As the NC State Data Network matures, wireless connectivity becomes even more important. Although in its infant stages at NC State, wireless technologies will soon be commonplace. ComTech is responsible for ensuring that the data network here at NC State remains stable and reliable.
The wireless connections at NC State allow for anyone with a wireless card in their computer to login into the campus network. There is no longer a need to tether yourself to a wall with an ethernet cable. With wireless you can do everything you could do with your wired connection including:
- Get on your laptop and check your e-mail from anywhere on campus
- Complete and submit your classwork online
- Chat with your friends using AIM
- Do research for your next big English paper
However, keep in mind that the range is less than 300 feet, and is diminished further if the signal has to travel through walls or is hampered by other obstacles. Therefore, it may be helpful to know the wireless coverage area.
As of now, there is only partial coverage of the campus. Both Daniels Hall and EGRC, on Centenial Campus, are fully covered. A complete coverage map can be found on the Coverage Maps page. Campus coverage areas include:
- D. H. Hill Library
- Harrelson Hall
- Poe Hall
- Riddick Labs
- Mann Hall
- Partners I - Centenial Campus (ECE controlled Suites)
- Flex Building - 1400 and 1500 modules
- EB1 Classrooms & Atrium
- EB2 Classrooms
If there is a place you want wireless, and it's not available, you can vote to have it added. In addition to other scheduled installations, each month NC State will add another wireless access point to a new location based upon votes received at http://wireless.ncsu.edu/hotspot.htm.
To login to NCSU's Nomadic Computing System, follow the steps below. You will then remain connected to the Nomad network, provided your computer does not go network idle for two hours or you are off the network for 10 minutes.
1. Allow you computer to fully boot. 2. Attach your Wireless card (or be sure it's enabled if yours is an on-board card). 3. Once you are certain that your card has been connected correctly, make sure you are using an SSID of ncsu. 4. At this point, open your web browser. Your homepage should now be replaced with the login page for the Nomad system. 5. Login using you Unity ID and password.
For additional information about wireless access at NC State, please visit http://wireless.ncsu.edu/.
NCSU has rolled out a new Guest Wireless system throughout campus. This will allow visitors/guests to have access to the internet without having to authenticate to the NOMAD system. This service is limited to http/https usage (i.e., they can only browse the web).
Visitors will need to select the NCSU-GUEST network when attempting to access the Internet. NCSU remains the regular NOMAD protected network. If there are any problems connecting, please contact the NOC at 513-9675 or firstname.lastname@example.org.
Commonly Asked Questions
What kind of service can I expect from Mobile Computing?
The goal of the NCSU wireless will be pervasive connectivity of the highest speed technologically possible, and will be maintainable so that users will experience the minimum of slowdowns and disruptions with the design goal being for pervasive 11MBps coverage. Faster speeds (54MBps) will be considered a bonus. There may be areas where it is not pragmatic to design for 11MBps. These areas would probably be "pockets" with few occupants where improving coverage would significantly impact the design and costs.
What rules are there for using the Nomadic wireless network?
Running remote services (web server, ftp server, nfs server, any person-to-person file sharing services, etc) is prohibited. All traffic to and from the Nomad System is logged and associated with the user, as permitted by the NC State Administrative Regulations, section II, G.
Is the NC State wireless Nomadic network secure?
Wireless network users are responsible for the security of the data transmissions they send over the wireless network. Transmissions over the wireless network are not encrypted or secure. Users are strongly encouraged to use secure application-level protocols when sensitive information traverses the wireless network; otherwise, they should move to the wired network. Example secure application-level protocols are: https, ssh, scp, vpn.
For further information and additional frequently asked questions regarding wireless, visit the online FAQ.