Wednesday, May 6, 2020

Biomedical Programming Improvement †Free Samples to Students

Question: Discuss about the Biomedical Programming Improvement. Answer: Introduction: The main purpose of the development of the network solution is increasing the availability of the network core components and allow the employs to use the wireless device to increase their productivity. The current network infrastructure is outdated and it is required to be replaced with new technology for increasing the availability and security of the network. The present system foundation of the association is obsolete and new advancements are required to be connected for supporting the new gadgets associated in the system and increment the security of the system. The remote logging is required to be enabled in order to enable the employees to access the important files and document from remote locations. A secure channel is established and a strong backbone for the network is used for enabling the managers to communicate with the other branches using teleconferencing and increase the productivity of the company. The access point installed in the network is secured with WPA or PSK for restricting the unknown users to use the wireless network. Analysis of User Requirements The software developers, web developer and other employees are the main users of the proposed network design and they would access the network components from different locations. Thus the different branches are required to be connected such that the employees can communicate with each other for increasing the productivity of their work. The users are segmented into different categories for allocation of the bandwidth of the network to them and reduce the congestion in the network. The main categories are the heavy user and the regular users and the software development team and the web development are under the heavy users because they run different application that generates data traffic in the network. Different vlans are created for the users and load balancers are used for increasing the efficiency of the network. The moderate users are those having minimum printing jobs and they are assigned with different Vlans and different printers for reducing the waiting time. The routers are configured with VPN such that the remote users can access the organizational resources from remote location and increase their productivity. The VPN connection is established using a firewall for increasing the security of the network and mitigate the risk of data modification and data piracy. For enabling BYOD in the organization the mobility support is required to be enabled and wireless access point is required to be installed in different location of the building such that the employees can use the network for connecting their devices and proceed with the work. The access ;points is also required to be secured with proper encryption algorithm such that unauthorized users does not have access of the organizational network. Description and Analysis of Current Setup The propose solution is developed to handle more number of request from the users at a time with a less reaction time. A cabling plan is required to be utilized for supporting vast measure of transmission. The current network uses a Cisco 1941 router and the arrangement is used for connecting with the department of the organization. No remote access point introduced in the system for interfacing the cell phones or tablets in the system. The primary building comprises of the product engineer and the website specialist and an enormous measure of activity is created from the building and consequently there is a necessity of building up the system to decrease blockage and handle the demand of the client productively. The switch used are ordinary switch and no VLAN can be configured on the switch and thus the network faces congestion and can increase the response time of the user. The routers and servers are required to be used for the development of the network solution. The network is also required a proper power backup plan for handling emergency conditions such as power outrage. Instead of using multiple servers a single high end server is used for increasing the efficiency of the network and virtualize the server in order to meet the growing demand of the client. The current network can be analysed using wire shark and it is required to be installed on any machine connected in the network. The data packets are required to be captured and analyzed for detection of the unknown behavior of the network. The network diagram is created following the requirement of the business organization and all the features required for the management of the business is included for the development of the network solution. The business rules and the constraints acting on the development of the project is required to be mitigated for increasing the efficiency of the network. The routers are configured with OSPF and EIGRP for communicating with the routers installed outside the network securely. The quality of service is implemented for monitoring the flow of the data packets in the network and block the malicious host to access the network resources. Description of Proposed Network The main goals of designing the network is that to find the flaws in the current setup and develop the new network for mitigating the flaws and increase the efficiency of the organisation. The new network solution uses a cisco 2800 series routes and a cisco wireless router for accommodation of the wireless devices. Layer 2 switch are used for configuration of the VLAN in the network and reduce the congestion in the network. Serial cables are used for interconnecting the routers and cat 6 cables are used for connecting the switches with the routers and the servers and the PCs in the network. The servers are developed to handle multiple request from the client and support for virtualization. Intel 17 processors are used for the servers and for the heavy users i5 processors are used. A network protocol analyser is required to be installed on the servers for analysing the source of the request and block the unknown sources to secure the network devices. Antivirus software are required to be installed in the client and the organization machines for reducing the risk of DDoS attack on the network and protect the network from phishing or spamming attacking Conclusions From the above report it can be reasoned that with the usage of the new innovation in the advancement of the system of the biomedical programming improvement association it would help the association to build its profitability. The application caused because of the poor execution of the system is maintained a strategic distance from and isolate channels are utilized for various clients of the system. The clients are portioned and distinctive VLAN are apportioned for them with the end goal that the execution of the system is expanded. The product similarity issues on the windows server due utilization of old form of windows is likewise moderated with the sending of the windows server 2012 R2. The VPN association is additionally settled with the remote customer and legitimate username and secret key is utilized for foundation of the remote association and securing the hierarchical system against outsider unapproved clients. List of References Freeman, R.L., 2015.Telecommunication system engineering(Vol. 82). John Wiley Sons. Kripalani, S.H., Commvault Systems, Inc., 2015.Automatic identification of storage requirements, such as for use in selling data storage management solutions. U.S. Patent 9,021,452. Lazzeroni, J.J., Carevich, M.K., Vertz, J.D., Hauser, P.E.H. and Kingston, S.J., 2016.Simultaneous voice and audio traffic between two devices on a wireless personal-area network. U.S. Patent 9,398,620. Mazalan, L., Hamdan, S.S.S., Masudi, N., Hashim, H., Rahman, R.A., Tahir, N.M., Zaini, N.M., Rosli, R. and Omar, H.A., 2013, November. Throughput analysis of LAN and WAN network based on socket buffer length using JPerf. InControl System, Computing and Engineering (ICCSCE), 2013 IEEE International Conference on(pp. 621-625). IEEE. Nadji, Y., Dagon, D., Antonakakis, M. and Joffe, R., 2016, September. Enabling Network Security Through Active DNS Datasets. InResearch in Attacks, Intrusions, and Defenses: 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings(Vol. 9854, p. 188). Springer. Partanen, J., Chetty, S.K. and Rajala, A., 2014. Innovation types and network relationships management.Entrepreneurship Theory and Practice,38(5), pp.1027-1055. Rogasch, N.C. and Fitzgerald, P.B., 2013. Assessing cortical network properties using TMSEEG.Human brain mapping,34(7), pp.1652-1669. Roka, R., 2012.Fixed transmission media. INTECH Open Access Publisher. Tang, Q.Y. and Zhang, C.X., 2013. Data Processing System (DPS) software with experimental design, statistical analysis and data mining developed for use in entomological research.Insect Science,20(2), pp.254-260. Thaler, D., Draves, R., Matsumoto, A. and Chown, T., 2012.Default address selection for internet protocol version 6 (IPv6)(No. RFC 6724). Willars, P., Telefonaktiebolaget LM Ericsson (Publ), 2012.Priority bearers in a mobile telecommunication network. U.S. Patent 8,300,575. Yang, X., Zhou, M. and Cao, J., 2013, April. Synchronization in array of coupled neural networks with unbounded distributed delay and limited transmission efficiency. InAbstract and Applied Analysis(Vol. 2013). Hindawi Publishing Corporation.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.