INFO813 Assignment: Medical Center Network Infrastructure Proposal
VerifiedAdded on 2023/06/07
|23
|4921
|128
Report
AI Summary
This report presents a comprehensive proposal for deploying and upgrading the IT network infrastructure of a medical center, focusing on the opening of a new branch. The current network, limited by LAN connections and local database servers, faces challenges in scalability and accessibility. The report addresses these issues by proposing a centralized data center to synchronize information, improve cost-efficiency, and enhance security. It details network security concerns, including DDoS attacks, and provides a network diagram and cost analysis. The proposal emphasizes virtualization, BYOD implementation, and the integration of VOIP and video conferencing. Furthermore, the report includes requirement analysis, technology recommendations, project timelines, risk assessments, a business continuity plan, and a disaster recovery plan, offering a holistic approach to network management and operational efficiency. The report also recommends future cloud-based solutions for further optimization.

NETWORKS AND
INFRASTRUCTURE
INFO813
[NAME OF THE STUDENT] - [STUDENT ID]
[NAME OF THE INSTITUTE]
INFRASTRUCTURE
INFO813
[NAME OF THE STUDENT] - [STUDENT ID]
[NAME OF THE INSTITUTE]
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
Introduction......................................................................................................................................3
Background......................................................................................................................................4
Problem Statement...........................................................................................................................6
Aims and Objectives........................................................................................................................7
Deployment of new system.............................................................................................................7
Centralized Data center....................................................................................................................9
Network Security Issues................................................................................................................10
Network Diagram..........................................................................................................................13
Cost................................................................................................................................................14
Future Work...................................................................................................................................14
Requirement analysis.....................................................................................................................15
Technology to be purchased..........................................................................................................15
Project timelines............................................................................................................................16
Schedule implementation...............................................................................................................17
Risk and solution for each risks.....................................................................................................19
Business continuity plan................................................................................................................20
Site description..........................................................................................................................20
1 | P a g e
Introduction......................................................................................................................................3
Background......................................................................................................................................4
Problem Statement...........................................................................................................................6
Aims and Objectives........................................................................................................................7
Deployment of new system.............................................................................................................7
Centralized Data center....................................................................................................................9
Network Security Issues................................................................................................................10
Network Diagram..........................................................................................................................13
Cost................................................................................................................................................14
Future Work...................................................................................................................................14
Requirement analysis.....................................................................................................................15
Technology to be purchased..........................................................................................................15
Project timelines............................................................................................................................16
Schedule implementation...............................................................................................................17
Risk and solution for each risks.....................................................................................................19
Business continuity plan................................................................................................................20
Site description..........................................................................................................................20
1 | P a g e

Site comparison.........................................................................................................................21
Final recommendations..............................................................................................................22
Disaster recovery plan...................................................................................................................23
Disaster indicators.....................................................................................................................23
Network disaster........................................................................................................................23
Events that indicate the disaster.....................................................................................................24
Roles of the staffs......................................................................................................................24
Containment strategies...................................................................................................................25
Damage assessment.......................................................................................................................25
Forensics....................................................................................................................................26
Identification of the cause of the disaster......................................................................................26
Legal inolvments.......................................................................................................................26
Technology support...................................................................................................................26
Time consideration....................................................................................................................26
Conclusion.....................................................................................................................................27
References......................................................................................................................................27
2 | P a g e
Final recommendations..............................................................................................................22
Disaster recovery plan...................................................................................................................23
Disaster indicators.....................................................................................................................23
Network disaster........................................................................................................................23
Events that indicate the disaster.....................................................................................................24
Roles of the staffs......................................................................................................................24
Containment strategies...................................................................................................................25
Damage assessment.......................................................................................................................25
Forensics....................................................................................................................................26
Identification of the cause of the disaster......................................................................................26
Legal inolvments.......................................................................................................................26
Technology support...................................................................................................................26
Time consideration....................................................................................................................26
Conclusion.....................................................................................................................................27
References......................................................................................................................................27
2 | P a g e
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Introduction
The proposal is about the deployment of the IT network at the medical center in which the
medical center wants to open a new branch in another city. The current network is based on the
LAN connection in which the access of the servers are limited. This report will described the
core functional information about the deployment of the network and synchronized the
information at one data center which can control the cost of the services as the existing branch of
the medical center is having local database server to which the access is only limited to the area
of the branch whereas the business required the more vast access to connect with the systems.
Background
The current network system of the medical center is based on the wired connection and the
Macintosh computer systems which are comparatively fast than the windows based computer
system, the current network is based on the giga bit fibre connection which makes the complete
connection between the systems and the networks to ensure the connectivity of the computers
with the database server in which the information about the 5500 clients are stored. There are
also the data about the patients who will be existing in the medical center. The current structure
of the medical center is for the limited number of users who will be managing the bookings on
daily basis.
The system access is available for a certain local area.
3 | P a g e
The proposal is about the deployment of the IT network at the medical center in which the
medical center wants to open a new branch in another city. The current network is based on the
LAN connection in which the access of the servers are limited. This report will described the
core functional information about the deployment of the network and synchronized the
information at one data center which can control the cost of the services as the existing branch of
the medical center is having local database server to which the access is only limited to the area
of the branch whereas the business required the more vast access to connect with the systems.
Background
The current network system of the medical center is based on the wired connection and the
Macintosh computer systems which are comparatively fast than the windows based computer
system, the current network is based on the giga bit fibre connection which makes the complete
connection between the systems and the networks to ensure the connectivity of the computers
with the database server in which the information about the 5500 clients are stored. There are
also the data about the patients who will be existing in the medical center. The current structure
of the medical center is for the limited number of users who will be managing the bookings on
daily basis.
The system access is available for a certain local area.
3 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

The existing network is not efficient enough for the operational management and hence, cost-
effective measure is necessary for the enhancement in the security and othwer factors of the
organization. The present network is not very secured and thus, the transformation needs to be
capable of restoring the security of the dsata and information being exchanged over the network.
The manual input data and information needs to be manipulated and transformed with an online
services. One of the major issue is based on the data security in every forum such as the existing
system is based on the one server where the data about the 5500 clients has been stored can be
crashed at any moment as the local databases cannot get the load more than the capacity.
Problem Statement
The existing system of the medical center is limited for the users and the access is also limited ,
the company management face the issues in the monitoring as well as the clients also have to
spend a lot of time for the booking which is based on the software which only work in limited
area. The current system will not be enough in the case if the company wants to open a new
branch of the medical center whereas the accessibility will be more complex and the workflow
would be managed by the existing systems.
The current network of the system is based on the wired connection and if the second branch also
integrates the services of same system, then it would not be able to manage the complete
workflow of the organization that is why the management of the medical center should have to
upgrade the services which enables the users to get register. Also the services of the online
bookings and the appointments should be integrated for the service optimizations.
4 | P a g e
effective measure is necessary for the enhancement in the security and othwer factors of the
organization. The present network is not very secured and thus, the transformation needs to be
capable of restoring the security of the dsata and information being exchanged over the network.
The manual input data and information needs to be manipulated and transformed with an online
services. One of the major issue is based on the data security in every forum such as the existing
system is based on the one server where the data about the 5500 clients has been stored can be
crashed at any moment as the local databases cannot get the load more than the capacity.
Problem Statement
The existing system of the medical center is limited for the users and the access is also limited ,
the company management face the issues in the monitoring as well as the clients also have to
spend a lot of time for the booking which is based on the software which only work in limited
area. The current system will not be enough in the case if the company wants to open a new
branch of the medical center whereas the accessibility will be more complex and the workflow
would be managed by the existing systems.
The current network of the system is based on the wired connection and if the second branch also
integrates the services of same system, then it would not be able to manage the complete
workflow of the organization that is why the management of the medical center should have to
upgrade the services which enables the users to get register. Also the services of the online
bookings and the appointments should be integrated for the service optimizations.
4 | P a g e

Aims and Objectives
The aims and the objectives of the proposed network system is to initialize the complete
infrastructure which will be managing the complete workflow of the system to ensure the proper
quality of the services of the medical center. There should be a data center from the both
branches will be having the access to the servers. The clients found it difficult to get the
bookings and the appointments, the proposed system will be having an online web interface
where the users can select the branches, see the timings of the consultants, and make their
bookings at the given time that would be time saving for the client as well.
Deployment of new system
The proposed system should be based on the complete virtualization where every operating
system will be supporting the system in manner to meet the increased needs and demands.
The VOIP (Voice over Internet protocol) or a specific video conference can be installed for
enhancing the communication between the different branches. Quality of the service is most
important factor in case of video streaming that is the broadband companies have optimized the
wireless services such as the integration of WiMAX services which specifically allocate more
bandwidth to the video conference session. In this research the integration and the simulation of
WiMAX would also be discussed and the video frame algorithms will be implemented to
calculate the efficiency of the video streaming overlays based on the given bandwidth (Khan,
2006).
BYOD can be implemented withint the existing system for enhancing the functioning and
delivery of the project operations.
5 | P a g e
The aims and the objectives of the proposed network system is to initialize the complete
infrastructure which will be managing the complete workflow of the system to ensure the proper
quality of the services of the medical center. There should be a data center from the both
branches will be having the access to the servers. The clients found it difficult to get the
bookings and the appointments, the proposed system will be having an online web interface
where the users can select the branches, see the timings of the consultants, and make their
bookings at the given time that would be time saving for the client as well.
Deployment of new system
The proposed system should be based on the complete virtualization where every operating
system will be supporting the system in manner to meet the increased needs and demands.
The VOIP (Voice over Internet protocol) or a specific video conference can be installed for
enhancing the communication between the different branches. Quality of the service is most
important factor in case of video streaming that is the broadband companies have optimized the
wireless services such as the integration of WiMAX services which specifically allocate more
bandwidth to the video conference session. In this research the integration and the simulation of
WiMAX would also be discussed and the video frame algorithms will be implemented to
calculate the efficiency of the video streaming overlays based on the given bandwidth (Khan,
2006).
BYOD can be implemented withint the existing system for enhancing the functioning and
delivery of the project operations.
5 | P a g e
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

SSL certificates should be evaluated for the compliance with the security of thre network
Centralized Data center
Data center should be upgraded so that the data of both branches can be stored at one place
whereas the data center of the medical center should be centralized because the management of
the database at two different branches will be more reliable where the server will be centralized.
The cost of the cables and the Ethernet connections will also be saved if the wireless network
will be implemented at the data center.
Centralized data center also consume the less cost for the maintenance services and the
monitoring is also effective in the case of setting up a data center between two branches , the
access and the latency will delay will not be affecting the quality of the services whereas the new
infrastructure will help the medical center to have a proper embedded network management
system which can be enough to manage the work flow of execution which is considered as the
most important factor in the business success (Al-Fares, 2010). Central databases are more
reliable as the access is fast for every existing user of the services.
Network Security Issues
The reason for DDoS attacks is to prevent others from reaching a service on the internet. There
can be numerous reasons for this. Someone made a website about you attempting to spread false
rumors. You could obtain that websites IP address, then if you have more upload bandwidth then
they have download bandwidth, you could send that website more requests then it could handle,
thus preventing anyone else from accessing it. A person gets banned from a website or a game.
They get mad and for revenge they flood that service with a bunch of fake connection attempts
6 | P a g e
Centralized Data center
Data center should be upgraded so that the data of both branches can be stored at one place
whereas the data center of the medical center should be centralized because the management of
the database at two different branches will be more reliable where the server will be centralized.
The cost of the cables and the Ethernet connections will also be saved if the wireless network
will be implemented at the data center.
Centralized data center also consume the less cost for the maintenance services and the
monitoring is also effective in the case of setting up a data center between two branches , the
access and the latency will delay will not be affecting the quality of the services whereas the new
infrastructure will help the medical center to have a proper embedded network management
system which can be enough to manage the work flow of execution which is considered as the
most important factor in the business success (Al-Fares, 2010). Central databases are more
reliable as the access is fast for every existing user of the services.
Network Security Issues
The reason for DDoS attacks is to prevent others from reaching a service on the internet. There
can be numerous reasons for this. Someone made a website about you attempting to spread false
rumors. You could obtain that websites IP address, then if you have more upload bandwidth then
they have download bandwidth, you could send that website more requests then it could handle,
thus preventing anyone else from accessing it. A person gets banned from a website or a game.
They get mad and for revenge they flood that service with a bunch of fake connection attempts
6 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

so that nobody else can access the service. A company wants to prevent their competition’s
website from being accessed. Usually, a website will have a lot more bandwidth than a single
person would. That is why it usually takes a “bot net” (a bunch of “hacked” computers that you
can control) to disable a service like a http server (http servers are what display html pages such
as the one you are on right now reading this). A lot of webpages today have DDoS protection.
One kind of protection is where incoming traffic is scanned to determine if it is legitimate or
fake. Fake traffic is dropped immediately to prevent the service from becoming overloaded. This
type of protection will not always work. If the DDoS attack has enough bandwidth, it can still
bog down even the scanning of the incoming traffic which will again prevent others from
accessing the service. This attack starts with denial of service we select a service like Google
search, facebook or any other service which is provided on the internet. The main target of the
attack is to make service unavailable. As you could infer from the name of this attack it is
distributive in nature i.e. we need a many machine,ip’s , mac address etc for this attack
depending upon the service we want to deny. If we want to deny a service like Google millions
or even billions of machines and ip’s would be needed. But if it is small website with 1000
requests a day hundreds of machines may be enough. Most of the time when these attacks are
carried out, they are carried out through a lot of machines (usually of innocent users) which
could include your and my machine too, unknowingly we could be part of the attack. Ddos
Attacks are known to be one of the most powerful attacks on the internet and they would become
more prominent as we move towards IOT as for these machines it would be very difficult to fix
vulnerability.
In addition, the attackers are always seeking new attack methods and therefore their attack
traffic characteristics might also adapt to defeat the detection method. One of such methods
7 | P a g e
website from being accessed. Usually, a website will have a lot more bandwidth than a single
person would. That is why it usually takes a “bot net” (a bunch of “hacked” computers that you
can control) to disable a service like a http server (http servers are what display html pages such
as the one you are on right now reading this). A lot of webpages today have DDoS protection.
One kind of protection is where incoming traffic is scanned to determine if it is legitimate or
fake. Fake traffic is dropped immediately to prevent the service from becoming overloaded. This
type of protection will not always work. If the DDoS attack has enough bandwidth, it can still
bog down even the scanning of the incoming traffic which will again prevent others from
accessing the service. This attack starts with denial of service we select a service like Google
search, facebook or any other service which is provided on the internet. The main target of the
attack is to make service unavailable. As you could infer from the name of this attack it is
distributive in nature i.e. we need a many machine,ip’s , mac address etc for this attack
depending upon the service we want to deny. If we want to deny a service like Google millions
or even billions of machines and ip’s would be needed. But if it is small website with 1000
requests a day hundreds of machines may be enough. Most of the time when these attacks are
carried out, they are carried out through a lot of machines (usually of innocent users) which
could include your and my machine too, unknowingly we could be part of the attack. Ddos
Attacks are known to be one of the most powerful attacks on the internet and they would become
more prominent as we move towards IOT as for these machines it would be very difficult to fix
vulnerability.
In addition, the attackers are always seeking new attack methods and therefore their attack
traffic characteristics might also adapt to defeat the detection method. One of such methods
7 | P a g e

is to make the malicious flows look like legitimate flows by making them appear as longer
flows. It is very important to see how the algorithm starts to behave when the malicious
traffic starts to generate longer flows with more number of packets in other words when
attack flows start to look like legitimate flows. In order to achieve longer attack flows the
number of packets sent in each flow and the traffic interval is increased gradually. Table 17
shows the parameters set in each scenario. In all cases the attack flow is run over 4 hosts all
attacking a single victim in the network and ten attacks are tested for each attack traffic
pattern.
Network Diagram
Figure 1: Initial Network architeure for the medical centre
(Source: Kornberger, 2017, pp-180)
8 | P a g e
flows. It is very important to see how the algorithm starts to behave when the malicious
traffic starts to generate longer flows with more number of packets in other words when
attack flows start to look like legitimate flows. In order to achieve longer attack flows the
number of packets sent in each flow and the traffic interval is increased gradually. Table 17
shows the parameters set in each scenario. In all cases the attack flow is run over 4 hosts all
attacking a single victim in the network and ten attacks are tested for each attack traffic
pattern.
Network Diagram
Figure 1: Initial Network architeure for the medical centre
(Source: Kornberger, 2017, pp-180)
8 | P a g e
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Cost
If the implementation of the BYOD system will be successful then the cost of the system will be
reduced as compared to the existing network system because the existing system is based on the
Macintosh computers while the BYOD supporting system will be complete compatible with
every system and more number of users will be able to access the services of the medical center.
The dedicated cost of the system will also be less because the entire system will be based on the
wireless connection so the cost of the cables will also be saved and accessibility will be
increased.
Future Work
The proposed solution will be consideration as an appropriate increment to the business of
medical care center; it would be helping in the case if the management of the medical center
wants to integrate another branch with the system. The preferable future network will be based
on the cloud services in which the cost the data center will also be saved an entire network will
be shifted to the cloud database which will also be helping the fast access by using the
technology of fog computing services, because fog servers are plotted nearer to the users so the
level of optimization will be high.
Requirement analysis
Currently the medical centre company use such a network system which is comprises of 5
digitized machines which are connected to a simple LAN connection. On the other hand the
database system connected to to the application of the medical centre has limited amount of data
storage. However the total number of employees working for the comaony are 5500 which is not
9 | P a g e
If the implementation of the BYOD system will be successful then the cost of the system will be
reduced as compared to the existing network system because the existing system is based on the
Macintosh computers while the BYOD supporting system will be complete compatible with
every system and more number of users will be able to access the services of the medical center.
The dedicated cost of the system will also be less because the entire system will be based on the
wireless connection so the cost of the cables will also be saved and accessibility will be
increased.
Future Work
The proposed solution will be consideration as an appropriate increment to the business of
medical care center; it would be helping in the case if the management of the medical center
wants to integrate another branch with the system. The preferable future network will be based
on the cloud services in which the cost the data center will also be saved an entire network will
be shifted to the cloud database which will also be helping the fast access by using the
technology of fog computing services, because fog servers are plotted nearer to the users so the
level of optimization will be high.
Requirement analysis
Currently the medical centre company use such a network system which is comprises of 5
digitized machines which are connected to a simple LAN connection. On the other hand the
database system connected to to the application of the medical centre has limited amount of data
storage. However the total number of employees working for the comaony are 5500 which is not
9 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

a little in number. Therefore, workflow management of the comaony has become quite difficult
due to this system. in orderto avoid the operational and functional difficulties they are wiling to
change their exiting network infrastructure. It is the role of the comaony to design the network in
such a way so that it can avoid the secutrity and management orieneted issues. In order to design
such network system the network systems those are required by the company are elaborated in
the below section. It is the role of the secutity manager ad operation manager of the company to
purchase suiable technologies and supporting elements and equipmenets so that the system can
be successfully built. In order to design the new network management plan for the company a
project timeline, scheulde ans risk management plan are also elaborated for the company.
Technology to be purchased
As the comap ny is willing to design a multi data centre architecture with the amendment of
Amazon Web services thus, the supporting techologis that are required by the project developers
include ElasticSearch Cluster (Mingo DBInstance), Greylog and MongoDB. It is expected with a
single direct connection the issues that the preious system was facing will be completely
minimzed. In order to spread the new data centre of the medical irganization the proper way is
required to be find out for the Graylog setup across 2 different Dorect connection. However this
kind of network setup are not supported by the elastic serach approach. Though, the elastic
search cluster looks ery much promising from te business perspectives because it fails to find
much amount of information from at a time. For this system a dual 1 Gbps direct connection will
be required in the AWS a each of the comaony data center. Though, along with the DC addition
to each of the Graylog Instance are enough but still behind the system addition of a loadbalacer
will be more helpful. Across the DC system the MongoDB and the Graylog can be clustered
10 | P a g e
due to this system. in orderto avoid the operational and functional difficulties they are wiling to
change their exiting network infrastructure. It is the role of the comaony to design the network in
such a way so that it can avoid the secutrity and management orieneted issues. In order to design
such network system the network systems those are required by the company are elaborated in
the below section. It is the role of the secutity manager ad operation manager of the company to
purchase suiable technologies and supporting elements and equipmenets so that the system can
be successfully built. In order to design the new network management plan for the company a
project timeline, scheulde ans risk management plan are also elaborated for the company.
Technology to be purchased
As the comap ny is willing to design a multi data centre architecture with the amendment of
Amazon Web services thus, the supporting techologis that are required by the project developers
include ElasticSearch Cluster (Mingo DBInstance), Greylog and MongoDB. It is expected with a
single direct connection the issues that the preious system was facing will be completely
minimzed. In order to spread the new data centre of the medical irganization the proper way is
required to be find out for the Graylog setup across 2 different Dorect connection. However this
kind of network setup are not supported by the elastic serach approach. Though, the elastic
search cluster looks ery much promising from te business perspectives because it fails to find
much amount of information from at a time. For this system a dual 1 Gbps direct connection will
be required in the AWS a each of the comaony data center. Though, along with the DC addition
to each of the Graylog Instance are enough but still behind the system addition of a loadbalacer
will be more helpful. Across the DC system the MongoDB and the Graylog can be clustered
10 | P a g e

successfully. In order to run the application susccessfully this is mandatory for the company to
buy proper software lisnce and supporting hardware equipments as well.
11 | P a g e
buy proper software lisnce and supporting hardware equipments as well.
11 | P a g e
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 23
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





