Beruflich Dokumente
Kultur Dokumente
WiMax
Local area network Provide easy access to end-user devices Multiple access points that comprise the coverage area Quick and painless start-up
Wide area network Provide an alternative to wired connections Large coverage area with one base station controller Comprehensive coverage
Mapping a Plan
Using
a campus map, plot all areas for coverage, including library, computer lab, etc. Mark areas of higher traffic
Remember that one user can be using multiple devices Allow for future growth so major restructuring will not be needed in coming years
Access Points
Note
how many access points are needed, with special attention to hightraffic areas
Access points can typically cover about 200 feet indoors and 1,000 feet outdoors Individual access points can accommodate between 10 and 100 devices simultaneously, depending on the model of device.
Case Example: Access Points in Nelson Poynter Library at USF St. Petersburg
My
current office location is in the USFSP campus library, which uses a WiFi network to provide connectivity to about 5,000 undergraduate and graduate students. Access points are placed at or near hightraffic areas, including study rooms, presentation areas and collaboration stations in the library.
Case Example: Access Points in Nelson Poynter Library at USF St. Petersburg
First Floor Map
Access Points on First Floor
Results
At
my home institution of USFSP, in a 2009 campus-wide survey, 54% of students used the librarys wireless network Very Often or Often. Since upgrading the WiFi at the library, device loans have increased by 33%.
also can have loaner devices available in libraries and other secure environments.
Bolton College has automated the process with device lockers (video clip) USFSP uses a check-out process at the circulation desk in the library, with about 1,000 device loans per academic year.
campuses are requiring that students purchase mobile devices such as smart phones and tablets
devices connect to the network via the closest access point, as long as the device is within range. For security purposes, most campuses require student identities to be verified in order to access the WiFi network.
Security
For security, wireless networks should always be encrypted and limited to students, faculty and staff on campus.
Generally accomplished with a service set identifier (SSID) to restrict usage to a directory of users with usernames and passwords
Some campuses, such as Ohio State University, also make an unencrypted guest network available for sponsored guests.
References
Eddy, N. (2009, May 11). University of Missouri Requires Students Buy iPhone or iPod. Retrieved February 10, 2013, from eWeek: http://www.eweek.com/c/a/Midmarket/Univ ersity-of-Missouri-Requires-Students-BuyiPhones-540478/ Halestar, Inc. (2008). Wireless WAN/LAN solutions for schools using WiMax, WiFi and Secured Access and Content. Hartford, Connecticut.
References
Hixson, C. (2011). Nelson Poynter Memorial Library Annual Report for 2008/09. The Ohio State University. (2012). IT Security Framework. Retrieved February 11, 2013, from http://ocio.osu.edu/itsecurity/framework/ Tilsley, A. (2013, January 15). iPad U. Retrieved February 10, 2013, from Insider Higher Ed: http://www.insidehighered.com/news/2013/0 1/15/lynn-university-require-all-new-studentsbuy-ipads