SlideShare a Scribd company logo
1 of 12
Feasibility Report
Page 1 of 12
FEASIBILITY Report
Live Production Network for CISCO
1 February 2014
Anurag Sharma
IT/10/505
Feasibility Report
Page 2 of 12
TABLE OF CONTENTS
1.1 Purpose............................................................................................................................4
1.2 Scope................................................................................................................................4
1.3 System Overview............................................................................................................4
1.4 Project References .........................................................................................................5
1.5 Acronyms and Abbreviations .......................................................................................5
1.6 Points of Contact............................................................................................................5
1.6.1 Information ............................................................................................................................................5
1.6.2 Coordination ..........................................................................................................................................5
2.1 Environment...................................................................................................................6
2.1.1 Organizations Involved..........................................................................................................................6
2.1.2 Input/ Output..........................................................................................................................................6
2.1.3 Processing..............................................................................................................................................6
2.1.4 Security..................................................................................................................................................6
2.1.5 System Interaction .................................................................................................................................6
2.1.6 Physical Environment ............................................................................................................................6
2.2 Current Functional Procedures....................................................................................6
2.3 Functional Objectives ....................................................................................................7
2.4 Performance Objectives ................................................................................................7
2.5 Assumptions and Constraints.......................................................................................7
2.6 Methodology...................................................................................................................7
2.7 Evaluation Criteria........................................................................................................7
2.8 Recommendation............................................................................................................7
3.1 Description of Proposed System ...................................................................................1
3.2 Improvements.................................................................................................................1
3.3 Time and Resource Costs ..............................................................................................1
3.4 Impacts............................................................................................................................1
3.4.1 Equipment Impacts ................................................................................................................................1
3.4.2 Software Impacts ...................................................................................................................................1
3.4.3 Organizational Impacts..........................................................................................................................1
3.4.4 Operational Impacts...............................................................................................................................1
3.4.5 Developmental Impacts .........................................................................................................................2
3.4.6 Site or Facility Impacts ..........................................................................................................................2
3.4.7 Security and Privacy Impacts.................................................................................................................2
3.5 Rationale for Recommendations ..................................................................................2
4.0 Description of [Alternative System Name] ..................................................................3
Feasibility Report
Page 3 of 12
NOTE TO AUTHOR: Highlighted, italicized text throughout this template is provided solely as
background information to assist you in creating this document. Please delete all such text, as well
as the instructions in each section, prior to submitting this document. ONLY YOUR PROJECT-
SPECIFIC INFORMATION SHOULD APPEAR IN THE FINAL VERSION OF THIS DOCUMENT.
The Feasibility Study is used to provide an analysis of the objectives, requirements, and system concepts
of the proposed system, including justification, schedule, and end products. During this analysis, the
objectives of the system are defined based on the needed functions described previously. Included in
these system objectives are the high-level functional and performance objectives and any assumptions
and constraints. When the system objectives have been identified, the various alternatives for satisfying
those objectives are determined. For each alternative, the costs in time and resources are estimated. A
determination is then made as to the most feasible development alternative.
Feasibility Report
Page 4 of 12
1.0 GENERAL INFORMATION
1.1 Purpose
A network consists of 2 or more computers connected together, and they can communicate and share
resources (e.g. information). When we connect two or more than two computers for sharing of resources is
known as networking.
1.2 Scope
Certificate courses in MCSE(Microsoft Certified System Engineer), CCNA(Cisco Certified Network
Associate). Prospects are good in the hardware and networking field, especially if you have a BE(Computer
Engineering)/B.Tech/BCA and the certificate courses mentioned above.
1.3 System Overview
Provide a brief system overview description as a point of reference for the remainder of the document.
In addition, include the following:
ī‚ˇ Network Zone
ī‚ˇ Windows Server 2012
ī‚ˇ System code
ī‚ˇ System category
ī€­ Major application: Remote Desktop, Remote Assistance.
ī€­ General support system: Windows 7, Windows Server 2012.
ī‚ˇ Operational status
ī€­ creating user account through command prompt.
ī€­ User management and creating peer-to-peer networking work group.
ī€­ providing permissions to various applications.
ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ 
Feasibility Report
Page 5 of 12
1.4 Project References
â€ĸ Held G., “Internetworking LANs and WANs – Concepts, Techniques and Methods”, Wiley, 2nd Ed.,
1998
īƒ˜ Comment: Good at concepts
â€ĸ Stallings W., “Data and Computer Communications”, Prentice Hall, 7th Ed., 2004
īƒ˜ Comment: Good at concepts and very up-to-date
â€ĸ Forouzan B. A, “Data Communications and Networking”, McGraw-Hill, 2nd Ed., 2000
īƒ˜ Comment: Many good revision questions at ends of chapters
â€ĸ Redmond W., “MCSE Training Kit: Networking Essentials Plus”, Microsoft Press, 2000
īƒ˜ Comment: Practical oriented
1.5 Acronyms and Abbreviations
Provide a list of the acronyms and abbreviations used in this document and the meaning of each.
1.6 Points of Contact
1.6.1 Information
We are now 7 years old organization having training Centre in Delhi. We have been able to garner
appreciation by the grace of God and by our belief in hard work and commitment. We strongly believe in
achieving new targets and meeting customer expectation with high level of professionalism and transparency.
We believe in delivering new landmarks for students, industry and society. We are small but we are proud of
our contribution. Also we are selective. And our courses are not meant for everyone. Everyone does not
come to us and everyone who comes to us is not selected. We are selective because unlike most of our
competitors, we do not follow an open door policy. We aim at making small yet powerful impact and so we
invite limited number of students and transform them into top professionals. If size of an institution is
important to the future engineers then they might be disappointed. If world-class infrastructure, top-faculty
and becoming a real professional is important to them, we invite them to explore further.
1.6.2 Coordination
Karnal Greenwood Polytechnic
Hi-Tech Institute of Engineering & Technology
MSME
Hardcon Limited
Feasibility Report
Page 6 of 12
2.0 MANAGEMENT SUMMARY
2.1 Environment
2.1.1 Organizations Involved
We are committed to give the best & innovative solutions in area of It Training, Communication, &
Technology Consultancy.
To be the leader in the field of IT training & services, as a team, we will achieve aggressive growth. We
enjoy exploring new ways of thinking and problem solving. This can mean devising completely new
solutions, or applying tried and trusted solutions in contexts never contemplated before. Bring together
people, projects, technologies, and environments.
2.1.2 Input/ Output
Input
Output
Feasibility Report
Page 7 of 12
2.1.3 Processing
2.1.4 Security
ī‚ˇ Changes in Authorization and Access Control in Windows Server 2008 R2
o Changes in User Account Control
o Introducing AppLocker
o Introducing Enhanced Storage Access
o Introducing Managed Service Accounts
ī‚ˇ Changes in Identity and Authentication in Windows Server 2008 R2
o Changes in Kerberos Authentication
o Changes in NTLM Authentication
o Introducing Extensions to the Negotiate Authentication Package
o Introducing Online Identity Integration
o Introducing PKU2U in Windows
o Introducing Smart Card Plug and Play
o Introducing TLS v1.2
o Introducing the Restriction of NTLM Authentication
o Introducing the Windows Biometric Service
Feasibility Report
Page 8 of 12
2.1.5 System Interaction
Typically, services are console applications that are designed to run unattended without a graphical user
interface (GUI). However, some services may require occasional interaction with a user. This page discusses
the best ways to interact with the user from a service.
Important Services cannot directly interact with a user as of Windows Vista. Therefore, the techniques
mentioned in the section titled Using an Interactive Service should not be used in new code.
2.1.6 Physical Environment
With Microsoft's announcement of Windows Server 2012 versions, licensing, and pricing, I thought it would
be a good idea to take a look at what a typical environment might look like. We talked about this a bit on
Brian and Gabe Live this week, but we haven't written about it or flushed out any thoughts.
2.2 Current Functional Procedure
Describe current functional procedures of any existing system, whether automated or manual.
Specifically, document the major processing and data flow of the current system(s), volume of work
currently processed, costs incurred in operating the current system, skill categories and number of staff
required to operate and maintain the current system, equipment used by the existing system, and any other
factors that are unique to the current system.
Feasibility Report
Page 9 of 12
2.3 Functional Objectives
In order to serve the needs of our customers, company associates have extensive knowledge in
communication solution. Developing customized communication requirements.
2.4 Performance Objectives
We are carrying a legacy of excellent teaching mechanism and personal consideration
to students who are not only giving us repetitive business but also enabling us with
Respect of “can do anything “attitude for us.
2.5 Assumptions and Constraints
Anybody can come up with innovative business case and ideology which can be fit for any business but they
can’t get materialized unless and until it get supported with determination, processes, operational and
implementation efficiency.
2.6 Methodology
Based on above our ideology please consider our request for:
1) Long term planning: We emphasis on long term relationship rather than short term
2) Cost: Being a very small start-up and having less operative capital many of our ideas get
focused commercially.
3) Effort: We believe each and every effort is linked with cost.
4) TCO and ROI: We intend to work on quick wins
2.7 Evaluation Criteria
High level of educational standards by which students themselves get placed in leading corporate.
Students Positioned at various leading organizational positions .
2.8 Recommendation
ī‚§ Management is also interested in these type of courses if it become good
Business case for them Semester examinations were about to start.
3.0 PROPOSED SYSTEM
3.1 Description of Proposed System
We have state of art labs with latest technological equipment’s.
The CCNA training is conducted using real Cisco equipment. We do not use simulation software. Following
equipment is used for the CCNA training:
â€ĸ Routers: 1700, 1800, 2500, 2600, 3640, 2800
â€ĸ Switches: 2950, 3550 3750
â€ĸ ASA Firewall
â€ĸ Wireless: AIRONET WNIC, AIRONET LWAP
3.2 Improvements
The training of Computer Hardware, MCITP windows 2008 server, Exchange 2007/2010 is provide by
industry experts having 10 years’ experience. Our trainer knows the requirement of industry and train the
student as per industry requirements.
3.3 Time and Resource Costs
Access technical product resources—such as evaluation guides, virtual labs, training courses, and forums—
at the Windows Server 2012 R2 Resource Page.
3.4 Impacts
We are committed to deliver latest technical courses with high level of professionalism.
Computer Hardware & Networking.
Network+
MCITP Windows 2008 enterprise administration.
Exchange server 2010
CCNA
CCNP
CCSA
3.4.1 Equipment Impacts
ī‚ˇ Windows Server 2012 R2 Datacenter ISO
ī‚ˇ Windows Server 2012 R2 Datacenter VHD
ī‚ˇ Windows Server 2012 R2 Datacenter on Windows Azure
3.4.2 Software Impacts
Each server that hosts the different FIM 2010 R2 server-side components has a different software
requirement. This document contains the software requirements for each of the FIM 2010 R2 server-side
components. If you decide to install all the server-side components on one server, you must install the
software requirements for each of the FIM 2010 R2 server-side components on that server.
Page 10 of 12
3.4.3 Organizational Impacts
Each server that hosts the different FIM 2010 R2 server-side components has a different software
requirement. This document contains the software requirements for each of the FIM 2010 R2 server-side
components. If you decide to install all the server-side components on one server, you must install the
software requirements for each of the FIM 2010 R2 server-side components on that server.
Describe the effects on operations, such as:
ī‚ˇ User operating procedures
ī‚ˇ Operating center procedures
ī‚ˇ Operating center/user relationships
ī‚ˇ Source data processing
ī‚ˇ Data entry procedures
ī‚ˇ Data retention requirements, information storage and retrieval procedures (refer to Handbook
2229.1, Records Disposition Scheduling for Automated Systems)
ī‚ˇ Output reporting procedures, media, and schedules
ī‚ˇ System failure contingencies and recovery procedures
3.4.5 Developmental Impacts
The developmental impacts, such as:
ī‚ˇ Specific activities to be performed by the user in support of development of the system
ī‚ˇ Resources required to develop databases
ī‚ˇ Computer processing resources required to develop and test the new system
ī‚ˇ Privacy and security implications
3.4.6 Site or Facility Impacts
Network-zone has a team of well qualified and experienced faculties with international certifications in
ccna, ccnp, ccsp, ccip, ccsa and Microsoft etc.
3.4.7 Security and Privacy Impacts
This information is for IT pros to learn about security technologies and features, including important
changes, for Windows Server 2012 R2, Windows Server 2012, Windows 8.1 and Windows 8.
ī‚ˇ Security and Protection
ī‚ˇ Secure Windows 8 and 8.1
Page 11 of 12
Feasibility Report
4.0 Alternative System
N/A
4.0 Description of [Alternative System Name]
N/A
Page 12 of 12

More Related Content

What's hot

76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-networklklokesh
 
Bt 72 computer networks
Bt 72 computer networksBt 72 computer networks
Bt 72 computer networksPadam Thapa
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006Pace IT at Edmonds Community College
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networkingVIJAY TRIPATHI (DSS Basti)
 

What's hot (17)

76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
PACE-IT: Introducing_NAT - N10 006
PACE-IT: Introducing_NAT - N10 006 PACE-IT: Introducing_NAT - N10 006
PACE-IT: Introducing_NAT - N10 006
 
Pace IT - Introduction to IPv6
Pace IT - Introduction to IPv6Pace IT - Introduction to IPv6
Pace IT - Introduction to IPv6
 
Pace IT - Common Ports and Protocols
Pace IT - Common Ports and ProtocolsPace IT - Common Ports and Protocols
Pace IT - Common Ports and Protocols
 
PACE-IT: DHCP in the Network - N10 006
PACE-IT: DHCP in the Network - N10 006 PACE-IT: DHCP in the Network - N10 006
PACE-IT: DHCP in the Network - N10 006
 
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006 PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006
 
PACE-IT: Introduction to IPv4 (part 1) - N10 006
PACE-IT: Introduction to IPv4 (part 1) - N10 006 PACE-IT: Introduction to IPv4 (part 1) - N10 006
PACE-IT: Introduction to IPv4 (part 1) - N10 006
 
PACE-IT: Introduction to IPv6 - N10 006
PACE-IT: Introduction to IPv6 - N10 006 PACE-IT: Introduction to IPv6 - N10 006
PACE-IT: Introduction to IPv6 - N10 006
 
PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006 PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
 
PACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless StandardsPACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless Standards
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
Pace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport LayerPace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport Layer
 
Bt 72 computer networks
Bt 72 computer networksBt 72 computer networks
Bt 72 computer networks
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networking
 

Viewers also liked

Ccna training report
Ccna training reportCcna training report
Ccna training reportTalvinder Singh
 
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...thesakshi12
 
CCNA training report
CCNA training reportCCNA training report
CCNA training reportNikita Kaushal
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
 
Vlan
Vlan Vlan
Vlan sanss40
 

Viewers also liked (7)

CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
ccna project
ccna projectccna project
ccna project
 
Ccna training report
Ccna training reportCcna training report
Ccna training report
 
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
 
CCNA training report
CCNA training reportCCNA training report
CCNA training report
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
Vlan
Vlan Vlan
Vlan
 

Similar to CISCO Live Production Feasibility Report

Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxalanfhall8953
 
245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wan245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wanAshnaWaseem1
 
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysisAn_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysisMicheal Walsh
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
Itsc white paper_v1--it specialist
Itsc white paper_v1--it specialist  Itsc white paper_v1--it specialist
Itsc white paper_v1--it specialist dongphatvnj
 
SUDESHNA DAS_resume
SUDESHNA DAS_resumeSUDESHNA DAS_resume
SUDESHNA DAS_resumeSudeshna Das
 
Mohan_Bedekar_Final
Mohan_Bedekar_FinalMohan_Bedekar_Final
Mohan_Bedekar_FinalMohan Bedekar
 
Print report
Print reportPrint report
Print reportVed Prakash
 
SLeahy - Unit 5 Assignment - IT599-01
SLeahy - Unit 5 Assignment - IT599-01SLeahy - Unit 5 Assignment - IT599-01
SLeahy - Unit 5 Assignment - IT599-01Steven Leahy
 
summer training report on payroll at cmc
summer training report on payroll at cmcsummer training report on payroll at cmc
summer training report on payroll at cmcKaran Gupta
 
India Energy Security Scenarios Calculator - BTech Project
India Energy Security Scenarios Calculator - BTech ProjectIndia Energy Security Scenarios Calculator - BTech Project
India Energy Security Scenarios Calculator - BTech ProjectAditya Gupta
 
PAR Stories 9
PAR Stories 9PAR Stories 9
PAR Stories 9SDuhig
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final DocumentationJennifer Cordes
 
Resume_Informatica_4.3yrs_CSC_MCA_from_NIT_Venkat_CV.v1.0
Resume_Informatica_4.3yrs_CSC_MCA_from_NIT_Venkat_CV.v1.0Resume_Informatica_4.3yrs_CSC_MCA_from_NIT_Venkat_CV.v1.0
Resume_Informatica_4.3yrs_CSC_MCA_from_NIT_Venkat_CV.v1.0Venkat Bathem
 
How UC Pays For Itself
How UC Pays For ItselfHow UC Pays For Itself
How UC Pays For ItselfLanair
 
How Unified Communications Pays For Itself
How Unified Communications Pays For ItselfHow Unified Communications Pays For Itself
How Unified Communications Pays For ItselfKingfin Enterprises Limited
 
GAS MANAGEMENT SYSTEM.pdf
GAS MANAGEMENT SYSTEM.pdfGAS MANAGEMENT SYSTEM.pdf
GAS MANAGEMENT SYSTEM.pdfRmsDagi
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisHitesh Jangid
 

Similar to CISCO Live Production Feasibility Report (20)

Help desk system report
Help desk system reportHelp desk system report
Help desk system report
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docx
 
245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wan245745671 ccna-report-on-project-wan
245745671 ccna-report-on-project-wan
 
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysisAn_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
An_investigation_into_Spring XD_to_study_methods_of_big_data_analysis
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Itsc white paper_v1--it specialist
Itsc white paper_v1--it specialist  Itsc white paper_v1--it specialist
Itsc white paper_v1--it specialist
 
SUDESHNA DAS_resume
SUDESHNA DAS_resumeSUDESHNA DAS_resume
SUDESHNA DAS_resume
 
Final package
Final packageFinal package
Final package
 
Mohan_Bedekar_Final
Mohan_Bedekar_FinalMohan_Bedekar_Final
Mohan_Bedekar_Final
 
Print report
Print reportPrint report
Print report
 
SLeahy - Unit 5 Assignment - IT599-01
SLeahy - Unit 5 Assignment - IT599-01SLeahy - Unit 5 Assignment - IT599-01
SLeahy - Unit 5 Assignment - IT599-01
 
summer training report on payroll at cmc
summer training report on payroll at cmcsummer training report on payroll at cmc
summer training report on payroll at cmc
 
India Energy Security Scenarios Calculator - BTech Project
India Energy Security Scenarios Calculator - BTech ProjectIndia Energy Security Scenarios Calculator - BTech Project
India Energy Security Scenarios Calculator - BTech Project
 
PAR Stories 9
PAR Stories 9PAR Stories 9
PAR Stories 9
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final Documentation
 
Resume_Informatica_4.3yrs_CSC_MCA_from_NIT_Venkat_CV.v1.0
Resume_Informatica_4.3yrs_CSC_MCA_from_NIT_Venkat_CV.v1.0Resume_Informatica_4.3yrs_CSC_MCA_from_NIT_Venkat_CV.v1.0
Resume_Informatica_4.3yrs_CSC_MCA_from_NIT_Venkat_CV.v1.0
 
How UC Pays For Itself
How UC Pays For ItselfHow UC Pays For Itself
How UC Pays For Itself
 
How Unified Communications Pays For Itself
How Unified Communications Pays For ItselfHow Unified Communications Pays For Itself
How Unified Communications Pays For Itself
 
GAS MANAGEMENT SYSTEM.pdf
GAS MANAGEMENT SYSTEM.pdfGAS MANAGEMENT SYSTEM.pdf
GAS MANAGEMENT SYSTEM.pdf
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester Synopsis
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

CISCO Live Production Feasibility Report

  • 1. Feasibility Report Page 1 of 12 FEASIBILITY Report Live Production Network for CISCO 1 February 2014 Anurag Sharma IT/10/505
  • 2. Feasibility Report Page 2 of 12 TABLE OF CONTENTS 1.1 Purpose............................................................................................................................4 1.2 Scope................................................................................................................................4 1.3 System Overview............................................................................................................4 1.4 Project References .........................................................................................................5 1.5 Acronyms and Abbreviations .......................................................................................5 1.6 Points of Contact............................................................................................................5 1.6.1 Information ............................................................................................................................................5 1.6.2 Coordination ..........................................................................................................................................5 2.1 Environment...................................................................................................................6 2.1.1 Organizations Involved..........................................................................................................................6 2.1.2 Input/ Output..........................................................................................................................................6 2.1.3 Processing..............................................................................................................................................6 2.1.4 Security..................................................................................................................................................6 2.1.5 System Interaction .................................................................................................................................6 2.1.6 Physical Environment ............................................................................................................................6 2.2 Current Functional Procedures....................................................................................6 2.3 Functional Objectives ....................................................................................................7 2.4 Performance Objectives ................................................................................................7 2.5 Assumptions and Constraints.......................................................................................7 2.6 Methodology...................................................................................................................7 2.7 Evaluation Criteria........................................................................................................7 2.8 Recommendation............................................................................................................7 3.1 Description of Proposed System ...................................................................................1 3.2 Improvements.................................................................................................................1 3.3 Time and Resource Costs ..............................................................................................1 3.4 Impacts............................................................................................................................1 3.4.1 Equipment Impacts ................................................................................................................................1 3.4.2 Software Impacts ...................................................................................................................................1 3.4.3 Organizational Impacts..........................................................................................................................1 3.4.4 Operational Impacts...............................................................................................................................1 3.4.5 Developmental Impacts .........................................................................................................................2 3.4.6 Site or Facility Impacts ..........................................................................................................................2 3.4.7 Security and Privacy Impacts.................................................................................................................2 3.5 Rationale for Recommendations ..................................................................................2 4.0 Description of [Alternative System Name] ..................................................................3
  • 3. Feasibility Report Page 3 of 12 NOTE TO AUTHOR: Highlighted, italicized text throughout this template is provided solely as background information to assist you in creating this document. Please delete all such text, as well as the instructions in each section, prior to submitting this document. ONLY YOUR PROJECT- SPECIFIC INFORMATION SHOULD APPEAR IN THE FINAL VERSION OF THIS DOCUMENT. The Feasibility Study is used to provide an analysis of the objectives, requirements, and system concepts of the proposed system, including justification, schedule, and end products. During this analysis, the objectives of the system are defined based on the needed functions described previously. Included in these system objectives are the high-level functional and performance objectives and any assumptions and constraints. When the system objectives have been identified, the various alternatives for satisfying those objectives are determined. For each alternative, the costs in time and resources are estimated. A determination is then made as to the most feasible development alternative.
  • 4. Feasibility Report Page 4 of 12 1.0 GENERAL INFORMATION 1.1 Purpose A network consists of 2 or more computers connected together, and they can communicate and share resources (e.g. information). When we connect two or more than two computers for sharing of resources is known as networking. 1.2 Scope Certificate courses in MCSE(Microsoft Certified System Engineer), CCNA(Cisco Certified Network Associate). Prospects are good in the hardware and networking field, especially if you have a BE(Computer Engineering)/B.Tech/BCA and the certificate courses mentioned above. 1.3 System Overview Provide a brief system overview description as a point of reference for the remainder of the document. In addition, include the following: ī‚ˇ Network Zone ī‚ˇ Windows Server 2012 ī‚ˇ System code ī‚ˇ System category ī€­ Major application: Remote Desktop, Remote Assistance. ī€­ General support system: Windows 7, Windows Server 2012. ī‚ˇ Operational status ī€­ creating user account through command prompt. ī€­ User management and creating peer-to-peer networking work group. ī€­ providing permissions to various applications. ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ ī€ 
  • 5. Feasibility Report Page 5 of 12 1.4 Project References â€ĸ Held G., “Internetworking LANs and WANs – Concepts, Techniques and Methods”, Wiley, 2nd Ed., 1998 īƒ˜ Comment: Good at concepts â€ĸ Stallings W., “Data and Computer Communications”, Prentice Hall, 7th Ed., 2004 īƒ˜ Comment: Good at concepts and very up-to-date â€ĸ Forouzan B. A, “Data Communications and Networking”, McGraw-Hill, 2nd Ed., 2000 īƒ˜ Comment: Many good revision questions at ends of chapters â€ĸ Redmond W., “MCSE Training Kit: Networking Essentials Plus”, Microsoft Press, 2000 īƒ˜ Comment: Practical oriented 1.5 Acronyms and Abbreviations Provide a list of the acronyms and abbreviations used in this document and the meaning of each. 1.6 Points of Contact 1.6.1 Information We are now 7 years old organization having training Centre in Delhi. We have been able to garner appreciation by the grace of God and by our belief in hard work and commitment. We strongly believe in achieving new targets and meeting customer expectation with high level of professionalism and transparency. We believe in delivering new landmarks for students, industry and society. We are small but we are proud of our contribution. Also we are selective. And our courses are not meant for everyone. Everyone does not come to us and everyone who comes to us is not selected. We are selective because unlike most of our competitors, we do not follow an open door policy. We aim at making small yet powerful impact and so we invite limited number of students and transform them into top professionals. If size of an institution is important to the future engineers then they might be disappointed. If world-class infrastructure, top-faculty and becoming a real professional is important to them, we invite them to explore further. 1.6.2 Coordination Karnal Greenwood Polytechnic Hi-Tech Institute of Engineering & Technology MSME Hardcon Limited
  • 6. Feasibility Report Page 6 of 12 2.0 MANAGEMENT SUMMARY 2.1 Environment 2.1.1 Organizations Involved We are committed to give the best & innovative solutions in area of It Training, Communication, & Technology Consultancy. To be the leader in the field of IT training & services, as a team, we will achieve aggressive growth. We enjoy exploring new ways of thinking and problem solving. This can mean devising completely new solutions, or applying tried and trusted solutions in contexts never contemplated before. Bring together people, projects, technologies, and environments. 2.1.2 Input/ Output Input Output
  • 7. Feasibility Report Page 7 of 12 2.1.3 Processing 2.1.4 Security ī‚ˇ Changes in Authorization and Access Control in Windows Server 2008 R2 o Changes in User Account Control o Introducing AppLocker o Introducing Enhanced Storage Access o Introducing Managed Service Accounts ī‚ˇ Changes in Identity and Authentication in Windows Server 2008 R2 o Changes in Kerberos Authentication o Changes in NTLM Authentication o Introducing Extensions to the Negotiate Authentication Package o Introducing Online Identity Integration o Introducing PKU2U in Windows o Introducing Smart Card Plug and Play o Introducing TLS v1.2 o Introducing the Restriction of NTLM Authentication o Introducing the Windows Biometric Service
  • 8. Feasibility Report Page 8 of 12 2.1.5 System Interaction Typically, services are console applications that are designed to run unattended without a graphical user interface (GUI). However, some services may require occasional interaction with a user. This page discusses the best ways to interact with the user from a service. Important Services cannot directly interact with a user as of Windows Vista. Therefore, the techniques mentioned in the section titled Using an Interactive Service should not be used in new code. 2.1.6 Physical Environment With Microsoft's announcement of Windows Server 2012 versions, licensing, and pricing, I thought it would be a good idea to take a look at what a typical environment might look like. We talked about this a bit on Brian and Gabe Live this week, but we haven't written about it or flushed out any thoughts. 2.2 Current Functional Procedure Describe current functional procedures of any existing system, whether automated or manual. Specifically, document the major processing and data flow of the current system(s), volume of work currently processed, costs incurred in operating the current system, skill categories and number of staff required to operate and maintain the current system, equipment used by the existing system, and any other factors that are unique to the current system.
  • 9. Feasibility Report Page 9 of 12 2.3 Functional Objectives In order to serve the needs of our customers, company associates have extensive knowledge in communication solution. Developing customized communication requirements. 2.4 Performance Objectives We are carrying a legacy of excellent teaching mechanism and personal consideration to students who are not only giving us repetitive business but also enabling us with Respect of “can do anything “attitude for us. 2.5 Assumptions and Constraints Anybody can come up with innovative business case and ideology which can be fit for any business but they can’t get materialized unless and until it get supported with determination, processes, operational and implementation efficiency. 2.6 Methodology Based on above our ideology please consider our request for: 1) Long term planning: We emphasis on long term relationship rather than short term 2) Cost: Being a very small start-up and having less operative capital many of our ideas get focused commercially. 3) Effort: We believe each and every effort is linked with cost. 4) TCO and ROI: We intend to work on quick wins 2.7 Evaluation Criteria High level of educational standards by which students themselves get placed in leading corporate. Students Positioned at various leading organizational positions . 2.8 Recommendation ī‚§ Management is also interested in these type of courses if it become good Business case for them Semester examinations were about to start.
  • 10. 3.0 PROPOSED SYSTEM 3.1 Description of Proposed System We have state of art labs with latest technological equipment’s. The CCNA training is conducted using real Cisco equipment. We do not use simulation software. Following equipment is used for the CCNA training: â€ĸ Routers: 1700, 1800, 2500, 2600, 3640, 2800 â€ĸ Switches: 2950, 3550 3750 â€ĸ ASA Firewall â€ĸ Wireless: AIRONET WNIC, AIRONET LWAP 3.2 Improvements The training of Computer Hardware, MCITP windows 2008 server, Exchange 2007/2010 is provide by industry experts having 10 years’ experience. Our trainer knows the requirement of industry and train the student as per industry requirements. 3.3 Time and Resource Costs Access technical product resources—such as evaluation guides, virtual labs, training courses, and forums— at the Windows Server 2012 R2 Resource Page. 3.4 Impacts We are committed to deliver latest technical courses with high level of professionalism. Computer Hardware & Networking. Network+ MCITP Windows 2008 enterprise administration. Exchange server 2010 CCNA CCNP CCSA 3.4.1 Equipment Impacts ī‚ˇ Windows Server 2012 R2 Datacenter ISO ī‚ˇ Windows Server 2012 R2 Datacenter VHD ī‚ˇ Windows Server 2012 R2 Datacenter on Windows Azure 3.4.2 Software Impacts Each server that hosts the different FIM 2010 R2 server-side components has a different software requirement. This document contains the software requirements for each of the FIM 2010 R2 server-side components. If you decide to install all the server-side components on one server, you must install the software requirements for each of the FIM 2010 R2 server-side components on that server. Page 10 of 12
  • 11. 3.4.3 Organizational Impacts Each server that hosts the different FIM 2010 R2 server-side components has a different software requirement. This document contains the software requirements for each of the FIM 2010 R2 server-side components. If you decide to install all the server-side components on one server, you must install the software requirements for each of the FIM 2010 R2 server-side components on that server. Describe the effects on operations, such as: ī‚ˇ User operating procedures ī‚ˇ Operating center procedures ī‚ˇ Operating center/user relationships ī‚ˇ Source data processing ī‚ˇ Data entry procedures ī‚ˇ Data retention requirements, information storage and retrieval procedures (refer to Handbook 2229.1, Records Disposition Scheduling for Automated Systems) ī‚ˇ Output reporting procedures, media, and schedules ī‚ˇ System failure contingencies and recovery procedures 3.4.5 Developmental Impacts The developmental impacts, such as: ī‚ˇ Specific activities to be performed by the user in support of development of the system ī‚ˇ Resources required to develop databases ī‚ˇ Computer processing resources required to develop and test the new system ī‚ˇ Privacy and security implications 3.4.6 Site or Facility Impacts Network-zone has a team of well qualified and experienced faculties with international certifications in ccna, ccnp, ccsp, ccip, ccsa and Microsoft etc. 3.4.7 Security and Privacy Impacts This information is for IT pros to learn about security technologies and features, including important changes, for Windows Server 2012 R2, Windows Server 2012, Windows 8.1 and Windows 8. ī‚ˇ Security and Protection ī‚ˇ Secure Windows 8 and 8.1 Page 11 of 12
  • 12. Feasibility Report 4.0 Alternative System N/A 4.0 Description of [Alternative System Name] N/A Page 12 of 12