1st Edition
Wi-Fi Enabled Healthcare
Focusing on its recent proliferation in hospital systems, Wi-Fi Enabled Healthcare explains how Wi-Fi is transforming clinical work flows and infusing new life into the types of mobile devices being implemented in hospitals. Drawing on first-hand experiences from one of the largest healthcare systems in the United States, it covers the key areas associated with wireless network design, security, and support.
Reporting on cutting-edge developments and emerging standards in Wi-Fi technologies, the book explores security implications for each device type. It covers real-time location services and emerging trends in cloud-based wireless architecture. It also outlines several options and design consideration for employee wireless coverage, voice over wireless (including smart phones), mobile medical devices, and wireless guest services.
This book presents authoritative insight into the challenges that exist in adding Wi-Fi within a healthcare setting. It explores several solutions in each space along with design considerations and pros and cons. It also supplies an in-depth look at voice over wireless, mobile medical devices, and wireless guest services.
The authors provide readers with the technical knowhow required to ensure their systems provide the reliable, end-to-end communications necessary to surmount today’s challenges and capitalize on new opportunities. The shared experience and lessons learned provide essential guidance for large and small healthcare organizations in the United States and around the world.
This book is an ideal reference for network design engineers and high-level hospital executives that are thinking about adding or improving upon Wi-Fi in their hospitals or hospital systems.
Brief History of Wi-Fi
History and Current Growth and Proliferation of Wi-Fi in Hospitals
Regulatory Bodies
Federal Communications Commission
Institute of Electrical and Electronics Engineers
Wi-Fi Alliance
Core Programs
Optional Programs
International Organization for Standardization
Wi-Fi Impacts on Clinical Workflow
mHealth
Endnotes
Wireless Architecture Considerations
About Wi-Fi Networks
History of Wireless Local Area Network Architecture
Basic Components of All Network Architectures
The MAC Layer
Vendor-Specific Solutions
Autonomous Architecture
Controller-Based Architectures
Distributed Architecture Medical Devices
Medical Imaging
Wireless on Wheels
Tablets and Smart Phones
Bonjour
Site Survey Process
Wireless Site Survey Process
Preparation
The Statement of Work
Facility Blueprints
Pre-Survey Walkthrough
Design Considerations
High Capacity Design
Channel Planning
Multi-Floor Designs
Aesthetics
Augmenting Existing Designs
Upgrading Access Point Hardware
Cabling
Network Infrastructure
Network Ports
Power Availability
Network Bandwidth
IP Address Availability
Survey Equipment
Form Factor
Site Survey Design Software
Spectrum Analyzer
Survey Types
Predictive Survey
Passive Survey
Active Survey
Survey Techniques
Site Survey Report
Post-Validation Survey
Wireless Security Wi-Fi
About Information Security and Wireless Networking
Confidentiality
Availability
Integrity
Wireless Security Risks and Threats
Denial of Service
Malicious Code
Social Engineering
Signal Analysis
Spoofing
Rogue Access Points
Wireless Hacking and Hackers
Motives of Wireless Hackers
War Driving
Tracking War Drivers
The Hacking Process
Information Gathering
Enumeration
Compromise
Expanding Privileges and Accessibility
Cleaning up the Trails
Shared Key Authentication
Open Key Authentication
Wired Equivalent Privacy Standard
802.1x
Authentication Server
Authenticator
Supplicant
Extensive Authentication Protocol over Local Area Network (EAPOL)
Remote Authentication Dial-In User Service (RADIUS)
Extensible Authentication Protocol
EAP-MD5
EAP-TLS
EAP-TTLS
LEAP
PEAP
EAP-FAST
Wi-Fi Protected Access
802.11i
Robust Secure Network (RSN)
Transition Secure Network (TSN)
Temporal Key Integrity Protocol
TKIP MIC
Advance Encryption Standard
802.11i System Overview
Wi-Fi Protected Access
Rogue Access Points Detection
Wireless Security Tools
Scanning Tools
Sniffing Tools
Hybrid Tools
Cracking Tools
Access Point Attacking Tools
Wireless Security Policy Areas
Password Policy
Access Policy
Rogue Access Point Policy
Guest Access Policy
Remote WLAN Access Policy
Physical Security
Wireless Monitoring and Security Incident Response
HIPAA and Wi-Fi
Wireless Guest Services
Sponsored, Open Access, and Self-Enrollment
Sponsored Guest Access
Self-Enrollment Guest Access
Open Access
Captive Portal Page Types
No Registration Splash Page
Self-Registration
Manual Registration
Sponsored Registration
Supporting Infrastructure
Revenue Generation
Bring Your Own Device (BYOD)
SCEP
Endnotes
Mobile Medical Devices
Functional Testing
Network Testing
Failover and Redundancy Test
Mobile X-Ray Machines
Medication Dispensing Systems
IV Pumps
Electrocardiogram Carts
Ultrasound Devices
Blood Gas Analyzers
Hemodialysis Machines
mHealth
Voice over Wi-Fi
Why VoWi-Fi?
The Challenges of VoWi-Fi
Quality of Service Fundamentals
Evolution of QoS
The Journey of a Voice Packet
What Happens at Phone One
What Happens at the Access Point
What Happens at Switch One
What Happens at the Router
Differentiated Services
802.1Q
Anatomy of VoIP
The Anatomy of Codecs
Proprietary Protocols
Wireless Arbitration
Troubleshooting VoWi-Fi
Roaming
Real Time Location Services
RTLS Technologies
ZigBee
Wi-Fi
Infrared
Ultrasound
How RTLS Works
Architecture
ISO/IEC Standards
Different Types of Transmitters
Applications
Asset Management
Equipment Rentals
Shrinkage
Condition Monitoring
Patient and Clinician Safety
Infection Control
Workflow
RTLS Issues
Privacy Concerns
Challenges with Accuracy
Maintenance and Costs
The Wireless Project Management Process
Refining the Scope
Scheduling and Developing Milestones
Developing a Budget
Quality Assurance
Communication Strategy
Risk Management
Change Management
Closure Criteria
1. Identify Key Stakeholders and Set up aKickoff Meeting
2. Perform an RFI and RFP to Choose Wireless Vendor
3. Survey Network Closets for Port Capacity and POE Availability
4. Perform Predictive and Onsite Wireless Survey
5. Develop Detailed Physical and Logical Architecture
6. Develop Survey Report and Create Cabling Bid Package
7. Order Hardware and Consider Lead Times on Project Plan
8. Identify Third-Party Training Requirements
9. Stage Hardware
10. Oversee Installation and Turn-up of Wireless Network Using Standard Change Management Process
11. Ensure that All Hardware Is Set up on the Enterprise Monitoring System
12. Validate Channel and Power Plan
13. Conduct Post-Implementation Survey and Make Modifications as Needed
14. Perform UAT Using Various Form Factors of End User Devices
15. Send a Series of Communications Outlining Offerings with Instructions
16. Develop Help Desk Knowledge Base for Common Troubleshooting
17. Create Runbook
18. Hand Off Support to Ongoing Operations Team
19. Ensure that a Process is in Place for Onboarding and Certifying Wireless Devices
Support Considerations and Lifecycle
Tool Set
Protocol Analyzer
Voice Analyzer
Spectrum Analyzer
Site Survey Software
Performance Software
Packet Capturing
Wireless Intrusion Prevention Systems (WIPS)
Wireless Network Management
Staffing Considerations
Vendor Neutral Training
Software Tool Training
Wireless Manufacturer Training
Wireless Runbook
Policies
Acceptable Use
Disaster Recovery
Procedures
Architecture
Systems Lifecycle
Routine Maintenance
Technical Support
Tier 1
Tier 2
Tier 3
Tier 4
Infrastructure Code Upgrade
End User Device Considerations
Lifecycle and Drivers for System Upgrades
Infrastructure Lifecycle
Client Device Lifecycle
Emerging Trends and Technologies
Demand for More Bandwidth and Denser Deployments
Device Density
Evolution of the Electronic Medical Record
Mobile Voice and Video
Guest Access
Patient Engagement with Social Media
Device Consolidation
Shrinking Herds of CoWs and WoWs
Infrastructure
Client Devices
Design and Planning
Policy Management and Software Defined Networking (SDN)
The Rise of the Smart Phone
Application Performance and Security
IPv6
802.11u/Hotspot 2.0/Passpoint
mHealth
Index
Biography
Ali Youssef is a Senior Network Architect specializing in mobility (CWNE #133) and digital health with over 18 years of design, strategy and operations experience. His passions include mHealth, patient engagement, patient experience, medical device design, and how IOT and mobile devices are transforming healthcare and improving clinical outcomes. Ali led the design, implementation, and ongoing support of one of the largest wireless networks in healthcare in North America. He speaks regularly at industry events like HIMSS, AAMI, CWNP, CTIA, IHP, and MDM&M, is an active member of the AAMI Wireless Strategy Task Force, and the chair for wireless technology for the Intelligent Hospital Association. He has authored several articles on topics ranging from network design to mobile medical device design, and a book entitled "Wi-Fi Enabled Healthcare."
Bob Zemke CPHIMS, CISSP is the Healthcare Solutions Manager at Extreme Networks and a member of the Association of Medical Instrumentation Wireless Strategy Task Force (WSTF). Bob has degrees in Telecommunications Management from Western Michigan University and a Master's degree in telecommunications and network management from Syracuse University’s prestigious iSchool. An IT professional with a broad span of experience in healthcare, Bob has been practicing and consulting in healthcare IT for over 15 years of experience in network design, deployment and management for hospital organizations globally. You can reach Bob on twitter @bobzemke
Doug McDonald CPHIMS, CWSP is the Wireless Network Manager for Henry Ford Health System in Rochester Hills, Michigan. He is responsible for over 7 million square feet of hospital grade wireless Infrastructure. He holds a Bachelor’s degree in Information Technology and Services Management from Michigan State University and is currently pursuing an Executive MBA at Oakland University. Doug has fifteen years of experience as an IT professional. A member on the mHIMSS task force and coauthor of the mHIMSS roadmap, he holds a number of certifications including CPHIMS, CWNA, CWSP, CWDP, and ITILV3. You can reach Doug on twitter @DougRMcDonald
Jon Linton CWNE #89 is a Senior Wireless Architect at Henry Ford Health System. He holds a BS in Management from Kettering University and is one of the first 100 Certified Wireless Experts in the CWNP organization. Jon also holds the ITILV3 certification. He has been active in publishing articles, presenting webinars and writing blog posts on all things Wi-Fi. You can reach Jon on twitter @wifisamuri
Aaron Earle CRISC, CISSP, CISA, CISM, CCNP, MCP, A+, Net+, and Security + has been securing computer and network systems for over a decade. In this time he has accumulated thirty five certifications and two corporations. Aaron Earle has been involved with System Auditing, Vulnerability Assessment, Security Architecture, and Corporate Policy Writing. Aaron is an avid speaker and instructor for many security organizations worldwide. He has taught for prestigious security organizations such as Computer Security Institute (CSI) and Information Systems Security Association (ISSA). Aaron has also instructed personnel from almost every United States three or four letter government agency including NSA, FBI, and DOD. Aaron Earle’s talent has taken him around the world informing, educating, and safeguarding governments and companies alike. You can reach Aaron at [email protected]