Nt1330 Unit 4.1 Personal Server

Improved Essays
4.4.1 Personal Server
The personal server is responsible for interfacing and communicate with the medical server via the Internet, interfacing the WBAN sensors and fusing sensor data, and providing an intuitive graphical and/or audio interface to the end user. The personal server application can run on a variety of platforms with a variety of wide area network (WAN) access possibilities for Internet access. Platform selection is system specific and should be selected to minimize obtrusiveness for a given user [46]. The personal server needs ZigBee or Bluetooth capability for communicating within the WBAN; depending on the platform, this may be incorporated in the electronic device or setted as a separate plug in network coordinator (NC). The NC is
…show more content…
In the case of a static residential gateway or home personal computer implementation, the personal server may be connected directly to a broadband Internet connection. The patient authentication information is carried by the personal server and is configured with IP address or domain name of the medical server so that it can access services over the World Wide Web. The PS schedules upload of health monitoring session files and data at periodic intervals or defers transmission in the event an Internet connection is unavailable [46]. In such cases, the personal server may be unable to propagate indicators of serious changes in health status. Because processing is performed on the personal server and on sensor nodes, the system should be capable of recognizing abnormalities and alerting the user to potential threatening physiological conditions.
The individual server does the following responsibilities [47]:
• Initialization, configuration, and synchronization of WBAN nodes
• Monitor and controlling Control and monitor actions of WBAN

Related Documents

  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 1039 Words
    • 5 Pages

    Amazon 5 Bullet Points: MONITOR LOVED ONES OR PATIENTS REMOTELY: Receive instant alerts when a loved one or patient exits the chair to enabling you to provide immediate assistance to reduce falls and prevent injuries. EASY SET UP: Easy to use sensor pad connection is wireless for convenience and portability for use in different settings. Alarm is easily reset by reapplying pressure to the sensor pad or turning off the alarm setting. COMFORTABLE WATERPROOF PAD:…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6

    • 858 Words
    • 4 Pages

    Task-5 a) • Metals Metal structure is made up of crystals of metals which are made up of positive metal ions and these ions are surrounded by a sea of delocalized electrons. To separate these substances from this crystal lattice a lot of energy is needed. In between the positive and negative ions is present a strong electrostatic force of attraction. That is the reason why metals have strong melting and boiling points. In order to slide one layer of the metal ions over the other layer very less amount of energy is used.…

    • 858 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 2

    • 592 Words
    • 3 Pages

    I am a registered health information technologist. I am currently working on an Epic implementation as an analyst and trainer. All answers are based on my personal experience or my previous education unless denoted by in text citation. TASK: A. EXAMINE ELEMENTS OF THE VENDOR SELECTION PROCESS BY DOING THE FOLLOWING: 1.…

    • 592 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 2

    • 234 Words
    • 1 Pages

    1. Who will participate in the evaluation? The person that will participate in this evaluation is my cousin. 2.…

    • 234 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    -------------------------------------------------------------------------------- Security ( show explanationhide explanation ) This is a public or shared computer Select this option if you are connecting from a public computer. Be sure to log off and close all browser windows to end your session.…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    Microsoft was the one to develop Active Directory. Directory services are provided by Active Directory to windows domain network. It stores all the information related to files, users, resources and computers. It places them in proper hierarchal logical groupings. It uses this information to provide the right access and authority to the right user.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1

    • 360 Words
    • 2 Pages

    These days’ security is a critical factor of I.T whether it be protecting physical devices or information. What are some basic examples of ways to provide physical security for a server? What can be done about logical security? Security in the critical factor for everything related to internet.…

    • 360 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1320 Unit 7

    • 1110 Words
    • 5 Pages

    1. How is the Moon dependent on the Sun? The Moon is dependent on the Sun for its different lunar phases. Although these phases may not be essential to the existence of the Moon, they would not occur without the Sun.…

    • 1110 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 1907 Words
    • 8 Pages

    1. What is the phenomenon of interest and is it clearly stated for the reader? The phenomenon of interest was to examine resident’ and family member preference on care for pneumonia in a long-term care facility or a hospitalized setting. The phenomenon was clearly stated in the article.…

    • 1907 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4

    • 634 Words
    • 3 Pages

    1. How do the various types of scores differ regarding the information they provide? Scores provide feedback to teachers and students and reflect how a student is learning, meeting objectives, and achievement level. Raw scores are actual scores calculated by the sum of total correct answers or percentage and provide criterion-referenced information about a student’s performance.…

    • 634 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 781 Words
    • 4 Pages

    Describe the responsibility of the medical office specialist to protect all protected health information (PHI). When it comes to protecting patient information, it’s about getting employees to understand how to best protect it and what to do if there is a data breach. Training is essential and should include not only administrative employees, like medical office specialist, but also doctors, nurses, and other clinicians throughout the organization. All employees with access to patient information need to have the understanding of how to maintain security protocols when it comes to patient care. Many clinicians tend to look at PHI breaches as simply an IT issue.…

    • 781 Words
    • 4 Pages
    Improved Essays