Free Essay

Netw320 W2

In: Computers and Technology

Submitted By ozone
Words 1759
Pages 8
NETW320 -- Converged Networks with Lab
Lab # 2 Title: Silent Suppression – Cont.
Procedure
Start OPNET Modeler
Open the scenario
1. Select File/Open.
2. Select Project.
3. Open your f: drive. (Note: If you don’t see drive F: listed, you click on “My Computer or “Computer” first.)
4. Open your op_models directory.
5. Open your NETW 320 directory.
6. Open the Lab1_Silent.project folder.
7. Click on Lab1_Silent.prj.
8. Click OK. The project should open.
9. Choose Scenarios > Switch to Scenario > Silent_Suppression.

Results analysis
1. We are now ready to look at the results. From the tool bar, select DES > Results > View Results.
2. The Results Browser will appear. You may have to expand the items in the top left panel and click on them to get Global Statistics to appear in the bottom left panel. 3. Expand Global Statistics and select the following (4) statistics: Expand Select
DB Query Response Time (sec)
HTTP Page Response Time (sec)
E-mail Download Response Time (sec)
Voice Packet End-to-End Delay (sec)

4. You can adjust the size of the panels as you wish by hovering the cursor over the panel border until it changes to the adjust line cursor, and then hold the left mouse button to set the panel size.

5. Change the view from As Is to Time Average using the dropdown menu on the lower right-hand side. Remember, your results may not be exactly the same but they should be very similar. 6. Click Show. A graph similar to the following should appear. 7. The values for your graph many differ slightly, but overall they should be about the same as those pictured. If not, you must check your configurations before continuing, because we are going to duplicate this scenario and if you have errors in the current configurations, they will be copied over to the duplicate simulation.
Close out the graphs by clicking the X in the top right-hand side of the window. This panel should appear. 8. Just click the Delete button. We can always look at the graph again later if we choose to do so. Then close out the Results Browser.

Duplicating the scenarios
1. We now want to duplicate the scenario. In the second scenario, we are going to generate the same amount of data and VoIP traffic, but we will configure the VoIP traffic to use silent suppression.
2. Choose Scenarios > Duplicate Scenario.

3. An option menu will appear. Select the second option, Duplicate Scenario. A new screen will appear. The new screen will automatically assign the name of 1 after the present scenario name. Change it to something what is shown here. 4. Click OK. The scenario will duplicate into the new one with the new name in the top banner. Left-click on the Application Config node, and then right-click on it and select Edit Attributes.

5. Expand Application Definitions->Voice Traffic> Description. 6. Change the Voice Traffic configuration from IP Telephony to IP Telephony and Silence Suppressed.

7. Click OK to close the Application Configuration window. Go to File -> Save, to save the settings for your second scenario.
8. We are now ready to run our second simulation. Select Scenarios > Manage Scenarios.
9. We only need to run the second scenario since we ran the first scenario to test it. We have not changed any of the configurations in the first one. In the Results box next to the new scenario, change uncollected to . 10. Click OK. The second scenario will now run. It should take about three minutes or so to run. When it is finished running, close out the Simulation Sequence window.
11. We will now look at some of the results. From the tool bar, select DES >Results > View Results. In the Results Browser, note the small selector at the top of the left panels. Change Current Scenario to Current Project. You can now see the results from both scenarios in the left panels. Expand the trees until you see the view shown below.
Expand Select
DB Query Response Time 11. Once again, change the view from AS IS to time_average using the dropdown arrow next to AS IS. Also, change Stacked Statistics to Overlaid Statistics.

12. Click Show. 13. Note, your results do not have to match these exactly, but they should be very similar. You can use your mouse to zoom in on a graph once you are in the Show mode to get more granularity of a specific area, if you so desire. Zoom in on the second half of the graph in order to stay away from the start-up time oscillations.
Left-click your mouse and the graph, and draw a black box around the area you wish to zoom into. 14. When you release the mouse, you will have zoomed in. 15. Note, you can continue to zoom in as many times as you like if you feel it helps you read the statistical results better. Lab Report
You need to create a word document that answers the required questions. You must retype the questions in your lab report in order to make your answers very clear. Also, you should support your answers with graphical results. In most cases, you will be instructed to view the graph either As Is or Time Average, and it is also suggested that you might want to zoom in when necessary. However, please do not hesitate to include addition graphs in any view of your choice any time you feel those graphs may support your answer. Also, you are encouraged to use your textbook, the Internet, or any other reference material you feel will help you support your answers to the questions. However, make sure you reference any such materials at the end of your lab report.
Copying a graph to your Lab report: After you have clicked Show to view your graphical data, click anywhere on that specific graph, and then hit the (alt) and (prt scr) keys on your keyboard at the same time. If you now go to your Word document and select Edit –> Paste (or type Ctrl-V) from your tool bar, the graph will be pasted into your Word document. Some questions will require you to import specific graphs, but you should feel free to import graphical results anytime you feel it helps support your answer. Always make sure that you clearly label your graphs.
Required Lab Questions for NETW320, Silent Suppression
(This section is worth 75% of your grade for this lab.)
1. On the Results Browser, make sure you are on Current Project so you have both sets of results. Expand DB Query and Select DB Query Response Time (sec). Hit the Show button. Zoom into the last half portion of the graph for better granularity and to avoid start up oscillation time to stabilize. Copy and label this graph to your lab report and answer the following: 1. Which run has a better (lower) DB Query Response time? 2. In regard to your answer to part a, approximate how much faster (in seconds or milliseconds) of a response time the better scenario has.
2. Expand E-mail and select Download Response Time (sec). Select Show and zoom into the last half portion of the graph for better granularity and to avoid start up oscillation time to stabilize. Copy and label this graph to your lab report and answer the following: 3. Which run has a better (lower) e-mail Download Response time? 4. In regard to your answer to part a, approximate how much faster (in seconds or milliseconds) of a response time the better scenario has.
3. Expand HTTP and select Page Response Time (sec). Select Show and zoom into the last half portion of the graph for better granularity and to avoid start up oscillation time to stabilize. Copy and label this graph to your lab report and answer the following: 5. Which run has a better (lower) page response time? 6. In regard to your answer to part a, approximate how much faster (in seconds or milliseconds) of a response time the better scenario has.
4. Expand Voice and select Traffic Sent (bytes/sec). Change the view from AS IS to time_average. Copy and label this graph to your lab report and answer the following: 7. For the (2) runs used in this lab was the amount of Voice Traffic sent about the same? If not, which scenario sent more and by how much?
5. Expand Voice and select Traffic Received (bytes/sec). Change the view from AS IS to time_average. Copy and label this graph to your lab report and answer the following: 8. For the (2) runs used in this lab, was the amount of Voice Traffic received about the same? If not, which scenario received more and by how much?
6. Expand Voice and select Packet End-to-End Delay (sec). Hit the Show button. Zoom into the last half portion of the graph for better granularity and to avoid start up oscillation time to stabilize. Copy and label this graph to your lab report and answer the following: 9. Which run has a better (lower) Packet End-to-End Delay? 10. In regard to your answer to part a, approximate how much faster (in seconds or milliseconds) of an end-to-end delay the better scenario has.
7. Expand Voice and select Packet Delay Variation. Hit the show button. Zoom into the last half portion of the graph for better granularity and to avoid start up oscillation time to stabilize. Copy and label this graph to your lab report and answer the following: 11. Which run has a better (lower) Packet Delay Variation? 12. In regard to your answer to part a, approximate how much of an improved (in seconds or milliseconds) packet delay variation the better scenario has.

Required Lab Summary Report for NETW320, Silent Suppression (This section is worth 25% of your grade for this lab.)
Write a two-page Summary Report, and use the graphs you generated during this lab to support your analysis. Which graphs you decide to use is up to you. Your two-page summary report must answer the following:
1. For the network under analysis in this lab, what effect did implementing silent suppression have on the data traffic? Why?
2. For the network under analysis in this lab, what effect did implementing silent suppression have on the VoIP traffic? Why?
3. What would be a possible disadvantage to implementing silent suppression on a VoIP network?…...

Similar Documents

Free Essay

Netw320 Lab 5-6

...NETW320 Week 5 and week 6 – Asterisk* Lab Here You can see that the address is set and that the Ports are now active. And I can get a line for 3 seconds Using my windows phone but it doesn’t stay connected. I have now been working on getting tested with Chas from class This is the coding that I used to set up my Config line. I am still working on the configuration setup.This was taken out of the Red Hat Book. John's extensions.conf [general] static=no writeprotect=no autofallthrough=yes clearglobalvars=yes priorityjumping=no [globals] ; Incoming calls to these numbers will be routed to the specified peer. peer-5555551234 = SIP/mango peer-5555554321 = SIP/mangosteen ; Incoming calls to these numbers will be routed to the specified context. context-8775551234 = DISA-in,s,1 ; These names will override whatever is sent as the Caller ID Name for incoming calls. callerid-5555556789 = Joe Blow ; These are the peers outgoing calls may be routed through, in order. If one is unreachable, Asterisk will attempt to use the next one. outgoing-1 = VoIPmsUS3 outgoing-2 = Callcentric ; This is the password for use with DISA. ...

Words: 1252 - Pages: 6

Free Essay

Netw320 W3 Lab

...NETW320 -- Converged Networks with Lab Lab #3 Title: IPv4 TOS and Router Queuing Objectives In this lab, you will work with an intranet for an organization that will encompass four different site locations in different cities. The subnets of these locations will be connected by a backbone IP network. The organization will be using a converged network that allows data and real-time voice traffic to traverse the same packet-switched network. The data traffic will consist of FTP (file transfer protocol) and email traffic and the voice traffic will be a VoIP (Voice over Internet Protocol) implementation. You will experiment with various router queuing policies to see how routers within a TCP/IP network can be utilized to support QoS (Quality of Service) within a converged network that is based on TCP/IP. Explanation and Background Traditional voice and data applications have been kept on separate networks. The voice traffic is confined to a circuit-switched network while data traffic is on a packet-switched network. Often, businesses keep these networks in separate rooms, or on different floors, within buildings that they own or lease (and many still do). This requires a lot of additional space and technical manpower to maintain these two distinct infrastructures. Today’s networks call for the convergence of these circuit-switching and packet-switching networks, such that voice and data traffic will traverse a common network based on packet switching. A common WAN......

Words: 2956 - Pages: 12

Free Essay

Comp230 W2 Lab

...Student Name | xx | Class | COMP-230 | Date | 9-2012 | VBScript IPO VBox Lab Report ' VBScript: NameAge.vbs ' Written by: xx ' Date: 9-2012 ' Class: Comp230 ' Professor:xx ' Create name and age variables name = "" ageStr = "" ' Promt User for Name and Age WScript.StdOut.Write("Please Enter your Full Name ") name = WScript.StdIn.ReadLine() Wscript.StdOut.WriteLine() 'Skip 1 Line WScript.StdOut.WriteLine("Please Enter your age ") ageStr = WScript.StdIn.ReadLine() ageStr10 = CStr( CInt(ageStr)+10 ) ' Display Name and age Value WScript.StdOut.WriteBlankLines(2) 'Skip 2 Lines WScript.StdOut.WriteLine("Your Name is " & vbtab & vbtab & name) WScript.StdOut.WriteLine("Your Age is " & vbtab & vbtab & ageStr) WScript.StdOut.WriteLine("Your Age in 10 years is ......" & _ AgeStr10 & vbcrlf) WScript.StdOut.WriteLine("End of Program") ' VBScript: NameAge.vbs ' Written by: xx ' Date: 9-2012 ' Class: Comp230 ' Professor:xx ' Create name and age variables name = "" ageStr = "" ' Promt User for Name and Age WScript.StdOut.Write("Please Enter your Full Name ") name = WScript.StdIn.ReadLine() Wscript.StdOut.WriteLine() 'Skip 1 Line WScript.StdOut.WriteLine("Please Enter your age ") ageStr = WScript.StdIn.ReadLine() ageStr10 = CStr( CInt(ageStr)+10 ) ' Display Name and age Value WScript.StdOut.WriteBlankLines(2) 'Skip 2 Lines WScript.StdOut.WriteLine("Your Name is " & vbtab & vbtab &......

Words: 1091 - Pages: 5

Premium Essay

Netw320

...iLab Grading Rubric Category | Points | Description | Project 4-1: Compute RF Behavior (page 152) 25 points * Step 4 Calculation * Step 11 Calculation * Step 15 Calculation * Step 17 Calculation * Step 19 Calculation * Summary of RF Behavior | 2 2 2 2 2 15 | Calculate each of the five measurements in the project.In your own words, summarize what you have learned concerning RF behavior from your calculations, readings, and research. | Case Project 4-3: MIMO (page 156) 25 points * Introduction * Advantages/Disadvantages * Applications * Future | 55510 | Discuss MIMO antenna technology, including history, advantages, disadvantages, current applications, and future. | Total | 50 | A quality paper will meet or exceed all of the above requirements. | Deliverables IMPORTANT: A report template is provided beginning on the next page, and you must use it to submit your assignment. Before submitting your assignment, delete the pages containing the instruction and rubric. Your submitted assignment should begin with the title page and only contain your report. Don’t forget to place your name, your professor’s name, and the date on the title page. Week 2 iLab Report Francisco Santoya DeVry University NETW360: Wireless Technologies and Services COMPUTE RF BEHAVIOR AND MIMO Submitted to: Professor: Jalinous Date: 9/11/13 Compute RF Behavior Calculate each of the five measurements in the project by performing......

Words: 727 - Pages: 3

Free Essay

Bsa 375 W2

...Fundamentals of Business Systems Development BSA/375 3/14/2012 The success of an organization is mostly dependent on the workforce employed and there is a need for an effective HR system. The use of information technology in HR provides automation of the services. Management can easily obtain data on their employees. The development of HR system requires the collaboration of all the stakeholders to ensure that it will be to the best interest to the management and the employees. This paper expounds on the process of identifying requirements, design methodology, scope and feasibility for the development of HR system. Human resource management comprises the activities that govern the organization’s workforce to ensure maximum productivity and success. The HR system should be structured into three components: strategic planning, operational management, and administrative management. In developing a system for human resources, the components and their respective functions are considered. The overall functions that are to be included in a human resources information system are: recruitment of new staff, training of new and existing staff, performance management, labor relations, employee relations, job analysis, job design, payment structure, benefits allocation, employee development, and incentives (NMA, 2008). The role of HR administrative and operational structures is to improve efficiency in handling information for the employees and their activities. Information system......

Words: 1279 - Pages: 6

Free Essay

Bussines Regulations W2

...Bussines Regulation/ Torts and Liability Diomedes Gonzales Ramos LAW/421 17 de octubre de 2013 Jesus Rivera-Delgado Bussines Regulation/ Torts and Liability Aprender a reconocer situaciones en las que un negocio o empresa puede tener la responsabilidad potencial de otra parte, es una parte importante de la limitación de riesgo en las operaciones comerciales. La ley de responsabilidad se establece determinando la conducta y las normas de razonabilidad y proporcionan recursos legales cuando una violación de esas normas resulta en una lesión que cause pérdidas. En este ensayo pretendo discutir los principios fundamentales de la ley de responsabilidad civil, y los tipos de agravios. Utilizare como referencia la reglamentación del gobierno de las actividades comerciales, y la responsabilidad de dueños de establecimientos comerciales por concepto de daños a tenor con algunos casos del Supremo de Puerto Rico El agravio es un ilícito civil cuando una parte ha actuado, o en algunos casos no ha actuado, y que la acción u omisión causa una pérdida que sufrió un tercero. La ley dispone un remedio para alguien que ha sufrido una lesión al obligar al infractor a pagar una indemnización a la parte lesionada. El derecho por daños se entiende mejor como un intento de compensar a los perjudicados o pérdidas derivadas de daños causados ​​por una conducta irracional por otro. En la mayor parte, la responsabilidad extracontractual se rige por los principios del derecho común del......

Words: 1238 - Pages: 5

Premium Essay

Netw320

...Cedric Clinton NETW320 Professor: Steve Gonzales Lab Report week2 1. On the Results Browser, make sure you are on Current Project so you have both sets of results. Expand DB Query and Select DB Query Response Time (sec). Hit the Show button. Zoom into the last half portion of the graph for better granularity and to avoid start up oscillation time to stabilize. Copy and label this graph to your lab report and answer the following: 1.) Which run has a better (lower) DB Query Response time? The scenario that runs the silence suppression (red line on my lab) has the best DB query response time. 2.) In regard to your answer to part a, approximate how much faster (in seconds or milliseconds) of a response time the better scenario has. The faster scenario that runs silence suppression is approximately 0.2 seconds faster. 2. Expand E-mail and select Download Response Time (sec). Select Show and zoom into the last half portion of the graph for better granularity and to avoid start up oscillation time to stabilize. Copy and label this graph to your lab report and answer the following: 3.) Which run has a better (lower) e-mail Download Response time? The scenario that runs the silence suppression (red line on my lab) has the lower email download response time. 4.) In regard to your answer to part a, approximate how much faster (in seconds or milliseconds) of a response time the better scenario has. The scenario that runs silence suppression is......

Words: 1098 - Pages: 5

Premium Essay

Bus412 W2

...In searching the web I came across a few articles that spoke to the JC Penny Company Inc. somewhat recent change in business strategy and the effects it has had with their customer base and business overall. In February of 2012, JC Penny launched an entirely new pricing strategy for their department stores where they were going to introduce a new technique titled “Fair and Square” pricing. This approach would basically do away with seasonal/impromptu sales along with the use of coupons. Instead their pricing on products in the stores and online were going to be at an everyday low price. In conjunction with this strategy, the retailer was going to introduce new brands to their retail store fronts (i.e. “Martha Stewart and l'amour nanette lepore”) which include a store within a store concept further distinguishing and separating the products/brands within their stores. Further detail can be referenced via the following link:http://ir.jcpenney.com/phoenix.zhtml?c=70528&p=irolnewsCompanyArticle&ID=1652614&highlight. Although these changes seemed positive and progressive at first, once implemented it had quite an adverse effect on their business overall and as a result sales have continued to suffer going into early 2013. In fact, when fourth quarter sales information was released, it showed JC Penny department sales being down 32% year over year. (Blodget, 2013. Para. 2). It was apparent that there was a disconnect between the company’s newly implemented changes/vision,......

Words: 531 - Pages: 3

Premium Essay

Hum176 W2

...University of Phoenix Material Media Convergence Worksheet Write brief 250- to 300-word answers to each of the following: |Questions |Answers | |What is meant by the term media |The term media convergence with regard to technology means that it involves merging of | |convergence with regard to technology, |technology through various different outlets. The most popular and available are the | |and how has it affected everyday life? |internet outlets.  This is the most popular and effective at carrying information to the | | |masses because technology is advancing everyday and changing to make devices and people | | |more dependent on the internet. These changes are also causing a demand for people to | | |learn how to use them properly. The problem with the internet method of relaying | | |information is that you have to use these devices and know how to do so to receive your | | |information. The internet has put new devices at higher demand and there are even classes | | |on how to use devices so people do not get lost in our ever changing time.  There are | | ...

Words: 1204 - Pages: 5

Free Essay

Netw320 Wk 5 Rtp Report

...RTP – short for Real-time Transport Protocol defines a standard packet format for delivering audio and video over the internet. It is defined in RFC 1889. It was developed by the Audio Video Transport Working group and was first published in 1996. RTP is used extensively in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications, television services and web-based push-to-talk features. RTP is an end-to-end transfer of data in real-time. What this means is that data is sent from the server to the client(s) and is in actual time. Imagine something like Internet radio which is audio only, but there should be few lapses in the transmission since the data is usually buffered. A buffer is when data is stored in memory and played from memory. The buffer may allow for a few seconds of stored information before playing. Some applications can allow for setting the buffer amount. RTP is used in conjunction with the RTP Control Protocol (RTCP). While RTP carries the media streams (e.g., audio and video), RTCP is used to monitor transmission statistics and quality of service (QoS) and aids synchronization of multiple streams. RTP is originated and received on even port numbers and the associated RTCP communication uses the next higher odd port number. RTP is one of the foundations of VoIP and it is used in conjunction with SIP which assists in setting up the connections across the network. The Real-Time Transport......

Words: 604 - Pages: 3

Premium Essay

W2 Security

...Information Security Detroit Hospital Security Breach CMGT441 John Ebel May 18, 2014 Information Security Detroit Hospital Security Breach      Security breaches can be a detrimental to any company, especially if the breach brings out sensitive information belonging to individuals. Sensitive information is as simple as a name, dates of birth, personal records, or any other type of personal information that is able to be used by someone to defraud any other individual or a business. The impacts of such a security breach like the one that occurred at the Henry Ford Health Systems hospital in Detroit, Michigan when a laptop was used to store data that was compiled on a spreadsheet that was not encrypted. This is just one example, though there were a few incidents at this hospital where data was stolen. Incident Background     A laptop was stolen from an office at the Henry Ford Health System hospital, the laptop did contain password protection software but it was standard protection that could easily be broken by anyone that knew their way around a computer slightly. The information on the laptop didn’t include social security or health insurance information, but it did have “patient names, medical record numbers, dates of birth, telephone numbers, e-mail addresses, and treatment and doctor visits” (Moscaritolo, 2010, p. 1). The laptop is thought to have had about 4,000 patient’s information, and all records were related to services that were done over the past eleven...

Words: 948 - Pages: 4

Premium Essay

Cja W2

...Keishla M. Del Valle Marrero University of Phoenix CJA/394 - Contemporary Issues and Futures in Criminal Justice Week 2 December 22, 2014 Prof. Hector Garcia An organizational structure determines how the roles, power and responsibilities, controlled and coordinated, and how information flows between different levels of management are assigned. A structure depends on the objectives and strategy of the organization. In a centralized structure, the top layer of management has the most power of decision and has tight control over the departments and divisions, is where he takes the situation as a last resort for one last final word. In a decentralized structure, decision-making power is distributed and departments and divisions may have different degrees of independence. A company like Procter & Gamble sells multiple products can organize their structure so that the groups are divided according to each product and depending on the geographical area as well. Police organizations respond to the crime after it happens and in an organized manner starting with a routine patrol called in by radio where they visit the location reported for a possible intervention or arrest. In the division of tasks for the police first start with the patrol, then a call to action, intervention or arrest, investigation and then share the information which can all throw by one or more agents as simultaneously if it would be customer service outside the police offered by an agent according to...

Words: 1206 - Pages: 5

Premium Essay

Netw320-Course Project

...Course Project (80 points) QoS Design and Implementation 1. Objectives As a network engineer working for a Service Provider, design and implement QoS on a converged network. For this project it is assumed that the converged network offers triple play services and has the following traffic: VOIP, High Definition TV (HDTV), Video on Demand (VOD) and Internet. Note 1: The project is based on the experience acquired by the students in the previous labs, hence the main sources to complete the project are the labs of previous weeks, so it is important that the students review the lab instructions of the labs that have already been completed. Note 2: The students will have access to the same lab equipment of Skillsoft as the previous weeks. The students will need to access the iLab to complete the project. 2. Project Requirements Part A: Design In this part the student should provide the QoS design. A1. It is assumed that the traffic sources for HDTV, VOD, VOIP and Internet are connected to switch NYCORE1 to four different ports. The following are the requirements: (10 points) * Assign a switch port to each type of traffic. * Assign a COS to each type of traffic. The COS marking has 8 classes, from 0 to 7, assuming 0 is the lowest priority and 7 is the highest. Decide which class each traffic should have, based on the importance of the traffic. * Provide your answers in the form of the table below: Traffic Type | Switch Port Number | COS | VOIP |...

Words: 1330 - Pages: 6

Free Essay

Communication and Collaboration Strategy Worksheet Gen/200 W2

...Communication and Collaboration Strategy Worksheet GEN/200 W2 Based off your results of the Multiple Pathways to Learning Assessment, and the Personality Spectrum Assessment, located in week 2 of your materials page, address the each of the following statements. Each response should be written in full sentence format with 5-7 sentences minimum length. Identify your strongest learning style and discuss the advantages and disadvantages of working with others who have the same learning style. A: My strongest learning style was a tie between Bodily-Kinesthetic and Interpersonal. I feel that being strong in two areas rather than one area allows me to adapt to others learning style. Being Bodily-Kinesthetic can be an advantage when learning with things that require hands on activities, but can be a disadvantage if I am learning is a classroom environment which requires me to strictly learn out of a book and classroom discussion. Being Interpersonal has its advantages that allows me to work well with others. I like working in groups and University of Phoenix classes are focused on group work which will benefit me. The disadvantages to being interpersonal is sometimes I lack the motivation to complete my work because I do not have other people pushing me to complete my part of an assignment. Discuss how knowing your learning style can help you to work with others who have different learning styles in a team environment. A: Being Interpersonal allows me to work......

Words: 502 - Pages: 3

Premium Essay

Hsm 541 W2 You Decide

...HSM 541: Week 2 – You Decide Middlefield Hospital has been a great healthcare facility to the Middlefield area. Middlefield Hospital consists of a 450-bed tertiary facility in a major urban area in the Northeast. The hospital is an integrated health system that provides the full array of inpatient and outpatient services. The hospital enjoys a reputation of quality care in the area. In recent years, there are areas of concern that need to be addressed. As I have been assigned the position as the new Chief Executive Officer (CEO) of Middlefield Hospital, I will provide strategies and recommendations needed for implementation to turnaround the hospital into a more positive experience not only for the patients but for the employees as well. My approach will implement a triad of care – access, cost, and quality. Middlefield Hospital has been a key staple within our market area of Middlefield. The hospital was able to build another facility on the other side of town. The new hospital offers much better facilities and the technology is state of the art. While visiting the new hospital, I noticed that the staff appeared much more invested in the quality of patient care and the patients also seem happier. As with new facilities, there comes lots of excitement. The quality of our old facility needs to be upgraded and needs some new type of organization. There needs to be a balance of power so that the new hospital is able to start performing better. This lies within the hospital......

Words: 729 - Pages: 3

Аудиокниги на иностранных языках | [ Zobacz cały opis... ] | Jumanji Bienvenidos a La Jungl.. BluRay-Screeener