This document provides an overview of Washington University's wireless network. It explains:
- The differences between the WUFI, WUFI-S, and WUNOREG wireless networks, including which allow encryption and require authentication.
- That most students now use the encrypted WUFI-S network, though some off-campus students still use the unencrypted WUFI.
- The basic process a computer goes through to connect to the WUFI network, including locating the network, getting an IP address from the DHCP server, and authenticating the user's credentials against the authentication server.
- Additional details on the wireless infrastructure and how users can get help if they have trouble
Starview International manufactures and distributes optical transceivers and networking solutions. They offer a wide range of transceiver products including SFP, SFP+, GBIC, XFP, and QSFP modules that are compatible with major networking equipment vendors. Starview's transceivers feature digital diagnostics monitoring and comply with various industry standards. They provide reliable products, dedicated after-sales support, and competitive pricing to customers in the telecom, enterprise, and industrial sectors.
WiMAX will provide mobile broadband internet access over a wide area, similar to how cellular networks provide phone coverage. It will allow users to get high-speed internet access on their laptops or mobile devices anywhere within the WiMAX provider's network, even when away from WiFi hotspots. Intel is working to build WiMAX support into laptops and mobile devices to enable this mobile broadband internet access on the go. WiMAX will fill in the gaps between WiFi coverage areas and allow continuous high-speed connectivity for activities like video chatting, online gaming, or working remotely.
WiMAX is being deployed around the world to provide broadband connectivity in both mature and emerging markets. In mature markets like the US, Taiwan, Japan, and Europe, WiMAX providers are delivering speeds of up to 16 Mbps while undercutting the prices of 3G networks. WiMAX is also connecting people in emerging markets in countries across Africa, Asia, and Central/South America. The document provides examples of successful WiMAX deployments from providers in the US, Taiwan, Japan, the Netherlands, Ireland, and Italy.
1) By 2020, mobile networks will need to support up to 1000 times more data traffic than in 2010 through advancements like 10x more spectrum availability, 10x more base stations, and 10x improvements in spectral and latency performance.
2) New radio technologies aim to reduce latency to 1ms and improve spectral efficiency 10x by 2020 through techniques like shorter frame lengths, interference cancellation, and advanced antenna technologies.
3) To achieve 1000x more network capacity, mobile networks will rely on 10x gains in performance, spectrum, and base station deployment through smaller cells and a combination of new 4G, 5G, and WiFi technologies working together.
The document provides specifications for Sub10's Liberator wireless Ethernet bridges, which operate at 60GHz frequencies and can transmit data at speeds up to 1Gbps over distances up to 1km. The bridges are compact at 182x182x60mm and lightweight at 2.5kg. They use PoE for power and have an IP67 outdoor rating. Common applications include wireless backhauling, leased line replacement, LAN connectivity between buildings, and use in mobile networks and broadcast applications.
This document discusses the future of mobile broadband beyond 4G by 2020. It predicts:
1) Mobile data traffic will increase up to 1000 times from 2010 levels, requiring support for 1000 exabytes of traffic.
2) Latency in radio networks can be reduced to 1 millisecond through shorter frame lengths, enabling low-latency applications.
3) Spectral efficiency can be improved 10 times through technologies like coordinated multipoint to manage interference.
1) By 2020, mobile networks will need to support 1000 times more traffic than 2010 levels through advancements in spectral efficiency, available spectrum, network densification, and new technologies.
2) New radio technologies aim to reduce latency by 10 times to 1ms and improve spectral efficiency 10 times through techniques like coordinated multipoint and interference cancellation.
3) Ten times more spectrum could be made available through initiatives to drive spectrum availability and technologies like cognitive radio.
4) The number of base stations is expected to grow to over 50 million by 2020, 80% being micro, pico or femtocells, to support 1000 times more network capacity through densification.
Starview International manufactures and distributes optical transceivers and networking solutions. They offer a wide range of transceiver products including SFP, SFP+, GBIC, XFP, and QSFP modules that are compatible with major networking equipment vendors. Starview's transceivers feature digital diagnostics monitoring and comply with various industry standards. They provide reliable products, dedicated after-sales support, and competitive pricing to customers in the telecom, enterprise, and industrial sectors.
WiMAX will provide mobile broadband internet access over a wide area, similar to how cellular networks provide phone coverage. It will allow users to get high-speed internet access on their laptops or mobile devices anywhere within the WiMAX provider's network, even when away from WiFi hotspots. Intel is working to build WiMAX support into laptops and mobile devices to enable this mobile broadband internet access on the go. WiMAX will fill in the gaps between WiFi coverage areas and allow continuous high-speed connectivity for activities like video chatting, online gaming, or working remotely.
WiMAX is being deployed around the world to provide broadband connectivity in both mature and emerging markets. In mature markets like the US, Taiwan, Japan, and Europe, WiMAX providers are delivering speeds of up to 16 Mbps while undercutting the prices of 3G networks. WiMAX is also connecting people in emerging markets in countries across Africa, Asia, and Central/South America. The document provides examples of successful WiMAX deployments from providers in the US, Taiwan, Japan, the Netherlands, Ireland, and Italy.
1) By 2020, mobile networks will need to support up to 1000 times more data traffic than in 2010 through advancements like 10x more spectrum availability, 10x more base stations, and 10x improvements in spectral and latency performance.
2) New radio technologies aim to reduce latency to 1ms and improve spectral efficiency 10x by 2020 through techniques like shorter frame lengths, interference cancellation, and advanced antenna technologies.
3) To achieve 1000x more network capacity, mobile networks will rely on 10x gains in performance, spectrum, and base station deployment through smaller cells and a combination of new 4G, 5G, and WiFi technologies working together.
The document provides specifications for Sub10's Liberator wireless Ethernet bridges, which operate at 60GHz frequencies and can transmit data at speeds up to 1Gbps over distances up to 1km. The bridges are compact at 182x182x60mm and lightweight at 2.5kg. They use PoE for power and have an IP67 outdoor rating. Common applications include wireless backhauling, leased line replacement, LAN connectivity between buildings, and use in mobile networks and broadcast applications.
This document discusses the future of mobile broadband beyond 4G by 2020. It predicts:
1) Mobile data traffic will increase up to 1000 times from 2010 levels, requiring support for 1000 exabytes of traffic.
2) Latency in radio networks can be reduced to 1 millisecond through shorter frame lengths, enabling low-latency applications.
3) Spectral efficiency can be improved 10 times through technologies like coordinated multipoint to manage interference.
1) By 2020, mobile networks will need to support 1000 times more traffic than 2010 levels through advancements in spectral efficiency, available spectrum, network densification, and new technologies.
2) New radio technologies aim to reduce latency by 10 times to 1ms and improve spectral efficiency 10 times through techniques like coordinated multipoint and interference cancellation.
3) Ten times more spectrum could be made available through initiatives to drive spectrum availability and technologies like cognitive radio.
4) The number of base stations is expected to grow to over 50 million by 2020, 80% being micro, pico or femtocells, to support 1000 times more network capacity through densification.
1) Scandinavian open access networks have had 5 years of success with over 800,000 active FTTH users in Sweden, more than 50% using city networks.
2) The open access model separates the network infrastructure owner, active network operator, and retail service providers allowing each to focus on their core competencies.
3) Lessons from Scandinavian open access networks include building flexibility into the network design to adapt to changes, educating end-users, and involving municipalities which aids rural development.
The document describes Cisco ASR 9000 Series Ethernet Line Cards, which are carrier-grade networking components. The line cards deliver scalable, high-availability Ethernet and IP services to enable profitable business, residential, and mobile services. They provide dense QoS and support both Layer 2 and 3 services, allowing operators to reduce costs and quickly deploy new services. Key features include high port densities, support for various interface types and distances, extensive Layer 2 and 3 capabilities, carrier-class OAM functions, and timing synchronization.
Concept of ubiquitous network. Network that is flexible and adaptive.
Check this article - http://mazlan.kinja.com/shadow-network-the-early-definition-863757704
The document discusses network transformation and the state of the optical networking industry. It provides a history of the industry in the 1990s and 2000s, analyzes growth drivers and challenges, and envisions the future of optical networking including a transition to software-defined networks. It calls for industry innovation and developing solutions that capitalize on trends like cloud services, mobility, and big data.
This presentation is based on the book "Building the Mobile Internet", the central theme being that the lack of a true session layer in the TCP/IP stack causes problems with mobility. The presentation addresses different ways of dealing with that problem on the various layers of the TCP/IP stack.
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarloMundo Contact
This document discusses reducing mobile costs through WiFi offloading, least cost routing (LCR), and voice over 3G (Vo3G). An example shows a company's mobile expenses reduced from $749 to $270 with Agito's WiFi and LCR services, and further reduced to $90 with the addition of Agito's Vo3G service, resulting in savings of 88%. Agito is presented as a solution to bypass high cellular and long distance rates by routing calls over IP networks and WiFi when possible.
This document discusses driving broadband innovation in the UAE using du's LTE evolution. It begins with an overview of du's broadband portfolio including mobile and fixed network services. It then discusses why LTE is important for speed enhancement, latency reduction, quality of service capabilities, and a simple flat architecture. The document outlines LTE evolution and spectrum options, and discusses du's deployment strategy and trial results showing improved speeds and latency compared to earlier technologies like HSPA+.
This document summarizes T-Mobile's role as a leader in the Next Generation Mobile Networks (NGMN) initiative. It outlines T-Mobile's "always connected" vision and discusses how Moore's Law is driving exponential growth in broadband demand. The document then reviews the evolution of mobile technologies like 2G, 3G, and 4G LTE, and describes NGMN's goals of delivering a high-quality user experience at sustainable costs. It concludes by discussing T-Mobile's trials of NGMN technology and the keys to its successful adoption.
This document discusses wireless network solutions for ports and intermodal operations. It summarizes Luceor's WiMESH technology which can provide wireless broadband coverage for entire container terminals using a scalable and resilient mesh network architecture. The network supports applications requiring high bandwidth such as automation systems using GPS, RFID, and video cameras. It also enables mobility for equipment like straddle carriers across large terminal areas. A case study describes a successful implementation of Luceor's WiMESH to upgrade the wireless network for a major French port terminal.
This document discusses how big data is growing faster than Moore's law and how the network is becoming a bottleneck. It introduces Solarflare as a company providing high-performance networking solutions for applications handling big data workloads. Solarflare's products are optimized for financial services, HPC, storage and cloud/web applications. The document highlights how Solarflare's hardware and software can optimize network performance and reduce latency compared to standard server networking approaches. It also provides an example of a turnkey big data management solution leveraging Solarflare's networking products.
Every once in a while a new technology changes the game. Some benefit from it while others fail to adapt. Long Term Evolution, or LTE for short, is on the surface ,just yet another fast wireless standard bringing us faster mobile networking. But just like the freeway was much more than just a faster road, LTE actually has a chance to change the rules for app developers and create new possibilities.
Falk von bornstaedt networks perspectives and analysis in the future intern...ictseserv
The document discusses quality of service (QoS) and quality of experience (QoE) for internet networks. It notes that QoS helps guarantee characteristics like bandwidth and delay, while QoE is the user's perceived quality and is influenced by many factors. The document also provides examples of elastic and inelastic internet services and how moving elastic traffic to off-peak times can reduce costs. Definitions of QoS and QoE are presented from standards bodies.
Slides to the HandsOn CloudFoundry session given with @fbiville on Oct 11th, 2012.
Instructions to the exercises are here : https://github.com/ericbottard/hands-on-cloudfoundry
4G iPhone Platform by Open Wireless ArchitectureWillie LU
These slides detail the open wireless architecture (OWA) technology for the 4G iPhone platform. It is also the system architecture for other smartphones including the Google Phone, G1, Blackberry, Nokia phone, etc. OWA will become the leading platform in converging the home phone, office phone and mobile phone into one common device platform for truly personal communications for the 4G era, and it is being widely used by over one billion mobile users worldwide. Firstly developed by USCWC and ObamaLab in Palo Alto, the OWA technology design centers include US, China, Germany and Japan. For more, please visit: ObamaLab.com.
The document discusses Voice over IP (VoIP) and its description and operation. It defines VoIP as using private networks for IP telephony and Internet telephony as using public networks. It describes how audio is digitized, compressed, and transported via IP packets. Common VoIP deployments like IP phone to IP phone are also outlined. The differences between SIP and H.323 protocols are highlighted. Typical call flows for SIP, H.323, and interworking between SIP and H.323 are illustrated. Implementing VoIP requires IP-IP gateways or Asterisk servers to connect IP and PSTN networks. Using VoIP eliminates traditional time-based telephony charges and distinctions between local and long distance calls.
The document discusses the importance of network choices in determining future success. It summarizes that making the right choices around technologies, spectrum, and vendors is imperative as these choices will dictate the network's competitive advantage and ability to meet subscriber demands. The document outlines many of the key technology choices facing operators, such as wired vs wireless, GSM vs CDMA, LTE vs WiMAX, and emphasizes that market inertia often influences which options become most widely adopted.
Hacking Your Information Workflow HandoutSarah Bombich
The document discusses various tools that can be used for productivity including collections, tools, and waiting lists. It recommends choosing tools that are shared by a group to work on projects together and tools that allow integrating tasks across different lists. Common tools mentioned include collections, references, waiting lists, next action lists, and calendars.
Lillith is a hardcore band based in New Jersey. While hardcore has deep roots in New Jersey, giving Lillith a local advantage, it remains underground nationwide. To build more awareness, Lillith plans to utilize websites like JerseyMusic.com and social media platforms like Facebook to promote their new album. The album will be offered both physically and digitally. Physical purchases include extras like posters and downloads, while digital purchases provide an unreleased song. Lillith will use Catapult Distribution to distribute the album through both online and brick-and-mortar retailers. Potential partnerships with Shock Hound and Bamboozle Festival are also mentioned.
This document provides an overview of key Twitter concepts and terminology in 3 paragraphs or less:
Tweets are individual Twitter messages that are typically 140 characters or less. Users can follow other accounts to receive their tweets and have their own tweets sent to their followers. Lists allow users to organize the accounts they follow on specific topics or interests. Additional features include retweeting, which shares another user's tweet, mentions which tag another user in a tweet, and hashtags which group tweets by topic for discovery. Direct messages allow for private communication between users who follow each other. Trending topics show popular terms being discussed publicly on Twitter in real-time.
1) Scandinavian open access networks have had 5 years of success with over 800,000 active FTTH users in Sweden, more than 50% using city networks.
2) The open access model separates the network infrastructure owner, active network operator, and retail service providers allowing each to focus on their core competencies.
3) Lessons from Scandinavian open access networks include building flexibility into the network design to adapt to changes, educating end-users, and involving municipalities which aids rural development.
The document describes Cisco ASR 9000 Series Ethernet Line Cards, which are carrier-grade networking components. The line cards deliver scalable, high-availability Ethernet and IP services to enable profitable business, residential, and mobile services. They provide dense QoS and support both Layer 2 and 3 services, allowing operators to reduce costs and quickly deploy new services. Key features include high port densities, support for various interface types and distances, extensive Layer 2 and 3 capabilities, carrier-class OAM functions, and timing synchronization.
Concept of ubiquitous network. Network that is flexible and adaptive.
Check this article - http://mazlan.kinja.com/shadow-network-the-early-definition-863757704
The document discusses network transformation and the state of the optical networking industry. It provides a history of the industry in the 1990s and 2000s, analyzes growth drivers and challenges, and envisions the future of optical networking including a transition to software-defined networks. It calls for industry innovation and developing solutions that capitalize on trends like cloud services, mobility, and big data.
This presentation is based on the book "Building the Mobile Internet", the central theme being that the lack of a true session layer in the TCP/IP stack causes problems with mobility. The presentation addresses different ways of dealing with that problem on the various layers of the TCP/IP stack.
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarloMundo Contact
This document discusses reducing mobile costs through WiFi offloading, least cost routing (LCR), and voice over 3G (Vo3G). An example shows a company's mobile expenses reduced from $749 to $270 with Agito's WiFi and LCR services, and further reduced to $90 with the addition of Agito's Vo3G service, resulting in savings of 88%. Agito is presented as a solution to bypass high cellular and long distance rates by routing calls over IP networks and WiFi when possible.
This document discusses driving broadband innovation in the UAE using du's LTE evolution. It begins with an overview of du's broadband portfolio including mobile and fixed network services. It then discusses why LTE is important for speed enhancement, latency reduction, quality of service capabilities, and a simple flat architecture. The document outlines LTE evolution and spectrum options, and discusses du's deployment strategy and trial results showing improved speeds and latency compared to earlier technologies like HSPA+.
This document summarizes T-Mobile's role as a leader in the Next Generation Mobile Networks (NGMN) initiative. It outlines T-Mobile's "always connected" vision and discusses how Moore's Law is driving exponential growth in broadband demand. The document then reviews the evolution of mobile technologies like 2G, 3G, and 4G LTE, and describes NGMN's goals of delivering a high-quality user experience at sustainable costs. It concludes by discussing T-Mobile's trials of NGMN technology and the keys to its successful adoption.
This document discusses wireless network solutions for ports and intermodal operations. It summarizes Luceor's WiMESH technology which can provide wireless broadband coverage for entire container terminals using a scalable and resilient mesh network architecture. The network supports applications requiring high bandwidth such as automation systems using GPS, RFID, and video cameras. It also enables mobility for equipment like straddle carriers across large terminal areas. A case study describes a successful implementation of Luceor's WiMESH to upgrade the wireless network for a major French port terminal.
This document discusses how big data is growing faster than Moore's law and how the network is becoming a bottleneck. It introduces Solarflare as a company providing high-performance networking solutions for applications handling big data workloads. Solarflare's products are optimized for financial services, HPC, storage and cloud/web applications. The document highlights how Solarflare's hardware and software can optimize network performance and reduce latency compared to standard server networking approaches. It also provides an example of a turnkey big data management solution leveraging Solarflare's networking products.
Every once in a while a new technology changes the game. Some benefit from it while others fail to adapt. Long Term Evolution, or LTE for short, is on the surface ,just yet another fast wireless standard bringing us faster mobile networking. But just like the freeway was much more than just a faster road, LTE actually has a chance to change the rules for app developers and create new possibilities.
Falk von bornstaedt networks perspectives and analysis in the future intern...ictseserv
The document discusses quality of service (QoS) and quality of experience (QoE) for internet networks. It notes that QoS helps guarantee characteristics like bandwidth and delay, while QoE is the user's perceived quality and is influenced by many factors. The document also provides examples of elastic and inelastic internet services and how moving elastic traffic to off-peak times can reduce costs. Definitions of QoS and QoE are presented from standards bodies.
Slides to the HandsOn CloudFoundry session given with @fbiville on Oct 11th, 2012.
Instructions to the exercises are here : https://github.com/ericbottard/hands-on-cloudfoundry
4G iPhone Platform by Open Wireless ArchitectureWillie LU
These slides detail the open wireless architecture (OWA) technology for the 4G iPhone platform. It is also the system architecture for other smartphones including the Google Phone, G1, Blackberry, Nokia phone, etc. OWA will become the leading platform in converging the home phone, office phone and mobile phone into one common device platform for truly personal communications for the 4G era, and it is being widely used by over one billion mobile users worldwide. Firstly developed by USCWC and ObamaLab in Palo Alto, the OWA technology design centers include US, China, Germany and Japan. For more, please visit: ObamaLab.com.
The document discusses Voice over IP (VoIP) and its description and operation. It defines VoIP as using private networks for IP telephony and Internet telephony as using public networks. It describes how audio is digitized, compressed, and transported via IP packets. Common VoIP deployments like IP phone to IP phone are also outlined. The differences between SIP and H.323 protocols are highlighted. Typical call flows for SIP, H.323, and interworking between SIP and H.323 are illustrated. Implementing VoIP requires IP-IP gateways or Asterisk servers to connect IP and PSTN networks. Using VoIP eliminates traditional time-based telephony charges and distinctions between local and long distance calls.
The document discusses the importance of network choices in determining future success. It summarizes that making the right choices around technologies, spectrum, and vendors is imperative as these choices will dictate the network's competitive advantage and ability to meet subscriber demands. The document outlines many of the key technology choices facing operators, such as wired vs wireless, GSM vs CDMA, LTE vs WiMAX, and emphasizes that market inertia often influences which options become most widely adopted.
Hacking Your Information Workflow HandoutSarah Bombich
The document discusses various tools that can be used for productivity including collections, tools, and waiting lists. It recommends choosing tools that are shared by a group to work on projects together and tools that allow integrating tasks across different lists. Common tools mentioned include collections, references, waiting lists, next action lists, and calendars.
Lillith is a hardcore band based in New Jersey. While hardcore has deep roots in New Jersey, giving Lillith a local advantage, it remains underground nationwide. To build more awareness, Lillith plans to utilize websites like JerseyMusic.com and social media platforms like Facebook to promote their new album. The album will be offered both physically and digitally. Physical purchases include extras like posters and downloads, while digital purchases provide an unreleased song. Lillith will use Catapult Distribution to distribute the album through both online and brick-and-mortar retailers. Potential partnerships with Shock Hound and Bamboozle Festival are also mentioned.
This document provides an overview of key Twitter concepts and terminology in 3 paragraphs or less:
Tweets are individual Twitter messages that are typically 140 characters or less. Users can follow other accounts to receive their tweets and have their own tweets sent to their followers. Lists allow users to organize the accounts they follow on specific topics or interests. Additional features include retweeting, which shares another user's tweet, mentions which tag another user in a tweet, and hashtags which group tweets by topic for discovery. Direct messages allow for private communication between users who follow each other. Trending topics show popular terms being discussed publicly on Twitter in real-time.
This document provides an overview of wireless networking and Washington University's wireless network. It discusses how wireless networks work using radio waves, authentication and encryption. It describes the different types of wireless access at WashU including WUFI, WUFI-S and GUESTWIFI-WUSTL and how they differ in terms of security, speed and resource access. It also outlines the basic steps users can expect when connecting to the WUFI wireless network on campus.
This document provides an overview of Wash U's wireless network "WUFI" and how to connect devices to it. It discusses how wireless networks work, the different types of wireless access at Wash U including WUFI, WUFI-S and Guest WiFi, and what steps users should expect when connecting their devices to WUFI or WUFI-S. It also provides troubleshooting tips for connection issues and recommends contacting Arc or STS for additional help.
This document provides an overview of screenr, a free screencasting tool. It explains that screenr allows users to create short videos of their computer screen to easily share instructions and demonstrations. The summary covers how to set up an account, record and share a screencast, and find and manage previously recorded videos. It also notes some limitations, such as an inability to edit recordings or zoom in on specific areas of the screen.
Making Connections - Lebanon Merina Shabanguestabec8c
The document provides background information on Lebanon, including:
1) Beirut is the capital of Lebanon, which was originally part of Phoenicia and was an early center of writing and trade in the region.
2) Lebanon faces several environmental issues like pollution, coastal water pollution from oil spills, and deforestation which have damaged its landscape and economy.
3) Hezbollah, a Shiite militant group, seized control of parts of Beirut in deadly clashes in 2008, exacerbating political tensions in the country.
- The document discusses how to use templates and library items in Dreamweaver to create a consistent site structure and allow for rapid updating. It covers creating templates from new or existing documents, defining editable regions, creating and applying template-based pages, and updating templates and attached pages. It also discusses creating, inserting, and editing library items to store reusable elements and update them across a site. Finally, it defines cascading style sheets as external style sheets that can control the presentation of multiple documents to ensure consistent styling.
Microsoft Office 2007 introduced significant changes to the interface of Microsoft Word, Excel, and PowerPoint. This guide provides an overview of the key changes and how to navigate the new "ribbon" interface, which consolidated many tools and functions into tabbed groups. It summarizes the new file formats that are not backwards compatible with Office 2003 and provides instructions on saving files in a compatible format. The guide also explains how to perform common tasks like inserting tables and images, changing fonts and formatting, and setting page layout options in Office 2007.
This document provides information about working with digital images, including choosing appropriate image resolution and file format, understanding images commonly found online, and basic image manipulation in Photoshop. It discusses resolution and file format, describes common image issues like blurriness or exposure problems that can be fixed in Photoshop, and provides an overview of the scanners available in the Olin Library Arc for scanning photos, documents, and other materials.
Photoshop: Tools and Tricks for BeginnersSarah Bombich
The document provides an overview of basic tools and techniques for beginners in Photoshop, including resizing images, understanding resolution and file formats, working with layers and the history palette, and an introduction to the Photoshop workspace and tools. It explains how to resize images while maintaining pixel dimensions, manipulate pixel dimensions, work with layers, use the history palette to navigate between editing states, and highlights some basic selection and editing tools to try.
This document provides an introduction to Flash MX, including its capabilities, uses, and basic tools. It discusses what Flash is, what can be created with it, and helpful prerequisite knowledge. It then outlines the Flash workspace and provides tutorials on illustrating, text, symbols, layers, and tweened animation. The goals are to familiarize users with Flash's capabilities and learning curve.
Making Connections - My home country Lebanonguestabec8c
The document provides background information on Lebanon, including:
1) Beirut is the capital of Lebanon, which was originally part of Phoenicia and was an early center of writing and trade in the region.
2) Lebanon faces several environmental issues like pollution, coastal water pollution from oil spills, and deforestation which have damaged its landscape and economy.
3) Hezbollah, a Shiite militant group, seized control of parts of Beirut in deadly clashes in 2008, exacerbating political tensions in the country.
This document provides an overview and introduction to using Dreamweaver MX, including:
- Its capabilities for designing and managing websites visually or with code
- How to set up a local website and add pages, text, images and links
- Tools for previewing pages, uploading sites, and checking links
- Recommended prerequisite knowledge includes familiarity with HTML, websites, and how they work.
This document discusses different types of computer networks including LANs (local area networks spanning a single building or campus), MANs (metropolitan area networks spanning a single city), and WANs (wide area networks spanning multiple cities, countries, or continents). It provides details on the history and development of WANs, how they are constructed using switches, and how they can connect more sites than LANs or MANs. The document also compares key characteristics of LANs, MANs, and WANs such as cost, speed, and management.
This document discusses different types of computer networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It provides details on:
- LANs connect computers within a single building or campus, while MANs connect sites within a city and WANs connect multiple cities, countries, or continents.
- The ARPANET project in the 1960s, considered the precursor to the Internet, demonstrated the feasibility of packet switched WANs for military communications.
- Key differences between WANs and LANs include scalability and that WANs can connect many more computers and networks over greater distances.
In enterprises today, Wide Area Networks (WANs) are no
longer operating behind the scenes. WANs are central to
the daily operations and core business of organizations large
and small. However, enterprises must choose from a variety
of ways to implement WANs. This eBook examines the
various types of Wide Area Networks (WANs), and why
IT departments gravitate towards specific WAN solutions.
In addition, the paper provides constructive guidelines
for organizations seeking Local Area to Wide Area
Network extension.
The document discusses cloud computing and the concept of a "World Wide Cloud" (WWC). It defines cloud as a service model (IaaS, PaaS, SaaS, etc.) and discusses users and producers in the cloud. It then introduces the idea of the WWC architecture, which would allow computing environments and virtual machines to be migrated across multiple clouds without changes, enabling universal cloud computing. Key aspects of the WWC architecture include virtual and hardware-independent elements, separate data/control/encryption paths, and migrate-able virtual computing environments called Migrate-able Domains.
Why your wifi sucks and how it can be helped, part 1 july 2011Fajar Isnanto
This document provides an overview of common WiFi performance issues and how wireless networking technologies work. It discusses how interference from other wireless devices and competing WiFi networks can reduce performance by causing packet collisions and contention as devices compete to transmit data. Newer beamforming and interference mitigation technologies aim to more efficiently manage airtime and transmission paths to improve speeds even in congested environments with many sources of interference. The document aims to explain these issues and shed light on improving ubiquitous but often unreliable WiFi performance.
This document provides an overview of computer networks. It discusses what a network is and the need for networking. The key components of a network are workstations/nodes, servers, and network interface units. Networks have evolved over time from early networks like ARPANET to today's internet. Various transmission media and technologies are used for data communication across networks, including cables, wireless transmission, and satellite communication. The document also covers network devices, topologies, and protocols.
The document discusses how WAN virtualization and colocation facilities can enable enterprises to build reliable hybrid cloud networks at lower costs. WAN virtualization provides significantly more bandwidth at lower prices by combining multiple internet connections. Colocation allows enterprises to centralize network complexity while maintaining performance. This transforms the enterprise WAN and provides an evolutionary path for enterprises to leverage both private and public cloud computing.
The document discusses how WAN virtualization and other technologies can enable enterprises to build next-generation WAN architectures and leverage cloud computing in a practical, evolutionary manner. WAN virtualization provides massive bandwidth increases at much lower costs and greater reliability compared to traditional WANs. These technologies provide a reliable, hybrid cloud networking solution that allows enterprises to consolidate infrastructure and benefit from both private and public cloud services.
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01Hussein Elmenshawy
This document discusses IP tunneling and VPN concepts. It provides an overview of various L2 and L3 tunneling techniques that allow VPN implementation. VPNs offer flexibility, scalability, and lower network costs by extending private networks over shared public infrastructure. Cisco routers and IOS software provide tools to implement VPNs with security, management, and related features.
The document discusses a presentation on wireless networking technologies past and present. It outlines the history of wireless from proprietary standards to modern WiFi standards. It then discusses wireless management strategies over time, from no remote management to centralized hardware controllers to new cloud-based management approaches. Finally, it introduces Ubiquiti Networks as an innovator in new low-cost wireless hardware and PowerCloud Systems' CloudCommand platform for managing wireless networks remotely via the cloud.
This chapter will cover how to configure, manage, and troubleshoot VLANs and
VLAN trunks. It will also examine security considerations and strategies relating
to VLANs and trunks, and best practices for VLAN design.
Wi-Fi is a wireless technology standard that allows electronic devices to connect to the internet or communicate with each other wirelessly. The presentation discusses Wi-Fi technologies like 802.11b, 802.11a, and 802.11g. It explains the basic components of a Wi-Fi network including access points, Wi-Fi cards, and security measures. It also covers Wi-Fi configurations, applications, security techniques and topologies like AP-based, peer-to-peer, and point-to-multipoint bridge.
Legacy Inter-VLAN routing: This is a legacy solution. It does not scale well.
Router-on-a-Stick: This is an acceptable solution for a small- to medium-sized network.
Layer 3 switch using switched virtual interfaces (SVIs): This is the most scalable solution for medium to large organizations.
MidoNet Overview - OpenStack and SDN integrationAkhilesh Dhawan
The document provides an overview of MidoNet's network virtualization platform. It discusses MidoNet's distributed architecture as an alternative to the single network node approach of the OpenStack Neutron OVS plugin. MidoNet's distributed logical switching, routing, firewalling and load balancing are performed across multiple nodes for high performance, availability and scalability without relying on hardware appliances. The document also demonstrates MidoNet's integration with OpenStack Neutron and its capabilities for overlay networking, distributed logical topologies and load balancing as a service.
Wi-Fi (Wireless Fidelity) is a wireless networking technology that allows devices to connect to the internet and communicate with one another without being physically connected with wires. It utilizes radio waves to enable wireless internet access within a particular area. The document discusses key aspects of Wi-Fi including its components like access points and Wi-Fi cards, how a Wi-Fi network works by creating hotspots, different network topologies, configurations, security measures, advantages like mobility and convenience, disadvantages such as limited range and security issues, and the future of Wi-Fi with technologies like the Internet of Things and increasing speeds.
The document provides specifications for Sub10's Liberator wireless Ethernet bridges, which operate at 60GHz frequencies and can transmit data at speeds up to 1Gbps over distances up to 1km. The bridges are compact at 182x182x60mm and lightweight at 2.5kg. They use PoE for power and have an IP67 outdoor rating. Common applications include wireless backhauling, leased line replacement, LAN connectivity between buildings, and use in mobile networks and broadcast applications.
Networks are categorized based on their geographic span. A LAN connects devices within a single location like an office or building using fast networking media over short distances. A WAN spans multiple locations, is generally slower, and more expensive, connecting multiple LANs. A MAN covers an area larger than a LAN but smaller than a WAN, like a university campus or city. Wireless networks use infrastructure topologies with access points to connect to wired LANs, or ad-hoc topologies to directly connect devices without access points. Common wireless standards include 802.11, Bluetooth, and infrared.
The document discusses intrusion detection systems (IDS) in wireless networks. It describes how Wi-Fi networks work and their security vulnerabilities like unencrypted networks and rogue access points. It then explains how the research implements a network detection system to identify unauthorized access points using multiple clients. The clients report detected network information to a central server, which uses geometry to triangulate the location of any rogue access points based on the common networks detected and signal strengths reported by each client.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
Wireless Boot Camp 2010 Handout
1. W A S H I N G T O N U N I V E R S I T Y
Unive r s ity Lib r a r ie s
WIRELESS NETWORK BOOT CAMP
UNDERSTANDING THE UNIVERSITY’S WIRELESS NETWORK
Sarah Bombich
Friday, January 29, 2010
2. Table of Contents
What is a network?
1
Parts of a Network
1
How does Wi-Fi work?
2
What Is Wi-Fi?
2
What are the different types of Wi-Fi?
2
What happens when I “get on wireless”?
3
What is encryption?
4
Wash U’s Wireless Network in Action
5
Who can use the University wireless network?
5
What are the differences between WUFI, WUFI-S, and WUNOREG?
6
Which network is being used by most people? Why?
7
Are WUFI and WUFI-S used on the South Forty?
7
Where else is the wireless network available on campus?
7
What happens when I connect to WUFI?
8
What should I expect when I connect to WUFI?
9
What should I expect when I connect to WUFI-S?
11
Troubleshooting a WIFI Connection
12
WUFI & WUFI-S: Cannot find the network
12
WUFI only: Trouble getting to or past the authentication page
12
WUFI & WUFI-S: Appears connected a network but cannot load or connect to any-
thing
13
Where can we get more help?
14
Glossary
15
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
i
3. fabric, you greatly simplify management. More importantly, you ensure an open environment that can accommodate
multiple vendors, new solutions and future flexibility.
What is a network?
“A system containing any combination of computers, computer terminals, printers, audio or visual display devices, or telephones
interconnected by telecommunication equipment or cables: used to transmit or receive information.1”
Parts of a Network
The Internet. The worldwide Internet
computer network, comprised
SANbox ®
of many smaller networks con- The new look for powerful, easy to manage fabrics
nected to each other. Informa- • SANbox 9000 Stackable Chassis Switch
• SANbox 8000 Storage Services Platform
tion you receive via computer • SANbox 6000 Intelligent Storage Router
• SANbox 5000 Stackable Switch
network that is not from Wash
• SANbox 1000 Fixed Port Switch
U is from the Internet. Network Backbone
(or Modem, at
Network Backbone (Modem). This home)
device talks to an Internet Serv-
ice Provider and sends infor-
Router
mation and information re-
(may be skipped
quests back and forth to the rest at home)
of the Internet.
Router. This device allows mul-
tiple devices or computers to
share a single Internet connec-
tion. It ensures that the correct
data gets to and from each de-
vice. At Wash U, it generally
refers to wired connections. At
home, it can be wired only,
wireless only, or both.
Wireless
Access Point
Wireless Access Point. Converts
the data sent over wires to a
wireless signal that can be re-
ceived by computers and de-
vices with compatible wireless
cards. Every access point has at
least one name (or SSID) that it
broadcasts, such as WUFI and
WUFI-S.
Server. This is a general term for
a computer that has no one
sitting at it; most of its communication is to other computers. For example, a web server sends data to other comput-
ers using the Internet.
Client Computer, Computer, or Workstation. This is a general term for a computer that has someone sitting in front of it,
using it. For example, computers in a computer lab are workstations.
1 network. (n.d.). Dictionary.com Unabridged (v 1.1). http://dictionary.reference.com/browse/network
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
Page 1
4. How does Wi-Fi work?
What Is Wi-Fi? 2
A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across
a wireless network is a lot like two-way radio communication. Here's what happens:
1. A computer's wireless adapter translates data into a radio signal and transmits it using an antenna.
2. A wireless router receives the signal and then sends the information to the Internet using a physical, wired Eth-
ernet connection.
The process also works in reverse, with
the router receiving information from the
Internet, translating it into a radio signal
and sending it to the computer's wireless
adapter.
The signal from each wireless device is
circular and can be visualized as a rock
dropping in the center of a pond. The
waves spread out from the wireless de-
vice, like waves in the water, and get
weaker the farther you get from the de-
vice. Different devices create signals of
different strengths and have antennas of
different strengths; just because one lap-
top gets a wireless signal in a given loca-
tion, you cannot assume that all laptops
will be able to detect a signal at the same
location.
The radios used for Wi-Fi communica-
tion are very similar to the radios used for
walkie-talkies, cell phones and other devices. Note that Wi-Fi radios use a different part of the radio wave spectrum
and have special networking standards.
What are the different types of Wi-Fi?
Most Wi-Fi in use is 802.11, which is a name created by the IEEE (Institute of Electrical and
Electronics Engineers) standards board to describe signals traveling within a certain part of
the wireless spectrum. As technology changes, the standard has been modified slightly which is designated by add-
ing letters to the end (802.11a, 802.11b, 802.11g, 802.11n). There is a Wi-Fi standards board which certifies all wireless
access points and devices to ensure that that can successfully interoperate. WUFI/WUFI-S is an 802.11a/b/g net-
work; all devices that support those standards will work. 802.11n devices are the newest and generally backwards
compatible with a/b/g networks (check with the device manufacturer to be sure).
2 This section adapted from How Stuff Works. http://computer.howstuffworks.com/wireless-network1.htm
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
Page 2
5. What happens when I “get on wireless”?
Networking as a Phone Call
Join wireless network
Locate the phone
or plug into ethernet
Say hello to DHCP
Pick up the phone
server
Listen for response
Hear dial tone
from DHCP server
Dial number & hear Request IP address
phone ring from DHCP server
Someone answers Receive IP address
from DHCP server
You ask their name and ask a Wireless access point asks for
question to verify it's the correct and you provide user name and
person password
Optional: WUFI-S only Optional: WUFI-S only
Special software creates an
skips step
skips step
You tell person the code language encrypted connection between
WUFI
WUFI
in which to speak your computer and the wireless
access point
Start sending and
Have a conversation
receiving data
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
Page 3
6. What is authentication? 3
Authentication is “the process of determining whether someone or something is, in fact, who or what it is declared to
be.” To access the wireless network, among other technologies, at Washington University, you must provide such
proof of identity. “In private and public computer networks (including the Internet), authentication is commonly
done through the use of login passwords or passphrases; knowledge of such is assumed to guarantee that the user is
authentic. Thus, when you are asked to "authenticate" to a system, it usually means that you enter your username
and/or password for that system.“
What is encryption?
Encryption is the encoding of data to prevent it from being read by unauthorized people. Think of pig latin - you take
a word and change it around a little bit so that it is hard to understand if you don’t know what you’re listening for.
Encryption is similar in that only the sender and receiver have the keys needed to unscramble the data in order to use
it. Given enough time and effort, encryption can be broken, but it is much better than using no encryption at all.
3All authentication quotes from http://kb.iu.edu/data/alqk.html
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
Page 4
7. Wash U’s Wireless Network in Action
How does Wash U’s wireless
network work?
Internet
Our wireless network runs on
SANbox ®
Meru Networks access points, The new look for powerful, easy to manage fabrics
which are also used in airports • SANbox 9000 Stackable Chassis Switch
• SANbox 8000 Storage Services Platform
and other large-scale commercial • SANbox 6000 Intelligent Storage Router
• SANbox 5000 Stackable Switch
settings as well as other universi- • SANbox 1000 Fixed Port Switch
ties. Network Backboone
There are multiple access points in
the library and any given physical
location may have coverage from Router
multiple access points (see dia-
gram on page 2). The access
points are installed to provide
maximum coverage, though there
are some areas without coverage.
The library provides coverage
maps on its website.
Each access point in the library
provides access to the University
network. All connect to the same Authentication
Server
network -the Internet- but the
various network names describe
the security type of each kind of
Wireless
connection and which protocols Access Point
are allowed.
The Meru access points are auto-
matically load balancing (when
one access point has lots of people
connected it decreases its signal
strength and other access points in
the area increase their signal
strength in order to move people away from the over-used access point). They also allow handoffs between access
points when people are moving around the building. To the user, the multiple access points all look like one big
super-access point.
Who can use the University wireless network?
The only people allowed to use the University’s wireless networks are current students, faculty, and staff with a
WUSTL key. In order to use the wired network, one must authenticate with a WUSTL key. Individuals affiliated with
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
Page 5
8. the Law and Medical School have access to the wireless networks using authentication provided by their respective
schools (not WUSTL key). Visitors do have limited wireless access but it is unsupported.
What are the differences between WUFI, WUFI-S, and WUNOREG?
WUFI WUFI-S GUESTWIFI- WUNOREG LAW-S WUCON
WUSTL WIRELESS
What can you View web Everything Everything, View web cannot test; cannot test;
do?* pages, SSH, but number pages with “allows ac- “allows
SFTP of connec- browser; “for cess to Law Medical
tions and special ma- specific re- School login
speed lim- chine appli- sources1” access to the
ited cations1” Internet1”
What doesn’t FTP, non- Nothing Nothing - Everything Unknown, Unknown,
work* secure email but could be but web cannot test cannot test
transfers very slow or browsing
(POP, IMAP), unavailable,
Remote depending
Shell, telnet on usage
Does it require Yes, via a Yes No No Yes Yes
authentication? web browser
Do you have to Yes, must No No, never No, never Probably no, Probably no,
enter your login authenticate cannot test cannot test
and password through web
every time you browser first
connect?
Do you have to No No No No Probably Probably
install special same as same as
software to use WUFI-S, WUFI-S,
it? cannot test cannot test
Is your data en- No Yes No No Yes Yes
crypted and se-
cure?
Who can access Students, Students, Everyone, Everyone, Individuals Individuals
it? faculty, staff faculty, staff including including affiliated affiliated
via WUSTL via WUSTL visitors visitors with the Law with the
key key School Med School
1Information from NSS: http://nss.wustl.edu/node/8
*Note that this information is not well-documented and may be slightly incorrect
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
Page 6
9. Which network is being used by most people? Why?
In past years, WUFI was widely used but WUFI-S was not. However, with the creation of WUSTL key and the adop-
tion of WUFI-S on the South Forty coupled with some changes to STS policy regarding device registration, most stu-
dents arrive at the Library with their laptops correctly configured to use WUFI-S. However, students that live off
campus are less likely to be set up to use WUFI-S.
Ultimately, our users are better served by connecting to WUFI-S instead of WUFI due to the ease of use after initial
setup (don’t have to enter username and password every time) and the increased level of security it offers. However,
setup takes more time the first time one connects to WUFI-S.
Are WUFI and WUFI-S used on the South Forty?
Any student that has used wireless on the South Forty has already used WUFI-S and has all the necessary software
installed.
Where else is the wireless network available on campus?
See http://nss.wustl.edu/sites/default/files/wufi-coverage.png
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
Page 7
10. What happens when I connect to WUFI?
What You're Doing What Your Computer is Doing
Enable wireless, check list of available Look for wireless signals from other
networks devices
Select WUFI and connect Say hello to DHCP server
Open a web browser Listen for response from DHCP server
Attempt to open a web page Request IP address from DHCP server
Redirected to WUFI authentication page Receive IP address from DHCP server
You enter username and password. Wireless access point asks for and you
Press enter. provide user name and password
Access point checks your
username@domain and password
You wait
against master list (authentication
server)
No Match No Match
Match Found Match Found
on Server on Server
You are redirected You are taken back
to the page you Start sending and No data will be
to the
first asked for authentication page receiving data sent or received
You are now You are not connected You are now Only have access to
connected to WUFI. to WUFI. You can retry connected to WUFI. authentication page
Use the Internet. or give up. Use the Internet. until successful.
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
Page 8
11. What should I expect when I connect to WUFI?
1. Enable wireless, check list of available networks. Select WUFI and Connect or Join.
2. Your system will automatically be assigned an IP address on the University wireless network. Open your
web browser. and attempt to open a web page.
3. You will see certificate errors. Select “Accept this certificate permanently” and OK and then OK on the next
screen.
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
Page 9
12. Note: These prompts might be slightly different on different browsers. Some require only one OK, some might want you to click
on “Continue.”As long as the certificate says something about wustl.edu or Meru Networks, it is safe to assume it is legitimate.
4. You are redirected to the WUFI authentication page.
5. Enter user name and password. Click Login. You wait. Some browsers will take you straight to the web page
requested in step 2; some will first show a Web Authentication Succeeded pop-up or screen.
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
P a g e 10
13. What should I expect when I connect to WUFI-S?
Sample help sheet from Student Technology Services. See http://sts.wustl.edu/index.php/Wireless-setup.html for
up-to-date directions for iPhone & iPod Touch, Mac OS X 10.5 Leopard, Windows Vista & XP. More directions can be
found on NSS’s web page at http://nss.wustl.edu/node/8.
Connecting to WUFI-S
Mac OS X (10.5.x) Gregg Hall Store Front
http://sts.wustl.edu
935-7100 (help desk)
AIM: WUSTSHelp
What You Will Do: What You Will See:
We strongly recommend you first: Step 1: Airport Icon and List of Wireless Networks
! Connect your computer to the WIRED network FIRST
AND REGISTER
! Install all Apple updates
rd
! If you have a 3 party wireless configuration on your
computer, we recommend REMOVING that software
before using these instructions!
1. Click the “Airport” icon near the top-right of your screen.
When the list of available wireless networks appears, select
WUFI-S.
2. Enter your WUSTL-KEY username and password. Click OK.
3. When asked to verify the security certificate, click on “Show Step 2: WUSTL KEY Username and Password
Certificate.”
4. Click the small button labeled “Always trust accounts-
dc1.account.ad.wustl.edu”. Click “Continue.”
5. When prompted for a password to save the certificate, enter
the username and password for your computer’s user logon
account. Click “Ok.”
REGISTERING YOUR COMPUTER FOR USE IN RESIDENTIAL
LIVING SPACES/HALLS:
Step 3: Show Certificate
Once you have connected your computer to WUFI-S, you will
need to register it on the STS Network in order to use it in the
residential living spaces/halls. Follow these steps to register on
the STS network:
a. Be sure you are connected to WUFI-S and open a web
browser.
b. Navigate to a page, such as www.google.com Step 4: Always Trust XX Button
c. You will be automatically redirected to the registration page
for the STS network.
d. At the bottom of the page, click “Regular full time students
using their WUSTL KEY.”
e. The registration page will appear. Complete the form using
your WUSTL key and contact information. When finished,
click “Register.”
f. You will get a confirmation that registration is complete.
Close your web browser.
g. Reboot your computer. You are now registered on the STS
network!
Step 5: Computer’s User Logon Account Info
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
P a g e 11
14. Troubleshooting a WIFI Connection
If someone cannot connect to the wireless network, the problem is most likely to be one of the following:
• Lack of physical wireless coverage
• Wireless disabled on their laptop
• Trouble getting to the authentication page
• Trouble getting past the authentication page which is a login/password issue
• Appears connected but cannot load any web pages which is a capacity issue
WUFI & WUFI-S: Cannot find the network
• Lack of physical wireless coverage
• Find out if the person has successfully connected at that location previously (Note: this is not a guarantee
that they will always connect successfully there, but it means that is not likely a coverage issue.)
• Determine network coverage by checking the library’s wireless coverage maps located on the library web
site (see http://library.wustl.edu/about/techinfo/computing-olin-maps.html ).
• If it appears that the area should have a wireless signal, you can check to ensure that the wireless network
is fully functional by checking the SOS status page (
http://library.wustl.edu/about/techinfo/access-point-status.py ).
• Wireless disabled on their laptop
• Even if the person has successfully connected before, their wireless adapter might be disabled. Make sure
wireless in enabled by right-clicking on the wireless icon in the system tray (Win) or by turning on
Airport in the top-right corner of the menu bar (Mac) . If this doesn’t fix it, more extensive configura-
tion and troubleshooting may be needed. See “Where can we get more help?” below.
WUFI only: Trouble getting to or past the authentication page
You might be redirected to a blank page, or, you’re not redirected at all, and your computer just says it cannot
load a page. Other times, a login and password are entered but you are taken back to the same login page. Here
are some things you can try to get online:
• Try manually entering the authentication page address into a web browser and then authenticating:
https://meruct9.wufi.wustl.edu:8081/vpn/loginformWebAuth.html
• Try using a different web browser. Firefox often works best. If Firefox is not installed, it can be downloaded
onto a flash drive ( http://www.getfirefox.com )and quickly installed.
• Try loading a web page again - it might have worked but sent you back to the authentication page in error.
• If none of these things work, the person’s username or password might be incorrect. Use the available tools
to ensure that their WUSTL key is correct.
• If it still won’t work, try to set up WUFI-S. If time is short, GUESTWIFI-WUSTL can be used as a short term
fix. It is not recommended as a long-term solution due to capacity, speed and security issues.
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
P a g e 12
15. WUFI & WUFI-S: Appears connected a network but cannot load or connect to anything
If the library is especially busy, it is possible that people will be unable to connect to the wireless network. There
is a limit to the number of connected devices that the network can support. Although capacity has been in-
creased recently, it is possible that students will be unable to connect.
Unfortunately, if we are truly over capacity, there isn’t much to do. However, they can try:
• Changing locations. Each access point has its own pool of network addresses and ones in popular places like
Whispers are most likely to be full. It may be possible that ones in less-busy areas, like the Arc, would work.
• Keep retrying to connect. As addresses become available, they might be lucky and get one.
• If this problem is seen, please report it to SOS so that they can collect data to pass on to NSS. See
http://library.wustl.edu/about/techinfo/computing-wireless-report.html
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
P a g e 13
16. Where can we get more help?
• The Arc can help set up WUFI-S connections and perform some basic troubleshooting of laptops. Most Arc
student employees have laptops and are comfortable helping people perform basic troubleshooting. If you
would like to refer someone with a wireless issue to the Arc, best practice is to IM our desk at OlinLi-
braryArc or call at 5-4137 to ensure that we are available and able to handle the situation. If not, a direct re-
ferral to STS might be needed.
• The official point of support for students is the Student Technology Services Help Desk (STS) on the South
Forty (on just the other side of Forsyth, across from the Music Library and next to Cornerstone). You can
contact them via phone (935-7100) or AIM (WUSTSHelp).
• The official point of support for all others is through their schools. NSS maintains a list of that contact in-
formation at http://nss.wustl.edu/node/232 .
• If all else fails, the Arc and Circulation can check out an ethernet cable to give the person Internet access.
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
P a g e 14
17. Glossary
A) 802.11a N) Domain
An IEEE wireless networking standard that specifies a A specific name for a network of computers.
maximum data transfer rate of 54Mbps and an operating
frequency of 5GHz. O) Download
To receive a file transmitted over a network.
B) 802.11b
An IEEE wireless networking standard that specifies a P) Dynamic IP Address
maximum data transfer rate of 11Mbps and an operating A temporary IP address assigned by a DHCP server.
frequency of 2.4GHz. Q) EAP (Extensible Authentication Protocol)
C) 802.11g A general authentication protocol used to control net-
An IEEE wireless networking standard that specifies a work access. Many specific authentication methods work
maximum data transfer rate of 54Mbps, an operating within this framework.
frequency of 2.4GHz, and backward compatibility with
R) EAP-TTLS (EAP-Tunnelled Transport Layer Secu-
802.11b devices.
rity)
D) Access Point An authentication method that uses digital certificates.
Device that allows wireless-equipped computers and After the server is securely authenticated to the client, the
other devices to communicate with a wired network. server can then use the established secure connection
Also used to expand the range of a wireless network. ("tunnel") to authenticate the client.
E) Adapter S) Encryption
This is a device that adds network functionality to your Encoding data to prevent it from being read by unauthor-
PC. ized people.
F) Authentication T) Ethernet
Authentication is the process of validating a user before An IEEE standard network protocol that specifies how
allowing access to digital resources, often accomplished data is placed on and retrieved from a common transmis
by comparing a username and password against those
U) Firewall
listed in a database.
Security measures that protect the resources of a local
G) Bandwidth network from intruders.
The transmission capacity of a given device or network.
V) Gateway
H) Bit A system that interconnects networks.
A binary digit.
W) IEEE (The Institute of Electrical and Electronics
I) Bridge Engineers)
A device that connects two different kinds of local net- An independent institute that develops networking stan-
works, such as a wireless network to a wired Ethernet dards.
network.
X) Infrastructure
J) Database Currently installed computing and networking equip-
A collection of data that is organized so that its contents ment.
can easily be accessed, managed, and updated.
Y) IP (Internet Protocol)
K) Default Gateway A protocol used to send data over a network.
A device that forwards Internet traffic from your local
Z) IP Address
area network.
A numerical address used to identify a computer or de-
L) DHCP (Dynamic Host Configuration Protocol) vice on a network.
A protocol that lets one device on a local network, known
AA) IPSec (Internet Protocol Security)
as a DHCP server, assign temporary IP addresses to the
A VPN protocol used to implement secure exchange of
other network devices, typically computers.
packets at the IP layer.
M) DNS (Domain Name Server)
BB) ISM band
The IP address of your ISP's server, which translates the
Radio band used in wireless networking transmissions.
names of websites into IP addresses.
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
P a g e 15
18. CC) ISP (Internet Service Provider) RR) Router
A company that provides access to the Internet. A networking device that connects multiple networks
together, such as a local network and the Internet.
DD)LAN (Local Area Network)
The computers and networking products that make up SS) Secure W2
the network in your home or office. Software used to create a WUFI-S connection on a Win-
dows laptop.
EE) MAC (Media Access Control) Address
The unique address that a manufacturer assigns to each TT) Server
networking device. Any computer whose function in a network is to provide
user access to files, printing, communications, and other
FF) Mbps (Megabits Per Second) services.
One million bits per second; a unit of measurement for
data transmission. UU) SSID (Service Set IDentifier)
Your wireless network's name.
GG)Meru
Manufacturer of our wireless access system. VV) Static IP Address
A fixed address assigned to a computer or device that is
HH)Network connected to a network.
A series of computers or devices connected for the pur-
pose of data sharing, storage, and/or transmission be- WW)Subnet Mask
tween users. An address code that determines the size of the network.
II) Packet XX) Switch
A unit of data sent over a network. 1. Device that is the central point of connection for com-
puters and other devices in a network, so data can be
JJ) Ping (Packet INternet Groper) shared at full transmission speeds. 2. A device for mak-
An Internet utility used to determine whether a particu- ing, breaking, or changing the connections in an electrical
lar IP address is online. circuit.
KK) PAP (Password Authentication Protocol) YY) TCP/IP (Transmission Control Protocol/Internet
A simple authentication protocol used to authenticate a Protocol)
user to a network access server; user names and pass- A network protocol for transmitting data that requires
words are sent as clear text. acknowledgement from the recipient of data sent.
LL) Port ZZ) Upload
1. The connection point on a computer or networking To transmit a file over a network.
device used for plugging in a cable or an adapter. 2. The
virtual connection point through which a computer uses AAA)URL (Uniform Resource Locator)
a specific application on a server. The address of a file located on the Internet.
MM)PPTP (Point-to-Point Tunneling Protocol) BBB)VPN (Virtual Private Network)
A VPN protocol that allows the Point to Point Protocol A security measure to protect data as it leaves one net-
(PPP) to be tunneled through an IP network. work and goes to another over the Internet.
NN)Preamble CCC)WLAN (Wireless Local Area Network)
Part of the wireless signal that synchronizes network A group of computers and associated devices that com-
traffic. municate with each other wirelessly.
OO)RADIUS (Remote Authentication Dial-In User
Service)
A protocol that uses an authentication server to control
References:
network access.
http://www.pchardware.co.uk/wirelessglossary.php
PP) RJ-45
An Ethernet connector that holds up to eight wires.
QQ)Roaming
The ability to take a wireless device from one access
point's range to another without losing the connection.
Wi r e l e s s N e t w o r k B o o t C a m p
Presented by Sarah Bombich
P a g e 16