Resource: Patton-Fuller Community Hospital Virtual Organization
Based on Patton-Fuller Community Hospital Network, prepare a 1,500 - to 2,500-word paper including the following:
- Identify network system elements (routers, switches, servers and workstations etc) in use. (10 pts)
- Identify network protocols in use within each of the seven OSI layers. (5 pts)
- Research on networks deployed by other health care organizations and recommend additional network elements and protocols that may be used to enhance current network. (5 pts) Hints and clarifications:
1 With regard to network system elements, please describe what elements are used and where. Also briefly explain why the elements are used when appropriate (e.g, “The VPN router serves as a VPN concentrator/server and provides VPN access to remote users.”).
2 For network protocols, identify which of following core protocols are in use and expand around them:
a. Layer 1 and 2: what network interfaces are involved? Example of network interfaces are Ethernet, FDDI, ATM, Frame-Relay, T1 etc.
b. Layer 3: It’s important to first determine which network protocol suite(s) is/are used in the network(example of network protocol suites are TCP/IP, Appletalk, IPX/SPX etc). The core protocol for layer 3 is then IP for TCP/IP, DDP for Appletalk, IPX for IPX/SPX. Other important protocols in this layer include various routing protocols and network address to physcial address mapping protocols (e.g, ARP in TCP/IP).
c.
Related Documents: Essay about Resource: Osi Model and Application Layer Protocols
server? Question options: stores data and software that can be accessed by client devices. is the pathway through which messages travel. in client/server computing, servers together over the network with client computers to support business applications. can only perform one function on a network. stores documents and graphics that can be accessed from a Web browser. Question 2 1 / 1 point Networks designed to connect similar computers that share data and software with each other are _________…
connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data? Upper-layer connection-oriented protocols 2. What type of cable should be used to connect to different devices? like devices? Straight through Cross-over 3. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission? Transport 4. Describe the 7 layers of…
Requirements 3 Network Security Algorithms 6 Cryptography Applications 8 E-Mail Security 11 Wireless Networking Protocols 12 Network Security Requirements The OSI (Open Systems Interconnection) Reference Model consists of seven layers and provides a conceptual framework which determines how network aware devices interact and communicate with each other, (Briscoe, 2000). Actual communications is distinguished by several network protocols, which is an established procedure and format that…
Professor Jalinous May 29, 2011 Table of Contents Networking Technology Concepts 1 Definition 1 OSI Reference Model 4 Network Standards 5 IEEE 6 References 7 U02a1 Networking Technology Concepts Definition Network architecture can be referred to as the logical and structural layout of a network. It entails transmission equipment, software and network protocols. It can apply to wired and wireless mode of transmission of data and connectivity between networked components…
point-to-point links. Recall a physical point-to-point topology connects two nodes directly. In a point-to-point WAN architecture, layer two frames are placed on the communications medium at the source and removed at the destination. This architecture allows the data link MAC protocols to be very simple since frames can only travel between the two nodes. This simplicity allows the layer two switching to be optimized and performed in hardware achieving an efficient low latency communications channel. Lastly…
Communication Protocols In the network industry, communication protocols play a vital role for masking communication a possibility. Not everyone uses the same hardware or software platforms, but all need to be able to communicate no matter the system. That is where protocols come into play. The ability to code and decode protocols are built into the computers operating system. There are hundereds of different types of protocols. One that users see everyday is Hyper Text Transfer Protocol (HTTP). The…
2 – Application 2. Explain in simple terms the I/O process. a. “Input/Output”… Data is entered into the computer through an input device such as a mouse or keyboard; given the application used the CPU will process the data into output. Level 3 – Troubleshooting 3. You typed “abcd” but the locally attached printer prints garbled text. How do you go…
University of Phoenix Material: Integrative Network Design Project. Select a Virtual Organization for the Integrative Network Design Project (INDP) Final Project assignment, due in Week Five. 3/19/12 * Learning Team Instructions Learning Team Charter Resource: Learning Team Toolkit Complete the Learning Team Charter. 3/19/12 * Individual Tele- communications Evolution Timeline Research the evolution of the telecommunications industry based on this week’s Electronic Reserve Readings. (700 to 1050 words)…
improve the time it takes a server of the computer takes in allocating file location, reading the disk itself and pulling it up for the requesting device. The physical layer of the equipment should be fairly safe in the environment and everything is physically where it should be. Now I will examine the data link and network layer of XYZ computers. The first thing I would is to assign a level of access and for all workstations on the network. The reason I would do this first is to avoid confusion…