Task: This assessment task will assess the following learning outcomes.
Be able to interpret and evaluate an overview of recent trends in emerging technologies and innovation.
Be able to apply project management and information and communication technologies (ICT) tools to plan, execute, record and present their research and project work as a capstone experience.
The Capstone Topic Project Plan allows for a broad range of project areas like systems administration, database systems, IT security, mobile technology etc. Often the project has a sponsor and is linked to your interest or workplace needs. The proposal has a research component (Assessment Item 3 Annotated Bibliography) so in some cases you may need to find a supervisor willing to accept you as a candidate.
The Learning Outcomes being assessed in this item include how you interpret and evaluate an overview of recent trends in emerging technologies and innovation and begin to to plan, execute, record and present your research and project work as a capstone experience.
Your Capstone Project Proposal and Plan will be evaluated with a series of questions that you can use as a Checklist:
1.1 Problem domain: This wireless network assignment identifies problems that are associated with wireless network are slow connection and no network issue. This can be the limitation for the wireless network. The data that are transferred from wireless network may get leak. As mentioned by Khan and Pathan (2013), the modem and router that are used can have some glitch that can disrupt the communication. Slow connection can be caused because of internet connection as well as system errors. Moreover there are issues due to the efficiency of the persons involved in the project. This can be logically explained and can be fixed. Another reason for slow down of the network is because of lack of bandwidth. This can happen in home during use of phone and computer. The speed of internet can be spread by shared across different multiple devices. During peak hours the internet connection can go down.
1.2 Purpose and justification: The purpose of this wireless network assignment is that Wireless connection is used for boosting the productivity and encouraging the information sharing procedure. As mentioned by Hu and Qian (2014), this can help in accessing the email. Document and employee that are roaming that have constant access to wireless tool. Increase in mobility and collaboration can happen without losing connection. This can make working more efficient. Wireless network can be used at different places. Use of wireless technology using LAN technology can have roaming capability for voice communication. As mentioned by Liang and Yu (2015), Wireless connection can help in connection of information for the need and also provide a better customer experience.
Customers can have a quick response to the query and other concerns. It can improve the service for customer and also connect staff for the information. Wireless network can be used for connection in remote areas.
2. Sponsor or Supervisor recommendation:
Wireless network can be used but at a limited place or area. The limitation of connection is low and technology needs to be upgraded. The system that is connected if increased the connection get slow and cannot handle multiple systems at same time. As mentioned by Rabbachin,Conti and Win (2015), Wireless network need to be upgraded in the way that most of the system can be used same time and speed does decrease. This wireless network assignment outlines the role of connections and method need to be secure because during transfer of data over the network there are chances that data may get leaked or hacked. The connection need to be more secure and reliable for securing data is transferred over network.
3. Research Questions
4. Conceptual Framework
Figure 1: Conceptual Framework for Wireless Network
(Source: Created by Author
5.1 Research and Systems Development method(s): The process of upcoming information system can lead to innovative method that is required for improvement of management system. This wireless network assignment design can be implemented in information system. The methodological approach can be used for meeting the order of time that is against the human constraints and physical process. The development of system can refer to the steps that are used for plan, form and getting control over the process of development. System prototyping is the way for system and application that can be complex and also involves many ways for analysis. The method is used for emphasis of working version of the application by the user for the possible way. Hence, the researcher will effectively focus on a post positivism approach that will help in the process of collecting the data in a very logical and detailed manner. A descriptive research design will be focused upon as this will help in the process of analyzing the wireless networking trends in much more detailed manner. A deductive approach will also helps in analyzing the present theories and models with the research question and will deduce the answers (Van De Belt, Ahmadi and Doyle, 2018).
5.2 Data collection or systems design methods: Secondary data collection method is used for gathering information. Secondary data collection method is used for increasing the sampling size for the research. The data is collected from existing resources. The data collected has been collected by focusing on research and interest area of interest. Sources are used for collection of data from existing resources that includes the data that are collected by different resources. The secondary data has been collected from preliminary work. Secondary data can be more legitimacy than primary data and can also be used for verification of primary data.
5.3 Ethical Issues: This wireless network assignment outlines numerous ethical issues have the chances of hindering the current research. It has been observed that the researcher is effectively required to abide by the Data Privacy act of the year 1988. There is also a requirement of abiding by the Copyrights act. There must be no plagiarism and the research is required to be conducted on own. The researcher will only utilize the data that is collected from various secondary sources for the academic purpose.
5.4 Compliance Requirements: Wireless network need to be secured and different security systems are used for protecting data from any harm. This can be done by increasing scrutiny that is needed for network security implementation. The research will also focus on complying by the different legal requirements that are required to be compliant with while in the process of conducting a specific research. Organizations that use wireless network need to identify all the opportunities for the business process. As mentioned by Chen and Kunz (2016), the wireless network device and software that are used need to be updated for avoiding risk of security.
5.5 Analysis of data: The collected data will be effectively analyzed through the means of thematic analysis. The data that will be collected from the various secondary sources will be effectively divided into small themes based on their concept. A comparison will also be demonstrated in between different innovation trends that are being observed.
6. Project Plan
Ensures readability and standardization
Ensures readability and standardization
Ensures readability and standardization
Table 1: Deliverables
(Source: Created by Author)
This wireless network assignment is a capstone project plan that has completely been focused on the numerous technologies which is emerging in nature. This particular project plan has some risk regarding the data security which should be mitigated by taking proper action plan.
Project deliverable is the record of the total project plan. This part of the project actually demonstrates the total learning process of the proposed plan and its application. This is a kind of documentation which is provided in the last part of a project proposal plan.
Software codes are the main part of a software development process. Coding is the most important art which goes under the implementation strategy. Proper design of the software structure is required for proper implementation of the code.
6.2 Work breakdown structure (WBS):
6.3 Risk Analysis: Capstone project plan basically involves various IT staffs who are involved in the project planning system. The various IT staffs including a database system, mobile technology, system administration and IT security are involved in mitigating various risks that are involved in the project. There are two types of connection establishment process. One is a wired connection and another one is a wireless connection system. The wireless connection system has various advantages like internet control system, access to data (Sarkar, Basavaraju & Puttamadappa, 2016). The system is used to ensure a disruption free data transfer. This wireless connection system has broadly used in a various technical area where a large number of PC's and laptops are connected within an open sources interconnectivity system (Azharuddin & Jana, 2015). Open system interconnectivity system has a great threat of hacking possibilities as the total connectivity falls under an open source system. It is very insecure than the wired system.
6.4 Duration: This wireless network assignment plan was done within 18 days. The project has been started on June 13th and the complete project plan was established finally on July 6th. All of the steps have been done in a proper way. Selection of the topic was the main step which was done in 2 days. Importance of the research and rationale of the project has been completed within 2 days. Recommendation from supervisor had taken 3 days to complete. As the supervisor completely checked the whole plan, it took some time to complete the whole process. Research Question has been set for 1 days. The complete theoretical framework took 4 long days and the whole framework has been completed successfully. The methodology of a research is a big process where various methods, design, and approaches are involved. This particular step took 4 days to complete. Risk analysis has been done within 1 day and finally, the project was submitted successfully within 1 day.
6.5 Gantt chart:
Title: Emerging Technology and Innovation
Innovation is the process of global change and it helps to bring the best practices for getting fruitful results in the coming years. Certain negative sides are also been seen in technological innovation and creation. As opined by Hossain et al. (2014), the era of digital changes led to surprising experiments with innovative ideas and reinvention. It also requires a new planning process for extraordinary opportunities. The conceptual innovation will provide incredible changes in the process of thinking and execution of new designs of opinions for drastic changes and development. This will bring advancement in the process of continual growth and stronger access to positive social interactions. It is introduced that organizations will empower trust with significant growth for building new platforms to develop the existing scenario. As mentioned by Lu et al. (2015), this will provide more chances and facilities to bring effective growth in the organization. It is possible with the help of new or advanced technologies that will help individuals to cope up with the fast developing scenario due to technological advancement or innovations.
The industry is launching new services to bring changes in the old processes of doing businesses. This will help them to manage the risks with metrics of innovation. Digital era is the new mantra for innovation and this helps to gain momentum or market share by accepting the changes and adopting the required processes for betterment. Revolution and innovation is the new term for globalization and this can bring required changes by making this world fast and tech-savvy (Huang et al. 2015).
Innovation is the process where it follows the innovative structures of digital implementation. In this digitally paced era, almost each and every sector of the different organization is trying to implement their system in a digital technology system. Traditional system had a problem of technical inventions where digital transformation helps the total process to complete in an innovative way. Digital transformation actually deals with the various steps of implementation of technology in the existing system. Various emerging technology like big data analytics, cloud computing helps the various organization to implement their process in this way. This is the generation with complete technical innovations where each and every step of our daily life stands on a digital platform. Use of smartphones has already made us tech-savvy people. Young generations have a keen interest in social media where the social advancements are reflected in a broader way. Special innovations of e-paper have already changed the meaning of reading newspaper. E-jounals helps us to gather information from one preparation of this wireless network assignment.
Project Blog (Weekly Progress Reports Plan)
Table 1: Weekly Progress Reports Plan
(Source: created by the author)
Sarkar, S. K., Basavaraju, T. G., & Puttamadappa, C. (2016). Ad hoc mobile wireless networks: principles, protocols, and applications. US: CRC Press.
Khan, S., & Pathan, A. K. (2013). Wireless networks and security. Berlin: Springer.
Azharuddin, M., & Jana, P. K. (2015). A distributed algorithm for energy efficient and fault tolerant routing in wireless sensor networks. Wireless Networks, 21(1), 251-267.
Hossain, E., Rasti, M., Tabassum, H., & Abdelnasser, A. (2014). Evolution toward 5G multi-tier cellular wireless networks: An interference management perspective. IEEE Wireless Communications, 21(3), 118-127.
Lu, X., Wang, P., Niyato, D., Kim, D. I., & Han, Z. (2015). Wireless networks with RF energy harvesting: A contemporary survey. IEEE Communications Surveys & Tutorials, 17(2), 757-789.
Hu, R. Q., & Qian, Y. (2014). An energy efficient and spectrum efficient wireless heterogeneous network framework for 5G systems. IEEE Communications Magazine, 52(5), 94-101.
Rabbachin, A., Conti, A., & Win, M. Z. (2015). Wireless network intrinsic secrecy. IEEE/ACM Transactions on Networking, 23(1), 56-69.
Van De Belt, J., Ahmadi, H., & Doyle, L. E. (2014, September). A dynamic embedding algorithm for wireless network virtualization. In Vehicular Technology Conference (VTC Fall), 2014 IEEE 80th(pp. 1-6). IEEE.
Chen, Y., & Kunz, T. (2016, April). Performance evaluation of IoT protocols under a constrained wireless access network. In Selected Topics in Mobile & Wireless Networking (MoWNeT), 2016 International Conference on (pp. 1-7). IEEE.
Huang, X., Leng, T., Zhu, M., Zhang, X., Chen, J., Chang, K., ... & Hu, Z. (2015). Highly flexible and conductive printed graphene for wireless wearable communications applications. Scientific reports, 5, 18298. [Online] Retrieved from: https://www.nature.com/articles/srep18298 [Accessed on: 25th July, 2018]
Liang, C., & Yu, F. R. (2015). Wireless network virtualization: A survey, some research issues and challenges. IEEE Communications Surveys & Tutorials, 17(1), 358-380. Retrieved on: 05 August 2018, Retrieved from: https://s3.amazonaws.com/academia.edu.documents/35468325/2014_Wireless_Network_Virtualization-_A_Survey__Some_Research_Issues_and_Challenges.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1533633036&Signature=QT8hoCgJ3w0TU3bvNj3K6%2BhWbOc%3D&response-content-disposition=inline%3B%20filename%3DWireless_Network_Virtualization_A_Survey.pdf