Difference between revisions of "Wireless"

From WolfTech
Jump to navigation Jump to search
 
(One intermediate revision by the same user not shown)
Line 16: Line 16:
  
 
* D. H. Hill Library
 
* D. H. Hill Library
* Harrelson Hall
 
 
* Poe Hall
 
* Poe Hall
 
* Riddick Labs
 
* Riddick Labs
Line 48: Line 47:
 
'''NOTE:''' You must do this FROM the laptop and you MUST be on NCSU wireless when you try to do this.  
 
'''NOTE:''' You must do this FROM the laptop and you MUST be on NCSU wireless when you try to do this.  
  
There is a limit of 3 devices per person. Renewal of your registered devices is required each semester.
+
There is a limit of 5 devices per person. Renewal of your registered devices is required each semester.
  
 
==Guest Access==
 
==Guest Access==

Latest revision as of 12:23, 18 January 2017

Info.pngPlease visit http://itd.ncsu.edu for official documentation.

As the NC State Data Network matures, wireless connectivity becomes even more important. Although in its infant stages at NC State, wireless technologies will soon be commonplace. ComTech is responsible for ensuring that the data network here at NC State remains stable and reliable.

The wireless connections at NC State allow for anyone with a wireless card in their computer to login into the campus network. There is no longer a need to tether yourself to a wall with an ethernet cable. With wireless you can do everything you could do with your wired connection including:

  1. Get on your laptop and check your e-mail from anywhere on campus
  2. Complete and submit your classwork online
  3. Chat with your friends using AIM
  4. Do research for your next big English paper

However, keep in mind that the range is less than 300 feet, and is diminished further if the signal has to travel through walls or is hampered by other obstacles. Therefore, it may be helpful to know the wireless coverage area.

Coverage

As of now, there is only partial coverage of the campus. Both Daniels Hall and EGRC, on Centenial Campus, are fully covered. A complete coverage map can be found on the Coverage Maps page. Campus coverage areas include:

  • D. H. Hill Library
  • Poe Hall
  • Riddick Labs
  • Mann Hall
  • Partners I - Centenial Campus (ECE controlled Suites)
  • Flex Building - 1400 and 1500 modules
  • EB1 Classrooms & Atrium
  • EB2 Classrooms

If there is a place you want wireless, and it's not available, you can vote to have it added. In addition to other scheduled installations, each month NC State will add another wireless access point to a new location based upon votes received at http://wireless.ncsu.edu/hotspot.htm.

Access

To login to NCSU's Nomadic Computing System, follow the steps below. You will then remain connected to the Nomad network, provided your computer does not go network idle for two hours or you are off the network for 10 minutes.

  1. Allow you computer to fully boot.
  2. Attach your Wireless card (or be sure it's enabled if yours is an on-board card).
  3. Once you are certain that your card has been connected correctly, make sure you are using an SSID of ncsu.
  4. At this point, open your web browser. Your homepage should now be replaced with the login page for the Nomad system.
  5. Login using you Unity ID and password.

For additional information about wireless access at NC State, please visit http://wireless.ncsu.edu/.

NOMAD Registration System

Tired of having to authenticate through NOMAD every time you want to use wireless on your laptop? Is authenticating with your PDA a real hassle?

ITD has released the new NOMAD Registration System for open beta testing. When you register a device it will be able to gain network access immediately without requiring you to sign in using your username and password. Once a device has been registered, it will transparently authenticate itself to the Nomad system using the registration profile that is associated with your account.

From your wireless device, head to http://nomad.ncsu.edu, login, and register your laptop/pda. You'll see "Add Device" on the left-hand navigation.

NOTE: You must do this FROM the laptop and you MUST be on NCSU wireless when you try to do this.

There is a limit of 5 devices per person. Renewal of your registered devices is required each semester.

Guest Access

NCSU has rolled out a new Guest Wireless system throughout campus. This will allow visitors/guests to have access to the internet without having to authenticate to the NOMAD system. This service is limited to http/https usage (i.e., they can only browse the web). Most VPN clients will also function.

Visitors will need to select the NCSU-GUEST network when attempting to access the Internet. NCSU remains the regular NOMAD protected network. If there are any problems connecting, please contact the NOC at 513-9675 or support@ncstate.net.

Commonly Asked Questions

For further information and additional frequently asked questions regarding wireless, visit the online FAQ.

What kind of service can I expect from Mobile Computing?

The goal of the NCSU wireless will be pervasive connectivity of the highest speed technologically possible, and will be maintainable so that users will experience the minimum of slowdowns and disruptions with the design goal being for pervasive 11MBps coverage. Faster speeds (54MBps) will be considered a bonus. There may be areas where it is not pragmatic to design for 11MBps. These areas would probably be "pockets" with few occupants where improving coverage would significantly impact the design and costs.

What rules are there for using the Nomadic wireless network?

Running remote services (web server, ftp server, nfs server, any person-to-person file sharing services, etc) is prohibited. All traffic to and from the Nomad System is logged and associated with the user, as permitted by the NC State Administrative Regulations, section II, G.

Is the NC State wireless Nomadic network secure?

Wireless network users are responsible for the security of the data transmissions they send over the wireless network. Transmissions over the wireless network are not encrypted or secure. Users are strongly encouraged to use secure application-level protocols when sensitive information traverses the wireless network; otherwise, they should move to the wired network. Example secure application-level protocols are: https, ssh, scp, vpn.