Title: Thomas Edelblute
1Library Computing Without Wires
Infopeople Webcast Technology Tuesday Series
Tuesday, March 1, 20051200 noon to 100 p.m
- Thomas Edelblute
- Public Access Systems Coordinator
- Anaheim Public Library
- TEdelblute_at_anaheim.net
2Agenda
- Definitions
- Wireless inside the building
- Wireless technology and your bookmobile
- Building to building wireless
- Security
- Summary of Benefits
- QA
3Housekeeping
Dont wait for QA to submit questions
- Todays webcast
- presentation 50 minutes
- QA final 10 minutes
- Submit your questions via Chat during webcast
so presenter gets them in time - Fill out evaluation during QA
Webcast Archives http//infopeople.org/training/
webcasts/archived.php
4When to Use Chat
- Get help with technical difficulties
- send message to HorizonHelp
- Ask presenter questions
- send message to ALL
- Chat with other participants
- select name from dropdown list
Chat Area There
List of Participants There
5Definitions
6What is Wireless?
- Radio
- Television
- Cell phones
- Some e-mail devices (Blackberry)
- Data communications
7What I Mean By Wireless
- Definition
- a way of connecting computers to your ILS without
cables - Methods
- Radio waves
- Lasers
8Wireless Inside The Building
9Benefits of Wireless Inside Buildings
- Easy to implement
- Inexpensive
- Solves cabling problems associated with historic
buildings
10Inside the Building Implementation Issues
- Building structure issues
- Standards and their significance
- Equipment
- Limitations of WiFi
11WiFi
- WiFi Wireless Fidelity
- Refers to wireless standards designed to improve
compatibility between equipment - WiFi Alliance non-profit that does much of the
testing
12WiFi Key Points
- 1) Access point (base station) DOES require cable
connection - 2) Power over Ethernet means access point does
not need to be plugged into power outlet - 3) Equipment has 2-3 year life span
- 4) More susceptible to security breaches
13WiFi Standards
- 802.11b
- 802.11a
- 802.11g
- 802.11n
14802.11b
- Maximum speed at close range 11 Mbps
- Maximum range 300 feet line of site
- Office environment range 100 - 150 feet
- Speed at maximum range 1 Mbps
- Frequency 2.4 GHz
15802.11b Site Survey
16PDAs with 802.11b
- Wireless Markup Language (WML) made for these
devices - Innovative Interfaces first on the market with a
searchable catalog made for PDAs and cell phone
screens
17802.11a
- Maximum speed at close range 54 Mbps
- Maximum range 175 feet line of site
- Office environment range 100 - 150 feet
- Speed at maximum range 6 Mbps
- Frequency 5 GHz
18802.11g
- Maximum speed at close range 54 Mbps
- Maximum range 250 feet line of site
- Office environment range 100 - 150 feet
- Speed at maximum range 2 Mbps
- Frequency 2.4 GHz
19Standard to Choose for Public Access
- 1) 802.11g is the most common on the marketplace
- 2) g is backward compatible with b
- 3) 802.11a is available
- Why not get a hybrid that supports all three
standards?
20WiFi Equipment Required
- Wireless Access Point
- connect to cabled LAN
- start at 100
- price increases for security protections
- Wireless Router
- connect directly to DSL or cable modem
- under 200
- Wireless Network Cards
- Each device connecting to the wireless network
needs one - 100 each
21Wireless Network Cards
- Desktop computers
- usually have to purchase separate wireless
network card - Laptop computers
- many have built in wireless card Centrino
- can buy wireless PC Card
22Optional WiFi Equipment
- Authentication Package
- Software that permits authorized users to use
your wireless network - Statistical Analysis
- Software that allows you to keep track of who is
using your wireless network - Filtering Software
- Software that allows you to control what sites
are accessed via your wireless network
23Why Not Use Wireless Everywhere?
- Cabling will always outperform wireless
- Latency (response time) slower with wireless as
distance from access point increases - What will you do when the wireless access point
fails?
24802.11n
- May make wireless competitive with wired networks
- Ratification of standard expected in 2 years
- Promising greater speed and distance
- Video streaming in mind
25Wireless Technology and Your Bookmobile
261st and 2nd Generation Cell Phones
- Text data communication only
- Telnet connections
- Insufficient bandwidth for client/server
graphical applications
273rd Generation Cell Phones
- Can support data transfer
- Citrix or Windows Terminal Services provide
screen shots to laptops in the field.
28Ev-DO (Evolution Data Optimized)
- Pioneered by Verizon in San Diego and Washington
DC - Spreading through the United States
- Check with the provider for the rates covering
your area
29Ev-DO PC Card
30Bookmobile to ILS Connection
31Upcoming Cellular Options
- ATT, Cingular, and T-Mobile pursuing
technologies to compete with Ev-DO called GSM,
GRPS, and Edge - Faster connection speeds (100-130 kbps)
- At least a year away from implementation
32Building to Building Wireless
- Also known as Municipal Area Networks (MAN)
33Wireless Alternatives to T-1 and Fiber Optic
Connections
- T-1, leased lines and fiber are more expensive
than wireless options - Wireless can be almost as fast
- Options are
- 802.11
- Free Space Optics
- Spread Spectrum Radio
- Future Technologies
34Option One 802.11
- Require special antennas to boost the signal
across town - Too many residential wireless networks to compete
with. - Too many sources of interference
35Option Two Free Space Optics
- Short range laser beams
- Low cost alternative to fiber
- Connect one building to another
- Range of 1 or 2 km (depending on model).
36Connectivity Using Free Space Optics
37Weather Considerations
- Fog and snow scatters the laser light
- Attenuation decrease in signal strength
- Compensated by more focused beam
38Auto-Tracking
- The ability to maintain target link.
- Essential due to building sway, vibration, wind
effects and temperature fluctuations.
39Option Three Spread Spectrum Radio
- So named for its ability to hop frequencies
- Hard to intercept
- Resists jamming
- Popular with military
- Now in commercial applications
- Products claim 10 mile range
40Option 4 Future Technologies
- Two new wireless standards
- Connecting buildings across a city
- 802.20 favored by Flarion and Arraycomm
- 802.16 aka WiMAX
- Favored by Intel and Fujitsu
- Products by 2006?
41WiMAX
- Does not rely on line of site
- 75 Mbps over several miles
- Some believe
- all cellular base stations will have WiMAX
support - WiMAX chips may appear in laptops for mobile
computing - may be able to reach areas where DSL, cable and
T-1 services are not abundant at 3 Mbps
42Security Considerations
43Security Threats
- War-drivers
- use your Internet bandwidth
- advertise the availability of free Internet
access to others - Malicious hackers trying to steal or alter data
inside network - People launching attacks outside of your network
from within your network (denial of service
attacks)
44Security Solutions
- Lock down network
- MAC address authentication
- Encryption WEP/WPA/WPA2
- Monitoring
- Virtual Private Network (VPN)
45Lock Down Network
- Vendors sloppy with security
- Dont assume defaults are acceptable
- Ask vendor
- can administrator name and user be changed or
disabled? - can telnet be disabled?
46MAC Address Authentication
- Security system based on defining computers that
are allowed on the wireless network based on
their MAC Address - MAC address is unique identifier of the network
card in a computer - e.g. 00-10-DC-CB-89-1A
- MAC Medium of Access Control
- beware MAC addresses can be inpersonated
(spoofed)
47Encryption
- WEP
- Wired Equivalent Privacy
- first encryption standard for wireless
- uses RC4 encryption algorithm
- fallen out of favor due to its weakness
- WPA
- WiFi Protected Access
- strong encryption standard
- recommended to protect data from evil forces that
lurk - WPA2
- a stronger level of encryption security
- check for certified products at
- http//www.wi-fi.org/OpenSection/certified_produc
ts.asp?TID2
48Rogue Access Point Detection
- Rogue access point an access point that is
illegally made available on your network - How they work
- smart sensors analyze network traffic
- prevent unsecured back door to secured network
- block rogue communications over the airwaves
- identify location of rogue
49Comprehensive Security Solutions
- Consist of several components
- distributed sensors monitor all activity
- provides authentication
- rogue access points
- intrusion detection
- enforce network policy
- Example Cisco Air-Defense
50Virtual Private Network (VPN)
- VPNs use the Internet for transporting data but
rely on security and encryption to ensure that
only authorized users can access the internal
network - Important to use VPN for all communications that
come into library system from the Internet - remote connections to ILS
- bookmobile
51Summary of Benefits
52Improve Operations for Staff
- Mobile workstations
- Instant inventory updates
- Roaming Reference connection
- Movable circulation points out onto the floor
53Connect Your Bookmobile To Your Circulation System
- Connect live to circulation system
- Instant updates for your patron records while out
in the field. - Instant ability to see place and receive holds.
54Save Money
- Replace Expensive T-1 Lines
- Eliminate ongoing leased line costs
- Eliminate costs associated with new cable runs
55Library Wireless List
- For more information on wireless, subscribe to
the libwireless list - http//people.morrisville.edu/drewwe/
- wireless/libwireless.html
56QA