StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Requirements for Dental Office Network Design - Case Study Example

Cite this document
Summary
The paper "Requirements for Dental Office Network Design" tells that considering that dentists are mobile and involved in offering services in different locations, the network solution will contain better communication equipment in order to make the provision of services efficient…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Requirements for Dental Office Network Design
Read Text Preview

Extract of sample "Requirements for Dental Office Network Design"

? Dental office network design Analyze the given case and provide a clear set of requirements for the network solution Operation of a single dental office does not require a lot of attention in terms of network solutions as compared to several offices. The integration of a single office with other dental practices has indicated a need for a better network solution to manage operations. The network solution will require equipments responsible for passage of information between the dentist and the patients (Stair & Reynolds, 2010). Considering that the dentists are mobile and involved in offering services in different locations, the network solution will contain better communication equipment in order to make provision of services efficient. The network should contain proper connection of persons from different five offices situated in different locations. There should be a link between the receptionists in all offices such that they communicate and respond to calls from all areas (White, 2012). The network should be able to allow access of information by all dentists offering services to patients regardless of their location. This means that the network will contain several computers linked to a server that will enable access of information or data for patients. The design of the network solution will require careful attention in order to develop effective computer systems for fostering operations by dentists in different locations (Plant & Murrell, 2007). The network should have proper systems of communications, for example, telephone and internet linked in a systematic manner. This will allow proper communication between the dentists, their assistants and receptionists. The network solution will contain an installation of a VPN server linked to computers from different offices. The network shall contain Metropolitan Area Network components integrated in manner that it supports the Local area Network (Stair & Reynolds, 2010). The MAN network from a central point, will distribute the internet connection through a system of cables to a backbone router, linked with application servers, file servers, email servers and web servers. The rooter will be connected to a room with equipments that will transform the MAN network into LAN received by computers from the five offices (Stair & Reynolds, 2010). Identify the information that is to be protected and the related security requirements Although the network is to allow flow and access of information between the five offices and other locations that the dentists will perform their services, there must be protection of information from patients (White, 2012). The design of the network solution will ensure that there is a restriction of information access to individuals. This will ensure confidentiality of patient’s information. Protection of information is a requirement of Health Insurance and Accountability Act (HPAA). The organization requires the formation of appropriate national standards for electronic healthcare operations (Stair & Reynolds, 2010). The design of the network will allow information access for authorized persons. For example, there will be security measures, for example, use of passwords and security codes to ensure access by required persons. This will ensure information for patients is not accessed by unauthorized individuals. The information to be protected includes electronic and that contained in the papers. In order to ensure safeguard of information, the network requires administrative, technical and physical protection (Plant & Murrell, 2007). Maintenance of security will be possible through implementation of documented security controls. Administrative protocols will have to indicate persons who will have access to protected data. The protocol will consider aspects of data access alteration and termination. Plans should exist for the purpose of tackling emergencies emanating from the network (White, 2012). In order to adhere to the rules of HPAA, the administration will ensure performance of audits to measure the level of compliance with policies. The network solution requires appropriate physical controls to prevent access of information by undesired persons. Removal of various hardware and software must be protected through proper monitoring and restrictions to access (Stair & Reynolds, 2010). There should be adequate security protocols for the purpose of maintaining records and visitor movements. Technical requirements for ensuring security of information include control of computer use. Use of authentication systems is suitable for this purpose (White, 2012). Identify the types of network(s), components, devices and equipment that would be involved in meeting the needs of the stationary offices and the mobile dentists The metropolitan Area Network (MAN) will satisfy the necessity of the five offices by offering an interconnection between them (White, 2012). The use of this network is suitable because of the physical location of the offices. The network is efficient due to its speed and its utilization in offices with the same geographical location. Metropolitan Network can offer sufficient transaction recovery systems. In order to interconnect the mobile dentists with others and the five offices, a remote computing device will be necessary (Stair & Reynolds, 2010). A virtual private network work (VPN) will be suitable for this purpose. Therefore, VPN server installation for the purpose of allowing the dentists connection to the intranet will be fundamental. VPN operates in a unique manner, providing privacy via the tunneling protocol. Although it utilizes public internet, VPN offers privacy through the option of data encryption, which allows data protection while in motion. Provide a network design diagram that clearly shows an appropriate network configuration to meet the requirements, with components properly labeled (Plant & Murrell, 2007) Office Explain the benefits of the proposed network solution The proposed network solution is cost effective because execution of Virtual private Network (VPN) is not expensive. The use of VPN becomes less expensive because the provider of internet service offers most of the mandatory hardware. VPN is beneficial because it allows encryption of data leading to a secure connection (Plant & Murrell, 2007). The encryption provided by VPN is not easy to break through hacking, a condition which is beneficial for ensuring safety of patient information. Metropolitan Area Network (MAN) is beneficial because it allows utilization of a central point (data center) offering efficient access of patient information by others in different locations. The efficiency of MAN is evident due to the networks ability to allow Bandwidth expansions. This offers a room for adjusting the size and strength of the network (Stair & Reynolds, 2010). Identify the risks and risk mitigation strategies associated with the proposed network solution The proposed networks have limitations just like any other network such as WAN. Provision of internet by ISPs poses threats to the network because there can be an attack by worms or viruses rendering the system inefficient (Plant & Murrell, 2007). The use of VPN provides risks of decryption of data via hacking thus exposing confidential information. VPN is susceptible to attack because most computers lack adequate features to make connections secure. Advanced hackers can easily crack passwords hence rejection of access to the service. Mitigation of risk is only possible via the use of a fire wall which offers proper protection to the network from outside internet users. Formation of a security protocol for the purpose of ensuring safety of the network will aid avoidance of risks involved with the network (Stair & Reynolds, 2010). Computers should have efficient software for preventing attack of the system by viruses. The system should exhibit proper authentication for the purpose of limiting data access (White, 2012) . References Stair, R. M., & Reynolds, G. W. (2010). Principles of information systems: A managerial approach. Australia: Course Technology Cengage Learning. Plant, R. T., & Murrell, S. (2007). An executive's guide to information technology: Principles, business models, and terminology. Cambridge [England: Cambridge University Press. White, C. M. (2012). Data communications and computer networks: A business user's approach. Boston, MA: Course Technology. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Dental office network design Case Study Example | Topics and Well Written Essays - 1000 words”, n.d.)
Dental office network design Case Study Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1458695-dental-office-network-design
(Dental Office Network Design Case Study Example | Topics and Well Written Essays - 1000 Words)
Dental Office Network Design Case Study Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1458695-dental-office-network-design.
“Dental Office Network Design Case Study Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1458695-dental-office-network-design.
  • Cited: 0 times

CHECK THESE SAMPLES OF Requirements for Dental Office Network Design

IIS Networking Infrastructure Design

The corporation does not have consolidated network infrastructure due to gradual business expansion and most of the locations have heterogeneous network provisions.... Networks have recently got enormous stake in organizational success, rather more accurately we can say, “Organizations have become highly dependent of their network infrastructure.... The business operations of IIS are presently supported by loosely integrated heterogeneous network infrastructure....
11 Pages (2750 words) Essay

Network Technology Specification

4 Pages (1000 words) Essay

Mobile computing

High Portability and Computation One of the essential requirements for mobile computing is the need that the devices used in the environment are light weight and small enough to ensure portability (Forman & Zahorjan, 1994).... the users need not be connected to fixed network positions in order to acquire or communicate information.... Whenever the device is required to have an Internet access, the mobile computing device must have at least a built-in wireless network adapter, also called as WiFi card for accessing the Internet....
6 Pages (1500 words) Research Paper

Security Requirement Analysis - New Smile Dentists

We are required to design a personal area and local area networks e.... e should also use the metropolitan area network to design an interconnection for all the offices.... This telecommunication network should enable the dentists to work within the offices and also from their laptops while at the patients' home.... The designed network should meet HIPAA requirements by maintaining high degree confidentiality on the patient's details (Claise and Wolter 2007)....
3 Pages (750 words) Research Paper

Dental Office Network Systems

The author of this paper "dental office network Systems" will examine network solutions relevant to the dental practice entity provided in the case study, highlighting the requirements, network solutions, and risks associated with the proposed network solution.... Business entities continue to encounter the problem of finding the right network solution to cater to several business locations, whether stationary or mobile.... This is because the bandwidth provided by Gigabit Ethernet has the capacity to convey high data quantities through one network at a fast rate....
6 Pages (1500 words) Case Study

Dental Office Network Systems

dental office network Systems Name Institution dental office network Systems A robust and effective network is essential infrastructure that business organizations require to succeed in running their activities.... network design Diagram The network diagram for the proposed netw... In the scenario, there is no doubt that the new organizations require an elaborate and well-planned network that will release the potential of the employers....
3 Pages (750 words) Case Study

Computer Network Principles

The network design with centralized administration is called a client/server architecture.... The second stride includes the network design.... The design will identify, floor connections, office connections, servers, workstations, printers, scanners, and cable types.... The paper "Computer network Principles" highlights that access points are seven in total.... The school of computing needs a network that will cope with future trends and technologies....
7 Pages (1750 words) Essay

Integrated Software and Hardware Trading

aking into consideration the above critical factors, the Integrated Software and Hardware Trading (ISHT) network design proposal has been developed.... The design of the network as elaborated in this report has been subject to providing the optimum network connections to all Integrated Software and Hardware Trading (ISHT)'s branches and mobile workers within and on the internet with all the constraints of costs, connection capacity, and speeds, network media, hardware and addressing space....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us