SlideShare una empresa de Scribd logo
1 de 15
How to Add Mobile Devices to Your
School Network
WiFi For Mobile Networks
Issues to Consider
 What is a Network?
 Current Network
 Needs Analysis:
 Why do we need mobile devices?
 Access points
 Teacher, Staff and Administrator needs
 Student needs
 Budget & Infrastructure
 Implementation
 Maintenance & Testing
 Network Security
 Acceptable Use Policy
 Local Results
 A network connects computers to each other, and
often to the Internet
 Switches connect computers and printers within a
building, creating a network, or Intranet.
 Routers connect computers to other networks, or the
Internet
What is a Network?
What is a Wireless Network?
 A wireless network allows devices to access each
other (computers, printers etc) and the Internet
without cables. Prior to wireless technology , most
computers connected via phone modems or
Ethernet cables.
 Most newer computers have built-in wireless
networking; older computers may require a
wireless network adapter card (Cisco).
 A wireless router typically extends up to 300
feet, sufficient for a room or home space. (Cisco).
Current Network
 How many computers, peripherals and other
devices?
 What servers, operating systems are running?
 What is the speed of the network?
Photo source: http://www.flickr.com/photos/ash-brown/955897562/
Why Mobile Devices?
 Students need laptops, tablets and other
devices for school work
 Teachers want to use iPads or other devices
in the classroom
 The computer lab is overused or
overscheduled
 School wants to use cloud storage
Access Points
 Existing computer
lab/facilities
 Classrooms
 Common areas:
hallways, locker rooms,
library, lunch room.
 Other areas on campus:
 Teachers lounge
 Labs, gym, field
 Do visitors need access?
Photo source:
http://www.flickr.com/photos/cimatti/433593238/
Teacher & Staff Needs
 How do teachers plan to use mobile devices?
 Streaming movies in class
 Use iPad apps
 Use student response systems
 Use their own laptop in the classroom
 How do staff members plan to use mobile
devices?
 Attendance
 Contact with parents
 Training purposes
Student Needs
 Where will students use
wireless?
 In classrooms for learning
 In common areas
 Possibly outside buildings
to extend the classroom
 Can students bring their
own device (BYOD) ?
 How will students
connect?
 Automatically, or
password?
Photo source:
http://www.flickr.com/photos/56155476@N08/6660042
699/
Budget
 Faster speeds and higher capacity = Higher costs
 Consider the following:
 Number of devices: Each user may have multiple
devices such as a laptop, tablet and smartphone
 Number of access points – each
classroom, common areas, etc.
 Bandwidth limitations – consider the busiest times
of day and usage expectations.
 Maintenance/Hardware costs
 Initial Setup
 Ongoing maintenance and upgrades
 Plan for expansion
Security
 Network security starts with the
router. Becky Waring of
PCWorldsuggests, “If you haven't
already, enable your router's
encryption... The Wireless
Protected Access (WPA) protocol
and more recent WPA2 have
supplanted the older (WEP).
 The router firewall prevents
users on the Internet from
accessing your computer, but
does not protect the network
from being used.
 Make sure you change the
default network name and
password on your router.
 Students should keep passwords
Photo source:
http://www.flickr.com/photos/simon_cocks/453
4589059/
Maintenance & Testing
 After the network is configured, Education world
suggests that you check and test the coverage.
 “Do you have coverage in the areas you expected?
Is the performance what you expected? Keep an
open mind and remember that some adjustments
may be needed.”
 On-going maintenance includes back-ups,
security software checks and hardware tests
 Change password regularly/annually for schools
 Make plans for expansion as needs change
Acceptable Use Policy
 The Acceptable Use Policy (AUP) document
communicates expectations to students and
parents
 The policy can lay out the school vision, list
specific do’s and don’ts or discuss hardware care
and maintenance.
 It defines the student’s and school’s responsibility
in case of inappropriate use, accessing content,
and loss of equipment.
Local Results
 In my previous high school, a wireless network was
put in place several years ago:
 All teachers, staff and students had access
 Devices were configured for each community member
– passwords were not handed out except for guest
access
 Each person had a unique email address, server
space
 Each full-time staffer and student has an iPad
(beginning 2012)
 Laptop, iPad and smartphone use prevalent
 Network frequently does not have enough bandwidth
for streaming video or accessing server mid-day, but
improvements are made annually.
 Network extends through multiple school buildings
References
Education World (n.d.). Setting Up School Wi-Fi Part 2: Larger Networks.
Retrieved June 21, 2013 from:http://www.educationworld.com/a_tech
setting_up_school_wifi_part_2.shtml
Cisco Systems (n.d.). What is a Network Switch vs. a Router? Retrieved June 24,
2013 from:
http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti
cles/connect_employees_and_offices/what_is_a_network_switch/index.html
Cisco Systems (n.d.) Wireless Network FAQ. Retrieved June 24, 2013 from:
http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti
cles/work_from_anywhere/wireless_networking_faq/index.html
Waring, Becky. (2007). How to secure your wireless network. PCWorld. Retrieved
from: http://www.pcworld.com/article/130330/article.html

Más contenido relacionado

La actualidad más candente

CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation SecurityCASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation SecurityPurdicom
 
Educause2011PresentationFinal
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinaltbanks
 
Use of technology in education
Use of technology in education Use of technology in education
Use of technology in education BK Patel
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policymmjones1021
 
Mobile learning for care workers
Mobile learning for care workersMobile learning for care workers
Mobile learning for care workersTalke Hoppmann
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School TechnologyTami Brass
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 pptjenice
 
Major project 1 ppt new
Major project 1 ppt newMajor project 1 ppt new
Major project 1 ppt newjenice
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 pptjenice
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 pptboone1
 
Tech. ppt new
Tech. ppt newTech. ppt new
Tech. ppt newjenice
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Educationmwolfrey
 
Gareth Frith & Dr Gill Taylor, ALPS
Gareth Frith & Dr Gill Taylor, ALPSGareth Frith & Dr Gill Taylor, ALPS
Gareth Frith & Dr Gill Taylor, ALPSHandheldLearning
 
How byod can be leveraged in education sector
How byod can be leveraged in education sectorHow byod can be leveraged in education sector
How byod can be leveraged in education sectorJack Smith
 
7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT Infrastructure7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT InfrastructureVartek Services Inc
 
Disadvantages of technology
Disadvantages of technologyDisadvantages of technology
Disadvantages of technologyAfsana Nasir
 
Assistive technology presentation
Assistive technology presentation Assistive technology presentation
Assistive technology presentation God1love
 

La actualidad más candente (19)

CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation SecurityCASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
 
Educause2011PresentationFinal
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinal
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Use of technology in education
Use of technology in education Use of technology in education
Use of technology in education
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Mobile learning for care workers
Mobile learning for care workersMobile learning for care workers
Mobile learning for care workers
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School Technology
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Major project 1 ppt new
Major project 1 ppt newMajor project 1 ppt new
Major project 1 ppt new
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Tech. ppt new
Tech. ppt newTech. ppt new
Tech. ppt new
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Education
 
Gareth Frith & Dr Gill Taylor, ALPS
Gareth Frith & Dr Gill Taylor, ALPSGareth Frith & Dr Gill Taylor, ALPS
Gareth Frith & Dr Gill Taylor, ALPS
 
How byod can be leveraged in education sector
How byod can be leveraged in education sectorHow byod can be leveraged in education sector
How byod can be leveraged in education sector
 
Distance Learning
Distance LearningDistance Learning
Distance Learning
 
7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT Infrastructure7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT Infrastructure
 
Disadvantages of technology
Disadvantages of technologyDisadvantages of technology
Disadvantages of technology
 
Assistive technology presentation
Assistive technology presentation Assistive technology presentation
Assistive technology presentation
 

Destacado

Bangalore's Greenest Homes: Chockalingam Muthiah on his green home
Bangalore's Greenest Homes: Chockalingam Muthiah on his green homeBangalore's Greenest Homes: Chockalingam Muthiah on his green home
Bangalore's Greenest Homes: Chockalingam Muthiah on his green homeThe_Alternative
 
How to put a story to your pictures by Peevee
How to put a story to your pictures by PeeveeHow to put a story to your pictures by Peevee
How to put a story to your pictures by PeeveeThe_Alternative
 

Destacado (8)

What is the Global Heart Network
What is the Global Heart NetworkWhat is the Global Heart Network
What is the Global Heart Network
 
Bases legales
Bases legalesBases legales
Bases legales
 
Bangalore's Greenest Homes: Chockalingam Muthiah on his green home
Bangalore's Greenest Homes: Chockalingam Muthiah on his green homeBangalore's Greenest Homes: Chockalingam Muthiah on his green home
Bangalore's Greenest Homes: Chockalingam Muthiah on his green home
 
How to put a story to your pictures by Peevee
How to put a story to your pictures by PeeveeHow to put a story to your pictures by Peevee
How to put a story to your pictures by Peevee
 
Ravindra green home
Ravindra green homeRavindra green home
Ravindra green home
 
Viruset
VirusetViruset
Viruset
 
Philippines Art
Philippines ArtPhilippines Art
Philippines Art
 
Epic story of Ibalon
Epic story of IbalonEpic story of Ibalon
Epic story of Ibalon
 

Similar a Mobile

BYOD for digital exams
BYOD for digital examsBYOD for digital exams
BYOD for digital examsIngrid Melve
 
Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13Sheryl Abshire
 
Building An Education Network for the Future
Building An Education Network for the FutureBuilding An Education Network for the Future
Building An Education Network for the FutureMichael Przytula
 
Internet based learning slideshare
Internet based learning slideshareInternet based learning slideshare
Internet based learning slideshareElboni Todd
 
Internet based learningv slideshare
Internet based learningv slideshareInternet based learningv slideshare
Internet based learningv slideshareElboni Todd
 
21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training SlideshowPunxsutawney School District
 
Action Model
Action ModelAction Model
Action Modelu082934
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentationspaul6414
 
Poteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the FuturePoteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the FutureJennifer Lopez
 
BYOD for exams: leaving students to their own devices
BYOD for exams: leaving students to their own devicesBYOD for exams: leaving students to their own devices
BYOD for exams: leaving students to their own devicesIngrid Melve
 
Networking in a k 12 school
Networking in a k 12 schoolNetworking in a k 12 school
Networking in a k 12 schoolbiggsboys
 
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?Cisco Service Provider Mobility
 
The Future of Technology and Education
The Future of Technology and EducationThe Future of Technology and Education
The Future of Technology and Educationsspengler
 
Review Of A De Technology (Report)
Review Of A De Technology (Report)Review Of A De Technology (Report)
Review Of A De Technology (Report)u068704
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Diana Benner
 

Similar a Mobile (20)

BYOD for digital exams
BYOD for digital examsBYOD for digital exams
BYOD for digital exams
 
Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13
 
Building An Education Network for the Future
Building An Education Network for the FutureBuilding An Education Network for the Future
Building An Education Network for the Future
 
Internet based learning slideshare
Internet based learning slideshareInternet based learning slideshare
Internet based learning slideshare
 
Internet based learningv slideshare
Internet based learningv slideshareInternet based learningv slideshare
Internet based learningv slideshare
 
21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow
 
Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
 
Action Model
Action ModelAction Model
Action Model
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Poteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the FuturePoteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the Future
 
BYOD for exams: leaving students to their own devices
BYOD for exams: leaving students to their own devicesBYOD for exams: leaving students to their own devices
BYOD for exams: leaving students to their own devices
 
Networking in a k 12 school
Networking in a k 12 schoolNetworking in a k 12 school
Networking in a k 12 school
 
Wireless Requirements and Benefits in the Academics Domain
Wireless Requirements and Benefits in the Academics DomainWireless Requirements and Benefits in the Academics Domain
Wireless Requirements and Benefits in the Academics Domain
 
Networks pres
Networks presNetworks pres
Networks pres
 
M learning in education
M learning in educationM learning in education
M learning in education
 
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
 
The Future of Technology and Education
The Future of Technology and EducationThe Future of Technology and Education
The Future of Technology and Education
 
Review Of A De Technology (Report)
Review Of A De Technology (Report)Review Of A De Technology (Report)
Review Of A De Technology (Report)
 
E learning
E learningE learning
E learning
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016
 

Último

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Mobile

  • 1. How to Add Mobile Devices to Your School Network WiFi For Mobile Networks
  • 2. Issues to Consider  What is a Network?  Current Network  Needs Analysis:  Why do we need mobile devices?  Access points  Teacher, Staff and Administrator needs  Student needs  Budget & Infrastructure  Implementation  Maintenance & Testing  Network Security  Acceptable Use Policy  Local Results
  • 3.  A network connects computers to each other, and often to the Internet  Switches connect computers and printers within a building, creating a network, or Intranet.  Routers connect computers to other networks, or the Internet What is a Network?
  • 4. What is a Wireless Network?  A wireless network allows devices to access each other (computers, printers etc) and the Internet without cables. Prior to wireless technology , most computers connected via phone modems or Ethernet cables.  Most newer computers have built-in wireless networking; older computers may require a wireless network adapter card (Cisco).  A wireless router typically extends up to 300 feet, sufficient for a room or home space. (Cisco).
  • 5. Current Network  How many computers, peripherals and other devices?  What servers, operating systems are running?  What is the speed of the network? Photo source: http://www.flickr.com/photos/ash-brown/955897562/
  • 6. Why Mobile Devices?  Students need laptops, tablets and other devices for school work  Teachers want to use iPads or other devices in the classroom  The computer lab is overused or overscheduled  School wants to use cloud storage
  • 7. Access Points  Existing computer lab/facilities  Classrooms  Common areas: hallways, locker rooms, library, lunch room.  Other areas on campus:  Teachers lounge  Labs, gym, field  Do visitors need access? Photo source: http://www.flickr.com/photos/cimatti/433593238/
  • 8. Teacher & Staff Needs  How do teachers plan to use mobile devices?  Streaming movies in class  Use iPad apps  Use student response systems  Use their own laptop in the classroom  How do staff members plan to use mobile devices?  Attendance  Contact with parents  Training purposes
  • 9. Student Needs  Where will students use wireless?  In classrooms for learning  In common areas  Possibly outside buildings to extend the classroom  Can students bring their own device (BYOD) ?  How will students connect?  Automatically, or password? Photo source: http://www.flickr.com/photos/56155476@N08/6660042 699/
  • 10. Budget  Faster speeds and higher capacity = Higher costs  Consider the following:  Number of devices: Each user may have multiple devices such as a laptop, tablet and smartphone  Number of access points – each classroom, common areas, etc.  Bandwidth limitations – consider the busiest times of day and usage expectations.  Maintenance/Hardware costs  Initial Setup  Ongoing maintenance and upgrades  Plan for expansion
  • 11. Security  Network security starts with the router. Becky Waring of PCWorldsuggests, “If you haven't already, enable your router's encryption... The Wireless Protected Access (WPA) protocol and more recent WPA2 have supplanted the older (WEP).  The router firewall prevents users on the Internet from accessing your computer, but does not protect the network from being used.  Make sure you change the default network name and password on your router.  Students should keep passwords Photo source: http://www.flickr.com/photos/simon_cocks/453 4589059/
  • 12. Maintenance & Testing  After the network is configured, Education world suggests that you check and test the coverage.  “Do you have coverage in the areas you expected? Is the performance what you expected? Keep an open mind and remember that some adjustments may be needed.”  On-going maintenance includes back-ups, security software checks and hardware tests  Change password regularly/annually for schools  Make plans for expansion as needs change
  • 13. Acceptable Use Policy  The Acceptable Use Policy (AUP) document communicates expectations to students and parents  The policy can lay out the school vision, list specific do’s and don’ts or discuss hardware care and maintenance.  It defines the student’s and school’s responsibility in case of inappropriate use, accessing content, and loss of equipment.
  • 14. Local Results  In my previous high school, a wireless network was put in place several years ago:  All teachers, staff and students had access  Devices were configured for each community member – passwords were not handed out except for guest access  Each person had a unique email address, server space  Each full-time staffer and student has an iPad (beginning 2012)  Laptop, iPad and smartphone use prevalent  Network frequently does not have enough bandwidth for streaming video or accessing server mid-day, but improvements are made annually.  Network extends through multiple school buildings
  • 15. References Education World (n.d.). Setting Up School Wi-Fi Part 2: Larger Networks. Retrieved June 21, 2013 from:http://www.educationworld.com/a_tech setting_up_school_wifi_part_2.shtml Cisco Systems (n.d.). What is a Network Switch vs. a Router? Retrieved June 24, 2013 from: http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti cles/connect_employees_and_offices/what_is_a_network_switch/index.html Cisco Systems (n.d.) Wireless Network FAQ. Retrieved June 24, 2013 from: http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti cles/work_from_anywhere/wireless_networking_faq/index.html Waring, Becky. (2007). How to secure your wireless network. PCWorld. Retrieved from: http://www.pcworld.com/article/130330/article.html