Professional Documents
Culture Documents
Page 0
EXECUTIVE SUMMARY
We as networking professionals advise firm that delivers well thought out business plans
based on statistics, research, and organization. We propose that the company (known as Dream
Care General Hospital) should take the following five critical points into consideration:
It should also be noted that we take a pride in our research of perfect solutions to business
needs. We incorporate the closest attention to detail and only suggest the best product based on
quality for our companies services. The same can be said for our policies which we construct and
develop around our customized networks.
After gathering information about various products and services, as well as Dream Care
General Hospital’s business plan and layout, we have the following policies prepared to enhance
connectivity, organization, and overall productivity…
Page 1
ORGANIZATION LAYOUT
Currently, the Hospital facilities do not meet the requirements of modern network
standards. Due to the tremendous risk involved with Hospital needs of connectivity and
maintenance, we have prepared a new layout of logical and physical topologies that will fulfill
the Hospital’s need of 99.9% connection uptime, full scale office range, security, and back-up
capability.
The current setup of Dream Care General Hospital has no any network access. The wired
users are made up of the manager, pharmacist, 10 specialist doctors, HR, OPD, finance, nurses,
Public Outreach, Medical Supplies, Medical Records, Counseling, an Office general service
officer, Receptionist and other various support personnel. Together these make up all of the staff
that work and collaborate together to operate Dream Care General Hospital’s datacenter and
Hospital building.
The network starts off with four server boxes that will be located within the datacenter
across the street from the hospital. Two servers will run at all times, as the primary server and the
remaining two are as a backup. The backups will thoroughly copy everything within the network
every weekend, as well as store files that have been manipulated after a day’s work through
Differentiation. The backup servers will also be available to kick in and take over the task of
primary servers if the primary servers ever fail for any reason. This setup will allow Dream Care
General Hospital to have high hardware failure tolerance which will in the end make server or
network downtime non-existent.
These four servers will connect to main-Switch 1, which are connected to Router1.
Router1 is hardwired to a trunk line form of the Internet. Through the internet, the datacenter will
allow its information to be accessed by the Hospital facility via Virtual Private Networking
(VPN). The VPN allows Router1 to connect to Router2, which is located in the hospital and is
also hooked up to a trunk line form of the Internet. It should be noted Router2 is connected to
main switch2, which will allow the router1 and Router2 to connect to each other if the Internet
connectivity ever fails, thus giving Dream Care General hospital a high tolerance for connection
failure.
With this network setup, Dream Care General Hospital will have a star topology with
easy failure justification, troubleshooting, and efficiency. The main network of the facility will
function through the Internet VPN, allowing personnel to access the Hospital’s network offsite
and conduct project file collaboration. The direct connection P2P WAP will serve simply as a
Page 2
backup that will only be turned on if the Internet connection fails for any reason. With this
information flow, Dream Care General Hospital will be more efficient, productive, and have zero
connection failure or time loss.
Page 3
HARDWARE AND WIRING
The following are the proposed hardware and network wiring configurations that we find
will suffice Dream Care General Hospital’s Needs…
The server is a very important element of a business’s network; it is the sole brain and
computing device that dictates the information flow of the network. Therefore, it is very
important to Dream Care General Hospital’s interest that they use top of the line servers. A
trustworthy manufacturer with a good warranty that can support their hardware at any given time
is a need in the medical field. We have decided to go with CISCO brand server to support Dream
Care General Hospital’s new network based on their reputation, services, and high standard
products.
The model we have chosen is the Cisco UCS® C480 ML M5 Rack Server based on its
efficient infrastructure, quick task completion, and high reviews. After contacting CISCO, they
recommended this system because it will fulfill all of Dream Care General Hospital’s
requirements of server needs. This hardware features “Go-Green” technology which allows for
utility savings and energy efficiency, room for growth, security, and the newest system
management tools. Both the primary and backup servers, ALPHA and BRAVO, will be of this
hardware specification. It should also be noted that both servers will run Windows Server 2003
for easy workstation and device calibration.
Page 4
Power supplies Hot-pluggable, redundant 1600W AC
Integrated dual 10-Gbps Ethernet Increased network I/O performance and
additional network options
Table 1 server specification
When looking for a provider of routing and switching devices, one can trust no one more
than Cisco Networking Systems. They provide the best in device warranties, support, price,
durability, and function. Their systems are known worldwide and would serve well under Dream
Care General Hospital’s command. Their networking infrastructures are superior technologies
that integrate all network devices and operating standards together. Dream Care General Hospital
needs a total of two P2P WAP routers, two Internet connectivity routers, seven WAP routers, and
five total layer3 switches.
The models of Cisco devices we have decided to go with are Basic 5GHz Complete Wireless
Bridge Kit (1/2 mile LOS) for the P2P WAP, two Cisco RV320 Dual Gigabit WAN VPN Router
for the Internet/VPN connection, 24 Port 10/100btx 2- GBIC Ports DC-Pwrd STD Multilayer
SW for the multiple switches needs, and Cisco Aironet 1552S Outdoor Access Point for the
WAPs required throughout the network. All of these devices allow room for expansion, multiple
device connectivity with ease, and simple troubleshooting. These are all top of the line and come
with full warranties and support.
Dream Care General Hospital has the need for 200 workstations for the various wired
users, as well as 104 workstations for the college. We have decided to go with HP workstations
for the network environment based on their low costs, reliability, and superior tech support. If a
HP computer ever fails under warranty, HP will send out a representative to fix the problem as
soon as possible, which is highly valuable in the high risk Hospital environment. The model we
have decided to go with is the HP LV2011 20. We also prefer Kyocera FS-1220MFP multi
function printer.
Workstation Table 2:
Hardware Specification
Processor: Intel™ Core®2 Quad Q6600
(2.40GHz/1066MHz/2X4MB L2) 375W
Operating System: Genuine Windows 7
Warranty & Services: 3 Year Warranty and 3 Year NBD On-Site
Chavesis Configuration: Mini-Tower Chavesis Configuration
Memory: 2GB, 667MHz, DDR2 SDRAM Memory,
NECC (2 DIMMS)
Optical Drive: 16X DVD+/-RW w/ Cyberlink PowerDVD™
and Roxio Creator™ Dell Ed
Hard Drive: 80GB SATA 3.0Gb/s with NCQ and 8MB
DataBurst Cache™
Monitor
File System: NTFS File System
Page 5
System Documentation: Resource DVD - contains Diagnostics and
Drivers
Video Card: 256MB PCIe x16 nVidia Quadro FX570, Dual
Monitor DVI Capable
Printer type Paper Print RAM Processor Noise Weight Max duty
capacity speed speed level cycle
A4 Mono 250 sheets Up to 20 64 MB 390 MHz Up to 8.7 kg 20,000
Multifunction ppm 50 db pages /
Laser Printer month
Table 3 printer specification
As far as Dream Care General Hospital’s need for cabling, the network will need over 1000, 000
feet of total cable that will allow little to no interference, and must have the durability to
withstand the test of time of data flow and ever changing environment conditions. Dream Care
General Hospital have zero tolerance for connectivity failure due to the high risk operations
involved, so we have decided to utilize 24 gauge shielded CAT6. Having shielded cabling will
cut out interference of all other radio frequencies and disturbances throughout the Hospital
environment.
The final hardware and devices that Dream Care General Hospital should be concerned
with purchasing for the network infrastructure are disaster recovery devices. All of the
workstations, servers, and important devices will need backup batteries to support the systems
for a short period of down time for events such as power flickers or outages. The Cyber Power
Cp600LCD 340W backup utilities will fit this job well due to their long battery life and cheap
price. Also, since power failure could be a life threatening situation, we suggest the purchase of a
backup generator capable of powering the Hospital facilities for a long amount of time. This will
allow a large window of time for the fixing of the power or for management and staff to organize
an evacuation. The Elite 100 kW Generator by Guardian is a reliable, quick, efficient, and well
supported product that will keep the Dream Care General Hospital facilities fully functional
during a power crisis.
BUDGET
The following is the budget of the hardware and devices that we propose to implement
within Dream Care General Hospital’s facilities…
Page 6
Budget Table 4:
Quantity of Items Hardware/Devices Price
X4 Cisco UCS® C480 ML M5 $5500 Each
Rack Server
x30 Cyber Power Cp600LCD $30 Each
340W
x1 Guardian Elite 100 kW $18,800 Each
Generator
x6 1000000ft Shielded CAT6 $170 Each
Cable
x1 Basic 5GHz Complete $1000 Each
Wireless Bridge Kit (1/2 mile
LOS)
X7 Cisco Aironet 1552S Outdoor $500 Each
Access Point
IP INFORMATION
Page 7
The following specified information is in regards to Dream Care General Hospital’s new network
infrastructure IP addresses…
We have decided to go with a Class B IP address, 172.16.0.1, due to the fact that a class C
may not contain enough hosts for all of the connected clients. A Class C will only allow up to a
maximum of 254 total available hosts for the network, therefore, we proposes the use of a Class
B to allow 510 available hosts on one network. Dream Care General Hospital’s network will use
this Class B IP and internal NAT subnetting to communicate the network designated IPs to the
global network IPs, 90.44.22.5 and 90.44.22.6.
Page 8
Table 5 IP addressing
Page 9
The rest of the IPs, ranging from 172.16.0.32 to 172.16.1.254, will allow up to four hundred
and seventy-seven dynamic IPs left for connecting hosts on the network for use. These will be
designated to the three hundred four wired workstations, and other devices connected to the network.
VLAN INFORMATION
The following table generalizes information about VLAN and type of users that access the
corresponding VLAN.
Number Name Users /offices Number of hosts
1 Blood bank area
2 OPD
3 Nurse
4 Admin area
5 F P area
6 Reception area
7 Student
8 Registrar area
9 Dean office area
10 Nursing
12 Accounting
NETWORK POLICIES
The following are the guidelines and policies pertaining to DREAM CARE
GENERALHOSPITAL’s network that we believe fit to keep consistent integrity throughout the
workspace…
Email Policy
1.0 Purpose
The purpose is to prevent tarnishing of the public image of DREAM CARE GENERALHOSPITAL.
When email goes out from DREAM CARE GENERALHOSPITAL, the general public will tend to
view that message as an official policy statement from the DREAM CARE GENERALHOSPITAL.
2.0 Scope
This policy covers appropriate use of any email sent from an DREAM CARE GENERALHOSPITAL
email address and applies to all employees, vendors, and agents operating on behalf of DREAM CARE
GENERALHOSPITAL.
3.0 Policy
3.1 Prohibited Use. The DREAM CARE GENERALHOSPITAL email system shall not to be used for
the creation or distribution of any disruptive or offensive messages, including offensive comments
about race, gender, hair color, disabilities, age, sexual orientation, pornography, religious beliefs and
practice, political beliefs, or national origin. Employees who receive any emails with this content from
any DREAM CARE GENERALHOSPITAL employee should report the matter to their supervisor
immediately.
3.3 Monitoring
DREAM CARE GENERALHOSPITAL employees shall have no expectation of privacy in anything
they store, send or receive on the company’s email system. DREAM CARE GENERALHOSPITAL
may monitor messages without prior notice, but is not obliged to monitor email messages.
4.0 Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up to and
including termination of employment.
5.0 Definitions
Email - The electronic transmission of information through a mail protocol.
SMTP or IMAP - Typical email clients include Eudora and Microsoft Outlook.
Forwarded Email - Email resent from an internal network to an outside point.
Chain Email or Letter - Email sent to successive people. Typically the body of the note have direction
to send out multiple copies of the note and promises good luck or money if the direction is followed.
Sensitive Information - Information is considered sensitive if it can be damaging to DREAM CARE
GENERALHOSPITAL or its customers' reputation or market standing.
Virus Warning - Email containing warnings about virus or malware. The overwhelming majority of
these emails turn out to be a hoax and contain bogus information usually intent only on frightening or
misleading users.
Unauthorized Disclosure - The intentional or unintentional revealing of restricted information to
people, both inside and outside Dream Care General Hospital, who do not have a need to know that
information.
2.0 Scope
All equipment or devices owned and/or operated by DREAM CARE GENERALHOSPITAL (including
hosts, routers, switches, etc.) and/or registered in any Domain Name System (DNS) domain owned by
DREAM CARE GENERALHOSPITAL, must follow this policy. This policy also covers any host
device outsourced or hosted at external/third-party service providers, if that equipment resides in the
"DREAM CARE GENERALHOSPITAL.com" domain or appears to be owned by DREAM CARE
GENERALHOSPITAL. All new equipment which falls under the scope of this policy must be
configured according to the referenced configuration documents, unless a waiver is obtained from
InfoSec. All existing and future equipment deployed on DREAM CARE GENERALHOSPITAL's un-
trusted networks must comply with this policy.
3.0 Policy
3.1. Ownership and Responsibilities
Equipment and applications within the scope of this policy must be administered by support groups
approved by InfoSec for system, application, and/or network management.
Support groups will be responsible for the following:
Equipment must be documented in the corporate wide enterprise management system. At a
minimum, the following information is required:
o Host contacts and location.
o Hardware and operating system/version.
o Main functions and applications.
o Password groups for privileged passwords.
Network interfaces must have appropriate Domain Name Server records (minimum of A and
PTR records).
Password groups must be maintained in accordance with the corporate wide password
management system/process.
Immediate access to equipment and system logs must be granted to members of InfoSec upon
demand, per the Audit Policy.
Changes to existing equipment and deployment of new equipment must follow and corporate
governess or change management processes/procedures.
To verify compliance with this policy, InfoSec will periodically audit equipment per the Audit Policy.
4.0 Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up to and
including termination of employment. External service providers found to have violated this policy
may be subject to financial penalties, up to and including termination of contract.
5.0 Definitions
Terms Definitions
Secure Channel - Out-of-band console management or channels using strong encryption according to
the Acceptable Encryption Policy. Non-encrypted channels must use strong user authentication (one-
time passwords).
Un-Trusted Network - Any network firewalled off from the corporate network to avoid impairment of
production resources from irregular network traffic (lab networks), unauthorized access (partner
networks, the Internet etc.), or anything else identified as a potential threat to those resources.
The Information Security Department must approve exceptions to this policy in advance.
4.0 Enforcement
An employee found to have violated this policy may be subject to disciplinary action, up to and
including termination of employment. A violation of this policy by a temporary worker, contractor or
vendor may result in the termination of their contract or assignment with DREAM CARE
GENERALHOSPITAL.
5.0 Definitions
DREAM CARE GENERALHOSPITAL Network – A wired or wireless network, including indoor,
outdoor, and alpha networks that provide connectivity to corporate services.
Corporate Connectivity – A connection that provides access to an DREAM CARE
GENERALHOSPITAL network.
Information Assets – Information that is collected or produced and the underlying hardware, software,
services, systems, and technology that is necessary for obtaining, storing, using, and securing that
information which is recognized as important and valuable to an organization.
MAC Address – The MAC address is a hardware number that uniquely identifies each node on a
network and is required for every port or device that connects to the network
DREAM CARE GENERALHOSPITAL Naming Conventions
1.0 Overview
The purpose of this policy is to ensure that network components are named with the same standards.
DREAM CARE GENERALHOSPITAL have many different networking components and for the IT
department to quickly and effectively diagnose problems, the components must have a naming
convention so that IT employees can find them quickly.
2.0 Scope
This policy mainly affects Information Technology Department personnel. Said employees must abide
by all of DREAM CARE GENERALHOSPITAL's naming conventions. This policy applies to all
network hardware including but not limited to servers, workstations, routers, WAPs, etc.
3.0 Policy
3.1 Server Conventions
DREAM CARE GENERALHOSPITAL have two servers, the primary and the secondary. The primary
server is named Alpha and the secondary is Bravo.
4.0 Definitions
WAP – Wireless Access Point. These are used throughout the DREAM CARE GENERALHOSPITAL
for the wireless network.
Server – Computer that serves files and services to the HOSPITAL's network.
SECURITY POLICIES
Scope
This policy applies to all DREAM CARE GENERALHOSPITAL personnel who administer, manage,
maintain, or use DREAM CARE GENERALHOSPITAL’s IT resources, their supervisors, and their
unit administrators. It applies to all locations of those resources, whether on site or from remote
locations.
Objective
This policy statement is intended to support appropriate and effective use of information technology
(IT) resources at the DREAM CARE GENERALHOSPITAL, while providing guidelines for allowable
use.
1.2 Access
1.2.1: Accounts are to be made only by management
1.2.2: No user is to create, modify, execute or retransmit any computer program or instructions to gain
unauthorized access to the DREAM CARE GENERALHOSPITAL.
1.2.3: Personal devices are not to be used to spy on activities of others is strictly forbidden.
1.2.4: Attempts to degrade the performance of the DREAM CARE GENERALHOSPITAL’s
technology systems are prohibited.
1.2.5: Users are to refrain from controlling systems, overloading networks with excessive data, disk
space and other information technology resources.
5.2 Scope
This affects all users of computer systems and networks responsible for the management and use of
encryption keys.
8.2 Actions
8.2.1: Each department or major organizational unit must have a designated Departmental Security
Coordinator (DSC). The function of the DSC is to communicate and coordinate access to
administrative systems for employees in that department.
8.3 Responsibilities
8.3.1: Teaching new employees the basics of terminal usage--signing on, changing passwords and
locating keys.
8.3.2: Instructing new employees regarding data access, security and confidentiality and having them
review the DREAM CARE GENERALHOSPITAL Data Access.
8.3.3: Impressing upon all users, new and existing, the necessity for preserving confidentiality of
DREAM CARE GENERALHOSPITAL’s data.
8.3.4: Ensuring users periodically change their passwords. Especially, if they suspect someone else that
might know it.
8.3.5: Encouraging users to sign-off their terminal anytime they leave it unattended, or activating a
password protected screen saver.
9.2 Actions
9.2.1: Each department or major organizational unit must have a designated Departmental Security
Coordinator (DSC). The function of the DSC is to communicate and coordinate access to
administrative systems for employees in their department as follows:
9.2.1.2: To request new user-ids or authorization for departmental employees to access On-line
Administrative Systems files, the DSC should complete and sign the Request for On-line user-id and
Administrative System Access form and mail to AIS.
9.2.1.3: Authorized file access can be granted only by the appropriate Application Security Manager
(ASM). Each ASM will contact the DSC to discuss specific access and update authority to be granted
users.
11.0 Documentation
11.1 Purpose
The security risk to DREAM CARE GENERALHOSPITAL’s data is also related to the stability and
reliability of the associated administrative systems and applications, which in turn, is related to the
quality and accessibility of the technical documentation of those systems and applications.
11.2 Actions
The level of detail required within such documentation is a function of the size, complexity and
criticality of the system/application. System or application documentation should be viewed as "work
in progress" and evolutionary, and thus must be constantly revised and updated throughout the life
cycle of the system/application.
11.2.1: In keeping with paperwork reduction objectives, and to facilitate documentation currency, it is
desirable that administrative system/application documentation, to the maximum degree possible, be
maintained on-line.
11.2.2: Although no specific format can address all cases, documentation of critical and sensitive
administrative systems and applications should, as a minimum, include:
11.2.2.1: Business case/analysis, or process description,
11.2.2.2: System description/design/architecture,
11.2.2.3: Data/database design and dictionary,
11.2.2.4: Programming logic, programmer notes, and
11.2.2.5: Operational procedures and help
12.2 Scope
This policy applies to all wireless network devices utilizing DREAM CARE GENERALHOSPITAL IP
space and all users of such devices, and governs all wireless connections to the company’s network
backbone, frequency allocation, network assignment, registration in the Domain Name System, and
services provided over wireless connections to the company’s network backbone.
12.3 Guidelines
12.3.1: Wireless equipment and users must follow all network connection policies set forth.
12.3.2: Interference or disruption of other authorized communications that result from the intentional or
incidental misuse or misapplication of wireless network radio frequency spectrum is prohibited.
12.3.3: Wireless access points must abide by all federal, state, and local laws, rules or regulations
pertaining to wireless networks.
12.3.4: Wireless access points shall require user authentication at the access point before granting
access to Internet services.
12.3.5: Wireless passwords and data must be encrypted.
12.3.6: Wireless networks must be designed and deployed to avoid physical and logical interference
between components of different network segments and other equipment.
12.3.7: Institutional Security Office (ISO) will attempt to resolve any interference or security incidents
by coordinating with the registered Point of Contact (POC) for the wireless network.
12.3.8: Any wireless network that poses a security threat may be disconnected from the company’s
backbone network.
13.0 Physical Security
13.1 Purpose
A balanced security program must include a solid physical security foundation. A solid physical
security foundation protects and preserves information, physical assets, and human assets by reducing
the exposure to various physical threats that can produce a disruption or denial of computer service.
Managers are responsible for ensuring that corporate information assets under their control are properly
protected through the implementation of cost-effective physical security measures.
13.2 Responsibilities
13.2.1 The manager in charge of a computer facility that operates any platform computer system is
responsible for providing adequate physical protection of computer equipment and data media.
13.2.2 All the DREAM CARE GENERALHOSPITAL users are responsible for securing their access
unit from unauthorized use. Whenever a user is away from his or her access unit during the day, he or
she must protect the DREAM CARE GENERALHOSPITAL information assets by either logging off
of the computer, or activating a password protected screen saver.
13.2.3 At the end of the workday, each user is required to log off of his or her access unit.
13.2.4 DREAM CARE GENERALHOSPITAL offices and building shall have normal physical security
controls in place. Areas should be designed having limited accessibility with personnel access
controlled by a biometric hand scanner.
Every business, regardless of location, should have a backup plan. The following is the Disaster
Recovery Plan (DRP) that wehave found that DREAM CARE GENERALHOSPITAL should
envelop…
JEM’s disaster recovery plan produces solutions for a wide variety of problems for the
preparation of natural or man-made disasters that DREAM CARE GENERALHOSPITAL may be
viable to. To completely protect our data entirely, as well as add a secondary backup for DREAM
CARE GENERALHOSPITAL’s data, WEhave chosen CA ARCserve for the hot site. It is an integrated
package including the CA ARCserve Backup base product, a client agent for high-performance backup,
two CA XOsoft WANSyncHA licenses for continuous data protection, replication and failover to a
replica server, plus CA XOsoft Assured Recover to test and verify the recoverability of DREAM CARE
GENERALHOSPITAL’s backup. During the consideration process, WEfocused the majority of the
time on adhering to the Recovery Time and Recovery Point Objectives. The CA ARCerve solution
delivers the ability to align information protection with business requirements across the full range of
data protection needs for both the speed of recovery and maximum allowable data loss which meets
DREAM CARE GENERALHOSPITAL’s needs in case of an uncontrollable disaster. This system
utilizes not only the function of tape storage, but disk storage as well. They provide extended protection
capabilities for a server using continuous data protection, replication, and fail-over combined with
guaranteed high-performance. They support multiple operating systems in case of changes in hardware
as well, making calibration smooth and effortless.
Objectives:
The objective of this policy is to enhance the operational capabilities all information technology
resources, i.e. hardware, software and personnel that support the critical missions of the state in the
event of a natural or
man-made disaster.
Scope:
This policy applies to the data center.
Actions:
1. In case of a natural disaster, such as a hurricane, floods, wild fires, if there is server damage, or
servers cannot be access by the administrator, backups will be used for access to the same
material that would be backed up every night.
2. Immediately contact all managers and advise them of the situation and status.
3. Actions to be taken are to access back up and implement them as soon as possible without
exceeding Recovery Time Objective time.
4. Backups will be updated every night by Differential backup.
5. All backups must conform to the following best practice procedures:
5.1: All data, operating systems, and utility files must be adequately and systematically backed
up. (Ensure this includes all patches, fixes and updates).
5.2: Records of what is backed up and to where must be maintained.
5.3: Records of software licensing should be backed up.
5.4: The backup media must be precisely labeled and accurate records must be maintained of
back-ups done and to which back-up set they belong.
5.5: Copies of the back-up media, together with the back-up record, should be stored safely in a
remote location, at a sufficient distance away, to escape any damage from a disaster at the main
site.
5.6: Regular tests of restoring data/software from the backup copies should be undertaken, to
ensure that they can be relied upon for use in an emergency.
6. In case of security breach or malicious code is places on hardware immediate shut down of
infected
server is to take place. Backup will replace the primary server before server shut down for no
down time.
6.1: Shut down of servers will include full wipe of all files and a clean install will be necessary.
6.2: Possible capture of malicious code will be sent to government agencies for inspection.
7. UPS will be placed on all machines using building power. In case of power outage the UPS will
provide sufficient power for the time the generator will kick in.
7.1: UPS will be tested every 4 months. This will ensure all UPS are working. Tests need to be
documented every time test is issued.
8. Disk/ Fault tolerance will be handled by a RAID system of 0 + 1; this system will be striped
mirrored disks. Data is striped across multiple mirrored disks. Failure of any one disk causes no
data loss and no speed loss. Failure of a second disk could result in data loss. This is faster than
a single disk for both reads and writes.
Enforcement:
Policy 100-00: Disaster Recovery
Reporting
DREAM CARE GENERALHOSPITAL will be required to submit annual disaster recovery
plans along with documentation of all test exercises.
DATAGRAM
The following are the diagram of the logical and physical topologies that meets standards
of networking solutions.