SlideShare a Scribd company logo
How to Add Mobile Devices to Your
School Network
WiFi For Mobile Networks
Issues to Consider
 What is a Network?
 Current Network
 Needs Analysis:
 Why do we need mobile devices?
 Access points
 Teacher, Staff and Administrator needs
 Student needs
 Budget & Infrastructure
 Implementation
 Maintenance & Testing
 Network Security
 Acceptable Use Policy
 Local Results
 A network connects computers to each other, and
often to the Internet
 Switches connect computers and printers within a
building, creating a network, or Intranet.
 Routers connect computers to other networks, or the
Internet
What is a Network?
What is a Wireless Network?
 A wireless network allows devices to access each
other (computers, printers etc) and the Internet
without cables. Prior to wireless technology , most
computers connected via phone modems or
Ethernet cables.
 Most newer computers have built-in wireless
networking; older computers may require a
wireless network adapter card (Cisco).
 A wireless router typically extends up to 300
feet, sufficient for a room or home space. (Cisco).
Current Network
 How many computers, peripherals and other
devices?
 What servers, operating systems are running?
 What is the speed of the network?
Photo source: http://www.flickr.com/photos/ash-brown/955897562/
Why Mobile Devices?
 Students need laptops, tablets and other
devices for school work
 Teachers want to use iPads or other devices
in the classroom
 The computer lab is overused or
overscheduled
 School wants to use cloud storage
Access Points
 Existing computer
lab/facilities
 Classrooms
 Common areas:
hallways, locker rooms,
library, lunch room.
 Other areas on campus:
 Teachers lounge
 Labs, gym, field
 Do visitors need access?
Photo source:
http://www.flickr.com/photos/cimatti/433593238/
Teacher & Staff Needs
 How do teachers plan to use mobile devices?
 Streaming movies in class
 Use iPad apps
 Use student response systems
 Use their own laptop in the classroom
 How do staff members plan to use mobile
devices?
 Attendance
 Contact with parents
 Training purposes
Student Needs
 Where will students use
wireless?
 In classrooms for learning
 In common areas
 Possibly outside buildings
to extend the classroom
 Can students bring their
own device (BYOD) ?
 How will students
connect?
 Automatically, or
password?
Photo source:
http://www.flickr.com/photos/56155476@N08/6660042
699/
Budget
 Faster speeds and higher capacity = Higher costs
 Consider the following:
 Number of devices: Each user may have multiple
devices such as a laptop, tablet and smartphone
 Number of access points – each
classroom, common areas, etc.
 Bandwidth limitations – consider the busiest times
of day and usage expectations.
 Maintenance/Hardware costs
 Initial Setup
 Ongoing maintenance and upgrades
 Plan for expansion
Security
 Network security starts with the
router. Becky Waring of
PCWorldsuggests, “If you haven't
already, enable your router's
encryption... The Wireless
Protected Access (WPA) protocol
and more recent WPA2 have
supplanted the older (WEP).
 The router firewall prevents
users on the Internet from
accessing your computer, but
does not protect the network
from being used.
 Make sure you change the
default network name and
password on your router.
 Students should keep passwords
Photo source:
http://www.flickr.com/photos/simon_cocks/453
4589059/
Maintenance & Testing
 After the network is configured, Education world
suggests that you check and test the coverage.
 “Do you have coverage in the areas you expected?
Is the performance what you expected? Keep an
open mind and remember that some adjustments
may be needed.”
 On-going maintenance includes back-ups,
security software checks and hardware tests
 Change password regularly/annually for schools
 Make plans for expansion as needs change
Acceptable Use Policy
 The Acceptable Use Policy (AUP) document
communicates expectations to students and
parents
 The policy can lay out the school vision, list
specific do’s and don’ts or discuss hardware care
and maintenance.
 It defines the student’s and school’s responsibility
in case of inappropriate use, accessing content,
and loss of equipment.
Local Results
 In my previous high school, a wireless network was
put in place several years ago:
 All teachers, staff and students had access
 Devices were configured for each community member
– passwords were not handed out except for guest
access
 Each person had a unique email address, server
space
 Each full-time staffer and student has an iPad
(beginning 2012)
 Laptop, iPad and smartphone use prevalent
 Network frequently does not have enough bandwidth
for streaming video or accessing server mid-day, but
improvements are made annually.
 Network extends through multiple school buildings
References
Education World (n.d.). Setting Up School Wi-Fi Part 2: Larger Networks.
Retrieved June 21, 2013 from:http://www.educationworld.com/a_tech
setting_up_school_wifi_part_2.shtml
Cisco Systems (n.d.). What is a Network Switch vs. a Router? Retrieved June 24,
2013 from:
http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti
cles/connect_employees_and_offices/what_is_a_network_switch/index.html
Cisco Systems (n.d.) Wireless Network FAQ. Retrieved June 24, 2013 from:
http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti
cles/work_from_anywhere/wireless_networking_faq/index.html
Waring, Becky. (2007). How to secure your wireless network. PCWorld. Retrieved
from: http://www.pcworld.com/article/130330/article.html

More Related Content

What's hot

CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation SecurityCASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
Purdicom
 
Educause2011PresentationFinal
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinal
tbanks
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
Kristi DeRoche
 
Use of technology in education
Use of technology in education Use of technology in education
Use of technology in education
BK Patel
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
mmjones1021
 
Mobile learning for care workers
Mobile learning for care workersMobile learning for care workers
Mobile learning for care workers
Talke Hoppmann
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School Technology
Tami Brass
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
jenice
 
Major project 1 ppt new
Major project 1 ppt newMajor project 1 ppt new
Major project 1 ppt new
jenice
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
jenice
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
boone1
 
Tech. ppt new
Tech. ppt newTech. ppt new
Tech. ppt new
jenice
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Education
mwolfrey
 
Gareth Frith & Dr Gill Taylor, ALPS
Gareth Frith & Dr Gill Taylor, ALPSGareth Frith & Dr Gill Taylor, ALPS
Gareth Frith & Dr Gill Taylor, ALPS
HandheldLearning
 
How byod can be leveraged in education sector
How byod can be leveraged in education sectorHow byod can be leveraged in education sector
How byod can be leveraged in education sector
Jack Smith
 
Distance Learning
Distance LearningDistance Learning
Distance Learning
Richard Montague-Thompson
 
7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT Infrastructure7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT Infrastructure
Vartek Services Inc
 
Disadvantages of technology
Disadvantages of technologyDisadvantages of technology
Disadvantages of technology
Afsana Nasir
 
Assistive technology presentation
Assistive technology presentation Assistive technology presentation
Assistive technology presentation
God1love
 

What's hot (19)

CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation SecurityCASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
 
Educause2011PresentationFinal
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinal
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Use of technology in education
Use of technology in education Use of technology in education
Use of technology in education
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Mobile learning for care workers
Mobile learning for care workersMobile learning for care workers
Mobile learning for care workers
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School Technology
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Major project 1 ppt new
Major project 1 ppt newMajor project 1 ppt new
Major project 1 ppt new
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Tech. ppt new
Tech. ppt newTech. ppt new
Tech. ppt new
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Education
 
Gareth Frith & Dr Gill Taylor, ALPS
Gareth Frith & Dr Gill Taylor, ALPSGareth Frith & Dr Gill Taylor, ALPS
Gareth Frith & Dr Gill Taylor, ALPS
 
How byod can be leveraged in education sector
How byod can be leveraged in education sectorHow byod can be leveraged in education sector
How byod can be leveraged in education sector
 
Distance Learning
Distance LearningDistance Learning
Distance Learning
 
7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT Infrastructure7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT Infrastructure
 
Disadvantages of technology
Disadvantages of technologyDisadvantages of technology
Disadvantages of technology
 
Assistive technology presentation
Assistive technology presentation Assistive technology presentation
Assistive technology presentation
 

Viewers also liked

What is the Global Heart Network
What is the Global Heart NetworkWhat is the Global Heart Network
What is the Global Heart Network
Jacques Franc de Ferrière
 
Bases legales
Bases legalesBases legales
Bases legales
Yaenny Burgos
 
Bangalore's Greenest Homes: Chockalingam Muthiah on his green home
Bangalore's Greenest Homes: Chockalingam Muthiah on his green homeBangalore's Greenest Homes: Chockalingam Muthiah on his green home
Bangalore's Greenest Homes: Chockalingam Muthiah on his green home
The_Alternative
 
How to put a story to your pictures by Peevee
How to put a story to your pictures by PeeveeHow to put a story to your pictures by Peevee
How to put a story to your pictures by Peevee
The_Alternative
 
Ravindra green home
Ravindra green homeRavindra green home
Ravindra green home
The_Alternative
 
Philippines Art
Philippines ArtPhilippines Art
Philippines Art
John Vincent Jose
 
Epic story of Ibalon
Epic story of IbalonEpic story of Ibalon
Epic story of Ibalon
John Vincent Jose
 

Viewers also liked (8)

What is the Global Heart Network
What is the Global Heart NetworkWhat is the Global Heart Network
What is the Global Heart Network
 
Bases legales
Bases legalesBases legales
Bases legales
 
Bangalore's Greenest Homes: Chockalingam Muthiah on his green home
Bangalore's Greenest Homes: Chockalingam Muthiah on his green homeBangalore's Greenest Homes: Chockalingam Muthiah on his green home
Bangalore's Greenest Homes: Chockalingam Muthiah on his green home
 
How to put a story to your pictures by Peevee
How to put a story to your pictures by PeeveeHow to put a story to your pictures by Peevee
How to put a story to your pictures by Peevee
 
Ravindra green home
Ravindra green homeRavindra green home
Ravindra green home
 
Viruset
VirusetViruset
Viruset
 
Philippines Art
Philippines ArtPhilippines Art
Philippines Art
 
Epic story of Ibalon
Epic story of IbalonEpic story of Ibalon
Epic story of Ibalon
 

Similar to Mobile

BYOD for digital exams
BYOD for digital examsBYOD for digital exams
BYOD for digital exams
Ingrid Melve
 
Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13
Sheryl Abshire
 
Building An Education Network for the Future
Building An Education Network for the FutureBuilding An Education Network for the Future
Building An Education Network for the Future
Michael Przytula
 
Internet based learningv slideshare
Internet based learningv slideshareInternet based learningv slideshare
Internet based learningv slideshare
Elboni Todd
 
Internet based learning slideshare
Internet based learning slideshareInternet based learning slideshare
Internet based learning slideshare
Elboni Todd
 
21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow
Punxsutawney School District
 
Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
Mark Boorman
 
Action Model
Action ModelAction Model
Action Model
u082934
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
spaul6414
 
Poteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the FuturePoteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the Future
Jennifer Lopez
 
BYOD for exams: leaving students to their own devices
BYOD for exams: leaving students to their own devicesBYOD for exams: leaving students to their own devices
BYOD for exams: leaving students to their own devices
Ingrid Melve
 
Networking in a k 12 school
Networking in a k 12 schoolNetworking in a k 12 school
Networking in a k 12 school
biggsboys
 
Wireless Requirements and Benefits in the Academics Domain
Wireless Requirements and Benefits in the Academics DomainWireless Requirements and Benefits in the Academics Domain
Wireless Requirements and Benefits in the Academics Domain
Associate Professor in VSB Coimbatore
 
Networks pres
Networks presNetworks pres
Networks pres
danafredwell
 
M learning in education
M learning in educationM learning in education
M learning in education
eSAT Publishing House
 
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Cisco Service Provider Mobility
 
The Future of Technology and Education
The Future of Technology and EducationThe Future of Technology and Education
The Future of Technology and Education
sspengler
 
Review Of A De Technology (Report)
Review Of A De Technology (Report)Review Of A De Technology (Report)
Review Of A De Technology (Report)
u068704
 
E learning
E learningE learning
E learning
madhuvardhan
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016
Diana Benner
 

Similar to Mobile (20)

BYOD for digital exams
BYOD for digital examsBYOD for digital exams
BYOD for digital exams
 
Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13
 
Building An Education Network for the Future
Building An Education Network for the FutureBuilding An Education Network for the Future
Building An Education Network for the Future
 
Internet based learningv slideshare
Internet based learningv slideshareInternet based learningv slideshare
Internet based learningv slideshare
 
Internet based learning slideshare
Internet based learning slideshareInternet based learning slideshare
Internet based learning slideshare
 
21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow
 
Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
 
Action Model
Action ModelAction Model
Action Model
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Poteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the FuturePoteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the Future
 
BYOD for exams: leaving students to their own devices
BYOD for exams: leaving students to their own devicesBYOD for exams: leaving students to their own devices
BYOD for exams: leaving students to their own devices
 
Networking in a k 12 school
Networking in a k 12 schoolNetworking in a k 12 school
Networking in a k 12 school
 
Wireless Requirements and Benefits in the Academics Domain
Wireless Requirements and Benefits in the Academics DomainWireless Requirements and Benefits in the Academics Domain
Wireless Requirements and Benefits in the Academics Domain
 
Networks pres
Networks presNetworks pres
Networks pres
 
M learning in education
M learning in educationM learning in education
M learning in education
 
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
 
The Future of Technology and Education
The Future of Technology and EducationThe Future of Technology and Education
The Future of Technology and Education
 
Review Of A De Technology (Report)
Review Of A De Technology (Report)Review Of A De Technology (Report)
Review Of A De Technology (Report)
 
E learning
E learningE learning
E learning
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016
 

Recently uploaded

Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 

Recently uploaded (20)

Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 

Mobile

  • 1. How to Add Mobile Devices to Your School Network WiFi For Mobile Networks
  • 2. Issues to Consider  What is a Network?  Current Network  Needs Analysis:  Why do we need mobile devices?  Access points  Teacher, Staff and Administrator needs  Student needs  Budget & Infrastructure  Implementation  Maintenance & Testing  Network Security  Acceptable Use Policy  Local Results
  • 3.  A network connects computers to each other, and often to the Internet  Switches connect computers and printers within a building, creating a network, or Intranet.  Routers connect computers to other networks, or the Internet What is a Network?
  • 4. What is a Wireless Network?  A wireless network allows devices to access each other (computers, printers etc) and the Internet without cables. Prior to wireless technology , most computers connected via phone modems or Ethernet cables.  Most newer computers have built-in wireless networking; older computers may require a wireless network adapter card (Cisco).  A wireless router typically extends up to 300 feet, sufficient for a room or home space. (Cisco).
  • 5. Current Network  How many computers, peripherals and other devices?  What servers, operating systems are running?  What is the speed of the network? Photo source: http://www.flickr.com/photos/ash-brown/955897562/
  • 6. Why Mobile Devices?  Students need laptops, tablets and other devices for school work  Teachers want to use iPads or other devices in the classroom  The computer lab is overused or overscheduled  School wants to use cloud storage
  • 7. Access Points  Existing computer lab/facilities  Classrooms  Common areas: hallways, locker rooms, library, lunch room.  Other areas on campus:  Teachers lounge  Labs, gym, field  Do visitors need access? Photo source: http://www.flickr.com/photos/cimatti/433593238/
  • 8. Teacher & Staff Needs  How do teachers plan to use mobile devices?  Streaming movies in class  Use iPad apps  Use student response systems  Use their own laptop in the classroom  How do staff members plan to use mobile devices?  Attendance  Contact with parents  Training purposes
  • 9. Student Needs  Where will students use wireless?  In classrooms for learning  In common areas  Possibly outside buildings to extend the classroom  Can students bring their own device (BYOD) ?  How will students connect?  Automatically, or password? Photo source: http://www.flickr.com/photos/56155476@N08/6660042 699/
  • 10. Budget  Faster speeds and higher capacity = Higher costs  Consider the following:  Number of devices: Each user may have multiple devices such as a laptop, tablet and smartphone  Number of access points – each classroom, common areas, etc.  Bandwidth limitations – consider the busiest times of day and usage expectations.  Maintenance/Hardware costs  Initial Setup  Ongoing maintenance and upgrades  Plan for expansion
  • 11. Security  Network security starts with the router. Becky Waring of PCWorldsuggests, “If you haven't already, enable your router's encryption... The Wireless Protected Access (WPA) protocol and more recent WPA2 have supplanted the older (WEP).  The router firewall prevents users on the Internet from accessing your computer, but does not protect the network from being used.  Make sure you change the default network name and password on your router.  Students should keep passwords Photo source: http://www.flickr.com/photos/simon_cocks/453 4589059/
  • 12. Maintenance & Testing  After the network is configured, Education world suggests that you check and test the coverage.  “Do you have coverage in the areas you expected? Is the performance what you expected? Keep an open mind and remember that some adjustments may be needed.”  On-going maintenance includes back-ups, security software checks and hardware tests  Change password regularly/annually for schools  Make plans for expansion as needs change
  • 13. Acceptable Use Policy  The Acceptable Use Policy (AUP) document communicates expectations to students and parents  The policy can lay out the school vision, list specific do’s and don’ts or discuss hardware care and maintenance.  It defines the student’s and school’s responsibility in case of inappropriate use, accessing content, and loss of equipment.
  • 14. Local Results  In my previous high school, a wireless network was put in place several years ago:  All teachers, staff and students had access  Devices were configured for each community member – passwords were not handed out except for guest access  Each person had a unique email address, server space  Each full-time staffer and student has an iPad (beginning 2012)  Laptop, iPad and smartphone use prevalent  Network frequently does not have enough bandwidth for streaming video or accessing server mid-day, but improvements are made annually.  Network extends through multiple school buildings
  • 15. References Education World (n.d.). Setting Up School Wi-Fi Part 2: Larger Networks. Retrieved June 21, 2013 from:http://www.educationworld.com/a_tech setting_up_school_wifi_part_2.shtml Cisco Systems (n.d.). What is a Network Switch vs. a Router? Retrieved June 24, 2013 from: http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti cles/connect_employees_and_offices/what_is_a_network_switch/index.html Cisco Systems (n.d.) Wireless Network FAQ. Retrieved June 24, 2013 from: http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti cles/work_from_anywhere/wireless_networking_faq/index.html Waring, Becky. (2007). How to secure your wireless network. PCWorld. Retrieved from: http://www.pcworld.com/article/130330/article.html