digital campus blueprint

Cisco Research
Broadmeadows Digital Campus Blueprint
Outlining Capability for Greener, Safer,
More Sustainable Schools
Cisco Systems
ANZ Public Sector – Strategic Programs & Solutions
Updated: September 2011
Cisco Research
Contents
Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
K –12 Architectural Framework. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Capability Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Fundamental Concepts and Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
K –12 Service Framework. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Reference Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
The K–12 Service Framework. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Core design considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Leveraging the network for full value. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Technology Overview:
The K–12 Service Foundation – A Borderless Network Infrastructure. . . . . . . . . . . . . . . . . . . .8
Critical Technologies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Stacking switches in wiring closet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Quality of service enablement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Medianet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Smart Operations Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
IPv6 capability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1. Greener Schools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Critical Technologies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Power usage monitor in hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Cisco EnergyWise. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Digital building systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2. Safer Schools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Critical Technologies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Identity management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Network admission control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Centralised access control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Cisco Integrated Security Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Video surveillance cameras using IP network infrastructure. . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3. Smarter and More Efficient Schools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Critical Technologies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Quality of service enablement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Intelligent recognition and management of end device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Cisco Unified Communications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Unified communications integrated applications – improving productivity
and responsiveness and reducing costs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Remote site survivability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Virtual desktop infrastructure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Private and public clouds. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Technical Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Current State Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Technology Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Enabling Change: Netbook Rollout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Video Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Business use cases. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Technology solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Energy and Facilities Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Support and operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Terms of Use. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
page 2 of 27
Cisco Research
Preface
As part of Cisco’s support for Australia’s education reform initiatives, this blueprint looks
to support state education departments in ensuring technology-enabled solutions are
complementary to the acceleration of education outcomes and objectives outlined in the
2008 Melbourne Declaration on Educational Goals for Young Children. It seeks to further
advance the value of the network in centralising, standardising and enabling efficiencies
across school systems.
This blueprint emphasises the first phase in any approach to support change at scale
across the ICT network. It establishes a baseline of network services that can be leveraged
and expanded to enable the next generation of classroom learning environment reforms.
Ultimately, this expanded network presence can be used as a platform for future integrated
child and family service delivery across regional, remote, urban and rural communities.
This blueprint also builds on recent state and Commonwealth investments in education
provided through programs such as the Digital Education Revolution; the Building
Education Revolution; the framework for educational outcomes proposed in the Melbourne
Declaration; and state-based initiatives such as Victoria’s Department of Education and
Early Childhood Development (DEECD) eduSTAR ICT Design Model for Schools: Best
Practice Guide for Implementing ICT into School Buildings work.
Scope
K –12 Architectural Framework
This blueprint is an Architectural Framework of core technical services for K–12 education
systems built across a network environment. While the implementation of the baseline
infrastructure is instrumental to building and supporting a modern learning environment,
this blueprint does not look in detail at specific system-wide approaches to efficiency,
environmental and security solutions. As such, it does not specifically address how
technology can support holistic system reform, instructional technology, learning
environment design, or the direct support of informal learning environments across the
community or integrated service delivery approaches.
In forming a blueprint for K–12 education, three core services are considered for anchoring
the network, and providing immediate benefit at scale across the system:
1. Greener Schools: As energy costs rise and administrative budgets are reduced, intelligent
and energy-efficient buildings are high on the priority list for schools and education
departments. Converging disparate building networks into a common IP backbone marries
energy efficiency, technology infrastructure and green initiatives. This may involve virtualising
the infrastructure to reduce the size and cost of the physical cable plant.
2. Safer Schools: Creating and maintaining a safe environment and protecting the welfare
of students is top of mind for schools. Traditional risk factors within schools such as physical
violence, theft and vandalism need to be mitigated. Controlled building access, or using
radio-frequency identification (RFID) tagging to protect assets, is quickly becoming a
popular practice. Emergency response capabilities are critical to counter natural or other
threats to schools.
Cisco’s Open Platform for Safety and Security (COPSS) ensures the platform and
networking are in place to provide the necessary technology to enable schools to reach
out immediately in emergency response situations. This allows schools to provide critical
information to everyone at once (including emergency services, parents, teachers and
students) to proactively reduce and thwart threats before they evolve into crisis situations.
3. Smarter and More Efficient Schools: With school budgets and funding sources tightly
monitored and regulated in the current economic climate, many Australian schools are
striving to improve operational efficiencies. Schools can increase productivity and flexibility,
reduce costs and improve responsiveness with fewer resources by using network and
technology solutions to improve communications, automate routine tasks and streamline
management and operations.
page 3 of 27
Cisco Research
The diagram below provides a visual summary of this K–12 Architectural Framework.
Cisco has produced other papers that address these specific issues, which are available
along with supporting white papers and thought leadership documents, at
www.transformglobaleducation.com. An additional community of leading practice
is supported at www.GETideas.org.
Capability Overview
Fundamental Concepts and Services
The reference architecture for the K–12 Architectural Framework is predicated on enabling
21st century learning by integrating technology in the classroom. The ‘classroom of the
future’ is service-enabled, enhancing the learning environment by facilitating collaboration
with other schools across the community, the state or even nationally.
This technology integration extends beyond the classroom to facilities management, with
digital building systems placing energy efficiency controls at the teacher’s fingertips via
XML applications integrated with the IP phone in the classroom. These controls include
climate and lighting, as well as more sophisticated intelligent building solutions that reduce
power consumption by deactivating areas of the school that are not in use, or powering off
devices after school hours.
Physical security can also be converged onto a common IP backbone within a school
and across a school district. IP video surveillance cameras and line-powered bells and
alarms can be directly integrated with the network. Video surveillance and analytics can be
monitored and stored locally at the school and centrally to enhance physical security. Bells
and alarms are integrated with emergency response applications, enabling emergency
instructions to be delivered through the communications infrastructure back to the district,
as well as to public safety and emergency service providers. Additionally, digital signage
provides real-time awareness of emergency alerts and messaging, both in the classroom
and throughout the school.
School administration applications securely converge data-rich information about students
with the communications system. Access to this information allows schools to record
student attendance and notify parents of absences via automated messages or voicemail.
Student records can be securely accessed by the school nurse via the IP phone or a
wireless handheld device in the event of a medical incident, and announcements and alerts
can be delivered to specific classrooms.
page 4 of 27
Cisco Research
Mobile communications – in the form of a Wi-Fi IP phones – can be provided to teachers,
enabling them to roam freely throughout the school, and between schools. This also gives
teachers immediate access to communications resources in the event of an emergency,
further augmenting safety and security practices at the school.
These are just some of the possibilities that can be achieved with the K–12 Architectural
Framework. By laying out the Service Framework and underlying infrastructure to
support these baseline services, schools can further expand their capabilities through
inter‑school collaboration.
K –12 Service Framework
The K–12 Service Framework is a fundamental building block of 21st century schools.
This foundation creates an infrastructure that transforms the network beyond simple
connectivity and bandwidth, to a platform for delivering differentiated services, thereby
extracting further efficiencies from the infrastructure.
The Service Framework leverages the capabilities of proven, interoperable technologies,
enabled through service tiers which are pervasive across the network infrastructure.
Services build off one another to form specific school and system offerings. Service tiers
provide a methodology for categorising and differentiating services to create solutions to
schools across K–12.
In designing any K–12 environment, these service delivery considerations must be
addressed to implement a foundation that is:
•Available and scalable
The network-as-a-platform has taken on a new role and is now considered critical
infrastructure, requiring high levels of availability and scalability. Classic perimeter security
is no longer sufficient as users become more mobile. Security must be pervasive across
all levels of the architecture and network.
•Focused on functionality
Services and solutions are integrated into the network foundation as integral offerings
to schools. For instance, security, unified communication, collaboration and mobility are
all critical elements of the network. Because the network is aware of these services and
solutions, and understands their functions, the network can make an informed decision
about how to direct relevant information across the school and system infrastructure.
•Adaptive and interoperable
An intelligent network must be able to provision, optimise, analyse and defend itself.
These capabilities must be embedded to enable self-governance, which in turn results
in lower operational costs, greater capabilities and increased adaptability. Interoperability
helps reduce duplication, inefficiencies, and training requirements. It can also reduce
communication conflicts that can arise from stand-alone proprietary systems.
page 5 of 27
Cisco Research
Reference Architecture
The reference architecture provides the foundation to deliver enhanced services and
solutions that will optimise school operations, while allowing schools to adapt and respond
to the changing needs of students and educators.
The K–12 Service Framework
The following figure is a notional architecture for a school network, based on the concepts
and methodologies of the K–12 Service Framework. This diagram depicts a Metropolitan
Area Network (MAN), which proposes a multi-school network within the state-wide system
that links central departmental systems with associated schools via Gigabit Ethernet (GigE)
connections over optical fibre.
This topology, by design, follows enterprise architecture best practices with a well-defined
hierarchical core, distribution and access layer, to further enhance the concepts and
methodologies of the design guidelines.
A similar hierarchy can be seen in individual schools featuring a similar layered network
topology, which will still allow services to be incorporated at the school level to provide
a level of autonomy, service distribution and localised management.
Core design considerations
By following key design principles, the fundamental networking architecture can support
required services regardless of a school’s location, as part of a system or a specific location
on a campus.
page 6 of 27
Cisco Research
Some of these key considerations are:
• Latency and bandwidth: GigE access where possible, as speed of access is a high priority.
• High availability: Implement a strategy for sub-second convergence. There is a need to
account for protection at the access layer. Implement a strategy that leverages centralised
and localised school services as backups for each other, ensuring there is a survival
strategy. Each school needs to be able to function on its own, should its connection
to the central system be severed.
• Quality of service: Essential for collaboration services such as unified communications,
videoconferencing, telepresence and digital media.
• Mobility: Implement high-speed wireless LANs to provide mobile access to voice
services, voice applications and multimedia services.
• Identity and confidentiality: Authentication and authorisation of endpoints and end users
on the network. Enforce encryption policies, leverage network admission control and
endpoint security strategies to mitigate risks and neutralise threats.
These and other considerations will be detailed in the next section of this blueprint, which
addresses the individual technology services that define the K–12 Reference Architecture.
Leveraging the network for full value
Resilient borderless networks are instrumental to modern learning environments. Basic
issues of connectivity, wireless access and mobility are immediately evident as necessary
to create those modern learning environments.
The network can also drive greater value by enhancing online security in teacher-student
interactions, improving efficiency by reducing the total cost of ownership (TCO) for network
systems, and improving the student experience by enabling video and user-selected devices.
Closing the “Architecture Gap”
Cisco Architectural Strategy in Action
Educational
Challenges
Increased Educational
Outcomes
Operational
Efficiency
Sm
ts
E-Learning
Video
Raise Student / Teacher
Satisfaction
ia
Consistent
Mobility
Change Student
/Teacher Interactions
C
ce
W
is
e
M
ed
Streamline
Education Efficiencies
gy
vi
s
p
Ga
Increase
Productivity
er
er
re
ctu
En
ite
Lower Energy
Costs
ch
ar
Ar
Reduce Total
Cost of Ownership
ne
t
le
an
Ai
An
Tr
u
yC
st
on
r
Se
ne
c
ct
Technology Innovation
LAN
Switching
Branch
Routing
Wireless
Datacenter
Switching
Datacenter
Routing
These services are enabled by a resilient network fabric that allows schools and state-wide
systems to develop an architectural approach to building and delivering services. Cisco’s
Service Ready Architectures and Validated Design for Schools is available at:
www.cisco.com/go/designzone.
page 7 of 27
Cisco Research
Technology Overview:
The K–12 Service Foundation – A Borderless Network Infrastructure
The foundation of the K–12 Reference Architecture is the enterprise architecture through which
all services and technologies flow for K–12 school and state-wide system environments.
Critical Technologies
Stacking switches in wiring closet
Stacked fixed-configuration switch solutions make sense in the wiring closet when:
• a modular switch is overkill
• when port density may change up or down over time without a concern about
reconfiguration downtime
• the flexibility to add new fixed-configuration switches in a phased approach is desired.
Stacked switches in the wiring closet are well suited to high demands for system uptime,
when use of existing power supplies is desired, or when management of a single switch
versus multiple switches reduces the number of devices to configure.
Cisco Systems has several stacking solutions for the wiring closet that allow the switches
to be managed as one switch and to share one or more uplinks to the distribution layer in
the building.
The Cisco stacking solutions are:
• Catalyst 2960S (single IP address for stack management, two stack ports per switch),
up to nine per stack
• Catalyst 3750X and 3750G Series (single IP address for stack management, two
StackWise ports per switch), up to nine per stack.
Quality of service enablement
Voice, video and other real-time classes of IP network services have strict requirements
concerning packet loss, delay and the variations in delay (also known as jitter). To meet
these requirements, the fabric of the K–12 Reference Architecture incorporates Quality
of Service (QoS) features throughout its infrastructure to allow the proper prioritisation of
real‑time traffic.
The QoS components for the K–12 Reference Architecture are provided through rich IP
traffic management, queuing and shaping capabilities. Key elements that enable QoS include:
• traffic marking
• enhanced queuing services
• link fragmentation and interleave (LFI)
• compressed RTP (cRTP)
• low latency queuing (LLQ)
• link efficiency
• traffic shaping
• call admission control (CAC) – bandwidth allocation
• embedded event management
• network-based traffic flow statistics gathering
• Dynamic Host Configuration Protocol (DHCP) snooping
• Cisco LAN Management Solution (LMS)
• authentication and identity services.
page 8 of 27
Cisco Research
Medianet
The infrastructure must be ‘media aware’. Rather than a network, the infrastructure forms
a media network, or medianet. A medianet is aware of the content and applications
being used and configures and optimises itself accordingly. The infrastructure devices
communicate among themselves and (in the future) with the media sources and sinks
(endpoints). By doing this, an end-to-end view of the media path through the network can
be established for monitoring and troubleshooting.
Smart Operations Environment
Managing network infrastructure devices individually can lead to significant operational
expense. Potentially hundreds of configurations must be stored, maintained and audited.
Stacking can greatly reduce the device count, but for some environments many individual
devices may remain.
A smart operations environment allows for one to two switches to maintain a database of
connected downstream switches. In this database, configuration and software information
is stored and backed up automatically to a central server. In the event of a new device
being deployed, a suitable configuration is automatically retrieved, a software image is
downloaded and the new device is provisioned in a matter of minutes. Once a smart
operations environment has been set up, the skill level required to install a new device is
greatly reduced.
IPv6 capability
IPv6 deployments are still in the very early stages in the K–12 environment. However, the
explosion of portable devices in the classroom means IPv4 address spaces – even private
ones – are being exhausted. The challenge facing administrators is to either:
• delay moving to IPv6 and re-address the IPv4 addressing scheme, thereby delaying the
inevitable need to move to IPv6
• move to IPv6 today, which raises other challenges around application support and
compatibility with IPv4-based Internet as it exists today.
When investing in a long-term infrastructure, IPv6 capabilities must be considered. Over the
next few years, IPv6 will become a viable option for network addressing and will alleviate
some issues being encountered in large-scale IPv4 environments.
page 9 of 27
Cisco Research
1. Greener Schools
Measuring, managing and monitoring energy use is key to cutting costs, power
consumption and greenhouse gas emissions, and reducing the environmental footprint of
systems and buildings.
Using converged IP-based network technology across the system can bring together
disparate sets of systems to manage power in a building, and to manage devices with a
common view and set of policies such as wireless, building, lighting and PC control. This
convergence can in turn help reduce resource use while maintaining service accessibility,
responding to growing green regulatory requirements, reducing the environmental effects
of school buildings and increasing power consumption driven by device proliferation, and
addressing growing public demands for greener facilities that meet community expectations.
Critical Technologies
Power usage monitor in hardware
On a per-port and per-device basis, power usage monitoring is the ability to monitor Power
over Ethernet (PoE) usage by client devices and aggregate this information for querying
by remote power management applications. This allows building field controllers to report
information through the converged network, as well as receive secure instructions for
operational changes.
With further enhancements, time-based power management is also possible. Through
per-port power conserving features in hardware such as the Cisco Catalyst® switching
range, devices may be controlled automatically to conserve power during off-hours. The
PoE Management Information Base (MIB) would be used to collect and interpret data from
the access layer switches.
Cisco EnergyWise
Cisco EnergyWise® technology is an innovative architecture integrated within the Cisco
Catalyst switching portfolios that promotes system-wide sustainability by reducing energy
consumption across an entire, state-wide infrastructure. It leverages a highly intelligent
network-based approach to communicate messages that measure and control energy
between network devices and endpoints. The network discovers Cisco EnergyWisemanageable devices, monitors their power consumption, and takes action based on
business rules, to reduce power consumption.
Cisco EnergyWise technology uses a unique domain-naming system to query and
summarise information from large sets of devices, making it simpler than traditional network
management tools. Its management interfaces allow facilities and network management
applications to communicate with endpoints and each other using the network as a
unifying fabric. The management interface uses standard single network management
protocol (SNMP) or Secure Sockets Layer (SSL) to integrate Cisco and third-party
management systems.
Digital building systems
Merging building and IT systems over IP can deliver efficiencies and benefits that fully
leverage the capabilities of network convergence. These benefits include:
• optimised remote control, monitoring and reporting of building systems, including
centralised management of a distributed state-wide infrastructure
• intelligent heating, ventilation, and air conditioning (HVAC) and lighting systems,
resulting in reduced energy consumption costs
• single cable plant deployment, providing compelling reductions in infrastructure
cabling costs.
page 10 of 27
Cisco Research
2. Safer Schools
A safe school employs the right tools to ensure the safety of students, staff and faculty
and responds immediately and effectively in the event of an incident. Providing a safe
school environment can be a key differentiator for student and staff recruitment. Building a
reputation for safety also facilitates broader integration of a school into the local community
and enhances the community’s reputation as a whole.
Enhancing school security does not require security solutions to be unified in one
environment, but requires collaboration between environments. Whether it is network
security, video surveillance, video analytics, emergency services, unified communications
applications, or a combination of these services, it is the convergence of these solutions
that provides a more secure school environment.
Critical Technologies
Identity management
As the number of network devices increases in schools, the need for identity management
techniques also increases. There is now a desire for a mechanism to associate identities
with the port-of-access to the LAN to establish authorised access. The IEEE 802.1x standard
ties the Extensible Authentication Protocol (EAP) to the wired and wireless LAN media and
supports multiple authentication methods.
The IEEE 802.1x standard defines a generic framework that can use different authentication
mechanisms without implementing these mechanisms outside the backend authentication
infrastructure and client devices. The standard specifies a protocol framework between
devices desiring access to a LAN (supplicants) and devices providing access to a
LAN (authenticators).
Network admission control
Within the state-wide and school environment, protecting sensitive student and staff
information is a top priority. Network admission control provides registration and enforcement
utilities that allow a school or state-wide network administrators to authenticate, authorise
and evaluate users and their machines in a controlled environment prior to granting access
to the network and internal resources – either through wired or wireless access. Being able
to deploy network admission control in out-of-band or in-band topologies allows flexibility in
implementation, as well as the ability to address wireless and VPN access.
Some of the key benefits of deploying network admission control include the following:
• Multiple user groups can have defined roles correlated to the areas of the network they
can access.
• Full network admission control features are available for wireless networks and those
users entering via VPN connections.
• Guest access control, to define the areas they can access.
• Security and encryption for staff can be for specific areas only.
• Automatic security policy updates can be enforced throughout the state.
• Authentication and authorisation with single-sign-on.
Centralised access control
Even with a relatively limited number of devices on the network to manage, maintaining
robust access security on those devices over time is a challenge. With the addition of new
user groups – including teachers, thousands of students, administrators and guests – the
security challenge grows exponentially.
page 11 of 27
Cisco Research
A centralised access control system receives requests from devices throughout the
network, then checks credentials, clearances, authorisations and posture – the collection of
attributes that play a role in the conduct and ‘health’ of the endpoint device that is seeking
access to the network. That means Cisco Secure Access Control Server for Windows
(ACS) has to interact with various external user databases (Microsoft Active Directory or
LDAP) and engines to come up with the right decision. Cisco Secure ACS then registers
the request and enforces the relevant action on the network device – allowing the right
access to the right user. Cisco Secure ACS can act on both user access and device
administration policies.
Cisco Secure ACS supports both key device protocols – RADIUS and TACACS+ – required
for identity and access control. This allows access control to be centralised in a single
system. Cisco Secure ACS has the interfaces to interoperate with existing identity and
policy databases and systems to make multi-dimensional access policy decisions. It is not
just a single server, it is a system that can be deployed and distributed as needed to meet
availability, performance and resiliency requirements. Cisco Secure ACS provides the tools
and interfaces to manage deployments supporting large numbers of users and network
devices. Cisco Secure ACS reporting, alerting and troubleshooting capabilities provide
maximum visibility into authentication and authorisation activities across the network.
Cisco Integrated Security Features
The network switches that handle wired and wireless user access to the network are
often the source locations for attacks on an internal network. These switches are also the
best place to protect the network. Specific features in the wireless network hardware and
software can help prevent these types of common attacks, including:
• MAC flooding attacks
• DHCP rogue server attacks
• DHCP exhaustion attacks
• ARP spoofing attacks
• IP spoofing attacks.
The Cisco Integrated Security Features (CISF) enables these preventative measures.
Features such as Port Security, DHCP Snooping, Dynamic ARP Inspection and IP Source
Guard are used at the network edge, to stop these attacks closest to the source.
Video surveillance cameras using IP network infrastructure
Schools and administrative regions can use centralised digital network to store captured
video for review and analysis.
page 12 of 27
Cisco Research
3. Smarter and More Efficient Schools
Leveraging the reference architecture for the K–12 Architectural Framework, Cisco Unified
Communications delivers innovative and integrated solutions that ensure the central
department is communicating in the most effective and efficient manner. These IP-based
communication services improve state-wide communications, safety and productivity,
while offering significant cost savings to optimise operational efficiency.
Through more effective network use, schools can improve asset management by better
conforming to appropriate usage policies and providing more consistent user experiences
across physical and virtual campus environments. A resilient network is important to drive
video usage in classrooms, secure cloud and wireless environments, and manage the
proliferation of devices.
Critical Technologies
Quality of service enablement
Voice, video, and other real-time classes of IP network traffic have strict requirements
concerning packet loss, delay and the variations in delay (also known as jitter). To meet
these requirements, the reference architecture for the K–12 Architectural Framework
incorporates QoS features to allow the proper prioritisation of real-time traffic, such as traffic
classification, queuing, traffic shaping, compressed Real-Time Protocol (cRTP) and TCP
header compression.
Intelligent recognition and management of end device
As the variety of PoE devices and capabilities increase over time (IP phones, access points,
building operations), the network’s ability to understand what is physically connected to the
Ethernet ports becomes even more critical. Different devices draw different amounts of
power, have different traffic profiles, and may have different VLANs associated to multiple
functions. Network hardware should be able to communicate with these devices, recognise
them, and automatically make the appropriate network modifications to support the end user.
Cisco Systems has implemented several enabling hardware and software technologies
throughout the network to support seamless Unified Communications. When an Ethernet
device is connected in a school building, the Ethernet switch will automatically sense
the type of device connecting and automatically apply the following functions using
six key technologies:
• Power: determines what kind of power the device needs, including PoE pre-standard or
IEEE 802.3af, applies the power, monitors power use while connected and reports power
consumption to management tools.
• VLAN association: determines what type of device is connected, then applies the proper
VLAN policy to the device.
• Automatic QoS enablement: enables QoS on the port to properly match the traffic profile
of the device.
• Trust boundary: determines appropriate trust levels for the device based on trust policies
in force across the network, and puts these into effect immediately.
• Location detection: provides CDP information to the device, which allows it to register
location-to-location services (CER) on the network.
• Auto Smartport: uses custom macros to automate the handling of device enablement.
Cisco Unified Communications
Unified Communications is the delivery of fully integrated communications, by enabling
data, voice and video to be transmitted over a single network infrastructure using
standards-based IP.
page 13 of 27
Cisco Research
Unified communications integrated applications – improving productivity
and responsiveness and reducing costs
By leveraging the flexibility provided by XML applications that use the IP phone as a
delivery endpoint, schools can improve productivity and responsiveness and reduce costs.
Examples include:
• Student attendance: take attendance, record absences and send messages to the
student’s parents via Cisco Unified Messaging across the K–12 infrastructure.
• Real-time look-up of student records: for medical information, data and parent contact
information.
• A single interface to reach emergency services: school or state-wide emergency
messages delivery, weather/natural disasters notification, photo notification of on-site
visitors, etc.
Remote site survivability
In a school and system-wide environment, survivable remote site telephony (SRST) allows
the use of a centralised call-processing model, while providing backup communications
paths in case of a network failure across the WAN or MAN. Upon a WAN/MAN failure, the
school IP phone or gateway registers the failure on the SRST-enabled router, which then
provides telephony services for locally connected phones and PSTN voice modules.
• All Cisco IP Phones are supported.
• VG224, VG248, or ATA 180 Series can be used for analogue devices.
• Flexibility of PSTN trunk choice – FXO, DID, E1, BRI & PRI.
Virtual desktop infrastructure
As portable computing numbers increase exponentially in the classroom, a number of new
challenges are arising for Australian education systems.
Students and teachers increasingly want the flexibility of bringing their own devices into
classroom environments. This is potentially challenging on a number of fronts, including:
maintaining security while allowing access to a standard service-oriented architecture
(SOE) for these devices, and catering to low-power computing devices for high power
applications such as video.
Desktop virtualisation decouples the desktop operating system from the client device. The
applications and operating system reside in a data centre and client devices access them
via a lightweight screen-sharing protocol.
What is
a Virtual
Desktop?
page 14 of 27
Cisco Research
By virtualising desktops, any client device can access the virtualised operating system
and applications. Desktop virtualisation extends the life of client devices by a number of
years, as CPU and other capabilities do not need to increase to support more complex
applications. It also allows schools to support almost any client device, be it smartphone,
Apple, Microsoft Windows or a tablet-based option.
Private and public clouds
There is plenty of interest around cloud-based offerings, with good reason. In K–12 learning
environments, both public and private cloud solutions warrant consideration.
• Public cloud: Open or public clouds for K–12 solutions pose some challenges, including
concerns about student information being stored by third parties and the need to protect
access to that data.
• Private cloud: This presents some viable options for schools that do not want to own
and maintain large amounts of infrastructure, but still want the ability to deploy their own
server-based applications (or virtual desktop environments).
Infrastructure as a Service (IaaS): Infrastructure hosted in a central data centre allows
technicians in schools to provision servers via a portal with a choice of operating system,
RAM, storage and CPU configurations. Suitable applications can be deployed on the virtual
server and it can be used as a normal physical server at the school. A service catalogue
can be established, allowing commonly deployed server configurations and applications
to be chosen via the portal and rapidly deployed. This gives a school all of the advantages
of running its own server infrastructure without the complications of power, space, cost
and maintenance.
Software as a Service (SaaS): This provides schools with a service catalogue of hosted
applications, allowing them to subscribe to these applications and have them delivered
via the underlying network infrastructure. Similar offerings already exist in most state-run
educational systems, but it is important to understand that the infrastructure supporting
the IaaS offering above is identical to the infrastructure for the SaaS offering.
Conclusion
Cisco’s Borderless Networks architecture is being used in K–12 learning environments
across Australia and around the world to consolidate multiple networks into a single IP
network. This allows more efficient delivery of IT functionality within, and across, multiple
schools, as well as the provision of additional services across the network to improve the
experience for students and staff with an anywhere, anytime and any device approach.
The Cisco Borderless Network Architecture uses the power of the network to provide:
• a consistent policy architecture for staff, students and guests
• transparent mobility with location services for anytime, anywhere learning and asset
tracking
• security for devices on the local network and across cloud services, enabling
collaboration with other schools, law enforcement and school departments, while
maintaining student privacy
• reduced energy costs and improved sustainability for efficient and cost-effective operation
• optimised application performance for video and Web 2.0 services, providing a more
engaging learning environment
• policy-based access control and identity-aware networking, to enable access and
collaboration while protecting business-critical applications
• compliance with current and future educational regulatory requirements.
page 15 of 27
Cisco Research
Case Study:
Broadmeadows School Regeneration Project
Technical Case Study
Introduction
The Broadmeadows School Regeneration Project (BSRP) Digital Campus involves
establishing a sound foundational network infrastructure in schools, to enable nextgeneration teaching and learning. The BSRP is located in the suburb of Broadmeadows,
Australia, 16 kilometres north of the Melbourne CBD. The project represents a large multiyear capital investment by the Victorian Government, aimed at redeveloping the learning
environment to improve teaching and supporting student outcomes in this economically
challenged and increasingly diverse community.
The BSRP Digital Campus employs a foundational network infrastructure on BSRP
campuses that have sufficient capabilities to support next-generation learning
technologies, such as video technology, which can be used to support student learning
and teacher development, and to improve campus safety and security.
Cisco performed a high-level review of existing campus LAN and wireless LAN – as well as
the campus WAN connectivity currently being deployed – and looked at opportunities for
enhanced operational efficiency in unified communications and energy management.
Current State Summary
Table 1: BSRP current state summary
School
WAN
LAN
IPT
CCTV
Dallas (and Upfield merged) Primary School and
Kindergarten
Bethal Primary School
Broadmeadows Primary School
Broadmeadows Special Developmental School
Coolaroo South Primary School
Dallas North Primary School
Hume Valley School
Hume Central Secondary College (HCSC)/(Town Park)
Meadows Primary School
Broadmeadows Valley ( Dimboola St)
Deployed
Optioned
Deferred
page 16 of 27
Cisco Research
Technology Summary
Table 2 provides a high-level overview of technology deployed across the BSRP campus,
and links these solutions back to the guiding principles of the blueprint.
Table 2: Borderless network architecture blocks
Technology
Description and Assessment
LAN and WAN
Switching and
Routing
The WAN is managed by Telstra under the eduSTAR portfolio of services known as the
VicSMART Wide Area Network.
More information: http://www.education.vic.gov.au/about/directions/vicsmart/faqs.htm
The service consists of a Cisco ISR router that delivers speeds between 4 mbps and
20 mbps depending on the school’s bandwidth requirements. This service provides
connectivity to DEECD shared services such as eduMail and the Internet.
LAN is based on Cisco Catalyst 3750 as the core switch and Cisco Catalyst 3560
as the administration and access switches.
Observations:
• Hume Central Secondary College (HCSC) reported regular high utilisation on
the WAN link.
• Only the merged schools at the Dimboola Road Campus (HCSC), Meadows Primary
School and Broadmeadows Valley Primary School reported a LAN infrastructure
as described above.
Wireless LAN
The Victorian DEECD is in the process of deploying the eduSTAR.net wireless network
– a Wireless LAN infrastructure that will be implemented in all Victorian Government
schools and as a robust and fully managed enterprise wireless network.
Observations:
• Wireless LAN was deployed across three schools in the BSRP campus.
Unified
Communications
There is limited deployment of IP telephony across the BSRP campus. It is important
to outline that a unified communications system goes beyond just IP telephony and
includes elements such as presence, instant messaging, audio conferencing, web or data
collaboration, unified messaging (a common message store for voicemail, email, and faxes),
mobility, and/or telepresence, which are all accessible in an ad hoc, multimodal fashion
through a single client interface or within an embedded application interface.
Some of the other elements of unified communications are discussed in the Building
Quality Standards Handbook, DEECD, (2008). http://www.eduweb.vic.gov.au/edulibrary/
public/propman/facility/BuildingQualityStandardsHandbook.pdf
Observations:
• Schools reported some use of Microsoft SharePoint Workspace (previously known
as Microsoft Grove).
• Schools also use Skype for communication.
Video Pedagogy
Schools used the borderless network infrastructure to enable more video-based
collaboration. This included a number of innovative approaches under the Victorian
DEECD’s Ultranet project.
http://www.education.vic.gov.au/about/directions/ultranet/default.htm
page 17 of 27
Cisco Research
Technology
Description and Assessment
Video Security
Video security is deployed across:
• Hume Central Secondary College (HCSC)
• the Dimboola Road campus (HCSC)
• Meadows Primary School
• Broadmeadows Valley
Observations:
• There are three independent systems in place, although centralised monitoring
or management has not been enabled.
Refer to the Video Security section of this document for additional information.
Facilities and
Energy Efficiency
Network-enabled building management systems were not deployed as part of the BSRP.
Enabling Change: Netbook Rollout
This initiative, which commenced in 2009, has provided approximately 10,000 students with
a wireless-enabled netbook to use anywhere, at any time. The first year of the trial produced
several highlights, and many teachers reported marked increases in student engagement;
increases in the volume and quality of student work produced; and students taking a
greater role in managing their own learning.
The netbook trial is continuing, with the rollout extending across the following regions
and student groups:
• Loddon Mallee Region: Year 7
• Barwon South Western and Grampians regions: Year 6
• Northern Metro Region (Hume cluster): Years 5–8
There are more than 1,500 netbooks available within the Broadmeadows schools (shared
between approximately 3,500 students). These netbooks are a critical tool in enabling
effective use of video. The EduStar 2.0 project contains the following audiovisual
applications:
• Audacity – A free, open-source software for recording and editing sounds
(http://audacity.sourceforge.net)
• Debut Video Capture Software – An easy-to-use video recorder program that lets users
capture video files directly onto their computer
(http://www.nchsoftware.com/capture/index.html)
• DVD Flick – A simple but powerful DVD authoring tool that lets users take a number of
video files stored on their computer and turn them into a DVD that can be played back in a
DVD player, media centre or home cinema (http://www.dvdflick.net)
• Format Factory – A multifunctional media converter (http://www.formatoz.com/)
• HandBrake – An open-source (general public licence), multiplatform, multithreaded video
transcoder, available for Mac OS X, Linux and Windows (http://handbrake.fr/details.php)
• Pencil – A free, open-source animation and drawing program for Mac OS X, Windows, and
Linux, which lets users create traditional hand-drawn animated cartoons using bitmap and
vector graphics. (http://www.pencil-animation.org)
page 18 of 27
Cisco Research
• Pivot Stickfigure Animator – A unique program that allows users to create stick figure
animations easily and without any artistic skills
(http://www.snapfiles.com/get/stickfigure.html)
• QuickTime Player – A powerful multimedia technology with a built-in media player that
lets users view online video, high-definition movie trailers and personal media in a wide
range of file formats (http://www.apple.com/quicktime/what-is/)
• Songsmith (Academic Edition) – A program that generates a musical accompaniment to
match a singer’s voice. The user only needs to choose a musical style and sing into the
computer’s microphone, and Songsmith will create the backing music
(http://research.microsoft.com/en-us/um/redmond/projects/songsmith/)
• VLC media player – A powerful media player that plays most media codecs and video
formats (http://www.videolan.org/vlc)
• VirtualDub – A video capture and processing utility for 32-bit and 64-bit Windows
platforms (http://www.virtualdub.org/)
• Wax 2.0 – A flexible, high-performance video composition and special effects software
(http://www.debugmode.com/wax/)
• Windows DVD Maker – An application included in premium editions (Home Premium
and Ultimate) of Windows Vista, Windows 7 and above editions, which allows users to
create DVD movies that can be played using DVD-playback software or on a standalone
consumer DVD player
• Windows Live Movie Maker – A program that lets users create movies and slide shows
from photos and videos, and share them with friends and family
(http://explore.live.com/windows-live-movie-maker)
• Windows Media Center – A piece of software that turns a PC into a powerful TV, bringing
TV shows and entertainment to one place
(http://www.microsoft.com/windows/windows-media-center/what-is-it/default.aspx)
• Windows Media Player – A standard inclusion in Windows, that lets users watch and
listen to multimedia entertainment
(http://windows.microsoft.com/en-US/windows/products/windows-media-player).
While the above list of software provides comprehensive capabilities for media recording
and playback, there is still scope to further enhance the power of the netbooks by enabling
them with:
• a high-quality VoIP client that supports voice and video calling between devices in the
DEECD network
• access to a web-conferencing and collaboration service to allow device-to-device web
meetings and e-learning class delivery
• access to a social video system (in the DEECD cloud) that helps create highly secure
video communities in which to share ideas and expertise.
Video Security
Overview
School administrators are entrusted with creating a safe learning environment for their
students and staff. In primary schools and pre-school environments, the main safety
concern is monitoring entries and exits to the school, to make sure unauthorised adults do
not enter or leave with a child. In secondary schools and high schools, major goals include
preventing violent activities such as theft, graffiti, vandalism, and fighting and bullying
between students.
IP-enabled video surveillance at the Broadmeadows school campus enhances security
and safety for staff, students and visitors, and for facilities and equipment, by connecting
page 19 of 27
Cisco Research
separate video surveillance systems. In addition to video analytics, the value of video
surveillance has grown significantly with the introduction of motion, heat and environmental
sensors. Video surveillance enables school administrators to monitor activities within
individual campuses and throughout the Broadmeadows school precinct, so they can
prevent, deter, detect, and respond to safety incidents.
Business use cases
Based on the BSRP experience, the following seven examples demonstrate best practice
use of the network to improve security.
Table 3: Video security use cases
ID
Use Case
Descriptions
VID-SEC-01
Enhance student safety
Video surveillance enables real-time response and intervention.
VID-SEC-02
Improve response time
Increased situational awareness through an IP-connected video
network means faster responses to emergencies.
VID-SEC-03
Monitor student activity
Administrators and staff can view video from wired and wireless
cameras across school grounds at any time, simultaneously.
VID-SEC-04
Protect campus assets
Centralised management optimises resource allocation
by allowing remote monitoring after school hours or during
summer vacations.
VID-SEC-05
Involve parents
Limited video access to specific classrooms or for specific
activities can encourage greater parental participation and
engagement in the educational process.
VID-SEC-06
Manage devices
and alarms from a
centralised location
Centralised management allows all campus security systems
to be controlled from one centralised location with the ability to
transfer control and monitoring to any other point in the network
in an emergency.
VID-SEC-07
Place cameras where
needed on the campus
Wireless camera options allow camera placement without
additional wiring.
Technology solution
Video security solutions include software and hardware to support video transmission,
monitoring, recording and management. The video surveillance solution works in unison
with the advanced features and functions of the IP network infrastructure – switches,
routers and other network security devices – to enable secure, policy-based access to
live and recorded video. All components of the video surveillance solution are linked on an
intelligent IP network and resilient infrastructure with high availability.
A key part of the video surveillance solution is its ability to enable education administrators
and security personnel to view, manage and record video locally and remotely using the
IP network and a standard Internet browser. Video can be securely accessed anywhere, at
any time, enabling faster response, investigation and resolution of incidents. Video can be
recorded and stored locally or off-campus (for example, in a Security and Facilities Operation
Centre), allowing it to be managed and aggregated with video from multiple locations.
Network-centric video surveillance solutions are easier to manage and deploy and provide
standardised capabilities throughout the Broadmeadows school precinct.
page 20 of 27
Cisco Research
Solution components – IP cameras
Table 4: Examples of video surveillance IP camera components
Device
Description
IP cameras
Feature-rich, professional digital cameras have an enhanced progressive scan imager
for excellent video and colour – even in the most demanding lighting conditions. These
fully featured high-resolution cameras use MPEG-4 compression to produce DVD-quality
video. They also include automatic day/night mode, dual streams, bi-directional audio,
motion detection, alarm inputs and outputs, and an analogue BNC connector for ease
of installation.
IP dome cameras
High-resolution, feature-rich digital IP dome cameras deliver superior performance in a
wide variety of environments. These vandal-resistant, rugged, outdoor cameras can cope
with high or low temperatures, moisture and dust.
IP gateway
encoders
IP gateway encoders enable a wide range of analogue video cameras – including pan-tiltzoom (PTZ) models – to be connected and controlled over an IP or Ethernet network. In
many cases, IP gateway encoders eliminate the need for analogue matrix switches, fibre
optic distribution amplifiers and multiplexers, and physical security personnel can access
the video in remote locations over the IP network, reducing video surveillance deployment
and operational costs.
Solution components – network-centric
Table 5: Examples of video surveillance centralised management components
Software
Description
Media Server
The Media Server software manages, stores and delivers video for network-centric video
surveillance, and performs the following networked video surveillance system functions:
• Collection and routing of video from a wide range of cameras and encoders over an IP
network
• Secure local, remote and redundant video archiving capabilities
• Event tagging for review and archiving purposes
• Bandwidth management for live distribution and historical recording.
Operations
Manager
Operations Manager enables users to efficiently and effectively configure and manage
video throughout the campus. The software provides a secure web portal to configure,
manage, display and control all video in an IP network. This allows users to manage a large
number of security assets, cameras, encoders, DVRs and event sources, as well as digital
monitors powered by Virtual Matrix.
Operations Manager authenticates and manages access to video feeds. It is a centralised
administration tool for managing media servers, virtual matrices, cameras, encoders and
viewers – and for viewing network-based video.
page 21 of 27
Cisco Research
Sample solution (Blair Street)
Figure 1 – Blair Street video security
Energy and Facilities Management
Introduction
Measuring, managing and monitoring energy use is central to reducing overall costs,
organisational power consumption, greenhouse gas emissions, and total environmental
footprint. Using converged IP-based network technology to connect disparate systems can
improve power management in schools and other DEECD buildings.
This can be achieved using devices with a common view and set of policies such as
wireless control, building control, lighting control and PC control. This in turn helps reduce
resource consumption while maintaining service accessibility. It helps building operators
respond to increased ‘green’ regulatory requirements; reduce the environmental effects
of school buildings; cut growing power consumption driven by device proliferation; and
address growing public demands for greener facilities.
Technologies
Power usage monitor in hardware
On a per-port and per-device basis, a power usage monitor checks PoE usage by client
devices, then aggregates this information for query by remote power management
applications. Building field controllers can report information through a converged network,
as well as receive secure instructions for operational changes.
page 22 of 27
Cisco Research
With further enhancements, users can achieve time-based power management. Through
per-port power conserving features in hardware, devices may be controlled automatically
to conserve power after hours. The PoE MIB would be used to collect and interpret data
from the access layer switches.
Intelligent Environmental Controls
Intelligent climate and lighting controls enable the DEECD and schools to reduce and
optimise their energy consumption. Intelligent controls can reduce or power down
environmental controls when building are not occupied.
Cisco EnergyWise Technology
Cisco EnergyWise is an innovative architecture, added to the existing Cisco Catalyst
switching portfolio, which can promote system-wide sustainability by reducing energy
consumption across an entire state-wide infrastructure.
Cisco EnergyWise uses a highly intelligent network-based approach to communicate
messages that measure and control energy between network devices and endpoints.
The network discovers Cisco EnergyWise manageable devices, monitors their power
consumption and takes action based on business rules to reduce power consumption.
EnergyWise uses a unique domain-naming system to query and summarise information
from large sets of devices, making it simpler to manage than traditional network
management tools.
Cisco EnergyWise’s management interfaces allow facilities and network management
applications to communicate with endpoints and each other, using the network as a unifying
fabric. The management interface uses standard SNMP or SSL to integrate Cisco and thirdparty management systems.
Digital building systems
Merging building and IT systems over IP creates efficiencies that fully leverage the
capabilities of network convergence. These benefits include:
• optimised remote control, monitoring and reporting of building systems, including
centralised management of a distributed state-wide infrastructure
• intelligent HVAC and lighting systems, resulting in reduced energy consumption costs
• single-cable plant deployment, reducing infrastructure cabling costs.
page 23 of 27
Cisco Research
Support and operations
Operational support
The introduction of new or changed IT services will create additional support requirements
for the DEECD support team. The following section lists the baseline skills for operating
the proposed infrastructure, as a guideline for its future implementation. Table 6 provides a
benchmark of the functional roles that should be allocated, while Table 7 outlines the skills
required to operate and maintain each technology solution described in this document.
Table 6: Baseline operational support matrix
ITIL role
Support function
Comment
Incident
management
Level 1
A core function of this role is the ability to work as part of a team with a solid work ethic,
a willingness to learn and a can-do attitude. This role is expected to work in a busy
environment and to ensure satisfactory outcomes for users. This role is not expected
to have deep networking skills, but must be able to follow and understand basic
troubleshooting processes, and must be able to clearly document the result of various
troubleshooting steps in the event of an incident.
Configuration
management
Level 2
The responsibilities of this role include diagnosing and resolving client incidents, and
performing prescribed changes to the network within DEECD’s agreed service levels. This
role is accountable for deploying devices, and monitoring and reporting on production
devices. This role will typically have a varied background and hands-on desktop, server
and network experience, and is expected to have a good understanding of networking
technologies.
Problem
and change
management
Level 3
This role will work as the hands-on technical lead to support the development of all
strategies for the network and related services. The role also includes liaising with vendors
and external service providers, and providing general stakeholder management on a
single program of work. The role is a mix of operational maintenance and support, solutions
development and technical environment governance.
Service lifecycle
designer
IT Architect
The purpose of this role is to develop and maintain appropriate infrastructure architectures
across DEECD’s overall ICT solutions. This role will represent the infrastructure group and
act as a stakeholder in the project teams of all IT programs across the schools. This role is
responsible for developing functional solutions; estimating effort and funding requirements
of new infrastructure-related services; making decisions that impact other dependent
programs; and taking responsibility for the lifecycle of all infrastructure solutions deployed
in the schools. This role will participate in the development of solution architectures in
collaboration with other solution architects and engineers, including vendor, business, data,
security and applications architects. This role will provide architecture leadership across all
DEECD ICT teams, projects and business groups. This role formally participates in DEECD’s
Enterprise Architecture forum.
page 24 of 27
Cisco Research
Table 7: Functional Operational Support Matrix for BSRP
Functional role
Knowledge
required
Campus LAN
dot1x
Layer 2 VLAN’s
ITIL function
Incident
Management
Role
performed by
Level 1
Core responsibilities
Core competencies
• A basic understanding of IT networking technologies
• Ability to understand and document user issues
Basic IP
internetworking
• Excellent verbal, written, presentation and influencing skills
Port assignment
Service and support
• Evaluating, determining and resolving a range of user or
hardware problems
User/Password
policy
management
• Following escalation procedures to ensure efficient resolution
of on-site issues
• Instructing/Training users on connectivity processes
Educational background and experience
• 1+ years experience in networking technologies
• CCNA training preferred
Unified
Communications
Voice and video
technologies
MGCP
SIP, H323, H239,
H264
Unified
messaging
Incident
Management
Level 1
Core competencies
• A basic understanding of voice and data technologies
• Excellent communication, written and collaboration skills
Service and support
• Following escalation procedures to ensure efficient resolution
of on-site issues
• Instructing/Training users on unified communications
activities
Education background and experience
• 2+ years experience in IP communications streams
page 25 of 27
Cisco Research
Conclusion
There are numerous pressures on schools today, many of which are clearly focused on
student outcomes. The Broadmeadows School Regeneration Project (BSRP) demonstrates
the important link between the learning environment and learning outcomes.
Creating change affects the facilities, faculty and school campus as a whole. In considering
change, schools today – like those in the BSRP – must ensure student experience and
performance remains a priority. School leaders are realising that the possibility of student
achievement attracts a new students and the best teachers available.
The success of the BRSP shows that the future of education is an activity, not a place.
The campus will be virtual, and it can be borderless. As we move to that virtual campus
environment, we will see more demand from teachers wanting upload lesson plans or
learning material instantly to a learning management system. We will see more demand by
parents wanting to know their children are in a safe learning environment so students can
focus on their academic and athletic performance. We will see more demand for rich media
and visual learning content that works on any device anywhere, and in doing so, facilitates
the learning process.
Securing these elements through a standardised operating environment and resilient
network is the foundation of ensuring the success of these changes. Together, these
components will clear the pathway to a better learning environment for all. This is the
achievement and promise of the BSRP, and the foundation of this technical blueprint.
page 26 of 27
Cisco Research
Terms of Use
Legal Disclaimer
The information contained in this Architectural Framework document is proprietary and
confidential to Cisco Systems, Inc. (Cisco). The Architectural Framework document is
furnished in confidence to the party requesting the document, with the understanding that
it will not, without the express written permission of Cisco, be used or disclosed for other
than evaluation purposes.
This Architectural Framework document is not and should not be construed as an offer
to contract. Some information contained in this Architectural Framework document may
reference future technology under development. All such information is subject to change.
It should be noted that, in preparing this Architectural Framework document, Cisco has
made certain assumptions. Except as expressly stated in the Architectural Framework
document or as otherwise expressly agreed upon in writing by the parties, any descriptions,
documentation, or references to third party products, to the extent they are provided in this
Architectural Framework document, shall be for informational purposes only.
Trademarks
Every effort has been made to identify trademark information in the accompanying
text. However, this information may unintentionally have been omitted in referencing
particular products. Product names that are not so noted may also be trademarks
of their respective manufacturers.
Cisco, Cisco Systems, the Cisco logo, Cisco IOS, IOS and WebEx are registered trademarks
of Cisco Systems, Inc.
©2011 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A
listing of Cisco’s trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the
word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
Intel, the Intel Logo, Intel Core, and Core Inside are trademarks of Intel Corporation in the U.S. and other countries.
EG1637/GRD1185/0911
page 27 of 27