Free Essay

Network Implementation

In:

Submitted By marysol63
Words 2004
Pages 9
| | | | |

| | | | |

Network Implementation Plan
Network Implementation Plan

Table of Contents Implementing IPv6 3
Great Clips: Implementing a Network Plan
Configuring IPv6 on a Juniper Router Network Infrastructure Design 6
Installing Ubuntu on Virtual Box Linux Networking 9
Linux Network Commands Analyzing Network Traffic 14
Network Sniffer Applications: Compare and Contrast
Installing Wireshark: Running a TCP Packet Trace Network Security 16
Access Control Lists (ACL)
ACL Command Examples
To configure an ACL on a router
To configure an ACL on a switch References 18

Implementing IPv6
Great Clips: Implementing a Network Plan

Great Clips is a hair salon franchise through the United States and Canada. The first salon opened in 1982 and the first franchise opened in 1983 both in the state of Minnesota. In 1988, there were 150 franchises and by 2014, there are now well over 3000. Because of this tremendous growth, I have selected this company for which I will implement a network plan that will support seamless sharing and connection between various company locations.

The routing protocols for IPv6 are similar to IPv4 but have been adjusted accordingly. There are two forms of routing protocols, Distance Vector routing and Link-State routing protocols. Distance Vector rules consider distance between nodes and the number of hops data must travel through before it reaches its destination. Distance Vector protocols require very little configuration and are popular among small to midsize organizations. Common Distance Vector protocols are Routing Information Protocol (RIP) and Boarder Gateway Protocol (BGP) which is the standard routing protocol used for the internet. RIP includes authentication to verify source, it needs a network address and number of hops (max of 15 hops) and is very automatic. BGP is used by all ISPs, is very flexible, allows for internal and external and allows multiple links to the same network.

Link-State routing protocols govern how information is passed between routers by determining the best paths of available connections. Routing protocols in this category include Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (IS-IS). OSPF will govern that data will follow the shortest, the most cost-effective and reliable path. This protocol is typically used on large networks and can be grouped logically into areas. ISIS is not as popular as OSPF but is typically implemented in large scale networks such as ISPs.

Configuring IPv6 on a Juniper Router

You configure IPv6 on a Juniper Network router much like you do with IPv4. For router interfaces to support IPv6, they must be configured to specific properties, types and addresses. Interface family type inet6 and logical interface protocol families must be configured as well. Below is an example of the steps to configure IPv6 on a Juniper Network.

2001:db8::1/128 2001:db8::5/128

A E 2001:db8:0:1::/64

Log into your device running Junos OS and the CLI

Step 1: Enter configuration mode
Upon logging in, you will be in operation mode: “user@host>”
You must get into configuration mode by enter “configure” “user@host> configure”
This changes to “user@host#” when place in configuration mode.

Step 2: Edit interfaces
“[edit interfaces ] Fe-1/2/0 unit 1 description to –E
Fe1/2/0 unit 1 family inet6 address
2001:db8:0:1:2a0:a502:0:1da/64
Unit 1 family inet6 address 2001:db8::1/128 primary
2001:db7::2/128
2001:db87::3/128
Device A
[edit routing-options]
Set rib inet6.0 static route 2001:db8::5/128 next-hop
2001:db8:0:1:2a0:a502:0:19da
[edit interfaces] user@host# commit
Device E
Fe-1/2/0 unit 25 description to –A
Fe-1/2/0 unit 25 family inet6 address
2001:db8:0:1:2a0:a502:0:19da/64
2001:db8::5/128
[edit routing-options]
Set routing-options rib inet6.0 static route ::/0 next-hop
2001:db8:0:1:2a0:a502:0:1da
[edit] user@host# commit” (Configuring IPv6 Static Routes, 2012)

Network Infrastructure Design
Installing Ubuntu on Virtual Box

Linux Networking
Linux Network Commands

The ifconfig command is a system admin tool used for network interface configuration. Using this command, a report is generated listing all running and recognized network interfaces on the system. Also listed are configurations such as IP addresses, net masks, broadcast addresses, gateway and the status of the loopback.
The ifconfig command can be used to troubleshoot networking issues by allowing a view of all network settings, all network interfaces, enabling and disabling network interfaces, assigning IP addresses and net masks among other capabilities.
Examples:
ifconfig –a: displays all information for active and inactive interfaces on the network ifconfig eth0 netmask : allows admin to define a net mask for a specific interface ifconfig eth0 broadcast: allows admin to set certain broadcast address for a specific interface ifdown and ifup are additional troubleshooting commands used for interface configurations allowing the administrator to shutdown or bring back online a specific interface. This is extremely helpful in the event of a malicious attack.
The nslookup command is a query command used to find information about a named domain. Running this command will provide the IP address for a specific domain name. This search can also be reversed, using the IP address to search for the domain name. This command is helpful when troubleshooting DNS servers.
Example:
Nslookup www.google.com
The ping command is a basic command that lets the administrator test for network connectivity. Using the ping command, the administrator can send a test packet of data to a certain host on a network in an attempt to get a reply and to determine how long it takes for the data to be exchanged.
Example:
Ping 192.168.1.122
The File Transfer Protocol is a program allowing users to transfer data to and from remote network sites. It is the fastest and most easy way to send files from your machine to another machine.
The Domain Name System is used on Linux to resolve computer IP addresses into readable host names. Users would never be able to remember computer IP addresses; however they have an easier time remember names such as Google. It can also do the reverse and convert a name into an IP. This is important because the IP address is used to route information, not the readable name.
The SSH application on Linux is used for logging into a machine remotely for administration and work through secure encrypted communication channels.

Analyzing Network Traffic
Network Sniffer Applications: Compare and Contrast
A program that works to intercept, track and log traffic over an interface is known as a network analyzer or sniffer. The sniffer captures the packets of data streaming through the network and decodes the data being sent. These tools can be very helpful for troubleshooting network problems, detecting network intrusions and misuse, monitoring utilizations and debugging along with other additional capabilities. A sniffer would be very helpful in a scenario where a user suspects computer attacks against their network firewall. Using a sniffer, the user could analyze the data packets being sent to the network to determine if they are legit or not. There are quite a handful of different applications and software sniffer tools available in the marketplace today. Let’s look at just two of them, Cain and Abel and Wireshark.
Cain and Abel is a graphical user interface (GUI), created by Massimiliano Montoro and Wireshark, formually Ethereal, is both a command-line interface and GUI both provided free for downloading but whereas Cain and Abel is a freeware, usually with restrictions, Wireshark is a General Public License freeware allowing more freedom. Cain and Abel works on Windows operating systems only and Wireshark works on Windows, OS, Linux, BSDs, Solaris, AIX, HP-UX, IRIX, Tru64 and UNIX. Cain and Abel, a well documented tool, has the ability to analyze routing protocols, recover, decode and/or crack encrypted passwords and record VoIP conversations. Wireshark has the ability to capture packets live and/or read in a file of previously captured packets. Additionally, the interactive interface allows the user to dig deep into the details of the packet as well as reconstruct the flow of a TCP session. I think based upon the research findings comparing and contrasting these two tools, I think the vast versatility that comes with Wireshark makes it a better tool than that of Cain and Abel.
Installing Wireshark: Running a TCP Packet Trace

Network Security
Access Control Lists (ACL)
Access Control Lists (ACL) are the rules governing the flow of traffic on the network by specifying which traffic is allowed to flow in and/or which traffic is allowed to flow out. The rules are set regarding different traffic attributes found in the data packets such as source and destination IP addresses and MAC addresses, port information and protocols. When a data packet is received, the attributes are thoroughly scanned and compared against the ACL, looking for rules that will either allow or prohibit the packet to enter the network. Because of this, ACLs are able to provide a fundamental level of network security by blocking unauthorized traffic and restricting data.
ACLs are created using commands or statements that specify which attributes are permitted and which ones are denied. The attributes are specified in the order in which the list should appear in the ACL using a top-down approach since the ACL reviews the packets from top to bottom. ACLs are applied to interfaces, so you can have an ACL for the outbound interface and/or for the inbound interface. ACLs can be standard, extended or named. Standard ACLs match source addresses, extended ACLs can include additional information such as ports, TCP and UDP information and named ACLs use specified names and numbered lines.
For example: ACL 180
Config access-list 180 permit tcp 192.167.77.0.0.0.0.255 192.167.77.3.0.0.0.0
TCP packet to 192.167.78.1 will be rejected because it is not within the specificed range of the ACL.
TCP packet to 192.167.77.2 will be accepted because it is within the specified range of the ACL.
ACL Command Examples
There are many commands that can be used for ACL implementations. Such commands are:
Config access-list permit
Config access-list deny
Config clear access-list
Config show access-list

To configure an ACL on a router
Example: deny traffic from 192.167.77.3.0.0.0.0
Open the router terminal
En
Conf t
#access-list
<1-99 for standard list>
#access-list 50
#access list 50 de
#access list 50 deny 192.167.77.3.0.0.0.0
To configure an ACL on a switch
Example: permit traffic from 192.167.77.3.0.0.0.0
Open Command prompt
En
Switch#conf t
Switch#(config)#access-list 50
Switch#(config)#access-list 50 permit 192.167.77.3.0.0.0.0

References
Beasley, J. S., & Nilkaew, P. (2013). A Practical Guide to Advanced Networking. Pearson IT Certification.
Cain and Abel (software). (2014, 09 27). Retrieved 12 15, 2014, from Wikipedia: http://en.wikipedia.org/wiki/Cain_and_Abel_%28software%29
Configuring IPv6 Static Routes. (2012, 08 10). Retrieved 11 24, 2014, from Juniper: https://www.juniper.net/documentation/en_US/junos12.1/topics/example/policy-ipv6-static-routes.html
How to install Ubuntu 14.4 LTS on Virtubal box. (2014, 05 14). Retrieved 12 02, 2014, from YouTube: https://www.youtube.com/watch?v=QkJmahizwO4
Methods of Network Access Security. (n.d.). Retrieved 12 22, 2014, from Exam Collection: http://www.examcollection.com/certification-training/methods-of-network-access-security.html
SecTools.Org: Top 125 Network Security Tools. (n.d.). Retrieved 12 15, 2014, from SecTools: http://sectools.org/tag/sniffers/
Wilson, T. (2012, 05 16). Securing Networks: Access Control LIsts (ACL). Retrieved 12 22, 2014, from Pluralsight Blog: http://blog.pluralsight.com/access-control-list-concepts
Wireshark. (2014, 12 1). Retrieved 12 15, 2014, from Wikepedia: http://en.wikipedia.org/wiki/Wireshark

Similar Documents

Free Essay

Implementation and Analysis of a Wide Area Network

...IMPLEMENTATION AND ANALYSIS OF A WIDE AREA NETWOK (A FEASIBILITY REPORT) BY ISAIAH ADEBAYO STUDENT’S NAME WITH 3121658 STUDENT’S NUMBER COMPUTER SYSTEMS AND NETWORKING ENGINEERING (CSN)-FULL TIME SUBMITTED TO: DR VINCENT SIYAU (SUPERVISOR) TABLE OF CONTENTS CHAPTER ONE 1.0 AIM.............................................................................................................................Page 3 1.1 OBJECTIVES.............................................................................................................Page 3 1.2 INTRODUCTION......................................................................................................Page 4 1.3 EQUIPMENTS USED............................................................................................... Page 4 CHAPTER TWO 2.0 METHODS AND PROCEDURES............................................................................Page 5 2.1 PRESENT NETWORK OVERVIEW........................................................................Page 5 2.2 MAIN OFFICE NETWORK......................................................................................Page 7 2.3 SUBNET OFFICE NETWORK.................................................................................Page 7 2.4 BUSY NETWORK SCENARIO...............................................................................Page 7 CHAPTHER THREE 3.0 PROPOSED NETWORK SCENARIO....................................................

Words: 1948 - Pages: 8

Free Essay

Implementation and Evaluation of Wireless Mesh Networks on Manet Routing Protocols

...June 2013 Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols Shashi Bhushan1,Anil Saroliya2 ,Vijander Singh3 Research Scholar, Computer Science, Amity University, Jaipur, India 1 Assistant Professor, Computer Science, Amity University, Jaipur, India 2 Senior Lecturer, Computer Science, Amity University, Jaipur, India 3 Abstract—Wireless Mesh Network (WMN) is a kind of network which is made up of Mesh router and Mesh clients where Mesh router having lesser mobility and form the heart of WMNs. In this paper, Wireless Mesh Network over MANET implemented using routing protocols such as AODV, DSR. In this work NS-2.34 simulator is used for simulations. Various measurements and calculations were figure out in this work like throughput, Average end-end delay, PDR, NRL and Routing packets in Random way point mobility model. WMN have features such as self configuration, self healing and low cost of equipment. This work specifically aims to study the performance of routing protocols in a wireless mesh network, where static mesh routers and mobile clients participate together to implement networks functionality such as routing and packet forwarding in different mobility scenarios Keywords- Ad hoc Network, Routing Protocols, Wireless Mesh Network, Performance, Throughput, PDR, NRL and Routing packets in Random way point mobility model, Simulation on Network simulator NS-2, AODV,DSR , Routing Overhead. I. INTRODUCTION A Mobile Ad-hoc network (MANET) is...

Words: 4335 - Pages: 18

Premium Essay

Voip Network Service Implementation

...VOIP NETWORK SERVICE IMPLEMENTATION TABLE OF CONTENTS - Executive Summary------------------------------------------------------------------------ 1 - Introduction--------------------------------------------------------------------------------- 2 - What is Voip-------------------------------------------------------------------------------- 3 - How Voip Works-------------------------------------------------------------------------- 4 - Advantages and Requirements for Voip------------------------------------------------ 6 - Disadvantages of Voip-------------------------------------------------------------------- 7 - Voice Over IP Solutions------------------------------------------------------------------10 - Conclusion----------------------------------------------------------------------------------12 - References----------------------------------------------------------------------------------13 EXECUTIVE SUMMARY The term “Voice over Internet Protocol” (VoIP) describes the transport of voice over IP based networks; it is a generic term that covers deployments ranging in complexity from hobbyists using the internet to get free phone calls on a peer to peer basis, to full scale PSTN replacement networks. In carrier networks VoIP has been mainly deployed in enterprise networks or as a trunking technology to reduce transport costs in voice ...

Words: 2981 - Pages: 12

Premium Essay

Planning a Network

...planning or designing a computer network. Such factors include meeting the needs of the business, traffic and bandwidth requirements, budget considerations, scalability, etc. "Scalability refers to the extent of network growth that should be supported. For corporate network, scalability is a major consideration. Provision must be made to add users, applications, additional sites, and external network connections" (TutorialsWeb). It is important to have a system or methodology to follow to ensure you account for the necessary and critical aspects of the design process that will provide the best possible network solution for your company. The first step is considering the needs of the business. This is accomplished by understanding what the company does, how they currently function and operate to generate revenue, as well as having a good understanding of the company's business model. Once you have a good understanding of the company's business requirements, you can then determine specific design requirements. The second step then is defining the technical requirements of the network based on the information gathered from assessing the needs of the business. In this step of the planning process, technical considerations such as performance requirements, availability, scalability, standards compatibility, and rapid deployment are evaluated (Hummel). Only when these first two steps are followed in this order will you succeed in designing a network that best suits the customer and...

Words: 669 - Pages: 3

Free Essay

Wireless

...Coursework Assignment Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is located on a single campus called Campus A. Students and staff use the network services from hosts on various different user networks, as shown in Figure 1 . Due to an increasing number of security violations, a possible redesign of the network infrastructure is to be investigated. You have been hired as a consultant to propose security enhancements, and produce a report. The aim of the exercise is to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design should tackle the following components:  Provide best practice network egress and ingress filtering at the network perimeter.  Create a perimeter firewall, with an appropriate topology to provide the organisations services, including public web, and mail servers. The firewall should have a closed security stance, and provide public services in a secure way.  Provide secure access to all devices, from the security management subnet. Additionally, research should be carried out into increasingly common Advanced Persistent Threats (APT), and ways to defend against these using network defenses. This part of the coursework will be research only and be confined to a part of the Research Section. You will be required...

Words: 607 - Pages: 3

Premium Essay

Organizational Structure Simulation

...for Change Synergetic Solutions Inc is a 6 million dollar systems integration company. They specialize in assembling and reselling leading computer brands. It has 300 employees mainly in sales and service. Most of them only poses basic computer assembly and troubleshooting skills with a few higher skilled individuals functioning as specialists. The forces catalysts for change at Synergetic were both internal and external. The stagnant systems integration market were a reason why CEO Harold Redd looked into the network solutions business of designing and implementing complex computing networks. He also landed an order worth 1.2 million dollars for designing a network. There are also 5 million dollars in future orders waiting. Due to this the network solutions business now accounts for 20% of the total revenues for the company. Internal Factors The CEO has made the decision to focus on the network solutions business and raise its revenues to 80% of total sales. He has set a target of 12 million dollars in sales in the end of the next nine months. He has set quarterly growth targets for revenue...

Words: 909 - Pages: 4

Premium Essay

Service Request Sr-Rm-022

...Service Request SR-rm-022 Robert Vermette BSA/375-Fundementals of Business Systems Development January 19, 2013 Jeffery Comrie Analysis of the Riordan HR system My report will be regarding the main information collecting strategies that we will use for this project, depending on "Analyzing HR System.” A few main aspects will be recognized that is linked to the accomplishment of what is called the information collecting procedure. The scope and feasibility will be defined to assist us in accepting the significance of this project. This report will provide awareness for the project and may be able to recognize a range of options for the information to move forward Information Gathering procedures The data or information that is collected is an important step in any part of the plan. It ought to be conceded out in an organized way for procuring the targets of the development and accumulating the correct data. Data should be combined from options that express dependable data and provide the intention of the project. The collection of data collecting resources should be completed in compliance to the necessities of the development. For accumulating the data, two main options will be used, first and second options. Both of these will be supportive in collecting applicable and helpful information. “The first resource, questionnaire or meeting strategies can be used to collect information. Interviews can...

Words: 3563 - Pages: 15

Premium Essay

Terrorism

...Due to the current nature of infrastructure within the various geographical locations and populations’ who are involved in conflict, the Department of Defense (DoD) has adapted, and began to implement policy that is intended to disrupt internal subversion. The objective is to combat enemy insurgents and their agenda, in order to develop a peaceful infrastructure. The theatre of conflict both on U.S., and foreign soil, (namely Iraq, and Afghanistan) consist of enemies who do not have the capabilities to engage our coalition forces through conventional warfare. Conventional warfare is: opposing forces who engage one another using conventional weapon systems and tactics, in order to degrade or destroy their opponents abilities to operate. Due to the superior capacity of coalition forces both economically, and tactically, the way in which the enemy operates in current theatre has deviated from conventional forms of fighting. Enemy Insurgents use unconventional warfare in their fighting tactics, and this irregular warfare involves many actors from civilian population to enemy combatants, and resources. Because of the fast changing wartime climate, the DoD has developed policy that was nonexistent a mere ten years ago. The DoD has developed the Counter Insurgency Initiatives in order to implement policy that gives guidance to actors involved in current theatre combat operations. Insurgency is the organized use of subversion and violence, to seize, nullify, or challenge political...

Words: 1381 - Pages: 6

Premium Essay

Managing It

...Operational Systems Analytical Systems Usage Definitely need to be used. Carry ‘bread and butter’ operations of the company Not mandatory to be used. Enable employees to do the job better Cost Fixed cost. Cost is justifiable. No ROI The ROI is zero if system is not used Requirements Requirements are well defined Very fuzzy requirements Importance Efficiency is the top most (measurable) Effectiveness is the top most (not measurable) Data type Internal, hard data(historical) External, soft data(future) Data quality Complete. Timely. 100% accurate For what decisions, the data is going to be used? Balance quality of data with cost. Satisficing data is enough. Design process Waterfall Spiral Implementation Full scale at first go-live Evolves due to changes in environment. Implementation will not be completed. User responsibility End users of an agreed system Analytical systems are owned and driven by users. Example Credit card Transaction processing system Succession Planning system 3. Why Analytical systems are a different breed 1. Analytical systems need not be mandatorily used. 2. They help the employees to do their job better. 3. The users should recognize that business cannot function as usual and they should have the desire and ability to change how they do their jobs. The usage of analytical systems depends on this. 4....

Words: 1703 - Pages: 7

Free Essay

A Walk in the It Director’s Shoes

...comes to technology it leads to the internet. Many people can communicate with other people in various places through the internet. Companies can get many advantages by using Internet network to support their business. Therefore, companies are trying as hard as they can, and give high effort in protecting their network from attack and make sure that they have the best network security. Most people think that the threat of security attack is only come from outside the company. In fact, the attack from inside the company network is more harmful with high frequency to be happened. It is widely know now that threats from inside the company is far more dangerous than attacks from outside. These facts shows that any company must plan an implement policies to defend their network security from inside and outside intruders. These companies must find how intruders attack in order to protect their information assets. This will help make their network security more effective in blocking threats either from outside or inside the company. Within my paper I will discuss that I am the Information Technology (IT) Director for a small, growing firm and my tasked would be to develop an electronic resource security policy to deploy within my organization. I will discuss the differences between the terms implementation and policy and describe the importance of their separation. Then develop an outline of a security policy which addresses areas that are identified as problems. Then, I will identify...

Words: 1183 - Pages: 5

Free Essay

E-Procurement

...Practice Research Group, Discipline of Business Information Systems, Faculty of Economics and Business, The University of Sydney, Sydney, NSW 2006, Australia Available online 19 April 2007 Abstract The purpose of this paper is to theoretically and empirically explore how public e-procurement policies are translated into practice. The theoretical argument draws on actor network theory (ANT), coupled with Colebatch’s [Colebatch, H. K. (2002). Policy (2nd ed.). Maidenhead, Open University Press.] social construct of policy, to analyze the actors, actions, and circumstances through which understanding of public e-procurement comes to stabilize (or not) into a coherent policy for action. Drawing on three case studies of central government agencies in Italy, Scotland, and Western Australia, we suggest new intellectual perspectives and methodological heuristics that may assist researchers and practitioners analytical efforts in examining sociotechnical change and the implications for policy development and implementation. © 2007 Elsevier Inc. All rights reserved. Keywords: E-government; E-procurement; Actor network theory; Social construction of policy 1. Introduction Public e-procurement, as an information system (IS) enabled innovation in government, is transforming technological platforms and the way governments in Western countries procure goods and services and engage with suppliers (Lee, Tan & Trimi, 2005; Moe, 2004). ⁎ Corresponding author. E-mail addresses: c.hardy@econ.usyd...

Words: 12195 - Pages: 49

Free Essay

Hostel Management System

...Define user documentation Written or other visual information about an application system, how it works, and how to use it. (17) . User documentation refers to the documentation for a product or service provided to the end users. The user documentation is designed to assist end users to use the product or service. This is often referred to as user assistance. The user documentation is a part of the overall product delivered to the customer. The sections of a user manual often include: * A cover page * A title page and copyright page * A preface, containing details of related documents and information on how to navigate the user guide * A contents page * A guide on how to use at least the main functions of the system * A troubleshooting section detailing possible errors or problems that may occur, along with how to fix them * A FAQ (Frequently Asked Questions) * Where to find further help, and contact details * A glossary and, for larger documents, an index realized the importance of documentation many years ago when I joined an organization to head its IT function. The previous IT head had left the organization a couple of months ago. The managing director called me over and voiced his expectation. He told me that all ground work had been done for ordering new set of servers and application packages and that I should act upon it soon. I promised to take a look at the situation and revert with plans. However, when I sat in my department...

Words: 2026 - Pages: 9

Premium Essay

Is4550 Week 1 Lab

...------------------------------------------------- Week 1 Laboratory Part 1: Craft an Organization-Wide Security Management Policy for Acceptable Use Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Define the scope of an acceptable use policy as it relates to the User Domain * Identify the key elements of acceptable use within an organization as part of an overall security management framework * Align an acceptable use policy with the organization’s goals for compliance * Mitigate the common risks and threats caused by users within the User Domain with the implementation of an acceptable use policy (AUP) * Draft an acceptable use policy (AUP) in accordance with the policy framework definition incorporating a policy statement, standards, procedures, and guidelines Part 1 – Craft an Organization-Wide Security Management Policy for Acceptable Use Worksheet Overview In this hands-on lab, you are to create an organization-wide acceptable use policy (AUP) that follows a recent compliance law for a mock organization. Here is your scenario: * Regional ABC Credit union/bank with multiple branches and locations thrrxampexoughout the region * Online banking and use of the Internet is a strength of your bank given limited human resources * The customer service department is the most critical business function/operation for the organization * The organization wants to...

Words: 639 - Pages: 3

Premium Essay

Cpoe-Ehr-Implementation Partners Healthcare

...EHR/CPOE Implementation Executive Summary This thesis follows the implementation of Computerized Patient Order Entry/Electronic Health Record (CPOE/EHR) system implemented by Partners Healthcare System (PHS) during 2002-2003 for all its constituent practitioners. It looks at the problems faced during implementation of the system and identifies new potential problems that the system may encounter. Particularly in consideration is the effort it takes to convince healthcare professionals to switch to CPOE/EHR, the cost of installing the system, the potential of automating redundancies in the system and the potential of healthcare professionals getting skewed data out of the system suggestions. It looks at the management challenges faced by the administration when bringing about CPOE/EHR to PHS and divulges in some techniques that were used for tackling these issues. It defines ways in which the system is being used to improve patient healthcare and save millions of dollars for the government, healthcare facilities and patients alike. This thesis also finds ways to combat the potential problems that may arise later and the system and looks at related government policies and statutes which apply to the implementation. Finally some metrics of success are discussed their effectiveness in driving a result. Problem Definition CPOE/EHR Implementation can face a host of problems that can hinder the process flow and the acceptability of the system by the people involved. The initial...

Words: 7032 - Pages: 29

Free Essay

E Governance in India

...PRIORITIES IN E-GOVERNANCE RESEARCH PAPER SUBMITTED BY Lokesh Sharma   Ankita Prasad Contents Abstract 4 Introduction 4 Research Objective 8 Literature Review 9 Research Approach 10 Impact Assessment of various projects 11 Union Government MMPs 11 MCA21 11 Online Passport Services: 12 Online Income Tax 13 Pension 14 Banking 15 E-office 15 Central Excise 16 U.I.D 17 Insurance 17 State Government MMPs 18 Land Records 18 Road Transport 18 Agriculture 19 Police 19 Treasuries 19 Municipality 20 Commercial Taxes 21 Gram Panchayats 21 Employment Exchange 21 Integrated MMP 22 CSC 22 e-Courts 22 e-Trade 22 India Portal 23 National Service Delivery Gateway 23 e-Biz 23 e-Procurement 23 Prioritizing with respect to parameters 24 Conclusion 25 References 26 Abstract e-Governance is the form of interaction between government and citizens ,businesses and other arms of government using information technology .These technology can help government is fulfilling various needs like improved interaction between business and industries ,better delivery of services to citizens ,improved interactions with business and industry ,better...

Words: 6788 - Pages: 28