Top Banner
WIRELESS NETWORK BOOT CAMP UNDERSTANDING THE UNIVERSITY’S WIRELESS NETWORK Sarah Bombich Friday, January 29, 2010 W A S H I N G T O N U N I V E R S I T Y University Libraries
18

Wireless Boot Camp 2010 Handout

May 16, 2015

Download

Education

Sarah Bombich

Handout that accompanied the Wireless Boot Camp 2010.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Wireless Boot Camp 2010 Handout

WIRELESS NETWORK BOOT CAMPUNDERSTANDING THE UNIVERSITY’S WIRELESS NETWORK

Sarah Bombich

Friday, January 29, 2010

W A S H I N G T O N U N I V E R S I T YUniversity Libraries

Page 2: Wireless Boot Camp 2010 Handout

Table of Contents

What is a network? 1

Parts of a Network 1

How does Wi-Fi work? 2

What Is Wi-Fi? 2What are the different types of Wi-Fi? 2

What happens when I “get on wireless”? 3

What is encryption? 4

Wash U’s Wireless Network in Action 5

Who can use the University wireless network? 5What are the differences between WUFI, WUFI-S, and WUNOREG? 6Which network is being used by most people? Why? 7Are WUFI and WUFI-S used on the South Forty? 7Where else is the wireless network available on campus? 7What happens when I connect to WUFI? 8

What should I expect when I connect to WUFI? 9

What should I expect when I connect to WUFI-S? 11

Troubleshooting a WIFI Connection 12

WUFI & WUFI-S: Cannot find the network 12WUFI only: Trouble getting to or past the authentication page 12WUFI & WUFI-S: Appears connected a network but cannot load or connect to any-thing 13Where can we get more help? 14

Glossary 15

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

i

Page 3: Wireless Boot Camp 2010 Handout

What is a network?“A system containing any combination of computers, computer terminals, printers, audio or visual display devices, or telephones interconnected by telecommunication equipment or cables: used to transmit or receive information.1”

Parts of a NetworkThe Internet. The worldwide computer network, comprised of many smaller networks con-nected to each other. Informa-tion you receive via computer network that is not from Wash U is from the Internet.

Network Backbone (Modem). This device talks to an Internet Serv-ice Provider and sends infor-mation and information re-quests back and forth to the rest of the Internet.

Router. This device allows mul-tiple devices or computers to share a single Internet connec-tion. It ensures that the correct data gets to and from each de-vice. At Wash U, it generally refers to wired connections. At home, it can be wired only, wireless only, or both.

Wireless Access Point. Converts the data sent over wires to a wireless signal that can be re-ceived by computers and de-vices with compatible wireless cards. Every access point has at least one name (or SSID) that it broadcasts, such as WUFI and WUFI-S.

Server. This is a general term for a computer that has no one sitting at it; most of its communication is to other computers. For example, a web server sends data to other comput-ers using the Internet.

Client Computer, Computer, or Workstation. This is a general term for a computer that has someone sitting in front of it, using it. For example, computers in a computer lab are workstations.

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 1

1 network. (n.d.). Dictionary.com Unabridged (v 1.1). http://dictionary.reference.com/browse/network

Internet

D ATA S H E E TSANbox 9000 Series

SANbox® Product FamilyThe new look for powerful, easy to manage fabrics

The SANbox 9000 is the flagship in the SANbox line of fabric switches, intelligent storage routers, and storage ser-

vices platforms. As individual components, every QLogic SANbox delivers the advantages of a best-in-class product.

Working together as an intelligent network solution, they are easy to deploy and administrator and they make your

SAN perform better, too. That’s why the entire QLogic SANbox line won the Windows IT Pro “Readers Choice” award.

For your switched fabric, you can count on QLogic for exactly the right switch…from the core, to the distribution

layer, to the edge. For low-cost local and remote server connectivity, QLogic Intelligent Storage Routers boost utili-

zation while driving down cost and complexity. And for storage virtualization, the QLogic Storage Services Platform

offers network-based command and control of your heterogeneous storage. By virtualizing storage from within the

fabric, you greatly simplify management. More importantly, you ensure an open environment that can accommodate

multiple vendors, new solutions and future flexibility.

SANbox®

The new look for powerful, easy to manage fabrics

• SANbox 9000 Stackable Chassis Switch

• SANbox 8000 Storage Services Platform

• SANbox 6000 Intelligent Storage Router

• SANbox 5000 Stackable Switch

• SANbox 1000 Fixed Port Switch

Network Backbone(or Modem, at home)

Wireless Access Point

Router(may be skippedat home)

Page 4: Wireless Boot Camp 2010 Handout

How does Wi-Fi work?What Is Wi-Fi?2

A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way radio communication. Here's what happens:

1. A computer's wireless adapter translates data into a radio signal and transmits it using an antenna.

2. A wireless router receives the signal and then sends the information to the Internet using a physical, wired Eth-ernet connection.

The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter.

The signal from each wireless device is circular and can be visualized as a rock dropping in the center of a pond. The waves spread out from the wireless de-vice, like waves in the water, and get weaker the farther you get from the de-vice. Different devices create signals of different strengths and have antennas of different strengths; just because one lap-top gets a wireless signal in a given loca-tion, you cannot assume that all laptops will be able to detect a signal at the same location.

The radios used for Wi-Fi communica-tion are very similar to the radios used for walkie-talkies, cell phones and other devices. Note that Wi-Fi radios use a different part of the radio wave spectrum and have special networking standards.

What are the different types of Wi-Fi?

Most Wi-Fi in use is 802.11, which is a name created by the IEEE (Institute of Electrical and Electronics Engineers) standards board to describe signals traveling within a certain part of

the wireless spectrum. As technology changes, the standard has been modified slightly which is designated by add-ing letters to the end (802.11a, 802.11b, 802.11g, 802.11n). There is a Wi-Fi standards board which certifies all wireless access points and devices to ensure that that can successfully interoperate. WUFI/WUFI-S is an 802.11a/b/g net-work; all devices that support those standards will work. 802.11n devices are the newest and generally backwards compatible with a/b/g networks (check with the device manufacturer to be sure).

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 2

2 This section adapted from How Stuff Works. http://computer.howstuffworks.com/wireless-network1.htm

Page 5: Wireless Boot Camp 2010 Handout

What happens when I “get on wireless”?

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 3

Networking as a Phone Call

Pick up the phone Say hello to DHCP server

Hear dial tone

Dial number & hear phone ring

Listen for response from DHCP server

Request IP address from DHCP server

Someone answers

You ask their name and ask a question to verify it's the correct

person

Receive IP address from DHCP server

Wireless access point asks for and you provide user name and

password

Locate the phone Join wireless network or plug into ethernet

You tell person the code language in which to speak

Have a conversation

Special software creates an encrypted connection between your computer and the wireless

access point

Start sending and receiving data

WUF

Isk

ips

step

WUF

Isk

ips

step

Optional: WUFI-S only Optional: WUFI-S only

Page 6: Wireless Boot Camp 2010 Handout

What is authentication? 3

Authentication is “the process of determining whether someone or something is, in fact, who or what it is declared to be.” To access the wireless network, among other technologies, at Washington University, you must provide such proof of identity. “In private and public computer networks (including the Internet), authentication is commonly done through the use of login passwords or passphrases; knowledge of such is assumed to guarantee that the user is authentic. Thus, when you are asked to "authenticate" to a system, it usually means that you enter your username and/or password for that system.“

What is encryption?

Encryption is the encoding of data to prevent it from being read by unauthorized people. Think of pig latin - you take a word and change it around a little bit so that it is hard to understand if you don’t know what you’re listening for. Encryption is similar in that only the sender and receiver have the keys needed to unscramble the data in order to use it. Given enough time and effort, encryption can be broken, but it is much better than using no encryption at all.

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 4

3All authentication quotes from http://kb.iu.edu/data/alqk.html

Page 7: Wireless Boot Camp 2010 Handout

Wash U’s Wireless Network in ActionHow does Wash U’s wireless network work?

Our wireless network runs on Meru Networks access points, which are also used in airports and other large-scale commercial settings as well as other universi-ties.

There are multiple access points in the library and any given physical location may have coverage from multiple access points (see dia-gram on page 2). The access points are installed to provide maximum coverage, though there are some areas without coverage. The library provides coverage maps on its website.

Each access point in the library provides access to the University network. All connect to the same network -the Internet- but the various network names describe the security type of each kind of connection and which protocols are allowed.

The Meru access points are auto-matically load balancing (when one access point has lots of people connected it decreases its signal strength and other access points in the area increase their signal strength in order to move people away from the over-used access point). They also allow handoffs between access points when people are moving around the building. To the user, the multiple access points all look like one big super-access point.

Who can use the University wireless network?

The only people allowed to use the University’s wireless networks are current students, faculty, and staff with a WUSTL key. In order to use the wired network, one must authenticate with a WUSTL key. Individuals affiliated with

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 5

Internet

D ATA S H E E TSANbox 9000 Series

SANbox® Product FamilyThe new look for powerful, easy to manage fabrics

The SANbox 9000 is the flagship in the SANbox line of fabric switches, intelligent storage routers, and storage ser-

vices platforms. As individual components, every QLogic SANbox delivers the advantages of a best-in-class product.

Working together as an intelligent network solution, they are easy to deploy and administrator and they make your

SAN perform better, too. That’s why the entire QLogic SANbox line won the Windows IT Pro “Readers Choice” award.

For your switched fabric, you can count on QLogic for exactly the right switch…from the core, to the distribution

layer, to the edge. For low-cost local and remote server connectivity, QLogic Intelligent Storage Routers boost utili-

zation while driving down cost and complexity. And for storage virtualization, the QLogic Storage Services Platform

offers network-based command and control of your heterogeneous storage. By virtualizing storage from within the

fabric, you greatly simplify management. More importantly, you ensure an open environment that can accommodate

multiple vendors, new solutions and future flexibility.

SANbox®

The new look for powerful, easy to manage fabrics

• SANbox 9000 Stackable Chassis Switch

• SANbox 8000 Storage Services Platform

• SANbox 6000 Intelligent Storage Router

• SANbox 5000 Stackable Switch

• SANbox 1000 Fixed Port Switch

Network Backboone

Wireless

Access Point

Router

Authentication

Server

Page 8: Wireless Boot Camp 2010 Handout

the Law and Medical School have access to the wireless networks using authentication provided by their respective schools (not WUSTL key). Visitors do have limited wireless access but it is unsupported.

What are the differences between WUFI, WUFI-S, and WUNOREG?

WUFI WUFI-S GUESTWIFI-WUSTL

WUNOREG LAW-S WUCON WIRELESS

What can you do?*

View web pages, SSH, SFTP

Everything Everything, but number of connec-tions and speed lim-ited

View web pages with browser; “for special ma-chine appli-cations1”

cannot test; “allows ac-cess to Law specific re-sources1”

cannot test; “allows Medical School login access to the Internet1”

What doesn’t work*

FTP, non-secure email transfers (POP, IMAP),Remote Shell, telnet

Nothing Nothing - but could be very slow or unavailable, depending on usage

Everything but web browsing

Unknown, cannot test

Unknown, cannot test

Does it require authentication?

Yes, via a web browser

Yes No No Yes Yes

Do you have to enter your login and password every time you connect?

Yes, must authenticate through web browser first

No No, never No, never Probably no, cannot test

Probably no, cannot test

Do you have to install special software to use it?

No No No No Probably same as WUFI-S, cannot test

Probably same as WUFI-S, cannot test

Is your data en-crypted and se-cure?

No Yes No No Yes Yes

Who can access it?

Students, faculty, staff via WUSTL key

Students, faculty, staff via WUSTL key

Everyone, including visitors

Everyone, including visitors

Individuals affiliated with the Law School

Individuals affiliated with the Med School

1Information from NSS: http://nss.wustl.edu/node/8*Note that this information is not well-documented and may be slightly incorrect Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 6

Page 9: Wireless Boot Camp 2010 Handout

Which network is being used by most people? Why?

In past years, WUFI was widely used but WUFI-S was not. However, with the creation of WUSTL key and the adop-tion of WUFI-S on the South Forty coupled with some changes to STS policy regarding device registration, most stu-dents arrive at the Library with their laptops correctly configured to use WUFI-S. However, students that live off campus are less likely to be set up to use WUFI-S.

Ultimately, our users are better served by connecting to WUFI-S instead of WUFI due to the ease of use after initial setup (don’t have to enter username and password every time) and the increased level of security it offers. However, setup takes more time the first time one connects to WUFI-S.

Are WUFI and WUFI-S used on the South Forty?

Any student that has used wireless on the South Forty has already used WUFI-S and has all the necessary software installed.

Where else is the wireless network available on campus?

See http://nss.wustl.edu/sites/default/files/wufi-coverage.png

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 7

Page 10: Wireless Boot Camp 2010 Handout

What happens when I connect to WUFI?

Select WUFI and connect Say hello to DHCP server

Open a web browser

Attempt to open a web page

Listen for response from DHCP server

Request IP address from DHCP server

Redirected to WUFI authentication page

You enter username and password. Press enter.

Receive IP address from DHCP server

Wireless access point asks for and you provide user name and password

Enable wireless, check list of available networks

Look for wireless signals from other devices

You wait

You are redirected to the page you first asked for

Access point checks your username@domain and password against master list (authentication

server)

Start sending and receiving data

What You're Doing What Your Computer is Doing

No data will be sent or received

You are taken back to the

authentication page

No Matchon Server Match Found No Match

on Server

You are now connected to WUFI. Use the Internet.

You are not connected to WUFI. You can retry

or give up.

You are now connected to WUFI. Use the Internet.

Only have access to authentication page

until successful.

Match Found

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 8

Page 11: Wireless Boot Camp 2010 Handout

What should I expect when I connect to WUFI?1. Enable wireless, check list of available networks. Select WUFI and Connect or Join.

2. Your system will automatically be assigned an IP address on the University wireless network. Open your web browser. and attempt to open a web page.

3. You will see certificate errors. Select “Accept this certificate permanently” and OK and then OK on the next screen.

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 9

Page 12: Wireless Boot Camp 2010 Handout

Note: These prompts might be slightly different on different browsers. Some require only one OK, some might want you to click on “Continue.”As long as the certificate says something about wustl.edu or Meru Networks, it is safe to assume it is legitimate.

4. You are redirected to the WUFI authentication page.

5. Enter user name and password. Click Login. You wait. Some browsers will take you straight to the web page requested in step 2; some will first show a Web Authentication Succeeded pop-up or screen.

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 10

Page 13: Wireless Boot Camp 2010 Handout

What should I expect when I connect to WUFI-S?Sample help sheet from Student Technology Services. See http://sts.wustl.edu/index.php/Wireless-setup.html for up-to-date directions for iPhone & iPod Touch, Mac OS X 10.5 Leopard, Windows Vista & XP. More directions can be found on NSS’s web page at http://nss.wustl.edu/node/8.

Connecting to WUFI-S Mac OS X (10.5.x) What You Will Do:

We strongly recommend you first: ! Connect your computer to the WIRED network FIRST

AND REGISTER ! Install all Apple updates ! If you have a 3rd party wireless configuration on your

computer, we recommend REMOVING that software before using these instructions!

1. Click the “Airport” icon near the top-right of your screen. When the list of available wireless networks appears, select WUFI-S.

2. Enter your WUSTL-KEY username and password. Click OK.

3. When asked to verify the security certificate, click on “Show Certificate.”

4. Click the small button labeled “Always trust accounts-dc1.account.ad.wustl.edu”. Click “Continue.”

5. When prompted for a password to save the certificate, enter the username and password for your computer’s user logon account. Click “Ok.”

REGISTERING YOUR COMPUTER FOR USE IN RESIDENTIAL LIVING SPACES/HALLS:

Once you have connected your computer to WUFI-S, you will need to register it on the STS Network in order to use it in the residential living spaces/halls. Follow these steps to register on the STS network:

a. Be sure you are connected to WUFI-S and open a web browser.

b. Navigate to a page, such as www.google.com

c. You will be automatically redirected to the registration page for the STS network.

d. At the bottom of the page, click “Regular full time students using their WUSTL KEY.”

e. The registration page will appear. Complete the form using your WUSTL key and contact information. When finished, click “Register.”

f. You will get a confirmation that registration is complete. Close your web browser.

g. Reboot your computer. You are now registered on the STS network!

Step 1: Airport Icon and List of Wireless Networks

Step 2: WUSTL KEY Username and Password

Step 3: Show Certificate

Step 4: Always Trust XX Button

Step 5: Computer’s User Logon Account Info

What You Will See:

Gregg Hall Store Front 935-7100 (help desk) http://sts.wustl.edu AIM: WUSTSHelp

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 11

Page 14: Wireless Boot Camp 2010 Handout

Troubleshooting a WIFI ConnectionIf someone cannot connect to the wireless network, the problem is most likely to be one of the following:

• Lack of physical wireless coverage

• Wireless disabled on their laptop

• Trouble getting to the authentication page

• Trouble getting past the authentication page which is a login/password issue

• Appears connected but cannot load any web pages which is a capacity issue

WUFI & WUFI-S: Cannot find the network

• Lack of physical wireless coverage

• Find out if the person has successfully connected at that location previously (Note: this is not a guarantee that they will always connect successfully there, but it means that is not likely a coverage issue.)

• Determine network coverage by checking the library’s wireless coverage maps located on the library web site (see http://library.wustl.edu/about/techinfo/computing-olin-maps.html ).

• If it appears that the area should have a wireless signal, you can check to ensure that the wireless network is fully functional by checking the SOS status page ( http://library.wustl.edu/about/techinfo/access-point-status.py ).

• Wireless disabled on their laptop

• Even if the person has successfully connected before, their wireless adapter might be disabled. Make sure

wireless in enabled by right-clicking on the wireless icon in the system tray (Win) or by turning on

Airport in the top-right corner of the menu bar (Mac) . If this doesn’t fix it, more extensive configura-tion and troubleshooting may be needed. See “Where can we get more help?” below.

WUFI only: Trouble getting to or past the authentication page

You might be redirected to a blank page, or, you’re not redirected at all, and your computer just says it cannot load a page. Other times, a login and password are entered but you are taken back to the same login page. Here are some things you can try to get online:

• Try manually entering the authentication page address into a web browser and then authenticating: https://meruct9.wufi.wustl.edu:8081/vpn/loginformWebAuth.html

• Try using a different web browser. Firefox often works best. If Firefox is not installed, it can be downloaded onto a flash drive ( http://www.getfirefox.com )and quickly installed.

• Try loading a web page again - it might have worked but sent you back to the authentication page in error.

• If none of these things work, the person’s username or password might be incorrect. Use the available tools to ensure that their WUSTL key is correct.

• If it still won’t work, try to set up WUFI-S. If time is short, GUESTWIFI-WUSTL can be used as a short term fix. It is not recommended as a long-term solution due to capacity, speed and security issues.

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 12

Page 15: Wireless Boot Camp 2010 Handout

WUFI & WUFI-S: Appears connected a network but cannot load or connect to anything

If the library is especially busy, it is possible that people will be unable to connect to the wireless network. There is a limit to the number of connected devices that the network can support. Although capacity has been in-creased recently, it is possible that students will be unable to connect.

Unfortunately, if we are truly over capacity, there isn’t much to do. However, they can try:

• Changing locations. Each access point has its own pool of network addresses and ones in popular places like Whispers are most likely to be full. It may be possible that ones in less-busy areas, like the Arc, would work.

• Keep retrying to connect. As addresses become available, they might be lucky and get one.

• If this problem is seen, please report it to SOS so that they can collect data to pass on to NSS. See http://library.wustl.edu/about/techinfo/computing-wireless-report.html

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 13

Page 16: Wireless Boot Camp 2010 Handout

Where can we get more help?

• The Arc can help set up WUFI-S connections and perform some basic troubleshooting of laptops. Most Arc student employees have laptops and are comfortable helping people perform basic troubleshooting. If you would like to refer someone with a wireless issue to the Arc, best practice is to IM our desk at OlinLi-braryArc or call at 5-4137 to ensure that we are available and able to handle the situation. If not, a direct re-ferral to STS might be needed.

• The official point of support for students is the Student Technology Services Help Desk (STS) on the South Forty (on just the other side of Forsyth, across from the Music Library and next to Cornerstone). You can contact them via phone (935-7100) or AIM (WUSTSHelp).

• The official point of support for all others is through their schools. NSS maintains a list of that contact in-formation at http://nss.wustl.edu/node/232 .

• If all else fails, the Arc and Circulation can check out an ethernet cable to give the person Internet access.

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 14

Page 17: Wireless Boot Camp 2010 Handout

GlossaryA) 802.11a An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz.

B) 802.11bAn IEEE wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz.

C) 802.11gAn IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps, an operating frequency of 2.4GHz, and backward compatibility with 802.11b devices.

D) Access PointDevice that allows wireless-equipped computers and other devices to communicate with a wired network. Also used to expand the range of a wireless network.

E) AdapterThis is a device that adds network functionality to your PC.

F) AuthenticationAuthentication is the process of validating a user before allowing access to digital resources, often accomplished by comparing a username and password against those listed in a database.

G) BandwidthThe transmission capacity of a given device or network.

H) Bit A binary digit.

I) BridgeA device that connects two different kinds of local net-works, such as a wireless network to a wired Ethernet network.

J) Database A collection of data that is organized so that its contents can easily be accessed, managed, and updated.

K) Default GatewayA device that forwards Internet traffic from your local area network.

L) DHCP (Dynamic Host Configuration Protocol)A protocol that lets one device on a local network, known as a DHCP server, assign temporary IP addresses to the other network devices, typically computers.

M) DNS (Domain Name Server)The IP address of your ISP's server, which translates the names of websites into IP addresses.

N) DomainA specific name for a network of computers.

O) DownloadTo receive a file transmitted over a network.

P) Dynamic IP AddressA temporary IP address assigned by a DHCP server.

Q) EAP (Extensible Authentication Protocol)A general authentication protocol used to control net-work access. Many specific authentication methods work within this framework.

R) EAP-TTLS (EAP-Tunnelled Transport Layer Secu-rity)

An authentication method that uses digital certificates. After the server is securely authenticated to the client, the server can then use the established secure connection ("tunnel") to authenticate the client.

S) EncryptionEncoding data to prevent it from being read by unauthor-ized people.

T) Ethernet An IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmis

U) FirewallSecurity measures that protect the resources of a local network from intruders.

V) GatewayA system that interconnects networks.

W) IEEE (The Institute of Electrical and Electronics Engineers)

An independent institute that develops networking stan-dards.

X) InfrastructureCurrently installed computing and networking equip-ment.

Y) IP (Internet Protocol)A protocol used to send data over a network.

Z) IP AddressA numerical address used to identify a computer or de-vice on a network.

AA)IPSec (Internet Protocol Security)A VPN protocol used to implement secure exchange of packets at the IP layer.

BB) ISM bandRadio band used in wireless networking transmissions.

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 15

Page 18: Wireless Boot Camp 2010 Handout

CC) ISP (Internet Service Provider)A company that provides access to the Internet.

DD)LAN (Local Area Network)The computers and networking products that make up the network in your home or office.

EE) MAC (Media Access Control) AddressThe unique address that a manufacturer assigns to each networking device.

FF) Mbps (Megabits Per Second)One million bits per second; a unit of measurement for data transmission.

GG)MeruManufacturer of our wireless access system.

HH)NetworkA series of computers or devices connected for the pur-pose of data sharing, storage, and/or transmission be-tween users.

II) PacketA unit of data sent over a network.

JJ) Ping (Packet INternet Groper)An Internet utility used to determine whether a particu-lar IP address is online.

KK)PAP (Password Authentication Protocol)A simple authentication protocol used to authenticate a user to a network access server; user names and pass-words are sent as clear text.

LL) Port1. The connection point on a computer or networking device used for plugging in a cable or an adapter. 2. The virtual connection point through which a computer uses a specific application on a server.

MM)PPTP (Point-to-Point Tunneling Protocol)A VPN protocol that allows the Point to Point Protocol (PPP) to be tunneled through an IP network.

NN)PreamblePart of the wireless signal that synchronizes network traffic.

OO)RADIUS (Remote Authentication Dial-In User Service)

A protocol that uses an authentication server to control network access.

PP) RJ-45An Ethernet connector that holds up to eight wires.

QQ)RoamingThe ability to take a wireless device from one access point's range to another without losing the connection.

RR) RouterA networking device that connects multiple networks together, such as a local network and the Internet.

SS) Secure W2Software used to create a WUFI-S connection on a Win-dows laptop.

TT) ServerAny computer whose function in a network is to provide user access to files, printing, communications, and other services.

UU)SSID (Service Set IDentifier)Your wireless network's name.

VV)Static IP AddressA fixed address assigned to a computer or device that is connected to a network.

WW)Subnet MaskAn address code that determines the size of the network.

XX) Switch1. Device that is the central point of connection for com-puters and other devices in a network, so data can be shared at full transmission speeds. 2. A device for mak-ing, breaking, or changing the connections in an electrical circuit.

YY) TCP/IP (Transmission Control Protocol/Internet Protocol)

A network protocol for transmitting data that requires acknowledgement from the recipient of data sent.

ZZ) UploadTo transmit a file over a network.

AAA)URL (Uniform Resource Locator)The address of a file located on the Internet.

BBB)VPN (Virtual Private Network)A security measure to protect data as it leaves one net-work and goes to another over the Internet.

CCC)WLAN (Wireless Local Area Network)A group of computers and associated devices that com-municate with each other wirelessly.

References:http://www.pchardware.co.uk/wirelessglossary.php

Wi r e l e s s N e t w o r k B o o t C a m p P r e s e n t e d b y S a r a h B o m b i c h

P a g e 16