Skip to main content

The Healthcare Simulation Technology Specialist and Information Technology

  • Chapter
  • First Online:
Comprehensive Healthcare Simulation: Operations, Technology, and Innovative Practice

Part of the book series: Comprehensive Healthcare Simulation ((CHS))

  • 1089 Accesses

Abstract

Nearly every device in a simulation center is now reliant upon network connectivity to allow data collection, processing, transfer, or analysis. Everything from the manikin that the students interact with, to the database server that stores scenarios and grading templates, to the telephone system and video recording and debriefing software are frequently connected to some type of network connection. Understanding how these connections are made and the hardware and software required for proper operation will allow the healthcare simulation technology specialist (HSTS) to best use, troubleshoot, and design features for simulation-based education. This chapter will define common terms, describe network components and their features, as well as introduce some innovative uses of this equipment for use in healthcare simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ATIS Committee PRQC. ATIS Telecom Glossary – Computer Network. [Online] http://www.atis.org/glossary/definition.aspx?id=6555. Alliance for Telecommunications Industry Solutions; 2018 [cited 2018 August 7]. Available from: http://www.atis.org/glossary/definition.aspx?id=6555

  2. iplocation.net. What is a MAC address? August 27, 2018. Available from: https://www.iplocation.net/mac-address

  3. Techopedia. Wireless Local Area Network (WLAN); August 27, 2018. Available from: https://www.techopedia.com/definition/5107/wireless-local-area-network-wlan

  4. Irujo T. OM4 – the next generation of multimode fiber. [Online] http://www.fols.org/fols_library/white_papers/documents/OFSOM4TheNextGenerationofMultimodeFiber.pdf; 2011

  5. Meyers M. CompTIA Network+ all-in-one exam guide, exam N10-007. 7th ed. McGraw-Hill Education Group: Houston; 2018. 960 p

    Google Scholar 

  6. Association NFP. NFPA 262 – standard method of test for flame travel and smoke of wires and cables for use in air-handling spaces. Quincy: National Fire Protection Association; 2002.

    Google Scholar 

  7. National Fire Protection Association. NFPA 262 – standard method of test for flame travel and smoke of wires and cables for use in air-handling spaces. Quincy: National Fire Protection Association; 2002.

    Google Scholar 

  8. International Organization for Standardization. Information technology – generic cabling for customer premises – part 1: general requirements. Geneva: International Organization for Standardization; 2017.

    Google Scholar 

  9. Khan Academy. How the Internet works – IP addresses and DNS. In: Mejia P, editor. [Online] https://www.khanacademy.org/computing/computer-science/internet-intro/internet-works-intro/v/the-internet-ip-addresses-and-dns; 2015

  10. Eisen M. Introduction to PoE and the IEEE802. 3af and 802.3 at Standards 2010. Available from: http://www.sepitam.com/files/editor/downloads/What is difference End-Span and Mid-Span.pdf

  11. Datanyze. Microsoft SQL Server market share. [Online] https://www.datanyze.com/market-share/databases/microsoft-sql-server-market-share; 2018. Available from: https://www.datanyze.com/market-share/databases/microsoft-sql-server-market-share

  12. iDatalabs. Database Management System Products. [Online] https://idatalabs.com/tech/database-management-system; 2017. Available from: https://idatalabs.com/tech/database-management-system

  13. Bednarz A. What is a SAN and how does it differ from NAS? Network World [Internet]; 2018.

    Google Scholar 

  14. Cisco. Site-to-site VPN. 2018. In: Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager [Internet]. [Online] https://www.cisco.com/c/en/us/td/docs/security/firepower/620/fdm/fptd-fdm-config-guide-620.html: Cisco. 6.2. Available from: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/fdm/fptd-fdm-config-guide-620.html

  15. Laerdal. SimMan 3G User Guide; 2016 August 27, 2018. Available from: http://cdn.laerdal.com/downloads/f3111/user_guide,_simman_3g_english.pdf

  16. Florek B. Laerdal SimMan 3G wireless router upgrade information and troubleshooting; 2013. Available from: http://simulation.laerdal.com/forum/forums/storage/93/4793/Laerdal SimMan 3G wireless upgrade.pdf

  17. Clarke GE. CompTIA network+ certification study guide, sixth edition (exam N10–006). 6th ed. New York: McGraw-Hill; 2015.

    Google Scholar 

  18. Panko RR. A closer look at HTTP, TCP, IP, and PPP. Business data communications and networking. 3rd ed. Upper Saddle River: Prentice-Hall; 2001. p. 53–74.

    Google Scholar 

  19. IPLocation.com. What is a subnet mask? [Online] https://www.iplocation.net/subnet-mask. Available from: https://www.iplocation.net/subnet-mask

  20. Techopedia.com. Subnetting. [Online] https://www.techopedia.com/definition/28328/subnetting. Available from: https://www.techopedia.com/definition/28328/subnetting

  21. Cisco. Training and certifications. [Online] https://www.cisco.com/c/en/us/training-events/training-certifications/certifications.html#~cert [Updated August 27, 2018]. Available from: https://www.cisco.com/c/en/us/training-events/training-certifications/certifications.html#~cert

Additional Recommended Readings

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eduardo R. Luevano .

Editor information

Editors and Affiliations

Appendix: IP Addresses and Subnets

Appendix: IP Addresses and Subnets

It is important to understand that a router will provide an allotment of IP addresses within a defined range for any designated network and across the Internet. Many understand that when a device is connected to a network, regardless of if it is hardwired or wireless, it is given an IP address (like a token) to connect to the network. Most IP addresses are in the form XXX.XXX.XXX.XXX, where each set of three Xs (called an octet) forms a number between 0 and 255 allowing for 256 (28) unique numbers per octet. This is called IPv4 notation. The 256 here is actually a decimal number system representation of the eight positions of a binary number in the range of 00000000–11111111 [17].

An IP address has three components much like the country, city, and zip code of a postal address. These parts are the network part, the subnet part, and the host part (see Fig. 14.10).

Fig. 14.10
figure 10

In this figure the IP address 192.168.20.105 is shown and divided into its constituent pieces. The network part (in red) identifies the location potentially globally in the Internet where a piece of information is going to or coming from. The subnet part (in blue) marks a segment within a larger network. Finally the host (in yellow) identifies the specific computer or device. The “mask” that accompanies the IP address identifies how much of the IP address is allocated to the network or subnet portion. In the example above, the network mask is /16, identifying the first two octets (11111111.11111111.00000000.00000000) or (255.255.0.0) as belonging to the network. The subnet mask is /24; this is the total of the first 16 bits from the network mask and the next 8 bits from the subnet mask totaling 24 (11111111.11111111.11111111.00000000) or (255.255.255.0). This configuration would allow only the final octet to be assigned to host devices within the subnetwork. Inside of an institution, when information is traveling across the Internet, the network mask is not used for routing, and instead the subnet mask is used to define hosts and routing of information within a network [18]

Dividing a network using a subnet can add several layers of difficulty if you are not familiar or comfortable with it. Whether you are novice, intermediate, or advanced in networking, understanding the concepts of segmenting small networks within a network is a desirable trait. Subnetting can make networks easier to manage and can improve security.

The subnet mask is intended for defining the type and number of IP addresses available for a given local network. Some default categories of subnet masks are as follows:

  • Class A: 255.0.0.0

  • Class B: 255.255.0.0

  • Class C: 255.255.255.0

The subnetting process allows an administrator to divide a single Class A, Class B, or Class C network number into smaller portions.

Example of subnets in action:

A college offering Internet connectivity may provide two SSIDs (service set identifier) to connect to its Wi-Fi network:

  1. 1.

    College Z – Student

  2. 2.

    College Z – Guest

This is an example of subnetting. The network administrator has configured the college’s switch, which manages data flow, to route data traffic to one of two different subnetworks, to allow use by students and guests . This could be achieved by partitioning the college’s network into two subnetworks by changing the subnet mask.

A subnet mask distinguishes an IP address, by separating it into “network address” (first) and “host address” (second) portions (<network>,<host>). A subnet divides the host portion further (<network>,<subnet>,<host>). A subnet mask is a 32-bit number that is used to define the number of assignable IP addresses within a network segment. The subnet mask makes all network bits “1s” and all host bits “0s” and therefore also indicates where the network and host address portions start and end [19]. For a standard home network, the subnet mask is a class C /24 network denoted as 255.255.255.0 (see Table 14.3).

The numbers 0 and 255 (00000000 and 11111111) in the host portion are reserved for the “network ID” and “broadcast ID,” respectively, leaving only 254 possible numbers to be assigned to “hosts” (individual computers or devices on a network). The router, and the IP address assigned to it, is also called the default gateway and will occupy one additional IP address.

Example device on a class C network

  • Network ID        192.168.0.0/24

  • Subnet mask         255.255.255.0

  • IPv4 host address       192.168.1.211

  • Default gateway       192.168.1.1

  • Broadcast ID        192.168.1.255

This example using a class C network means that the network can only provide 256 IP addresses. The assignable range of host addresses is from 192.168.1.2 to 192.168.0.254 plus the network, broadcast, and gateway IPs. This may seem like plenty for a standard home network; however, for a college, this would not be enough IP address to operate. Looking at Table 14.3 and the following examples, we note that changing the subnet mask can increase the number of available IP addresses on the network as shown.

College Z– Employee: (Allocating 4,096 IP addresses)

  • Network ID        192.167.0.0/20

  • Subnet mask         255.255.240.0

  • IPv4 host address       192.167.1.201

  • Default gateway       192.167.0.1

  • Broadcast ID        192.168.15.255

The range of possible IP addresses in for this network is 192.167.0.2–192.167.15.254

College Z – Guest: (Allocating 65,534 IP addresses)

  • Network ID        192.160.0.0/16

  • Subnet mask         255.255.0.0

  • IPv4 host address       192.160.2.64

  • Default gateway       192.160.0.1

  • Broadcast ID        192.160.255.255

The range of possible IP addresses for this network is 192.160.0.2–192.160.255.254

Subnetting is one method to partition or segment your network into smaller networks. Actually configuring a network in this manner requires a special networking switch and configuration of that switch and the devices to which it connects.

When considering simulation and the number of learners that participate in a facility, it may be suitable to create several subnets for a network infrastructure.

Examples for users and groups that could be assigned to different subnetworks :

  1. 1.

    Employees and simulation devices within the workplace to connect via wireless connections

  2. 2.

    Guests outside of the workplace to connect via wireless connections

  3. 3.

    Employees and simulation devices within the workplace to connect via a hardwired connection

  4. 4.

    Voice over IP (VoIP) Phones

  5. 5.

    Video recording system

Dividing a network into a number of subnets provides the following benefits:

  • Reduces the network traffic by reducing the volume of traffic and reducing collisions by decreasing the number of hosts

  • Can allow for more hosts and surpass the limitations in a local area network (LAN)

  • Enables users to access a specific portion of a network, without needing to provide access to the complete network

  • Allows prioritization of data over specific subnets [20]

Table 14.3 Shows the subnet classifications, subnet mask, and the number of assignable IP addresses for different types of networks including Class A, B, and C and classless inter-domain routing (CDIR). Most home networks are Class C and allow for 254 connections, but multiple differentiations are possible as seen in the table. Online calculators are commonly used to assist with planning

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Luevano, E.R., Morton, W. (2019). The Healthcare Simulation Technology Specialist and Information Technology. In: Crawford, S., Baily, L., Monks, S. (eds) Comprehensive Healthcare Simulation: Operations, Technology, and Innovative Practice. Comprehensive Healthcare Simulation. Springer, Cham. https://doi.org/10.1007/978-3-030-15378-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15378-6_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15377-9

  • Online ISBN: 978-3-030-15378-6

  • eBook Packages: MedicineMedicine (R0)

Publish with us

Policies and ethics