Preview

Kirk Samuda, Kirk Patrick, Communication Protocols

Good Essays
Open Document
Open Document
1051 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Kirk Samuda, Kirk Patrick, Communication Protocols
Kirk Samuda

University of Phoenix

NTC/362

Week (3)

To understand the importance of communication protocols, it’s necessary to understand what communication protocols are, and there purpose. A communication protocol is a formal description of various digital message formats and rules that are required to permit the exchange of messages in or between computing systems. Communications protocols are responsible for authentication, error correction and detection, and signaling. They also describe the syntax, synchronization and semantics of digital and analog communications. Communications protocols are implemented in software and hardware. There are a large number of communications protocols used everywhere in digital and analog communications. Computer networks are very dependent on protocols, they cannot exist without them. Patton-Fuller Community Hospital’s upgraded IT structure reflects a need to convert the administration network to Wireless Local Area Network (WLAN), install Voice Over Internet
Protocol (VOIP) in the hospital, and design a high speed Wide Area Network (WAN). Let us realize the need for quick and secure access to information by all the various departments, the reduction in overhead cost to run physical cables throughout the hospital, and most important the need for medical doctors to have immediate access to important information regardless of data type. Of absolute imperative is the need for the IEEE 802.11(ad) protocols to be included.
This showcases support for all the prior members of the 802.11 family, seamless switching between 2.4 and 60GHZ bands, a huge increase in the channel width up to 2160 MHz, improved functionality of mobile devices, impressive expansion in working range, and advanced security features. According to Techtagets.com, networks using 802.11ad will operate in the 60-GHz band using orthogonal frequency-division multiplexing. The



References: http://whatis.techtarget.com/definition/80211ad https://ecampus.phoenix.edu/secure/aapd/CIST/VOP/Healthcare/PFCH/it.asp?topview

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    NTC362 Week 2 INDP part 1

    • 719 Words
    • 3 Pages

    Patton Fuller is a community hospital that has been proudly serving the community since 1975. Patience care is number one, and they thrive to ensure each of their patients experience is as pleasant as possible. Hospitals are under enormous pressure to treat patients in the most effective and efficient way. By leveraging the best IT systems, health organizations provide the type of patient care with the speed and efficiency required by the market. By analyzing Patton Fuller’s IT infrastructure, a determination can be made about the network and the devices supported on it as well. The outcome of the analysis will be used to recommend new technologies in data collection, internal communication, and security. If done correctly, this will link productivity with care thereby improving performance and reducing the cost of operations in the hospital.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bsa 374 Week 3 Ind

    • 627 Words
    • 3 Pages

    After interviewing and collecting data through surveys we have determined that each department will have their own security controls based on the methods each department performs. These separate departments will have a unique method of storing and securing their data.…

    • 627 Words
    • 3 Pages
    Good Essays
  • Better Essays

    So what's next on the wireless horizon? A new standard, known as Very High Throughput (VHT), will feature data rates of between 4Gbps and 7Gbps, nearly five times the rate of 802.11n, and will operate on the 60GHz frequency band. As such, the new standard will likely have limited range and will be best suited to peer-to-peer applications such as streaming video from one device to another or moving very large chunks of data in a matter of seconds.…

    • 820 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    We will educate employees on how to properly secure information by user ID and password management training. Instructing them on how to…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    something else. It is used to describe devices that turn the movement or condition of a natural…

    • 925 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Essay

    • 443 Words
    • 2 Pages

    TCP – TCP stands for “transmission control protocol” and it is the pieces that manages all movement of each data packet between computers. It establishes a connection between the computers. It also acknowledges that each packet have been…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 7

    • 1479 Words
    • 6 Pages

    * Extranet – uses internet and web tech to connect intranets to business partners. Supply chain systems.…

    • 1479 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Butler’s Information Resources department played a major role in establishing the new VoIP system at Butler University. The IS department began this entire project by first researching the current system at Butler and identifying what they currently had, and what they needed. They looked at the features provided by Centrex and how their current system worked and developed a plan of what they needed to improve and add to their system. Butler’s IS department researched other systems, listened to vendor presentations, and set up interviews with numerous potential providers in order to narrow down their decision of what system they would be installing. The IS department came across a system called VoIP that was extremely intriguing to them. Although it was a fairly new and expensive system, they saw it as an opportunity to improve their current system drastically. “Only twelve to thirteen percent of the market had VoIP installed in 2004. Even though the telecommunications landscape was changing with an emerging trend of increasing IP lines, the current statistics were still daunting and left us wondering if this was a good path to…

    • 629 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It is important to have secure systems in place in respect of information handling in order to…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are many challenges that happen within the health care field. The most important is protecting the patient’s personal information and who is able to access this information. The National Health Information Network (NHIN) was formed to help improve upon the sharing of health care data. This was to help link data together for all involved to keep data secure when transferring over the internet. Within a health care organization a Hierarchy information system is used. This offers ease of network expansion and alteration for desktops used to be able to access necessary data. Both local area network (LAN) and wide area network (WAN) are used in within the organization. Two or more LANs are connected by a hub. The LAN is connected from different areas to form an internetwork.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. NBN provides good and fast communication flow in between patients and medical centre with the help of mobile doctors.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    HCS-100 served to improve the cost and effectiveness and quality of communication in hospital operations. This is an high-end product for communication which doesn’t suit all hospitals however works best for large and medium sized hospitals. This should be supported with the calculations that support the effectiveness of its installation and the returns.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    HCS-100 should be positioned as “high end” hospital internal communication system for large and medium size hospitals with clear message of the value delivered with ROI calculations…

    • 1691 Words
    • 7 Pages
    Satisfactory Essays

Related Topics