WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.

Slides:



Advertisements
Similar presentations
Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
Advertisements

DSL-2730B, DSL-2740B, DSL-2750B.
Web Filtering. ExchangeDefender Web Filtering provides policy-controlled protection from dangerous content on the web. Web Filtering is agent based, allowing.
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
DSL-2870B How to Change ADSL Username and Password in your modem router How to Change Wireless Channel in your modem router How to Open Ports in your modem.
Configuring Home Network With OpenDNS
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
The Internet and the World Wide Web. Una DooneyThe Internet and WWWSlide 2 What is the Internet? A collection of networks (LANS and WANS) around the world.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Wi-Fi Structures.
Free Wi-Fi Zone. Detail Process of Free Wi-Fi Access Switch on Wi-Fi setup on your Wi-Fi enabled Device like Cell Phone, Tablet PC, Laptop & search for.
Designing a Home Network By Tabby Booth. Network Components Motorola Cable Modem Wireless 4 port Linksys Router Compaq Desktop Computer – NIC card HP.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Technical Training: DIR-615
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
By: Amy Simon  What happened to my student’s project?  Why can’t I access my lesson in the computer lab?  I know I saved it… somewhere…  WHERE DID.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice.
PC Maintenance: Preparing for A+ Certification Chapter 25: The Internet.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
Common Devices Used In Computer Networks
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Networking Components Presented by Jaisson Mailloux LTEC 4550 Network Systems Administration.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
EDT 661 Kelly Maurer. (((DS))) (((WIRELESS PRINTER))) ((( NETBOOK ))) DESKTOP ROUTER MODEM INTERNET /DLS (FROM WALL)
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
The Internet TexPREP Summer Camp Computer Science.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
SETTING UP AN INTERNET NETWORK What you’ll need Your options How does data travel the Internet? Different terminology.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
INTRODUCTION TO NETWORKS 8/2/2015 SSIG SOUTHERN METHODIST UNIVERSITY.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Components of wireless LAN & Its connection to the Internet
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Networking Components Siby Abraham LTEC Purpose of the presentation  This presentation will cover how certain network components function, when.
# 1# 1 CS 105 Fall 2006 Internet and Web Concepts What is a URL? The Internet and the World Wide Web (subset) What is a browser? HTTP is? cs.uiuc.edu means…
THE INTERNET INTRODUCTION TO BUSINESS TECHNOLOGY.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
CSC 116 Nov Administrative Required 2 nd exam will be next week on Wed  Nov 18th It will be short (10 questions) It will only cover chapters.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Understand how a router works and its purpose
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
Network System Security - Task 2. Russell Johnston.
Instructor: Ahmed Jafer
Networks and Connecting to the Internet
Final Revision Notes-Grade10
Welcome To : Group 1 VC Presentation
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Unit 27: Network Operating Systems
* Essential Network Security Book Slides.
Network Models, Hardware, Protocols and number systems
Presentation transcript:

WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network

The Agenda Components of a Network Typical Network Layout WiFi vs Wireless (Cell) Setting up your Wifi Security Guest Network Blocking Websites Logs, Stats, Monitoring Traffic Control Summary Q & A

ANATOMY OF A WIRELESS NETWORK

Common Equipment Cable or DSL Modem

Common Equipment Router (aka Firewall) Cable or DSL Modem

Common Equipment Modem (Cable/DSL) Router (aka Firewall) Switch

Common Equipment Wireless Router/ Access Point

Common Equipment Network Cables

A Typical Network INTERNET aka ‘The Cloud’

Does Wireless = Wifi? WiFi Your device is connected to a wireless access point or router in your library, a building, the library parking lot Cellular Wireless Your device, typically a cell phone, connects to the cell towers. Both methods allow access to the internet.

2 main purposes Wireless Internet Access the INTERNET wirelessly Wireless Intranet Access your local network devices wirelessly Printers Shared folders

Why offer wireless? Community Access to Internet Media Accommodate Mobile Users Remain Current Other reasons?

Cellular Wireless vs Wifi Internet Cell Tower Library WiFi

Connecting to ‘The Wireless’ To switch

Wireless Router Setup Step 1 Connect a computer to the network with a cable. Step 2 Connect the wireless router to the same network and power it on Step 3 Navigate to the router’s administration screen using a browser

Wireless routers are configured using a browser like Internet Explorer You access the configuration by navigating to the router’s IP address Screenshots from a Netgear WNDR3700 for demonstration purposes Wireless Router Setup

enter the router’s IP address Wireless Router Setup

Common Features Security using WPA2 (not WEP) Guest Networks Content Filtering Maintenance Functions

Security What is wireless security? Why do you think security is important?

Security

WPA2 Passphrase This is the password you give your patrons.

Guest Networks Allows patrons to connect to the wireless and only access the internet. Not local files, folders or devices such as printers. Can use a password or not Can enable or disable it anytime. Users will not have access to the router administration setup or the network Ideal for patrons.

Guest Network with Isolation Some routers not only allow guest networks but also Wireless Isolation Prevents any wireless client from accessing other clients.

Configuring the Guest Network

Blocking Websites limit access to certain sites on the Internet Blocking access to certain domains (for example, Blocking sites that contain certain words (like profanity or explicit sexual material). When users try to access a blocked site, they will get a message…

Website Blocked!

Blocking Services allows you to block Internet access by specific users on your local network based on their IP address prevent the use of certain Internet services such as surfing the Web (http) by everyone or just a few people on your network. configure service blocking to be on never, on according to a schedule, or on always.

Common Services HTTP – General web surfing SMTP – Web TCP – Internet Games such as the popular World of Warcraft use TCP and UDP services

Blocking the infamous World of Warcraft World of Warcraft uses service TCP and port number 3724 Blocking this service as well as the ports will prevent people on your wireless network from accessing it.

Block Access based on a Schedule you can set up a schedule for when blocking occurs or when access is not restricted.

Notifications Alerts can be sent when someone tries to visit a blocked site Logs show websites that have been visited

Viewing the Logs A log is a detailed record of the websites that users have attempted to access If you have notification on, you can receive these logs in an message. If you do not have notification set up, you can view the logs on the router itself.

See Who’s Connected Some routers allow you to see who is currently connected and keeps a history for statistical purposes.

Traffic Control record and restrict the volume of Internet traffic No Limit - If this is selected specified restriction will not be applied when traffic limit is reached. Download only - If this is selected the specified restriction will be applied to the incoming traffic only Both Directions - If this is selected the specified restriction will be applied to both incoming and outgoing traffic only

Limit Connection Time record and restrict the time usage of the Internet connection

Summary Most library networks are simple when you get right down to it. Made up of 3 main components: Modem Router(firewall) Switches

Summary Most networks only have 2 or 3 TYPES of devices attached to them Computers Printers Wireless Access Points/Routers

Summary Even huge networks with dozens of switches supporting hundreds of computers, printers and wifi access points are really the same as the smaller networks…they just have more of the same!

Don’t sweat the IT stuff! If you ARE the IT person, don’t sweat it. Just grab the manual for whatever the device is and go for it! Once you start reading, you’ll soon see how simple all this really is. If you can catalogue a book you can configure a wireless router in your sleep!

?