Presentation on theme: "The Next Step NSW DET Standards. Standard (“fat”) Access Point(s) (AP’s) installed Multiple laptops connected Security provided by WEP or WPA (or."— Presentation transcript:
fibre-optic Backbone CPC Server Wireless Access Points
Access points are managed separately Each AP must be configured individually Access points do not talk to each other Each AP works independent from others Each AP must have security settings configured consistently WEP or WPA Keys must match across all Aps Channel Management No adjacent cells on same channel 1 – 5 – 11 Rogue or interfering APs Laptop Management Laptops need security keys entered School Laptops (Trusted) Non School Laptops (Not Trusted) - Student and Staff
Secure Connection? WEP/WPA keys Some Laptops can not support WPA Security Keys? CC configures laptops? Keys made pubic? On Domain? Logon Scripts Group Policies Workstation Management Antivirus/Antispyware software installed or up to date? You Touched it – You Broke it
Bandwidth is shared by all connections More connections – slower for all Practical limitation – 15 connections a/b/g is half duplex (cuts bandwidth in half) b/g drops to speed of slowest connection Distances Environmental factors Management overhead Channel management Rogue AP’s Interfering AP’s
Can your school support Staff Laptops? 50 + Laptops on site across whole site. Can your school support Students bring in their own laptops 500 + laptops on site across whole site? Who will manage Security, Connection, Virus and Spyware software.
“Zero Touch” Deployment of AP’s Centralised management Can be managed from Regional Office or onsite RF Management Automatically adjust channel and signal strength Self Healing to correct AP failure Client Load Balancing Fast Roaming Support for Voice, Video and Data Non-disruptive integration into existing Wired Network Identification and Cancelation of Rogue and Interfering AP’s (Requires Air Monitors) Management software can identify location of any client computer (Requires 3 or more AP’s)
Can support trusted and non-trusted laptops No touch approach for Non-Trusted Laptops
System can authenticate against: Local LDAP/Radius Server using Active Directory (Windows) or Open LDAP (Mac) Centralised Radius Server/ IDM Edu.Win (Students) Staff.Win (Staff) Sydney.DET.WIN (Computers) – Resource Domain
UseRecommended Technology Trolley based Laptops Single Room Based Laptops Trusted Laptops only Room Based Laptops Up to 4 Access points HP 420 Access point 5 or More Access points School wide WLAN School wide Roaming “Non-Trusted” Laptops Longer term Planning Aruba WLAN Inter-Building ConnectionsWireless not a recommended Solution
Your consent to our cookies if you continue to use this website.