Supply Network Design

Table of contents

Supply Network Design

The Supply Network Perspective

A supply network perspective means setting an operation in the context of all the operations with which it interacts, some of which are its suppliers and its customers. Materials, parts, other information, ideas and sometimes people all flow through the network of customer-supplier relationships formed by all these operations. On its supply side an operation has its suppliers of parts, or information, or services. These suppliers themselves : have their own suppliers who in turn could also have suppliers, and so on.

On the demand side the operation has customers. These customers might not be the final consumers of the operation’s products or services; they might have their own set of customers.

•On the supply side is a group of operations that directly supply the operation; these are often called first-tier suppliers. They are supplied by second-tier suppliers. However, some second-tier suppliers may also supply an operation directly, thus missing out a link in the network. Similarly, on the demand side of the network, ‘first-tier’ customers are the main customer group for the operation.

These in turn supply ‘second-tier’ customers, although again the operation may at times supply second-tier customers directly. The suppliers and customers who have direct contact with an operation are called its immediate supply network, whereas all the operations which form the network of suppliers’ suppliers and customers‘ customers, etc. , are called the total supply network. Homeware manufacturer supplies some of its basic products to wholesalers which supply retail outlets. However, it also supplies some retailers directly with ‘made-to-order’ products.

Along with the flow of goods in the network from suppliers to customers, each link in the network will feed back orders and information to its suppliers. When stocks run low, the retailers will place orders with the wholesaler or directly with the manufacturer. The wholesaler will likewise place orders with the manufacturer, which will in turn place orders with its suppliers, which will replenish their own stocks from their suppliers. It is a two-way process with goods flowing one way and information flowing the other. It is not only manufacturers that are part of a supply network.

The second (service) operation, an operation which manages an enclosed shopping mall, also has suppliers and customers that themselves have their own suppliers and customers. Figure 6. 2 shows the supply network for an operation which manages an enclosed shopping mall. Why consider the whole supply network? •There are three important reasons for taking a supply network perspective:

•It helps an understanding of competitiveness. Immediate customers and immediate suppliers, quite understandably, are the main concern to competitively minded companies.

Yet sometimes they need to look beyond these immediate contacts to understand why customers and suppliers act as they do. Any operation has only two options if it wants to understand its ultimate customers’ needs at the end of the network. It can rely on all the intermediate customers and customers’ customers, etc. , which form the links in the network between the company and its end-customers. Alternatively, it can look beyond its immediate customer and suppliers. Relying on one’s immediate network is seen as putting too much faith in someone else’s judgment of things which are central to an organization’s own competitive health. It helps identify significant links in the network. The key to understanding supply networks lies in identifying the parts of the network which contribute to those performance objectives valued by end-customers. Any analysis of networks must start, therefore, by understanding the downstream end of the network. After this, the upstream parts of the network which contribute most to end-customer service will need to be identified. But they will not be equally significant. For example, the important end-customers for domestic plumbing parts and appliances are the installers and service companies that deal directly with domestic consumers.

They are supplied by ‘stock holders’ which must have all parts in stock and deliver them fast. Suppliers of parts to the stock holders can best contribute to their end-customers’ competitiveness partly by offering a short delivery lead time but mainly through dependable delivery. The key players in this example are the stock holders. The best way of winning end-customer business in this case is to give the stock holder prompt delivery which helps keep costs down while providing high availability of parts. •It helps focus on long-term issues. There are times when circumstances render parts of a supply network weaker than its adjacent links.

A major machine breakdown, for example, or a labour dispute might disrupt a whole network. Should its immediate customers and suppliers exploit the weakness to enhance their own competitive position, or should they tolerate the problems, and hope the customer or supplier will eventually recover? A long-term supply-network view would be to weigh the relative advantages to be gained from assisting or replacing the weak link. Design decisions in supply networks •The supply-network view is useful because it prompts three particularly important design decisions.

These are the most strategic of all the design decisions treated in this part of the book. It is necessary to understand them at this point, however, because, as well as having a particularly significant impact on the strategy of the organization, they set the context in which all other process design decisions are made. The three decisions are: •1- How should the network be configured? This means, first, how can an operation influence the shape which the network might take? Second, how much of the network should the operation own? This may be called the outsourcing, vertical integration or do-or-buy decision. 2- Where should each part of the network be located? If the home ware company builds a new factory, should it be close to its suppliers or close to its customers, or somewhere in between? This decision is called the operations location decision.

•3-What physical capacity should each part of the network have? How large should the home war factory be? Should it expand in large-capacity steps or small ones? These types of decisions are called long-term capacity management decisions.

•Note that all three of these decisions rely on assumptions regarding the level of future demand. The supplement to this chapter explores forecasting in more detail

Deciding whether to outsource

•Although the effect of outsourcing on the operation’s performance objective is important, there are other factors that companies take into account when deciding if outsourcing an activity is a sensible option. For example, if an activity has long-term strategic importance to a company, it is unlikely to outsource it. For example, a retailer might choose to keep the design and development of its web site in-house even though specialists could perform the activity at less cost because it plans to move into web-based retailing at some point in the future.

Nor would a company usually outsource an activity where it had specialized skills or knowledge. For example, a company making laser printers may have built up specialized knowledge in the production of sophisticated laser drives. •This capability may allow it to introduce product or process innovations in the future. It would be foolish to ‘give away’ such capability. After these two more strategic factors have been considered the company’s operations performance can be taken into account.

Obviously if its operations performance is already too superior to any potential supplier, it would be unlikely to outsource the activity. But also even if its performance was currently below that of potential suppliers, it may not outsource the activity if it feels that it could significantly improve its performance. Figure 6. 3 illustrates this decision logic. Outsourcing and offshoring •Two supply network strategies that are often confused are those of outsourcing and off-shoring Outsourcing means deciding to buy-in products or services rather than perform the activities in-house.

Off-shoring means obtaining products and services from operations that are based outside one’s own country. Of course, one may both outsource and offshore as illustrated in Figure 6. 4. Offshoring is very closely related to outsourcing and the motives for each may be similar. Offshoring to a lower-cost region of the world is usually done to reduce an operation’s overall costs as is outsourcing to a supplier that has greater expertise or scale or both. Critical commentary •In many Instances there has been fierce opposition to companies outsourcing some off their processes.

Trade unions often point out that the only reason that outsourcing companies can do the job at lower cost is that they either reduce salaries or reduce working conditions, or both. Furthermore, they say, flexibility is only achieved by reducing job security. Employees who were once part of a large and secure corporation could find themselves as far less secure employees of a less benevolent employer with a philosophy of permanent cost-cutting. Even some proponents of outsourcing are quick to point out the problems.

There can be significant obstacles, including understandable resistance from staff who find themselves ‘outsourced’. Some companies have also been guilty of ‘outsourcing a Problem’ . In other words, having failed to manage a process well themselves, they ship it out rather than face up to why the process was problematic in the first place. There is also evidence that, although long-term costs can be brought down when a process is outsourced, there may be an initial period when costs rise as both sides learn how to manage the new arrangement. The Location of capacity It was reputedly Lord Sieff, one-time boss of Marks and Spencer, the UK-based retail organization, who said, ‘There are three important things in retailing – location, location and location’, and any retailing operation knows exactly what he meant. Get the location wrong and it can have a significant impact on profits, or service. For example, misallocating a fire service station can slow down the average journey time of the fire crews in getting to the fires; •locating a factory where there is difficulty attracting labour with appropriate skills will affect the effectiveness of the factory’s operations.

Location decisions will usually have an effect on an operation’s costs as well as its ability to serve its customers (and therefore its revenues). Also, location decisions, once taken, are difficult to undo. The costs of moving an operation can be hugely expensive and the risks of inconveniencing customers very high. No operation wants to move very often. •Reasons for location decisions Not all operations can logically justify their location. Some are where they are for historical reasons. Yet even the operations that are ‘there because they’re there’ are implicitly making a decision not to move.

Presumably their assumption is that the cost and disruption involved in changing location would outweigh any potential benefits of a new location. Two stimuli often cause organizations to change locations: changes in demand for their goods and services, and changes in supply of their inputs. Changes in demand A change in location may be prompted by customer demand shifting. For example, as garment manufacture moved to Asia, suppliers of zips, threads, etc. started to follow them. Changes in the volume of demand can also prompt relocation.

To meet higher demand, an operation could expand its existing site, or choose a larger site in another location, or keep its existing location and find a second location for an additional operation; the last two options will involve a location decision. High-visibility operations may not have the choice of expanding on the same site to meet rising demand. A dry cleaning service may attract only marginally more business by expanding an existing site because it offers a local, and therefore convenient, service. Finding a new location for an additional operation is probably its only option for expansion.

Changes in supply. The other stimulus for relocation is changes in the cost, or availability, of the supply of inputs to the operation. For example, a mining or oil company will need to relocate as the minerals it is extracting become depleted. A manufacturing company might choose to relocate its operations to a part of the world where labour costs are low, because the equivalent resources (people) in its original location have become relatively expensive. Sometimes a business might choose to relocate to release funds if the value of the land it occupies is worth more than an alternative, equally good, location.

The objectives of the location decision

•The aim of the location decision is to achieve an appropriate balance between three related objectives:

•The Spatially variable costs the operation (spatially variable means that something changes with geographical location); •the service the operation is able to provide to its customers;

•the revenue potential of the operation.

•In for-profit organizations the last two objectives are related. The assumption is that the better the service the operation can provide to its customers, the better will be its potential to attract custom and therefore generate revenue.

In not-for-profit organizations, revenue potential might not be a relevant objective and so cost and customer service are often taken as the twin objectives of location. In making decisions about where to locate an operation, operations managers are concerned with minimizing spatially variable costs and maximizing revenue and customer service. Location affects both of these but not equally for all types of operation. For example, with most products, customers may not care very much where they were made. Location is unlikely to affect the operation’s revenues significantly.

However the costs of the operation will probably be very greatly affected by location. Services, on the other hand, often have both costs and revenues affected by location. The location decision for any operation is determined by the relative strength of supply-side and demand-side factors (see Fig. 6. 5). Location techniques Although operations managers must exercise considerable judgement in the choice of alterative locations, there are some systematic and quantitative techniques which can help the decision process.

We describe two here – the weighted-score method and the centre-of-gravity method.

•Weighted-score method The procedure involves, first of dl, identifying the criteria which will be used to evaluate the various locations. Second, it involves establishing the relative importance of each criterion and giving weighting factors to them. Third, it means raring each location according to each criterion. The scale of the score is arbitrary. In our example we shall use 0 to 100, where 0 represents the worst possible score and 100 the best. Worked example An Irish company which prints and makes specialist packaging materials for the pharmaceutical industry has decided to build a new factory somewhere in the Benelux countries so as to provide a speedy service for its customers in continental Europe. In order to choose a site it has decided to evaluate all options against a number of criteria, as follows:

•the cost of the site;

•the rate of local property taxation;

•the availability of suitable skills in the local labour force;

•the site’s access to the motorway network;

•the site’s access to the airport; the potential of the site for future expansion. After consultation with its property agents the company identifies three sites which seem to be broadly acceptable. These are known as sites A, B and C. The company also investigates each site and draws up the weighted-score table shown in Table 6. 2. It is important to remember that the scores shown in Table 6. 2 are those which the manager has given as an indication of how each site meets the company’s needs specifically. Nothing is necessarily being implied regarding any intrinsic worth of the locations. Likewise, the weightings are an indication of how important the company finds each criterion in the circumstances it finds itself. The ‘value’ of a site for each criterion is then calculated by multiplying. its score by the weightings for each criterion. • •For location A, its score for the ‘cost-of-site’ criterion is 80 and the weighting of this criterion is 4, so its value is •80 X 4 = 320. All these values are then summed for each site to obtain its total weighted score. • •Table 6. 2 indicates that location C has the highest total weighted score and therefore would be the preferred choice.

It is interesting to note, however, that location C has the lowest score on what is, by the company’s own choice, the most important criterion – cost of the site. The high total weighted score which location C achieves in other criteria, however, outweighs this deficiency. If, on examination of this table, a company cannot accept what appears to be an inconsistency, then either the weights which have been given to each criterion, or the scores that have been allocated, do not truly 1 reflect the company’s preference. ?

Read more

Network Design Project

Situation in which the Project Exists: This project is for a residential data communication network. The proposed network is designed to connect 2 workstations and 1 printer. It will provide internet access as well as multiple email addresses. The client has approved an initial investment of $5,000 to implement the networking project. The two workstations […]

Read more

Network Design Proposal

Unlimited Security International is a diversified company composed of two segments (Security Solutions, and Fire Protection) that provides vital products and services to customers around the world. Security Solutions: Sell, designs, installs and maintains integrated systems to detect intrusion, control access and react to movement, fire, smoke, flooding, environmental conditions, industrial processes and other hazards. Fire Protection: Sell, designs, installs and maintains fire detection, fire sprinkler, fire suppression, emergency communications, and nurse call systems in both new and existing facilities.

Our global reach allows us to anticipate changes across geographies and industries, and deploy the right solutions rapidly. In the most challenging and demanding environments, we help our customers achieve their safety, security and business goals. Unlimited Security International is a market leader in the $100 billion+ global fire protection and security solutions industries. Our 225,000 employees take great pride in knowing that they make a difference in the world: their work helps protect and safeguard people and property. Our products and solutions help protect:

80% of the world’s top retailers

More than 1,000,000 fire fighters around the world
300 international airports
100+ major stadiums around the world
200+ hospitals around the world
Nearly 9 million commercial, government and residential customers Communications Methods used by Unlimited Security International

1. Desktop computers – Used by management, sales, service, and administrative workers to conduct daily transactions, email, and training. 2. Plain old telephone service- Used to conduct routine conversations with customers, and field technicians.
3. VoIP – Used to conduct secure conversations within the organization.
4. Video teleconference, conference calls, and Web-Cast – Used for training, passing word, analyzing plans while saving money from travel expenses.
5. Laptop computers and VPN’s – Used by management, and mobile employees.
6. PDA’s – Used by remote employees to view, and update plans and documents.
7. Smart phones – Used by mobile employees
8. Wireless network
9. Global Positioning System – Track vehicle location and usage

Protocols

802.1q (VLAN)
802.3an
802.11n
802.16 (WiMAX)
Media Gateway Control Protocol (MGCP)
Domain Name Service (DNS)
Ipv4
Hypertext Transport Protocol (HTTP)
Hypertext Transport Protocol Secure (HTTP)
Trivial File Transfer Protocol (TFTP)
Simple Network Management Protocol (SNMP)
Internet Control Message Protocol (ICMP)
Internet Protocol Security (IPSec)
Session Description Protocol (SDP)
Temporal Key Integrity Protocol (TKIP)
Wi-Fi Protected Access 2 (WPA2)

Management and Monitoring

The goal of our network fault management and monitoring is to detect, log, notify users of, and (to the extent possible) automatically fix network problems to keep the network running effectively. Fault Management—Detect, isolate, notify, and correct faults encountered in the network. Configuration Management—Configuration aspects of network devices such as configuration file management, inventory management, and software management.

Performance Management—Monitor and measure various aspects of performance so that overall performance can be maintained at an acceptable level. Security Management—Provide access to network devices and corporate resources to authorized individuals. Accounting Management—Usage information of network resources. The management and monitoring platform will include:

Network discovery
Topology mapping of network elements
Event handler
Performance data collector and grapher
Management data browser

Trivial File Transfer Protocol (TFTP) and system log (syslog) servers are crucial components of this troubleshooting infrastructure. The TFTP server is used primarily for storing configuration files and software images for network devices. The routers and switches are capable of sending system log messages to a syslog server. The messages facilitate the troubleshooting function when problems are encountered.

Security Management

The goal of our security management is to control access to network resources according to local guidelines so that the network cannot be sabotaged (intentionally or unintentionally). The security management subsystem can monitor users logging on to a network resource, refusing access to those who enter inappropriate access codes. Use the following methods of controlling access on the routers and switches: Access Control Lists (ACL)

User IDs and passwords local to the device
Terminal Access Controller Access Control System (TACACS)

TACACS is an Internet Engineering Task Force (RFC 1492) standard security protocol that runs between client devices on a network and against a TACACS server. TACACS is an authentication mechanism that is used to authenticate the identity of a device seeking remote access to a privileged database. Variations of TACACS include TACACS+, the AAA architecture that separates authentication, authorization, and accounting functions

. Authentication

Authentication is the way a user is identified prior to being allowed access to the router or switch. There is a fundamental relationship between
authentication and authorization. The more authorization privileges a user receives, the stronger the authentication will be.

Authorization

Authorization provides remote access control, including one-time authorization and authorization for each service that is requested by the user.

Accounting
Accounting allows for the collecting and sending of security information used for billing, auditing, and reporting, such as user identities, start and stop times, and executed commands. Network managers can track the services that users are accessing as well as the amount of network resources they are consuming.

Unified Communications

1. Unified Messaging (Voice, Email & Fax)
2. Mobility
3. Audio & Video Conferencing
4. Core UC (VoIP, IM, Group chat, webconferencing)
5. PBX Integration and/or Replacement
6. Contact Center
7. Communication enabled Business Process (CEBP)

Protocols

1. Session Initiation Protocol (SIP)
2. Real-Time Streaming Protocol (RTSP)
3. Real-Time Transport Protocol (RTP)
4. Real-Time Control Protocol (RTCP)

Read more

Verizon Advanced (Otn) Network Design

The set of complex challenges that an Enterprise might face over time, like –global growth, mobility, threat prevention, collaboration can either contribute to its success or be stumbling blocks. So, working with a company that understands a business, potential limitations, and possible opportunities, really does make a lot of sense. Verizon has the most comprehensive set of capabilities for global, secure communication services that has been achieved through the understanding, expertise, and drive to deliver business solutions that tackle unique challenges.

The entire bouquet of solutions and services that Verizon provides to its customers includes IT Solutions & Data Management, Security Solutions for a 24X7 secure traversal of data and network, Communication Solutions, IP-based Network Solution that makes it possible to connect, communicate, and collaborate in a competitive world, etc. And not only that, Verizon also provides a comprehensive professional service that covers enterprise essentials from building your networks, to making them resilient and secure, to managing what runs on the network.

Apart from the services, Verizon also provides a wide range of product based solutions to its customers. This includes Leading hardware and maintenance plans designed to meet client requirements, world-class voice services from one provider around the globe, largest wholly-owned global IP networks in the world connecting 150 countries on six continents with reliable and secure connectivity, IT hosting facilities, Intelligent routing, voice recognition, and workforce management tools etc.

In short, the major functions of Verizon can be coined as : Improving a business infrastructure and application performance, securing an Extended Enterprise, enabling business collaboration, connecting a business to its customers, partners, suppliers, and employees.

Read more

Supply Network Design

Supply Network Design The Supply Network Perspective: A supply network perspective means setting an operation in the context of all the operations with which it interacts, some of which are its suppliers and its customers. Materials, parts, other information, ideas and sometimes people all flow through the network of customer-supplier relationships formed by all these […]

Read more

Comparison Of Internet Security Protocols

Introduction I have been asked to research and compare two of the most widely used internet security protocols, Transport Layer Security (TLS) and Secure Shell (SSH). In this report I shall research both protocols and then compare the two listing similarities and differences in how they operate as security protocols. I shall examine the features […]

Read more

Network Design in Supply Chain

18. 12. 2011 Fusun Ulengin MANUFACTURER OR DISTRIBUTOR STORAGE WITH CUSTOMER PICKUP 18. 12. 2011 Fusun Ulengin MANUFACTURER OR DISTRIBUTOR STORAGE WITH CUSTOMER PICKUP ? Inventory is stored at the distributor or manufacturer ? Orders are shipped to designated pickup points where customers come and pick up their order 18. 12. 2011 Fusun Ulengin MANUFACTURER […]

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp