SlideShare a Scribd company logo
1 of 22
WiFi for Mobile
Networks
Teresa Ulmer
EdTech 541
What is WiFi?
 “Wireless Fidelity”
 Wireless communication between a computer
and an Access Point (AP) and the Internet
What is WiFi?
Antenna
transmits
radio waves
Access point
sends info to the
Internet
Wireless Adaptor
converts data
into radio waves
Access Point
(connected to LAN)
translates radio waves
into data
Internet
responds to
data
Internet data
travels to Access
Points
AP sends
data in form
of radio
waves to
wireless
devices
What is WiFi?
 One access point
connects several
devices to the
Internet
 If AP fail or if too
many people try to
use high-bandwidth
applications
simultaneously
 Interference can
occur
 Connections can be
lost
Why have WiFi in High School
Classrooms?
 Data Sharing
 Access to Internet for Research
 Access to Tools that Enhance Learning
 Graphing calculators
 Simulations
 Virtual labs
 E-books
 Student response systems
 Improves Classroom Communication
ALLOWS FOR:
Steps for integrating a WiFi
Network in a High School
1. Identify users
Who will the network serve?
 Students
 Teachers
 Administrators
 Counselors
 Support staff
 Guests
Steps for integrating a WiFi
Network in a High School
2. Define coverage area
Where are the people who will be served by the
network?
 classrooms
 media center
 cafeteria
 common areas
 offices
 outside of buildings
 gymnasium
 sports fields
Steps for integrating a WiFi
Network in a High School
3. Determine uses for the network
What are the users going to do on the
wireless network?
 Gather/organize student data
 Grade students
 Communication
 Research
 Planning/prepping for courses
 Using educational tools
Steps for integrating a WiFi
Network in a High School
4. Plan for growth
 How many users will be accessing the
network (today and in the future)?
 Students
 Staff
 Guests
Steps for integrating a WiFi
Network in a High School
5. Determine network layout
a. How many access points (AP) will be
needed
 Each AP supports a set number of devices
b. Where the AP should be located
 Each AP needs an Ethernet cable and power
Steps for integrating a WiFi
Network in a High School
6. Install Access Points and Connect them to
the Network
Modem
(Cable/DSL)Internet
Router Wireless
Access
Point (WAP)
Clients
Steps for integrating a WiFi
Network in a High School
7. Configure network
 Set SSID (service set identifier)for the Network
 Unique name of wireless local area network
(WLAN)
 Case-sensitive sequence of alphanumeric
characters (up to 32)
 Enable encryption (WPA-PSK2 etc.) and
“password” to allow only authorized devices to
access the network
 Set WAPs with same SSID and encryption set
 Push configurations from a central controller
or configure each individual AP
Steps for integrating a WiFi
Network in a High School
8. Test the network and
trouble shoot
 Dead zones
 Interference (file
cabinets; lockers;
microwaves; building
materials
 Performance issues (low
speeds, etc. requires
software tools)
 Move WAPs to achieve
optimal
coverage/performance
Steps for integrating a WiFi
Network in a High School
9. Provide access to the network
 Students
 Teachers
 Administrators
 Counselors
 Support staff
 Guests
Potential Problems
 Should overlap
 # of APs required to provide wireless coverage in
desired locations
 Coverage
Potential Problems
 Depends on usage (can be projected using packet analyzer
software)
 # of APs required to provide the minimum acceptable data
rates
 min data rate = size of cell = Access Points
 Capacity
Potential Problems
 Security
 Encrypt data being transmitted
 Authenticate users
 Eliminate of rogue access points
Potential Problems
 Security
 Needs depend on the type of WLAN you're
accessing and the level of data encryption
required
 Three options for secure WLAN encryption and
authentication:
1. Wi-Fi Protected Access (WPA)
2. Wi-Fi Protected Access 2 (WPA2)
3. Virtual Private Networking (VPN)
 effective security for mobile users accessing the
network
WPA and WPA2
Virtual Private Networking (VPN)
Potential Problems
 Misuse
Resources
 Education World and Smith, R. (2011). Setting Up School WiFi Part II: Larger Networks. In Education World. Retrieved Sept 13, 2013, from
http://www.educationworld.com/a_tech/setting_up_school_wifi_part_2.shtml.
 Dannenfeldt, D. (1998-2013). How Portable Internet Devices Work?. In How Stuff Works. Retrieved Sept 13, 2013, from
http://computer.howstuffworks.com/portable-internet-devices.htm.
 undefined. (Nov 1, 2002). Classrooms with WiFi. In The Journal. Retrieved Sept 13, 2013, from
http://thejournal.com/articles/2002/11/01/classrooms-with-wifi.aspx.
 undefined. (undefined). Securing Wireless Networks. In Cisco. Retrieved Sept 13, 2013, from
http://www.cisco.com/en/US/solutions/collateral/ns339/ns639/ns642/net_customer_profile0900aecd803ee938.html.
 Mitchell, B. (2013). SSID: Service Set Identifier. In About.com. Retrieved Sept 14, 2013, from
http://compnetworking.about.com/cs/wireless/g/bldef_ssid.htm.
 Shields, G. (Sept 21, 1012). 10 Things You Were Never Told about Wireless Network Planning. In Dell Software. Retrieved Sept 14, 2013, from
http://communities.quest.com/community/nms/blog/2012/09/21/10-things-you-were-never-told-about-wireless-network-planning.
 Undefined. (undefined). Securing your wifi network. In YouTube. Retrieved Sept 15, 2013, from
http://www.youtube.com/watch?v=_WHynHcXm7c
IMAGES
 [I-pad mini]. Retrieved Sept 15,2013, from: http://cdn.toucharcade.com/wp-content/uploads/2012/10/apple-ipad-mini-pr.jpeg
 [WiFi symbol]. Retrieved Sept 15, 2013, from: http://images.clipartlogo.com/files/images/16/164074/wireless-wifi-symbol_t
 [Wireless network ]. Retrieved Sept 15, 2013, from: http://www.vicomsoft.com/learning-center/wireless-networking/
 [Wireless chart]. Retrieved Sept 15, 2013, from: http://homepages.wmich.edu/~s5lu/images/wireless_chart.jpg
 [VPN}. Retrieved Sept 15, 2013, from: http://www.bath.ac.uk/bucs/networking/Images/VPNExample.PNG
 [WPA/Firewall ]. Retrieved Sept 15, 2013, from: http://www.techieapps.com/wp-content/uploads/2012/06/gfx2.gif
 [coverage and capacity plan]. Retrieved Sept 16, 2013, from: http://communities.quest.com/community/nms/blog/2012/09/21/10-
things-you-were-never-told-about-wireless-network-planning
 [encryption]. Retrieved Sept 16, 2013, from: http://gdp.globus.org/gt4-tutorial/multiplehtml/images/security_concepts_encryption.png
 [football interference]. Retrieved Sept 15, 2013, from: http://d.yimg.com/i/ng/sp/reuters/20110724/02/731199012-24072011022828.jpg
 [cyberbullying]. Retrieved Sept 15, 2013, from: http://info.uknowkids.com/Portals/176530/images/cyberbullying.jpg
 [hacking]. Retrieved Sept 15, 2013, from: http://hacknmod.com/hack/thousands-of-free-scanned-hacking-books/
 [plagiarism]. Retrieved Sept 15, 2013, from: http://library.austincc.edu/gen-info/plagiarism_theft.jpg
 [social media]. Retrieved Sept 15, 2013, from: http://blog.socialmaximizer.com/wp-content/uploads/2013/02/social_media.jpg
 [online games]. Retrieved Sept 15, 2013, from:
https://lh5.googleusercontent.com/oE0_zHsex8eWjXVykWER88CAC7NHd2LoIN9YXJPCVZjByefYXiYGtHhXTI0gqGsxUA0Mblqq=s640-h400-
e365

More Related Content

What's hot

Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and developmentiarthur
 
Prototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on InternetPrototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on InternetAfrah Fathima
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingZaeem Hassan
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermMark John Lado, MIT
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technologyZul Fikri
 
Computer Communications - R.D.Sivakumar
Computer Communications - R.D.SivakumarComputer Communications - R.D.Sivakumar
Computer Communications - R.D.SivakumarSivakumar R D .
 
NETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D SivakumarNETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D SivakumarSivakumar R D .
 
Computer networks
Computer networksComputer networks
Computer networksUsman Abid
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer networkTrinity Dwarka
 
Examen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra TorresExamen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra TorresOnce Redes
 

What's hot (15)

Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and development
 
Prototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on InternetPrototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on Internet
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
2 1 lan
2 1 lan2 1 lan
2 1 lan
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
Lesson 25
Lesson 25Lesson 25
Lesson 25
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Computer Communications - R.D.Sivakumar
Computer Communications - R.D.SivakumarComputer Communications - R.D.Sivakumar
Computer Communications - R.D.Sivakumar
 
NETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D SivakumarNETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D Sivakumar
 
Computer networks
Computer networksComputer networks
Computer networks
 
Synopsis
SynopsisSynopsis
Synopsis
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Networks
NetworksNetworks
Networks
 
Examen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra TorresExamen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra Torres
 

Similar to WiFi for mobile networks

biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfJOMan21
 
Mobile computing
Mobile computingMobile computing
Mobile computingJeha Ryhan
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005Bill Drew
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
Effect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video TransmissionEffect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video TransmissionUniversitas Pembangunan Panca Budi
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Hem Pokhrel
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
Wireless network
Wireless networkWireless network
Wireless networkmattglover0
 
Network Trends
Network TrendsNetwork Trends
Network TrendsArun ACE
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityDustin Pytko
 
Integrating wi fi for mobile networks
Integrating wi fi for mobile networksIntegrating wi fi for mobile networks
Integrating wi fi for mobile networksBev Anderson
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & NetworkingGohil Anshu
 
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
FAS 110CL QEP Assignment Why Study Theatre   Inst.docxFAS 110CL QEP Assignment Why Study Theatre   Inst.docx
FAS 110CL QEP Assignment Why Study Theatre Inst.docxssuser454af01
 

Similar to WiFi for mobile networks (20)

Wireless and intranet
Wireless and intranetWireless and intranet
Wireless and intranet
 
All Chapter
All ChapterAll Chapter
All Chapter
 
biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdf
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Effect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video TransmissionEffect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video Transmission
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Wireless network
Wireless networkWireless network
Wireless network
 
final IT ppt.pptx
final IT ppt.pptxfinal IT ppt.pptx
final IT ppt.pptx
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
 
Integrating wi fi for mobile networks
Integrating wi fi for mobile networksIntegrating wi fi for mobile networks
Integrating wi fi for mobile networks
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
FAS 110CL QEP Assignment Why Study Theatre   Inst.docxFAS 110CL QEP Assignment Why Study Theatre   Inst.docx
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
 

Recently uploaded

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

WiFi for mobile networks

  • 2. What is WiFi?  “Wireless Fidelity”  Wireless communication between a computer and an Access Point (AP) and the Internet
  • 3. What is WiFi? Antenna transmits radio waves Access point sends info to the Internet Wireless Adaptor converts data into radio waves Access Point (connected to LAN) translates radio waves into data Internet responds to data Internet data travels to Access Points AP sends data in form of radio waves to wireless devices
  • 4. What is WiFi?  One access point connects several devices to the Internet  If AP fail or if too many people try to use high-bandwidth applications simultaneously  Interference can occur  Connections can be lost
  • 5. Why have WiFi in High School Classrooms?  Data Sharing  Access to Internet for Research  Access to Tools that Enhance Learning  Graphing calculators  Simulations  Virtual labs  E-books  Student response systems  Improves Classroom Communication ALLOWS FOR:
  • 6. Steps for integrating a WiFi Network in a High School 1. Identify users Who will the network serve?  Students  Teachers  Administrators  Counselors  Support staff  Guests
  • 7. Steps for integrating a WiFi Network in a High School 2. Define coverage area Where are the people who will be served by the network?  classrooms  media center  cafeteria  common areas  offices  outside of buildings  gymnasium  sports fields
  • 8. Steps for integrating a WiFi Network in a High School 3. Determine uses for the network What are the users going to do on the wireless network?  Gather/organize student data  Grade students  Communication  Research  Planning/prepping for courses  Using educational tools
  • 9. Steps for integrating a WiFi Network in a High School 4. Plan for growth  How many users will be accessing the network (today and in the future)?  Students  Staff  Guests
  • 10. Steps for integrating a WiFi Network in a High School 5. Determine network layout a. How many access points (AP) will be needed  Each AP supports a set number of devices b. Where the AP should be located  Each AP needs an Ethernet cable and power
  • 11. Steps for integrating a WiFi Network in a High School 6. Install Access Points and Connect them to the Network Modem (Cable/DSL)Internet Router Wireless Access Point (WAP) Clients
  • 12. Steps for integrating a WiFi Network in a High School 7. Configure network  Set SSID (service set identifier)for the Network  Unique name of wireless local area network (WLAN)  Case-sensitive sequence of alphanumeric characters (up to 32)  Enable encryption (WPA-PSK2 etc.) and “password” to allow only authorized devices to access the network  Set WAPs with same SSID and encryption set  Push configurations from a central controller or configure each individual AP
  • 13. Steps for integrating a WiFi Network in a High School 8. Test the network and trouble shoot  Dead zones  Interference (file cabinets; lockers; microwaves; building materials  Performance issues (low speeds, etc. requires software tools)  Move WAPs to achieve optimal coverage/performance
  • 14. Steps for integrating a WiFi Network in a High School 9. Provide access to the network  Students  Teachers  Administrators  Counselors  Support staff  Guests
  • 15. Potential Problems  Should overlap  # of APs required to provide wireless coverage in desired locations  Coverage
  • 16. Potential Problems  Depends on usage (can be projected using packet analyzer software)  # of APs required to provide the minimum acceptable data rates  min data rate = size of cell = Access Points  Capacity
  • 17. Potential Problems  Security  Encrypt data being transmitted  Authenticate users  Eliminate of rogue access points
  • 18. Potential Problems  Security  Needs depend on the type of WLAN you're accessing and the level of data encryption required  Three options for secure WLAN encryption and authentication: 1. Wi-Fi Protected Access (WPA) 2. Wi-Fi Protected Access 2 (WPA2) 3. Virtual Private Networking (VPN)  effective security for mobile users accessing the network
  • 22. Resources  Education World and Smith, R. (2011). Setting Up School WiFi Part II: Larger Networks. In Education World. Retrieved Sept 13, 2013, from http://www.educationworld.com/a_tech/setting_up_school_wifi_part_2.shtml.  Dannenfeldt, D. (1998-2013). How Portable Internet Devices Work?. In How Stuff Works. Retrieved Sept 13, 2013, from http://computer.howstuffworks.com/portable-internet-devices.htm.  undefined. (Nov 1, 2002). Classrooms with WiFi. In The Journal. Retrieved Sept 13, 2013, from http://thejournal.com/articles/2002/11/01/classrooms-with-wifi.aspx.  undefined. (undefined). Securing Wireless Networks. In Cisco. Retrieved Sept 13, 2013, from http://www.cisco.com/en/US/solutions/collateral/ns339/ns639/ns642/net_customer_profile0900aecd803ee938.html.  Mitchell, B. (2013). SSID: Service Set Identifier. In About.com. Retrieved Sept 14, 2013, from http://compnetworking.about.com/cs/wireless/g/bldef_ssid.htm.  Shields, G. (Sept 21, 1012). 10 Things You Were Never Told about Wireless Network Planning. In Dell Software. Retrieved Sept 14, 2013, from http://communities.quest.com/community/nms/blog/2012/09/21/10-things-you-were-never-told-about-wireless-network-planning.  Undefined. (undefined). Securing your wifi network. In YouTube. Retrieved Sept 15, 2013, from http://www.youtube.com/watch?v=_WHynHcXm7c IMAGES  [I-pad mini]. Retrieved Sept 15,2013, from: http://cdn.toucharcade.com/wp-content/uploads/2012/10/apple-ipad-mini-pr.jpeg  [WiFi symbol]. Retrieved Sept 15, 2013, from: http://images.clipartlogo.com/files/images/16/164074/wireless-wifi-symbol_t  [Wireless network ]. Retrieved Sept 15, 2013, from: http://www.vicomsoft.com/learning-center/wireless-networking/  [Wireless chart]. Retrieved Sept 15, 2013, from: http://homepages.wmich.edu/~s5lu/images/wireless_chart.jpg  [VPN}. Retrieved Sept 15, 2013, from: http://www.bath.ac.uk/bucs/networking/Images/VPNExample.PNG  [WPA/Firewall ]. Retrieved Sept 15, 2013, from: http://www.techieapps.com/wp-content/uploads/2012/06/gfx2.gif  [coverage and capacity plan]. Retrieved Sept 16, 2013, from: http://communities.quest.com/community/nms/blog/2012/09/21/10- things-you-were-never-told-about-wireless-network-planning  [encryption]. Retrieved Sept 16, 2013, from: http://gdp.globus.org/gt4-tutorial/multiplehtml/images/security_concepts_encryption.png  [football interference]. Retrieved Sept 15, 2013, from: http://d.yimg.com/i/ng/sp/reuters/20110724/02/731199012-24072011022828.jpg  [cyberbullying]. Retrieved Sept 15, 2013, from: http://info.uknowkids.com/Portals/176530/images/cyberbullying.jpg  [hacking]. Retrieved Sept 15, 2013, from: http://hacknmod.com/hack/thousands-of-free-scanned-hacking-books/  [plagiarism]. Retrieved Sept 15, 2013, from: http://library.austincc.edu/gen-info/plagiarism_theft.jpg  [social media]. Retrieved Sept 15, 2013, from: http://blog.socialmaximizer.com/wp-content/uploads/2013/02/social_media.jpg  [online games]. Retrieved Sept 15, 2013, from: https://lh5.googleusercontent.com/oE0_zHsex8eWjXVykWER88CAC7NHd2LoIN9YXJPCVZjByefYXiYGtHhXTI0gqGsxUA0Mblqq=s640-h400- e365