Download presentation
Presentation is loading. Please wait.
Published byRosanna Shields Modified over 9 years ago
1
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network
2
The Agenda Components of a Network Typical Network Layout WiFi vs Wireless (Cell) Setting up your Wifi Security Guest Network Blocking Websites Logs, Stats, Monitoring Traffic Control Summary Q & A
3
ANATOMY OF A WIRELESS NETWORK
4
Common Equipment Cable or DSL Modem
5
Common Equipment Router (aka Firewall) Cable or DSL Modem
6
Common Equipment Modem (Cable/DSL) Router (aka Firewall) Switch
7
Common Equipment Wireless Router/ Access Point
8
Common Equipment Network Cables
9
A Typical Network INTERNET aka ‘The Cloud’
10
Does Wireless = Wifi? WiFi Your device is connected to a wireless access point or router in your library, a building, the library parking lot Cellular Wireless Your device, typically a cell phone, connects to the cell towers. Both methods allow access to the internet.
11
2 main purposes Wireless Internet Access the INTERNET wirelessly Wireless Intranet Access your local network devices wirelessly Printers Shared folders
12
Why offer wireless? Community Access to Internet Media Accommodate Mobile Users Remain Current Other reasons?
14
Cellular Wireless vs Wifi Internet Cell Tower Library WiFi
15
Connecting to ‘The Wireless’ To switch
16
Wireless Router Setup Step 1 Connect a computer to the network with a cable. Step 2 Connect the wireless router to the same network and power it on Step 3 Navigate to the router’s administration screen using a browser
17
Wireless routers are configured using a browser like Internet Explorer You access the configuration by navigating to the router’s IP address Screenshots from a Netgear WNDR3700 for demonstration purposes Wireless Router Setup
18
http://192.168.1.1 enter the router’s IP address Wireless Router Setup
20
Common Features Security using WPA2 (not WEP) Guest Networks Content Filtering Maintenance Functions
21
Security What is wireless security? Why do you think security is important?
22
Security
23
WPA2 Passphrase This is the password you give your patrons.
24
Guest Networks Allows patrons to connect to the wireless and only access the internet. Not local files, folders or devices such as printers. Can use a password or not Can enable or disable it anytime. Users will not have access to the router administration setup or the network Ideal for patrons.
25
Guest Network with Isolation Some routers not only allow guest networks but also Wireless Isolation Prevents any wireless client from accessing other clients.
26
Configuring the Guest Network
27
Blocking Websites limit access to certain sites on the Internet Blocking access to certain domains (for example, www.badstuff.com/XXX) Blocking sites that contain certain words (like profanity or explicit sexual material). When users try to access a blocked site, they will get a message…
28
Website Blocked!
30
Blocking Services allows you to block Internet access by specific users on your local network based on their IP address prevent the use of certain Internet services such as surfing the Web (http) by everyone or just a few people on your network. configure service blocking to be on never, on according to a schedule, or on always.
31
Common Services HTTP – General web surfing SMTP – Web Email TCP – Internet Games such as the popular World of Warcraft use TCP and UDP services
32
Blocking the infamous World of Warcraft World of Warcraft uses service TCP and port number 3724 Blocking this service as well as the ports will prevent people on your wireless network from accessing it.
34
Block Access based on a Schedule you can set up a schedule for when blocking occurs or when access is not restricted.
36
Email Notifications Alerts can be sent when someone tries to visit a blocked site Logs show websites that have been visited
38
Viewing the Logs A log is a detailed record of the websites that users have attempted to access If you have e-mail notification on, you can receive these logs in an e-mail message. If you do not have e-mail notification set up, you can view the logs on the router itself.
40
See Who’s Connected Some routers allow you to see who is currently connected and keeps a history for statistical purposes.
42
Traffic Control record and restrict the volume of Internet traffic No Limit - If this is selected specified restriction will not be applied when traffic limit is reached. Download only - If this is selected the specified restriction will be applied to the incoming traffic only Both Directions - If this is selected the specified restriction will be applied to both incoming and outgoing traffic only
43
Limit Connection Time record and restrict the time usage of the Internet connection
44
Summary Most library networks are simple when you get right down to it. Made up of 3 main components: Modem Router(firewall) Switches
45
Summary Most networks only have 2 or 3 TYPES of devices attached to them Computers Printers Wireless Access Points/Routers
46
Summary Even huge networks with dozens of switches supporting hundreds of computers, printers and wifi access points are really the same as the smaller networks…they just have more of the same!
47
Don’t sweat the IT stuff! If you ARE the IT person, don’t sweat it. Just grab the manual for whatever the device is and go for it! Once you start reading, you’ll soon see how simple all this really is. If you can catalogue a book you can configure a wireless router in your sleep!
48
?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.