Deployment of secure network for VIVID Medical center based on MPLS links
Keywords:distributed network, medical center, networks
Vivid Medical Center is considered one of the leading medical centers in Al Batinah Governorate in the city of Saham. It is a healthcare division of Vivid Hospital LLC, which provides world-class healthcare. It offers many medical specialties and has advanced technology, and high-quality equipment. The main business of the medical center is to provide early awareness and awareness about disease prevention through early diagnosis. In addition, the medical center contains several specialized medical and administrative departments. The medical center has a simple network that is not distributed among all departments and employees, they do not have a network connected to departments, and patient data cannot be transferred between employees and departments except through paperwork, which is considered somewhat outdated and impractical in the aspect of the organization’s performance, in addition to the absence of a system Protection of the network from any external or internal attacks. Therefore, the current network is not considered a triggering network to install the hospital management system.
My project will require rebuilding the entire health center network by designing and implementing an integrated and distributed network across all sections of the building's personnel. As well as implementing a high security system in the network in order to enhance network security and address security risks from inside and outside. In addition, all terminals will be provided to be distributed to all employees to ensure inter-departmental communication and support data transmission in a secure and encrypted channel.
References or Bibliography
Ahmadi-Javid, A., Fateminia, S. and Gemünden, H., 2019. A Method for Risk Response Planning in Project Portfolio Management. Project Management Journal, 51(1), pp.77-95.
Ahmed, F., Abedin Butt, Z. and Siddiqui, U., 2016. MPLS based VPN Implementation in a Corporate Environment. Journal of Information Technology & Software Engineering, 06(05).
Akinsipe, O., Goodarzi, F. and Li, M., 2012. Comparison of IP, MPLS and MPLS RSVP-TE Networks using OPNET. International Journal of Computer Applications, 58(2), pp.1-3.
Alabady, S., 2009. Design and Implementation of a Network Security Model for Cooperative Network. International Arab Journal of e-Technology, 1(2).
Alchaal, L., 2005. Dynamic and Easily Manageable Approach for Secure IP VPN Environments. Institut National Polytechnique de Grenoble - INPG,. Apm.org.uk. 2019. Introduction To Project Planning. [online] Available at: <https://www.apm.org.uk/media/7580/ipp-sample-chapter.pdf> [Accessed 1 January 2021].
Aslam, S., 2014. An Integrated Approach to Project Feasibility Analysis: A Case Study. The International Journal of Sustainability Policy and Practice, 8(4), pp.73-95.
Cooray, K., 2015. A study of moments and likelihood estimators of the odd Weibull distribution. Statistical Methodology, 26, pp.72-83.
Dey, P., 2001. Integrated approach to project feasibility analysis: a case study. Impact Assessment and Project Appraisal, 19(3), pp.235-245.
Fang, L., Behringer, M., Callon, R., Graveman, R., Roux, J., Zhang, R. and Knight, P., 2010. Security Framework for MPLS and GMPLS Networks. In: Internet Engineering Task Force (IETF). [online] Cisco Systems, Inc, pp.2070-1721. Available at: <https://tools.ietf.org/html/rfc5920>
[Accessed 12 December 2020].
Fathurrahmad, F. and Yusuf, S., 2019. Implementasi Jaringan VPN dengan Routing Protocol terhadap Jaringan Multiprotocol Label Switching (MPLS). Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi), 3(1), p.29.
Fathurrahmad, Yusuf, S., Iqbal, T. and Salam, A., 2020. Virtual Private Network (Vpn) Network Design For Multiprotocol Label Switching (Mpls) Networks. INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, [online] 9(1), pp.2277-8616. Available at: <http://www.ijstr.org/final-print/jan2020/-Virtual-Private-Network-vpn-Network-Design-For-Multiprotocol-Label-Switching-mpls-Networks.pdf> [Accessed 12 December 2020].
G., P., 2020. Requirement Analysis Framework for Re-Defining the Process Outcome. Journal of Advanced Research in Dynamical and Control Systems, 12(7), pp.808-814.
Hernandez, L. and Jimenez, G., 2018. Design and Validation of a Scheme of Infrastructure of Servers, Under the PPDIOO Methodology, in the University Institution - ITSA. Advances in Intelligent Systems and Computing, pp.367-379.In:
Designing and Supporting Computer Networks, CCNA Discovery Learning Guide. 2020. Introducing Network Design Concepts. [online] pp.5-40. Available at: <https://students.mimuw.edu.pl/~zbyszek/sieci/CCNA4%20Sample.pdf> [Accessed 12 December 2020].
Kadry, S. and Khaled, S., 2008. Design and Implementation of System and Network Security for an Enterprise with World Wide Branches. Journal of Applied Sciences Research, 4, pp.1361-1370.
Kaplan, A. and Garner, J., 2017. A complex dynamic systems perspective on identity and its development: The dynamic systems model of role identity. Developmental Psychology, 53(11), pp.2036-2051.
How to Cite
Copyright (c) 2022 Haitham Zahir Al-Abri; Ali Abbas; Raza Hasan
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.