17
Feasibility Report Page 1 of 12 FEASIBILITY Report Live Production Network for CISCO 1 February 2014 Anurag Sharma IT/10/505

networking report for sbit

Embed Size (px)

DESCRIPTION

networking report complete

Citation preview

Page 1: networking report for sbit

Feasibility Report

Page 1 of 12

FEASIBILITY Report Live Production Network for CISCO

1 February 2014 Anurag Sharma IT/10/505

Page 2: networking report for sbit

Feasibility Report

Page 2 of 12

TABLE OF CONTENTS

1.1 Purpose............................................................................................................................4

1.2 Scope................................................................................................................................4

1.3 System Overview ............................................................................................................4

1.4 Project References .........................................................................................................5

1.5 Acronyms and Abbreviations .......................................................................................5

1.6 Points of Contact ............................................................................................................51.6.1 Information ........................................................................................................................................... . 51.6.2 Coordination ......................................................................................................................................... . 5

2.1 Environment ...................................................................................................................62.1.1 Organizations Involved ......................................................................................................................... . 62.1.2 Input/ Output......................................................................................................................................... . 62.1.3 Processing ............................................................................................................................................. . 62.1.4 Security ................................................................................................................................................. . 62.1.5 System Interaction ................................................................................................................................ . 62.1.6 Physical Environment ........................................................................................................................... . 6

2.2 Current Functional Procedures ....................................................................................6

2.3 Functional Objectives ....................................................................................................7

2.4 Performance Objectives ................................................................................................7

2.5 Assumptions and Constraints .......................................................................................7

2.6 Methodology ...................................................................................................................7

2.7 Evaluation Criteria ........................................................................................................7

2.8 Recommendation............................................................................................................7

3.1 Description of Proposed System ...................................................................................1

3.2 Improvements.................................................................................................................1

3.3 Time and Resource Costs ..............................................................................................1

3.4 Impacts............................................................................................................................13.4.1 Equipment Impacts ............................................................................................................................... . 13.4.2 Software Impacts .................................................................................................................................. . 13.4.3 Organizational Impacts ......................................................................................................................... . 13.4.4 Operational Impacts .............................................................................................................................. . 13.4.5 Developmental Impacts ........................................................................................................................ . 23.4.6 Site or Facility Impacts ......................................................................................................................... . 23.4.7 Security and Privacy Impacts................................................................................................................ . 2

3.5 Rationale for Recommendations ..................................................................................2

4.0 Description of [Alternative System Name] ..................................................................3

Page 3: networking report for sbit

Feasibility Report

Page 3 of 12

NOTE TO AUTHOR: Highlighted, italicized text throughout this template is provided solely as background information to assist you in creating this document. Please delete all such text, as well as the instructions in each section, prior to submitting this document. ONLY YOUR PROJECT- SPECIFIC INFORMATION SHOULD APPEAR IN THE FINAL VERSION OF THIS DOCUMENT.

The Feasibility Study is used to provide an analysis of the objectives, requirements, and system concepts of the proposed system, including justification, schedule, and end products. During this analysis, the objectives of the system are defined based on the needed functions described previously. Included in these system objectives are the high-level functional and performance objectives and any assumptions and constraints. When the system objectives have been identified, the various alternatives for satisfying those objectives are determined. For each alternative, the costs in time and resources are estimated. A determination is then made as to the most feasible development alternative.

Page 4: networking report for sbit

Feasibility Report

Page 4 of 12

1.0 GENERAL INFORMATION

1.1 Purpose

A network consists of 2 or more computers connected together, and they can communicate and share resources (e.g. information). When we connect two or more than two computers for sharing of resources is known as networking.

1.2 Scope

Certificate courses in MCSE(Microsoft Certified System Engineer), CCNA(Cisco Certified Network Associate). Prospects are good in the hardware and networking field, especially if you have a BE(Computer Engineering)/B.Tech/BCA and the certificate courses mentioned above.

1.3 System Overview

Provide a brief system overview description as a point of reference for the remainder of the document. In addition, include the following:

Network Zone

Windows Server 2012

System code

System category

Major application: Remote Desktop, Remote Assistance.

General support system: Windows 7, Windows Server 2012.

Operational status

creating user account through command prompt.

User management and creating peer-to-peer networking work group.

providing permissions to various applications.

Page 5: networking report for sbit

Feasibility Report

Page 5 of 12

1.4 Project References• Held G., “Internetworking LANs and WANs – Concepts, Techniques and Methods”, Wiley, 2nd Ed.,

1998

Comment: Good at concepts

• Stallings W., “Data and Computer Communications”, Prentice Hall, 7th Ed., 2004

Comment: Good at concepts and very up-to-date

• Forouzan B. A, “Data Communications and Networking”, McGraw-Hill, 2nd Ed., 2000

Comment: Many good revision questions at ends of chapters

• Redmond W., “MCSE Training Kit: Networking Essentials Plus”, Microsoft Press, 2000

Comment: Practical oriented

1.5 Acronyms and Abbreviations

Provide a list of the acronyms and abbreviations used in this document and the meaning of each.

1.6 Points of Contact

1.6.1 Information

We are now 7 years old organization having training Centre in Delhi. We have been able to garner appreciation by the grace of God and by our belief in hard work and commitment. We strongly believe in achieving new targets and meeting customer expectation with high level of professionalism and transparency. We believe in delivering new landmarks for students, industry and society. We are small but we are proud of our contribution. Also we are selective. And our courses are not meant for everyone. Everyone does not come to us and everyone who comes to us is not selected. We are selective because unlike most of our competitors, we do not follow an open door policy. We aim at making small yet powerful impact and so we invite limited number of students and transform them into top professionals. If size of an institution is important to the future engineers then they might be disappointed. If world-class infrastructure, top-faculty and becoming a real professional is important to them, we invite them to explore further.

1.6.2 Coordination

Karnal Greenwood PolytechnicHi-Tech Institute of Engineering & TechnologyMSMEHardcon Limited

Page 6: networking report for sbit

Feasibility Report

Page 6 of 12

2.0 MANAGEMENT SUMMARY

2.1 Environment

2.1.1 Organizations Involved

We are committed to give the best & innovative solutions in area of It Training, Communication, &

Technology Consultancy.

To be the leader in the field of IT training & services, as a team, we will achieve aggressive growth. We

enjoy exploring new ways of thinking and problem solving. This can mean devising completely new

solutions, or applying tried and trusted solutions in contexts never contemplated before. Bring together

people, projects, technologies, and environments.

2.1.2 Input/ Output

Input

Output

2.1.3 Processing

Page 7: networking report for sbit

Feasibility Report

Page 7 of 12

2.1.4 Security

Changes in Authorization and Access Control in Windows Server 2008 R2 

o Changes in User Account Control 

o Introducing AppLocker 

o Introducing Enhanced Storage Access 

o Introducing Managed Service Accounts 

Changes in Identity and Authentication in Windows Server 2008 R2 

o Changes in Kerberos Authentication 

o Changes in NTLM Authentication 

o Introducing Extensions to the Negotiate Authentication Package 

o Introducing Online Identity Integration 

o Introducing PKU2U in Windows 

o Introducing Smart Card Plug and Play 

o Introducing TLS v1.2 

o Introducing the Restriction of NTLM Authentication 

o Introducing the Windows Biometric Service 

Page 8: networking report for sbit

Feasibility Report

Page 8 of 12

2.1.5 System Interaction

Typically, services are console applications that are designed to run unattended without a graphical user interface (GUI). However, some services may require occasional interaction with a user. This page discusses the best ways to interact with the user from a service.Important  Services cannot directly interact with a user as of Windows Vista. Therefore, the techniques mentioned in the section titled Using an Interactive Service should not be used in new code.

2.1.6 Physical Environment

With Microsoft's announcement of Windows Server 2012 versions, licensing, and pricing, I thought it would be a good idea to take a look at what a typical environment might look like. We talked about this a bit on Brian and Gabe Live this week, but we haven't written about it or flushed out any thoughts.

2.2 Current Functional Procedure

Describe current functional procedures of any existing system, whether automated or manual. Specifically, document the major processing and data flow of the current system(s), volume of work currently processed, costs incurred in operating the current system, skill categories and number of staff required to operate and maintain the current system, equipment used by the existing system, and any other factors that are unique to the current system.

Page 9: networking report for sbit

Feasibility Report

Page 9 of 12

2.3 Functional Objectives

In order to serve the needs of our customers, company associates have extensive knowledge in communication solution. Developing customized communication requirements.

2.4 Performance Objectives

We are carrying a legacy of excellent teaching mechanism and personal considerationto students who are not only giving us repetitive business but also enabling us withRespect of “can do anything “attitude for us.

2.5 Assumptions and Constraints

Anybody can come up with innovative business case and ideology which can be fit for any business but they can’t get materialized unless and until it get supported with determination, processes, operational and implementation efficiency.

2.6 Methodology

Based on above our ideology please consider our request for:

1) Long term planning: We emphasis on long term relationship rather than short term2) Cost: Being a very small start-up and having less operative capital many of our ideas get focused commercially.3) Effort: We believe each and every effort is linked with cost.4) TCO and ROI: We intend to work on quick wins

2.7 Evaluation Criteria

High level of educational standards by which students themselves get placed in leading corporate.Students Positioned at various leading organizational positions .

2.8 Recommendation

Management is also interested in these type of courses if it become good Business case for them Semester examinations were about to start.

Page 10: networking report for sbit

3.0 PROPOSED SYSTEM

3.1 Description of Proposed System

We have state of art labs with latest technological equipment’s. The CCNA training is conducted using real Cisco equipment. We do not use simulation software. Following equipment is used for the CCNA training:• Routers: 1700, 1800, 2500, 2600, 3640, 2800• Switches: 2950, 3550 3750 • ASA Firewall• Wireless: AIRONET WNIC, AIRONET LWAP

3.2 Improvements

The training of Computer Hardware, MCITP windows 2008 server, Exchange 2007/2010 is provide by industry experts having 10 years’ experience. Our trainer knows the requirement of industry and train the student as per industry requirements.

3.3 Time and Resource Costs

Access technical product resources—such as evaluation guides, virtual labs, training courses, and forums—at the Windows Server 2012 R2 Resource Page.

3.4 Impacts

We are committed to deliver latest technical courses with high level of professionalism.Computer Hardware & Networking.Network+MCITP Windows 2008 enterprise administration.Exchange server 2010CCNACCNPCCSA

3.4.1 Equipment Impacts

Windows Server 2012 R2 Datacenter ISO Windows Server 2012 R2 Datacenter VHD Windows Server 2012 R2 Datacenter on Windows Azure

3.4.2 Software Impacts

Each server that hosts the different FIM 2010 R2 server-side components has a different software requirement. This document contains the software requirements for each of the FIM 2010 R2 server-side components. If you decide to install all the server-side components on one server, you must install the software requirements for each of the FIM 2010 R2 server-side components on that server.

Page 10 of 12

Page 11: networking report for sbit

3.4.3 Organizational Impacts

Each server that hosts the different FIM 2010 R2 server-side components has a different software requirement. This document contains the software requirements for each of the FIM 2010 R2 server-side components. If you decide to install all the server-side components on one server, you must install the software requirements for each of the FIM 2010 R2 server-side components on that server.

Describe the effects on operations, such as:

User operating procedures

Operating center procedures

Operating center/user relationships

Source data processing

Data entry procedures

Data retention requirements, information storage and retrieval procedures (refer to Handbook2229.1, Records Disposition Scheduling for Automated Systems)

Output reporting procedures, media, and schedules

System failure contingencies and recovery procedures

3.4.5 Developmental Impacts

The developmental impacts, such as:

Specific activities to be performed by the user in support of development of the system

Resources required to develop databases

Computer processing resources required to develop and test the new system

Privacy and security implications

3.4.6 Site or Facility Impacts

Network-zone has a team of well qualified and experienced faculties with international certifications in ccna, ccnp, ccsp, ccip, ccsa and Microsoft etc.

3.4.7 Security and Privacy Impacts

This information is for IT pros to learn about security technologies and features, including important

changes, for Windows Server 2012 R2, Windows Server 2012, Windows 8.1 and Windows 8.

Security and Protection 

Secure Windows 8 and 8.1 

Page 11 of 12

Page 12: networking report for sbit

Feasibility Report

4.0 Alternative System

N/A

4.0 Description of [Alternative System Name]

N/A

Page 12 of 12