Wi-Fi Enabled Healthcare.

By: Youssef, AliContributor(s): McDonald II, Douglas | Linton, Jon | Zemke, Bob | Earle, AaronMaterial type: TextTextPublisher: Milton : Auerbach Publishers, Incorporated, 2014Copyright date: �2014Edition: 1st edDescription: 1 online resource (301 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9781000218701Genre/Form: Electronic books.Additional physical formats: Print version:: Wi-Fi Enabled HealthcareDDC classification: 610.285 LOC classification: R119.95.W545 2014ebOnline resources: Click to View
Contents:
Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- Chapter 1 Brief History of Wi-Fi -- History and Current Growth and Proliferation of Wi-Fi in Hospitals -- Regulatory Bodies -- Federal Communications Commission -- Institute of Electrical and Electronics Engineers -- Wi-Fi Alliance -- Core Programs -- Optional Programs -- International Organization for Standardization -- Wi-Fi Impacts on Clinical Workflow -- mHealth -- Endnotes -- Chapter 2 Wireless Architecture Considerations -- About Wi-Fi Networks -- The MAC Layer -- Vendor-Specific Solutions -- Autonomous Architecture -- Controller-Based Architectures -- Distributed Architecture -- Medical Devices -- Medical Imaging -- Wireless on Wheels -- Tablets and Smart Phones -- Bonjour -- Chapter 3 Site Survey Process -- Wireless Site Survey Process -- Preparation -- The Statement of Work -- Facility Blueprints -- Pre-Survey Walkthrough -- Design Considerations -- High-Capacity Design -- Channel Planning -- Multifloor Designs -- Aesthetics -- Augmenting Existing Designs -- Upgrading Access Point Hardware -- Cabling -- Network Infrastructure -- Network Ports -- Power Availability -- Network Bandwidth -- IP Address Availability -- Survey Equipment -- Form Factor -- Site Survey Design Software -- Spectrum Analyzer -- Survey Types -- Predictive Survey -- Passive Survey -- Active Survey -- Survey Techniques -- Site Survey Report -- Post-Validation Survey -- Chapter 4 Wireless Security Wi-Fi -- About Information Security and Wireless Networking -- Confidentiality -- Availability -- Integrity -- Wireless Security Risks and Threats -- Denial of Service -- Malicious Code -- Social Engineering -- Signal Analysis -- Spoofing -- Rogue Access Points -- Wireless Hacking and Hackers -- Motives of Wireless Hackers -- War Driving -- Tracking War Drivers.
The Hacking Process -- Information Gathering -- Enumeration -- Compromise -- Expanding Privileges and Accessibility -- Cleaning Up the Trails -- Service Set Identifier -- Shared Key Authentication -- Open Key Authentication -- Wired Equivalent Privacy Standard -- 802.1x -- Authentication Server -- Authenticator -- Supplicant -- Extensive Authentication Protocol over Local Area Network (EAPOL) -- Remote Authentication Dial-In User Service (RADIUS) -- Extensible Authentication Protocol -- EAP-MD5 -- EAP-TLS -- EAP-TTLS -- LEAP -- PEAP -- EAP-FAST -- Wi-Fi Protected Access -- 802.11i -- Robust Secure Network (RSN) -- Transition Secure Network (TSN) -- Temporal Key Integrity Protocol -- TKIP MIC -- Advance Encryption Standard -- 802.11i System Overview -- Wi-Fi Protected Access -- Rogue Access Points Detection -- Wireless Security Tools -- Scanning Tools -- Sniffing Tools -- Hybrid Tools -- Cracking Tools -- Access Point Attacking Tools -- Wireless Security Policy Areas -- Password Policy -- Access Policy -- Rogue Access Point Policy -- Guest Access Policy -- Remote WLAN Access Policy -- Physical Security -- Wireless Monitoring and Security Incident Response -- HIPAA and Wi-Fi -- Chapter 5 Wireless Guest Services -- Sponsored, Open Access, and Self-Enrollment -- Sponsored Guest Access -- Self-Enrollment Guest Access -- Open Access -- Captive Portal Page Types -- No Registration Splash Page -- Self-Registration -- Manual Registration -- Sponsored Registration -- Supporting Infrastructure -- Revenue Generation -- Bring Your Own Device (BYOD) -- SCEP -- Endnotes -- Chapter 6 Mobile Medical Devices -- Functional Testing -- Network Testing -- Failover and Redundancy Test -- Mobile X-Ray Machines -- Medication Dispensing Systems -- IV Pumps -- Electrocardiogram Carts -- Ultrasound Devices -- Blood Gas Analyzers -- Hemodialysis Machines -- mHealth.
Chapter 7 Voice over Wi-Fi -- Why VoWi-Fi? -- The Challenges of VoWi-Fi -- Quality of Service Fundamentals -- Evolution of QoS -- The Journey of a Voice Packet -- What Happens at Phone One -- What Happens at the Access Point -- What Happens at Switch One -- What Happens at the Router -- Differentiated Services -- 802.1Q -- Anatomy of VoIP -- The Anatomy of Codecs -- Proprietary Protocols -- Wireless Arbitration -- Troubleshooting VoWi-Fi -- Roaming -- Chapter 8 Real-Time Location Services -- RTLS Technologies -- ZigBee -- Wi-Fi -- Infrared -- Ultrasound -- How RTLS Works -- Architecture -- ISO/IEC Standards -- Different Types of Transmitters -- Applications -- Asset Management -- Equipment Rentals -- Shrinkage -- Condition Monitoring -- Patient and Clinician Safety -- Infection Control -- Workflow -- RTLS Issues -- Privacy Concerns -- Challenges with Accuracy -- Maintenance and Costs -- Chapter 9 The Wireless Project Management Process -- Refining the Scope -- Scheduling and Developing Milestones -- Developing a Budget -- Quality Assurance -- Communication Strategy -- Risk Management -- Change Management -- Closure Criteria -- 1. Identify Key Stakeholders and Set up a Kickoff Meeting -- 2. Perform an RFI and RFP to Choose a Wireless Vendor -- 3. Survey Network Closets for Port Capacity and POE Availability -- 4. Perform Predictive and Onsite Wireless Survey -- 5. Develop Detailed Physical and Logical Architecture -- 6. Develop a Survey Report and Create a Cabling Bid Package -- 7. Order Hardware and Consider Lead Times on the Project Plan -- 8. Identify Third-Party Training Requirements -- 9. Stage Hardware -- 10. Oversee Installation and Turn-up of Wireless Network Using a Standard Change Management Process -- 11. Ensure that All Hardware Is Set up on the Enterprise Monitoring System -- 12. Validate Channel and Power Plan.
13. Conduct Post-Implementation Survey and Make Modifications as Needed -- 14. Perform UAT (Unit Acceptance Testing) Using Various Form Factors of End-User Devices -- 15. Send a Series of Communications Outlining Offerings with Instructions -- 16. Develop Helpdesk Knowledge Base for Common Troubleshooting -- 17. Create a Runbook -- 18. Handoff Support to Ongoing Operations Team -- 19. Ensure that a Process is in Place for Onboarding and Certifying Wireless Devices -- Chapter 10 Support Considerations and Lifecycle -- Tool Set -- Protocol Analyzer -- Voice Analyzer -- Spectrum Analyzer -- Site Survey Software -- Performance Software -- Packet Capturing -- Wireless Intrusion Prevention Systems (WIPS) -- Wireless Network Management -- Staffing Considerations -- Vendor Neutral Training -- Software Tool Training -- Wireless Manufacturer Training -- Wireless Runbook -- Policies -- Acceptable Use -- Disaster Recovery -- Procedures -- Architecture -- Systems Lifecycle -- Routine Maintenance -- Technical Support -- Tier 1 -- Tier 2 -- Tier 3 -- Tier 4 -- Infrastructure Code Upgrade -- End-User Device Considerations -- Lifecycle and Drivers for System Upgrades -- Infrastructure Lifecycle -- Client Device Lifecycle -- Chapter 11 Emerging Trends and Technologies -- Demand for More Bandwidth and Denser Deployments -- Device Density -- Evolution of the Electronic Medical Record -- Mobile Voice and Video -- Guest Access -- Patient Engagement with Social Media -- Device Consolidation -- Shrinking Herds of Carts on Wheels (CoWs) and Workstations on Wheels (WoWs) -- Key Emerging Technologies -- IEEE 802.11ac -- Infrastructure -- Client Devices -- Design and Planning -- Policy Management and Software Defined Networking (SDN) -- The Rise of the Smart Phone -- Application Performance and Security -- IPv6 -- 802.11u/Hotspot 2.0/Passpoint -- mHealth -- Index.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- Chapter 1 Brief History of Wi-Fi -- History and Current Growth and Proliferation of Wi-Fi in Hospitals -- Regulatory Bodies -- Federal Communications Commission -- Institute of Electrical and Electronics Engineers -- Wi-Fi Alliance -- Core Programs -- Optional Programs -- International Organization for Standardization -- Wi-Fi Impacts on Clinical Workflow -- mHealth -- Endnotes -- Chapter 2 Wireless Architecture Considerations -- About Wi-Fi Networks -- The MAC Layer -- Vendor-Specific Solutions -- Autonomous Architecture -- Controller-Based Architectures -- Distributed Architecture -- Medical Devices -- Medical Imaging -- Wireless on Wheels -- Tablets and Smart Phones -- Bonjour -- Chapter 3 Site Survey Process -- Wireless Site Survey Process -- Preparation -- The Statement of Work -- Facility Blueprints -- Pre-Survey Walkthrough -- Design Considerations -- High-Capacity Design -- Channel Planning -- Multifloor Designs -- Aesthetics -- Augmenting Existing Designs -- Upgrading Access Point Hardware -- Cabling -- Network Infrastructure -- Network Ports -- Power Availability -- Network Bandwidth -- IP Address Availability -- Survey Equipment -- Form Factor -- Site Survey Design Software -- Spectrum Analyzer -- Survey Types -- Predictive Survey -- Passive Survey -- Active Survey -- Survey Techniques -- Site Survey Report -- Post-Validation Survey -- Chapter 4 Wireless Security Wi-Fi -- About Information Security and Wireless Networking -- Confidentiality -- Availability -- Integrity -- Wireless Security Risks and Threats -- Denial of Service -- Malicious Code -- Social Engineering -- Signal Analysis -- Spoofing -- Rogue Access Points -- Wireless Hacking and Hackers -- Motives of Wireless Hackers -- War Driving -- Tracking War Drivers.

The Hacking Process -- Information Gathering -- Enumeration -- Compromise -- Expanding Privileges and Accessibility -- Cleaning Up the Trails -- Service Set Identifier -- Shared Key Authentication -- Open Key Authentication -- Wired Equivalent Privacy Standard -- 802.1x -- Authentication Server -- Authenticator -- Supplicant -- Extensive Authentication Protocol over Local Area Network (EAPOL) -- Remote Authentication Dial-In User Service (RADIUS) -- Extensible Authentication Protocol -- EAP-MD5 -- EAP-TLS -- EAP-TTLS -- LEAP -- PEAP -- EAP-FAST -- Wi-Fi Protected Access -- 802.11i -- Robust Secure Network (RSN) -- Transition Secure Network (TSN) -- Temporal Key Integrity Protocol -- TKIP MIC -- Advance Encryption Standard -- 802.11i System Overview -- Wi-Fi Protected Access -- Rogue Access Points Detection -- Wireless Security Tools -- Scanning Tools -- Sniffing Tools -- Hybrid Tools -- Cracking Tools -- Access Point Attacking Tools -- Wireless Security Policy Areas -- Password Policy -- Access Policy -- Rogue Access Point Policy -- Guest Access Policy -- Remote WLAN Access Policy -- Physical Security -- Wireless Monitoring and Security Incident Response -- HIPAA and Wi-Fi -- Chapter 5 Wireless Guest Services -- Sponsored, Open Access, and Self-Enrollment -- Sponsored Guest Access -- Self-Enrollment Guest Access -- Open Access -- Captive Portal Page Types -- No Registration Splash Page -- Self-Registration -- Manual Registration -- Sponsored Registration -- Supporting Infrastructure -- Revenue Generation -- Bring Your Own Device (BYOD) -- SCEP -- Endnotes -- Chapter 6 Mobile Medical Devices -- Functional Testing -- Network Testing -- Failover and Redundancy Test -- Mobile X-Ray Machines -- Medication Dispensing Systems -- IV Pumps -- Electrocardiogram Carts -- Ultrasound Devices -- Blood Gas Analyzers -- Hemodialysis Machines -- mHealth.

Chapter 7 Voice over Wi-Fi -- Why VoWi-Fi? -- The Challenges of VoWi-Fi -- Quality of Service Fundamentals -- Evolution of QoS -- The Journey of a Voice Packet -- What Happens at Phone One -- What Happens at the Access Point -- What Happens at Switch One -- What Happens at the Router -- Differentiated Services -- 802.1Q -- Anatomy of VoIP -- The Anatomy of Codecs -- Proprietary Protocols -- Wireless Arbitration -- Troubleshooting VoWi-Fi -- Roaming -- Chapter 8 Real-Time Location Services -- RTLS Technologies -- ZigBee -- Wi-Fi -- Infrared -- Ultrasound -- How RTLS Works -- Architecture -- ISO/IEC Standards -- Different Types of Transmitters -- Applications -- Asset Management -- Equipment Rentals -- Shrinkage -- Condition Monitoring -- Patient and Clinician Safety -- Infection Control -- Workflow -- RTLS Issues -- Privacy Concerns -- Challenges with Accuracy -- Maintenance and Costs -- Chapter 9 The Wireless Project Management Process -- Refining the Scope -- Scheduling and Developing Milestones -- Developing a Budget -- Quality Assurance -- Communication Strategy -- Risk Management -- Change Management -- Closure Criteria -- 1. Identify Key Stakeholders and Set up a Kickoff Meeting -- 2. Perform an RFI and RFP to Choose a Wireless Vendor -- 3. Survey Network Closets for Port Capacity and POE Availability -- 4. Perform Predictive and Onsite Wireless Survey -- 5. Develop Detailed Physical and Logical Architecture -- 6. Develop a Survey Report and Create a Cabling Bid Package -- 7. Order Hardware and Consider Lead Times on the Project Plan -- 8. Identify Third-Party Training Requirements -- 9. Stage Hardware -- 10. Oversee Installation and Turn-up of Wireless Network Using a Standard Change Management Process -- 11. Ensure that All Hardware Is Set up on the Enterprise Monitoring System -- 12. Validate Channel and Power Plan.

13. Conduct Post-Implementation Survey and Make Modifications as Needed -- 14. Perform UAT (Unit Acceptance Testing) Using Various Form Factors of End-User Devices -- 15. Send a Series of Communications Outlining Offerings with Instructions -- 16. Develop Helpdesk Knowledge Base for Common Troubleshooting -- 17. Create a Runbook -- 18. Handoff Support to Ongoing Operations Team -- 19. Ensure that a Process is in Place for Onboarding and Certifying Wireless Devices -- Chapter 10 Support Considerations and Lifecycle -- Tool Set -- Protocol Analyzer -- Voice Analyzer -- Spectrum Analyzer -- Site Survey Software -- Performance Software -- Packet Capturing -- Wireless Intrusion Prevention Systems (WIPS) -- Wireless Network Management -- Staffing Considerations -- Vendor Neutral Training -- Software Tool Training -- Wireless Manufacturer Training -- Wireless Runbook -- Policies -- Acceptable Use -- Disaster Recovery -- Procedures -- Architecture -- Systems Lifecycle -- Routine Maintenance -- Technical Support -- Tier 1 -- Tier 2 -- Tier 3 -- Tier 4 -- Infrastructure Code Upgrade -- End-User Device Considerations -- Lifecycle and Drivers for System Upgrades -- Infrastructure Lifecycle -- Client Device Lifecycle -- Chapter 11 Emerging Trends and Technologies -- Demand for More Bandwidth and Denser Deployments -- Device Density -- Evolution of the Electronic Medical Record -- Mobile Voice and Video -- Guest Access -- Patient Engagement with Social Media -- Device Consolidation -- Shrinking Herds of Carts on Wheels (CoWs) and Workstations on Wheels (WoWs) -- Key Emerging Technologies -- IEEE 802.11ac -- Infrastructure -- Client Devices -- Design and Planning -- Policy Management and Software Defined Networking (SDN) -- The Rise of the Smart Phone -- Application Performance and Security -- IPv6 -- 802.11u/Hotspot 2.0/Passpoint -- mHealth -- Index.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.