You are on page 1of 74

FORM 5A4

DESCRITION OF APPROACH, METHODOLOGY AND


WORK PLAN FOR PERFORMING THE ASSIGNMENT

1. TECHNICAL APPROACH AND METHODOLOGY

1.1 Understanding of the Assignment

RAJUK allocates government plots/flats in the metropolis of Dhaka to public since


nineteen hundred sixties. An allottee may transfer the plot/flat to other through
RAJUK. One plot/flat, over the period, may experience several transfers. Processing
each allotment, transfer, mutation etc. involves a good number of documents and
pages. In addition, RAJUK receives payment for a flat or a plot in installments. All
such documents of allotment, transfer, mutation, payment etc. of a flat or a plot are
maintained in a separate file. These documents are required for subsequent
business processing as reference.

The volume of documents of a file increases with the number of processing. It


sometime is cumbersome and time consuming to search & get a particular
document.

On the other hand, the valuable documents may get eroded with time and as the
number of processing increases.

The document may also get lost.

To avoid such inconveniencies of searching file documents and the risk of damage
or loss of valuable documents, RAJUK undertakes this project of computerized
digital archival of files of Gulshan, Banani and Baridhara model town.

1.2 Objectives & Benefits of the Project

Objective of the project is to digital archiving of files of plots/flats of Gulshan, Banani


and Baridhara model town to fetch the benefits as,

• Reduce document searching time and thus Increase the business processing
efficiency of RAJUK
Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

• Save documents from damage. With proper management, digitized


documents may last for centuries

• Save documents from loss. Adequate security can be assured through


appropriate database management

• Eventually eliminate record room space requirement (if the system is


upgraded to an almost paperless office through full business automation, in
future)

• Allow online access to the archived documents from local as well as remote
office(s), thus increase the business processing efficiency

1.3 Scope of Services

Scope of services of the consultant shall be –

i. Customized Web Enabled Application Software Development:


Develop a Customized Web Enabled Application Software for digital
archival/management of the files information (scanned pages &
entered data) of estate department

ii. Systems Design: Design systems architecture and prepare


specification of hardware, software, accessories etc.

iii. Scanning & Data Entry: Scan pages & maps/plans of the files and
enter files’ information, such as, file reference, plot/flat information,
allotment/transfer date, allotee/transferee information, mutation
information, payment information etc. of Gulshan, Banani and
Baridhara model town of estate department:

- Files: - 3,000 nos.

- File contents: Legal or less size page - 9,00,000 nos.

A0 size map or plan - 6,000 nos.

- Per file contents (ave): Legal or less size page - 300 nos.

A0 size map or plan - 2 nos.

ddc form 5A4 - 2


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Each of these pages shall be scanned and uploaded in the


Customized Web Enabled Application Software. Data entry of
information of the files shall be done, around 250 characters per file.

iv. Systems Implementation: Implement systems and migrate digitized


data of the files

v. Training / Transfer of Technology: Impart training to relevant


RAJUK personnel on application software operation, administration &
maintenance, and transfer technology on application software design
& development, and digitization of records

vi. Warranty & Maintenance Service

2. APPROACH AND METHODOLOGY

2.1 Customized Web Enabled Application Software Development and


Systems Design

2.1.1 GENERAL APPROACH_ CUSTOMIZED WEB ENABLED APPLICATION


SOFTWARE DEVELOPMENT AND SYSTEMS DESIGN

Consultant’s Project Office: The consultant has a well established ICT lab at its
head quarter at 47 Mohakhali commercial area equipped with computers, servers,
network, peripherals and industry standard software. The consultant proposes to
establish the consultant’s project office for the assignment in the said ICT lab
wherefrom management, design and development of systems will be carried out.

The consultant offers to provide 2000 sft of furnished office space with utility services
for the project.

Logistics: Consultant would provide the necessary logistics needed for


management, design and development of systems. The following logistics will be
provided for the project period on rental basis:

Computer (Server) with UPS 1 no

Computer (PC) with UPS 12 nos.

ddc form 5A4 - 3


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Laser Printer with stabilizer 1 no.

Network, software etc. service 1 lot

Telecommunication, fax, e-mail etc. 1 lot

Office consumables 1 lot

Transport ( microbus) 1 no.

Support Staff: The following support office staff will be provided:

Office Assistant 1 no.

Peon 1 no.

2.1.2 METHODOLOGY_ CUSTOMIZED WEB ENABLED APPLICATION


SOFTWARE DEVELOPMENT AND SYSTEMS DESIGN

It is like a development life cycle comprising the following steps:

1. System Analysis and Need Assessment

2. Design and Develop the Database

3. Design and Develop Business Logic

4. Design and Develop Data Input Forms

5. Sample Data Entry

6. Design and Develop Reports

7. Generate Sample Reports

8. Software Quality Assurance Testing ( SQAT)

9. User Acceptance Testing (UAT)

10. Deployment/Hosting of the Application

System Analysis and Need Assessment: This is the vital step of the development
life cycle. At this stage the user requirements will be identified and listed, and the
system requirements will be derived based on the user requirements. The objective
of this phase is to identify business need, establish the type of problem, and define

ddc form 5A4 - 4


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

client quality requirement, resource and products of any present information system,
present reporting system and the constraint of the system. Consultant will interview
all concerned persons. All information will be recorded, analyzed to assess the
requirements.

The scope of the project is to design & develop a Customized Web Enabled
Application Software for digital archival/management of the files information
(scanned pages & entered data) of plots/flats of Gulshan, Banani and Baridhara
model towns of the estate department.

During this requirement assessment stage, the consultant shall study & analyze the
files to identity database management fields required to generate custom reports,
call and view/print any stored scanned document. etc. Examples of such fields (but
not exhaustive) are presented hereunder:

Field Definition Example


Model Town Name Gulshan, Banani, Uttara

File Id. File No.

Plot Id. Plot No.

Plot size (decimal)

Plot price (Tk.)

Flat Id. Flat No.

Flat Size (sft)

Flat Price (Tk)

Record Documents belonging to a Allotment, Transfer,


business process Mutation, etc.

Record Date A single date specific to the


record

Document Part of a Record having Allotment letter, Application


specific name letter, Declaration, Flat
plan, Site map etc.
Allottee Name

Allottee Father’s Name

ddc form 5A4 - 5


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Field Definition Example

Allottee Address Vill/House No., Road,


Union/Ward,
Upozila/Thana, District

Transferee Name

Transferee Father’s
Name

Transferee Address Vill/House No., Road,


Union/Ward,
Upozila/Thana, District

Etc.

The result of this phase is a requirement specification document, which documents


what the analysis has produced. The purpose of this document is twofold: on the one
hand, it must be analyzed and confirmed by the clients in order to verify whether it
captures all of the client’s expectations; on the other hand, it is used by the software
engineers to develop a solution that meets the requirements.

Another deliverable of this phase is the definition of the system test plan. In fact,
during system testing, the system is expected to be tested against its requirements.
Therefore, the way this will eventually be done may be agreed upon with the clients
at this stage and documented along with the requirements specification document.

This phase is the most critical one, because the other phases depend on it. If there is
any mistake in this phase, it will continue and increase in the remaining phases
geometrically. So, it is the key point to success of the project. This phase will cover
the following tasks:

1. Feasibility study of using the customized software (to be developed) in


terms of data needs, boosting up the previous manual activities and lowering
the official cost in the long run.

2. Analyzing the existing manual and/or computer systems that are used,
or to be used for the management.

3. Analyze the existing data to encounter all reports and data storage that
are necessary.

ddc form 5A4 - 6


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

4. Study of the user and system requirements by conducting meetings with


the client’s personnel, and collecting the formats of data storage and
reporting as far as possible. Whenever any data is to be stored or reported
that has no pre-defined format, new convenient formats will be
recommended.

5. Observing the client activities (official systems), and reviewing the


organizational policies and procedures to extract the business
processes(algorithm of functions) etc.

Design & Develop the Database: Here a relational database management system
(RDBMS) is a must. So proper design and development of RDBMS can ensure the
feasibility study as it is the storehouse of information.

First of all, flow of data through the system will be studied by Data Flow Diagram
considering where and how data is originated, processed and where it goes. Then
key data codification is designed in such a fashion that it can be handled maintaining
proper integrity, security and speed as it is the part and parcel in designing database.
Database design can be performed manually or by some CASE tools (Computer
Aided Software Engineering) like Oracle Designer etc. Then design format will be
implemented and developed using Oracle 10g Database Server. It provides an
unbounded, easy to use, scalable and manageable solution for high quality
heterogeneous database. It also delivers performance, scalability, availability
necessary to support very large Data Base (VLDB) and mission critical application in
a concurrent multi user environment. Here in this phase ‘Normalization’ processes
are to be applied for elimination of redundant and repeating data using Entity
Relationship Diagram (ERD). This phase will cover the following tasks:

1. Collect the user needs and data formats

2. Derive the flow of information through DFG (Data Flow Diagram)

3. Identifying the repeating and non-repeating data

4. Identifying the data-groups with keys and relationships

5. Applying the Normalization Formulas to extract a Relational Database


design

6. Design ERD (Entity Relationship Diagram)

ddc form 5A4 - 7


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

7. Checking the design and according to the design develop the database.

To make zero data loss due to database server hardware failure, Oracle Clustering
RAC (Real Application Clustering) is one of the best tools to be used.

Design and Develop the Business Logic : During the designing period, proper
data validation, hierarchical security, privileges and access over modules should be
maintained.

Design & Develop Data Input Forms: The data entry forms are user interfaces,
which will be used for adding, modifying, viewing and deleting data or information.
These forms are designed and developed according to the need assessments and
management policies of the client. In some case reengineering of input/output forms
for computerization, some time, is needed.

Sample Data Entry: After developing the input interface some sample data are
necessary to test them and test the reports that are to be developed in the latter
phase. The data should be inputted during the Forms development. It will serve both
testing of interfaces and loading of actual data.

Design & Develop Reports: Charts are the user interfaces that the user will use to
know information and/or print it. For testing them sample data are necessary that will
come from the prior phase. The reports will be designed and developed according to
the Need Assessment. User requirements for reporting will be mapped accordingly.
All reports and charts will be generic and dynamic having multiple options so that
one report can be viewed in various formats. Report writer facilities are to be
incorporated in the software so that custom reports can be generated.

Generate Sample Reports: Sample reports can be generated by executing and


printing the report-interfaces, already developed in the prior phase, for submission to
the client for feedback and/or approval.

Testing & Debugging: In this phase the problems with the software developed
and/or its components are identified and removed using five test levels. These levels
are 1. Unit Test

2. System Test

3. Peakload Test

4. Performance Test

ddc form 5A4 - 8


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

5. Procedure Test

6. Software Q A Testing

Unit Test: Unit test goes throughout the development and also at the end of coding.
It tests all the separate progress to find weather they are performing accurately or
not.

System Test: System testing does not only test the software but it also tests the
integration of each module of the system. Programmers test the whole system with
different data; they check all List of Values (LOV), data integrity from other module.

Peak load Test: In this test the system is strained to it’s maximum capability by
keeping all the terminals of the system active at the same time.

Performance Test: In this test the response time of inquiry is tested when the
system is fully loaded with operating data. Generally the length of the time systems
used by the system to process, transaction data is judged by the performance test.

Procedure Test: The clarity of documentation on operation and use of system by


having users do exactly what manuals request is tested in this phase.

Software Quality Assurance Testing (SQAT): Software testing may be viewed as an


important part of the software quality assurance (SQA) process. In SQA, software process
specialists and auditors take a broader view on software and its development. They examine
and change the software engineering process itself to reduce the amount of faults that end up
in defect rate. What constitutes an acceptable defect rate depends on the nature of the
software. An arcade video game designed to simulate flying an airplane would presumably
have a much higher tolerance for defects than software used to control an actual airliner.
Although there are close links with SQA testing departments often exist independently, and
there may be no SQA areas in some companies.

The software faults occur through the following process. A programmer makes an
error (mistake), which results in a defect (fault, bug) in the software source code. If
this defect is executed, in certain situations the system will produce wrong results,
causing a failure. Not all defects will necessarily result in failures. For example,
defects in a dead code will never result in failures. A defect can turn into a failure
when the environment is changed. Examples of these changes in environment include

ddc form 5A4 - 9


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

the software being run on a new hardware platform, alterations in source data or
interacting with different software.

A problem with software testing is that testing all combinations of inputs and
preconditions is not feasible when testing anything other than a simple product. This
means that the number of defects in a software product can be very large and defects
that occur infrequently are difficult to find in testing. More significantly,
parafunctional dimensions of quality--for example, usability, scalability,
performance, compatibility, reliability--can be highly subjective; something that
constitutes sufficient value to one person may be intolerable to another.

There are many approaches to software testing. Reviews, walkthroughs or inspections


are considered as static testing, whereas actually running the program with a given set
of test cases in a given development stage is referred to as dynamic testing.

User Acceptance Testing (UAT): The test procedures that lead to formal
'acceptance' of new or changed systems. User Acceptance Testing is a critical phase
of any 'systems' project and requires significant participation by the 'End Users'. To
be of real use, an Acceptance Test Plan should be developed in order to plan
precisely, and in detail, the means by which 'Acceptance' will be achieved. The final
part of the UAT can also include a parallel run to prove the system against the current
system.

The User Acceptance Test Plan will vary from system to system but, in general, the
testing should be planned in order to provide a realistic and adequate exposure of the
system to all reasonably expected events. The testing can be based upon the User
Requirements Specification to which the system should conform.

As in any system though, problems will arise and it is important to have determined what will
be the expected and required responses from the various parties concerned; including Users;
Project Team; Vendors and possibly Consultants / Contractors.

ddc form 5A4 - 10


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Deployment/Hosting of the Web Enabled Application: Web Server/Application


server will be configured in this phase and finally the application will be deployed and
hosted in the web.

The overall system development life cycle (SDLC) is depicted in the following
diagram.

The overall system development life cycle (SDLC) is depicted in the following
diagram.

It is important to note that during deployment user may change many procedure and
functions that are important for their practical uses which are unknowingly or
unintentionally missed during system study.

ddc form 5A4 - 11


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

APPLICATION ARCHITECTURE

The user interface will be developed in such a fashion that a user (who may have no
technical knowledge about database or may be novice in computer literacy) can
operate and navigate the application easily, comfortably and smoothly. The
application will include varieties of modular forms. A typical user interface for this
concerned project is described below.

Skeleton of the User Interface: Application gallery will be the home page of the
application. It will comprise three modules

ddc form 5A4 - 12


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Skeleton of the User Interface

Application Gallery
(Home Page)
Security and Privileges Password Management
(Highly Restricted) Module Access Control

Name Clearance

Operations Registration
(Data Entry and Modification)
Return Filing
Issues of Certified Copy

Payment

Data Verification Verification

Audit Trail
Audit-trail
A Long List of
Reporting Formatted Reports
(Printable Formatted Output)
Parameterized and
Customizable Generic Reports

Backup and Recovery Interface for Backup

1. Security and Privileges


2. Operations
3. Data Verification
4. Reporting
5. Backup and Recovery
6. Payment
7. Payment

ddc form 5A4 - 13


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

1. Security and Privileges: An administrator can control the security of the hole
system using this module. Only the administrator of the system can access to this
module using password. From this module administrator will create new user and
can control security and privileges of his users. The Administrator will decide which
user will get which type of privileges on which modules setting behind the screen.
Since the Administrator can exercise the supreme power, only trusted person should
be appointed as an administrative user. In this module, the administrator can change
everyone's password. Not only have that, he can controlled access in any module for
any user. Say he wants that user 1 can only access personal information module and
nowhere. Not only that, he can restrict this user as read only user giving only 'Can
Select' privilege on that module

A Sample Form Showing Security and Privilege Control

ddc form 5A4 - 14


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Also there are several privileges which may be assigned to the above users on a
particular module by the administrator. These privileges are …

i) Can Select

ii) Can Update

iii) Can Insert

iv) Can Update Insert

v) Can All (means user can select, update, insert, delete).

2. Operations: This is an operational interface where an authentic user can insert,


update and delete data according to his privileges given by the administrator. It will
include various sub- modules. All modules will be password protected.

3. Verification: The concerned application includes a lot of sensitive and confidential


records (say, offence, punishment etc.) which should be verified by the respective
authority. Otherwise a mal practice can take place. So, all data need to be verified by
the authority after entry. This module will be highly restricted and password
protected. Only verified data can be shown in the reports. The data which are not
verified yet by the authentic and nominated user will never be published in the
reports.

4. Audit Trail: Whenever a user log on into the application all sort of operations (say,
insert, update, delete, entry time, exit time etc.) will be recorded internally without
informing the connected user. Only super user can check and view all sort of
occurrences made by the users. If any user tries to do something wrong, of course,
he will be identified and captured by the administrator. Audit Trail is such kind of
module where the above things are maintained properly.

5. Reporting: It will contain verities of several navigational interfaces.

Web Portal:

The website will be developed by HTML, XML and with server side language PHP,
PSP. It will retrieve data from the central database. In some cases it may retrieve
data even from local database of Field Offices also.

Features:

The website will be contained with the following features:

ddc form 5A4 - 15


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

• All software tasks should utilize less than 80% of the available processor cycles.

• At least 100 concurrent users support by the system for internet application and
for the website support at least 10,000 concurrent users.

• It is preferable for pages that its size should not exceed 100 kilobytes (KB).

• Home pages should be less than 40 kilobytes in size since this will ensure that in
most circumstances its load time will be less than 10 seconds.

• Links on a site should be always checked that they are functioning properly or
not. While it is inevitable that there will always be some broken links on a site of
any significant size, the percentage of links that are broken should be kept to a
minimum, ideally less than 1-2%.

• Website should operate with all W3C standards compliant browsers and should
be checked with both graphics based browsers currently in use.

• Websites should function fully with both Fire Fox and Internet Explorer browsers
at least one generation earlier than what is currently available.

• Search performance depends on speed of returning results, the time between the
user clicking the submit button and the page of results being fully displayed on
the client’s screen.

• Session Timeout depends on the user activity. If there is no user activity it should
be expired within 5 minutes.

This dynamic website will contain general information along with some advance
sections like online query, latest status of plot or flat etc. The web site will also have
a search engine. This website will have the following sections:

Solution Architecture-Network

Communication Infrastructure

Salient Features (Network Solution):

1. Local area network will be designed based on Star Topology and


Ethernet Technology.

2. All sorts of data will communicate in the LAN and WAN maintaining
TCP/IP protocol.

ddc form 5A4 - 16


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

3. All offices will be connected together through LAN / WAN, respective


local ISP or dial up network.

4. Whenever a local server will send the data to central database server,
they will send data in encrypted format so that the sent data will never be
hacked.

5. The incoming data will be decrypted when the data will be inserted into
the central database server.

6. The local database server will be under LAN / WAN, directly link with
local ISP using DSL modem or link up with dial up telephone using
modem.

7. The total intranet (field offices) will be acted as VPN (Virtual Private
Network).

8. The central information of the central database will be hosted to the ISP.
Public from the Internet, will access only the information, which will reside
in the central server.

9. Proxy server will be used to limit user’s access to specific Internet


resources.

10. Firewalls will protect networks from outside interference by using a


variety of techniques to limit the traffic passing between the internal
network and the Internet.

11. It is not the mandatory to make the whole network 100% uptime as data

synchronization will occur between local server and central server after a
certain amount of time.

ddc form 5A4 - 17


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Internet

Field Office -1

Dhaka local ISP

RAJUK Database
Field Offiece -2

Field Office -3 Field Office -4

Fig: Possible Network Diagram showing connectivity between field offices with
central database through Web.

IS P
rk
two
Ne
Area
de
Wi

E m a il S erv e r D ata b as e S e rv er R outer F irew all D S L M ode m

Lo ca l A re a N etw ork

IS P
rk
P rinte r two
P rin t S e rv er W eb S erv e r Ne
rea
A
W ide

R A JU K O ffice
D a ta b a s e S e rv e r R o u te rF ire w a l l D S L M o d e m
R
L o c a l A re a N e tw o rk

Fig1. Local Area Network Diagram for RAJUk office

B a c k u p S e rv e r P ri n te r

ddc R A J U K O ffi c e form 5A4 - 18


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Fig2. Local Area Network for other field offices

Services/Servers/OS

Network Operating System

Microsoft Windows 2003 Server include following features:

Active Directory Application Mode

• Active Directory
Application Mode (ADAM) is now available for download. Organizations,
independent software vendors, and developers who want to integrate their
applications with a directory service now have an additional capability within
Active Directory that provides numerous benefits.

Automated Deployment Services

• With Automated Deployment Services (ADS), Microsoft is extending the


Windows platform to enable faster, more flexible server deployment. Find out
how ADS can help us streamline this process.

DSML Services for Windows

ddc form 5A4 - 19


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

• DSML Services for


Windows (DSFW) allows Active Directory access using SOAP over HTTP based
on the OASIS DSML v2 specification.

Group Policy Management Console

• The Microsoft Group


Policy Management Console (GPMC) is a new tool that unifies management of
Group Policy across the enterprise. The GPMC consists of a new MMC snap-in
and a set of programmable interfaces for managing Group Policy.

Remote Control Add-on for Active Directory Users and Computers

• Remote Control is a
small add-on that adds the option to right-click a computer account in the Active
Directory MMC and choose Remote Control on that computer by opening a
Terminal/Remote Desktop connection to that computer.

Shadow Copy Client

• For computers running a


version of Windows earlier than Windows Server 2003, We can download the
Shadow Copy Client to take advantage of the intelligent file storage capabilities
of the Shadow Copies of Shared Folders feature.

Software Update Services

• Microsoft Software
Update Services (SUS) enables administrators to deploy critical updates to
Windows 2000–based, Windows XP, and Windows Server 2003 computers.

Windows Rights Management Services

• Microsoft Windows
Rights Management Services (RMS) for Windows Server 2003 is information
protection technology that works with RMS-enabled applications to help
safeguard digital information from unauthorized use—both online and offline,
inside and outside of the firewall.

Windows Rights Management Services Client

ddc form 5A4 - 20


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

• In order to run
applications that provides functionality based on Windows RMS technologies
and to develop with the RMS SDKs, download the Windows RMS client.

Windows Services For NetWare 5.03

• Windows Services For


NetWare 5.03 provides a cumulative set of updates and services that have been
offered since the release of Services For Netware 5.01 SP 1.

Windows Services For UNIX

• Windows Services for


UNIX (SFU) 3.5 provides the tools and environment that IT professionals and
developers need to integrate Windows with UNIX and Linux environments.

Windows SharePoint Services

• Windows SharePoint
Services is now available to help teams start creating Web sites for their
information sharing and document collaboration needs.

Windows System Resource Manager

• Windows System
Resource Manager (WSRM) is available for use with Windows Server 2003,
Enterprise Edition and Datacenter Edition. WSRM provides resource
management and enables the allocation of resources among multiple
applications based on business priorities.

Red Hat Enterprise include following features:

The following section outlines a few of the major new features in Red Hat
Enterprise Linux v.4 Update:

LINUX 2.6 KERNEL INFRASTRUCTURE

Red Hat Enterprise Linux v.4 Update provides the most stable and robust
commercial product based on the Linux community's 2.6.9 kernel. Open source
projects such as Fedora provided an environment for the Linux 2.6 kernel to
mature significantly during 2004. As a result, the Red Hat Enterprise Linux v.4

ddc form 5A4 - 21


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

kernel offers numerous improvements over earlier kernels, including many


enhanced algorithms and features:

• Generic logical CPU scheduler: Handles multi-core and hyper threaded


CPUs.

• Object-based Reverse Mapping VM: Improved performance in memory


constrained systems.

• Read Copy Update: SMP algorithm optimization for operating system data
structures.

• Multiple I/O schedulers: Selectable based on the application environment.

• Enhanced SMP & NUMA support: Improved performance and scalability for
large servers.

• Network interrupt mitigation (NAPI): Improved performance for heavy


network loads.

IMPROVED STORAGE AND FILE SYSTEM CAPABILITIES

Numerous enhancements have been incorporated into Red Hat Enterprise Linux
v.4 that improves the scalability and performance of the data storage
subsystems, including:

• Ext3 performance: Block Reservations and Hash Tree Directories improve


the performance of read/write I/O and directory scanning operations.

• Ext3 scalability: Dynamic file system expansion and file system sizes up to
8TB are now supported.

• Logical Volume Management: A comprehensive update to the LVM provides


new features such as read/write snapshots and transactional metadata updates,
along with a flexible new management GUI. Mirroring and enhanced multipathing
are scheduled for delivery by mid 2005.

• Scalability: Enhanced storage LUN management makes it possible to


configure much larger storage subsystems.

• Auto mounting: The inclusion of AutoFSv4 provides sophisticated device


access control, supporting features such as browsable mounts and replicated
servers.

ddc form 5A4 - 22


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

• Cost reduction: Support for Serial ATA disk storage provides increased
performance, higher densities, and reduced cost per megabyte over traditional
IDE devices.

NEW SECURITY CAPABILITIES

Provision of sophisticated security capabilities has been a specific development


focus of the Red Hat Enterprise Linux v.4 release. New features include:

• Mandatory Access Control: Security Enhanced Linux (SELinux) provides a


MAC infrastructure that complements the existing Discretionary Access Control
security features provided by the standard Linux environment. In a MAC-based
environment, application capabilities and privileges are set by predefined policies
and enforced by the kernel. This prevents errant applications from compromising
system security.

• Memory management enhancements: Several features, including Exec


Shield and Position Independent Executables, combine to prevent applications
from being exploited by attacks such as buffer overflows.

• Compile and runtime consistency checking: New buffer validation techniques


in the GCC compiler and Glibc library greatly reduce the risk of faulty
applications being compromised.

IMPROVED DESKTOP CAPABILITIES

Significant emphasis has been placed on providing a feature-rich, easy-to-use,


desktop environment for all Red Hat Enterprise Linux family members (including
Red Hat Desktop). A brief summary of new features:

• Personal productivity: Advanced user capabilities are provided by the


OpenOffice.org productivity suite, the Firefox web browser and Evolution email
client

• Plug-and-play device support: Easy handling of devices such as USB disks


and digital cameras (as well as photo management applications such as
gThumb)

• Multimedia: Applications for audio, video, and streaming content such as


RhythmBox, HelixPlayer, Totem, and SoundJuicer

ddc form 5A4 - 23


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

• User environment: GNOME 2.8 provides numerous enhancements for a


more consistent graphical look and feel. Comprehensive management tools (e.g.
printer and network management and VNC-based application session sharing)
and utilities (e.g. Gaim instant messaging, and GIMP image processing) combine
to provide a complete and highly functional user experience.

• Interoperability: Technologies that allow user login authentication with


Microsoft Active Directory, NTLM authentication for web-based applications,
Evolution mail client access to Windows Exchange Servers

• IIIMF: The Internet/Intranet Input Method framework provides the next-


generation multilingual Unicode input method framework. It offers many features,
such as full Unicode support and the ability to run multiple concurrent language
engines.

MISCELLANEOUS FEATURES

As a major new release, almost every aspect of Red Hat Enterprise Linux has
been enhanced. Some of the more important improvements:

• Compatibility with prior releases: Red Hat Enterprise Linux v.4 includes
compatibility libraries that enable most v.3 and v.2.1 applications to continue to
run without modification.

• Languages: Focused on international standards, such as OpenI18N and


GB18030, Red Hat Enterprise Linux has documentation and software available
in 15 languages: English, Japanese, German, Brazilian Portuguese, Korean,
Italian, French, Simplified Chinese, Traditional Chinese, Spanish, Devnagari,
Bangla, Punjabi, Tamil, Gujarati.

• Auditing: In an update planned for mid-2005, a new auditing facility will be


available that provides an open, bidirectional socket interface that can be used
by auditing applications. It provides comprehensive auditing capabilities for
SELinux and standard Linux events.

• File serving: Provision of NFSv4 provides features such improved security,


operation coalescing and integrated file locking, while Samba provides easy
access to Microsoft Windows printers and file shares.

ddc form 5A4 - 24


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

• Software development: The latest GCC 3.4 compiler toolchain, and a


technology preview of the forthcoming GCC 4.0 toolchain, are provided. These
offer standards-compliant C/C++ and Fortran 95 development environments.

• Advanced configuration and power interface: Support for the ACPI standard
enables a wide range of power management capabilities (battery monitoring,
automated power down, suspend), and provides a foundation for increasingly
sophisticated features in the future.

Extras: Optional software is provided on the Red Hat Enterprise Linux Extras CD
and Red Hat Network channel. This includes features such as additional desktop
applications (e.g. Adobe Reader, Macromedia Flash), Java environments, and
printroom-quality Agfa/Monotype fonts.

Security Concern and Policy

Security is a part of every network job, whether there is confidential data stored
on computers that must be protected or vital operating system and application
files that must be protected from deletion by users. There are various
mechanisms used to provide security on a network because different types of
protection are needed.

System Monitoring

• View a list of all


computers in our site and sites beneath it in the SMS hierarchy and view the
inventory for each individual computer

• Provide direct support to computers using the remote troubleshooting


utilities

• Create, modify, and


delete packages and program groups

• Define inventory rules for


packages to enable SMS to scan for these packages and report
them to the inventory database

• Configure site properties


for our site and sites beneath it in the SMS hierarchy

ddc form 5A4 - 25


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

• Use Network Monitor to


capture network traffic from a computer in the inventory

• Configure SMS to
receive Simple Network Management Protocol (SNMP) traps and store these
traps in the database

Password Protection

• For passwords to be an
effective means of protecting network resources, users and administrators must
select suitable passwords.

• Most network operating


systems enable administrators to implement policies that govern how and when
users should create new passwords.

• Effective passwords
should be at least five or six characters long and use a combination of uppercase
and lowercase letters, numbers, and symbols.

• Users should be
compelled to change their passwords at regular intervals and should not be
allowed to use the same few passwords repeatedly.

• User accounts should be


automatically locked out after a specified number of failed logon attempts.

Security Models

• Client/server networks
store authentication data in a central database, whereas each computer on a
peer-to-peer network maintains its own security information.

• User-level security is
based on individual accounts created for each user on the network. To grant
users access to network resources, we select their account names from the user
list and specify the permissions we want to grant them.

• Share-level security
assigns passwords to specific network resources. Everyone on the network uses
the same password to access a resource.

ddc form 5A4 - 26


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Firewalls

• Firewalls protect
networks from outside interference by using a variety of techniques to limit the
traffic passing between the internal network and the Internet.

• Packet filtering is a
technique in which a router determines whether to allow network access to each
packet based on the contents of its protocol headers.

• Network address
translation enables the computers on a private network to use unregistered IP
addresses and still access the Internet normally through a special router that
modifies the contents of the IP header in each packet.

• Proxy servers are


application layer products that act as intermediaries between network clients and
Internet servers. Client applications must be configured to use proxy servers and
administrators can configure the servers to limit users' access to specific Internet
resources.

Security Protocols

• IPSec is series of TCP/IP


standards that provide authentication and encryption services for LAN
communications.

• Layer 2 Tunneling
Protocol creates tunnels for VPNs that can be encrypted using IPSec.

• Secure Sockets Layer is


a security protocol used by Web servers and browsers to encrypt and
authenticate their transmitted data.

• Kerberos is an
authentication protocol used by directory services to provide clients with single
logon access to network resources.

Fault Tolerant Plan

Organization relies heavily on their computers, and once the computers are
networked, they come to rely on those network communications as well.

ddc form 5A4 - 27


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Depending on the type of organization using the network, an equipment failure or


other service interruption can mean lost productivity, lost revenue, and in some
cases even lost lives. Following are some key fault tolerant approaches:

Data Backup

The Backup utility helps us protect data from accidental loss if our system
experiences hardware or storage media failure. For example, we can use
Backup to create a duplicate copy of the data on our hard disk and then archive
the data on another storage device such as a hard disk or a tape. If the original
data on our hard disk is accidentally erased or overwritten, or becomes
inaccessible because of a hard disk malfunction, We can easily restore the data
from the archived copy.

Using Backup, we can:

• Archive selected files and folders on our hard disk.

• Restore the archived files and folders to our hard disk or any other disk
we can access.

• Make a copy of any Remote Storage data and any data stored in mounted
drives.

• Schedule regular backups to keep our archived data up-to-date.

TYPES OF BACKUP

The Backup utility supports five methods of backing up data on our computer or
network.

COPY BACKUP

A copy backup copies all selected files but does not mark each file as having
been backed up (in other words, the archive attribute is not cleared). Copying is
useful if we want to back up files between normal and incremental backups
because copying does not affect these other backup operations.

Daily backup

A daily backup copies all selected files that have been modified the day the daily
backup is performed. The backed-up files are not marked as having been
backed up (in other words, the archive attribute is not cleared).

ddc form 5A4 - 28


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Differential backup

Differential backup copies files created or changed since the last normal or
incremental backup. It does not mark files as having been backed up (in other
words, the archive attribute is not cleared). If we are performing a combination of
normal and differential backups, restoring files and folders requires that we have
the last normal as well as the last differential backup.

Incremental backup

An incremental backup backs up only those files created or changed since the
last normal or incremental backup. It marks files as having been backed up (in
other words, the archive attribute is cleared). If we use a combination of normal
and incremental backups, we will need to have the last normal backup set as
well as all incremental backup sets in order to restore our data.

Normal backup

A normal backup copies all selected files and marks each file as having been
backed up (in other words, the archive attribute is cleared). With normal
backups, we need only the most recent copy of the backup file or tape to restore
all of the files. We usually perform a normal backup the first time we create a
backup set.

Data Availability

RAJUK must have their data available all the time to function. If a drive on a
server fails, the data should be responsible from a backup, but the time lost
replacing the drive and restoring the data can mean lost productivity that costs
the company dearly. To provide a higher degree of data availability, there are a
variety of hardware technologies that worked in different ways to ensure that
network data is continuously accessible.

Two technologies are as follows:

RAID 1

Provides fault tolerance by maintaining duplicate copies of all data on two drives.
Disk mirroring uses two drives connected to the same host adapter and disk
duplexing uses two drives connected to different host adapters.

RAID 5

ddc form 5A4 - 29


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Both data and parity information are written across all disks in stripes to provide
full data recoverability in case any single drive fails. Disk striping with parity is an
excellent way to protect data from the downtime caused by disk failures. RAID 5
requires a minimum of three disks and is supported by Windows NT Server,
Windows 2000 Server and Linux.

Server Availability

Server fault tolerance is to have more than one server, and there are various
solutions available that enable multiple computers to operate as one, so that if
one server should fail, another can immediately take its place.

Clustering

Any technology that allows one device to take over for a similar device that has
failed. An example of a system that takes advantage of failover technology is
clustering. Failover is also often used to ensure that a break in a communication
line doesn’t cause a break in communication between networked systems.
Windows 2003 Advance Server and Linux support it.

Fig: Clustering between two computers

ddc form 5A4 - 30


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

SECURITY, RISK MANAGEMENT AND FLEXIBILITY

Security

- Antivirus server will protect data from the viruses and worms
- Controlling access to the sensitive data from unauthorized users
- Internet access for authorized employees
Threats

Human generated threats can be controlled by applying following security


- Ensuring system Level security by controlling user access
- Defining well defined security level group
- Preventing unauthorized or limited access to database
- Preventing unauthorized physical access to the system
RISK MANAGEMENT AND FLEXIBILITY

Risk refers to future conditions or circumstances that exist outside of the


control of the project team that will have an adverse impact on the project if
they occur. In other words, whereas an issue is a current problem that must be
dealt with, a risk is a potential future problem that has not yet occurred.

Risk Assessment and Level of Risk

Factors in the following table can be used for Risk assessment

Characteristic/Factor High Risk Low Risk

Total effort hours Large project > 5000 Small project < 1000 hours
hours

Duration Longer than 12 months Less than 4 months

Team size Over 8 members Fewer than 4

Number of clients or client More than three One


organizations

Project scope / deliverables Poorly defined Well defined

Business benefit Not clear Well defined

Project team and client Neither the project team Both the project team and
business knowledge nor the client have solid the client have solid
business knowledge business knowledge

Requirements Very complex, hard for Easy for client to define

ddc form 5A4 - 31


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Characteristic/Factor High Risk Low Risk

client to define

Dependency on other projects Dependent on three or No more than one


or outside teams more outside projects or dependency on an outside
teams project or team

Project sponsorship Unknown (should not Identified and enthusiastic


start the project)

Client commitment Unknown, passive Passionate

Changes required for existing Large amount of change Little change


procedures, processes and
policies

Organization structures Large amount of change Little or no change

Project manager experience Little experience on Similar experience on


similar projects multiple projects

Physical location of team Team is dispersed at Team is located together


several sites

Use of formal methodology Large project / no formal Small project / standard


methods or processes methods in use

Technology New technology is being No new technology


used for critical required
components

Response time Very short response Normal response time is


times are critical acceptable

Data quality Data is of poor quality Data is of good quality

Vendor partnership Have not worked with the Have a good relationship
vendor before with the vendor

Level of Risk

ddc form 5A4 - 32


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Severity of Risk Impact / Probability of Risk Overall Risk Level


Occurring

High negative impact to project / Highly likely to occur High

High negative impact to project / Medium likely to occur High

High negative impact to project / Not likely to occur Medium / Low

Medium negative impact to project / Highly likely to Medium


occur

Medium negative impact to project / Medium likely to Medium / Low


occur

Medium negative impact to project / Not likely to occur Low

Low negative impact to project / Highly likely to occur Low

Low negative impact to project / Medium likely to occur Low

Low negative impact to project / Not likely to occur Low

Risk Management Techniques

Once risks have been identified, there are a number of options that the project
manager might consider for responses.

Leave it. In this approach, the project manager looks at the impact the risk
condition would have on the project and decides that nothing needs to be done
to mitigate the risk. This approach should only be used for low impact risks or
those that are unlikely to occur. This approach is dangerous for high and
medium risks.

Monitor the risk. In this case, the project manager does not proactively
mitigate the risk, but monitors it to see whether it is more or less likely to occur
as time goes on. If it looks more likely to occur, the team must formulate a
different response at a later time. This approach can work for serious risks that
are not likely to occur. Rather than put a plan in place immediately, the project
manager creates a plan only if it looks likely that the risk will occur. The
advantage is that scarce resources are expended only on those risks that are

ddc form 5A4 - 33


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

likely to occur. The disadvantage is that the delay in addressing the risk might
make it less likely that the risk can be successfully mitigated in the future.

Avoid the risk. Avoiding the risk means that the condition that is causing the
problem is eliminated. For instance, if a part of the project has high risk
associated with it, then the whole part of the project is eliminated. Risks
associated with a particular vendor might be avoided if another vendor is used
instead. This is a very effective way to eliminate risks but obviously can be
used only in certain unique circumstances.

Move the risk. In some instances, the responsibility for managing a risk can be
removed from the project by assigning the risk to another entity or third party.
For instance, installation risks might be eliminated by outsourcing this function
to a third party. The third party might have particular expertise that allows them
to do the work without the risk. Even if the risk is still present, it now is up to
another party to resolve.

Mitigate the risk. In most cases, this is the approach to take. Usually proactive
steps must be taken if a risk has been identified to ensure that the risk does not
occur. Another of the goals of mitigation is to ensure that the effect (impact) of
the risk is minimized if it does occur.

Testing and QA Plan

The objective of testing is to reduce the risks inherent in the computer systems.
The strategy must address the risks and present a process that can reduce
those risks. Four steps will be followed to develop a customized test strategy
for this project:

• Select and rank the test factors: In conjunction with the clients/key
users of the system, Quality Assurance team will select and rank the key
test factors. The following work paper is used to select and rank test
factor/risk:

Number Test Factor Factor Ranking


Rank Rationale/Comments

1. Accuracy

ddc form 5A4 - 34


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Number Test Factor Factor Ranking


Rank Rationale/Comments

2. Access Control

3. File Integrity

4. Authorization

5. Compliance

6. Portability

7. Ease of Use

8. Reliability

9. Performance

10. Ease of Operation

11. Service level

12. Processing
Continuity

13.

14.

15.

• Identify the system development phases: The project development


team will identify the phases of their development process. These phases
are recorded in the test phase component of the matrix. The following work
paper or template is used to record the test factors, test phases, and test
concerns:

Test Phase Require Design Build Dynami Integrate Maintain


ments c Test

ddc form 5A4 - 35


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Test

Factors

Factor or

Risks

Test
Concerns

• Identify the business risks associated with the system under


development: Then developers, key users, clients, and test personnel will
brainstorm the risks associated with the software system.

• Place risks in the matrix: The risk team determines the test phases in
which the risk needs to be addressed by the test team, and the test factor
to which the risk is associated.

Testing Methodology

To ensure better quality, testing will be performed in every phase of the entire
Software Development Life Cycle. The following table shows the testing
process that explains how testing and verification activities will be performed in
each phase:

Life Cycle Phase Verification Activities/Primary Objectives of Testing

Requirements / • Determine that the requirements fairly represent what


Conception

ddc form 5A4 - 36


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Life Cycle Phase Verification Activities/Primary Objectives of Testing

the user needs.

• Determine that the needs have been defined and


documented.

• Determine that the business problem has been solved.

• Verify that the control requirements have been


specified

• Verify that a reasonable process was followed in


developing the business solution

• Determine that a reasonable alternative was selected


among the most probable alternative solutions.

• Verify that there is no missing cases, faulty logic,


module interface mismatches, data structure
inconsistencies in the design.

Design • Determine adequacy of design

• Generate structural and functional test data

• Determine consistency with design

Program • Determine adequacy of implementation


(build/construction)
• Generate structural and functional test data for
programs

• Unit testing and White Box testing by Developer and


White Box Tester.

Test • Test the application system (e.g. System Test, Load


Test, Stress Test, Data Integrity Test etc.)

Installation • Place tested system into production

Maintenance • Modify the system and retest (e.g.: Regression Test)

ddc form 5A4 - 37


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

TENTATIVE PROPOSED SYSTEM AND HARDWARE REQUIREMENT

In practical situation system and hardware requirement are the outcome of


system analysis and system design. However we are proposing the tentative
system and hardware requirement which will be changed after actual system
analysis and system design.

_ Main system will be located at RAJUK head office with some computing
facilities at local field offices.

- All the computer of RAJUK office will be connected with LAN while Field
offices will be connected with WAN/MAN

- Authorized Stackholders even field offices may have access to RAJUK


office through web or dial up network

- Application and Database server may be clustered one to avoid threat of


hardware failure.

- We suggest that Network server will be Windows 2003 Servers and


remaining server will run under Linux operating system while client machine will
run under windows XP.

- We also suggest Oracle RAC (Real Application Clustering) for Database


to introduce high level security and auditing facilities.

- Oracle 10g Developer Suite or Jdeveloper or C#.net will be used as


development tools for LAN interfaces

- HTML/XML/PHP/PSP/JSP/Java Script/ASP.net will be used for dynamic


web development.

- Internet explorer or Fire Fox can be used as browser by web client

- Data entry and scanning will be off line. Later on through script having
validation and consistency checking process those data and scan document
will be loaded into the database

- After operationalize the complete systems data entry and scanning may
be done on line.

Proposed Tentative Hardware Specification for RAJUK

ddc form 5A4 - 38


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

After real system analysis and systems design these hardware specification
may change

Sl. Items Brand Model Specification Quantity Remark


No Name s
1 Database HP/Any HP DL380 BRAND/MODEL: HP PROLIANT DL380 2 X DL380 + 1
Server Reputed G4/ Latest (G4) x MSA1000
Cluster Brand model
PROCESSOR: 2 (TWO) INTEL XEON
PROCESSOR 3.6 GHz /800MHz -2MB L2

RAM: 8-GB, PC2 PC3200 DDR2 SDRAM


DIMM RAM

HARD DISK DRIVE: 2 X 72.8-GB 15,000


RPM, U320 UNIVERSAL HARD DRIVE, 1"

STORAGE CONTROLLER: STORAGE


CONTROLLERS SMART ARRAY 6i
CONTROLLER

DUAL PORT NIC: NC7782 DUAL PORT


PCI-X GIGABIT SERVER ADAPTER
(EMBEDDED)

RAID CONTROLLER: HP SMART


ARRAY 642 RAID CONTROLLER

MODULAR SMART ARRAY: HP


STORAGEWORKS MODULAR SMART
ARRAY 1000 (MSA1000) STORAGE
SYSTEM

FIBRE CONNECTIONS: 2 GB FIBRE


CHANNEL HOST CONNECTIONS
(SUPPORT FOR 1 GB AND 2 GB FIBRE
CHANNEL FABRICS)

HARD DISK DRIVE: 8 X 72.8-GB 15,000


RPM, U320 UNIVERSAL HARD DRIVE, 1"

GRAPHICS: INTEGRATED ATI RAGE XL


VIDEO CONTROLLER WITH 8-MB
SDRAM VRAM

POWER SUPPLY: HOT PLUG


REDUNDANT POWER SUPPLY

REDUNDANT FAN: HOT PLUG


REDUNDANT FAN

OS SUPPORT: MICROSOFT WINDOWS


SERVER 2000, MICROSOFT WINDOWS
SERVER 2003, NOVELL NETWARE,
LINUX (RED HAT, SUSE), SCO
UNIXWARE, OPENSERVER

MONITOR: HP 17” TFT COLOR


MONITOR

ddc form 5A4 - 39


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Sl. Items Brand Model Specification Quantity Remark


No Name s
2 Service HP/ Any HP HP SERVICEGUARD FOR LINUX 1 SET (2
guard Reputed SERVICE PROLIANT CLUSTER A.11.16 (Latest) NODES
(Cluster Brand GUARD KIT INCLUDING 2 LICENSES, LICENSE)
Device) DOCUMENTATION AND AN ETHERNET
CROSSOVER CABLE
3 Storage HP/ Any HP HP ULTRIUM STORAGE WORKS 460
Device Reputed ULTRIUM TAPE DRIVE
Brand STORAGE DESCRIPTION: INCLUDING HP
WORKS STORAGE RACK KIT 3U
460 TAPE TYPE: EXTERNAL
DRIVE/ EXTRA TAPE CARTIDGE: 10 TAPES
Latest (STORAGE)
Model OS SUPPORT: MICROSOFT WINDOWS
2000 AND WINDOWS 2003, HP-UX,
ALPHA TRU64, NATIVE OPERATING
SYSTEM BACKUP APPLICATIONS

4 Applicati HP/Any HP DL380 BRAND/MODEL: HP PROLIANT DL380 2 X DL380 + 1


on Reputed G4/ Latest (G4) x MSA1000
Server Brand model
(Cluster) PROCESSOR: 2 (TWO) INTEL XEON
PROCESSOR 3.6 GHz /800MHz -2MB L2

RAM: 8-GB, PC2 PC3200 DDR2 SDRAM


DIMM RAM

HARD DISK DRIVE: 2 X 72.8-GB 15,000


RPM, U320 UNIVERSAL HARD DRIVE, 1"

STORAGE CONTROLLER: STORAGE


CONTROLLERS SMART ARRAY 6i
CONTROLLER

DUAL PORT NIC: NC7782 DUAL PORT


PCI-X GIGABIT SERVER ADAPTER
(EMBEDDED)

RAID CONTROLLER: HP SMART


ARRAY 642 RAID CONTROLLER

MODULAR SMART ARRAY: HP


STORAGEWORKS MODULAR SMART
ARRAY 1000 (MSA1000) STORAGE
SYSTEM

FIBRE CONNECTIONS: 2 GB FIBRE


CHANNEL HOST CONNECTIONS
(SUPPORT FOR 1 GB AND 2 GB FIBRE
CHANNEL FABRICS)

HARD DISK DRIVE: 8 X 72.8-GB 15,000


RPM, U320 UNIVERSAL HARD DRIVE, 1"

GRAPHICS: INTEGRATED ATI RAGE XL


VIDEO CONTROLLER WITH 8-MB
SDRAM VRAM

POWER SUPPLY: HOT PLUG

ddc form 5A4 - 40


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Sl. Items Brand Model Specification Quantity Remark


No Name s
REDUNDANT POWER SUPPLY

REDUNDANT FAN: HOT PLUG


REDUNDANT FAN

OS SUPPORT: MICROSOFT WINDOWS


SERVER 2000, MICROSOFT WINDOWS
SERVER 2003, NOVELL NETWARE,
LINUX (RED HAT, SUSE), SCO
UNIXWARE, OPENSERVER

5 Service HP/ Any HP HP SERVICEGUARD FOR LINUX 1 SET (2


guard Reputed SERVICE PROLIANT CLUSTER A.11.16 NODES
(Cluster Brand GUARD KIT INCLUDING 2 LICENSES, LICENSE)
Device) DOCUMENTATION AND AN ETHERNET
CROSSOVER CABLE
6 Storage HP/ Any HP HP ULTRIUM STORAGE WORKS 232 02
Device Reputed ULTRIUM TAPE DRIVE
(Applicat Brand STORAGE CAPACITY: NATIVE: 100-GB,
ion & WORKS COMPRESSED: 200-GB
WEB) 232 TAPE BUFFER SIZE: 64-MB
DRIVE/ DESCRIPTION : INCLUDING HP
Latest STORAGE RACK KIT 1U
Model

7 WEB HP/ Any HP DL380 BRAND/MODEL: HP PROLIANT DL380 2 X DL380 + 1


Server Reputed G4/ Latest (G4) x MSA1000
Brand model
PROCESSOR: 2 (TWO) INTEL XEON
PROCESSOR 3.6 GHz /800MHz -2MB L2

RAM: 8-GB, PC2 PC3200 DDR2 SDRAM


DIMM RAM

HARD DISK DRIVE: 2 X 72.8-GB 15,000


RPM, U320 UNIVERSAL HARD DRIVE, 1"

STORAGE CONTROLLER: STORAGE


CONTROLLERS SMART ARRAY 6i
CONTROLLER

DUAL PORT NIC: NC7782 DUAL PORT


PCI-X GIGABIT SERVER ADAPTER
(EMBEDDED)

RAID CONTROLLER: HP SMART


ARRAY 642 RAID CONTROLLER

MODULAR SMART ARRAY: HP


STORAGEWORKS MODULAR SMART
ARRAY 1000 (MSA1000) STORAGE
SYSTEM

FIBRE CONNECTIONS: 2 GB FIBRE


CHANNEL HOST CONNECTIONS
(SUPPORT FOR 1 GB AND 2 GB FIBRE
CHANNEL FABRICS)

HARD DISK DRIVE: 8 X 72.8-GB 15,000

ddc form 5A4 - 41


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Sl. Items Brand Model Specification Quantity Remark


No Name s
RPM, U320 UNIVERSAL HARD DRIVE, 1"

GRAPHICS: INTEGRATED ATI RAGE XL


VIDEO CONTROLLER WITH 8-MB
SDRAM VRAM

POWER SUPPLY: HOT PLUG


REDUNDANT POWER SUPPLY

REDUNDANT FAN: HOT PLUG


REDUNDANT FAN

OS SUPPORT: MICROSOFT WINDOWS


SERVER 2000, MICROSOFT WINDOWS
SERVER 2003, NOVELL NETWARE,
LINUX (RED HAT, SUSE), SCO
UNIXWARE, OPENSERVER

8 Service HP/ Any HP HP SERVICEGUARD FOR LINUX 1 SET (2


guard Reputed SERVICE PROLIANT CLUSTER A.11.16 NODES
(Cluster Brand GUARD KIT INCLUDING 2 LICENSES, LICENSE)
Device) DOCUMENTATION AND AN ETHERNET
CROSSOVER CABLE
9 Mail HP/ Any HP DL380 BRAND/MODEL: HP PROLIANT DL380 01
Server Reputed G4/ Latest (G4)
Brand model PROCESSOR: 2 (TWO) INTEL XEON
PROCESSOR 3.6 GHz /800MHz -2MB L2
RAM: 2-GB, PC2 PC3200 DDR2 SDRAM
DIMM RAM
HARD DISK DRIVE: 5 X 72.8-GB 15,000
RPM, U320 UNIVERSAL HARD DRIVE, 1"
STORAGE CONTROLLER: STORAGE
CONTROLLERS SMART ARRAY 6i
CONTROLLER
DUAL PORT NIC: NC7782 DUAL PORT
PCI-X GIGABIT SERVER ADAPTER
(EMBEDDED)
GRAPHICS: INTEGRATED ATI RAGE XL
VIDEO CONTROLLER WITH 8-MB
SDRAM VRAM
POWER SUPPLY: HOT PLUG
REDUNDANT POWER SUPPLY
REDUNDANT FAN: HOT PLUG
REDUNDANT FAN
OS SUPPORT: MICROSOFT WINDOWS
SERVER 2000, MICROSOFT WINDOWS
SERVER 2003, NOVELL NETWARE,
LINUX (RED HAT, SUSE), SCO
UNIXWARE, OPENSERVER

10 Network HP/ Any HP DL380 BRAND/MODEL: HP PROLIANT DL380 01


Server Reputed G4/ Latest (G4)
Brand model PROCESSOR: 2 (TWO) INTEL XEON
PROCESSOR 3.6 GHz/800MHz -2MB L2
RAM: 2-GB, PC2 PC3200 DDR2 SDRAM
DIMM RAM
HARD DISK DRIVE: 5 X 72.8-GB 15,000

ddc form 5A4 - 42


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Sl. Items Brand Model Specification Quantity Remark


No Name s
RPM, U320 UNIVERSAL HARD DRIVE, 1"
STORAGE CONTROLLER: STORAGE
CONTROLLERS SMART ARRAY 6i
CONTROLLER
DUAL PORT NIC: NC7782 DUAL PORT
PCI-X GIGABIT SERVER ADAPTER
(EMBEDDED)
GRAPHICS: INTEGRATED ATI RAGE XL
VIDEO CONTROLLER WITH 8-MB
SDRAM VRAM
POWER SUPPLY: HOT PLUG
REDUNDANT POWER SUPPLY
REDUNDANT FAN: HOT PLUG
REDUNDANT FAN
OS SUPPORT: MICROSOFT WINDOWS
SERVER 2000, MICROSOFT WINDOWS
SERVER 2003, NOVELL NETWARE,
LINUX (RED HAT, SUSE), SCO
UNIXWARE, OPENSERVER

11 Antivirus HP/ Any HP DL380 BRAND/MODEL: HP PROLIANT DL380 01


Server Reputed G4/ Latest (G4)
Brand model PROCESSOR: 2 (TWO) INTEL XEON
PROCESSOR 3.6 GHz/800MHz -2MB L2
RAM: 2-GB, PC2 PC3200 DDR2 SDRAM
DIMM RAM
HARD DISK DRIVE: 5 X 72.8-GB 15,000
RPM, U320 UNIVERSAL HARD DRIVE, 1"
STORAGE CONTROLLER: STORAGE
CONTROLLERS SMART ARRAY 6i
CONTROLLER
DUAL PORT NIC: NC7782 DUAL PORT
PCI-X GIGABIT SERVER ADAPTER
(EMBEDDED)
GRAPHICS: INTEGRATED ATI RAGE XL
VIDEO CONTROLLER WITH 8-MB
SDRAM VRAM
POWER SUPPLY: HOT PLUG
REDUNDANT POWER SUPPLY
REDUNDANT FAN: HOT PLUG
REDUNDANT FAN
OS SUPPORT: MICROSOFT WINDOWS
SERVER 2000, MICROSOFT WINDOWS
SERVER 2003, NOVELL NETWARE,
LINUX (RED HAT, SUSE), SCO
UNIXWARE, OPENSERVER

12 Worksta HP/ Any HP BRAND/MODEL: HP XW6200 01


tion Reputed XW6200 WORKSTATION (PZ041UT)
(Monito Brand WORKST PROCESSOR: INTEL® XEON™ 2.80 GHZ
ATION 800 MHZ 2 MB CACHE
ring
(PZ041UT) CHIPSET: INTEL® E7525
Server ) / Latest RAM: 1(ONE) GB DDR SDRAM
model HARD DISK: 80-GB SERIAL ATA
HARD DRIVE (7200 RPM)
GRAPHICS: NVIDIA

ddc form 5A4 - 43


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Sl. Items Brand Model Specification Quantity Remark


No Name s
COMBO DRIVE: COMBO DRIVE
NETWORKING: 100/1000 NIC
KEYBOARD: 2004 STANDARD HP
KEYBOARD
MOUSE : TWO BUTTON MOUSE
WITH PAD
MONITOR: HP 17” TFT COLOR
MONITOR
OS SUPPORT: MICROSOFT
WINDOWS SERVER 2000,
MICROSOFT WINDOWS SERVER
2003
* WARRANTY: 3 YEARS FULL
WARRANTY FOR SPARE PARTS &
SERVICES

13 Server HP/ Any HP 42U HP 42U SERVER RACK WITH SIDE 01


Rack Reputed SERVER PANEL, KEYBOARD & DRAWER KIT,
Brand RAC / MONITOR/UTILITY SHELF, SERVER
Latest CONSOLE SWITCH, CAT-6 CABLE (6
Model FEET) PS/2 INTERFACE ADAPTER FOR
CONSOLE, MODULAR POWER
DISTRIBUTION UNITS (MPDU), CABLE
MANAGEMENT KIT AND OTHER
ACCESSORIES

14 UPS SOCOME MASTERY CAPACITY: 10 KVA 02


(Online) C SICON S/ Latest
for 10 KVA Model INPUT RECTIFIER
Server ON LINE INPUT RECTIFIER VOLTAGE :230V
UPS TOLERANCE :+/-20% (UP TO –35%@70%
NOMINAL LOAD) FREQUENCY :50-60 HZ
+/-10%
POWER FACTOR :0.99

OUTPUT INVERTER
OUTPUT INVERTER VOLTAGE :1 PH
230V (220/240V SETTABLE) TOLERANCE
(STABLE CONDITION) :< 1% TOTAL
HARMONIC DISTORTION ON LINEAR
LOAD :<1% ON NON LINEAR LOAD :<
3% FREQUENCY :50 - 60 HZ FREE
RUNNING OUTPUT FREQUENCY
ACCURACY :+/- 0.1% ACCEPTABLE
OVERLOAD 1 MN: :150% 10 MN; :125%
DEGREE OF PROTECTION :IP 21
(COMPLYING WITH IEC 60529)
ACCEPTABLE CREST FACTOR
WITHOUT DOWNGRADING :UP TO 3
(COMPLYING WITH IEC62040-3)
OVERALL EFFICIENCY :92% ECO-MODE
EFFICIENCY :98% EFFICIENCY IN
ALWAYS – ON MODE :96% TRANSFER
TIME :0 (ZERO) MILLISECOND
CURRENT WAVEFORM :100% PURE
SINE WAVE AUDIBLE NOISE (ISO
3746) :<50-DB BATTERY :100% SEALED
MAINTENANCE FREE LEAD ACID VFI-
SS-111 (IEC62040-3) ON LINE DOUBLE

ddc form 5A4 - 44


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Sl. Items Brand Model Specification Quantity Remark


No Name s
CONVERSION TECHNOLOGY

UNIVISION PRO SOFTWARE FOR


REMOTE MONITORING
� DOUBLE CONVERSION
� COMMUNICATION CAPABILITY
� CREST FACTOR UP TO 3: 1
� MICROPROCESSOR
CONTROLLED
� ABSOLUTE BATTERY
PROTECTION
� COMPACT DESIGN � PURE SINE
WAVE
� OPTION FOR PARALLEL
EXTENSION UP TO 2
UNIT
MIN. BACKUP TIME REQUIRED AT
100% LOAD: 30 MINUTES

15 PC HP/ Any HP PROCESSOR SPEED: INTEL Core 2 25


Reputed COMPAQ Duo 2.2 GHz WITH HTT (Assuming)
Brand BUSINESS CACHE : INTEGRATED 1-MB LEVEL-
DESKTOP/ 2 CACHE
Latest CHIPSET : INTEL 945G CHIPSET
Model FORM FACTOR: MICRO TOWER
FRONT SIDE BUS : 800 MHz
MEMORY STANDARD: 1 GB DDR-
SYNCH DRAM (800-MHz) NON-ECC,
UPTO 4 GB
HARD DISK : 80-GB SERIAL ATA/150
HARD DRIVE (7200 RPM)
GRAPHICS : INTEL INTEGRATED
GRAPHICS MEDIA ACCELERATOR
900 (INTEGRATED WITH 915G
CHIPSET)
CD-ROM DRIVE: 52x CD-ROM DRIVE
FLOPPY DRIVE : SINGLE 3.5”, 1.44
MB FLOPPY DISK DRIVE
NETWORKING: INTEGRATED
BROADCOM NETXTREME GIGABIT
(10/100/1000) NIC
EXPANSION BAYS: TOTAL 5 (FIVE)
BAYS: 2 X INTERNAL, 3 X
EXTERNAL
EXPANSION SLOTS : TOTAL 4 (FOUR)
SLOTS: 2 X PCI, 1 X PCI EXPRESS x1, 1 X
PCI EXPRESS x16
INTERFACE : 8 X USB 2.0; 1 X
STANDARD SERIAL PORT, 1X
PARALLEL PORT; 2 X PS/2; 1X RJ-45;
1X VGA; AUDIO IN/OUT
KEYBOARD: 2004 STANDARD HP
KEYBOARD
MOUSE : TWO BUTTON MOUSE
WITH PAD
MONITOR: HP 15” TFT COLOR
MONITOR
SOFTWARE: PRELOADED
WINDOWS XP PRO. WITH CD,

ddc form 5A4 - 45


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Sl. Items Brand Model Specification Quantity Remark


No Name s
LICENSE & MANUAL
* COUNTRY OF ORIGIN : USA
* WARRANTY : 3 YEARS FULL
WARRANTY FOR SPARE PARTS
& SERVICES

16 UPS APC/ Any APC APC BACK-UPS RS 800VA 25


(Offline Reputed BACK- CAPACITY: 800 VA (Assuming)
) Brand UPS RS INPUT VOLTAGE:(160 ~ 270 V)
800VA/ SINGLE PHASE
Latest OUTPUT VOLTAGE: 230V (WITH +/-
Model 5% ON MAINS)
INPUT FREQUENCY: 50/60 HZ (+/-
10% AUTO SENSING)
BATTERY TYPE : SEALED
MAINTENANCE-FREE LEAD ACID
RECHARGE TIME : 6~8 HOURS (TO
90% OF FULL CAPACITY)
BACKUP TIME: 15 ~ 30 MINUTES
(TYPICAL PC LOAD)
* MODEM/LAN INTERNET
PROTECTION
* COMPACT DESIGN
* STABILISED OUTPUT WITH
AUTOMATIC
* SUPPRESSION FILTERS VOLTAGE
REGULATOR (AVR)
* EFFICIENCY SMART BATTERY
MANAGEMENT
* RJ 11/45 PHONE JACK FOR SURGE
PROTACTION SMART RS-232
COMMUNICTION INTERFACE
UPS MANAGEMENT SOFTWARE FOR-
UPS MONITORING, AUTOMATIC
SYSTEM AND UPS
17 LAN PANDUIT/ UTP CABLE
Accessor Any BRAND/MODEL :
ies Reputed AMP/PANDUIT/AVAYA
Brand
CATEGORY : CAT-6
COLOR : BLUE

CONNECTOR
BRAND/MODEL :
AMP/PANDUIT/AVAYA
CATEGORY : CAT-6
TYPE : RJ45

DROP/PATCH CABLE 40
(Assuming)
BRAND/MODEL :
AMP/PANDUIT/AVAYA
CATEGORY : CAT-6 ((3 meter))
COLOR : YELLOW

PATCH CABLE 40
(Assuming)

ddc form 5A4 - 46


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Sl. Items Brand Model Specification Quantity Remark


No Name s
BRAND/MODEL :
AMP/PANDUIT/AVAYA
CATEGORY : CAT-6 (1 meter)
COLOR : YELLOW

WALL PLATE 30
(Assuming)
BRAND/MODEL : PANDUIT/AVAYA
CATEGORY : 2 PORT KEYSTONE WALL
PLATE (RJ45 COMPATIABLE)
COLOR : BLUE and WHITE

INSERTS for WALL PLATE & 30


HOUSINGS (Assuming)
BRAND/MODEL : PANDUIT/AVAYA
CATEGORY : CAT 6 Keystone Jack- White
110 Type
COLOR : BLUE and WHITE

18 TOOLS Any 01( per site)


ET Reputed TOOLSET FOR HARDWARE
Brand
19 TOOLS Any TOOLSET FOR NETWORK 01( per site)
ET Reputed
Brand
20 Commun PANDUIT COMMUNICATION RACK (OPEN 04
ication RACK) (Assuming)
Rack
PANDUIT/ AVAYA 22U RACK WITH
HORIZONTAL AND VERTICAL CABLE
MANAGEMENT KIT AND OTHER
ACCESSORIES
CAT6 COMPATIBLE

21 UPS APC/ Any APC APC Smart-UPS, 1980 Watts / 2200 VA, 04
(Online) Reputed Smart-UPS Input 230V / Output 230V, Interface Port DB- (Assuming)
for Brand 2200VA 9 RS-232, Smart Slot, USB, Rack Height 2 U
Commun USB and Power Protection Type: Rack mount UPS
ication Serial RM Battery Backup
Rack 2U 230V/ Frequency: 50Hz +/- 3 Hz (auto sensing)
Latest Waveform Type: Sine Wave
Model Typical Backup Time at Half Load: 30 minute
Typical Backup Time at Full Load: 15 minute

22 Patch PANDUIT/ Latest PATCH PANEL (PANDUIT/AVAYA) 04


Panel Any Model (Assuming)
Reputed 24-PORT PATCH PANEL
Brand CAT6 COMPATIBLE

23 Router CISCO CISCO BRAND/MODEL:CISCO 2821XM 02


(Internet) 2821XM ONBOARD LAN PORTS: TWO 10/100/1000 (Assuming)
ONBOARD
EXTRA LAN PORTS: TWO 100/1000
SERIAL PORT: ONE 2 Mbps
MODULAR SLOTS: 2 (TWO)

ddc form 5A4 - 47


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Sl. Items Brand Model Specification Quantity Remark


No Name s
AIM SLOTS : TWO (INTERNAL)
CONSOLE PORT : ONE–UP TO 115.2
KBPS
AUXILIARY PORT : ONE–UP TO 115.2
KBPS
USB PORTS : 2 (1.1 FIXED)
INTERFACE CARD SLOTS : 4 SLOTS,
EACH SLOT CAN SUPPORT HWIC, WIC,
VIC, OR VWIC TYPE
NETWORK-MODULE SLOT : 1 SLOT,
SUPPORTS NM, NME AND NME-X TYPE
MODULES
VOICE MODULE SLOT : 1 (EXTENDED)
PVDM (DSP) SLOTS : 3 ON
MOTHERBOARD
FLASH MEMORY : 64 MB (DEFAULT),
128 MB (MAXIMUM)
DRAM : 256 MB (DEFAULT), 384 MB
(MAXIMUM)

* WARRANTY : 1-YEAR WARRANTY

24 Firewall CISCO CISCO BRAND/MODEL: CISCO PIX-525-UR- 01


for PIX BUN (Assuming)
Internet FIREWAL PROCESSOR : 600 MHz
L MEMORY : 256 MB
FLASH MEMORY : 16 MB
INTEGRATED 10/100 PORTS : 2
EXTRA LAN PORTS : 2
INTEGRATED VPN ACCELERATION :
YES
PCI EXPANSION SLOTS : 3
MAX. PHYSICAL INTERFACES : 10
MAX. VIRTUAL INTERFACES (VLANS) :
100
LICENSED USERS : UNLIMITED
CISCO PIX SECURITY APPLIANCE
SOFTWARE VERSION : 7.0(1)
* WARRANTY : 1-YEAR WARRANTY

25 Switch CISCO CATALYS BRAND/MODEL : CATALYST 3750G- 01


for T 3750G- 24TS (Assuming)
Server 24TS PART NUMBER: (WS-C3750G-24TS-S)
FIXED PORTS : 24 ETHERNET
10/100/1000 PORTS AND 4 SFP-BASED
GIGABIT ETHERNET PORTS
UPLINKS : 4
SWITCHING FABRIC : 32
VLAN MAXIMUM : 1005
SFPS: 1000BASET, SX, LX/LH, ZX, CWDM
MANAGEABILITY : SNMP, TELNET,
RMON, CWSI, CLI-BASED OUT-OF-
BAND, EMBEDDED CMS
SOFTWARE IMAGE : STANDARD
MULTILAYER SOFTWARE IMAGE (SMI)
INSTALLED
FLASH MEMORY : 16 MB
CPU DRAM : 128 MB
* WARRANTY: 1-YEAR WARRANTY

ddc form 5A4 - 48


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Sl. Items Brand Model Specification Quantity Remark


No Name s
26 Router CISCO CISCO BRAND/MODEL : CISCO 2811XM 04
(Intrane 2811XM ONBOARD LAN PORTS : TWO 10/100 (Assuming)
t) ONBOARD
SERIAL PORT: ONE 2 Mbps
MODULAR SLOTS : 2 (TWO)
AIM SLOTS : TWO (INTERNAL)
CONSOLE PORT : ONE–UP TO 115.2
KBPS
AUXILIARY PORT : ONE–UP TO 115.2
KBPS
USB PORTS : 2 (1.1 FIXED)
INTERFACE CARD SLOTS : 4 SLOTS,
EACH SLOT CAN SUPPORT HWIC, WIC,
VIC, OR VWIC TYPE MODULES
NETWORK-MODULE SLOT : 1 SLOT,
SUPPORTS NM AND NME TYPE
MODULES PVDM (DSP) SLOTS : 2 ON
MOTHERBOARD
FLASH MEMORY : 64 MB (DEFAULT),
128 MB (MAXIMUM)
DRAM : 256 MB (DEFAULT), 384 MB
(MAXIMUM)

* WARRANTY : 1-YEAR WARRANTY

27 Switch CISCO CISCO 05


(LAN) CATALYS BRAND : CISCO CATALYST 2950T-24 (Assuming)
T 2950T- SWITCH PART NUMBER : WS-C2950T-
24
SWITCH 24
FIXED PORTS : 26-PORTS (24-PORTS
10/100 AUTOSENSING & 2-PORTS
1000BASE-T)
FLASH MEMORY: 8 MB
CPU DRAM : 16 MB
FORWARD BANDWIDTH : 8.8 GBPS
FORWARDING RATE : 6.6 MPPS
FULL DUPLEX CAPABILITIES: ALL
PORTS
VLAN MAXIMUM: 250-PORT BASED
VIALS
* WARRANTY: 1-YEAR WARRANTY

28 Modem US External US Robotics 56Kbps External Modem 05


(Intrane Robotics Modem (Assuming)
t)

DOCUMENTATION PLAN

The following documents will be given before the authority in different stages of
the project.

ddc form 5A4 - 49


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

User Manual/ Documentation

A user manual will be prepared in such a way so that a novice user can learn
easily and operate the application without any technical knowledge. User
manual will focus the A to Z of the application.

Technical Documentation

Technical manual will describe the A to Z of the technical issues of the


application. It will describe what kind of problems a user can face and how
he/she will resolve the problems. It will also describe how to administer the
application. Only the technical guy will follow this manual.

System Administration Manual:

System administration manual will state the total administration of developed


application. It will describe total architecture of the developed application, how
to manage security and user access, troubleshooting etc which will help system
administrator to run the system smoothly.

Online Help

Online help will be provided with developed application to provide overall


guidance to

the user where a user can easily find any topic. It will be developed according
to the international standard like famous industry standard software.

FAQ

Frequently Asked Questions will be documented in both manual and online


help. It will provide solution and knowledge based conception to users through
questions.

ddc form 5A4 - 50


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

2.2 Scanning & Data Entry

2.2.1 GENERAL APPROACH_SCANNING & DATA ENTRY

Operation Venue: Considering security of the files and their contents, the consultant
would carry out scanning & data entry operation in RAJUK premise. RAJUK would
provide such office space and utility services (electricity, air conditioner, toilets etc.)
free of cost.

This however is already confirmed by RAJUK in the pre-bid meeting.

File Movement Register: The consultant would maintain File Movement Register in
duplicate, one with the consultant and another with RAJUK duly signed by the
counterpart to track & ensure security of the files.

The consultant would take care that no file/document is taken out from the operation
room.

Logistics: Consultant would provide the necessary logistics needed for scanning
and data entry operation. The following logistics will be provided for the project
period on rental basis:

Computer (Server) with UPS 1 no

Computer (PC) with UPS 20 nos.

Scanner (Legal, letter, A4) 15 nos.

Scanner (A0) 1 no.

Laser Printer with stabilizer 1 no.

Office furniture 21 sets

Network. 1 lot

Telecommunication, fax, e-mail etc. 1 lot

Office consumables 1 lot

ddc form 5A4 - 51


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

The consultant would take back the non-consumable logistics after the operation is
over.

Scanners: Task of scanning constitutes a major part of the assignment. Quality &
rate of scanning shall highly influence the appropriateness & time of completion of
the project. The consultant would deploy two types of scanners, one for legal or
smaller sizes pages and the other for A0 size maps/plans. In addition to others, the
scanners shall have the following technical features:

• Input Media - Paper

• Max Scan Size - A4, Legal and Letter with


Automatic Document Feeder (ADF)
for Smaller Scanner

- A0 for Bigger Scanner

• Scan Resolution - 300 dpi (min)

• File format - PDF

• Provision For Colour Page Scan - Yes

• Provision of Book Scanning - Yes for Smaller Scanner

Human Resources: The consultant would mobilize competent experienced


technical staff for the operation. Headed by one In-Charge of Scanning & Data
entry, the scanning & data entry team would consists of –

• Document Controllers, responsible for maintaining file movement


registers, receive files from RAJUK, orderly sort documents for scanning &
data entry and return files to RUJUK after scanning & data entry

• Scanning & Data Entry Operators, responsible for scanning


pages/maps/plans and enter data

ddc form 5A4 - 52


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

For convenience of operation, scanning and data entry of one file would be
done by a single person.

• Scanning & Data Entry Supervisor, responsible for online checking and
ensure quality & completeness of data entry & scanning

Support Staff: The consultant shall provide support office staff for data entry and
scanning as under:

• Office Assistant 1 no.

• Peon 1 no.

Prior to start scanning & data entry operation, Sr. professionals of the consultant
would impart orientation training to all Scanning & Data Entry Team members

2.2.2 METHODOLOGY_ SCANNING & DATA ENTRY

Design & Develop Software for Scanning & Data Entry: The sub-task involves –

• Naming documents

• Identifying data entry fields

• Developing Scanning & Data Entry software

The consultant proposes to quickly develop the software with Oracle developer 6i.
Detail methodology of software development has been delineated in Section 2.1.

Software professionals headed by the Database Specialist shall implement the sub-
task.

The sub-task will be completed within one (1) month of contract signing.

Setup Computing Infrastructure for Scanning & Data Entry: The sub-task
involves –

• Get RAJUK office space

ddc form 5A4 - 53


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

• Mobilize furniture, computers, printer, UPS, LAN accessories etc.

• Set up LAN, client – server environment

• Install & test the software for Scanning & Data Entry

Hardware/Network & software professionals headed by the In-charge of Scanning &


Data Entry shall implement the sub-task.

The sub-task will be completed within one (1) month of contract signing.

Conduct Orientation Training to All Scanning & Data Entry Team Members: All
the members of Scanning & Data Entry Team shall undergo an orientation course on
the scope, team, procedure, responsibility, security, quality assurance etc. of the
scanning & data entry process, They shall scan and enter data on test basis and
may suggest any changes/improvement on the software

Scanning & Data Entry Operation: The sub-task involves –


Receive Docs,
Entry in the File
Online Check
Movement Scanning & the Quality and
Registers, Sort Data Entry of
File File Completeness
Docs by Record Documents File
RAJUK of Digitization
Category

Scanning & Scanning &


Document
Data Entry Data Entry
Controller
Operator Supervisor

• Receiving files from RAJUK putting proper entry in the file movement
registers, then sorting the documents of each file by record category (for
definition please see Section 2.3) and handing over the files to the Scanning
& Data Entry operators. One complete file will be given to one operator only

The Document Controller will be responsible for the sub-task.

ddc form 5A4 - 54


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

• Scanning & data entry of documents in accordance with the scanning & data
entry interface of the software

Scanning constitutes major portion of the total assignment. Progress rate of


service could be substantially ehanced if ‘Automatic Document Feeder (ADF)’
of scanner could be used. However, heterogeneous sizes, roughness and
poor condition of papers (smaller ones) would limit the use of ADF. There is
the risk of damage of such valuable (original) documents when run through
ADF.

On the other hand, effective database management requires assigning


identification to each document category (for definition please sees Section
2.1) at the time of digitization, which also restricts the use of ADF.

Bound books bar the use of ADF leaving flatbed scanning option.

The Scanning & Data Entry Operators will be responsible for the sub-task.

On Line Checking: The Scanning & Data Entry Supervisors shall online check the
quality and completeness of digitization and does the necessary editing/entry as
required.

Backup: The In-Charge of Scanning & Data Entry shall take backup of digitized
documents in CD/DVD at regular interval

ddc form 5A4 - 55


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

2.3 Systems Implementation

For deployment and commissioning of systems the following tasks are to be done:

i. Set environment for hardware, network etc. specially A/C, backup power supply,
UPS etc.

ii. Install & configure the network wiring and network accessories

iii. Install & configure the server with operating system

iv. Install & configure the router, firewall & switches

v. Setup communication among servers, PCs, testing IP addresses

vi. Install & configure the database

vii. Install the application and upload live data

viii. Thorough testing of application with live data

ix. commissioning of the application

ddc form 5A4 - 56


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

x. 2.4 Training / Transfer of Technology

Types of Training: The consultant will impart the following trainings to RAJUK
officials:

Name Target Group

1. Management Top ranking officers, Departmental


Training heads and supervisors

2. End User Operators


Training

3. Technical Technical Staff


Users Training

Methodology of the Training: The Consultant follows a training methodology to


conduct training smoothly. The following diagram represents the methodology followed
by the Consultant during training session:

ddc form 5A4 - 57


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

1. Orientation of
the Course

5. Discussion
through User
Manual

2. Scope of 8. User
the Course Practice
Session and
Review
6. Practice
Session
according to
User Manual

3. Multimedia
Presentation 9. Evaluation

7. Discussion
Session

4. Distribution of
User Manual

ddc form 5A4 - 58


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

The steps of the methodology are discussed as follows:

1.Orientation of the Course:

The trainers (one main trainer and one assistant trainer) from the Consultant will conduct
an orientation at the first step of the training. In this step, the trainers introduce
themselves with trainees and vice-versa. A brief description of the specific course will be
presented in this step. The trainers will also get primary idea on skills of trainees in this
interactive session.

2. Scope of the Course:

In this step, the trainer will describe the course contents and its scope of application. He/
she will also discuss on the upcoming training session so that a trainee can easily adapt
with the training.

3. Multimedia Presentation:

Here, the trainer will present a multimedia presentation according to the contents of the
course. This will be an interactive session between trainers and trainees. Almost all
contents of the course will be covered in this presentation. The presentation will be
prepared before starting training course by the Consultant.

4. Distribution of User Manual:

In this steps the trainers distribute the User Manuals prepared by the Consultant among
trainees. The trainer will discuss on organization of the User Manual and various
convention used in the manual.

5. Discussion through User Manual:

The trainer will present in depth discussion according to User Manual of specific training
course in this step.

6. Practice Session according to User Manual:

The Consultant will prepare the User Manual in such a way that it will represent all step-
by-step tasks of specific application that will help assist in practice session of the
training.

7. Discussion Session:

ddc form 5A4 - 59


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

In this step, Question- answers session will be held. The trainer will also discuss on the
critical issues of the course that will have observed during discussion through user
manual and practice session.

8. User Practice Session and Review:

In this step, trainee will operate the application based on training through practice
session. The trainers will observe and assist the trainees in this step. The trainer will
take a review session for the trainees based on observations during practice.

9. Evaluation:

The trainees will be evaluated by the trainers in this step.

Courses of Training

Detail courses of the training shall be as under.

1) Management Training:

- Presentation on the overall concept of the software system, and


its scope & benefits

- Introduction to software/database/web applications/security


concepts

- Hands on training on basic operating system functionality

- Demonstration on Operation of the developed software system

- Hands on training on how to use the software to extract MIS


report and use them as decision support or monitoring tools.

2. End User Training

- Presentation on the overall concept of the software system, and


its scope & benefits

- Demonstration on Operation of the developed software system

- Hands on training on specific area

- Operating system, internet browsing etc.

3) Technical Users Training:

- Database administration

ddc form 5A4 - 60


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

- Software administration

- Software trouble shooting

- Software error analysis and reporting

- Hardware trouble shooting

Sessions and Durations:

Sessions:

Management Training:

Sessions (No.): 04

Duration per Session (hr): 04

Trainees per Batch (No.): 10

End User Training:

Sessions (No.): 8

Duration per Session (hr): 04

Trainees per Batch (No.): 10

Technical Users Training

Sessions (No.): 10

Duration per Session (hr): 04

Trainees per Batch (No.): 10

Training Aid:

Computer, one for each trainee

Training manual

Video projector

Venue:

The consultant offers its training facility at DDC headquarter at 47, Mohakhali
Commercial Area, Dhaka 1212.

ddc form 5A4 - 61


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

TRAINING MATERIALS

Training materials are part and parcel of the training. The Consultant prepares the user
manual/ documentation/ online help in such a way that a user can easily understand its
contents and explore independently. It will be diagram and figure based so that a user
can easily understand. The Consultant will provide user manual/ documentation to
trainees during training session.

Following manuals/documentation/ online help shall be provided during training session


by the Consultant:

i) User Manual/ Documentation of RAJUK Application

ii) System Administration Manual

iii) Technical Documentation

iv) OS, Intenet browsing

v) Hardwaren network

vi) Quick Start Tutorial

vii) Online Help

viii) FAQ

Features of Manual/ Documents/ Online Help:

1) Quick Start Tutorial, Online Help and FAQ will be incorporated with the main
Application through maintaining standard help file conventions.

2) All types of documentation will also be provided in Portable Document Format


(PDF).

3) These will contain detail description and screen snaps of all functions of the
Application.

4) These will contain diagrammatic based step-by-step tasks of application.

User Manual/ Documentation of RAJUK Application:

User Manual/ Documentation is the part and parcel of the software development. It is
very necessary for application user. It represents the detail functionalities of the
developed application with diagrams. This manual will be distributed among trainees
during Application Training and System Administration Training.

ddc form 5A4 - 62


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Content of User Manual:

1. Introduction

1.1 Purpose

1.2 Document Conventions

1.3 Related Documents

1.4 Version and Copyright

1.5 Structure of the Document

2. Description of the System

2.1 Security and Privileges

2.1.1 Password Management

2.1.2 Module Access Control

2.2 Operations

2.2.7 Common Module

2.2.8 Search Engine

2.3 Data Archive

2.4 Data Verification

2.5 Audit Trail

2.6 Reporting

2.6.1 Formatted Reporting

2.6.2 Generic Reporting

2.7 Backup and recovery

3. Installation/ Configuration

3.1 Software Requirements

3.2 Hardware Requirements

3.3 Installation of the Application

3.4 Un-installation of the Application

ddc form 5A4 - 63


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

4. Trouble-shooting

5. Frequently Asked Questions (FAQ)

Appendix

A- Glossary

B- References

System Administration Manual:

This manual is designed considering RAJUK projects staff needs which will help them
run the system smoothly. The study of this manual will have eight distinctly different
parts: Data communication concept which covers the network terminology and
networking concept, MS Windows Server 2003 which covers administration part, Linux
with Redhat flavour and Cisco Router which covers router coniguration and Database
Administration. This manual will be distributed among trainees during System
Administration Training.

Contents of System Administration Manual

1. Introduction

1.1 Purpose

1.2 Document Conventions

1.3 Related Documentation

1.4 Version and Copyright

1.5 Structure of the Document

Part 1: Network Basics

2. Network Communications

2.1 Signals and Protocols

2.2 Local Area Networks and Wide Area Networks

2.3 Broadband and Baseband

2.4 Half-Duplex and Full-Duplex Communications

2.5 Segments and Backbones

ddc form 5A4 - 64


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

2.5 Client/Server and Peer-to-Peer Networking

3. The OSI Reference Model

3.1 Data Encapsulation

3.2 The Physical Layer

3.3 The Data-Link Layer

3.4 The Network Layer

3.5The Transport Layer

3.6 The Session Layer

3.7 The Presentation Layer

3.8 The Application Layer

Part2: Network Hardware

4. Network Cables

4.1 Cable Topologies

4.2 Cable Types

5. Connectivity

5.1 Hub

5.2 Bridging
5.3 Switching
5.4 Routing

Part 3: Networking Software

6. Network Operating Systems

6.1 Windows 2000 Server

6.2 Linux RedHat

7. Network Clients

7.1 Windows XP professional

Part 4: TCP/IP Fundamentals

ddc form 5A4 - 65


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

8. TCP/IP Protocols

9. IP Addressing

9.1 IP Address Assignments

9.2 IP Address Classes

9.3 Subnet Masking

9.4 IPv6 Addressing

Part 5: MS Windows Server 2003

10.Microsoft Windows 2003 File Systems

11. Installing and Configuring Microsoft Windows 2003 Server

12. Administering Microsoft Windows 2003 Server

13. Administering File Services/Server

14. Administering Print Services/Server

15. Reliability and Availability

Part 6 Linux Redhat

16. Linux File Systems

17. Installing and Configuring Linux RedHat Server

18. Administering Linux

19. Networking Setup in Linux

20. Reliability and Availability

Part 7 Cisco Router Configurations

21. Routing Fundamentals and Subnets

22. Introduction to Router

23. Configuring Router

Part 8 Database Administration

22. Installation/ Un-installation

23. Basic PL/SQL

ddc form 5A4 - 66


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

24. Oracle Net Configuration

25. Trigger, View and Stored Procedure

26. Database Export/Import and Migration

27. Session management

28. Recovery Policy

29. Authentication of Database Administrators and Users

30. Database Roles

31. Load Balancing

32. Database Backup

33. Audit Trail

34. Disaster Recovery

35. Real Application Clustering

36. Oracle Database Configuration Management

37. View Processes

38. Conclusion

Appendix

A- Glossary

B- References

Technical Documentation:

Technical documentation represents all technology related with the design and
development of the software. It presents all relationships in the database, detail class
design, user interface design, security interface etc. This manual will be distributed
among trainees during System Administration Training. This documentation will also
help maintain and expand RAJUK System in future.

Content of Technical Documentation:

7. Introduction

1.1 Purpose

ddc form 5A4 - 67


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

1.2 Document Conventions

1.3 Related Documentation

1.4 Version and Copyright

1.5 Structure of the Document

2. Overview of the System

3. Design of the System

3.1 User Interface Design

3.2 Database Design

3.3 Relationship

3.4 Class/ Object Design

3.5 Security Interface

3.6 Coding Conventions and Standards

3.7 Software and Hardware Requirements

4. Application Architecture

5. Technology Architecture

6. Quality Assurance

7. Setup and Deployment

8. Support and Maintenance

Appendix

A- Glossary

B- References

C- Data Dictionary

D- Source Code

Quick Start Tutorial:

Quick Start Tutorial is the guide for application user to be familiar with the main
functionality of application within short time. It is generally step wise learning process

ddc form 5A4 - 68


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

that helps user handle application. This online help will be built in with RAJUK
Application. This will be introduced in Application Training.

Contents of Quick Start Tutorial:

1. Introduction

1.1 Purpose

1.2 Organization of Tutorial

2. Quick Start Tutorial:

2.1 Name Clearance Module

2.2 Registration Module

2.3 Returns Filing Module

2.4 Issuance of Certified Copies Module

2.5 Voluntary Winding Up Module

2.6 Stuck Up Process Module

2.6 Common Module

2.7 Search Engine

3. Conclusion

Appendix

A- Glossary

B- References

On-line Help:

An on-line help would be incorporated with main application. It would provide detail
information and assistance to the users. It would be interactive and index based that one
can easily find out any topics.

Frequently Asked Questions (FAQ):

Frequently Asked Questions (FAQ) would be provided by the Consultant for the users of
the developed application. This online help will be built in with RAJUK Application. A
user can find his answer of a problem(s) easily from the given FAQ.

ddc form 5A4 - 69


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Conclusion

Training/ Transfer of knowledge is part and parcel of application development. Without


proper training, no developed application can be successfully implemented. To develop
skills of existing staffs, proper training is a must. In view of the previous chapter, the
Consultant hopes that through following aforementioned methodology, the staffs of
RAJUK will operate the developed system smoothly.

ddc form 5A4 - 70


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

2.5 Warranty & Maintenance Service

WARRANTY

SOFTWARE DEVELOPMENT PROJECTS ARE ALWAYS INVOLVED WITH A WARRANTY SERVICE PROGRAM FOR A

PERIOD (6 MONTHS IN THIS PROJECT), AFTER SUCCESSFUL COMPLETION AND INSTALLATION OF THE

SOFTWARE PRODUCT IN THE CLIENTS PREMISE.

MAINTENANCE SERVICE

AFTER THE WARRANTY PERIOD, DDC WILL PROVIDE TWO YEARS MAINTENANCE SERVICES THE SERVICE SHALL
INCLUDE –

• Identify and help to fix any hardware and LAN/WAN related problem within 24
hours

• Fix any software problem within 3 days

• Fix any security issues (including virus attacks) within 24 hours

• Maintain & recovery of data

• Assist the client to maintain and enhance the system through transfer of
knowledge

The following four (4) designated professionals shall provide the maintenance
service:

• System Administrator

• Programmer (LAM)

• Programmer (Web)

• Hardware/Network Engineer

Software Level Services

DDC maintains the IT professionals in its full time payroll as per policy, so that they
remain available whenever required for such services after successful completion and
commissioning.

Network and Hardware Services

ddc form 5A4 - 71


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

DDC owns a well equipped and sophisticated Hardware maintenance lab, located at the
11th floor of DDC Centre. The Lab has very sophisticated testing equipment and tools
such as Oscilloscope, Signal Generator, Frequency counter, EPROM Programmer,
Logic probe, Digital and Analog Multi-meter, Variac, Network Cable tester, Network
Crimper, Punching tools, and many other tools. Highly trained and experienced
professionals are engaged here to provide the best support and service instantly.

Hardware Engineers in work at DDC Hardware Lab


DDC has vast experience in maintenance of a wide variety of Computers, Laser, Color
Laser, Dot matrix, BubbleJet and InkJet printers, Plotters, Digitizers, Wide Format
Scanners, GIS Receiver, LCD Panel, Over head projector, Central ON-line UPS, Off-
line UPS, UBS as well as Local Area Network (LAN), Wide Area Network (WAN)
and Intranet.

DDC Computer center has its own 300 PCs, Servers, Plotters, Scanners, Digitizers,
Video Projectors and many other sophisticated types of equipment. DDC Hardware
centre is responsible for Design, Installation, Configuring, Troubleshooting and
Maintenance of the Local Area Network (LAN), Wide Area Network (WAN) and
Intranet of the 13 storied DDC Centre and its all project offices. Installation and
maintenance of central UPS & UBS, Voltage Stabilizer to provide more safe guard and
stable AC power.

They also provide the routine maintenance, trouble shooting, expanding of the network,
up gradation of Software and Hardware, maintaining the Back-up Server, Print Server,
DHCP Server, Application server and mail server.

ddc form 5A4 - 72


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

The Following Table Presents the Manpower in DDC Hardware Section:

Designation No. of Personnel

Senior Hardware Engineer 02

Assistant Hardware Engineer 03

Hardware Technician 02

The following table presents a list of IT projects/software projects with their


warranty/maintenance services periods where DDC successfully provided or is
providing such services.

Sl. Name of Project / Application Software Warranty Status


No. Period

1. Contract Package S1-CMMU: Baseline/Repeat Survey of Existing Health 1 Year Completed


and Family Welfare Facilities and Preparation of an Integrated GIS/MIS
Database Management Program under Health and Population Program
Project (HPPP), IDA Credit No. 3101-BD

2. S-2008: Establishment of a Table of Equipment 1 Year Ongoing


(TOE) for Different Category of Hospitals/Health
Services Institutions with Standard Specification
and Preparation of a Database under Health and
Population Sector Program Project , GOB
(HPSPP) - IDA Credit No. 3101-BD

3 Road Rehabilitation and Maintenance Project-3 - 2 Year Completed


Institutional Development Component (IDC-3)

4 Road Rehabilitation and Maintenance Project-2 - 2 Year Completed


Institutional Development Component (IDC-2)

5 Development Design Consultants Ltd. (DDC) 1 Year Completed


Hardware Management Information System

6 Development Design Consultants Ltd. (DDC) 2 Year Completed

ddc form 5A4 - 73


Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan

Sl. Name of Project / Application Software Warranty Status


No. Period

Payroll

7 Review and Revise LGED's Road Structure 1 Year Completed


Manual Project, Computerized selection of road
structure, bill of materials, material accounting,
drawings etc., CARE Bangladesh

8 Maintenance Management Information System 1 Year Completed


(MMIS) of Ministry of Food, Govt. of Bangladesh

ddc form 5A4 - 74

You might also like