BOMBO
BOMBO
BOMBO
1
Contents
List of Abbreviation ....................................................................................................................................... 3
INTRODUCTION ............................................................................................................................................. 4
Scope: ............................................................................................................................................................ 5
Chapter one: ................................................................................................................................................. 7
WAN AND LAN NETWORKS .................................................................................................................... 7
Local Area Network (LAN) – ...................................................................................................................... 7
Wide Area Network (WAN) – .................................................................................................................... 8
How to set up a LAN...................................................................................................................................... 9
Network Designing ...................................................................................................................................... 11
Chapter two: ............................................................................................................................................... 13
BOMBO RRH TANGA ................................................................................................................................... 13
AFYA EHMS .................................................................................................................................................. 13
Benefits of Afya EHMS ................................................................................................................................ 15
Implementation and Challenges ................................................................................................................. 16
APPLICATION OF ICT OFFICE AT BOMBO HOSPITAL .................................................................................... 16
CONCLUSION ............................................................................................................................................... 18
REFERENCES ................................................................................................................................................ 20
2
List of Abbreviation
WAN………Wide Area Network
LAN………...Local Area Network
IoT…………..Internet of Things
US…………..United States
URLs...............Uniform Resource Locator
MAC.................Medium Access Control
IP.....................Internet Protocol
NIC.................Network Interface Card
SDN..................Software Defined
IBN...................Intent Based
QoS....................Quality of Services
PSTN.................Public Switched Telephone Network
3
INTRODUCTION
Networking, also known as computer networking, is the practice of
transporting and exchanging data between nodes over a shared medium
in an information system. Networking comprises not only the design,
construction and use of a network, but also the management,
maintenance and operation of the network infrastructure, software and
policies.
Computer networking enables devices and endpoints to be connected to
each other on a local area network (LAN) or to a larger network, such as
the internet or a private wide area network (WAN). This is an essential
function for service providers, businesses and consumers worldwide to
share resources, use or offer services, and communicate. Networking
facilitates everything from telephone calls and text messaging to
streaming video and the internet of things (IoT).
The internet is a global network of interconnected computers and servers
that allows people to communicate, share information, and access
resources from anywhere in the world. It was created in the 1960s by the
US Department of Defense as a way to connect computers and share
information between researchers and scientists.
The World Wide Web, or simply the web, is a system of interconnected
documents and resources, linked together by hyperlinks and URLs. It
was created by Tim Berners-Lee in 1989 as a way for scientists to share
information more easily. The web quickly grew to become the most
popular way to access information on the internet.
Together, the internet and the web have revolutionized the way we
communicate, do business, and access information. They have made it
possible for people all over the world to connect with each other
instantly and have transformed many industries, from media and
entertainment to education and healthcare.
4
Scope:
Specialized devices such as switches, routers, and access points form the
foundation of computer networks.
Switches connect and help to internally secure computers, printers,
servers, and other devices to networks in homes or organizations. Access
points are switches that connect devices to networks without the use of
cables.
Routers connect networks to other networks and act as dispatchers. They
analyzing data to be sent across a network, choose the best routes for it,
and send it on its way. Routers connect your home and business to the
world and help protect information from outside security threats.
While switches and routers differ in several ways, one key difference is
how they identify end devices. A Layer 2 switch uniquely identifies a
device by its "burned-in" MAC address. A Layer 3 router uniquely
identifies a device's network connection with a network-assigned IP
address.
Today, most switches include some level of routing functionality.
MAC and IP addresses uniquely define devices and network
connections, respectively, in a network. A MAC address is a number
assigned to a network interface card (NIC) by a device's manufacturer.
An IP address is a number assigned to a network connection.
How is computer networking evolving?
Modern-day networks deliver more than connectivity. Organizations are
embarking on transforming themselves digitally. Their networks are
critical to this transformation and to their success. The types of network
architectures that are evolving to meet these needs are as follows:
• Software-defined (SDN): In response to new requirements in the
"digital" age, network architecture is becoming more
programmable, automated, and open. In software-defined
5
networks, routing of traffic is controlled centrally through
software-based mechanisms. This helps the network to react
quickly to changing conditions.
• Intent-based: Building on SDN principles, intent-based networking
(IBN) not only introduces agility but also sets up a network to
achieve desired objectives by automating operations extensively,
analyzing its performance, pinpointing problematic areas,
providing all-around security, and integrating with business
processes.
• Virtualized: The underlying physical network infrastructure can be
partitioned logically, to create multiple "overlay" networks. Each
of these logical networks can be tuned to meet specific security,
quality-of-service (QoS), and other requirements.
• Controller-based: Network controllers are crucial to scaling and
securing networks. Controllers automate networking functions by
translating business intent to device configurations, and they
monitor devices continuously to help ensure performance and
security. Controllers simplify operations and help organizations
respond to changing business requirements.
• Multidomain integrations: Larger enterprises may construct
separate networks, also called networking domains, for their
offices, WANs, and data centers. These networks communicate
with one another through their controllers. Such cross-network, or
multidomain, integrations generally involve exchanging relevant
operating parameters to help ensure that desired business outcomes
that span network domains are achieved.
6
Chapter one:
7
Wide Area Network (WAN) –
WAN or Wide Area Network is a computer network that extends over a
large geographical area, although it might be confined within the bounds
of a state or country. WAN has a range of above 50 km. A WAN could be
a connection of LAN connecting to other LANs via telephone lines and
radio waves and may be limited to an enterprise (a corporation or an
organization) or accessible to the public. The technology is high-speed
and relatively expensive.
There are two types of WAN: Switched WAN and Point-to-Point WAN.
WAN is difficult to design and maintain. Similar to a MAN, the fault
tolerance of a WAN is less and there is more congestion in the network.
A Communication medium used for WAN is PSTN(Public Switched
Telephone Network) or Satellite Link. Due to long-distance
transmission, the noise and error tend to be more in WAN.
WAN’s data rate is slow about a 10th LAN’s speed since it involves
increased distance and increased number of servers and terminals etc.
The speed of WAN ranges from a few kilobits per second (Kbps) to
megabits per second (Mbps). Propagation delay is one of the biggest
problems faced here. Devices used for the transmission of data through
WAN are Optic wires, Microwaves, and Satellites. An example of a
Switched WAN is the asynchronous transfer mode (ATM) network and
Point-to-Point WAN is a dial-up line that connects a home computer to
the Internet.
There are many advantages of LAN over MAN and WAN, such as LAN
provide excellent reliability, a high data transmission rate, and can
easily be managed and shares peripheral devices too. Local Area
Network cannot cover cities or towns and for that Metropolitan Area
Network is needed, which can connect a city or a group of cities
together. Further, for connecting a Country or a group of Countries one
requires a Wide Area Network.
8
How to set up a LAN
Setting up a LAN may seem like a daunting task, but it doesn't have to
be. With the right tools and knowledge, you can have your LAN up and
running in no time. This article will guide you through the steps to set up
a LAN network.
1. Plan the network solution and determine the layout and connection
methods of each device in the network. Design an appropriate network
topology taking into account network requirements and equipment
location.
2. To choose the right equipment, you will need at least a computer,
router or switch, and Ethernet cable. The most common and simplest
LAN switch is the SMB switch. SMB switches are designed for small
and medium-sized businesses or office environments. These switches
typically have a modest port count, such as 8, 16, or 24 ports, which is
sufficient for networks of these sizes. Setup and operation are simple,
plug and play, no complicated configuration steps required.
3. Connect your computer to your router or network switch. It would
help if you did it via an Ethernet cable, which is as simple as plugging
one end of the Ethernet cable into your computer and the other end into
your router or network switch. Of course, you need to connect according
to your specific network plan. The computer will prompt you to go
through the first-time connection setup wizard, or you can set it up in the
Network and Sharing Center and select the option to set up a new
connection or network.
4. Configure each device according to the device's instruction manual or
user manual—set network parameters such as IP address, subnet mask,
default gateway, and DNS server. Make sure devices can communicate
with each other and set up security and access controls as needed.
9
Above is the picture taken for the network cabinet at bombo hospital
tanga
10
Network Designing
As networks become mission-critical for business functions, design
decisions made by IT professionals can have far-reaching implications.
A network with a well-planned design will perform better. It will be
more secure and resilient and easier to troubleshoot, and it will scale
easily and adapt to future technologies. Whereas network design
encompasses business processes and results, network topology refers
to the design as viewed through network diagrams, often called
topology maps. Ring, chain, tree, and mesh are a few types of network
topology.
A network diagram is typically the workhorse of the design process. It
provides a visual representation of the network and integrates
information such as physical connections; quantity, type, and location of
all devices and endpoints; IP addressing; and security processes and
architecture. Network design software can help by creating a site or
office plan to map physical connections.
When building a network from scratch, the first step is to assemble a list
of all the assets, endpoints, users, devices, LANs, and other network
elements. IT teams enter this information in the network design
application to create the first iteration of a network diagram. When
designing for existing network environments, the process integrates
existing infrastructure that must be maintained or kept running during
production and deployment of the new network.
Existing use patterns and workflows can inform the new network
hierarchies and topologies, which will evolve as security, product, and
user experience teams collaborate on the design.
11
12
Chapter two:
14
8. Referral and Communication Support: The system facilitates
seamless referrals and communication between healthcare
providers, enabling them to share patient information across
different facilities as needed. This improves care coordination,
especially for patients needing specialized treatment.
9. Improved Data Security: Afya EHMS is built with data security
in mind, incorporating security measures such as access controls,
data encryption, and audit trails to protect patient confidentiality
and ensure compliance with data protection regulations.
10. Telemedicine and Remote Care Support: Some versions of
Afya EHMS support telemedicine, enabling remote consultations
and follow-ups, which is especially beneficial for patients in rural
or underserved areas.
15
Implementation and Challenges
Afya EHMS is being implemented in various public and private
healthcare facilities across Tanzania. However, challenges such as
infrastructure limitations (like internet access in remote areas), funding,
and training for healthcare staff to fully utilize the system can impact its
adoption and effectiveness. Nonetheless, Afya EHMS is a key step
toward modernizing Tanzania’s healthcare system and improving
healthcare outcomes through digital transformation.
16
2. Health Information Systems Management: They manage
electronic health information systems (HIS) used for patient
records, appointments, billing, and inventory. This includes
implementing and maintaining systems like EMR (Electronic
Medical Records) or other digital record-keeping software to
improve the accuracy and accessibility of patient data.
3. Data Management and Security: ICT officers oversee data
security protocols to ensure patient data privacy and compliance
with regulations. This involves managing access controls, setting
up secure data storage systems, and implementing measures to
prevent unauthorized access, data breaches, and other security
threats.
4. Network Administration: They maintain the hospital’s internet
and local area network (LAN) infrastructure, ensuring reliable
connectivity throughout the facility. This involves monitoring
network performance, troubleshooting connectivity issues, and
optimizing the network for smooth data exchange.
5. Training and User Support: ICT officers provide training and
ongoing support for hospital staff on the use of digital tools, health
information systems, and other technology resources.
6. Telemedicine Support: ICT officers may also support
telemedicine services by ensuring that the video conferencing
tools, data transmission channels, and relevant applications run
smoothly.
7. Inventory and Asset Management: ICT officers track and
manage technology assets within the hospital, including
computers, network devices, and software licenses. They maintain
an inventory and plan for necessary upgrades or replacements to
keep the hospital’s technology up-to-date.
8. Collaboration with Health Authorities: They may coordinate
with the Ministry of Health or other relevant bodies to implement
national health information policies, upgrade software systems,
and report on key hospital metrics as required.
9. Digital Transformation Initiatives: ICT officers can play a key
role in any digital transformation initiatives, helping to introduce
17
new technologies that improve patient care and streamline
administrative functions.
10. Technical Support for Biomedical Equipment: In some
cases, ICT officers collaborate with biomedical technicians to
ensure that digital aspects of medical equipment (such as
diagnostic machines with computer interfaces) are integrated
properly and maintained.
These activities help enhance the hospital's efficiency, improve patient
record management, and contribute to better healthcare delivery overall.
CONCLUSION
Bombo Regional Referral Hospital in Tanga, Tanzania, uses the Afya
EHMS (Electronic Health Management System) for several reasons, all
aimed at improving healthcare delivery, operational efficiency, and data
management within the hospital.
1. Improved Patient Data Management: Afya EHMS enables
Bombo Hospital to digitally manage patient records, including
medical history, diagnosis, treatments, and prescriptions.
2. Enhanced Efficiency: The system streamlines various
administrative processes like patient registration, appointment
scheduling, and billing, reducing wait times and helping the
hospital manage patient flow better.
3. Better Coordination of Care: With Afya EHMS, healthcare
providers at Bombo Hospital can share patient information
seamlessly among departments. This is essential for coordinated
care, especially when patients need to consult multiple specialists
or require follow-up in other departments, such as laboratory or
radiology.
4. Accurate Billing and Financial Transparency: The system’s
billing and financial management features simplify the hospital’s
billing process, ensuring accurate and timely payments and
18
reducing errors. This transparency is beneficial for both patients
and the hospital, as it improves trust and accountability.
5. Effective Inventory and Supply Management: Managing
inventory is crucial, especially in a busy referral hospital like
Bombo, which serves a large patient population. Afya EHMS
tracks the availability of drugs, medical supplies, and equipment,
preventing stockouts, reducing wastage, and ensuring that essential
items are available when needed.
6. Enhanced Data Security and Compliance: Digitizing patient
records and sensitive data comes with the responsibility of
protecting it. Afya EHMS incorporates data security measures,
such as access controls and encryption, helping Bombo Hospital
meet data privacy and protection standards and keeping patient
information secure.
7. Access to Reporting and Analytics: Afya EHMS provides Bombo
Hospital with tools for data analysis and report generation. This is
valuable for tracking healthcare trends, disease patterns, and
treatment outcomes, allowing hospital management to make data-
driven decisions and monitor the hospital’s performance.
8. Supports Telemedicine: As a regional referral hospital, Bombo
may serve patients from distant areas. Afya EHMS supports
telemedicine, enabling remote consultations and follow-ups, which
is beneficial for patients who cannot easily travel to the hospital,
particularly those in rural areas.
9. Compliance with National Health Strategy: Tanzania’s Ministry
of Health promotes digital health solutions as part of its strategy to
improve healthcare delivery across the country. Bombo Hospital’s
adoption of Afya EHMS aligns with national health policies and
objectives to modernize healthcare infrastructure and improve
accessibility and quality of care.
19
By using Afya EHMS, Bombo Regional Referral Hospital aims to meet
its high patient demand more effectively, enhance patient care quality,
and contribute to the larger goals of Tanzania’s healthcare system for
improved health outcomes through digital innovation.
REFERENCES
http://192.168.29.11:3005/private/dashboard
20