Java Assigment

This program will work with file IO and exception handling by building a simple text-based interface for browsing the file system. When the program starts it should ask the user if they would like to dump results to a log file IN ADDITION to standard out. If so, your program should prompt for the name of the log file. If the file already exists, it’s contents should be overwritten. The program will then display (6) options to the user: (1) List the contents of a directory provided by the user (2) List the contents of a directory provided by the user as well as all of its sub directories. (hint: use recursion) (3) Locate a file with a given name. (4) Locate files with a given file extension (5) Concatenate the contents of 2 files whose names are provided by the user and output the result to a third file (name also provided by the user) (6) Exit In addition, provide additional (useful) options in addition to those listed above. For example, locating files based on regular expression matches in the file name or the file content. Be creative. Have fun. Design: Make sure to design the program so that the file system functionality is encapsulated in its own class or classes. Specifically, you should design so that it would be trivial to hook up these features to a GUI rather than the command line. (This means the main function should have almost no code in it, and that all command-line user interaction should be separate of file browsing implementation, etc.)

{"statusCode":404,"error":"Not Found","message":"The specified key does not exist."}
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Wireless Networking Quiz 2

1.         How long is a RIFS?

A.         2 microseconds

B.         10 microseconds

C.         16 microseconds

D.         9 microseconds

 

2.         What guard interval is used with 64-QAM by 802.11n HT devices to reach 600 Mbps data rates?

A.         800 ns

B.         200 ns

C.         100 ns

D.         400 ns

 

3.         When two RF signals on the same frequency arrive at a receiver at the exact same time and their peaks and valleys are in alignment, what is true about these signals? (choose all that apply)

A.         They are 180 degrees out of phase

B.         They are 90 degrees out of phase

C.         They have 0 degrees of separation

D.         They are in phase

 

4.         What is the cause of Free Space Path Loss?

A.         Beam Reflection

B.         Beam Absorption

C.         Beam Diffraction

D.         Beam Divergence

 

5.         Which of the following are units of power?

A.         dBi

B.         Watt

C.         Milliwatt

D.         dBd

E.         dBm

 

6.         A single milliwatt = 0 decibels of change.

A.         True

B.         False

 

7.         Which of the following increase amplitude?

A.         Lightning arrestors

B.         RF Cables

C.         Pig tail adaptors

D.         Antennae

E.         Amplifiers

 

8.         More than 40% blockage in the Fresnel Zone will not impede an RF link.

A.         True

B.         False

 

9.         Which of the following describes a behavior of waves?

A.         Frequency

B.         Phase

C.         Modulation

D.         Amplitude

 

10.        Phase is a standard measurement of RF wave size.

A.         True

B.         False

 

11.        In an ERP 802.11 network, there are two mandated spread spectrum technologies.

A.         True

B.         False

 

12.        ERP-OFDM stations can not connect with OFDM AP’s because the use different __________.

A.         Contention methods

B.         Modulation techniques

C.         Frequencies

D.         Coordination functions

 

13.        Which data rates are supported by PBCC?

A.         6, 12, and 24 Mbps

B.         36, 48 and 54 Mbps

C.         1, 2, 5.5 and 11 Mbps

D.         22 and 33 Mbps

E.         1, 2, 5.5, 11, 22, and 33 Mbps

 

14.        How many adjacent non-overlapping channels may be used in the same physical area using the 2.4 GHz spectrum?

A.         14

B.         11

C.         6

D.         3

 

15.        The area of coverage provided by an AP is called which of the following?

A.         BSS

B.         ESS

C.         BSA

D.         WLAN

 

16.        The function of an AP is most closely related to which wired networking device?

A.         A Switch

B.         A Hub

C.         A router

D.         A firewall

 

17.        What is the largest channel size possible with 802.11ac?

A.         40 MHz

B.         80 MHz

C.         120 MHz

D.         160 MHz

 

18.        What is required for stations to use 256-QAM?

A.         they must have a firmware upgrade

B.         there can be no more then 2 stations

C.         they must be very close to the AP

D.         they must be far from the AP

 

19.        The period of time that exist between wireless frames is called __________.

A.         Duration/ID field

B.         NAV Value

C.         Interframe Space

D.         Carrier Sense

 

20.        What are the two ways carrier sense is performed? (Choose two)

A.         Virtual Carrier Sense

B.         Physical Carrier Sense

C.         Logical Carrier Sense

D.         DCF Carrier Sense

E.         HCF Carrier Sense

 

21.        What are the two frames used in active scanning? (Choose two)

A.         Beacon Management Frame

B.         Probe Response Frame

C.         Clear to Send Frame

D.         Ready to Send Frame

E.         Probe Request Frame

 

22.        Which of the following devices are said to be parts of a Specialty WLAN Infrastructure (Choose all that apply)

A.         Autonomous AP’s

B.         Lightweight AP’s

C.         Wireless Workgroup Bridges

D.         PTMP Bridges

E.         WLAN Controllers

 

23.        Many Law Enforcement agencies use frequency managers.

A.         True

B.         False

 

24.        When designing wireless networks, two concepts often conflict.  What are they? (Choose two)

A.         Capacity

B.         Channel

C.         Antenna type

D.         Transmit Power

E.         Coverage

 

25.        The standard as amended defines which PoE device types?

A.         Legacy

B.         PSE

C.         PD

D.         Proprietary

 

26.        Which if the following is responsible for enrolling client devices?

A.         Mobile Device

B.         AP/WLAN Controller

C.         MDM Server

D.         Push notification server

 

27.        What are the three main components of the 802.1X/EAP Framework?

A.         Authentication, Authorization, Accounting

B.         Authentication Server, Authentication Client, Authentication Accountant

C.         Authenticator, Supplicant, Authentication Server

D.         Authentication Guest, Authentication member, Authentication Server

 

28.        A spectrum analyzer can be used to locate the source of which type of intentional attack?

A.         RF Jamming

B.         Overlapping adjacent channel interference

C.         Bit Flipping

D.         Duration field spoofing

 

29.        What is a primary concern when planning WLAN deployments within the government vertical market?

A.         Cost

B.         Channel Use

C.         Security

D.         Capacity

 

30.        A facilities escort may be required when conducting a site survey.

A.         True

 

B.         False

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Case Study For Chapter 6 OUTRIGGER HOTELS AND RESORTS

Case Study for Chapter 6

OUTRIGGER HOTELS AND RESORTS

 

Outrigger History1

 

On Black Friday, September 13, 1929, Roy C. Kelley arrived in Hawaii with his wife Estelle. An architect by training, Mr. Kelley joined the firm of C.W. Dickey and was responsible for designing many of Honolulu’s landmark buildings, including the main building of the old Halekulani Hotel and the Waikiki Theater on Kalakaua Avenue. Nine years later Kelley set out on his own and opened his architecture firm, building numerous homes, apartment buildings, and hotels on the island of Oahu. In 1963, Kelley took over the land occupied by the old Outrigger Canoe Club and Outrigger Hotels became a reality with the mission of bringing the dream of a vacation in Paradise within the reach of the middle-class traveler. Included in the agreement were leases on three Waikiki lots that later became the Outrigger East, Outrigger West, and Coral Reef hotels. The Outrigger Waikiki Hotel was built on the site of the old canoe club, arguably the prime spot on Waikiki beach, in 1967. Throughout the next two decades, Outrigger Hotels Hawaii, as the company was named, continued its expansion in Waikiki. When in the seventies the zoning authority put a cap on new construction in Waikiki, Outrigger began to expand through acquisition rather than construction, ultimately becoming the largest chain in the State of Hawaii with over 7,000 rooms and a total of 15 properties concentrated in Waikiki (see Exhibit 6.1). Thanks to its clustered configuration, Outrigger Hotels Hawaii was able to maintain a centralized management structure fitting Mr. Kelley’s “management by walking around” style.

 

In 1989, Outrigger Hotels Hawaii, now under the leadership of Roy Kelley’s son, Dr. Richard Kelley, took over management of The Royal Waikoloan Hotel on the Big Island of Hawaii. When hurricane Iniki, heading for Waikiki in 1992, barely missed Honolulu and ravaged the island of Kauai, it provided further impetus for Outrigger’s geographical diversification strategy to and beyond neighboring islands. The firm, now expanding into management agreements with third-party owners, added properties on Maui and Kauai and ultimately grew to a total of 26 locations in the Hawaiian Islands (see Exhibit 6.2).

 

In 1996 the firm made its first international foray, opening the Outrigger Marshall Island Resort on Majuro Atoll in the Republic of the Marshall Islands. Through partnerships, joint ventures, acquisitions, and new developments the firm continued to grow internationally, adding properties in Guam, Fiji, Tahiti, Australia, and New Zealand (see Exhibit 6.3).

 

 

 

While growing geographically, Outrigger Hotels Hawaii also began to diversify its product portfolio with the addition of condominium resorts beginning in 1990. Because of its geographical and product diversification, in 1995 Outrigger Hotels Hawaii changed its name to Outrigger Hotels and Resorts, and in 1999 re- branded fifteen of its hotels in Waikiki to launch a new hotel brand called OHANA Hotels of Hawaii. Reflecting on the decision, President and CEO David Carey commented: “We had an identity crisis because the market moved up, we upgraded the on-beach properties where we had higher demand and bought some nice properties in neighboring islands. But we had huge variation in the portfolio —if you stayed at a budget property vs. a beach front property, you’d be very confused as to what an Outrigger was.” In an effort to bank on the name awareness that the Outrigger brand had developed with consumers, the on-beach properties became upscale full-service hotels under the Outrigger brand. The condos, also typically on-beach upscale locations, maintained the Outrigger brand. Conversely, the OHANA brand was positioned to cater to the budget traveler looking for value on off-beach properties. Perry Sorenson, COO, explained the OHANA value proposition: “OHANA hotels are something between a Holiday Inn and a Hampton Inn. No expectation of restaurants, but expectations that you have a friendly staff, that the room is going to be clean, and you will be taken care of. Not a lot of extras, but good value.” Condominiums represented an increasingly important share of the total portfolio of properties (see Exhibit 6.4), even though the firm had sort of stumbled upon the opportunity condominiums offered. Condominiums appealed to the independent traveler who would do much research and planning on his own.

 

Condominiums were also very complex, non-standard products that travel agents and wholesalers found hard to sell. As Sorenson explained: “The addition of condominium properties was a customer driven initiative. We kept receiving inquiries about condominium vacations and had to direct customers to competitors who also ran hotels. That did not make any sense.”

 

As the firm learned over time, condominiums were very different than traditional hotel and resort operations. While management agreements with condominiums varied substantially, unit owners typically had the option to join a pool of units that Outrigger was responsible for marketing and managing. Owners typically received 55% of the gross income the units generated and Outrigger funded its operations with the remainder. Beyond labor costs, the primary expenses included the costs of marketing and selling the properties, front desk and housekeeping operations, and in-unit maintenance. Maintenance of the common areas, defined as anything from the unit’s inside wall paint outward, was the responsibility of the AOAO (the owners association) and was funded through annual dues. This state of affairs was simpler in the Australian condominiums— referred to as strata title properties. There, the management company had to buy and control the lobby area, and the contracts were generally 25 years in length and required standardization of revenue splits. This approach created simplicity and clarity that made it more efficient for the management company to operate. Because condos were rarely built as business ventures, but rather were designed as primary or vacation homes for the tenants, they offered little office or staging space for management companies to operate in. They also lacked many of the typical hotel services and departments such as food and beverage, room service, laundry, and daily maid service. Working with a relatively unsophisticated and widespread ownership base, with some condominiums having almost one owner (i.e., one contract) per unit, presented significant challenges. Jim Hill, Regional Director—Maui, summarized the challenge: “The thing that is hardest to do in condos is to change anything. You’ll sit in a board meeting with the association and they’ll say no, no, no, when the next property over offers a more appealing layout and better amenities. But that same person will ask you in another meeting why isn’t the revenue higher?”

 

These difficulties notwithstanding, Outrigger found the condo business appealing when it made its first foray into it in the early 1990s, because it provided a means for expansion through management contracts without the need to acquire expensive properties. Condo products varied widely, ranging from

studios to two bedroom apartments, and did not have all the services typically associated with a hotel, like room service, on-property restaurants, and retail shops.

 

Outrigger had grown to a sizable firm, encompassing about 3,600 employees (of which about 230 were at corporate), a portfolio of properties exceeding U.S. $1.4 billion,2 and approximate revenues of US $45 million.

 

The Hotels and Resorts Industry

As the new millennium dawned, the global lodging industry was estimated to exceed $295 billion in sales, about 11% of the world’s economic output, and employed more than 250 million workers (see Table 6.1 for performance indicators).3 The leisure travel segment accounted for about 45% of total volume.

 

With respect to the Hawaiian market, which was Outrigger’s traditional stronghold, recent figures showed performance levels above the average of the global industry (see Table 6.2). Being quite isolated from any large population pool, Hawaii was a classic destination market with an exclusive fly-in customer base. The major feeders were U.S. westbound traffic and Japanese eastbound traffic. These markets were thought to yield very high return rates—estimated by some to be around 50% westbound and over 65% eastbound. This trend made for a very location-savvy customer base. Peculiar to this market was also the trend of multi-island stays, with guests visiting more than one destination during the same trip.

 

Because the Hawaii and Pacific Rim markets were exclusive destination markets, the use of packages—including air and accommodations—was pervasive. Historically, packages were assembled and sold by wholesalers and tour operators who purchased both air and hotel rooms in bulk and re-marketed them to the traveling public. With the widespread adoption of the Internet, a new type of package was emerging under the leadership of large online travel agencies: dynamic packages. A dynamic package was one that enabled the guest to choose air, hotel, car rental, and even activities, ticket them independently, and then price them out as a bundle. Dynamic packages were appealing to suppliers because the price of each item was not disclosed, making price comparison difficult and alleviating commoditization fears. They were appealing to perspective travelers because they increased choice and fostered flexibility. Finally, they appealed to online travel agents because they built upon their value proposition—customer choice—and had the potential to improve their margins.

 

As a mature destination, Hawaii had been entered by many of the larger branded hospitality and resort companies. The largest hospitality firms, such as Marriott International, Hilton Hotels and Resorts, and Starwood, had a significant presence with eight, five, and eleven properties respectively. But the largest operators in Hawaii were geographically- and leisure-focused players such as Outrigger, ASTON Hotels & Resorts Hawaii (with twenty-eight properties), and Marc Resorts Hawaii (with eleven properties).

 

Outriggers Organization

Outrigger Hotels and Resorts was a management company wholly owned by a holding corporation called Outrigger Enterprises. Reflecting its real estate development roots, Outrigger Enterprises also owned a real estate ownership company called Outrigger Properties (Exhibit 6.5).

 

W. David P. Carey III, President and Chief Executive Officer David Carey joined Outrigger Enterprises, Inc. as executive vice president and general counsel in 1986, and was named president of the company in 1988, and chief executive officer in 1994. After graduation in 1982, Carey moved to Honolulu and was an attorney specializing in corporate and real estate law at Carlsmith Wichman Case Mukai and Ichiki, where Outrigger Hotels was one of his major clients. Carey is a member of numerous business and community organizations, including the Hawaii Tourism Authority, Hawaii Hotel Association, and others. Carey has a B.S. in electrical engineering from Stanford University, a J.D., cum laude, and an M.B.A., with distinction, from the Santa Clara University. He was a member of the Beta Gamma Sigma Honor Society.

 

 

Joe Durocher, Senior Vice President and Chief Information Officer Joe Durocher first joined Outrigger in 1986 as Vice President of Information Systems. During his tenure, he was instrumental in the installation and maintenance of the company’s Stellex reservations and front desk computer system. After 10 years with Outrigger, Durocher left the company to join Hilton Hotels Corporation as SVP & CIO, where he was

responsible for data processing and related strategies for all of Hilton’s non- gaming hotels, amounting to well over 300 properties with over 110,000 rooms worldwide. While with Hilton, Durocher was instrumental in the replacement of Hilton’s Hiltron central reservation system with Hilstar, a new state of the art central reservations system. Durocher rejoined Outrigger Enterprises in 2000. Born and raised in Hawaii, Durocher received his B.S. in Electrical Engineering and MBA from the University of Hawaii. He is a Certified Systems Professional (CSP) and Certified Data Processing Professional (CDP). Durocher is also a member of the Beta Gamma Sigma honor society.

 

 

Perry Sorenson, Chief Operating Officer In his position as a chief operating officer Perry Sorenson is responsible for all aspects of hotel operations as well as Outrigger’s current expansion across the Pacific. He joined Outrigger as executive vice president in 1991. Sorenson’s career spans over 20 years in the hospitality industry. He was previously EVP and COO for Embassy Suites, Inc., the world’s largest all- suite hotel chain. Sorenson directed the rapid growth of Embassy Suites operations as it expanded from five to 105 hotels in five years. Prior to joining Embassy Suites, Sorenson was vice president of operations for Holiday Inns Inc., where he was the recipient of the Holiday Inn Corporation Chairman’s Award for Service Excellence. He has also held management positions with Radisson Hotel Corp. and Rockresorts, Inc. He is currently a member of the Native Hawaiian Tourism & Hospitality Association and sits on the board of various other community and industry organizations. Sorenson received his BA in psychology and MBA from the University of Utah.

 

 

Outrigger Properties wrote and managed real estate contracts with third-party owners and supervised the owned assets (accounting for about a third of all properties in the Outrigger portfolio), as well as the development of new properties. The firm also monitored the real estate market for optimal times to invest in available properties or sell assets in the portfolio and raise needed capital. Outrigger Properties managed leasing contracts with the many independent retailers occupying food and beverage outlets—rarely run internally by Outrigger—and shops within the hotels and resorts in its portfolio. Sorenson explained the tradeoffs associated with this decision: “We are the third largest retail landlord in Hawaii, with about 300,000 square feet of retail space, so we have access to the best restaurant operators. Leasing restaurants allows us to focus our energies on hospitality and [the] profitability of the rest of the hotel, but of course you lose some control when you outsource. It takes a hotel mentality to do room service very well for example.”

 

Outrigger Hotels and Resorts, the operating arm of Outrigger Enterprises, was responsible for the writing of new management contracts, as well as overseeing property renovations, and operations of the managed hotels, resorts, and condos. Outrigger Properties generally negotiated a base and a percentage of revenue with tenants; revenues from leased space were assigned to the hosting property’s own P&L. Room revenue made up the bulk of each property’s revenue, with rental income as low as 5% in hotels with little retail space and as high as 20% in some of the most appealing locations. Other more marginal revenue lines were parking, in-room entertainment, telecommunications, and kids’ clubs operations.

 

Outrigger Hotels and Resorts had historically maintained a highly centralized

organizational structure. As the firm grew in size and geographical distribution a more traditional structure emerged, but, reflecting its roots, Outrigger Hotels and Resorts remained consolidated where possible. For example, the two beach-front Outrigger Hotels on Waikiki beach were managed as one. As Chuck Shishido, OHANA Hotels VP of operations and a 33-year veteran of the company, explained: “We have centralized services—accounting, IT, finance, engineering, purchasing, and special projects—that support all the properties on Oahu, as well as indirectly the neighboring islands. There is also one executive housekeeper in charge of all properties. We run the OHANA Hotels like a 4,200 room distributed hotel. It is very efficient.”

 

Since each property in the Outrigger family had its own P&L, these shared services were charged back to them based on room count, revenue, or usage, depending on the service. As the firm expanded internationally it became more decentralized, with resorts in the Pacific Rim working much more like independent operations and organized like traditional resorts. Recognizing the significant advantages offered by its centralized structure, Outrigger was looking at the possibility of better integrating its international resorts. However, distance presented new challenges—1,800 miles separated its southernmost Australian property from its northernmost property alone. Sorenson explained: “We need a reservation solution for Australia, a real-time coordination with a central reservation service. They are operated as individual hotels; the central 800 number today is just switched to the correct hotel. A centralized system would offer tremendous value because we get drive-in business and substantial potential cross-property traffic.”

 

The Outrigger Customers and Competition

Outrigger’s original mission was to bring the opportunity for a vacation in paradise within the reach of middle-class families. As the firm began to diversify its portfolio, the profile of its customers and the competition changed as well. The typical Outrigger guest was often a multigenerational customer with a sense of loyalty to the Outrigger family (about 25% of guests were returning to Outrigger) and an annual income exceeding $75k. Outrigger guests were almost exclusively leisure travelers, with some mixing business and travel (e.g., attending a conference and extending the stay for some leisure time with the family afterwards). This customer base created seasonality, with winter and summer being the high seasons when properties like the Outrigger Waikiki on the Beach reached an ADR of $260 and an overall occupancy around 90%. Group business was limited, with some overflow from the conference center

looking for meeting space for break-out events. Solomon profiled Outrigger’s customer base: “Our customers are independent-minded and look for an experience that is more regional and attuned to the destination, but still within their comfort zone. They may stay with big brands in their road warrior capacity, but that’s not what they are looking for in a tropical destination.”

 

rands as Marriott International, Hilton Hotels and Resorts, and Starwood Hotels and Resorts—the latter having a big Sheraton presence in Waikiki. These brands enjoyed name recognition, significant brand awareness amongst the traveling public, a flow of customers redeeming points, available capital, and availability of programs for employees such as discounted travel beyond Hawaii and the Pacific region. In response, Outrigger leveraged some of the premier locations in the markets it competed in, like the Outrigger Waikiki on the Beach, strong name recognition and long-term relationships with the travel distribution network, a strategic focus on vacation destinations, a deep local knowledge and community ties, and good employee relations. Kimberly Agas, VP of Operations for Outrigger’s Waikiki Beachfront Hotels and a 20-year veteran with the company, explained: “Our employees are trusted to help the guests have a wonderful stay, and have the flexibility to act on their initiative. The teams of employees include our partners in the retail, restaurants and activities. We are concerned with the holistic experience, an all encompassing experience. In much of our unionized competition everyone has a narrow job [description] and outside of that they will refer you to a colleague, out of respect, because of contract restrictions, or because that’s how they look at it: ‘this is all I have to do.’”

 

The typical OHANA guest was a value-minded and Hawaii-savvy leisure traveler with income below $100k a year. Typically, OHANA guests had visited Hawaii multiple times, stayed longer than average, and visited more often. Business travel was mainly composed of military and corporations with operations on multiple islands. Groups accounted for less that 10% of OHANA’s overall traffic. Shishido explained: “We have about 50% return guests. Your first trip you want a beach front hotel, the atmosphere, the ambiance—you want the full Hawaii experience. When you come more often, you still want the experience, but you look for more value and instead of spending $250-$300 a night for a beachfront you can stay longer off-beach for $70-$80 a night.”

 

otels typically achieved an ADR around $66 and approximate occupancy levels of 75% over the year. A number of small regional chains (such as Marc Resorts and Castle Resorts) and many off-beach independent hotels existed in the Waikiki market. But Outrigger’s senior management thought that OHANA hotels had no direct competition. Solomon explained: “There is no quality branded

competitor for OHANA. Because of the real estate costs and lack of efficiencies, competitors like Holiday Inn, Cendant, and Choice can’t build and operate their product at their price point here.

 

There are many independent no-name products.” Pricing for off-beach properties was much harder to manage because of the commodity nature of the hotels not enjoying a premium location, even though wholesalers concerned about their own brand and customer satisfaction were more willing to carry the OHANA brand over independents because Outrigger backed OHANA’s quality promise. OHANA was the largest operator in Waikiki and the largest Hawaii owned operator.

 

Two types of customers were typically staying at the condominiums. On the lower side of the $90k to $160k income brackets were families visiting during school breaks and looking to control expenses and control their vacation experience. They valued the full kitchen—a standard in every unit—and the two bedrooms and two baths. This was substantiated by the fact that condos had four times as many reservations coming from the Internet direct and tended to recover faster after a soft economy. On the upper side of the spectrum were ‘newlyweds’ and ‘nearly dead’ couples who liked the privacy and space afforded by a condo. As Hill explained: “On the upper end of the scale people like the convenience to have a full size refrigerator and kitchen amenities but they may never cook. If they want to cook the kitchen is available, but chances are they’ll never use it. That’s why, against conventional wisdom, the new trend is to put restaurants with more resort services in condominium properties.”

 

While high degrees of variability existed between properties, returning guests to the same property ranged typically between 20% to 40%. With its expanding portfolio, Outrigger believed it enjoyed significant cross-property traffic as well, but it had little hard data on this. Condominiums enjoyed almost no branded competition. Instead, because of the need to convince individual owners to join the pool of Outrigger managed units, the firm competed with small local management companies and individual owners’ beliefs that they could do a better job alone. This idiosyncrasy of condominium operations amounted to having two customers—the unit owners and the guests—who, unaware of the workings of condo operations, were looking for the same level of service they would receive at a resort.

 

On average, a condominium with mostly two bedroom units would achieve ADRs around $175, while properties with mostly studio and one bedroom units would settle around $140. Outrigger operated a Central Reservation Office (CRO) in Denver, Colorado with anywhere from 40 to 70 reservationists (FTEs), mainly depending on the

volume of business. A corporate marketing staff of 12 people, allocated about 6% of revenue, was responsible for managing the brand and for going to market. An additional 2% of revenue was used to fund reservation and other distribution costs. Reservations were centralized for all properties in Hawaii. Outrigger Hotels had a staff of two or three people at each property to follow through (e.g. to reconcile inconsistencies, create rooming lists, and identify VIPs). For the OHANA hotels this was done as a shared service. Beyond Hawaii reservations were only taken at each property.

 

Outrigger executives believed that distribution was a cornerstone of its success, with about 50% of the business coming from wholesalers (classified as anything that is on a contract basis) who often sold Outrigger products as part of a package. Consumer direct (via voice or the Web), travel agents, government and military, and corporate clients made up the difference. For international properties the source of business percentage from wholesalers was close to 80% and almost all reservations were faxed to the property. But the lines were blurring with the increasing prominence of online travel agents (e.g., Expedia) and the advent of dynamic packages. Solomon explained: “We strive to make distribution as broad as possible, and for each pipeline (voice, Web direct, GDS, fax) we want to make it as efficient and user friendly as possible. The customer is in control; more than half of those who transact in the wholesale channel can pick the hotel.”

 

Outrigger Strategy

At the heart of Outrigger Hotels and Resorts’ strategy was a drive to position its properties in places where people could enjoy a vacation experience leveraging Outriggers’ own core competencies. The firm was very careful not to create a cookie cutter approach, but instead to deliver an experience that was respectful of the culture and the special characteristics of the localities in which it operated

—a “sense of place” as the firm called it. As Carey put it: “Our business is really about being a ‘window’ to an experience, not the experience itself. We are the enabler through which people can engage in the leisure experience they desire. We don’t try to export Hawaii when we go elsewhere, but we do honor the same values in the places we operate hotels and resorts.”

 

 

The firm was embarking in a $315M renovation of the heart of Waikiki that required the leveling of five existing OHANA hotels—almost 2,000 rooms—that required significant investment in asset maintenance. In this area the firm planned to create about 500 rooms—a substantial reduction in room count—with a sizeable retail component. The firm’s real estate ownership in the area totaled 7.9 contiguous acres and, with its biggest real estate investment being in Waikiki, a renewal of the area had benefits beyond the creation of new hotels and retail space. This bold project limited the firm’s ability to expand in the short term, but Outrigger remained committed to growth and expansion once the renovation was completed. Carey explained the rationale for the firm’s growth strategy: “Given our key competencies, expanding to Guam, the Pacific, and Australia was a source-customer or distribution-driven growth strategy. It leveraged both markets where the customers knew us because they had experienced our hotels before and [markets] where we had relationships with global distribution channels.”

 

Outrigger’s senior management felt that its key competencies resifded in providing hospitality to guests visiting their properties and successfully marketing those properties through leisure distribution channels, which before the widespread adoption of the Internet by consumers had accounted for over 80% of travel to Hawaii and other fly-in leisure destinations. To complement these basic competencies, Outrigger felt it had developed a superior capability to manage in a multicultural environment, including multicultural and multilingual employees and guests. Outrigger had its roots in the economy segment of the market, but the firm’s executives believed that it was not feasible to compete on price alone and had begun to focus on service delivery as well to build customer preference. Aided by a turnover rate in the single digits in the tight Hawaii labor market, and an average of 25 years of employee tenure with the company, it implemented a value-based management system that called for upward evaluation of managers and a focus on helping employees understand the principles behind Outrigger’s service delivery strategy. As a testament to the firm’s ability to fulfill its employees’ needs, Outrigger had managed to be a mostly non-union shop in the heavily unionized Hawaii labor market. Carey summarized the firm’s positioning: “We operate properties that have good locations, we have a strong travel distribution network, and our employees really provide hospitality from the heart. That creates a differentiated product making price less important.”

 

Beyond maintenance of the product under capital constraints, at the operational level three dimensions were deemed fundamental for success: providing guests with a rewarding experience and a sense of place, enabling employees to reach their potential and being an integral part of the community. These dimensions were reflected in the firm’s Management Incentive Plan (MIP), structured along three dimensions: Operating Cash Flow, guest satisfaction surveys (using reports produced by the independent research firm Leisure Trends), and employee satisfaction. Beyond these critical success factors within the firm’s control, Outrigger was wedded to the success of its destination markets given the proliferation of competing choices for consumers’ entertainment budgets. Moreover, the firm was dependent on airlines. As leisure decisions became more and more impulse- driven it became more difficult for travelers to find available seats at suitable times and prices. Carey summarized these challenges: “If Hawaii does well, so do we. I spend a lot of time working with local tourism authorities to improve the appeal of the destinations we operate in. But airlines can be a bottleneck. We may not have available lift at times when we need it. If the airlines are full or they have decided in their yield model that they are going to only sell their top fares, there is nothing we can do. From purely the hotels’ perspective, the best thing for us is an airline price war to Hawaii.”

 

The major carriers, those driving the most traffic into Hawaii and the Pacific region, were under constant financial pressures. The events of September 11th 2001 and the recession that had hit the United States had depressed airline travel and had negatively impacted Outrigger’s own financial performance. While the firm had been able to recover from these setbacks and was seeing high occupancies, terrorist threats and alerts remained a significant concern.

 

 

 

 

Outrigger IT Infrastructure

Joe Durocher, the CIO of Outrigger Enterprises, was hired by David Carey in 1986. Durocher recalled his early days with the firm: “Mr. Roy Kelly was a hands-on manager. He once told me he hated two things: computers and vice presidents. As the VP of IT, I had two strikes against me. Yet, in 1986 I was brought in to overhaul Outrigger’s IT infrastructure and we built Stellex—our integrated CRS/PMS. At the time all our properties were in Waikiki, within one square mile of each other.” Stellex, introduced in 1987, was a COBOL application running on a Tandem NonStop platform and a proprietary Enscribe database management system that

guaranteed complete redundancy and 24 x 365 uptime. In 1992 Outrigger introduced Stellex 2.0, its first major update to Stellex, which ran on a Sun Microsystems UNIX platform and provided revenue management functionality and reservation center support. Because of its unique need for substantial wholesale interaction, Outrigger engaged Opus to build their revenue management module for Stellex 2.0. Outrigger retained control of the source code and over the years made substantial enhancements, mainly to manage wholesale relationships. The firm felt that its centralized IT infrastructure was a source of competitive advantage. Durocher discussed the trade-offs associated with centralized IT: “Decentralizing IT would decrease our capabilities while increasing overall costs. But centralized IT creates friction at times. When a hotel is sold for example, the IT allocation may increase for other properties.”

 

Stellex provided the anchor to which all other operational systems, including telephone switches, call accounting, and in-room entertainment, connected. All of the properties in the Hawaiian Islands had access to Outrigger’s centralized IT systems, served from the Honolulu-based data center, through the firm’s proprietary Wide Area Network (Exhibit 6.6).

 

Stellex, for example, was accessed using an ASP model by all the properties in the Hawaiian Islands, the firm’s Denver-based CRO, and the Portland-based Web servers, greatly simplifying the achievement of single image inventory, disaster recovery, and overall IT management. This enabled the properties to operate with PCs (as few as 12 in a typical 500-room property) and networking equipment. The Point of Sales (POS) systems were not centralized, since Outrigger leased retail and restaurant space. This state of affairs generated some friction at times, as Alan White, VP of Property Technology, explained: “We offer to interface their POS to Stellex and pay for interfaces to automate room charges. But many of those POS are old and can’t interface, they must be upgraded first. Restaurants have to write a manual charge voucher and walk it to the front desk for input. It’s not a popular or efficient way to do it.”

 

Due to the need for local support, the high telecommunication costs, and the

reliability of international networks deemed unacceptable, Outrigger had yet to extend this centralized model to its operations in Australia and the Pacific. The properties in Australia and New Zealand, all condominiums, used a highly specialized PMS particularly well suited for strata title properties and their special tax code requirements. Durocher explained: “None of the properties in Hawaii has a server on property. In the outer regions we have standalone PMS’s and on-property reservations. We don’t even try to keep Stellex in sync, they just open and close. If a date is getting full, they issue a stop-sell. Reservations that are taken centrally are automatically e-mailed.”

 

Outrigger’s IT function comprised a staff of twenty-six full time employees, including four data entry operators and three developers housed in a separate limited liability company designed to help Outrigger take advantage of tax incentives offered by the state of Hawaii. One corporate IT professional supported the Australian properties’ application needs. Hardware support was contracted out to local vendors. The function was organized along user needs rather than traditional departmental lines (e.g., data entry, application development, support). Alan White, VP of Property Technology, led the group in charge of creating and supporting IT solutions for the hotels. JoAnn Okawa, Director of Corporate Systems, led the group in charge of creating and supporting IT solutions for the firm’s back-office needs (e.g., general accounting, HR, payroll, purchasing). Bob Owens, Director of System Operations, and his group managed the data center and supported the other two groups. They also performed advisory work for the international properties that had local MIS managers in charge of procuring and managing technology solutions locally. This organization enabled operations personnel to unequivocally ask the Property Technology group for support, while administrative personnel referred to the Corporate Information Service group.

 

The IT function at Outrigger was designated a cost center. Its operations were funded through allocations to the business units and to each property using four different methods. A charge, based on room count, was assessed for use of property technology. The same mechanism was used to account for use of administrative systems. Group sales software (i.e., Newmarket’s Delphi) was charged based on each property’s meeting space. Finally, any ad-hoc solution (e.g., the writing of a specialized report) was charged directly to the requesting unit. Traditional metrics to measure success (e.g., on-time and on-budget project delivery) were used, and the IT function had recently introduced service level agreements. Durocher explained the rationale for the decision: “Service level agreements enable the management of expectations, increase accountability, and offer choice to user-managers. If you feel you are paying too much, you can reduce your allocation accepting less service. Or you can request more service

and we’ll adjust your charge. Of course, we still get some of the ‘I want more service but I don’t want to pay for it.’”

 

Beyond maintaining and upgrading Stellex, Outrigger’s IT professionals engaged in minimal application development—mainly writing customized reports, and configuring and interfacing off-the-shelf applications. Outrigger had implemented JD Edwards ERP as the cornerstone of its back-office operations in 1990, years before the ERP craze swept the business world. JD Edwards ran on an IBM AS 400—a very mature and stable platform. The use of outsourcing was limited to the Web site, developed and hosted by a third party in Portland, Oregon. Yet, in order to maintain the integration of direct channels, Stellex served as the Web site’s booking engine through an XML interface that Outrigger’s IT group used as the proof of concept for the interfaces with wholesalers—a key initiative for Outrigger. Durocher explained: “With many wholesalers we have real-time electronic interfaces—they can check availability and we get their reservations instantaneously. Without the interface, if they create a reservation six or three months out, we don’t see it until reporting time, ten days out, when we receive a fax and manually input it. It is virtually impossible to revenue manage like that. Many big brands have great revenue management systems, but don’t have real-time wholesaler data. Moreover, we can write wholesale contracts brand-wide.”

 

Outrigger felt that its electronic interfaces afforded it a competitive advantage and preferential treatment from interface-enabled wholesalers, a relationship that proved particularly important during slow periods or a soft economy. Electronic interfaces generated substantial efficiencies, including automatic billing and invoicing without human handling, lowering estimated costs to $0.75 from an estimated $10 for manually handled ones. But not all wholesalers were able or interested in automating reservation processing. This was particularly true for small operations or those for whom Hawaii and the Pacific represented a small percentage of business. Solomon summarized the challenge: “The industry is a mess from a connectivity standpoint. We are fortunate that we have the in-house expertise and the recognition from senior management of how important this is. Even the big companies often don’t understand the conditions for success. The dirty little secret of the travel industry is that the fax machine still rules.” White added: “I spend 30–40 hours a week working with wholesalers on interfaces. There are many legacy systems out there; the fax is state of the art. We have made great progress with the more advance wholesalers or those that upgraded recently.”

 

Outrigger found the Open Travel Alliance (OTA) XML standards, specifying common message format and common content, of great help. But being able to

pick the right partner, and avoid costly failures, remained the major challenge. While Outrigger felt it had been successful to date, with an estimated 33% of total reservations received electronically through the various channels, it still handled more than half a million faxes a year—about eight hundred a day from its largest wholesaler alone before its recent migration to the electronic interface. The firm had recently acquired business intelligence software, a data mart, and analytical tools from E.piphany running on a Windows 2000 platform. The data mart held detailed data for three years, enabling analysis down to the individual guest folio. Data were consolidated afterwards, enabling only aggregate analyses. While E.piphany was a recent purchase, Outrigger had been disciplined in collecting data for some time. White explained: “We had 10 years of high quality data from Stellex; we are very rigid about data capture standardization like room category, naming conventions, request codes, [and] what goes where. For example, postal and country codes are mandatory fields. Our employees’ long tenure helps, and peer pressure is a great asset—nobody wants to be the one that ruins the value of these reports for all.”

 

 

IS Assessment

 

Outrigger’s senior executives found technology to be a great asset to enable communication, as Outrigger’s operations spanned 11 time zones, and felt confident that the IT function was enabling the firm to compete effectively. Carey indicated: “We think that our IT capability in the leisure travel space exceeds the major chains and we have an ability to implement things very quickly. [That’s] the advantage of being small.” The IT function was thought to be able to operate more efficiently than the competition, often offering the same level of service with one or no property- level IS professionals when the competition needed three to six. Outrigger also felt that its size enabled it to move faster than the competition. Bob Owns, Director of Systems/Operations, explained: “We don’t do anything slow here. Major systems in other firms take a year to plan, a year in committees that assign responsibilities, and two or three years to build. A year is a really along time here to develop and implement anything. But we are not a huge company, and capital is a constraint, so we are always challenged to get way ahead of the curve, speculate, and build with a forward thinking mentality. You don’t get bored here.” As the firm was expanding aggressively, and had yet to find an integrated solution for its international properties, some questioned the viability of reinvesting in Stellex. Its rapid geographical and product growth notwithstanding, the IS group felt that its legacy technology—specifically its mature ERP, integrated PMS/CRS, and electronic interfaces with distribution partners—was serving the firm well. White explained: “Stellex is 18 years old. So three years ago we developed the business case for PMS and CRS functionalities. We could not find anything better, with one exception—Stellex is a green screen application that needs a windows GUI.”

 

The firm was prompted to re-evaluate the role of Stellex after a failed attempt

to migrate to a more modern platform thought to simplify connectivity with the other off-the-shelf computer systems in the portfolio. After testing in two properties over an eight month period the project was aborted, principally blaming the difficulty in effectively managing wholesale relationships and billing manually with the new PMS. Outrigger engaged in limited formal technology training and relied mainly on on-the-job training when it came to software applications. While this created difficulties for people who were hired from outside the firm, Sorenson explained: “Our people have been working with Stellex so long that they have effective workarounds when necessary, and we have very low employee turnover. If someone new comes in we have many experienced employees to help them; this makes training easier.”

 

As guests became used to ever increasing technology choices and availability both at home and on the road, even resorts focused on the leisure traveler felt the pressure to provide it to guests—whether they used it or not. But for a mid-size company like Outrigger, chasing the technology curve could be dangerous. Agas articulated the challenge: “Our guests say: ‘I do wireless at home, why can’t I do it here?’ As a company we use our buying power to do what’s best for the company. But as two beachfront properties with guests paying the highest ADR and expecting more, sometimes we are held back when it gets to technology as we explore what is best for all.”

 

 

The Future

 

Outrigger’s senior management felt that the firm could leverage its hospitality and marketing expertise, as well as big brand name recognition, by entering into management agreements with third party owners and large brands. While it remained committed to growing and strengthening the Outrigger family of brands, it also had plans to engage in this type of partnership. Another important trend affecting Outrigger’s future strategy was the rapidly changing hospitality distribution landscape and the role of the retail travel agent. Travel agents had historically provided significant amounts of information, counseling, and reassurance to leisure travelers, but more and more consumers were now turning to the Internet for this information. This presented Outrigger with the challenge of populating the new electronic world. The emergence of powerful online agencies (e.g., Expedia, Orbitz) was creating significant opportunities and threats. Carey captured them: “We have grown up with wholesalers; we know how to yield manage the merchant model. The major

chains are not yet embracing the capabilities of the internet. They look at Internet bookings through third party providers as a threat. We see it as just another wholesaler; we know how to revenue manage the merchant model. We all must recognize the consumer’s desire to shop before they buy. The single web site solution will not work in my opinion.”

 

This was particularly true with wholesalers using electronic interfaces. With these partners, Outrigger was able to open and close rates dynamically. Yet, questions remained as to the long term effects that powerful online intermediaries were having on customer loyalty and brand preference. As some senior managers put it: “Whose customer is it, Expedia’s or ours?” For a company with relatively small scale and a niche positioning, the commoditization threat could be quite dangerous. Durocher summarized the challenge: “In the days of Mr. Kelley and Dr. Kelley, Waikiki was running at 98% occupancy annually. Get the reservations in accurately was the main concern. That world has changed, now we compete in mature destinations.”

 

With the increasing competition in its key markets, Outrigger felt that strengthening electronic relationships with distributors, improving its trademark hospitality and customer service, better managing inventory yield, and better integrating its international properties were crucial stepping-stones to the firm’s continued success. The right information systems strategy was crucial to enabling these goals.

 

Discussion Questions

1. . What is Outrigger Hotels and Resorts’ strategic position? What are its strengths and weaknesses? What are the firm’s Critical Success Factors (CSF)?

 

2. How well are current IS resources serving the needs of Outrigger Hotels and Resorts?

 

3. What should be, in your opinion, the role of the IS function at Outrigger Hotels and Resorts?

 

4. Can you articulate both the IS vision and guidelines for the firm?

 

5. Based on your proposed IS plan for Outrigger Hotels and Resorts, what strategic initiatives would you propose?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

MIPS Pipelined Cpu Design

Penn  State  University          School  of  Electrical  Engineering  and  Computer  Science                                    Page  1  of  5

CMPEN  331  –  Computer  Organization  and  Design,

Lab  4   Due  Wednesday  April  5,  2017  at  7:0  am  (Drop  box  on  Canvas)

This lab introduces the idea of the pipelining technique for building a fast CPU. The students will obtain experience with the design implementation and testing of the first two stages (Instruction Fetch, Instruction Decode) of the five-stage pipelined CPU using the Xilinx design package for FPGAs. It is assumed that students are familiar with the operation of the Xilinx design package for Field Programmable Gate Arrays (FPGAs) through the Xilinix tutorial available in the class website.

1.   Pipelining Pipelining is an implementation technique in which multiple instructions are overlapped in execution. The five- stage pipelined CPU allows overlapping execution of multiple instructions. Although an instruction takes five clock cycle to pass through the pipeline, a new instruction can enter the pipeline during every clock cycle. Under ideal circumstances, the pipelined CPU can produce a result in every clock cycle. Because in a pipelined CPU there are multiple operations in each clock cycle, we must save the temporary results in each pipeline stage into pipeline registers for use in the follow-up stages. We have five stages: IF, ID, EXE, MEM, and WB. The PC can be considered as the first pipeline register at the beginning of the first stage. We name the other pipeline registers as IF/ID, ID/EXE, EXE/MEM, and MEM/WB in sequence. In order to understand in depth how the pipelined CPU works, we will show the circuits that are required in each pipeline stage of a baseline CPU.

2.   Circuits of the Instruction Fetch Stage The circuit in the IF stage are shown in Figure 2. Also, looking at the first clock cycle in Figure 1(b), the first lw instruction is being fetched. In the IF stage, there is an instruction memory module and an adder between two pipeline registers. The left most pipeline register is the PC; it holds 100. In the end of the first cycle (at the rising edge of clk), the instruction fetched from instruction memory is written into the IF/ID register. Meanwhile, the output of the adder (PC + 4, the next PC) is written into PC.

3.   Circuits of the Instruction Decode Stage Referring to Figure 3, in the second cycle, the first instruction entered the ID stage. There are two jobs in the second cycle: to decode the first instruction in the ID stage, and to fetch the second instruction in the IF stage. The two instructions are shown on the top of the figures: the first instruction is in the ID stage, and the second instruction is in the IF stage. The first instruction in the ID stage comes from the IF/ID register. Two operands are read from the register file (Regfile in the figure) based on rs and rt, although the lw instruction does not use the operand in the register rt. The immediate (imm) is sign- extended into 32 bits. The regrt signal is used in the ID stage that selects the destination register number; all others must be written into the ID/EXE register for later use. At the end of the second cycle, all the data and control signals, except for regrt, in the ID stage are written into the ID/EXE register. At the same time, the PC and the IF/ID register are also updated.

 

 

Penn  State  University          School  of  Electrical  Engineering  and  Computer  Science                                    Page  2  of  5

 

Figure 1 Timing chart comparison between two types of CPUs

 

Figure 2 Pipeline instruction fetch (IF) stage

 

 

Penn  State  University          School  of  Electrical  Engineering  and  Computer  Science                                    Page  3  of  5

 

 

Figure 2 Pipeline instruction decode (ID) stage

 

4.   Table 1 lists the names and usages of the 32 registers in the register file.

Table 1 MIPS general purpose register

 

$zero 0 Constant 0 $at 1 Reserved for assembler $v0, $v1 2, 3 Function return values $a0 – $a3 4 – 7 Function argument values $t0 – $t7 8 – 15 Temporary (caller saved) $s0 – $s7 16 – 23 Temporary (callee saved) $t8, $t9 24, 25 Temporary (caller saved) $k0, $k1 26, 27 Reserved for OS Kernel $gp 28 Pointer to Global Area $sp 29 Stack Pointer $fp 30 Frame Pointer $ra 31 Return Address

 

5.   Table 2 lists some MIPS instructions that will be implemented in our CPU

Table 2 MIPS integration instruction

 

 

 

Penn  State  University          School  of  Electrical  Engineering  and  Computer  Science                                    Page  4  of  5

 

6.   Initialize the first 10 words of the Data memory with the following HEX values:

A00000AA 10000011 20000022 30000033 40000044 50000055 60000066 70000077 80000088 90000099

7.   Write a Verilog code that implement the following instructions using the design shown in Figure 2 and Figure 3.

Write a Verilog test bench to verify your code: (You have to show all the signals written into the IF/ID register and the ID/EXE register in your simulation outputs)

# address instruction comment 100: lw $v0, 00($at) # $2 ß memory[$1+00]; load x[0] 104: lw $v1, 04($at) # $3 ß memory[$1+04]; load x[1] Assume that the register $at has the value of 0

8.   Write a report that contains the following:

a.   Your Verilog design code. Use: i.   Device: XC7Z010- -1CLG400C

b.   Your Verilog® Test Bench design code. Add “`timescale 1ns/1ps” as the first line of your test bench file.

 

 

Penn  State  University          School  of  Electrical  Engineering  and  Computer  Science                                    Page  5  of  5

c.   The waveforms resulting from the verification of your design with ModelSim showing all the signals written into the IF/ID register and the ID/EXE register.

d.   The design schematics from the Xilinx synthesis of your design. Do not use any area constraints. e.   Snapshot of the I/O Planning and f.   Snapshot of the floor planning

9.   REPORT FORMAT: Free form, but it must be:

g.   One report per student. h.   Have a cover sheet with identification: Title, Class, Your Name, etc. i.   Using Microsoft word and it should be uploaded in word format not PDF. If you know LaTex, you should

upload the Tex file in addition to the PDF file. j.   Double spaced

10.  You have to upload the whole project design file zipped with the word file.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

What Is The Impact Of Rapid Environmental Changes On Organizations?

Response of 100-150words required for below Student Discussion

 

Environment is an external force that gives out so much to the humans and to the organizations as well. For any type of company like, manufacturing or IT companies need the basic materials that is provided by the nature. Land, water and food is extracted from the environment by organizations in order to vary out the operations and bring out the final product. Environment provides an opportunity for the organization to improve their performance. But on the other hand, extracting too much of resources from the environment will lead to threat. Scarcity of resources results in environmental changes and thus increasing the complexity. Now a days the manufacturing industries are polluting the environment either by releasing the hazardous gas in to the atmosphere, dump the waste directly in to the water or throwing away the waste on land. Polluting environment is leading to global warming.

Some of the damages caused by the organizations are mentioned below:

1. The buildings of an organization use electric full 24 hours, 7 days a week even when no one is working.

2. Paper that is being used in abundance at companies are manufactured by cutting trees.

3. Some equipment end up in landfills releasing chemicals in to the land and water.

4. The heater and air conditioner used in the office set up, releases a gas in to the atmosphere leading to air pollution.

Environment is the pillar of an organization, without it’s support, it is impossible to create and operate goods and services. So, it is necessary to conserve, plants, animals and other natural resources.

 

References: How Businesses Affect the Environment. (2016, March 27). Dummies.  https://www.dummies.com/home-garden/green-living/how-businesses-affect-the-environment/

Edwards, J. (2014, September 12). The Relationship between an Organization and Its Environment – Mastering Strategic Management – 1st Canadian Edition. Pressbooks. https://opentextbc.ca/strategicmanagement/chapter/the-relationship-between-an-organization-and-its-environment/

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Exploring Excel Project

Exploring Excel 2013 Project

80 Marks = __/15%

DUE: Week 7 eCentennial Dropbox

 

 

RESTAURANT ANALYSIS:

 

Assume you are a restaurant manager. You are considering entering into a long-term agreement with a poultry company and planning to purchase a new refrigeration unit to store the chicken. If you enter into this agreement, the poultry company agrees to provide a substantial discount for a specified period of time. You would like to stimulate sales for the lowest revenue producing chicken item on the menu as well as any chicken items not meeting a sales performance threshold. Thus, some of this savings will be passed on to the guests by placing these chicken items on sale.

 

TASKS:

 

Name the Lookup Table – 4 marks

 

a) Start Excel and Open the Sales V?.xlsx file provided by your professor. Ensure you open and complete the version assigned to you, otherwise you may not receive a grade for this project. Save As Sales_YourName (where YourName is replaced by your first and last name).

b) Make the Lookup Table worksheet the active sheet. Enter reasonable Prices in the B column for each of the Menu Items. Assign the name Price to the range containing menu items and price.

 

Insert Functions and Formulas – 22 marks

 

You need to compare the projected sales quantities to the actual sales quantities over a four month period. Notice that data on the ChickenSales worksheet in range A15:E208 contains four months of actual sales quantities for each menu item. Whereas, the range A24:E29 contains the sales projections made for the same four months prior to the start of each month.

 

a) Make the ChickenSales worksheet the active sheet. Wrap text in the range A5:I5 to make the column headings understandable. Ensure row height and column widths are set so as to display cell contents.

b) In Cell B6 enter a formula to calculate the total Projected Sales Quantity for this menu item over the four months.

c) In Cell C6 enter a formula to calculate the total Actual Sales Quantity for this menu item over the four months.

d) In Cell D6 enter a formula to calculate the average Actual Sales Quantity over the four months.

e) In Cell E6 enter a formula to calculate the price of the menu item by looking up the price of the menu item from within the Price range.

f) In Cell F6 enter a formula to calculate the Total Revenue on each menu item based upon the Total Qty Sold and the Price of the menu item.

g) In Cell G6 enter a formula to calculate the percentage of Total Qty Projected sales that were actually sold (Total Qty Sold). For example, maybe 92% of the Total Qty Projected was actually sold.

h) In Cell H6 enter use a logical function in a formula to determine which menu item has the highest Total Revenue. For the menu item that has the highest revenue enter the words Best Item and for all other menu show a blank cell.

i) In Cell I6 enter a logical function in a formula to determine which items will be put on sale next in order to stimulate sales. An item should be put on sale if its % of Projection is less than the Sale Threshold in Cell L4. An item should also be put on sale if its Sales Revenue is the lowest. Leave the cell bank for items that are not put on sale.

j) Copy the formulas and functions down their respective columns.

k) In Cell L7 enter a formula that display the number of days between the Start of the sale and the End of the sale. The Start and End dates have been provided by the poultry company and are entered in Cells L7 and L8.

 

Determine Loan Payments – 8 marks

 

You will need a loan in order to purchase a new refrigeration unit to store the poultry. You wish to make quarterly payments (4 payments per year) toward your loan repayment. You will then want to see how these payments will vary based on the number of years to repay and varying interest rates.

 

a) Click on the Poultry Loan worksheet tab. Use a financial function in a formula in Cell C12 to calculate the loan payment amount given the loan amount in Cell C6 and the annual interest rate in Cell B12. Use the appropriate relative, mixed, and/or absolute cell references in the formula.

b) Copy the formula to Cells C13 and C14. The formula in C12 will reference the B12 interest rate, but when you copy the formula to C13 the formula should change to reference the B13 interest rate. Similarly, for C14 referencing the B14 interest rate.

c) Copy the formula to Cells D12 and E12. The formula in C12 will reference the C11 year, but when you copy the formula to D12 the formula should change to reference the D11 year. Similarly, for E12 referencing the E11 year.

d) Complete copying the formula to Cells D13:E14 and ensure the interest rate cell references and the year cell references change accurately.

 

Set File Properties – 6 marks

 

You need to set some details about the workbook.

 

a) In the File, Properties, enter a Title for this Workbook RestaurantName Sales (where RestaurantName is the name you have chosen for the restaurant).

b) In the File Properties, enter a Tag for this Workbook YourFirstandLastNames, Manager (where YourFirstandLastNames is your first and last names and Manager is your job title).

c) Under File, Properties enter your first and last name as Author. You may need to adjust the File, Options for your name to appear as Author.

 

Format Data – 18 marks

 

You need to format the titles and numeric data in the ChickenSales sheet. In addition, you want to freeze the column labels so that they do not scroll offscreen. You also want to apply conditional formatting to emphasize values above the average value.

 

a) Create a name for this restaurant and a company logo (image file). Insert your company logo (image file) into the ChickenSales and PoultryLoan worksheets and place the top-right corner of the logo in cell A1. Ensure the logo does not overlap other content. Ensure the logo is the same size on both worksheets.

b) On the ChickenSales worksheet, merge and center the main title Chicken Sales Analsys, across the Menu Item table. Format the title in a larger font and fill the cell with colour.

c) Move the date cells (C4:D4) to H1:I1.

d) Apply Currency number format to the monetary values in columns E and F.

e) Format the Avg Monthly Qty Sold values with one decimal place.

f) Freeze column A so it does on scroll offscreen.

g) Apply conditional formatting to values in the Total Revenue column. When a cell’s value is greater than the average of the values in the column the cell fills with colour.

h) Change the dark purple formatting on the column headings on the ChickenSales worksheet to some other colour(s) that better suit your company logo and company colours. Ensure the cell contents fits the cell and is clearly seen.

i) Click on the PoultryLoan worksheet. You would like to use the repayment option that keeps the quarterly payment amount under $2000, has the shortest term, and the lowest interest rate. Locate the Cell that meets these conditions and add a Comment saying Winner! (or something of that sort).

 

Create Sparklines and Insert a Chart – 6 marks

 

You will create a chart comparing the total revenue for each menu item, and you will insert sparklines to display trends over a four-month period of time.

a) On the ChickenSales worksheet create Sparklines (lines or columns) in Cells F15:F20 to display four-month trends for actual sales for each menu item. Show the high point in each sparkline. Apply a Sparkline Style of your choice.

b) Create a Chart comparing the Total Revenue for each of the Menu Items. Select any one of Pie, Line, or Bar chart type.

c) Position the Chart beside the Actual Sales Quantities area and ensure it does not extend past column P. Apply any Chart Style to this Chart. Change the Chart Title to Chicken Sales Revenue by Menu Item.

 

Sort and Filter the Data – 16 marks

 

To preserve the integrity of the original data, you copy the worksheet. You will then convert the data in the copies worksheet to a table, and apply a table style, sort and filter the data, and then display totals.

 

a) Copy the ChickenSales sheet and place the copied sheet at the end of the workbook.

b) Remove the conditional formatting rule on the ChickenSales (2) sheet.

c) Convert the data in the Menu Item area in the ChickenSales (2) sheet to a table.

d) Sort the table by % of Projection in ascending order.

e) Apply a filter to display the top 5 performers only.

f) Display a total row. Add totals for columns B, C, and F.

g) On the ChickenSales worksheet, create a footer with the file name code on the left side, your name in the center, and the sheet tab code on the right side.

h) On the ChickenSales worksheet, apply 0.5” (1.25 cm) left and right margins. Scale to fit on one page. Select Landscape orientation. Preview to ensure all is set correctly.

 

Save the workbook. Close the workbook and exit Excel. Submit the workbook as directed by your instructor.

 

Congratulations! You have completed the project.

COMP126 Exploring Excel Project Page 1 of 4

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Research And Critical Analysis Oct 3

 

1. Protecting Online Privacy for Individuals or Cyber bullying on Social Media

2. The Impact of Social Media on Brand Reputation

3. Succession Planning and Development of Leadership or Diversity and Inclusion at the work place

4. Artificial intelligence fairness and bias in automated decisions making system

 

COMPLETED THE PREVIOUS ASSIGNMENT and gained approval of a research question

2.Found 3 or 4 RESEARCH ARTICLES using the method taught in the video in this week’s folder

For this assignment, follow the directions CAREFULLY: 

Step 1: Download the EXCEL document below 

HOW, WHAT, who, when, where, why

Step 2: Fill in ONLY the BLUE portions

(If you have answers for how and what, your article IS a research article; if not, please go back to find one)

Submit the complete form here.

Sheet1

Research Articles
WHO conducted the research (authors of article) WHEN year research was conducted (within last 10 years) WHERE the research was conducted WHY was the research conducted HOW the research was conducted (NAME the METHODOLO-GY) HOW the research was conducted (DESCRIBE the PROCESS) WHAT the reseachers learned – results Link to article
News articles and websites
Who wrote it? rationale for inclusion When was the article written (within the last 5 years) Link to article/site
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Your Boss Mentions That Recently A Number Of Employees Have Received Calls From Individuals Who Didn’t Identify Themselves And Asked A Lot Of Questions About The Company And Its Computer Infrastructure.

Week 1 Discussion Question

Your boss mentions that recently a number of employees have received calls from individuals who didn’t identify themselves and asked a lot of questions about the company and its computer infrastructure. At first, he thought this was just a computer vendor who was trying to sell your company some new product, but no vendor has approached the company. He also says several strange e-mails requesting personal information have been sent to employees, and quite a few people have been seen searching your company’s trash dumpsters for recyclable containers. Your boss asks what you think about all of these strange incidents. Respond and be sure to provide recommendations on what should be done about the various incidents.

Directions:

· Students are required to post one original response to the discussion questions each week, as well as a response to one classmate. Original responses should not be a word for word rehashing of what is stated in the readings, but rather an integration of the concepts and additional insights, either from real world experience or additional sources. It should be a 250 word response to the question each week by 11 p.m. on Wednesday evening. Your primary posting may end with a tag-line or a related question of your own. Between 1 a.m. on Thursday and 11 p.m. on Saturday, you should have done your secondary posting. Your secondary posting is a response to one classmate’s post. Each answer/response should be supported with research. Responses to classmates should not be “I agree” or “I like the way you stated that.” These responses should again be insightful, offering an opinion or facts based on your research and experiences. The response to one classmate should be a minimum of 125 words. See APA criteria for citing resources. You must provide a minimum of a reference, in APA format, in your original response.

 

 

Discussion Provided is below : Needed response for the below as well

 

Discussion 1

by Sudheer Reddy Tokala – Saturday, 7 July 2018, 4:24 AM

 

From the discussion, it is obvious that an outsider is trying to fetch the company’s sensitive information in multiple ways. It is clear that the outsider is doing an identity theft, pretending as a computer vendor, using phishing method to fetch information about the company’s employees and also looking for the physical company related documents in the company’s dumpster.

Thus, an organization should must maintain and follow various security measures in order to protect its data. Similarly, in this discussions scenario, the company has to take the following measures to avoid any data and security breaches:

1. The company should train every individual, not to disclose any of the company’s information, until the caller is identified. In the given scenario, it is clear that the company is not expecting any calls from the computer vendor. So, any person who is taking the call must verify the caller and must contact his/her supervisor about the caller, before disclosing the company’s infrastructure. The company should also implement the role based access controls, which means, not every person has access to all the information (sans.org, 2016).

2. In order to avoid any security threats via emails, the company should have a strong firewall and should filter any suspicious emails from the unknown senders and/or categorize them as spam. The company should bring the awareness among the employees regarding the possible security threats and train them on how to react to those threats. The network team should scan the company’s network more often to identify the vulnerabilities and constantly apply the security patches and updates (waterisac.org, 2016).

3. Employees must shred any document that may contain any sensitive information about any individual or company before disposing them into recyclable containers.

Finally, no matter how complex and secure infrastructure the company maintains, the security threats are inevitable, in one way or the other. So, its organization’s responsibility to keep its infrastructure and its employees and customer’s data secure from the vast forms of security threats in this, always evolving, world.

References

Laskov, P. (2018). Introduction to Computer Security: Security Principles, Vulnerabilities and Threats. Retrieved from,

http://www.ra.cs.uni-tuebingen.de/lehre/ss11/introsec/02-principles.pdf

sans.org. (2016). Guarding Beyond the Gateway: Challenges of Email Security. Retrieved from,

https://www.sans.org/reading-room/whitepapers/analyst/guarding-gateway-challenges-email-security-36597

waterisac.org. (2016). 10 Basic Cybersecurity Measures: Best Practices to Reduce Exploitable Weakness and Attacks. Retrieved from,

https://www.waterisac.org/sites/default/files/public/10_Basic_Cybersecurity_Measures-WaterISAC_Oct2016%5B2%5D.pdf

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

CCNA: Scaling Networks Skills Assessment (EIGRP & OSPFv2) – Hands On Skills Assessment

Cisco NetAcad_Header(Vertical)-01

CCNA: Scaling Networks SA Exam

CCNA: Scaling Networks

Skills Assessment (EIGRP & OSPFv2) – Hands On Skills Assessment

 

Topology

EIGRPtopology

Addressing Table

Device Interface IP Address Subnet Mask Default Gateway
R1 G0/1 172.27.0.1 255.255.255.0 N/A
  S0/0/0 172.27.123.1 255.255.255.252 N/A
  Lo1 172.27.1.1 255.255.255.0 N/A
  Lo2 172.27.2.1 255.255.255.0 N/A
  Lo3 172.27.3.1 255.255.255.0 N/A
R2 S0/0/0 172.27.123.2 255.255.255.252 N/A
  S0/0/1 172.27.123.5 255.255.255.252 N/A
  Lo0 209.165.200.225 255.255.255.248 N/A
R3 G0/1 172.27.0.3 255.255.255.0 N/A
  S0/0/1 172.27.123.6 255.255.255.252 N/A
  Lo4 172.27.4.1 255.255.255.0 N/A
  Lo5 172.27.5.1 255.255.255.0 N/A
  Lo6 172.27.6.1 255.255.255.0 N/A
S1 VLAN 1 172.27.0.11 255.255.255.0 172.27.0.2
S2 VLAN 1 172.27.0.12 255.255.255.0 172.27.0.2
S3 VLAN 1 172.27.0.13 255.255.255.0 172.27.0.2
PC-A NIC 172.27.0.21 255.255.255.0 172.27.0.2
PC-B NIC 172.27.0.22 255.255.255.0 172.27.0.2
PC-C NIC 172.27.0.23 255.255.255.0 172.27.0.2

Assessment Objectives

Part 1: Initialize Devices (2 points, 5 minutes)

Part 2: Configure Device Basic Settings (5 points, 30 minutes)

Part 3: Configure LAN Redundancy and Link Aggregation (6 points, 25 minutes)

Part 4A: Configure EIGRP for IPv4 Dynamic Routing Protocol (8 points, 30 minutes)

Part 4B: Configure OSPFv2 Dynamic Routing Protocol (8 points, 30 minutes)

Part 5: Verify Network Connectivity and HSRP Configuration (6 points, 15 minutes)

Part 6: Display IOS Image and License Information (5 points, 5 minutes)

Scenario

In this Skills Assessment (SA), you will create a small network. You must connect the network devices, and configure those devices to support IPv4 connectivity, LAN redundancy, and link aggregation. You will then configure EIGRP and OSPFv2 for IPv4 on the network and verify connectivity and HSRP. Finally, you will demonstrate your knowledge of IOS images and licensing.

Required Resources

3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)

3 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)

3 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)

Console cable to configure the Cisco IOS devices via the console ports

Ethernet and Serial cables as shown in the topology

Initialize Devices

Total points: 2

Time: 5 minutes

Initialize and reload the routers and switches.

Erase the startup configurations and reload the devices.

Before proceeding, have your instructor verify device initializations.

Task IOS Command Points
Erase the startup-config file on all routers. R1# erase startup-config 2
Reload all routers. R1# reload  
Erase the startup-config file on all switches and remove the old VLAN database. S1# erase startup-config

S1# del vlan.dat

 
Reload all switches. S1# reload  
Verify VLAN database is absent from flash on all switches. S1# show flash  

Points: __________ of 2

Configure Device Basic Settings

Total points: 5

Time: 30 minutes

Configure R1.

Configuration tasks for R1 include the following:

Configuration Item or Task Specification Points
Disable DNS lookup no ip domain lookup .5
Router name hostname R1  
Encrypted privileged EXEC password enable secret class  
Console access password line con 0

password cisco

login

 
Telnet access password line vty 0 4

password cisco

login

 
Encrypt the plain text passwords. service password-encryption  
MOTD banner banner motd @ Unauthorized Access is

Prohibited! @

 
Interface G0/1 interface g0/1

description Connection to S1

ip address 172.27.0.1 255.255.255.0

no shutdown

 
Interface S0/0/0 interface s0/0/0

description Connection to R2

ip add 172.27.123.1 255.255.255.252

clock rate 128000

no shutdown

 
Interface Loopback 1 (LAN) interface lo1

ip address 172.27.1.1 255.255.255.0

 
Interface Loopback 2 (LAN) interface lo2

ip address 172.27.2.1 255.255.255.0

 
Interface Loopback 3 (LAN) interface lo3

ip address 172.27.3.1 255.255.255.0

 

Configure R2.

Configuration tasks for R2 include the following:

Configuration Item or Task Specification Points
Disable DNS lookup no ip domain lookup 1
Router name hostname R2  
Encrypted privileged EXEC password enable secret class  
Console access password line con 0

password cisco

login

 
Telnet access password line vty 0 4

password cisco

login

 
Encrypt the plain text passwords. service password-encryption  
MOTD banner banner motd @ Unauthorized Access is

Prohibited! @

 
Interface S0/0/0 interface s0/0/0

description Connection to R1

ip add 172.27.123.2 255.255.255.252

no shutdown

 
Interface S0/0/1 interface s0/0/1

description Connection to R3

ip add 172.27.123.5 255.255.255.252

clock rate 128000

no shutdown

 
Interface Loopback 0 (Simulated Internet connection) description Connection to Internet

ip address 209.165.200.225

255.255.255.248

 
Default route ip route 0.0.0.0 0.0.0.0 lo0  

Configure R3.

Configuration tasks for R3 include the following:

Configuration Item or Task Specification Points
Disable DNS lookup no ip domain lookup 1
Router name hostname R3  
Encrypted privileged EXEC password enable secret class  
Console access password line con 0

password cisco

login

 
Telnet access password line vty 0 4

password cisco

login

 
Encrypt the plain text passwords. service password-encryption  
MOTD banner banner motd @ Unauthorized Access is

Prohibited! @

 
Interface G0/1 interface g0/1

description Connection to S3

ip address 172.27.0.3 255.255.255.0

no shutdown

 
Interface S0/0/1 interface s0/0/1

description Connection to R2

ip add 172.27.123.6 255.255.255.252

no shutdown

 
Interface Loopback 4 (LAN) interface lo4

ip address 172.27.4.1 255.255.255.0

 
Interface Loopback 5 (LAN) interface lo5

ip address 172.27.5.1 255.255.255.0

 
Interface Loopback 6 (LAN) interface lo6

ip address 172.27.6.1 255.255.255.0

 

Configure S1.

Configuration tasks for S1 include the following:

Configuration Item or Task Specification Points
Disable DNS lookup no ip domain lookup 1
Switch name hostname S1  
Encrypted privileged EXEC password enable secret class  
Console access password line con 0

password cisco

login

 
Telnet access password line vty 0 15

password cisco

login

 
Encrypt the plain text passwords. service password-encryption  
MOTD banner banner motd @ Unauthorized Access

is Prohibited! @

 
Assign an IPv4 address to the default SVI. interface vlan 1

ip address 172.27.0.11 255.255.255.0

no shutdown

 
Assign the default-gateway. ip default-gateway 172.27.0.2  
Force trunking on Interfaces connected to S2 and S3. interface range f0/1-4

switchport mode trunk

switchport trunk native vlan 1

Note: VLAN 1 is the native VLAN by

default, the previous command is not

necessary.

 
Disable the Dynamic Trunking Protocol (DTP) on all other ports. interface range f0/5-24, g0/1-2

switchport mode access

Note: The switchport nonegotiate

command may have also been

issued, this is not incorrect but it is

important that these ports have been

changed to access ports.

 
Shutdown all unused ports. interface range f0/7-24, g0/1-2

shutdown

 

Configure S2.

Configuration tasks for S2 include the following:

Configuration Item or Task Specification Points
Disable DNS lookup no ip domain lookup .5
Switch name hostname S2  
Encrypted privileged exec password enable secret class  
Console access password line con 0

password cisco

login

 
Telnet access password line vty 0 15

password cisco

login

 
Encrypt the clear text passwords. service password-encryption  
MOTD banner banner motd @ Unauthorized Access

is Prohibited! @

 
Assign an IPv4 address to the default SVI. interface vlan 1

ip address 172.27.0.12 255.255.255.0

no shutdown

 
Assign the default-gateway. ip default-gateway 172.27.0.2  
Force trunking on Interfaces connected to S1 and S3. interface range f0/1-4

switchport mode trunk

switchport trunk native vlan 1

Note: VLAN 1 is the native VLAN by

default, the previous command is not

necessary.

 
Disable the Dynamic Trunking Protocol (DTP) on all other ports. interface range f0/5-24, g0/1-2

switchport mode access

Note: The switchport nonegotiate

command may have also been

issued, this is not incorrect but it is

important that these ports have been

changed to access ports.

 
Shutdown all unused ports. interface range f0/5-17, f0/19-24,

g0/1-2

shutdown

 

Configure S3

Configuration tasks for S3 include the following:

Configuration Item or Task Specification Points
Disable DNS lookup no ip domain lookup .5
Switch name hostname S3  
Encrypted privileged EXEC password enable secret class  
Console access password line con 0

password cisco

login

 
Telnet access password line vty 0 15

password cisco

login

 
Encrypt the plain text passwords. service password-encryption  
MOTD banner banner motd @ Unauthorized Access

is Prohibited! @

 
Assign an IPv4 address to the default SVI. interface vlan 1

ip address 172.27.0.13 255.255.255.0

no shutdown

 
Assign the default-gateway. ip default-gateway 172.27.0.2  
Force trunking on Interfaces connected to S1 and S2. interface range f0/1-4

switchport mode trunk

switchport trunk native vlan 1

Note: VLAN 1 is the native VLAN by

default, the previous command is not

necessary.

 
Disable the Dynamic Trunking Protocol (DTP) on all other ports. interface range f0/5-24, g0/1-2

switchport mode access

Note: The switchport nonegotiate

command may have also been

issued, this is not incorrect but it is

important that these ports have been

changed to access ports.

 
Shutdown all unused ports. interface range f0/6-17, f0/19-24,

g0/1-2

shutdown

 

 

Configure IPv4 addresses on PCs.

Configuration Item or Task Specification Points
Configure static IPv4 address information on PC-A. IPv4 address:172.27.0.21

Subnet mask: 255.255.255.0

Default gateway:172.27.0.2

.5
Configure static IPv4 address information on PC-B. IPv4 address:172.27.0.22

Subnet mask: 255.255.255.0

Default gateway:172.27.0.2

 
Configure static IPv4 address information on PC-C. IPv4 address:172.27.0.23

Subnet mask: 255.255.255.0

Default gateway:172.27.0.2

 

 

Points: _________ of 5

Configure LAN Redundancy and Link Aggregation

Total points: 6

Time: 25 minutes

Configure Spanning Tree on S1.

Configuration tasks for S1 include the following:

Configuration Item or Task Specification Points
Configure Rapid PVST+. PVST+.

spanning-tree mode rapid-pvst

1
Configure as primary root bridge for VLAN 1. spanning-tree vlan 1 root primary  
Configure PortFast and BPDU Guard on the interface connected to PC-A. interface f0/6

spanning-tree portfast

spanning-tree bpduguard enable

 

 

Configure Spanning Tree on S2.

Configuration tasks for S2 include the following:

Configuration Item or Task Specification Points
Configure Rapid PVST+. spanning-tree mode rapid-pvst 1
Configure PortFast and BPDU Guard on the interface connected to PC-B. interface f0/18

spanning-tree portfast

spanning-tree bpduguard enable

 

 

 

Configure Spanning Tree on S3.

Configuration tasks for S3 include the following:

Configuration Item or Task Specification Points
Configure Rapid PVST+. spanning-tree mode rapid-pvst 1
Configure as secondary root bridge for VLAN 1. spanning-tree vlan 1 root secondary  
Configure PortFast and BPDU Guard on the interface connected to PC-C. interface f0/18

spanning-tree portfast

spanning-tree bpduguard enable

 

 

Configure HSRP on R1.

Configuration tasks for R1 include the following:

Configuration Item or Task Specification Points
Configure the HSRP virtual IP address on interface G0/1. interface g0/1

standby 1 ip 172.27.0.2

1
Make this the primary HSRP router. standby 1 priority 150

R1

 
Configure so this router becomes the primary HSRP router on a reboot. standby 1 preempt  

 

Configure HSRP on R3.

Configuration tasks for R3 include the following:

Configuration Item or Task Specification Points
Configure the HSRP virtual IP address on interface G0/1. interface g0/1

standby 1 ip 172.27.0.2

1

 

Configure an LACP EtherChannel between S1 and S3.

Configuration tasks include the following:

Configuration Item or Task Specification Points
On S1, configure an LACP EtherChannel on interfaces connected to S3. interface range f0/3-4

channel-group 1 mode active

1
On S3, configure an LACP EtherChannel on interfaces connected to S1. interface range f0/3-4

channel-group 1 mode passive

 

 

Points: _________ of 6

Configure EIGRP for IPv4 Dynamic Routing Protocol

Total points: 8

Time: 30 minutes

Configure EIGRP on R1.

Configuration tasks for R1 include the following:

Configuration Item or Task Specification Points
Autonomous System (AS) number router ospf 1 2
Router ID router-id 1.1.1.1  
Advertise directly connected networks. network 172.27.0.0 0.0.0.255 area 0

network 172.27.123.0 0.0.0.3 area 0

network 172.27.1.0 0.0.0.255 area 1

network 172.27.2.0 0.0.0.255 area 1

network 172.27.3.0 0.0.0.255 area 1

 
Set all LAN interfaces as passive. passive-interface g0/1

passive-interface lo1

passive-interface lo2

passive-interface lo3

 
Manually disable automatic summarization. No auto-summary  
Apply a manual summary route for the Loopback interface networks.    
Set the bandwidth on S0/0/0 interface s0/0/0

bandwidth 128

 
Change the hello-interval on S0/0/0. 30 seconds  
Change the hold-time on S0/0/0. 90 seconds  
Change bandwidth percentage available to EIGRP 70%  
Configure a key chain named EIGRP-KEY with 1 key-string. Key-string: cisco  
Configure MD5 authentication on S0/0/0 using the key chain configured in the previous task.    

 

Configure EIGRP on R2.

Configuration tasks for R2 include the following:

Configuration Item or Task Specification Points
Autonomous System number 1 2
Router ID 2.2.2.2  
Advertise directly connected Networks. Use classless network addresses.  
Manually disable automatic summarization.    
Propagate the default route to all other EIGRP routers.    
Set the bandwidth on both serial interfaces. 128 Kb/s  
Change the hello-interval on serial interfaces. 30 seconds  
Change the hold-time on serial interfaces. 90 seconds  
Change bandwidth percentage available to EIGRP. 70%  
Configure a key chain named EIGRP-KEY with 1 key-string. Key-string: cisco  
Configure MD5 authentication on serial interfaces using the key chain configured in the previous step.    

Configure EIGRP on R3.

Configuration tasks for R3 include the following:

Configuration Item or Task Specification Points
Autonomous System number 1 2
Router ID 3.3.3.3  
Advertise directly connected Networks. Use classless network addresses.  
Set all LAN interfaces as passive.    
Manually disable automatic summarization.    
Set the serial interface bandwidth. 128 Kb/s  
Apply a manual summary route for the Loopback interface networks.    
Change the hello-interval on S0/0/1. 30 seconds  
Change the hold-time on S0/0/1. 90 seconds  
Change bandwidth percentage available to EIGRP. 70%  
Configure a key chain named EIGRP-KEY with 1 key-string. Key-string: cisco  
Configure MD5 authentication on S0/0/1 using the key chain configured in previous task.    

 

Verify network connectivity.

Verify that EIGRP is functioning as expected. Enter the appropriate CLI command to discover the following information:

Question Response Points
What command will display all connected EIGRP routers? Show eigrp neighbors 1
What command displays EIGRP hello-interval, hold-time, bandwidth percentage, and authentication mode for all EIGRP interfaces on a router? Show ip eigrp interfaces detail  
What command displays the EIGRP Autonomous System number, router ID, address summarizations, routing networks, and passive interfaces configured on a router? Show ip protocoals  
What command displays only EIGRP routes? Show ip route eigrp  

Step 5: Disable EIGRP

Disable EIGRP to prepare for OSPFv2.

Configuration Item or Task Specification Points
Disable EIGRP No router eigrp 1

1

Points: _________ of 8

Configure OSPFv2 Dynamic Routing Protocol

Total points: 8

Time: 30 minutes

Configure OSPFv2 on R1.

Configuration tasks for R1 include the following:

Configuration Item or Task Specification Points
OSPF Process ID 1 2
Router ID 1.1.1.1  
Advertise directly connected networks. Use classless network addresses.

Assign S0/0/0 and G0/1 interfaces to Area 0.

Assign Loopback interfaces to Area 1.

 
Set all LAN interfaces as passive.    
Configure an inter-area summary route for the networks in area 1.    
Change the default cost reference bandwidth to support Gigabit interface calculations. 1000  
Set the bandwidth on S0/0/0. 128 Kb/s  
Adjust the metric cost of S0/0/0. Cost: 7500  
Create an OSPF MD5 key on S0/0/0. Key: 1

Password: CISCO

 
Apply MD5 authentication to S0/0/0.    

 

Configure OSPFv2 on R2.

Configuration tasks for R2 include the following:

Configuration Item or Task Specification Points
OSPF Process ID 1 2
Router ID 2.2.2.2  
Advertise directly connected networks. Use classless network addresses.

All connected networks should be assigned to Area 0 except the Lo0 network.

 
Propagate the default route to all other OSPF routers.    
Change the default cost reference bandwidth to allow for Gigabit interfaces. 1000  
Set the bandwidth on all serial interfaces. 128 Kb/s  
Adjust the metric cost of S0/0/0. Cost: 7500  
Create an OSPF MD5 key on the serial interfaces. Key: 1

Password: CISCO

 
Apply MD5 authentication on the serial interfaces.    

 

Configure OSPFv2 on R3.

Configuration tasks for R3 include the following:

Configuration Item or Task Specification Points
OSPF Process ID 1 2
Router ID 3.3.3.3  
Advertise directly connected networks. Use classless network addresses

Assign S0/0/1 and G0/1 interfaces to Area 0

Assign Loopback interfaces to Area 3

 
Set all LAN interfaces as passive.    
Configure an inter-area summary route for the networks in area 3.    
Change the default cost reference bandwidth to support Gigabit interface calculations. 1000  
Set the serial interface bandwidth. 128 Kb/s  
Create an OSPF MD5 key on S0/0/1. Key: 1

Password: CISCO

 
Apply MD5 authentication to S0/0/1.    

 

Verify network connectivity.

Verify that OSPF is functioning as expected. Enter the appropriate CLI command to discover the following information:

Question Response Points
What command will display all connected OSPFv2 routers? show ip ospf neighbor 2
What command displays a summary list of OSPF interfaces that includes a column for the cost of each interface? show ip ospf interface brief  
What command displays the OSPF Process ID, Router ID, Address summarizations, Routing Networks, and Passive Interfaces configured on a router? show ip protocols  
What command displays only OSPF routes? show ip route ospf  
What command displays detailed information about the OSPF interfaces, including the authentication method? show ip ospf interface  
What command displays the OSPF section of the running-configuration? show run | section router ospf  

Points: _________ of 8

 

Verify Network Connectivity and HSRP Configuration

Total points: 6

Time: 15 minutes

Use the listed command to verify that network is working as expected.

Verify end-to-end connectivity.

Take corrective action if results are other than expected.

From Command To Expected Results Points
PC-A ping PC-C Ping should be successful. 3
PC-B ping PC-A Ping should be successful.  
PC-B ping PC-C Ping should be successful.  
PC-B ping Default Gateway Ping should be successful.  
PC-B ping 209.165.200.225 Ping should be successful.  
PC-B tracert 209.165.200.225 Trace should route through R1.  

Note: It may be necessary to disable the PC firewall for pings to be successful

Verify HSRP is working as expected.

Issue the shutdown command on R1 G0/1, and then re-issue the following commands to verify that HSRP is working as expected:

From Command To Expected Results Points
PC-B ping 172.27.0.1 Ping should not be successful. 3
PC-B ping Default Gateway Ping should be successful.  
PC-B ping 209.165.200.225 Ping should be successful.  
PC-B tracert 209.165.200.225 Trace should route through R3.  

Points: _________ of 6

Display IOS Image and License Information

Total points: 5

Time: 5 minutes

Enter the appropriate CLI command to discover the following information:

Question Response Points
What command displays the IOS image that is currently being used by the network device? show version 5
What command displays the size of an IOS image loaded on a network device? show flash  
What command displays a summary list of the Technology Package licenses on an ISR-G2 device that includes the current the state of each of those licenses? show version  
What command displays the amount of space available to install an additional IOS image to a network device? show flash  
What command displays a list of all the licenses on an ISR-G2 device? show license  
What command would you use to accept the end user license agreement? license accept end user agreement  

Points: _________ of 5

 

Router Interface Summary Table

Router Interface Summary
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 (F0/0) Fast Ethernet 0/1 (F0/1) Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
1900 Gigabit Ethernet 0/0 (G0/0) Gigabit Ethernet 0/1 (G0/1) Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
2801 Fast Ethernet 0/0 (F0/0) Fast Ethernet 0/1 (F0/1) Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/0/1)
2811 Fast Ethernet 0/0 (F0/0) Fast Ethernet 0/1 (F0/1) Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
2900 Gigabit Ethernet 0/0 (G0/0) Gigabit Ethernet 0/1 (G0/1) Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has. There is no way to effectively list all the combinations of configurations for each router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent the interface.

 

 

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 19

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 19

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

IT PROJECT (NO WRITTING NEEDED) TECHNICAL Cisco Packet Tracer PKT File Only

***I require only the Packet Tracer file for the working redesign listed below in the requirements***

IT INFRASTRUCTURE PROJECT PHASE I INSTRUCTIONS

All labs must be submitted using the version of Packet Tracer in the online course/learning management system. Please do NOT use other versions of Packet Tracer to assure licensing compliance and proper assessment/credit. In addition, please do NOT add users or passwords to any device, leave all credentials blank for assessment purposes.

Project Background

Please reference Figure 1. Friendly Care Hospital is one of the biggest hospitals in DC. You have recently bought the hospital, naming it [Your Firstname Lastname] Hospital. For example, Jane Doe Hospital. Jane Doe Hospital owns a 5-story building and houses many departments that span multiple floors. Its Radiology department is spread across the first and second floors, connected by a dedicated local area network (LAN). The department has recently deployed a new “Radiology Images” application as part of their initiative to digitize patient records. However, the department staff sometimes faces long application delays during busy hours. It also experiences regular delays in Internet connectivity, FTPS services, web services, and email services.

Their original design, depicted in Figure 1, was categorized as a small network, providing services for up to 200-500 devices. They have well surpassed this. You, as their senior network administrator, are tasked with the job of a complete re-design. This design must support a medium to large sized network for over 1,000 devices. Thus, it should surpass the current capabilities.

Figure 1. Current Friendly Care Hospital Network Design

Project Overview

In this project, you will study performance improvements in a congested, wired LAN/WAN environment that can be solved to varying degrees by a new IT infrastructure design and fully functional implementation in Packet Tracer.  To learn more about Packet Tracer please read the Cisco Packet Tracer DS PDF. Later, in Phase II of the project, you will scale this design to a larger enterprise IT infrastructure.

To begin the projects, you will complete a review of related literature to identify what is appropriate to improve system feasibility, RAS (reliability, availability, serviceability), security, and disaster recovery of the existing IT infrastructure and model of your hospital. Once this review of literature is complete, you will use the outcomes and research results to advance and improve the IT infrastructure. Proper data analysis, comparison, and contrast will be summarized within in-text tables and figures as well as appendixes to explain the results of the IT infrastructure re-design and improvement.

Packet Tracer is limited given it is a simulator. Be creative! For instance, if Packet Tracer does not have a file sharing service for a file sharing server, turn on any other related and relevant services that are available. As another example, use LAN and WAN protocols that are optimal given what the version of Packet Tracer allows. You will be assessed based upon optimal configurations in the version of Packet Tracer used. Thus, assure this is well studied. Research will outline new opportunities for future IT infrastructure designs, and this should be discussed accordingly in the written paper even if not configured in Packet Tracer. Often, new technologies are not implemented in industry immediately due to limitations such as hardware architecture.

Please verify all requirements are met by reviewing the grading rubric. Below is an outline of minimum requirements with examples and ideas.

Minimum Project Requirements

• Submit a working Packet Tracer lab, typically this file has a .pkt file extension.

o This will include the fully operational new IT infrastructure design o All devices in the lab must be named with your first name and last name

▪ Example: Jane_Doe_Router_1 o All hardware and software should be configured properly and should be able to communicate using optimized networking designs, configurations, and protocols

o No devices should have passwords for assessment purposes

• Minimum IT Infrastructure Design and Packet Tracer Requirements o You must start with a blank/new Packet Tracer file, existing labs or modified labs of existing solutions will receive a zero without exception

o Design a medium-size hospital IT infrastructure for well over 1,000 devices, and scalable beyond the Figure 1 example

▪ For example, a design that goes beyond traditional N-Tier designs

▪ Design proper addressing via IPv4 and/or IPv6 that scales

▪ Add appropriate routers and switches to support this new design

▪ Configure at least one appropriate networking protocol, operational across the entire infrastructure

▪ Use proper network address translation (NAT)

▪ Implement private and public IP address spaces correctly

▪ Assure network traffic is organized, efficient, and secured properly (e.g. limit broadcast domains, do not allow marketing employees to access accounting systems, etc)

o Add an Internet Service Provider (ISP) into the design o Add enough modularity, resiliency, and flexibility into the design o Design and implement the following new services and servers

▪ A Dynamic Host Configuration Protocol (DHCP) server that automatically assigns working IP addresses to new workstations

▪ A name server that manages the Domain Name System (DNS) for all servers in the hospital

▪ A web server hosted on the Internet

▪ Two new user workstations located at each level of the building that can use the new services properly

• Show these services working on each workstation in your project (e.g. a website from the web server, DHCP, etc)

Provide a few hospital departments as examples beyond radiology

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!