StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Dental Office Network Systems - Case Study Example

Cite this document
Summary
Dental Office Network Systems Name Institution Dental Office Network Systems A robust and effective network is essential infrastructure that business organizations require to succeed in running their activities. In the scenario, there is no doubt that the new organizations require an elaborate and well-planned network that will release the potential of the employers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Dental Office Network Systems
Read Text Preview

Extract of sample "Dental Office Network Systems"

Download file to see previous pages

Despite the robustness of the proposed network, the report will details its risks along with its benefits. Network Requirements The entire organization, which has five offices, must connect to a central repository where all data will be stored. Because of this reason, proposed network must have a server to store all files for the five offices. In addition, the need for a fast and reliable network calls for a fast network connection that supports high throughput such as T1 lines. In the new organization, four dentists are mobile, which calls for a provision of remote connectivity such as VPN along with switching services using routers and layer three switches.

With the network responsible for securing patient’s data as per HIPPA laws, the network must allow data encryption and authentication of users who access the network. Safety of Information Safety of patient’s data is an paramount goal the proposed network must address effectively. Since the organization will be dealing with crucial information about patients, all information about patients including admission and treatment records be safe and secure. This will be possible if the files server will encrypt data using encryption such as EAS.

Moreover, the network must protect data during transmission using encryption techniques and technologies such as VPN. Among the five offices, the network must allow senders and recipients of data to authenticate before transmission of data. The VPN technologies will mobile workers to connect to the central file server securely without compromising on safety of data (Baldauf & Stair, 2011). The network must also have a firewall and intrusion detection system to prevent any unauthorized access to the organization’s data.

Users will also need to authenticate their devices before using the network especially wireless access points due to security concerns. Network Type, Components, Devices, and Equipment for the Network A metropolitan network (MAN) system is the best network type that will match the requirement of the new organization. A MAN network has the capacity to span several cities and capable of delivering high bandwidth connections using existing telecommunication lines (Morley & Parker, 2009). The proposed network will have several components to link the five offices and the remote workers.

Consequently, the proposed network will have five routers connected with serial cables in a mesh topology. These routers connect to layer three switches to enable packet switching and separation of departments using VLANS. The switches must have at least enough number of ports and support security protocols such as IPSEC. For remote workers, each will have a laptop and a VPN enabled dongle that will allow them establish a secure connection to the central database. With security being a vital issue, devices such as firewalls and backups devices must be located within the network to improve security and recovery process.

Most important, the network must have a network server that will store all data and identifiable using a static IP address and a secondary backup in the cloud to provide continuity during an outage. The servers must have power backup and standby power generators not to mention hot swap features to avoid taking the server offline during service. Network Design Diagram The network diagram for the proposed netw

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Dental Office Network Systems Case Study Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/design-technology/1454234-dental-office-network-systems
(Dental Office Network Systems Case Study Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/design-technology/1454234-dental-office-network-systems.
“Dental Office Network Systems Case Study Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/design-technology/1454234-dental-office-network-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Dental Office Network Systems

Network Technology Specification

This paper presents communication network specification for a dental office.... network TECHNOLOGY SPECIFICATION CSIA302 Final Exam Paper: network Technology Specification Author Author Affiliation Date Table of Contents Requirements for the network 3 network Information and Data Need Security 4 network Specification 6 network Components, Devices and Equipment 6 network Design Diagram 7 Benefits of the Proposed network Solution 8 Potential Risks 9 Risk Mitigation Strategies 9 Conclusion 10 References 10 Introduction Business communication and data management have become one of the essential business activities in this new age of technology....
4 Pages (1000 words) Essay

Security Requirement Analysis - New Smile Dentists

e should also use the metropolitan area network to design an interconnection for all the offices.... This telecommunication network should enable the dentists to work within the offices and also from their laptops while at the patients' home.... The designed network should meet HIPAA requirements by maintaining high degree confidentiality on the patient's details (Claise and Wolter 2007).... In this telecommunication network the patients' record should be confidential....
3 Pages (750 words) Research Paper

Requirements for Dental Office Network Design

dental office network design Name Professor Institution Course Date Analyze the given case and provide a clear set of requirements for the network solution Operation of a single dental office does not require a lot of attention in terms of network solutions as compared to several offices.... The design of the network solution will require careful attention in order to develop effective computer systems for fostering operations by dentists in different locations (Plant & Murrell, 2007)....
4 Pages (1000 words) Case Study

Successful information security management

The security incident of different computing systems will have dissimilar effects and escort to different consequences, bureau, departments the Internal Revenue Service need to tailor the security incident handling plan according to specific operational requirements.... Information systems security is a challenge for executives and the information technology professionals.... The information technology professionals are not only responsible for securing the information systems, all the employees of the organization are responsible....
9 Pages (2250 words) Research Paper

The Information Security Officer in a Well-Defined Process

It has been calculated that approximately half of the breaches to the security of the information systems are made by the internal staff or employee of the organization (Spears et al.... The security incident of different computing systems will have dissimilar effects and escort to different consequences, bureau, departments the organization needs to tailor the security incident handling plan according to specific operational requirements.... Information systems security is a challenge for executives and information technology professionals (Dhillon et al....
6 Pages (1500 words) Assignment

Huffman Trucking Company Inc. Telephony Service Profiling

A gateway is needed to communicate with others within the network.... A Voice enabled talk switch model is used to integrate VOIP and handle the traditional telephone network.... network ProtocolsA.... Identifying network ProtocolsOn locations CA office and CA Plant, MO Plant, NJ Office, NJ Plant, OH Plant uses the TCP/IP protocols.... PBX means Private Branch Exchange, privately owned and is created to function as a box referred to as the central office made to handle anywhere from 100-20,000 lines within a 20 - 30 miles radius large scale....
14 Pages (3500 words) Essay

Communications and Networks Analysis

efine each following term and state their negative and positive LAN - Local Area Network, NETBIOS protocol based physical network systems limited to a building.... XML, MARC21 or RFID formats for demand-supply chains, library automation system, product tracking. Intranet - Is the physical network of networking and computing systems spread in a building or across buildings of the same organization.... Ring - The computing systems connected such that the cable runs from one system to another and thus forming a closed circuit....
6 Pages (1500 words) Essay

Successful Information Security Management and Computer Security

It has been calculated approximately half of the breaches to the security of the information systems are made by the internal staff or employee of the organization (Spears et al.... The security incident of different computing systems will have dissimilar effects and escort to different consequences, bureau, departments the organization needs to tailor the security incident handling plan according to specific operational requirements.... Information systems security is a challenge for executives and the information technology professionals (Dhillon et al....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us