Professional Documents
Culture Documents
Form 5a4 Rajuk
Form 5a4 Rajuk
On the other hand, the valuable documents may get eroded with time and as the
number of processing increases.
To avoid such inconveniencies of searching file documents and the risk of damage
or loss of valuable documents, RAJUK undertakes this project of computerized
digital archival of files of Gulshan, Banani and Baridhara model town.
• Reduce document searching time and thus Increase the business processing
efficiency of RAJUK
Technical Proposal Form 5A4
Digital Archiving of Files, RAJUK Methodology & Work Plan
• Allow online access to the archived documents from local as well as remote
office(s), thus increase the business processing efficiency
iii. Scanning & Data Entry: Scan pages & maps/plans of the files and
enter files’ information, such as, file reference, plot/flat information,
allotment/transfer date, allotee/transferee information, mutation
information, payment information etc. of Gulshan, Banani and
Baridhara model town of estate department:
- Per file contents (ave): Legal or less size page - 300 nos.
Consultant’s Project Office: The consultant has a well established ICT lab at its
head quarter at 47 Mohakhali commercial area equipped with computers, servers,
network, peripherals and industry standard software. The consultant proposes to
establish the consultant’s project office for the assignment in the said ICT lab
wherefrom management, design and development of systems will be carried out.
The consultant offers to provide 2000 sft of furnished office space with utility services
for the project.
Peon 1 no.
System Analysis and Need Assessment: This is the vital step of the development
life cycle. At this stage the user requirements will be identified and listed, and the
system requirements will be derived based on the user requirements. The objective
of this phase is to identify business need, establish the type of problem, and define
client quality requirement, resource and products of any present information system,
present reporting system and the constraint of the system. Consultant will interview
all concerned persons. All information will be recorded, analyzed to assess the
requirements.
The scope of the project is to design & develop a Customized Web Enabled
Application Software for digital archival/management of the files information
(scanned pages & entered data) of plots/flats of Gulshan, Banani and Baridhara
model towns of the estate department.
During this requirement assessment stage, the consultant shall study & analyze the
files to identity database management fields required to generate custom reports,
call and view/print any stored scanned document. etc. Examples of such fields (but
not exhaustive) are presented hereunder:
Transferee Name
Transferee Father’s
Name
Etc.
Another deliverable of this phase is the definition of the system test plan. In fact,
during system testing, the system is expected to be tested against its requirements.
Therefore, the way this will eventually be done may be agreed upon with the clients
at this stage and documented along with the requirements specification document.
This phase is the most critical one, because the other phases depend on it. If there is
any mistake in this phase, it will continue and increase in the remaining phases
geometrically. So, it is the key point to success of the project. This phase will cover
the following tasks:
2. Analyzing the existing manual and/or computer systems that are used,
or to be used for the management.
3. Analyze the existing data to encounter all reports and data storage that
are necessary.
Design & Develop the Database: Here a relational database management system
(RDBMS) is a must. So proper design and development of RDBMS can ensure the
feasibility study as it is the storehouse of information.
First of all, flow of data through the system will be studied by Data Flow Diagram
considering where and how data is originated, processed and where it goes. Then
key data codification is designed in such a fashion that it can be handled maintaining
proper integrity, security and speed as it is the part and parcel in designing database.
Database design can be performed manually or by some CASE tools (Computer
Aided Software Engineering) like Oracle Designer etc. Then design format will be
implemented and developed using Oracle 10g Database Server. It provides an
unbounded, easy to use, scalable and manageable solution for high quality
heterogeneous database. It also delivers performance, scalability, availability
necessary to support very large Data Base (VLDB) and mission critical application in
a concurrent multi user environment. Here in this phase ‘Normalization’ processes
are to be applied for elimination of redundant and repeating data using Entity
Relationship Diagram (ERD). This phase will cover the following tasks:
7. Checking the design and according to the design develop the database.
To make zero data loss due to database server hardware failure, Oracle Clustering
RAC (Real Application Clustering) is one of the best tools to be used.
Design and Develop the Business Logic : During the designing period, proper
data validation, hierarchical security, privileges and access over modules should be
maintained.
Design & Develop Data Input Forms: The data entry forms are user interfaces,
which will be used for adding, modifying, viewing and deleting data or information.
These forms are designed and developed according to the need assessments and
management policies of the client. In some case reengineering of input/output forms
for computerization, some time, is needed.
Sample Data Entry: After developing the input interface some sample data are
necessary to test them and test the reports that are to be developed in the latter
phase. The data should be inputted during the Forms development. It will serve both
testing of interfaces and loading of actual data.
Design & Develop Reports: Charts are the user interfaces that the user will use to
know information and/or print it. For testing them sample data are necessary that will
come from the prior phase. The reports will be designed and developed according to
the Need Assessment. User requirements for reporting will be mapped accordingly.
All reports and charts will be generic and dynamic having multiple options so that
one report can be viewed in various formats. Report writer facilities are to be
incorporated in the software so that custom reports can be generated.
Testing & Debugging: In this phase the problems with the software developed
and/or its components are identified and removed using five test levels. These levels
are 1. Unit Test
2. System Test
3. Peakload Test
4. Performance Test
5. Procedure Test
6. Software Q A Testing
Unit Test: Unit test goes throughout the development and also at the end of coding.
It tests all the separate progress to find weather they are performing accurately or
not.
System Test: System testing does not only test the software but it also tests the
integration of each module of the system. Programmers test the whole system with
different data; they check all List of Values (LOV), data integrity from other module.
Peak load Test: In this test the system is strained to it’s maximum capability by
keeping all the terminals of the system active at the same time.
Performance Test: In this test the response time of inquiry is tested when the
system is fully loaded with operating data. Generally the length of the time systems
used by the system to process, transaction data is judged by the performance test.
The software faults occur through the following process. A programmer makes an
error (mistake), which results in a defect (fault, bug) in the software source code. If
this defect is executed, in certain situations the system will produce wrong results,
causing a failure. Not all defects will necessarily result in failures. For example,
defects in a dead code will never result in failures. A defect can turn into a failure
when the environment is changed. Examples of these changes in environment include
the software being run on a new hardware platform, alterations in source data or
interacting with different software.
A problem with software testing is that testing all combinations of inputs and
preconditions is not feasible when testing anything other than a simple product. This
means that the number of defects in a software product can be very large and defects
that occur infrequently are difficult to find in testing. More significantly,
parafunctional dimensions of quality--for example, usability, scalability,
performance, compatibility, reliability--can be highly subjective; something that
constitutes sufficient value to one person may be intolerable to another.
User Acceptance Testing (UAT): The test procedures that lead to formal
'acceptance' of new or changed systems. User Acceptance Testing is a critical phase
of any 'systems' project and requires significant participation by the 'End Users'. To
be of real use, an Acceptance Test Plan should be developed in order to plan
precisely, and in detail, the means by which 'Acceptance' will be achieved. The final
part of the UAT can also include a parallel run to prove the system against the current
system.
The User Acceptance Test Plan will vary from system to system but, in general, the
testing should be planned in order to provide a realistic and adequate exposure of the
system to all reasonably expected events. The testing can be based upon the User
Requirements Specification to which the system should conform.
As in any system though, problems will arise and it is important to have determined what will
be the expected and required responses from the various parties concerned; including Users;
Project Team; Vendors and possibly Consultants / Contractors.
The overall system development life cycle (SDLC) is depicted in the following
diagram.
The overall system development life cycle (SDLC) is depicted in the following
diagram.
It is important to note that during deployment user may change many procedure and
functions that are important for their practical uses which are unknowingly or
unintentionally missed during system study.
APPLICATION ARCHITECTURE
The user interface will be developed in such a fashion that a user (who may have no
technical knowledge about database or may be novice in computer literacy) can
operate and navigate the application easily, comfortably and smoothly. The
application will include varieties of modular forms. A typical user interface for this
concerned project is described below.
Skeleton of the User Interface: Application gallery will be the home page of the
application. It will comprise three modules
Application Gallery
(Home Page)
Security and Privileges Password Management
(Highly Restricted) Module Access Control
Name Clearance
Operations Registration
(Data Entry and Modification)
Return Filing
Issues of Certified Copy
Payment
Audit Trail
Audit-trail
A Long List of
Reporting Formatted Reports
(Printable Formatted Output)
Parameterized and
Customizable Generic Reports
1. Security and Privileges: An administrator can control the security of the hole
system using this module. Only the administrator of the system can access to this
module using password. From this module administrator will create new user and
can control security and privileges of his users. The Administrator will decide which
user will get which type of privileges on which modules setting behind the screen.
Since the Administrator can exercise the supreme power, only trusted person should
be appointed as an administrative user. In this module, the administrator can change
everyone's password. Not only have that, he can controlled access in any module for
any user. Say he wants that user 1 can only access personal information module and
nowhere. Not only that, he can restrict this user as read only user giving only 'Can
Select' privilege on that module
Also there are several privileges which may be assigned to the above users on a
particular module by the administrator. These privileges are …
i) Can Select
4. Audit Trail: Whenever a user log on into the application all sort of operations (say,
insert, update, delete, entry time, exit time etc.) will be recorded internally without
informing the connected user. Only super user can check and view all sort of
occurrences made by the users. If any user tries to do something wrong, of course,
he will be identified and captured by the administrator. Audit Trail is such kind of
module where the above things are maintained properly.
Web Portal:
The website will be developed by HTML, XML and with server side language PHP,
PSP. It will retrieve data from the central database. In some cases it may retrieve
data even from local database of Field Offices also.
Features:
• All software tasks should utilize less than 80% of the available processor cycles.
• At least 100 concurrent users support by the system for internet application and
for the website support at least 10,000 concurrent users.
• It is preferable for pages that its size should not exceed 100 kilobytes (KB).
• Home pages should be less than 40 kilobytes in size since this will ensure that in
most circumstances its load time will be less than 10 seconds.
• Links on a site should be always checked that they are functioning properly or
not. While it is inevitable that there will always be some broken links on a site of
any significant size, the percentage of links that are broken should be kept to a
minimum, ideally less than 1-2%.
• Website should operate with all W3C standards compliant browsers and should
be checked with both graphics based browsers currently in use.
• Websites should function fully with both Fire Fox and Internet Explorer browsers
at least one generation earlier than what is currently available.
• Search performance depends on speed of returning results, the time between the
user clicking the submit button and the page of results being fully displayed on
the client’s screen.
• Session Timeout depends on the user activity. If there is no user activity it should
be expired within 5 minutes.
This dynamic website will contain general information along with some advance
sections like online query, latest status of plot or flat etc. The web site will also have
a search engine. This website will have the following sections:
Solution Architecture-Network
Communication Infrastructure
2. All sorts of data will communicate in the LAN and WAN maintaining
TCP/IP protocol.
4. Whenever a local server will send the data to central database server,
they will send data in encrypted format so that the sent data will never be
hacked.
5. The incoming data will be decrypted when the data will be inserted into
the central database server.
6. The local database server will be under LAN / WAN, directly link with
local ISP using DSL modem or link up with dial up telephone using
modem.
7. The total intranet (field offices) will be acted as VPN (Virtual Private
Network).
8. The central information of the central database will be hosted to the ISP.
Public from the Internet, will access only the information, which will reside
in the central server.
11. It is not the mandatory to make the whole network 100% uptime as data
synchronization will occur between local server and central server after a
certain amount of time.
Internet
Field Office -1
RAJUK Database
Field Offiece -2
Fig: Possible Network Diagram showing connectivity between field offices with
central database through Web.
IS P
rk
two
Ne
Area
de
Wi
Lo ca l A re a N etw ork
IS P
rk
P rinte r two
P rin t S e rv er W eb S erv e r Ne
rea
A
W ide
R A JU K O ffice
D a ta b a s e S e rv e r R o u te rF ire w a l l D S L M o d e m
R
L o c a l A re a N e tw o rk
B a c k u p S e rv e r P ri n te r
Services/Servers/OS
• Active Directory
Application Mode (ADAM) is now available for download. Organizations,
independent software vendors, and developers who want to integrate their
applications with a directory service now have an additional capability within
Active Directory that provides numerous benefits.
• Remote Control is a
small add-on that adds the option to right-click a computer account in the Active
Directory MMC and choose Remote Control on that computer by opening a
Terminal/Remote Desktop connection to that computer.
• Microsoft Software
Update Services (SUS) enables administrators to deploy critical updates to
Windows 2000–based, Windows XP, and Windows Server 2003 computers.
• Microsoft Windows
Rights Management Services (RMS) for Windows Server 2003 is information
protection technology that works with RMS-enabled applications to help
safeguard digital information from unauthorized use—both online and offline,
inside and outside of the firewall.
• In order to run
applications that provides functionality based on Windows RMS technologies
and to develop with the RMS SDKs, download the Windows RMS client.
• Windows SharePoint
Services is now available to help teams start creating Web sites for their
information sharing and document collaboration needs.
• Windows System
Resource Manager (WSRM) is available for use with Windows Server 2003,
Enterprise Edition and Datacenter Edition. WSRM provides resource
management and enables the allocation of resources among multiple
applications based on business priorities.
The following section outlines a few of the major new features in Red Hat
Enterprise Linux v.4 Update:
Red Hat Enterprise Linux v.4 Update provides the most stable and robust
commercial product based on the Linux community's 2.6.9 kernel. Open source
projects such as Fedora provided an environment for the Linux 2.6 kernel to
mature significantly during 2004. As a result, the Red Hat Enterprise Linux v.4
• Read Copy Update: SMP algorithm optimization for operating system data
structures.
• Enhanced SMP & NUMA support: Improved performance and scalability for
large servers.
Numerous enhancements have been incorporated into Red Hat Enterprise Linux
v.4 that improves the scalability and performance of the data storage
subsystems, including:
• Ext3 scalability: Dynamic file system expansion and file system sizes up to
8TB are now supported.
• Cost reduction: Support for Serial ATA disk storage provides increased
performance, higher densities, and reduced cost per megabyte over traditional
IDE devices.
MISCELLANEOUS FEATURES
As a major new release, almost every aspect of Red Hat Enterprise Linux has
been enhanced. Some of the more important improvements:
• Compatibility with prior releases: Red Hat Enterprise Linux v.4 includes
compatibility libraries that enable most v.3 and v.2.1 applications to continue to
run without modification.
• Advanced configuration and power interface: Support for the ACPI standard
enables a wide range of power management capabilities (battery monitoring,
automated power down, suspend), and provides a foundation for increasingly
sophisticated features in the future.
Extras: Optional software is provided on the Red Hat Enterprise Linux Extras CD
and Red Hat Network channel. This includes features such as additional desktop
applications (e.g. Adobe Reader, Macromedia Flash), Java environments, and
printroom-quality Agfa/Monotype fonts.
Security is a part of every network job, whether there is confidential data stored
on computers that must be protected or vital operating system and application
files that must be protected from deletion by users. There are various
mechanisms used to provide security on a network because different types of
protection are needed.
System Monitoring
• Configure SMS to
receive Simple Network Management Protocol (SNMP) traps and store these
traps in the database
Password Protection
• For passwords to be an
effective means of protecting network resources, users and administrators must
select suitable passwords.
• Effective passwords
should be at least five or six characters long and use a combination of uppercase
and lowercase letters, numbers, and symbols.
• Users should be
compelled to change their passwords at regular intervals and should not be
allowed to use the same few passwords repeatedly.
Security Models
• Client/server networks
store authentication data in a central database, whereas each computer on a
peer-to-peer network maintains its own security information.
• User-level security is
based on individual accounts created for each user on the network. To grant
users access to network resources, we select their account names from the user
list and specify the permissions we want to grant them.
• Share-level security
assigns passwords to specific network resources. Everyone on the network uses
the same password to access a resource.
Firewalls
• Firewalls protect
networks from outside interference by using a variety of techniques to limit the
traffic passing between the internal network and the Internet.
• Packet filtering is a
technique in which a router determines whether to allow network access to each
packet based on the contents of its protocol headers.
• Network address
translation enables the computers on a private network to use unregistered IP
addresses and still access the Internet normally through a special router that
modifies the contents of the IP header in each packet.
Security Protocols
• Layer 2 Tunneling
Protocol creates tunnels for VPNs that can be encrypted using IPSec.
• Kerberos is an
authentication protocol used by directory services to provide clients with single
logon access to network resources.
Organization relies heavily on their computers, and once the computers are
networked, they come to rely on those network communications as well.
Data Backup
The Backup utility helps us protect data from accidental loss if our system
experiences hardware or storage media failure. For example, we can use
Backup to create a duplicate copy of the data on our hard disk and then archive
the data on another storage device such as a hard disk or a tape. If the original
data on our hard disk is accidentally erased or overwritten, or becomes
inaccessible because of a hard disk malfunction, We can easily restore the data
from the archived copy.
• Restore the archived files and folders to our hard disk or any other disk
we can access.
• Make a copy of any Remote Storage data and any data stored in mounted
drives.
TYPES OF BACKUP
The Backup utility supports five methods of backing up data on our computer or
network.
COPY BACKUP
A copy backup copies all selected files but does not mark each file as having
been backed up (in other words, the archive attribute is not cleared). Copying is
useful if we want to back up files between normal and incremental backups
because copying does not affect these other backup operations.
Daily backup
A daily backup copies all selected files that have been modified the day the daily
backup is performed. The backed-up files are not marked as having been
backed up (in other words, the archive attribute is not cleared).
Differential backup
Differential backup copies files created or changed since the last normal or
incremental backup. It does not mark files as having been backed up (in other
words, the archive attribute is not cleared). If we are performing a combination of
normal and differential backups, restoring files and folders requires that we have
the last normal as well as the last differential backup.
Incremental backup
An incremental backup backs up only those files created or changed since the
last normal or incremental backup. It marks files as having been backed up (in
other words, the archive attribute is cleared). If we use a combination of normal
and incremental backups, we will need to have the last normal backup set as
well as all incremental backup sets in order to restore our data.
Normal backup
A normal backup copies all selected files and marks each file as having been
backed up (in other words, the archive attribute is cleared). With normal
backups, we need only the most recent copy of the backup file or tape to restore
all of the files. We usually perform a normal backup the first time we create a
backup set.
Data Availability
RAJUK must have their data available all the time to function. If a drive on a
server fails, the data should be responsible from a backup, but the time lost
replacing the drive and restoring the data can mean lost productivity that costs
the company dearly. To provide a higher degree of data availability, there are a
variety of hardware technologies that worked in different ways to ensure that
network data is continuously accessible.
RAID 1
Provides fault tolerance by maintaining duplicate copies of all data on two drives.
Disk mirroring uses two drives connected to the same host adapter and disk
duplexing uses two drives connected to different host adapters.
RAID 5
Both data and parity information are written across all disks in stripes to provide
full data recoverability in case any single drive fails. Disk striping with parity is an
excellent way to protect data from the downtime caused by disk failures. RAID 5
requires a minimum of three disks and is supported by Windows NT Server,
Windows 2000 Server and Linux.
Server Availability
Server fault tolerance is to have more than one server, and there are various
solutions available that enable multiple computers to operate as one, so that if
one server should fail, another can immediately take its place.
Clustering
Any technology that allows one device to take over for a similar device that has
failed. An example of a system that takes advantage of failover technology is
clustering. Failover is also often used to ensure that a break in a communication
line doesn’t cause a break in communication between networked systems.
Windows 2003 Advance Server and Linux support it.
Security
- Antivirus server will protect data from the viruses and worms
- Controlling access to the sensitive data from unauthorized users
- Internet access for authorized employees
Threats
Total effort hours Large project > 5000 Small project < 1000 hours
hours
Project team and client Neither the project team Both the project team and
business knowledge nor the client have solid the client have solid
business knowledge business knowledge
client to define
Vendor partnership Have not worked with the Have a good relationship
vendor before with the vendor
Level of Risk
Once risks have been identified, there are a number of options that the project
manager might consider for responses.
Leave it. In this approach, the project manager looks at the impact the risk
condition would have on the project and decides that nothing needs to be done
to mitigate the risk. This approach should only be used for low impact risks or
those that are unlikely to occur. This approach is dangerous for high and
medium risks.
Monitor the risk. In this case, the project manager does not proactively
mitigate the risk, but monitors it to see whether it is more or less likely to occur
as time goes on. If it looks more likely to occur, the team must formulate a
different response at a later time. This approach can work for serious risks that
are not likely to occur. Rather than put a plan in place immediately, the project
manager creates a plan only if it looks likely that the risk will occur. The
advantage is that scarce resources are expended only on those risks that are
likely to occur. The disadvantage is that the delay in addressing the risk might
make it less likely that the risk can be successfully mitigated in the future.
Avoid the risk. Avoiding the risk means that the condition that is causing the
problem is eliminated. For instance, if a part of the project has high risk
associated with it, then the whole part of the project is eliminated. Risks
associated with a particular vendor might be avoided if another vendor is used
instead. This is a very effective way to eliminate risks but obviously can be
used only in certain unique circumstances.
Move the risk. In some instances, the responsibility for managing a risk can be
removed from the project by assigning the risk to another entity or third party.
For instance, installation risks might be eliminated by outsourcing this function
to a third party. The third party might have particular expertise that allows them
to do the work without the risk. Even if the risk is still present, it now is up to
another party to resolve.
Mitigate the risk. In most cases, this is the approach to take. Usually proactive
steps must be taken if a risk has been identified to ensure that the risk does not
occur. Another of the goals of mitigation is to ensure that the effect (impact) of
the risk is minimized if it does occur.
The objective of testing is to reduce the risks inherent in the computer systems.
The strategy must address the risks and present a process that can reduce
those risks. Four steps will be followed to develop a customized test strategy
for this project:
• Select and rank the test factors: In conjunction with the clients/key
users of the system, Quality Assurance team will select and rank the key
test factors. The following work paper is used to select and rank test
factor/risk:
1. Accuracy
2. Access Control
3. File Integrity
4. Authorization
5. Compliance
6. Portability
7. Ease of Use
8. Reliability
9. Performance
12. Processing
Continuity
13.
14.
15.
Test
Factors
Factor or
Risks
Test
Concerns
• Place risks in the matrix: The risk team determines the test phases in
which the risk needs to be addressed by the test team, and the test factor
to which the risk is associated.
Testing Methodology
To ensure better quality, testing will be performed in every phase of the entire
Software Development Life Cycle. The following table shows the testing
process that explains how testing and verification activities will be performed in
each phase:
_ Main system will be located at RAJUK head office with some computing
facilities at local field offices.
- All the computer of RAJUK office will be connected with LAN while Field
offices will be connected with WAN/MAN
- Data entry and scanning will be off line. Later on through script having
validation and consistency checking process those data and scan document
will be loaded into the database
- After operationalize the complete systems data entry and scanning may
be done on line.
After real system analysis and systems design these hardware specification
may change
OUTPUT INVERTER
OUTPUT INVERTER VOLTAGE :1 PH
230V (220/240V SETTABLE) TOLERANCE
(STABLE CONDITION) :< 1% TOTAL
HARMONIC DISTORTION ON LINEAR
LOAD :<1% ON NON LINEAR LOAD :<
3% FREQUENCY :50 - 60 HZ FREE
RUNNING OUTPUT FREQUENCY
ACCURACY :+/- 0.1% ACCEPTABLE
OVERLOAD 1 MN: :150% 10 MN; :125%
DEGREE OF PROTECTION :IP 21
(COMPLYING WITH IEC 60529)
ACCEPTABLE CREST FACTOR
WITHOUT DOWNGRADING :UP TO 3
(COMPLYING WITH IEC62040-3)
OVERALL EFFICIENCY :92% ECO-MODE
EFFICIENCY :98% EFFICIENCY IN
ALWAYS – ON MODE :96% TRANSFER
TIME :0 (ZERO) MILLISECOND
CURRENT WAVEFORM :100% PURE
SINE WAVE AUDIBLE NOISE (ISO
3746) :<50-DB BATTERY :100% SEALED
MAINTENANCE FREE LEAD ACID VFI-
SS-111 (IEC62040-3) ON LINE DOUBLE
CONNECTOR
BRAND/MODEL :
AMP/PANDUIT/AVAYA
CATEGORY : CAT-6
TYPE : RJ45
DROP/PATCH CABLE 40
(Assuming)
BRAND/MODEL :
AMP/PANDUIT/AVAYA
CATEGORY : CAT-6 ((3 meter))
COLOR : YELLOW
PATCH CABLE 40
(Assuming)
WALL PLATE 30
(Assuming)
BRAND/MODEL : PANDUIT/AVAYA
CATEGORY : 2 PORT KEYSTONE WALL
PLATE (RJ45 COMPATIABLE)
COLOR : BLUE and WHITE
21 UPS APC/ Any APC APC Smart-UPS, 1980 Watts / 2200 VA, 04
(Online) Reputed Smart-UPS Input 230V / Output 230V, Interface Port DB- (Assuming)
for Brand 2200VA 9 RS-232, Smart Slot, USB, Rack Height 2 U
Commun USB and Power Protection Type: Rack mount UPS
ication Serial RM Battery Backup
Rack 2U 230V/ Frequency: 50Hz +/- 3 Hz (auto sensing)
Latest Waveform Type: Sine Wave
Model Typical Backup Time at Half Load: 30 minute
Typical Backup Time at Full Load: 15 minute
DOCUMENTATION PLAN
The following documents will be given before the authority in different stages of
the project.
A user manual will be prepared in such a way so that a novice user can learn
easily and operate the application without any technical knowledge. User
manual will focus the A to Z of the application.
Technical Documentation
Online Help
the user where a user can easily find any topic. It will be developed according
to the international standard like famous industry standard software.
FAQ
Operation Venue: Considering security of the files and their contents, the consultant
would carry out scanning & data entry operation in RAJUK premise. RAJUK would
provide such office space and utility services (electricity, air conditioner, toilets etc.)
free of cost.
File Movement Register: The consultant would maintain File Movement Register in
duplicate, one with the consultant and another with RAJUK duly signed by the
counterpart to track & ensure security of the files.
The consultant would take care that no file/document is taken out from the operation
room.
Logistics: Consultant would provide the necessary logistics needed for scanning
and data entry operation. The following logistics will be provided for the project
period on rental basis:
Network. 1 lot
The consultant would take back the non-consumable logistics after the operation is
over.
Scanners: Task of scanning constitutes a major part of the assignment. Quality &
rate of scanning shall highly influence the appropriateness & time of completion of
the project. The consultant would deploy two types of scanners, one for legal or
smaller sizes pages and the other for A0 size maps/plans. In addition to others, the
scanners shall have the following technical features:
For convenience of operation, scanning and data entry of one file would be
done by a single person.
• Scanning & Data Entry Supervisor, responsible for online checking and
ensure quality & completeness of data entry & scanning
Support Staff: The consultant shall provide support office staff for data entry and
scanning as under:
• Peon 1 no.
Prior to start scanning & data entry operation, Sr. professionals of the consultant
would impart orientation training to all Scanning & Data Entry Team members
Design & Develop Software for Scanning & Data Entry: The sub-task involves –
• Naming documents
The consultant proposes to quickly develop the software with Oracle developer 6i.
Detail methodology of software development has been delineated in Section 2.1.
Software professionals headed by the Database Specialist shall implement the sub-
task.
The sub-task will be completed within one (1) month of contract signing.
Setup Computing Infrastructure for Scanning & Data Entry: The sub-task
involves –
• Install & test the software for Scanning & Data Entry
The sub-task will be completed within one (1) month of contract signing.
Conduct Orientation Training to All Scanning & Data Entry Team Members: All
the members of Scanning & Data Entry Team shall undergo an orientation course on
the scope, team, procedure, responsibility, security, quality assurance etc. of the
scanning & data entry process, They shall scan and enter data on test basis and
may suggest any changes/improvement on the software
• Receiving files from RAJUK putting proper entry in the file movement
registers, then sorting the documents of each file by record category (for
definition please see Section 2.3) and handing over the files to the Scanning
& Data Entry operators. One complete file will be given to one operator only
• Scanning & data entry of documents in accordance with the scanning & data
entry interface of the software
Bound books bar the use of ADF leaving flatbed scanning option.
The Scanning & Data Entry Operators will be responsible for the sub-task.
On Line Checking: The Scanning & Data Entry Supervisors shall online check the
quality and completeness of digitization and does the necessary editing/entry as
required.
Backup: The In-Charge of Scanning & Data Entry shall take backup of digitized
documents in CD/DVD at regular interval
For deployment and commissioning of systems the following tasks are to be done:
i. Set environment for hardware, network etc. specially A/C, backup power supply,
UPS etc.
ii. Install & configure the network wiring and network accessories
Types of Training: The consultant will impart the following trainings to RAJUK
officials:
1. Orientation of
the Course
5. Discussion
through User
Manual
2. Scope of 8. User
the Course Practice
Session and
Review
6. Practice
Session
according to
User Manual
3. Multimedia
Presentation 9. Evaluation
7. Discussion
Session
4. Distribution of
User Manual
The trainers (one main trainer and one assistant trainer) from the Consultant will conduct
an orientation at the first step of the training. In this step, the trainers introduce
themselves with trainees and vice-versa. A brief description of the specific course will be
presented in this step. The trainers will also get primary idea on skills of trainees in this
interactive session.
In this step, the trainer will describe the course contents and its scope of application. He/
she will also discuss on the upcoming training session so that a trainee can easily adapt
with the training.
3. Multimedia Presentation:
Here, the trainer will present a multimedia presentation according to the contents of the
course. This will be an interactive session between trainers and trainees. Almost all
contents of the course will be covered in this presentation. The presentation will be
prepared before starting training course by the Consultant.
In this steps the trainers distribute the User Manuals prepared by the Consultant among
trainees. The trainer will discuss on organization of the User Manual and various
convention used in the manual.
The trainer will present in depth discussion according to User Manual of specific training
course in this step.
The Consultant will prepare the User Manual in such a way that it will represent all step-
by-step tasks of specific application that will help assist in practice session of the
training.
7. Discussion Session:
In this step, Question- answers session will be held. The trainer will also discuss on the
critical issues of the course that will have observed during discussion through user
manual and practice session.
In this step, trainee will operate the application based on training through practice
session. The trainers will observe and assist the trainees in this step. The trainer will
take a review session for the trainees based on observations during practice.
9. Evaluation:
Courses of Training
1) Management Training:
- Database administration
- Software administration
Sessions:
Management Training:
Sessions (No.): 04
Sessions (No.): 8
Sessions (No.): 10
Training Aid:
Training manual
Video projector
Venue:
The consultant offers its training facility at DDC headquarter at 47, Mohakhali
Commercial Area, Dhaka 1212.
TRAINING MATERIALS
Training materials are part and parcel of the training. The Consultant prepares the user
manual/ documentation/ online help in such a way that a user can easily understand its
contents and explore independently. It will be diagram and figure based so that a user
can easily understand. The Consultant will provide user manual/ documentation to
trainees during training session.
v) Hardwaren network
viii) FAQ
1) Quick Start Tutorial, Online Help and FAQ will be incorporated with the main
Application through maintaining standard help file conventions.
3) These will contain detail description and screen snaps of all functions of the
Application.
User Manual/ Documentation is the part and parcel of the software development. It is
very necessary for application user. It represents the detail functionalities of the
developed application with diagrams. This manual will be distributed among trainees
during Application Training and System Administration Training.
1. Introduction
1.1 Purpose
2.2 Operations
2.6 Reporting
3. Installation/ Configuration
4. Trouble-shooting
Appendix
A- Glossary
B- References
This manual is designed considering RAJUK projects staff needs which will help them
run the system smoothly. The study of this manual will have eight distinctly different
parts: Data communication concept which covers the network terminology and
networking concept, MS Windows Server 2003 which covers administration part, Linux
with Redhat flavour and Cisco Router which covers router coniguration and Database
Administration. This manual will be distributed among trainees during System
Administration Training.
1. Introduction
1.1 Purpose
2. Network Communications
4. Network Cables
5. Connectivity
5.1 Hub
5.2 Bridging
5.3 Switching
5.4 Routing
7. Network Clients
8. TCP/IP Protocols
9. IP Addressing
38. Conclusion
Appendix
A- Glossary
B- References
Technical Documentation:
Technical documentation represents all technology related with the design and
development of the software. It presents all relationships in the database, detail class
design, user interface design, security interface etc. This manual will be distributed
among trainees during System Administration Training. This documentation will also
help maintain and expand RAJUK System in future.
7. Introduction
1.1 Purpose
3.3 Relationship
4. Application Architecture
5. Technology Architecture
6. Quality Assurance
Appendix
A- Glossary
B- References
C- Data Dictionary
D- Source Code
Quick Start Tutorial is the guide for application user to be familiar with the main
functionality of application within short time. It is generally step wise learning process
that helps user handle application. This online help will be built in with RAJUK
Application. This will be introduced in Application Training.
1. Introduction
1.1 Purpose
3. Conclusion
Appendix
A- Glossary
B- References
On-line Help:
An on-line help would be incorporated with main application. It would provide detail
information and assistance to the users. It would be interactive and index based that one
can easily find out any topics.
Frequently Asked Questions (FAQ) would be provided by the Consultant for the users of
the developed application. This online help will be built in with RAJUK Application. A
user can find his answer of a problem(s) easily from the given FAQ.
Conclusion
WARRANTY
SOFTWARE DEVELOPMENT PROJECTS ARE ALWAYS INVOLVED WITH A WARRANTY SERVICE PROGRAM FOR A
PERIOD (6 MONTHS IN THIS PROJECT), AFTER SUCCESSFUL COMPLETION AND INSTALLATION OF THE
MAINTENANCE SERVICE
AFTER THE WARRANTY PERIOD, DDC WILL PROVIDE TWO YEARS MAINTENANCE SERVICES THE SERVICE SHALL
INCLUDE –
• Identify and help to fix any hardware and LAN/WAN related problem within 24
hours
• Assist the client to maintain and enhance the system through transfer of
knowledge
The following four (4) designated professionals shall provide the maintenance
service:
• System Administrator
• Programmer (LAM)
• Programmer (Web)
• Hardware/Network Engineer
DDC maintains the IT professionals in its full time payroll as per policy, so that they
remain available whenever required for such services after successful completion and
commissioning.
DDC owns a well equipped and sophisticated Hardware maintenance lab, located at the
11th floor of DDC Centre. The Lab has very sophisticated testing equipment and tools
such as Oscilloscope, Signal Generator, Frequency counter, EPROM Programmer,
Logic probe, Digital and Analog Multi-meter, Variac, Network Cable tester, Network
Crimper, Punching tools, and many other tools. Highly trained and experienced
professionals are engaged here to provide the best support and service instantly.
DDC Computer center has its own 300 PCs, Servers, Plotters, Scanners, Digitizers,
Video Projectors and many other sophisticated types of equipment. DDC Hardware
centre is responsible for Design, Installation, Configuring, Troubleshooting and
Maintenance of the Local Area Network (LAN), Wide Area Network (WAN) and
Intranet of the 13 storied DDC Centre and its all project offices. Installation and
maintenance of central UPS & UBS, Voltage Stabilizer to provide more safe guard and
stable AC power.
They also provide the routine maintenance, trouble shooting, expanding of the network,
up gradation of Software and Hardware, maintaining the Back-up Server, Print Server,
DHCP Server, Application server and mail server.
Hardware Technician 02
Payroll