Network Infrastructure Planning For A New Healthcare Facility

Critical elements and technologies necessary

For the maintenance of the data servers that are to be used in the new clinic as well as the network connectivity, the critical elements, which needs to be looked after for the work, can be described as follows:

  • Architectural application: The basic architecture of the network needs to be changed for the completion of the proposed system. The current network configuration of the clinic has been designed to be used as a single network and a single building. Thus for the implementation of a new clinic there needs to be the complete changeover of the network system so that the new workstations can be implemented into it.
  • Security threats: The threats related to the security aspect of the project are one of the most essential work that needs to be completed. Security threats can happen at any point of time during the project. The treats related to the security aspect of a project are in the form of unauthorized access to the system of data base servers of the company, virus from the internet and data theft attacks. Prevention of such security threats are needed as one of the primary elements that needs to be cleared for the project.
  • Training of the employees: The new system would make the old system obsolete. The connection of all the aspect of the new building as well as the old system would require the use of a new form of software where the details from both the software’s are to be synchronized into a single database. The completion of this task needs to be followed with the process of training the employees to be able to work on the new system that is to be used in the clinic.

Following the understanding of the required critical elements of the project, the next step of the work is to compile the necessary requirements of the project. The following list would provide the necessary requirements for the project:

  • Intrusion detection system: An IDS is required for the proper maintenance and monitoring of the activity on the network to be set up in the new clinic. The system would help in the checking of the activity traffic and any person who would be sniffing around the network of the clinic.
  • Firewall system: A network firewall system is necessary to be setup for the new proposed system to keep out the unauthorized intrusion to the network. A firewall can be said to be one of the minimum requirement of the security policy for the setting up of the new network system.
  • Network medium for transmission: For the process of transmission of the information from the new clinic to the old clinic’s data server, there is the requirement of a network transmission medium.
  • End device: This category of devices is required for the completion of the connectivity process. This would comprise of the new workstations as well as the routers and the modems, which would help in the connection of the devices to the data server.

The case study provided for the project is related to a setting up of a new clinic, which would be able to connect to the network system and in turn make connection to the already usable network data servers. The following list of resources would be required for the completion of the project task as per the requirement of the client:

  • Database Resources: This can be considered one of the most important aspect of the completion of the network completion project. The main idea of the project would be to connect the new clinic’s network devices to the data server already in use. However, there is a requirement of setting up of a new data server for the new clinic, which would be responsible for the storage of the details of the clinic at a local repository. The data can then be transferred to the main data server.
  • Network Resources: For the completion of the network of the new clinic, there is the use of certain network resources, which would be able to connect the new clinic and the data server to the old main data server. The hardware resources required for the project are routers, network cables, switches, firewall and modems. These resources can be used for the completion of the network connectivity at the new clinic. The new network system would be implemented with the help of a local repository and a connection to the old larger database already in use. This make the use of a local data repository and a network server for the maintenance of the database.
  • Applications: The old system that were in use for the clinic required a data server. The new implementation would be to connect both the system to a single data server. This would require the complete redesigning of the application software in use. The new software would be able to store data from both the clinics along with the location of data storage. The data would be stored in the local repository and then transferred to the main data server.

The IT director of the clinic was provided with a scenario for the development of a new network system for the new clinic that would help in the connection. The main data server would be located would be in the same location as before at the Modern City Clinic. The old facility and the new facility would be connected to local repositories at separate locations. This would help in the connection of the two clinics easily. The two clinics would be connected with the help of the main data servers. The systems at each of the locations would be connected to the connected to a single router, which would connect to the local repository. The repositories would then be connected to the main server. All the routers and connections would be configured with the help of separate firewalls. The router concept would be kept similar to the previous configuration. The two local repositories would serve as the local data servers and would separately connect to the main data server. All data would be taken a backup at the end of each day. The connection between the routers and the data servers would be encrypted with high security level. The complete structure would be depicted as follows:

The implementation of the new health care system would be required for the connection of the two clinics to one data server. The following list are the main working clinical application, which would be achieved from the application implementation:

  • Digitalization of the clinical applications: This is one of the main working example of the work that would be completed in the new application system. The storing of the information such as the pathological reports and other detailed reports would be made available for the doctors on the system as well as the others in the hospital. This application would be able to save time for the workers and increase the productivity of the work.
  • A centralized database server: The implementation of one centralized data base server along with local repositories would help in the storing of the data easily. The users of the system would be able to keep up with the speed of data storage process. All the required information would be able to be stored in the server, which would be able to be then retrieved when required.
  • Availability of information to all: Once the network is completed the two clinics would be able to connect to one another with the help of the main data server. The data that is created by one of the clinics would be instantly uploaded to both the data server and the local repository. This would help in the sharing of information among all the users of the company.
  • A network based information system: The system, which would be used for the new clinic, would be able to transfer to the database and among the users of the application system in the clinics. Complete connectivity with the network would help in the sharing of information among all users of the system. Doctors would be able to receive the report instantly as soon as it is uploaded to the server.

Any form of information system integration would have certain benefits and risks associated with the implementation process. The benefits and risks associated with the implementation of the new system are discussed as follows:

  • Use of a centralized database server: The new centralized data base system would be able to help the users of the application to store information from one machine and be available at all the other machines in the clinic. This would help in the sharing of information among the different departments of the clinic easier.
  • Use of digitalized clinical approach: The digitalization of the clinical approach of the report would be able to help the company is storing the details in the database of the clinic. This would then help the company to reduce the time required for the transferring of details to the doctors. The report would also be able to be printed in an instant the customers’ requests for the file.
  • Fast and secure mode of information exchange: The network connectivity with the data server would be made secure and thus would facilitate in the transfer of secure information through the network. Once the data is uploaded into the local repository, a similar copy is also stored on the central database. The local repository connects all the system in the clinic and the data is made available to all the workers and doctors of the clinic.
  • Cost for the system: The complete system would require a lot of money and maintenance process for the complete network. The cost would be required for the purchase of the data servers and the maintenance of the wires and the security protocol of the company.
  • Security risk: The security risk associated with the use of the network might occur. At any point of time, hackers would be able to break into the system and collect data. Risks can be in the form of problems related to the theft of data.
  • Staff training: The staff of the clinic might not be technologically sound enough to grasp the technical work in the project. Most of the staff comes from management background and would require a lot of time for them to grasp the concept, which is followed for the working process of the application.
  • Privacy: There can be high risk of privacy error in the fact that there can be theft of confidential information from the clinics database related to the patient’s personal information and bank details. Secure transactions needs to be cleared with a certified secure SSL.

Resources required

The new system that is proposed in the report is to provide the company with a solution to cope up with the implementation of the new clinic system for the company. The network solution provided for the company is proper and has been developed with the proper maintenance of the networking rules and security aspect of the process. The proposed system would be integrated into a local data repository along with a centralized database for the storing of all the data from both the clinics. The use of the two level data server would be beneficial for the clinic. This system also has the ability to assist the workers in the process of completing their work faster and with the minimum amount of effort. This would thus process the work faster and make a large contribution to the work. The use of the digitalization of the reports and the works would help in the distribution of the task and the data without any effort. Keeping these objectives in mind the report has been created along with the probable solution to the network configuration. The new system would hence be of the best fit for the new clinic.

References

Agyapong, P. K., Iwamura, M., Staehle, D., Kiess, W., & Benjebbour, A. (2014). Design considerations for a 5G network architecture. IEEE Communications Magazine, 52(11), 65–75. https://doi.org/10.1109/MCOM.2014.6957145

Bai, R., Wallace, S. W., Li, J., & Chong, A. Y. L. (2014). Stochastic service network design with rerouting. Transportation Research Part B: Methodological, 60, 50–65. https://doi.org/10.1016/j.trb.2013.11.001

Baxter, M., Elgindy, T., Ernst, A. T., Kalinowski, T., & Savelsbergh, M. W. P. (2014). Incremental network design with shortest paths. European Journal of Operational Research, 238(3), 675–684. https://doi.org/10.1016/j.ejor.2014.04.018

Capaldo, A. (2014). Network governance: A cross-level study of social mechanisms, knowledge benefits, and strategic outcomes in joint-design alliances. Industrial Marketing Management, 43(4), 685–703. https://doi.org/10.1016/j.indmarman.2014.02.002

Dragan, E. S. (2014). Design and applications of interpenetrating polymer network hydrogels. A review. Chemical Engineering Journal. https://doi.org/10.1016/j.cej.2014.01.065

Ene, S., & Öztürk, N. (2014). Open Loop Reverse Supply Chain Network Design. Procedia – Social and Behavioral Sciences, 109, 1110–1115. https://doi.org/10.1016/j.sbspro.2013.12.596

Farahani, R. Z., Rezapour, S., Drezner, T., & Fallah, S. (2014). Competitive supply chain network design: An overview of classifications, models, solution techniques and applications. Omega (United Kingdom). https://doi.org/10.1016/j.omega.2013.08.006

Ferdoush, S., & Li, X. (2014). Wireless sensor network system design using Raspberry Pi and Arduino for environmental monitoring applications. In Procedia Computer Science (Vol. 34, pp. 103–110). https://doi.org/10.1016/j.procs.2014.07.059

Hatefi, S. M., & Jolai, F. (2014). Robust and reliable forward-reverse logistics network design under demand uncertainty and facility disruptions. Applied Mathematical Modelling, 38(9–10), 2630–2647. https://doi.org/10.1016/j.apm.2013.11.002

Liu, Z., Meng, Q., Wang, S., & Sun, Z. (2014). Global intermodal liner shipping network design. Transportation Research Part E: Logistics and Transportation Review, 61, 28–39. https://doi.org/10.1016/j.tre.2013.10.006

Mulder, J., & Dekker, R. (2014). Methods for strategic liner shipping network design. European Journal of Operational Research, 235(2), 367–377. https://doi.org/10.1016/j.ejor.2013.09.041

Nair, R., & Miller-Hooks, E. (2014). Equilibrium network design of shared-vehicle systems. European Journal of Operational Research, 235(1), 47–61. https://doi.org/10.1016/j.ejor.2013.09.019

Olver, N., & Shepherd, F. B. (2014). Approximability of Robust Network Design. Mathematics of Operations Research, 39(2), 561–572. https://doi.org/10.1287/moor.2013.0620

Shahabi, M., & Unnikrishnan, A. (2014). Robust hub network design problem. Transportation Research Part E: Logistics and Transportation Review, 70, 356–373. https://doi.org/10.1016/j.tre.2014.08.003

Sun, P., Mahajan, R., Rexford, J., Yuan, L., Zhang, M., & Arefin, A. (2014). A Network-state Management Service. In Proceedings of the 2014 ACM Conference on SIGCOMM (pp. 563–574). https://doi.org/10.1145/2619239.2626298

Wang, S., & Meng, Q. (2014). Liner shipping network design with deadlines. Computers and Operations Research, 41(1), 140–149. https://doi.org/10.1016/j.cor.2013.08.014

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with Answers Market
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Technology
Thank you for your work
Customer 452551, October 22nd, 2021
Psychology
I requested a revision and it was returned in less than 24 hours. Great job!
Customer 452467, November 15th, 2020
Education
Thank you so much, Reaserch writer. you are so helpfull. I appreciate all the hard works. See you.
Customer 452701, February 12th, 2023
Accounting
Thank you for your help. I made a few minor adjustments to the paper but overall it was good.
Customer 452591, November 11th, 2021
Political science
I like the way it is organized, summarizes the main point, and compare the two articles. Thank you!
Customer 452701, February 12th, 2023
Psychology
Thank you. I will forward critique once I receive it.
Customer 452467, July 25th, 2020
Finance
Thank you very much!! I should definitely pass my class now. I appreciate you!!
Customer 452591, June 18th, 2022
Business Studies
Great paper thanks!
Customer 452543, January 23rd, 2023
Political science
Thank you!
Customer 452701, February 12th, 2023
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat