Tuesday, September 1, 2009

Healthcare Information Technology Image Management, Part 2 of 5

Part two of a five-part series on healthcare information technology. The information found in this article can be used as part of a preparation program for the American Board of Imaging Informatics (ABII) Imaging Informatics Professional certification program, which awards the Certified Imaging Informatics Professional (CIIP) designation.
The backbone of Healthcare Information Technology (HIT) is comprised of physical and logical networks, servers, databases, and archives. These elements comprise the engine the drives the HIT enterprise. The design and deployment of these HIT components requires a thorough knowledge of the interaction of one with the other, the capabilities of each, the standards affecting their implementation, and a planned upgrade path for when current technology is eclipsed by future innovation. 

Network Protocols
The International Standards Organization (ISO) created the Open Systems Interconnection (OSI) Model in 1978 and it has defined the framework on which most modern protocols are based. 

The OSI Model separates network functionality into seven distinct layers; at each layer, a distinct task or set of tasks is performed. The OSI architecture is split between seven layers, from lowest to highest:
  1. Physical layer
  2. Data Link layer
  3. Network layer
  4. Transport layer
  5. Session layer
  6. Presentation layer
  7. Application layer
Each layer uses the layer immediately below it and provides a service to the layer above. In some implementations a layer may itself be composed of sub-layers. Each vendor is free to design its implementation any it chooses, they all must agree on the following:
  • Input information received at the specified layer
  • Output information that will be delivered to the next layer
  • Once messages are delivered to other devices, the function performed at a given layer at the sending device will be processed by the same layer at the receiving device. The same layer in different devices would be considered "peers".
Data Transmission Protocols
The Transport Layer of the OSI Model ensures that all data arrives at the proper destination across the network intact and error free. It protects end-to-end data integrity, checks for errors, ensures data is in sequence, identifies processes within a host, and segments data for applications (ports). 

TCP - Transmission Control Protocol is the most popular transport layer protocol, and provides for error detection and re-transmission, sequencing of data, and other features. 

UDP – User Datagram Protocol is another transport layer protocol that does not provide error detection or sequencing, but has less overhead than TCP. Port numbers or sockets are used at this layer to segment data for the applications. 

Transmission Control Protocol/Internet Protocol (TCP/IP) is the suite of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de facto standard for transmitting data over networks. Even network operating systems that have their own protocols, such as Novell's Netware, also support TCP/IP. 

The TCP/IP protocol suite is actually composed of several protocols including IP which handles the movement of data between host computers, TCP which manages the movement of data between applications, UDP which also manages the movement of data between applications but is less complex and reliable than TCP, and Internet Control Message Protocol (ICMP), which transmits error messages and network traffic statistics. 

The Ethernet protocol is by far the most widely used network transmission protocol. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. 

Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally affect the speed of transmission on the network. 

The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted over wireless access points, twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to 1000 Mbps. 

Fault Tolerance and Load Balancing 
Load balancing is dividing the amount of work that a computer has to do between two or more computers so that more work gets done in the same amount of time and, in general, all users get served faster. Load balancing can be implemented with hardware, software, or a combination of both. 

Fault tolerance is the capability of a system to cope with internal hardware problems (eg, a disk drive failure) and still continue to operate with minimal impact, such as by bringing a backup system online. There are many levels of fault tolerance, the lowest being the capability to continue operation in the event of a power failure. Many fault-tolerant computer systems mirror all operations -- that is, every operation is performed on two or more duplicate systems, so if one fails the other can take over. Fault tolerance requires redundant hardware and modifications to the operating system. 

In the healthcare IT environment, it is critical that systems are extremely fault tolerant. For example, Microsoft Windows NT Server includes fault tolerance for a failed disk drive by disk mirroring (RAID 1) or disk striping with parity (RAID 5). 

In addition, clustering provides fault tolerance for individual computers. 

Network Hardware and Components 
A network is comprised of a variety of hardware devices. 

These include repeaters or hubs that are used to extend the physical length of an Ethernet network. These are seldom used today, and have been mostly replaced by switches in a healthcare IT network. 

A switch connects similar networks at layer 2 (the data link layer) of the OSI Model. 

A router is a layer 3 device (network layer) of the OSI Model and it makes decisions about path as well as connects different networks based on network addressing. 

A gateway is a machine that connects two or more networks using different network protocols and performs the necessary protocol conversions. 

Network Configuration 
There are three main network configurations, or topologies, that are used:
  1. Bus Network
  2. Ring Network
  3. Star Network
A bus network is a line of computers connected together by a cable. The cable is called the bus. The bus must be terminated at both ends. 

A ring network is a bus network that has been attached at both ends. The data in a ring network travels in only in one direction. 

In order to eliminate data crashes, an improvement was made to the ring network by adding a token, which became known as a Token Ring Network. A token is an electronic impulse that runs around the ring. A device can only send a request or receive data when it has the token. This eliminated data clashes since two requests could no longer be entered at the same time. 

A star network is a network where each network device is connected to a central computer, called a server. The server holds all the software, and the other devices, called nodes, request the software from it. It is possible to have a star network spawn another star network. Star networks are the most commonly employed topologies. 

Network Metrics
Basic network performance metrics describe the performance of the network as seen by a user and are divided into four broad categories: availability, loss and errors, delay, and bandwidth. 

Availability metrics assess how robust a network is; for example, the amount of time it runs without a problem that impacts service availability (also known as “uptime”). 

Loss and error metrics indicate network congestion problems, transmission errors, or equipment malfunctioning. 

Delay metrics are specific to network congestion problems and can also be used to measure the effect of routing changes. 

Bandwidth metrics measure the amount of data that can be transferred across a network in a set amount of time. 


  1. Your site is truly cool and this is an incredible rousing article. Much thanks to you to such an extent. jointenterprisetechnologies.com

  2. One of the current trend in the healthcare delivery model is that continued care is emphasized. The key professionals are not only treating patients for their illness, but they are promoting and managing quality of health. Stanozolol

  3. Similarly, primary healthcare can be easily administered by using practical and handy communication channels. this site

  4. Numerous IT bolster organizations just include a type of service with a monitoring bundle for an ostensible charge and call it oversaw services.pdf to ppt converter

  5. These changes work together and continue to evolve in the way companies use information technology.

  6. Many times, managers who hire employees for those jobs know what they want to do in terms of business, but do not know what skills are needed to get there.

  7. I've been related with both those that succeeded and those that fizzled. Each had special driving edge innovations. wearable tech definition

  8. Technology, accordingly, is an empowering agent whose extreme offer is to make upgrades to our lives.wearable tech function

  9. Thanks a lord to sharing this information Check this page to know about some interesting topics in information technology - Healthcare Software Solutions, Healthcare Technology Solutions, See More

  10. This is such a great resource that you are providing and you give it away for free. I love seeing blog that understand the value of providing a quality resource for free. Website

  11. In any case, do they see how an organization's technology fits into the master plan from a business point of view? That is the place the board preparing ends up essential. Hire freelance software tester software testing

  12. There are a different array of versatile operating frameworks presently available. As of now the greatest moving portable operating framework is Symbian OS, and smaller rivals incorporate Android, Blackberry OS, iOS and Windows Mobile. pdf document filler

  13. One of the advantages of Android OS is that it has large network of designers composing application program that broaden the functionality of the gadgets running with Android OS. pdf document filler

  14. The technology of mobile comes under such great technologies. The use of mobiles is no more limited to the deliverance of personal messages. The advancements in mobile http://www.leadershub.org/business/a-note-on-the-us-rehabilitation-act-section-508/ and their uses have surprised us to a greater extent, both negatively as well as positively.

  15. Say the words "technology management", and some people have a look of puzzlement on their faces - they have no idea what the term means. Basically, technology management follows the same course as other strategies applied in the workplace in order to further the success and sustainability of a company or organization: Planning, organizing, staffing, implementing and monitoring/evaluation. The one difference is that in technology management, you add the Spend Management Software factor to the mix.

  16. Technology and HR-Leverage one for the other: "Technology and HR are empowering influences of business. https://www.techpally.com/debt-consolidation-rules/

  17. Utilizing HR for technology infers overseeing change related with technology by method for correspondence, preparing, procuring, retraining, partner investigation and cognizant keeping. Therefore they can assume correlative jobs."

  18. This comment has been removed by the author.

  19. Hey there. Neat post. I think other site owners should take this website as a model – very clean and excellent style and design, not to mention the content. You’re the man. window

  20. When the summer began, I first thought Bridesmaids was the funniest movie of the year, but I have to say Horrible Bosses will now take that claim. how to's

  21. I discovered your blog site on yahoo and appearance many of your early posts. Keep the very good operate. I merely extra the Feed to my MSN News Reader. Seeking toward reading far more by you at a later date!… tips tricks

  22. I read your articles very excellent and the i agree our all points because all is very good information provided this through in the post. medical imaging data

  23. The key refinement with a vital redistributing firm is that you pay for what you need - when you need it! https://techeries.com/

  24. The showcasing group appointed to your firm can be scaled to suit undertakings of any size and degree. With an in-house group, you have reliable costs. https://techeries.com/

  25. Information Technology and the move to a computerized infrastructure model are bringing great changes to many industries. Often it is the CIO of the company who escort this fundamental shift in the 508 revenue stream. Leading others through modernization, revolutionize and transformation means you must be able to make changes yourself.

  26. There is noticeably big money to understand about this. I assume you made specific nice points in features also. Cockroach Pest Control Abu Dhabi