CMGT 575: Request For Proposal

2592 Words11 Pages
Request for Proposal CMGT/575 Table of Contents 1. Introduction 4 1.1 Project Goals 4 1.2 Scope of Project 5 1.3 Time Constraints 5 1.4 Budget Constraints 6 2. Requirements 6 2.1 Technical 6 2.1.1 Hardware 6 2.1.2 Operating Systems 7 2.1.3 Networking 7 2.1.4 Application Software 8 2.1.5 Scalability 8 2.1.6 Availability and Reliability 9 2.1.7 Maintenance 9 2.1.8 Disaster Recovery 10 2.2 Training and Documentation 10 2.3 Installation Issues 10 2.4 Costs 11 3. Administrative Information 11 3.1 How to Apply 11 3.2 Confidentiality 12 3.3 References 12 3.4 How to Get Clarification 12 3.5 Decision Schedule 12 References 13 1. Introduction Defense Communications Services…show more content…
Each of servers will have 32 gigabytes of memory with dual Intel Xeon Processors. The server will have 12 1.2 terabyte hard discs and two dual-channel 10 Gbps network controllers. Each server will have dual-power supplies. One power supply will plug directly into a prime power generator and the other plugs into an APC power supply mounted inside the cage. Inside the cage a Cisco 6500 Series with a WS-X6816-10G-2TXL (Cisco Systems, 2012) fiber controller is needed. This is a 16-port fiber controller that will facilitate the high-speed data transfer over the internal network from switch to switch. In addition to this there is a need for 36 Cisco SPF-10G-SR modules to connect the fiber cable to the switches at both ends and to the servers. 3.1.2 Operating Systems The main operating system will be Windows Server 2012 Enterprise edition (Microsoft Inc, 2013). The operating system was chosen because it is an industry standard. This system is designed for multiple users without developing a serious effect on the performance of the operating system. This software package is backward compatible with other operating systems and allows the ability to stay current with technology and security within the operating system while removing worry about the software becoming outdated in the near future. 3.1.3…show more content…
The second software is the operating system installed over the encrypted drives to provide a base for the file services installation. Third is the encryption of the file system on government servers through the utilization of propriety software distributed from the National Security Agency (Reuvers & Simons, 2013), replicated to the servers joining the specified domain for individual organization. Security software for civilian servers is obtained from corporate offices and installed via scripting during the joining of the server to the

More about CMGT 575: Request For Proposal

Open Document