Research Paper on "Risk Assessment for Cybertrans Ltd., a Logistics"

Research Paper 10 pages (2782 words) Sources: 10

[EXCERPT] . . . .

risk assessment for CyberTrans Ltd., a logistics firm that is faced with relocation and system upgrade issues. The company is to relocate its technology base to another site within two-year and upgrade its systems to Wireless and VoIP in order to aid in a cost effective relocation exercise. The latest technology such as fiber optics is to be incorporated and its satellite tracking solution can be outsourced but with the ownership and control of the system still being under the control of CyberTrans Ltd.A risk assessment is also carried out and recommendations provided.

Overview of Cybertrans Ltd.

Cybertrans Ltd. is a logistics firm, which provides next day delivery services throughout the UK for packages weighing up to 50kg in weight, as well as a three-day service for shipments over 50kg. They do operate a national fleet of vehicles from small vans up to articulated trucks of 38-tonnes. All of their vehicles have satellite tracking devices that allow the firm to know exactly where each of the vehicles is located at any point in time. The tracking system is hosted on a leased server, based off site, having 24-hour maintenance

Overview of the applicable technologies

Wireless LAN technology

Wireless Local Area network (WLAN) is a special form of LAN that employs radio frequency (RF) in order to communicate as opposed to using wires. The wireless clients then connect to the WLAN via wireless access points (WAP).This is as indicated below;

Figure 1:Wired and wireless network access. Source: Teare and Paquet (2005)

Teare and Paquet (2005) points out three main advanta
Continue scrolling to

download full paper
ges of WLAN. These are;

It provides flexibility

It increases overall productivity

It results in cost savings in comparison to wired networks

All these are of great importance to Cybertrans considering that it requires relocating within the shortest time possible and at reduced costs. The requirement of flexibility is necessary as this would allow for the free movement of items within the office.

The implementation of the WLAN by Cybertrans would result in the following scenario;

Flexible work environment

The WLAN would allow the staff at Cybertrans Ltd. To easily access printers, servers as well as other network resources easily without regard to their location. This is however subject to the wireless network coverage. This flexibility implies that a laptop that is connected to the Cybertrans access point can stay connected anywhere within the Cybertrans Ltd. wireless network coverage. The employees can work in their cubicles, in their cafeteria as well as in the meeting rooms! The flexibility aspect of WLAN would make it possible for Cybertrans Ltd. To be able to move machines and people around in the office space without having to run extension network cables everywhere.

Increased productivity

A study by NOP World Technology for Cisco Systems in November, 2003 indicated that users of WLAN normally remained connected to the corporate network about 3.64 hours longer as compared to their wired counterparts. This ends up increasing their productivity by twenty seven percent (Cisco, 2003). This increased productivity can indeed be important to Cybertrans.

Low deployment cost

The other great benefit attached to the deployment of WLAN is the low cost of deployment (Teare and Paquet (2005). This is because the total cost of ownership (TCO) is considerable lower as compared to the benefits that it attracts to the organization. This is however subject to a caveat; the WLAN must be well managed and secured.

The wireless components

The Cybertrans corporate WLAN is to be made up of;

Wireless access points and Wireless client devices

The Wireless Access Points

These are used to provide connectivity to the Cybertrans wireless client devices such as laptops, desktops, printers and IP phones. Due to the complex nature of the services at Cybertrans, it is appropriate if they implement an integrated wireless access point. They can acquire Cisco integrated access point systems. This is by putting in place a high-speed wireless interface card (HWIC) using Cisco 2800 or their 3800 routers. This is due to their capability to concurrently route, switch and offer security services on a single platform that has IEEE 802.11 Wireless LAN functionality (Cisco, n.d). The Cisco HWIC-AP WLAN Module for Cisco 1800, 2800 and 3800 used in the convergence of IP communication with IP telephony is shown in the diagram below

Figure 2: Source (Cisco, n.d).

Wireless client devices

He wireless client devices are the ones that have wireless interface card (WIC) that are use for communication over Wireless access points (WAPs) and Radio Frequency (RF). They may include laptops, workstations, PDAs and Wireless IP phones. The Cybertrans expansion/modernization plan is to include the implementation of wireless IP telephony in their call centers. The phones are implemented on 802.11b technology and should have inbuilt security features such as QoS as well as management features. Cybertrans should deploy their wireless IP telephony using Cisco IP phones. This should be deployed using Cisco Unified Wireless IP Phone 7920 (Cisco,2005).

Wireless IP telephony deployment (Teare and Paquet,2005).

Secure Hosting Server

A secure hosting server is important for Cybertrans since it would enable it to effectively host its vehicle tracking system using its own resources. The hosting server should be secure and reliable and must provided the three tenets of information security namely confidentiality, availability and integrity. The hosting server is to be based on HP ProLiant G6 Servers that are equipped with the Intel Xeon 5500 Processors. The server is to run Red Hat Enterprise Linux 5.2 distribution. The vehicle tracking software to be used is WebTMC which is a special Web Server used for Telemetry, Monitoring and Control as well as Vehicle Tracking (Methos Consulting, 2011).

Fiber Optic technology

A fiber optic framework is to be used to provide a Wide Area Network (WAN) between the main office and the new offsite location that houses the tracking servers, customer liaison and finance operations. This is to be done using a broadband coverage service from Virgin Fiber Optic from Virgin Media. The broadband service is to be used in linking up the two the various offices with the main office (Headquarters).This is to be implemented using a 100Mb option for fast and secure exchange of information

Risk Assessment

Risk assessment is defined by PC Magazine (n.d) as a report that clearly shows the vulnerabilities of an organization as well as an estimate of the recovery cost in the event of any damage. The risk assessment also provides a summary of the defensive measures as well as associated costs on the basis of the amount of risk the given organization is willing to fully accept. This is also referred to as the risk tolerance. Risk analysis on the other hand is the process of undertaking the risk assessment. In risk analysis, there are threats. Threats refer to the harmful events and acts like the deployment of worms and viruses as well as unauthorized network access. Risk on the other hand us the level of expectation that a given threat might as well succeed as well as the damage that can result.

Wireless LAN technology Risk Assessment

The wireless network technologies have several advantages of the wired networks. These include:

1. Support for mobility

2. Rapid deployment of the network resources

3. Flexibility in implementation

4. Scalability

The frequency allocation for wireless spectrum

The industrial, scientific and medical (ISM) frequency band

Lower limit

Upper limit

Total bandwidth

902 MHz

928 MHz

26 MHz

2.4 GHz

2.4835 GHz

83.5 GHz

5.725GHz

58.50GHz

125 MHz

Table 1: The industrial, scientific and medical frequency band -- Source Bruce (2000)

The components of wireless LAN -Source (Burrell,2002)

Technologies for WLAN Transmission

Infrared LANS

this form of transmission is needed where there is no need of long-range. The infrared signals cannot go past opaque walls .No license is needed to operate this form of transmission.

Spread spectrum LANs

In this case, the spread spectrum transmission technology is employed. The LANs in this case uses the Industrial, Scientific, and Medical (ISM) band in order to eliminate the need for licensing.

Narrowband Microwave

In this category, microwaves are used in the transmission. Some of the frequencies require FCC licensing while others don't. This is because they utilize the ISM bands.

Infrared transmission

There are three forms of infrared transmission. These are;

1. Direct beam

2. Omnidirectional

3. Diffused

The direct beam infrared is the one that has the best speed of transmission. The receiver in this case is aligned with the signal sender unit in order to form a point-to-point link. The signal range however depends on the level of focus as well as the power that is emitted. The source of light is dependent on the specific environment .Indoor environments requires light emitting diodes (LEDs) while outdoors require lasers.

The omnidirectional infrared configuration on the other hand uses a sing base transmitter station (BTS) that is within the LAN's line of sight. The base station is mounted at a suitable point on the ceiling where it operates as a multiport repeater. The station then broadcasts signals omnidirectionally to be… READ MORE

Quoted Instructions for "Risk Assessment for Cybertrans Ltd., a Logistics" Assignment:

CIT300 - Assignment

Case Study ***** Cybertrans Ltd.

Cybertrans Ltd. is a logistics company, which offers next day delivery services throughout the UK for packages up to 50kg in weight, and a three-day service for shipments over 50kg. They operate a national fleet of vehicles from small vans up to 38-tonne articulated trucks. All of their vehicles are fitted with satellite tracking devices, which allow the company to know exactly where each vehicle is at any point in time. The tracking system is hosted on a leased server, off site, with 24 hour maintenance.

Details of customers***** requirements, collection and dispatch, customer liaison and finance are all handled from a central management facility located in an old paper mill on the outskirts of town. The building has been fitted with network cabling and a local telephone exchange unit, and there are 150 telephone extensions and 250 network points spread around the building, covering the call centre area and the management offices. Printing facilities are networked, and all computers have internet access, monitored and restricted centrally for business use.

The area has recently been awarded a development grant, and is being transformed into a leisure park with sports facilities, and the company is required to move out of the paper mill into alternative office accommodation elsewhere in two years***** time. All of the vehicle maintenance and goods handling is carried out at other centres around the country, and none of this work happens on the head office premises.

The company has been given a relocation grant, which will support the adaptation of new premises to suit its purposes. The existing site at the paper mill is in need of modernisation, and the network infrastructure of the building is a number of years old. There have been ongoing problems with the performance of the out-of-date network system, and the unavailability of network connections in key areas which have been under used as a result.

The company wants to replace the existing network and telephone infrastructure with a high capacity, modern and up-to-date system which will allow them to operate more efficiently. They also want to abandon the old telephone system in favour of a Voice over Internet Protocol (VoIP) system which will work over the data network. Staff will be issued with internet phones to connect to their PCs. As the business is relocating in two years***** time, they want to invest as little as possible in fixed infrastructure, and intend to take the new network system with them when they move. They also want to be able to move machines and people around in the office space without having to run extension network cables everywhere. The company has already decided to install a suitable capacity wireless LAN, capable of handling their data network and the VoIP telephones. The whole system will be relocated to the new premises when they move.

Your task is to provide an overall specification and report for the company on the available suitable technologies, and risk assessment on the project to be undertaken. You should consider the network capacity implications of the company*****s activity, especially in view of the move to VoIP, along with the security implications of using a wireless LAN. The solution you suggest to them should involve the minimum of hard-wired components. You can outsource elements of the solution to third party providers if you think it is appropriate, but the company will expect to retain ownership and control of the bulk of the system.

For this assignment you must write a case study report of between 3000 - 3500 words. This must be written in your own words and critically evaluate the current market offerings for wireless LAN systems and VoIP telephony. You should discuss the benefits and pitfalls for different types of system and consider the emergence of new services based on fibre optics, with higher capacities than current wireless technologies, and their impact on companies like Cybertrans. Your report should begin by introducing some suitable products, and describing the issues surrounding their use as identified by you from your research. The main body of your paper should discuss the key issues for consideration of the project, and conclude be recommending an overall solution.

In line with the normal standard of academic papers, you should include an abstract (approx. 300 words - which does not count towards the word count) and a comprehensive reference list (Harvard Referencing Standard). A bibliography is not required, and must not be included.

To write this paper, you will have to undertake thorough research, review and evaluation in the subject. The standard of presentation in your paper should match that of papers published by academic journals .

Staying within the bounds of The University regulations (if you have not seen these regulations, see your local tutor), you should make full use of any source material available to you (particularly journals or technical reports). Plagiarism and paraphrasing will not be tolerated, and will be dealt with under University regulations.

Your paper must be submitted in Microsoft Word 97 format as a single file on an otherwise clean floppy disc, and also in hard copy (i.e., printed-off). Assignment cover sheets will be available at the LRC.

Marking Scheme

70% and above

*****¢ Thorough understanding of key theories and distinguishing features, trends and factors;

*****¢ Overview of the field used as a basis for independent judgement;

*****¢ Clear structure and excellent critical analysis;

*****¢ + points below.

How to Reference "Risk Assessment for Cybertrans Ltd., a Logistics" Research Paper in a Bibliography

Risk Assessment for Cybertrans Ltd., a Logistics.” A1-TermPaper.com, 2011, https://www.a1-termpaper.com/topics/essay/risk-assessment-cybertrans-ltd/38909. Accessed 3 Jul 2024.

Risk Assessment for Cybertrans Ltd., a Logistics (2011). Retrieved from https://www.a1-termpaper.com/topics/essay/risk-assessment-cybertrans-ltd/38909
A1-TermPaper.com. (2011). Risk Assessment for Cybertrans Ltd., a Logistics. [online] Available at: https://www.a1-termpaper.com/topics/essay/risk-assessment-cybertrans-ltd/38909 [Accessed 3 Jul, 2024].
”Risk Assessment for Cybertrans Ltd., a Logistics” 2011. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/risk-assessment-cybertrans-ltd/38909.
”Risk Assessment for Cybertrans Ltd., a Logistics” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/risk-assessment-cybertrans-ltd/38909.
[1] ”Risk Assessment for Cybertrans Ltd., a Logistics”, A1-TermPaper.com, 2011. [Online]. Available: https://www.a1-termpaper.com/topics/essay/risk-assessment-cybertrans-ltd/38909. [Accessed: 3-Jul-2024].
1. Risk Assessment for Cybertrans Ltd., a Logistics [Internet]. A1-TermPaper.com. 2011 [cited 3 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/risk-assessment-cybertrans-ltd/38909
1. Risk Assessment for Cybertrans Ltd., a Logistics. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/risk-assessment-cybertrans-ltd/38909. Published 2011. Accessed July 3, 2024.

Related Research Papers:

Risk Assessment Report Assessment

Paper Icon

Risk Assessment Report of the Center for Disease Control (CDC)

Risk Assessment Report

This is a Risk Assessment Report formulated for the staff of the IT department of the Centers… read more

Assessment 9 pages (2612 words) Sources: 12 Topic: Management / Organizations


Risk Assessment: El Dorado Hills Assessment

Paper Icon

Risk Assessment: El Dorado Hills, California

El Dorado Hills, California, faces several risks that must be mitigated. The El Dorado Fire Department is one of the entities with the task… read more

Assessment 2 pages (681 words) Sources: 1 Topic: Environment / Conservation / Ecology


Risk Assessments for Falls Essay

Paper Icon

Risk Assessments for Falls Risk

One of the biggest threats to frail and infirm elderly individuals aged 65 years and older is falls. Whether at home or in a healthcare… read more

Essay 5 pages (1509 words) Sources: 7 Topic: Sports / Exercise / Fitness


Risk Assessment the Science of Dangerousness Essay

Paper Icon

Risk Assessment

The Science of Dangerousness

Dangerousness refers to the likelihood that a mentally ill person, or criminal will participate in an act that harms themselves or others. The prediction… read more

Essay 8 pages (2724 words) Sources: 11 Style: Harvard Topic: Psychology / Behavior / Psychiatry


Risk Assessment of Analysis of Phishing Research Paper

Paper Icon

Risk Assessment Analysis of Phishing

Risk Assessment of Analysis of Phishing

Over the last several years, both large and small businesses have become increasingly vulnerable to practice known as phishing.… read more

Research Paper 2 pages (741 words) Sources: 3 Topic: Business / Corporations / E-commerce


Wed, Jul 3, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!