Presentation is loading. Please wait.

Presentation is loading. Please wait.

WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.

Similar presentations


Presentation on theme: "WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network."— Presentation transcript:

1 WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network

2 The Agenda Components of a Network Typical Network Layout WiFi vs Wireless (Cell) Setting up your Wifi Security Guest Network Blocking Websites Logs, Stats, Monitoring Traffic Control Summary Q & A

3 ANATOMY OF A WIRELESS NETWORK

4 Common Equipment Cable or DSL Modem

5 Common Equipment Router (aka Firewall) Cable or DSL Modem

6 Common Equipment Modem (Cable/DSL) Router (aka Firewall) Switch

7 Common Equipment Wireless Router/ Access Point

8 Common Equipment Network Cables

9 A Typical Network INTERNET aka ‘The Cloud’

10 Does Wireless = Wifi? WiFi Your device is connected to a wireless access point or router in your library, a building, the library parking lot Cellular Wireless Your device, typically a cell phone, connects to the cell towers. Both methods allow access to the internet.

11 2 main purposes Wireless Internet Access the INTERNET wirelessly Wireless Intranet Access your local network devices wirelessly Printers Shared folders

12 Why offer wireless? Community Access to Internet Media Accommodate Mobile Users Remain Current Other reasons?

13

14 Cellular Wireless vs Wifi Internet Cell Tower Library WiFi

15 Connecting to ‘The Wireless’ To switch

16 Wireless Router Setup Step 1 Connect a computer to the network with a cable. Step 2 Connect the wireless router to the same network and power it on Step 3 Navigate to the router’s administration screen using a browser

17 Wireless routers are configured using a browser like Internet Explorer You access the configuration by navigating to the router’s IP address Screenshots from a Netgear WNDR3700 for demonstration purposes Wireless Router Setup

18 http://192.168.1.1 enter the router’s IP address Wireless Router Setup

19

20 Common Features Security using WPA2 (not WEP) Guest Networks Content Filtering Maintenance Functions

21 Security What is wireless security? Why do you think security is important?

22 Security

23 WPA2 Passphrase This is the password you give your patrons.

24 Guest Networks Allows patrons to connect to the wireless and only access the internet. Not local files, folders or devices such as printers. Can use a password or not Can enable or disable it anytime. Users will not have access to the router administration setup or the network Ideal for patrons.

25 Guest Network with Isolation Some routers not only allow guest networks but also Wireless Isolation Prevents any wireless client from accessing other clients.

26 Configuring the Guest Network

27 Blocking Websites limit access to certain sites on the Internet Blocking access to certain domains (for example, www.badstuff.com/XXX) Blocking sites that contain certain words (like profanity or explicit sexual material). When users try to access a blocked site, they will get a message…

28 Website Blocked!

29

30 Blocking Services allows you to block Internet access by specific users on your local network based on their IP address prevent the use of certain Internet services such as surfing the Web (http) by everyone or just a few people on your network. configure service blocking to be on never, on according to a schedule, or on always.

31 Common Services HTTP – General web surfing SMTP – Web Email TCP – Internet Games such as the popular World of Warcraft use TCP and UDP services

32 Blocking the infamous World of Warcraft World of Warcraft uses service TCP and port number 3724 Blocking this service as well as the ports will prevent people on your wireless network from accessing it.

33

34 Block Access based on a Schedule you can set up a schedule for when blocking occurs or when access is not restricted.

35

36 Email Notifications Alerts can be sent when someone tries to visit a blocked site Logs show websites that have been visited

37

38 Viewing the Logs A log is a detailed record of the websites that users have attempted to access If you have e-mail notification on, you can receive these logs in an e-mail message. If you do not have e-mail notification set up, you can view the logs on the router itself.

39

40 See Who’s Connected Some routers allow you to see who is currently connected and keeps a history for statistical purposes.

41

42 Traffic Control record and restrict the volume of Internet traffic No Limit - If this is selected specified restriction will not be applied when traffic limit is reached. Download only - If this is selected the specified restriction will be applied to the incoming traffic only Both Directions - If this is selected the specified restriction will be applied to both incoming and outgoing traffic only

43 Limit Connection Time record and restrict the time usage of the Internet connection

44 Summary Most library networks are simple when you get right down to it. Made up of 3 main components: Modem Router(firewall) Switches

45 Summary Most networks only have 2 or 3 TYPES of devices attached to them Computers Printers Wireless Access Points/Routers

46 Summary Even huge networks with dozens of switches supporting hundreds of computers, printers and wifi access points are really the same as the smaller networks…they just have more of the same!

47 Don’t sweat the IT stuff! If you ARE the IT person, don’t sweat it. Just grab the manual for whatever the device is and go for it! Once you start reading, you’ll soon see how simple all this really is. If you can catalogue a book you can configure a wireless router in your sleep!

48 ?


Download ppt "WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network."

Similar presentations


Ads by Google