SlideShare una empresa de Scribd logo
1 de 15
How to Add Mobile Devices to Your
School Network
WiFi For Mobile Networks
Issues to Consider
 What is a Network?
 Current Network
 Needs Analysis:
 Why do we need mobile devices?
 Access points
 Teacher, Staff and Administrator needs
 Student needs
 Budget & Infrastructure
 Implementation
 Maintenance & Testing
 Network Security
 Acceptable Use Policy
 Local Results
 A network connects computers to each other, and
often to the Internet
 Switches connect computers and printers within a
building, creating a network, or Intranet.
 Routers connect computers to other networks, or the
Internet
What is a Network?
What is a Wireless Network?
 A wireless network allows devices to access each
other (computers, printers etc) and the Internet
without cables. Prior to wireless technology , most
computers connected via phone modems or
Ethernet cables.
 Most newer computers have built-in wireless
networking; older computers may require a
wireless network adapter card (Cisco).
 A wireless router typically extends up to 300
feet, sufficient for a room or home space. (Cisco).
Current Network
 How many computers, peripherals and other
devices?
 What servers, operating systems are running?
 What is the speed of the network?
Photo source: http://www.flickr.com/photos/ash-brown/955897562/
Why Mobile Devices?
 Students need laptops, tablets and other
devices for school work
 Teachers want to use iPads or other devices
in the classroom
 The computer lab is overused or
overscheduled
 School wants to use cloud storage
Access Points
 Existing computer
lab/facilities
 Classrooms
 Common areas:
hallways, locker rooms,
library, lunch room.
 Other areas on campus:
 Teachers lounge
 Labs, gym, field
 Do visitors need access?
Photo source:
http://www.flickr.com/photos/cimatti/433593238/
Teacher & Staff Needs
 How do teachers plan to use mobile devices?
 Streaming movies in class
 Use iPad apps
 Use student response systems
 Use their own laptop in the classroom
 How do staff members plan to use mobile
devices?
 Attendance
 Contact with parents
 Training purposes
Student Needs
 Where will students use
wireless?
 In classrooms for learning
 In common areas
 Possibly outside buildings
to extend the classroom
 Can students bring their
own device (BYOD) ?
 How will students
connect?
 Automatically, or
password?
Photo source:
http://www.flickr.com/photos/56155476@N08/6660042
699/
Budget
 Faster speeds and higher capacity = Higher costs
 Consider the following:
 Number of devices: Each user may have multiple
devices such as a laptop, tablet and smartphone
 Number of access points – each
classroom, common areas, etc.
 Bandwidth limitations – consider the busiest times
of day and usage expectations.
 Maintenance/Hardware costs
 Initial Setup
 Ongoing maintenance and upgrades
 Plan for expansion
Security
 Network security starts with the
router. Becky Waring of
PCWorldsuggests, “If you haven't
already, enable your router's
encryption... The Wireless
Protected Access (WPA) protocol
and more recent WPA2 have
supplanted the older (WEP).
 The router firewall prevents
users on the Internet from
accessing your computer, but
does not protect the network
from being used.
 Make sure you change the
default network name and
password on your router.
 Students should keep passwords
Photo source:
http://www.flickr.com/photos/simon_cocks/453
4589059/
Maintenance & Testing
 After the network is configured, Education world
suggests that you check and test the coverage.
 “Do you have coverage in the areas you expected?
Is the performance what you expected? Keep an
open mind and remember that some adjustments
may be needed.”
 On-going maintenance includes back-ups,
security software checks and hardware tests
 Change password regularly/annually for schools
 Make plans for expansion as needs change
Acceptable Use Policy
 The Acceptable Use Policy (AUP) document
communicates expectations to students and
parents
 The policy can lay out the school vision, list
specific do’s and don’ts or discuss hardware care
and maintenance.
 It defines the student’s and school’s responsibility
in case of inappropriate use, accessing content,
and loss of equipment.
Local Results
 In my previous high school, a wireless network was
put in place several years ago:
 All teachers, staff and students had access
 Devices were configured for each community member
– passwords were not handed out except for guest
access
 Each person had a unique email address, server
space
 Each full-time staffer and student has an iPad
(beginning 2012)
 Laptop, iPad and smartphone use prevalent
 Network frequently does not have enough bandwidth
for streaming video or accessing server mid-day, but
improvements are made annually.
 Network extends through multiple school buildings
References
Education World (n.d.). Setting Up School Wi-Fi Part 2: Larger Networks.
Retrieved June 21, 2013 from:http://www.educationworld.com/a_tech
setting_up_school_wifi_part_2.shtml
Cisco Systems (n.d.). What is a Network Switch vs. a Router? Retrieved June 24,
2013 from:
http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti
cles/connect_employees_and_offices/what_is_a_network_switch/index.html
Cisco Systems (n.d.) Wireless Network FAQ. Retrieved June 24, 2013 from:
http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti
cles/work_from_anywhere/wireless_networking_faq/index.html
Waring, Becky. (2007). How to secure your wireless network. PCWorld. Retrieved
from: http://www.pcworld.com/article/130330/article.html

Más contenido relacionado

La actualidad más candente

CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation SecurityCASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation SecurityPurdicom
 
Educause2011PresentationFinal
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinaltbanks
 
Use of technology in education
Use of technology in education Use of technology in education
Use of technology in education BK Patel
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policymmjones1021
 
Mobile learning for care workers
Mobile learning for care workersMobile learning for care workers
Mobile learning for care workersTalke Hoppmann
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School TechnologyTami Brass
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 pptjenice
 
Major project 1 ppt new
Major project 1 ppt newMajor project 1 ppt new
Major project 1 ppt newjenice
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 pptjenice
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 pptboone1
 
Tech. ppt new
Tech. ppt newTech. ppt new
Tech. ppt newjenice
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Educationmwolfrey
 
Gareth Frith & Dr Gill Taylor, ALPS
Gareth Frith & Dr Gill Taylor, ALPSGareth Frith & Dr Gill Taylor, ALPS
Gareth Frith & Dr Gill Taylor, ALPSHandheldLearning
 
How byod can be leveraged in education sector
How byod can be leveraged in education sectorHow byod can be leveraged in education sector
How byod can be leveraged in education sectorJack Smith
 
7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT Infrastructure7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT InfrastructureVartek Services Inc
 
Disadvantages of technology
Disadvantages of technologyDisadvantages of technology
Disadvantages of technologyAfsana Nasir
 
Assistive technology presentation
Assistive technology presentation Assistive technology presentation
Assistive technology presentation God1love
 

La actualidad más candente (19)

CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation SecurityCASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
 
Educause2011PresentationFinal
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinal
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Use of technology in education
Use of technology in education Use of technology in education
Use of technology in education
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Mobile learning for care workers
Mobile learning for care workersMobile learning for care workers
Mobile learning for care workers
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School Technology
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Major project 1 ppt new
Major project 1 ppt newMajor project 1 ppt new
Major project 1 ppt new
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Tech. ppt new
Tech. ppt newTech. ppt new
Tech. ppt new
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Education
 
Gareth Frith & Dr Gill Taylor, ALPS
Gareth Frith & Dr Gill Taylor, ALPSGareth Frith & Dr Gill Taylor, ALPS
Gareth Frith & Dr Gill Taylor, ALPS
 
How byod can be leveraged in education sector
How byod can be leveraged in education sectorHow byod can be leveraged in education sector
How byod can be leveraged in education sector
 
Distance Learning
Distance LearningDistance Learning
Distance Learning
 
7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT Infrastructure7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT Infrastructure
 
Disadvantages of technology
Disadvantages of technologyDisadvantages of technology
Disadvantages of technology
 
Assistive technology presentation
Assistive technology presentation Assistive technology presentation
Assistive technology presentation
 

Destacado

Bangalore's Greenest Homes: Chockalingam Muthiah on his green home
Bangalore's Greenest Homes: Chockalingam Muthiah on his green homeBangalore's Greenest Homes: Chockalingam Muthiah on his green home
Bangalore's Greenest Homes: Chockalingam Muthiah on his green homeThe_Alternative
 
How to put a story to your pictures by Peevee
How to put a story to your pictures by PeeveeHow to put a story to your pictures by Peevee
How to put a story to your pictures by PeeveeThe_Alternative
 

Destacado (8)

What is the Global Heart Network
What is the Global Heart NetworkWhat is the Global Heart Network
What is the Global Heart Network
 
Bases legales
Bases legalesBases legales
Bases legales
 
Bangalore's Greenest Homes: Chockalingam Muthiah on his green home
Bangalore's Greenest Homes: Chockalingam Muthiah on his green homeBangalore's Greenest Homes: Chockalingam Muthiah on his green home
Bangalore's Greenest Homes: Chockalingam Muthiah on his green home
 
How to put a story to your pictures by Peevee
How to put a story to your pictures by PeeveeHow to put a story to your pictures by Peevee
How to put a story to your pictures by Peevee
 
Ravindra green home
Ravindra green homeRavindra green home
Ravindra green home
 
Viruset
VirusetViruset
Viruset
 
Philippines Art
Philippines ArtPhilippines Art
Philippines Art
 
Epic story of Ibalon
Epic story of IbalonEpic story of Ibalon
Epic story of Ibalon
 

Similar a Mobile

BYOD for digital exams
BYOD for digital examsBYOD for digital exams
BYOD for digital examsIngrid Melve
 
Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13Sheryl Abshire
 
Building An Education Network for the Future
Building An Education Network for the FutureBuilding An Education Network for the Future
Building An Education Network for the FutureMichael Przytula
 
Internet based learning slideshare
Internet based learning slideshareInternet based learning slideshare
Internet based learning slideshareElboni Todd
 
Internet based learningv slideshare
Internet based learningv slideshareInternet based learningv slideshare
Internet based learningv slideshareElboni Todd
 
21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training SlideshowPunxsutawney School District
 
Action Model
Action ModelAction Model
Action Modelu082934
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentationspaul6414
 
Poteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the FuturePoteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the FutureJennifer Lopez
 
BYOD for exams: leaving students to their own devices
BYOD for exams: leaving students to their own devicesBYOD for exams: leaving students to their own devices
BYOD for exams: leaving students to their own devicesIngrid Melve
 
Networking in a k 12 school
Networking in a k 12 schoolNetworking in a k 12 school
Networking in a k 12 schoolbiggsboys
 
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?Cisco Service Provider Mobility
 
The Future of Technology and Education
The Future of Technology and EducationThe Future of Technology and Education
The Future of Technology and Educationsspengler
 
Review Of A De Technology (Report)
Review Of A De Technology (Report)Review Of A De Technology (Report)
Review Of A De Technology (Report)u068704
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Diana Benner
 

Similar a Mobile (20)

BYOD for digital exams
BYOD for digital examsBYOD for digital exams
BYOD for digital exams
 
Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13
 
Building An Education Network for the Future
Building An Education Network for the FutureBuilding An Education Network for the Future
Building An Education Network for the Future
 
Internet based learning slideshare
Internet based learning slideshareInternet based learning slideshare
Internet based learning slideshare
 
Internet based learningv slideshare
Internet based learningv slideshareInternet based learningv slideshare
Internet based learningv slideshare
 
21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow
 
Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
 
Action Model
Action ModelAction Model
Action Model
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Poteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the FuturePoteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the Future
 
BYOD for exams: leaving students to their own devices
BYOD for exams: leaving students to their own devicesBYOD for exams: leaving students to their own devices
BYOD for exams: leaving students to their own devices
 
Networking in a k 12 school
Networking in a k 12 schoolNetworking in a k 12 school
Networking in a k 12 school
 
Wireless Requirements and Benefits in the Academics Domain
Wireless Requirements and Benefits in the Academics DomainWireless Requirements and Benefits in the Academics Domain
Wireless Requirements and Benefits in the Academics Domain
 
Networks pres
Networks presNetworks pres
Networks pres
 
M learning in education
M learning in educationM learning in education
M learning in education
 
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
 
The Future of Technology and Education
The Future of Technology and EducationThe Future of Technology and Education
The Future of Technology and Education
 
Review Of A De Technology (Report)
Review Of A De Technology (Report)Review Of A De Technology (Report)
Review Of A De Technology (Report)
 
E learning
E learningE learning
E learning
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Mobile

  • 1. How to Add Mobile Devices to Your School Network WiFi For Mobile Networks
  • 2. Issues to Consider  What is a Network?  Current Network  Needs Analysis:  Why do we need mobile devices?  Access points  Teacher, Staff and Administrator needs  Student needs  Budget & Infrastructure  Implementation  Maintenance & Testing  Network Security  Acceptable Use Policy  Local Results
  • 3.  A network connects computers to each other, and often to the Internet  Switches connect computers and printers within a building, creating a network, or Intranet.  Routers connect computers to other networks, or the Internet What is a Network?
  • 4. What is a Wireless Network?  A wireless network allows devices to access each other (computers, printers etc) and the Internet without cables. Prior to wireless technology , most computers connected via phone modems or Ethernet cables.  Most newer computers have built-in wireless networking; older computers may require a wireless network adapter card (Cisco).  A wireless router typically extends up to 300 feet, sufficient for a room or home space. (Cisco).
  • 5. Current Network  How many computers, peripherals and other devices?  What servers, operating systems are running?  What is the speed of the network? Photo source: http://www.flickr.com/photos/ash-brown/955897562/
  • 6. Why Mobile Devices?  Students need laptops, tablets and other devices for school work  Teachers want to use iPads or other devices in the classroom  The computer lab is overused or overscheduled  School wants to use cloud storage
  • 7. Access Points  Existing computer lab/facilities  Classrooms  Common areas: hallways, locker rooms, library, lunch room.  Other areas on campus:  Teachers lounge  Labs, gym, field  Do visitors need access? Photo source: http://www.flickr.com/photos/cimatti/433593238/
  • 8. Teacher & Staff Needs  How do teachers plan to use mobile devices?  Streaming movies in class  Use iPad apps  Use student response systems  Use their own laptop in the classroom  How do staff members plan to use mobile devices?  Attendance  Contact with parents  Training purposes
  • 9. Student Needs  Where will students use wireless?  In classrooms for learning  In common areas  Possibly outside buildings to extend the classroom  Can students bring their own device (BYOD) ?  How will students connect?  Automatically, or password? Photo source: http://www.flickr.com/photos/56155476@N08/6660042 699/
  • 10. Budget  Faster speeds and higher capacity = Higher costs  Consider the following:  Number of devices: Each user may have multiple devices such as a laptop, tablet and smartphone  Number of access points – each classroom, common areas, etc.  Bandwidth limitations – consider the busiest times of day and usage expectations.  Maintenance/Hardware costs  Initial Setup  Ongoing maintenance and upgrades  Plan for expansion
  • 11. Security  Network security starts with the router. Becky Waring of PCWorldsuggests, “If you haven't already, enable your router's encryption... The Wireless Protected Access (WPA) protocol and more recent WPA2 have supplanted the older (WEP).  The router firewall prevents users on the Internet from accessing your computer, but does not protect the network from being used.  Make sure you change the default network name and password on your router.  Students should keep passwords Photo source: http://www.flickr.com/photos/simon_cocks/453 4589059/
  • 12. Maintenance & Testing  After the network is configured, Education world suggests that you check and test the coverage.  “Do you have coverage in the areas you expected? Is the performance what you expected? Keep an open mind and remember that some adjustments may be needed.”  On-going maintenance includes back-ups, security software checks and hardware tests  Change password regularly/annually for schools  Make plans for expansion as needs change
  • 13. Acceptable Use Policy  The Acceptable Use Policy (AUP) document communicates expectations to students and parents  The policy can lay out the school vision, list specific do’s and don’ts or discuss hardware care and maintenance.  It defines the student’s and school’s responsibility in case of inappropriate use, accessing content, and loss of equipment.
  • 14. Local Results  In my previous high school, a wireless network was put in place several years ago:  All teachers, staff and students had access  Devices were configured for each community member – passwords were not handed out except for guest access  Each person had a unique email address, server space  Each full-time staffer and student has an iPad (beginning 2012)  Laptop, iPad and smartphone use prevalent  Network frequently does not have enough bandwidth for streaming video or accessing server mid-day, but improvements are made annually.  Network extends through multiple school buildings
  • 15. References Education World (n.d.). Setting Up School Wi-Fi Part 2: Larger Networks. Retrieved June 21, 2013 from:http://www.educationworld.com/a_tech setting_up_school_wifi_part_2.shtml Cisco Systems (n.d.). What is a Network Switch vs. a Router? Retrieved June 24, 2013 from: http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti cles/connect_employees_and_offices/what_is_a_network_switch/index.html Cisco Systems (n.d.) Wireless Network FAQ. Retrieved June 24, 2013 from: http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti cles/work_from_anywhere/wireless_networking_faq/index.html Waring, Becky. (2007). How to secure your wireless network. PCWorld. Retrieved from: http://www.pcworld.com/article/130330/article.html