Table of Contents
Type of Testing Program
For this project, I recommend the prototype-testing program over pilot testing methodology. First, this is because prototype testing will help Mr. Smith gain a deeper understanding of video conferencing and he will also be able to test his ideas before hand with real users. This process is conducted before the new product is implemented altogether. Therefore, it is safe to assume that with prototype testing, the developer is able to figure out whether the product is going to be conversant with user’s needs and expectations.
Unlike pilot model testing, prototype is also considered to be an effective approach that can be used to locate possible design errors at the early stage of product development process. It should be mentioned that at the early development stage the product functionalities are in their respective basic structures hence, not yet implemented. Third, with prototype testing methodology the video conferencing developer is able to analyze the designs to be used on the fundamental platform test outcome that may lead to the focus of the next design cycle (Sotopia.Com, 2007).
Fourth, the key goal of using prototype testing methodology, in comparison to its counterpart pilot testing, is based on the mere assumption that collection of either performance or satisfaction data is conducted at a specific point within the developmental stage. Therefore, this allows for cheap and simple alterations of the video conferencing before actual implementation process is carried out. Developers, using prototype testing, embark on establishing areas of the entire system user interface that showcases possible problems and design immediate solutions to eliminate the impeding problem (Sotopia.Com, 2007).
Question 2: Naming Structure
For this case, the entire network topology is arranged in a ring structure model. It should be noted that ring topologies allow for two neighbors useful for inter-linkage and communication purposes. Notably, this topology allows information to be transmitted through the ring model in the same direction. This means that the information is allowed to transmit either in a clockwise or anti-clockwise manner (Bradley, 2009).
Consequently, possible failure within the operation of cables or devices is likely to cause immediate breakdown of the entire loop. This, in turn, can paralyze the entire network structure. For instance, in this case both the Accounting and Human Resources departments are experiencing some form of latency (Bradley, 2009).
Examples of ring topology network structures are found within campus buildings and other learning institutions where communication of information is channeled towards similar direction.
Question no 3: Security
The security question arises in both the Accounting department and Human Resource given that in ring topologies, informational data is transmitted in one direction. This transmission direction can either be clockwise or anticlockwise.
It should be noted that within ring topology, every computer is expected to repeat the signal before passing it to the proceeding computer. Thus, in this process the broadcast is perceived by each PC within the network. This causes a breach into the security of the transmitted information being given that all nodes can view it before sending to the intended recipient. The ring topology can be optimized effectively so that cases of breakdown and latency are reduced or completely eliminated.
Modern technologies allow for network developers to implement such tools as the FDDI or SONET in order to support a double ring topology. The double-ring topology is used extensively as a back-up plan in case of device failure or total breakdown of the primary ring.
Question no 4: Functions of Each Network Device
Network devices are each physical entities that are connected to the entire network topology. For this project, the different network devices are individual personal computers, servers and printers. First, the individual computers are the interconnected PC’s. These PC’s are desktop computers, workstations and notebooks for specific users. They are used to transmit information from one PC to another within the topology. Second, servers are computers within a given network that stores important data and, they are meant to avail specific services within the topology. Third, there are printers that are used to provide hard-copies of the material information in transmission. Fourth, there are routers which channel data around the network topology from data senders to possible recipients (Starlan Consulting Services, n.d).
Question no 5: Network Design
Personally, I believe that the specific needs of each department will change their immediate network design. This impeding change can be due to the following factors. First, the basic cost of setting-up each department within the company. Second, the communication cost of the network topology to be affected within each department. Third, the reliability of the topology in providing required services in good time by each department.