This website uses cookies to ensure you have the best experience. Learn more

I.T Infrastructure Essay

1448 words - 6 pages

Running Head: Networking Project

University of Phoenix
Dominic Roberts

Patton-Fuller Community Hospital has been in business in the City of Kelsey since 1975. Patton-Fuller Community hospital structure from an IT network perspective includes logical network, administration network details, radiology, RIS data center, OR/ICU/Ward floor systems, and IT data center.
Identify how data is transmitted within the hospital and externally.
Patton-Fuller network structure for the entire hospital is 1000Base T using CAT 6 cable. Some departments are using a network structure of 1000BaseF using single mode fiber. The administrative side of the hospital is ...view middle of the document...

The layers three through one are the communication between the different devices that connected to the network. Layers seven through five deals with applications and implementing using software. Outlook/Exchange, Mac Mail, Surge Mail, is examples of software that these layers use. The previous software’s are able to perform on different platforms from UNIX to Windows. Even if the mail is being send and received on different platforms the layers help make it through without being dependent on which operating system or a particular brand of hardware being used. Layers four through one allow the data to be moved be able to go the Network Cable Plant and the Wi-Fi Networks. Both the physical layer and the data link layer are implemented through both software and hardware. Each layer of the OSI Model receives a header that is than past down to all the layers until it reaches the physical layer. In order to understand the OSI Model let it be explained as follow with the reason how Patton-Fuller is using it.
Upper layers -
7. Application- The seventh Layer is responsible for standardizing services like file transfer and/or virtual terminal.
6. Presentation- The sixth layer is responsible for making data universally understood. This makes it that no matter what platform is used that the sender and receiver of data can understand each other. It is also responsible for encrypting and decrypting data and can compress data if it is needed.
5. Session- The fifth layer is responsible for establishing, and terminating communication, between the hosts, and send information to layers above it when it is needed.

Lower layers -
4. Transport- The fourth layer is responsible for delivering the messages throughout the network. Reliable delivery of data packets, Transmission Control Protocol or TCP) and connectionless delivery of packets (Internet Protocol or IP).
3. Network- The third layer is responsible for determining how the data is to be sent from one device to another device. It also looks to find the best way to route data to be sent through, it helps the prevention of Network Congestion, or it can prevent bottle necking which in a Taken ring Network could bring the entire ring down.
2. Data link- The second layer is responsible for framing the packets for delivering over the wire. It also looks for data that may collide and will re-transmit the data if it is needed.
1. Physical- The first layer is responsible for the connection of hardware on the network to the physical media.

Identify the various protocols that are available for use, and provide a recommended standard that should be used for the hospital.
Some protocols that are available are as follows: SMTP (Simple Mail Transfer Protocol), FTP (File Transfer Protocol), IP (Internet Protocol), DHCP (Dynamic Host Configuration Protocol), Trivial File Transfer Protocol (TFTP), PPTP (Point to Point Tunneling Protocol).

SMTP- This protocol is used to send e-mail messages between the...

Other Papers Like I.T Infrastructure

Assignment 3

2906 words - 12 pages introduced in the form of the costs of setting up an I.T infrastructure to support the ERP system .An ERP system might also be difficult if not impossible to implement in a decentralised organisation with unrelated business operations (Gunasekaran 2007). ROLE AND APPLICABILITY OF ERP TO MY ORGANISATION Current situation My organisation is a higher learning institution in Zimbabwe. The institution came to be in the 1960s and has 8

Bsa/310 Kudler Loyalty Program Essay

1174 words - 5 pages program affiliates. This will ensure both the business and customer have clear understanding of what to expect when it concerns the use of sensitive personal data. Data security should have much more emphasis since sensitive information is being recorded. A secured network infrastructure should be implemented to assure hackers and other outside influences could not obtain the program’s customer information. This could be hazardous to


3025 words - 13 pages INDUSTRY RURAL DEVELOPMENT: I.T. has varied applications in it, through which the development of the rural area can be possible accurately. Government had introduced a number of programs through which the people of rural India can come forward and use the I.T. enabled services and work more systematically. Some of the programs run by the Government are:  E-Mitra:         This service was launched by the RAJASTHAN Government for the first

Securing and Protecting Information

1469 words - 6 pages with the appropriate credentials to access this network. For this reason, net business and plenty of alternative transactions need additional authentication methods. “The utilization of digital certificates issued and verified by a Certificate Authority (CA) as a part of a public key infrastructure is taken into account probably to become the quality thanks to perform authentication on the web” (D'Arcy, Hovav, & Galletta, 2009). Process includes

Mr Mhlongo, Will Use This Site for Research Purpose and Other Reasons

3943 words - 16 pages ” solutions. Improved decision-making ability. Re-use of information, models, etc.Good knowledge of IT Infrastructure and Exposure to the implementation of solutions.Basic Project Management Experience and Knowledge. Functional and technical experience in Practice Management Systems. Provide and document business processes. Thorough understanding and experience in data and application integration. Practice Management Systems, Web based systems and BI

Introduction to Business. Tesco as a Case Study

2085 words - 9 pages various customers to deliver the service or product or may be advertise a product. High streets (walk-ins) whereby the one can walk in the any Tesco branch and will get any survive or product needed for example shopping in the different Tesco outlets or branches as well. Infrastructure The infrastructure designed to meet the these delivery systems are call centers and these keep on attending to the different urgencies

Information Technology

3010 words - 13 pages Information Technology in Health Care By: Antonio Ross Southern Illinois University at Carbondale HCM-20 Health Policy, Professor Swain Abstract Health care reform has reemerged as a policy imperative. Congressional discussions regarding sizable federal investments in health information technology (IT) infrastructure have revitalized the vision of health IT as a critical component of accelerating improvements in the quality and value

It Implementation For Procomm Technology Solutions, An It Consulting Company

6632 words - 27 pages , federal governments and educational districts. The main purpose of this business is to facilitate a complete I.T. solution to Information Technology departments in major industries in the state of New Jersey, New York, Connecticut and Pennsylvania. My business would start out small with a minimum of 20 to 25 employees. If the need arises in the future, where it demanded expansion then I would hire more employees. The company name is

Omega Research Inc. – A Case Study

2969 words - 12 pages . Baseline Network Infrastructure • Omega leverages AT&T Managed Internet Services for each of its office locations. • Omega owns and manages the border routers for each of their office sites. • Offices in Reston, San Diego, and Kansas City receive full T-1 service. • Offices in Salem receive 256k F-T1 circuit service. Systems Business processes provided by AIX Environment 1. Financial 2. Reporting 3. Data Warehouse LAN

Business Proposal of Document Management & Storage Service

4814 words - 20 pages the Document Management, digital imaging, Records Storage and I.T. that has over twenty years of experience in the field. We have been instrumental in establishing Document management systems with IBM, Apple, EMC, Kodak, KonicaMinolta and Microsoft. Chart: Highlights 1.1 Mission Why should anyone buy from you? Customers buy because your marketing is better, meaning that you have put together a proposition that is more relevant to them

Ford Case Study - Supply Chain

4444 words - 18 pages Additional issued to be addressed include relationship management (improvement) between Ford and its suppliers and Ford and its dealers. Additionally, while information technology is a key aspect of “Ford 2000”, however, this technology has actually caused some of our suppliers some issues we need to go back and revisit in order to optimize the return on our investment in I.T. Finally, we have made available to our supply chain partner’s

Related Essays

Bsbrsk501 B Essay

1150 words - 5 pages infrastructure, doing regular | |backups (including offsite backups), providing I.T technical support to staff, configuring internal Internet settings and | |maintaining and updating the company’s web pages and web presence. | | | | Reports To

Bus107 Fundamentals Of E Commerce Essay

1326 words - 6 pages , religion and type of governments to overcome these types of issues. Honestly, it would be very difficult to understand other international e-commerce, henceforth it's best to hire an expert native as I've stated earlier. To gain trust and be accustomed to the culture, language, government and infrastructure is to sometimes go to that particular country and be more open of their views and form a comfort level, because to me business is not only

Internal Analysis

4747 words - 19 pages . Objectives and Strategies TIM faces the challenges and opportunities that lie ahead with better skilled personnel, stronger alliances and sound financials. TIM is dedicated to the fruition of its dream to become the best I.T. solutions company in Philippines. Seeking better means of providing sounder technologies and understanding that to be the best one can only give the best. TIM’s standards: * Expert technical skills that can only be

Hacking And Countermeasures Essay

701 words - 3 pages information such as password and user names that may grant me access to their network. 3. What applications and tools can be used to perform this initial reconnaissance and probing steps? Google is a major tool in most hacker’s initial first step. But you can use Nmap, AMAP, Scan and Para trace 4. How can social engineering be used to gather information or data about the organization’s IT infrastructure? Social Engineering is one of the