Professional Documents
Culture Documents
For
By
Submitted by
Tata Consultancy Services
June 2012
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
Confidentiality Statement
This document contains information that is proprietary and confidential to Tata Consultancy
Services Limited, which shall not be disclosed outside Rural Development and Panchayat
Raj Department, Government of Rajasthan transmitted or duplicated, used in whole or in
part for any purpose other than its intended purpose. Any use or disclosure in whole or in
part of this information without express written permission of Tata Consultancy Services is
prohibited. Any other company and product names mentioned are used for identification
purposes only and may be trademarks of their respective owners.
© Copyright 2012, Tata Consultancy Services (TCS)
We, in our dealings, are self-regulated by a code of conduct as enshrined in the ‘TATA Code
of Conduct’. We request your support in helping us adhere to the code in letter and spirit.
We request that any violation or potential violation of the code by any person be promptly
brought to the notice of the Local Ethics Counselor or the Principal Ethics Counselors or the
CEO of TCS. All communication received in this regard will be treated and kept as
confidential.
Confidential Page 2
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
Table of Contents
1 Introduction.................................................................................................................... 4
2 BACKGROUND............................................................................................................ 5
3 JAIPUR – CITY COMPONENTS...................................................................................6
4 ACHIEVING OBJECTIVES OF SAFE & SECURE JAIPUR........................................11
5 INTEGRATED ARCHITECTURE.................................................................................12
6 PERCIEVED THREAT SCENARIO.............................................................................16
7 ACHIEVING EXCELLENCE IN LAW ENFORCEMENT..............................................19
8 IMPLEMENTATION METHODOLOGY........................................................................20
9 TRAINING METHODOLOGY......................................................................................21
10 ENGAGEMENT MODEL.............................................................................................22
11 epilogue....................................................................................................................... 25
Confidential Page 3
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
1 INTRODUCTION
Jaipur is the capital and largest city of the gold, diamond and stone jewellery besides
Indian state of Rajasthan. The city is also taking the pride of being the only city to
known as the 'Pink City'. The city today process blue diamond in the world.
has a population of 3.1 million approx.
In short, it is one of the fastest growing
It is one of the finest planned cities of city in the country.
India, located in the semi-desert lands of
Rajasthan. Some of the Jaipur Attractions Some Important locations in Jaipur:
are Hawa Mahal, Jantar Mantar, City (Courtesy: Wikipedia)
Palace, Amer Fort, Lake Palace, Jal
Mahal etc.
Confidential Page 4
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
2 BACKGROUND
Economic growth is always welcome for and the city is under constant,
any city, state or country. With the unobstrusive vigil to ensure that the law
changes to a city’s economy, various other enforcing agency are equipped with the
parameters of the city also changes. latest data to tackle the ground situation.
Primarily, there is noticeable change in the
socio-economic relationship in the city, Though our security agencies are always
along with heightned tension towards on their toes, trying to nip the activity at its
threat and security concerns. budding stage but there are occasions
when they fall short and terrorists succeed
Our awareness towards threats, both local in their attempts.One of the major
and global has increased over time. This observations is that the various security
calls for an increased necessity to agencies, though having their own
respond to such threats. The spurt in technological solutions, are not integrated
economic activity has given rise to many and hence either the information is not
communities being developed, passed proactively to nip the activity or
infrastructure being enhanced which post-event the information is not passed
provide more avenues for economic amongst themselves to handle the
prosperity. situation.
Confidential Page 5
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
Each of the two major components can be further divided into sub-components which are
depicted in the following diagram:
Confidential Page 6
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
Confidential Page 7
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
Confidential Page 8
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
Confidential Page 9
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
procession.
Confidential Page 10
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
Confidential Page 11
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
The various systems which are in place but are working in silos are depicted in the diagram
below:
One can also see from the above diagram that after having so many systems implemented,
multiple incidents happen at the same time in different areas of the city areas. Thus it has
become necessary to integrate all the above systems so that the information is passed in
real time and all the agencies work in a coordinated manner to serve Jaipur better.
Confidential Page 12
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
5 INTEGRATED ARCHITECTURE
The integrated architecture means that all the systems of Security and Service agencies converge or
get plugged to one master control center. There may be control centers for each area for taking care
of dayto- day control and support activities but they all get linked to the master control center so that
the city is one at the time of terrorist attack or disaster affecting the city as a whole. A typical
integrated system can be depicted by the following diagram:
5- 3 Integrated Architecture
TCS proposes advanced Command and Control Centers shall be perhaps the most critical assets of a
modern police force. The objective of advanced command and control centers is to provide the Jaipur
Police force with a facility to have a common operating scenario view in real time from the incident
site to head quarters and all the interlinked range offices to facilitate the response and reaction to
incidents and emergencies.
The solution must provide the responders with technology enabled management tools required for
performing the daily duties and additional requirements imposed upon them for securing the city. The
goal of the envisioned system is to maintain enable convergence of various technology systems into a
strongly integrated intelligent model which can exploit the benefits of each solution.
Confidential Page 13
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
Confidential Page 14
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
At the C4I command centre, High Command will analyze the situation and
direct emergency response units to act through a secure and unified
communication channels. The convergence of the diverse sources and
response methods will provide a common platform with real-time
information to all groups in action on the field for efficient coordination
and the commanders to make informed decisions.
Confidential Page 15
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
At local command and control center, functionalities such as GIS of local area, AVL, Data analytics
and reports shall be part of C2 to have situational awareness of local area.
Confidential Page 16
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
Entry/Exit of criminals/terrorist
Cyber Communications
Imports of Nuclear, Biological and Chemical Components
Smuggling of unwanted materials
Confidential Page 17
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
Confidential Page 18
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
Confidential Page 19
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
Confidential Page 20
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
8 IMPLEMENTATION METHODOLOGY
In order to implement integrated security architecture from the ground level to the top level,
implementation agency needs to strategically plan& analyze and prioritize the initiatives to
prepare the system blueprint. Then it becomes important to classify the system
implementation in phases based upon the priority & locations. After system implementation,
it becomes important to impart the training to the on- the- job officials by the system and
domain experts. This can be articulated in the following flow chart:
Confidential Page 21
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
9 TRAINING METHODOLOGY
TCS proposes Train the Trainer methodology before system becomes operational:
• Train-the-trainer (TTT) training and hand holding support (HHS) must be provided to the
Police
• TTT will help in creating a cadre of “application experts” within Police
• The prime objective of providing the HHS will be:
To ensure effective usage of the new application within the Police offices
To ensure a smooth transition to the new application software,
To increase the adaptability and familiarity of the application software amongst the
Police personnel (actual users),
To provide an on-the-job support based training to the actual users who will have an
opportunity to use the application software with support from the HHS team
• A central helpdesk must be set up at location specified by police
• The helpdesk will form the backend of the HHS and will support the on location HHS team
with bug fixing and problem resolution
Confidential Page 22
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
10ENGAGEMENT MODEL
Policing is the “business” charter of every State Government, wherein the outcomes
achieved in terms of public safety and security are of paramount importance. The Police are
therefore under constant stress to prevent crime, conduct investigations speedily and instill a
high level of confidence in the minds of citizens.
On the other hand, technology is constantly evolving, requiring a dedicated effort to keep
pace with technological innovations, changes and upgrades. In order to meet the business
needs that exist today, and those that emerge in future due to the changing security
environment in the country, managing technology becomes mission critical.
While the Police needs to focus on its business charter, an IT Services Company can
become the technology partner of the State for the long term. This will not only ensure
continuous technology upgrades, enhancements and obsolescence management, it will also
provide the State with a “business consulting” arm to align technology solutions with the
Police’s business needs from time to time.
TCS proposes a “pay-per-use” model for the Police. In this, TCS will setup the “State Police
IT Framework” which the Police will use as a “service” over a long term period of time. This
means TCS will make the required investment in the “State Police IT Framework”, create a
Confidential Page 23
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
technology roadmap for the State aligned with the State’s business objectives, deploy
systems from time to time, provide upgrades and enhancements, and run the related
back-office operations.
As an example, for the “e-Challan” system, TCS will deploy the handheld devices and
backend application, which the State Police shall use as a service and pay TCS a
transaction fee per Challan issued. On similar lines, pay-peruse pricing can be structured for
all of the other potential projects as well.
The proposed SLA structure will compel the IT Partner to render superlative quality of
services at all times. This in turn will ensure deployment of latest technology, compliance to
business needs of the Police and efficient support and operations by the Partner.
This will not only bring about standardization across the country, it will also allow the IT
Partner to optimize its service delivery and costs thereof.For every additional implementation
of a project thus achieved, TCS shall reduce the transaction fee for the Police based on a
tiered pricing structure. This discount shall apply to all the partnering Police Departments at
that time.
Confidential Page 24
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
Confidential Page 25
Concept Note – Safe & Secure Jaipur by Implementating of Integrated IT Enabled Architecture
11EPILOGUE
The Concept Note on Safe & Secure Jaipur is presented here suggesting a holistic
approach towards Implementing Integrated IT enabled Security Architecture.
There are disparate systems installed by various Security & Service Agencies but at the
time when the city needs them collectively in an integrated manner they remain
wanting.It is emphasized that all the systems converge into one local control centre
(areas wise) and then all the local centers converge into the master control centre. The
Local and the Master Control Centers have a single system which takes feeds as per
their respective definition and gives meaningful reports to the city authorities for taking
proactive actions and decisions.
Driven by the system architecture suggested for such a system, considerable amount of
customization is required in the software design, which follows from the study of physical
parameters of the premises/areas and anticipated threat and response time needed to
prevent security breach and serve as a deterrence.
In this backdrop, TCS is happy to share its experience in building a truly state-of-
the-art Integrated system Architecture for a Safe & Secure Jaipur.
Confidential Page 26