PNNL Site Update July, 2009 Lewis Allen, Network Engineer.

Slides:



Advertisements
Similar presentations
Motorola Mobility Management Suite: RF Management
Advertisements

Broadband Wireless Applications for the Mining Industry.
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Salem Health Tech Talk – iPhones, Laptops and Rogue Devices, OH MY!
Sharing Content and Experience in Smart Environments Johan Plomp, Juhani Heinila, Veikko Ikonen, Eija Kaasinen, Pasi Valkkynen 1.
Professor Nigel Linge Computer Networking and Telecommunications Research Group University of Salford.
Application Guide For Mesh AP – MAP-3120
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
1 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public Wireless and Mobility Products.
NLIT June Marcia Jacobs - Presenter Sandia National Laboratories- California Communication and Network Systems Telecom Operations BlackBerry Project.
1 Improving Efficiency, Reliability and Security in the Mobile Communications & Data Environment Coban User Group 2013, Rob Boback – Public Safety Sales.
Electrical & Computer Engineering Department Ryerson University EDP Topics of Xavier Fernando
U.S. Department of Energy Pacific Northwest National Laboratory July 2004 Presented by Jeffery Mauth Pacific Northwest National Laboratory
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
Chapter 15 Radio Frequency Site Survey Fundamentals
U N C L A S S I F I E D LA-UR LANL Exchange / Blackberry Deployment June 2, 2009 Anil Karmel Solutions Architect Network and Infrastructure Engineering.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Cisco Unified Wireless Network Webinar Commercial WLAN.
Active Directory Production Pilot Project Department of Administration Enterprise Technology Services (ETS) ETS is a customer based team that provides.
MetaSim - design Version 1.0. Outline DrillSim Original design Plug and play requirements MetaSim Design Input Interfaces DrillSim Where are so far Future.
Wireless networking Roger Treweek Oxford University Computing Services.
Accurate Location in Wireless Networks © Ekahau, Inc. All rights reserved. Location-enabling WLAN Antti Korhonen, CEO Ekahau, Inc. eProM /
Title put our names here. General Problem Statement Ability to give customized information to a user based on the user’s current location, the current.
© Daconi Ltd 2005 Deploying wireless and Wi-Fi tracking in a hospital environment Keith Jones, CEO, FIEE
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
By: Thomas Philip What is the Cell Phone? A cell phone is a device used to talk to people who are in different locations. Cell phones have no wires and.
Mesh Network Technical Guide for the Mesh AP Topic 2 Installation Knowledge / Network Design Copyright © PLANET Technology.
History of Telematics, Telemetry, & M2M Technology
PNNL Outdoor Campus Public Safety Camera System Creating a “Virtual Fence” around an open campus 2009 DOE Integrated Safety Management (ISM) Conference.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 FCC-NTIA Joint Advisory Committee on Communications Capabilities of.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
CSD 2006 / TEAM 12 Final presentation 29 th May 2006.
Indoor Localization using Wireless LAN infrastructure Location Based Services Supervised by Prof. Dr. Amal Elnahas Presented by Ahmed Ali Sabbour.
Experience you can trust. Knowledge2006 – Technology Roundtable Dan Ruiz
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Moving the RFID Value Chain Value Proposition Cost and Complexity What is it? (passive RFID) Where is it? (active RFID) How is it? (Sensors) Adapt to it.
1 Prepared by: Les Cottrell SLAC, for SLAC Network & Telecommunications groups Presented to Kimberley Clarke March 8 th 2011 SLAC’s Networks.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
PRESENTATION ON WI-FI TECHNOLOGY
Computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections.
AirPatrol’s ZoneDefense for Corrections Complete 24/7 precision monitoring and detection of all mobile devices.
October 4-7, 2004 Los Angeles, CA VoWLAN Trends and Opportunities Kamal Anand Vice President Marketing Meru Networks
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Enterprise-Class Telephony on Wireless LANs Tom Alexander CTO VeriWave, Inc.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
ITExpo January 24, 2006 Networks C OGNITRONICS Network Media Servers Conferencing and Collaboration Mike Keefe CTO Presented by.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Philadelphia, May 2–4, Integration Technology Track Location determining technologies: RFID, Wi-Fi, GPS & LBS Location.
© 2015 albert-learning.com Role of Mobile Phone Apps Role of mobile Phone Apps.
Types Of Enterprise Mobility Needed By Different Business Verticals.
Mark Gaynor and Bryan Duepner  Mark Gaynor, PhD – Saint Louis University School of Public Health, St. Louis, MO Associate Professor, Department of Health.
Location Awareness Lancaster Keith Mitchell Computing Department Paul Astle Information Systems Services (ISS)
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
A PRESENTATION ON Wi-Fi INTERNET CONNECTIVITY AND IP CCTV SURVEILLANCE SYSTEM BY ROTIMI AJIBODE THE CHIEF EXECUTIVE OFFICER OF OLIVER CANON COMPANY LIMITED.
I I R R T T Internet Real Time Lab SECE SYSTEM SECE SERVER INTERNET ELECTRICAL APPLIANCES CONNECTED TO MICROCONTROLLER … … : register & download.
Local Government: Public Safety Solutions at work Digital Video Surveillance, Outdoor Wireless Solutions at work Digital Video Surveillance, Outdoor Wireless.
Antony Edwin Keane Inc Ltd
Jefferson Lab Site Update Winter 2010 ESCC Meeting Andy Kowalski Bryan Hess February 4, 2010.
Jefferson Lab Site Update January 2013 Bryan Hess
Understand Wireless Security LESSON Security Fundamentals.
MineDash 2.0 Feature Walk Through Revision A 20 JUN 2013.
OmniAccess WLAN Stellar WLAN con Control Distribuido
Sunnytek sensor networks
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
SurfCFCC Secure Wireless Access For Students, Faculty, and Staff.
What’s New In WatchGuard Wi-Fi Cloud v8.6
Presentation transcript:

PNNL Site Update July, 2009 Lewis Allen, Network Engineer

Wireless Evolution at PNNL Return on Investment Coverage and Reliability Basic Connectivity Advanced Functionality Business Integration and Applications Pilot, 1 Bldg. 1 st Generation Architecture, Wireless to 20 Buildings 2 nd Generation Architecture, Wireless to 35 Buildings Campus Camera 3 rd Generation Location Context Aware Calendar Year Location Property Mgt. VoIP Facilities Mgt. Sensors Security RFID Temperature

Wireless Infrastructure Outdoor Mesh (Campus Camera Network) 80 Outdoor Mesh AP’s supporting Safety Cameras 14 Emergency VoIP call stations Indoor 300 Indoor AP’s Design AP/~5Ksqft New Design AP/2.5ksqft

Able to drill down to a room for related information. PNNL applications leveraging location services 4 Map Information Tool (MIT2)

PNNL applications leveraging location services 5 Wireless client and Wi-Fi tag location Rogue access point location

Asset Management: The Problem First-class asset management is essential for good stewardship of DOE resources Wall-to-Wall inventory at PNNL has been conservatively estimated at $115k/year* (direct costs) Indirect costs are unknown Staff efforts redirected from projects One data point The longer between inventories, the harder assets may be to find and more likely to be lost * Based on inventory of all tagged property

Three-Phase Pilot 7 Non-Networked Property (Phase 3) Wired (Phase 2) 0 15,000 30,000 Wireless (Phase 1)

Pilot Phase 1: Wireless Devices (Complete) Result: ~50% of population seen (2,723 of 5,615 items) Reasons: Only 75% of population registered for use on our networks 63% of registered wireless assets seen Cultural: staff used to manual inventory method Lesson: Must have a good tie between MAC address and property number 8

Pilot Phase 2: Wired Devices (in progress) 75% of items last seen within 24 hrs Wired devices talk on networks very frequently Should be relatively easy to track 9

Benefits ~30,000 tagged property items Previous method: $115k/year for one data point Current: 2,700 wireless items successfully tracked using networks Continuous data Future: up to 30,000 items could be tracked using existing network architecture Continuous data 10 Non-Networked Property (Phase 3) Wired (Phase 2) 0 15,000 30,000 Wireless (Phase 1)

Other Wireless Wired The Network: Location Architecture Simple Network Management Protocol AP Application 1 Application 2 Application 3 Switch GPS, Cell, BlackBerry, etc. GPS, Cell, BlackBerry, etc. MSE Mobility Services Engine Location db Location db Search Harvester Devices Passive RFID Tags WCS Wireless Control System Wireless LAN Controller WLC and tags Manual Process BlackBerry Server

Wireless Location 12 Wireless Switch AP MSE Mobility Services Engine WCS Wireless Control System Wireless LAN Controller WLC AP

The future: Developing areas of Location Basic Location (x/y, civic, geo) Asset Management Real Time Location Services (basic location + timeliness) Tracking high valued items or processes Presence (basic location + context) available/unavailable Staffing, best form of contact (call (ring vs. vibrate), IM, , page, etc) Telemetry and sensors (basic location + environment) Temp, pressure, shock, etc Authentication (basic location + role) What something or someone can do based on its location 13

Questions? 14