Wi-Fi Enabled Healthcare.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Place / Publishing House:Milton : : Auerbach Publishers, Incorporated,, 2014.
Ã2014.
Year of Publication:2014
Edition:1st ed.
Language:English
Online Access:
Physical Description:1 online resource (301 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Cover
  • Half Title
  • Title Page
  • Copyright Page
  • Table of Contents
  • Foreword
  • Preface
  • Chapter 1 Brief History of Wi-Fi
  • History and Current Growth and Proliferation of Wi-Fi in Hospitals
  • Regulatory Bodies
  • Federal Communications Commission
  • Institute of Electrical and Electronics Engineers
  • Wi-Fi Alliance
  • Core Programs
  • Optional Programs
  • International Organization for Standardization
  • Wi-Fi Impacts on Clinical Workflow
  • mHealth
  • Endnotes
  • Chapter 2 Wireless Architecture Considerations
  • About Wi-Fi Networks
  • The MAC Layer
  • Vendor-Specific Solutions
  • Autonomous Architecture
  • Controller-Based Architectures
  • Distributed Architecture
  • Medical Devices
  • Medical Imaging
  • Wireless on Wheels
  • Tablets and Smart Phones
  • Bonjour
  • Chapter 3 Site Survey Process
  • Wireless Site Survey Process
  • Preparation
  • The Statement of Work
  • Facility Blueprints
  • Pre-Survey Walkthrough
  • Design Considerations
  • High-Capacity Design
  • Channel Planning
  • Multifloor Designs
  • Aesthetics
  • Augmenting Existing Designs
  • Upgrading Access Point Hardware
  • Cabling
  • Network Infrastructure
  • Network Ports
  • Power Availability
  • Network Bandwidth
  • IP Address Availability
  • Survey Equipment
  • Form Factor
  • Site Survey Design Software
  • Spectrum Analyzer
  • Survey Types
  • Predictive Survey
  • Passive Survey
  • Active Survey
  • Survey Techniques
  • Site Survey Report
  • Post-Validation Survey
  • Chapter 4 Wireless Security Wi-Fi
  • About Information Security and Wireless Networking
  • Confidentiality
  • Availability
  • Integrity
  • Wireless Security Risks and Threats
  • Denial of Service
  • Malicious Code
  • Social Engineering
  • Signal Analysis
  • Spoofing
  • Rogue Access Points
  • Wireless Hacking and Hackers
  • Motives of Wireless Hackers
  • War Driving
  • Tracking War Drivers.
  • The Hacking Process
  • Information Gathering
  • Enumeration
  • Compromise
  • Expanding Privileges and Accessibility
  • Cleaning Up the Trails
  • Service Set Identifier
  • Shared Key Authentication
  • Open Key Authentication
  • Wired Equivalent Privacy Standard
  • 802.1x
  • Authentication Server
  • Authenticator
  • Supplicant
  • Extensive Authentication Protocol over Local Area Network (EAPOL)
  • Remote Authentication Dial-In User Service (RADIUS)
  • Extensible Authentication Protocol
  • EAP-MD5
  • EAP-TLS
  • EAP-TTLS
  • LEAP
  • PEAP
  • EAP-FAST
  • Wi-Fi Protected Access
  • 802.11i
  • Robust Secure Network (RSN)
  • Transition Secure Network (TSN)
  • Temporal Key Integrity Protocol
  • TKIP MIC
  • Advance Encryption Standard
  • 802.11i System Overview
  • Wi-Fi Protected Access
  • Rogue Access Points Detection
  • Wireless Security Tools
  • Scanning Tools
  • Sniffing Tools
  • Hybrid Tools
  • Cracking Tools
  • Access Point Attacking Tools
  • Wireless Security Policy Areas
  • Password Policy
  • Access Policy
  • Rogue Access Point Policy
  • Guest Access Policy
  • Remote WLAN Access Policy
  • Physical Security
  • Wireless Monitoring and Security Incident Response
  • HIPAA and Wi-Fi
  • Chapter 5 Wireless Guest Services
  • Sponsored, Open Access, and Self-Enrollment
  • Sponsored Guest Access
  • Self-Enrollment Guest Access
  • Open Access
  • Captive Portal Page Types
  • No Registration Splash Page
  • Self-Registration
  • Manual Registration
  • Sponsored Registration
  • Supporting Infrastructure
  • Revenue Generation
  • Bring Your Own Device (BYOD)
  • SCEP
  • Endnotes
  • Chapter 6 Mobile Medical Devices
  • Functional Testing
  • Network Testing
  • Failover and Redundancy Test
  • Mobile X-Ray Machines
  • Medication Dispensing Systems
  • IV Pumps
  • Electrocardiogram Carts
  • Ultrasound Devices
  • Blood Gas Analyzers
  • Hemodialysis Machines
  • mHealth.
  • Chapter 7 Voice over Wi-Fi
  • Why VoWi-Fi?
  • The Challenges of VoWi-Fi
  • Quality of Service Fundamentals
  • Evolution of QoS
  • The Journey of a Voice Packet
  • What Happens at Phone One
  • What Happens at the Access Point
  • What Happens at Switch One
  • What Happens at the Router
  • Differentiated Services
  • 802.1Q
  • Anatomy of VoIP
  • The Anatomy of Codecs
  • Proprietary Protocols
  • Wireless Arbitration
  • Troubleshooting VoWi-Fi
  • Roaming
  • Chapter 8 Real-Time Location Services
  • RTLS Technologies
  • ZigBee
  • Wi-Fi
  • Infrared
  • Ultrasound
  • How RTLS Works
  • Architecture
  • ISO/IEC Standards
  • Different Types of Transmitters
  • Applications
  • Asset Management
  • Equipment Rentals
  • Shrinkage
  • Condition Monitoring
  • Patient and Clinician Safety
  • Infection Control
  • Workflow
  • RTLS Issues
  • Privacy Concerns
  • Challenges with Accuracy
  • Maintenance and Costs
  • Chapter 9 The Wireless Project Management Process
  • Refining the Scope
  • Scheduling and Developing Milestones
  • Developing a Budget
  • Quality Assurance
  • Communication Strategy
  • Risk Management
  • Change Management
  • Closure Criteria
  • 1. Identify Key Stakeholders and Set up a Kickoff Meeting
  • 2. Perform an RFI and RFP to Choose a Wireless Vendor
  • 3. Survey Network Closets for Port Capacity and POE Availability
  • 4. Perform Predictive and Onsite Wireless Survey
  • 5. Develop Detailed Physical and Logical Architecture
  • 6. Develop a Survey Report and Create a Cabling Bid Package
  • 7. Order Hardware and Consider Lead Times on the Project Plan
  • 8. Identify Third-Party Training Requirements
  • 9. Stage Hardware
  • 10. Oversee Installation and Turn-up of Wireless Network Using a Standard Change Management Process
  • 11. Ensure that All Hardware Is Set up on the Enterprise Monitoring System
  • 12. Validate Channel and Power Plan.
  • 13. Conduct Post-Implementation Survey and Make Modifications as Needed
  • 14. Perform UAT (Unit Acceptance Testing) Using Various Form Factors of End-User Devices
  • 15. Send a Series of Communications Outlining Offerings with Instructions
  • 16. Develop Helpdesk Knowledge Base for Common Troubleshooting
  • 17. Create a Runbook
  • 18. Handoff Support to Ongoing Operations Team
  • 19. Ensure that a Process is in Place for Onboarding and Certifying Wireless Devices
  • Chapter 10 Support Considerations and Lifecycle
  • Tool Set
  • Protocol Analyzer
  • Voice Analyzer
  • Spectrum Analyzer
  • Site Survey Software
  • Performance Software
  • Packet Capturing
  • Wireless Intrusion Prevention Systems (WIPS)
  • Wireless Network Management
  • Staffing Considerations
  • Vendor Neutral Training
  • Software Tool Training
  • Wireless Manufacturer Training
  • Wireless Runbook
  • Policies
  • Acceptable Use
  • Disaster Recovery
  • Procedures
  • Architecture
  • Systems Lifecycle
  • Routine Maintenance
  • Technical Support
  • Tier 1
  • Tier 2
  • Tier 3
  • Tier 4
  • Infrastructure Code Upgrade
  • End-User Device Considerations
  • Lifecycle and Drivers for System Upgrades
  • Infrastructure Lifecycle
  • Client Device Lifecycle
  • Chapter 11 Emerging Trends and Technologies
  • Demand for More Bandwidth and Denser Deployments
  • Device Density
  • Evolution of the Electronic Medical Record
  • Mobile Voice and Video
  • Guest Access
  • Patient Engagement with Social Media
  • Device Consolidation
  • Shrinking Herds of Carts on Wheels (CoWs) and Workstations on Wheels (WoWs)
  • Key Emerging Technologies
  • IEEE 802.11ac
  • Infrastructure
  • Client Devices
  • Design and Planning
  • Policy Management and Software Defined Networking (SDN)
  • The Rise of the Smart Phone
  • Application Performance and Security
  • IPv6
  • 802.11u/Hotspot 2.0/Passpoint
  • mHealth
  • Index.