Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Le Groupe National Dentaire (LGND) has branches in major cities across Cote d'Ivoire such as Abidjan, Grand Bassam, Bouake, Khorogo, Odienne, and...
Le Groupe National Dentaire (LGND) has branches in major cities across Cote d'Ivoire such as Abidjan, Grand Bassam, Bouake, Khorogo, Odienne, and Yamoussoukro. The company provides a range of general, complex and cosmetic dental care with specialists offering services in Orthodontics, Endodontics (Root Canal) and Periodontics (oral health and gums).
Le Groupe National Dentaire plans to open a new clinic in Man in the west of the country and has rented office units within an old building for its premises. As a result, the company needs to complete some internal work within the building so that it is suitable for patients. The clinic will have three ground floor and two first floor surgical consulting rooms, a patient lounge (first floor), a reception and a storage room. The building is of brick construction externally, with some brick and some stud-partition internal walling. The flooring is concrete.
LGND is a high-tech company, and all consulting rooms require networking to a local server. Dental consultants and hygienists view patient information on screens in the consulting rooms. These consist of patient records, including x-ray images, and videos. The patient lounge provides open internet access through an open access PC, and also Wi-Fi for patients' own devices.
The reception has access to an appointment system, which is Windows-based and standardized across the company. It takes electronic payments, sends SMS reminders and emails to patients. The clinic will also be networked to the head office in Abidjan, enabling head office staff to access local server files.
The following outline requirements have been identified (excluding specialist dental equipment that connects to the network):
a) Overall System Requirements
1. To provide a network solution (hardware and software) to meet the needs of the company, which ensures timely and secure access to information.
2. To provide Internet access for patients while in the lounge.
3. To provide network access to Head office.
b) Data and information
1. Patient information stored locally.
2. Electronic payments.
3. Corporate web email provided via the company's ISP.
4. Patient appointments/ records, including personal contact information.
.
c) Hardware
1. New computers to meet performance, security and storage requirements
(including backup)
2. New PC workstations (total 8: 8 x desktop) running Microsoft Windows.
3. New network printers (2).
4. Network components as required.
d) Software
1. Latest Microsoft Office Suite required.
2. Dental management software (appointments/ records) as used throughout the
company.
3. Web & email Internet access
4. Suitable security software
As an IT consultant you have been hired to provide all the necessary information about
the project.
Task 1 - Windows Installation
Task 1 (Software, Installation and Configuration) in the laboratory session or using your
own computer asks you to develop a report that describes the installation you have
completed. This report, as part of your portfolio of work, should address the following:
1. Installation of Windows
a. Identification of key stages in the installation.
b. Identification and description of required device drivers and their source locations.
c. Identification and description of unresolved issues - especially missing device drivers.
This requires a portfolio which is made of photos and comments about the windows'
installation's processes and steps
2) Give local prices and specification of suitable hardware/ software you recommend.
Task 2
Networking Infrastructure and Protocols
The building has an existing Token Ring infrastructure. The Chief Executive Officer of
LGND has asked you to provide a report to clarify the following:
a) It has been suggested that there are three major options for providing the clinic
network: (1) Use the existing Token Ring infrastructure; (2) Replace it with Ethernet and
structured cabling; or (3) use Wi-Fi. Explain the difference between Ethernet, Token
Ring and Wi-Fi and make a recommendation about the technology he should use. You
should discuss differences in topology, data rate and the type of cable required. A good
answer will relate your recommendation to the business requirements.
b) Network architecture is frequently described in terms of the OSI 7-layer model.
Explain the purpose of each of the 7 layers.
c) Given the applications that will be used, and making any suitable assumptions,
identify and briefly explain the purpose of SEVEN (7) protocols.
For each protocol, identify the layer at which they operate.
This task requires around 700 words.
Task 3
Addressing
LGND wants you to provide a clear explanation about network addressing.
a) Briefly explain why network components need addresses and outline the difference
between a network address and a host address.
b) Explain the difference between a private IPv4 address and a public IPv4 address.
You should explain when you would use each address type within SDS's network.
c) Explain what is meant by DHCP and outline why you would use it.
d) Explain the difference between IPv4 and IPv6 and state which type of address will be
used in LGND's network.
e) Draw a logical network diagram (topology) that shows the main components of the
network.
This task requires around 300 to 500 words.
Task 4
Security
Cyber security is increasingly important.
a) Explain THREE (3) security concepts. A LGND clinic has suffered a virus infection
which meant that no patient records could be viewed. Briefly outline which security
concept was violated.
b) How would you ensure that there was a secure connection between the local and
head office networks?
c) How would you ensure that users of the open access PC or the Wi-Fi cannot access
the local server?
d) Provide a list of FOUR (4) measures that can help keep the network secure.
This list should include hardware, software, policies and ways of checking them.
e) What do you think is the biggest threat for this system? Justify your answer.
This task requires around 450 words.