
HI6006 Competitive Strategy Editing Service
Delivery in day(s): 4
The current technology plays an important role in the business strategy of the organisation. Therefore, different concept of technology has been introduced in order to enhance the efficiency of business. Newly concept of network function virtualisation, which is originated from the telecommunication provider, is using different kind of hardware in the system. Here, the concept of interfacing comes into the picture where the hardware cum software system is forming an efficient network for conducting the business in organisation. The study of this project will explain that network function virtualisation has removed the need of hardware installation on different server of the system. It can be considered that the whole functionality of the hardware has been shifted to the software application. It has happened to the extent that software application used in place of standard hardware in the data centre and fulfilling the objective of business. Here, the contribution of the Software defined network (SDN) is very important and the virtual network is working efficiently with the SDN. The SDN is essential for this technology but it is also a fact that it can process without the help of SDN.
The study of this project would clear the concept of the reader about the approach implemented by the considered organisation for network function virtual.
Week 1:beginning of the project with the inclusion of virtualization of telecommunication network within the working structure
Week 2:
NAME: | Kuncham Nageswar Rao | ||
PROJECT TITLE: | Paying With Face | ||
WEEK NO: | 2 | DATE:06/08/2017 | |
| |||
PLANNING |
| ||
MILESTONE: | PLANNED: | ACTUAL: | COMMENT: |
1)Site Create 2)Select the Project type | 1)Create Project Site 2)Google for the Project | Finalized the Project Topic and Create the Project Site | I Need More Information for the Project |
ISSUES |
| ||
DESCRIPTION: | DATE: | ACTION/RESULTS: | FINISHED (Y/N) |
The researcher needs more information regarding the site creation and data handling | 8/08/2017 | Planning is done and accordingly work is on schedule | N |
Week 3:
NAME: | Kuncham Nageswar Rao | ||
PROJECT TITLE: | Paying With Your Face | ||
WEEK NO: | 3 | DATE:13/08/2017 | |
| |||
PLANNING |
| ||
MILESTONE: | PLANNED: | ACTUAL: | COMMENT: |
Gathered the required information required for the assessment 2. Allocating the Topics to be done for the assessment. | This week planned to complete the Assessment 2 and try to acquire the data. To start work on the assessment tasks that is to be done by each member. | Almost completed the topics need to be done. There are some areas, needed to be covered still. Try to complete the work. | My part to work in the assessment 1.Project Plan 2.References 3.Appendix
3. Methodology
|
ISSUES |
| ||
DESCRIPTION: | DATE: | ACTION/RESULTS: | FINISHED (Y/N) |
Took lot of time to complete to gather the information. | 13/08/2017 | Research on the topic is required more than we think | Y |
a. Problem domain
A large amount of expensive hardware appliances are integrated within the mobile core network systems and hence, include hard state signaling protocols. In order to attain a specific function a replacement is required with existing equipment by the cellular operators. Scaling up and scaling down is offered by the network providers but it becomes difficult at the time of maintain the signal protocols with respect to traffic. The Cloud EPC (Evolved Packet Core) can do the addressing part for these issues, as it is the core network for LTE. The main targets of this virtualization concept is making the Mobility Management Entity (MME), Home Subscriber Server (HSS) and Packet data network gateway (PGW) more functional and seamless in their operations. Along with removing the issues, the main concept lies between removing several more daily problems faced by several business operations, as in flexible distribution of hardware resources and hence, eliminating the bottlenecks of the performances. New revenue sources generations are also accustomed with the help of rapidly launching innovation services. Machine to machine communication is also another resourceful integration of this project that can help in the future in making the world more virtualized and artificially intelligent. Another important issue in this case is the cost of production
b. Justification and Purpose
The actual motto behind this innovation is creating the future of the telecommunication sector independent of all the variables. Making the world virtualized is in other way making the word artificially intelligent, which can be useful for the future and people in their daily aspects.
3. Sponsor and Supervisor recommendation
The immediate head of my project is has made approval of the work and hence, the project needs continuation.
1. What is your age?
20-30
30-40
40-50
50-60
2. What is your gender?
Male
Female
3. How far do you agree that machine to machine communication system is efficient in the telecommunication sector?
Highly satisfied
Satisfied
Neutral
Dissatisfied
Highly dissatisfied
4. Do you think that the employee performances bottlenecks can be removed with the help of flexible distribution of hardware resources?
Yes
No
5. Do you think that development in the telecommunication sector by virtualizing the total industry can help in future aspects of communication?
Yes
No
By selecting effective methodology, the researcher will be able to propagate with the research seamlessly.
a) Research and System development methods
This exploration is done to demonstrate the proficiency of the innovative incorporation and how the functioning structure is beneficed by this. Thus, with a specific end goal to finish this exploration, the scientist has made a few arrangements. These arrangements incorporate making of a poll and exhibiting it to the respondents (Osseiran et al.,2017). The poll incorporates questions viewing the point as in if the execution of this innovation is valuable or has it helped the organization in accomplishing g targets or not. The analyst will be in charge of directing the survey. A number of 100 arbitrarily chosen respondents, who are working in the organization by and by, are chosen for the poll and a meeting should be presented with five administrators of the organization. Every one of, the respondents are given both open finished and close finished inquiries, with the goal that the relying upon the appropriate responses, the specialist can make legitimate conclusions. In single word, it can be expressed that the scientist is directing an essential research (Dobkin, 2017).
b. Data collection and systems design method
The data collection method basically, implies different survey and interview techniques. A questionnaire including seven questions are prepared and given to the respondents by the researcher. The questions are usually comes with both ended answer options. There are questions with multiple choice answer options also, so that the respondents can provide answer according to their ideas. This is a very useful method of data collection as the responses that are been derived from the respondents are accurate for both of the organisation as well as for the respondents. This is a technique of primary research and seems to be very useful for completion of the research.
c. Ethical Issues
In any research, Ethics is one of the basic things one has to maintain. Ethical breakdown can happen frequently while conducting the research. Information is collected from the organisation for research data analysis and it will be unethical if that confidential information is leaked out. Therefore, a boundary should be maintained in respect of information that is collected from the employees in order to make them categorised. It needs to be ensured that no other person except the stakeholders of the organisation or the person, who are involved in this research process, can get access to these data. The organisation can face a real threat if the information is collected and conveyed to other company for same kind of projects. Therefore, the research should be conducted with utmost privacy and they must comply with ethics.
d. Compliance requirements
The origin of the word compliance is the word, ‘complimentary’. That means the research work must be abided by certain guidelines and rules. Data Protection Act should be followed with utmost priority while conducting the research work. This will help to keep the privacy of the data that are collected from the respondents and to finish the project within the stipulated timeframe.
e. Analysis of data
Deductive approach is to be applied to analyse the data that are collected for research as with this approach the results can be represented in graphical forms.
Task | Activities | Start date | Duration (days) | End Date |
1 | Planning for evaluation of the impacts of VCN | 8/21/2017 | 56 | 10/16/2017 |
1.1 | Research topic selection | 8/21/2017 | 10 | 8/31/2017 |
1.1.1 | Recognition of the research background and project | 8/21/2017 | 4 | 8/25/2017 |
1.1.2 | Project objectives determination | 8/25/2017 | 3 | 8/28/2017 |
1.1.3 | Consolidation of the selected research topic | 8/28/2017 | 3 | 8/31/2017 |
1.2 | Literature Review | 8/31/2017 | 16 | 9/16/2017 |
1.2.1 | Discussion of the literature relevant to the topic | 8/31/2017 | 10 | 9/10/2017 |
1.2.2 | Literature review and information summary | 9/10/2017 | 6 | 9/16/2017 |
1.3 | Research methodologies | 9/16/2017 | 10 | 9/26/2017 |
1.3.1 | Description of the applied research methods | 9/16/2017 | 5 | 9/21/2017 |
1.3.2 | Identification of the suitable method for the research | 9/21/2017 | 5 | 9/26/2017 |
1.4 | Data analysis | 9/26/2017 | 15 | 10/11/2017 |
1.4.1 | Data analysis techniques description | 9/26/2017 | 8 | 10/4/2017 |
1.4.2 | Recognition of the appropriate analysis techniques | 10/4/2017 | 7 | 10/11/2017 |
1.5 | Consideration of the Ethical Issues | 10/11/2017 | 5 | 10/16/2017 |
a. Deliverables
This project has been conducted into different phases and each phase is delivering some knowledge about the technology. The introduction and the literature of this project is analysing and evaluating the technology with the perspective of its effect on the businesses. Literature is the part where different approaches and strategies have been used by the researcher.
b) Work break down structure
Task | Activities |
1 | Planning for evaluation of the impacts of VCN |
1.1 | Research topic selection |
1.1.1 | Recognition of the research background and project |
1.1.2 | Project objectives determination |
1.1.3 | Consolidation of the selected research topic |
1.2 | Literature Review |
1.2.1 | Discussion of the literature relevant to the topic |
1.2.2 | Literature review and information summary |
1.3 | Research methodologies |
1.3.1 | Description of the applied research methods |
1.3.2 | Identification of the suitable method for the research |
1.4 | Data analysis |
1.4.1 | Data analysis techniques description |
1.4.2 | Recognition of the appropriate analysis techniques |
1.5 | Consideration of the Ethical Issues |
c. Risk analysis
There are chances of getting poor or undependable quality of data, as the respondents answer randomly with a very less time and other quality issues are also there. Therefore, the quality of the research is largely dependent on the risk analysis.
d. Duration
The process of data collection and its analysis procedure determines the duration of the project. Generally, it can be said that, after data collection, it takes nearly eight weeks to completion of the project.
e) Gantt Chart
Osseiran, A., Elloumi, O., Song, J., & Monserrat, J. F. (2017). Internet of Things. IEEE Communications Standards Magazine, 1(2), 84-84.
Oberlaender, A. M., Roeglinger, M., Rosemann, M., & Kees, A. (2017). Conceptualising business-to-thing interactions–a sociomaterial perspective on the Internet of Things. European Journal of Information Systems.
Venkatesh, A. N. (2017). Connecting the Dots: Internet of Things and Human Resource Management.
Dobkin, B. H. (2017). A Rehabilitation-Internet-of-Things in the Home to Augment Motor Skills and Exercise Training. Neurorehabilitation and neural repair, 31(3), 217-227.