Provide a clear set of requirements for the network solution

Assignment Help Computer Networking
Reference no: EM13752997

Case Study

You are a consultant working with a dental office that has just merged with another dental practice. The original office housed 3 dentists, 2 dental assistants, and 1 receptionist in one location. With the merger, there are now 5 offices in different parts of the city, 15 dentists, 12 dental assistants, and 5 receptionists. Four of the dentists work in the offices, but also are mobile in that they provide dental checkups to elderly patients in their homes or at the senior citizen centers, and to school children in the three inner-city elementary schools. The mobile dentists need to be able to send and receive patient records while they are out of the office. All the dentists and dental assistants must have real-time access to all patient records and daily schedules. The lead dentist has reminded you that they are required to meet HIPAA requirements for protecting patient information. You, as a telecommunications specialist, have been asked to design the telecommunications network to support this new multi-location practice. Others on the team will develop the applications and databases. Your task is to identify the requirements and design a network solution that will meet those requirements.

The Deliverable

Define the requirements and then design an appropriate network that would support this dental practice. Your paper should:

1. Analyze the given case and provide a clear set of requirements for the network solution.

2. Identify the information that is to be protected and the related security requirements.

3. Identify the types of network(s), components, devices and equipment that would be involved in meeting the needs of the stationary offices and the mobile dentists.

4. Provide a network design diagram that clearly shows an appropriate network configuration to meet the requirements, with components properly labeled.

5. Explain the benefits of the proposed network solution.

Reference no: EM13752997

Questions Cloud

Discuss three to four methods of coping with the bullwhip : Discuss three to four methods of coping with the bullwhip effect from the following list and give an example of each in relationship to the chosen company
Graphs on chinese manufacturing industry in africa : Write eight pages not including charts graphs on chinese manufacturing industry in africa.
Adjustment required for the investment account : On May 20, 2013, Montero Co. paid $1,000,000 to acquire 40% of ORD Corp.’s outstanding stock. Also assume that ORD Corp. paid a $100,000 dividend on November 1, 2013, and reported a net income of $700,000 for 2013. (a) Prepare the entry to record the..
Uses the straight-line method for depreciation : Flip Company purchased a refrigerated delivery truck for $65,000 on April 1, 2016. The plan is to use the truck for 4 years and then replace it. At the end of it’s useful life the truck is expected to have a salvage value of $10,000. Prepare the depr..
Provide a clear set of requirements for the network solution : Analyze the given case and provide a clear set of requirements for the network solution and Identify the information that is to be protected and the related security requirements
The nominal interest rate : Suppose the nominal interest rate is going to be 10% per year for the next two years. The present discounted value of $500 to be received in two years is: $480.00 $490.00 $350.00 $413.22 $454.45
Calculate the economic life : Calculate the Economic Life in STB/month for an oil lease with WI = 100%, NRI = 87.5%, lease operating expense = $5,000 per month, price of oil = $15/STB, price of associated gas = $2.25/Mscf, GOR = 500 scf/STB, oil and gas severance taxes = 7.085%. ..
Describe the technological and economic innovations : Describe the technological and economic innovations, along with political events, that drove Indian Ocean trade and commerce in the thousand years after the end of the classical period.
Modes of communication in the organization : Modes of communication in the organization (i.e., written or verbal) Nature of authority (i.e., recognized social rank) Motivational techniques (e.g. intrinsic or extrinsic used to influence productivity and performance)

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining protocol to avoid defeat

Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.

  Demonstrate familiarity with problems of tcp/ip connectivity

A network administrator faces when dealing with a client/server network is TCP/IP connectivity between computers in the network.

  Implement buffer overflow in cthe effect of launching new

implement buffer overflow in cthe effect of launching new applications is the growth of vulnerabilities to attacks. the

  Explain workstation to decode each received frame

It takes 56 milliseconds for workstation to decode each received frame and display it on screen. Will this workstation display video stream successfully? Why or why not?

  Receiving uart transfering incoming character to buffer

How long [in micro-seconds (µs)] does receiving UART have to transfer an incoming character to buffer or to the main computer before next character arrives?

  Diagram of simplest connection between two computers

Using Ethernet Network Interface Cards or NICs, diagram simplest connection between two computers which will allow for communications and resource sharing.

  Strategy planning for corporate

In another year, after all assignments are completed, you consider to convert back to a volunteer basis with AllTechComm, and to discover more profitable employment, preferably with a major company.

  Ethernet has been broadly deployed around the world in

ethernet has been widely deployed around the world in local area networks lan until now. native ethernet packet data

  Disadvantages of several different web technologies

Describe the advantages and disadvantages of several different Web 2.0 technologies. How could these technologies be used for good? What types of problems might these technologies cause?

  The senior network administrator would like you to get

you are a networking intern at richman investments. you recently developed a design for a remote access control policy

  Show an acl with multiples access-list commands what order

a small company is using the topology shown below. minimal security measures have been implemented. assume that the

  Create a 3-4-page memo outlining what you have done as the

over the past several years the chief executive officer ceo of your company has read articles on internet control

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd