Free Essay

Netw 206 Assignment 1

In:

Submitted By jonny1989
Words 1080
Pages 5
Support for High-Definition IP Cameras
DeVry University
NETW206: Introduction to Switching
Submitted to: Yves Gollo
Professor: Yves Gollo
Date: 9-14-13

Understanding of the purpose of the operations at hand is key to the function of the change in the university. The main purpose of the case study presented is to present the task of implementing a high definition security video surveillance system solution that can replace and magnify what already exists at DeVry University today. As mentioned, DeVry requests a high definition security system that is to require the following features: 1. PoE (Power over Ethernet), avoid any additional wiring, the mounting of power bricks or using power injectors. Conserve and confine; 2. Segment camera IP traffic from the existing network for security purposes; 3. Provide sufficient bandwidth for full HD support; 4. Support a minimum of 150 cameras; 5. Comply with the cisco hierarchical design model; 6. Integrate 1Gb uplinks; and 7. Minimize rack space.
During this process, DeVry has not yet purposed a budget for this action taken for this project but as any company would, DeVry would like the most cost efficient method possible.

With such a request as this, it seems almost impossible to find such a camera that can withstand everything. Almost as if it was an indestructible camera seeming almost impossible until there was some research conducted. The discovery of the D-Link DCS-7513 Full HD Day & Night WDR Outdoor Bullet Camera is a high-definition professional surveillance camera developed to be versatile to any small, medium or large establishment. This camera uses a high sensitivity 2 megapixel progressive scan CMOS sensor to deliver high quality video within a wide range of lighting conditions. The DCS-7513 has an integrated mechanical IR filter and infrared LEDs t allow the viewing and recording of video even in complete darkness, up to 90 feet away from where the camera is stationed. This camera is to be a good combination to what the University is requesting and then more. The camera’s capability seems endless but it doesn’t stop there with the capability to rotate, zoom with its high definition imagining makes it a lot harder for the criminal mind to tamper with such a camera.

The camera being as compact as it is being its only 135mm by 79.5mm by 65 mm (LxWxH) makes the camera more versatile for rotation and high definition making the camera visuals more vivid to the human eye being the picture clearer than ever before. The DCS-7513 can withstand many differences in weather conditions being such that indoors can withhold the temps of 32-122*F/ 0-50*C and as for outdoor temps of -40-158*F/ -40-70*C. The camera has a look and feel of aluminum but as light as 1.2 lb. / 0.54 kg. With the shutter speed of H.264, MJPEG and the audio compression being AAC (encoding only), G.711 A-Law, G.711 U-Law gives this camera superior visual as well as audio so the administrator will always know what is going on and where by the identifying precise motion sensor activity.

The introduction of the Catalyst 2960-X Series switches effectively allows the customers to address the growth needs of their business or establishment, with all new intelligent services. The innovation of the Catalyst 2960-X are highly differentiated when it comes to comparable offerings, and will no doubt increase the competitive intensity in the market in order to support the DCS-7513 safely and efficiently.

The New Original Cisco, 24 Port, Fiber Switch WS-C2960X-48FPS-L Catalyst Base has the power (PoE) of 740W and the uplinks of 4 SFP+ with the function of POE, QoS and VLAN Support. The 2960-X Series are fixed-configuration, stackable Gb Ethernet switches that provide enterprise-class access for campus and branch applications. Designed for operational simplicity to lower total cost of ownership, they enable scalable, secure and energy-efficient business operations with intelligent services and a range of advanced Cisco IOS Software features.

The Cisco Catalyst 2960-X switches feature a 24-48 Gigabit Ethernet ports with line-rate forwarding performance with a Gigabit small form-factor pluggable (SFP) or 10G SFP+ uplinks. USB and Ethernet management interfaces for simplified operations while applications visibly and capacity planning with integrated NetFlow-Lite with LAN Bane and LAN Lite Cisco IOS. Catalyst 2960-X switches include a single fixed power supply and are available with either the Cisco IOS LAN Base or the LAN Lite feature set. Catalyst 2960-X switch models includes a field-replaceable modular power supply and can accommodate a second power supply. All Catalyst 2960-X Series Switches use a single Universal Cisco IOS Software Image for all SKUs.

The Cisco Catalyst will be segmented to have all the HD camera on the Vlan 4. This will help with security for the cameras and stop unnecessary traffic to computers. Any other computers or printers will be set to Vlan 4 to keep all the computers together. We decided to have all of are servers to be set to Vlan 10 to help minimize the security threat to then since the computers on are network are on Vlan 5. This will keep all the systems on the network from broadcasting in to other networks and bogging down the system.

In the network design we decided to have redundancy as a priority. This is one of the most important things to think about when you are making a network. We estimated about a 190 device on this network so we have four 48 port switches. The switches will have to backbones from the disputation center 1&2 to ever switch. This allows for a center to go down and have no down time in your network keeping a 24/7 running network. With this in place not only will it be fault tolerant, but you will have a balanced network if one side is being used to much the switch can go to a other center where it may have less traffic.

References
Design: www.cisco.com/en/US/docs/solutions/Enterprise/Campus/HA_campus_DG/hacampusdg.html
Camera: www.cisco.com/en/US/prod/collateral/vpndevc/ps6918/ps9692/ps9716/data_sheet_c78-492032.html
Video Bandwidth: http://www.cisco.com/en/US/docs/solutions/Enterprise/Video/IPVS/IPVS_DG/IPVSchap4.html Switch information:
http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps12995/data_sheet_c78-728232.html

Similar Documents

Premium Essay

Earth

...There are so many events going on in the world today. There is a housing market issue, health care reform issue, and companies fighting for paid sick leave from their jobs. There are many more this is just to name a few. The housing market is going to start booming again for a short time. The health care reform created by Obama will continue to be an issue for a long time, and companies are fighting to get paid sick leave when they are ill. There are so many things that have changed in the world, and it sure is not what it used to be. First, the housing market is starting to come back to business, but it is taking some time. “Between 2002 and 2007, the population of prospective homeowners grew at an average annual rate of 2.5 million. Over this same time period, the number of households increased by average of 1.1 million. And to accommodate these newly formed households, homebuilders built an average of 1.7 million housing units a year” (Maxfield, 2013). That is great for some people. When the United States was in the recession, there were many of people that lost almost everything that they owned. Anyone that is looking to buying a home, or having one built should take careful planning before doing so. People should consider that the United States could go into another recession at any time. Is the person going to be able to afford their home? That is the number one question a person should ask themselves. There are many people that try to live outside of their means. Sure...

Words: 509 - Pages: 3

Premium Essay

Cognitive Radio Network

...POWER ALLOCATION FOR THE NETWORK CODED COGNITIVE COOPERATIVE NETWORK by Major Awal Uddin Ahmed (ID: 1003) Major Md Shariful Islam(ID: 1004) Major K M Hasnut Zamil (ID: 1006) A Project Report submitted to the department of Electrical Electronic and Communication Engineering in partial fulfillment of the requirements for the degree of Bachelor of Engineering in Electrical Electronic and Communication Engineering Advisor: M. Shamim Kaiser Military Institute of Science and Technology Mirpur Cantonment, Dhaka December 2010 To Our Beloved Parents ii DECLARATION This thesis is a presentation of my original research work. Wherever contributions of others are involved, every effort is made to indicate this clearly, with due reference to the literature, and acknowledgement of collaborative research and discussions. The work was done under the guidance of Dr. M. Shamim Kaiser, at the Mililary Institute of Science and Technology (MIST), Mirpur Cantonment, Dhaka. (Major Awal Uddin Ahmed (ID: 1003)) (Major Md Shariful Islam(ID: 1004)) (Major K M Hasnut Zamil (ID: 1006)) iii CERTIFICATE This is to certify that the thesis entitled POWER ALLOCATION FOR THE NETWORK CODED COGNITIVE COOPERATIVE NETWORK and submitted by Major Awal Uddin Ahmed (ID: 1003), Major Md Shariful Islam(ID: 1004), Major K M Hasnut Zamil (ID: 1006) for the degree of Bachelor of Engineering in Electrical Electronics and Communication Engineering. They embody original work under my supervision...

Words: 9257 - Pages: 38

Premium Essay

Ip Spoof

...Categories and Subject Descriptors: C.2.0 [Computer-Communication Networks]: General— Security and protection General Terms: Performance, Security Additional Key Words and Phrases: IP spoofing, spoofing defense, spoofing packet, packet filtering ACM Reference Format: Ehrenkranz, T. and Li, J. 2009. On the state of IP spoofing defense. ACM Trans. Internet Technol. 9, 2, Article 6 (May 2009), 29 pages. DOI = 10.1145/1516539.1516541 http://doi.acm.org/10.1145/1516539.1516541 1. INTRODUCTION In today’s Internet, attackers can forge the source address of IP packets to both maintain their anonymity and redirect the blame for attacks. When attackers inject packets with spoofed source addresses into the Internet, routers forward those packets to their destination just like any other packet—often without checking the validity of the packets’ source addresses. These spoofing packets1 consume network bandwidth en route to their destinations, and are often part of some malicious activity, such as a DDoS attack. Unfortunately, routers on 1 In...

Words: 14721 - Pages: 59

Premium Essay

Khan

...This text was adapted by The Saylor Foundation under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License without attribution as requested by the work’s original creator or licensee. Saylor URL: http://www.saylor.org/books Saylor.org 1 Preface Competing books are focused on the academic part of HRM, which is necessary in a university or college setting. However, the goal with this book is not only to provide the necessary academic background information but also to present the material with a practitioner’s focus on both large and small businesses. While the writing style is clear and focused, we don’t feel jargon and ten-dollar words are necessary to making a good textbook. Clear and concise language makes the book interesting and understandable (not to mention more fun to read) to the future HRM professional and manager alike. It is highly likely that anyone in business will have to take on an HRM role at some point in their careers. For example, should you decide to start your own business, many of the topics discussed will apply to your business. This is the goal of this book; it is useful enough for the HRM professional, but the information presented is also applicable to managers, supervisors, and entrepreneurs. Besides these differences, other key differences include the following:   This book utilizes a technology focus and shows how HRM activities can be leveraged using technology. We have also included a chapter on communication and information...

Words: 157258 - Pages: 630

Premium Essay

Mergers and Acquisitions Basics

...Mergers and Acquisitions Basics Mergers and Acquisitions Basics All You Need To Know Donald DePamphilis Amsterdam • Boston • Heidelberg • London New York • Oxford • Paris • San Diego San Francisco • Singapore • Sydney • Tokyo Academic Press is an imprint of Elsevier  Academic Press is an imprint of Elsevier 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA Elsevier, The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK Copyright © 2011 Elsevier Inc. All rights reserved No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must always rely on their own experience and knowledge...

Words: 105288 - Pages: 422

Free Essay

Bush

...FAMILY OF SECRETS The Bush Dynasty, America’s Invisible Government, and the Hidden History of the Last Fifty Years RUSS BAKER Contents Foreword by James Moore 1. How Did Bush Happen? 2. Poppy’s Secret 3. Viva Zapata 4. Where Was Poppy? 5. Oswald’s Friend 6. The Hit 7. After Camelot 8. Wings for W. 9. The Nixonian Bushes 10. Downing Nixon, Part I: The Setup 11. Downing Nixon, Part II: The Execution 12. In from the Cold 13. Poppy’s Proxy and the Saudis 14. Poppy’s Web 15. The Handoff 16. The Quacking Duck 17. Playing Hardball 18. Meet the Help 19. The Conversion 20. The Skeleton in W.’s Closet 21. Shock and . . . Oil? 22. Deflection for Reelection 23. Domestic Disturbance 24. Conclusion Afterword Author’s Note Acknowledgments Notes Foreword When a governor or any state official seeks elective national office, his (or her) reputation and what the country knows about the candidate’s background is initially determined by the work of local and regional media. Generally, those journalists do a competent job of reporting on the prospect’s record. In the case of Governor George W. Bush, Texas reporters had written numerous stories about his failed businesses in the oil patch, the dubious land grab and questionable funding behind a new stadium for Bush’s baseball team, the Texas Rangers, and his various political contradictions and hypocrisies while serving in Austin. I was one of those Texas journalists. I spent about a decade...

Words: 249168 - Pages: 997