For Your Current Organization Or One With Which You Are ✓ Solved

For your current organization or one with which you are

For your current organization or one with which you are familiar identify the change initiative that you will use for your Week 8 Change Management Application paper in which you diagnose the need for change and create a proposed action plan based on either Kotter’s 8 Step Process or The Change Path Model. Describe the change initiative and identify what type of change is required: tuning, adapting, redirecting, or recreating.

MITS5003 Wireless Networks and Communication Assignment

Part I: Encoding and error control

Sam's robot sends every two seconds a status string comprising accelerometer reading (4 bits), ultrasound obstacle detection (6 bits), motor functionality (4 bits) and battery power level (2 bits).

  • a) Calculate the data rate required for robot to remote controller communication.
  • b) Explain three suitable encoding techniques to encode the status string.
  • c) Given acceleration 5 m/s², obstacle at 48 cm, motors 1111, battery 75%: i. Write the status string in binary; ii. Represent the status string using ASK, FSK, and PSK.
  • d) Calculate the CRC for the status string with polynomial divisor 1101.
  • e) Briefly explain other error control and flow control techniques for robot control.

Part II: Multiplexing and multiple access

  • a) Explain TDM, FDM and CDMA with diagrams.
  • b) Explain how OFDM differs, its special signal features, and its role in the change from 3G to 4G and WiMAX.
  • c) For IEEE 802.11ac using 40 MHz total bandwidth in OFDM: i. For 48 subscribers what should be the subcarrier bandwidth (fb)? ii. Propose a suitable subcarrier bit time T to achieve orthogonality. iii. Explain how OFDM overcomes inter-symbol interference (ISI).

Part III: Wi‑Fi network design for Prime Living office

Prime Living new office: 5 rooms (average 8 employees per room) and lounge used by staff and customers (≈25 devices). Client requires at least 100 Mbps data rate for all wireless connections. Resources: one distribution system and several access points with 10 m range.

  • a) Design the network specifying access point and distribution system locations and backbone.
  • b) Calculate the BSS and ESS sizes.
  • c) Calculate the throughput for the distribution system.
  • d) Recommend a suitable IEEE substandard and justify.
  • e) Recommend suitable security strategies for the network.

Paper For Above Instructions

Change initiative (diagnosis and action plan)

Organization: a mid-sized professional services firm migrating from an on-premises legacy enterprise resource planning (ERP) system to a cloud-based ERP suite. Diagnosis: the legacy system causes frequent downtime, poor integration with modern collaboration tools, slow reporting, and rising maintenance costs. Strategic drivers include the need for real-time data, mobile access, cost predictability, and improved analytics. Type of change: redirecting — the organization is changing strategic direction from internally hosted, maintenance-heavy IT to cloud-first operations that alter processes, architecture, roles and supplier relationships (Kotter, 1996; Cawsey et al., 2016).

Action plan using Kotter’s 8-Step Process:

  1. Create urgency: present data on downtime, costs and missed business opportunities to leadership and key stakeholders to build the case for cloud migration (Bridges, 2007).
  2. Form a guiding coalition: cross-functional team of IT, finance, operations and vendor representatives.
  3. Develop a vision and strategy: articulate improved uptime, mobile access, and analytics as core benefits and define phased migration strategy (pilot, staged rollouts).
  4. Communicate the vision: town halls, FAQs, targeted training schedules and regular status updates.
  5. Enable action: remove technical and organizational barriers (legacy integrations, skill gaps) by investing in middleware, cloud skills and change champions.
  6. Generate short-term wins: quick pilots for non-critical modules (expense reporting) to demonstrate benefits.
  7. Consolidate gains: expand to core financials, refine processes, update KPIs and incentives.
  8. Anchor changes: revise job descriptions, governance and vendor engagement models so cloud-first becomes standard practice (Kotter, 1996; Cawsey et al., 2016).

This Kotter-based plan addresses cultural, process and technological dimensions and aligns quick wins with longer-term capability building (Kotter, 1996; Bridges, 2007).

Part I — Encoding and error control (robot)

a) Data rate: the status string length is 4 + 6 + 4 + 2 = 16 bits transmitted every 2 seconds. Data rate = 16 bits / 2 s = 8 bits/second (8 bps) (Proakis, 2001).

b) Three suitable encoding techniques:

  • Line coding (NRZ-L): simple, low overhead, maps bit 1 to high voltage and 0 to low; efficient for low-data-rate control links but requires DC-balanced alternatives if baseline wander is a concern (Stallings, 2013).
  • Manchester coding: embeds clocking by using a mid-bit transition, robust for synchronization though it doubles the bandwidth; useful when receiver and transmitter clocks are unsynchronized (Proakis, 2001).
  • Digital modulation (BPSK/QPSK): modulate a carrier using phase shifts (BPSK for binary). For wireless robot telemetry, BPSK (or QPSK for higher robustness/spectral efficiency) provides radio resilience and is compatible with ASK/FSK/PSK approaches (Rappaport, 2002).

c) Encoding instance:

Assumptions: accelerometer 4-bit range 0–15 m/s² with 1 m/s² resolution → 5 → 0101. Obstacle 6-bit range 0–63 cm → 48 → 110000. Motors all working → 1111. Battery 2-bit mapping: 00=0–24%, 01=25–49%, 10=50–74%, 11=75–100% → 75% → 11. Status string (concatenate): 0101 110000 1111 11 → binary: 0101110000111111 (16 bits).

ASK/FSK/PSK representations (conceptual):

  • ASK: transmit a carrier at amplitude A1 for bit 1 and A0 (lower) for bit 0; waveform alternates amplitudes per bit time.
  • FSK: two carrier frequencies f1 and f0 represent bit 1 and 0 respectively; the carrier switches frequency each bit period.
  • PSK (BPSK): carrier phase 0 for bit 0 and phase π for bit 1 (or vice versa); phase flips encode bits while maintaining amplitude and frequency.

d) CRC calculation with divisor 1101 (polynomial x^3 + x^2 + 1): append three zeros to the 16-bit message giving 19 bits and perform modulo-2 division. Division yields remainder 100. Therefore CRC = 100 and transmitted frame = 0101110000111111 100 (Proakis, 2001; Wicker, 1995).

e) Other error and flow-control techniques: forward error correction (Hamming, Reed–Solomon) for bit-error resilience; ARQ and hybrid ARQ for retransmission (with sequence numbers and ACK/NACK); sliding-window flow control to manage link utilization; checksums and message sequencing to detect duplicates (Wicker, 1995; Stallings, 2013).

Part II — Multiplexing, OFDM and 802.11ac

a) TDM: time slices allocate full channel to each user in turn. FDM: frequency bands allocated to users simultaneously. CDMA: code-based separation using orthogonal or pseudo-random codes to permit simultaneous transmissions (Verdu, 1998).

b) OFDM (orthogonal frequency-division multiplexing) splits a wide channel into many tightly packed orthogonal subcarriers carrying parallel low-rate streams; it uses IFFT/FFT and typically a cyclic prefix to mitigate multipath ISI. OFDM enabled 4G and WiMAX because its robustness to multipath and spectral efficiency suit broadband mobile channels (van Nee & Prasad, 2000; Rappaport, 2002).

c) For 40 MHz total bandwidth and 48 subscribers, a simple uniform allocation gives subcarrier spacing fb ≈ 40 MHz / 48 ≈ 0.833 MHz (833 kHz). A subcarrier bit time T = 1 / fb ≈ 1.2 μs meets orthogonality (symbol duration chosen to be the reciprocal of subcarrier spacing); practical OFDM uses much smaller subcarrier spacing (kHz-level) with many more subcarriers, but this calculation illustrates the relation between bandwidth, subcarrier spacing and symbol time. OFDM combats ISI by using long symbol durations and adding a cyclic prefix that absorbs delay spread so inter-symbol interference is reduced (van Nee & Prasad, 2000).

Part III — Wi‑Fi design for Prime Living

a) Design: recommend one AP per room (5) plus two APs in the lounge to handle 25 devices and guests (total 7 APs) with 10 m placement centrally in each room/lounge; wired backbone: gigabit Ethernet (1 Gbps) switches in a distribution closet, with uplink to a 10 Gbps edge if Internet or aggregation demands grow. APs configured on non-overlapping 5 GHz channels where possible to maximize throughput and reduce interference (IEEE 802.11ac) (IEEE Std 802.11ac-2013).

b) BSS and ESS sizes: BSS = clients per AP (rooms ≈ 8 each; lounge APs ≈ 12–13 each), overall ESS = total stations ≈ 65 devices.

c) Throughput for DS: with a 1 Gbps wired DS, theoretical per-AP share (7 APs) ≈ 1,000 Mbps / 7 ≈ 143 Mbps. To ensure per-client 100 Mbps guarantees, upgrade DS to 10 Gbps and deploy sufficient RF capacity; otherwise enforce QoS and traffic shaping. Real per-client wireless throughput depends on PHY rates, contention and MU‑MIMO gains (Stallings, 2013; IEEE Std 802.11ac-2013).

d) Recommend IEEE 802.11ac Wave 2 (5 GHz, MU‑MIMO) for high per-client throughput and reduced interference; if future-proofing for very high aggregation, consider 802.11ax (Wi‑Fi 6) for denser scenarios and better spectral efficiency (IEEE Std 802.11ac-2013).

e) Security: WPA3‑Enterprise with RADIUS authentication, per-user credentials, VLAN segmentation for guest vs corporate traffic, strong network access control, firmware patching, 802.1X, network IDS/IPS and endpoint hygiene. Use VPN for sensitive remote access and logging for auditability (Stallings, 2013).

References

  • Kotter, J. P. (1996). Leading Change. Harvard Business Review Press.
  • Bridges, W. (2007). Transitions: Making Sense of Life’s Changes (2nd ed.). DaCapo Press.
  • Cawsey, T. F., Deszca, G., & Ingols, C. (2016). Organizational Change: An Action-Oriented Toolkit. SAGE Publications.
  • Proakis, J. G. (2001). Digital Communications (4th ed.). McGraw-Hill.
  • Rappaport, T. S. (2002). Wireless Communications: Principles and Practice (2nd ed.). Prentice Hall.
  • Stallings, W. (2013). Data and Computer Communications (10th ed.). Pearson.
  • Wicker, S. B. (1995). Error Control Systems for Digital Communication and Storage. Prentice Hall.
  • van Nee, R. & Prasad, R. (2000). OFDM for Wireless Multimedia Communications. Artech House.
  • IEEE Std 802.11ac-2013. (2013). IEEE Standard for Information technology—Telecommunications and information exchange between systems Local and metropolitan area networks—Specific requirements.
  • Verdu, S. (1998). Multiuser Detection. Cambridge University Press.