IT-FP3355_HinesJon_AssesmentNumber1-Attempt2

docx

School

Capella University *

*We aren’t endorsed by this school

Course

FP3355

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

9

Uploaded by JusticeTankTurtle22

Report
Assessment 1: Project Scope Jon Hines IT-FP3355 Network Architecture Capella University Professor Kuhlman 9-29-21
Table of Contents The Organization……………………………………………………………………..3 Project and Goals……………………………………………………………………..4 Stakeholders Roles……………………………………………………………………4 Network Diagram……………………………………………………………………..6 Project Timeline/Outline……………………………………………………..……….7 International and Cultural Concerns………………………………………………….7 References.…………………………………...……………………………………... 9
The Organization My project will consist of a healthcare system example, Christus Health. This is also my current employer. Christus expanses across multiple regions and into another state. I am going to focus on expanding into a new location within the Santa Rosa region. I began my career with Christus Health as a field technician I, then into a Senior Field technician role. I found an opportunity to move into an application analyst role and have learned how everything on the back end integrates to what users see in the field. My current role is based out of the data center and part of my duties are accessing servers to make necessary changes that affect users or entire services. Some of these servers affect the enterprise or just individual regions. In this scenario I will be adding a stand-alone clinic to the existing footprint of the core hospitals shown in the network diagram. Each of these had their own data connection back to the Christus ITC. This new location will need a new data connection to the ISP and since it will be a smaller site will need a slower connection due to the needs of that business addition. I worked on several projects during my time as a field technician and this has enabled me to learn more about how IT decisions are made depending on the business’s needs. This plays a role in how stakeholders interests determine technical decisions that will affect the business. The goals for individual locations in the business all have the same primary goal, to have a reliable enterprise network that is stable and have adequate wireless coverage for connected devices. In this paper it will discuss the requirements of the organization and goals of the business for growth as the enterprise network grows adding a location to its existing footprint.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Project and Goals The project in this scenario is to add another satellite facility to the existing network. This facility will be a new clinic that will be at a new location. This location will need a new connection to an ISP (circuit) and this will be pointed back to the Christus ITC for this new location to have secure network access that passes through a secure datacenter environment with access to the enterprise servers and firewalls. The location will have an IDF tied back to the data center via the circuit and then connected a router, then switches pointing back to the data center using a secure path. The location in this scenario does not need a generator due to the fact that the site is not an emergency facility, but will need to have proper UPS back up power devices installed in the IDF for the networking equipment and proper surge protections and prevent outages during short power interruptions. The UPS devices will allow the network to stay up during quick power outages allowing phones, switches and Wi-Fi access points to stay online. There needs to be enough reserve battery power for the amount of equipment in the IDF. Once the switch and networking equipment is programmed and pointed back to the data center this location will be ready to go live. Equipment can now be setup and should have network connectivity at this time. The overall goal is to make this new facility a go live a success. Stakeholders Roles As for stake holders in this project, they are the business itself, Christus health and anyone who stands to gain or lose in the success or failure of the project. Some of the stake holders to note in this would be the regional and corporate IT leadership, Physicians, Practice managers, nursing staff and anyone else that could have impacts either positive or negative with this go live. To
emphasize on stake holders there are two different types. From the resource for stake holders, I located on the internet, it states “There are two main types of stake holders in project management, internal and external.” Internal means what it sounds like, they are internal vested interests, teams, executives, managers and whoever in the scenario who either benefit from the success of this project. Not to mention there are external stake holders. This would be customers, users, suppliers and other outside organizations or people that will do business with this clinic expansion. Managing this project efficiently will be key to making sure that the internal and external stakeholders needs are met to their expectations. Prioritizing the stake holders is also critical in having a successful project. “Prioritizing your stake holders is important because it helps you understand where to invest your resources. In other words, it helps you – as the project manager – to identify who the key decision makers are at any given moment so you can ensure you’re talking to the right people, at the right time. (n.d.)” In this clinic expansion the main stakeholders would be the leadership in the ambulatory side of the clinics using the resources of a Regional Operations Manager, who has the ability to walk through the goals of the project ensuring all needs are documented. In our organization this is a key role or point of contact between the leaders on both sides. The regional operations manager (ROM) will make sure to include the practice manager, networking, telecom resources and all necessary individuals present to ensure the expectations are documented at that time. There will be additional stake holders down the line but these are the most critical ones that need to be involved with the setup and go live process. During this stage of the project, necessary contracts with vendors and planning with 3 rd party vendors can also begin. Equipment will be procured as the needs of the clinic are discussed at this stage with these primary stake holders. Equipment
locations and site planning can begin with this walkthrough with the project stakeholders at this time. Network Diagram
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Project Timeline/Outline The Christus organization will have to plan for this addition to be part of its existing network footprint using the network lifecycle phases. “In its simplest form, network lifecycle management consists of three phases: plan, build and manage. It is also known as design, implement and operate (DIO). The cycle is repeated as the plan phase identifies new requirements. The lifecycle process can also be applied to subtasks. (Slattery, T)” The overall budget will need to include what is needed for the planning stages for getting the network established at this new location. This includes getting a circuit installed from the telco, getting a router/switch and getting racks installed in the IDF or MDF. Since the core network for the enterprise already exists, this extension will need to be pointed and added to that end via a secure tunnel. There needs to be a technical project plan on this end to make sure all tasks are completed within the given timeline for the go live. This timeline will encompass tasks, milestones, responsibilities and financial resources. The timeline for this project is 3 months and should allow for a smooth go live once all the resource collaboration is done to extend the network to this site along with other necessary work. During the design, the business will decide what the technical requirements are needed for this project. From the networking standpoint and manage this once it’s in production. International and Cultural Concerns Cultural concerns with any project that utilizes technology will for sure bring up the digital divide. “The digital divide is the division that exists between those people who can use technology and are comfortable doing so, and those who are not. (N.D)” Another area to be
concerned with is that some people may not be as computer literate as others. This could be a clinician or staff member that would rather work on paper rather than on a computer and prefers that because of their lack of knowledge using computers and electronic charting. Younger people would be more inclined to use computer equipment due to the fact that they are more likely to be computer or electronic savvy. As an employer you would want to hire someone who has experience using computers to chart and be willing to use a computer at work. Just having basic IT skills could be a requirement to work for such an employer, they could make this a requirement to be employed. Some examples of using technology that may be more widely used by younger generations are tele-health appointments or using a tablet or mobile devices to register when arriving at a clinic or doctor’s office. With records being stored in an EMR, there are now portals that patients can login to access their healthcare data, this includes labs or charting data from their appointments and general health information. Up until Covid 19 healthcare was primarily something that was done in an actual doctor’s office setting and this has changed dramatically since this pandemic began. This actually made the technology that was already in place become more utilized. Tele-health has become very popular and prior to the pandemic was not widely utilized. The main concern on an international standpoint would be cyber security and ensuring that data or PHI is not compromised within the enterprise. An attack could easily either compromise data or be a ransom style type attack, locking the entire network down. Recently, there have been some very high-profile attacks recently and the biggest problem is there is no clear definition of a war crime regarding cyber-attacks with very little way to prosecute groups that carry them out. The current network already incorporates safeguards against these types of attacks.
References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help