Ten Steps to Wireless for Libraries Live web event July, 21, 2005 WebJunction's Focus on Wireless Internet Access in Public Libraries.

Slides:



Advertisements
Similar presentations
You wish to offer your guests access to the internet?
Advertisements

Brute Force Attack Against Wi-Fi Protected Setup
Integrated Healthcare Management system. Standards based design. [ Supports HXP (Health Exchange Protocol) a standard in exchanging health care data ]
How Does the Internet Work? A Basic Introduction to the Worlds Biggest Computer Network.
Laptop 101 Campus Training Mac Version. Introduction Learning Objectives After completing this course the participant will be able to: 1. Successfully.
Unleashing Your Laptop Justin Sellers. Wireless Access Today we will talk about several different wireless scenarios. We will also cover the hardware,
Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
REBA TV-HOTEL PROJECT PROJECT DESCRIPTION REBA TV creates a data hub through internet, intranet and extranet. is a phone interactive CCTV channel uses.
EVERY CONNECTION has a starting point. NetLibrary eAudiobooks An Overview for Washington State Libraries Nathan Downing Field Implementation Specialist.
Application Guide For Mesh AP – MAP-3120
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
Technical Overview July, 2004.
Reducing Risk and Improving Profitability Jay Wommack CEO.
 SONA ENTERPRISE was founded in 2008 as a manufacturer and developer of high performance, versatile wireless solutions for Wireless Internet Service.
Association Management System Norman Campbell Director, Information Systems.
Deployment Scenario: Mobile Secured Wi-Fi Hotspots Confidential - Do not distribute © Digilogix Technologies Pvt. Ltd. All Rights Reserved.
OPSEC Awareness Briefing Man-In-The-Middle Attacks (MITM)
Remote Viewing Setup DVR & IP Video Devices
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Wireless.ubc.ca Balancing security and usability on the world’s largest Wi-Fi campus network Jonn Martell Wireless Project Manager, UBC
Hotspot Express $ One of the Pioneers of complete WiFi solutions in India $ Hardware to create HOTSPOTs  Software to secure HOTSPOTs & Manage the users.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
September 9, 2009 Michael W. McKeehan Executive Director, Internet & Technology Policy Online Safety: Protecting Consumers.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Basics Dayton Metro Library Place photo here August 10, 2015.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
Introduction  Trinity guest network project objective  College wireless network overview  Public wireless/hospitality internet access  Guest network.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
School Technology Solutions, LLC Technology Audits What's in it for you? 4 th Annual SW/WC Technology Conference March 11, 2010 Presenter: Lee Whitcraft.
Marketing of Information Security Products. The business case for Information Security Management.
Clarity Educational Community Get the Results You Need When You Need Them Transitioning to CA PPM On Demand Presented by: Joshua.
Student Financial Assistance. Edconnet SFA to the Internet: EDconnect Software Session 16.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Expanding and Improving the Technical Infrastructure of the Atlanta Day Shelter for Women and Children Project Advisor Whit Smith Group Members - Taylor.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Vantage Report 3.0 Product Sales Guide
Internet Engineering Course Network Design. Internet Engineering Course; Sharif University of Technology Contents Define and analyse an organization network.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
CAEN Wireless Network College of Engineering University of Michigan October 16, 2003 Dan Maletta.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Wireless 101 Brian Heil Consultant, Ezrasoft Consulting & Design.
1 Why Wi-Fi business model review August 18, 2003.
NUOL Internet Application Services Midterm presentation 22 nd March, 2004.
Remote Access Portal Project Ben Dawson Larry Finn Peter Stickney Ken Vedaa May 7, GC.
Campus Network upgrade and Wi-Fi Rollout REVIEW AND PHASE 3 PROJECT MANAGER TASKS.
Campus Network upgrade and Wi-Fi Rollout PHASE 3 - CHANGES & HOW THESE AFFECT USERS.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
IS3220 Information Technology Infrastructure Security
Group Policy in Windows Vista. Group Policy Administration Group Policy with Windows Vista QoS Policies What Will We Cover?
HotSpot Software HotSpot Billing Software helps you control and bill Internet access by redirecting your customers to sign-in or pay on your login page.
A HotSpot is a location with an access point which provides wireless broadband network services. It is expected today to have Hotspots in heavily populated.
The lastest version of Hotspot, our software- only solution for deploying paid and free WiFi access, is already proving the value of the real- world expertise.
Online Canon Printer Support & Customer Services
ACCESSING YOUR E-FAX SYSTEM
What are the Steps to Print Wirelessly from Laptop to HP Printer HP Customer Support Helpdesk.
How To Set Up A Wireless Network
Your Business Opportunity
IS4550 Security Policies and Implementation
Please check that your widget is plugged in got power.
LINKSYS SUPPORT NUMBER. Linksys Support Number for upgrading firewall, Installation and Repair and Connecting Device and Fix Error Messages by Linksys.
NAT Configuration For ZyXEL ADSL Wireless Router
Customize Your Wireless Network (March 2018)
Presentation transcript:

Ten Steps to Wireless for Libraries Live web event July, 21, 2005 WebJunction's Focus on Wireless Internet Access in Public Libraries

Step 1… Why Customer/Community service Increase library traffic No more room to expand Technical progression Inexpensive Most libraries have internet access already Why should your library provide this service??

Step 2… Planning Library Requirements Simple and Reliable Controlled access Inexpensive Industry standards Integrate into existing network infrastructure Wireless footprint

Step 3… Survey your existing network Hotspot Setup Choices 1) Wide open wireless access point 2) Private turnkey system 3) Wi-Fi Hotspot operator Present network integration 1.Do you have a network 2.Do you use dialup access 3.Staff computers 4.Bandwidth requirements 5.Other wireless networks

Step 4… Understand wireless security in libraries Wireless and security expert Marshall Breeding will be covering more on this later, in this live web event... Stay tuned!!!

System/Hardware purchase options Freeware systems Large corporate business solutions Consumer/Retail Manufactures Linksys, 3Com, Netgear, D-Link, Zyair System/Hardware purchase options Freeware systems System/Hardware purchase options Freeware systems Step 5… Evaluate wireless hardware

Other Wireless Solution Manufactures Step 5… Evaluate wireless hardware

Staff network Public wired VPN Router DSA-3100 gateway DSA-3100p Printer Present Network configuration DWL-7000 Patron laptop Step 5… Evaluate wireless hardware

Wide open, no security configured Step 5… Evaluate wireless hardware

Many, many features User Bandwidth & Access Control Built-in DHCP Server & Advanced Firewall Up to 50 Concurrent Online Users Generate Up to 2000 On-demand Users… Requires External Printer (DSA-3100P) 250 PERMANENT user name and passwords available Ability to connect to central authentication Login Schedule Policies Configure free internet access zones Step 5… Evaluate wireless hardware

No configuration required Simple password generation Step 5… Evaluate wireless hardware

Key Points $1.00 one time signup fee (Personal ID required) Single button press to generate username and password 1 hour session limit valid for 1 day Free surfing zones Connection of laptop handled by the patron Step 5… Evaluate wireless hardware

Step 6… Access policy Can be wide and varied Let your board of directors decide with your input Community standards Local laws, federal laws Webjunction article

Step 7… Support plan for users Will you have a tech person on staff to help patrons? Will your present staff be able to answer questions? Are the patrons expected to do it themselves? Ross Rikers article from Webjunction Blackfalds Librarys FAQ

Step 8… Train your Staff Document your setup and procedures. Get buy-in from your staff. Hold training sessions. Rollout wireless system to staff first.

Step 9… Educate your patrons Hold some training sessions or classes. Have some books and FAQs available. Inform them of the security implications of wireless usage. Websites for education

Step 10… Marketing We became part of the Wi-Fi Alliance Improve awareness of our services Travelers know that we are here (we are listed in their database) The Wi-Fi ZONE logo means you have met their standards Free membership Hired a summer student Designed brochures, information packs, and documentation Went out and actively promoted our service Newspapers, community cable, tourism booths Promote your Wireless service!!!

RULES FOR HOTSPOT SUCCESS 1.Provide a laptop-friendly environment. 2.Get the word out to your customers about your hotspot. 3.Promote your hotspot externally, too. 4.Get listed in hotspot directories. 5.Help customers get connected. 6.Give free trials to entice new users. 7.Provide workstations for those without laptops. 8.Monitor activity to prevent fraudulent use. Step 10… Marketing

Thank you