Free Essay

Netw 206 Assignment 1

In: Computers and Technology

Submitted By jonny1989
Words 1080
Pages 5
Support for High-Definition IP Cameras
DeVry University
NETW206: Introduction to Switching
Submitted to: Yves Gollo
Professor: Yves Gollo
Date: 9-14-13

Understanding of the purpose of the operations at hand is key to the function of the change in the university. The main purpose of the case study presented is to present the task of implementing a high definition security video surveillance system solution that can replace and magnify what already exists at DeVry University today. As mentioned, DeVry requests a high definition security system that is to require the following features: 1. PoE (Power over Ethernet), avoid any additional wiring, the mounting of power bricks or using power injectors. Conserve and confine; 2. Segment camera IP traffic from the existing network for security purposes; 3. Provide sufficient bandwidth for full HD support; 4. Support a minimum of 150 cameras; 5. Comply with the cisco hierarchical design model; 6. Integrate 1Gb uplinks; and 7. Minimize rack space.
During this process, DeVry has not yet purposed a budget for this action taken for this project but as any company would, DeVry would like the most cost efficient method possible.

With such a request as this, it seems almost impossible to find such a camera that can withstand everything. Almost as if it was an indestructible camera seeming almost impossible until there was some research conducted. The discovery of the D-Link DCS-7513 Full HD Day & Night WDR Outdoor Bullet Camera is a high-definition professional surveillance camera developed to be versatile to any small, medium or large establishment. This camera uses a high sensitivity 2 megapixel progressive scan CMOS sensor to deliver high quality video within a wide range of lighting conditions. The DCS-7513 has an integrated mechanical IR filter and infrared LEDs t allow the viewing and recording of video even in complete darkness, up to 90 feet away from where the camera is stationed. This camera is to be a good combination to what the University is requesting and then more. The camera’s capability seems endless but it doesn’t stop there with the capability to rotate, zoom with its high definition imagining makes it a lot harder for the criminal mind to tamper with such a camera.

The camera being as compact as it is being its only 135mm by 79.5mm by 65 mm (LxWxH) makes the camera more versatile for rotation and high definition making the camera visuals more vivid to the human eye being the picture clearer than ever before. The DCS-7513 can withstand many differences in weather conditions being such that indoors can withhold the temps of 32-122*F/ 0-50*C and as for outdoor temps of -40-158*F/ -40-70*C. The camera has a look and feel of aluminum but as light as 1.2 lb. / 0.54 kg. With the shutter speed of H.264, MJPEG and the audio compression being AAC (encoding only), G.711 A-Law, G.711 U-Law gives this camera superior visual as well as audio so the administrator will always know what is going on and where by the identifying precise motion sensor activity.

The introduction of the Catalyst 2960-X Series switches effectively allows the customers to address the growth needs of their business or establishment, with all new intelligent services. The innovation of the Catalyst 2960-X are highly differentiated when it comes to comparable offerings, and will no doubt increase the competitive intensity in the market in order to support the DCS-7513 safely and efficiently.

The New Original Cisco, 24 Port, Fiber Switch WS-C2960X-48FPS-L Catalyst Base has the power (PoE) of 740W and the uplinks of 4 SFP+ with the function of POE, QoS and VLAN Support. The 2960-X Series are fixed-configuration, stackable Gb Ethernet switches that provide enterprise-class access for campus and branch applications. Designed for operational simplicity to lower total cost of ownership, they enable scalable, secure and energy-efficient business operations with intelligent services and a range of advanced Cisco IOS Software features.

The Cisco Catalyst 2960-X switches feature a 24-48 Gigabit Ethernet ports with line-rate forwarding performance with a Gigabit small form-factor pluggable (SFP) or 10G SFP+ uplinks. USB and Ethernet management interfaces for simplified operations while applications visibly and capacity planning with integrated NetFlow-Lite with LAN Bane and LAN Lite Cisco IOS. Catalyst 2960-X switches include a single fixed power supply and are available with either the Cisco IOS LAN Base or the LAN Lite feature set. Catalyst 2960-X switch models includes a field-replaceable modular power supply and can accommodate a second power supply. All Catalyst 2960-X Series Switches use a single Universal Cisco IOS Software Image for all SKUs.

The Cisco Catalyst will be segmented to have all the HD camera on the Vlan 4. This will help with security for the cameras and stop unnecessary traffic to computers. Any other computers or printers will be set to Vlan 4 to keep all the computers together. We decided to have all of are servers to be set to Vlan 10 to help minimize the security threat to then since the computers on are network are on Vlan 5. This will keep all the systems on the network from broadcasting in to other networks and bogging down the system.

In the network design we decided to have redundancy as a priority. This is one of the most important things to think about when you are making a network. We estimated about a 190 device on this network so we have four 48 port switches. The switches will have to backbones from the disputation center 1&2 to ever switch. This allows for a center to go down and have no down time in your network keeping a 24/7 running network. With this in place not only will it be fault tolerant, but you will have a balanced network if one side is being used to much the switch can go to a other center where it may have less traffic.

References
Design: www.cisco.com/en/US/docs/solutions/Enterprise/Campus/HA_campus_DG/hacampusdg.html
Camera: www.cisco.com/en/US/prod/collateral/vpndevc/ps6918/ps9692/ps9716/data_sheet_c78-492032.html
Video Bandwidth: http://www.cisco.com/en/US/docs/solutions/Enterprise/Video/IPVS/IPVS_DG/IPVSchap4.html Switch information:
http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps12995/data_sheet_c78-728232.html

Similar Documents

Premium Essay

Earth

...Affordable Care Act and, “It gives states just enough power over insurance marketplaces and the Medicaid expansion to... [continues] Read full essay Cite This Essay APA (2013, 07). Netw206 W1 Assignment 1. StudyMode.com. Retrieved 07, 2013, from http://www.studymode.com/essays/Netw206-W1-Assignment-1-1826501.html MLA MLA 7 CHICAGO Welcome StudyMode.com is the web's leading learning tool. We inspire millions of students every day with over 1,600,000 model essays and papers, AP notes and book notes. Related Essays Netw206 W1 Assignment ...Support for High-Definition IP Cameras Grading Rubric Categories | Points/Grading Content |... 5 Pages September 2013 Netw206 W1 Assignment ...Support for High-Definition IP Cameras DeVry University NETW206: Introduction to Switching... 4 Pages July 2013 Discussion ...Dana Owens Professor Molly Sparhawk Week 1 – W1: Assignment 2: Discussion Question 2 July 28,... 2 Pages July 2012 Marketing Strategy Essay ...W1 Assignment: Marketing Strategy Select a product or service that you have purchased recently... 3 Pages March 2013 Netw206 Assignment 1 ...DeVry University Security System 12 May 2013 NETW 206 Introduction The purpose of this case... 3 Pages June 2013...

Words: 509 - Pages: 3

Premium Essay

Cognitive Radio Network

...FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CHAPTER I. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1 Background . . . . . . . . . . . . 1.1.1 Spectrum Sensing . . . 1.1.2 Spectrum Management 1.1.3 Spectrum Mobility . . 1.1.4 Spectrum Sharing . . . 1.1.5 Network Coding . . . . Assumption and Limitation . . . Objectives . . . . . . . . . . . . Organization of Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii iii iv v vi ix 1 1 1 2 3 3 4 5 6 6 8 8 9 10 11 12 13 14 1.2 1.3 1.4 II. Literature Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1 2.2 2.3 2.4 2.5 2.6 2.7 Wireless Communication . . Cognitive Radio Network . . OFDM . . . . . . . . . . . . Advantages of OFDM . . . . Disadvantages of OFDM . . . Characteristics and Principles OFDM in CRN . . . . . . . . vii . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . of Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.8 2.9 Cooperative Cognitive Networks . . . . . . . . . . . . . . . Analysis of Network Coding . . . . . . . . . . . . . . . . . .......

Words: 9257 - Pages: 38

Premium Essay

Ip Spoof

...Categories and Subject Descriptors: C.2.0 [Computer-Communication Networks]: General— Security and protection General Terms: Performance, Security Additional Key Words and Phrases: IP spoofing, spoofing defense, spoofing packet, packet filtering ACM Reference Format: Ehrenkranz, T. and Li, J. 2009. On the state of IP spoofing defense. ACM Trans. Internet Technol. 9, 2, Article 6 (May 2009), 29 pages. DOI = 10.1145/1516539.1516541 http://doi.acm.org/10.1145/1516539.1516541 1. INTRODUCTION In today’s Internet, attackers can forge the source address of IP packets to both maintain their anonymity and redirect the blame for attacks. When attackers inject packets with spoofed source addresses into the Internet, routers forward those packets to their destination just like any other packet—often without checking the validity of the packets’ source addresses. These spoofing packets1 consume network bandwidth en route to their destinations, and are often part of some malicious activity, such as a DDoS attack. Unfortunately, routers on 1 In this article we use spoofing packets instead of spoofed packets as such a packet is from an attacker, and it does harm to the network instead of being a victim. Authors’ address: T. Ehrenkranz and J. Li, University of Oregon, Computer and Information Science, Eugene, OR 97403-1202; email: {tehrenkr,lijun}@cs.uoregon.edu. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee......

Words: 14721 - Pages: 59

Premium Essay

Khan

...This text was adapted by The Saylor Foundation under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License without attribution as requested by the work’s original creator or licensee. Saylor URL: http://www.saylor.org/books Saylor.org 1 Preface Competing books are focused on the academic part of HRM, which is necessary in a university or college setting. However, the goal with this book is not only to provide the necessary academic background information but also to present the material with a practitioner’s focus on both large and small businesses. While the writing style is clear and focused, we don’t feel jargon and ten-dollar words are necessary to making a good textbook. Clear and concise language makes the book interesting and understandable (not to mention more fun to read) to the future HRM professional and manager alike. It is highly likely that anyone in business will have to take on an HRM role at some point in their careers. For example, should you decide to start your own business, many of the topics discussed will apply to your business. This is the goal of this book; it is useful enough for the HRM professional, but the information presented is also applicable to managers, supervisors, and entrepreneurs. Besides these differences, other key differences include the following:   This book utilizes a technology focus and shows how HRM activities can be leveraged using technology. We have also included a chapter on communication and......

Words: 157258 - Pages: 630

Premium Essay

Mergers and Acquisitions Basics

...and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein. Library of Congress Cataloging-in-Publication Data DePamphilis, Donald M.   Mergers and acquisitions basics: all you need to know/Donald DePamphilis.    p. cm.   Includes bibliographical references.   ISBN 978-0-12-374948-2   Consolidation and merger of corporations—United States—Management. 1. 2. Corporate reorganizations—United States—Management. 3. Organizational change— United States—Management.  I. Title.   HG4028.M4D47 2011   658. 1620973—dc22 2010023983 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. For information on all Academic Press publications visit our website at www.elsevierdirect.com Printed in The United States of America 10  11  12  13  9  8  7  6  5  4  3  2  1 Preface Why We Need to Understand the Role of Mergers and Acquisitions in Today’s World Mergers, acquisitions, business alliances, and corporate restructuring activities are increasingly commonplace in both developed and emerging economies. Given the frequency with which such activities occur, it is critical for business people and officials at all levels of government to have a basic understanding of why and how they take place and how they can affect economic growth. A lack of......

Words: 105288 - Pages: 422

Free Essay

Bush

...FAMILY OF SECRETS The Bush Dynasty, America’s Invisible Government, and the Hidden History of the Last Fifty Years RUSS BAKER Contents Foreword by James Moore 1. How Did Bush Happen? 2. Poppy’s Secret 3. Viva Zapata 4. Where Was Poppy? 5. Oswald’s Friend 6. The Hit 7. After Camelot 8. Wings for W. 9. The Nixonian Bushes 10. Downing Nixon, Part I: The Setup 11. Downing Nixon, Part II: The Execution 12. In from the Cold 13. Poppy’s Proxy and the Saudis 14. Poppy’s Web 15. The Handoff 16. The Quacking Duck 17. Playing Hardball 18. Meet the Help 19. The Conversion 20. The Skeleton in W.’s Closet 21. Shock and . . . Oil? 22. Deflection for Reelection 23. Domestic Disturbance 24. Conclusion Afterword Author’s Note Acknowledgments Notes Foreword When a governor or any state official seeks elective national office, his (or her) reputation and what the country knows about the candidate’s background is initially determined by the work of local and regional media. Generally, those journalists do a competent job of reporting on the prospect’s record. In the case of Governor George W. Bush, Texas reporters had written numerous stories about his failed businesses in the oil patch, the dubious land grab and questionable funding behind a new stadium for Bush’s baseball team, the Texas Rangers, and his various political contradictions and hypocrisies while serving in Austin. I was one of those Texas journalists. I spent about a......

Words: 249168 - Pages: 997