source node does not receive the CTS packet or an ACK following the transmission of the data packet then it backs off for a random amount of time. A source node may retransmit an unsuccessful packet upto a transmission limit, when that limit is passed then the packet is discarded ( for values of these limits see Fig. 7). – The routing protocol is Bellman-Ford (a Distance Vector routing algorithm). The default settings of the OSI layers can be modified here according to the requirements of the network. As well, the default settings of an individual node can be viewed by clicking the Nodes tab and double clicking each node. The nodes update their routing tables regularly by exchanging routing packets. We not that in a single wireless subnetwork all the nodes are one hop away from each other, thus there is no routing, but nevertheless nodes will send routing packets regularly. It is worthwhile to spend a few minutes navigating through the menus to learn where to go in order to view or modify parameters in our network scenario. We can right-click the nodes or wireless network in the canvas area. 7 Figure 7 Properties of the MAC Protocol . Part 3c. Wireless channel with Fading We may include fading in the wireless channel by choosing the Scenario Properties button on the left side of the window and then selecting the Channel Properties tab in the new window. (see Fig. 9). In the Channel Properties window go to the row which says Fading Model [0] and click on where it says None. From the drop out menu choose Fading. Then go to the row which says Specify Gaussian Component File, click where it says No and change it to Yes. After this step is taken, a new menu item is open with the name Gaussian Component File, then fill that tab with the following entry, C:/snt/qualnet/5. 0/scenarios/default/default. fading Failure to provide this link will give the following error. â€Å"Error: Error in file .. librarieswirelesssrcpropagation. cpp:3933 PROPAGATION-FADING-GAUSSIAN-COMPONENTS-FILE is missing† 8 Figure 8. Incorporation of fading to the simulation Part 4: Running Simulation The next step is to run simulation of our network. One useful feature of the QualNet Developer package is the ability to trace packets. To enable packet tracing, go to Scenario Properties in the left hand window, select Statistics and Tracing tab, click Packet Tracing in the left window, select Enabled Packet Tracing, click where it says No and change it to Yes. See Fig. 9. 9 Figure 9 Enabling packet tracing. On the Run Toolbar, there are a set of icons related to simulation which include an Open Current Scenario in File Editor, a Run Settings, a Run Simulation and Record Animation Trace. To initialize the scenario, click on the Run Simulation icon . The mode of the Architect will be changed from Design Mode to Visualize Mode. To switch back to Design Mode, click Switch to Design Mode . The Visualization Controls panel opens in the left window. You should see the coordinates icon of the nodes and the current simulation time (which is 0. 0000 seconds) in the output window. Before running the simulation, we note that the Developer package will by default animate various aspects of the simulation such as packet receptions, packet drops and collisions, and unicast and multicast transmissions. Others aspects such as packet queue animation can be enabled by clicking on the button in the Animation Filters which should appear in the left hand window. Enable the radio range animation. Simulation will tend to run very fast so if we wish to see the animation it will help to slow down the speed of the animation. This is done by sliding the speed bar to about half way in the Animator window. See Fig10. 10 Figure 10 Initialization and animation settings for simulation The total simulation time can be changed by switching back to the Design Mode, click the Scenario Properties button on the left window, and select the General tab. The Simulation Time is set to 30 seconds by default. We will leave this at its default value for now. We run the simulator by clicking the Play button (Fig. 11). on the menu bar. You should see the simulation animations as the simulator runs Figure 11 Simulation animation during a run. 11 You can enable or disable the different animations while the simulation runs. Wait until the simulation completes. Part 5. Routing of the traffic between subnetworks. We need to have a router for to be able to route the traffic from one wireless subnetwork to another. The router will have two network interfaces each one being member of a one subnetwork. We can create a router as an ordinary node which belongs to both subnetworks. Thus the router node is selected among the nodes belonging to that subnetwork when each subnetwork is created ( see Fig. 12). 12 Figure 12 The two subnetworks communicate through the router node [2] Next we will configure node 2 as a router. For this click on the Table view, then on the Node button, then double click on the row for node 2 and click on the Node Configuration button in the window that opens. Then click on the router properties on the left hand window which displays Fig. 13. Fig. 3 Node configuration window In the Node Configuration window in the row for Type of Router click on the arrow for the value User Specified and from the opening menu choose Predefined. Then in the row for Router Type choose the value Generic. Finally choosing Apply button at the bottom of the window configures node 2 as a router ( see Fig. 14) 13 Fig. 14 Node 2 has been configured as a router Part 6. Simulation Statist ics 14 After the simulation has been completed, we can view the data collected during the simulation. To view the statistics of the simulation, click on he Analyze Statistics icon toolbar. in the Components 1- Statistics File If you click on the Statistics File button at the bottom of the window, you will see large amount of per node simulation data. Among the collected statistics we see, – The packets generated by the source nodes and received by the destination nodes are listed as unicast packets. In a connection not all the generated packets may be successfully delivered to the destination. As explained, in Part 3b. a packet will be discarded by the source as a result of reaching the number of retransmissions’ limit. Transmissions may not be successful because of destination node not sending a CTS packet or as a result of the bit errors in the received packet. We note that the bit errors will depend on the distance between source and destination nodes, fading and shadowing. The strength of the received signal which will decrease as the distance between the source and destination nodes increases. As a result of packet discarding, the throughput of the source and destination nodes in a connection may not be same. – If the distance between two nodes is higher than the node’s transmission range, then, these nodes are not aware of each other. They can not communicate with each other and they will not know each other’s IP addresses. Therefore, if two such nodes will exchange data traffic with each other, the packets will be generated by the Application layer of the source node but they will not be passed to the transport and then to the network layers because the IP address of the destination node is unknown. – In addition to unicast traffic packets, as may be seen there are other packets being transmitted in the network , RTS, CTS, ACK and Broadcasting packets for routing. For each successfully received unicast packet there will be a corresponding ACK path. The number of RTS and CTS packets will correspond to the total number of transmissions of a packet until it is successfully transmitted. 2- Graph Analyzer Window If you click on the Overview button at the bottom of the window, then we can navigate through the Physical, MAC, Network, Transport, and Application layers shown on left hand window. We can access to each layer data by clicking on the button for that layer at the bottom of left hand window. This results in opening of a menu for that layer in the left hand window. Then clicking on any of the menu items displays a submenu. Clicking on any submenu item displays a bar chart for the data collected for that item during the simulation. In Fig. 15 we are ready to view the data collected in the application layer. 15 Fig. 15 Viewing the data collected during the simulation. In Fig. 15, when we click on the Traffic-Gen Client button on the left hand window, then from the drop out menu we click on the data units sent. This results in Fig. 16 which shows the bart charts for the total number of packets generated at the application layer of each node. 16 Fig. 16 Traffic generated at the application layer of each node 17 How to cite Qualnet, Papers

Saturday, May 2, 2020

Project Management In Product Development -Myassignmenthelp.Com

Question: Discuss About The Project Management In Product Development? Answer: Introducation Globex formerly B T Sons Farming Equipment established RALS (Riviera Agriculture and Lifestyle Show) in 2000; a three day event held in November every year. The event requires that attendees pay for tickets at the entrance which re checked and then allowed to proceed to attend the event. The event relies heavily on trained volunteers. The main problem being faced is managing ticketing at the entrance especially on opening days when there are many people attending the event; what happens is that the ticketing system is manual and at peak human traffic, some people are able to slip in because they cannot wait for too long. Further, the volunteers are usually overwhelmed; this slows down the business process of issuing tickets while making it almost impossible for the staff to ascertain the number of tickets given out and he number of people that attended. Furthermore, the volunteers needed for the exercise are also many. What is required is a system in which people can purchase tickets earlier before attending the event and have a system where they can have the number of tickets purchased and redeemed automatically updated so they know the number of people attending through bar code scanning and the computer system. It is assumed that the people know how to use the system (are computer literate) and that the system will work at least 96% of the time in a given 365 day period. It is also assumed that the system will be fully accurate and enabling infrastructure (Internet and networks) will also work, along with the automatic bar code scanners. It is also assumed that the attendees will have some access to a mobile device or computer to make the purchases on-line/through the web or at least be able to access some of the ticketing outlets where they can buy printed tickets. Another assumption is that for those buying the tickets online, they have a way to print them or at least have an application that will enable digital bar code scanning of their e-tickets. Business Purpose, Need and Significance This project is needed to help the organizers of the RALS to make the process of accessing the venue by customers easy and seamless; this will reduce over crowding at the gate/ entrance. The system will also lead to increased sales as few people will manage to slip through without paying for tickets, especially when there are crowds during opening days or at peak times. The system will enable potential attendees to purchase the tickets on-line and at their convenience and print them out or use electronic means to sign out. This will also lower costs, including the need for fewer volunteers and to help with administration and planning as the organizers will be able to ascertain the number of tickets sold and redeemed and people that attended. This will also ensure accurate accounting. The idea of the system is driven by the need for greater accountability, the need to have accurate metrics on ticket sales and attendees, and to improve the experience of attendees through easy and seamless entry, even during peak times and on the opening day. The system should be easy to use by customers, quick transaction processing, give real time updates and reports, and be able tp perform without lags even during high demand. The system should also be compatible with different browsers and operating platforms, and have the same functionality and appearance whether accessed using mobiles, tablets, or computers. The system should have resilience so that even in the event of a disaster or during backups, business processes will still continue and full operations can be restored within a short period of time. The system should also be easy to maintain and allow people to be given specific access rights to prevent abuse. If there is a wrong operation committed either by buyers or internal users, the system must highlight this and enable the user to repeat the process again, with help options available. These will be the guiding objectives for this project Benefits and Costs The system should reduce delays during entry, make the process of ticketing easy and seamless, and enable accounting and report generation by authorized users. The system will increase ticket sales and reduce operational costs while giving visitors a better experience and the organizers an easy time in planning and managing the project. The system will have various costs, including costs of making surveys and capturing user requirements, the purchase of hardware and other software, development and labor costs, costs for hiring cloud backup services, and maintenance and management costs. These costs are summarized in the table below; Item Cost in $ Initial survey and logistics costs, including user documentation 500 Cloud service provider costs 600 per month Purchase of turnstiles (8) each at 600 6000 Development costs (labor) 45000 Barcode scanners 3000 Hardware (Computers and power backups) 9000 Cables and networking 3000 Labor costs 2500 Maintenance costs 4000 Other incidentals and caution money 5000 Total 80000 Methodology The system will be developed using the agile project management methodology known as scrum; scrum. It is a lightweight method in which a project is undertaken and delivered incrementally in sprints, with each sprint supposed to end with a minimum shippable product that can perform the envisaged tasks as captured in the user requirements (Schwaber, 2015). Changes can be made along the way, but the delivery deadline and budget does not change. This method would be highly suitable for this project because it ensures the final product is table and works according to client needs. Its an approach that also enables new user requirements to be identified as the system is developed and testing and a system can be delivered in a far shorter period and with a lower budget than other traditional software delivery methods (Mike, 2010), (Pham Pham, 2016). The figure below shows the agile scrum framework; Source- (Innolution 2017) Team Project Charter Skills and Knowledge Inventory Skills Leadership and organizing skills Knowledge of product and customer needs Technical skills for testing Conflict resolution skills Team management skills Reporting skills Testing skills (technical) Communications skills Programming skills in JAVA and C++ Programming skills in Python Database development skills and Perl Knowledge of All forms of SQL Knowledge of No-Databse database system Web development skills including HTML and HTML 5 skills Training and support skills Business process skills Networking skills Purchasing and negotiation skills Cloud operations and backup skills RAID skills Networking skills Software testing skills Programming skills in Python, Perl, JAVA Knowledge of Linux testing and penetration skills Roles and Responsibilities Team Member Roles and Responsibility Shaik Ahmed Bin Taher Accurately capturing the needs of the client Testing products to ensure the user needs are well captured Communicating the user needs and any other needs effectively to the team Overall leadership for the project Liaising with the client on behalf of the team and giving progress reports Developing the backlog and budget Rafa Afr Will record all minutes of meetings and document them Plan, organize, and chair regular team meetings Ensure all team members are working seamlessly Risk management for the entire project Documentation Communication with all team members Developing Communication Plan Team member Developing the web interface scripts for performing various actions including capturing user details Developing the pay processing system and the cart system Developing the help system (online) Team member Software application development to include reporting and user access rights Testing of the system Developing interoperability with other systems and softwares Team member Development of the database and relationships between database items Testing the database Future updating of the database Developing Queries Developing web interface scripts using Perl for user querying Team member Will be responsible for developing the web interface and website for the system developing UX diagrams for the web interface and back end web access Using of HCI rules in web development Team member Developing the business processes that will operationalize the system Ensuring the developed system captures business processes effectively Training the client and users on how to use the system Developing help documentation for users Team member Purchasing and acquiring the necessary software and hardware components testing purchased equipment and ensuring they meet needs of the system and the user needs Team member Installing the system instances on the cloud Installation of system in private cloud Setting up cloud and off site backup Setting up redundancy using suitable RAID architecture Setting up business process continuity negotiating cloud service provider SLAs Team member Developing the networks and networking Ensuring system works seamlessly from any access point Team member Ensures the software performs as required (performance metrics) Notifies other team members of any issues Identifies bugs and fixes them in the software Develops software patches and updates Ensures the system is secure and any security loopholes are fixed Performs penetration testing for the system Based on scrum framework (Pham Pham, 2016) Team Communications The team will meet at least three times before the commencement of the project; the fist two meetings will happen at the client location when soliciting user needs and understanding the requirements of the user. The third meeting will be at the project office where team oles will be discussed and given; this meeting will also be used to ensure all team members understand the project requirements clearly and what is required for the project. The fourth meeting will be plan the course of action and what should be delivered at what time. After that, the team will meet daily in the morning during stand up meetings that will take an hour or less at the project office and also after every sprint is done to evaluate the work done and have a sprint retrospective. At the end of the project, there will be two meetings, one with the client during handover and another for team members during the scrum retrospective meting where documentation will be done. At the end of every sprint, the team wil l meet with the client or the client representative and test the developed system (so far) and capture any issues to be corrected along with with any other new user requirements to be incorporated. The agile framework requires effective communications and frequent meetings (Aguanno, 2005)The team will continue to communicate while developing the system be e-mail and telephone, as well as through the project management system interface and the digital scrum wall so everyone is up to date on the meeting. The meetings are summarized below; Meeting Location Purpose Date and Time Meeting 1 Client premises Familiarize with user needs and know requirements Meeting 2 Client premises In depth capture of user needs Meeting 3 Project Office Sprint planning meeting Understanding and sharing roles and responsibilities Meting 4 Project Office Knowing the work and work schedule Meeting five Project Office Daily scrum meeting 7.00 am to 8.00 am Meeting Six Project Office Daily scrum meeting 7.00 am to 8.00 am Meeting Seven Project Office Daily scrum meeting 7.00 am to 8.00 am Meting Eight Project Office Daily scrum meeting 7.00 am to 8.00 am Meeting Nine Project Office Daily scrum meeting 7.00 am to 8.00 am Meeting fifteen Client premises Testing at the end of first sprint Meeting sixteen Project Office Sprint Retrospective Sprint meetings (daily start again until the next testing phase with client Meeting x Client premises Testing at the end of sprint Meeting X Project Office Sprint Retrospective Cycles continue until the software is ready and is being handed over to client Scrum review meeting Project Office Evaluate entire project, lessons learned, documentation During meetings, Rafa Afr will chair all the meetings and each member will be free to speak or make comments; Rafa will do the documentation for the meeting and update these on the digital scrum board as well as on the physical scrum board. Each member will be given time to present what they did during the daily sprint meetings as well as any challenges they faced. Rafa will document these and post them on the project management system board for all members to see and make comments. Further communication will take place on-line through the project management system software and through e-mail and group chat platforms. Members can also communicate through mobile phones, although these are not recorded. The on-line project management system will enable each member to access resources such as sprint backlogs and the digital scrum board as well as minutes of past meetings. The physical scrum board will be located at the project office and be accessible by anyone during meetings; Taher wi ll update th scrum board so every member can see the progress of the entire team. Team Rules and Expectations The team rules have been developed due to a past experience where team members did not attend enough meetings and there were arguments that slowed down progress Team Rules and Expectations The team members are encouraged to express their feelings and opinions freely Team members must contribute during meetings No aggressive or abusive language during meetings Disagreements are allowed, but an amicable solution must be reached either through a vote or under the direction of Rafa All meeting minutes must be communicated to all team members by Rafa Communication will be official through e-mail, project system, or verbally and recorded All team members must attend 90% of the daily sprint meetings in person All team members must visit the physical/ or digital scrum board at least one daily Team values Commitment Communication Respect Code of Ethics No arguments or fights No abusive language Being bound by team decisions even if in disagreement Attending at least 90% of meetings on time (lateness will not be tolerated) Avoiding disruptions during meetings such as receiving and making personal calls Team Signatures Learning cycle Meetings All meetings must be attended in person frequent meetings help the team bond and know progress (what has been done and what needs to be done) Client needs These must be captured and can be updated as testing is done Delivery System will be developed and delivered incrementally Roles Team roes are complementary (inter dependence) Framework Effective project delivery must be structured and use a suitable methodology and follow its rules and tasks (the team chose to use the scrum agile method) Communication An effective communication plan is essential in project success Constraints Time and budgets ae constant constraints and this should be managed based on the work breakdown structure and project schedule Planning Prior planning and updates to plan helps team keep focused Communication Planning This was developed during the fourth meeting at the project office where stakeholders were identified and a plan on how to communicate with them developed. The communication plan is based on the stakeholder role and influence in the project Title Role Influence Communication method/ channel Interest in project Frequency Globex CEO Executive sponsor Very High Face to face E-mail telephone Reports and memos Very high Fortnightly Globex Executive In Charge of LARS Business sponsor Very High Face to face E-mail telephone Reports and memos Very high Weekly Globex Team Advisory team High Face to face E-mail telephone High Monthly Globex Staff Users Low Face to face High Fortnightly Members of public People that attend LARS events and will use system Low Face to face E-mil Medium Fortnightly Reflection Managing projects can be very challenging, especially given that one will be working with teams of diverse behaviors and personalities. Using a structured approach will help make the process of managing projects easy, especially when undertaking the role of the leader. From this project, I learned that even when one is the overall leader or has substantial leadership responsibilities, the rest of the team members are also leaders in their own little way. I discovered this, luckily in the second meeting and it was helpful in getting the team members to define their roles and give ideas on how the entire project would succeed and what needed to be done to achieve the project objectives and project success. Further, the leader, as I learned, gives direction and overall vision; the team members will give the road signs and speed at which the destination will be arrived at (meeting objective). The ability for effective communication is crucial for the leader, and different situations requ ire different leadership skills and styles. The leader must have integrity and enthusiasm, while also showing empathy if a team member is lagging behind. The lead must lead by example, being at the meeting earliest and being the last to leave, while dealing with individual concerns (Ellis, 2016). To perform these roles, a leader requires a set of both soft and hard/ technical skills; I needed to have technical skills for testing software to ensure it works well under different conditions. The leader must also clearly understand the client requirements, better than everyone else and effectively communicate these to the team members. The leader must know different project management methodologies, and the way it is used, knowing the methods is not enough, the practices must also be well known. The leader must know how to deal with conflict and disagreements and inspire the team forward (Flanners levin, 2005); in summary, a leader requires technical IT skills, soft skills, and practical project management skills References Aguanno, K. (2005). Managing agile Projects: [the project management essentials library]. Lakefield: Multi-Media Publications. Ellis, G. (2016). Project management in product development: Leadership skills and management techniques to deliver great products. Oxford : Butterworth-Heinemann. Flannes, S. W., Levin, G. (2005). Essential people skills for project managers. Vienna, VA: ManagementConcepts. Mike, C. (2010). Succeeding with Agile: Software Development using Scrum. Pearson India. Pham, A. T., Pham, D. K. (2016). Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Implementation: An Action Guide for Business and IT Leaders. Boca Raton: CRC Press. Schwaber, K. (2015). Agile project management with scrum. Redmond: Microsoft.