I Need 100 Original Not Copy Deliverable Length 8 Pages

I Need 100 Original Not Copydeliverable Length8 Pages That Include

Throughout this course, you will work on several aspects of network design and configuration that will result in a complete network design and configuration document for the scenario that is described below. You will not configure a real network, but you will work extensively with the concepts of good network design and configuration practices. Additional information and the deliverables for each Individual Project will be provided in the assignment description for the project. For this course, your projects will be for a company named RL Medical Imaging (RLMI). This company provides imaging services (MRIs, CAT scans, etc.) for physicians in the greater New York metropolitan area.

The company has 50 clients with an average of 10 patients per week, per client, and it expects to grow at a rapid pace during the next 5 years. The company's clients schedule imaging for their patients. Patient information is currently delivered to RLMI as paper documents. Imaging is performed, and the results are recorded (again on paper) and sent back to the client. The goal for RLMI is to transform its current paper system to a computerized system and create a network with appropriate servers and workstations to support the required software and staff.

In addition, RLMI would like to provide scheduling and results services via the Web to its clients. The company has 20 staff members (10 imaging technicians, 3 doctors, 1 sales and customer service representative, and 6 clerical staffers). The average results package (data and images) is 50 MB in size. The company must protect patient data because of federal patient-privacy laws, so security measures are important. In addition, the patient records are valuable, and the imaging is expensive, so it is important that a solid data backup process is in place.

Paper For Above instruction

Designing a comprehensive network for RL Medical Imaging (RLMI) requires careful consideration of the organization’s needs, data security, scalability, and cost-efficiency. This project entails developing a detailed network architecture that supports administrative functions, patient data management, imaging services, and web-based access for clients, all while ensuring compliance with legal standards such as HIPAA.

Network Design Overview

A strategic network design must accommodate current operational requirements and future growth projections. Considering RLMI’s scope includes handling large imaging files, patient data, and web-based scheduling, the network architecture should incorporate high-bandwidth connections, robust security protocols, redundant systems for data recovery, and scalable hardware components.

The core of the network will encompass enterprise-grade servers dedicated to storage, database management, and web hosting, complemented by dedicated workstations for clinical and administrative staff. Network topology should favor a hybrid approach with a combination of LAN and WAN segments, modular switches, and firewalls to segregate sensitive data areas from web access points.

Layered Design and Hardware Components

Implementing a layered network topology enhances security and performance. The internal network will be segmented into different VLANs—separating administrative, clinical, and guest user access. The connection to the internet will be secured through multiple firewalls, intrusion detection systems, and VPN access for remote staff and clients.

Hardware components will include high-speed switches (such as Cisco Catalyst series), dedicated servers with minimum specifications aligned with current and anticipated data loads, backup storage systems, and wireless access points for staff mobility. Redundancy will be built into critical hardware for high availability, including dual power supplies and RAID-configured storage devices.

Network Protocols and Security

The network will utilize TCP/IP as the foundational communication protocol. Specific protocols such as HTTPS for secure web communication, SFTP for secure file transfer, and VPN protocols for remote access will be essential. Security measures include encrypting sensitive patient data with WPA3 wireless security, implementing strong user authentication, role-based access controls, and continuous monitoring for unauthorized access or anomalies.

Users and Security

User management will assign permissions according to role—technicians, doctors, clerical staff, and administrative personnel—ensuring data access aligns with HIPAA compliance. Multi-factor authentication will be incorporated for remote and administrative access points. Regular security audits and staff training are integral to maintaining security standards.

Backup and Recovery

A comprehensive backup strategy will involve daily incremental backups and weekly full backups stored both onsite and offsite. Cloud-based backup solutions will be part of the disaster recovery plan, ensuring data integrity and availability in case of hardware failure or cyber-attacks. Automated backup systems will reduce human error and increase efficiency.

Cost Summary and Implementation Timeline

The project cost includes hardware procurement, software licensing, security infrastructure, installation, and configuration. Initial estimates suggest a total setup cost between $150,000 and $200,000, depending on hardware specifications and security features. The implementation phase is expected to take 3 to 6 months, with phased deployment to minimize operational disruption. Training staff on new systems will be scheduled concurrently with hardware setup.

Conclusion

The proposed network design aims to balance security, scalability, and cost-efficiency, facilitating RLMI’s transition from paper-based processes to a digital, networked environment. By adhering to best practices in network architecture, data security, and disaster recovery planning, RLMI will be positioned to support its current operations and future expansion plans effectively.

References

  • Cisco Systems. (2020). Cisco Catalyst Series Switches. Cisco Publications.
  • Federal Trade Commission. (2021). Health Breach Notification Rule. FTC.gov.
  • Google Cloud. (2022). Cloud Backup Solutions. Google Cloud Documentation.
  • Hoffman, L. (2019). Network Security Essentials. IEEE Communications Magazine.
  • Johnson, M. (2020). Enterprise Network Design Best Practices. Network World.
  • Microsoft. (2021). Securing Windows Server and Active Directory. Microsoft Docs.
  • Sharma, P., & Kumar, R. (2022). Cloud Computing and Data Security in Healthcare. Journal of Medical Systems.
  • Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk Management Guide for Information Technology Systems. NIST.
  • Symantec. (2019). Data Backup and Recovery Strategies. Symantec Enterprise Vault.
  • World Health Organization. (2018). Data Privacy in Healthcare. WHO Publications.