Virtualization and the Funding Problems in Developing Countries: A Case Study of a Network Simulation of a Hospital Environment Constructed Virtually
PDF
PDF

How to Cite

Bartla, Gargis, Jihaad Okda, and Nadia Abd-Alsabour. 2024. “Virtualization and the Funding Problems in Developing Countries: A Case Study of a Network Simulation of a Hospital Environment Constructed Virtually”. Recent Research Reviews Journal 3 (1): 183-207. https://doi.org/10.36548/rrrj.2024.1.013.

Keywords

— Virtualization Technology
— Virtual Networks
— Virtualization Software
— VMware Workstation
— Real-Time Monitoring
— Centralized Management
— Hospital Management System
— Hospital Network Simulation Sharing
— Security
— Low Budget
— Small Companies
Published: 29-06-2024

Abstract

A virtual machine utilizes software instead of a computer to install and run programs. Virtualization software establishes an abstract layer on top of the machine hardware, which allows the hardware components of this single machine to be divided into many virtual computers. In this article, a network simulation of a hospital environment is built virtually. With some modifications, it can be adapted elsewhere. Here, the objective is to obtain the best features at the lowest cost. The constructed virtual network will be used by the hospital staff, the IT department, the patients, and the visitors. A hospital network is simulated by hosting two Windows servers on a VMware workstation application, with two Windows 10 clients as virtual machine applications. A VMware virtual switch is used to create a network between them. This virtual network system provides a variety of important and essential network functions needed by any hospital or an emerging organization at low cost, such as data sharing, user access restrictions, system policies resources, a security system, a network monitoring system, a mail server, a backup solution, and a centralized management.

References

  1. Stallings, W., Operating Systems: Internals and Design Principles, 9th Edition, Pearson, 2018
  2. https://www.vmware.com/in/products/workstation-pro/workstation-pro-evaluation.html
  3. https://docs.vmware.com/en/VMware-Workstation-Pro/16.0/workstation-pro-16-user-guide.pdf
  4. https://docs.microsoft.com/en-us/learn/modules/implement-group-policy-objects/2-define-gpos
  5. https://docs.microsoft.com/en-us/exchange/exchange-server-2013-exchange-2013-help
  6. https://www.spiceworks.com/it-articles/network-monitoring/
  7. https://www.spiceworks.com/it-articles/network-monitor-success/
  8. https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html
  9. https://www.wireshark.org/download/docs/Wireshark%20User%27s%20Guide.pdf
  10. https://helpcenter.veeam.com/docs/backup/vsphere/install_vbr.html?ver=110
  11. https://parablu.com/demystifying-data-backups-types-of-backups/
  12. https://www.realvnc.com/en/
  13. https://discover.realvnc.com/what-is-vnc-remote-access-technology
  14. https://docs.microsoft.com/en-us/iis/web-hosting/configuring-servers-in-the-windows-web-platform/configuring-share-and-ntfs-permissions