html5-img
1 / 6

Ken LeCompte Systems Programmer/Administrator NBCS -CCF lecompte@rutgers

Ken LeCompte Systems Programmer/Administrator NBCS -CCF lecompte@rutgers.edu. Brief History. RUWireless started as a project in January of 2002 First buildings to be installed were the student centers - Fall/Winter of 2002/2003

siusan
Download Presentation

Ken LeCompte Systems Programmer/Administrator NBCS -CCF lecompte@rutgers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ken LeCompte Systems Programmer/Administrator NBCS -CCF lecompte@rutgers.edu

  2. Brief History • RUWireless started as a project in January of 2002 • First buildings to be installed were the student centers - Fall/Winter of 2002/2003 • Several libraries and departments were added during the summer of 2003 • Today there are 27 buildings with RUWireless and several more in the process of being installed

  3. Usage Statistics

  4. Site Survey Report

  5. Installation Process • Determine coverage needs • Conduct site survey and create report • Coordinate data cable installation • Install physical equipment and test network • Manage and maintain network and supporting systems • Provide support for users and UCS/UCM

  6. Features and Benefits • Guest Account Management System: Allows department liaisons to create temporary RUWireless guest accounts for visitors to their departments. • Statistics Website: Allows department liaisons to track RUWireless usage in their departments • Bandwidth Monitoring System: Automatically monitors user consumption of bandwidth and limits a user if they consume too much. • Virus Detection System: Monitors wireless traffic for virus signatures and automatically quarantines and notifies possibly infected users. • Tunneling Technology: Allows each access point to tunnel traffic back to the wireless gateways where policy and authentication is enforced. This level of distribution dramatically lowers the cost of implementation for departments.

More Related