Infopeople Webcast: Technology Tuesday Series Library Computing Without Wires Tuesday, March 1, 2005 12:00 noon to 1:00 p.m Thomas Edelblute Public Access Systems Coordinator Anaheim Public Library TEdelblute@anaheim.net Agenda 1. Definitions 2. Wireless inside the building 3. Wireless technology and your bookmobile 4. Building to building wireless 5. Security 6. Summary of Benefits 7. Q&A Housekeeping Today s webcast: presentation: 50 minutes Q&A: final 10 minutes Submit your questions via Chat during webcast so presenter gets them in time Fill out evaluation during Q&A Don t wait for Q&A to submit questions Webcast Archives: http://infopeople.org/training/webcasts/archived.php 1
When to Use Chat Get help with technical difficulties send message to HorizonHelp Ask presenter questions send message to ALL Chat with other participants select name from dropdown list Chat Area There List of Participants There Definitions What is Wireless? Radio Television Cell phones Some e-mail devices (Blackberry) Data communications 2
What I Mean By Wireless Definition a way of connecting computers to your ILS without cables Methods Radio waves Lasers Wireless Inside The Building Benefits of Wireless Inside Buildings Easy to implement Inexpensive Solves cabling problems associated with historic buildings 3
Inside the Building: Implementation Issues 1. Building structure issues 2. Standards and their significance 3. Equipment 4. Limitations of WiFi WiFi WiFi = Wireless Fidelity Refers to wireless standards designed to improve compatibility between equipment WiFi Alliance: non-profit that does much of the testing WiFi Key Points 1) Access point (base station) DOES require cable connection 2) Power over Ethernet means access point does not need to be plugged into power outlet 3) Equipment has 2-3 year life span 4) More susceptible to security breaches 4
WiFi Standards 802.11b 802.11a 802.11g 802.11n 802.11b Maximum speed at close range 11 Mbps Maximum range 300 feet line of site Office environment range 100-150 feet Speed at maximum range 1 Mbps Frequency 2.4 GHz 802.11b Site Survey 5
PDAs with 802.11b Wireless Markup Language (WML) made for these devices Innovative Interfaces first on the market with a searchable catalog made for PDAs and cell phone screens 802.11a Maximum speed at close range 54 Mbps Maximum range 175 feet line of site Office environment range 100-150 feet Speed at maximum range 6 Mbps Frequency 5 GHz 802.11g Maximum speed at close range 54 Mbps Maximum range 250 feet line of site Office environment range 100-150 feet Speed at maximum range 2 Mbps Frequency 2.4 GHz 6
Standard to Choose for Public Access 1) 802.11g is the most common on the marketplace 2) g is backward compatible with b 3) 802.11a is available Why not get a hybrid that supports all three standards? WiFi Equipment Required Wireless Access Point connect to cabled LAN start at $100 price increases for security protections Wireless Router connect directly to DSL or cable modem under $200 Wireless Network Cards Each device connecting to the wireless network needs one $100 each Wireless Network Cards Desktop computers usually have to purchase separate wireless network card Laptop computers many have built in wireless card Centrino can buy wireless PC Card 7
Optional WiFi Equipment Authentication Package Software that permits authorized users to use your wireless network Statistical Analysis Software that allows you to keep track of who is using your wireless network Filtering Software Software that allows you to control what sites are accessed via your wireless network Why Not Use Wireless Everywhere? Cabling will always outperform wireless Latency (response time) slower with wireless as distance from access point increases What will you do when the wireless access point fails? 802.11n May make wireless competitive with wired networks Ratification of standard expected in 2 years Promising greater speed and distance Video streaming in mind 8
Wireless Technology and Your Bookmobile 1st and 2nd Generation Cell Phones Text data communication only Telnet connections Insufficient bandwidth for client/server graphical applications 3rd Generation Cell Phones Can support data transfer Citrix or Windows Terminal Services provide screen shots to laptops in the field. 9
Ev-DO (Evolution Data Optimized) Pioneered by Verizon in San Diego and Washington DC Spreading through the United States Check with the provider for the rates covering your area Ev-DO PC Card Bookmobile to ILS Connection 10
Upcoming Cellular Options AT&T, Cingular, and T-Mobile pursuing technologies to compete with Ev-DO called GSM, GRPS, and Edge Faster connection speeds (100-130 kbps) At least a year away from implementation Building to Building Wireless Also known as Municipal Area Networks (MAN) Wireless Alternatives to T-1 and Fiber Optic Connections T-1, leased lines and fiber are more expensive than wireless options Wireless can be almost as fast Options are: 1. 802.11 2. Free Space Optics 3. Spread Spectrum Radio 4. Future Technologies 11
Option One: 802.11 Require special antennas to boost the signal across town Too many residential wireless networks to compete with. Too many sources of interference Option Two: Free Space Optics Short range laser beams Low cost alternative to fiber Connect one building to another Range of 1 or 2 km (depending on model). Connectivity Using Free Space Optics 12
Weather Considerations Fog and snow scatters the laser light Attenuation: decrease in signal strength Compensated by more focused beam Auto-Tracking The ability to maintain target link. Essential due to building sway, vibration, wind effects and temperature fluctuations. Option Three: Spread Spectrum Radio So named for its ability to hop frequencies Hard to intercept Resists jamming Popular with military Now in commercial applications Products claim 10 mile range 13
Option 4: Future Technologies Two new wireless standards Connecting buildings across a city 802.20 favored by Flarion and Arraycomm 802.16 aka WiMAX Favored by Intel and Fujitsu Products by 2006? WiMAX 1. Does not rely on line of site 2. 75 Mbps over several miles 3. Some believe all cellular base stations will have WiMAX support WiMAX chips may appear in laptops for mobile computing may be able to reach areas where DSL, cable and T-1 services are not abundant at 3 Mbps Security Considerations 14
Security Threats War-drivers use your Internet bandwidth advertise the availability of free Internet access to others Malicious hackers trying to steal or alter data inside network People launching attacks outside of your network from within your network (denial of service attacks) Security Solutions 1. Lock down network 2. MAC address authentication 3. Encryption: WEP/WPA/WPA2 4. Monitoring 5. Virtual Private Network (VPN) Lock Down Network Vendors sloppy with security Don t assume defaults are acceptable Ask vendor can administrator name and user be changed or disabled? can telnet be disabled? 15
MAC Address Authentication Security system based on defining computers that are allowed on the wireless network based on their MAC Address MAC address is unique identifier of the network card in a computer e.g. 00-10-DC-CB-89-1A MAC = Medium of Access Control beware: MAC addresses can be inpersonated (spoofed) Encryption WEP Wired Equivalent Privacy first encryption standard for wireless uses RC4 encryption algorithm fallen out of favor due to its weakness WPA WiFi Protected Access strong encryption standard recommended to protect data from evil forces that lurk WPA2 a stronger level of encryption security check for certified products at http://www.wifi.org/opensection/certified_products.asp?tid=2 Rogue Access Point Detection Rogue access point: an access point that is illegally made available on your network How they work: smart sensors analyze network traffic prevent unsecured back door to secured network block rogue communications over the airwaves identify location of rogue 16
Comprehensive Security Solutions Consist of several components: distributed sensors monitor all activity provides authentication rogue access points intrusion detection enforce network policy Example: Cisco Air-Defense Virtual Private Network (VPN) VPNs use the Internet for transporting data but rely on security and encryption to ensure that only authorized users can access the internal network Important to use VPN for all communications that come into library system from the Internet remote connections to ILS bookmobile Summary of Benefits 17
Improve Operations for Staff Mobile workstations Instant inventory updates Roaming Reference connection Movable circulation points out onto the floor Connect Your Bookmobile To Your Circulation System Connect live to circulation system Instant updates for your patron records while out in the field. Instant ability to see place and receive holds. Save Money Replace Expensive T-1 Lines Eliminate ongoing leased line costs Eliminate costs associated with new cable runs 18
Library Wireless List For more information on wireless, subscribe to the libwireless list http://people.morrisville.edu/~drewwe/ wireless/libwireless.html Q&A 19