This report presents the design of a hospital network using Cisco Packet Tracer. The network is designed to meet the requirements of the hospital staff and users.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
MN621 Advanced Network Design 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents Introduction..........................................................................................................................................3 Part 1....................................................................................................................................................4 Questionnaire.......................................................................................................................................4 Justification of designed Questionnaire...............................................................................................5 Validation and verification plan...........................................................................................................7 Part 2..................................................................................................................................................10 Gather the information to develop the network without talk to users and staff.........................10 Part 3..................................................................................................................................................11 Network Design..................................................................................................................................11 Network design reliability..................................................................................................................13 Application Sets..................................................................................................................................14 Conclusion..........................................................................................................................................22 References..........................................................................................................................................23 2
Introduction In this report, a hospital network is to be designed and implemented. For designing the network requirements are to be gathered from the stakeholders, for that a questionnaire is to be developed in this report. A detailed justification will be provided for the all questions. The network will be implemented using Cisco Packet Tracer and will be tested on the given application set. 3
Part 1 Questionnaire The questionnaire is prepared for the users, management, and other staff to develop the network system. Question from User S. No.Questions from users 1Which type of interface did you require the system? 2Which server is required for hospital network system? 3Tell the hardware and software required to develop the application? 4Which type of security requirement you required? 5Is system should allow updating the information? Questions for management S. No.Questions from hospital management to develop network 1Is already inserted data should be updated and delete from the database? 2Issues are easily detected to secure the system. 3Required consistent network with the appropriate mechanism. 4The network system should be support project management system and they can perform operations. 5The network should secure all the patient and doctors data. Questions for Other staff S. No.Questions from other staff to develop network 1Required training to learn the system or application. 2Easily managed and securely store the data automatically. 3Provide accurate information and identified the data of the patient. 4Other staffs also update and delete or modify the data. 5Every staff member needs to register them in the network to secure the network information. 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Justification of designed Questionnaire Justification of user questions: 1.The first question of the user provides the information of system interface. Which type of interface did it require? The user tells us about the system interface requirement for hospital network system. With this question, we also get what technology they want for the network. According to the scenario, the network is designed by using LAN technology. 2.The second question is providing the information of a server that is required to develop the network for hospital application. For network development, the required server is a database server, DNS server etc. 3.The third question of user provides the information about required hardware and software details to develop the network system for the hospital application. The hardware and software requirement is given as select windows server with latest version to run the application and network should support the internet information easily. 4.Fourth question is designed to take the information about the security in the hospital network. The user wants a login and registered feature in the network. Is the network has register and login feature in the network then it can be secure from the malware users and untrusted users? 5.Fifth question of user questionnaire provides the information about the network flexibility with the data. According to the user requirement, the user should able to modify their stored data in the network. Justification of management questionnaire: 1.First question of management questionnaire provide the information of what they with network regarding data modification. The management staff can able to modify the data from the stored data in the network. The management staff should log in to the network and then they can able to modify the data in the network. 2.With second questions, the developer should apply the security strategies to secure the network. The strategy should be able to detect the issues and threats from the network when they are occurred and should be able to resolve them. The network should be secure from the malware users, hacker and from internal attackers. 3.The network should be able to run on every platform of the hospital management. The network should be used LAN technology to provide the consistent network. The network 5
should be consistent by using the Ethernet and cables. To develop the network use appropriate strategies and mechanism. 4.The hospital management staff should able to perform the operation in the network without any problems. The network should allow the management staff to make changes in the network according to the requirement. 5.The fifth question of the management questionnaire provides the information about the network security. The network should be secure for the hospital management team, doctors, and patient who are registered in the hospital network. The network should use encryption technique to identify the incoming data of the patient. The patient and doctors should register them first in the network then they are able to make modification in the stored data. Justification of the other staff questionnaire: 1.The other staff required training to learn the network. So, the organization should provide training to learn the network. Every staff should know about the network functionality and how they perform the operation in the network. With this question the staffs want a training session from the organization to understand the network working. 2.The network should be easily managed by the staff member of the hospital without any extra effort. The hospital should require technical staff to perform the operation in the network. With the help of technical staff, the other member also performs the different operation in the designed network of the hospital. 3.The network should secure all the important information of the organization, staff, and patient. So, secure the information, apply the encryption technique in the network. The developer also applies any other security approach to secure the information from the hackers and internal attackers. 4.The network should allow other staff members to make modification in the network if required. To update the data and access the network the every staff member should register in the network. 5.The network should be secure form the malware users. In a network, the developer should implement some security techniques that secure the network from the attacker and that type of users who are not registered in the network. To access the network the users, staff, and another member of the hospital should register them in the network and then login in the system. With these questions, the developer and designer should identify what is the requirement to develop the network system for the hospital [5]. 6
Validation and verification plan The validation and verification plan is developed to gather the information from the project stakeholders to develop the network for the hospital. So, first discuss the stakeholder of the project that is providing the information and requirement related to the hospital network system. There are various stakeholders to help the gathering information: S. No.StakeholdersGathered information 1GovernmentThe government provides the security and privacy policy to develop the secure network. These security and privacy policy are securing the network system of the hospital from the malware users and attackers. 2Contractors and subcontractorsThe contract decides: how much time it takes in development and cost. Also, provide the information which technology is used to develop the network for the hospital. 3External CustomersWith the external customer, get the market strategies for the developed network system. The external customers manage the network system after development and give feedbacks to recover the issues in the network. 4SuppliersWith the supplier, get the project requirements such as which type of server it required, and define the router and switches requirement to develop the network for the hospital. 5ManagerThe manager decides the strategies to develop the secure network with his team members. Also gathered the information by conduct meetings. The project manager also gathers the network system total cost and time. 6Internal customersThe internal customers are more important part of the project for gathering the information. With the help of an internal customer, get 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
network specifications, budget, operating characteristics, and another important requirement of the network system. 7Project team membersThey define what type of difficulties network faces and how it can be solved. With them, also get the network performance requirement. 8Business AnalystThe business analyst provides the information about the completion time and also provides the total budget project. Business analyst shows the system requirement that which type of technology, it required to develop the network and also shows the required network devices. 9DesignerGather the user requirement to solve the design problems and verify the solutions. Analyse all the required server, network devices, and technology to secure the network of the hospital [3]. The stakeholders get the information to develop the network by using the methodology that is described here. The overall requirements are gathered by following this approach: 8
Figure1stakeholder approach to gathering the information The management system follows this process to gather the information: 1.Stakeholders identification 2.Gather the requirement 3.Analyse the user and system requirement 4.Validate and verify the requirements 5.Communicate with stakeholders 6.Track all the requirements 7.Make changes if network required [2] 9
Part 2 Gather the information to develop the network without talk to users and staff To collect the information and requirement without meeting or talk to the users and staff of the hospital, I have started to research about the technologies, and this type of network form the past research work and past study that is done by researchers. From this past research work, I can analyze which type of network is required to develop for the hospital. To know the user requirement, I can observe the requirement to study the documentation that is done by users and also read the feedbacks which are given by the user on this type of network. With this observation, documentation, and feedbacks, I can analyze all the requirement of the user and staff. To gather the information and requirement, first I have analyzed the problem and then start to research work on this problem. After that, I found information to solve the problem. The information also gets by identified the gaps from the already completed research work. There is research work is already done on same technology with the same network, so, I will study them to know the information and requirement to develop the network system for the hospital without conduct meeting with users and staff. 10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Part 3 Network Design Figure2Network Implementation EIGRP Protocol is used in this network. EIGRP 10 is utilized in the above-implemented network. All the routes in the above-implemented network have individual routing tables. It is basically the quickest routing protocol present there, and due to which if there are any changes in the network it will automatically change the adjacent router. EIGRP Protocol sends a message every 5 seconds. Multilayer Switch 3650-24PS, 2960-24 TT Switch and Cisco Router are used in the above network. Router -1 11
Router -2 Router -3 12
Network design reliability The network availability and reliability play different key roles to increase the satisfaction of the customers and productivity of employees. To show the network design reliability: 1.Check the network performance, the administrator of network required to ensure the hardware devices of the network that are compatible or not and analyze the problems. 2.Check the malicious activity that is done on the network and finds the solution to stop the malicious network. The malicious activities are found by external communication. 3.The bandwidth should be sufficient for the better reliable network [4]. The network administrator visualizes the IT infrastructure and allows solving the problems. 4.To measure the network design reliable checks the terminal reliability. For terminal reliability, the source node should be communicated to the node of the terminal for OD pairs. 5.The nodes should be communicated to the node of the terminal (k-terminal or various sources to the reliability of terminal). 6.To check the node to node blocking, check the delay of node to node communication, terminal reliability and check the functional reliability. 7.There are two models to check the network reliable: Deterministic model and probabilistic models. The deterministic model is used to check the connectivity of the network, check the hoop counts and manage the disjoint paths and nodes. The probabilistic model is used to check the reliability of path and also manage the path disconnection [1]. 13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Conclusion The hospital network is designed by using the Cisco Packet Tracer that is the requirement of the user. The designed network is secured by applying the security strategies like encryption technique. In this report, I have presents the stakeholders of the project to develop the network system for the hospital and questionnaire also present. With this questionnaire and stakeholders, the developer gets the information about the network system of the hospital. 22
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References [1]H. Richard, “Network reliability,”Seat.massey,n.d,pp. 143. [2]P. Rani & H. Mark, “REQUIREMENTS GATHERING PLAN AND METHODOLOGY”,PERICLES Consortiu,2013,pp. 7, 9, 10, 12. [3]T. Coventry, “Requirements management – planning for success:techniques to get it right when planning requirements,”Paper presented at PMI® Global CongressEMEA, London, England. Newtown Square, PA: Project Management Institute, 2015. Available: https://www.pmi.org/learning/library/requirements-management-planning-for-success-9669 [4]V. Ram, “How to ensure high network availability in your organisation”,ABC Technology+ games,2015. [5]W. Adrienne, “Stakeholder management,” Opentextbc, 2014, Available: https://opentextbc.ca/projectmanagement/chapter/chapter-5-project-stakeholders-project- management/ 23