1. Feasibility Report
Page 1 of 12
FEASIBILITY Report
Live Production Network for CISCO
1 February 2014
Anurag Sharma
IT/10/505
2. Feasibility Report
Page 2 of 12
TABLE OF CONTENTS
1.1 Purpose............................................................................................................................4
1.2 Scope................................................................................................................................4
1.3 System Overview............................................................................................................4
1.4 Project References .........................................................................................................5
1.5 Acronyms and Abbreviations .......................................................................................5
1.6 Points of Contact............................................................................................................5
1.6.1 Information ............................................................................................................................................5
1.6.2 Coordination ..........................................................................................................................................5
2.1 Environment...................................................................................................................6
2.1.1 Organizations Involved..........................................................................................................................6
2.1.2 Input/ Output..........................................................................................................................................6
2.1.3 Processing..............................................................................................................................................6
2.1.4 Security..................................................................................................................................................6
2.1.5 System Interaction .................................................................................................................................6
2.1.6 Physical Environment ............................................................................................................................6
2.2 Current Functional Procedures....................................................................................6
2.3 Functional Objectives ....................................................................................................7
2.4 Performance Objectives ................................................................................................7
2.5 Assumptions and Constraints.......................................................................................7
2.6 Methodology...................................................................................................................7
2.7 Evaluation Criteria........................................................................................................7
2.8 Recommendation............................................................................................................7
3.1 Description of Proposed System ...................................................................................1
3.2 Improvements.................................................................................................................1
3.3 Time and Resource Costs ..............................................................................................1
3.4 Impacts............................................................................................................................1
3.4.1 Equipment Impacts ................................................................................................................................1
3.4.2 Software Impacts ...................................................................................................................................1
3.4.3 Organizational Impacts..........................................................................................................................1
3.4.4 Operational Impacts...............................................................................................................................1
3.4.5 Developmental Impacts .........................................................................................................................2
3.4.6 Site or Facility Impacts ..........................................................................................................................2
3.4.7 Security and Privacy Impacts.................................................................................................................2
3.5 Rationale for Recommendations ..................................................................................2
4.0 Description of [Alternative System Name] ..................................................................3
3. Feasibility Report
Page 3 of 12
NOTE TO AUTHOR: Highlighted, italicized text throughout this template is provided solely as
background information to assist you in creating this document. Please delete all such text, as well
as the instructions in each section, prior to submitting this document. ONLY YOUR PROJECT-
SPECIFIC INFORMATION SHOULD APPEAR IN THE FINAL VERSION OF THIS DOCUMENT.
The Feasibility Study is used to provide an analysis of the objectives, requirements, and system concepts
of the proposed system, including justification, schedule, and end products. During this analysis, the
objectives of the system are defined based on the needed functions described previously. Included in
these system objectives are the high-level functional and performance objectives and any assumptions
and constraints. When the system objectives have been identified, the various alternatives for satisfying
those objectives are determined. For each alternative, the costs in time and resources are estimated. A
determination is then made as to the most feasible development alternative.
4. Feasibility Report
Page 4 of 12
1.0 GENERAL INFORMATION
1.1 Purpose
A network consists of 2 or more computers connected together, and they can communicate and share
resources (e.g. information). When we connect two or more than two computers for sharing of resources is
known as networking.
1.2 Scope
Certificate courses in MCSE(Microsoft Certified System Engineer), CCNA(Cisco Certified Network
Associate). Prospects are good in the hardware and networking field, especially if you have a BE(Computer
Engineering)/B.Tech/BCA and the certificate courses mentioned above.
1.3 System Overview
Provide a brief system overview description as a point of reference for the remainder of the document.
In addition, include the following:
īˇ Network Zone
īˇ Windows Server 2012
īˇ System code
īˇ System category
ī Major application: Remote Desktop, Remote Assistance.
ī General support system: Windows 7, Windows Server 2012.
īˇ Operational status
ī creating user account through command prompt.
ī User management and creating peer-to-peer networking work group.
ī providing permissions to various applications.
ī ī ī ī ī ī ī ī ī ī ī ī ī ī ī ī ī ī ī ī ī ī
5. Feasibility Report
Page 5 of 12
1.4 Project References
âĸ Held G., âInternetworking LANs and WANs â Concepts, Techniques and Methodsâ, Wiley, 2nd Ed.,
1998
ī Comment: Good at concepts
âĸ Stallings W., âData and Computer Communicationsâ, Prentice Hall, 7th Ed., 2004
ī Comment: Good at concepts and very up-to-date
âĸ Forouzan B. A, âData Communications and Networkingâ, McGraw-Hill, 2nd Ed., 2000
ī Comment: Many good revision questions at ends of chapters
âĸ Redmond W., âMCSE Training Kit: Networking Essentials Plusâ, Microsoft Press, 2000
ī Comment: Practical oriented
1.5 Acronyms and Abbreviations
Provide a list of the acronyms and abbreviations used in this document and the meaning of each.
1.6 Points of Contact
1.6.1 Information
We are now 7 years old organization having training Centre in Delhi. We have been able to garner
appreciation by the grace of God and by our belief in hard work and commitment. We strongly believe in
achieving new targets and meeting customer expectation with high level of professionalism and transparency.
We believe in delivering new landmarks for students, industry and society. We are small but we are proud of
our contribution. Also we are selective. And our courses are not meant for everyone. Everyone does not
come to us and everyone who comes to us is not selected. We are selective because unlike most of our
competitors, we do not follow an open door policy. We aim at making small yet powerful impact and so we
invite limited number of students and transform them into top professionals. If size of an institution is
important to the future engineers then they might be disappointed. If world-class infrastructure, top-faculty
and becoming a real professional is important to them, we invite them to explore further.
1.6.2 Coordination
Karnal Greenwood Polytechnic
Hi-Tech Institute of Engineering & Technology
MSME
Hardcon Limited
6. Feasibility Report
Page 6 of 12
2.0 MANAGEMENT SUMMARY
2.1 Environment
2.1.1 Organizations Involved
We are committed to give the best & innovative solutions in area of It Training, Communication, &
Technology Consultancy.
To be the leader in the field of IT training & services, as a team, we will achieve aggressive growth. We
enjoy exploring new ways of thinking and problem solving. This can mean devising completely new
solutions, or applying tried and trusted solutions in contexts never contemplated before. Bring together
people, projects, technologies, and environments.
2.1.2 Input/ Output
Input
Output
7. Feasibility Report
Page 7 of 12
2.1.3 Processing
2.1.4 Security
īˇ Changes in Authorization and Access Control in Windows Server 2008 R2
o Changes in User Account Control
o Introducing AppLocker
o Introducing Enhanced Storage Access
o Introducing Managed Service Accounts
īˇ Changes in Identity and Authentication in Windows Server 2008 R2
o Changes in Kerberos Authentication
o Changes in NTLM Authentication
o Introducing Extensions to the Negotiate Authentication Package
o Introducing Online Identity Integration
o Introducing PKU2U in Windows
o Introducing Smart Card Plug and Play
o Introducing TLS v1.2
o Introducing the Restriction of NTLM Authentication
o Introducing the Windows Biometric Service
8. Feasibility Report
Page 8 of 12
2.1.5 System Interaction
Typically, services are console applications that are designed to run unattended without a graphical user
interface (GUI). However, some services may require occasional interaction with a user. This page discusses
the best ways to interact with the user from a service.
Important Services cannot directly interact with a user as of Windows Vista. Therefore, the techniques
mentioned in the section titled Using an Interactive Service should not be used in new code.
2.1.6 Physical Environment
With Microsoft's announcement of Windows Server 2012 versions, licensing, and pricing, I thought it would
be a good idea to take a look at what a typical environment might look like. We talked about this a bit on
Brian and Gabe Live this week, but we haven't written about it or flushed out any thoughts.
2.2 Current Functional Procedure
Describe current functional procedures of any existing system, whether automated or manual.
Specifically, document the major processing and data flow of the current system(s), volume of work
currently processed, costs incurred in operating the current system, skill categories and number of staff
required to operate and maintain the current system, equipment used by the existing system, and any other
factors that are unique to the current system.
9. Feasibility Report
Page 9 of 12
2.3 Functional Objectives
In order to serve the needs of our customers, company associates have extensive knowledge in
communication solution. Developing customized communication requirements.
2.4 Performance Objectives
We are carrying a legacy of excellent teaching mechanism and personal consideration
to students who are not only giving us repetitive business but also enabling us with
Respect of âcan do anything âattitude for us.
2.5 Assumptions and Constraints
Anybody can come up with innovative business case and ideology which can be fit for any business but they
canât get materialized unless and until it get supported with determination, processes, operational and
implementation efficiency.
2.6 Methodology
Based on above our ideology please consider our request for:
1) Long term planning: We emphasis on long term relationship rather than short term
2) Cost: Being a very small start-up and having less operative capital many of our ideas get
focused commercially.
3) Effort: We believe each and every effort is linked with cost.
4) TCO and ROI: We intend to work on quick wins
2.7 Evaluation Criteria
High level of educational standards by which students themselves get placed in leading corporate.
Students Positioned at various leading organizational positions .
2.8 Recommendation
ī§ Management is also interested in these type of courses if it become good
Business case for them Semester examinations were about to start.
10. 3.0 PROPOSED SYSTEM
3.1 Description of Proposed System
We have state of art labs with latest technological equipmentâs.
The CCNA training is conducted using real Cisco equipment. We do not use simulation software. Following
equipment is used for the CCNA training:
âĸ Routers: 1700, 1800, 2500, 2600, 3640, 2800
âĸ Switches: 2950, 3550 3750
âĸ ASA Firewall
âĸ Wireless: AIRONET WNIC, AIRONET LWAP
3.2 Improvements
The training of Computer Hardware, MCITP windows 2008 server, Exchange 2007/2010 is provide by
industry experts having 10 yearsâ experience. Our trainer knows the requirement of industry and train the
student as per industry requirements.
3.3 Time and Resource Costs
Access technical product resourcesâsuch as evaluation guides, virtual labs, training courses, and forumsâ
at the Windows Server 2012 R2 Resource Page.
3.4 Impacts
We are committed to deliver latest technical courses with high level of professionalism.
Computer Hardware & Networking.
Network+
MCITP Windows 2008 enterprise administration.
Exchange server 2010
CCNA
CCNP
CCSA
3.4.1 Equipment Impacts
īˇ Windows Server 2012 R2 Datacenter ISO
īˇ Windows Server 2012 R2 Datacenter VHD
īˇ Windows Server 2012 R2 Datacenter on Windows Azure
3.4.2 Software Impacts
Each server that hosts the different FIM 2010 R2 server-side components has a different software
requirement. This document contains the software requirements for each of the FIM 2010 R2 server-side
components. If you decide to install all the server-side components on one server, you must install the
software requirements for each of the FIM 2010 R2 server-side components on that server.
Page 10 of 12
11. 3.4.3 Organizational Impacts
Each server that hosts the different FIM 2010 R2 server-side components has a different software
requirement. This document contains the software requirements for each of the FIM 2010 R2 server-side
components. If you decide to install all the server-side components on one server, you must install the
software requirements for each of the FIM 2010 R2 server-side components on that server.
Describe the effects on operations, such as:
īˇ User operating procedures
īˇ Operating center procedures
īˇ Operating center/user relationships
īˇ Source data processing
īˇ Data entry procedures
īˇ Data retention requirements, information storage and retrieval procedures (refer to Handbook
2229.1, Records Disposition Scheduling for Automated Systems)
īˇ Output reporting procedures, media, and schedules
īˇ System failure contingencies and recovery procedures
3.4.5 Developmental Impacts
The developmental impacts, such as:
īˇ Specific activities to be performed by the user in support of development of the system
īˇ Resources required to develop databases
īˇ Computer processing resources required to develop and test the new system
īˇ Privacy and security implications
3.4.6 Site or Facility Impacts
Network-zone has a team of well qualified and experienced faculties with international certifications in
ccna, ccnp, ccsp, ccip, ccsa and Microsoft etc.
3.4.7 Security and Privacy Impacts
This information is for IT pros to learn about security technologies and features, including important
changes, for Windows Server 2012 R2, Windows Server 2012, Windows 8.1 and Windows 8.
īˇ Security and Protection
īˇ Secure Windows 8 and 8.1
Page 11 of 12