The standard and guidelines described in this document will certain the uniformity of wireless network access points within the University.

You are watching: Cellular services use _______ to provide wireless connectivity to the internet.

Development of the Wireless Network Standard

The wireless networking equipment available supports differing levels of industry communication standards. At present, the IEEE 802.11b/g traditional is widely embraced throughout the industry and provides the important balance of range, network throughput, and also support for maker mobility to successfully serve many needs the the university community. As newer standards emerge, such as IEEE 802.11 improvements they will certainly be evaluated and also deployed must they sell security and throughput renovations over 802.11b/g.

It is the University's goal to sell the many advanced modern sirhenryjones-museums.org available while ensuring the the University ar benefits fromstable and reliable service. sirhenryjones-museums.org the will continue to evaluate available wireless network industry standards and equipment to ensure the the college meets this goal.


Wireless access Point

A wireless interactions hardware maker that creates a main point that wireless connectivity. A wireless accessibility point behaves lot like a "hub" in that the complete bandwidth is shared amongst all individuals for which the device is preserving an energetic network connection.

Wireless Port

A network harbor that has been installed to connecta wireless accessibility point come the University's wired network. Wireless ports carry out both data and also power organization to the wireless access point and also are clearly distinguished from simple network port by one affixed yellow warning label. Because wireless ports bring both data and electrical power, plain end-user devices could be severely damaged if castle are linked to this type of port.

Wireless customer software or developed in 802.1x supplicant

sirhenryjones-museums.org that provides customer software client that allowsa computer system to utilize 802.1x authentication come the wired and also wireless networks. Part operating equipment have built-in support for 802.1x and also can be used for accessing the University’s networks. The University-provided client software will be preconfigured to support the certain setup because that sirhenryjones-museums.orgNet Wi-Fi.

Coverage Area

The geographical area in which acceptable wirelessservice high quality is attainable. Coverage areas for similar devices deserve to vary considerably due to the visibility of building materials, interference, obstructions, and accessibility point placement.


Degradation of a wireless interaction radio signal led to by electromagnetic radiation from another resource including various other wireless access points, to move telephones, microwave ovens, medical and research equipment, and also other gadgets that create radio signals. Interference deserve to either degrade a wireless infection or completely eliminate it entirely depending upon the stamin of the signal created by the offending device.


The condition that is achieved by properly maintaining the confidentiality of personal, student, employee, and/or patient information transmitted over a wireless network.


Security is an especially important in wireless networks since data is sent making use of radio signals that, there is no implementation of particular data encryption mechanisms, can conveniently be intercepted.

Wireless Network Infrastructure

The collection of every wireless accessibility points, antennas, network cabling, power, ports, hardware, and also software associated with the deployment that a wireless communication network.

Wired identical Privacy (WEP)

A protection protocol because that wireless networks identified within the 802.11b standard. WEP is designed to carry out the same level of defense as the of a wired network. Recent reports indicate that the use of WEP alone is poor to ensure privacy unless provided in connect with various other mechanisms for data encryption.


Short for Wi-Fi safeguarded Access, a Wi-Fi typical that to be designed to improve upon the security attributes of WEP. This an innovation features enhanced data encryption v the temporal key integrity protocol (TKIP) and also user authentication through the extensible authentication protocol (EAP), PEAP – MSChapV2. sirhenryjones-museums.orgNet Wi-Fi uses the WPA protocol.


This standard enhances the protection of local area networks by giving an authentication framework enabling users to authenticate to a central authority, such together LDAP or active Directory. In conjunction through 802.11 access technologies, it gives an efficient mechanism because that controlling accessibility to the wireless local area network.


An extension to the 802.11 standard emerged by the IEEE for wireless network sirhenryjones-museums.org. 802.11a applies to wireless regional area networks and supports a preferably a maximum connect rate that 54 Mbps throughput in the 5GHz band. This specification is no backwardly compatible through 802.11b/g and also requires unique wireless adapters.


An extension to the 802.11 standard occurred by the IEEE for wireless network sirhenryjones-museums.org. 802.11b applies to wireless regional area networks and supports a maximum affix rate of 11 Mbps with fallback come 5.5, 2, and also 1 Mbps in the 2.4GHz ISM band. This standard was ratified in 1999.


An extension to the 802.11 conventional that allows for a maximum connect rate that 54 Mbps while maintaining compatibility with the 802.11b traditional in the 2.4GHz tape This specification is compatible and cost-free to the 802.11b standard.


An extension to the 802.11 conventional to carry out improved protection over that which is available under 802.11 extensions. This extension provides for enhanced encryption methods and also for the integration of the IEEE 802.1x authentication protocol as well as progressed encryption mechanisms such as AES(Advanced Encryption Standard), for an optional, completely compliant implementation of 802.11i.


Uses many transmitter and also receiver antennas (also known as multiple-input and also multiple-output, or MIMO) to permit for increased data throughput and range. This conventional was validated in2009. Pre-standard hardware is commercially obtainable and no compatible v sirhenryjones-museums.orgNet Wi-Fi.

Infrastructure Mode

The operating mode for wireless networks in which every end-user an equipment is configured come associate v a wireless network access point v which network services are accessed.

Ad Hoc Mode

The operating mode for wireless company in i beg your pardon end-user devices interact with each other in a "peer-to-peer" configuration. Ad hoc setting does not need the use of a wireless network accessibility point.


Prior come the surroundings of any kind of wireless devices, sirhenryjones-museums.org it will evaluation the consumption requirements for the area in question to recognize the optimum variety of wireless accessibility points needed to properly support all users in the area simultaneously. Space configuration, building materials, anticipated number of end-userdevices to be served, and also potential resources of radio frequencyinterference will be taken into consideration when conducting a site survey.

sirhenryjones-museums.org the will administer support for framework mode installations only. This installations call for at the very least one wireless accessibility point. Ad hoc wireless setting will not be supported.

In order to prevent problems caused by radio interference, come ensure the integrity of college resources, and also to certain the widest accessibility of dependable wireless networking services, the college shall continue to be the sole owner of every unlicensed spectrums the radio frequencies accessible for use on any type of of that campuses and also related properties.

Network Bandwidth

The best network bandwidth easily accessible through a single wireless accessibility point under the 802.11b/g standard is 54 Mbps and also is shared by every users associated to that access point. A traditional wired network port offers switched 100 Mbps devoted bandwidth.

On a wired network, throughput every user is higher because direct bandwidth vain is eliminated for customers of switched ports and a specialized 100 Mbps is allotted because that each user. Since wireless network access users re-superstructure the accessible bandwidth, network performance deserve to be diminished as extr wireless users attach to the accessibility point. Bandwidth intensive applications will diminish the obtainable shared bandwidth because that all individuals in the coverage area. Yes, really throughput in ~ wireless coverage locations will vary depending on the number of users and also the species of applications being offered on client computers. Client computers making use of 802.11b only adapters will certainly diminish the easily accessible bandwidth significantly due to the fact that of the way the 802.11b/g standard has actually been emerged to assistance backward compatibility. As such, sirhenryjones-museums.org that recommendsthat customer adapters assistance 802.11b/g together the preferred access method. Wireless network installations job-related well because that low-bandwidth activities, together as net browsing and also email. High-bandwidth activities, consisting of streaming video, MP3 sharing, and videoconferencing are most likely to result in reduced performance and should it is in discouraged by University units until market standards and equipment become easily accessible to support these activities. Present wireless network modern sirhenryjones-museums.org effectively permits from 15-25 users to utilize a single wireless access point properly despite seller claims that much bigger numbers the users have the right to associate v a single wireless accessibility point. Check out the Bandwidth intake Guideline section for added details.

Wireless Networking Guidelines


Integration of wireless network access points or various other wireless communications equipment to college of sirhenryjones-museums.orgsburgh network will just be performed by sirhenryjones-museums.org IT.

University students, faculty, staff, and units may purchase the Wi-Fi certified wireless network user interface adapters the their selection to attach end-user tools to the University's wireless networks.

University units will be compelled to remove any kind of wireless network infrastructure devices (Wi-Fi routersand bridges) not set up by sirhenryjones-museums.org IT.

Wireless network access points will certainly be connected to the University's wired network by method of a especially designated wireless harbor that will be mounted specifically because that this purpose. University units and individuals may not disconnect a wireless accessibility point indigenous its associated wireless harbor or interfere with any kind of components the the wireless AP assembly consisting of antennas, antenna cables, or monitoring cables. Wireless ports room specially configured come supply electric power come the wireless accessibility point and may cause permanent damages to an improperly connected end-user device.

Wireless network installations at University locations consist of the necessary Wi-Fi certified wireless accessibility point devices. The variety of access points forced will be established by initial estimates of need for users and the dimension of the area to be covered. If the variety of users to be offered exceeds the practical variety of users that can connect to solitary access allude with enough bandwidth easily accessible to every user, additional access points may be installed. In locations with a high thickness of users, such as classrooms and lecture halls, additional access points will certainly be set up to accomplish the usage requirements. Every wireless accessibility point gadgets will be installedand kept by sirhenryjones-museums.org IT.

Network Reliability

In order to ensure the trusted performance that the University's network, sirhenryjones-museums.org IT will investigate reports of particular wireless gadgets that are suspected of causing interference and performance problems in the same manner in i beg your pardon sirhenryjones-museums.org that investigates reports of certain devices connected to wired harbor that are suspected of resulting in disruption. Back sirhenryjones-museums.org IT will certainly not actively monitor content carried on the University's wireless network radio frequencies as soon as investigating reports of potentially interfering devices, wireless network detection tools will be used to finding unauthorized wireless network equipment. Units will be forced to remove any type of such equipment uncovered in unit-controlled college space.

Wireless access service is provided based top top theanticipated utilization data gathered during initial website surveys performed by sirhenryjones-museums.org IT. As the number of users increases, reliable wireless network performance might be diminished.

Current industry standards for wireless network organization do not provide sufficient throughput to properly support bandwidth-intensive applications and also network services. sirhenryjones-museums.org it prohibits the usage of serving-based applications (file, web, media servers) top top sirhenryjones-museums.orgNet Wi-Fi.

sirhenryjones-museums.org it will attend to problems encountered in the usage of wireless network services according come the following priority list: publicly access, academic, research, administrative, and staff use.


Access come the University's wireless networks will need all authorized users in all locations to authenticate come the network making use of their assigned college ComputingAccount username and also passwordthrough the use of University-provided wireless customer software or 802.1x supplicant.Network access logs will be kept containing the username, time of access, and also duration of use for all customers who access the network making use of wireless connections.This information and also will be noted to authorized governmental authorities if the college is compelled to relax such information.

Wireless an innovation deployed in ~ the university of sirhenryjones-museums.orgsburgh includes the usage of WPA (Wi-Fi protected Access), which offers improved data encryption with the temporal crucial integrity protocol (TKIP) and user authentication through the extensible authentication protocol (EAP). To provide extr security, all college wireless networks will call for authentication of finish users to the network upon connection of any type of wireless end user machine using an 802.1x supplicant or listed wireless client software. Every user will certainly be forced to authenticate to the network utilizing his or her university ComputingAccount and also password. The University's main Directory business will be provided as the basis because that authentication come services, consisting of wireless network access.

The use of WPA and also 802.1x because that user authentication will provide advanced protection levels for the activities of university wireless network users. Now that Temporal an essential Integrity Protocol (TKIP) and also even advanced Encryption conventional (AES)can be nearly deployed, sirhenryjones-museums.org it will stop supporting older, less secure security approaches at some point in the future. Reports have been published demonstrating the weaknesses in the WEP protocol and also stating the it should not be used to safeguard sensitive data, such together identifiable patient information, payroll, and also student data. V the usage of the more recent and an ext advanced encryption mechanisms and user authentication protocols, this weaknesses space mitigated. Although the protection of the wireless network is now as secure together the wired network, the university will avoid wireless access to these type of data when such data space stored top top protected central services. Devices using the wireless network in their areas for day-to-day operations will not it is in granted exceptions with the sirhenryjones-museums.org that firewalls to acquire native accessibility to sensitive information via sirhenryjones-museums.orgNet Wi-Fi there is no the usage of a VPN (sirhenryjones-museums.orgVPN or IPSec).

University students, faculty, staff, and also units have to follow the regards to all applicable college acceptable usage policies, network intake guidelines, and all applicable local, state, and federal regulations once using equipment associated to the University's network even if it is or no the individual is utilizing wireless or wired network connections. Violations of together guidelines will certainly be report to the University's computer incident an answer team and may be forwarded come the suitable University or governmental authorities.

University students, faculty, staff, and units must be conscious that the usage of wireless network connections may increase the danger that confidential information can be intercepted by innocuous or unintended parties. This danger in inherent in wireless network modern sirhenryjones-museums.org irrespective the security procedures that deserve to be imposed by the University. Users must avoid sending or receiving confidential or various other sensitive data via wireless connections whenever possible.

Wireless Usage

Some services deserve to have a an unfavorable impact ~ above a wireless network due to the fact that they create a high level of task on the network. Such services have the right to negatively impact your wireless network performance and the network performance of various other wireless users. The wireless network is a shared resource, which means the bandwidth available to each user the an accessibility point will decrease as high-bandwidth solutions are used. If a student, faculty member, or employee member has a require for a service that requires high bandwidth, a wired network link should be used.

The adhering to list provides examples of high bandwidth usage. Please note that this list is no all-inclusive.

You cannot use the computer system you have connected to the wireless network as a server of any type of kind, such as:

Web serversPeer-to-peer paper sharing serversFTP serversMultiplayer video game servers

An unsecured computer system may have difficulties that will certainly also an outcome in high bandwidth usage. The adhering to are examples of feasible problems:

Infections by worms or virusesCompromised equipment running ftp, IRC, or various other services or malicious spyware programs

Some tasks may likewise use excessive wireless bandwidth. The adhering to are some examples of user tasks that consume high quantities of bandwidth:

Reinstalling an operating systemDownloading and also installing applicationsPerforming mechanism backupsTransferring huge files (images, video, music, databases) to other systems


Problems can occur if other gadgets use the same radio frequency variety (2.4 GHz) together the wireless network. Since of the potential because that conflicts, it is essential for all customers to understand which technologies are permitted in our environment and which space not permitted.

In bespeak to administer wireless network company at the greatest level of quality, every non-client gadgets that usage the 2.4 GHz variety should be gotten rid of from service in any kind of University building. Only devices that are component of the sirhenryjones-museums.orgNet Wi-Fi network will certainly be permitted to usage the 2.4 GHz range.

This consists of any device that is used as a wireless base station or router, such as the to apologize Airport base Station, or any kind of other wireless router. Cordless phones, cameras, and also audio speaker that use the frequency band of 2.4 GHz or 5 GHz should likewise not be supplied in areas with wireless coverage.

If friend think you have an existing mechanism that might use 2.4 GHz radios for transmission, please call the 24/7 IT help Desk at 412-624-HELP(4357)to determine if such devices will interfere through wireless network service in her area.

sirhenryjones-museums.org it Responsibilities

Development and also maintenance that the wireless standard and also wireless guidelines.Installation and maintenance of all tools supporting wireless network organization at the university of sirhenryjones-museums.orgsburgh.Investigation and resolution the wireless interaction interference problems.Deployment, management, and also configuration of wireless network access in windy areas, classrooms, and also office areas.Development and also implementation that wireless network protection protocols and practices.Provision of user cultivate on wireless network defense issues and also acceptable usage of wireless network services.Performance and security surveillance for all installed wireless access points and provision of performance statistics to University units upon request.Monitoring the the development of wireless network technologies and also evaluation of your potential usage within the University's wireless infrastructure.Responding to troubles reported come the 24/7 IT assist Desk in accordance through standard procedures and levels the service.

See more: Someone Opening A Door - Person Opening Door High Res Stock Images

Wireless User Responsibilities

Adherence to the wireless network standard and also related guidelines and policies developed by the university of sirhenryjones-museums.orgsburgh.Implementation that recommended defense software, hardware settings, patches, and protocols ~ above end-user equipment used to accessibility the University's wireless networks.Following all appropriate University policies and procedures in addition to federal, state, and local legislations pertaining to the security of sensitive and also confidential data as soon as working through such data top top the University's wireless networks.Installation the wireless network user interface adapters according to published instructions.Assumption of obligation for support and troubleshooting of troubles when using wireless network user interface adapters not supported by sirhenryjones-museums.org IT.Immediately reporting recognized misuse or abuse of the wireless network or linked equipment to the 24/7 IT aid Desk.