SlideShare a Scribd company logo
1 of 22
WiFi for Mobile
Networks
Teresa Ulmer
EdTech 541
What is WiFi?
 “Wireless Fidelity”
 Wireless communication between a computer
and an Access Point (AP) and the Internet
What is WiFi?
Antenna
transmits
radio waves
Access point
sends info to the
Internet
Wireless Adaptor
converts data
into radio waves
Access Point
(connected to LAN)
translates radio waves
into data
Internet
responds to
data
Internet data
travels to Access
Points
AP sends
data in form
of radio
waves to
wireless
devices
What is WiFi?
 One access point
connects several
devices to the
Internet
 If AP fail or if too
many people try to
use high-bandwidth
applications
simultaneously
 Interference can
occur
 Connections can be
lost
Why have WiFi in High School
Classrooms?
 Data Sharing
 Access to Internet for Research
 Access to Tools that Enhance Learning
 Graphing calculators
 Simulations
 Virtual labs
 E-books
 Student response systems
 Improves Classroom Communication
ALLOWS FOR:
Steps for integrating a WiFi
Network in a High School
1. Identify users
Who will the network serve?
 Students
 Teachers
 Administrators
 Counselors
 Support staff
 Guests
Steps for integrating a WiFi
Network in a High School
2. Define coverage area
Where are the people who will be served by the
network?
 classrooms
 media center
 cafeteria
 common areas
 offices
 outside of buildings
 gymnasium
 sports fields
Steps for integrating a WiFi
Network in a High School
3. Determine uses for the network
What are the users going to do on the
wireless network?
 Gather/organize student data
 Grade students
 Communication
 Research
 Planning/prepping for courses
 Using educational tools
Steps for integrating a WiFi
Network in a High School
4. Plan for growth
 How many users will be accessing the
network (today and in the future)?
 Students
 Staff
 Guests
Steps for integrating a WiFi
Network in a High School
5. Determine network layout
a. How many access points (AP) will be
needed
 Each AP supports a set number of devices
b. Where the AP should be located
 Each AP needs an Ethernet cable and power
Steps for integrating a WiFi
Network in a High School
6. Install Access Points and Connect them to
the Network
Modem
(Cable/DSL)Internet
Router Wireless
Access
Point (WAP)
Clients
Steps for integrating a WiFi
Network in a High School
7. Configure network
 Set SSID (service set identifier)for the Network
 Unique name of wireless local area network
(WLAN)
 Case-sensitive sequence of alphanumeric
characters (up to 32)
 Enable encryption (WPA-PSK2 etc.) and
“password” to allow only authorized devices to
access the network
 Set WAPs with same SSID and encryption set
 Push configurations from a central controller
or configure each individual AP
Steps for integrating a WiFi
Network in a High School
8. Test the network and
trouble shoot
 Dead zones
 Interference (file
cabinets; lockers;
microwaves; building
materials
 Performance issues (low
speeds, etc. requires
software tools)
 Move WAPs to achieve
optimal
coverage/performance
Steps for integrating a WiFi
Network in a High School
9. Provide access to the network
 Students
 Teachers
 Administrators
 Counselors
 Support staff
 Guests
Potential Problems
 Should overlap
 # of APs required to provide wireless coverage in
desired locations
 Coverage
Potential Problems
 Depends on usage (can be projected using packet analyzer
software)
 # of APs required to provide the minimum acceptable data
rates
 min data rate = size of cell = Access Points
 Capacity
Potential Problems
 Security
 Encrypt data being transmitted
 Authenticate users
 Eliminate of rogue access points
Potential Problems
 Security
 Needs depend on the type of WLAN you're
accessing and the level of data encryption
required
 Three options for secure WLAN encryption and
authentication:
1. Wi-Fi Protected Access (WPA)
2. Wi-Fi Protected Access 2 (WPA2)
3. Virtual Private Networking (VPN)
 effective security for mobile users accessing the
network
WPA and WPA2
Virtual Private Networking (VPN)
Potential Problems
 Misuse
Resources
 Education World and Smith, R. (2011). Setting Up School WiFi Part II: Larger Networks. In Education World. Retrieved Sept 13, 2013, from
http://www.educationworld.com/a_tech/setting_up_school_wifi_part_2.shtml.
 Dannenfeldt, D. (1998-2013). How Portable Internet Devices Work?. In How Stuff Works. Retrieved Sept 13, 2013, from
http://computer.howstuffworks.com/portable-internet-devices.htm.
 undefined. (Nov 1, 2002). Classrooms with WiFi. In The Journal. Retrieved Sept 13, 2013, from
http://thejournal.com/articles/2002/11/01/classrooms-with-wifi.aspx.
 undefined. (undefined). Securing Wireless Networks. In Cisco. Retrieved Sept 13, 2013, from
http://www.cisco.com/en/US/solutions/collateral/ns339/ns639/ns642/net_customer_profile0900aecd803ee938.html.
 Mitchell, B. (2013). SSID: Service Set Identifier. In About.com. Retrieved Sept 14, 2013, from
http://compnetworking.about.com/cs/wireless/g/bldef_ssid.htm.
 Shields, G. (Sept 21, 1012). 10 Things You Were Never Told about Wireless Network Planning. In Dell Software. Retrieved Sept 14, 2013, from
http://communities.quest.com/community/nms/blog/2012/09/21/10-things-you-were-never-told-about-wireless-network-planning.
 Undefined. (undefined). Securing your wifi network. In YouTube. Retrieved Sept 15, 2013, from
http://www.youtube.com/watch?v=_WHynHcXm7c
IMAGES
 [I-pad mini]. Retrieved Sept 15,2013, from: http://cdn.toucharcade.com/wp-content/uploads/2012/10/apple-ipad-mini-pr.jpeg
 [WiFi symbol]. Retrieved Sept 15, 2013, from: http://images.clipartlogo.com/files/images/16/164074/wireless-wifi-symbol_t
 [Wireless network ]. Retrieved Sept 15, 2013, from: http://www.vicomsoft.com/learning-center/wireless-networking/
 [Wireless chart]. Retrieved Sept 15, 2013, from: http://homepages.wmich.edu/~s5lu/images/wireless_chart.jpg
 [VPN}. Retrieved Sept 15, 2013, from: http://www.bath.ac.uk/bucs/networking/Images/VPNExample.PNG
 [WPA/Firewall ]. Retrieved Sept 15, 2013, from: http://www.techieapps.com/wp-content/uploads/2012/06/gfx2.gif
 [coverage and capacity plan]. Retrieved Sept 16, 2013, from: http://communities.quest.com/community/nms/blog/2012/09/21/10-
things-you-were-never-told-about-wireless-network-planning
 [encryption]. Retrieved Sept 16, 2013, from: http://gdp.globus.org/gt4-tutorial/multiplehtml/images/security_concepts_encryption.png
 [football interference]. Retrieved Sept 15, 2013, from: http://d.yimg.com/i/ng/sp/reuters/20110724/02/731199012-24072011022828.jpg
 [cyberbullying]. Retrieved Sept 15, 2013, from: http://info.uknowkids.com/Portals/176530/images/cyberbullying.jpg
 [hacking]. Retrieved Sept 15, 2013, from: http://hacknmod.com/hack/thousands-of-free-scanned-hacking-books/
 [plagiarism]. Retrieved Sept 15, 2013, from: http://library.austincc.edu/gen-info/plagiarism_theft.jpg
 [social media]. Retrieved Sept 15, 2013, from: http://blog.socialmaximizer.com/wp-content/uploads/2013/02/social_media.jpg
 [online games]. Retrieved Sept 15, 2013, from:
https://lh5.googleusercontent.com/oE0_zHsex8eWjXVykWER88CAC7NHd2LoIN9YXJPCVZjByefYXiYGtHhXTI0gqGsxUA0Mblqq=s640-h400-
e365

More Related Content

What's hot

Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and developmentiarthur
 
Prototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on InternetPrototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on InternetAfrah Fathima
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingZaeem Hassan
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermMark John Lado, MIT
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technologyZul Fikri
 
Computer Communications - R.D.Sivakumar
Computer Communications - R.D.SivakumarComputer Communications - R.D.Sivakumar
Computer Communications - R.D.SivakumarSivakumar R D .
 
NETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D SivakumarNETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D SivakumarSivakumar R D .
 
Computer networks
Computer networksComputer networks
Computer networksUsman Abid
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer networkTrinity Dwarka
 
Examen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra TorresExamen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra TorresOnce Redes
 

What's hot (15)

Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and development
 
Prototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on InternetPrototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on Internet
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
2 1 lan
2 1 lan2 1 lan
2 1 lan
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
Lesson 25
Lesson 25Lesson 25
Lesson 25
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Computer Communications - R.D.Sivakumar
Computer Communications - R.D.SivakumarComputer Communications - R.D.Sivakumar
Computer Communications - R.D.Sivakumar
 
NETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D SivakumarNETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D Sivakumar
 
Computer networks
Computer networksComputer networks
Computer networks
 
Synopsis
SynopsisSynopsis
Synopsis
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Networks
NetworksNetworks
Networks
 
Examen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra TorresExamen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra Torres
 

Similar to WiFi for mobile networks

biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfJOMan21
 
Mobile computing
Mobile computingMobile computing
Mobile computingJeha Ryhan
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005Bill Drew
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
Effect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video TransmissionEffect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video TransmissionUniversitas Pembangunan Panca Budi
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Hem Pokhrel
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
Wireless network
Wireless networkWireless network
Wireless networkmattglover0
 
Network Trends
Network TrendsNetwork Trends
Network TrendsArun ACE
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityDustin Pytko
 
Integrating wi fi for mobile networks
Integrating wi fi for mobile networksIntegrating wi fi for mobile networks
Integrating wi fi for mobile networksBev Anderson
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & NetworkingGohil Anshu
 
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
FAS 110CL QEP Assignment Why Study Theatre   Inst.docxFAS 110CL QEP Assignment Why Study Theatre   Inst.docx
FAS 110CL QEP Assignment Why Study Theatre Inst.docxssuser454af01
 

Similar to WiFi for mobile networks (20)

Wireless and intranet
Wireless and intranetWireless and intranet
Wireless and intranet
 
All Chapter
All ChapterAll Chapter
All Chapter
 
biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdf
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Effect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video TransmissionEffect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video Transmission
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Wireless network
Wireless networkWireless network
Wireless network
 
final IT ppt.pptx
final IT ppt.pptxfinal IT ppt.pptx
final IT ppt.pptx
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
 
Integrating wi fi for mobile networks
Integrating wi fi for mobile networksIntegrating wi fi for mobile networks
Integrating wi fi for mobile networks
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
FAS 110CL QEP Assignment Why Study Theatre   Inst.docxFAS 110CL QEP Assignment Why Study Theatre   Inst.docx
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
 

Recently uploaded

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

WiFi for mobile networks

  • 2. What is WiFi?  “Wireless Fidelity”  Wireless communication between a computer and an Access Point (AP) and the Internet
  • 3. What is WiFi? Antenna transmits radio waves Access point sends info to the Internet Wireless Adaptor converts data into radio waves Access Point (connected to LAN) translates radio waves into data Internet responds to data Internet data travels to Access Points AP sends data in form of radio waves to wireless devices
  • 4. What is WiFi?  One access point connects several devices to the Internet  If AP fail or if too many people try to use high-bandwidth applications simultaneously  Interference can occur  Connections can be lost
  • 5. Why have WiFi in High School Classrooms?  Data Sharing  Access to Internet for Research  Access to Tools that Enhance Learning  Graphing calculators  Simulations  Virtual labs  E-books  Student response systems  Improves Classroom Communication ALLOWS FOR:
  • 6. Steps for integrating a WiFi Network in a High School 1. Identify users Who will the network serve?  Students  Teachers  Administrators  Counselors  Support staff  Guests
  • 7. Steps for integrating a WiFi Network in a High School 2. Define coverage area Where are the people who will be served by the network?  classrooms  media center  cafeteria  common areas  offices  outside of buildings  gymnasium  sports fields
  • 8. Steps for integrating a WiFi Network in a High School 3. Determine uses for the network What are the users going to do on the wireless network?  Gather/organize student data  Grade students  Communication  Research  Planning/prepping for courses  Using educational tools
  • 9. Steps for integrating a WiFi Network in a High School 4. Plan for growth  How many users will be accessing the network (today and in the future)?  Students  Staff  Guests
  • 10. Steps for integrating a WiFi Network in a High School 5. Determine network layout a. How many access points (AP) will be needed  Each AP supports a set number of devices b. Where the AP should be located  Each AP needs an Ethernet cable and power
  • 11. Steps for integrating a WiFi Network in a High School 6. Install Access Points and Connect them to the Network Modem (Cable/DSL)Internet Router Wireless Access Point (WAP) Clients
  • 12. Steps for integrating a WiFi Network in a High School 7. Configure network  Set SSID (service set identifier)for the Network  Unique name of wireless local area network (WLAN)  Case-sensitive sequence of alphanumeric characters (up to 32)  Enable encryption (WPA-PSK2 etc.) and “password” to allow only authorized devices to access the network  Set WAPs with same SSID and encryption set  Push configurations from a central controller or configure each individual AP
  • 13. Steps for integrating a WiFi Network in a High School 8. Test the network and trouble shoot  Dead zones  Interference (file cabinets; lockers; microwaves; building materials  Performance issues (low speeds, etc. requires software tools)  Move WAPs to achieve optimal coverage/performance
  • 14. Steps for integrating a WiFi Network in a High School 9. Provide access to the network  Students  Teachers  Administrators  Counselors  Support staff  Guests
  • 15. Potential Problems  Should overlap  # of APs required to provide wireless coverage in desired locations  Coverage
  • 16. Potential Problems  Depends on usage (can be projected using packet analyzer software)  # of APs required to provide the minimum acceptable data rates  min data rate = size of cell = Access Points  Capacity
  • 17. Potential Problems  Security  Encrypt data being transmitted  Authenticate users  Eliminate of rogue access points
  • 18. Potential Problems  Security  Needs depend on the type of WLAN you're accessing and the level of data encryption required  Three options for secure WLAN encryption and authentication: 1. Wi-Fi Protected Access (WPA) 2. Wi-Fi Protected Access 2 (WPA2) 3. Virtual Private Networking (VPN)  effective security for mobile users accessing the network
  • 22. Resources  Education World and Smith, R. (2011). Setting Up School WiFi Part II: Larger Networks. In Education World. Retrieved Sept 13, 2013, from http://www.educationworld.com/a_tech/setting_up_school_wifi_part_2.shtml.  Dannenfeldt, D. (1998-2013). How Portable Internet Devices Work?. In How Stuff Works. Retrieved Sept 13, 2013, from http://computer.howstuffworks.com/portable-internet-devices.htm.  undefined. (Nov 1, 2002). Classrooms with WiFi. In The Journal. Retrieved Sept 13, 2013, from http://thejournal.com/articles/2002/11/01/classrooms-with-wifi.aspx.  undefined. (undefined). Securing Wireless Networks. In Cisco. Retrieved Sept 13, 2013, from http://www.cisco.com/en/US/solutions/collateral/ns339/ns639/ns642/net_customer_profile0900aecd803ee938.html.  Mitchell, B. (2013). SSID: Service Set Identifier. In About.com. Retrieved Sept 14, 2013, from http://compnetworking.about.com/cs/wireless/g/bldef_ssid.htm.  Shields, G. (Sept 21, 1012). 10 Things You Were Never Told about Wireless Network Planning. In Dell Software. Retrieved Sept 14, 2013, from http://communities.quest.com/community/nms/blog/2012/09/21/10-things-you-were-never-told-about-wireless-network-planning.  Undefined. (undefined). Securing your wifi network. In YouTube. Retrieved Sept 15, 2013, from http://www.youtube.com/watch?v=_WHynHcXm7c IMAGES  [I-pad mini]. Retrieved Sept 15,2013, from: http://cdn.toucharcade.com/wp-content/uploads/2012/10/apple-ipad-mini-pr.jpeg  [WiFi symbol]. Retrieved Sept 15, 2013, from: http://images.clipartlogo.com/files/images/16/164074/wireless-wifi-symbol_t  [Wireless network ]. Retrieved Sept 15, 2013, from: http://www.vicomsoft.com/learning-center/wireless-networking/  [Wireless chart]. Retrieved Sept 15, 2013, from: http://homepages.wmich.edu/~s5lu/images/wireless_chart.jpg  [VPN}. Retrieved Sept 15, 2013, from: http://www.bath.ac.uk/bucs/networking/Images/VPNExample.PNG  [WPA/Firewall ]. Retrieved Sept 15, 2013, from: http://www.techieapps.com/wp-content/uploads/2012/06/gfx2.gif  [coverage and capacity plan]. Retrieved Sept 16, 2013, from: http://communities.quest.com/community/nms/blog/2012/09/21/10- things-you-were-never-told-about-wireless-network-planning  [encryption]. Retrieved Sept 16, 2013, from: http://gdp.globus.org/gt4-tutorial/multiplehtml/images/security_concepts_encryption.png  [football interference]. Retrieved Sept 15, 2013, from: http://d.yimg.com/i/ng/sp/reuters/20110724/02/731199012-24072011022828.jpg  [cyberbullying]. Retrieved Sept 15, 2013, from: http://info.uknowkids.com/Portals/176530/images/cyberbullying.jpg  [hacking]. Retrieved Sept 15, 2013, from: http://hacknmod.com/hack/thousands-of-free-scanned-hacking-books/  [plagiarism]. Retrieved Sept 15, 2013, from: http://library.austincc.edu/gen-info/plagiarism_theft.jpg  [social media]. Retrieved Sept 15, 2013, from: http://blog.socialmaximizer.com/wp-content/uploads/2013/02/social_media.jpg  [online games]. Retrieved Sept 15, 2013, from: https://lh5.googleusercontent.com/oE0_zHsex8eWjXVykWER88CAC7NHd2LoIN9YXJPCVZjByefYXiYGtHhXTI0gqGsxUA0Mblqq=s640-h400- e365