Medical(Facility(Network(Design(Proposal(

Transcription

MedicalFacilityNetworkDesignProposalLIS4482- Management of Networks and TelecomIndia Pittman, Joaquin Coston, Lavhonte DavisDecember 8, 2011

Executive SummaryNetwork systems are interactive infrastructures comprised of several factors that enable optimalsharing of information and resources. This dynamic system of networking has becomeimperative to every aspect of human life, from business operations to health care. Networksystems and telecommunications play a vital role in the function of today’s society, shortcomingsand interruptions within the network are costly and therefore impermissible. Standardization andregulation specifications are determined by policies in order to minimize the occurrence ofdrawbacks within systems.Most faults within network systems can be attributed to disregard of conventional networksystem requirements and specifications. Network policies are instrumental in maintaininghomogeny between network systems. Effective standardization and regulation of networks isachieved through the implementation of a network policy. This policy outlines the variousprocedures related to standardizing network operations.Network policies serve as a guideline to assure that systems abide by the proper specifications toassure that the system maintains a consistent flow. Network policies address many areas of focussuch as user administration, protocol standards, internet access, storage allocation, web stationconfiguration, printing, email usage, network device placement, naming conventions,environmental issues, and power and patch policy. This promotes conventionality amongstnetworks to assure consistency and reliability in the functionality of systems.Network systems contain sensitive information related to network administrators and users. Forthat purpose, security measures are adopted to protect the user against threats of privacy invasionor corruption within the system. A major issue with maintaining security is that users are notfully knowledgeable about how to prevent possible security threats and violations. Securitypolicies are thorough documents containing effective procedures necessary to maintain systemsecurity as well as physical security. These documents brief the user with knowledge regardingsecurity matters such as user account access, password requirements, encryption use and otherissues pertaining to security. Procedures relating to security violations are also outlined in thesecurity policy. Security policies serve as a highly effective resource in defending networksagainst attacks that may harm the system.Disaster recovery policies include all information relating to disaster recovery and businesscontinuity related action. These documents are valuable because they have the potential to save asubstantial amount of time and money in disaster recovery efforts. Very critical practices, such asbackup procedures and virus management, provide users with tools necessary to prevent the lossor corruption of crucial information. Fault tolerance is also an issue that is observed by thedisaster recovery policy with the objective to maintain a dependable and functional networksystem.Hosting a reliable network infrastructure can be quite costly. However, these costs are justifiedby the caliber of resources and tools needed to establish and maintain an efficient network. Thebudget for the proposal is outlined in a spreadsheet document. This document contains a list of

expenses and finance allocations. With this budget we intend to provide optimal networkexperience at a reasonable and affordable price.

Network PoliciesUser AdministrationAll the users of the medical facility will be required to have a username or password to be able touse the network at the facility. The password will have to be 8 characters alphabetical numerical.Every user of the medical facility will have to sign into the centralized network to be able to usethe resources and to access the internet to complete task. All the activity that you do through thenetwork will be traced and monitored by the administration. So as users make sure you are beingvery responsible in what you are doing on the network. The network is here to help you be thebest workers here for the medical facility and take our company to unimaginable heights. Wetrust in you to do your best and bring great things to this company.Once again do not consider anything that is done on a computer while that is connected to thenetwork to be private. We will monitor your moves while you are on the network. If we find outyou have been doing strange things, we will give you a verbal warning. If the activity continuesit will lead to termination of your job. So most importantly as user be responsible for youractions and other while you are on the network.Protocol StandardsHTTP- Used to allow web browsers to connect to web servers.SFTP- Used to transfer files and data to and from remote locations to a back-up site.SMTP- Used to monitor email in the network.TCP/IP- Used to monitor Internet traffic.DNS- Used to resolves domain names in IP addresses.IPsec- Used to securely connect devices in the main office to the centralized data location withthe help of L2TPL2TP- Used to for encryption to securely connect to devices in the main office to the centralizeddata with the help of IPsecSNMP- Used to help check the activity and security on the network.VoIP- Used for the phone systems throughout the buildings.Internet AccessThe medical facility has allowed Internet access in the buildings to help allow users to fulfilltheir needs to complete tasks within the job. They have the capability now to connect andcommunicate with other companies and also other users within the building. We are notresponsible for any of the information that is found while on the Internet. We are leaving thatresponsibility with the users to make sure everything they are looking up on the Internet isreasonable with the company. Also to make sure it doesn’t jeopardize any of the other users inthe company that are using the Internet.In order for users to use the Internet they will have to use their user names and passwords thatthe used for the network to get on. This also will help the administration track to see whateverybody is doing while they are using the Internet. Users will also be responsible to not go tosites that will bring any harm to the networks systems. Such as pornographic sites or fake sitesthat lead you to viruses. None of this will be tolerated in the medical facility. If you are caught

using this sites it will result in losing you Internet access up to 6 months and if it happens again ifwill result in termination.We have also given the users the ability to use some of the social networks only for the use of thejob. If you are caught using it for personal use, it will result in the same violations are going tothe forbidden sites. We also ask that you not use the Internet too for your on personal use such asto check billing accounts, chat with friends etc. because it can bring security issues to ourcompany. Though if you follow these rules, be a responsible user and don’t break any of theviolations you have nothing to worry about.Storage allocationThere will be storage on each laptop and desktop for a user at the medical facility to use. Eachuser will be responsible for managing there on data storage on their computer. Each computerwill have at least 100 GB of space to use. We expect our users to be able to organize their workand not to save so much unnecessary stuff on the storage system that they do not need. Eachdepartment in the medial facility will be given enough data storage to use for their task andassignments. All users will also have to make sure they save their work on the backup locationtoo just in case something bad happens and they will have their work to get from another place.If you ever have problems with your storage you can always contact administration for help.Workstation configurationEvery workstation in the medical facility will be suitable for each user. Every laptop or desktopcomputer will be a dell product and it will be fully operational. The will come equip RAM and100 GBs of space for storage. They each will also have Windows 7 programed on the computersalong with Microsoft office 2010. Programs such as adobe reader and flash player will already beinstalled on them too. Each laptop and desktop will come with Norton security 2011 forprotection against harmful malware and viruses. Depending on which department the device isfrom, each device will be programed with software that is suitable for each department. If a typeof software is not on that laptop or desktop, please contact the administration and they willdefinitely provide you with the software that you need.PrintingThe medical facility will have printers throughout the building. There will be a printer for eachdepartment and each user will have to make sure they have their user name and password to beable to print things out. There will be a maximum of 50 pages a day for each user and we willmonitor that for each user. If a user does need to print out more than 50 pages, the will have togo to the administration to ask for permission. The reason for this is to try to save material in themedical facility. Printing will be free to each user and the will have the choice to print it in coloror in black or white. Every user is responsible for their printing and making sure they clean uptheir mess if they have left something around the printers.Email Usage Policy

All the email will be will be user through the medical facility accounts, and each user isresponsible for what they email. Emails should always be professional to whoever you send it toin the company or to another company. User should not use emails for person use because we seethis as a distraction and security reasons. Also sexual harassment will not be tolerated throughemails. This will also go for racism, gender and religion harassment. Any violation of thesethings and you will be terminated from this company. We will like to keep the cyberspaceenvironment a nice clean place for everybody to enjoy. To make sure these things go through wehave the right to monitor your emails to make sure everything is going according to policy.Remember as users you are responsible for everything you say through emails.Network Device PlacementAll the laptops and desktops tops will be connected to the medical facility network so we can beable to track them at any time. This will help us keep up with knowing where our products are atevery day and making sure that none of it gets stolen. There will be wireless access pointsthroughout the building that will help us located where our products are at all times. Once againthese products will be things such as the printers, desktops, and laptops. The technical supportdepartment will have the knowledge knowing where these devices are and also helping you too ifyou just so happen to have any problems with them.Naming ConventionsFor the laptops, desktops and printers in the medical facility they will all have names. The nameswill help us located and keep up with these products throughout the buildings. The name will bebroken down into three sections for you to identify them. The first part will be two letters thatdescribe what department it is from. After that it will be a dash in between to separate the twosections. The second section will be to describe what type of device it is such as printer, laptopetc. After that there will be another dash to separate the next two sections. Then, the third andfinal section will be a number that technical support has given to the device for it to be tracked.An example of a device name would be “IT-printer-01.” The “IT” would stand for theinformation technology department. Then “Printer” would stand for the device the name is on.Then “01” would be the number given to the device by technical support.Environmental issuesThere are some issues in the building that we would like to ask the users to help us with becausewe cannot do it all by ourselves. The first thing would be to make sure you cut the power offanything you are not using. By doing this it will have use save energy, time and money for themedical facility and it will be greatly appreciated if all users did it. Another thing we would likeour users to do it to recycle paper or anything that can be used again. We do not want to keepspending lots of money on things we can use over and over again. It would hurt us as a businessif we did and you by the possibility of getting in trouble.The last thing we will also want users to do is try to clean whatever area you in nice and clean aspossible. When you do that you are being respectful to others, yourself and most of all thecompany. If you can do these things we will greatly appreciate your help and trying to clean thisbusiness looking as best as possible.

Power and patching policyWe ask that all devices stay plugged up with you are using them, so they can help you out to thebest of your ability and the next person to the best of their ability. Keep the devices pluggedensures that they have the power to keep working and functioning properly. If you just so happento come across a device that’s unplugged or isn’t hooked up right, we ask that you please contactthe administration so they are able to fix this problem.We also ask that whenever we send you emails about patching or updating your system, that youplease do so. If you refuse to do it, it will be a violation and it could results in someconsequences of even termination. We want all our products at the best for the company and itsusers. When this happens great things start to happen for everybody and the company. We areable complete task and soar to goals that we would never even think we would reach. So againwe ask that you help your company out, by following these policies.

Security PoliciesUser Account Access PolicyAll account access contr

achieved through the implementation of a network policy. This policy outlines the various procedures related to standardizing network operations. Network policies serve as a guideline to assure that systems abide by the proper specifications to assure that the system maintains a consistent flow. Network policies address many areas of focus