IDACS NCIC 2000 - PowerPoint PPT Presentation

1 / 56
About This Presentation
Title:

IDACS NCIC 2000

Description:

... the Intelenet Commission and it's business partners (AT&T and Ihets) ... CAD, RMS, mobile data devices? IDACS NCIC 2000. Standalone 'terminal agency' can use... – PowerPoint PPT presentation

Number of Views:246
Avg rating:3.0/5.0
Slides: 57
Provided by: support2
Category:
Tags: idacs | ncic | att | live | mobile | nec | support

less

Transcript and Presenter's Notes

Title: IDACS NCIC 2000


1
IDACS / NCIC 2000
  • Migration to the new System
  • and Network.

2
Introduction
  • IDACS/NCIC 2000 Project Team
  • Major Fred Pryor, ISP
  • Dave Smith, IDACS/NCIC 2000 Project
    Managerdsmith3_at_isp.state.in.us
  • Jim Cole, Datamaxx Project Manager
  • Dennis Eaton, ISP Systems Programming / IDACS
    ISO
  • Michael Paxton, ISP Systems Programming
  • Matt Ryan, Intelenet Commissionmryan_at_intelenet.st
    ate.in.us
  • Charlie Sharp, Intelenet Commissioncsharp_at_intelen
    et.state.in.us

3
System Overview
4
Presentation Agenda
  • IDACS Upgrade
  • Project Status
  • Network MIGRATION
  • Workstations
  • Datamaxx Workstation Client
  • Network Overview
  • System Security
  • Interface specifications IDACS- Open FOX message
    switch
  • Regional Systems, 3rd Party Vendor provided
    systems (CAD, MDT, RMS etc.)

5
Project Status
  • Project Status
  • 5 Phases contract execution, design,
    development, deployment and acceptance.
  • Were in Phase II the most important of all
    phases
  • Timeline remaining
  • May 31 October 15
  • Programming State Police Datamaxx/CPI Open
    FOX
  • Network Upgrade through February 2004
  • Implementation
  • Deployment/installation of Workstation Clients
  • Cutover to new IDACS System for Live Operation

6
Network Migration
  • Intelenet Commission

7
Network Migration
  • The Pressing Questions
  • How do agencies and departments go about this
    Migration?
  • What does that involve?
  • What is it going to cost?
  • How do I do it?..

8
Network Migration
  • How do agencies and departments go about this
    migration?
  • IDACS - continued support of existing network for
    2 years from March 1, 2002.
  • Requires a new telco managed circuit Replaces
    your current IDACS circuit and modem
  • Intelenet Commission -
  • Service of the Indiana Telecommunications Network
    (ITN)
  • Partnership between the Intelenet Commission and
    its business partners (ATT and Ihets).
  • Private Network, only serving the public sector.
    Customers Include K-12, Higher Ed, State
    Libraries, State Government.

9
Network Migration
  • Intelenet Commission contd
  • 56 Kilobit Frame Relay Service includes
  • 24 x 7 help desk support through ITN. Always on,
    no dialing up required.
  • Router is included with the service.
  • Guaranteed 32 Kilobit Committed Information Rate
    (CIR) at all times.

10
Network Migration
  • What does that involve?
  • Installation of new IDACS telco service
  • Service will be ordered through the Intelenet
    Commission.
  • All customer information will be taken at that
    time. Allow a minimum of 40 days for the service
    to be installed.
  • Installation will consist of the circuit install
    (local telco), demarc extension, and router
    install (ITN contractors). Up to three site
    visits.

11
Network Migration
  • What is it going to cost?
  • Monthly Recurring Cost (projected)
  • The quicker the service is adopted by IDACS
    users, the lower the MRC should be. Monthly
    recurring cost will NOT exceed 500.00, however.
  • Non-Recurring Costs
  • 1,500 Installation Charge.
  • 435.00 Demarc Extension Charge (if required).
  • Core or wall penetrations on a per quote basis.

12
Network Migration
  • How do I do it?
  • Contact Information
  • To order service/provisioning information
  • Lynn Jefferson, Customer Service Specialist
    (317) 234-1427.ljefferson_at_intelenet.state.in.us
  • Questions/Comments regarding 56K frame service or
    Intelenet/Indiana Telecommunications Network
  • Matt Ryan, Manager, Network Services (317)
    233-8874.mryan_at_intelenet.state.in.us
  • Charlie Sharp, Director of Operations (317)
    233-8997.csharp_at_intelenet.state.in.us

13
Workstations
  • ISP Project Management

14
Workstations
  • What will work on the system?
  • Time for a quick needs analysis
  • What are you using today?
  • What are you planning for the future? CAD, RMS,
    mobile data devices?
  • IDACS NCIC 2000
  • Standalone terminal agency can use
  • Hardware/Operating System almost any Pentium
    based PC,. Windows 95, 98, or Windows 2000.
    (Windows 2000 Professional preferred operating
    system, provides a better level of security.)

15
Workstations
  • Standalone terminal agency can usecontd
  • Common off-the shelf getem at a local office
    supply product Dell, Gateway, HP, NEC, with
    a minimum
  • Pentium III / IV processor
  • 128 MB RAM
  • 20 G byte hard drive (standard minimum)
  • 10/100 M Byte PCI Ethernet network card
  • Monitors again, off the shelf - 15 21 .28
    up to.24AG Trinitron Monitors, 15 flat panel
    displays to the 19 Digital Flat Panel displays..
  • Performance Considerations
  • What else are you going to run on it ?!?!?
  • Presentation later on the platform selected for
    ISP use. Get some IDEAS!

16
Network Overview
  • ISP Systems and Programming

17
Network Overview
18
Network Overview
19
Network Overview
20
Network Overview
Diagram Here!.
21
System Security
  • IDACS Information Security Officer (ISO)

22
System Security
  • Site Security
  • Site must have adequate physical security to
    protect equipment and data.
  • Visitors must be accompanied by staff.
  • Personnel restricted to authorized persons.
  • Documented procedures to monitor security.
  • Terminal use for authorized purposes.
  • Procedures for changing of passwords.

23
System Security
  • Personnel
  • Check state/national fugitive/arrest files.
  • If record found, delay access pending further
    review.
  • Felony/serious misdemeanors referred to CTA or
    designee.
  • Notice to employer with disposition.

24
System Security Technical
  • Dial-up Access
  • Properly managed ports and other security
    measures.
  • Develop and maintain documentation of security
    measures.
  • Identify and authenticate dial-in users.
  • Transaction logs of activity.
  • Each individual shall be uniquely identified.
    (i.e. name, badge, serial, or other unique
    number.)
  • CTA and Computer Center automated logging.

25
System Security Technical
  • Authentication Strategy
  • Centralize oversight.
  • Decentralize day-to-day and administration of
    computer centers.

26
System Security Technical
  • Encryption
  • Any use of a public network segment must be
    encrypted. (includes wireless, dial-up, or
    Internet).
  • session-based or VPNs.
  • private-key (FIPS Publication 46-2).
  • DES (ANSI X3.92, ANSI X3.106, FIPS Publication
    81.)
  • FBI responsible for FBI to CTA.
  • CTA responsible for CTA to Computer Centers.

27
System Security Technical
  • Encryption contd
  • Ensure correct, legal, efficient dissemination
  • Copies of III data must be secured.
  • Audit considerations.
  • CTA to document and oversee encryption key
    management procedures.

28
System Security Technical
  • Internet
  • advanced authentication.
  • access control.
  • integrity.
  • confidentiality.
  • non-repudiation.
  • firewall protection.

29
Interface Specifications
  • ISP Project Management

30
Interface Specifications
  • DMPP-2020 Communications Interface
  • Provides
  • Guaranteed delivery
  • Application-level message headers
  • Data-stream format communication
  • DSEO-2020 Embedded Objects
  • Provides
  • Standard method of image exchange
  • Platform independence
  • Compatibility with DMPP-2020

31
Next Steps
  • When can I begin the process?
  • budget issues are the driving force. I have
    two years, but can I wait? Who else is on my
    circuit that may leave potentially increasing
    my line costs..?
  • Plan for your workstation.
  • Plan for network upgrade
  • initial contacts with Intelenet - circuit,
    router installation-
  • Do I need the (IDACS software)?
  • Will the IDACS staff be available for questions
    or assistance?

32
Datamaxx Client
  • Datamaxx Prime Vendor
  • Datamaxx a leader in criminal justice
    information systems integration.
  • Desktop client application
  • Contract 10,000 user licenses for the Datamaxx
    client, OmniForce
  • No cost to the local agencies wishing to deploy
    to their desktops.
  • Windows like look and feel. Not Windows
    however
  • Demonstration
  • Computer Projects, Inc. (CPI) Open Fox message
    switching system (IDACS).

33
Demonstrations
  • IDACS Workstation
  • State Police Districts / GHQ
  • DATAMAXX Workstation Client
  • OmniForce

34
Datamaxx Demonstration
  • Datamaxx Project Management

35
Omniforce Client
  • Fourth generation of software
  • Not 1.uh-oh version
  • Uses internet technology, but it is NOT a browser
  • Industry-standard components
  • All necessary modules download automatically
  • Updates itself automatically
  • Platform independent
  • Windows 2000 Professional preferred

36
The workstation client is automatically updated
with new forms each time the application is
started.
37
The workstation client is shown below in its
initial state without any transaction forms or
windows open.
38

The forms menu provides access to all transaction
forms available to the user
39
The menu panels will cascade as the user narrows
their selection from the choices available to
them.
40
Selecting the appropriate transaction will close
the menu and open the desired transaction form.
Note default information is pre-loaded into
transaction fields.
41
The user completes the transaction by entering
data into the transaction data fields
42
For any field that is validated by a value list,
the user may access a list of field values by
clicking the value list control.
Field Value List Control
43
After selecting a value from the list, the
correct data is inserted into the data field.
Note If the user knows the appropriate data
value for a field they may type it directly into
the field without using the data list.
44
As the user enters data into the fields, the
system automatically checks to ensure that only
valid values are entered
45
Entering an incorrect value into a field causes
an error dialog to be displayed.
Note The Error Dialog can be over ridden if the
value is correct, but has not been identified to
the system validation tables.
46
After entering all available data, the user
transmits the transaction by clicking the
Transmit control.
Transmit Control
47
The system does a final check to ensure that all
data fields are accurate and required fields
contain data.
48
After all validation has been passed, the user
once again transmits the message to the network.
49
After transmitting, the Message Window is opened
allowing the operator to review responses.
50
Double-clicking any of the messages in the
Message Window will display the full content of
the message.
51
Multiple Transaction Windows can be open at one
timeallowing the operator to work on several
activities.
52
The Message Log utility allows the user to search
for and review any messages they have sent or
received.
53
The workstation provides access to information
previously only available in printed format.
Help information may be maintained on
separate/disparate servers for ease of update.
54
Training Certification
  • Training
  • Online
  • Integrated companion software with Omniforce
  • User configurable profile
  • Remembers where user leaves off and resumes
  • Certification
  • Online
  • Pooled questions
  • Timed testing
  • Immediate results and certification
  • Integrated with Operator Authorization

55
Training Certification
  • Training
  • Train the Trainer
  • October 1 02
  • User community workstation software installation
    October 7 14

56
IDACS/NCIC 2000
  • Question and Answer
Write a Comment
User Comments (0)
About PowerShow.com