final package

43
1 A Comprehensive Network Development Project Submitted to the IT/Computer Network Systems Program in Partial Fulfillment of the Requirements for the Associate Degree By: Patrick Hoover Anthony Davis Jules Francis William Johnson Advisor: Brandon Champion ITT Technical Institute

Upload: patrick-hoover

Post on 11-Jun-2015

184 views

Category:

Technology


5 download

TRANSCRIPT

Page 1: Final package

1

A Comprehensive Network Development Project

Submitted to the IT/Computer Network

Systems Program in Partial Fulfillment of the

Requirements for the Associate Degree

By:

Patrick Hoover

Anthony Davis

Jules Francis

William Johnson

Advisor: Brandon Champion

ITT Technical Institute

Springfield, VA

May, 2013

Page 2: Final package

1

ContentsScope Documentation and Project Charter...........................................................................................4

Purpose..................................................................................................................................................4

Goals and Objectives...........................................................................................................................4

Success Criteria....................................................................................................................................6

Project Context......................................................................................................................................6

Project Deliverables..............................................................................................................................7

Scope Specifications............................................................................................................................8

Cost Matrix.................................................................................................................................................9

Out-of Scope Specifications..............................................................................................................11

Information Security:.......................................................................................................................11

Application Roles and Permission:...............................................................................................11

Physical Hardware Disposal:.........................................................................................................11

Software and hardware maintenance:.............................................................................................12

Assumptions........................................................................................................................................12

Constraints...........................................................................................................................................12

Project Scope Approval Signatures..................................................................................................13

Security Plan...........................................................................................................................................14

Introduction and Background............................................................................................................14

Quality Assurance Plan..........................................................................................................................15

Introduction..........................................................................................................................................15

Responsibility and Roles....................................................................................................................15

Time and Reporting............................................................................................................................16

Test Plan..................................................................................................................................................17

Purpose....................................................................................................................................................17

System Overview....................................................................................................................................17

Test Analysis...........................................................................................................................................17

Systems Test...........................................................................................................................................17

Requirements to be Tested...............................................................................................................18

Performance Test...................................................................................................................................18

Training Plan...........................................................................................................................................19

Implementation Plan...............................................................................................................................22

Page 3: Final package

1

Implementation Activities.......................................................................................................................22

Purposed Solution..................................................................................................................................23

Disaster Recovery Plan.........................................................................................................................24

Emergency Contacts..........................................................................................................................24

Purpose................................................................................................................................................24

Scope...................................................................................................................................................24

In the event of a fire........................................................................................................................26

Plan Review and Maintenance.......................................................................................................27

Network diagrams...................................................................................................................................28

IP Addressing Scheme.......................................................................................................................29

Page 4: Final package

1

Scope Documentation and Project Charter

Purpose

Currently, all of the offices use dated personal computers that are not capable of

accommodating certain modern medical insurance and information applications. These

offices also cannot support the processing demand of specific digital images of medical

graphics, dot matrix printers with proprietary software that date back to 1986 are still

used to manage the patients’ information. These computer systems (hardware and

software) will need to be upgraded and the existing data will need to be transferred into

the new computer systems.

Goals and Objectives

Inter-connect remote offices to central office

Develop local area networks for each site

Install & configure Wi-Fi access

Upgrade workstations and printers

Install & configure servers

Configure and implement security, disaster recovery, and risk analysis

Develop training for doctors and staff

Develop IT support package (internal or external)

Maximize end users’ ease of use.

Centralized administration at each location.

Enable remote monitoring and management of client machines.

Page 5: Final package

1

Minimize or eliminate end user downtime post deployment.

Provide services and equipment in the most cost effective manner.

Ensure training of end users in as effective and time condensed manner as possible.

Provide regular progress reports.

Maintain a list of milestones and revisit the schedule at the milestone markers.

Apply for and make any changes in a timely manner while reconfiguring the timeline

to account for it.

Maintain communication so all team members know the project status at a given

moment.

Implement client machines at each location with new hardware and have them all

running Windows 7 Professional

Implement Windows 2008 servers.

Consolidate the domains onto a master DC in central location.

Upgrade to Office 2010 on terminal server to provide access to all.

Enhance the security of each of the servers.

Implement a fast connection to each site through the frame.

Implement the electronic archive backup system.

Run Category 6 cable throughout both buildings.

Provide file sharing and transfer access for faculty, while restricting it of students.

Implement centralized management of the network at the central location.

Page 6: Final package

1

Success Criteria

Our goal is to complete this project within 6 months for no more than $800,000. The

success of this project will be measured in the amount of time taken, money spent, and

the financial return on investment within the first 6 months after project completion.

Project Context

This project is designed to update current systems and will help better serve a larger

customer base while maintaining compliance with applicable laws and regulations. It will

allow for a higher level of satisfaction for patients and allow the medical staff to be more

efficient.

Project Deliverables

Page 7: Final package

1

Task Title Deliverables Date Comments

Milestone 1 WAN Design 01/14/2013 Establish a design that incorporates network redundancy and stability while maintaining a reasonable cost to the customers.

Milestone 2 LAN Design 01/14/2013 Establish a design for each of the five(5) office locations that is suited to the needs for each space while maintaining a reasonable cost to the customers

Milestone 3 Hardware 01/11/2013 Purchase all necessary hardware. This includes but is not limited to workstations, laptops, printers, servers and required server equipment, routers, and switches.

Milestone 4 Software 01/11/2013 Purchase all necessary software and licenses to enable the customers to function optimally while maintaining a reasonable cost to the customers.

Milestone 5 Install 05/22/2013 Complete installation of all hardware and software components.

Milestone 6 Configure 05/22/2013 Configure all hardware and software to meet the customer’s needs.

Milestone 7 Test & Troubleshoot

05/29/2013 Test and troubleshoot all hardware and software to ensure all components are functioning correctly and to the customer’s specifications.

Milestone 8 Training 06/05/2013 Establish and implement a training program to ensure employees are competent and comfortable utilizing the new system and software.

Scope Specifications

To design an infrastructure that connects each remote office to the central office that will

meet all stated requirements for the integrity, storage, and movement of related data

Page 8: Final package

1

and the applications that process such data, including the networking and

communications infrastructure that supports such applications covering all desired

functions in security, redundancy, and operability, etc. The office computers, servers,

and all network-related equipment need to be upgraded to meet the requirements as

well. Workstations from all sites will need to be connected to the internet all the time for

research and web-based applications. The new partnership is also seeking professional

guidance and procedures on whether it makes sense to hire a full-time staff to manage

the networking/telecommunications infrastructure and related services, or if leaving

such services to an external consulting firm will be more effective and efficient. Each

office will have its own local area network (LAN) with an operating speed that will permit

data transfer at high speeds with minimum chance of bottlenecks. CIS is proposing that

it would be best to have the data accessed by all offices by each office being on be on

its own LAN. As of today, data sharing among workstations is minimal. Dedicated high-

speed internet access is not currently available at any site.

Cost Matrix

Main Site

Materials Quantity

Cost Total

Page 9: Final package

1

Cisco 3925 Series Voice Bundle Router 1 $6,546.00

$6,546.00

Cisco Catalyst 3750X-24T-S Switch - 24 ports PoE

1 $2,256.00

$2,256.00

Cisco Aironet 1041 Wireless Access Point 3 $250.00 $750.00Cisco Small Business SPA 303 VoIP Phone 16 $65.00 $1,040.00Dell PowerEdge R420 Server 3 $6,989.

00$20,967.00

APC Smart-UPS X 3000 Rack/Tower 2.7kW 2 $1,439.00

$2,878.00

Dell 4220 42U Rack 1 $990.00 $990.0024 Port Patch Panels 1 $29.00 $29.00RJ-45 jack modules 36 $3.00 $108.00Modular Wallplates 23 $1.00 $23.0052'' Cable Ties 25 pack 5 $45.95 $229.75Cable Tray 7ft Sections 64 $43.84 $2,805.76Miscellaneous Building Materials $2,000.00Dell Inspiron 14z Ultrabook 5 $699.99 $3,499.95Xerox 6400X Color Laser 1 $3,210.

00$3,210.00

Xerox 5550DT B/W Laser Printer 1 $3,177.00

$3,177.00

Xerox 8560MFP/N Color Solid Ink 1 $1,396.00

$1,396.00

Backup Generator 1 $2,792.00

$2,792.00

CAT6, 550-MHz Solid Bulk Cable 1000-ft 4 $149.95 $599.80

SoftwareMicrosoft Office 2010 18 $373.00 $6,714.00Windows 7 Professional 18 $109.00 $1,962.00AVG Enterprise Internet Security Suite 18 $50.96 $917.282 Socket Redhat Standard Tech Support 1 $799.99 $799.99Office AllyNagios Network monitoring Free

Materials Total $65,690.53

Page 10: Final package

1

Satellite Sites

Materials Quantity

Cost Total

Cisco 3925 Series Voice Bundle Router 1 $6,546.00

$6,546.00

Cisco Catalyst 3750X-24T-S Switch - 24 ports PoE

1 $2,256.00

$2,256.00

Cisco Aironet 1041 Wireless Access Point 3 $250.00 $750.00Cisco Small Business SPA 303 VoIP Phone 16 $65.00 $1,040.00Dell PowerEdge R420 2008 2 $6,989.0

0$13,978.00

APC Smart-UPS X 3000 Rack/Tower 2.7kW 2 $1,439.00

$2,878.00

Dell 4220 42U Rack 1 $990.00 $990.0024 Port Patch Panels 1 $29.00 $29.00RJ-45 jack modules 36 $3.00 $108.00Modular Wallplates 23 $1.00 $23.0052'' Cable Ties 25 pack 10 $45.95 $459.50Cable Tray 7ft Sections 64 $43.84 $2,805.76Miscellaneous Building Materials $2,000.00Dell Inspiron 14z Ultrabook 5 $699.99 $3,499.95Xerox Phaser 5550DT B/W Laser Printer 1 $3,177.0

0$3,177.00

Xerox Phaser 8560MFP/N Color Solid Ink 1 $1,396.00

$1,396.00

Generac 5871 10,000 Watt Backup Generator 1 $2,792.00

$2,792.00

CAT6, 550-MHz Solid Bulk Cable 1000-ft 4 $149.95 $599.80

SoftwareMicrosoft Office 2010 18 $373.00 $6,714.00Windows 7 Professional 18 $109.00 $1,962.00AVG Enterprise Internet Security Suite 18 $50.96 $917.28Office AlleyNagios Network monitoring FreeMaterials Total $54,920.7

9

Page 11: Final package

1

Total Budget: $800,000

Out-of Scope Specifications

Information Security:

A management framework should be established to initiate and control the

implementation of information security within the organization. Management should

approve the information security policy, clearly define and assign security roles, and

coordinate and review the implementation of security controls across the organization.

Application Roles and Permission:

Roles and permissions for all applications implemented by CIS will be established by

CIS.

Physical Hardware Disposal:

All hardware currently in place within the CIS offices will be placed in an area

designated by the CIS Project Manager, within the CIS facilities to be removed at the

doctors expense. Removal should be coordinated with the CIS Project Manager to be

sure removal of hardware does not interfere with active install times and spacing

requirements.

Page 12: Final package

1

Software and hardware maintenance:

All patches, updates and warranty information will be provided to CIS during the project

and updated prior to project completion. After project completion CIS and all third party

vendors should work in cohesion to ensure proper patches, updates, upgrades and

warranties are maintained or implemented.

Assumptions

The project can be implemented within budget.

All require suppliers, resources, and services will available as needed.

All hardware and software will operate correctly.

All offices require new hardware and software.

All doctors and nurses are familiar with workstation functionality.

Project team will be given ample space to perform project task.

Constraints

We will have to perform majority of implementation tasks after work hours.

The economy is bad- the cost budget cannot be exceeded.

Page 13: Final package

1

Project depends upon successful and timely completion of associated tasks.

Project environment is new and the components have not yet been successfully

integrated.

Project Scope Approval Signatures

Project Name: Doctors Office Network Project

Project Manager: Patrick Hoover

I have read the information in this Project Scope Statement and agree:

Name Role Signature Date(MM/DD/YYY)

The signatures above indicate an understanding of the purpose and content of this document by thosesigning it. By signing this document, they agree to this as the formal Project Scope Statement document.

Page 14: Final package

1

Security Plan

Introduction and Background

CIS is responsible for maintaining all hardware asset control until final sign off on project

release and handover occurs. All hardware purchased and not yet placed into site will

be the sole responsibility of the CIS team. When asset has been moved onto site,

customer will be solely responsible for the physical security of all hardware. All

application security will be initiated through CIS and turned over before project

completion during a knowledge sharing meeting at project end.

Information and Software Security

All the workstations, laptops and servers will be configured and implement with an

approved centrally managed virus protection software (AVG Software). Users should

not be permitted to disable, bypass, suspend, or alter the state of the software to reduce

vulnerability.

All Company applications implemented by CIS are required to be configured to prevent

unauthorized access to information held in application systems, control user access and

protect from malicious software that is capable of overriding or bypassing system or

application controls.

Physical Security

apC/8X Advanced Processing Controller is an access control for all outer doors and

rooms requiring restricted access. This also allows for access card entry and control for

employees, alarm monitoring, which will serve as a basic building block for building

Page 15: Final package

1

security management. Door card reader will provide performance, reliability, and

security.

A red LED flashes green and the beeper sounds when reader is presented with a

proximity card. The multicolor LED and beeper can also be controlled individually by the

host system controls.

Quality Assurance Plan

Introduction

CSI has all right and is responsible for maintaining all hardware asset control until the

final sign off on the project release and handover. All hardware that was purchased and

not have been put into the site will be the sole responsibility of CSI. When the assets

have been moved onto the site locations, the customer will be responsible for the

physical security of all hardware. All of the security applications will be initiated through

CSI and turned over to the doctors before the project completion during the final

meeting at the end of the project.

Responsibility and Roles

All of the doctor assets handled by CSI will be accounted for by using the Equipment

List and Gant Chart. The equipment list may be delegated by the owner as appropriate

to the process; however the owner remains responsible for the proper protection of the

assets.

CSI will secure all hardware off site during the project period and will replace any stolen

or lost items at their expense. The contacts are listed below in case of an asset event.

Name Position Phone Number

Page 16: Final package

1

Patrick Hoover Project Manager 301-898-7789Jules Francis Security 301-897-8899

CSI will install, test and oversee training the new training place on all application

security software agreed upon with the doctors/nurses need to ensure the company

compliance and standard are met.

Time and ReportingThe maintenance and documentation of the equipment list will become the responsibility

of the doctors/nurses at the end of the project. Any assets movement will be approved

by the project manager 24 hours prior to move and the assets site location verification

will be accessed by the same project manager within 12 hours of move.

Page 17: Final package

1

Test Plan

PurposeThe purpose of this test plan is to ensure all systems are working to expected level. This

would include software and hardware alike.

System Overview

Hardware and software are both CIS’s responsibility to test during implementation

process. All tests will be performed with the 3rd party vendors.

Test Analysis

Connectivity tests, LAN and WAN, will be done to ensure proper and stable

connectivity to office's servers and the internet.

Security, internal and external, will be tested for intrusion detection and prevention.

User access, rights, and privileges will be tested in alignment with the doctors

needs.

Install measures will be set and tested

All application software install will be tested with 3rd party vendors after install and

during all configuration changes

Page 18: Final package

1

Systems Test

The system tests will focus on the behavior of the system. User scenarios will be

executed against the system as well as error message testing. Overall, the system test

will test the integrated system and verify that it meets the requirements defined in the

requirements document.

Requirements to be Tested

AVG Enterprise Internet Security Suite will be used to test its security holistically of any

malware or attacks of any kind. The result has a respectable capability to fully block

malicious attacks. Microsoft Server 2008 R2 will be used to test user access, rights, and

privileges which will meet HIPPA law and privacy of patient’s demographic.

Performance Test

Performance test will be conducted to ensure that the network system’s response time

meet the user expectations and does not exceed the specified performance criteria.

During these tests, response times will be measured under heavy stress and/or volume.

Page 19: Final package

1

Training Plan

Introduction

All training will be performed by CIS team members with the exception of Office Ally which will be conducted by Office Ally training staff. All training is outlined with a specified schedule.

Purpose

The purpose of this training plan is to ensure that all employees know what will be expected of them during the training phase of this project.

Scope

All training is provided by Capital IT Solutions with the exception of Office Ally software.

System Overview

Systems to be included in training are:

-General computer knowledge

-Basic computer skills

-Windows 7 Professional (OS)

-Microsoft Office 2010

Page 20: Final package

1

General Training Outline

Training schedules are included in the timeline and must be completed no later than 2

weeks prior project hand off. Training will be done at one of the four sites with staff as

the customer schedules. Each training session will be conducted in a class type

environment to include no more than 10 staff members at time.

Roles and Responsibilities

All training material and execution will be handled by Jules Francis, Patrick Hoover and Antony Davis.

Techniques and Tools

Training will be conducted in a classroom type setting on site with computer-based

instruction, hands-on practical sessions, written manuals, and peer-to-peer practice

time.  Training can extend on an individual basis for up to 3 hours on each training day

and is included in the cost.

Curriculum

Course Offering

Audience Method When/How Often

Trainer

Computer Skills Training

All office Staff to include medical staff

Hands on training, classroom type environment

TBD Patrick Hoover or Jules Francis and a member of the management staff

Microsoft Office Suite

All office Staff to include medical staff

Hands on training, classroom type environment

TBD Antony Davis or Jules Francis and a member of the management staff

Operating All office Hands on TBD Patrick Hoover or

Page 21: Final package

1

Sysem (Win7Pro)

Staff to include medical staff

training, classroom type environment

Jules Francis and a member of the management staff

Tracking and Reporting

All training classes will be signed into on hard copy forms and returned to office staff for

attendance review. Clock in for such training will be the responsibility of the office

management and not CIS.

Sustainability

Training will be scheduled by the Project manager and the office team to isolate dates,

and this will be reviewed regularly until the training dates begin. All training feedback

will be submitted in the form of a status report by the training to the Project manager

and then submitted to the office team for review. If any changes or suggestions are to

be submitted by the office team, it needs to be given to the project manager within 24

hours of next scheduled training session.

Page 22: Final package

1

Implementation Plan

The configuration of workstations, servers, routers, and switches will happen offsite

prior to actual installation. CIS will then begin with the central office and run cabling to

accommodate plan specifications, after connectivity has been established CIS will start

hardware install only at the central office. After installs and test have been completed at

the central office, the other office implementations will commence at the satellite sites.

Implementation Activities

By following the implementation plan, setup of the infrastructure should satisfy all

requirements set forth in the Scope Document and Project Charter. The ultimate

outcome of implementing our plan is to have each office set up with a modern, reliable,

high-speed Local Area Network, with connectivity to each office through the Wide Area

Network. This will include new servers, new workstations and a vastly more reliable

backup and data retrieval system.

Page 23: Final package

1

Purposed Solution

CIS will develop a solution that will impact all of the five doctors to provide excellent

service to patient without impacting normal business operations. We will have a network

diagram that will incorporate all submitted requirements to allow success for the

business and project growth. We will have full details for all network connections,

configurations, networks, and a level of security settings.

Each office should meet all security and disaster plan recovery plan including all of the

HIPAA requirements at a reasonable cost. For our security system we will have

identification for authentication, authorization, and public key infrastructure at each

location. Each location will also have a network LAN and WAN design to have the ability

to communicate between locations.

CIS will provide training to all of the staff/employees. This training will be provided to all

the doctors, nurses, supervisors, managers, billing collection department, and financial

manager. We will have backup plans and disaster recovery plans to protect the

company information. For the disaster recovery plan the financial manager, billing

department, supervisors will receive training. Our project will be completed once we

Page 24: Final package

1

have successfully implemented the network that meets the client’s needs/wants, the

budget and deadlines.

Disaster Recovery Plan

Emergency Contacts

Name Address Home Phone Mobile/Cell Phone

Patrick Hoover (111)222-2222 (555)666-6666

Anthony Davis (222)333-3333 (666)777-7777

Jules Francis (333)444-4444 (777)888-8888

William Johnson (444)555-5555 (888)999-9999

PurposeThe purpose of this disaster recovery plan (DRP) is to prepare the doctors in the event

of communication interruptions due to events out of the control of the CIS Staff (man-

made or natural disasters). All locations that are connected to the WAN are expected to

implement preventative measures wherever possible to offset the time needed to

recover operational network communications. This plan identifies vulnerabilities and

recommends necessary measures to prevent extended network outages. It is a plan

that covers all locations network operations.

Page 25: Final package

1

ScopeThe scope of this plan is limited to the areas of the doctors operations, specific to their

facilities and CIS installed data lines. This is a disaster recovery plan (DRP), not a daily

problem resolution procedures document.

DRP Objectives

To serve as a guide for the doctors IT data and network recovery teams

Refers and points to the site of network operational data outside this document

Provides procedures and resources needed to assist in network recovery

Identifies vendors and customers to be notified when a network outage occurs

Helps to assist in the avoidance of confusion experienced during a network outage

by keeping proper documentation, testing, and reviewing recovery procedures

To identify alternate sources for network equipment, services, power supply, and

other resources

Documentation of storage, safeguard, and retrieval procedures needed for network

records and other data relevant to business operations

Emergency management standards

Backup policy

Full and incremental backups protect and preserve corporate network information

and should be performed on a regular basis for system logs and technical

documents that are not easily replaced, have a high replacement cost or are

considered critical. Backup media should be stored in a secure and geographically

separate location from the original and isolated from environmental hazards.

Page 26: Final package

1

Backup network components, cabling and connectors, power supplies, spare parts

and relevant documentation should be stored in a secure area on-site as well as at

other corporate locations.

Network-specific data and document retention policies specify what records must be

retained and for how long. All network organizations are accountable for carrying

out instructions for records management in their organization.

System databases

A copy of the most current network and system databases must be made at least

twice per month or based on frequency of changes made.

These backups must be stored offsite.

The lead network administrator is responsible for this activity.

Offsite storage procedures

Access to backup databases and other data is tested annually.

Data backups will be stored through Carbonite (carbonite.com) hosted facilities.

In the event of a fire

If fire or smoke is present in the facility where network infrastructure assets are located,

evaluate the situation and determine the severity, categorize the fire as a major or minor

incident and take the appropriate action as defined in this section. Call 911 or contact

your local first responders as soon as possible if the situation warrants it.

Personnel are to attempt to extinguish minor fires (e.g., single hardware component

or paper fires) using hand-held fire extinguishers located throughout the facility. Any

Page 27: Final package

1

other fire or smoke situation will be handled by qualified building personnel until the

local fire department arrives.

In the event of a major fire, call 911 and immediately evacuate the area.

Page 28: Final package

1

In the event of any emergency situation, such as system and network security, site

security and personal safety are the major concerns. If possible, the lead network

administrator and/or designee should remain present at the facility until the fire

department has arrived.

In the event of a major catastrophe affecting the facility, immediately notify senior

management.

Plan Review and Maintenance

This network disaster recovery plan must be reviewed semi-annually and exercised

on at least an annual basis. The test may be in the form of a walk-through, mock

disaster, or component testing. Additionally, considering the dynamic environment

within offices, it is important to review the listing of personnel and phone numbers

contained within the network DR plan regularly. The hard-copy version of the

network DR plan will be stored in a common location where it can be viewed by site

personnel and the EMT and DRT. Electronic versions will be available via the

doctors network resources as provided by IT Technical Support. Each recovery

team will have its own directory with change management limited to the recovery

plan coordinator.

Page 29: Final package

1

Network diagrams

Page 30: Final package

1

IP Addressing Scheme

Location IP Address Subnet Gateway Gateway IP SubnetCWS01 192.168.3.1 255.255.255.224 Central Office Rt 192.168.8.0 255.255.255.252CWS02 192.168.3.2 255.255.255.224CWS03 192.168.3.3 255.255.255.224CWS04 192.168.3.4 255.255.255.224CWS05 192.168.3.5 255.255.255.224CWS06 192.168.3.6 255.255.255.224CWS07 192.168.3.7 255.255.255.224CWS08 192.168.3.8 255.255.255.224CWS09 192.168.3.9 255.255.255.224CWS10 192.168.3.10 255.255.255.224CWS11 192.168.3.11 255.255.255.224CWS12 192.168.3.12 255.255.255.224CWS13 192.168.3.13 255.255.255.224CWS14 192.168.3.14 255.255.255.224CWS15 192.168.3.15 255.255.255.224NWS01 192.168.4.1 255.255.255.240 North Office Rt 192.168.9.0 255.255.255.252NWS02 192.168.4.2 255.255.255.240NWS03 192.168.4.3 255.255.255.240NWS04 192.168.4.4 255.255.255.240NWS05 192.168.4.5 255.255.255.240NWS06 192.168.4.6 255.255.255.240NWS07 192.168.4.7 255.255.255.240NWS08 192.168.4.8 255.255.255.240NWS09 192.168.4.9 255.255.255.240NWS10 192.168.4.10 255.255.255.240NWS11 192.168.4.11 255.255.255.240NWS12 192.168.4.12 255.255.255.240NWS13 192.168.4.13 255.255.255.240NWS14 192.168.4.14 255.255.255.240NWS15 192.168.4.15 255.255.255.240EWS01 192.168.5.1 255.255.255.240 East Office Rt 192.168.10.0 255.255.255.252EWS02 192.168.5.2 255.255.255.240EWS03 192.168.5.3 255.255.255.240EWS04 192.168.5.4 255.255.255.240EWS05 192.168.5.5 255.255.255.240EWS06 192.168.5.6 255.255.255.240EWS07 192.168.5.7 255.255.255.240EWS08 192.168.5.8 255.255.255.240EWS09 192.168.5.9 255.255.255.240EWS10 192.168.5.10 255.255.255.240EWS11 192.168.5.11 255.255.255.240EWS12 192.168.5.12 255.255.255.240EWS13 192.168.5.13 255.255.255.240EWS14 192.168.5.14 255.255.255.240EWS15 192.168.5.15 255.255.255.240

Page 31: Final package

1

SWS01 192.168.6.1 255.255.255.240 South Office Rt 192.168.11.0 255.255.255.252SWS02 192.168.6.2 255.255.255.240SWS03 192.168.6.3 255.255.255.240SWS04 192.168.6.4 255.255.255.240SWS05 192.168.6.5 255.255.255.240SWS06 192.168.6.6 255.255.255.240SWS07 192.168.6.7 255.255.255.240SWS08 192.168.6.8 255.255.255.240SWS09 192.168.6.9 255.255.255.240SWS10 192.168.6.10 255.255.255.240SWS11 192.168.6.11 255.255.255.240SWS12 192.168.6.12 255.255.255.240SWS13 192.168.6.13 255.255.255.240SWS14 192.168.6.14 255.255.255.240SWS15 192.168.6.15 255.255.255.240WWS01 192.168.7.1 255.255.255.240 West Office Rt 192.168.12.0 255.255.255.252WWS02 192.168.7.2 255.255.255.240WWS03 192.168.7.3 255.255.255.240WWS04 192.168.7.4 255.255.255.240WWS05 192.168.7.5 255.255.255.240WWS06 192.168.7.6 255.255.255.240WWS07 192.168.7.7 255.255.255.240WWS08 192.168.7.8 255.255.255.240WWS09 192.168.7.9 255.255.255.240WWS10 192.168.7.10 255.255.255.240WWS11 192.168.7.11 255.255.255.240WWS12 192.168.7.12 255.255.255.240WWS13 192.168.7.13 255.255.255.240WWS14 192.168.7.14 255.255.255.240WWS15 192.168.7.15 255.255.255.240