Coders PlayGround

Coders PlayGround

Learn to code and change the future!

Monday 22 October 2018

Leadership and Ethics in Software Project Management

October 22, 2018 1







Important Notes on Leadership and Ethics In Software Project Management


How Management and Leadership is different from each other?

• Management     
     – Focuses on policies and procedures that bring order and predictability to complex organizational situations
     – Is traditionally defined with such activities as planning, organizing, controlling, staffing, evaluating, and monitoring 
• Leadership     
     – Is different from management, although they tend to overlap
     – Centers on vision, change and getting results that involve setting direction, aligning people, and
motivating them
 

Various types of leadership styles:

Leadership Style
The following six styles can be used in influence performance and results
– The Coercive Style
     • Attitude: “do as I say”  
     • Can be effective in a crisis situation, kick-start a turnaround situation, dealing with a problem
an employee, or when trying to achieve immediate compliance
     • Can be ineffective in many other situations and can have a negative impact on the climate of the
organization or project
  

– The Authoritative Style
     • Attitude: “Come with me!”  
     • The leader outlines a clearly defined goal but empowers people to choose their own means for achieving it
     • Authoritative leaders provide vision and enthusiasm
         

         – Shows how peoples’ work fits into the large picture
         – People believe their work has meaning and purpose
         – Standards for success and performance are clear to everyone
     

     • The authoritative style works best when the organization or project is adrift
     • Not a good style for inexperienced leaders who work with experts or a more experienced team
 

– The Affiliative Style
     • Attitude: “people come first!”
     • Affiliative leaders try to build strong emotional bonds that translate into strong loyalty by attempting to keep people happy and creating harmony among them
         

         – The idea is that people who like each other tend to communicate more, share ideas & inspirations, and take risks
         – The leader does not impose unnecessary rules and structures to define the work 

         – that’s up to those who must do it     
    • Works well in situations where the leader must build team harmony, morale, trust, or communication
     • Does not work well where people need some structure or direction
        

        – An over-caring and over-nurturing approach can create a perception that mediocrity is tolerated 

– The Democratic Style
     • Attitude: “what do you think?”
     • The leaders try to get other’s ideas while building trust, respect, and commitment
     • People have a greater say in the decisions that affect their work
         

         – Morale tends to be higher
         – More realistic idea of what can or cannot be done
     

     • Works best when the leader needs buy-in or consensus or to gain valuable input from others
     • But can lead to seemingly endless meetings or the perception that the group is leaderless
         

        – Not appropriate in a crisis or when the team does not have competence or experience to offer sound advice 

– The Pace Setting Style
     • Attitude: “do as I do, now!”
     • The leader sets high-performance standards and has an obsession for doing things better and faster
         

         – Poor performers are quickly identified and replaced
         – Morale can deteriorate if people feel overwhelmed by the pace or demands for excellence or performance
         – Goals may be clear to the leader, but not to everyone else
     • The leader may try to micromanage by taking over the work of others         
         – People may lose energy and enthusiasm if the work becomes task-focused, routine, and boring
         – If the leader leaves, people may feel adrift since the pacesetter sets all direction
     

     • Maybe appropriate in situations that require quick results from a highly motivated, self-directed, and competent team 

– The Coaching Style
 
     • Attitude: “try this!”
     • The leader helps people identify their unique strengths and weaknesses so that they can reach their personal & career goals
     • The leader is good at delegating and giving people challenging, but attainable, assignments
              – Short or minor failures are acceptable and viewed as positive learning experiences     
     • This style may be the least often used, but can be a valuable and powerful tool for improving performance and the climate of the organization or project         
        – Works well in many situations, but is most effective when people are willing to be coached
        – Least effective when people are resistant to change or when the leader does not have to knowledge, capability, or desire to be a coach
 

The Five Exemplary Practices of Leadership:

Five Exemplary Practices of Leadership:

1. Model The Way 
– Most effective leaders lead by example
– A leader’s behaviour wins respect, not title or position
– Find your own voice based on your personal values and beliefs
- what you do is often more important than what you say
– Modelling the way sets an example of what the leader expects from others and gives the leader the right to lead others

 
2. Inspire a Vision 
– Exemplary leaders have an exciting vision or dream that acts as a force to ignite a passion for what the future could be (i.e., inventing the future)
– This vision should inspire people so that they become committed to a purpose by
 
    • Understanding their needs, interest, and language
    • Engaging in dialogue, not monologue


3. Challenge the Process 
– Exemplary leaders venture out and accept challenges not the status quo 
• They look for new opportunities to innovate, grow and improve
     – But most leaders do not create, develop, or come up with new products, services, or processes 
• They are often good listeners who recognize good ideas, support those ideas, and then challenge the process to make those ideas happen
• They minimize the risk of failure for others while making people feel safe and comfortable in taking risks


4. Enable Others to Act 
– Leaders must get others to act by encouraging collaboration and building trust among the project stakeholders
– Leaders provide an environment that makes it possible for others to do good work
– People should feel empowered and motivated to do their best, feel a sense of ownership, and take pride in what they do
– Leaders should give power away, not hang on to it
– In short, a leader must turn his or her followers into leaders themselves


5. Encourage the Heart 
– Exemplary leaders rally others to carry on by encouraging the heart 
 • Can be simple gestures such as a thank-you note or more dramatic such as a marching band     
     – The leaders should show appreciation for people’s contributions and create a culture to recognize
accomplishments

 • Recognition and celebration should not be phony or lame
 • Must visibly link rewards with performance
 
     – Authentic rituals and celebration can that align with a team’s values can build a strong collective identify and spirit that can carry the team throughout the project journey

What is Emotional Intelligence

Emotional intelligence is the ability to understand and manage our relationships and ourselves better  
The four capabilities are as follows:
o Self-Awareness     
     • Emotional Self-Awareness 
        – Reading and understanding your emotions as well as how your emotions impact your job performance and those around you 
     • Accurate Self-Assessment 
         – Realistically evaluating your strengths and weaknesses 
     • Self-Confidence 
         – Having a strong and positive sense of self-worth 

o Self-Management
      • Self-Control 
         – Keeping your impulses and negative emotions in check 
     • Trustworthiness
          – Maintaining a high level of honesty and integrity 
     • Conscientiousness 
         – Managing yourself and responsibilities effectively 
     • Adaptability 
         – Adjusting to new situations & overcoming challenges 
     • Achievement Orientation 
         – Meeting high internal standards of excellence 
     • Initiative 
         – Seizing new opportunities


o Social Awareness 
     • Empathy
          – Seeing and understanding other people’s emotions, perspectives, and being genuinely concerned in the problems and interests 
     • Organizational Awareness 
         – Being perceptive about the currents of everyday organization life, building networks, and navigating through organizational politics 
     • Service Orientation 
         – Recognizing and meeting customer needs
 
o Social Skills 
     • Visionary Leadership
         – Taking charge and inspiring others with a compelling vision
      • Influence 
         – Having a wide range of persuasive tactics at your disposal 
     • Developing Others 
         – Bolstering the abilities of others through feedback and guidance 
     • Communication 
         – Listening and sending a clear, convincing, and well-aimed message 
     • Change Catalyst 
         – Initiating new ideas and leading people in the right direction 
     • Conflict Management 
         – Being able to de-escalate disagreements and facilitate resolutions 
     • Building Bonds 
         – Cultivating and maintaining a web of relationships inside and outside the organization 
     • Teamwork and Collaboration 
         – Facilitating cooperation and building teams 

What is Ethics?

Ethics:
Ethics can be defined as a set of moral principles and values  

Making Sound Ethical Decisions
1. Gather the Facts
2. Define the Ethical Issue
3. Identify the Affected Stakeholders
4. Identify the Consequences
5. Identify the Obligations
6. Consider Your Character and Integrity
 


Credits to Prof Mahalaxmi S. faculty of Department of Information Technology from Don Bosco Institute of Technology, Kurla.






Read More

Procurement Management in Software Project Management

October 22, 2018 5




Important stuff on Procurement management

What is Procurement Management?

Is one of the nine PMBOK® areas
• Focuses on the acquisition and management of outside products and services
• Project teams require resources and many of these resources must be acquired externally
– e.g., office supplies, technology, printing services, etc. 

• Organizations can also outsource entire business functions and business processes– e.g., data centers, call centers, accounting functions, and projects 
• Outsourcing was commonly called “subcontracting
• Project teams can be outsourcing buyers and sellers
 

PMBOK Definition:

The contract management and change control processes are required to administer contracts or purchase orders issued by authorized project team members. Project Procurement Management also includes administering any contract issued by an outside organization (the buyer) that is acquiring the project from the performing organization (the seller) and administering contractual obligations placed on the project team by the contract.  

Types of Cost:

Direct and Indirect Cost
Direct costs are defined as the costs that have been incurred only for the purpose of the project. One example of this type of cost can be the salaries of the full-time staff members, or equipment purchased exclusively for use in the project

Indirect costs represent costs that refer to more general, more broad types of costs, such as administrative costs and general overhead costs.

Types of Contract:

Fixed-Price or Lump-Sum Contracts 
– A total or fixed price is negotiated or set as the final price for a product or service
– May include incentives for meeting certain performance objectives or penalties if those objectives are not met
 

Cost-Reimbursable Contracts 
– Payment or reimbursement is made to the seller to cover the seller’s actual direct costs (i.e., labour, materials, etc.) and indirect costs (i.e., admin. salaries, rent, utilities, etc.)
– May include incentives for meeting certain objectives or penalties if those objectives are not met
– Types

 • Cost-Plus-Fee (CPF) or Cost-Plus-Percentage Cost (CPPC)
    – The seller is paid for the costs incurred in performing the work as well as a fee based upon an agreed-on percentage of the costs
• Cost-Plus-Fixed-Fee (CPFF)
   – The seller is reimbursed for the total direct and indirect costs of doing the work but receives a fixed amount that does not change unless the project’s scope changes
• Cost-Plus-Incentive-Fee (CPIF)
   – The seller is reimbursed for the costs incurred in doing the work and receives a predetermined fee plus an incentive bonus for meeting certain objectives 

Time and Materials (T&M) Contracts
 – A hybrid of cost-reimbursable and fixed-price contracts
– The buyer pays the seller for both the time and materials required to complete the work
 

• Resembles a cost-reimbursable contract because it is open-ended and the full cost of the project is not predetermined
• But can resemble a fixed-price contract if unit rates are set
 


Outsourcing


Outsourcing provides more of a strategic approach, while project procurement management is more tactical approach.

Various outsourcing Relationships:

• Business Process Outsourcing 
– Where an organization turns over processes other than just IT    
• E.g., Accounting, Human Resources, R&D, etc. 
• Offshoring– Outsourcing to another country usually overseas in order to take advantage of labour arbitrage (cheaper labour) 

Various approaches to outsourcing:

Full-In-sourcing    
    • The organization or project develops all products and services internally
– Full-Outsourcing     
    • All products and services are acquired from external sources 
– Selective Outsourcing     
    • Perhaps the best approach because it provides greater flexibility in choosing which processes or deliverables should be outsourced and which should be kept internal 


Credits to Prof Mahalaxmi S. faculty of Department of Information Technology from Don Bosco Institute of Technology, Kurla.





Read More

Wednesday 17 October 2018

Wireless Technology Q&A

October 17, 2018 4


Wireless in Local Loop (WLL):
What is WLL system?
o WLL is a system that connects subscribers to a public switched telephone network (PSTN) using radio signals as a substitute for copper transmission media for all or part of the connection between the subscriber and the switch.
o  WLL is also known as Fixed Wireless Access (FWA), Radio in the loop (RITL), Fixed-Radio Access (FRA).
There are two alternatives to WLL:
> Narrowband WLL - offers replacement for existing telephone system
> Broadband WLL - provide high speed voice and data service
WLL configuration:
Figure 1: WLL configuration
Architecture of WLL:
Figure 2: WLL architecture

• The given architecture consists of three major components i.e WANU, WASU and SF
• Wireless Access network unit (WANU):
 The WANU consists of various components which include
  1. Several base stations transceivers or radio ports (RP)
  2. a Radio port control unit
  3. an Access manager (AM)
  4. an HLR.
• It provides various functionalities like:
  1. Authentication
  2. Air interface privacy
  3. Over-the-air registration of subscriber units.
  4. Operations and Maintenance
  5. Routing
  6. Billing
  7. Switching functions
  8. Transcoding of voice and data.
Wireless access subscriber unit (WASU): 
It provides an air interface UWLL towards the network and a traditional interface TWLL towards the subscriber.
• The power supply for it is provided locally.
• The interface includes
  1. protocol conversion and transcoding
  2. authentication functions
  3. signaling functions
• Switching Function (SF): 
The switching function (SF) is associated with a switch that can be digital switch with or without Advanced Intelligent Network (AIN) capability, an ISDN switch or a Mobile Switching Centre (MSC).

• The TWLL interface can be an RJ-11 or RJ-45 port.
• The UWLL interface can be AMPS, GSM, DECT and so one.
• The AWLL interface between the WANU and the SF can be ISDN-BRI or IS-634 or IS-653 or such variants.

Various issues are considered in WLL development which include:
  1. Spectrum: The implementation of WLL should be flexible to accommodate different flexible bands as well as non-continuous bands. More these bands are licenseby the government.
  2. Service quality: Customer expects that the quality of service should be better than the wireline counterpart. The quality requirements include link quality, reliability and fraud immunity.
  3. Network Planning: Unlike Mobile System, WLL assumes that user is stationary, not moving. Also, the network penetration should be greater than 90%. Therefore WLL should be installed based on parameters like Population Density etc.
  4. Economics: Major cost here is electronic equipment’s. In the current scenario, the cost of such electronic equipment is reducing periodically.
     
Advantages of WLL over the wired system to subscriber local loop support:
1.  Time of installation: Much less than wired system.
2. Cost: the Overall total cost of wireless system components, installation, and maintenance is less than a wired system.
3. The scale of installation: Radio transceivers are installed only for those subscribers who need the service at the given time.

Wireless Local Loop Techniques are as follows:
o Multichannel Multipoint Distribution Service (MMDS)
o Local Multipoint Distribution Service (LMDS)

A) Multichannel Multipoint Distribution Service (MMDS)
o Used to support two-way services as well as an alternative for broadband services. 
o In United States, the FCC(Federal communication commision) has allocated five frequency bands in the range of 2.15 - 2.68 GHz
o Used in Tv and Data signals
Advantages:
o Cost of subscriber and base stations is lowered because the equipment operating at low frequency is less expensive.
o MMDS signals can travel further without power losses.
o Less susceptible to rain absorption. MDDS signals do not get blocked by objects, which allow them to be sent fot longer distance.
Disadvantage:
o Low bandwidth as compared to LMDS

B) Local Multipoint Distribution Service (LMDS)
o Broadband wireless point to multipoint communication technology used to provide digital two-way voice, data, Internet and video services.
o Operates on microwave frequency across 26Ghz to 29Ghz bands.
o LMDS uses cellular like architecture.
o The propogation characteristics of signal limit the potential coverage area to a single cell site.

Advantages of LMDS:
o Easy and fast to deploy
o Realization of revenue is fast.
o Relatively less expensive if compared with cable alternatives.
o Easy and cost-effective network mainteinance, management, and operation
o Data rate is relatively high, in Mbps range.
o Scalable architecture with customer demands

Drawback of LMDS:
o Short range from the base station, as a result increase in number of base stations in order to service a specific area.

Wireless Personal Area Networks

Bluetooth

Bluetooth wireless technology is a short-range radio technology, which is developed for Personal Area Network (PAN). Bluetooth is a standard developed by a group of electronics manufacturers that allows any sort of electronic equipment -- from computers and cell phones to keyboards and headphones -- to make its own connections, without wires, cables or any direct action from a user.

Topology:

Before learning about the topology let us understand some basic terms:
Master & Slave: When two bluetooth devices want to connect, the one requesting the connection is known as master and the other is known as slave. The master always controls the link created between the two devices. A master can setup 7-8 active connections.
PARK Mode: When a master instructs a slave to 'sleep' for the specified amount of time by putting them in low-power mode, it is known as PARK Mode.

    Now let us understand the different topology present in Bluetooth.

There are two types of topology
o Piconet
o Scatternet

A) Piconet:

o The Piconet is a small ad hoc network of devices (normally 8 stations) as shown in Figure 3.
o Devices in a Piconet hop together according to master's clock value and its 48 bit device ID
o Slave to Slave transmission is not possible. If they want to communicate then either they can form a separate piconet where one of them is master or use a higher layer protocol. 
Figure 3: Piconet
It has the following features:
o One is called Master and the others are called Slaves
o All slave stations synchronizes their clocks with the master
o Possible communication - One-to-one or one-to-many
o There may be one station in parked state
o Each piconet has a unique hopping pattern/ID
o Each master can connect to 7 simultaneous or 200+ inactive (parked) slaves per piconet 

B) Scatternet:

o A collection of overlapping piconets is called scatternet. 
o Devices participating in two or more piconets are known as bridge devices and participate in each piconet in time-sharing manner.
o A bridge node that participates in several piconets can be either:
    > Slave in all piconets. In this case, when leaving the old piconet, the slave has to inform the master for the duration of its absence.

    > Master in one piconet and slave in all others. In this case, all traffic in the old piconet is suspended until the master returns to the piconet. The suspension of traffic is achieved by putting the piconets slaves into low power HOLD mode.

Figure 4: Scatternet
By making one slave as master of another Piconet, Scatternet is formed by combining several Piconets as shown in Figure 4.
Key features of the scatternet topology are mentioned below:
• Linking of multiple co-located piconets through the sharing of common master or slave devices.
• A device can a master as well as a slave.
• High capacity system

Bluetooth Protocol Stack

Figure 5: Bluetooth protocol stack
A) Radio Layer:
• The Radio layer provides electrical specification in order to send and receive bitstreams over the channel.
• It makes use of 2.4 GHz license free band.
• Time division duplex & Frequency hopping is used for transmission with hopping rate of 1600 hops/s.
79 hop carriers equally spaced with 1 MHz.
GFSK is used for modulation.

B) Baseband layer:
• The Baseband layer enables operations of Bluetooth link medium. 
• It controls the following:
o Device Addressing
o Channel control by using paging and inquiry methods 
o Power saving
o Flow control & synchronization among devices.

C) Link Manager Protocol (LMP):
• The Link management layer runs the Link Manager Protocol (LMP).
• The functions are covered by LMP:
o Authentication, encryption and pairing
o Capability negotiation
o Synchronization
o Power control
o QoS negotiation
o State and transmission mode change
o Link Supervision

D) Logical Link Control and Adapation Protocol (L2CAP):
• Logical Link Control and Adaptation Protocol (L2CAP) supports higher level protocol multiplexing, packet segmentation and reassembly, and the conveying of quality of service information.
• L2CAP provides:
o Connection-oriented and connectionless data services to upper layer protocols with protocol multiplexing capability.
o Group abstractions.
• L2CAP provides three different types of logical channels, these are:
o Connectionless - broadcast
o Connection-oriented - data transfer with QoS flow specification.
o Signaling -  exchange signaling messages between L2CAP entities.

E) Host Controller Interface (HCI):
• The Host Controller Interface (HCI) provides a command interface to the Baseband Link Controller and Link Manager.
• Access to hardware status and control registers.
• A uniform method of accessing the Bluetooth baseband capabilities.
• The HCI exists across 3 sections, The Host, Transport Layer, and Host Controller. Each section has a different role in HCI system.
• HCI defines the set of functions of a Bluetooth module that are accessible to the host and its application.
• HCI can be seen as a boundary.

F) RFCOMM:
• The RFCOMM protocol runs a serial line RS-232 control and data signal emulation protocol
• Provides a serial line interface to all the applications, hence also called as cable replacement protocol.
• Based on the ETSI std TS 07.10.
• Supports multiple serial ports over a single physical channel.

G) Service Discovery Protocol (SDP):
• The Service Discovery Protocol (SDP) provides a means for applications to discover, which services are provided by or available through a Bluetooth device.
• New service is discovered as follows:
    o Client sends request to search for an interested service.
    o Server responds to the client with list of available services that match to the client’s criteria.
    o Client uses list to retrieve additional attribute for the service of interest.

H) Telephony Control Protocol Specification (TCS):
• Define call control signaling for establishment of voice, data calls between devices 

Bluetooth Security

A) Bluetooth security features

o Authentication and Encryption feature is supported by Bluetooth.
o Authentication:  It verifies the user on the other side of the link.
o Encryption: It ensures confidentiality of data. 
i. Pairing
    When two devices communicate for the first time, a secret key is generated which is shared and stored in both the devices. In future, there is no pairing procedure of the same device.
ii. Security modes of a device:
There are three security modes to a device.
  • Non-secure: Security procedure is not initiated by the device.
  • Service level enforced security:  Before channel establishment at the L2CAP level, the device does not initiate security procedures.
  • Link level enforced security: Security procedure is initiated before link  set up at LMP is completed.


Figure 5: Security in Bluetooth

2. Bluetooth security levels
Authentication: After determining the type of service, authentication is performed. It cannot be performed when ACL link is established, performed only when connection request to service is submitted. Bidirectional: client authenticates server and vice versa.
Figure 6: Authentication Procedure in Bluetooth

Authentication procedure: - 
1. The connection request is sent to L2CAP. 
2. L2CAP requests access from the security manager. 
3. The security manager enquires the service database. 
4. The security manager enquires the device database. 
5. If necessary, the security manager enforces the authentication and encryption procedure. 
6. The security manager grants access, and L2CAP continues to set up the connection.

Authorization:

There are two kinds of device trust levels:
  • Trusted device: It has fixed relationship (paired) and unrestricted access to all services.
  • Untrusted device: This device has been previously authenticated, a link key is stored, but the device is not marked as trusted in device database.
  • An unknown device is also an untrusted device. No security information is available for this device.
Services that require authorization and authentication — Trusted devices are granted automatic access. Rest devices need a manual authorization. 
Services that require authentication only — As stated, authorization is not necessary 
 
A default security level is defined to serve the needs of legacy applications and will be used unless other settings related to a service are found in a security database.

IEEE 802.11 standards:

o Specifies physical layer and MAC layer standards, operating at 2.4GHz ISM band with 1 or 2 Mbps data rate.
Figure 7: IEEE Comparison chart

WiMax vs LTE:
Figure 8: LTE vs WiMax

References:
5 Broadcast Communication Networks Version 2 CSE IIT, Kharagpur 



Read More
PropellerAds