Ken LeCompte Systems Programmer/Administrator NBCS -CCF

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
Wireless Access Things that you need to know TC Meeting SCISC – January 17, 2007.
Chapter 2 History and Background. Evolution of HART  The HART protocol has evolved from a 4– 20mA based protocol to the current wired and wireless-based.
IBMS – From Netsanchar Internet Bandwidth Management Solution.
© 2010 Cisco and/or its affiliates. All rights reserved. 1 JerseyConnect Managed WiFi Presented by JerseyConnect’s Chuck Marquette and Mike Rasimowicz.
Overview of Wireless Network Steven Fetcie Infrastructure Manager Information Services.
1 Anti Virus System i-Specific Anti-Virus Product.
Virtual Private Network (VPN) Its Place in a Lottery’s Communication Portfolio Leslie Vang, Deputy Director IT, SCEL.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Designing a Peer-to-Peer Wireless Network Confederation Elias C. Efstathiou and George C. Polyzos Department of Computer Science Athens University of Economics.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Wireless networking Roger Treweek Oxford University Computing Services.
By: Alena Newcomb.  What is a WI-FI hotspot?  Wireless Local Area Network location that provides broadband Internet access.  Use of laptops, PDA, or.
(Geneva, Switzerland, September 2014)
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Green Cellular Networks: A Survey, Some Research Issues and Challenges
Being Proactive with Computer Posture Assessment Department of Housing and Residence Education Charles Benjamin.
JINR’s PBX DEPARTMENT Chepigin A.V., Litnitcky M., Polyanskiy N. NEC-2011, Varna, Bulgaria.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Voice & Data Convergence Network Services January 11, 2001.
Duties of a system administrator. A system administrator's responsibilities typically include:
Norman SecureSurf Protect your users when surfing the Internet.
Microsoft ® Official Course Module 9 Configuring Applications.
Phone System Migration Move to Voice Over Internet Protocol (VoIP)
Eurostat Unit B3 – Statistical Information Technologies Data transmission tools and services 15/05/ eDAMIS The standard solution for transmitting.
© VISION Consulting Telemetry/JPS Remote Meter Reading.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
PCGRID ‘08 Workshop, Miami, FL April 18, 2008 Preston Smith Implementing an Industrial-Strength Academic Cyberinfrastructure at Purdue University.
Information Services Overview An introduction to DePaul’s technology especially for new employees.
Vantage Report 3.0 Product Sales Guide
Converged Service A Dartmouth Perspective Bob Johnson.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
What’s New in Fireware v11.9.5
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
LAN Switching and Wireless – Chapter 1 Vilina Hutter, Instructor
Copyright 2014 Open Networking User Group. All Rights Reserved Confidential Not For Distribution Six Steps To A Common Open Networking Ecosystem Common.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Scott Butson District Technology Manager. Provide professional to all district staff Professional development has been provided on a regular basis to.
The Next Generation Wireless Yuri Kolomiyets Network Services Information Systems and Technology.
Supporting the needs of Core Lab managers and users CORES: Core Ordering and Reporting Enterprise System.
● Albert Einstein explained it best: ● "You see, wire telegraph is a kind of a very, very long cat. You pull his tail in New York and his head is meowing.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
1 Cathay Life Insurance Ltd. (Vietnam) 27/03/ Cathay Life Insurance (VN) Date: 27 March 2009.
LAN Switching and Wireless – Chapter 1
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
UPDATE ON TRB INFORMATION SERVICES GTRIC June 8, 2003 Barbara Post Manager, Information Services
Amagees Tech Corp value added services Data Management and Infrastructure.
MIMCom 2006: Deploying a campus area network for the University Teaching Hospital Lusaka – Zambia Final Presentation May 30th 2006 Project Team: Michael.
HotSpot Software HotSpot Billing Software helps you control and bill Internet access by redirecting your customers to sign-in or pay on your login page.
Princeton Plasma Physics Site Report ESnet Site Coordinator's Meeting, July 2013.
The lastest version of Hotspot, our software- only solution for deploying paid and free WiFi access, is already proving the value of the real- world expertise.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
Statewide network and technology services from the New Jersey State Library Connecting people with information through libraries 1.
Providing Teleworker Services
Anti Virus System i-Specific Anti-Virus Product
Securing the Network Perimeter with ISA 2004
Network Management Checking Performance + Traffic & Configuration
LAN Switching and Wireless – Chapter 1
Arizona State University Capital Development Project Status
Converged Service A Dartmouth Perspective
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
LAN Switching and Wireless – Chapter 1
CT 1306 Communication Networks Management Lab
Technology Update September 4, 2012.
Global One Communications
Network Monitoring System
Presentation transcript:

Ken LeCompte Systems Programmer/Administrator NBCS -CCF

Brief History RUWireless started as a project in January of 2002 First buildings to be installed were the student centers - Fall/Winter of 2002/2003 Several libraries and departments were added during the summer of 2003 Today there are 27 buildings with RUWireless and several more in the process of being installed

Usage Statistics

Site Survey Report

Installation Process 1.Determine coverage needs 2.Conduct site survey and create report 3.Coordinate data cable installation 4.Install physical equipment and test network 5.Manage and maintain network and supporting systems 6.Provide support for users and UCS/UCM

Features and Benefits Guest Account Management System: Allows department liaisons to create temporary RUWireless guest accounts for visitors to their departments. Statistics Website: Allows department liaisons to track RUWireless usage in their departments Bandwidth Monitoring System: Automatically monitors user consumption of bandwidth and limits a user if they consume too much. Virus Detection System: Monitors wireless traffic for virus signatures and automatically quarantines and notifies possibly infected users. Tunneling Technology: Allows each access point to tunnel traffic back to the wireless gateways where policy and authentication is enforced. This level of distribution dramatically lowers the cost of implementation for departments.