SlideShare a Scribd company logo
1 of 22
WiFi for Mobile
Networks
Teresa Ulmer
EdTech 541
What is WiFi?
 “Wireless Fidelity”
 Wireless communication between a computer
and an Access Point (AP) and the Internet
What is WiFi?
Antenna
transmits
radio waves
Access point
sends info to the
Internet
Wireless Adaptor
converts data
into radio waves
Access Point
(connected to LAN)
translates radio waves
into data
Internet
responds to
data
Internet data
travels to Access
Points
AP sends
data in form
of radio
waves to
wireless
devices
What is WiFi?
 One access point
connects several
devices to the
Internet
 If AP fail or if too
many people try to
use high-bandwidth
applications
simultaneously
 Interference can
occur
 Connections can be
lost
Why have WiFi in High School
Classrooms?
 Data Sharing
 Access to Internet for Research
 Access to Tools that Enhance Learning
 Graphing calculators
 Simulations
 Virtual labs
 E-books
 Student response systems
 Improves Classroom Communication
ALLOWS FOR:
Steps for integrating a WiFi
Network in a High School
1. Identify users
Who will the network serve?
 Students
 Teachers
 Administrators
 Counselors
 Support staff
 Guests
Steps for integrating a WiFi
Network in a High School
2. Define coverage area
Where are the people who will be served by the
network?
 classrooms
 media center
 cafeteria
 common areas
 offices
 outside of buildings
 gymnasium
 sports fields
Steps for integrating a WiFi
Network in a High School
3. Determine uses for the network
What are the users going to do on the
wireless network?
 Gather/organize student data
 Grade students
 Communication
 Research
 Planning/prepping for courses
 Using educational tools
Steps for integrating a WiFi
Network in a High School
4. Plan for growth
 How many users will be accessing the
network (today and in the future)?
 Students
 Staff
 Guests
Steps for integrating a WiFi
Network in a High School
5. Determine network layout
a. How many access points (AP) will be
needed
 Each AP supports a set number of devices
b. Where the AP should be located
 Each AP needs an Ethernet cable and power
Steps for integrating a WiFi
Network in a High School
6. Install Access Points and Connect them to
the Network
Modem
(Cable/DSL)Internet
Router Wireless
Access
Point (WAP)
Clients
Steps for integrating a WiFi
Network in a High School
7. Configure network
 Set SSID (service set identifier)for the Network
 Unique name of wireless local area network
(WLAN)
 Case-sensitive sequence of alphanumeric
characters (up to 32)
 Enable encryption (WPA-PSK2 etc.) and
“password” to allow only authorized devices to
access the network
 Set WAPs with same SSID and encryption set
 Push configurations from a central controller
or configure each individual AP
Steps for integrating a WiFi
Network in a High School
8. Test the network and
trouble shoot
 Dead zones
 Interference (file
cabinets; lockers;
microwaves; building
materials
 Performance issues (low
speeds, etc. requires
software tools)
 Move WAPs to achieve
optimal
coverage/performance
Steps for integrating a WiFi
Network in a High School
9. Provide access to the network
 Students
 Teachers
 Administrators
 Counselors
 Support staff
 Guests
Potential Problems
 Should overlap
 # of APs required to provide wireless coverage in
desired locations
 Coverage
Potential Problems
 Depends on usage (can be projected using packet analyzer
software)
 # of APs required to provide the minimum acceptable data
rates
 min data rate = size of cell = Access Points
 Capacity
Potential Problems
 Security
 Encrypt data being transmitted
 Authenticate users
 Eliminate of rogue access points
Potential Problems
 Security
 Needs depend on the type of WLAN you're
accessing and the level of data encryption
required
 Three options for secure WLAN encryption and
authentication:
1. Wi-Fi Protected Access (WPA)
2. Wi-Fi Protected Access 2 (WPA2)
3. Virtual Private Networking (VPN)
 effective security for mobile users accessing the
network
WPA and WPA2
Virtual Private Networking (VPN)
Potential Problems
 Misuse
Resources
 Education World and Smith, R. (2011). Setting Up School WiFi Part II: Larger Networks. In Education World. Retrieved Sept 13, 2013, from
http://www.educationworld.com/a_tech/setting_up_school_wifi_part_2.shtml.
 Dannenfeldt, D. (1998-2013). How Portable Internet Devices Work?. In How Stuff Works. Retrieved Sept 13, 2013, from
http://computer.howstuffworks.com/portable-internet-devices.htm.
 undefined. (Nov 1, 2002). Classrooms with WiFi. In The Journal. Retrieved Sept 13, 2013, from
http://thejournal.com/articles/2002/11/01/classrooms-with-wifi.aspx.
 undefined. (undefined). Securing Wireless Networks. In Cisco. Retrieved Sept 13, 2013, from
http://www.cisco.com/en/US/solutions/collateral/ns339/ns639/ns642/net_customer_profile0900aecd803ee938.html.
 Mitchell, B. (2013). SSID: Service Set Identifier. In About.com. Retrieved Sept 14, 2013, from
http://compnetworking.about.com/cs/wireless/g/bldef_ssid.htm.
 Shields, G. (Sept 21, 1012). 10 Things You Were Never Told about Wireless Network Planning. In Dell Software. Retrieved Sept 14, 2013, from
http://communities.quest.com/community/nms/blog/2012/09/21/10-things-you-were-never-told-about-wireless-network-planning.
 Undefined. (undefined). Securing your wifi network. In YouTube. Retrieved Sept 15, 2013, from
http://www.youtube.com/watch?v=_WHynHcXm7c
IMAGES
 [I-pad mini]. Retrieved Sept 15,2013, from: http://cdn.toucharcade.com/wp-content/uploads/2012/10/apple-ipad-mini-pr.jpeg
 [WiFi symbol]. Retrieved Sept 15, 2013, from: http://images.clipartlogo.com/files/images/16/164074/wireless-wifi-symbol_t
 [Wireless network ]. Retrieved Sept 15, 2013, from: http://www.vicomsoft.com/learning-center/wireless-networking/
 [Wireless chart]. Retrieved Sept 15, 2013, from: http://homepages.wmich.edu/~s5lu/images/wireless_chart.jpg
 [VPN}. Retrieved Sept 15, 2013, from: http://www.bath.ac.uk/bucs/networking/Images/VPNExample.PNG
 [WPA/Firewall ]. Retrieved Sept 15, 2013, from: http://www.techieapps.com/wp-content/uploads/2012/06/gfx2.gif
 [coverage and capacity plan]. Retrieved Sept 16, 2013, from: http://communities.quest.com/community/nms/blog/2012/09/21/10-
things-you-were-never-told-about-wireless-network-planning
 [encryption]. Retrieved Sept 16, 2013, from: http://gdp.globus.org/gt4-tutorial/multiplehtml/images/security_concepts_encryption.png
 [football interference]. Retrieved Sept 15, 2013, from: http://d.yimg.com/i/ng/sp/reuters/20110724/02/731199012-24072011022828.jpg
 [cyberbullying]. Retrieved Sept 15, 2013, from: http://info.uknowkids.com/Portals/176530/images/cyberbullying.jpg
 [hacking]. Retrieved Sept 15, 2013, from: http://hacknmod.com/hack/thousands-of-free-scanned-hacking-books/
 [plagiarism]. Retrieved Sept 15, 2013, from: http://library.austincc.edu/gen-info/plagiarism_theft.jpg
 [social media]. Retrieved Sept 15, 2013, from: http://blog.socialmaximizer.com/wp-content/uploads/2013/02/social_media.jpg
 [online games]. Retrieved Sept 15, 2013, from:
https://lh5.googleusercontent.com/oE0_zHsex8eWjXVykWER88CAC7NHd2LoIN9YXJPCVZjByefYXiYGtHhXTI0gqGsxUA0Mblqq=s640-h400-
e365

More Related Content

What's hot

Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and developmentiarthur
 
Prototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on InternetPrototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on InternetAfrah Fathima
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingZaeem Hassan
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermMark John Lado, MIT
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technologyZul Fikri
 
Computer Communications - R.D.Sivakumar
Computer Communications - R.D.SivakumarComputer Communications - R.D.Sivakumar
Computer Communications - R.D.SivakumarSivakumar R D .
 
NETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D SivakumarNETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D SivakumarSivakumar R D .
 
Computer networks
Computer networksComputer networks
Computer networksUsman Abid
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer networkTrinity Dwarka
 
Examen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra TorresExamen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra TorresOnce Redes
 

What's hot (15)

Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and development
 
Prototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on InternetPrototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on Internet
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
2 1 lan
2 1 lan2 1 lan
2 1 lan
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
Lesson 25
Lesson 25Lesson 25
Lesson 25
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Computer Communications - R.D.Sivakumar
Computer Communications - R.D.SivakumarComputer Communications - R.D.Sivakumar
Computer Communications - R.D.Sivakumar
 
NETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D SivakumarNETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D Sivakumar
 
Computer networks
Computer networksComputer networks
Computer networks
 
Synopsis
SynopsisSynopsis
Synopsis
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Networks
NetworksNetworks
Networks
 
Examen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra TorresExamen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra Torres
 

Similar to WiFi for mobile networks

biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfJOMan21
 
Mobile computing
Mobile computingMobile computing
Mobile computingJeha Ryhan
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005Bill Drew
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
Effect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video TransmissionEffect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video TransmissionUniversitas Pembangunan Panca Budi
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Hem Pokhrel
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
Wireless network
Wireless networkWireless network
Wireless networkmattglover0
 
Network Trends
Network TrendsNetwork Trends
Network TrendsArun ACE
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityDustin Pytko
 
Integrating wi fi for mobile networks
Integrating wi fi for mobile networksIntegrating wi fi for mobile networks
Integrating wi fi for mobile networksBev Anderson
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & NetworkingGohil Anshu
 
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
FAS 110CL QEP Assignment Why Study Theatre   Inst.docxFAS 110CL QEP Assignment Why Study Theatre   Inst.docx
FAS 110CL QEP Assignment Why Study Theatre Inst.docxssuser454af01
 

Similar to WiFi for mobile networks (20)

Wireless and intranet
Wireless and intranetWireless and intranet
Wireless and intranet
 
All Chapter
All ChapterAll Chapter
All Chapter
 
biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdf
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Effect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video TransmissionEffect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video Transmission
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Wireless network
Wireless networkWireless network
Wireless network
 
final IT ppt.pptx
final IT ppt.pptxfinal IT ppt.pptx
final IT ppt.pptx
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
 
Integrating wi fi for mobile networks
Integrating wi fi for mobile networksIntegrating wi fi for mobile networks
Integrating wi fi for mobile networks
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
FAS 110CL QEP Assignment Why Study Theatre   Inst.docxFAS 110CL QEP Assignment Why Study Theatre   Inst.docx
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

WiFi for mobile networks

  • 2. What is WiFi?  “Wireless Fidelity”  Wireless communication between a computer and an Access Point (AP) and the Internet
  • 3. What is WiFi? Antenna transmits radio waves Access point sends info to the Internet Wireless Adaptor converts data into radio waves Access Point (connected to LAN) translates radio waves into data Internet responds to data Internet data travels to Access Points AP sends data in form of radio waves to wireless devices
  • 4. What is WiFi?  One access point connects several devices to the Internet  If AP fail or if too many people try to use high-bandwidth applications simultaneously  Interference can occur  Connections can be lost
  • 5. Why have WiFi in High School Classrooms?  Data Sharing  Access to Internet for Research  Access to Tools that Enhance Learning  Graphing calculators  Simulations  Virtual labs  E-books  Student response systems  Improves Classroom Communication ALLOWS FOR:
  • 6. Steps for integrating a WiFi Network in a High School 1. Identify users Who will the network serve?  Students  Teachers  Administrators  Counselors  Support staff  Guests
  • 7. Steps for integrating a WiFi Network in a High School 2. Define coverage area Where are the people who will be served by the network?  classrooms  media center  cafeteria  common areas  offices  outside of buildings  gymnasium  sports fields
  • 8. Steps for integrating a WiFi Network in a High School 3. Determine uses for the network What are the users going to do on the wireless network?  Gather/organize student data  Grade students  Communication  Research  Planning/prepping for courses  Using educational tools
  • 9. Steps for integrating a WiFi Network in a High School 4. Plan for growth  How many users will be accessing the network (today and in the future)?  Students  Staff  Guests
  • 10. Steps for integrating a WiFi Network in a High School 5. Determine network layout a. How many access points (AP) will be needed  Each AP supports a set number of devices b. Where the AP should be located  Each AP needs an Ethernet cable and power
  • 11. Steps for integrating a WiFi Network in a High School 6. Install Access Points and Connect them to the Network Modem (Cable/DSL)Internet Router Wireless Access Point (WAP) Clients
  • 12. Steps for integrating a WiFi Network in a High School 7. Configure network  Set SSID (service set identifier)for the Network  Unique name of wireless local area network (WLAN)  Case-sensitive sequence of alphanumeric characters (up to 32)  Enable encryption (WPA-PSK2 etc.) and “password” to allow only authorized devices to access the network  Set WAPs with same SSID and encryption set  Push configurations from a central controller or configure each individual AP
  • 13. Steps for integrating a WiFi Network in a High School 8. Test the network and trouble shoot  Dead zones  Interference (file cabinets; lockers; microwaves; building materials  Performance issues (low speeds, etc. requires software tools)  Move WAPs to achieve optimal coverage/performance
  • 14. Steps for integrating a WiFi Network in a High School 9. Provide access to the network  Students  Teachers  Administrators  Counselors  Support staff  Guests
  • 15. Potential Problems  Should overlap  # of APs required to provide wireless coverage in desired locations  Coverage
  • 16. Potential Problems  Depends on usage (can be projected using packet analyzer software)  # of APs required to provide the minimum acceptable data rates  min data rate = size of cell = Access Points  Capacity
  • 17. Potential Problems  Security  Encrypt data being transmitted  Authenticate users  Eliminate of rogue access points
  • 18. Potential Problems  Security  Needs depend on the type of WLAN you're accessing and the level of data encryption required  Three options for secure WLAN encryption and authentication: 1. Wi-Fi Protected Access (WPA) 2. Wi-Fi Protected Access 2 (WPA2) 3. Virtual Private Networking (VPN)  effective security for mobile users accessing the network
  • 22. Resources  Education World and Smith, R. (2011). Setting Up School WiFi Part II: Larger Networks. In Education World. Retrieved Sept 13, 2013, from http://www.educationworld.com/a_tech/setting_up_school_wifi_part_2.shtml.  Dannenfeldt, D. (1998-2013). How Portable Internet Devices Work?. In How Stuff Works. Retrieved Sept 13, 2013, from http://computer.howstuffworks.com/portable-internet-devices.htm.  undefined. (Nov 1, 2002). Classrooms with WiFi. In The Journal. Retrieved Sept 13, 2013, from http://thejournal.com/articles/2002/11/01/classrooms-with-wifi.aspx.  undefined. (undefined). Securing Wireless Networks. In Cisco. Retrieved Sept 13, 2013, from http://www.cisco.com/en/US/solutions/collateral/ns339/ns639/ns642/net_customer_profile0900aecd803ee938.html.  Mitchell, B. (2013). SSID: Service Set Identifier. In About.com. Retrieved Sept 14, 2013, from http://compnetworking.about.com/cs/wireless/g/bldef_ssid.htm.  Shields, G. (Sept 21, 1012). 10 Things You Were Never Told about Wireless Network Planning. In Dell Software. Retrieved Sept 14, 2013, from http://communities.quest.com/community/nms/blog/2012/09/21/10-things-you-were-never-told-about-wireless-network-planning.  Undefined. (undefined). Securing your wifi network. In YouTube. Retrieved Sept 15, 2013, from http://www.youtube.com/watch?v=_WHynHcXm7c IMAGES  [I-pad mini]. Retrieved Sept 15,2013, from: http://cdn.toucharcade.com/wp-content/uploads/2012/10/apple-ipad-mini-pr.jpeg  [WiFi symbol]. Retrieved Sept 15, 2013, from: http://images.clipartlogo.com/files/images/16/164074/wireless-wifi-symbol_t  [Wireless network ]. Retrieved Sept 15, 2013, from: http://www.vicomsoft.com/learning-center/wireless-networking/  [Wireless chart]. Retrieved Sept 15, 2013, from: http://homepages.wmich.edu/~s5lu/images/wireless_chart.jpg  [VPN}. Retrieved Sept 15, 2013, from: http://www.bath.ac.uk/bucs/networking/Images/VPNExample.PNG  [WPA/Firewall ]. Retrieved Sept 15, 2013, from: http://www.techieapps.com/wp-content/uploads/2012/06/gfx2.gif  [coverage and capacity plan]. Retrieved Sept 16, 2013, from: http://communities.quest.com/community/nms/blog/2012/09/21/10- things-you-were-never-told-about-wireless-network-planning  [encryption]. Retrieved Sept 16, 2013, from: http://gdp.globus.org/gt4-tutorial/multiplehtml/images/security_concepts_encryption.png  [football interference]. Retrieved Sept 15, 2013, from: http://d.yimg.com/i/ng/sp/reuters/20110724/02/731199012-24072011022828.jpg  [cyberbullying]. Retrieved Sept 15, 2013, from: http://info.uknowkids.com/Portals/176530/images/cyberbullying.jpg  [hacking]. Retrieved Sept 15, 2013, from: http://hacknmod.com/hack/thousands-of-free-scanned-hacking-books/  [plagiarism]. Retrieved Sept 15, 2013, from: http://library.austincc.edu/gen-info/plagiarism_theft.jpg  [social media]. Retrieved Sept 15, 2013, from: http://blog.socialmaximizer.com/wp-content/uploads/2013/02/social_media.jpg  [online games]. Retrieved Sept 15, 2013, from: https://lh5.googleusercontent.com/oE0_zHsex8eWjXVykWER88CAC7NHd2LoIN9YXJPCVZjByefYXiYGtHhXTI0gqGsxUA0Mblqq=s640-h400- e365