Wireless Networks on university Campuses
نویسنده
چکیده
U niversities are particularly interested in wireless communication networks because they let students using wireless-enabled mobile terminals download lecture slides, watch educational audio and video programs, and take online practice quizzes at any time and from anywhere on campus. This can both reduce paper handouts and simplify paperless assignments and submissions. Wireless networks can also strengthen teamwork among students and faculty, making it easier for them to email each other with preliminary results, use chat channels to discuss problems, and readily access information resources during problem-solving sessions. When students and faculty can access all the information they need via their own mobile terminals, universities can even consider retiring their expensive computer labs. To achieve these benefits, usability is crucial—that is, university information systems must make it easy for users to access resources and achieve their goals. Typically, universities employ individual authentication to give users system access. Such authentication mechanisms tend to reduce system usability, however, because users view them as both an intrusion and an obstacle to completing their primary tasks. Also, individual authentication often requires users to remember multiple log in names and passwords and sometimes to possess particular authentication devices. Finally, authentication requires a trade-off between a user’s privacy rights and an administrator’s need to protect access to resources. On wired networks, university IT departments have long been capable of collecting information on authenticated users, including what they do and when they come and go. Introducing a campus-wide wireless network that uses authentication makes it even simpler to track user movements and activities on campus. As an alternative, universities can opt for an open network, granting wired and wireless users access to the network infrastructure without any form of authentication. Open networks let users freely surf the Internet and access library catalogs and other services that offer nonsensitive information; sensitive services, such as email, would still require authentication. An information system’s degree of openness largely depends on the number of different devices that can access the system, the number of services available without authentication, and the network’s availability. Open networks increase system usability, but they also raise privacy issues and increase the risks of illegal downloads and various attacks (and the negative press coverage that can result). We discuss these benefits and drawbacks here, using a simple model in which campus-wide mobile terminals communicate over wireless links with services on the university’s wired infrastructure. We also discuss how administrators can mitigate open-network risks and vary their network’s openness to reduce these risks while still increasing usability.
منابع مشابه
Exploring TV White Spaces for Use in Campus Networks
University campuses are busy places for wireless client traffic coming from Wi-Fi connections and other wireless devices that contend for the 2.4 GHz frequencies space that most campus Wi-Fi networks use currently. This is making the 2.4 GHz frequency unsuitable for WiFi connection due to too much interference from other devices as well as from Wi-Fi connections themselves. TV white space could...
متن کاملIMPACT: Investigation of Mobile-user Patterns Across University Campuses using WLAN Trace Analysis
We conduct the most comprehensive study of WLAN traces to date. Measurements collected from four major university campuses are analyzed with the aim of developing fundamental understanding of realistic user behavior in wireless networks. Both individual user and inter-node (group) behaviors are investigated and two classes of metrics are devised to capture the underlying structure of such behav...
متن کاملAn Interworking Implementation and Performance Evaluation in Ieee 802.11s Based Campus Mesh Networks
To address deployment schemes over large dispersed geographical area a paradigm shift in the technology was needed. Wireless Mesh Networks (WMN) has emerged as a promising technology to such challenging tasks. As wireless network grows it puts an increased demands in infrastructure based networks.802.11s based WMN is a concrete step that address this paradox to make infrastructure itself wirele...
متن کاملIntrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملA New Method based on Intelligent Water Drops for Multicast Routing in Wireless Mesh Networks
In recent years a new type of wireless networks named wireless mesh networks has drawn the attention of researchers. In order to increase the capacity of mesh network, nodes are equipped with multiple radios tuned on multiple channels emerging multi radio multi channel wireless mesh networks. Therefore, the main challenge of these networks is how to properly assign the channels to the radios. O...
متن کاملThe Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices
Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and everything surrounding humans. To understand the advanced topics in wireless networks and IoT devi...
متن کامل