Here is the synopsis of our sample research paper on PATTON-FULLER AND IT. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 4-page paper discusses Patton-Fuller's information technology system and open systems interconnections. Bibliography lists 3 sources.
Page Count:
4 pages (~225 words per page)
File: AS43_MTpattfulit.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
to the Patton-Fuller case study, the hospitals IT structure is supported by 100 BaseT (though individual sections of departmental networks, such as Radiology, rely on different standards such as 100
BaseF). Furthermore, the entire hospital has a complete power backup system, as well as automatic cutover to a disease motor generator set.
Data is transmitted internally through an Ethernet connection served, as mentioned above, by 1000 BaseF. Servers are Apple Cluster servicers, that run MAC OS Leopard Xserve, with remote desktops that
run PACs. The standard data center workstation contains an iMac, wit 2.4 GHz, 2 GB of RAM and a 350 MB hard drive. On the imaging side, Apple MAC PROs
are used. Meanwhile, on the external side, the IT data center handles information and data through an IBM Series Z9EC mainframe server, which
is driven by a Linux operating system. Various routers and servers (again, IBM-based) link information to the Internet. Whats interesting to note in this example is that internal and external
data are handled by two separate servers - and even two separate brands of servers, both with different operating systems. This may not be the most efficient way of transmitting
data both within the organization, or to external stakeholders. What OSI layers are directly involved? In the standard OSI model, there are
seven layers. The physical layer handles the media used to deliver information (as well as the signal used); the data link provides the data link/physical addressing and the network encompasses
the path direction and determination. Transport, in the meantime, involves end-to-end connections, while presentation is the encryption area. Finally, we have application, which applies the network process to the applications.
...