Website Development Portal Site (1S)

Website Development
Website Development

Want help to write your Essay or Assignments? Click here

Website Development Portal Site (1S)

This paper gives an outline of the development of a design document for a website that is meant to assist students at Trident University International with the ITM program as they transition through this from their first courses to the last through the utilization of the Information Architecture (IA) design method from the Webmonkey site.

Goal Definition

The short and long term goals for this site will include

The primary short term goal in this case will be in easing the usability of the site, a factor that will make the site navigable thus enabling the students to utilize the contents of the site through their current course workloads (Balloni, 2010). This will be achieved through the development of a navigational system that clearly states the objectives of the course and a flow of communication, a factor that will make accessibility simpler for the students.

On the other hand, the long-term goals on this site will be pegged on assisting the students through their entire courses as Trident University. This will therefore determine the inclusion of a communicational flow, a single sign-on, grading systems, an auto-enroll policy and a transitioned approach upon graduation.

Questions To Structure the Goals of the Website

Some of the essential questions that will be used in structuring the goals of the site include:

Question 1: Who are the sites intended audience

Answer: The site will focus on the current students, the Trident Universities Faculty members, the student’s family members and the Alumnae’s who will be included for the purposes of keeping records.

Question 2: Why will the students come to my website?

Answer: The rationale for students visiting my site will be based on the complete support that the site offers the learners, a factor that will aid them in getting information about the systems of the university for the future students and parents. This will be achieved through the inclusion of a fully supported program for the students in ITM.

Considering that these questions are straightforward, they will be blended with the aim of developing the conceptual framework that will be utilized in building the website that will support the ITM students through their learning period in this institution (Scacchi, 2003). Having summarized and determined the questions in this first part, the design of this document will additionally focus on a short discussion of the goals that I would want to achieve in the development of this site.

It is in this case important to indentify that the overall goal I have developed for this site is in the fact that the site will be a source of support to the students in their ITM program. The site will be in a position of helping the student’s in making transitions from their first course through to the last. My short term focus will be based on the concentration that will be initiated to provide the most essential and immediate programs that meet the learning needs of the students in their current course schedules.

In this case, the website will be developed in a manner that enables the students to easily access their course contents with the aim of acquiring their current course needs in this portal. This therefore means that the website will provide background information of the sources as well as the objectives that will be incorporated through an open line of communication that allows the students to interact with other peers who are undertaking the same course (Scacchi, 2003).

Additionally, the support provided in the site will also take the form of developing interactive segments with the professors, thus aimed at helping the students receive answers to their questions during the course duration. Considering that the institution has a large populace, the site will be developed to allow multiple usability including its accessibility in different locations.

Taking a closer consideration of the long-term goals of this site, there is a need of developing an achieve that will enable the returning students on the site to acquire information on the courses that they had undertaken and the remaining courses required to fulfill the institutions courses required in graduating to the degree level (Sommerville, 2010). This record will also grant the graduating students the ability to review their performances. Additionally, the site will also have a single sign-in interface that will ensure the students do not make multiple logins to access the site.

Want help to write your Essay or Assignments? Click here

A public access section will also be included in the site that will give the usurers of this site the capacity to conduct overviews of the Universities structures and systems and the manner in which the ITM course relates to the core functions of the University. It is important to mention that this faced will be disintegrated during the process of design documentation (Sommerville, 2010).

However, my main objective is directed towards the development of a site that will enable the students and other prospective students including the graduates to access relevant content on their course including offering the assistance through their entire courses as Trident University

In order to develop an effective site, I conducted a survey on some of the students to determine what they would prefer having on the site. I was in a position to learn that the students wanted an inclusion of the institutions curriculum activities in the site. This would make the site interesting and attractive. Additionally, the students wanted some section of the site include the levies that would be paid in every semester in order to allow them access such information through the site.


Balloni, A. (2010). Challenges and Reflections on Knowledge Society and Sociotechnical Systems, The International Journal of Managing Information Technology (IJMIT) 2, 1, February 2010. Retrieved on July 26, 2010, from

Scacchi, W. (2003). Socio-Technical-Design. Institute for Software Research, Univ. of Wisconsin. Retrieved July 26, 2010 from

Sommerville, I. (2010). Socio-technical Systems Retrieved on July 26, 2010, from

Want help to write your Essay or Assignments? Click here

Data Security: Analysis of Effect of Cloud Computing

Data Security
Data Security

Want help to write your Essay or Assignments? Click here

Data Security: Analysis of Effect of Cloud Computing

Cloud Computing: Security, New Opportunities and Challenges

Section 1: Topic Endorsements

Cloud computing has been a very successful invention. It has created new opportunities for businesses in terms of storage spaces, access to software and other facilities. Additionally, many businesses have stated that they feel that their data is more secure if it is held in a cloud (Pearson and Yee, 2013). However, just as many businesses and experts have stated that cloud computing exposes data and makes businesses vulnerable in terms of data security (Ali, Khan and Vasilakos, 2015).

For computer scientists, understanding security issues as they relate to cloud computing is important for several reasons (Ali et al., 2015). The first and most important is the fact that in the future, any establishment will likely, partly or entirely, depend on cloud computing for storage of data (Mahmood, 2014). As a computer specialist, a computer scientist will be relied upon to monitor data, ensure security and make necessary adjustments where they are required (Verma and Kaushal, 2011).

Want help to write your Essay or Assignments? Click here

Section 2: Research Overview

The research literature on cloud computing indicates that we know cloud computing, even though safer than botnets, has created unexpected side channels because it is a shared resource (Verma and Kaushal, 2011). We also know that security incidences related to data computing are not unique, just different (Flinn, 2012). However, we do not know exact ways on how to improve data security within oud computing. However, several measures such as passwords, can be used to improve security (Pearson and Yee, 2013).

Cloud computing means that the devices used to provide required computing services do not belong to the end users (Krutz and Vines, 2010). As a result, users do not have control over how these devices are operated or who has access to them (Zhu, Hill and Trovati, 2015). Research regarding cloud computing has been extensive over the last decade as the service has continued to become more common among businesses and individuals. With each security development made, new ways to breach security come up as well (Samani, Honan, Reavis, Jirasek and CSA, 2015).

The basic research question is whether cloud computing has led to the increase or decrease of data security in enterprises, since it has become a business necessity (Nepal, Pathan and SpringerLink, 2014). The purpose of the study is to provide insight on cloud computing and how best to ensure data security. The methodology suggested for this research is equation methodology. Similarly, Moustakas- transcendental phenemonology is the suggested research model. With this in mind, the dissertation title becomes; Cloud Computing: Security, New opportunities and challenges (Schwarzkopf, Schmidt, Strack, Martin and Freisleben, 2012).


Ali, M., Khan, S. U., & Vasilakos, A. V. (June 01, 2015). Security in cloud computing:     Opportunities and challenges. Information Sciences, 305, 1, 357-383.

Flinn, J. (2012). Cyber foraging: Bridging mobile and cloud computing. San Rafael, Calif.: Morgan & Claypool.

Samani, R., Honan, B., Reavis, J., In Jirasek, V., & CSA (Organization),. (2015). CSA guide to cloud computing: Implementing cloud privacy and security. Waltham, MA: Syngress

Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Indianapolis, Ind: Wiley Pub.

In Zhu, S. Y., In Hill, R., & In Trovati, M. (2015). Guide to security assurance for cloud computing.

In Mahmood, Z. (2014). Cloud computing: Challenges, limitations and R & D solutions.

Pearson, S., & Yee, G. (2013). Privacy and security for cloud computing. London: Springer.

In Nepal, S., In Pathan, M., & SpringerLink (Online service). (2014). Security, Privacy and Trust  in Cloud Systems. Berlin, Heidelberg: Springer Berlin Heidelberg.

Verma, A., & Kaushal, S. (January 01, 2011). Cloud Computing Security Issues and Challenges:  A Survey.

Schwarzkopf, Roland, Schmidt, Matthias, Strack, Christian, Martin, Simon, & Freisleben, Bernd. (2012). Increasing virtual machine security in cloud environments. (BioMed Central Ltd.) BioMed Central Ltd.

Want help to write your Essay or Assignments? Click here

The Benefits of TCP Protocol

The Benefits of TCP Protocol
The Benefits of TCP Protocol

TCP Protocol

The benefits of TCP Protocol include: control of flow the rate of data exchange, segment size, network control and flow control. On the other hand, the benefits of UDP Protocol include its time sensitivity and ability of its servers towards answering small queries from a large pool of clients (McKeen & Smith, 2014). The differences between TCP and UDP include:  TCP is more reliable than UDP; TCP transmissions are ordered in a sequence whereas messages sent through UDP may not be in a sequence; and finally TCP connection is heavyweight while that of UDP is lightweight (McNurlin, 2009).

TCP Protocol is used in remote surgery because of its preferred in a procedure that requires error correction facilities at network interface level. UDP Protocol is the choice for online gaming and online shopping, which are time sensitive applications for online gaming and the servers are requiring the ability of answering small queries from a large pool of clients for online shopping (O’Brien, 2013).

Basic Data Transfer: The TCP is able to transfer a continuous stream of octets in each direction between its users by packaging some number of octets intosegments for transmission through the internet system. In general, the TCPs decide when to block and forward data at their own convenience.

Reliability: The TCP must recover from data that is damaged, lost, duplicated, or delivered out of order by the internet communication system. This is achieved by assigning a sequence number to each octet transmitted, and requiring a positive acknowledgment (ACK) from the receiving TCP.

The Transmission Control Protocol (TCP) is intended for use as a highly reliable host-to-host protocol between hosts in packet-switched computer communication networks, and in interconnected systems of such networks.

Precedence and Security: The users of TCP may indicate the security and precedence of their communication. Provision is made for default values to be used when these features are not needed.


Matthews, H. S. & Williams, E. (2012). Telework Adoption and Energy Use in Building and Transport Sectors in the United States and Japan. Journal of Infrastructural Systems, 11(1), 21-30. doi:10.1061/(ASCE)1076-0342(2005)11:1(21)

McKeen, J. D. & Smith, H. A. (2014). Making IT Happen: Critical Issues in IT Management, Wiley Series in Information Systems. New York, NY: Prentice Hall.

McNurlin, B. (2009). Information Systems Management in Practice (8th ed.). New York, NY: Prentice Hall.

O’Brien, J. (2013). Management Information Systems: Managing Information Technology in the Internetworked Enterprise. Boston, MA: Irwin McGraw-Hill. ISBN 0-07-112373-3

Sardeshmukh, S. R., Sharma, D., & Golden, T. (2012). Impact of Telework on exhaustion and job engagement: A job demands and resources model. New Technology, Work and Employment, 27(3), 193-207. doi:10.1111/j.1468-005X.2012.00284.x

Want help to write your Essay or Assignments? Click here

Understanding Frame Relay

Understanding Frame Relay
Understanding Frame Relay

Understanding Frame Relay

            Frame relay is one of the inventions in the computer technology industry that have significantly transformed transmission of data among different devices. According to Mir and Sharma (2014), frame relay is a transmission service that has been designed into a packet-mode, and that helps to minimize the degree of data recovery and detection of an error within a network. In this respect, frame relay assists organizations to achieve a higher throughput by reorganizing the communication process. Frame relay allows for the transmission of data between Wide Area Networks (WANs) and local area network (LANs) (Basu, Jha, and Mohanty, 2015).

            Frame relay works by placing data into a small variable unit known as a frame. For instance, the network that has been created by a frame relay tends to create a permanent virtual circuit (PVC), which allows the customer to easily view a continuous connection without making a full payment (Basu, Jha, and Mohanty, 2015). To achieve maximum success from frame relay technology, an organization must choose a high level of service quality, and prioritize some frames while at the same time making others less relevant. Frame relay works by minimizing error detection rate between WANs and LANs, which makes it very efficient for interconnecting these networks (Walton, 1998).

Understanding frame relays: How they work

            Frame relay has a link-layer service that is connection-oriented to give rise to one functional unit. Being that frame relay falls on layer two protocol of X.25, it comprises of features that increase its ability to reduce error detection rates between LANs and WANs (Walton, 1998). These characteristics include; multiplexing, an indication of the most important and less important frames, insertion of zero bits, and frame delineation, nonduplication of frames preservation of frames, and protection of the probability of frame loss. These layer characteristics resemble those of OSI network layer protocol which frame relay is made up of (Basu, Jha, and Mohanty, 2015).

 Frame relay is used by today’s organizations to speed up the transmission of data among networks. According to Basu, Jha, and Mohanty (2015), the use of frame relay to improve networking performance is common in many organizations today. An example of one organization that utilizes frame relay is AT&T.

As Alexander, Alexander, Zhang, and Zhang, (2000), point out, frame relay that has been designed in the form of an integrated service is rapidly gaining strategic importance in both private and public sectors. These authors further assert that frame relay is mostly used by modern organizations to increase the worth of services that they offer and to achieve competitive advantage.

An integrated service that incorporates frame relay is used by today’s organizations to give customers what they desire as far as network connection and speed are concerned (Mir and Sharma, 2014).

There are many reasons why frame relay is still used today. when understanding frame relay, the reasons are provided. First, it assists organizations to minimize costs of internetworking. Second, today’s organizations can increase performance and minimize the complexity of networks. Third, companies which have successfully implemented frame relay can enjoy protocol independence and to increase interoperability (Basu, Jha, and Mohanty, 2015). Based on these benefits, contemporary organizations should consider utilizing frame relay with other technologies such as ATM and IP, to maximize network performance (Alexander et al., 2000).

Reference List

Alexander, H., Alexander, R. B., Zhang, J. & Zhang, Q. (2000). Value added service-voice, data, frame relay, ATM, IP all on one. Communication Technology Proceedings,  doi:10.1109/ICCT.2000.889280

Basu, A., Jha, K., & Mohanty, S. (2015). Wide area networking using frame relay cloud. International Journal of Computer & Mathematical Science, 4(7): 1-6.

Mir, S., A. & Sharma, M. (2014). A comparative study of x.25, frame relay and ATM in high speed networks. International Journal for Research in Applied Science and Engineering Technology, 2 (IV): 243-245.

Walton, D. (1998). Frame relay to ATM interworking. BT Technology Journal, 16(1): 96-105.

Want help to write your Essay or Assignments? Click here.