Free Essay

Capstone

In:

Submitted By deathbyeli
Words 18593
Pages 75
WeMakeConnections
TTI Multi Campus Network

Executive Summary:
WeMakeConnections is an up-and-coming networking and infrastructure company; we offer network solutions that are customized to each client, and their specific financial and technical needs. We provide a le82vel of service you would expect from a close friend, not a company.
We service all network sizes, large and small, and have worked extensively with existing network upgrades, as well as total network creation. WeMakeConnections offers personalized services to match any budget.
In this day and age competition is fierce, and money is tight. That is why we only hire people who love networking; they know what works, what doesn't, and where we can cut waste. That is why WeMakeConnections is the only company that offers a complimentary follow up, one month after your network is complete. We want to make sure you love your network.
Each of our eight core employee's graduated from the prestigious ITT Tech, San Diego. Each has a passion for networking, and genuine love for problem solving. From the cabling in the walls to workstations on the desks, a trained professional will be on the job.
Based on the request for proposal from TTI, we have created what may be, our masterpiece work. The following pages detail our plan of action for TTI's success, and subsequent expansions. We are confident that our network provides the best return on investment for TTI's four additional campuses, and will be easily scaled to meet the demands of continued success.

table of contents:
Staff …………………………………………………………………………………………………………………………………………. 3
Network Requirements ……………………………………………………………………………………………………………. 4
WAN Design …………………………………………………………………………………………………………………………… 12
LAN Design ……………………………………………………………………………………………………………………………. 26
Structured Cabling …………………………………………………………………………………………………………………. 28
Hardware ………………………………………………………………………………………………………………………………. 30
Software ………………………………………………………………………………………………………………………………… 77
Active Directory …………………………………………………………………………………………………………………….. 79
Disaster Recovery ………………………………………………………………………………………………………………….. 82
Timeline ………………………………………………………………………………………………………………………………… 83
Budget …………………………………………………………………………………………………………………………………… 88
References …………………………………………………………………………………………………………………………….. 89

staff:

Network Requirements:
GENERAL:
5 geographically dispersed campuses require an enterprise-wide network * 5 year minimum functionality * 100X growth in LAN throughput - Minimum * 2X growth in WAN core throughput - Minimum * 10X growth in main campus internet throughput - Minimum * 10 Mbps to any host pc - Minimum * 100 Mbps to any server host - Minimum * Must be TCP/IP
Education Board Requirements: * A system wide approach to tracking all students attendance * A system wide approach to tracking all students academic progress
Access to the internet for various applications from any site
WAN:
Two layer hierarchical model
Regional hub established at main campus, forming fast WAN core network
High-end, powerful routers to be installed at each WAN Core location
Internet access and outside network connections will come through the main campus office via frame relay WAN link
No other connections permitted

Currently using:
All NT servers with the exception of one server running netware
Novell server used for medical related records for staff
Deemed valuable and needs to be included, but updated to work with TCP/IP
LAN:
Every campus must separate its LAN network traffic into 2 segments * Administrative network * Education network
Transport speeds are Ethernet of choice
Horizontal cabling will be CAT 5 UTP or higher - min 100 Mbps
Vertical backbone cabling will be CAT5 UTP or fiber optic multi-mode cable
Cable must comply with TIA/EIA-568-A or B and TIA/EIA-569 standards
LAN infrastructure based on Ethernet LAN switching
Each location will have a Main Distribution Facility (MDF) which will be the central point for all LAN cabling to terminate, and will also be the Point of Presence (POP) for WAN connection
All major electronics will be house in the MDF - routers LAN switches
The new Houston campus will have an Intermediate Distribution Facility (IDF), which will service the second floor of this particular building
The IDF will be connected to the MDF in a star or extended star topology
The IDF will provide an access point where cable lengths would otherwise exceed the TIA/EIA-568-A recommended distance

Education LAN Network
Each school will have 2 wired labs with 72 connections each. * 70 workstations * 2 printers * 4 CAT 5 UTP runs for data * 1 administrative LAN run terminated at the teachers workstation
Each school will have 2 wireless labs with 31 connections each * 30 workstations * 1 networked printer * 4 CAT 5 UTP runs for data * 1 administrative LAN run terminated at teachers workstation
Each school will have 1 wireless segment of computers in the Learning Resource Center with 11 connections * 10 workstations * 1 networked printer * 4 CAT5 UTP cable runs for data * 1 administrative LAN run terminated at the LRC coordinators workstation
All CAT 5 UTP will be tested end-to-end for 100 Mbps bandwidth capacity
A single location in each room will be designated as the wiring POP for that room * Lockable cabinet containing all cable terminations and network equipment * Decorative wire molding
Administrative LAN Network
Used for departmental functions
School directors and every department head with his/her staff will have access
HQ Supplied Servers and Functions
All servers will be categorized as Enterprise or Workgroup type services, and placed on the network according to function and anticipated traffic patterns
DNS and E-Mail
Implemented in a hierarchical fashion
All services located on the master server in the main campus
Each school will contain a host for DNS and email services (local post office) * Will maintain a complete directory of staff and student population
School host will store all e-mail messages
The Update DNS process will flow from individual school server to main campus server
All administrative servers will be able to communicate between themselves for redundancy
Administrative Server
Database management system
Each school will contain an Administration server, which connects to the HQ DBM server * Student tracking * Attendance * Grading * Other admin functions
Virtual Library Server
Available to all users on the entire enterprise network

Application Server
All pc applications will be housed in a central server at each school location
Specific applications used in both admin and academic environments will be retrieved from this server
Easy and efficient method for upgrading applications
Available to all users on the network
FTP Server
Setup at the main campus to provide all schools with quick way to recover missing/corrupt files
Download/upload drivers
Collect a weekly backup database file for grades and attendance for each school
Other Servers
All other servers will be considered standalone server, and placed by user group access needs
Implementation will require analysis to determine placement on the network
Addressing and Network Management
A complete addressing and naming convention scheme will be developed and administered by HQ at the main campus
Unauthorized addresses will be prohibited
All PC's on the Administrative network will have static addresses
Curriculum PC's will obtain addresses via DHCP
Each school should have a DHCP server that uses only addresses consistent with HQ's scheme
A master network management host will be established at the main campus with total management rights over all devices
This host will also serve as a router configuration host and maintain current configurations of all routers
The management scheme for the data portion will be based on Simple Network Management Protocol (SNMP) standards
All routers will be pointed to the master network management host for configurations and updates
Main campus will maintain super user passwords for all network devices
Any changes to configuration will be authorized from the main campus only
Network Security
Internet connectivity shall use a double firewall implementation with all internet exposed applications residing on a public backbone network
All connections initiated from the internet into the schools private network will be denied
The main campus security model will be divided into 3 logical networks with secured interconnections between them * Administrative * Curriculum * External
This model dictates 2 physical LAN infrastructures be installed at all schools * Administrative * Other Curriculum
Every PC and file server will be categorized according to function and placed on the appropriate LAN segment
Each LAN segment will have a file server
All applications will be categorized and placed on appropriate server
Access Control Lists (ACL) will block all traffic from curriculum LAN's to administration LAN
Exceptions to this ACL will be made on an individual basis
Applications such as E-mail and Directory services will be allowed to pass freely since they pose no risk
A user ID and Password policy will be published and strictly enforced at all schools
All PC's will have full access to the internet
All ACL's will be controlled at the main campus
All wireless environments shall be protected via standardized security protocols
Backups - The most recent copy will be stored on site all others will be stored off site for security
Internet Connectivity
All Internet connectivity will be supplied through the main campus
This connection will be highly controlled and capacity upgraded as needed
The internet connection will utilize a double firewall with a public network established for services that will be exposed to the internet * E-mail * Domain Name Services * Web Server
All connectivity that is initiated from the internet to the internal network will be protected via ACL's
Any connectivity initiated from the main campus to the internet will be permitted
E-mail and DNS Services will communicate freely in both directions
A web server will be located on the public backbone and partitioned to allow any school to install a web home page on the internet
Individual web servers that need total exposure to the internet will not be permitted on the internet network

User Counts
200 student workstations per school - Max
100 administration workstations per school
Wiring for 71 pc's per lab * 1 run for teacher pc * Up to 3 runs for remaining 70 pc's
LAN/WAN Connectivity
4 data lines will connect Dallas, Austin, San Antonio and the HQ hub * Phase I will not include redundancy but it should be included in the original design for Phase II
1 Internet circuit will connect at the HQ will connect all sites to the internet * Phase I will not include redundancy but it should be included in the original design for Phase II
The Houston west campus will access the main campus WAN via T1
All site routers will have modem connectivity to the main campus IT department for Out-of Band-Management (OBM) purpose

WAN Design:
Servers
The server operating system for the servers will be Microsoft Server 2003. There will be six servers; Web server, exchange server, application server, ftp server, admin database server.
Web Server:
Will control the virtual library and allowing people to view the website for the educational institute.
Exchange Server:
Will be used for all the e-mail for faculty and students.
Application Server:
Will hold all the applications that the students will use and if a computer goes down it will send out the programs the computers so it will be up and running in as little time as possible.
FTP Server:
Will be used for people to download files that may have been corrupted.
Admin Database Server:
This will hold all the files that the admin staff will need ie: student records, financial records, attendance, grades.
NWLink
NWLink is Microsoft's implementation of Novell's IPX/SPX protocols. NWLink includes an implementation of NetBIOS atop IPX/SPX.
NWLink packages data to be compatible with client/server services on NetWare Networks. However, NWLink does not provide access to NetWare File and Print Services. To access the File and Print Services the Client Service for NetWare needs to be installed.
Using NWLink IPX/SPX/NetBIOS
NWLink IPX/SPX/NetBIOS Compatible Transport is Microsoft's implementation of the Novell IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange) protocol stack. The Windows XP implementation of the IPX/SPX protocol stack adds NetBIOS support. The main function of NWLink is to act as a transport protocol to route packets through internetworks. By itself, the NWLink protocol does not allow you to access the data across the network. If you want to access NetWare File and Print Services, you must install NWLink and Client Services for NetWare (software that works at the upper layers of the OSI model to allow access to File and Print services). One advantage of using NWLink is that is easy to install and configure.
Configuring NWLink IPX/SPX The only options that are configured for NWLink are the internal network number and the frame type. Normally, you leave both settings at their default values. The internal network number is commonly used to identify NetWare file servers. It is also used when you are running File and Print Services for NetWare or using IPX routing. The frame type specifies how the data is packaged for transmission over the network. If the computers that are using NWLink use different frame types, they are not able to communicate with each other. The default setting for frame type is Auto Detect, which will attempt to automatically choose a compatible frame type for your network. If you need to connect to servers that use various frame types, you should configure Manual Frame Type Detection, which will allow you to use a different frame type for each network
VMware
We have decided to run the servers virtually due to the fact it is cheaper and can be easily up scaled. Using virtual servers you will be able to have one physical machine running numerous servers. This will save you money not only on hardware but also on your overhead with electricity and cooling for the server room. Each campus will have two physical servers and each server will have six virtual servers. There will be a total of 12 servers on each campus. One group of servers will be sending daily differential backups to the other group. Once a week the backup servers will be sending a full back up to headquarters. Network area storage will be needed to store all the files.
VMware ESXi Features
Below you will find a comprehensive list of the VMware ESXi features.
Key Features * Record-setting performance with up to 8,900 database transactions per second, 200,000 I/O operations per second, and up to 16,000 Exchange mailboxes on a single physical host * Up to eight-way virtual SMP (symmetric multiprocessing), enabling the virtualization of multiprocessor workloads* (8-way vSMP requires vSphere Enterprise Plus licensing) * Memory over committment and deduplication, allowing higher consolidation ratios * Broadest OS support of any hypervisor, enabling IT to virtualize numerous versions of Windows®, Linux®, Solaris®, NetWare®, and other operating systems. * Built-in high availability through NIC teaming and HBA multipathing to protect against hardware component failures * Up to 64 logical processing cores, 256 virtual CPUs, and 1TB RAM per host, enabling higher consolidation ratios
Architecture
* Bare-metal, 64-bit hypervisor architecture. Achieve near-native virtual machine performance, reliability and scalability with production-proven hypervisor technology that runs directly on server hardware, without the need for a host operating system. * Virtual disk files. Use virtual machine disk (VMDK) files to provide virtual machines access to their own private datastores while giving IT administrators the flexibility to create, manage and migrate virtual machine storage as separate, self-contained files that can reside on shared storage equipment. * VMware vStorage VMFS. Eliminate single points of failure and balance storage resources by implementing shared storage for virtual machines with VMware vStorage Virtual Machine File System (“VMFS”), a cluster file system that allows multiple VMware ESX hosts to access a single VMDK file concurrently. VMFS is supported on a mix of Fibre Channel SAN, iSCSI SAN, and NAS storage arrays in a manner that is transparent to application owners and end users. Download the VMFS datasheet to learn more about VMFS, which provides new enhancements such as dynamic increase of VMFS volume size. * Boot from SAN. Eliminate the need to separately backup local attached server disks by running VMware ESX hosts on diskless configurations of blade and rack mount servers. * Virtual networking. The virtual networking capabilities in VMware ESX and ESXi allow customers to build complex networks between virtual machines residing on a single host or across multiple installations of VMware ESX and ESXi hosts for production deployments or development and testing purposes. Configure each virtual machine with one or more virtual NIC, each with its own IP and MAC address, to make virtual machines indistinguishable from physical machines. Create a simulated network within a VMware ESX host with virtual switches that connect virtual machines. Use virtual LANs (VLANs) to overlay a logical LAN on top of physical LANs to isolate network traffic for security and load segregation. Modify network configurations without having to change actual cabling and switch setups.
Advanced Resource Management
VMware ESX and VMware ESXi offers advanced resource management capabilities to improve performance and increase consolidation ratios. * Resource management for virtual machines. Define advanced resource allocation policies for virtual machines to improve service levels to software applications. Establish minimum, maximum and proportional resource shares for CPU, memory, disk and network bandwidth. Modify allocations while virtual machines are running. * Intelligent CPU virtualization. Manage the execution of virtual machine processes with intelligent process scheduling and load balancing across all available CPUs on the physical host. * RAM overcommitment. Increase memory utilization by configuring virtual machine memory that safely exceeds the physical server memory, enabling a greater number of virtual machines to run on a VMware ESX or ESXi host. * Transparent page sharing (memory de-duplication). Use physical RAM more efficiently by storing memory pages identical across multiple virtual machines only once. * Memory ballooning. Shift RAM dynamically from idle virtual machines to active workloads. Memory ballooning artificially induces memory pressure within idle virtual machines, forcing them to use their own paging areas and release memory for active virtual machines. * Network traffic shaping. Ensure that critical virtual machines receive priority access to network bandwidth. Network traffic from virtual machines can be prioritized on a “fair share” basis. Network Traffic Shaper manages virtual machine network traffic to meet peak bandwidth, average bandwidth and burst size constraints. * Storage I/O traffic prioritization. Ensure that critical virtual machines receive priority access to storage devices by prioritizing I/O traffic on a “fair share” basis. * Improved power management. Improve energy efficiency with dynamic voltage and frequency scaling and support for Intel SpeedStep® and AMD PowerNow!.

Performance and Scalability
VMware ESX and VMware ESXi deliver unparalleled performance and scalability, enabling even the most resource intensive production applications to be virtualized. * Performance optimizations for virtualized workloads. VMware ESX and ESXi 4.0 have undergone performance optimizations for specific business-critical applications such as Oracle databases, Microsoft SQL Server, and Microsoft Exchange. Get up to 8,900 database transactions per second, 200,000 I/O operations per second, and up to 16,000 Exchange mailboxes per host. * Performance improvements for iSCSI storage. Leverage a combination of new in-guest virtualization-optimized SCSI drivers and VMkernel-level storage stack optimizations to dramatically increase performance for I/O-intensive applications such as databases and messaging applications. * Support for powerful server hardware. Take advantage of hardware systems with up to 64 physical CPU cores, 256 virtual CPUs, 1TB RAM, and up to hundreds of virtual machines on a single host to facilitate large-scale consolidation and disaster recovery projects. * Support for larger virtual machines. Configure virtual machines with as much as 255GB RAM. * Support for eight-way virtual SMP. VMware Virtual Symmetric Multiprocessing (SMP) enhances virtual machine performance by enabling a single virtual machine to use up to eight physical processors, simultaneously. VMware Virtual SMP enables virtualization of the most CPU-intensive enterprise applications such as databases, ERP and CRM. * Raw device mapping. Optionally, map SAN LUNs directly to a virtual machine in order to enable application clustering and array-based snapshot technology while profiting from the manageability benefits of VMware vStorage VMFS. * Support for hardware virtualization. VMware ESX and ESXi provide industry-leading support for next-generation virtualization hardware assist technologies such as AMD’s Rapid Virtualization Indexing® or Intel’s Extended Page Tables. * Support for large memory pages. VMware ESX and ESXi are the only hypervisors that support large memory pages to improve efficiency of memory access for guest operating systems. * Networking performance optimizations. VMware ESX and ESXi support a variety of performance offload technologies including TCP Segmentation Offloading (TSO), VLAN and checksum offloading, and jumbo frames to reduce the CPU overhead associated with processing network I/O. Additionally, virtualization optimized I/O performance features such as NetQueue is supported which significantly improves performance in 10 Gigabit Ethernet virtualized environments. * Support for new high performance devices and protocols: VMware ESX and ESXi support 10Gb Ethernet network cards and storage arrays and Infiniband technology to improve virtual machine performance. * Support for paravirtualization. VMware ESX and ESXi support para-virtualized Linux guest operating systems (Linux kernel 2.6.21 onwards) to improve virtual machine performance. * VMDirectPath I/O for virtual machines. Enhance CPU efficiency for applications that require frequent access to I/O devices by allowing select virtual machines to directly access underlying hardware devices. Other virtualization features, such as VMware VMotion™, hardware independence and sharing of physical I/O devices will not be available to the virtual machines using this feature.
High Availability
VMware ESX and ESXi delivers datacenter-class high availability for virtual machines. * Built-in storage access multipathing. Ensure shared storage availability with SAN multipathing for Fibre Channel or iSCSI SAN. * NIC teaming. Give each networked virtual machine built-in NIC failover and load balancing enabling greater hardware availability and fault tolerance. NIC teaming policies allow users to configure multiple active and standby adapters. * Support for Microsoft Clustering Services. Cluster virtual machines running Microsoft Windows operating system across physical hosts.
Interoperability
VMware ESX and VMware ESXi are optimized, rigorously tested and certified across the complete IT stack of servers, storage, operating systems, and software applications allowing for enterprise-wide standardization. * Server hardware. VMware ESX and ESXi have been certified with industry-leading rack, tower and blade servers from Dell, Fujitsu Siemens, HP, IBM, NEC, Sun Microsystems and Unisys. * Storage hardware. VMware ESX and ESXi are certified with a wide range of storage systems from Dell, EMC, Fujitsu, Fujitsu Siemens, HP, Hitachi Data Systems, IBM, NEC, Network Appliance, StorageTek, Sun Microsystems and 3PAR. Internal SATA drives, Direct Attached Storage (DAS), Network Attached Storage (NAS) and both fibre channel SAN and iSCSI SAN are supported. * Operating systems. VMware ESX and ESXi support the broadest range of unmodified operating systems, including Windows, Linux, Solaris, Novell NetWare and more. VMware recently added support for 20 new guest operating systems. * Software applications. Run any software application in VMware virtual machines without the need to modify the application. * Virtual machine formats. VMware ESX and ESXi can run virtual machines created in non-VMware formats. Using the free VMware vCenter Converter, users can convert and run Microsoft Virtual Server and Virtual PC, and Symantec LiveState Recovery virtual machines on VMware ESX and ESXi hosts.
Security
Advanced security features in VMware ESX and ESXi protect stored data within the virtual environment. * VMware VMsafe™. VMware VMsafe is a new security technology that helps protect virtualized workloads in ways previously not possible with physical machines. VMsafe provides a set of security APIs that enable third-party security products to gain the same visibility as VMware ESX or ESXi into the operation of a virtual machine to identify and eliminate malware, such as viruses, trojans and key-loggers. This advanced protection is achieved by fine-grained visibility into the virtual machine’s hardware resources such as memory, CPU and disk and its I/O systems. * VMkernel Protection. VMware ESX and ESXi are protected from common attacks and exploits by assuring the integrity of the VMkernel, a core component of the hypervisor. Disk integrity techniques in ESX and ESXi protect the boot-up of the hypervisor by utilizing the Trusted Platform Module (TPM), a hardware device embedded in servers. VMkernel modules that load onto disk and memory are digitally signed and validated during load to ensure the authenticity and integrity of dynamically loaded code and protect against malware attempting to modify VMkernel as it persists on disk. VMKernel also uses memory integrity techniques at load-time coupled with microprocessor capabilities to protect itself from common buffer-overflow attacks used to exploit running code. * Encryption: Ensure secure connection to VMware ESX and ESXi hosts with SSL encryption. * Enable authentication for iSCSI Devices: VMware ESX and ESXi secure iSCSI devices from unwanted intrusion by requiring that either the host or the iSCSI initiator be authenticated by the iSCSI device or target whenever the host attempts to access data on the target LUN. * Network Security Policies. Enforce security for virtual machines at the Ethernet layer. Disallow promiscuous mode sniffing of network traffic, MAC address changes and forged source MAC transmits.
Manageability
Several management interfaces are available to more efficiently manage VMware ESX and ESXi environments. The core management interfaces used by VMware ESX and ESXi administrators are: * VMware vSphere Client. Manage VMware ESX or ESXi hosts, virtual machines and (optionally) VMware vCenter Server with the common user interface of the VMware vSphere Client. The vSphere Client is available as a free download and can be pointed at a VMware ESX or ESXi host for single host management, or it can be pointed at VMware vCenter Server for multi-host management. * VMware vCenter Server. Enable centralized management for VMware ESX and ESXi hosts and their virtual machines. To manage an ESX or ESXi host with VMware vCenter Server, a VMware vCenter Agent license, included in all editions of VMware vSphere, is required for that host. VMware vSphere includes many more management capabilities that improve business continuity and maximize operational efficiency such as live migration, automatic load balancing, protection against hardware failures, and virtual machine backup and restore capabilities.

Additional management tools for VMware ESX and ESXi include: * VMware vSphere Command-Line Interface 4.0 (vCLI). Manage VMware ESX and ESXi through a remote execution environment. The latest version of vCLI has a number of new commands and is supported on both VMware ESX 4.0 and VMware ESXi 4.0. View the vSphere Command-Line Interface Installation and Reference Guide. * VMware vSphere Power Command-Line Interface 4.0 (PowerCLI). Manage and configure thousands of Virtual Machines with this powerful yet easy to use interface that is based on Microsoft PowerShell technology. PowerCLI allows IT administrators to manage VMware ESX or ESXi through a scripting interface managing the same tasks done with the VMware vSphere Client. * VMware vSphere Management Assistant. The VMware vSphere Management Assistant is a virtual machine that includes a VMware vSphere command-line interface and other prepackaged software that developers and administrators can use to run agents and scripts to manage VMware ESX and ESXi hosts. * Agent-less Hardware Management with CIM. Common Information Model (CIM) provides a protocol for monitoring hardware health and status through VMware vCenter Server or CIM-compatible third-party tools.
*The free version of ESXi is limited to 4-way virtual SMP.
VCenter
* Provides centralized control and visibility at every level of virtual infrastructure

* Unlocks the power of vSphere through proactive management

* Is a scalable and extensible management platform with a broad partner ecosystem
A Scalable and Extensible Management Platform
As you extend virtualization across the datacenter, you need a management platform that can both scale to fit your organization and plug into your existing architecture. VMware vCenter Server enables efficient management of a large scale enterprise, giving you the ability to manage more than 1,000 hosts and up to 10,000 VMs from a single console.
Additionally, VMware vCenter Server’s open plug-in architecture supports a broad range of additional capabilities from VMware and its partners. More than 200 VMware partners directly integrate with vCenter Server, allowing you to easily extend the platform for more advanced management capability in areas such as capacity management, compliance management, business continuity and storage monitoring. The vCenter Server APIs also allow customers to integrate physical and virtual management tools, using their choice of enterprise management tools to connect to vCenter Server.
Features
The VMware vCenter Server platform is the industry’s most robust virtualization management solution. Advanced capabilities provide the greatest visibility, proactive management and scalability for your virtual environment. vCenter Server is a foundation you can easily extend for end-to-end integration with your physical environment and upon which you can build a private cloud infrastructure.
View the What's New in VMware vCenter Server document.
The list below highlights new and key VMware vCenter Server features:
Centralized Control and Deep Visibility into Virtual Infrastructure * An improved user interface allows for easier navigation. Access different parts of the vSphere Client from a vCenter Home Page featuring a new dashboard and navigation bar. * Inventory search puts the entire vCenter inventory including virtual machines, hosts, datastores, and networks at your fingertips from anywhere within vCenter. * New hardware monitoring with CIM SMASH enable alarms when hardware failures of key components such as fans, system board and power supply occur, providing an integrated view of physical and virtual server health. * New storage maps and reports convey storage usage, connectivity and configuration. Customizable topology views give you visibility into storage infrastructure and assist in diagnosis and troubleshooting of storage issues. * Improved alerts and notifications support new entities, metrics and events such as datastore- and VM-specific alarms. These alarms can trigger new automated workflows to remedy and pre-empt problems. * Improved performance graphs monitor virtual machines, resource pools and server utilization and availability with more detailed statistics and graphs that can be viewed in real time or across a specified time interval.
Proactive Management of VMware vSphere * New Host Profiles standardize and simplify how you configure and manage ESX host configurations. Capture the blueprint of a known, validated configuration including networking, storage and security settings and it to many hosts to simplify setup. Host profile policies can also monitor compliance. * View the VMware Host Profiles Youtube Video * Read the eWeek article: VMware vSphere 4 Host Profiles Feature Eases Configuration, Compliance Chores * Improved energy efficiency with full support for VMware Distributed Power Management, which continuously monitors utilization in a DRS cluster and puts hosts in standby to reduce power consumption when the cluster needs fewer resources. * New vCenter Orchestrator is a powerful orchestration engine simplifies management by enabling you to automate over 800 tasks using out of the box workflows or by assembling workflows using an easy drag & drop interface. * Improved patch management with a compliance dashboard, baseline groups, a shared patch repository in vCenter Update Manager, which automates scanning and patching of vSphere hosts and virtual machines. * New vCenter Server Heartbeat (sold separately) extends availability for vCenter Server, failing over the management server and database over the LAN or WAN to a standby server. vCenter Server Heartbeat has deep awareness of all vCenter Server components and is simple to configure and deploy. * Integrated Physical to Virtual (P2V) machine conversion manages multiple simultaneous conversions of physical machines, non-VMware virtual machine formats, and backup images of physical machines into running virtual machines. * Guided Consolidation, now a module within vCenter Server, walks you step by step through the consolidation process including automatic discovery of up to 500 servers, performance analysis, conversion and intelligent placement on the right host.
A Scalable and Extensible Management Platform * Improved large-scale management is possible with vCenter Server since it is designed from the ground up to handle the largest IT environments. A single instance of vCenter Server 4.0 manages up to 300 hosts and 3000 virtual machines and with Linked Mode you can manage up to 1,000 hosts and 10,000 virtual machines across 10 vCenter Server instances. VMware HA and DRS clusters can support up to 32 hosts. * Linked Mode provides a scalable architecture and visibility across multiple vCenter Server instances, with roles, permissions and licenses replicated across the infrastructure so you can simultaneously log in, view and search the inventories of all vCenter Servers. * View the VMware vCenter Linked Mode Video * Integration with systems management products web services APIs protect your investments and give you freedom of choice in how you manage your environment.
Distributed Resource Optimization * Resource management for virtual machines. Allocate processor and memory resources to virtual machines running on the same physical servers. Establish minimum, maximum, and proportional resource shares for CPU, memory, disk and network bandwidth. Modify allocations while virtual machines are running. Enable applications to dynamically acquire more resources to accommodate peak performance. * Dynamic allocation of resources. VMware DRS continuously monitors utilization across resource pools and intelligently allocates available resources among virtual machines based on pre-defined rules that reflect business needs and changing priorities. The result is a self-managing, highly optimized and efficient IT environment with built-in load balancing. * Energy efficient resource optimization. VMware Distributed Power Management (experimental) continuously monitors resource requirements and power consumption across a DRS cluster. When the cluster needs fewer resources, it consolidates workloads and puts hosts in standby mode to reduce power consumption. When resource requirements of workloads increase, DPM brings powered-down hosts back online to ensure service levels are met.
High Availability * Automatic restart of virtual machines with VMware HA. Provide an easy to use and cost-effective failover solution.

Security * Fine-grained access control. Secure the environment with configurable, tiered group definitions and fine-grained permissions. * Integration with Microsoft® Active Directory. Base access controls on existing Microsoft® Active Directory authentication mechanisms. * Custom roles and permissions. Enhance security and flexibility with user-defined roles. VMware vCenter Server users with appropriate privileges can create custom roles such as night shift operator or backup administrator. Restrict access to the entire inventory of virtual machines, resource pools and servers by assigning users to these custom roles. * Audit trails. Maintain a record of significant configuration changes and the administrator who initiated them. Export reports for event tracking. * Session management. Discover and if necessary terminate VMware vCenter Server user sessions. * Patch Management. Enforce compliance to patch standards through automated scanning and patching of online VMware ESX hosts and select Microsoft and Linux virtual machines with VMware vCenter Update Manager. Reduce security exposure in the environment through secure patching of offline virtual machines and reduce downtime through automatic snapshots prior to patching and rollback. Integration of VMware vCenter Update Manager with VMware DRS enables zero downtime VMware ESX host patching.
MPLS
Benefits of MPLS: * Multi-protocol label switching (MPLS) was invented to solve the problem of bridging multiple disparate protocols such as Frame Relay, ATM and Ethernet.

* Over the last few years, MPLS has become the dominant internetworking technology. More and more providers are migrating to MPLS.

* Carriers have deployed IP/MPLS core routers in order to support existing legacy networks more cost effectively.

* Fundamentally, MPLS employs an encapsulation technique providing internetworking between different technologies, coupled with signaling protocols necessary to discover, configure and manage connectivity.

* In addition to signaling protocols, MPLS uses resiliency protocols, such as Fast Re-route and Bi-directional Fault Detection, to determine failures and in turn switching to standby links.

* The strength of these protocols combined with the popularity of MPLS core networks have made MPLS a logical choice for extending into metro networks.

* Vendors have responded by creating MPLS-enabled multi-service platforms with a mixture of legacy port options.
MPLS can lower operational costs by integrating multiple services onto a common backbone; has integrated capabilities which enable service providers to offer strict SLAs and thereby increase revenue and margins; and facilitates the convergence of disparate Frame Relay, ATM, Ethernet and IP networks onto a single infrastructure to reduce capital and operating expenses.
Main reasons to deploy MPLS include: * Cost reduction through data network convergence: MPLS facilitates the convergence of disparate Frame Relay, ATM, Ethernet and IP networks onto a single infrastructure to reduce capital and operational expenses. The cost savings can be up to 40% from frame relay.

* Integration of voice, video and data services: MPLS's traffic management capabilities enable this services "triple play" on a common backbone.

* New high-margin revenue opportunities through MPLS-based service offerings: MPLS's flexibility, high availability and multi-service support enables service providers to offer strict SLAs, increasing revenue and margins.

LAN Design:

IP Addressing
Houston 1- 10.1.0.1/21 (Gateway) 10.1.0.1-10.1.7.254 (Student Pool) 255.255.248.0 (Subnet)

10.1.100.1/22 (Faculty Gateway) 10.1.100.1-10.1.103.254 (Faculty Pool) 255.255.252.0 (Subnet)

10.1.200.1/22 (Wireless Gateway) 10.1.200.2-10.1.203.254 (Wireless Pool) 255.255.252.0 (Subnet)

Houston 2- 10.2.0.1/21 (Gateway) 10.2.0.1-10.2.7.254 (Student Pool) 255.255.248.0 (Subnet)

10.2.100.1/22 (Faculty Gateway) 10.2.100.1-10.2.103.254 (Faculty Pool) 255.255.252.0 (Subnet)

10.2.200.1/22 (Wireless Gateway) 10.2.200.2-10.2.203.254 (Wireless Pool) 255.255.252.0 (Subnet)

Austin- 10.3.0.1/21 (Gateway) 10.3.0.1-10.3.7.254 (Student Pool) 255.255.248.0 (Subnet)

10.3.100.1/22 (Faculty Gateway) 10.3.100.1-10.3.103.254 (Faculty Pool) 255.255.252.0 (Subnet)

10.3.200.1/22 (Wireless Gateway) 10.3.200.2-10.3.203.254 (Wireless Pool) 255.255.252.0 (Subnet)

San Antonio-10.4.0.1/21 (Gateway) 10.4.0.1-10.4.7.254 (Student Pool) 255.255.248.0 (Subnet)

10.4.100.1/22 (Faculty Gateway) 10.4.100.1-10.4.103.254 (Faculty Pool) 255.255.252.0 (Subnet)

10.4.200.1/22 (Wireless Gateway) 10.4.200.2-10.4.203.254 (Wireless Pool) 255.255.252.0 (Subnet)

Dallas- 10.5.0.1/21 (Gateway) 10.5.0.1-10.5.7.254 (Student Pool) 255.255.248.0 (Subnet)

10.5.100.1/22 (Faculty Gateway) 10.5.100.1-10.5.103.254 (Faculty Pool) 255.255.252.0 (Subnet)

10.5.200.1/22 (Wireless Gateway) 10.5.200.2-10.5.203.254 (Wireless Pool) 255.255.252.0 (Subnet)

Loopback- 10.254.0.0/16

10.254.0.1-10.6.255.254(Loopback Pool)

255.255.0.0(Subnet)

Structured cable:

While installing each campus' cabling the utmost care will be taken to install according to ANSI/TIA/EIA standards. Only quality cabling from trusted sources will be used throughout each building, and all wiring will be tested to ensure a high performance. Below, we have outlined some best practices as well as specific limitations for each medium.

Category 6a (or Augmented Category 6) is defined at frequencies up to 500 MHz—twice that of Cat 6. Category 6a performs at improved specifications, particularly in the area of Alien Cross-talk (AXT) as compared to Cat6 UTP which exhibited high alien noise in high frequencies.

The maximum allowed length of a Cat-6 cable is 100 meters (330 ft) when used for 10/100/1000baseT. This consists of 90 meters (300 ft) of solid "horizontal" cabling between the patch panel and the wall jack, plus 10 meters (33 ft) of stranded patch cable between each jack and the attached device. Since stranded cable has higher attenuation than solid cable, exceeding 10 meters of patch cabling will reduce the permissible length of horizontal cable.

When used for 10GbaseT, Cat-6 cable's maximum length is 55 meters (180 ft) in a favorable alien crosstalk environment, but only 37 meters (120 ft) in a hostile alien crosstalk environment such as when many cables are bundled together. 10GbaseT runs of up to 100 meters (330 ft) are permissible using Cat-6a.

Category 6a cable must be properly installed and terminated to meet specifications. Incorrect installation practices include kinking the cable or bending it with too tight a radius. Incorrect termination practices include untwisting the wire pairs or stripping the outer jacket back too far.

Optical Fiber

Graded index multimode fiber uses variations in the composition of the glass in the core to compensate for the different path lengths of the modes. It offers hundreds of times more bandwidth than step index fiber - up to about 2 gigahertz.

EIA/TIA Cable Loss Estimates:**

Fiber Type Loss Amount per 1 km
Multimode 62.5/125µm fiber @ 850nm 3.5dB / km
Multimode 62.5/125µm fiber @ 1300nm 1.5dB / km
Multimode 50/125µm fiber @ 850nm 3.5dB / km
Multimode 50/125µm fiber @ 1300nm 1.5dB / km
Singlemode 9/125µm fiber @ 1310nm 0.4dB / km
Singlemode 9/125µm fiber @ 1550nm 0.3dB / km

hardware: Switches The Cisco Catalyst® 4948 10 Gigabit Ethernet Switch is a wire-speed, low-latency, Layer 2 to 4, 1-rack-unit (1RU), fixed-configuration switch for rack-optimized server switching. Based on the proven Cisco® Catalyst 4500 Series hardware and software architecture, the Cisco Catalyst 4948 10 Gigabit Ethernet Switch offers exceptional performance, bandwidth, and reliability for low-density, multilayer aggregation of high-performance servers and workstations. High performance and scalability of intelligent network services is made possible with dedicated specialized resources known as ternary content addressable memory (TCAM). Ample TCAM resources (64,000 entries) enable high feature capacity, providing wire-speed routing and switching performance with concurrent provisioning of services such as quality of service (QoS) and security and helping ensure scalability for today's network requirements with ample room for future growth. The Cisco Catalyst 4948 10 Gigabit Ethernet Switch offers 48 ports of wire-speed 10/100/1000BASE-T with 2 ports of wire-speed 10 Gigabit Ethernet (X2 optics). Exceptional reliability and serviceability are delivered with optional internal AC or DC 1+1 hot-swappable power supplies and a hot-swappable fan tray with redundant fans (Figures 1 and 2). Figure 1. Cisco Catalyst 4948 10 Gigabit Ethernet Switch Figure 2. Rear View of Cisco Catalyst 4948 10 Gigabit Ethernet Switch with Dual Redundant Power Supplies and Removable Fan Tray

Features and Benefits Wire-Speed Performance in All Directions The Cisco Catalyst 4948 10 Gigabit Ethernet Switch delivers wire-speed throughput with low latency for data-intensive applications using a 136-Gbps switching fabric with a forwarding rate of 102 million packets per second (mpps) in hardware for Layer 2 to 4 traffic. High-performance switching is maintained regardless of the number of route entries or Layer 3 and 4 services enabled. Hardware-based Cisco Express Forwarding routing architecture enables increased scalability and performance. X2 10 Gigabit Ethernet optics provide 20 Gigabit Ethernet wire-speed uplinks for outstanding throughput of traffic. Power-Supply Redundancy for Nonstop Operation The Cisco Catalyst 4948 10 Gigabit Ethernet Switch provides reliability for critical applications with 1+1 redundant, hot-swappable internal AC or DC power supplies. The 1+1 power supply design provides A-to-B failover when power supplies are connected to different circuits. AC and DC power supplies can be mixed in the same unit for outstanding deployment flexibility. The Cisco Catalyst 4948 10 Gigabit Ethernet Switch also has a hot-swappable fan tray with four redundant fans for additional serviceability and availability. Comprehensive Management The Cisco Catalyst 4948 10 Gigabit Ethernet Switch includes a single, dedicated 10/100 console port and a single, dedicated 10/100 management port for offline disaster recovery. Remote in-band management is available with the Simple Network Management Protocol (SNMP), Telnet client, Bootstrap Protocol (BOOTP), and Trivial File Transfer Protocol (TFTP). Support for local or remote out-of-band management is delivered through a terminal or modem attached to the console interface. The management port helps enable the Cisco Catalyst 4948 10 Gigabit Ethernet Switch to reload a new image from a TFTP server within seconds. The Cisco Catalyst 4948 10 Gigabit Ethernet Switch delivers a comprehensive set of management tools to provide the visibility and control required for server switching. Managed with CiscoWorks solutions and embedded CiscoWorks CiscoView, the Cisco Catalyst 4948 10 Gigabit Ethernet Switch can be configured and managed to deliver device, VLAN, traffic, and policy management. These web-based management tools offer numerous services, including software deployment and quick isolation of error conditions. Software Configuration Options Table 1 describes the software configuration options for the Cisco Catalyst 4948 10 Gigabit Ethernet Switch. Table 1. Software Configuration Options for the Cisco Catalyst 4948 10 Gigabit Ethernet Switch Software Image | Description | LAN Base Image | Basic Layer 2 image | IP Base Image | Standard Layer 3 image, including Routing Information Protocol Version 1 (RIPv1), RIPv2, static routes, and Enhanced Interior Gateway Routing Protocol (EIGRP) stub | Enterprise Services Image | Enhanced Layer 3 image, including Open Shortest Path First (OSPF), Intermediate System-to-Intermediate System (IS-IS), EIGRP, Border Gateway Protocol (BGP), AppleTalk, and Internetwork Packet Exchange (IPX) software routing; also includes all IP Base image features | Feature Comparison Table 2 compares the features of the Cisco Catalyst 4948 Switch, Catalyst 4948 10 Gigabit Ethernet Switch, and Catalyst 4900M Switch. Table 2. Cisco Catalyst 4900 Series Switches Model Comparison Feature and Description | Cisco® Catalyst 4948 | Cisco Catalyst 4948 10 Gigabit Ethernet | Cisco Catalyst 4900M | Switching Capacity | 96 Gbps | 136 Gbps | 320 Gbps | Throughput | 72 mpps | 102 mpps | • 250 mpps for IPv4 • 125 mpps for IPv6 | IPv6 Support | In Software | In Software | In Hardware | Height | 1RU | 1RU | 2RU | Modular Half-Card Slots | 0 | 0 | 2 | Maximum 10/100/1000 Ports | 48 | 48 | 40 | Maximum 10 Gigabit Ethernet Ports | 0 | 2 | 24 | Maximum Gigabit Ethernet (fiber) Ports | 4 | 0 | 32 (Cisco TwinGig Converter Module) | Cisco TwinGig Converter Module Support | No | No | Yes (half-cards only) | Uplink Optic Type | 4 Small Form-Factor Pluggable (SFP) optics | 2 X2 (10 Gigabit Ethernet) optics | 8 X2 (10 Gigabit Ethernet) optics | Multilayer Switching | IP Base and Enterprise Services options | IP Base and Enterprise Services options | IP Base and Enterprise Services options | Shared Buffer | 16 MB | 16 MB | 16 MB | CPU | 266 MHz | 666 MHz | 1.3 GHz | Synchronous Dynamic RAM (SDRAM) | 256 MB | 256 MB | 512 MB | Active VLANs | 4096 | 4096 | 4096 | Multicast Entries | • 28,000 (Layer 3) • 16,000 (Layer 2) | • 28,000 (Layer 3) • 16,000 (Layer 2) | • 56,000 for IPv4 • 28,000 for IPv6 | Per-VLAN Spanning Tree (PVST) and VLAN IDs | 4096 | 4096 | 4096 | Spanning Tree Protocol Instances | 10000 | 10000 | 10000 | Switched Virtual Interfaces (SVIs) | 2000 | 2000 | 4000 | Security and QoS Hardware Entries | 32,000 | 32,000 | 128,000 | MAC Addresses | 32,000 | 55,000 | 55,000 | Switched Port Analyzer (SPAN) | 2 ingress and 4 egress | 2 ingress and 4 egress | 8 ingress and 8 egress | USB port | No | No | Yes | Compact Flash Memory Support | No | No | Yes | System Reset Button | No | No | Yes | Minimum Software Requirement | Cisco IOS® Software Release 12.2(20)EWA or later | Cisco IOS Software Release 12.2(25)EWA or later | Cisco IOS Software Release 12.2(40)XO or later | Predictable Performance and Scalability The Cisco Catalyst 4948 10 Gigabit Ethernet Switch is optimized for multimedia applications with its advanced multicast support. It supports Protocol Independent Multicast (PIM), Source-Specific Multicast (SSM), and Pragmatic General Multicast (PGM), providing end users with additional scalability to support multimedia applications. Also supported is Internet Engineering Task Force (IGMP) snooping in hardware, enhancing performance and reducing network traffic by allowing a switch to dynamically add and remove hosts from a multicast group. Intelligent Network Services with QoS and Sophisticated Traffic Management The Cisco Catalyst 4948 10 Gigabit Ethernet Switch offers superior per-port QoS features to help ensure that network traffic is classified, prioritized, and scheduled optimally to efficiently manage bandwidth-hungry multimedia, and time-sensitive and mission-critical applications. The Catalyst 4948 10 Gigabit Ethernet Switch can classify, police, and mark incoming packets, allowing the administrator to differentiate between traffic flows and enforce policies. Sharing, shaping, and strict-priority configurations determine scheduling of egress traffic. The Catalyst 4948 10 Gigabit Ethernet Switch also supports Dynamic Buffer Limiting (DBL), a congestion-avoidance feature. For details about the QoS features (including DBL) on the Cisco Catalyst 4948 10 Gigabit Ethernet Switch, refer to the Cisco Catalyst 4500 Series supervisor engine QoS overview at: http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_white_papers_list.html. Features and Specifications at a Glance Layer 2 Features * Layer 2 hardware forwarding at 102 mpps * Layer 2 switch ports and VLAN trunks * IEEE 802. 1Q VLAN encapsulation * Inter-Switch Link (ISL) VLAN encapsulation * Dynamic Trunking Protocol (DTP) * VLAN Trunking Protocol (VTP) and VTP domains * Support for 4096 VLANs per switch * PVST and PVST+ * Flexlink * Spanning Tree PortFast and PortFast Guard * Spanning Tree UplinkFast and BackboneFast * IEEE 802.1s * IEEE 802.1w * IEEE 802.3ad * Spanning Tree Root Guard * Cisco Discovery Protocol Versions 1 and 2 * IGMPv1, v2, and v3 snooping * Cisco EtherChannel technology, Cisco Fast EtherChannel technology, and Cisco Gigabit EtherChannel technology * Port Aggregation Protocol (PAgP) * Link Aggregation Control Protocol (LACP) * Unidirectional link detection (UDLD) and aggressive UDLD * IEEE 802.1 QinQ in hardware * Layer 2 protocol tunneling * Multilayer jumbo frames (up to 9216 bytes) * Baby giants (up to 1600 bytes) * Unidirectional Ethernet * Storm control (formally known as broadcast and multicast suppression) * Community private VLANs (PVLANs) * Forced 10/100 autonegotiation * Web Content Communication Protocol (WCCP) Version 2 Layer 2 redirect * Private VLAN promiscuous trunk * Layer 2 promiscuous trunk over trunk port (L2PT) * Class-of-service (CoS) mutation * E-OAM 802.3ah and CFM: 802.1ag Layer 3 Features * Jumbo frames on all ports (up to 9216 bytes) * Hardware-based IP Cisco Express Forwarding routing at 102 mpps * IP routing protocols: EIGRP, OSPF, RIP, and RIP2 * BGP4 and Multicast Border Gateway Protocol (MBGP) * Nonstop Forwarding (NSF) awareness * Hot Standby Router Protocol (HSRP) v1 and v2 * Software routing of Internetwork Packet Exchange (IPX) and AppleTalk * IS-IS routing protocol * IGMPv1, v2, and v3 * IGMP filtering on access and trunk ports * IP Multicast routing protocols: PIM, SSM, and Distance Vector Multicast Routing Protocol (DVMRP) * Auto rendezvous point (Auto-RP) * Pragmatic General Multicast (PGM) * Cisco Group Multicast Protocol server * Full Internet Control Message Protocol (ICMP) support * ICMP Router Discovery Protocol * Policy-based routing (PBR) * Virtual Route Forwarding lite (VRF-lite) * VRF-aware IP services * IPv6 (software switched) * OSPF fast convergence * OSPF and EIGRP fast-convergence protection * EIGRP stub * Virtual Router Redundancy Protocol (VRRP) * IP unnumbered for SVI * NSF (Non-Stop Forwarding) Awareness * WCCPv2 (Web Cache Communications Protocol) * Gateway Load Balancing Protocol (GLBP) High-Availability Features * 1+1 hot swappable AC or DC power supplies * Hot-swappable field-replaceable fan tray with redundant fans * HSRP v1 and v2 * VRRP * Cisco IOS Embedded Event Manager (EEM) * Cisco Generic Online Diagnostics (GOLD) * Smart Call Home * Sophisticated QoS and Traffic Management * Per-port QoS configuration * Support for four queues per port * Strict priority queuing * IP differentiated services code point (DSCP) * Classification and marking based on IP type of service (ToS) or DSCP * Classification and marking based on full Layer 3 and 4 headers * Input and output policing based on Layer 3 and 4 headers * Support for 512 policers on ingress and 512 policers on egress * Shaping and sharing output queue management * DBL congestion-avoidance feature * No performance penalty for granular QoS functions * Per-port, per-VLAN QoS * Match class of service (CoS) for non-IPv4 traffic Predictable Performance * 136-Gbps switching fabric * Layer 2 hardware forwarding at 102 mpps * Layer 3 hardware-based IP Cisco Express Forwarding routing at 102 mpps * Layer 4 TCP and User Datagram Protocol (UDP) hardware-based filtering at 102 mpps * No performance penalty with advanced Layer 3 and 4 services enabled * Software-based learning at a sustained rate of 3000 hosts per second * Support for 55,000 unicast and 16000 multicast MAC addresses * Support for 32,000 entries in routing table (shared between unicast and multicast) * Scalability to 2000 virtual ports ( SVIs ) * Bandwidth aggregation up to 40 Gbps using Cisco Gigabit Ethernet EtherChannel technology * Hardware-based multicast management * Hardware-based access control lists (ACLs), router ACLs (RACLs), and VLAN ACLs (VACLs) Comprehensive management * Manageable through Cisco Network Assistant (CNA) * Single console port and single IP address to manage all system features * Software configuration management, including local and remote storage * Manageable through CiscoWorks Windows network-management software on a per-port and per-switch basis, providing a common management interface for Cisco routers, switches, and hubs * SNMPv1, v2, and v3 instrumentation, delivering comprehensive in-band management * Command-line interface (CLI) based management console to provide detailed out-of-band management * Remote Monitoring (RMON) software agent to support four RMON groups (history, statistics, alarms, and events) for enhanced traffic management, monitoring, and analysis * Support for all nine RMON groups through the use of a Cisco SwitchProbe analyzer (Switched Port Analyzer [SPAN]) * port, which permits traffic monitoring of a single port, a group of ports, or the entire switch from a single network analyzer or RMON probe * Analysis support, including ingress port, egress port, and VLAN SPAN * Layer 2 traceroute * Remote SPAN (RSPAN) * Cisco SmartPort macros * SPAN ACL filtering * Dynamic Host Configuration Protocol (DHCP) client autoconfiguration * Enhanced SNMP MIB support * HTTPS * Time Domain Reflectometry (TDR) * MAC address notification * Onboard failure logging (OBFL) * Network Mobility Service Protocol (NMSP) Advanced Security * TACACS+ and RADIUS, which help enable centralized control of the switch and restrict unauthorized users from altering the configuration * Standard and extended ACLs on all ports * IEEE 802. 1x user authentication (with VLAN assignment, voice VLAN, port security, guest VLAN, private guest VLAN, private VLAN, and RADIUS-supplied session timeout extensions) * IEEE 802.1x accounting * IEEE 802. 1x authentication failure * IEEE 802. 1x private VLAN assignment * IEEE 802. 1x private guest VLAN * IEEE 802. 1x RADIUS-supplied timeout * IEEE 802.1x Mac-Auth-Bypass * IEEE 802.1x inaccessible authentication bypass * Cisco Network Admission Control (NAC) Layer 2 IEEE 802.1x * Cisco NAC Layer 2 IP * Cisco NAC Layer 2 IP inaccessible authentication bypass * Trusted boundary * RACLs on all ports (no performance penalty) * VACLs * Port ACLs (PACLs) * Private VLANs (PVLANs) on access and trunk ports * VTPv3 * DHCP snooping * DHCP Option 82 * DHCP Option 82 insertion * DHCP Option 82 pass-through * Port security * Port security for PVLAN ports * Sticky port security * Secure Shell (SSH) Protocol Versions 1 and 2 * VLAN Management Policy Server (VMPS) client * Unicast MAC filtering * Unicast port flood blocking * Dynamic Address Resolution Protocol (ARP) inspection * IP Source Guard * Community PVLANs * Trunk port security * IEEE 802.1x inaccessible authentication bypass * MAC authentication bypass * Control plane policing * IEEE 802.1x unidirectional controlled port * Voice VLAN sticky port security * Secure Copy Protocol (SCP) * Cisco EtherChannel trunk port security Management * Enhanced Object Tracking (EOT) * IP service-level agreement (SLA) * CiscoWorks LAN Management Solution (LMS), including CiscoWorks Resource Manager Essentials * CiscoWorks CiscoView * Cisco Network Assistant (CNA) * BGP4-MIB.my * BRIDGE-MIB.my (RFC 1493) * Static multicast MAC address in BRIDGE-MIB * CISCO-BULK-FILE-MIB.my * CISCO-CDP-MIB.my * CISCO-CLASS-BASED-QOS-MIB.my * CISCO-CONFIG-COPY-MIB.my * CISCO-CONFIG-MAN-MIB.my * CISCO-ENTITY-ASSET-MIB.my * CISCO-ENTITY-EXT-MIB.my * CISCO-ENTITY-FRU-CONTROL-MIB.my * CISCO-ENTITY-SENSOR-MIB.my * CISCO-ENTITY-VENDORTYPE-OID-MIB.my * CISCO-ENVMON-MIB.my * CISCO-FLASH-MIB.my * CISCO-FTP-CLIENT-MIB.my * CISCO-HSRP-MIB.my * CISCO-IETF-IP-MIB.my * CISCO-IETF-IP-FORWARD-MIB.my * CISCO-IETF-ISIS-MIB.my * CISCO-IF-EXTENSION-MIB.my * CISCO-IGMP-FILTER-MIB.my * CISCO-IMAGE-MIB.my * CISCO-IPMROUTE-MIB.my * CISCO-L2-TUNNEL-CONFIG-MIB.my * CISCO-L2L3-INTERFACE-CONFIG-MIB.my * CISCO-LAG-MIB.my * CISCO-MEMORY-POOL-MIB.my * CISCO-NDE-MIB.my * CISCO-PAGP-MIB.my * CISCO-PAE-MIB.my * CISCO-PING-MIB.my * CISCO-PORT-SECURITY-MIB.my * CISCO-PORT-STORM-CONTROL-MIB.my * CISCO-PRIVATE-VLAN-MIB.my * CISCO-PROCESS-MIB.my * CISCO-PRODUCTS-MIB.my * CISCO-RF-MIB.my * CISCO-RMON-CONFIG-MIB.my * CISCO-RTTMON-MIB.my * CISCO-STP-EXTENSIONS-MIB.my * CISCO-SYSLOG-MIB.my * CISCO-VLAN-IFTABLE-RELATIONSHIP-MIB.my * CISCO-VLAN-MEMBERSHIP-MIB.my * CISCO-VTP-MIB.my * DOT3-MAU-MIB.my (RFC 3636) * ENTITY-MIB.my * ETHERLIKE-MIB.my * EXPRESSION-MIB.my * HC-RMON-MIB.my * IEEE8021-PAE-MIB.my * IEEE8023-LAG-MIB.my (802.3ad) * IF-MIB.my * IGMP-MIB.my * IPMROUTE-MIB.my * NOVELL-IPX-MIB.my * NOVELL-RIPSAP-MIB.my * OLD-CISCO-TS-MIB.my * PIM-MIB.my * RFC1213-MIB.my (MIB-II) * RFC1243-MIB.my (APPLETALK MIB) * RFC1253-MIB.my (OSPF-MIB) * RMON-MIB.my (RFC 1757) * RMON2-MIB.my (RFC 2021) * SMON-MIB.my (Internet-Draft) * SNMP-FRAMEWORK-MIB.my (RFC 2571) * SNMP-MPD-MIB.my (RFC 2572) * SNMP-NOTIFICATION-MIB.my (RFC 2573) * SNMP-TARGET-MIB.my (RFC 2573) * SNMP-USM-MIB.my (RFC 2574) * SNMP-VACM-MIB.my (RFC 2575) * SNMPv2-MIB.my * TCP-MIB.my * UDP-MIB.my * RIP SNMP MIB * LLDP MIB Industry Standards * Ethernet: IEEE 802.3 and 10BASE-T * Fast Ethernet: IEEE 802.3u, 100BASE-TX, and 100BASE-FX * Gigabit Ethernet: IEEE 802.3z and 802.3ab * IEEE 802. 1D Spanning Tree Protocol * IEEE 802.1w rapid reconfiguration of spanning tree * IEEE 802. 1s multiple VLAN instances of spanning tree * IEEE 802.3 ad LACP * IEEE 802. 1p CoS prioritization * IEEE 802.1Q VLAN * IEEE 802. 1x user authentication * X2 support * RMON I and II standards Indicators and Ports * System status: Green (operational), or red (faulty) * Console: RJ-45 socket * Reset (switch recessed for protection) * Uplinks: Link and active Supported X2 Optics Table 3 lists the X2 optics supported by the Cisco Catalyst 4948 10 Gigabit Ethernet Switch. Table 3. X2 Optics Supported by Cisco Catalyst 4948 10 Gigabit Ethernet Switch Type | Maximum Distance over Specified Medium | LR | 10 km on single-mode fiber (SMF) (G.652) | CX4 | Up to 15m on IBX4 cable | LX4 | 300m on multimode fiber (MMF) | SR | 26 to 300m on MMF (depends on MMF type) | ER | 40 km on SMF | LRM | 220m on MMF | ZR | 1550 nm on SMF | DWDM | 1530.33 nm to 1560.61 nm X2 (100-GHz ITU grid) | Power Supply The Cisco Catalyst 4948 10 Gigabit Ethernet Switch offers a choice of 300-watt (W) AC or DC power supplies. The switch can operate with one power supply present. When two power supplies are installed, the switch shares the power load between the two supplies (Table 4).

Table 4. AC and DC Power Supply Specifications Specification | 300W AC | 300W DC | Input Current | 4A at 100V | 8A @ -40.5 to -75VDC | 2A at 240V | 8A at -48 to -60V | - | Output Current | 25A at 12 VDC | 25A @ 12 VDC | Weight | Weight: 2.0 kg | Weight: 2.0 kg | Heat Dissipation | 1023 BTU/hr | 1023 BTU/hr | Average Power use | 212 Watts | 212 Watts | Switch Dimensions * Width: 17.290 in. (43.9166 cm) * Depth: 16.14 in. (40.9956 cm) * Height: 1.712 in. (4.445 cm) * Weight: 16.5 lb (7.48 kg) with one power supply Software Requirements The Cisco Catalyst 4948 10 Gigabit Ethernet Switch is supported only in Cisco IOS Software and is not supported in the Cisco Catalyst Operating System Software. The minimum software version is Cisco IOS Software Release 12.2(25)EWA or later. For the latest software release information and recommendations, please reference the product bulletin athttp://www.cisco.com/en/US/products/ps6021/prod_bulletins_list.html. Environmental Conditions * Operating temperature: 32 to 104ºF (0 to 40ºC) * Storage temperature: -40 to 167ºF (-40 to 75ºC) * Relative humidity: 10 to 90 percent, noncondensing * Operating altitude: -60 to 2000m Regulatory Standards Compliance Table 5 summarizes the regulatory standards compliance of the Cisco Catalyst 4948 10 Gigabit Ethernet Switch. Table 5. Regulatory Standards Compliance of Cisco Catalyst 4948 10 Gigabit Ethernet Switch Specification | Description | Regulatory Compliance | Products bear CE Marking, indicating compliance with the 89/336/EEC and 73/23/EEC directives, which include the safety and EMC standards listed here. | Safety | • UL 60950-1 • CAN/CSA-C22.2 No. 60950-1 • EN 60950-1 • IEC 60950-1 • AS/NZS 60950 • IEC 60825-1 • IEC 60825-2 • EN 60825-1 • EN 60825-2 • 21 CFR 1040 | EMC | • FCC Part 15 (CFR 47) Class A • ICES-003 Class A • EN55022 Class A • CISPR22 Class A • AS/NZS 3548 Class A • VCCI Class A • EN55024 • ETS300 386 • EN50082-1 • EN61000-3-2 • EN61000-3-3 | Table 6 lists the industry EMC, safety, and environmental standards for the Cisco Catalyst 4948 10 Gigabit Ethernet Switch. Table 6. Industry EMC, Safety, and Environmental Standards Specification | Description | Network Equipment Building Standards (NEBS) | • GR-63-Core NEBS Level 3 • GR-1089-Core NEBS Level 3 | ETSI | • ETS 300 019 Storage Class 1.1 • ETS 300 019 Transportation Class 2.3 • ETS 300 019 Stationary Use Class 3.1 | New Cisco IOS Software Packaging for the Cisco Catalyst 4900 Series Cisco provides a new Cisco IOS Software package for the Cisco Catalyst 4900 Series, creating a new foundation for features and functions and offering consistency across all Cisco Catalyst switches. The new Cisco IOS Software release is designated Release 12.2SG. Prior Cisco IOS Software images for the Catalyst 4900 Series, formally known as Basic Layer 3 (Standard Multilayer Image [SMI]) and Enhanced Layer 3 (Enhanced Multilayer Image [EMI]) images, now are called IP Base and Enterprise Services images, respectively. Unless otherwise specified, all currently shipping Cisco Catalyst 4900 software features based on Cisco IOS Software are supported in the IP Base image; however, note the following points regarding the IP Base image: * The IP Base image does not support the following routing-related features: BGP, EIGRP, OSPF, IS-IS, IPX, AppleTalk, VRF-lite, and PBR). * The IP Base image supports EIGRP stub for Layer 3 routing on all Cisco Catalyst 4900 Series supervisor engines. For more information on EIGRP stub functions, go to http://www.cisco.com/en/US/tech/tk365/technologies_white_paper0900aecd8023df6f.shtml. The Enterprise Services image supports all Cisco Catalyst 4900 Series software features based on Cisco IOS Software, including enhanced routing. Table 1 earlier in this document provides a more detailed description of the feature differences between the IP Base and Enterprise Services images. LAN Base Image Starting with Cisco IOS Release 12.2(52)SG LAN Base Software image will be the default IOS option for the Catalyst 4948. IP Base and Enterprise Services image are available as optional upgrades. The LAN Base image is supported on the Catalyst 4948 and 4948-10GE. It is primarily focused on customers Layer 2 requirements and therefore many of the IP Base features have been removed. If at a later date some of the features are required LAN Base is fully upgradable to IP Base or Enterprise Services. Table 7. IOS Feature Comparison-LAN Bas | LAN Base | IP Base | Datacenter Grade HW | Yes | Yes | Basic L2 | Yes | Yes | SPAN | 2 sessions | 8 sessions | Location Services | No | Yes | SmartCallHome | No | Yes | HSRP and VRRP | No | Yes | GLBP | No | Yes | L2PT and Q-in-Q | No | Yes | Auto QoS | Yes* | Yes | EIGRP Stub | No | Yes | PIM SM/DM | No | Yes | MLD Snooping | Yes* | Yes | Flex Link | Yes* | Yes | PVST+ & RPVST+ | Yes* | Yes | EEM | No | Yes | Smartports | Yes* | Yes | * Support added in 12.2(53)SG Ordering Information Table 8 provides ordering information for the Cisco Catalyst 4948 10 Gigabit Ethernet Switch. Table 8. Ordering Information Part Number | Description | WS-C4948-10GE-S | Cisco Catalyst 4948-10GE, IP Base Image (RIP, static routes,), one AC power supply, fan tray | WS-C4948-10GE-E | Cisco Catalyst 4948-10GE, Enterprise Services Image (OSPF, EIGRP, IS-IS, BGP, IPX, AppleTalk), one AC power supply, fan tray | WS-C4948-10GE | Cisco Catalyst 4948-10GE, optional software image, optional power supplies, fan tray | WS-C4948-10GEBDL | Cisco Catalyst 4948-10GE, 10 switch multi-pack bundle shipped in 1 box, volume service option | S49LB-12252SG(=) | Cisco IOS Software for Cisco Catalyst 4900 Series Switches (LAN Base image) | S49LBK9-12252SG(=) | Cisco IOS Software for Cisco Catalyst 4900 Series Switches (LAN Base image with Triple Data Encryption Standard [3DES]) | S49IPB-12252SG(=) | Cisco IOS Software for Cisco Catalyst 4900 Series Switches (IP Base image) | S49IPBK9-12252SG(=) | Cisco IOS Software for Cisco Catalyst 4900 Series Switches (IP Base image with Triple Data Encryption Standard [3DES]) | S49ES-12252SG(=) | Cisco IOS Software for Cisco Catalyst 4900 Series Switches (Enterprise Services image with BGP support) | S49ESK9-12252SG(=) | Cisco IOS Software for Cisco Catalyst 4900 Series Switches (Enterprise Services image with 3DES and BGP support) | WS-C4900-SW-LIC | Catalyst 4948 IP Base Upgrade License for LAN Base IOS | PWR-C49-300AC(=) | Cisco Catalyst 4900 300W AC power supply | PWR-C49-300AC/2 | Cisco Catalyst 4900 300W AC power supply, redundant | PWR-C49-300DC(=) | Cisco Catalyst 4900 300W DC power supply | PWR-C49-300DC/2 | Cisco Catalyst 4900 300W DC power supply, redundant | WS-X4991= | Cisco Catalyst 4900 fan tray (spare) | C4948-ACC-KIT= | Spare rack-mount and cable guide | C4948-BKT-KIT= | C4900 front- and rear-mount brackets | C4948-REAR-BKT(=) | C49xx high performance rear mount brackets | Power Cable Options | CAB-US515-C15-US | AC power cord, 110V North America | CAB-N5K6A-NA | AC power cord, 220V North America | CAB-AS3112-C15-AU | AC power cord (Australia) | CAB-CEE77-C15-EU | AC power cord (Europe) | CAB-C2316-C15-IT | AC power cord CD12 (Italy) | CAB-IR2073-C15-AR | AC power cord (Argentina) | CAB-BS546-C15-SA | AC power cord (South Africa) | CAB-BS1363-C15-UK | AC power cord (United Kingdom) | CAB-7KACSXX | AC power cord (Switzerland) | X2 Options | X2-10GB-LR | 10GB long-reach (LR) module | X2-10GB-CX4 | 10GB CX4 module | X2-10GB-LX4 | 10GB LX4 module | X2-10GB-SR | 10GB short-reach (SR) module | X2-10GB-ER | 10GB extended-reach (ER) module | X2-10GB-ZR | 10GB ZR module | DWDM-X2 | 10GB DWDM X2 module with DOM support | Warranty The Cisco Catalyst 4948 10 Gigabit Ethernet Switch has a 1-year limited hardware warranty. It includes hardware replacement with a 10-day turnaround from receipt of a return materials authorization (RMA). Cisco Technical Support Services Cisco Technical Support Services helps ensure that your Cisco products operate efficiently, remain highly available, and benefit from current system software to help you effectively manage your network service while controlling operating costs. Cisco Technical Support Services (Tables 9 and 10) provides significant benefits that go beyond what is offered under the Cisco warranty policy. Services available under a Cisco SMARTnet® service contract that are not covered under a warranty include the following: * Latest software updates * Rapid replacement of hardware with next-day, 4-hour, or 2-hour dispatch options * Ongoing technical support through Cisco Technical Assistance Center (TAC) * Registered access to http://www.cisco.com Table 9. Cisco Technical Support Services: Components Feature | Benefits | Software Support | Software support offers maintenance and minor and major updates for licensed feature sets. Downloading new maintenance releases, patches, or updates of Cisco IOS Software helps enhance and extend the useful life of Cisco devices. Through major software updates, organizations can extend the life of equipment and maximize application technology investments by: • Adding new functions that, in many cases, require no additional hardware investment • Increasing the performance of current functions • Enhancing network or application availability, reliability, and stability | Cisco TAC Support | With more than 1000 highly trained customer support engineers, 390 CCIE® experts, and access to 13,000 research and development engineers, Cisco TAC complements your in-house staff with a high level of knowledge in data, voice, and video communications networking technology. Its sophisticated call-routing system quickly routes calls to the correct technology personnel. The Cisco TAC is available 24 hours a day, 365 days a year. | Cisco.com | This award-winning website provides 24-hour access to an extensive collection of online product and technology information, interactive network management and troubleshooting tools, and knowledge-transfer resources that can help customers reduce costs by increasing staff self-sufficiency and productivity. | Advance Hardware Replacement | Advance replacement and onsite field engineer options supply fast access to replacement hardware and field resources for installing hardware, minimizing the risk of potential network downtime. | Smart Call Home | Cisco Smart Call Home is a proactive, connected service capability of Cisco SMARTnet Service that is available at no additional cost on Cisco Catalyst 4500 Series Switches. Smart Call Home devices can continuously monitor their own health using GOLD diagnostics technology and automatically notify you of potential issues using secure transmissions. If a serious problem arises, Smart Call Home automatically detects it and generates a Cisco Technical Assistance Center (TAC) service request that is routed to the right team for a particular problem. | Table 10. Technical Support Services: Competitive Differentiators Feature | Benefits | Worldwide Virtual Lab | This extensive lab of Cisco equipment and Cisco IOS Software releases provides an invaluable engineering resource and knowledge base for training, product information, and recreation and testing of selected network problems to help decrease time to resolution. | Cisco TAC Training • Boot camps • Tech calls • Tech forums | Cisco is committed to providing customers the latest in technology support. Cisco TAC training programs help customers avoid opening cases. These programs also provide knowledge transfer of Cisco networking expertise. | Cisco Live | A powerful suite of Internet-enabled tools with firewall-friendly features, these secure, encrypted Java applets can turn a simple phone call into an interactive collaboration session, allowing customers and Cisco TAC support engineers to work together more effectively. | Global logistics | With 10,000 onsite field engineers and a US$2.3 billion investment in inventory, Cisco delivers award-winning, worldwide hardware replacement support from 650 depots, covering 120 countries. | Cisco IOS Software | Cisco IOS Software employs 100 discrete technologies with more than 2000 features. Each year, 400 new features are added. Cisco IOS Software is installed in more than 10 million devices and is running on more than 10,000 networks worldwide. It operates on the world's largest IPv6 and voice-over-IP (VoIP) networks and in all major service provider networks worldwide. |

Routers The Cisco® 7609 Router is a high-performance router deployed at the network edge, where performance, IP services, redundancy, and fault resiliency are critical. It enables Carrier Ethernet service providers to deploy an advanced network infrastructure that supports a range of IP video and triple-play (voice, video, and data) system applications in both the residential and business services markets. The Cisco 7609 enables enterprises to deploy advanced WAN and metropolitan-area network (MAN) networking solutions necessary to succeed in demanding, high-traffic environments. Providing the foundation for a powerful combination of speed and services, the 9-slot Cisco 7609 Router is an outstanding choice for multiple applications. Whether deployed as a high-speed WAN aggregator, as a device for peering, as a residential broadband services aggregator, or as a device for Metro Ethernet aggregation and uplink, the Cisco 7609 meets requirements for redundancy, high availability, and rack density. In the point-of-presence (POP) service provider edge or the metropolitan network edge, the Cisco 7609 sets new standards as part of the industry-leading Cisco 7600 Series Routers (Figure 1). Figure 1. Cisco 7609 Router With a forwarding rate of up to 400-Mpps distributed and 720-Gbps total throughput, the Cisco 7609 provides performance and reliability with options for redundant route processors and power supplies. The inclusion of two Gigabit Ethernet ports on the Cisco Catalyst® 6500 Series Supervisor Engine 720 with the Multilayer Switch Feature Card 3 (MSFC-3) or the new Cisco Route Switch Processor 720 (RSP 720) with the MSFC-4 used in the Cisco 7609 eliminates the need for a line-card slot for uplink ports. The result of this design is more efficient use of available line-card slots and increased deployment flexibility. Four Gigabit Ethernet ports are available for use in dual-route processor configurations. Shared port adaptors (SPA) on the SPA interface processors (SIPs) are available on the Cisco 7600 Series with interface speeds ranging from OC-3 to OC-192 and from Fast Ethernet to 10 Gigabit Ethernet. The Cisco 7600 Series can also use the Cisco 7600 Series/Catalyst 6500 Series Enhanced FlexWAN Module to take advantage of most Cisco 7200 and 7500 Port Adapters for terminating DS-0 to OC-3 speeds. By using the Cisco Catalyst 6000 Series of Ethernet line cards in conjunction with the SIP-based SPAs and the enhanced FlexWAN module, the Cisco 7600 provides a multitude of options to scale WAN connectivity from DS-0 to OC-192 and LAN connectivity from 10-Mbps Ethernet through 10 Gigabit Ethernet. The Cisco 7609 chassis accommodates a broad selection of line cards supporting numerous applications, including: • SPAs and SIPs (Cisco 7600 Series SPA Interface Processor-200 [SIP-200], SIP-400, and SIP-600): – Channelized T1/E1, Channelized T3, and Channelized OC-3/STM-1 – OC-3/STM-1, OC-12/STM-4, OC-48/STM-16 Packet over SONET/SDH (PoS), and OC-192/STM-64 PoS – OC-3/STM-1 ATM, OC-12/STM-4 ATM, and OC-48/STM-16 ATM – Fast Ethernet, Gigabit Ethernet, and 10 Gigabit Ethernet • Enhanced FlexWAN module: Supporting Cisco 7200 and 7500 WAN port adapters from DS-0 to OC-3 for channelized and ATM interfaces and also Fast Ethernet port adapters • High-density Ethernet services modules: 10/100 Mbps, Gigabit Ethernet, and 10-Gigabit Ethernet • Services modules: IP Security (IPsec), firewall, distributed denial of service, intrusion detection systems, network analysis, and content witching commonly used, for example, in the Cisco Mobile Exchange solution • Supervisor support: Cisco Catalyst 6500 Supervisor Engine 32 (WS-SUP32-GE-3B and WS-SUP32-10GE-3B), Cisco Catalyst 6500 Supervisor Engine 720 (WS-SUP720-3B and WS-SUP720-3BXL), and the new Cisco Route Switch Processor 720 (RSP720-3C and RSP720-3CXL) The Cisco 7609 incorporates many service provider and high-end enterprise carrier-class requirements. Line cards are vertically mounted for efficient cooling with front-to-back airflow. High availability is an inherent facet in the form of redundant power supplies and redundant fan-tray modules. Standard or extended cable-tray inserts provide unrestricted management of either fiber and coaxial or multiple conductor types with up to 48 10/100 cables per slot. Two chassis can be installed per 7-foot rack. Applications The flexible Cisco 7609 Router is ideal for addressing high-performance applications such as: • High-end customer premises equipment (CPE) • Leased line • IP/Multiprotocol Label Switching (MPLS) provider edge • Metro Ethernet access • Enterprise WAN aggregation • Mobile Radio Access Network (RAN) aggregation • Residential subscriber aggregation Feature Summary Cisco 7609 Chassis Features • 21RU (36.75 in. [93.3 cm]) high, up to 2 chassis per 7-foot rack • Nine configurable interface slots • Route processor, switch fabric, and power supply protection capability: 1 + 1 • Tiered-speed fan design (standard): 1 + 1 • Cable management tray options for fiber and coaxial and dense 10/100 cable configurations • Single-side connection management for both interface and power terminations • Front-to-back airflow Cisco 7609 System Features • Total throughput: 720 Gbps • Up to 400-Mpps distributed forward rate (requires distributed forwarding cards [DFCs]) Cisco 7609 Technical Specifications • Nine-slot chassis • Network Equipment Building Standards (NEBS) Level 3 compliance • Minimum route processor requirement; one Cisco Catalyst 6500 Series Supervisor Engine 2 with Multilayer Switch Feature Card 2 (MFSC-2) • Dimensions (H x W x D): 36.75 x 17.2 x 20.7 in. (93.3 x 43.1 x 53.3 cm) • Power requirements: – -208 to 240 VAC (recommended) – -48 to -60 VDC (4000 WAC supplies require 30A input circuits) • Weight: 121 lb (54.9 kg; chassis only); 270 lb (122.5 kg; full configuration) • Mean time between failure (MTBF): 7 years for system configuration • Environmental conditions: – Operating temperature: 32 to 104°F (0 to 40°C) – Storage temperature: -4 to 149°F (-20 to 65°C) – Relative humidity, operating: 10 to 85%, noncondensing – Relative humidity, storage: 5 to 95%, noncondensing – Operating altitude: -500 to 6500 ft • Minimum software release: Cisco IOS® Software Release 12.1(13)E1 Table 1 gives ordering information for the Cisco 7609. Table 1. Cisco 7609 Chassis Ordering Information Part Number | Description | Spare Units (denoted by "=") | CISCO7609= | Spare Cisco 7609 enhanced service-provider chassis (includes redundant tiered-speed fan trays, cable management tray with standard and extended depth inserts, and mounting kit) | PWR-6000-DC= | 6000W DC power supply for Cisco 7609/7609-S/7613 | WS-CAC-6000W = | Spare AC power supply for the Cisco 7609/7609-S chassis | PWR-4000-DC= | 4000W DC power supply for Cisco 7609/7613 | WS-CAC-4000W-US= | Spare AC power supply for the Cisco 7609 chassis (30A circuit required); U.S./Japan cord attached | WS-CAC-4000W-INT= | Spare AC power supply for Cisco 7609 chassis (30A circuit required); international cord attached | WS-CDC-2500W= | Spare DC 2500W supply | WS-CAC-3000W= | Spare 3000W AC power supply for the Cisco 7609 and 7613 | FAN-TRAY-09= | Spare fan tray for the Cisco 7609 chassis (can be used as the first or second tray) | CABLETRAY-09= | Spare cable tray assembly with standard and extended depth inserts | KIT-MNTG-09= | Spare mounting kit for the Cisco 7609 chassis | CLK-7600= | Clock card for the Cisco 7609 chassis | Regulatory Compliance CE marking Safety • UL 60950 • IEC 60950 • EN 60950 • CAN/CSA-C22.2 No. 60950 • AS/NZS 3260 EMC • FCC Part 15 (CFR 47) Class A • ICES-003 Class A • EN55022 Class A • CISPR22 Class A • AS/NZS 3548 Class A • VCCI Class A • EN55024 • ETS300 386 • EN50082-1 • EN61000-3-2 • EN61000-3-3 • EN61000-6-1 Industry Standard • GR-63-Core NEBS Level 3 (pending) • GR-1089-Core NEBS Level 3 (pending) • ETSI 300 019 Storage Class 1.1 • ETSI 300 019 Transportation Class 2.3 • ETSI 300 019 Stationary Use Class 3.1 Service and Support Cisco offers numerous service and support offerings for both service provider and enterprise customers. Cisco has earned the highest customer satisfaction ratings in the industry by providing the world-class service and support necessary to deploy, operate, and optimize networks. Whether the goal is speed to market, maximizing network availability, or enhancing customer satisfaction and retention, Cisco is committed to the success of its customers.

Firewall Cisco ASA 5500 Series Adaptive Security provides intelligent threat defense and secure communications services that stop attacks before they impact business continuity. The Cisco ASA 5500 series enables organizations to lower their deployment and operations costs while delivering comprehensive network security for networks of all sizes. Threats to today's networks continue to grow, with attacks coming from both outside and within corporate networks. These threats can have devastating effects, ranging from business disruption due to a network outage, financial risk resulting from information loss, or liability issues stemming from information tampering. Meanwhile, businesses are striving to improve their profitability and competitiveness through continued business process optimization and automation, leading to increased connectivity with their business partners and customers. These applications offer many benefits, but can also introduce a variety of risks, if not secured properly. Using the world-class security and networking services provided by the Cisco® ASA 5500 Series Firewall Edition, businesses can securely deploy mission-critical applications and networks in a highly reliable manner, while benefiting from the significant investment protection and lower operational costs offered by this unique, modular solution. Challenge The information assets and applications traveling on today's networks are the lifeblood of the modern enterprise. As businesses continue to optimize their processes and streamline their operations for improved profitability and competitiveness, their networks become increasingly more complex and interconnected. Now, as businesses depend on these networks as mission-critical infrastructure, the security and reliability challenges businesses face continue to grow. Examples of threats to today's business networks include: • Unauthorized network or information access-As businesses increase internal network connectivity and collaboration with new customers and business partners, they need to effectively maintain control of their vital assets to preserve their competitive edge and limit corporate liability. New applications can increase business automation and collaboration, but can also open dangerous security holes, if not secured properly. • Decreased employee productivity and wasted bandwidth-Businesses need to effectively control the use of applications, such as peer-to-peer file sharing and instant messaging, which plague many unsuspecting businesses, to improve employee productivity and reduce the costs associated with Internet connectivity. • Unplanned network downtime-Businesses need highly reliable networks that help ensure continuous operations for maximum productivity, including support for planned and unplanned maintenance upgrades. These networks must be able to defend against threats such as Internet-based denial of service attacks or internal sabotage from disgruntled employees or contractors. Solution The Cisco ASA 5500 Series Firewall Edition enables businesses to securely deploy mission-critical applications and networks in a highly reliable manner, while providing significant investment protection and lower operational costs through its unique, modular design. Businesses can protect their networks from unauthorized access using the Cisco ASA 5500 Series Firewall Edition's robust policy enforcement services. These services combine with market-leading VPN services to enable businesses to securely extend their networks across low-cost Internet connections to business partners, remote sites, and mobile workers. This flexible solution can adapt as an organization's needs evolve along with the ever-changing security threat landscape, giving businesses the ability to easily integrate market-leading intrusion prevention, antivirus, antispam, antispyware, URL filtering, and other advanced content security services for additional layers of protection. Combined with Cisco management and monitoring application solutions, the Cisco ASA 5500 Series Firewall Edition provides world-class security with lower operational costs. Capabilities of the Cisco ASA 5500 Series Firewall Edition include: • Most trusted and deployed firewall technology-Building upon the market-proven capabilities of the Cisco PIX® Family of security appliances, the Cisco ASA 5500 Series provides a wide range of services to secure modern network environments. Flexible policy capabilities prevent unauthorized access to network resources or vital corporate information. Advanced application control capabilities help businesses effectively control the use of peer-to-peer file sharing, instant messaging, and other non-corporate applications-thus improving employee productivity and reducing wasted Internet bandwidth. • Threat-protected VPN-Building upon the market-proven VPN capabilities of the Cisco VPN 3000 Series Concentrator, the Cisco ASA 5500 Series Firewall Edition provides secure site-to-site and remote-user access to corporate networks and services. This solution offers businesses maximum flexibility for secure connectivity by combining support for Secure Sockets Layer (SSL) and IP Security (IPsec) VPN capabilities into a single, best-in-class solution. Using the services offered by the Cisco ASA 5500 Series Firewall Edition, businesses can enforce identity-based security and networking policies to all network traffic, thus enabling businesses to tailor-fit access privileges for every group of employees, contractors, and business partners. • Adaptive design provides superior investment protection and extensibility to address future threats-The Cisco ASA 5500 Series Firewall Edition can adapt as businesses needs change through its unique, modular design. Businesses can easily expand the number of security services offered by adding a high-performance, purpose-built Cisco ASA 5500 Series security services module, such as the Advanced Inspection and Prevention Security Services Module (AIP SSM) for advanced intrusion prevention services, or the Content Security and Control Security Services Module (CSC SSM) for advanced antivirus, antispam, and other content security services. • Intelligent network integration and enterprise-class resiliency-Building on more than 20 years of Cisco networking leadership and innovation, the Cisco ASA 5500 Series Firewall Edition delivers a wide range of intelligent networking services for seamless integration into today's diverse network environments. Businesses can maximize network uptime and throughput by taking advantage of the many resiliency and scalability services this solution has to offer, such Active/Active high availability, "zero-downtime software upgrades," and integrated VPN clustering and load balancing. • Easy deployment and management-The Cisco management and monitoring suite enables large-scale deployment and operation of the Cisco ASA 5500 Series Firewall Edition. Cisco provides a complete solution, covering management and monitoring. Also included with the solution is Cisco Adaptive Security Device Manager (ASDM), which provides a powerful, yet easy-to-use browser-based management and monitoring interface for individual security appliances. Business Benefits The Cisco ASA 5500 Series Firewall Edition provides the security and connectivity services that helps your business with: • Controlled access to corporate resources-Prevents unauthorized access to applications or information assets by providing businesses with fine-grain identity- or network-based access control. Integrates with popular user authentication services such as Microsoft Active Directory, Lightweight Directory Access Protocol (LDAP), Kerberos, and RSA SecurID. • Secure deployment of new applications-Enables businesses to safely deploy new applications by providing advanced application-layer security services for a wide range of popular applications, including Web-based applications, e-mail, voice over IP (VoIP), video, and multimedia applications. Hides corporate network addresses from the Internet for an additional layer of protection from attack. • Secure remote access to corporate network-Provides both SSL- and IPsec-based methods of threat-protected VPN connectivity to remote sites, business partners, and mobile workers. • Business resiliency-Prevents disruption of mission-critical applications and services due to security breaches by implementing world-class firewall, VPN, and networking technologies. Architecture The Cisco ASA 5500 Series Firewall Edition is the focal point of a complete solution for secure network access. Tight integration with Cisco management and monitoring systems enables organizations to deploy and maintain a security solution that protects mission-critical applications and information assets (Figure 1). Primary Components Cisco ASA 5500 Series Firewall Edition Provides a wide range of security and networking services at locations across the enterprise. Management Cisco Security Manager provides an enterprise-grade management infrastructure for large-scale deployments of Cisco security technologies. Monitoring Cisco Security Monitoring, Analysis, and Response System (Cisco Security MARS) provides real-time monitoring and incident response capabilities, enabling businesses to get the most value from the security and networking services of the Cisco ASA 5500 Series Firewall Edition. Figure 1. Solution Architecture Complementary Solutions The Cisco® ASA 5500 Series Adaptive Security Appliance is a modular platform that provides the next generation of security and VPN services for small and medium-sized business and enterprise applications. The comprehensive portfolio of services within the Cisco ASA 5500 Series enables customization for location-specific needs through its four tailored package product editions: the Firewall, VPN, IPS, and Content Security Editions. These packages enable superior protection by providing the right services for the right location. At the same time, they enable standardization on the Cisco ASA 5500 Series platform to reduce costs in management, training, and sparing. Finally, each Edition simplifies design and deployment by providing pre-packaged location-specific security solutions. Figure 2. Complementary Solutions Cisco Services Cisco services help you protect your network investment, optimize network operations, and prepare your network for new applications to extend network intelligence and the power of your business. Included in the Operate phase of the lifecycle are Cisco Security Intellishield Alert Manager Service, SMARTnet, Service Provider Base, and Cisco Services for IPS. These services are suitable for Enterprise, Commercial and Services Provider customers. Cisco Security Intellishield Alert Manager Service provides a customizable, web-based threat and vulnerability alert service that allows organizations to easily access timely, accurate and credible information about potential vulnerabilities in their environment. Recommended Solutions Table 1. Ordering Information Description | Performance | Part Number | Cisco ASA 5505 10 User Firewall Edition Bundle Includes: 10 users, 8-port Fast Ethernet switch with 2 Power over Ethernet ports, 10 IPsec VPN peers, 2 SSL VPN peers, Triple Data Encryption Standard/Advanced Encryption Standard (3DES/AES) license | • 150 Mbps Firewall • 100 Mbps IPsec VPN | ASA5505-BUN-K9 | Cisco ASA 5505 10 User Firewall Edition Bundle Includes: 10 users, 8-port Fast Ethernet switch with 2 Power over Ethernet ports, 10 IPsec VPN peers, 2 SSL VPN peers, Data Encryption Standard (DES) license | • 150 Mbps Firewall • 100 Mbps IPsec VPN | ASA5505-K8 | Cisco ASA 5505 50 User Firewall Edition Bundle Includes: 50 users, 8-port Fast Ethernet switch with 2 Power over Ethernet ports, 10 IPsec VPN peers, 2 SSL VPN peers, 3DES/AES license | • 150 Mbps Firewall • 100 Mbps IPsec VPN | ASA5505-50-BUN-K9 | Cisco ASA 5505 Unlimited User Firewall Edition Bundle Includes: Unlimited users, 8-port Fast Ethernet switch with 2 Power over Ethernet ports, 10 IPsec VPN peers, 2 SSL VPN peers, 3DES/AES license | • 150 Mbps Firewall • 100 Mbps IPsec VPN | ASA5505-UL-BUN-K9 | Cisco ASA 5505 Security Plus Firewall Edition Bundle Includes: Unlimited users, 8-port Fast Ethernet switch with 2 Power over Ethernet ports, 25 IPsec VPN peers, 2 SSL VPN peers, DMZ support, Stateless Active/Standby high availability, Dual ISP support, 3DES/AES license | • 150 Mbps Firewall • 100 Mbps IPsec VPN | ASA5505-SEC-BUN-K9 | Cisco ASA 5510 Firewall Edition Bundle Includes: 5 Fast Ethernet interfaces, 250 IPsec VPN peers, 2 SSL VPN peers, 3DES/AES license | • 300 Mbps Firewall • 170 Mbps IPsec VPN | ASA5510-BUN-K9 | Cisco ASA 5510 Firewall Edition Bundle Includes: 5 Fast Ethernet interfaces, 250 IPsec VPN peers, 2 SSL VPN peers, DES license | • 300 Mbps Firewall • 170 Mbps IPsec VPN | ASA5510-K8 | Cisco ASA 5510 Security Plus Firewall Edition Bundle Includes: 2 Gigabit Ethernet + 3 Fast Ethernet interfaces, 250 IPsec VPN peers, 2 SSL VPN peers, Active/Standby high availability, 3DES/AES license | • 300 Mbps Firewall • 170 Mbps IPsec VPN | ASA5510-SEC-BUN-K9 | Cisco ASA 5520 Firewall Edition Bundle Includes: 4 Gigabit Ethernet interfaces + 1 Fast Ethernet interface, 750 IPsec VPN peers, 2 SSL VPN peers, Active/Active and Active/Standby high availability, 3DES/AES license | • 450 Mbps Firewall • 225 Mbps IPsec VPN | ASA5520-BUN-K9 | Cisco ASA 5520 Firewall Edition Bundle Includes: 4 Gigabit Ethernet interfaces + 1 Fast Ethernet interface, 750 IPsec VPN peers, 2 SSL VPN peers, Active/Active and Active/Standby high availability, DES license | • 450 Mbps Firewall • 225 Mbps IPsec VPN | ASA5520-K8 | Cisco ASA 5540 Firewall Edition Bundle Includes: 4 Gigabit Ethernet interfaces + 1 Fast Ethernet interface, 5000 IPsec VPN peers, 2 SSL VPN peers, 3DES/AES license | • 650 Mbps Firewall • 325 Mbps IPsec VPN | ASA5540-BUN-K9 | Cisco ASA 5540 Firewall Edition Bundle Includes: 4 Gigabit Ethernet interfaces + 1 Fast Ethernet interface, 5000 IPsec VPN peers, 2 SSL VPN peers, DES license | • 650 Mbps Firewall • 325 Mbps IPsec VPN | ASA5540-K8 | Cisco ASA 5550 Firewall Edition Bundle Includes: 8 Gigabit Ethernet interfaces + 1 Fast Ethernet interface, 4 Gigabit SFP interfaces, 5000 IPsec VPN peers, 2 SSL VPN peers, 3DES/AES license | • 1.2 Gbps Firewall • 425 Mbps IPsec VPN | ASA5550-BUN-K9 | Cisco ASA 5550 Firewall Edition Bundle Includes: 8 Gigabit Ethernet interfaces + 1 Fast Ethernet interface, 4 Gigabit SFP interfaces, 5000 IPsec VPN peers, 2 SSL VPN peers, DES license | • 1.2 Gbps Firewall • 425 Mbps IPsec VPN | ASA5550-K8 | Cisco ASA 5580-20 Firewall Edition Includes: 2 Management interfaces, 5000 IPsec VPN peers, 2 SSL VPN peers, DES license | • 5 Gbps Firewall • 1 Gbps IPsec VPN | ASA5580-20-BUN-K8 | Cisco ASA 5580-20 Firewall Edition Includes: 2 Management interfaces, 5000 IPsec VPN peers, 2 SSL VPN peers, 3DES/AES license | • 5 Gbps Firewall • 1 Gbps IPsec VPN | ASA5580-20-BUN-K9 | Cisco ASA 5580-20 Firewall Edition 4GE Bundle Includes: 4 Gigabit Ethernet interfaces, 2 Management interfaces, 5000 IPsec VPN peers, 2 SSL VPN peers, 3DES/AES license | • 5 Gbps Firewall • 1 Gbps IPsec VPN | ASA5580-20-4GE-K9 | Cisco ASA 5580-20 Firewall Edition 8GE Bundle Includes: 8 Gigabit Ethernet interfaces, 2 Management interfaces, 5000 IPsec VPN peers, 2 SSL VPN peers, 3DES/AES license | • 5 Gbps Firewall • 1 Gbps IPsec VPN | ASA5580-20-8GE-K9 | Cisco ASA 5580-40 Firewall Edition Includes: 2 Management interfaces, 5000 IPsec VPN peers, 2 SSL VPN peers, DES license | • 10 Gbps Firewall • 1 Gbps IPsec VPN | ASA5580-40-BUN-K8 | Cisco ASA 5580-40 Firewall Edition Includes: 2 Management interfaces, 5000 IPsec VPN peers, 2 SSL VPN peers, 3DES/AES license | • 10 Gbps Firewall • 1 Gbps IPsec VPN | ASA5580-40-BUN-K9 | Cisco ASA 5580-40 Firewall Edition 8GE Bundle Includes: 8 Gigabit Ethernet interfaces including short range optics and an LC connector, 2 Management interfaces, 5000 IPsec VPN peers, 2 SSL VPN peers, 3DES/AES license | • 10 Gbps Firewall • 1 Gbps IPsec VPN | ASA5580-40-8GE-K9 | Cisco ASA 5580-40 Firewall Edition 4 x 10GE Bundle Includes: 4 10Gigabit Ethernet interfaces, 2 Management interfaces, 5000 IPsec VPN peers, 2 SSL VPN peers, 3DES/AES license | • 10 Gbps Firewall • 1 Gbps IPsec VPN | ASA5580-40-10GE-K9 | Wireless Access Points Tech Specs * Model: WAP610N * Standards: IEEE 802.3u, 802.11g, 802.11b, 802.11a, draft 802.11n * LEDs: Power, Ethernet, Wi-Fi Protected Setup™, Wireless * Ports: Ethernet, Power * Buttons: Reset, Wi-Fi Protected Setup™ * Cabling Type: Cat 5 * # of Antennas: 3 (internal) * Detachable (y/n): No * Modulations: 802.11a: OFDM/BPSK, QPSK, 16-QAM, 64-QAM
802.11b: CCK/QPSK, BPSK
802.11g: OFDM/BPSK, QPSK, 16-QAM, 64-QAM
802.11n: OFDM/BPSK, QPSK, 16-QAM, 64-QAM * RF Power (EIRP) in dBm: 802.11a: 15dBm (typical) @ 54Mbps
802.11b: 18dBm (typical) @ 11Mbps
802.11g: 16dBm (typical) @ 54Mbps
802.11n: 12dBm (typical) @ 130Mbps (HT20), 270Mbps (HT40) * Receive Sensitivity in dBm: 802.11a: -72dBm (typical) @ 54Mbps
802.11b: -85dBm (typical) @ 11Mbps
802.11g: -73dBm (typical) @ 54Mbps
802.11n: -70dBm (typical) @ MCS15/2.4GHz, -69dBm (typical) @ MCS15/5.0GHz * Antenna Gain in dBi: 1.58 (max) for 2.4 GHz and 1.45 (max) for 5 GHz * Wireless Security: WEP, Wi-Fi Protected Access™ 2 (WPA2), Wireless MAC Filtering * Security key bits: Up to 128-bit Encryption * OS Requirements: Windows XP, Vista, or Vista 64-bit Edition with latest updates (for Setup Wizard only) Key Features * Add a Wireless-N (802.11n draft 2.0) network to an existing wired or wireless router * Complies with IEEE 802.11n draft 2.0 (2.4 GHz and 5 GHz), 802.11g, 802.11b and 802.11a standards * Wi-Fi certiied to ensure interoperability * Industrial-strength wireless encryption WPA2™ to ensure security * Easy-to-use setup wizard * Equipped with one 10/100 auto-crossover (MDI/MDI-X) port Environmental Details * Dimensions 5.71" x 4.17" x 2.05" (145mm x 106mm x 52mm) * Weight 5.61 oz (159 g) * Power 12V, 1A * Certiication FCC, UL/cUL, ICES-003, RSS210, Wi-Fi (IEEE 802.11a/b/g/draft n), PA2™, Wi-Fi Protected Setup™, WMM®, CE * Operating Temp. 0 to 40°C (32 to 104°F) * Storage Temp. -20 to 60°C (-4 to 140°F) * Operating Humidity 10 to 85% Noncondensing * Storage Humidity 5 to 90% Noncondensing Package Contents * Wireless-N Access Point with Dual-Band * Setup Software and User Guide on CD-ROM * Quick Installation Guide * Network Cable * Power Adapter Minimum Requirements * Wired or Wireless Router * Wireless Network Adapter or Wireless Ethernet Bridge (802.11g, 802.11b, 802.11a, or draft 802.11n compliant) * Internet Explorer 6, or Firefox 2 or Higher for Browser-based Coniguration * PC with CD-ROM Drive (for Setup Wizard only) * Setup Wizard requires Windows XP, Vista, or Vista 64-bit Edition with Latest Updates Maximum performance derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage. Performance depends on many factors, conditions and variables, including distance from the access point, volume of network traffic, building materials and construction, operating system used, mix of wireless products used, interference and other adverse conditions. Servers PowerEdge M710 Blade Server Ship Group:
Shipping Material, Individual Blade, PE M710, Systems Docs, OpenManage Kit Primary Processor:
Intel Xeon E5502, 1.86Ghz, 4M Cache, 4.86 GT/s QPI 2nd Processor:
Intel Xeon E5502, 1.86Ghz, 4M Cache, 4.86 GT/s QPI Memory:
4GB Memory (4x1GB), 1066MHz Single Ranked UDIMMs for 2 Processors, Adv ECC Hard Drive Configuration:
Add-in SAS6/IR supporting 1-4 HDs SAS - No RAID Primary Hard Drive:
73GB 10K RPM Serial-Attach SCSI 2.5" Hot Plug Hard Drive 2nd Hard Drive:
73GB 10K RPM Serial-Attach SCSI 2.5" Hot Plug Hard Drive Onboard NIC Type (Fabric A):
Onboard Broadcom 5709 Quad Port 1GbE NIC with TOE Hardware Support Services:
3Yr Basic Hardware Warranty Repair: 5x10 HW-Only, 5x10 NBD Onsite Workstations OptiPlex 740 Minitower:
AMD ATHLON™ 1640B (2.7GHz, 512KB) 7T2751 1 [223-6623] 1 Operating System(s):
Genuine Windows Vista® Home Basic Service Pack 1, With media, 32, ENG VHB31E 1 [420-8464] 11 Security Software:
Trend Micro Internet Security 30-day trial, English TREN30E 1 [410-2395] 37 Warranty & Service:
3 Year Basic Limited Warranty and 3 Year NBD On-Site Service Q3YOS 1 [985-7492][986-3100][989-4307][989-4308][991-2878] 29 Memory:
2GB DDR2 Non-ECC SDRAM,800MHz, (2 DIMM) 2G2N7P 1 [468-3119] 3 Hard Drive:
80GB SATA, 7200 RPM Hard Drive with Data Burst Cache™ 80S 1 [341-3999] 8 Removable Media Storage Devices:
16X DVD-ROM with Cyberlink Power DVD™ DVD16 1 [313-5125][421-0536] 16 Video Card:
Integrated NVIDIA Quadro NVS 210S Graphics INTVID 1 [320-5170] 6 Monitor:
Dell E Series E1910 19in Wide Monitor, VGA/ DVI E1910 1 [320-0939] 5 File System:
NTFS File System for all Operating Systems NTFS 1 [420-3699] 2 Resource CD:
Resource CD and DVD contains Diagnostics and Driver for Dell OptiPlex Syste RCDDVD 1 [310-8762][313-4558] 21 Labels:
Vista Basic Sticker VBASIC 1 [310-8643] 750 Keyboard:
Dell USB Keyboard, No Hot Keys, English, Black EUSB 1 [310-8010] 4 Mouse:
Dell USB 2-Button Optical Mouse with Scroll, Black USBOBLK 1 [310-9627] 12 Lead Free Motherboard:
RoHS Compliant Lead Free Chassis and Motherboard ROHS 1 [464-1131] 15 Backup Power The first UPS with redundancy and scalability within a single chassis. APC Symmetra RM 2kVA Scalable to 6kVA N+1 200V. Engineered to deliver the highest level of business continuity possible, Symmetra's modular, redundant architecture can scale power and run time as demand increases or when higher levels of availability are required. Integrated network manageability provides real time status updates of UPS health and environmental conditions. Hot-swappable, user replaceable power, battery, and intelligence modules enables low MTTR and ease of service. Symmetra's modular design provides redundant power in a single chassis for business-critical applications in server rooms and network closets. Output Output Power Capacity 1400 Watts / 2000 VA Max Configurable Power 4200 Watts / 6000 VA Nominal Output Voltage 230V Output Voltage Note Configurable for 220 : 230 or 240 nominal output voltage Efficiency at Full Load 89% Output Voltage Distortion Less than 5% at full load Output Frequency (sync to mains) 47 - 53 Hz for 50 Hz nominal Crest Factor up to 5 : 1 Waveform Type Sine wave Output Connections Input Nominal Input Voltage 230V Input Frequency 50/60 Hz +/- 5 Hz (auto sensing) Input Connections Hard Wire 3-wire Input voltage range for main operations 155 - 276V Batteries & Runtime Battery Type Maintenance-free sealed Lead-Acid battery with suspended electrolyte : leakproof Included Battery Modules 1 Available Battery Slots 4 Typical recharge time 4 hour(s) Replacement battery cartridge note UPS accepts 1-4 additional battery packs

Battery life

Printers DELL COLOR LASER PRINTER 1320c When sharing the 1320c Network with PCs on your network, Dell provides you with Color Track 2 network printer management software to help manage your color printing costs. Color Track 2 gives you the ability to create up to 50 user or department accounts and monitor print jobs per account. Enable, disable or set limits for color and black & white printing - Color Track 2 lets you control everything remotely using the Dell Printer Web Configuration Tool. At a Glance * Quality: Crisp, fast color laser printing from a compact design * Professional: Sharp, professional laser-quality output * Compact: Stylish, small footprint unit - can fit any home or business environment * Value: Up to 12 color pages per minute print speed, up to16 pages per minute in monochrome with a low printing cost per page (actual print speeds will vary with use). Toner Management * The DellTM Toner Management System makes monitoring and reordering toner easy. * Intelligent software proactively alerts you when your printer is running low on toner * Order from the software when it reminds you and get it delivered right to your front door for no additional charge when you choose the 3-5 day shipping option Network Area Storage It is now possible to share data among many, disparate users in an efficient way. Single Instant Storage (SIS) eliminates data clutter. It identifies duplicate files, saves one copy and replaces other version with pointers to the stored versions. Distributed File System (DFS) gives you simplified, quick access to data stored across wide WAN/LAN environments. DFS Replication makes it possible to eliminate local backup at branch offices and rely on daily backups from the corporate office. This helps keep administrative tasks centralized and easier to manage. File Services Resource Manager (FSRM) is a single-management interface that delivers better managed file services across CIFS/NFS and provides improved control and compliance over files. This is great for audit and planning purposes. Network File System(NFS) allows administrators to consolidate file-sharing resources so both Windows and non-Windows clients can collaborate more effectively. The PowerVaultTM NX3000 supports systems management with remote management through iDRAC and OpenManage 6.1including DMC (Dell Management Console), IT Assistant. Integration that Adapts to Your Environment The Dell PowerVault NX3000 is a network-attached storage system that stores both file and application data(using the optional iSCSI target) at the same time while supporting different operating environments. The PowerVault NX3000 can also be deployed as a SAN gateway in front of a Dell/EMC, EqualLogic PS Series or PowerVault MD Series backend to leverage your existing SAN investment. The PowerVault NX3000 harnesses the performance of the Intel® Xeon® Quad-Core or Dual-Core 5500 series processors resulting in improved file access and throughput. Plus, it has the added bonus of advanced software making data easier to manage and share.

software: Norton AntiVirus Key Technologies * Anti Virus * Anti Spyware * Bot Protection * Norton Pulse Updates * Anti Rootkit * NEW! Norton™ Insight Network * NEW! Norton Download Insight * NEW! Norton File Insight * NEW! Norton Threat Insight * Vulnerability Protection * NEW! SONAR™ 2 Behavioral Protection * NEW! Norton System Insight Norton Ghost Key Features * Centrally manages the deployment of hundreds of Windows or Linux operating systems across an enterprise in a matter of minutes. * Provides rapid and seamless Windows Vista Migration including migration of user data, application settings and Windows configuration settings. * Allows administrators to more effectively manage image and software deployments with hardware and software inventory. * Simplifies image management and reduces the number of images needed for deployment by using DeployAnywhere technology to deploy hardware-independent images. * Preserves files and folders during an image deployment to ensure an original state "onboard" recovery solution for every PC. * Meets the highest industry standards for secure system retirement and data disposal, including Department of Defense standard DoD 5220.22-M. VMware VMware ESXi is the easiest way to get started with virtualization—and it’s free. Consolidate your applications onto fewer servers and start saving money through reduced hardware, power, cooling and administration costs. VMware ESXi has been optimized and tested to run even your most resource intensive applications and databases with minimal performance overhead. With VMware ESXi you can: * Run multiple operating systems on a single server and reduce hardware costs * Run a greener datacenter and reduce your energy cost * Enable easier back-ups and restores for your applications * Run the most resource intensive applications in production Symantec Backup Exec Symantec Backup Exec 2010 delivers reliable backup and recovery designed for your growing business. Easily protect more data while you reduce storage and management costs through integrated deduplication and archiving technology. Reduce business downtime, ensure critical information on virtual or physical systems is always protected and restored in seconds. Key Features * Market leading data protection for physical and virtual server environments from desktop to servers * Integrated and adaptable deduplication (using NetBackup PureDisk technology) * Unified archiving (powered by Enterprise Vault) * First-to-market granular recovery for virtual applications * Patent-pending Granular Recovery Technology (GRT) recovers critical Microsoft application data in seconds * Centralized 3-tier set-up, reporting and patch management * Scalable heterogeneous support through remote Agents and Options. * Continuous data protection for Exchange, file Servers, SQL servers and desktop data * Innovative multi-product integration with market leading technologies Key Benefits * Protect more data while you reduce storage and management costs * Optimizing network utilization across physical and virtual environments with integrated deduplication technology * Easily automate storage and management savings with efficient archiving and backup through a single console * Eliminate redundant backups for Microsoft Exchange, Active Directory, and SQL in a virtual environment with integrated VMware and Hyper-V protection * Restore individual Exchange messages, SharePoint site items or documents, and Active Directory user preferences from a single-pass backup * Easy manage a local or distributed backup environment through a single console * Eliminate your backup window and help ensure recovery point objectives are easily met with continuous backup protection

Active directory: Why use a directory service? A company might want to store their database at convenient and easy to access location. With a directory service, they will get exactly that. A directory service will store any network-based entities such as computers, applications, files, and people. You can also perform various types of tasks on those individual resources such as manage, access, and define them. It also helps administrators by simplify the tasks of maintaining the network. It strengthens security by enforcing complex password requirement, group policies, and promoting interoperability when the network connected via a directory service. Microsoft Window 2003 Active Directory With the growing campuses of TTI, we are recommending Microsoft Window 2003 Active Directory. Window 2003 Active Directory is suited for any organization size from small businesses to global enterprises due a hierarchical, object-oriented fashion to manage resources on the network. Window 2003 Active Directory also has very high fault furtherance and redundancy because of the replication method is very powerful and unique. Accessing resources on the network will be much more efficiently because resources are store in a simplified location. Figure 1.1 shows when Active Directory acts as the center of your network, management would be simplified while maintain a secured access into the network. Figure 1.1 Network Connected via Active Directory (http://i.technet.microsoft.com) Features and Tools from Window 2003 Active Directory There are several tools offer from Window 2003 Active Directory would be very useful and save precious times. One of these tools is Single Logon. With Single Logon, the user only needs to be authenticated with the first logon. Afterward, he or she can access global resources on different servers on the network. Figure 2.1 shows Nathan and Nicolette, both users logon into a domain controller. Once authentication is received, both users can access the File Servers on different domain within the network. Figure 1.2 How Single Logon Works (http://i.technet.microsoft.com/) Another useful feature and also essential for network functionality is the Multi-Master Replication. With the Multi-Master Replication method, all domain controllers share a common database. When one domain makes a change, that change is replicated on all domain controllers on the network. This will increase redundancy and fault tolerance because even if one domain controller goes down, the network can still be operational. When managing an enterprise network could be a tedious task due to endless resources the organization has gathered. Fortunately, with Active Directory, management would be much more organized. When resources are connected via directory, administrators may use the necessary tools such as Active Directory Users and Computer, Domains and Trusts, and Sites and Services. With these tools at hand, administrators could maintain control all resources coming in. This would also promoting ease of access towards those resources since they are in the center on the network. Password Security and Group Policies We have password requirement that must be met for the staffs and the student. That requirement is all passwords must have at least eight characters long, one lower case letter, one capital letter, and one number. This ensures the password would be harder to crack. Group policy will be enforcing rights for individual that have authorization to access resources on the network. The staffs and other employees will have more authorization to access higher level of resources compare to the students. Disaster recovery: Frequent Periodic Data Backups * Daily local backups * Weekly HQ backup Disk Mirroring * Replication of logical disk volumes onto separate physical hard disks in real time * Replicate Servers * Guards against any single point of failure Third Party Relocation Services * Gives organizations access to space at temporary facilities in remote locations

timeline:
Phase I - Design Finalization
The overall design is discussed to make preferential changes as needed. Once complete, final design is sent to accounting for finalization and management approval. Final approves give all companies a chance to fine tune their network to their needs, instead of being stuck with an inflexible network.
Time required: 6 days (dependant on changes).
Phase II - Determine Readiness
Each campus location will need to be inspected to determine the readiness to proceed. The team will identify possible problem areas, unexpected location limitations, and generally familiarize themselves with the locations. Area's that present themselves as possible time delays will be discussed with TTI staff.
Time required: 6 days.
Phase III - Resource Procurement
Necessary hardware and software is ordered, delivery is scheduled, and preparations are made for the arrival of equipment. A secure location will be needed to house equipment until it is needed, and access given to staff on a need only basis.
Time required: 14 days (approximate).
Phase IV - Deployment
As a networking company we have cabling and support hardware in stock, more will be ordered as needed, and as soon as possible. This way structured cabling can begin as soon as possible in preparation for new hardware. The HQ building will be the first to be upgraded, with subsequent campuses being wired and brought online in a tiered fashion. As cabling ends at one building it can begin at the next etc.
Section I - Structured Cabling * Cabling and their support structures are installed as needed * Each connection is tested end to end to ensure proper functionality * Cable is wrapped and labeled to decrease installation and troubleshooting time

Section II - Hardware Installation * Network hardware is installed and prepared for configuration * Desktops and printers are installed and prepared for configuration * Servers are installed and prepared for configuration
Section III - Software Installation * Master ghost image is created * Desktops are imaged * Network OS's are installed
Section IV - Network Configuration * Routers and switches are configured and tested * Servers are configured and tested * Desktops are configured and tested
Section VI - Final Testing and Training * Network functionality is tested to meet requirements * Issues are resolved as needed * School staff is trained on new systems and best practices

Time required: 59 days (approximate).

Phase V - Project Wrap Up
The project is reviewed with key school staff members and WeMakeConnections staff. Issues and solutions used are discussed and documented. Follow up dates are established to ensure healthy network function.
Time required: 2 days (approximate).
Minimum Estimated Time: 71 Days.

Budget:

References: ACL's http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00800a5b9a.shtml Loopbacks http://www.cisco.com/en/US/docs/ios/12_2/interface/configuration/guide/icflogin.html Subnetting http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a00800a67f5.shtml ESXi http://www.vmware.com/products/esxi/ MPLS http://www.shopforbandwidth.com/mpls-vs-frame-relay.php MPLS #2 http://www.networkworld.com/news/2009/122309-how-mpls-works.html NWLink http://technet.microsoft.com/en-us/library/cc976898.aspx Cisco Catalyst 4948 http://www.cisco.com/en/US/products/ps6230/index.html Cisco 7609-s http://www.cisco.com/en/US/products/hw/routers/ps368/index.html Linksys Wireless-N Access Point with Dual-Band $129.99http://www.linksysbycisco.com/US/en/products/WAP610N PowerEdge M710 http://configure.us.dell.com/dellstore/config.aspx?oc=becwhk1&c=us&l=en&s=bsd&cs=04&kc=server-poweredge-m710 Dell OptiPlex 740 Desktop http://configure.us.dell.com/dellstore/config.aspx?c=us&cs=04&l=en&oc=bpdwcfp&s=bsd Category 6 cable http://en.wikipedia.org/wiki/Category_6_cable Cable Prices
cablewholesale.com

Similar Documents

Premium Essay

Capstone

...Capstone Rehearsal Guidelines (Revised 9-27-14) Overview The Capstone Rehearsal is an individual simulation that enables students to compete against computer competitors as a means to sharpen their decision making skills and knowledge of the Capstone simulation. It should be noted that the Rehearsal simulation does not include the optional TQM module that is being used in this course. This is because instructors are not given the option to include TQM functions in the rehearsal simulation. Due to some recent updating of the user interface in the Capstone rehearsal the revised guidelines presented below are being made available. Please note, the way the user screens for the tutorial and rehearsal may appear slightly differently depending on whether you are using the legacy view or the Beta view of Capstone. You should be able to switch from one to the other by clicking a control at the very top of your screen. If you have any questions about switching from legacy to beta view or vice versa, please call Capsim Technical Support directly at 877-477-8787. User Operating Guidelines 1. From the main dashboard screen select button REVIEW THE REHEARSAL TUTORIAL REVIEW THE REHEARSAL TUTORIAL Click on this button 2. At the bottom of the next page you will see a button OPEN THE REHEARSAL TUTORIAL OPEN THE REHEARSAL TUTORIAL...

Words: 494 - Pages: 2

Premium Essay

Capstone

...CAPSTONE QUESTION ETH 125 Nancy Martinez CAPSTONE QUESTION What information about race and ethnicity in the United States has helped you better understand or relate to specific minority groups? Learn many things from participating and reading the discussion questions from my classmates about race and ethnicity. Coming from Hispanic family that has treated Individuals for what they are, not their skin color learned that many races were discrimininated. This class has taught me that the Media has influence by their negative reporting human been race and culture. How could you use this information in your job, community ( e.g. church, school, group, Family), or a potential job. In my church group have talked many of my friends about the different race and culture that we have in our community. Not only we have Hispanics, not only we have a Mixture of Asian groups and other culture. Some of them were amazed that they thought Hispanic was the only ones that lived here in our community. Educating my peers that the website on U.S. Census will inform them race population in their community and just by talking to your neighbors learn about each other. Education plays a key role in today’s society, and become better citizen. If you were to be involved in politics or in the Human...

Words: 313 - Pages: 2

Premium Essay

Capstone

...Etest seminar 2 Question 1 0 out of 0.2 points According to Druskat and Wolff (2001), which of the following statements best describes group emotional intelligence? Selected Answer: A. Thinking and saying what's best for the group rather than what's best for you. Question 2 0 out of 0.2 points According to Druskat and Wolff (2001), what's missing from most research concerning teamwork? Selected Answer: D. Dysfunctional behaviours that provided learning opportunities. Question 3 0.2 out of 0.2 points High performing teams, according to Druskat and Wolff (2001), exhibit high levels of: [Three of the answers are correct.] b. Cooperation. c. Collaboration. d. Participation. Question 4 0.2 out of 0.2 points According to Borgatti (2004), what are some key things a facilitator should do to be successful? [Hint: Read Guide for Working in Teams by Borgatti (2004)] [Three of the answers are correct.] Selected Answers: a. Focus the team on the task. d. Notice when someone is upset. e. Defend individuals from personal attack. Question 5 0.2 out of 0.2 points Which of the following are key steps to working in teams? [Hint: Read Guide for Working in Teams by Borgatti (2004)] [Four of the answers are correct.] Selected Answers: a. Process. c. Getting to know one another. e. Vision...

Words: 1474 - Pages: 6

Premium Essay

Capstone

...Capstone Project Cover Sheet Capstone Proposal Project Name: Upgrading from XP to Windows 7 is important for Security Student Name: Matthew Phelps Degree Program: Security Emphasis Mentor Name: Julianne Evans Table of Contents Capstone Proposal Summary 3 Review of Other Work 7 Project Rationale 10 Systems Analysis and Methodology 10 Goals and Objectives 14 Project Deliverables 21 Project Plan and Timelines 24 Project Development 25 Conclusion 29 References 31 Competency Matrix 32 Project Timeline 34 Additional Deliverables 35 Capstone Report Summary The entire world is becoming increasingly more reliant on data determined technology. Industries cannot ignore the inevitability of a reliable Information Technology network to be successful and to remain competitive with other corporations. Most companies obviously tend to ignore the necessity of maintaining efficient Operating Systems in their networks; the consequences can lead to amplified employee hindrance, diminished customer contentment and eventually reduced revenue. This capstone project emphasis is on a company facing those very problems. Providence Health Services is a large company that operates multiple hospitals across five states, with its headquarters located in Renton, Washington. The health system includes 27 hospitals, more than 35 non-acute facilities...

Words: 8794 - Pages: 36

Premium Essay

Capstone

...related to your simulation environment. The Simulation Round 1 Board Queries Board Queries are web-based quizzes that relate directly to the results of your simulation. As CEO, you will report to the Board of Directors. The Board FRXOG DVN XS WR ÀYH VHWV RI TXHVWLRQV %RDUG 4XHULHV that are based on the results of your previous rounds. )RU H[DPSOH WKH ERDUG PLJKW UHTXLUH \RX WR FRQGXFW a break-even analysis on an increase in production automation or calculate the effect additional ERUURZLQJ ZLOO KDYH RQ \RXU ÀQDQFLDO UDWLRV 7KH questions use standard true-false, multiple choice and essay formats. All the information needed to answer the queries appears within the pages of The Comp-XM Inquirer, an industry newsletter similar to The Capstone® &RXULHU RU 7KH )RXQGDWLRQ® )DVW7UDFN ,Q &RPS;0 you work as an individual, which means all success will be attributed to your efforts. This is your chance to show your strategic vision, tactical abilities and business knowledge. Best of luck! You are the CEO of a new company, the Andrews Corporation. You will make four sets of decisions. Your competition, Baldwin, Chester and Digby, are run by computers. 7KH FRPSXWHUV FUHDWH D OHYHO SOD\LQJ ÀHOG ² all participants go up against a standard set of competitors. As with your previous simulation, the quality of your decisions directly affects the position...

Words: 5568 - Pages: 23

Free Essay

Capstone

...Capstone Most media in today’s society show acts of sexuality that is common and it is expected. Depending on what type of media it is. Some show girls that are flirtatious at a young age and it shows some that may be having sex at a young age as well. A lot of girls in today’s time think that its ok to be that way to try to get older guys attention with the way they dress or how much makeup that they may wear. Media portray some young men that may be pressuring a girl to have sex or it may portray them as sexual predators. The media has also represented gays and lesbians more so than they would years ago. And that is probably because it is accepted more not than it used to be. I think this is a good thing because people who are gay or lesbian don’t have to be ashamed of how they are especially if they are younger. I think some negative effects of the media’s portrayal of sexuality is the message that it’s sending to the younger generation and our future generation. That it’s ok to have sex young, it’s like the media is putting peer pressure on the younger kids along with what they deal with every day in school or at home. It is a greater risk for kids to start having babies early or be at risk of STD’s. They make it seem like sex is everything and being a virgin is like a disease that’s not a good view to have. I can say that the positive side is people meaning gays and lesbian do not have to hide who they are. They may not be accepted everywhere, but they can be comfortable...

Words: 450 - Pages: 2

Free Essay

Capstone

...Title Antonio Valentin CJS/210 October 18, 2012 Diane Boleware Capstone Discussion What is your opinion of probation? What should happen with probation programs in the future? Do you think it would be appropriate to increase restrictions imposed on probation? Explain your rationale My opinion of probation is that I feel probation is driven and controlled by politics. I feel probation is given to certain inmates that fall under a category to lessen the burden of overcrowding prisons or when the courts do not have enough evidence so they have to offer something to make it seem they did something for society. I believe probation programs in future should be changed. Probation programs should be only offered to first time offenders and low crime juveniles. If an individual returns to the courts for committing another crime then the right to probation should be revoked and the individual should serve their complete conviction time. This may deter some individuals from turning into a life of crime. I think it is appropriate to increase restrictions imposed on probation. I believe the probation program is abused by inmates and politics. I believe offenders have learned what offences have the possibility of getting probation and that is why they commit the crime because there is no fear of incarceration. I believe politics play a role on probation depending who is running for some sort of political office. For example one runner might want...

Words: 259 - Pages: 2

Premium Essay

Capstone

...Capstone Checkpoint After doing quite a bit of research I learned that Tallahassee (where I live), we have an art park called Railroad Square Art Park. They host more than “50 studios, galleries, and small shops” (http://railroadsquare.us/). They support many Tallahassee artists as well as small businesses. Most of the month Railroad Square has its own pace and then on the First Friday of every month, puts on an exciting “Gallery Hop”. Railroad Square has 10 acres in downtown Tallahassee, which has been there for about 30 years. Railroad Square continues to bring artists and art-lovers together. I have been unable to find out who supports the Art Park, as well as who contributes. I personally do not contribute to the Art Park seeing as how I was unaware that we even had one. Now that I know I would like to go to the Railroad Square and see the many things that it has to offer. Including the “Gallery Hop “which is supposed to be fun and enjoyable by many different ages as well as cultures. I did however learn that they have some type of Buddhism art styles here and after taking this class am interested in learning more about different kinds of art. Hence the reason that I am intrigued enough to go and visit the Railroad Square Art Park. If it wasn’t for this class I would still think art were just a waste of time and space. Thank you for opening my eyes to the unique forms and artists. you should definitely get up with the art that’s ongoing at Railroad Square. You can...

Words: 333 - Pages: 2

Free Essay

Capstone

...Capstone Paper Brooke Mills New England Institute of Technology NE 265.56 Table of Contents Users and Computers 3 NTFS Permissions 3-4 Global and Domain Local Groups 5 Folder Redirection 6 Website 6 -7 References 8 During this class my group developed a network from the ground up. The company, xyzLiqour.com, was the basis for the network. It is a small organization of 20 users with 4 departments. My portion of the project was the website, Windows domain and user groups, file and folder organization and security. In this paper, I will explain my responsibilities in the project as well as how I configured each task. Figure 1 Figure 1 A user account is an object stored in Active Directory that represents the information that defines a user with access to the network. With this user account a user can access the domain they belong to, or the local computer. All 20 users in the company have a user is and password. In an effort to keep things simple, everyone’s last name was their department. This made it easier for me to keep track of everyone and where they belonged. (See figure 1) There are 4 departments within this company; HR, Tech, Engineering and Sales. Every department has its own folders and sub folders. Creating folders gives each department their own location to store data needed for everyday operations. Attached to every folder are NTFS permissions. NTFS permissions are used to secure resources...

Words: 1234 - Pages: 5

Premium Essay

Capstone

...Project Constraints: Constraint 1: Project needs to move forward quickly and accurately so that it is completed by week 10. Constraint 2: Group members may be absent from time to time hampering the overall effectiveness of that days discussions. Constraint 3: Weekly assignments completed in a timely manner to be shared at the next class or group meeting. Product Dependencies: Project Approach: Stakeholders: The primary stakeholder is Greenway Bank. They are the most affected by this project due to their purchase of four new branch locations. They are participating by providing the location and the proposed budget of 1 million dollars. Each individual branch location is a stakeholder in that they are expecting their networks to run without flaw so that they are able to meet the mission requirements of the parent banking company. They are providing the building location that the work must be completed in. St. Louis will be the new headquarters of the call center. This will require additional resources to be added to their location in order to handle the increased volume. All data communications for the entire business will be handled through this office requiring special equipment to handle the increase in volume that they will see. Requirements: * St. Louis office is to be set up as the new inbound customer service call center. * New York, Seattle, Orlando, Los Angeles are expected to be able to process various banking needs. * St. Louis will be the central...

Words: 681 - Pages: 3

Premium Essay

Capstone

...Creative Image Group Infrastructure Upgrade Information Systems Capstone Dr. Richard Borroughs April 21, 2013 History of Creative Image Group The concept of Creative Image Group began in 1992 while two friends were attending college. One was majoring in business with a focus on marketing and advertising; the other sought a degree in graphic design technology. The graphic designer was learning how to take an art form that was originally done with paper, pens, acetate, tape and glue and apply those same skills using computerized graphics, layers, vectors and pixels. Business work such as accounting, proposals, estimates, invoices and contracts was performed on an IBM compatible machine while all the graphic and design work was performed on a Mac LC II. Internal communications were executed using a 9600 baud modem system. External communications were performed through U.S. mail, telephone calls and a relatively new technology called facsimile transmissions (fax). Primary project output consisted of creating marketing and advertising materials such as logos, corporate branding materials, advertisements and other promotional print driven materials. Like many partnerships, Creative Image owners eventually dissolved the working relationship to pursue other ventures; however the business license was retained for 20 years in order to continue to allow freelance work by the artist. In 2011, the designer re-entered college to support 20 years of freelance...

Words: 1523 - Pages: 7

Premium Essay

Capstone

...Capstone Lockheed Martin Strayer University Maitland campus Business Administration Capstone BUS 499 Prof. David Repp March 11, 2014 Lockheed Martin is an American global security defense, aerospace and advance information Technology Company that was establish in 1912 by Glenn Luther Martin. Martin believed that the future would be in technology and the harvesting of that technology. Lockheed approximately operates 572 facilities nationally and 75 facilities internationally employing about 115,000 people worldwide. Lockheed employees are constantly engaging in research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services. It is apparent that their employees all share the same enthusiasm about the company and the impact that the company has on mankind’s need to explore the technological possibilities in a whole. It’s abundantly clear that Lockheed is focused on the betterment of mankind and securing the information gained from those who which to use it offensively. It almost sounds as if Lockheed could be a character in a superhero comic book. Conversely, they are much more than a character in a superhero comic book and they are much more than just a global security or aerospace company. Lockheed has dedicated their company to helping design the future through technology. They have crossed over from the science fictional realm otherwise known as the realm of impossibilities into the virtual world with...

Words: 2564 - Pages: 11

Premium Essay

Capstone

...Computerized Book Inventory System Golden Success College 1297 V. Rama Ave. Corner Singson St. Guadalupe, Cebu City A Project Implementation Report Presented to The Faculty of Information Technology Golden Success College, Inc. In Partial Fulfillment of the Requirement for Capstone Project Proponents Dave Oficiar Barabat Catherine Rule Benlot Mark Jayson Jarina Cueva Mia Mangyao Labonite Ms. Lenny B. Yamilo Adviser October 2014 Table of Contents Page No. Acknowledgement Report Summary Project Proposal Introduction Rationale of the Study Background of the Study Statement of the Problem General Problem Specific Problem Objectives of the Problem General Objectives Specific Objectives Scope and Limitation Scope of the Study Limitation of the Study Significance of the Study System Design Specification System Design Review of Related Literature Methodology of the Study Theoretical Framework Appendices Appendix A Appendix B Appendix C Curriculum Vitae Glossary Bibliography Acknowledgement The proponents would like to express the deepest appreciation to Ms. Leny B. Yamilo, who has the attitude and the substance of a genius; she continually and convincingly conveyed a spirit of adventure in regard to research and an excitement in regarding to teaching. Without her guidance and persistent help this dissertation would not have been possible. Special thanks also to my co-proponents, who stood and determinedly joined...

Words: 4229 - Pages: 17

Free Essay

Capstone

...CHAPTER 1 THE PROBLEM AND ITS SCOPE INTRODUCTION Rationale of the Study Acquiring information is quasi difficult. Specifically, information that was secluded from general views. To puzzle out this problem, technology becomes an absolute must. In fact it can be used effectively in daily lives. The most essential contribution of technology to society is making the lives of people much easier and helping them achieve more what was previously impossible. The discovery of computers was the great function of modernity to make work easier, faster, and more precise for the humanity. Though technology may differ in various ways, but its uses are likely more advantageous. With technology, people find fast acquisition and availability of information. To have lived in this world for so many years without the use of computers just seem unthinkable or even unbelievable! (Stair and Reynolds, 2007). In today’s generation of rapid development, technology facilitates peoples’ lives and creates more comfort. It has remarkably improved the quality of life. Due to this transitory advancement, youngsters resort on finding information the easiest and most convenient way. It is in this era also that technology has affected society and its surroundings in a number of ways. In many societies, technology has helped develop more advanced economies. As organizations and entrepreneurs continue to operate in an increasingly competitive and global market place, workers in all business areas...

Words: 8842 - Pages: 36

Premium Essay

Capstone

...Capstone Project by Candice Sutterer February 17th, 2014 1. SWOT analyses are important in any business to evaluate their business structures and how to grow by analyzing their strengths, identifying the weaknesses to improve on, opportunities to grow by identifying the strengths and weaknesses, and also to know the threats to the business. Understanding all four of these concepts can easily make or break any business model. It is important to identity all four of these points to truly understand your business and where it stands in the marketplace. Below is a summary of a SWOT. Strengths Strengths are the qualities that enable us to accomplish the organization’s mission. These are the basis on which continued success can be made and continued/sustained. Strengths can be either tangible or intangible. These are what you are well-versed in or what you have expertise in, the traits and qualities your employees possess (individually and as a team) and the distinct features that give your organization its consistency. Strengths are the beneficial aspects of the organization or the capabilities of an organization, which includes human competencies, process capabilities, financial resources, products and services, customer goodwill and brand loyalty. Examples of organizational strengths are huge financial resources, broad product line, no debt, committed employees, etc. Weaknesses Weaknesses are the qualities that prevent us from accomplishing our mission and achieving...

Words: 5275 - Pages: 22