Free Essay

Hospital Lan Initial Evaluation

In:

Submitted By fuzzy
Words 935
Pages 4
Hospital LAN Initial Evaluation

NIT 362

Explain the network’s fundamental characteristics and components.
The Hospital’s Local Area Network (LAN) consists of two distinct network segments: Clinical and Admnistrative networks and are connected via bridge. The Administrative uses an ethernet backbone that is 1000BaseT using CAT 6 cable while the backbone for branches from each department run on 1000BaseF using single-mode fiber. Each clinical area is connected via a bus architecture to the main 1000BaseF backbone (Apollo, 2013).
The administrative network’s Executive Management has three different types of workstations and two different types printers all networked on the 1000BaseT Ethernet using a bus architecture. The workstations are for Executive Management, Senior Management in HR, Operations and Finance, and Data entry in HR, Operations and Finance. Workstations for Exeuctive management and Senior Management are iMACs while workstations for data entry are Hewlett-Packard thin clients. The printers are the Hewlett-Packard Model 4350 (black and white laser printers) and Hewlett-Packard Model 4200pht (color laser printsers) (Apollo, 2013).
On the clinical side of the network, Apple Mac Pros are used for modality viewing stations, which are each connected to their own DICON digital to film printers (Kodak model 6800) are used in Radiology. The emergency room has a MAC PRO workstation connected to a portable X-Ray machine and each Emergency Room bay has an iMAC workstation. The Lab uses Apple iMACs and has one Hewlett-Packard Model 4700pht color laser printer while the Pharmacy has a similar setup using iMACs for workstations, but connected to Hewlett-Packard Model 4350 black and white printers (Apollo, 2013).
Operating Rooms use Apple MAC PRO’s for RIS imaging with iMAC workstations. ICU is the only place utilizing Wireless Access Points, which are 1250 Series Cisco routers and each room is connected to the network through a 24 port Fiber Optic Hub. The nurses stations are iMACs and are individually connected to their own Hewlett-Packard Model 4350 printer (Apollo, 2013).
The Data Center has Apple Cluster Servers, connected workstations and two shared printers. The Servers are connected to disk storage for data backup using 4 gigabit fiber and a InfraStruXure model ISXT280HD8R power supply ensures uninterrupted power in the event of an emergency.
The IT Data Center uses an IBM Series Z9EC HIS system computer and IBM DB2 database, It is connected to backup storage and Backup power via the same methodology as the Data Center Apple Cluster Servers. The Windows Exchange Server utilizes RAID 1 data storage and is running Windows Server 2003 Enterprise. The Internet Server is an IBM System x3250 with RAID 1 storage and connects to the internet through a Model 7609 Cisco Router. Data center workstations and a Remote Access Server (RAS) is connected to the Internet through a Cisco ASA 5510 VPN router, all connected to the 1000BaseT CAT6 line. This line connects to the 1000BaseF fiber network containing clinical departments via a network bridge (Apollo, 2013).
Evaluate the current network topology and applicable Standards
Using a Bus topology requires “daisy chaining” nodes sequentially along the transmission medium—in this case 1000BaseT over copper cable and 1000BaseF over optical. For 1000BaseT over copper cable, IEEE 802.3z standards apply while for 1000BaseF over optical 802.3ab standards apply (Golenlewski, 2007). The bus topology utilized in the hospital network is one of the easiest and most cost efficient to install, but it suffers from having to ensure lines are terminated, using terminators (Golenlewski, 2007). It also suffers from high rates of collisions (when two packets collide on the network backbone and disrupt transmission of both. The reason for this is that every packet is sent to all systems along the line and is rejected by each node until it reaches the appropriate destination. This not only causes higher collision rates (when packets “collide” in transit on the network), but uses bandwidth that could be better used elsewhere. Segmenting each clinic into their own separate domains and changing the hubs in ICU using bridges/switches will help reduce collisions and will increase performance of the network. A router or firewall would also be helpful for increased security between the Administrative and Clinical segments, and the use of a firewall between the ICU and the other parts of the network would help to ensure security of patient information from being seen by unwanted eyes. This would help to put the clinic back into compliance with HIPAA standards ("Health information privacy," 2014) because as it stands the network is vulnerable to attack and the wireless access point in ICU is one of the central points of failure. As for the bridge in between the two networks, it could easily be replaced by a router and/or firewall to increase security and each clinic could be divided into domains by connecting their end devices to a switch to segment individual domains and reduce bandwidth requirements by directing to segments rather than the entire network. The firewalls can protect the network through packet filtering (Golenlewski, 2007), protecting ports and by containing tables of trusted entities on the network along with their “trusted states” to assess access levels warranted. All these devices fall under the layers 1 and 2 of the ISO model and therefore are also governed by those standards on a broader level.

References:
Apollo Group. (2013, March 10). Information technology network diagrams. Retrieved from https://ecampus.phoenix.edu/secure/aapd/CIST/VOP/Healthcare/PFCH/it.asp?topview
Golenlewski, L. 2007. Telecommunications Essentials: The Complete Global Source, 2nd Ed. Boston, MA: Pearson Education
Health information privacy. (2014, March 10). Retrieved from http://www.hhs.gov/ocr/privacy/

Similar Documents

Premium Essay

Healthy Body Wellness Center Office of Grants Giveaway Small Hospital Grants Tracking System

...HEALTHY BODY WELLNESS CENTER, OFFICE OF GRANTS GIVEAWAY HEALTHY BODY WELLNESS CENTER OFFICE OF GRANTS GIVEAWAY SMALL HOSPITAL GRANTS TRACKING SYSTEM INITIAL RISK ASSESSMENT PREPARED BY: WE TEST EVERYTHING LLC Jerry L. Davis, CISSP, Sr. Analyst EXECUTIVE SUMMARY .......................................................................................................... 4 1. INTRODUCTION..................................................................................................................... 7 Background ............................................................................................................................................................... 7 Purpose .....................................................................................................................................................................7 Scope ........................................................................................................................................................................7 Report Organization..................................................................................................................................................8 2. RISK ASSESSMENT APPROACH ........................................................................................ 9 2.1 2.2 Step 1: Define System Boundary ....................................................................................................................9 Step 2: Gather Information...

Words: 10420 - Pages: 42

Premium Essay

Wgu Fyt2 Task3

...HEALTHY BODY WELLNESS CENTER, OFFICE OF GRANTS GIVEAWAY HEALTHY BODY WELLNESS CENTER OFFICE OF GRANTS GIVEAWAY SMALL HOSPITAL GRANTS TRACKING SYSTEM INITIAL RISK ASSESSMENT PREPARED BY: WE TEST EVERYTHING LLC Jerry L. Davis, CISSP, Sr. Analyst EXECUTIVE SUMMARY .......................................................................................................... 4 1. INTRODUCTION..................................................................................................................... 7 Background ............................................................................................................................................................... 7 Purpose .....................................................................................................................................................................7 Scope ........................................................................................................................................................................7 Report Organization..................................................................................................................................................8 2. RISK ASSESSMENT APPROACH ........................................................................................ 9 2.1 Step 1: Define System Boundary ....................................................................................................................9 2.2 Step 2: Gather Information...

Words: 10420 - Pages: 42

Premium Essay

Healthy Body Wellness Center

...HEALTHY BODY WELLNESS CENTER, OFFICE OF GRANTS GIVEAWAY HEALTHY BODY WELLNESS CENTER OFFICE OF GRANTS GIVEAWAY SMALL HOSPITAL GRANTS TRACKING SYSTEM INITIAL RISK ASSESSMENT PREPARED BY: WE TEST EVERYTHING LLC Jerry L. Davis, CISSP, Sr. Analyst EXECUTIVE SUMMARY .......................................................................................................... 4 1. INTRODUCTION..................................................................................................................... 7 Background ............................................................................................................................................................... 7 Purpose .....................................................................................................................................................................7 Scope ........................................................................................................................................................................7 Report Organization..................................................................................................................................................8 2. RISK ASSESSMENT APPROACH ........................................................................................ 9 2.1 Step 1: Define System Boundary ....................................................................................................................9 2.2 Step 2: Gather Information...

Words: 10420 - Pages: 42

Premium Essay

Network Managmenet Guide

...7 Diagramming the Network 8 At the Hospital Level 8 At the Main Network Center (MNC) 9 Remote Personnel Access 10 Authentication 10 Hospital Level Diagram 11 MNC Diagram 12 Network Models 13 OSI Model 13 Physical Layer 14 Data Link Layer 15 Network Layer 16 Transport Layer 17 Session Layer 17 Presentation Layer 18 Application Layer 18 FCAPS 19 Fault Management 19 Configuration Level 19 Accounting Level 20 Performance Management 20 Security Management 20 Protocols and Agents 22 Optical Transport Network (OTN) 22 IEEE 802.11AC Wi-Fi 22 Spanning Tree Protocol (STP) 23 Integrated Services Digital Network (ISDN) 23 TCP/IP 24 Remote Authentication Dial-In User Service (RADIUS) 24 Post Office Protocol 3 (POP3) 25 Simple Network Management Protocol (SNMP) 26 Network Security 27 Confidential & Sensitive Data 27 Remote Access Use and Authorizations 29 Network Access and Restrictions 30 Network Management 32 Hardware and Software Management 32 Network Metrics – Recording, Use and SLAs 33 Existing Network Issue Resolutions 34 References 35 Identifying the network Overview C.H.I.N(California Health Information Network) is a collaboration of 24 hospitals that are self-sufficient and do not belong to an existing health network. These hospitals are broken into different districts with those being a northern, central and southern district. These individual hospitals are of different size and do not have any...

Words: 11726 - Pages: 47

Free Essay

ÇAlmanıN SıRları

...User Guide Contents Chapter 1. Getting Started 4 7 22 25 30 Before You Start Safety Precautions Proper Posture During Computer Use Overview Turning the Computer On and Off Chapter 2. Using the Computer 33 36 40 42 45 48 49 50 53 56 65 Chapter 1 Getting Started Keyboard Touchpad External-type CD drive (ODD, To be purchased) Multi Card Slot (Optional) Connecting an External Display Device Connecting an External Digital Device Adjusting the Volume Wired Network Wireless Network (Optional) Using the TPM Security Device (Optional) Slim Security Slot Chapter 3. Settings and Upgrade 67 68 69 71 74 75 Chapter 4. Backup/Restore 80 LCD Brightness Control Easy Settings (Optional) BIOS Setup Setting a Boot Password Changing the Boot Priority Battery Samsung Recovery Solution (Optional) Chapter 5. Appendix 92 93 95 97 110 111 112 114 Q&A Important Safety Information Replacement Parts and Accessories Regulatory Compliance Statements WEEE Symbol Information Samsung Packaging Take-Back Program Product Specifications Glossary 2 Chapter 1. Getting Started Before You Start 4 Safety Precautions 7 Proper Posture During Computer Use 22 Overview 25 Turning the Computer On and Off 30 Before You Start Before reading the User Guide, first check the following information. •• Optional items, some devices and software...

Words: 23426 - Pages: 94

Premium Essay

Strategy and Positiong Paper

...available application with the capability to integrate with an organization’s current EHR databases. What follows details the organization, specific market research, product overview and details, a marketing strategy, and a forecasted budget. As part of this process Hill-Rom conducted a comprehensive SWOT analysis and used the analysis in the further development of its marketing plan. Hill-Rom developed its marketing plan by examining product life cycle, positioning and differentiation, and public relations issues. Hill-Rom also developed strategies for pricing, placement, and promotion. Organizational Overview Hill-Rom is a company created during the Great Depression when the founder saw an opportunity to market wooden hospital furniture to local hospitals in Indiana. The company rapidly expanded from there, creating innovative new products in response to the needs of the nurses and patients company representatives came into contact with every day (Hill-Rom, n.d.). The company’s large array of products are centered on a single company mission, to “make a positive difference in the lives of patients and those who care for them” (Hill-Rom, About Hill-Rom, 2010, para. 6). Today the company produces and markets a wide range of medical products. Hill-Rom controls a large share of the market in the United States and has a presence in many countries around the world (Hill-Rom, Hill-Rom History, 2010). The company is split into five basic segments: 1) capital beds,...

Words: 6612 - Pages: 27

Premium Essay

Tech

...Overview, Purpose, Scope……………………..4-5 Training………………………………………………….5-6 Procedure………………………………………………….6 Policy……………….………………………………….….6-9 Policy 1: Information Systems Policy..…..10-13 Policy 2: Security of Laptop…………………..14-16 Policy 3: Clean Desk policy…….……………..17-18 Policy 4: Workstation Policy………………………19 Policy 6: Email Policy………………………..….20-21 Policy 7: Personnel policy………………….…22-23 Policy 9: Data Breach Policy………………...24-27 Policy 10: Software policy………………………29-31 Policy 11: Data and information classification……32 Policy 12: Internal Treats…………………………………….33 Policy 13: Policies and Procedures for Electronic Protected Health Information (ePHI) and Personally Identifiable Information (PII)...34-35 Policy 14: Wireless LAN Security Policy……………………..36 IS security Awareness policy…………………………………..37-38 Conclusion……………………………………………………………………39 References……………………………………………………………………40 Overview: DSA contractors has been awarded a contract with the Department of Defense. Our next task is to revamp the companies’ policy to ensure compliance with DOD policy. All employees have to be retrained on new policy to ensure that DSA medicate violations. The attitudes and atmosphere of change will also be needed to ensure compliance with DOD standards. Training sessions is scheduled for all employees and a policy handbook will be given to the each employee as references at the end of training. The security officer and his staff or human resources can be contacted for further...

Words: 9781 - Pages: 40

Premium Essay

Rapid

...QI uality mprovement in FOCUS Your Rapid-Cycle Improvement Guide to Achieving Results Quality Improvement in Focus Rapid-Cycle Improvement Getting Started Table of Contents Introduction........................................................................................................................... page 3 . Getting Started....................................................................................................................... page 5 Find a Process to Improve...................................................................................................... page 7 Organize to Improve the Process. .......................................................................................... page 8 . Clarify Current Knowledge of the Process............................................................................ page 11 Understand Sources of Process Variation............................................................................. page 13 Select the Process Improvement.......................................................................................... page 15 Appendix Worksheet A: Identifying Areas for Improvement. .............................................................. page 16 . Worksheet B: Developing a Team Worksheet...................................................................... page 17 Worksheet C: Team Meeting Notes....................................................

Words: 9192 - Pages: 37

Premium Essay

Managing Information Technology (7th Edition)

...CONTENTS: CASE STUDIES CASE STUDY 1 Midsouth Chamber of Commerce (A): The Role of the Operating Manager in Information Systems CASE STUDY I-1 IMT Custom Machine Company, Inc.: Selection of an Information Technology Platform CASE STUDY I-2 VoIP2.biz, Inc.: Deciding on the Next Steps for a VoIP Supplier CASE STUDY I-3 The VoIP Adoption at Butler University CASE STUDY I-4 Supporting Mobile Health Clinics: The Children’s Health Fund of New York City CASE STUDY I-5 Data Governance at InsuraCorp CASE STUDY I-6 H.H. Gregg’s Appliances, Inc.: Deciding on a New Information Technology Platform CASE STUDY I-7 Midsouth Chamber of Commerce (B): Cleaning Up an Information Systems Debacle CASE STUDY II-1 Vendor-Managed Inventory at NIBCO CASE STUDY II-2 Real-Time Business Intelligence at Continental Airlines CASE STUDY II-3 Norfolk Southern Railway: The Business Intelligence Journey CASE STUDY II-4 Mining Data to Increase State Tax Revenues in California CASE STUDY II-5 The Cliptomania™ Web Store: An E-Tailing Start-up Survival Story CASE STUDY II-6 Rock Island Chocolate Company, Inc.: Building a Social Networking Strategy CASE STUDY III-1 Managing a Systems Development Project at Consumer and Industrial Products, Inc. CASE STUDY III-2 A Make-or-Buy Decision at Baxter Manufacturing Company CASE STUDY III-3 ERP Purchase Decision at Benton Manufacturing Company, Inc. CASE STUDY III-4 ...

Words: 239887 - Pages: 960

Premium Essay

Hospital Capstone Charter & Scope

...Catherine Specialty Hospital Designing the Future of IP-based Healthcare Data Networks _________________ Project Charter Document with Scope Table of Contents A. General Project Information Page 3. B. Project Objectives -Project Mission Statement -Business Case -Problem Statement -Goal Statement -Definition of Terms Target Project Goals Page 4. Acceptance to Terms of Deliverables Key Project Directives Page 5. C. Project Assumptions Page 6. Telecommunication Location Specification Page 8. Telecommunication Room Specifications Telecommunication Power Requirements Additional Network Requirements Page 9. Project Deliverables Page 12. D. Project Scope Page 14. ScopeAgenda Fulfilling IP Convergence Requirements Network Verification Requirements Page 16. Work Area Designations Infectious Control Requirements Page 17. Cable Run Specifications Page 18. Scope Exclusions Page 20. E. Project Milestones Page 21. F. Impact Statement Page 22. G. Roles & Responsibilities Page 23. H. Resources Page 24. I. Project Risks Page 25. J. Success Measurements Page 26. K. Project Participant Signatures Page 27. A. - General Information Project Title: | St. Catherine Specialty Hospital - Network and Data Infrastructure | Brief Project Description: | New hospital with specialty...

Words: 8359 - Pages: 34

Premium Essay

Impotent Music

...INFORMATION RESOURCE GUIDE Computer, Internet and Network Systems Security An Introduction to Security i Security Manual Compiled By: S.K.PARMAR, Cst N.Cowichan Duncan RCMP Det 6060 Canada Ave., Duncan, BC 250-748-5522 sunny@seaside.net This publication is for informational purposes only. In no way should this publication by interpreted as offering legal or accounting advice. If legal or other professional advice is needed it is encouraged that you seek it from the appropriate source. All product & company names mentioned in this manual are the [registered] trademarks of their respective owners. The mention of a product or company does not in itself constitute an endorsement. The articles, documents, publications, presentations, and white papers referenced and used to compile this manual are copyright protected by the original authors. Please give credit where it is due and obtain permission to use these. All material contained has been used with permission from the original author(s) or representing agent/organization. ii T eofContent abl 1.0 INTRODUCTION........................................................................................................................................................... 2 1.1 BASIC INTERNET TECHNICAL DETAILS ........................................................................................................................ 2 1.1.1 TCP/IP : Transmission Control Protocol/Internet Protocol .........................................

Words: 134858 - Pages: 540

Premium Essay

Scientific Prose

...|5. The notion of a term.Its |6 newspaper st. var-s & pecul-s, |7 the style of official documents |8. publicist style. | |characteristics and st. |distinction from pub-c st. |it is the most conservative. It |(oratory, speeches, essays, articles)| |f-s.Scientific prose. |includes informative materials: |preserves cast-iron forms of |the style is a perfect ex. Of | |T. are w-ds denoting various |news in brief, headlines, ads, |structuring& uses syntactical |historical changeability of stylistic| |scientifical & techn. Objects, |additional articles. But not |constr-s words known as archaic & |differentiation of discourses. In | |phenomena & processes. They are |everything published in the paper |not observed any more else. |Greece it was practiced in oral form | |found in techn. Texts where they |can be included in N.S. we mean |Addressing documents and official |which was named P. in accordance with| |are indespensible means of |publicist essays, feature |letters, signing them, expressing the|the name of its corresponding genre. | |expressing ideas. They directly |articles, scient. Reviews are not |reasons and considerations leading to|PS is famouse for its explicit | |refer to the o-t they mean. They |N.S. to attract the readers |the subject of the doc-t – all this |pragmatic function of persuasion | |are...

Words: 12865 - Pages: 52

Premium Essay

Ethical Hacking

...Chapter-1 1.0 Introduction With the tremendous advancement of Internet, different aspects of it are achieving the highest peak of growth. An example of it is e-commerce. More and more computers get connected to the Internet, wireless devices and networks are booming and sooner or later, nearly every electronic device may have its own IP address. The complexity of networks is increasing, the software on devices gets more sophisticated and user friendly – interacting with other devices and people are a main issues. At the same time, the complexity of the involved software grows, life cycles are getting shorter and maintaining high quality is difficult. Most users want (or need) to have access to information from all over the world around the clock. Highly interconnected devices which have access to the global network are the consequence. As a result, privacy and security concerns are getting more important. In a word, information is money. There is a serious need to limit access to personal or confidential information – access controls are needed. Unfortunately most software is not bug free due to their complexity or carelessness of their inventors. Some bugs may have a serious impact on the access controls in place or may even open up some unintended backdoors. Security therefore is a hot topic and quite some effort is spent in securing services, systems and networks. On the internet, there is a silent war going on between the good and the bad guys – between the ones...

Words: 8365 - Pages: 34

Free Essay

Sir Rahms

...BELLO UNIVERSITY, ZARIA. A PROPOSAL FOR THE REVIEW OF VETERINARY EDUCATION AT THE AHMADU BELLO UNIVERSITY TO FACILITATE LINKAGES WITH THE KANSAS AND IOWA STATE UNIVERSITIES IN THE UNITED STATES OF AMERICA HASSAN, Adamu Zoaka MARCH 2011 1.0 INTRODUCTION When Ahmadu Bello University (ABU) was established in 1962, it was decided to give particular attention to Agriculture and Veterinary Medicine. Therefore, in 1964, the Faculty of Veterinary Medicine was established at ABU following the signing of an agreement between the government of the Federal Republic of Nigeria and the United States Agency for International Development (USAID) and the Kansas State University (KSU). According to this agreement, KSU/USAID was to provide initial staff and equipment to the new Faculty to enable it develop the following: (a) a well-equipped Veterinary School to train and supply Veterinarians for Nigeria and the rest of West African countries; (b) a postgraduate training programme in Veterinary Medicine; (c) a research programme to improve Animal Health, production and Public Health in Nigerian; (d) train Nigerians to staff and assume major roles in the Faculty of Veterinary Medicine as soon as possible; and; (e) advise on facilities and programme for future development and expansion of the Faculty. Professor G.K.J.L. Underberg (Kansas State University) arrived on September 15, 1964 as the first Dean of the Faculty of Veterinary Medicine at which time there were...

Words: 6401 - Pages: 26

Free Essay

Study

...L1 Contracts /'kɔntrækt/ N. hợp đồng, giao kèo, khế ước, giấy ký kết .......... 3 L2 Marketing (thị trường, nơi tiêu thụ; khách hàng)................................. 3 L3 Warranties /wɔrənti/ ........................................................................ 4 L4 Business planning ............................................................................ 5 L5 Conferences /'kɔnfərəns/ hội nghị ...................................................... 5 L6 computers ....................................................................................... 6 L7 Office Technology ............................................................................. 6 L8 Office Procedures .............................................................................. 7 L9 Electronics (điện tử) .......................................................................... 7 L10 Correspondence (quan hệ thư từ, sự phù hợp) .................................... 8 L11 Job Advertising and Recruiting .......................................................... 8 L12 Applying and Interviewing ............................................................... 9 L13 Hiring and Training .......................................................................... 9 L14 Salaries and benefits .................................................................... 10 L15 Promotions, Pensions and Awards ................................................. 10 L16 Shopping .....................................................

Words: 9114 - Pages: 37