Cover image for Wi-Fi enabled healthcare
Title:
Wi-Fi enabled healthcare
Personal Author:
Publication Information:
Boca Raton : CRC Press, Taylor & Francis Group, CRC Press in an imprint of the Taylor & Francis Group, an Informa Business, an Auerbach Book, 2014
Physical Description:
xviii, 282 pages : illustrations ; 24 cm.
ISBN:
9781466560406
General Note:
"A CRC title."

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010334287 R119.95 Y68 2014 Open Access Book Book
Searching...

On Order

Summary

Summary

Focusing on its recent proliferation in hospital systems, Wi-Fi Enabled Healthcare explains how Wi-Fi is transforming clinical work flows and infusing new life into the types of mobile devices being implemented in hospitals. Drawing on first-hand experiences from one of the largest healthcare systems in the United States, it covers the key areas associated with wireless network design, security, and support.

Reporting on cutting-edge developments and emerging standards in Wi-Fi technologies, the book explores security implications for each device type. It covers real-time location services and emerging trends in cloud-based wireless architecture. It also outlines several options and design consideration for employee wireless coverage, voice over wireless (including smart phones), mobile medical devices, and wireless guest services.

This book presents authoritative insight into the challenges that exist in adding Wi-Fi within a healthcare setting. It explores several solutions in each space along with design considerations and pros and cons. It also supplies an in-depth look at voice over wireless, mobile medical devices, and wireless guest services.

The authors provide readers with the technical knowhow required to ensure their systems provide the reliable, end-to-end communications necessary to surmount today's challenges and capitalize on new opportunities. The shared experience and lessons learned provide essential guidance for large and small healthcare organizations in the United States and around the world.

This book is an ideal reference for network design engineers and high-level hospital executives that are thinking about adding or improving upon Wi-Fi in their hospitals or hospital systems.


Author Notes

Ali Youssef is a Senior Network Architect specializing in mobility (CWNE #133) and digital health with over 18 years of design, strategy and operations experience. His passions include mHealth, patient engagement, patient experience, medical device design, and how IOT and mobile devices are transforming healthcare and improving clinical outcomes. Ali led the design, implementation, and ongoing support of one of the largest wireless networks in healthcare in North America. He speaks regularly at industry events like HIMSS, AAMI, CWNP, CTIA, IHP, and MDM&M, is an active member of the AAMI Wireless Strategy Task Force, and the chair for wireless technology for the Intelligent Hospital Association. He has authored several articles on topics ranging from network design to mobile medical device design, and a book entitled "Wi-Fi Enabled Healthcare."

Bob Zemke CPHIMS, CISSP is the Healthcare Solutions Manager at Extreme Networks and a member of the Association of Medical Instrumentation Wireless Strategy Task Force (WSTF). Bob has degrees in Telecommunications Management from Western Michigan University and a Master's degree in telecommunications and network management from Syracuse University's prestigious iSchool. An IT professional with a broad span of experience in healthcare, Bob has been practicing and consulting in healthcare IT for over 15 years of experience in network design, deployment and management for hospital organizations globally. You can reach Bob on twitter @bobzemke

Doug McDonald CPHIMS, CWSP is the Wireless Network Manager for Henry Ford Health System in Rochester Hills, Michigan. He is responsible for over 7 million square feet of hospital grade wireless Infrastructure. He holds a Bachelor's degree in Information Technology and Services Management from Michigan State University and is currently pursuing an Executive MBA at Oakland University. Doug has fifteen years of experience as an IT professional. A member on the mHIMSS task force and coauthor of the mHIMSS roadmap, he holds a number of certifications including CPHIMS, CWNA, CWSP, CWDP, and ITILV3. You can reach Doug on twitter @DougRMcDonald

Jon Linton CWNE #89 is a Senior Wireless Architect at Henry Ford Health System. He holds a BS in Management from Kettering University and is one of the first 100 Certified Wireless Experts in the CWNP organization. Jon also holds the ITILV3 certification. He has been active in publishing articles, presenting webinars and writing blog posts on all things Wi-Fi. You can reach Jon on twitter @wifisamuri

Aaron Earle CRISC, CISSP, CISA, CISM, CCNP, MCP, A+, Net+, and Security + has been securing computer and network systems for over a decade. In this time he has accumulated thirty five certifications and two corporations. Aaron Earle has been involved with System Auditing, Vulnerability Assessment, Security Architecture, and Corporate Policy Writing. Aaron is an avid speaker and instructor for many security organizations worldwide. He has taught for prestigious security organizations such as Computer Security Institute (CSI) and Information Systems Security Association (ISSA). Aaron has also instructed personnel from almost every United States three or four letter government agency including NSA, FBI, and DOD. Aaron Earle's talent has taken him around the world informing, educating, and safeguarding governments and companies alike. You can reach Aaron at aaronearle@aeecorp.com


Table of Contents

Forewordp. xiii
Prefacep. xvii
Chapter 1 Brief History of Wi-Fip. 1
History and Current Growth and Proliferation of Wi-Fi in Hospitalsp. 3
Regulatory Bodiesp. 10
Federal Communications Commissionp. 11
Institute of Electrical and Electronics Engineersp. 11
Wi-Fi Alliancep. 14
Core Programsp. 15
Optional Programsp. 15
International Organization for Standardizationp. 17
Wi-Fi Impacts on Clinical Workflowp. 17
mHealthp. 21
Endnotesp. 22
Chapter 2 Wireless Architecture Considerationsp. 23
About Wi-Fi Networksp. 23
The MAC Layerp. 24
Vendor-Specific Solutionsp. 25
Autonomous Architecturep. 26
Controller-Based Architecturesp. 27
Distributed Architecturep. 30
Medical Devicesp. 38
Medical Imagingp. 39
Wireless on Wheelsp. 41
Tablets and Smart Phonesp. 43
Bonjourp. 44
Chapter 3 Site Survey Processp. 47
Wireless Site Survey Processp. 47
Preparationp. 47
The Statement of Workp. 48
Facility Blueprintsp. 49
Pre-Survey Walkthroughp. 49
Design Considerationsp. 50
High-Capacity Designp. 51
Channel Planningp. 52
Multifloor Designsp. 53
Aestheticsp. 54
Augmenting Existing Designsp. 55
Upgrading Access Point Hardwarep. 55
Cablingp. 56
Network Infrastructurep. 56
Network Portsp. 57
Power Availabilityp. 57
Network Bandwidthp. 58
IP Address Availabilityp. 58
Survey Equipmentp. 58
Form Factorp. 60
Site Survey Design Softwarep. 61
Spectrum Analyzerp. 62
Survey Typesp. 62
Predictive Surveyp. 63
Passive Surveyp. 63
Active Surveyp. 64
Survey Techniquesp. 64
Site Survey Reportp. 65
Post-Validation Surveyp. 66
Chapter 4 Wireless Security Wi-Fip. 67
About Information Security and Wireless Networkingp. 67
Confidentialityp. 67
Availabilityp. 67
Integrityp. 68
Wireless Security Risks and Threatsp. 68
Denial of Servicep. 68
Malicious Codep. 69
Social Engineeringp. 70
Signal Analysisp. 70
Spoofingp. 71
Rogue Access Pointsp. 71
Wireless Hacking and Hackersp. 72
Motives of Wireless Hackersp. 73
War Drivingp. 73
Tracking War Driversp. 75
The Hacking Processp. 75
Information Gatheringp. 76
Enumerationp. 78
Compromisep. 79
Expanding Privileges and Accessibilityp. 79
Cleaning Up the Trailsp. 81
Service Set Identifierp. 82
Shared Key Authenticationp. 84
Open Key Authenticationp. 85
Wired Equivalent Privacy Standardp. 86
802.1xp. 87
Authentication Serverp. 88
Authenticatorp. 88
Supplicantp. 89
Extensive Authentication Protocol over Local Area Network (EAPOL)p. 89
Remote Authentication Dial-In User Service (RADIUS)p. 90
Extensible Authentication Protocolp. 93
EAP-MD5p. 95
EAP-TLSp. 95
EAP-TTLSp. 96
LEAPp. 96
PEAPp. 96
EAP-FASTp. 97
Wi-Fi Protected Accessp. 97
802.11ip. 99
Robust Secure Network (RSN)p. 101
Transition Secure Network (TSN)p. 104
Temporal Key Integrity Protocolp. 104
TKIP MICp. 106
Advance Encryption Standardp. 107
802-lli System Overviewp. 108
Wi-Fi Protected Accessp. 110
Rogue Access Points Detectionp. 110
Wireless Security Toolsp. 111
Scanning Toolsp. 112
Sniffing Toolsp. 113
Hybrid Toolsp. 114
Cracking Toolsp. 114
Access Point Attacking Toolsp. 114
Wireless Security Policy Areasp. 115
Pas sword Policyp. 116
Access Policyp. 118
Rogue Access Point Policyp. 118
Guest Access Policyp. 119
Remote WLAN Access Policyp. 120
Physical Securityp. 121
Wireless Monitoring and Security Incident Responsep. 122
HIPAA and Wi-Fip. 122
Chapter 5 Wireless Guest Servicesp. 129
Sponsored, Open Access, and Self-Enrollmentp. 130
Sponsored Guest Accessp. 130
Self-Enrollment Guest Accessp. 131
Open Accessp. 132
Captive Portal Page Typesp. 132
No Registration Splash Pagep. 133
Self-Registrationp. 134
Manual Registrationp. 134
Sponsored Registrationp. 135
Supporting Infrastructurep. 136
Revenue Generationp. 136
Bring Your Own Device (BYOD)p. 137
SCEPp. 143
Endnotesp. 143
Chapter 6 Mobile Medical Devicesp. 145
Functional Testingp. 153
Network Testingp. 154
Failover and Redundancy Testp. 154
Mobile X-Ray Machinesp. 155
Medication Dispensing Systemsp. 157
IV Pumpsp. 158
Electrocardiogram Cartsp. 160
Ultrasound Devicesp. 161
Blood Gas Analyzersp. 163
Hemodialysis Machinesp. 163
mHealthp. 165
Chapter 7 Voice over Wi-Fip. 167
Why VoWi-Fi?p. 167
The Challenges of VoWi-Fip. 168
Quality of Service Fundamentalsp. 172
Evolution of QoSp. 172
The Journey of a Voice Packetp. 173
What Happens at Phone Onep. 174
What Happens at the Access Pointp. 176
What Happens at Switch Onep. 177
What Happens at the Routerp. 177
Differentiated Servicesp. 177
802.1Q.p. 180
Anatomy of VoIPp. 181
The Anatomy of Codecsp. 183
Proprietary Protocolsp. 188
Wireless Arbitrationp. 190
Troubleshooting VoWi-Fip. 194
Roamingp. 199
Chapter 8 Real-Time Location Servicesp. 203
RTLS Technologiesp. 204
ZigBeep. 204
Wi-Fip. 204
Infraredp. 205
Ultrasoundp. 205
How RTLS Worksp. 205
Architecturep. 207
ISO/IEC Standardsp. 208
Different Types of Transmittersp. 208
Applicationsp. 208
Asset Managementp. 208
Equipment Rentalsp. 209
Shrinkagep. 210
Condition Monitoringp. 210
Patient and Clinician Safetyp. 210
Infection Controlp. 211
Workflowp. 212
RTLS Issuesp. 212
Privacy Concernsp. 212
Challenges with Accuracyp. 212
Maintenance and Costsp. 213
Chapter 9 The Wireless Project Management Processp. 215
Refining the Scopep. 217
Scheduling and Developing Milestonesp. 217
Developing a Budgetp. 218
Quality Assurancep. 218
Communication Strategyp. 219
Risk Managementp. 219
Change Managementp. 220
Closure Criteriap. 220
1 Identify Key Stakeholders and Set up a Kickoff Meetingp. 221
2 Perform an RFI and RFP to Choose a Wireless Vendorp. 221
3 Survey Network Closets for Port Capacity and POE Availabilityp. 222
4 Perform Predictive and Onsite Wireless Surveyp. 222
5 Develop Detailed Physical and Logical Architecturep. 224
6 Develop a Survey Report and Create a Cabling Bid Packagep. 225
7 Order Hardware and Consider Lead Times on the Project Planp. 226
8 Identify Third-Party Training Requirementsp. 226
9 Stage Hardwarep. 226
10 Oversee Installation and Turn-up of Wireless Network Using a Standard Change Management Processp. 227
11 Ensure that All Hardware Is Set up on the Enterprise Monitoring Systemp. 229
12 Validate Channel and Power Planp. 229
13 Conduct Post-Implementation Survey and Make Modifications as Neededp. 229
14 Perform UAT (Unit Acceptance Testing) Using Various Form Factors of End-User Devicesp. 229
15 Send a Series of Communications Outlining Offerings with Instructionsp. 230
16 Develop Helpdesk Knowledge Base for Common Troubleshootingp. 230
17 Create a Runbookp. 230
18 Handoff Support to Ongoing Operations Teamp. 231
19 Ensure that a Process is in Place for Onboarding and Certifying Wireless Devicesp. 231
Chapter 10 Support Considerations and Lifecyclep. 233
Tool Setp. 233
Protocol Analyzerp. 233
Voice Analyzerp. 234
Spectrum Analyzerp. 235
Site Survey Softwarep. 235
Performance Softwarep. 236
Packet Capturingp. 238
Wireless Intrusion Prevention Systems (WIPS)p. 239
Wireless Network Managementp. 240
Staffing Considerationsp. 240
Vendor Neutral Trainingp. 242
Software Tool Trainingp. 243
Wireless Manufacturer Trainingp. 243
Wireless Runbookp. 244
Policiesp. 244
Acceptable Usep. 244
Disaster Recoveryp. 244
Proceduresp. 245
Architecturep. 245
Systems Lifecyclep. 246
Routine Maintenancep. 246
Technical Supportp. 246
Tier 1

p. 247

Tier 2

p. 247

Tier 3

p. 248

Tier 4

p. 248

Infrastructure Code Upgradep. 249
End-User Device Considerationsp. 249
Lifecycle and Drivers for System Upgradesp. 250
Infrastructure Lifecyclep. 250
Client Device Lifecyclep. 251
Chapter 11 Emerging Trends and Technologiesp. 253
Demand for More Bandwidth and Denser Deploymentsp. 254
Device Densityp. 254
Evolution of the Electronic Medical Recordp. 254
Mobile Voice and Videop. 255
Guest Accessp. 255
Patient Engagement with Social Mediap. 256
Device Consolidationp. 257
Shrinking Herds of Carts on Wheels (CoWs) and Workstations on Wheels (WoWs)p. 259
Key Emerging Technologiesp. 259
IEEE 802.11acp. 260
Infrastructurep. 260
Client Devicesp. 260
Design and Planningp. 261
Policy Management and Software Defined Networking (SDN)p. 261
The Rise of the Smart Phonep. 262
Application Performance and Securityp. 262
IPv6p. 263
802.11u/Hotspot 2.0/Passpointp. 264
mHealthp. 265
Indexp. 267