Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Institute of Management, Nirma University

MBA – FT Batch 2020-22

Project Management

Case Analysis- Trans LAN Project


GROUP C_ Section J

Submitted To: Prof. Chetan Jhaveri

Submitted By: 201352 Soham Trivedi

201XXX Parth Adeshra


201XXX Sushant Batra
201XXX Mukul Saxena

Date of Submission: 21-Feb-2022


Case

Trans LAN Project

Trans Systems is a small information systems consulting firm located in Meridian, Louisiana.
Trans has just been hired to design and install a local area network (LAN) for the city of
Meridian's social welfare agency. You are the manager for the project, which includes one
Trans professional and two interns from a local university. You have just finished a
preliminary scope statement for the project (which follows). You are now brainstorming
potential risks associated with the project.

PROJECT SCOPE STATEMENT

PROJECT OBJECTIVE

To design and install a new local area network (LAN) within one month with a budget not to
exceed $125,000 for the Meridian Social Service Agency with minimum disruption to
ongoing operations.

DELIVERABLES

 Twenty workstations and 20 laptop computers.


 Two servers with quad-core processors.
 Print server with two color laser printers
 Barracuda Firewall.
 Windows R2 server and workstation operating system (Windows 11).
 Migration of existing databases and programs to new system.
 Four hours of introduction training for client's personnel.
 Sixteen hours of training for client network administrator.
 Fully operational LAN system.

MILESTONES

1. Hardware January 22.

2. Setting users' priority and authorization January 26.

3. In-house whole network test completed February 1.

4. Client site test completed February 2.


5. Training completed February 16.

TECHNICAL REQUIREMENTS

1. Workstations with 17-inch flat panel monitors, dual-core processors, 8 GB RAM. 8X


DVD+RW, wireless card, Ethernet card, 500 GB SSD.
2. Laptops with 12-inch display monitor, dual-core processors, 4 GB RAM, wireless
card. Ethernet card, 500 GB SSD, and weight less than 4½ lbs.
3. Wireless network interface cards and Ethernet connections.
4. System must support Windows 11 platforms.
5. System must provide secure external access for field workers.

LIMITS AND EXCLUSIONS

1. On-site work to be done after 8:00 p.m. and before 7:00 a.m. Monday through
Saturday.
2. System maintenance and repair only up to one month after final inspection.
3. Warranties transferred to client.
4. Only responsible for installing software designated by the client two weeks before the
start of the project.
5. Client will be billed for additional training beyond that prescribed in the contract.

ACCEPTANCE CRITERIA

Director of the city of Meridian's Social Service Agency reviews.


Case Solution

1. Identify potential risks associated with this project. Try to come up with at least five
different risks.
 Team size: the workload is too big compared to the size of the team and the
timeline
 Budget: The realibility of the estimates, what if the expense overstep the budget.
(the budget seems to small)
 Security: Need ty be tested (The system) many times to ensure that only
authorized users can get access
 User priorities: the users may not be able to use internet, during the transitioning
to new LAN.
 Availability of hardware and software:Shortages of hardware and software is a big
problem
2. Use a risk assessment form to analyze identified risks.

Risk Event Likelihood Impact Detection When


Difficulty

Team Size 5 4 1 Continuous

Budget 4 5 2 Continuous

Availability of 3 4 3 Installation
Hardware and
Software

Security 4 4 4 Post
Installation

User Priority 2 3 4 Installation


3. Develop a risk response matrix to outline how you would deal with each of the risks.

Risk Event Response Contingency Plan Trigger Person


Responsible

Team Size Adding the Outsource/Sub The PM and


team member contract. If the workload of Meridian
budget is sufficient the team

Budget Increase the Negotiate with The PM


budget Meridian/Downsize operations
the project will show
the
sufficiency
of the budget

Availability Not depending Follow up on Shortages PM


of only one ordering extra SW would be
Hardware supplier. (bid and HW. identified
and to multiple from the
Software suppliers) onset of the
LAN.

Security System test Alternative way for When it is Trans


and security the member to not working professional
check secure the system. after the
testing and
security
check.

User Have a system Secondary server After the Trans


Priority on standby testing when professional
during the there are
transition of glitches or
new LAN inability to
load

Now we know what are the risks associated with this project and we have also completed
risk assessment for those risks. Now we will make risk response matrix to deal with all
the risks.
risk response matrix is designed and used to ensure that a company, project or person is
properly prepared to manage and respond to these risks in an effective manner.
Risk response matrix contains risk event, response, contingency plan, trigger and person
responsible. Every risk event will have response, contingency plan, trigger and person
responsible.
Response is a decision which we think is appropriate for the specific risk event. There are
5 types of responses mitigating, avoiding, transferring, escalating, and retaining.
Contingency plan is an alternative plan that will be used if a possible risk event becomes
a reality.
Trigger is a condition of implementing the contingency plan.
Person responsible is a person who will monitor the potential risk and will initiate the
contingency plan assigned to the risk.
Now for our first risk event,
Team size: as we know our team size is very low so to avoid that risk our response will
be to add more members to our team. For our contingency plan we can hire more workers
on a contract base or we can outsource them. Work load of the team will trigger the
contingency plan and people responsible for this will be project manager and Meridian's
social welfare agency.
Budget: To decrease the budget problem in response we can try to increase the budget, so
in contingency plan we need to negotiate with Meridian's social welfare agency for the
budget. Contingency plan will be triggered when there will be insufficient funds for
continuing the project. project manager will be person responsible.
Availability of Hardware and Software: To avoid this risk we need to get in contact
with different suppliers. Our contingency plan will be to Follow up on ordering extra SW
and HW. Shortages would be identified from the onset of the LAN and that will be
Trigger point for this risk. Project manager is person responsible for this event.
Security: System test and security check is response for this risk, and contingency plan
will be finding Alternative way for the member to secure the system. When there is some
problem in the system or system is not working properly that can work as trigger. Person
responsible for this will be Trans professional.
User Priority: In response to this we need to Have a system on standby during the
transition of new LAN. For our contingency plan we need to use secondary server. If
some instability or glitches are shown in the system while transitioning to new LAN we
will take this as a trigger. Trans professional will be person responsible for this risk event.

You might also like