“A New Level” Redesigning the Network and Rebuilding Two New Computer Labs for Harambee Ministries By Josh Kammerer.

Slides:



Advertisements
Similar presentations
Chapter 3: Planning a Network Upgrade
Advertisements

and o REMOTE SUPPORT o ON-SITE SUPPORT o ONE-TIME TUNE-UP BASIC SERVICES.
Wireless Access Things that you need to know TC Meeting SCISC – January 17, 2007.
Information and Technology Services Customer Services.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Cisco – Semester III Documentation. What is it most important component of a good network?  Documentation.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Unit 11 - Computer Networks Assignment B: Design a Computer Network
Payment Card Industry (PCI) Data Security Standard
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Operating Systems.
Computer Networks IGCSE ICT Section 4.
Installing software on personal computer
Bullet-Proofing Your Wireless Router By Steve Janss.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Duties of a system administrator. A system administrator's responsibilities typically include:
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
Basic Networking Components
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Networking Components
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
LTEC 4560 Summer 2012 Justin Kappel Networking Components.
1 NTC/TCS Training Dallas 2010 TWO Set-ups Wired and Wireless.
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking (Part 4 of 5)
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Using SWHS: The AUP [Acceptable Use Policy]
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
70-411: Administering Windows Server 2012
Solutions for BDMHS  JF&C is a highly qualified company that performs a wide variety if technical services in the Chicago land area to business, government.
Networking Components DAVID INGUANZO 7/10/14. HUB ~$20 ($20 - $1,000+) Best for: home networks light traffic business environment connecting multiple.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Computers Are Your Future Eleventh Edition
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Operating Systems Networking for Home and Small Businesses – Chapter.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Our Company What your are Getting If your workstation or laptop has been giving you problems, we can fix it and restore your productivity without adding.
Components of wireless LAN & Its connection to the Internet
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
NETWORKING & SYSTEM UPDATES
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
Activity 1 5 minutes to discuss and feedback on the following:
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Assignment # 3 Networking Components By: Jeff Long.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings. Objective.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Network System Security - Task 2. Russell Johnston.
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
Unit Communication Hardware
Chapter Objectives In this chapter, you will learn:
Year 11 – Chapter 4 – Computer Networks
How To Set Up A Wireless Network
2018 Real CompTIA N Exam Questions Killtest
Networking for Home and Small Businesses – Chapter 2
Jeopardy Security Risks Hardware & Software Computer Types Networking
TWO Set-ups Wired and Wireless.
Planning a Network Upgrade
ICT Computing Lesson 4: Computing Network.
Networking for Home and Small Businesses – Chapter 2
Morgan County Schools And Extreme Networks
Introduction to Networking Security
Presentation transcript:

“A New Level” Redesigning the Network and Rebuilding Two New Computer Labs for Harambee Ministries By Josh Kammerer

The Need Existing wireless local area network (WLAN) that had been operational for more than six years Connectivity and sustainability issues on multiple subnets, partially because of non-standard wiring No wireless encryption Failed and out-of-date Internet content filtration system No computer labs for children or teenagers – stolen a few days before I arrived on site

The Network Improved existing wiring for better connectivity Installed new main router, new switches, and new wireless access points (WAP’s) Configured WAP’s for improved sustainability Purchased, installed, and configured a new hardware- based top-of-the-line Internet content filtration system Encrypted the wireless network using WPA encryption

Internet Content Filtration System Configured customized filtration groups for staff, students, and junior staff (teenagers) computers Utilized device to monitor all Internet traffic of each network card on the network Utilized the device to track down any spyware and viruses present on computers on the network Created custom bandwidth settings to minimize extraneous Internet bandwidth usage “Content Protect” hardware device from Content Watch, the owners of “NetNanny”

Computer Labs Set up two separate computer labs for the students and junior staff, consisting almost entirely of new Macbooks or iMacs running Mac OS 10.5 (Leopard) Set up each computer with customized, limited user accounts for use by junior staff and children Enrolled Harambee in TechSoup and requested over $9,000 worth of software Assembled one of two security carts for the computers Secured each new Mac computer to the security carts, using anti-theft computer padlocks

Computer Labs Researched, purchased, and installed new educational software for each of the student computers Recovered, rebuilt, and upgraded any remaining Windows laptops that did not get stolen Installed LoJack for laptops on most of the new Macs Tested out existing equipment to see what was usable Set up one Macbook to dual-boot into Windows Vista, for testing purposes

Sustainability Registered all “ongoing” computers with the content filtration system Partially documented the virtual structure of the network, including all passwords and unique device settings Documented all MAC addresses of “ongoing” computers on the network Developed a plan for “passing on” maintenance tasks to future employees/interns

What Remains to Be Done Create a series of videos (or write-ups) that describes (and illustrates) what I have done so far in each area discussed in this presentation Include in those videos ideas about how to keep the networks running smoothly Formulate a diagram of some sort to illustrate the network setup to help other sites replicate this project Finish a few remaining connectivity and computer lab setup tasks