Specifications

Technology Upgrade Wireless 28 6250-5
1224_01
A. The Contractor shall make themselves aware of the site prior to submission of the Bid
Response.
3.02 PREPARATION
A. Complete the software based wireless networking survey.
1. Send reports to the owner and designer for review.
2. Make suggested changes from the base design drawings.
3. Provide to the cabling contractor for coordination of their installation.
B. The Contractor shall provide all hardware, software, cable, connecting blocks, electronics,
configuration, and labor required for a complete and operating system.
3.03 WIRELESS NETWORK
A. Contractor shall meet with the owner to review all possible configurations of the wireless
network.
1. Make the owner aware of all configuration parameters and any options available
regarding the configuration of the system.
2. At the meeting the contractor shall minimally discuss the following:
a. Quantity and naming of VLANS
b. Quantity and naming of SSID
c. Quality of Service parameters for different systems
d. Administrator login
e. Teacher login
f. Student login
g. No-loss roaming of devices
h. Telephone system support
i. Public Internet access and Guest tracking
j. Transmission and segmentation of Bonjour devices (Apple TV’s)
B. After the meeting the contractor shall generate a report detailing how the system will be
configured. Provide that to the owner and designer for review and owner sign-off.
C. After approval by the owner the entire system can be installed and configured.
D. The system shall be minimally configured to:
1. Support Seamless Roaming and Fast Roaming among all access points
2. Enforce User Load Balancing to continually monitor user load and automatically
redirect new users to alternative access points.
3. Configure Dynamic RF Management to calculate optimal 802.11 channel
assignments and radio power transmission levels for all associated APs and adapts
to user load, interference, RF obstacles and jamming attacks.
4. User RF Optimization shall assimilate client RF data and usage patterns along with
basic RF data from access points for improved RF tuning and user performance.
5. Take advantage of the latest Security Standards. It shall include WPA, WPA2,
802.11i/802.1x with WEP, Dynamic WEP, TKIP, CCMP, EAP-TLS, TTLS and PEAP,
PEAP-TLS.
E. The controller shall be configured to be VPN and Firewall Compatible. It shall be configured
to provide local control of access points and not require any reconfiguration of WAN routers,
VPN gateways or firewalls.
F. Load all software upgrades and WAP licenses required for a complete system.
G. User-Based Policies shall be configured to enforce security and QoS policies based on
individual user or group identity, not their device, initial access point or physical port.
H. Rogue Access Point Protection shall be configured to identify, classify and locate rogue
access points.
I. Configure the system to allow visitors simple and immediate access to the internet.
J. The system shall allow administrators to get to the local and wide area applications and
attach to the servers associated with the district.
3.04 WIRELESS ACCESS POINTS
A. The contractor shall install new access points as shown on the drawings and as determined
by the software wireless survey.