Verified Document

Design Telecommunications Network Essay

¶ … Telecommunications Network In an effort to provide better care for its patients, arises the need to design a network able to support a new multi-location dental care practice. In this report, we will provide a clear set of requirements for the network solution, and then identify the information that is to be protected as well as their related security requirements. Also, we will identify the types of network components, devices and equipment that would be involved in meeting the needs of the stationary offices and all four mobile dentists, and then we will provide a network design diagram that shows an appropriate network configuration to meet the requirements. Finally, we will explain the benefits of the proposed network solution, and identify the risks and risk mitigation strategies associated with the proposed network solution.

With five dental offices currently operating, we need to design a network that will integrate databases of all 5 dental offices within the city into one database where all five offices' resources will be stored for organization wide access. Patients' data must be accessed as quickly as possible if requested as well as daily schedules. In a word, the new network must be able to provide high speed data transfer rate. Furthermore, the new design must include a remote access network that will enable mobile computing and a full organizational resource access to the four dentists that provide dental checkups to elderly patients in their homes, at the senior citizen centers, and to school children in the three inner-city elementary schools. Most importantly, the new network must protect patients' records and information.

With the network requirements outlined above, the dental offices must ensure that there are security protocols in place to protect their information assets. These assets include operational data, patients' records, and daily schedules. To accurately provide this data protection, information security procedures such...

MAN is an appropriate choice for this type of connection because it provides high speed network connection, and also all five offices are located within the same geographic region, which is the main characteristic of MAN networks. MAN also provides real-time transaction backup systems (White, 2011), a utility that is indispensable for the dental care facilities because a loss in patients' records could delay the provision of dental care to patients. On the other hand, in order to provide remote computing and a secure resource access to the four mobile dentists, we must implement a VPN connection. With this connection, a VPN server must be installed on the network so in case the mobile dentists would like to connect to the intranet, their request will be sent to the VPN server which will then process the request. VPN connection is a data network connection that uses the public internet, but provides privacy through the use of tunneling protocol (White, 2011). VPN network also provides data encryption, an indispensable asset to help protect data integrity while the data is in transit.
The first advantage of a MAN connection is it will allow all dental offices in the metro area to have one network, so one data center where all of the organization's information resources including patients' records are stored for easy organization wide access. Also, a MAN network provides a network convergence because the majority of MAN network service providers also provide Internet access to its subscribers (DAUTI, 2007). MAN also provides low error rates and high data rate throughput and gives "ability to a user to dynamically allocate more bandwidth on demand" (White, 2011). The latter benefit is very…

Sources used in this document:
References

DAUTI, B.A. (2007, April 26). METROPOLITAN AREA NETWORK AND WEB PORTAL FOR THE CITY OF GJILAN. Retrieved August 18, 2012, from UMUC Europe Web site: http://ac-support.europe.umuc.edu

Dr. Cole, E. (2007, October 26). Types of Networks. Retrieved August 18, 2012, from Sans Technology Institute Web site: http://www.sans.edu

Stines, M. (2003). Remote Access VPN - Security Concerns and Policy Enforcement. Retrieved August 18, 2012, from SANS Institute Reading Room site: http://www.sans.org

White, C.M. (2011). Introduction to Metropolitan Area Networks and Wide Area Networks. In C.M. White, Data Communications and Computer Networks (pp. 276-320). Course Technology Cengage Learning.
Cite this Document:
Copy Bibliography Citation

Related Documents

Enterprise-Wide Telecommunications Network the Illustrated
Words: 749 Length: 2 Document Type: Term Paper

This allows access to the WAN resources over the Internet. It entails secure access to HHSC resources applying encryption. This enhances the security by regulating the protocols that the workstations can access. It has regulatory access to the applications to which the employee is not authorized. (DIR Wide Area Network (WAN) Operations) Each of the TCP/IP network requires a unique IP address. An IP address is a 32-bit number

Network Security
Words: 3307 Length: 10 Document Type: Research Paper

Network Security: Past, Present and Future The work of Curtin (2007) states that a network is defined as "any set of interlinking lines resembling a net, a network of roads -- an interconnected system, a network of alliances." Quite simply a computer network is a system of computers that are interconnected. There are seven layers of communication types identified by the International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model

Network Design Network ABC Network Design a
Words: 3772 Length: 12 Document Type: Essay

Network Design Network ABC NETWORK DESIGN A Comprehensive Proposal and Design for ABC Inc. Network Requirements Network Proposal Overview Telecommunication Overview Telecommunication Proposal Network Configuration Management Plan In order to meet the needs of the customers, ABC Inc. must insure that productivity is not hindered by the growth of the company. The employees at ABC Inc. must have a robust network so that customer service is not jeopardized. The accounting firm has grown from five to fifty employees

Network Standards
Words: 2900 Length: 9 Document Type: Research Paper

Network Standards A Brief Look Since 1995 This is a research paper that focuses on network standards and protocols that involve strategies in management. Leadership strategies cannot handle the need for network standards to handle billions of users and user generated applications. Therefore management strategies are more appropriate. Furthermore the history of network standards shows layering through the OSI models follows a management approach vs. A leadership approach. In the OSI model, there

Telecommunications the Business Case FedEx
Words: 1786 Length: 6 Document Type: Research Paper

It is not known what cost FedEx will have to pay for a durable but reliable smartphone. Most such devices are not designed with longevity in mind, and FedEx normally utilizes devices with long lives. FedEx would be equipping upwards of 200,000 workers, so even negotiating a deal to pay $200 per unit would cost the company $40 million. In all likelihood, however, the cost will be much higher,

Network Design
Words: 701 Length: 3 Document Type: Research Paper

Network Verizon is a leader in the communications industry. With an unparalleled service and strong brand equity, Verizon continues to uphold its market leadership among telecommunications providers. A key aspect of the success of Verizon is its network. Its network is ultimately the source of its vast profits, strong leadership, and globally recognized brand. The company's network also provides the company with economies of scale, lowering the per-unit cost per subscriber.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now