Wi-Fi Enabled Healthcare.
Main Author: | |
---|---|
Other Authors: | , , , |
Format: | eBook |
Language: | English |
Published: |
Milton :
Auerbach Publishers, Incorporated,
2014.
|
Edition: | 1st ed. |
Subjects: | |
Online Access: | Click to View |
Table of Contents:
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Foreword
- Preface
- Chapter 1 Brief History of Wi-Fi
- History and Current Growth and Proliferation of Wi-Fi in Hospitals
- Regulatory Bodies
- Federal Communications Commission
- Institute of Electrical and Electronics Engineers
- Wi-Fi Alliance
- Core Programs
- Optional Programs
- International Organization for Standardization
- Wi-Fi Impacts on Clinical Workflow
- mHealth
- Endnotes
- Chapter 2 Wireless Architecture Considerations
- About Wi-Fi Networks
- The MAC Layer
- Vendor-Specific Solutions
- Autonomous Architecture
- Controller-Based Architectures
- Distributed Architecture
- Medical Devices
- Medical Imaging
- Wireless on Wheels
- Tablets and Smart Phones
- Bonjour
- Chapter 3 Site Survey Process
- Wireless Site Survey Process
- Preparation
- The Statement of Work
- Facility Blueprints
- Pre-Survey Walkthrough
- Design Considerations
- High-Capacity Design
- Channel Planning
- Multifloor Designs
- Aesthetics
- Augmenting Existing Designs
- Upgrading Access Point Hardware
- Cabling
- Network Infrastructure
- Network Ports
- Power Availability
- Network Bandwidth
- IP Address Availability
- Survey Equipment
- Form Factor
- Site Survey Design Software
- Spectrum Analyzer
- Survey Types
- Predictive Survey
- Passive Survey
- Active Survey
- Survey Techniques
- Site Survey Report
- Post-Validation Survey
- Chapter 4 Wireless Security Wi-Fi
- About Information Security and Wireless Networking
- Confidentiality
- Availability
- Integrity
- Wireless Security Risks and Threats
- Denial of Service
- Malicious Code
- Social Engineering
- Signal Analysis
- Spoofing
- Rogue Access Points
- Wireless Hacking and Hackers
- Motives of Wireless Hackers
- War Driving
- Tracking War Drivers.
- The Hacking Process
- Information Gathering
- Enumeration
- Compromise
- Expanding Privileges and Accessibility
- Cleaning Up the Trails
- Service Set Identifier
- Shared Key Authentication
- Open Key Authentication
- Wired Equivalent Privacy Standard
- 802.1x
- Authentication Server
- Authenticator
- Supplicant
- Extensive Authentication Protocol over Local Area Network (EAPOL)
- Remote Authentication Dial-In User Service (RADIUS)
- Extensible Authentication Protocol
- EAP-MD5
- EAP-TLS
- EAP-TTLS
- LEAP
- PEAP
- EAP-FAST
- Wi-Fi Protected Access
- 802.11i
- Robust Secure Network (RSN)
- Transition Secure Network (TSN)
- Temporal Key Integrity Protocol
- TKIP MIC
- Advance Encryption Standard
- 802.11i System Overview
- Wi-Fi Protected Access
- Rogue Access Points Detection
- Wireless Security Tools
- Scanning Tools
- Sniffing Tools
- Hybrid Tools
- Cracking Tools
- Access Point Attacking Tools
- Wireless Security Policy Areas
- Password Policy
- Access Policy
- Rogue Access Point Policy
- Guest Access Policy
- Remote WLAN Access Policy
- Physical Security
- Wireless Monitoring and Security Incident Response
- HIPAA and Wi-Fi
- Chapter 5 Wireless Guest Services
- Sponsored, Open Access, and Self-Enrollment
- Sponsored Guest Access
- Self-Enrollment Guest Access
- Open Access
- Captive Portal Page Types
- No Registration Splash Page
- Self-Registration
- Manual Registration
- Sponsored Registration
- Supporting Infrastructure
- Revenue Generation
- Bring Your Own Device (BYOD)
- SCEP
- Endnotes
- Chapter 6 Mobile Medical Devices
- Functional Testing
- Network Testing
- Failover and Redundancy Test
- Mobile X-Ray Machines
- Medication Dispensing Systems
- IV Pumps
- Electrocardiogram Carts
- Ultrasound Devices
- Blood Gas Analyzers
- Hemodialysis Machines
- mHealth.
- Chapter 7 Voice over Wi-Fi
- Why VoWi-Fi?
- The Challenges of VoWi-Fi
- Quality of Service Fundamentals
- Evolution of QoS
- The Journey of a Voice Packet
- What Happens at Phone One
- What Happens at the Access Point
- What Happens at Switch One
- What Happens at the Router
- Differentiated Services
- 802.1Q
- Anatomy of VoIP
- The Anatomy of Codecs
- Proprietary Protocols
- Wireless Arbitration
- Troubleshooting VoWi-Fi
- Roaming
- Chapter 8 Real-Time Location Services
- RTLS Technologies
- ZigBee
- Wi-Fi
- Infrared
- Ultrasound
- How RTLS Works
- Architecture
- ISO/IEC Standards
- Different Types of Transmitters
- Applications
- Asset Management
- Equipment Rentals
- Shrinkage
- Condition Monitoring
- Patient and Clinician Safety
- Infection Control
- Workflow
- RTLS Issues
- Privacy Concerns
- Challenges with Accuracy
- Maintenance and Costs
- Chapter 9 The Wireless Project Management Process
- Refining the Scope
- Scheduling and Developing Milestones
- Developing a Budget
- Quality Assurance
- Communication Strategy
- Risk Management
- Change Management
- Closure Criteria
- 1. Identify Key Stakeholders and Set up a Kickoff Meeting
- 2. Perform an RFI and RFP to Choose a Wireless Vendor
- 3. Survey Network Closets for Port Capacity and POE Availability
- 4. Perform Predictive and Onsite Wireless Survey
- 5. Develop Detailed Physical and Logical Architecture
- 6. Develop a Survey Report and Create a Cabling Bid Package
- 7. Order Hardware and Consider Lead Times on the Project Plan
- 8. Identify Third-Party Training Requirements
- 9. Stage Hardware
- 10. Oversee Installation and Turn-up of Wireless Network Using a Standard Change Management Process
- 11. Ensure that All Hardware Is Set up on the Enterprise Monitoring System
- 12. Validate Channel and Power Plan.
- 13. Conduct Post-Implementation Survey and Make Modifications as Needed
- 14. Perform UAT (Unit Acceptance Testing) Using Various Form Factors of End-User Devices
- 15. Send a Series of Communications Outlining Offerings with Instructions
- 16. Develop Helpdesk Knowledge Base for Common Troubleshooting
- 17. Create a Runbook
- 18. Handoff Support to Ongoing Operations Team
- 19. Ensure that a Process is in Place for Onboarding and Certifying Wireless Devices
- Chapter 10 Support Considerations and Lifecycle
- Tool Set
- Protocol Analyzer
- Voice Analyzer
- Spectrum Analyzer
- Site Survey Software
- Performance Software
- Packet Capturing
- Wireless Intrusion Prevention Systems (WIPS)
- Wireless Network Management
- Staffing Considerations
- Vendor Neutral Training
- Software Tool Training
- Wireless Manufacturer Training
- Wireless Runbook
- Policies
- Acceptable Use
- Disaster Recovery
- Procedures
- Architecture
- Systems Lifecycle
- Routine Maintenance
- Technical Support
- Tier 1
- Tier 2
- Tier 3
- Tier 4
- Infrastructure Code Upgrade
- End-User Device Considerations
- Lifecycle and Drivers for System Upgrades
- Infrastructure Lifecycle
- Client Device Lifecycle
- Chapter 11 Emerging Trends and Technologies
- Demand for More Bandwidth and Denser Deployments
- Device Density
- Evolution of the Electronic Medical Record
- Mobile Voice and Video
- Guest Access
- Patient Engagement with Social Media
- Device Consolidation
- Shrinking Herds of Carts on Wheels (CoWs) and Workstations on Wheels (WoWs)
- Key Emerging Technologies
- IEEE 802.11ac
- Infrastructure
- Client Devices
- Design and Planning
- Policy Management and Software Defined Networking (SDN)
- The Rise of the Smart Phone
- Application Performance and Security
- IPv6
- 802.11u/Hotspot 2.0/Passpoint
- mHealth
- Index.