SlideShare a Scribd company logo
1 of 10
WiFi in Libraries An Essential Public Service Robert A. Caluori, Jr. IT Manager, Westchester Library System
Background Westchester Library System (WLS) is a 38 member / 44 location library system and technology consortium Last year was faced with need for an upgrade 7 year old wireless equipment Not serving the rising demand Needed upgrade project that did not increase recurring costs. All wireless equipment separate from Library’s primary network No authentication desired
Previous Infrastructure Linksys routers, sometimes multiple routers, in each library Connected to cable modems providing 1.5Mbps at no charge from local provider No remote management, monitoring Consistent failures due to volume Not meeting patron demand for access
New Requirements Remote management and monitoring Scalable to meet coverage area and volume needs Statistical records of usage No new or upgraded data circuits
The solution Cisco wireless access points and controller  Can handle the current and future volume Provides scalability Collects valuable statistics Cisco firewall equipment Provides VPN access to enable private network features over the public Internet
Network Design
Benefits Ability to control # of users permitted Users presented with EULA acceptance Bandwidth limitation can be enforced Remote monitoring saves valuable staff time in diagnosing issues Statistics are valuable management tool Other management tools: Power control, access
Use of VPN to overcome issues AP’s require communication with controller Static IP not available with current connection Use of ASA accomplished VPN use to be configure devices appropriately Route Internet traffic around management traffic
Example of Statistics Usage
Thank you Questions???? Robert A. Caluori, Jr. Westchester Library System robc@wlsmail.org

More Related Content

Similar to Wireless Upgrade for ALA 2010

Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Stenio Fernandes
 
Importance of Network Performance Monitoring
Importance of Network Performance MonitoringImportance of Network Performance Monitoring
Importance of Network Performance MonitoringcPacket Networks
 
Some QoS Deployment Issues
Some QoS Deployment IssuesSome QoS Deployment Issues
Some QoS Deployment IssuesShumon Huque
 
IPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content AnalysisIPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content AnalysisJoachim Surich
 
Front-End Intelligence
Front-End IntelligenceFront-End Intelligence
Front-End IntelligenceJudy T Raj
 
Legacy system modernization: Moving to Services Platforms
Legacy system modernization: Moving to Services PlatformsLegacy system modernization: Moving to Services Platforms
Legacy system modernization: Moving to Services PlatformsLebanese Library Association
 
Introduction(2)
Introduction(2)Introduction(2)
Introduction(2)trayyoo
 
Wireless Networks 120719.ppt
Wireless Networks 120719.pptWireless Networks 120719.ppt
Wireless Networks 120719.pptAbyThomas54
 
Acquisition the great migration
Acquisition  the great migrationAcquisition  the great migration
Acquisition the great migrationincunabula
 
Fiber not Just for bREAKFAST
Fiber not Just for bREAKFASTFiber not Just for bREAKFAST
Fiber not Just for bREAKFASTAnn Treacy
 
Incorporating Wireless Measurements with Wired Data Acquisition Systems
Incorporating Wireless Measurements with Wired Data Acquisition SystemsIncorporating Wireless Measurements with Wired Data Acquisition Systems
Incorporating Wireless Measurements with Wired Data Acquisition Systemscmstiernberg
 
Carrier-Neutral Enhanced Campus DAS: Boost Cellular Network Quality and Perfo...
Carrier-Neutral Enhanced Campus DAS: Boost Cellular Network Quality and Perfo...Carrier-Neutral Enhanced Campus DAS: Boost Cellular Network Quality and Perfo...
Carrier-Neutral Enhanced Campus DAS: Boost Cellular Network Quality and Perfo...Boingo Wireless
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Conceptszaisahil
 
Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...KTN
 

Similar to Wireless Upgrade for ALA 2010 (20)

Planning & Automation Arun Joseph
Planning & Automation Arun Joseph Planning & Automation Arun Joseph
Planning & Automation Arun Joseph
 
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...
 
ICEIC_2017_20161013
ICEIC_2017_20161013ICEIC_2017_20161013
ICEIC_2017_20161013
 
Csc341 – Lecture 1 network management
Csc341 – Lecture 1 network managementCsc341 – Lecture 1 network management
Csc341 – Lecture 1 network management
 
Importance of Network Performance Monitoring
Importance of Network Performance MonitoringImportance of Network Performance Monitoring
Importance of Network Performance Monitoring
 
Some QoS Deployment Issues
Some QoS Deployment IssuesSome QoS Deployment Issues
Some QoS Deployment Issues
 
IPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content AnalysisIPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content Analysis
 
Front-End Intelligence
Front-End IntelligenceFront-End Intelligence
Front-End Intelligence
 
Legacy system modernization: Moving to Services Platforms
Legacy system modernization: Moving to Services PlatformsLegacy system modernization: Moving to Services Platforms
Legacy system modernization: Moving to Services Platforms
 
DS_Kloudyy_v2015
DS_Kloudyy_v2015DS_Kloudyy_v2015
DS_Kloudyy_v2015
 
Introduction(2)
Introduction(2)Introduction(2)
Introduction(2)
 
Automation
AutomationAutomation
Automation
 
Wireless Networks 120719.ppt
Wireless Networks 120719.pptWireless Networks 120719.ppt
Wireless Networks 120719.ppt
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
Acquisition the great migration
Acquisition  the great migrationAcquisition  the great migration
Acquisition the great migration
 
Fiber not Just for bREAKFAST
Fiber not Just for bREAKFASTFiber not Just for bREAKFAST
Fiber not Just for bREAKFAST
 
Incorporating Wireless Measurements with Wired Data Acquisition Systems
Incorporating Wireless Measurements with Wired Data Acquisition SystemsIncorporating Wireless Measurements with Wired Data Acquisition Systems
Incorporating Wireless Measurements with Wired Data Acquisition Systems
 
Carrier-Neutral Enhanced Campus DAS: Boost Cellular Network Quality and Perfo...
Carrier-Neutral Enhanced Campus DAS: Boost Cellular Network Quality and Perfo...Carrier-Neutral Enhanced Campus DAS: Boost Cellular Network Quality and Perfo...
Carrier-Neutral Enhanced Campus DAS: Boost Cellular Network Quality and Perfo...
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Wireless Upgrade for ALA 2010

  • 1. WiFi in Libraries An Essential Public Service Robert A. Caluori, Jr. IT Manager, Westchester Library System
  • 2. Background Westchester Library System (WLS) is a 38 member / 44 location library system and technology consortium Last year was faced with need for an upgrade 7 year old wireless equipment Not serving the rising demand Needed upgrade project that did not increase recurring costs. All wireless equipment separate from Library’s primary network No authentication desired
  • 3. Previous Infrastructure Linksys routers, sometimes multiple routers, in each library Connected to cable modems providing 1.5Mbps at no charge from local provider No remote management, monitoring Consistent failures due to volume Not meeting patron demand for access
  • 4. New Requirements Remote management and monitoring Scalable to meet coverage area and volume needs Statistical records of usage No new or upgraded data circuits
  • 5. The solution Cisco wireless access points and controller Can handle the current and future volume Provides scalability Collects valuable statistics Cisco firewall equipment Provides VPN access to enable private network features over the public Internet
  • 7. Benefits Ability to control # of users permitted Users presented with EULA acceptance Bandwidth limitation can be enforced Remote monitoring saves valuable staff time in diagnosing issues Statistics are valuable management tool Other management tools: Power control, access
  • 8. Use of VPN to overcome issues AP’s require communication with controller Static IP not available with current connection Use of ASA accomplished VPN use to be configure devices appropriately Route Internet traffic around management traffic
  • 10. Thank you Questions???? Robert A. Caluori, Jr. Westchester Library System robc@wlsmail.org