SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
W A S H I N G T O N                 U N I V E R S I T Y
                  Unive r s ity Lib r a r ie s




   WIRELESS NETWORK BOOT CAMP
   UNDERSTANDING THE UNIVERSITY’S WIRELESS NETWORK




                       Sarah Bombich

                  Friday, January 29, 2010
Table of Contents
What is a network?
                                                                            1
      Parts of a Network
                                                                      1

How does Wi-Fi work?
                                                                          2
      What Is Wi-Fi?
                                                                          2
      What are the different types of Wi-Fi?
                                                  2

What happens when I “get on wireless”?
                                                        3
      What is encryption?
                                                                     4

Wash U’s Wireless Network in Action
                                                           5
      Who can use the University wireless network?
                                            5
      What are the differences between WUFI, WUFI-S, and WUNOREG?
                             6
      Which network is being used by most people? Why?
                                        7
      Are WUFI and WUFI-S used on the South Forty?
                                            7
      Where else is the wireless network available on campus?
                                 7
      What happens when I connect to WUFI?
                                                    8

What should I expect when I connect to WUFI?
                                                  9

What should I expect when I connect to WUFI-S?
                                               11

Troubleshooting a WIFI Connection
                                                            12
      WUFI & WUFI-S: Cannot find the network
                                                  12
      WUFI only: Trouble getting to or past the authentication page
                          12
      WUFI & WUFI-S: Appears connected a network but cannot load or connect to any-
      thing
                                                                       13
      Where can we get more help?
                                                            14

Glossary
                                                                                     15

Wi r e l e s s N e t w o r k B o o t C a m p
                          Presented by Sarah Bombich


                                                        i
fabric, you greatly simplify management. More importantly, you ensure an open environment that can accommodate
                                                                                                 multiple vendors, new solutions and future flexibility.




                                                What is a network?
“A system containing any combination of computers, computer terminals, printers, audio or visual display devices, or telephones
interconnected by telecommunication equipment or cables: used to transmit or receive information.1”

Parts of a Network
The Internet. The worldwide                                                                                                         Internet
computer network, comprised
                                                                                                                                                             SANbox ®
of many smaller networks con-                                                                                                                                The new look for powerful, easy to manage fabrics

nected to each other. Informa-                                                                                                                               • SANbox 9000 Stackable Chassis Switch
                                                                                                                                                             • SANbox 8000 Storage Services Platform
tion you receive via computer                                                                                                                                • SANbox 6000 Intelligent Storage Router
                                                                                                                                                             • SANbox 5000 Stackable Switch
network that is not from Wash
                                                                                                                                                             • SANbox 1000 Fixed Port Switch
U is from the Internet.                                                                                                                         Network Backbone
                                                                                                                                                (or Modem, at
Network Backbone (Modem). This                                                                                                                  home)
device talks to an Internet Serv-
ice Provider and sends infor-
                                                                                                                                                Router
mation and information re-
                                                                                                                                                (may be skipped
quests back and forth to the rest                                                                                                               at home)
of the Internet.

Router. This device allows mul-
tiple devices or computers to
share a single Internet connec-
tion. It ensures that the correct
data gets to and from each de-
vice. At Wash U, it generally
refers to wired connections. At
home, it can be wired only,
wireless only, or both.
                                                                                  Wireless
                                                                                Access Point
Wireless Access Point. Converts
the data sent over wires to a
wireless signal that can be re-
ceived by computers and de-
vices with compatible wireless
cards. Every access point has at
least one name (or SSID) that it
broadcasts, such as WUFI and
WUFI-S.

Server. This is a general term for
a computer that has no one
sitting at it; most of its communication is to other computers. For example, a web server sends data to other comput-
ers using the Internet.

Client Computer, Computer, or Workstation. This is a general term for a computer that has someone sitting in front of it,
using it. For example, computers in a computer lab are workstations.


1 network. (n.d.). Dictionary.com Unabridged (v 1.1). http://dictionary.reference.com/browse/network

Wi r e l e s s N e t w o r k B o o t C a m p
                                                                         Presented by Sarah Bombich


                                                                     Page 1
How does Wi-Fi work?
What Is Wi-Fi? 2

  A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across
a wireless network is a lot like two-way radio communication. Here's what happens:

  1. A computer's wireless adapter translates data into a radio signal and transmits it using an antenna.

  2. A wireless router receives the signal and then sends the information to the Internet using a physical, wired Eth-
      ernet connection.

The process also works in reverse, with
the router receiving information from the
Internet, translating it into a radio signal
and sending it to the computer's wireless
adapter.

The signal from each wireless device is
circular and can be visualized as a rock
dropping in the center of a pond. The
waves spread out from the wireless de-
vice, like waves in the water, and get
weaker the farther you get from the de-
vice. Different devices create signals of
different strengths and have antennas of
different strengths; just because one lap-
top gets a wireless signal in a given loca-
tion, you cannot assume that all laptops
will be able to detect a signal at the same
location.

The radios used for Wi-Fi communica-
tion are very similar to the radios used for
walkie-talkies, cell phones and other devices. Note that Wi-Fi radios use a different part of the radio wave spectrum
and have special networking standards.

                                     What are the different types of Wi-Fi?

                                     Most Wi-Fi in use is 802.11, which is a name created by the IEEE (Institute of Electrical and
                                     Electronics Engineers) standards board to describe signals traveling within a certain part of
the wireless spectrum. As technology changes, the standard has been modified slightly which is designated by add-
ing letters to the end (802.11a, 802.11b, 802.11g, 802.11n). There is a Wi-Fi standards board which certifies all wireless
access points and devices to ensure that that can successfully interoperate. WUFI/WUFI-S is an 802.11a/b/g net-
work; all devices that support those standards will work. 802.11n devices are the newest and generally backwards
compatible with a/b/g networks (check with the device manufacturer to be sure).

2 This section adapted from How Stuff Works. http://computer.howstuffworks.com/wireless-network1.htm

Wi r e l e s s N e t w o r k B o o t C a m p
                                                          Presented by Sarah Bombich


                                                                    Page 2
What happens when I “get on wireless”?
                                           Networking as a Phone Call
                                                                           Join wireless network
                                   Locate the phone
                                                                           or plug into ethernet




                                                                             Say hello to DHCP
                                  Pick up the phone
                                                                                  server




                                                                            Listen for response
                                     Hear dial tone
                                                                             from DHCP server




                                 Dial number & hear                         Request IP address
                                      phone ring                             from DHCP server




                                  Someone answers                           Receive IP address
                                                                            from DHCP server




                        You ask their name and ask a                   Wireless access point asks for
                       question to verify it's the correct            and you provide user name and
                                    person                                       password



                                Optional: WUFI-S only                      Optional: WUFI-S only


                                                                        Special software creates an
                                                                                                        skips step
       skips step




                      You tell person the code language               encrypted connection between
                                                                                                           WUFI
          WUFI




                               in which to speak                      your computer and the wireless
                                                                                access point



                                                                             Start sending and
                                 Have a conversation
                                                                               receiving data


Wi r e l e s s N e t w o r k B o o t C a m p
                                           Presented by Sarah Bombich


                                                             Page 3
What is authentication? 3
Authentication is “the process of determining whether someone or something is, in fact, who or what it is declared to
be.” To access the wireless network, among other technologies, at Washington University, you must provide such
proof of identity. “In private and public computer networks (including the Internet), authentication is commonly
done through the use of login passwords or passphrases; knowledge of such is assumed to guarantee that the user is
authentic. Thus, when you are asked to "authenticate" to a system, it usually means that you enter your username
and/or password for that system.“

What is encryption?

Encryption is the encoding of data to prevent it from being read by unauthorized people. Think of pig latin - you take
a word and change it around a little bit so that it is hard to understand if you don’t know what you’re listening for.
Encryption is similar in that only the sender and receiver have the keys needed to unscramble the data in order to use
it. Given enough time and effort, encryption can be broken, but it is much better than using no encryption at all.




3All authentication quotes from http://kb.iu.edu/data/alqk.html

Wi r e l e s s N e t w o r k B o o t C a m p
                                              Presented by Sarah Bombich


                                                                  Page 4
Wash U’s Wireless Network in Action
How does Wash U’s wireless
network work?
                                                                 Internet
Our wireless network runs on
                                                                                 SANbox ®
Meru Networks access points,                                                     The new look for powerful, easy to manage fabrics

which are also used in airports                                                  • SANbox 9000 Stackable Chassis Switch
                                                                                 • SANbox 8000 Storage Services Platform
and other large-scale commercial                                                 • SANbox 6000 Intelligent Storage Router
                                                                                 • SANbox 5000 Stackable Switch
settings as well as other universi-                                              • SANbox 1000 Fixed Port Switch

ties.                                                                  Network Backboone


There are multiple access points in
the library and any given physical
location may have coverage from                                         Router
multiple access points (see dia-
gram on page 2). The access
points are installed to provide
maximum coverage, though there
are some areas without coverage.
The library provides coverage
maps on its website.

Each access point in the library
provides access to the University
network. All connect to the same                                                                                                     Authentication
                                                                                                                                     Server
network -the Internet- but the
various network names describe
the security type of each kind of
                                                                        Wireless
connection and which protocols                                        Access Point
are allowed.

The Meru access points are auto-
matically load balancing (when
one access point has lots of people
connected it decreases its signal
strength and other access points in
the area increase their signal
strength in order to move people away from the over-used access point). They also allow handoffs between access
points when people are moving around the building. To the user, the multiple access points all look like one big
super-access point.

Who can use the University wireless network?

The only people allowed to use the University’s wireless networks are current students, faculty, and staff with a
WUSTL key. In order to use the wired network, one must authenticate with a WUSTL key. Individuals affiliated with


Wi r e l e s s N e t w o r k B o o t C a m p
                                                           Presented by Sarah Bombich


                                                        Page 5
the Law and Medical School have access to the wireless networks using authentication provided by their respective
schools (not WUSTL key). Visitors do have limited wireless access but it is unsupported.




What are the differences between WUFI, WUFI-S, and WUNOREG?


                                      WUFI          WUFI-S        GUESTWIFI-     WUNOREG            LAW-S        WUCON
                                                                    WUSTL                                        WIRELESS

  What can you                  View web         Everything       Everything,    View web        cannot test;   cannot test;
  do?*                          pages, SSH,                       but number     pages with      “allows ac-    “allows
                                SFTP                              of connec-     browser; “for   cess to Law    Medical
                                                                  tions and      special ma-     specific re-    School login
                                                                  speed lim-     chine appli-    sources1”      access to the
                                                                  ited           cations1”                      Internet1”

  What doesn’t                  FTP, non-        Nothing          Nothing -      Everything      Unknown,       Unknown,
  work*                         secure email                      but could be   but web         cannot test    cannot test
                                transfers                         very slow or   browsing
                                (POP, IMAP),                      unavailable,
                                Remote                            depending
                                Shell, telnet                     on usage

  Does it require               Yes, via a       Yes              No             No              Yes            Yes
  authentication?               web browser

  Do you have to                Yes, must        No               No, never      No, never       Probably no,   Probably no,
  enter your login              authenticate                                                     cannot test    cannot test
  and password                  through web
  every time you                browser first
  connect?

  Do you have to                No               No               No             No              Probably       Probably
  install special                                                                                same as        same as
  software to use                                                                                WUFI-S,        WUFI-S,
  it?                                                                                            cannot test    cannot test

  Is your data en-              No               Yes              No             No              Yes            Yes
  crypted and se-
  cure?

  Who can access                Students,        Students,        Everyone,      Everyone,       Individuals    Individuals
  it?                           faculty, staff   faculty, staff   including      including       affiliated      affiliated
                                via WUSTL        via WUSTL        visitors       visitors        with the Law   with the
                                key              key                                             School         Med School


1Information       from NSS: http://nss.wustl.edu/node/8
*Note that this information is not well-documented and may be slightly incorrect
Wi r e l e s s N e t w o r k B o o t C a m p
                                                      Presented by Sarah Bombich


                                                                    Page 6
Which network is being used by most people? Why?

In past years, WUFI was widely used but WUFI-S was not. However, with the creation of WUSTL key and the adop-
tion of WUFI-S on the South Forty coupled with some changes to STS policy regarding device registration, most stu-
dents arrive at the Library with their laptops correctly configured to use WUFI-S. However, students that live off
campus are less likely to be set up to use WUFI-S.

Ultimately, our users are better served by connecting to WUFI-S instead of WUFI due to the ease of use after initial
setup (don’t have to enter username and password every time) and the increased level of security it offers. However,
setup takes more time the first time one connects to WUFI-S.



Are WUFI and WUFI-S used on the South Forty?

Any student that has used wireless on the South Forty has already used WUFI-S and has all the necessary software
installed.




Where else is the wireless network available on campus?

See http://nss.wustl.edu/sites/default/files/wufi-coverage.png




Wi r e l e s s N e t w o r k B o o t C a m p
                                             Presented by Sarah Bombich


                                                        Page 7
What happens when I connect to WUFI?

                          What You're Doing                                         What Your Computer is Doing

               Enable wireless, check list of available                               Look for wireless signals from other
                             networks                                                                devices




                          Select WUFI and connect                                           Say hello to DHCP server




                             Open a web browser                                      Listen for response from DHCP server




                       Attempt to open a web page                                    Request IP address from DHCP server




               Redirected to WUFI authentication page                                Receive IP address from DHCP server




                  You enter username and password.                                  Wireless access point asks for and you
                             Press enter.                                             provide user name and password


                                                                                           Access point checks your
                                                                                       username@domain and password
                                      You wait
                                                                                       against master list (authentication
                                                                                                    server)
                                                    No Match                                                    No Match
                 Match Found                                                          Match Found
                                                    on Server                                                   on Server

            You are redirected                  You are taken back
             to the page you                                                       Start sending and        No data will be
                                                      to the
              first asked for                   authentication page                  receiving data         sent or received




            You are now                         You are not connected                You are now            Only have access to
         connected to WUFI.                     to WUFI. You can retry            connected to WUFI.        authentication page
          Use the Internet.                          or give up.                   Use the Internet.          until successful.

Wi r e l e s s N e t w o r k B o o t C a m p
                                                              Presented by Sarah Bombich


                                                                         Page 8
What should I expect when I connect to WUFI?
      1.     Enable wireless, check list of available networks. Select WUFI and Connect or Join.




      2.     Your system will automatically be assigned an IP address on the University wireless network. Open your
             web browser. and attempt to open a web page.




      3.     You will see certificate errors. Select “Accept this certificate permanently” and OK and then OK on the next
             screen.




Wi r e l e s s N e t w o r k B o o t C a m p
                                                Presented by Sarah Bombich


                                                            Page 9
Note: These prompts might be slightly different on different browsers. Some require only one OK, some might want you to click
on “Continue.”As long as the certificate says something about wustl.edu or Meru Networks, it is safe to assume it is legitimate.

      4.     You are redirected to the WUFI authentication page.




      5.     Enter user name and password. Click Login. You wait. Some browsers will take you straight to the web page
             requested in step 2; some will first show a Web Authentication Succeeded pop-up or screen.




Wi r e l e s s N e t w o r k B o o t C a m p
                                                    Presented by Sarah Bombich


                                                            P a g e 10
What should I expect when I connect to WUFI-S?
Sample help sheet from Student Technology Services. See http://sts.wustl.edu/index.php/Wireless-setup.html for
up-to-date directions for iPhone & iPod Touch, Mac OS X 10.5 Leopard, Windows Vista & XP. More directions can be
found on NSS’s web page at http://nss.wustl.edu/node/8.




              Connecting to WUFI-S
              Mac OS X (10.5.x)                                                                    Gregg Hall Store Front
                                                                                                   http://sts.wustl.edu
                                                                                                                                      935-7100 (help desk)
                                                                                                                                        AIM: WUSTSHelp


               What You Will Do:                                                                  What You Will See:
              We strongly recommend you first:                                             Step 1: Airport Icon and List of Wireless Networks
                    !   Connect your computer to the WIRED network FIRST
                        AND REGISTER
                    !   Install all Apple updates
                                        rd
                    !   If you have a 3 party wireless configuration on your
                        computer, we recommend REMOVING that software
                        before using these instructions!
              1.    Click the “Airport” icon near the top-right of your screen.
                    When the list of available wireless networks appears, select
                    WUFI-S.
              2.    Enter your WUSTL-KEY username and password. Click OK.
              3.    When asked to verify the security certificate, click on “Show           Step 2: WUSTL KEY Username and Password
                    Certificate.”
              4.    Click the small button labeled “Always trust accounts-
                    dc1.account.ad.wustl.edu”. Click “Continue.”
              5.    When prompted for a password to save the certificate, enter
                    the username and password for your computer’s user logon
                    account. Click “Ok.”
                   REGISTERING YOUR COMPUTER FOR USE IN RESIDENTIAL
                                 LIVING SPACES/HALLS:
                                                                                                       Step 3: Show Certificate
              Once you have connected your computer to WUFI-S, you will
              need to register it on the STS Network in order to use it in the
              residential living spaces/halls. Follow these steps to register on
              the STS network:
              a.    Be sure you are connected to WUFI-S and open a web
                    browser.
              b.    Navigate to a page, such as www.google.com                                     Step 4: Always Trust XX Button
              c.    You will be automatically redirected to the registration page
                    for the STS network.
              d.    At the bottom of the page, click “Regular full time students
                    using their WUSTL KEY.”
              e.    The registration page will appear. Complete the form using
                    your WUSTL key and contact information. When finished,
                    click “Register.”
              f.    You will get a confirmation that registration is complete.
                    Close your web browser.
              g.    Reboot your computer. You are now registered on the STS
                    network!
                                                                                          Step 5: Computer’s User Logon Account Info




Wi r e l e s s N e t w o r k B o o t C a m p
                                                                               Presented by Sarah Bombich


                                                                             P a g e 11
Troubleshooting a WIFI Connection
If someone cannot connect to the wireless network, the problem is most likely to be one of the following:
      • Lack of physical wireless coverage
      • Wireless disabled on their laptop
      • Trouble getting to the authentication page
      • Trouble getting past the authentication page which is a login/password issue
      • Appears connected but cannot load any web pages which is a capacity issue

WUFI & WUFI-S: Cannot find the network

      • Lack of physical wireless coverage

             • Find out if the person has successfully connected at that location previously (Note: this is not a guarantee
               that they will always connect successfully there, but it means that is not likely a coverage issue.)

             • Determine network coverage by checking the library’s wireless coverage maps located on the library web
                site (see http://library.wustl.edu/about/techinfo/computing-olin-maps.html ).

             • If it appears that the area should have a wireless signal, you can check to ensure that the wireless network
               is fully functional by checking the SOS status page (
                http://library.wustl.edu/about/techinfo/access-point-status.py ).

      • Wireless disabled on their laptop

             • Even if the person has successfully connected before, their wireless adapter might be disabled. Make sure

                wireless in enabled by right-clicking on the wireless icon in the system tray (Win)      or by turning on

                Airport in the top-right corner of the menu bar (Mac)      . If this doesn’t fix it, more extensive configura-
                tion and troubleshooting may be needed. See “Where can we get more help?” below.

WUFI only: Trouble getting to or past the authentication page

      You might be redirected to a blank page, or, you’re not redirected at all, and your computer just says it cannot
      load a page. Other times, a login and password are entered but you are taken back to the same login page. Here
      are some things you can try to get online:
      •      Try manually entering the authentication page address into a web browser and then authenticating:
             https://meruct9.wufi.wustl.edu:8081/vpn/loginformWebAuth.html
      •      Try using a different web browser. Firefox often works best. If Firefox is not installed, it can be downloaded
             onto a flash drive ( http://www.getfirefox.com )and quickly installed.

      •      Try loading a web page again - it might have worked but sent you back to the authentication page in error.
      •      If none of these things work, the person’s username or password might be incorrect. Use the available tools
             to ensure that their WUSTL key is correct.
      •      If it still won’t work, try to set up WUFI-S. If time is short, GUESTWIFI-WUSTL can be used as a short term
             fix. It is not recommended as a long-term solution due to capacity, speed and security issues.




Wi r e l e s s N e t w o r k B o o t C a m p
                                                  Presented by Sarah Bombich


                                                            P a g e 12
WUFI & WUFI-S: Appears connected a network but cannot load or connect to anything

      If the library is especially busy, it is possible that people will be unable to connect to the wireless network. There
      is a limit to the number of connected devices that the network can support. Although capacity has been in-
      creased recently, it is possible that students will be unable to connect.

      Unfortunately, if we are truly over capacity, there isn’t much to do. However, they can try:
      •      Changing locations. Each access point has its own pool of network addresses and ones in popular places like
             Whispers are most likely to be full. It may be possible that ones in less-busy areas, like the Arc, would work.

      •      Keep retrying to connect. As addresses become available, they might be lucky and get one.
      •      If this problem is seen, please report it to SOS so that they can collect data to pass on to NSS. See
             http://library.wustl.edu/about/techinfo/computing-wireless-report.html




Wi r e l e s s N e t w o r k B o o t C a m p
                                                    Presented by Sarah Bombich


                                                             P a g e 13
Where can we get more help?

      •      The Arc can help set up WUFI-S connections and perform some basic troubleshooting of laptops. Most Arc
             student employees have laptops and are comfortable helping people perform basic troubleshooting. If you
             would like to refer someone with a wireless issue to the Arc, best practice is to IM our desk at OlinLi-
             braryArc or call at 5-4137 to ensure that we are available and able to handle the situation. If not, a direct re-
             ferral to STS might be needed.
      •      The official point of support for students is the Student Technology Services Help Desk (STS) on the South
             Forty (on just the other side of Forsyth, across from the Music Library and next to Cornerstone). You can
             contact them via phone (935-7100) or AIM (WUSTSHelp).
      •      The official point of support for all others is through their schools. NSS maintains a list of that contact in-
             formation at http://nss.wustl.edu/node/232 .
      •      If all else fails, the Arc and Circulation can check out an ethernet cable to give the person Internet access.




Wi r e l e s s N e t w o r k B o o t C a m p
                                                    Presented by Sarah Bombich


                                                              P a g e 14
Glossary
A) 802.11a                                                       N) Domain
An IEEE wireless networking standard that specifies a             A specific name for a network of computers.
maximum data transfer rate of 54Mbps and an operating
frequency of 5GHz.                                               O) Download
                                                                 To receive a file transmitted over a network.
B) 802.11b
An IEEE wireless networking standard that specifies a             P) Dynamic IP Address
maximum data transfer rate of 11Mbps and an operating            A temporary IP address assigned by a DHCP server.
frequency of 2.4GHz.                                             Q) EAP (Extensible Authentication Protocol)
C) 802.11g                                                       A general authentication protocol used to control net-
An IEEE wireless networking standard that specifies a             work access. Many specific authentication methods work
maximum data transfer rate of 54Mbps, an operating               within this framework.
frequency of 2.4GHz, and backward compatibility with
                                                                 R) EAP-TTLS (EAP-Tunnelled Transport Layer Secu-
802.11b devices.
                                                                      rity)
D) Access Point                                                  An authentication method that uses digital certificates.
Device that allows wireless-equipped computers and               After the server is securely authenticated to the client, the
other devices to communicate with a wired network.               server can then use the established secure connection
Also used to expand the range of a wireless network.             ("tunnel") to authenticate the client.

E) Adapter                                                       S) Encryption
This is a device that adds network functionality to your         Encoding data to prevent it from being read by unauthor-
PC.                                                              ized people.

F) Authentication                                                T) Ethernet
Authentication is the process of validating a user before        An IEEE standard network protocol that specifies how
allowing access to digital resources, often accomplished         data is placed on and retrieved from a common transmis
by comparing a username and password against those
                                                                 U) Firewall
listed in a database.
                                                                 Security measures that protect the resources of a local
G) Bandwidth                                                     network from intruders.
The transmission capacity of a given device or network.
                                                                 V) Gateway
H) Bit                                                           A system that interconnects networks.
A binary digit.
                                                                 W) IEEE (The Institute of Electrical and Electronics
I) Bridge                                                            Engineers)
A device that connects two different kinds of local net-         An independent institute that develops networking stan-
works, such as a wireless network to a wired Ethernet            dards.
network.
                                                                 X) Infrastructure
J) Database                                                      Currently installed computing and networking equip-
A collection of data that is organized so that its contents      ment.
can easily be accessed, managed, and updated.
                                                                 Y) IP (Internet Protocol)
K) Default Gateway                                               A protocol used to send data over a network.
A device that forwards Internet traffic from your local
                                                                 Z) IP Address
area network.
                                                                 A numerical address used to identify a computer or de-
L) DHCP (Dynamic Host Configuration Protocol)                     vice on a network.
A protocol that lets one device on a local network, known
                                                                 AA) IPSec (Internet Protocol Security)
as a DHCP server, assign temporary IP addresses to the
                                                                 A VPN protocol used to implement secure exchange of
other network devices, typically computers.
                                                                 packets at the IP layer.
M) DNS (Domain Name Server)
                                                                 BB) ISM band
The IP address of your ISP's server, which translates the
                                                                 Radio band used in wireless networking transmissions.
names of websites into IP addresses.


Wi r e l e s s N e t w o r k B o o t C a m p
                                                  Presented by Sarah Bombich


                                                           P a g e 15
CC) ISP (Internet Service Provider)                              RR) Router
A company that provides access to the Internet.                  A networking device that connects multiple networks
                                                                 together, such as a local network and the Internet.
DD)LAN (Local Area Network)
The computers and networking products that make up               SS) Secure W2
the network in your home or office.                               Software used to create a WUFI-S connection on a Win-
                                                                 dows laptop.
EE) MAC (Media Access Control) Address
The unique address that a manufacturer assigns to each           TT) Server
networking device.                                               Any computer whose function in a network is to provide
                                                                 user access to files, printing, communications, and other
FF) Mbps (Megabits Per Second)                                   services.
One million bits per second; a unit of measurement for
data transmission.                                               UU) SSID (Service Set IDentifier)
                                                                 Your wireless network's name.
GG)Meru
Manufacturer of our wireless access system.                      VV) Static IP Address
                                                                 A fixed address assigned to a computer or device that is
HH)Network                                                       connected to a network.
A series of computers or devices connected for the pur-
pose of data sharing, storage, and/or transmission be-           WW)Subnet Mask
tween users.                                                     An address code that determines the size of the network.

II) Packet                                                       XX) Switch
A unit of data sent over a network.                              1. Device that is the central point of connection for com-
                                                                 puters and other devices in a network, so data can be
JJ) Ping (Packet INternet Groper)                                shared at full transmission speeds. 2. A device for mak-
An Internet utility used to determine whether a particu-         ing, breaking, or changing the connections in an electrical
lar IP address is online.                                        circuit.
KK) PAP (Password Authentication Protocol)                       YY) TCP/IP (Transmission Control Protocol/Internet
A simple authentication protocol used to authenticate a              Protocol)
user to a network access server; user names and pass-            A network protocol for transmitting data that requires
words are sent as clear text.                                    acknowledgement from the recipient of data sent.
LL) Port                                                         ZZ) Upload
1. The connection point on a computer or networking              To transmit a file over a network.
device used for plugging in a cable or an adapter. 2. The
virtual connection point through which a computer uses           AAA)URL (Uniform Resource Locator)
a specific application on a server.                               The address of a file located on the Internet.

MM)PPTP (Point-to-Point Tunneling Protocol)                      BBB)VPN (Virtual Private Network)
A VPN protocol that allows the Point to Point Protocol           A security measure to protect data as it leaves one net-
(PPP) to be tunneled through an IP network.                      work and goes to another over the Internet.

NN)Preamble                                                      CCC)WLAN (Wireless Local Area Network)
Part of the wireless signal that synchronizes network            A group of computers and associated devices that com-
traffic.                                                          municate with each other wirelessly.

OO)RADIUS (Remote Authentication Dial-In User
    Service)
A protocol that uses an authentication server to control
                                                                 References:
network access.
                                                                 http://www.pchardware.co.uk/wirelessglossary.php
PP) RJ-45
An Ethernet connector that holds up to eight wires.

QQ)Roaming
The ability to take a wireless device from one access
point's range to another without losing the connection.




Wi r e l e s s N e t w o r k B o o t C a m p
                                                 Presented by Sarah Bombich


                                                           P a g e 16

Weitere ähnliche Inhalte

Was ist angesagt?

Gunnar Alcatel Lucent Open Networks
Gunnar   Alcatel Lucent   Open NetworksGunnar   Alcatel Lucent   Open Networks
Gunnar Alcatel Lucent Open Networksandrewmac101
 
Gunnar Florus - Manchester
Gunnar Florus - ManchesterGunnar Florus - Manchester
Gunnar Florus - ManchesterMarit Hendriks
 
OFC/NFOEC: Network Transformation
OFC/NFOEC: Network TransformationOFC/NFOEC: Network Transformation
OFC/NFOEC: Network TransformationADVA
 
Building the Mobile Internet
Building the Mobile InternetBuilding the Mobile Internet
Building the Mobile InternetKlaas Wierenga
 
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarloDeprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarloMundo Contact
 
From Selling Technology to Selling Value (2008)
From Selling Technology to Selling Value (2008) From Selling Technology to Selling Value (2008)
From Selling Technology to Selling Value (2008) Marc Jadoul
 
Globální zkušenosti s LTE - Ladislav Možný, T-Mobile
Globální zkušenosti s LTE - Ladislav Možný, T-MobileGlobální zkušenosti s LTE - Ladislav Možný, T-Mobile
Globální zkušenosti s LTE - Ladislav Možný, T-MobileTUESDAY Business Network
 
201212 luceor-ports
201212 luceor-ports201212 luceor-ports
201212 luceor-portsN2Gr8LTD
 
LTE: Building New Killer Apps
LTE: Building New Killer AppsLTE: Building New Killer Apps
LTE: Building New Killer AppsMarko Gargenta
 
Falk von bornstaedt networks perspectives and analysis in the future intern...
Falk von bornstaedt   networks perspectives and analysis in the future intern...Falk von bornstaedt   networks perspectives and analysis in the future intern...
Falk von bornstaedt networks perspectives and analysis in the future intern...ictseserv
 
Hands On CloudFoundry
Hands On CloudFoundryHands On CloudFoundry
Hands On CloudFoundryEric Bottard
 
4G iPhone Platform by Open Wireless Architecture
4G iPhone Platform by Open Wireless Architecture4G iPhone Platform by Open Wireless Architecture
4G iPhone Platform by Open Wireless ArchitectureWillie LU
 
Widyatama.lecture.applied networking.iv-week-09-voip
Widyatama.lecture.applied networking.iv-week-09-voipWidyatama.lecture.applied networking.iv-week-09-voip
Widyatama.lecture.applied networking.iv-week-09-voipDjadja Sardjana
 
Spain Getting Ready For Cloud Computing
Spain Getting Ready For Cloud ComputingSpain Getting Ready For Cloud Computing
Spain Getting Ready For Cloud ComputingCarlos Domingo
 
Wi Max Lte Tribal Presentation.
Wi Max Lte Tribal Presentation.Wi Max Lte Tribal Presentation.
Wi Max Lte Tribal Presentation.Ian Lenathen
 

Was ist angesagt? (19)

Gunnar Alcatel Lucent Open Networks
Gunnar   Alcatel Lucent   Open NetworksGunnar   Alcatel Lucent   Open Networks
Gunnar Alcatel Lucent Open Networks
 
Gunnar Florus - Manchester
Gunnar Florus - ManchesterGunnar Florus - Manchester
Gunnar Florus - Manchester
 
Asr 9000-line-cards
Asr 9000-line-cardsAsr 9000-line-cards
Asr 9000-line-cards
 
Concept of Shadow Network
Concept of Shadow NetworkConcept of Shadow Network
Concept of Shadow Network
 
OFC/NFOEC: Network Transformation
OFC/NFOEC: Network TransformationOFC/NFOEC: Network Transformation
OFC/NFOEC: Network Transformation
 
Building the Mobile Internet
Building the Mobile InternetBuilding the Mobile Internet
Building the Mobile Internet
 
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarloDeprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
Deprimido por tu cuenta de roaming? Ven y conoce cómo superarlo
 
From Selling Technology to Selling Value (2008)
From Selling Technology to Selling Value (2008) From Selling Technology to Selling Value (2008)
From Selling Technology to Selling Value (2008)
 
LTE Evolution
LTE EvolutionLTE Evolution
LTE Evolution
 
Globální zkušenosti s LTE - Ladislav Možný, T-Mobile
Globální zkušenosti s LTE - Ladislav Možný, T-MobileGlobální zkušenosti s LTE - Ladislav Možný, T-Mobile
Globální zkušenosti s LTE - Ladislav Možný, T-Mobile
 
201212 luceor-ports
201212 luceor-ports201212 luceor-ports
201212 luceor-ports
 
Big Data Smarter Networks
Big Data Smarter NetworksBig Data Smarter Networks
Big Data Smarter Networks
 
LTE: Building New Killer Apps
LTE: Building New Killer AppsLTE: Building New Killer Apps
LTE: Building New Killer Apps
 
Falk von bornstaedt networks perspectives and analysis in the future intern...
Falk von bornstaedt   networks perspectives and analysis in the future intern...Falk von bornstaedt   networks perspectives and analysis in the future intern...
Falk von bornstaedt networks perspectives and analysis in the future intern...
 
Hands On CloudFoundry
Hands On CloudFoundryHands On CloudFoundry
Hands On CloudFoundry
 
4G iPhone Platform by Open Wireless Architecture
4G iPhone Platform by Open Wireless Architecture4G iPhone Platform by Open Wireless Architecture
4G iPhone Platform by Open Wireless Architecture
 
Widyatama.lecture.applied networking.iv-week-09-voip
Widyatama.lecture.applied networking.iv-week-09-voipWidyatama.lecture.applied networking.iv-week-09-voip
Widyatama.lecture.applied networking.iv-week-09-voip
 
Spain Getting Ready For Cloud Computing
Spain Getting Ready For Cloud ComputingSpain Getting Ready For Cloud Computing
Spain Getting Ready For Cloud Computing
 
Wi Max Lte Tribal Presentation.
Wi Max Lte Tribal Presentation.Wi Max Lte Tribal Presentation.
Wi Max Lte Tribal Presentation.
 

Andere mochten auch

Hacking Your Information Workflow Handout
Hacking Your Information Workflow HandoutHacking Your Information Workflow Handout
Hacking Your Information Workflow HandoutSarah Bombich
 
Lillith Distribution Presentation
Lillith Distribution PresentationLillith Distribution Presentation
Lillith Distribution PresentationLillith
 
Wireless Boot Camp 2010
Wireless Boot Camp 2010Wireless Boot Camp 2010
Wireless Boot Camp 2010Sarah Bombich
 
Wireless Bootcamp 2010
Wireless Bootcamp 2010Wireless Bootcamp 2010
Wireless Bootcamp 2010Sarah Bombich
 
Word 2007: Tips, Trick, and New Features
Word 2007: Tips, Trick, and New FeaturesWord 2007: Tips, Trick, and New Features
Word 2007: Tips, Trick, and New FeaturesSarah Bombich
 
Making Connections - Lebanon Merina Shaban
Making Connections - Lebanon Merina ShabanMaking Connections - Lebanon Merina Shaban
Making Connections - Lebanon Merina Shabanguestabec8c
 
Intermediate Dreamweaver
Intermediate DreamweaverIntermediate Dreamweaver
Intermediate DreamweaverSarah Bombich
 
Office 2007 Survival Guide
Office 2007 Survival GuideOffice 2007 Survival Guide
Office 2007 Survival GuideSarah Bombich
 
Working With Images in Photoshop
Working With Images in PhotoshopWorking With Images in Photoshop
Working With Images in PhotoshopSarah Bombich
 
Photoshop: Tools and Tricks for Beginners
Photoshop: Tools and Tricks for BeginnersPhotoshop: Tools and Tricks for Beginners
Photoshop: Tools and Tricks for BeginnersSarah Bombich
 
Introduction to Flash
Introduction to FlashIntroduction to Flash
Introduction to FlashSarah Bombich
 
Making Connections - My home country Lebanon
Making Connections - My home country LebanonMaking Connections - My home country Lebanon
Making Connections - My home country Lebanonguestabec8c
 
Introduction to Dreamweaver
Introduction to DreamweaverIntroduction to Dreamweaver
Introduction to DreamweaverSarah Bombich
 

Andere mochten auch (17)

Hacking Your Information Workflow Handout
Hacking Your Information Workflow HandoutHacking Your Information Workflow Handout
Hacking Your Information Workflow Handout
 
Lillith Distribution Presentation
Lillith Distribution PresentationLillith Distribution Presentation
Lillith Distribution Presentation
 
Twitter101 Handout
Twitter101 HandoutTwitter101 Handout
Twitter101 Handout
 
Wireless Boot Camp 2010
Wireless Boot Camp 2010Wireless Boot Camp 2010
Wireless Boot Camp 2010
 
Wireless Bootcamp 2010
Wireless Bootcamp 2010Wireless Bootcamp 2010
Wireless Bootcamp 2010
 
Screenr
ScreenrScreenr
Screenr
 
Mmf
MmfMmf
Mmf
 
Word 2007: Tips, Trick, and New Features
Word 2007: Tips, Trick, and New FeaturesWord 2007: Tips, Trick, and New Features
Word 2007: Tips, Trick, and New Features
 
Making Connections - Lebanon Merina Shaban
Making Connections - Lebanon Merina ShabanMaking Connections - Lebanon Merina Shaban
Making Connections - Lebanon Merina Shaban
 
Intermediate Dreamweaver
Intermediate DreamweaverIntermediate Dreamweaver
Intermediate Dreamweaver
 
Office 2007 Survival Guide
Office 2007 Survival GuideOffice 2007 Survival Guide
Office 2007 Survival Guide
 
Working With Images in Photoshop
Working With Images in PhotoshopWorking With Images in Photoshop
Working With Images in Photoshop
 
Photoshop: Tools and Tricks for Beginners
Photoshop: Tools and Tricks for BeginnersPhotoshop: Tools and Tricks for Beginners
Photoshop: Tools and Tricks for Beginners
 
Why Tweet? Handout
Why Tweet? HandoutWhy Tweet? Handout
Why Tweet? Handout
 
Introduction to Flash
Introduction to FlashIntroduction to Flash
Introduction to Flash
 
Making Connections - My home country Lebanon
Making Connections - My home country LebanonMaking Connections - My home country Lebanon
Making Connections - My home country Lebanon
 
Introduction to Dreamweaver
Introduction to DreamweaverIntroduction to Dreamweaver
Introduction to Dreamweaver
 

Ähnlich wie Wireless Boot Camp 2010 Handout

Cloud And I S V
Cloud And  I S VCloud And  I S V
Cloud And I S Veasy4com
 
Why your wifi sucks and how it can be helped, part 1 july 2011
Why your wifi sucks and how it can be helped, part 1  july 2011Why your wifi sucks and how it can be helped, part 1  july 2011
Why your wifi sucks and how it can be helped, part 1 july 2011Fajar Isnanto
 
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp011ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01Hussein Elmenshawy
 
Wireless to the Nth Degree
Wireless to the Nth DegreeWireless to the Nth Degree
Wireless to the Nth DegreeInnoTech
 
Vlans and inter vlan routing
Vlans and inter vlan routingVlans and inter vlan routing
Vlans and inter vlan routingMohammedseleim
 
VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation Mohit Kumar
 
Inter vlan routing plus configuration
Inter vlan routing plus configurationInter vlan routing plus configuration
Inter vlan routing plus configurationMohammedseleim
 
MidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integrationMidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integrationAkhilesh Dhawan
 
The Potential Threats And Risks That Have Home And...
The Potential Threats And Risks That Have Home And...The Potential Threats And Risks That Have Home And...
The Potential Threats And Risks That Have Home And...Cyndi Ruppel
 
02 - LANs, WANs, MANs.ppt
02 - LANs, WANs, MANs.ppt02 - LANs, WANs, MANs.ppt
02 - LANs, WANs, MANs.pptssuserf7cd2b
 

Ähnlich wie Wireless Boot Camp 2010 Handout (20)

Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
Wan and VPN Solutions
Wan and VPN SolutionsWan and VPN Solutions
Wan and VPN Solutions
 
Cloud And I S V
Cloud And  I S VCloud And  I S V
Cloud And I S V
 
Why your wifi sucks and how it can be helped, part 1 july 2011
Why your wifi sucks and how it can be helped, part 1  july 2011Why your wifi sucks and how it can be helped, part 1  july 2011
Why your wifi sucks and how it can be helped, part 1 july 2011
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
10 fn s18
10 fn s1810 fn s18
10 fn s18
 
10 fn s18
10 fn s1810 fn s18
10 fn s18
 
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp011ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
 
Wireless to the Nth Degree
Wireless to the Nth DegreeWireless to the Nth Degree
Wireless to the Nth Degree
 
Vlans and inter vlan routing
Vlans and inter vlan routingVlans and inter vlan routing
Vlans and inter vlan routing
 
VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Inter vlan routing plus configuration
Inter vlan routing plus configurationInter vlan routing plus configuration
Inter vlan routing plus configuration
 
MidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integrationMidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integration
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
Sub10 product leaflet
Sub10 product leafletSub10 product leaflet
Sub10 product leaflet
 
The Potential Threats And Risks That Have Home And...
The Potential Threats And Risks That Have Home And...The Potential Threats And Risks That Have Home And...
The Potential Threats And Risks That Have Home And...
 
02 - LANs, WANs, MANs.ppt
02 - LANs, WANs, MANs.ppt02 - LANs, WANs, MANs.ppt
02 - LANs, WANs, MANs.ppt
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 

Kürzlich hochgeladen

DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
A gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceA gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceApostolos Syropoulos
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlDr. Bruce A. Johnson
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashasashalaycock03
 
Protein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxProtein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxvidhisharma994099
 
Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....Riddhi Kevadiya
 
3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptx3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptxmary850239
 
10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdfJayanti Pande
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxCapitolTechU
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
How to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeHow to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeCeline George
 

Kürzlich hochgeladen (20)

DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
A gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceA gentle introduction to Artificial Intelligence
A gentle introduction to Artificial Intelligence
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting Bl
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sasha
 
Protein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxProtein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptx
 
Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....Riddhi Kevadiya. WILLIAM SHAKESPEARE....
Riddhi Kevadiya. WILLIAM SHAKESPEARE....
 
3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptx3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptx
 
10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
 
Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
How to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeHow to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using Code
 

Wireless Boot Camp 2010 Handout

  • 1. W A S H I N G T O N U N I V E R S I T Y Unive r s ity Lib r a r ie s WIRELESS NETWORK BOOT CAMP UNDERSTANDING THE UNIVERSITY’S WIRELESS NETWORK Sarah Bombich Friday, January 29, 2010
  • 2. Table of Contents What is a network? 1 Parts of a Network 1 How does Wi-Fi work? 2 What Is Wi-Fi? 2 What are the different types of Wi-Fi? 2 What happens when I “get on wireless”? 3 What is encryption? 4 Wash U’s Wireless Network in Action 5 Who can use the University wireless network? 5 What are the differences between WUFI, WUFI-S, and WUNOREG? 6 Which network is being used by most people? Why? 7 Are WUFI and WUFI-S used on the South Forty? 7 Where else is the wireless network available on campus? 7 What happens when I connect to WUFI? 8 What should I expect when I connect to WUFI? 9 What should I expect when I connect to WUFI-S? 11 Troubleshooting a WIFI Connection 12 WUFI & WUFI-S: Cannot find the network 12 WUFI only: Trouble getting to or past the authentication page 12 WUFI & WUFI-S: Appears connected a network but cannot load or connect to any- thing 13 Where can we get more help? 14 Glossary 15 Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich i
  • 3. fabric, you greatly simplify management. More importantly, you ensure an open environment that can accommodate multiple vendors, new solutions and future flexibility. What is a network? “A system containing any combination of computers, computer terminals, printers, audio or visual display devices, or telephones interconnected by telecommunication equipment or cables: used to transmit or receive information.1” Parts of a Network The Internet. The worldwide Internet computer network, comprised SANbox ® of many smaller networks con- The new look for powerful, easy to manage fabrics nected to each other. Informa- • SANbox 9000 Stackable Chassis Switch • SANbox 8000 Storage Services Platform tion you receive via computer • SANbox 6000 Intelligent Storage Router • SANbox 5000 Stackable Switch network that is not from Wash • SANbox 1000 Fixed Port Switch U is from the Internet. Network Backbone (or Modem, at Network Backbone (Modem). This home) device talks to an Internet Serv- ice Provider and sends infor- Router mation and information re- (may be skipped quests back and forth to the rest at home) of the Internet. Router. This device allows mul- tiple devices or computers to share a single Internet connec- tion. It ensures that the correct data gets to and from each de- vice. At Wash U, it generally refers to wired connections. At home, it can be wired only, wireless only, or both. Wireless Access Point Wireless Access Point. Converts the data sent over wires to a wireless signal that can be re- ceived by computers and de- vices with compatible wireless cards. Every access point has at least one name (or SSID) that it broadcasts, such as WUFI and WUFI-S. Server. This is a general term for a computer that has no one sitting at it; most of its communication is to other computers. For example, a web server sends data to other comput- ers using the Internet. Client Computer, Computer, or Workstation. This is a general term for a computer that has someone sitting in front of it, using it. For example, computers in a computer lab are workstations. 1 network. (n.d.). Dictionary.com Unabridged (v 1.1). http://dictionary.reference.com/browse/network Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich Page 1
  • 4. How does Wi-Fi work? What Is Wi-Fi? 2 A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way radio communication. Here's what happens: 1. A computer's wireless adapter translates data into a radio signal and transmits it using an antenna. 2. A wireless router receives the signal and then sends the information to the Internet using a physical, wired Eth- ernet connection. The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter. The signal from each wireless device is circular and can be visualized as a rock dropping in the center of a pond. The waves spread out from the wireless de- vice, like waves in the water, and get weaker the farther you get from the de- vice. Different devices create signals of different strengths and have antennas of different strengths; just because one lap- top gets a wireless signal in a given loca- tion, you cannot assume that all laptops will be able to detect a signal at the same location. The radios used for Wi-Fi communica- tion are very similar to the radios used for walkie-talkies, cell phones and other devices. Note that Wi-Fi radios use a different part of the radio wave spectrum and have special networking standards. What are the different types of Wi-Fi? Most Wi-Fi in use is 802.11, which is a name created by the IEEE (Institute of Electrical and Electronics Engineers) standards board to describe signals traveling within a certain part of the wireless spectrum. As technology changes, the standard has been modified slightly which is designated by add- ing letters to the end (802.11a, 802.11b, 802.11g, 802.11n). There is a Wi-Fi standards board which certifies all wireless access points and devices to ensure that that can successfully interoperate. WUFI/WUFI-S is an 802.11a/b/g net- work; all devices that support those standards will work. 802.11n devices are the newest and generally backwards compatible with a/b/g networks (check with the device manufacturer to be sure). 2 This section adapted from How Stuff Works. http://computer.howstuffworks.com/wireless-network1.htm Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich Page 2
  • 5. What happens when I “get on wireless”? Networking as a Phone Call Join wireless network Locate the phone or plug into ethernet Say hello to DHCP Pick up the phone server Listen for response Hear dial tone from DHCP server Dial number & hear Request IP address phone ring from DHCP server Someone answers Receive IP address from DHCP server You ask their name and ask a Wireless access point asks for question to verify it's the correct and you provide user name and person password Optional: WUFI-S only Optional: WUFI-S only Special software creates an skips step skips step You tell person the code language encrypted connection between WUFI WUFI in which to speak your computer and the wireless access point Start sending and Have a conversation receiving data Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich Page 3
  • 6. What is authentication? 3 Authentication is “the process of determining whether someone or something is, in fact, who or what it is declared to be.” To access the wireless network, among other technologies, at Washington University, you must provide such proof of identity. “In private and public computer networks (including the Internet), authentication is commonly done through the use of login passwords or passphrases; knowledge of such is assumed to guarantee that the user is authentic. Thus, when you are asked to "authenticate" to a system, it usually means that you enter your username and/or password for that system.“ What is encryption? Encryption is the encoding of data to prevent it from being read by unauthorized people. Think of pig latin - you take a word and change it around a little bit so that it is hard to understand if you don’t know what you’re listening for. Encryption is similar in that only the sender and receiver have the keys needed to unscramble the data in order to use it. Given enough time and effort, encryption can be broken, but it is much better than using no encryption at all. 3All authentication quotes from http://kb.iu.edu/data/alqk.html Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich Page 4
  • 7. Wash U’s Wireless Network in Action How does Wash U’s wireless network work? Internet Our wireless network runs on SANbox ® Meru Networks access points, The new look for powerful, easy to manage fabrics which are also used in airports • SANbox 9000 Stackable Chassis Switch • SANbox 8000 Storage Services Platform and other large-scale commercial • SANbox 6000 Intelligent Storage Router • SANbox 5000 Stackable Switch settings as well as other universi- • SANbox 1000 Fixed Port Switch ties. Network Backboone There are multiple access points in the library and any given physical location may have coverage from Router multiple access points (see dia- gram on page 2). The access points are installed to provide maximum coverage, though there are some areas without coverage. The library provides coverage maps on its website. Each access point in the library provides access to the University network. All connect to the same Authentication Server network -the Internet- but the various network names describe the security type of each kind of Wireless connection and which protocols Access Point are allowed. The Meru access points are auto- matically load balancing (when one access point has lots of people connected it decreases its signal strength and other access points in the area increase their signal strength in order to move people away from the over-used access point). They also allow handoffs between access points when people are moving around the building. To the user, the multiple access points all look like one big super-access point. Who can use the University wireless network? The only people allowed to use the University’s wireless networks are current students, faculty, and staff with a WUSTL key. In order to use the wired network, one must authenticate with a WUSTL key. Individuals affiliated with Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich Page 5
  • 8. the Law and Medical School have access to the wireless networks using authentication provided by their respective schools (not WUSTL key). Visitors do have limited wireless access but it is unsupported. What are the differences between WUFI, WUFI-S, and WUNOREG? WUFI WUFI-S GUESTWIFI- WUNOREG LAW-S WUCON WUSTL WIRELESS What can you View web Everything Everything, View web cannot test; cannot test; do?* pages, SSH, but number pages with “allows ac- “allows SFTP of connec- browser; “for cess to Law Medical tions and special ma- specific re- School login speed lim- chine appli- sources1” access to the ited cations1” Internet1” What doesn’t FTP, non- Nothing Nothing - Everything Unknown, Unknown, work* secure email but could be but web cannot test cannot test transfers very slow or browsing (POP, IMAP), unavailable, Remote depending Shell, telnet on usage Does it require Yes, via a Yes No No Yes Yes authentication? web browser Do you have to Yes, must No No, never No, never Probably no, Probably no, enter your login authenticate cannot test cannot test and password through web every time you browser first connect? Do you have to No No No No Probably Probably install special same as same as software to use WUFI-S, WUFI-S, it? cannot test cannot test Is your data en- No Yes No No Yes Yes crypted and se- cure? Who can access Students, Students, Everyone, Everyone, Individuals Individuals it? faculty, staff faculty, staff including including affiliated affiliated via WUSTL via WUSTL visitors visitors with the Law with the key key School Med School 1Information from NSS: http://nss.wustl.edu/node/8 *Note that this information is not well-documented and may be slightly incorrect Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich Page 6
  • 9. Which network is being used by most people? Why? In past years, WUFI was widely used but WUFI-S was not. However, with the creation of WUSTL key and the adop- tion of WUFI-S on the South Forty coupled with some changes to STS policy regarding device registration, most stu- dents arrive at the Library with their laptops correctly configured to use WUFI-S. However, students that live off campus are less likely to be set up to use WUFI-S. Ultimately, our users are better served by connecting to WUFI-S instead of WUFI due to the ease of use after initial setup (don’t have to enter username and password every time) and the increased level of security it offers. However, setup takes more time the first time one connects to WUFI-S. Are WUFI and WUFI-S used on the South Forty? Any student that has used wireless on the South Forty has already used WUFI-S and has all the necessary software installed. Where else is the wireless network available on campus? See http://nss.wustl.edu/sites/default/files/wufi-coverage.png Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich Page 7
  • 10. What happens when I connect to WUFI? What You're Doing What Your Computer is Doing Enable wireless, check list of available Look for wireless signals from other networks devices Select WUFI and connect Say hello to DHCP server Open a web browser Listen for response from DHCP server Attempt to open a web page Request IP address from DHCP server Redirected to WUFI authentication page Receive IP address from DHCP server You enter username and password. Wireless access point asks for and you Press enter. provide user name and password Access point checks your username@domain and password You wait against master list (authentication server) No Match No Match Match Found Match Found on Server on Server You are redirected You are taken back to the page you Start sending and No data will be to the first asked for authentication page receiving data sent or received You are now You are not connected You are now Only have access to connected to WUFI. to WUFI. You can retry connected to WUFI. authentication page Use the Internet. or give up. Use the Internet. until successful. Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich Page 8
  • 11. What should I expect when I connect to WUFI? 1. Enable wireless, check list of available networks. Select WUFI and Connect or Join. 2. Your system will automatically be assigned an IP address on the University wireless network. Open your web browser. and attempt to open a web page. 3. You will see certificate errors. Select “Accept this certificate permanently” and OK and then OK on the next screen. Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich Page 9
  • 12. Note: These prompts might be slightly different on different browsers. Some require only one OK, some might want you to click on “Continue.”As long as the certificate says something about wustl.edu or Meru Networks, it is safe to assume it is legitimate. 4. You are redirected to the WUFI authentication page. 5. Enter user name and password. Click Login. You wait. Some browsers will take you straight to the web page requested in step 2; some will first show a Web Authentication Succeeded pop-up or screen. Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich P a g e 10
  • 13. What should I expect when I connect to WUFI-S? Sample help sheet from Student Technology Services. See http://sts.wustl.edu/index.php/Wireless-setup.html for up-to-date directions for iPhone & iPod Touch, Mac OS X 10.5 Leopard, Windows Vista & XP. More directions can be found on NSS’s web page at http://nss.wustl.edu/node/8. Connecting to WUFI-S Mac OS X (10.5.x) Gregg Hall Store Front http://sts.wustl.edu 935-7100 (help desk) AIM: WUSTSHelp What You Will Do: What You Will See: We strongly recommend you first: Step 1: Airport Icon and List of Wireless Networks ! Connect your computer to the WIRED network FIRST AND REGISTER ! Install all Apple updates rd ! If you have a 3 party wireless configuration on your computer, we recommend REMOVING that software before using these instructions! 1. Click the “Airport” icon near the top-right of your screen. When the list of available wireless networks appears, select WUFI-S. 2. Enter your WUSTL-KEY username and password. Click OK. 3. When asked to verify the security certificate, click on “Show Step 2: WUSTL KEY Username and Password Certificate.” 4. Click the small button labeled “Always trust accounts- dc1.account.ad.wustl.edu”. Click “Continue.” 5. When prompted for a password to save the certificate, enter the username and password for your computer’s user logon account. Click “Ok.” REGISTERING YOUR COMPUTER FOR USE IN RESIDENTIAL LIVING SPACES/HALLS: Step 3: Show Certificate Once you have connected your computer to WUFI-S, you will need to register it on the STS Network in order to use it in the residential living spaces/halls. Follow these steps to register on the STS network: a. Be sure you are connected to WUFI-S and open a web browser. b. Navigate to a page, such as www.google.com Step 4: Always Trust XX Button c. You will be automatically redirected to the registration page for the STS network. d. At the bottom of the page, click “Regular full time students using their WUSTL KEY.” e. The registration page will appear. Complete the form using your WUSTL key and contact information. When finished, click “Register.” f. You will get a confirmation that registration is complete. Close your web browser. g. Reboot your computer. You are now registered on the STS network! Step 5: Computer’s User Logon Account Info Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich P a g e 11
  • 14. Troubleshooting a WIFI Connection If someone cannot connect to the wireless network, the problem is most likely to be one of the following: • Lack of physical wireless coverage • Wireless disabled on their laptop • Trouble getting to the authentication page • Trouble getting past the authentication page which is a login/password issue • Appears connected but cannot load any web pages which is a capacity issue WUFI & WUFI-S: Cannot find the network • Lack of physical wireless coverage • Find out if the person has successfully connected at that location previously (Note: this is not a guarantee that they will always connect successfully there, but it means that is not likely a coverage issue.) • Determine network coverage by checking the library’s wireless coverage maps located on the library web site (see http://library.wustl.edu/about/techinfo/computing-olin-maps.html ). • If it appears that the area should have a wireless signal, you can check to ensure that the wireless network is fully functional by checking the SOS status page ( http://library.wustl.edu/about/techinfo/access-point-status.py ). • Wireless disabled on their laptop • Even if the person has successfully connected before, their wireless adapter might be disabled. Make sure wireless in enabled by right-clicking on the wireless icon in the system tray (Win) or by turning on Airport in the top-right corner of the menu bar (Mac) . If this doesn’t fix it, more extensive configura- tion and troubleshooting may be needed. See “Where can we get more help?” below. WUFI only: Trouble getting to or past the authentication page You might be redirected to a blank page, or, you’re not redirected at all, and your computer just says it cannot load a page. Other times, a login and password are entered but you are taken back to the same login page. Here are some things you can try to get online: • Try manually entering the authentication page address into a web browser and then authenticating: https://meruct9.wufi.wustl.edu:8081/vpn/loginformWebAuth.html • Try using a different web browser. Firefox often works best. If Firefox is not installed, it can be downloaded onto a flash drive ( http://www.getfirefox.com )and quickly installed. • Try loading a web page again - it might have worked but sent you back to the authentication page in error. • If none of these things work, the person’s username or password might be incorrect. Use the available tools to ensure that their WUSTL key is correct. • If it still won’t work, try to set up WUFI-S. If time is short, GUESTWIFI-WUSTL can be used as a short term fix. It is not recommended as a long-term solution due to capacity, speed and security issues. Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich P a g e 12
  • 15. WUFI & WUFI-S: Appears connected a network but cannot load or connect to anything If the library is especially busy, it is possible that people will be unable to connect to the wireless network. There is a limit to the number of connected devices that the network can support. Although capacity has been in- creased recently, it is possible that students will be unable to connect. Unfortunately, if we are truly over capacity, there isn’t much to do. However, they can try: • Changing locations. Each access point has its own pool of network addresses and ones in popular places like Whispers are most likely to be full. It may be possible that ones in less-busy areas, like the Arc, would work. • Keep retrying to connect. As addresses become available, they might be lucky and get one. • If this problem is seen, please report it to SOS so that they can collect data to pass on to NSS. See http://library.wustl.edu/about/techinfo/computing-wireless-report.html Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich P a g e 13
  • 16. Where can we get more help? • The Arc can help set up WUFI-S connections and perform some basic troubleshooting of laptops. Most Arc student employees have laptops and are comfortable helping people perform basic troubleshooting. If you would like to refer someone with a wireless issue to the Arc, best practice is to IM our desk at OlinLi- braryArc or call at 5-4137 to ensure that we are available and able to handle the situation. If not, a direct re- ferral to STS might be needed. • The official point of support for students is the Student Technology Services Help Desk (STS) on the South Forty (on just the other side of Forsyth, across from the Music Library and next to Cornerstone). You can contact them via phone (935-7100) or AIM (WUSTSHelp). • The official point of support for all others is through their schools. NSS maintains a list of that contact in- formation at http://nss.wustl.edu/node/232 . • If all else fails, the Arc and Circulation can check out an ethernet cable to give the person Internet access. Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich P a g e 14
  • 17. Glossary A) 802.11a N) Domain An IEEE wireless networking standard that specifies a A specific name for a network of computers. maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. O) Download To receive a file transmitted over a network. B) 802.11b An IEEE wireless networking standard that specifies a P) Dynamic IP Address maximum data transfer rate of 11Mbps and an operating A temporary IP address assigned by a DHCP server. frequency of 2.4GHz. Q) EAP (Extensible Authentication Protocol) C) 802.11g A general authentication protocol used to control net- An IEEE wireless networking standard that specifies a work access. Many specific authentication methods work maximum data transfer rate of 54Mbps, an operating within this framework. frequency of 2.4GHz, and backward compatibility with R) EAP-TTLS (EAP-Tunnelled Transport Layer Secu- 802.11b devices. rity) D) Access Point An authentication method that uses digital certificates. Device that allows wireless-equipped computers and After the server is securely authenticated to the client, the other devices to communicate with a wired network. server can then use the established secure connection Also used to expand the range of a wireless network. ("tunnel") to authenticate the client. E) Adapter S) Encryption This is a device that adds network functionality to your Encoding data to prevent it from being read by unauthor- PC. ized people. F) Authentication T) Ethernet Authentication is the process of validating a user before An IEEE standard network protocol that specifies how allowing access to digital resources, often accomplished data is placed on and retrieved from a common transmis by comparing a username and password against those U) Firewall listed in a database. Security measures that protect the resources of a local G) Bandwidth network from intruders. The transmission capacity of a given device or network. V) Gateway H) Bit A system that interconnects networks. A binary digit. W) IEEE (The Institute of Electrical and Electronics I) Bridge Engineers) A device that connects two different kinds of local net- An independent institute that develops networking stan- works, such as a wireless network to a wired Ethernet dards. network. X) Infrastructure J) Database Currently installed computing and networking equip- A collection of data that is organized so that its contents ment. can easily be accessed, managed, and updated. Y) IP (Internet Protocol) K) Default Gateway A protocol used to send data over a network. A device that forwards Internet traffic from your local Z) IP Address area network. A numerical address used to identify a computer or de- L) DHCP (Dynamic Host Configuration Protocol) vice on a network. A protocol that lets one device on a local network, known AA) IPSec (Internet Protocol Security) as a DHCP server, assign temporary IP addresses to the A VPN protocol used to implement secure exchange of other network devices, typically computers. packets at the IP layer. M) DNS (Domain Name Server) BB) ISM band The IP address of your ISP's server, which translates the Radio band used in wireless networking transmissions. names of websites into IP addresses. Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich P a g e 15
  • 18. CC) ISP (Internet Service Provider) RR) Router A company that provides access to the Internet. A networking device that connects multiple networks together, such as a local network and the Internet. DD)LAN (Local Area Network) The computers and networking products that make up SS) Secure W2 the network in your home or office. Software used to create a WUFI-S connection on a Win- dows laptop. EE) MAC (Media Access Control) Address The unique address that a manufacturer assigns to each TT) Server networking device. Any computer whose function in a network is to provide user access to files, printing, communications, and other FF) Mbps (Megabits Per Second) services. One million bits per second; a unit of measurement for data transmission. UU) SSID (Service Set IDentifier) Your wireless network's name. GG)Meru Manufacturer of our wireless access system. VV) Static IP Address A fixed address assigned to a computer or device that is HH)Network connected to a network. A series of computers or devices connected for the pur- pose of data sharing, storage, and/or transmission be- WW)Subnet Mask tween users. An address code that determines the size of the network. II) Packet XX) Switch A unit of data sent over a network. 1. Device that is the central point of connection for com- puters and other devices in a network, so data can be JJ) Ping (Packet INternet Groper) shared at full transmission speeds. 2. A device for mak- An Internet utility used to determine whether a particu- ing, breaking, or changing the connections in an electrical lar IP address is online. circuit. KK) PAP (Password Authentication Protocol) YY) TCP/IP (Transmission Control Protocol/Internet A simple authentication protocol used to authenticate a Protocol) user to a network access server; user names and pass- A network protocol for transmitting data that requires words are sent as clear text. acknowledgement from the recipient of data sent. LL) Port ZZ) Upload 1. The connection point on a computer or networking To transmit a file over a network. device used for plugging in a cable or an adapter. 2. The virtual connection point through which a computer uses AAA)URL (Uniform Resource Locator) a specific application on a server. The address of a file located on the Internet. MM)PPTP (Point-to-Point Tunneling Protocol) BBB)VPN (Virtual Private Network) A VPN protocol that allows the Point to Point Protocol A security measure to protect data as it leaves one net- (PPP) to be tunneled through an IP network. work and goes to another over the Internet. NN)Preamble CCC)WLAN (Wireless Local Area Network) Part of the wireless signal that synchronizes network A group of computers and associated devices that com- traffic. municate with each other wirelessly. OO)RADIUS (Remote Authentication Dial-In User Service) A protocol that uses an authentication server to control References: network access. http://www.pchardware.co.uk/wirelessglossary.php PP) RJ-45 An Ethernet connector that holds up to eight wires. QQ)Roaming The ability to take a wireless device from one access point's range to another without losing the connection. Wi r e l e s s N e t w o r k B o o t C a m p Presented by Sarah Bombich P a g e 16