Deployment of IT Network at Medical Center: Network Infrastructure Report
VerifiedAdded on 2023/06/07
|23
|4921
|128
AI Summary
This report describes the deployment of the IT network at the medical center in which the medical center wants to open a new branch in another city. The current network is based on the LAN connection in which the access of the servers are limited. The proposed system will be having an online web interface where the users can select the branches, see the timings of the consultants, and make their bookings at the given time that would be time-saving for the client as well.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NETWORKS AND
INFRASTRUCTURE
INFO813
[NAME OF THE STUDENT] - [STUDENT ID]
[NAME OF THE INSTITUTE]
INFRASTRUCTURE
INFO813
[NAME OF THE STUDENT] - [STUDENT ID]
[NAME OF THE INSTITUTE]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Introduction......................................................................................................................................3
Background......................................................................................................................................4
Problem Statement...........................................................................................................................6
Aims and Objectives........................................................................................................................7
Deployment of new system.............................................................................................................7
Centralized Data center....................................................................................................................9
Network Security Issues................................................................................................................10
Network Diagram..........................................................................................................................13
Cost................................................................................................................................................14
Future Work...................................................................................................................................14
Requirement analysis.....................................................................................................................15
Technology to be purchased..........................................................................................................15
Project timelines............................................................................................................................16
Schedule implementation...............................................................................................................17
Risk and solution for each risks.....................................................................................................19
Business continuity plan................................................................................................................20
Site description..........................................................................................................................20
1 | P a g e
Introduction......................................................................................................................................3
Background......................................................................................................................................4
Problem Statement...........................................................................................................................6
Aims and Objectives........................................................................................................................7
Deployment of new system.............................................................................................................7
Centralized Data center....................................................................................................................9
Network Security Issues................................................................................................................10
Network Diagram..........................................................................................................................13
Cost................................................................................................................................................14
Future Work...................................................................................................................................14
Requirement analysis.....................................................................................................................15
Technology to be purchased..........................................................................................................15
Project timelines............................................................................................................................16
Schedule implementation...............................................................................................................17
Risk and solution for each risks.....................................................................................................19
Business continuity plan................................................................................................................20
Site description..........................................................................................................................20
1 | P a g e
Site comparison.........................................................................................................................21
Final recommendations..............................................................................................................22
Disaster recovery plan...................................................................................................................23
Disaster indicators.....................................................................................................................23
Network disaster........................................................................................................................23
Events that indicate the disaster.....................................................................................................24
Roles of the staffs......................................................................................................................24
Containment strategies...................................................................................................................25
Damage assessment.......................................................................................................................25
Forensics....................................................................................................................................26
Identification of the cause of the disaster......................................................................................26
Legal inolvments.......................................................................................................................26
Technology support...................................................................................................................26
Time consideration....................................................................................................................26
Conclusion.....................................................................................................................................27
References......................................................................................................................................27
2 | P a g e
Final recommendations..............................................................................................................22
Disaster recovery plan...................................................................................................................23
Disaster indicators.....................................................................................................................23
Network disaster........................................................................................................................23
Events that indicate the disaster.....................................................................................................24
Roles of the staffs......................................................................................................................24
Containment strategies...................................................................................................................25
Damage assessment.......................................................................................................................25
Forensics....................................................................................................................................26
Identification of the cause of the disaster......................................................................................26
Legal inolvments.......................................................................................................................26
Technology support...................................................................................................................26
Time consideration....................................................................................................................26
Conclusion.....................................................................................................................................27
References......................................................................................................................................27
2 | P a g e
Introduction
The proposal is about the deployment of the IT network at the medical center in which the
medical center wants to open a new branch in another city. The current network is based on the
LAN connection in which the access of the servers are limited. This report will described the
core functional information about the deployment of the network and synchronized the
information at one data center which can control the cost of the services as the existing branch of
the medical center is having local database server to which the access is only limited to the area
of the branch whereas the business required the more vast access to connect with the systems.
Background
The current network system of the medical center is based on the wired connection and the
Macintosh computer systems which are comparatively fast than the windows based computer
system, the current network is based on the giga bit fibre connection which makes the complete
connection between the systems and the networks to ensure the connectivity of the computers
with the database server in which the information about the 5500 clients are stored. There are
also the data about the patients who will be existing in the medical center. The current structure
of the medical center is for the limited number of users who will be managing the bookings on
daily basis.
The system access is available for a certain local area.
3 | P a g e
The proposal is about the deployment of the IT network at the medical center in which the
medical center wants to open a new branch in another city. The current network is based on the
LAN connection in which the access of the servers are limited. This report will described the
core functional information about the deployment of the network and synchronized the
information at one data center which can control the cost of the services as the existing branch of
the medical center is having local database server to which the access is only limited to the area
of the branch whereas the business required the more vast access to connect with the systems.
Background
The current network system of the medical center is based on the wired connection and the
Macintosh computer systems which are comparatively fast than the windows based computer
system, the current network is based on the giga bit fibre connection which makes the complete
connection between the systems and the networks to ensure the connectivity of the computers
with the database server in which the information about the 5500 clients are stored. There are
also the data about the patients who will be existing in the medical center. The current structure
of the medical center is for the limited number of users who will be managing the bookings on
daily basis.
The system access is available for a certain local area.
3 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The existing network is not efficient enough for the operational management and hence, cost-
effective measure is necessary for the enhancement in the security and othwer factors of the
organization. The present network is not very secured and thus, the transformation needs to be
capable of restoring the security of the dsata and information being exchanged over the network.
The manual input data and information needs to be manipulated and transformed with an online
services. One of the major issue is based on the data security in every forum such as the existing
system is based on the one server where the data about the 5500 clients has been stored can be
crashed at any moment as the local databases cannot get the load more than the capacity.
Problem Statement
The existing system of the medical center is limited for the users and the access is also limited ,
the company management face the issues in the monitoring as well as the clients also have to
spend a lot of time for the booking which is based on the software which only work in limited
area. The current system will not be enough in the case if the company wants to open a new
branch of the medical center whereas the accessibility will be more complex and the workflow
would be managed by the existing systems.
The current network of the system is based on the wired connection and if the second branch also
integrates the services of same system, then it would not be able to manage the complete
workflow of the organization that is why the management of the medical center should have to
upgrade the services which enables the users to get register. Also the services of the online
bookings and the appointments should be integrated for the service optimizations.
4 | P a g e
effective measure is necessary for the enhancement in the security and othwer factors of the
organization. The present network is not very secured and thus, the transformation needs to be
capable of restoring the security of the dsata and information being exchanged over the network.
The manual input data and information needs to be manipulated and transformed with an online
services. One of the major issue is based on the data security in every forum such as the existing
system is based on the one server where the data about the 5500 clients has been stored can be
crashed at any moment as the local databases cannot get the load more than the capacity.
Problem Statement
The existing system of the medical center is limited for the users and the access is also limited ,
the company management face the issues in the monitoring as well as the clients also have to
spend a lot of time for the booking which is based on the software which only work in limited
area. The current system will not be enough in the case if the company wants to open a new
branch of the medical center whereas the accessibility will be more complex and the workflow
would be managed by the existing systems.
The current network of the system is based on the wired connection and if the second branch also
integrates the services of same system, then it would not be able to manage the complete
workflow of the organization that is why the management of the medical center should have to
upgrade the services which enables the users to get register. Also the services of the online
bookings and the appointments should be integrated for the service optimizations.
4 | P a g e
Aims and Objectives
The aims and the objectives of the proposed network system is to initialize the complete
infrastructure which will be managing the complete workflow of the system to ensure the proper
quality of the services of the medical center. There should be a data center from the both
branches will be having the access to the servers. The clients found it difficult to get the
bookings and the appointments, the proposed system will be having an online web interface
where the users can select the branches, see the timings of the consultants, and make their
bookings at the given time that would be time saving for the client as well.
Deployment of new system
The proposed system should be based on the complete virtualization where every operating
system will be supporting the system in manner to meet the increased needs and demands.
The VOIP (Voice over Internet protocol) or a specific video conference can be installed for
enhancing the communication between the different branches. Quality of the service is most
important factor in case of video streaming that is the broadband companies have optimized the
wireless services such as the integration of WiMAX services which specifically allocate more
bandwidth to the video conference session. In this research the integration and the simulation of
WiMAX would also be discussed and the video frame algorithms will be implemented to
calculate the efficiency of the video streaming overlays based on the given bandwidth (Khan,
2006).
BYOD can be implemented withint the existing system for enhancing the functioning and
delivery of the project operations.
5 | P a g e
The aims and the objectives of the proposed network system is to initialize the complete
infrastructure which will be managing the complete workflow of the system to ensure the proper
quality of the services of the medical center. There should be a data center from the both
branches will be having the access to the servers. The clients found it difficult to get the
bookings and the appointments, the proposed system will be having an online web interface
where the users can select the branches, see the timings of the consultants, and make their
bookings at the given time that would be time saving for the client as well.
Deployment of new system
The proposed system should be based on the complete virtualization where every operating
system will be supporting the system in manner to meet the increased needs and demands.
The VOIP (Voice over Internet protocol) or a specific video conference can be installed for
enhancing the communication between the different branches. Quality of the service is most
important factor in case of video streaming that is the broadband companies have optimized the
wireless services such as the integration of WiMAX services which specifically allocate more
bandwidth to the video conference session. In this research the integration and the simulation of
WiMAX would also be discussed and the video frame algorithms will be implemented to
calculate the efficiency of the video streaming overlays based on the given bandwidth (Khan,
2006).
BYOD can be implemented withint the existing system for enhancing the functioning and
delivery of the project operations.
5 | P a g e
SSL certificates should be evaluated for the compliance with the security of thre network
Centralized Data center
Data center should be upgraded so that the data of both branches can be stored at one place
whereas the data center of the medical center should be centralized because the management of
the database at two different branches will be more reliable where the server will be centralized.
The cost of the cables and the Ethernet connections will also be saved if the wireless network
will be implemented at the data center.
Centralized data center also consume the less cost for the maintenance services and the
monitoring is also effective in the case of setting up a data center between two branches , the
access and the latency will delay will not be affecting the quality of the services whereas the new
infrastructure will help the medical center to have a proper embedded network management
system which can be enough to manage the work flow of execution which is considered as the
most important factor in the business success (Al-Fares, 2010). Central databases are more
reliable as the access is fast for every existing user of the services.
Network Security Issues
The reason for DDoS attacks is to prevent others from reaching a service on the internet. There
can be numerous reasons for this. Someone made a website about you attempting to spread false
rumors. You could obtain that websites IP address, then if you have more upload bandwidth then
they have download bandwidth, you could send that website more requests then it could handle,
thus preventing anyone else from accessing it. A person gets banned from a website or a game.
They get mad and for revenge they flood that service with a bunch of fake connection attempts
6 | P a g e
Centralized Data center
Data center should be upgraded so that the data of both branches can be stored at one place
whereas the data center of the medical center should be centralized because the management of
the database at two different branches will be more reliable where the server will be centralized.
The cost of the cables and the Ethernet connections will also be saved if the wireless network
will be implemented at the data center.
Centralized data center also consume the less cost for the maintenance services and the
monitoring is also effective in the case of setting up a data center between two branches , the
access and the latency will delay will not be affecting the quality of the services whereas the new
infrastructure will help the medical center to have a proper embedded network management
system which can be enough to manage the work flow of execution which is considered as the
most important factor in the business success (Al-Fares, 2010). Central databases are more
reliable as the access is fast for every existing user of the services.
Network Security Issues
The reason for DDoS attacks is to prevent others from reaching a service on the internet. There
can be numerous reasons for this. Someone made a website about you attempting to spread false
rumors. You could obtain that websites IP address, then if you have more upload bandwidth then
they have download bandwidth, you could send that website more requests then it could handle,
thus preventing anyone else from accessing it. A person gets banned from a website or a game.
They get mad and for revenge they flood that service with a bunch of fake connection attempts
6 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
so that nobody else can access the service. A company wants to prevent their competition’s
website from being accessed. Usually, a website will have a lot more bandwidth than a single
person would. That is why it usually takes a “bot net” (a bunch of “hacked” computers that you
can control) to disable a service like a http server (http servers are what display html pages such
as the one you are on right now reading this). A lot of webpages today have DDoS protection.
One kind of protection is where incoming traffic is scanned to determine if it is legitimate or
fake. Fake traffic is dropped immediately to prevent the service from becoming overloaded. This
type of protection will not always work. If the DDoS attack has enough bandwidth, it can still
bog down even the scanning of the incoming traffic which will again prevent others from
accessing the service. This attack starts with denial of service we select a service like Google
search, facebook or any other service which is provided on the internet. The main target of the
attack is to make service unavailable. As you could infer from the name of this attack it is
distributive in nature i.e. we need a many machine,ip’s , mac address etc for this attack
depending upon the service we want to deny. If we want to deny a service like Google millions
or even billions of machines and ip’s would be needed. But if it is small website with 1000
requests a day hundreds of machines may be enough. Most of the time when these attacks are
carried out, they are carried out through a lot of machines (usually of innocent users) which
could include your and my machine too, unknowingly we could be part of the attack. Ddos
Attacks are known to be one of the most powerful attacks on the internet and they would become
more prominent as we move towards IOT as for these machines it would be very difficult to fix
vulnerability.
In addition, the attackers are always seeking new attack methods and therefore their attack
traffic characteristics might also adapt to defeat the detection method. One of such methods
7 | P a g e
website from being accessed. Usually, a website will have a lot more bandwidth than a single
person would. That is why it usually takes a “bot net” (a bunch of “hacked” computers that you
can control) to disable a service like a http server (http servers are what display html pages such
as the one you are on right now reading this). A lot of webpages today have DDoS protection.
One kind of protection is where incoming traffic is scanned to determine if it is legitimate or
fake. Fake traffic is dropped immediately to prevent the service from becoming overloaded. This
type of protection will not always work. If the DDoS attack has enough bandwidth, it can still
bog down even the scanning of the incoming traffic which will again prevent others from
accessing the service. This attack starts with denial of service we select a service like Google
search, facebook or any other service which is provided on the internet. The main target of the
attack is to make service unavailable. As you could infer from the name of this attack it is
distributive in nature i.e. we need a many machine,ip’s , mac address etc for this attack
depending upon the service we want to deny. If we want to deny a service like Google millions
or even billions of machines and ip’s would be needed. But if it is small website with 1000
requests a day hundreds of machines may be enough. Most of the time when these attacks are
carried out, they are carried out through a lot of machines (usually of innocent users) which
could include your and my machine too, unknowingly we could be part of the attack. Ddos
Attacks are known to be one of the most powerful attacks on the internet and they would become
more prominent as we move towards IOT as for these machines it would be very difficult to fix
vulnerability.
In addition, the attackers are always seeking new attack methods and therefore their attack
traffic characteristics might also adapt to defeat the detection method. One of such methods
7 | P a g e
is to make the malicious flows look like legitimate flows by making them appear as longer
flows. It is very important to see how the algorithm starts to behave when the malicious
traffic starts to generate longer flows with more number of packets in other words when
attack flows start to look like legitimate flows. In order to achieve longer attack flows the
number of packets sent in each flow and the traffic interval is increased gradually. Table 17
shows the parameters set in each scenario. In all cases the attack flow is run over 4 hosts all
attacking a single victim in the network and ten attacks are tested for each attack traffic
pattern.
Network Diagram
Figure 1: Initial Network architeure for the medical centre
(Source: Kornberger, 2017, pp-180)
8 | P a g e
flows. It is very important to see how the algorithm starts to behave when the malicious
traffic starts to generate longer flows with more number of packets in other words when
attack flows start to look like legitimate flows. In order to achieve longer attack flows the
number of packets sent in each flow and the traffic interval is increased gradually. Table 17
shows the parameters set in each scenario. In all cases the attack flow is run over 4 hosts all
attacking a single victim in the network and ten attacks are tested for each attack traffic
pattern.
Network Diagram
Figure 1: Initial Network architeure for the medical centre
(Source: Kornberger, 2017, pp-180)
8 | P a g e
Cost
If the implementation of the BYOD system will be successful then the cost of the system will be
reduced as compared to the existing network system because the existing system is based on the
Macintosh computers while the BYOD supporting system will be complete compatible with
every system and more number of users will be able to access the services of the medical center.
The dedicated cost of the system will also be less because the entire system will be based on the
wireless connection so the cost of the cables will also be saved and accessibility will be
increased.
Future Work
The proposed solution will be consideration as an appropriate increment to the business of
medical care center; it would be helping in the case if the management of the medical center
wants to integrate another branch with the system. The preferable future network will be based
on the cloud services in which the cost the data center will also be saved an entire network will
be shifted to the cloud database which will also be helping the fast access by using the
technology of fog computing services, because fog servers are plotted nearer to the users so the
level of optimization will be high.
Requirement analysis
Currently the medical centre company use such a network system which is comprises of 5
digitized machines which are connected to a simple LAN connection. On the other hand the
database system connected to to the application of the medical centre has limited amount of data
storage. However the total number of employees working for the comaony are 5500 which is not
9 | P a g e
If the implementation of the BYOD system will be successful then the cost of the system will be
reduced as compared to the existing network system because the existing system is based on the
Macintosh computers while the BYOD supporting system will be complete compatible with
every system and more number of users will be able to access the services of the medical center.
The dedicated cost of the system will also be less because the entire system will be based on the
wireless connection so the cost of the cables will also be saved and accessibility will be
increased.
Future Work
The proposed solution will be consideration as an appropriate increment to the business of
medical care center; it would be helping in the case if the management of the medical center
wants to integrate another branch with the system. The preferable future network will be based
on the cloud services in which the cost the data center will also be saved an entire network will
be shifted to the cloud database which will also be helping the fast access by using the
technology of fog computing services, because fog servers are plotted nearer to the users so the
level of optimization will be high.
Requirement analysis
Currently the medical centre company use such a network system which is comprises of 5
digitized machines which are connected to a simple LAN connection. On the other hand the
database system connected to to the application of the medical centre has limited amount of data
storage. However the total number of employees working for the comaony are 5500 which is not
9 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
a little in number. Therefore, workflow management of the comaony has become quite difficult
due to this system. in orderto avoid the operational and functional difficulties they are wiling to
change their exiting network infrastructure. It is the role of the comaony to design the network in
such a way so that it can avoid the secutrity and management orieneted issues. In order to design
such network system the network systems those are required by the company are elaborated in
the below section. It is the role of the secutity manager ad operation manager of the company to
purchase suiable technologies and supporting elements and equipmenets so that the system can
be successfully built. In order to design the new network management plan for the company a
project timeline, scheulde ans risk management plan are also elaborated for the company.
Technology to be purchased
As the comap ny is willing to design a multi data centre architecture with the amendment of
Amazon Web services thus, the supporting techologis that are required by the project developers
include ElasticSearch Cluster (Mingo DBInstance), Greylog and MongoDB. It is expected with a
single direct connection the issues that the preious system was facing will be completely
minimzed. In order to spread the new data centre of the medical irganization the proper way is
required to be find out for the Graylog setup across 2 different Dorect connection. However this
kind of network setup are not supported by the elastic serach approach. Though, the elastic
search cluster looks ery much promising from te business perspectives because it fails to find
much amount of information from at a time. For this system a dual 1 Gbps direct connection will
be required in the AWS a each of the comaony data center. Though, along with the DC addition
to each of the Graylog Instance are enough but still behind the system addition of a loadbalacer
will be more helpful. Across the DC system the MongoDB and the Graylog can be clustered
10 | P a g e
due to this system. in orderto avoid the operational and functional difficulties they are wiling to
change their exiting network infrastructure. It is the role of the comaony to design the network in
such a way so that it can avoid the secutrity and management orieneted issues. In order to design
such network system the network systems those are required by the company are elaborated in
the below section. It is the role of the secutity manager ad operation manager of the company to
purchase suiable technologies and supporting elements and equipmenets so that the system can
be successfully built. In order to design the new network management plan for the company a
project timeline, scheulde ans risk management plan are also elaborated for the company.
Technology to be purchased
As the comap ny is willing to design a multi data centre architecture with the amendment of
Amazon Web services thus, the supporting techologis that are required by the project developers
include ElasticSearch Cluster (Mingo DBInstance), Greylog and MongoDB. It is expected with a
single direct connection the issues that the preious system was facing will be completely
minimzed. In order to spread the new data centre of the medical irganization the proper way is
required to be find out for the Graylog setup across 2 different Dorect connection. However this
kind of network setup are not supported by the elastic serach approach. Though, the elastic
search cluster looks ery much promising from te business perspectives because it fails to find
much amount of information from at a time. For this system a dual 1 Gbps direct connection will
be required in the AWS a each of the comaony data center. Though, along with the DC addition
to each of the Graylog Instance are enough but still behind the system addition of a loadbalacer
will be more helpful. Across the DC system the MongoDB and the Graylog can be clustered
10 | P a g e
successfully. In order to run the application susccessfully this is mandatory for the company to
buy proper software lisnce and supporting hardware equipments as well.
11 | P a g e
buy proper software lisnce and supporting hardware equipments as well.
11 | P a g e
Project timelines
ID Task
Mode
Task Name Duration Start Finish PredecessorsResource Names Cost
0 Network design
scheduling
180 days Mon
03-09-18
Fri
10-05-19
$51,528.00
1 Project initiation 30 days Mon 03-09-18Fri 12-10-18 $9,880.00
2 Identifying the current issues6 days Mon 03-09-18Mon 10-09-18 project manager $1,920.00
3 Analyzing the current network architecture6 days Tue 11-09-18Tue 18-09-182 securiy manager $960.00
4 Conceptualization of the new network architecture8 days Wed 19-09-18Fri 28-09-183 network engineers $1,600.00
5 Feasibility study9 days Wed 19-09-18Mon 01-10-183 finance manager $1,800.00
6 Developing business strategies9 days Tue 02-10-18Fri 12-10-184,5 business analyst $3,600.00
7 Project planning phase39 days Mon 15-10-18Thu 06-12-18 $12,328.00
8 Risk management plan10 days Mon 15-10-18Fri 26-10-186 project manager $3,200.00
9 Business continuity program development12 days Mon 29-10-18Tue 13-11-188 business analyst $4,800.00
10 Disaster recovery planning3 days Wed 14-11-18Fri 16-11-189 legal advisor $528.00
11 Requirements analysis2 days Wed 14-11-18Thu 15-11-189 network engineers $400.00
12 Requirements gathering3 days Mon 19-11-18Wed 21-11-1810,11operation manager $840.00
13 Resource allocation3 days Thu 22-11-18Mon 26-11-1812 project manager $960.00
14 Project team allocation3 days Tue 27-11-18Thu 29-11-1813 HR manager $600.00
15 Analyzing network site5 days Fri 30-11-18Thu 06-12-1814 system designer $1,000.00
16 Project design phase72 days Fri 07-12-18Mon 18-03-19 $23,320.00
17 Network and cable designing phase10 days Fri 07-12-18Thu 20-12-1815 system designer $2,000.00
18 Prototype design12 days Fri 21-12-18Mon 07-01-1917 system designer $2,400.00
19 Creating spreadsheet6 days Tue 08-01-19Tue 15-01-1918 system developer $1,200.00
20 Site analysis (cold)15 days Tue 08-01-19Mon 28-01-1918 network engineers $3,000.00
21 Analyzing network performance20 days Wed 16-01-19Tue 12-02-1919 business analyst $8,000.00
22 Identification or networking protocols24 days Wed 13-02-19Mon 18-03-1920,21operation manager $6,720.00
23 Project testing 30 days Tue 19-03-19Mon 29-04-19 $3,600.00
24 Unit testing 25 days Tue 19-03-19Mon 22-04-1922 tester $3,000.00
25 Integration testing2 days Tue 23-04-19Wed 24-04-1924 tester $240.00
26 Acceptance testing3 days Thu 25-04-19Mon 29-04-1925 tester $360.00
27 Closure phase 9 days Tue 30-04-19Fri 10-05-19 $2,400.00
28 Final launch of the network design3 days Tue 30-04-19Thu 02-05-1926 project manager $960.00
29 Post maintenance program3 days Fri 03-05-19Tue 07-05-1928 operation manager $840.00
30 stakeholder signoff3 days Wed 08-05-19Fri 10-05-1929 HR manager $600.00
project manager
securiy manager
network engineers
finance manager
business analyst
project mana
business
legal adv
network
operati
projec
HR m
syst
s
12-08
01 July
12 | P a g e
ID Task
Mode
Task Name Duration Start Finish PredecessorsResource Names Cost
0 Network design
scheduling
180 days Mon
03-09-18
Fri
10-05-19
$51,528.00
1 Project initiation 30 days Mon 03-09-18Fri 12-10-18 $9,880.00
2 Identifying the current issues6 days Mon 03-09-18Mon 10-09-18 project manager $1,920.00
3 Analyzing the current network architecture6 days Tue 11-09-18Tue 18-09-182 securiy manager $960.00
4 Conceptualization of the new network architecture8 days Wed 19-09-18Fri 28-09-183 network engineers $1,600.00
5 Feasibility study9 days Wed 19-09-18Mon 01-10-183 finance manager $1,800.00
6 Developing business strategies9 days Tue 02-10-18Fri 12-10-184,5 business analyst $3,600.00
7 Project planning phase39 days Mon 15-10-18Thu 06-12-18 $12,328.00
8 Risk management plan10 days Mon 15-10-18Fri 26-10-186 project manager $3,200.00
9 Business continuity program development12 days Mon 29-10-18Tue 13-11-188 business analyst $4,800.00
10 Disaster recovery planning3 days Wed 14-11-18Fri 16-11-189 legal advisor $528.00
11 Requirements analysis2 days Wed 14-11-18Thu 15-11-189 network engineers $400.00
12 Requirements gathering3 days Mon 19-11-18Wed 21-11-1810,11operation manager $840.00
13 Resource allocation3 days Thu 22-11-18Mon 26-11-1812 project manager $960.00
14 Project team allocation3 days Tue 27-11-18Thu 29-11-1813 HR manager $600.00
15 Analyzing network site5 days Fri 30-11-18Thu 06-12-1814 system designer $1,000.00
16 Project design phase72 days Fri 07-12-18Mon 18-03-19 $23,320.00
17 Network and cable designing phase10 days Fri 07-12-18Thu 20-12-1815 system designer $2,000.00
18 Prototype design12 days Fri 21-12-18Mon 07-01-1917 system designer $2,400.00
19 Creating spreadsheet6 days Tue 08-01-19Tue 15-01-1918 system developer $1,200.00
20 Site analysis (cold)15 days Tue 08-01-19Mon 28-01-1918 network engineers $3,000.00
21 Analyzing network performance20 days Wed 16-01-19Tue 12-02-1919 business analyst $8,000.00
22 Identification or networking protocols24 days Wed 13-02-19Mon 18-03-1920,21operation manager $6,720.00
23 Project testing 30 days Tue 19-03-19Mon 29-04-19 $3,600.00
24 Unit testing 25 days Tue 19-03-19Mon 22-04-1922 tester $3,000.00
25 Integration testing2 days Tue 23-04-19Wed 24-04-1924 tester $240.00
26 Acceptance testing3 days Thu 25-04-19Mon 29-04-1925 tester $360.00
27 Closure phase 9 days Tue 30-04-19Fri 10-05-19 $2,400.00
28 Final launch of the network design3 days Tue 30-04-19Thu 02-05-1926 project manager $960.00
29 Post maintenance program3 days Fri 03-05-19Tue 07-05-1928 operation manager $840.00
30 stakeholder signoff3 days Wed 08-05-19Fri 10-05-1929 HR manager $600.00
project manager
securiy manager
network engineers
finance manager
business analyst
project mana
business
legal adv
network
operati
projec
HR m
syst
s
12-08
01 July
12 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Risk and solution for each risks
Risks Solution strategies
Digital identity theft Strong password, multi-factor authentication
A very weak access control 3A security protocol including authentication,
authorization, and accounts
Equipmrnt failure Proper maintenance and regular audit
Power fluctuation Continuous power supply and backup
Business continuity plan
Site description
The location chosen for the company is cold enough therefore, no such additional cooling system
will be required to be incorporated by the sustem developers.The location if the site is cool
enough thus, the cost for the additonl cooling willnot be reuired for this systemThe deatails of
the application are elaborated in the below section:
Aplication Location of the
sencors
Settings Recommended
sensors
Room temparature Small room such as
centre and the
19 degree to 28
degree temperature
Temparature as well
as humidity sensor
13 | P a g e
Risks Solution strategies
Digital identity theft Strong password, multi-factor authentication
A very weak access control 3A security protocol including authentication,
authorization, and accounts
Equipmrnt failure Proper maintenance and regular audit
Power fluctuation Continuous power supply and backup
Business continuity plan
Site description
The location chosen for the company is cold enough therefore, no such additional cooling system
will be required to be incorporated by the sustem developers.The location if the site is cool
enough thus, the cost for the additonl cooling willnot be reuired for this systemThe deatails of
the application are elaborated in the below section:
Aplication Location of the
sencors
Settings Recommended
sensors
Room temparature Small room such as
centre and the
19 degree to 28
degree temperature
Temparature as well
as humidity sensor
13 | P a g e
potential hot zone for
the data centre
per 66 to 80 degree
fahrenhite
HVAC as well as
Airco Monitoring
Next to each of the
HVAC unit for
monitoring their
worki state
Settings are dependent
upon the rooms to
make sure that the
temperature is 18
degree to 27 degree to
the rack and 50 to 60
rH the room levels.
Temparature as well
as humidity sensor
Intake temperature
(for the rack level)
It is recommended
that 3 per rack is
needed (for the
bottom, top and
middle)
19 degree to 28
degree centigrade or
64 to 80 degree per
fahrenhite
Temperature sensors
The rack level outtake
pemparature
Recommended for
three racks (top,
middle and bottom)
The temperature
should be lesser than
20 degree centigrade
or 35 degree
fahrenhite difference
from the ntel
tempature (the
tepapture is typically
lesser than the 40
NA
14 | P a g e
the data centre
per 66 to 80 degree
fahrenhite
HVAC as well as
Airco Monitoring
Next to each of the
HVAC unit for
monitoring their
worki state
Settings are dependent
upon the rooms to
make sure that the
temperature is 18
degree to 27 degree to
the rack and 50 to 60
rH the room levels.
Temparature as well
as humidity sensor
Intake temperature
(for the rack level)
It is recommended
that 3 per rack is
needed (for the
bottom, top and
middle)
19 degree to 28
degree centigrade or
64 to 80 degree per
fahrenhite
Temperature sensors
The rack level outtake
pemparature
Recommended for
three racks (top,
middle and bottom)
The temperature
should be lesser than
20 degree centigrade
or 35 degree
fahrenhite difference
from the ntel
tempature (the
tepapture is typically
lesser than the 40
NA
14 | P a g e
degree centigrade)
Site comparison
The location of the sites are not much different from each other which implies that the site for
both the previous and the current nrtwork infrastructure are cold enough. No such additional
cooling system will be required by the system developers to ensure that the network infrastrure
hold all supportive suste charecteristics.
Final recommendations
After the overall analysis it has been found that for the successful imlementattion of the entwrok
system the below are the ecommenatiosn to be followe by the developers:
Focused program on research and development
The research and development team of the medical comoany should put their focus on the
program development scenario. Application, functional and operational gaps are to be identified
and modified in such a way so that it can resove the communicatin rekated issues.
Security system incorporation: encryption technology can be recommended as the appropriate
security measure for the proposed network.
Training and development: Professional on job training and developmet program should be
arranged by the company for ther wrkng employees to make them more familiar to their job role
and duties.
15 | P a g e
Site comparison
The location of the sites are not much different from each other which implies that the site for
both the previous and the current nrtwork infrastructure are cold enough. No such additional
cooling system will be required by the system developers to ensure that the network infrastrure
hold all supportive suste charecteristics.
Final recommendations
After the overall analysis it has been found that for the successful imlementattion of the entwrok
system the below are the ecommenatiosn to be followe by the developers:
Focused program on research and development
The research and development team of the medical comoany should put their focus on the
program development scenario. Application, functional and operational gaps are to be identified
and modified in such a way so that it can resove the communicatin rekated issues.
Security system incorporation: encryption technology can be recommended as the appropriate
security measure for the proposed network.
Training and development: Professional on job training and developmet program should be
arranged by the company for ther wrkng employees to make them more familiar to their job role
and duties.
15 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Disaster recovery plan
Disaster indicators
With the successful implementation of the disaster recovery plan the company will be able to
resolve all the risks associated to it. All different risks factors are tequired to be identified by the
security manager at the project initiation phase. The project security manager should identify all
the possible risks that may interrupt the security if the system and according to the requiremenst
those risks are to be prioritized and mitigation strategis should be developed respectively to
resove the issues. Network disaster recobery plan can resolve the security level issues and also
give the company loh term sustainbel revenues.
Network disaster
If the designed and developed network system fails to deliver the expectation of the consumers
then the network system will be indicates as a failed one or may be said that the network sstem is
in disaster.
Network disaster is the situation which Network disaster recovery plan is referred to as a set of
processes designed for preparing an organization to make it respond to an interruption over the
network services while manmade catastrophe or the natural scenarios. In order to roster the
network services along with proper guidelines the network disaater recovery plan is very much
crucial.
16 | P a g e
Disaster indicators
With the successful implementation of the disaster recovery plan the company will be able to
resolve all the risks associated to it. All different risks factors are tequired to be identified by the
security manager at the project initiation phase. The project security manager should identify all
the possible risks that may interrupt the security if the system and according to the requiremenst
those risks are to be prioritized and mitigation strategis should be developed respectively to
resove the issues. Network disaster recobery plan can resolve the security level issues and also
give the company loh term sustainbel revenues.
Network disaster
If the designed and developed network system fails to deliver the expectation of the consumers
then the network system will be indicates as a failed one or may be said that the network sstem is
in disaster.
Network disaster is the situation which Network disaster recovery plan is referred to as a set of
processes designed for preparing an organization to make it respond to an interruption over the
network services while manmade catastrophe or the natural scenarios. In order to roster the
network services along with proper guidelines the network disaater recovery plan is very much
crucial.
16 | P a g e
Figure 2: Network architeure for the medical centre
(Source: Carley & Prietula, 2014), pp-30)
Events that indicate the disaster
Roles of the staffs
Name of the staffs Resposnbilities
Project manager To monitor and control the progress of the
project
Network manager To deliver an efficient as well as secuted
network system to the clients
Operation manager To design the system in such a way so
that it can deliver all the dsired operational
abilities to the employees and the consumers
Finance manager To desin the system within the estimated
17 | P a g e
(Source: Carley & Prietula, 2014), pp-30)
Events that indicate the disaster
Roles of the staffs
Name of the staffs Resposnbilities
Project manager To monitor and control the progress of the
project
Network manager To deliver an efficient as well as secuted
network system to the clients
Operation manager To design the system in such a way so
that it can deliver all the dsired operational
abilities to the employees and the consumers
Finance manager To desin the system within the estimated
17 | P a g e
budget and time
System developers To modify the system considering all the
previous system levek challenges and disaster.
Containment strategies
In order to stop goegrapical attack for the network system accurate security policies that should
be incorporated by the system developed are as follows:
A structurally different as well as separate oversight shoukd be cinducted by the system
developers
For reviewing the system the developers must possess working level skills and
knowledge
Sufficient number of staffs shoud be hired by the comaony to make sure that the
applications are runnubg successfully
Sufficient authority and system authentication is required to be incorporated
Damage assessment
The steps to be followed for assessing the damage are as follows:
Identoifucation of the infrastrutre level risks
Prioritize the riska and ranking the risks
Based on complexity proper management sratgeis are to be incorporeated by the
developers
The supporting elements and equoipments should be installed
18 | P a g e
System developers To modify the system considering all the
previous system levek challenges and disaster.
Containment strategies
In order to stop goegrapical attack for the network system accurate security policies that should
be incorporated by the system developed are as follows:
A structurally different as well as separate oversight shoukd be cinducted by the system
developers
For reviewing the system the developers must possess working level skills and
knowledge
Sufficient number of staffs shoud be hired by the comaony to make sure that the
applications are runnubg successfully
Sufficient authority and system authentication is required to be incorporated
Damage assessment
The steps to be followed for assessing the damage are as follows:
Identoifucation of the infrastrutre level risks
Prioritize the riska and ranking the risks
Based on complexity proper management sratgeis are to be incorporeated by the
developers
The supporting elements and equoipments should be installed
18 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
FEMA approach must be considerd for minimizing the disasaters
Forensics
In order to ensure damage recovery biometric analysis is very muh important for the medical
center to be installed. The biometric forensic will be done through face detection, fingerprint
scanning, iris scanning. It will minimize the number of frauds and also resolve the issues of
system disaster.
Identification of the cause of the disaster
Legal inolvments
Proper legal support will resole the issues of isconfiguratin and security breaches. All the
required software lisence are needed to rn the network application successfully.
Technology support
Technical support can minimize the man made errors, issues associated to the old equipments,
hardware failure, incompatible chnages and power failures.
Time consideration
The total time needed for the implementation of such network system is approximately 3 months
and the tota budget that may be required is $50,000 for the medical center. If any mediatory
application level issues are not recognized then no addition time ad cots will be needed and it is
expected that the actual cost and the planned ost for the project will be similar.
19 | P a g e
Forensics
In order to ensure damage recovery biometric analysis is very muh important for the medical
center to be installed. The biometric forensic will be done through face detection, fingerprint
scanning, iris scanning. It will minimize the number of frauds and also resolve the issues of
system disaster.
Identification of the cause of the disaster
Legal inolvments
Proper legal support will resole the issues of isconfiguratin and security breaches. All the
required software lisence are needed to rn the network application successfully.
Technology support
Technical support can minimize the man made errors, issues associated to the old equipments,
hardware failure, incompatible chnages and power failures.
Time consideration
The total time needed for the implementation of such network system is approximately 3 months
and the tota budget that may be required is $50,000 for the medical center. If any mediatory
application level issues are not recognized then no addition time ad cots will be needed and it is
expected that the actual cost and the planned ost for the project will be similar.
19 | P a g e
Conclusion
The information about the existing network system has been described briefly so that the new
network system for controlling the work flow of medical center can be proposed. The latest
network technologies and the infrastructure optimization has been discussed to ensure that the
services of medical center such as the implementation of the data center which would be helpful
for having the fast and the reliable access for both branches. In the business, the monitoring is
also necessary which can also be done by accessing the centralized database where the daily
workflow of both branches will be stored.
References
Al-Fares, M. R. (2010). Hedera: dynamic flow scheduling for data center networks.
Huang, J. L. (2008). Joint source adaptation and resource allocation for multi-user wireless video
streaming. IEEE Transactions on Circuits and Systems for Video Technology.
Khan, S. P. (2006). Application-driven cross-layer optimization for video streaming over
wireless networks. IEEE communications Magazine.
Krishnamachari, B. L. (2011). Toward dynamic energy-efficient operation of cellular network
infrastructure. IEEE Communications Magazine.
Malan, D. F.-J. (2004). Codeblue: An ad hoc sensor network infrastructure for emergency
medical care. In International workshop on wearable and implantable body sensor
networks.
20 | P a g e
The information about the existing network system has been described briefly so that the new
network system for controlling the work flow of medical center can be proposed. The latest
network technologies and the infrastructure optimization has been discussed to ensure that the
services of medical center such as the implementation of the data center which would be helpful
for having the fast and the reliable access for both branches. In the business, the monitoring is
also necessary which can also be done by accessing the centralized database where the daily
workflow of both branches will be stored.
References
Al-Fares, M. R. (2010). Hedera: dynamic flow scheduling for data center networks.
Huang, J. L. (2008). Joint source adaptation and resource allocation for multi-user wireless video
streaming. IEEE Transactions on Circuits and Systems for Video Technology.
Khan, S. P. (2006). Application-driven cross-layer optimization for video streaming over
wireless networks. IEEE communications Magazine.
Krishnamachari, B. L. (2011). Toward dynamic energy-efficient operation of cellular network
infrastructure. IEEE Communications Magazine.
Malan, D. F.-J. (2004). Codeblue: An ad hoc sensor network infrastructure for emergency
medical care. In International workshop on wearable and implantable body sensor
networks.
20 | P a g e
Eskandarpour, M., Dejax, P., Miemczyk, J., & Péton, O. (2015). Sustainable supply chain
network design: An optimization-oriented review. Omega, 54, 11-32.
Soleimani, H., & Kannan, G. (2015). A hybrid particle swarm optimization and genetic
algorithm for closed-loop supply chain network design in large-scale networks. Applied
Mathematical Modelling, 39(14), 3990-4012.
Dart, E., Rotman, L., Tierney, B., Hester, M., & Zurawski, J. (2014). The science dmz: A
network design pattern for data-intensive science. Scientific Programming, 22(2), 173-
185.
Xu, X., Liu, B. X., & Hu, N. (2017). Teaching
Content Design and Organization of Data Mining Course for Statistics Postgraduates. DEStech
Transactions on Engineering and Technology Research, (mcee).
Carley, K. M., & Prietula, M. J. (2014). The" virtual design team": Simulating how organization
structure and information processing tools affect team performance. In Computational
organization theory (pp. 19-36). Psychology Press.
Zhou, Q., Wang, Y., Jiang, P., Shao, X., Choi, S. K., Hu, J., ... & Meng, X. (2017). An active
learning radial basis function modeling method based on self-organization maps for
simulation-based design problems. Knowledge-Based Systems, 131, 10-27.
Kornberger, M. (2017). The visible hand and the crowd: Analyzing organization design in
distributed innovation systems. Strategic Organization, 15(2), 174-193.
Robins, G. (2015). Doing social network research: Network-based research design for social
scientists. Sage.
21 | P a g e
network design: An optimization-oriented review. Omega, 54, 11-32.
Soleimani, H., & Kannan, G. (2015). A hybrid particle swarm optimization and genetic
algorithm for closed-loop supply chain network design in large-scale networks. Applied
Mathematical Modelling, 39(14), 3990-4012.
Dart, E., Rotman, L., Tierney, B., Hester, M., & Zurawski, J. (2014). The science dmz: A
network design pattern for data-intensive science. Scientific Programming, 22(2), 173-
185.
Xu, X., Liu, B. X., & Hu, N. (2017). Teaching
Content Design and Organization of Data Mining Course for Statistics Postgraduates. DEStech
Transactions on Engineering and Technology Research, (mcee).
Carley, K. M., & Prietula, M. J. (2014). The" virtual design team": Simulating how organization
structure and information processing tools affect team performance. In Computational
organization theory (pp. 19-36). Psychology Press.
Zhou, Q., Wang, Y., Jiang, P., Shao, X., Choi, S. K., Hu, J., ... & Meng, X. (2017). An active
learning radial basis function modeling method based on self-organization maps for
simulation-based design problems. Knowledge-Based Systems, 131, 10-27.
Kornberger, M. (2017). The visible hand and the crowd: Analyzing organization design in
distributed innovation systems. Strategic Organization, 15(2), 174-193.
Robins, G. (2015). Doing social network research: Network-based research design for social
scientists. Sage.
21 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Kalimullin, A. M., & Islamova, Z. I. (2016). Formation of information-educational environment
in the partner universities of university of shanghai cooperation
organization. International Electronic Journal of Mathematics Education, 11(6), 1879-
1890.
Mishra, A. K., & Coulibaly, P. (2014). Variability in Canadian seasonal streamflow information
and its implication for hydrometric network design. Journal of Hydrologic
Engineering, 19(8), 05014003.
Chen, T., Cai, W., Ryali, S., Supekar, K., & Menon, V. (2016). Distinct global brain dynamics
and spatiotemporal organization of the salience network. PLoS biology, 14(6), e1002469.
22 | P a g e
in the partner universities of university of shanghai cooperation
organization. International Electronic Journal of Mathematics Education, 11(6), 1879-
1890.
Mishra, A. K., & Coulibaly, P. (2014). Variability in Canadian seasonal streamflow information
and its implication for hydrometric network design. Journal of Hydrologic
Engineering, 19(8), 05014003.
Chen, T., Cai, W., Ryali, S., Supekar, K., & Menon, V. (2016). Distinct global brain dynamics
and spatiotemporal organization of the salience network. PLoS biology, 14(6), e1002469.
22 | P a g e
1 out of 23
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.