Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Released Plan and a Maintenance Plan, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Introduction
The document is based on a released plan and a maintenance plan. The release plan includes the release item information, priority, justification and scope of the release item, scheduling and reason for release, end date of the release product, groups that are affected by the release process, release method, risk assessment, communication, training and documentation. The maintenance plan includes the description of the system, progress or status of the system, system support, system maintenance and level of support required along with time duration.
Release Item
“Secure Wireless Network Access”
Priority
The priority is selected from the options i.e. minor or major. In the current scenario, it is a major release.
Description and Scope of Release
However, the organization is currently securing its wireless network by wired equivalence privacy (WEP). There is a requirement of configuring WEP version 2 and WPA within the wireless network along with installation of spyware and firewall. The security framework will secure the organizations wireless network
Release Schedule
The release schedule not assigned yet.
Release End Date
The release end data is not assigned yet.
Target groups affected by Release
End Users
In order to incorporate wireless security framework, employees using the wireless network will encounter service outage, as the wireless access points will not be operational. The encryption techniques including WEP version 2 and WPA will be configured on wireless routers and access points. In order to prevent service outage, network support staff can configure the wireless devices one by one, as this approach will minimize the downtime for some department requiring wireless connectivity.
IT Support Staff
“While ITS will provide support for the backend infrastructure and will also provide desktop support to administrative and other groups under an SLA, first-level troubleshooting and desktop support for this service will be provided to specific departments by their respective IT support groups. Should a group or division in an organization do not have a local IT Support Group, Service Desk (ITS) will provide over the phone/email first-level support and installation guide” (ITS Release Management Plan Template. (n.d.))
IT Support Staff
The support groups that will facilitate the release plan are as follows:
- Client Communications will be responsible for maintaining the wireless network security information in white pages for the organization.
- Enterprise Workstation Services are responsible for issues related to desktop support and executive support for wireless network connectivity issues.
- Network Infrastructure Services is responsible for issues related to second-level support and encryption services.
- Shared Systems ensures adequate maintenance and running of the wireless encryption services on server along with its operating system.
- Support or helpdesk ensures appropriate incident management, wireless network connectivity service request.
- Production Facilities is responsible for examining wireless encryption services and notify to concerns, if any issue arises.
Release Contingency Plan
The wireless network security services will incorporate encryption services, DHCP services and WPA services. These services are configured on wireless network security server. One more consideration includes the operating system functionality, as these services will become non-functional in the case of an operating system failure. Moreover, if the server or operating system malfunctions, the services will be stopped. This will be a major drawback as the wireless network will become vulnerable to hackers, viruses and spywares. There is a requirement of mirroring these services on a separate server. Likewise, a dedicated support team is required to handle and monitor the instances of these services on both the systems i.e. primary server and secondary server.
Communication
A monitoring interface is required that will highlight and notify all issues related to the wireless network security services. Moreover, SNMP configuration can facilitate the network and support team to maintain uptime of network components, systems and services in an orderly manner. As per network dictionary, SNMP is defined as “Simple Network Management Protocol (SNMP) is the standard protocol developed to manage nodes (servers, workstations, routers, switches and hubs, etc.) on an IP network. SNMP enables network administrators to manage network performance, find, solve network problems and plan for network growth”. Likewise, managers and support groups will communicate with each other via emails.
Training
In order to train wireless network users, a self-troubleshooting guide will be published to the organization’s intranet. Documentation will illustrate the methods of establishing a secure wireless connectivity. Moreover, configuring a password or modifying old password for wireless connection is also demonstrated in the troubleshooting guide. It is observed that minor training is required to connect laptops or establishing wireless connection. However, certain credentials are required in order to gain access to the Internet. Likewise, as per policy, only limited users are granted Internet access, depending on the nature of work. However, if any user is unable to establish wireless connectivity, IT groups will facilitate users on phone, emails, or via visit. The troubleshooting guide is available for download from the organization’s intranet website.
Documentation
Documentation is a critical part of the release plan. However, the troubleshooting guide is available for download from the intranet; additional information is also available for novice users. The following information is published on the organization’s website:
- Recommended Wireless Ethernet models
- FAQ for connecting the wireless network
- Installation and download guide for accessing the Internet on the wireless network.
- Systematic power point presentation for connecting and securing the wireless network
- Guide for Manual IP assignment, in case of DHCP failure. Guide includes, IP addresses, Gateway and subnet mask.
The support staff and end users approach the Intranet in case of any assistance in terms of configuration and administrative guides, as intranet is the central source of all the guides and troubleshooting related to wireless networks.
Maintenance Plan
System
The network security architecture will provide enhanced security for the organization’s wireless network. In order to incorporate skills that are required for implementing the maintenance plan, network support engineers and system administrators are vital. Moreover, the concerned managers will handle management issues related to the system. The system will incorporate several services that will provide enhanced security of the wireless network of an organization. Encryption and security technologies including WPA, WEP version 2 and SNMP will facilitate enhanced security. “WEP uses passwords that are entered manually at both ends (see preshared keys). Using the RC4 encryption algorithm, WEP originally specified a 40-bit key, but was later boosted to 104 bits. Combined with a 24-bit initialization vector, WEP is often touted as having a 128-bit key. See WPA, 802.11i and initialization vector.” (WEP definition from PC magazine encyclopedia) moreover, WPA utilizes a new key hierarchy that constructs new encryption keys. These encryptions keys are unique, as the end users will generate a new key each time they connect to the wireless network. Likewise, protocols that are incorporated during this process are 802.1x, RADIUS and EAP, in order to provide enhanced security (Edney & Arbaugh, 2004). The support and administrative staff will configure wireless routers, wireless access points and servers running services related to wireless network security and encryption. However, the core components are the services running on a server, wireless routers and access points.
Status
Organization is currently operational on a wired and wireless network. The wireless network will incorporate an enhanced wireless network security including WPA, WEP version 2, SNMP, antivirus software and anti spyware software. By incorporating these technologies and software, the current wireless network will improve and protect itself by attacks from intruders, hackers and viruses.
Support
Technology is evolving; every now and then replacing itself by an advanced and improved technology or service, there is no prediction of a project or system life. However, in order to ensure sustainable protection, invariable system monitoring procedures are essential. Moreover, considerations to improve system productivity will be beneficial for the organization. By considering these factors, maintenance support is essential.
Maintainer
In order to support the functions of the system, organization is equipped with a technical support department including technical support staff and managers. However, outsourcing maintenance of the system is optional. The factors supporting the decision of outsourcing maintenance activities is probably the cost. In the current scenario, organization can cope up with the current system maintenance requirements.
Contracts
Outsourcing requires certain contracts and agreements between the maintainer and the customer. The technical support department of an organization may sign agreement with the maintainer, in order to provide maintenance services for the system i.e. wireless network architecture. However, in some cases, emergency services are also a part of the outsourcing contract or agreement. Likewise, the emergency services are provided on an hourly basis. Moreover, if there is a requirement of system upgrade, configuration control board (CCB) has a role to play.
Level of Support
The level of support for the wireless network will be for maximum three years including two major enhancements. However, one release is supported each year. Likewise, system upgrade will include all the changes that are granted and approved by the configuration control board (CCB). In order to handle queries related to technical issues and support, technical help desk will provide all the assistance required.
Support Period
The support period and duration may vary, as the period before ‘delivering the product’ and ‘after delivering the product’ will depend on many factors. However, the maintainer will facilitate the system during the construction stage. The maintainer will provide support via emails or via phone. Likewise, the support will be associated with factors related to system requirements, planning etc. as per the agreement; the duration of support will be of three years.
References
ITS Release Management Plan Template. (n.d.). Retrieved from http://www.its.monash.edu.au/staff/projects/desktop-vc/dvc-rm-v2.0.pdf
Edney, J., & Arbaugh, W. A. (2004). Real 802. 11 security: Wi-fi protected access and 802. 11i . Boston, MA: Addison-Wesley.
Simple network management protocol version 2. (2007). Network Dictionary, 442-443.
WEP definition from PC magazine encyclopedia Retrieved 7/9/2011, 2011, from http://www.pcmag.com/encyclopedia_term/0,2542,t=WEP&i=54412,00.asp
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee
