12.07.2015 Views

CCTNS nagaland_SI_RFP_Volume 1.pdf - National Crime Records ...

CCTNS nagaland_SI_RFP_Volume 1.pdf - National Crime Records ...

CCTNS nagaland_SI_RFP_Volume 1.pdf - National Crime Records ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Crime</strong> & Criminals Tracking Network and Systems ProjectNagaland PoliceS.NoComponentName6 NetworkInfrastructureDescriptionproprietary standards which are widely followed so that proprietaryservices may also plug n play in the enterprise architecture though itis not advised. For proprietary standards, the integration frameworkshould provide adapter for the widely used proprietary standards andtechnologies.A well defined network infrastructure is the backbone for delivering theservices through the channels and also to access all vital information relatedto <strong>CCTNS</strong>. Since it defines the delivery speed of information / servicethrough the channel, it is an important factor to infuse user confidence andsustain interest in the usage of the channel.7 Service DeliveryChannelsFor the successful implementation and deployment of the applicationmodules at Nagaland Police, it is essential that the system is backed up withsufficient connectivity infrastructure.Primary mode of connectivity and backup modes of ensuring connectivity arediscussed in details in the deployment section.Service delivery channels refer to the channels through which the Policedepartment provides service delivery to internal and external stakeholders.These consist of Police Stations, and Other offices of the Nagaland Police,Email, Online web portal, telephone, SMS, and mobile phones.8 User Layer The user Layer consists of the various users of the <strong>CCTNS</strong> project inNagaland. They consist of Citizens, Police Officers, NCRB and otherstakeholders mentioned, each of whom access the Applications throughrespective channels of service delivery.Technical ArchitectureA centralized architecture (servers and processing at single and central location) has been proposed forthe Nagaland <strong>CCTNS</strong> project. All requests from internal and external users will be sent to the systems,located in a central place for processing. All users will access the application through local or remoteterminals using a browser (through internet for external users and through intranet or VPN for internalDepartmental users).Bidders should clearly understand that the desire of the department is not to create a mere IT Solution butan information infrastructure that will expand, integrate and enhance the functional needs of thedepartment, citizens and other stakeholders. It is in this spirit that the core design and functionalrequirements are elaborated below:(a) Service Fulfillment– The objective of the System is to deliver the service from initiation tocompletion through electronic channels, as far as possible. Processes have been reengineeredso that a stakeholder is able to access the system, perform the required tasks which may involvesingle or multiple back-end application interactions and fulfill the service requests through thecomplete solution.(b) Single-Sign On – The Solution should enable single-sign-on so that any user once authenticatedand authorized by system is not required to be re-authorized for completing any of the services inthe same session. For employees of the Nagaland Police, the browser based applicationaccessed on the intranet, through single-sign-on mechanism, will provide access to all the coreservices (based on their roles and responsibilities), Help module, Basic and advanced Reportingetc. Similarly, for external users (Citizens, Hotels, Cyber Cafes, Hospitals, Jails, TransportDepartment etc), based on their profile and registration, the system shall enable single-sign onfacility to apply for various services, make payments, submit queries /complaints and check statusof their applications.(c) Support for PKI based Authentication and Authorization – The solution shall support PKIbased Authentication and Authorization, in accordance with IT Act 2000 (as amended till date),using the Digital Certificates issued by the Registration Authorities (RA). In particular, PKI based<strong>Volume</strong> I Request for Proposal for Selection of System Integrator Page 42 of 193

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!