Agenda. Housekeeping. Library Computing Without Wires Tuesday, March 1, :00 noon to 1:00 p.m. Don t wait for Q&A to submit questions

Similar documents
Wireless technology Principles of Security

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

It is the process of sharing data, programs, and information between two or more computers.

Digital Entertainment. Networking Made Easy

This tutorial has been designed to help beginners understand the basic concepts of WiMAX.

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

Wireless Attacks and Countermeasures

Naveen Kumar. 1 Wi-Fi Technology

Chapter 5 Local Area Networks. Computer Concepts 2013

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator

Wireless LAN Security (RM12/2002)

Networking. Prof. Abdul Hameed

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

GLOSSARY OF CELLUAR TERMS

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks

Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03

Wireless# Guide to Wireless Communications. Objectives

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Internet Architecture

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson


Wireless (Select Models Only) User Guide

WIMAX. WIMAX (Worldwide Interoperability for Microwave Access ): Field of application:

Wireless Community Networks: Evolution and Technical Challenges

Purpose of this book. Chapter 1: Where to Begin

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

end systems, access networks, links circuit switching, packet switching, network structure

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

Wireless Network Security

How Insecure is Wireless LAN?

Last Lecture: Data Link Layer

BreezeACCESS VL Security

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Bright House Networks Enterprise Solutions. FINAL Proposal for: WE RE WIRED DIFFERENTLY. Voice Data Cloud Managed Services. Proposal Date: 4/14/2016

Chapter 7. Video cases:

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Pioneer Communications Internet Services Disclosure

Remote Access Techniques and Issues

AC750 Dual Band Wireless-AC Access Point, Router and Repeater - Wall Plug

5 Tips to Fortify your Wireless Network

Network+ Guide to Networks 6 th Edition. Chapter 8 Wireless Networking

Chapter 7 TELECOMMUNICATIONS, THE INTERNET, AND WIRELESS TECHNOLOGY. Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION

Wireless Network Infrastructure. Inscape Data Corporation January 10, 2006

ECE 4450:427/527 - Computer Networks Spring 2017

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1

end systems, access networks, links circuit switching, packet switching, network structure

Chapter by Prentice Hall

Wireless (Select Models Only) User Guide

Dr./ Ahmed Mohamed Rabie Sayed

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements

Securing Wireless Networks by By Joe Klemencic Mon. Apr

RiverStreet Networks Network TRANSPARENCY Statement

Advanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.

Wi-Fi - Why for? A Word About Spectrum. I T I n f r a s t r u c t u r e S o l u t i o n s

Wilkes Communications, Inc. Network TRANSPARENCY Statement

CEN 538 Wireless LAN & MAN Networks

1. INTRODUCTION. Wi-Fi 1

NINESTAR CONNECT. Network TRANSPARENCY statement

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards

CSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing.

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

Palmetto rural telephone cooperative, INC. Network TRANSPARENCY statement

The dark side of IOT. Francesco Zucca. Automation Instrumentation Summit Wireless Expert

A Glossary of Terms. 9 July 2004, Rev. B

Wireless Security Security problems in Wireless Networks

The WiMAX Technology

Everybody s connecting.

Wireless Networking Basics. Ed Crowley

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless MAXg Technology

Case study of Wireless Technologies in Industrial Applications

Chapter 7. Basic Wireless Concepts and Configuration. Part I

Subscriber Management -Billing data - Authentication NAP. Backhaul Access. Backhaul. Backhaul Access CCU BaseT CCU3000 B/U CCU3000

Home Area Networks. Outline

Gigabit Wireless Applications Using 60GHz Radios. White Paper

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Wireless Network Security Fundamentals and Technologies

Network TRANSPARENCY statement

Basic Wireless Settings on the CVR100W VPN Router

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

CSC Introduction to Computers and Their Applications

How Does it Work. Presented by StarSight Team

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Chapter 12. Network Organization and Architecture

Chapter Three. Conducted and Wireless Media. Data Communications and Computer Networks: A Business User's Approach Seventh Edition

Vendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS

Transcription:

Infopeople Webcast: Technology Tuesday Series Library Computing Without Wires Tuesday, March 1, 2005 12:00 noon to 1:00 p.m Thomas Edelblute Public Access Systems Coordinator Anaheim Public Library TEdelblute@anaheim.net Agenda 1. Definitions 2. Wireless inside the building 3. Wireless technology and your bookmobile 4. Building to building wireless 5. Security 6. Summary of Benefits 7. Q&A Housekeeping Today s webcast: presentation: 50 minutes Q&A: final 10 minutes Submit your questions via Chat during webcast so presenter gets them in time Fill out evaluation during Q&A Don t wait for Q&A to submit questions Webcast Archives: http://infopeople.org/training/webcasts/archived.php 1

When to Use Chat Get help with technical difficulties send message to HorizonHelp Ask presenter questions send message to ALL Chat with other participants select name from dropdown list Chat Area There List of Participants There Definitions What is Wireless? Radio Television Cell phones Some e-mail devices (Blackberry) Data communications 2

What I Mean By Wireless Definition a way of connecting computers to your ILS without cables Methods Radio waves Lasers Wireless Inside The Building Benefits of Wireless Inside Buildings Easy to implement Inexpensive Solves cabling problems associated with historic buildings 3

Inside the Building: Implementation Issues 1. Building structure issues 2. Standards and their significance 3. Equipment 4. Limitations of WiFi WiFi WiFi = Wireless Fidelity Refers to wireless standards designed to improve compatibility between equipment WiFi Alliance: non-profit that does much of the testing WiFi Key Points 1) Access point (base station) DOES require cable connection 2) Power over Ethernet means access point does not need to be plugged into power outlet 3) Equipment has 2-3 year life span 4) More susceptible to security breaches 4

WiFi Standards 802.11b 802.11a 802.11g 802.11n 802.11b Maximum speed at close range 11 Mbps Maximum range 300 feet line of site Office environment range 100-150 feet Speed at maximum range 1 Mbps Frequency 2.4 GHz 802.11b Site Survey 5

PDAs with 802.11b Wireless Markup Language (WML) made for these devices Innovative Interfaces first on the market with a searchable catalog made for PDAs and cell phone screens 802.11a Maximum speed at close range 54 Mbps Maximum range 175 feet line of site Office environment range 100-150 feet Speed at maximum range 6 Mbps Frequency 5 GHz 802.11g Maximum speed at close range 54 Mbps Maximum range 250 feet line of site Office environment range 100-150 feet Speed at maximum range 2 Mbps Frequency 2.4 GHz 6

Standard to Choose for Public Access 1) 802.11g is the most common on the marketplace 2) g is backward compatible with b 3) 802.11a is available Why not get a hybrid that supports all three standards? WiFi Equipment Required Wireless Access Point connect to cabled LAN start at $100 price increases for security protections Wireless Router connect directly to DSL or cable modem under $200 Wireless Network Cards Each device connecting to the wireless network needs one $100 each Wireless Network Cards Desktop computers usually have to purchase separate wireless network card Laptop computers many have built in wireless card Centrino can buy wireless PC Card 7

Optional WiFi Equipment Authentication Package Software that permits authorized users to use your wireless network Statistical Analysis Software that allows you to keep track of who is using your wireless network Filtering Software Software that allows you to control what sites are accessed via your wireless network Why Not Use Wireless Everywhere? Cabling will always outperform wireless Latency (response time) slower with wireless as distance from access point increases What will you do when the wireless access point fails? 802.11n May make wireless competitive with wired networks Ratification of standard expected in 2 years Promising greater speed and distance Video streaming in mind 8

Wireless Technology and Your Bookmobile 1st and 2nd Generation Cell Phones Text data communication only Telnet connections Insufficient bandwidth for client/server graphical applications 3rd Generation Cell Phones Can support data transfer Citrix or Windows Terminal Services provide screen shots to laptops in the field. 9

Ev-DO (Evolution Data Optimized) Pioneered by Verizon in San Diego and Washington DC Spreading through the United States Check with the provider for the rates covering your area Ev-DO PC Card Bookmobile to ILS Connection 10

Upcoming Cellular Options AT&T, Cingular, and T-Mobile pursuing technologies to compete with Ev-DO called GSM, GRPS, and Edge Faster connection speeds (100-130 kbps) At least a year away from implementation Building to Building Wireless Also known as Municipal Area Networks (MAN) Wireless Alternatives to T-1 and Fiber Optic Connections T-1, leased lines and fiber are more expensive than wireless options Wireless can be almost as fast Options are: 1. 802.11 2. Free Space Optics 3. Spread Spectrum Radio 4. Future Technologies 11

Option One: 802.11 Require special antennas to boost the signal across town Too many residential wireless networks to compete with. Too many sources of interference Option Two: Free Space Optics Short range laser beams Low cost alternative to fiber Connect one building to another Range of 1 or 2 km (depending on model). Connectivity Using Free Space Optics 12

Weather Considerations Fog and snow scatters the laser light Attenuation: decrease in signal strength Compensated by more focused beam Auto-Tracking The ability to maintain target link. Essential due to building sway, vibration, wind effects and temperature fluctuations. Option Three: Spread Spectrum Radio So named for its ability to hop frequencies Hard to intercept Resists jamming Popular with military Now in commercial applications Products claim 10 mile range 13

Option 4: Future Technologies Two new wireless standards Connecting buildings across a city 802.20 favored by Flarion and Arraycomm 802.16 aka WiMAX Favored by Intel and Fujitsu Products by 2006? WiMAX 1. Does not rely on line of site 2. 75 Mbps over several miles 3. Some believe all cellular base stations will have WiMAX support WiMAX chips may appear in laptops for mobile computing may be able to reach areas where DSL, cable and T-1 services are not abundant at 3 Mbps Security Considerations 14

Security Threats War-drivers use your Internet bandwidth advertise the availability of free Internet access to others Malicious hackers trying to steal or alter data inside network People launching attacks outside of your network from within your network (denial of service attacks) Security Solutions 1. Lock down network 2. MAC address authentication 3. Encryption: WEP/WPA/WPA2 4. Monitoring 5. Virtual Private Network (VPN) Lock Down Network Vendors sloppy with security Don t assume defaults are acceptable Ask vendor can administrator name and user be changed or disabled? can telnet be disabled? 15

MAC Address Authentication Security system based on defining computers that are allowed on the wireless network based on their MAC Address MAC address is unique identifier of the network card in a computer e.g. 00-10-DC-CB-89-1A MAC = Medium of Access Control beware: MAC addresses can be inpersonated (spoofed) Encryption WEP Wired Equivalent Privacy first encryption standard for wireless uses RC4 encryption algorithm fallen out of favor due to its weakness WPA WiFi Protected Access strong encryption standard recommended to protect data from evil forces that lurk WPA2 a stronger level of encryption security check for certified products at http://www.wifi.org/opensection/certified_products.asp?tid=2 Rogue Access Point Detection Rogue access point: an access point that is illegally made available on your network How they work: smart sensors analyze network traffic prevent unsecured back door to secured network block rogue communications over the airwaves identify location of rogue 16

Comprehensive Security Solutions Consist of several components: distributed sensors monitor all activity provides authentication rogue access points intrusion detection enforce network policy Example: Cisco Air-Defense Virtual Private Network (VPN) VPNs use the Internet for transporting data but rely on security and encryption to ensure that only authorized users can access the internal network Important to use VPN for all communications that come into library system from the Internet remote connections to ILS bookmobile Summary of Benefits 17

Improve Operations for Staff Mobile workstations Instant inventory updates Roaming Reference connection Movable circulation points out onto the floor Connect Your Bookmobile To Your Circulation System Connect live to circulation system Instant updates for your patron records while out in the field. Instant ability to see place and receive holds. Save Money Replace Expensive T-1 Lines Eliminate ongoing leased line costs Eliminate costs associated with new cable runs 18

Library Wireless List For more information on wireless, subscribe to the libwireless list http://people.morrisville.edu/~drewwe/ wireless/libwireless.html Q&A 19