Agenda. Housekeeping. Library Computing Without Wires Tuesday, March 1, :00 noon to 1:00 p.m. Don t wait for Q&A to submit questions
|
|
- Kelly Logan
- 5 years ago
- Views:
Transcription
1 Infopeople Webcast: Technology Tuesday Series Library Computing Without Wires Tuesday, March 1, :00 noon to 1:00 p.m Thomas Edelblute Public Access Systems Coordinator Anaheim Public Library Agenda 1. Definitions 2. Wireless inside the building 3. Wireless technology and your bookmobile 4. Building to building wireless 5. Security 6. Summary of Benefits 7. Q&A Housekeeping Today s webcast: presentation: 50 minutes Q&A: final 10 minutes Submit your questions via Chat during webcast so presenter gets them in time Fill out evaluation during Q&A Don t wait for Q&A to submit questions Webcast Archives: 1
2 When to Use Chat Get help with technical difficulties send message to HorizonHelp Ask presenter questions send message to ALL Chat with other participants select name from dropdown list Chat Area There List of Participants There Definitions What is Wireless? Radio Television Cell phones Some devices (Blackberry) Data communications 2
3 What I Mean By Wireless Definition a way of connecting computers to your ILS without cables Methods Radio waves Lasers Wireless Inside The Building Benefits of Wireless Inside Buildings Easy to implement Inexpensive Solves cabling problems associated with historic buildings 3
4 Inside the Building: Implementation Issues 1. Building structure issues 2. Standards and their significance 3. Equipment 4. Limitations of WiFi WiFi WiFi = Wireless Fidelity Refers to wireless standards designed to improve compatibility between equipment WiFi Alliance: non-profit that does much of the testing WiFi Key Points 1) Access point (base station) DOES require cable connection 2) Power over Ethernet means access point does not need to be plugged into power outlet 3) Equipment has 2-3 year life span 4) More susceptible to security breaches 4
5 WiFi Standards b a g n b Maximum speed at close range 11 Mbps Maximum range 300 feet line of site Office environment range feet Speed at maximum range 1 Mbps Frequency 2.4 GHz b Site Survey 5
6 PDAs with b Wireless Markup Language (WML) made for these devices Innovative Interfaces first on the market with a searchable catalog made for PDAs and cell phone screens a Maximum speed at close range 54 Mbps Maximum range 175 feet line of site Office environment range feet Speed at maximum range 6 Mbps Frequency 5 GHz g Maximum speed at close range 54 Mbps Maximum range 250 feet line of site Office environment range feet Speed at maximum range 2 Mbps Frequency 2.4 GHz 6
7 Standard to Choose for Public Access 1) g is the most common on the marketplace 2) g is backward compatible with b 3) a is available Why not get a hybrid that supports all three standards? WiFi Equipment Required Wireless Access Point connect to cabled LAN start at $100 price increases for security protections Wireless Router connect directly to DSL or cable modem under $200 Wireless Network Cards Each device connecting to the wireless network needs one $100 each Wireless Network Cards Desktop computers usually have to purchase separate wireless network card Laptop computers many have built in wireless card Centrino can buy wireless PC Card 7
8 Optional WiFi Equipment Authentication Package Software that permits authorized users to use your wireless network Statistical Analysis Software that allows you to keep track of who is using your wireless network Filtering Software Software that allows you to control what sites are accessed via your wireless network Why Not Use Wireless Everywhere? Cabling will always outperform wireless Latency (response time) slower with wireless as distance from access point increases What will you do when the wireless access point fails? n May make wireless competitive with wired networks Ratification of standard expected in 2 years Promising greater speed and distance Video streaming in mind 8
9 Wireless Technology and Your Bookmobile 1st and 2nd Generation Cell Phones Text data communication only Telnet connections Insufficient bandwidth for client/server graphical applications 3rd Generation Cell Phones Can support data transfer Citrix or Windows Terminal Services provide screen shots to laptops in the field. 9
10 Ev-DO (Evolution Data Optimized) Pioneered by Verizon in San Diego and Washington DC Spreading through the United States Check with the provider for the rates covering your area Ev-DO PC Card Bookmobile to ILS Connection 10
11 Upcoming Cellular Options AT&T, Cingular, and T-Mobile pursuing technologies to compete with Ev-DO called GSM, GRPS, and Edge Faster connection speeds ( kbps) At least a year away from implementation Building to Building Wireless Also known as Municipal Area Networks (MAN) Wireless Alternatives to T-1 and Fiber Optic Connections T-1, leased lines and fiber are more expensive than wireless options Wireless can be almost as fast Options are: Free Space Optics 3. Spread Spectrum Radio 4. Future Technologies 11
12 Option One: Require special antennas to boost the signal across town Too many residential wireless networks to compete with. Too many sources of interference Option Two: Free Space Optics Short range laser beams Low cost alternative to fiber Connect one building to another Range of 1 or 2 km (depending on model). Connectivity Using Free Space Optics 12
13 Weather Considerations Fog and snow scatters the laser light Attenuation: decrease in signal strength Compensated by more focused beam Auto-Tracking The ability to maintain target link. Essential due to building sway, vibration, wind effects and temperature fluctuations. Option Three: Spread Spectrum Radio So named for its ability to hop frequencies Hard to intercept Resists jamming Popular with military Now in commercial applications Products claim 10 mile range 13
14 Option 4: Future Technologies Two new wireless standards Connecting buildings across a city favored by Flarion and Arraycomm aka WiMAX Favored by Intel and Fujitsu Products by 2006? WiMAX 1. Does not rely on line of site Mbps over several miles 3. Some believe all cellular base stations will have WiMAX support WiMAX chips may appear in laptops for mobile computing may be able to reach areas where DSL, cable and T-1 services are not abundant at 3 Mbps Security Considerations 14
15 Security Threats War-drivers use your Internet bandwidth advertise the availability of free Internet access to others Malicious hackers trying to steal or alter data inside network People launching attacks outside of your network from within your network (denial of service attacks) Security Solutions 1. Lock down network 2. MAC address authentication 3. Encryption: WEP/WPA/WPA2 4. Monitoring 5. Virtual Private Network (VPN) Lock Down Network Vendors sloppy with security Don t assume defaults are acceptable Ask vendor can administrator name and user be changed or disabled? can telnet be disabled? 15
16 MAC Address Authentication Security system based on defining computers that are allowed on the wireless network based on their MAC Address MAC address is unique identifier of the network card in a computer e.g DC-CB-89-1A MAC = Medium of Access Control beware: MAC addresses can be inpersonated (spoofed) Encryption WEP Wired Equivalent Privacy first encryption standard for wireless uses RC4 encryption algorithm fallen out of favor due to its weakness WPA WiFi Protected Access strong encryption standard recommended to protect data from evil forces that lurk WPA2 a stronger level of encryption security check for certified products at Rogue Access Point Detection Rogue access point: an access point that is illegally made available on your network How they work: smart sensors analyze network traffic prevent unsecured back door to secured network block rogue communications over the airwaves identify location of rogue 16
17 Comprehensive Security Solutions Consist of several components: distributed sensors monitor all activity provides authentication rogue access points intrusion detection enforce network policy Example: Cisco Air-Defense Virtual Private Network (VPN) VPNs use the Internet for transporting data but rely on security and encryption to ensure that only authorized users can access the internal network Important to use VPN for all communications that come into library system from the Internet remote connections to ILS bookmobile Summary of Benefits 17
18 Improve Operations for Staff Mobile workstations Instant inventory updates Roaming Reference connection Movable circulation points out onto the floor Connect Your Bookmobile To Your Circulation System Connect live to circulation system Instant updates for your patron records while out in the field. Instant ability to see place and receive holds. Save Money Replace Expensive T-1 Lines Eliminate ongoing leased line costs Eliminate costs associated with new cable runs 18
19 Library Wireless List For more information on wireless, subscribe to the libwireless list wireless/libwireless.html Q&A 19
Wireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationIt is the process of sharing data, programs, and information between two or more computers.
1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet
More informationDigital Entertainment. Networking Made Easy
Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered
More informationThis tutorial has been designed to help beginners understand the basic concepts of WiMAX.
About the Tutorial WiMAX is one of the hottest broadband wireless technologies around today. It is based on IEEE 802.16 specification and it is expected to deliver high quality broadband services. This
More informationUnit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1
1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationNaveen Kumar. 1 Wi-Fi Technology
Naveen Kumar 1 Contents 2 Introduction Need of Purpose History How a Wi-Fi Network Works Topologies & Configurations Applications Wi-Fi Security Advantages & Limitations Innovations Introduction 3 Wireless
More informationChapter 5 Local Area Networks. Computer Concepts 2013
Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section
More informationWireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS
How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms
More informationWhat is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator
What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator Introduction- What is WiMAX WiMAX -Worldwide Interoperability
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationNetworking. Prof. Abdul Hameed
Networking Prof. Abdul Hameed http://informationtechnology.pk http://informationtechnology.pk 0 Chapter Topics Networking Fundamentals Network Architectures and Components Connecting to the Internet Installing
More informationBluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016
3.3 Latest Technology in Wireless Network Bluetooth Bluetooth Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment
More informationGLOSSARY OF CELLUAR TERMS
GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service
More informationChapter 7. Telecommunications, the Internet, and Wireless Technology
Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different
More informationLecture 8 Winter 2006 Enterprise and Personal Communications Networks
Information Technology Lecture 8 Winter 2006 Enterprise and Personal Communications Networks 1 Objectives Identify the reasons that multiuser systems are used in business. Describe eight network service
More informationKarthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03
Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03 Introduction Although a variety of wireless network technologies have or will soon reach the general business market, wireless
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g
More informationPrepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT
Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define
More informationInternet Architecture
Internet Architecture Lecture 8: How Wireless Connections and WiFi Work Assistant Teacher Samraa Adnan Al-Asadi 1 Introduction The wired world created a revolution of allowing people to connect to the
More informationAssignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson
Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria
More informationWireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationWIMAX. WIMAX (Worldwide Interoperability for Microwave Access ): Field of application:
WIMAX WiMAX (Worldwide Interoperability for Microwave Access) is a technology that focuses on providing data over long distances in a wireless mode, very similar to the cellular mobile concept. WiMAX is
More informationWireless Community Networks: Evolution and Technical Challenges
Wireless Community Networks: Evolution and Technical Challenges Luiz A. DaSilva Bradley Department of Electrical and Computer Engineering Workshop on Nationwide Internet Access and Online Applications
More informationPurpose of this book. Chapter 1: Where to Begin
1 Where to Begin This book was created by a team of individuals who each, in their own field, are actively participating in the ever-expanding Internet by pushing its reach farther than ever before. The
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More informationVendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo
Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationend systems, access networks, links circuit switching, packet switching, network structure
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput
More informationWLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC
WLAN Security Dr. Siwaruk Siwamogsatham ThaiCERT, NECTEC Agenda Wireless Technology Overview IEEE 802.11 WLAN Technology WLAN Security Issues How to secure WLAN? WLAN Security Technologies Wireless Technologies
More informationVISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks
Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.
More informationWireless Network Security
Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless
More informationHow Insecure is Wireless LAN?
Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationBreezeACCESS VL Security
BreezeACCESS VL Security Technical Paper Alvarion Ltd. All rights reserved. The material contained herein is proprietary. No part of this publication may be reproduced in any form without the express written
More informationMulti-Layered Security Framework for Metro-Scale Wi-Fi Networks
Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the
More informationBright House Networks Enterprise Solutions. FINAL Proposal for: WE RE WIRED DIFFERENTLY. Voice Data Cloud Managed Services. Proposal Date: 4/14/2016
Bright House Networks Enterprise Solutions Voice Data Cloud Managed Services FINAL Proposal for: City of Port Orange Lisa Bryant Account Executive Bright House Networks Enterprise Solutions 65 S Keller
More informationChapter 7. Video cases:
Chapter 7 Telecommunications, the Internet, and Wireless Technology Video cases: Case 1: Telepresence Moves Out of the Boardrooom and Into the Field Case 2: Unified Communications Systems: Virtual Collaboration
More informationChapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011
Introduction ti Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationObjectives. Learn how computers are connected. Become familiar with different types of transmission media
Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives
More informationPioneer Communications Internet Services Disclosure
Pioneer Communications Internet Services Disclosure Pioneer Communications ( Pioneer ) is the leading Internet service provider for Southwest Kansas communities with a reputation for excellence that goes
More informationRemote Access Techniques and Issues
Remote Access Techniques and Issues Bill Klein Networking and Telecommunications Services 10/25/2006 klein@ku.edu Introduction Presenter bio The Information Services "triad" Information repositories Libraries
More informationAC750 Dual Band Wireless-AC Access Point, Router and Repeater - Wall Plug
AC750 Dual Band Wireless-AC Access Point, Router and Repeater - Wall Plug Product ID: WFRAP433ACD This dual-band wireless access point, router, and repeater makes it easy to create a wireless network from
More information5 Tips to Fortify your Wireless Network
Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In
More informationNetwork+ Guide to Networks 6 th Edition. Chapter 8 Wireless Networking
Network+ Guide to Networks 6 th Edition Chapter 8 Wireless Networking Objectives Explain how nodes exchange wireless signals Identify potential obstacles to successful wireless transmission and their repercussions,
More informationChapter 7 TELECOMMUNICATIONS, THE INTERNET, AND WIRELESS TECHNOLOGY. Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION
MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 7 TELECOMMUNICATIONS, THE INTERNET, VIDEO CASES Case 1: Traveling the Internet and Wireless Technology Case 2: Unified Communications Systems With Virtual
More informationWireless Network Infrastructure. Inscape Data Corporation January 10, 2006
Wireless Network Infrastructure Inscape Data Corporation January 10, 2006 1 Introduction Purpose Providing fixed wireless Internet connectivity to the general population from rural towns to densely populated
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationIntroduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005
Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services
More informationTwelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1
Computers Are Your Future Twelfth Edition Chapter 8: Wired and Wireless Communication Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Wired and Wireless Communication Copyright 2012
More informationend systems, access networks, links circuit switching, packet switching, network structure
Introduction Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and
More informationChapter by Prentice Hall
Chapter 6 Tl Telecommunications, the Internet, and Wireless Technology 6.1 2007 by Prentice Hall STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationDr./ Ahmed Mohamed Rabie Sayed
1 Dr./ Ahmed Mohamed Rabie Sayed 2 A network is a group of two or more computer systems linked together to exchange data and share resources, including expensive peripherals. 3 A local area network (LAN)
More informationSecure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements
Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users
More informationSecuring Wireless Networks by By Joe Klemencic Mon. Apr
http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies
More informationRiverStreet Networks Network TRANSPARENCY Statement
RiverStreet Networks Network TRANSPARENCY Statement RiverStreet Networks ( RiverStreet or Company ) provides this Network Transparency Statement in accordance with the FCC s Restore Internet Freedom Rules
More informationAdvanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.
Advanced Mobile Computing and Networking - CS 560 Assessment CA 40% - Assignment 20% - 2 Tests 10% each Exam 60% Wireless Technologies, Infrared Data Association (),, and Institute of Electrical and Electronic
More informationWi-Fi - Why for? A Word About Spectrum. I T I n f r a s t r u c t u r e S o l u t i o n s
I T I n f r a s t r u c t u r e S o l u t i o n s Note: The following technical article was current at the time it was published. However, due to changing technologies and standards updates, some of the
More informationWilkes Communications, Inc. Network TRANSPARENCY Statement
Wilkes Communications, Inc. Network TRANSPARENCY Statement Wilkes Communications, Inc. ( Wilkes or Company ) provides this Network Transparency Statement in accordance with the FCC s Restore Internet Freedom
More informationCEN 538 Wireless LAN & MAN Networks
King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book
More information1. INTRODUCTION. Wi-Fi 1
Wi-Fi 1 1. INTRODUCTION Wi-Fi, or Wireless Fidelity, is freedom: it allows you to connect to the Internet from your home, a bed in a hotel room or at a conference room at work without wires. How? Wi-Fi
More informationNINESTAR CONNECT. Network TRANSPARENCY statement
NINESTAR CONNECT Network TRANSPARENCY statement NineStar Connect ( NineStar Connect or Company ) provides this Network Transparency Statement in accordance with the FCC s Restore Internet Freedom Rules
More informationA+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling
A+ Guide to Managing & Maintaining Your PC, Chapter 16 Networking Types, Devices, and Cabling Objectives Learn about network types and topologies Learn about the hardware used to build local networks Learn
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE
More informationInformation Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards
COUNTY OF SACRAMENTO Inter-Departmental Correspondence December 6, 2007 TO: FROM: Information Technology Policy Board Members Jeff Leveroni, Chair Technology Review Group SUBJECT: Update to County WAN/LAN
More informationCSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing.
Multiplexing: combining information streams from multiple sources for transmission over a shared medium Demultiplexing: separating a combination back into individual information streams CSIS 4222 Ch 11:
More informationInterworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...
Interworking 2006 Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks Interworking Conference, 15th - 17th of January 2007 Dr-Ing Kai-Oliver Detken Business URL: http://wwwdecoitde
More informationPalmetto rural telephone cooperative, INC. Network TRANSPARENCY statement
Palmetto rural telephone cooperative, INC. Network TRANSPARENCY statement Palmetto Rural Telephone Cooperative, Inc. ( PRTC or Company ) provides this Network Transparency Statement in accordance with
More informationThe dark side of IOT. Francesco Zucca. Automation Instrumentation Summit Wireless Expert
Automation Instrumentation Summit - 2017 The dark side of IOT Francesco Zucca Wireless Expert 1 Agenda Introduction IIOT How to work WSN Typical hacker attack in WSN Issue with Drones Security Countermeasures
More informationA Glossary of Terms. 9 July 2004, Rev. B
2004 Allied Telesyn, Inc. A Glossary of Terms 9 July 2004, Rev. B A glossary of terms to guide readers through the jargon and acronyms of Wireless Local Area Network technology. www.alliedtelesyn.com PAGE
More informationWireless Security Security problems in Wireless Networks
Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security
More informationThe WiMAX Technology
Page 2 Oeconomics of Knowledge, Volume 2, Issue 2, 2Q 2010 The WiMAX Technology Felician ALECU, PhD, University Lecturer Department of Economic Informatics Academy of Economic Studies, Bucharest, Romania
More informationEverybody s connecting.
Everybody s connecting. The ABGs of Wireless LAN Technology Overview February 2003 Introduction Wireless LANs (WLANs) using the 802.11 standard offer compelling value in office, public, and home LAN environments.
More informationWireless Networking Basics. Ed Crowley
Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2
More informationWireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.
Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE
More informationWireless MAXg Technology
Wireless MAXg Technology MAXimizing range, performance, security and simplicity for 802.11g networks Technology Note Wireless technology has undoubtedly become a ubiquitous presence in our computing environment,
More informationCase study of Wireless Technologies in Industrial Applications
International Journal of Scientific and Research Publications, Volume 7, Issue 1, January 2017 257 Case study of Wireless Technologies in Industrial Applications Rahul Hanumanth Rao Computer Information
More informationChapter 7. Basic Wireless Concepts and Configuration. Part I
Chapter 7 Basic Wireless Concepts and Configuration Part I CCNA3-1 Chapter 7-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,
More informationSubscriber Management -Billing data - Authentication NAP. Backhaul Access. Backhaul. Backhaul Access CCU BaseT CCU3000 B/U CCU3000
Introduction The LMS3000 is another breakthrough member of WaveRider Communications Inc. s Last Mile Solution wireless Internet product line. The LMS3000 is the first system in the world that brings non-line-of-sight
More informationHome Area Networks. Outline
Home Area Networks CS 687 University of Kentucky Fall 2015 Acknowledgment: Some slides are adapted from the slides distributed with the book Computer Networking: A Top Down Approach, 5th edition. Jim Kurose,
More informationGigabit Wireless Applications Using 60GHz Radios. White Paper
Gigabit Wireless Applications Using 60GHz Radios INTRODUCTION The adoption of each successive generation of Ethernet technology has been driven by the rate at which the cost of the new generation has approached
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationWireless Network Security Fundamentals and Technologies
Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology
More informationNetwork TRANSPARENCY statement
Network TRANSPARENCY statement ND Tel ( NDTC or Company ) provides this Network Transparency Statement in accordance with the FCC s Restore Internet Freedom Rules to ensure that you have sufficient information
More informationBasic Wireless Settings on the CVR100W VPN Router
Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationCSC Introduction to Computers and Their Applications
CSC 170 - Introduction to Computers and Their Applications Lecture 6 An Introduction to Networks Communication Systems Networks can be classified in many ways; as a network user, you ll want to keep in
More informationHow Does it Work. Presented by StarSight Team
How Does it Work Presented by StarSight Team Agenda Why StarSight Overview of Wireless Technologies WLAN Components Throughput and Coverage Interference Access Point Placement Equipment considerations
More informationWPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)
WPA SECURITY (Wi-Fi Protected Access) Presentation By Douglas Cheathem (csc 650.01 Spring 2007) OUTLINE Introduction Security Risk Vulnerabilities Prevention Conclusion Live Demo Q & A INTRODUCTION! WPA
More informationWireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved
Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks
More informationChapter 12. Network Organization and Architecture
Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified
More informationChapter Three. Conducted and Wireless Media. Data Communications and Computer Networks: A Business User's Approach Seventh Edition
Chapter Three Conducted and Wireless Media Data Communications and Computer Networks: A Business User's Approach Seventh Edition After reading this chapter, you should be able to: Outline the characteristics
More informationVendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo
Vendor: Cisco Exam Code: 646-206 Exam Name: Cisco Sales Expert Version: Demo QUESTION 1 What are three current business factors that are influencing customer decisions in making technology investments?
More informationMain area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation
Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]
More informationSYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS
SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS David Murotake, (SCA Technica, Inc. Nashua NH, USA; david.murotak@scatechnica.com) Antonio Martin (SCA Technica, Inc., Nashua NH, USA;
More information