StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Healthcare Computer Network Architecture - Coursework Example

Cite this document
Summary
Name of the Author Name of the Professor Course 10 February 2012 Healthcare Computer Network Architecture Answer 1: Internet Protocol (IP) is a numeric address that configured on each computing device that wishes to communicate with other devices on a computer network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
Healthcare Computer Network Architecture
Read Text Preview

Extract of sample "Healthcare Computer Network Architecture"

of the of the 10 February Healthcare Computer Network Architecture Answer Internet Protocol (IP) is a numeric address that configured on each computing device that wishes to communicate with other devices on a computer network. Likewise, this address demonstrates the address of a specific device on the network. For example, a computer that is configured on the network will possess an IP address: 192.168.1.2. However, for establishing connectivity, subnet mask, gateway and other relevant protocols contribute for successful data transmission.

Likewise, a version 4 IP address comprises of five classes i.e. Class A, Class B, Class, C , Class D and Class E. Subnet demonstrates the class of an IP address. Moreover, the gateway defines the address via the possibility of relaying traffic to other network is possible. For instance, if a user is accessing a website, gateway will send the request from the local user network to the network of the website. Answer 2 & 3: As mentioned earlier, there are total five classes in version 4 IP address.

Details of IP classes are illustrated below (Blank 284): Class Starting IP address Last IP address Subnet Mask A 0.0.0.0 127.255.255.255 255.0.0.0 B 128.0.0.0 191.255.255.255 255.255.0.0 C 192.0.0.0 223.255.255.255 255.255.255.0 D 224.0.0.0 239.255.255.255 255.255.255.255 E 240.0.0.0 255.255.255.255 255.255.255.255 As the table defines all the classes for version 4 IP address, we can see that the class A has total 3 octets available for assigning IP addresses. It is obvious that 32 bits are available that are defined by 4 octets in an IP address.

For instance, 192.168.5.1 having a subnet mask of 255.255.255.0 has 3 octets filled and only one octet available for defining hosts. As shown in the Fig 1, IP address 140.251.183.184 with a subnet of 255.255.255.0 is a class C network. However, there is a difference in a local IP address and Global IP address. Network administrators define local IP address by breaking down global IP address in to local IP address by sub netting. Therefore, the communication is carried out by an IP address provided by an Internet Service Provider (ISP) and it can be of any class.

Answer 4: ‘Tracert’ known as trace route command is executed via command prompt for checking the delays and number of hops, time to live (TTL) for a particular request of Internet Protocol from one destination to other. Answer 5: MAC stands for Media Access Control and it controls manages the physical transmission control on the local area network (LAN). Likewise, MAC address is embedded in to an Ethernet card with a unique six bytes serial number and it operated on the data link layer of the OSI model ("MAC Layer." 1). Answer 6: Wireless access points are only used for providing access on long distances and where no routing is required.

For instance, a router provides functionality of relaying traffic from one network to another, whereas, wireless access point do not route traffic but provides a wide wireless spectrum for connectivity. Moreover, wireless router also has a functionality of connecting wired devices and may prove to be expensive as compared to a wireless access point. Answer 7, 8, & 9: T1 and T3 connections are expensive for consideration as compared to high speed cost effective Digital Subscriber Line. However, the bandwidth requirements are dependent on the amount of data that needs to be exchanged from the remote office to the head office.

SONET is an expensive connectivity supporting up to 52Mbps with redundant connectivity. If the bandwidth requirements are in reach, a robust SDSL Symmetric Digital Subscriber Line (SDSL) or ADSL connection can be considered, which can support up to 1 to 9 Mbps (ADSL) and 3.2 Mbps (SDSL). However, for a wireless or wired connection, it again depends on the requirements, as wireless connectivity will be expensive if the range of the remote office is far. Likewise, radio link connectivity can be considered for a far location, again it will be expensive.

The recommended option will be a DSL connection that will utilize Public Switched Telephone Networks (PSTN) to establish connectivity. Answer 10: Cyclic redundancy check is a technique for securing data integrity of data. CRC performs a calculation by utilizing binary representation of data and the results are kept separately from the data being checked. Likewise, existing CRC with the new CRS is verified to ensure high integrity of data ("Cyclic Redundancy Check." 130-130) Answer 11: TCP is a connection oriented protocol that ensures reliable delivery of data along with error correction.

Likewise, if a packet is found corrupted or loss, new packet is requested from the source to replace errors. Whereas, UDP is a connection less protocol that do not ensure reliable deliver and can be used in applications such as FTP, Video streaming, VoIP etc. True and False Answer 12: False Answer 13: True Answer 14: False Answer 15: False Answer 16: True Answer 17: A device that generates radio waves is called a radio transmitter or a transmitter. Answer 18: Data link layer that is identified as layer 3 of the OSI model Transport layer that is identified as layer 4 of the OSI model Answer 19: Manchester coded signaling Answer 20: 127.0.0.

1 Work Cited Blank, Andrew. TCP/IP Foundations . San Francisco, Calif.: Sybex, 2004. Print. "MAC Layer." Computer Desktop Encyclopedia (2011): 1. Print. "Cyclic Redundancy Check." Network Dictionary (2007): 130-. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Healthcare Computer Network Architecture Coursework”, n.d.)
Healthcare Computer Network Architecture Coursework. Retrieved from https://studentshare.org/information-technology/1445046-healthcare-computer-network-architecture
(Healthcare Computer Network Architecture Coursework)
Healthcare Computer Network Architecture Coursework. https://studentshare.org/information-technology/1445046-healthcare-computer-network-architecture.
“Healthcare Computer Network Architecture Coursework”, n.d. https://studentshare.org/information-technology/1445046-healthcare-computer-network-architecture.
  • Cited: 0 times

CHECK THESE SAMPLES OF Healthcare Computer Network Architecture

Virtual Private Network

The centralized architecture of VPN's providing the facility of central administration and the IT administrative staff does not need to visit the individual sites to troubleshoot the problem.... At the same time the data needs to be secure and protected from any threat or hacks so the security becomes a prime concern. A virtual private network (VPN) is a private data network which makes use of the public communication infrastructure, and at the same time maintains privacy through the use of a tunnelling protocol and security procedures....
4 Pages (1000 words) Essay

The Symantic Web: Using Web Services to join distributed, non-standard systems

In particular this study will focus on how Electronic Patient Record Systems (EPR) can be effectively shared between differing practices and hospitals within a given network of healthcare service providers.... Any EPR can have problems in terms of duplicated, disjointed or missing information as can any other similar network yet can compensate by providing the potential for more effective medical treatment.... … The healthcare community is making increased use of electronic information systems to store and share the medical records of Patients....
20 Pages (5000 words) Essay

Network Architectures and Operating System Implications within Well People NHS Trust

This paper "network Architectures and Operating System Implications within Well People NHS Trust" focuses on the fact that the authors are going to implement a digital collaboration system for the Well People NHS Trust.... nbsp;… I have analyzed the different networking options and selected the MAN (Metropolitan Area network) Wireless network.... This network will be connected to the network and runs the database, website and communication system of the Well People NHS Trust....
7 Pages (1750 words) Essay

Smart classroom

Consequentially, this kind of architecture provides both the teachers and the students with an enhanced experience.... As it is the most convenient and accessible type of architecture, we could also advocate for its introduction in all types of classrooms.... Scattered Classroom architecture In this kind of architectural consideration, students belong to diverse geographical areas and are unconnected.... If we were to compare the single and the scattered architecture, we could easily note, the scattered classroom setting facilitates students to learn from a distance without the requirement of a physical presence in the classroom....
1 Pages (250 words) Essay

Internet of Things - Features, Challenges, and Weaknesses

It was found that, in the distributed form of architecture in IoT, attackers could hijack unsecured network devices, converting them into bots to attack third parties.... The perceptual layer in distributed IoT architecture was also found to be vulnerable to node capture attacks, including physical capture, brute force attack, DDoS attacks, and node privacy leaks.... To meet this challenge, it is expected that sensor network and RFID technologies will become increasingly integral to the human environment, in which communication and information systems will be invisibly embedded....
24 Pages (6000 words) Research Paper

Enterprise Information Architecture

The focus of this paper is on Enterprise architecture is a comprehensive compilation of an organization's operational frameworks, its design, functionality, interrelation, and applications....  … It is evidently clear from the discussion that enterprise architecture as an art because it involves re-invention of systems, re-designing of operations and restructuring operations.... The relative maturity intricately affects my architecture and deliverables as it determines how well the objectives of the enterprise architecture are achieved....
6 Pages (1500 words) Assignment

Context-Aware Sensor Networks for Smart Environments

Context-awareness in sensing is an important part of the sensor network design because it helps a lot in the achievement of the goal of pervasive monitoring.... Three major approaches exist for deducing the context in a sensor network.... This type of sensor network is created to collect information form the places of their deployment where their processing is being done, decisions are made and actions taken on the physical environment.... Context-aware computing in such a case explains the situation of a mobile or wearable computer and its awareness about the state and surroundings of the user and changing its behavior in consideration of this information....
22 Pages (5500 words) Essay

System Security and Rise of Internet due to Advancement of Information Technology

1) claimed that IoT is classified into three significant layers consisting of perception, network, and application layers as shown in the IoT architecture in figure 1 below.... On the other hand, the network layer also called the wireless sensor, is in the middle of the architecture and is responsible for processing the data, broadcasting, polymerization, and assortment (Kumar & Patel 2014, p.... The application layer is the topmost layer of the architecture and provides the overhaul of the two layers....
7 Pages (1750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us