Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

For this course, your projects will be for a company named RL Medical Imaging (RLMI). This company provides imaging services (MRIs, CAT scans, etc.) for physicians in the greater New York metropolitan area. The company has 50 clients with an average of 10 patients per week, per client, and it expects to grow at a rapid pace during the next 5 years. The company's clients schedule imaging for their patients. Patient information is currently delivered to RLMI as paper documents. Imaging is performed, and the results are recorded (again on paper) and sent back to the client.

The goal for RLMI is to transform its current paper system to a computerized system and create a network with appropriate servers and workstations to support the required software and staff. In addition, RLMI would like to provide scheduling and results services via the Web to its clients. The company has 20 staff members (10 imaging technicians, 3 doctors, 1 sales and customer service representative, and 6 clerical staffers). The average results package (data and images) is 50 MB in size. The company must protect patient data because of federal patient-privacy laws, so security measures are important. In addition, the patient records are valuable, and the imaging is expensive, so it is important that a solid data backup process is in place.

Assignment:

For the assignments in this course, you will not implement the actual network, but you will develop a comprehensive network design and configuration document. Your first task for the project is to create the shell document for the final project deliverable that you will work on for each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project.

Your first version of the network design and configuration document will also include a suitable network design. Review the project background, develop a design for a network that will meet the needs of the organization, and follow the guidelines under the Network Design section of the document outline for specific deliverables. Assumptions may be made where necessary, but they should be stated in the document.

The project deliverables include the following:

  • Network Design and Configuration document shell ?Word document

?Title page ?Course number and name
?Project name
?Student name
?Date

  • Table of contents ?Use auto generated TOC

?Separate page
?Maximum of 3 levels deep
?TOC fields should be updated before submitting your project
?Section headings ?Create each heading on a new page with TBD as content, except for sections listed under "New content." ?Network Design
?Server and Workstation Operating Systems
?Network Protocols
?Users and Security
?Backup and Recovery



•New content ?Network Design ?Include a network diagram that identifies the major hardware components of the network and illustrates the connections between the components.
?Include a written discussion of the network design to justify the design you have chosen.
?Include a cost summary of the proposed network, including the hardware and time that is required for installation and configuration.



Adhere to APA formatting and reference guidelines when writing your response. Additionally, your response should be free of grammatical errors, use complete sentences, and give specific details to support statements.

 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91084760

Have any Question?


Related Questions in Computer Engineering

Assignment 1 multi-touch screens vs mouse-driven screensthe

Assignment 1: Multi-Touch Screens vs. Mouse-Driven Screens The following resources may be helpful when completing this assignment. • Dearden, A. (2008). User-Centered Design Considered Harmful • Norman, D. (2007-2010). A ...

What are the best practices to follow for microsoft windows

What are the best practices to follow for Microsoft Windows network security. Which two would you start with and why?

Question this discussion focuses on mapping cloud security

Question: This discussion focuses on mapping cloud security controls to existing frameworks or regulations. You will need to create 1 new thread AND post AT LEAST 2 comments on other students' threads. Here's how to get ...

If you set a lenient significance level eg 20 what is the

If you set a lenient significance level (e.g., .20), what is the effect on the probability of a Type I and Type II error (answer in terms of high or low probability for each Type of error)?

What is the example of social behavior or a social

What is the example of social behavior or a social situation that seems inconsistent with the fundamental presupposition, and why this example could be inconsistent?

Question overview of information security and risk

Question: Overview of Information Security and Risk Management (Due Oct 24) Does your company (or school) have a current disaster recovery plan? What are some of the activities involved in it? Do you feel confident that ...

Taskstudents are required to do the following tasks for

Task Students are required to do the following tasks for write report by answering all the questions at the end of case study: Task a: Answering all the questions at the end of case study. Task b: Student is required to ...

Reading the biographybook where the body meets memory by

Reading the Biography Book : "Where the Body Meets Memory" by David Mura Questions: 1. The internment camps were a very painful experience for Japanese Americans. They were also a very important and awkward chapter in Am ...

Runtime vs realtime considerations1 research the concept of

Runtime vs. Realtime Considerations 1. Research the concept of compilation with regards to code. 2. Is there a difference in how scripts are compiled vs. how programs are compiled? 3. What is the difference between compi ...

Question suppose we iterate the application of a blurring

Question : Suppose we iterate the application of a blurring filter with kernel size 5 on an image of 800 times 600 pixels. How many times should we apply the filter for the color of the pixel at position (20, 20) to be i ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As