SlideShare uma empresa Scribd logo
1 de 15
How to Add Mobile Devices to Your
School Network
WiFi For Mobile Networks
Issues to Consider
 What is a Network?
 Current Network
 Needs Analysis:
 Why do we need mobile devices?
 Access points
 Teacher, Staff and Administrator needs
 Student needs
 Budget & Infrastructure
 Implementation
 Maintenance & Testing
 Network Security
 Acceptable Use Policy
 Local Results
 A network connects computers to each other, and
often to the Internet
 Switches connect computers and printers within a
building, creating a network, or Intranet.
 Routers connect computers to other networks, or the
Internet
What is a Network?
What is a Wireless Network?
 A wireless network allows devices to access each
other (computers, printers etc) and the Internet
without cables. Prior to wireless technology , most
computers connected via phone modems or
Ethernet cables.
 Most newer computers have built-in wireless
networking; older computers may require a
wireless network adapter card (Cisco).
 A wireless router typically extends up to 300
feet, sufficient for a room or home space. (Cisco).
Current Network
 How many computers, peripherals and other
devices?
 What servers, operating systems are running?
 What is the speed of the network?
Photo source: http://www.flickr.com/photos/ash-brown/955897562/
Why Mobile Devices?
 Students need laptops, tablets and other
devices for school work
 Teachers want to use iPads or other devices
in the classroom
 The computer lab is overused or
overscheduled
 School wants to use cloud storage
Access Points
 Existing computer
lab/facilities
 Classrooms
 Common areas:
hallways, locker rooms,
library, lunch room.
 Other areas on campus:
 Teachers lounge
 Labs, gym, field
 Do visitors need access?
Photo source:
http://www.flickr.com/photos/cimatti/433593238/
Teacher & Staff Needs
 How do teachers plan to use mobile devices?
 Streaming movies in class
 Use iPad apps
 Use student response systems
 Use their own laptop in the classroom
 How do staff members plan to use mobile
devices?
 Attendance
 Contact with parents
 Training purposes
Student Needs
 Where will students use
wireless?
 In classrooms for learning
 In common areas
 Possibly outside buildings
to extend the classroom
 Can students bring their
own device (BYOD) ?
 How will students
connect?
 Automatically, or
password?
Photo source:
http://www.flickr.com/photos/56155476@N08/6660042
699/
Budget
 Faster speeds and higher capacity = Higher costs
 Consider the following:
 Number of devices: Each user may have multiple
devices such as a laptop, tablet and smartphone
 Number of access points – each
classroom, common areas, etc.
 Bandwidth limitations – consider the busiest times
of day and usage expectations.
 Maintenance/Hardware costs
 Initial Setup
 Ongoing maintenance and upgrades
 Plan for expansion
Security
 Network security starts with the
router. Becky Waring of
PCWorldsuggests, “If you haven't
already, enable your router's
encryption... The Wireless
Protected Access (WPA) protocol
and more recent WPA2 have
supplanted the older (WEP).
 The router firewall prevents
users on the Internet from
accessing your computer, but
does not protect the network
from being used.
 Make sure you change the
default network name and
password on your router.
 Students should keep passwords
Photo source:
http://www.flickr.com/photos/simon_cocks/453
4589059/
Maintenance & Testing
 After the network is configured, Education world
suggests that you check and test the coverage.
 “Do you have coverage in the areas you expected?
Is the performance what you expected? Keep an
open mind and remember that some adjustments
may be needed.”
 On-going maintenance includes back-ups,
security software checks and hardware tests
 Change password regularly/annually for schools
 Make plans for expansion as needs change
Acceptable Use Policy
 The Acceptable Use Policy (AUP) document
communicates expectations to students and
parents
 The policy can lay out the school vision, list
specific do’s and don’ts or discuss hardware care
and maintenance.
 It defines the student’s and school’s responsibility
in case of inappropriate use, accessing content,
and loss of equipment.
Local Results
 In my previous high school, a wireless network was
put in place several years ago:
 All teachers, staff and students had access
 Devices were configured for each community member
– passwords were not handed out except for guest
access
 Each person had a unique email address, server
space
 Each full-time staffer and student has an iPad
(beginning 2012)
 Laptop, iPad and smartphone use prevalent
 Network frequently does not have enough bandwidth
for streaming video or accessing server mid-day, but
improvements are made annually.
 Network extends through multiple school buildings
References
Education World (n.d.). Setting Up School Wi-Fi Part 2: Larger Networks.
Retrieved June 21, 2013 from:http://www.educationworld.com/a_tech
setting_up_school_wifi_part_2.shtml
Cisco Systems (n.d.). What is a Network Switch vs. a Router? Retrieved June 24,
2013 from:
http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti
cles/connect_employees_and_offices/what_is_a_network_switch/index.html
Cisco Systems (n.d.) Wireless Network FAQ. Retrieved June 24, 2013 from:
http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti
cles/work_from_anywhere/wireless_networking_faq/index.html
Waring, Becky. (2007). How to secure your wireless network. PCWorld. Retrieved
from: http://www.pcworld.com/article/130330/article.html

Mais conteúdo relacionado

Mais procurados

Educause2011PresentationFinal
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinal
tbanks
 
Use of technology in education
Use of technology in education Use of technology in education
Use of technology in education
BK Patel
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
jenice
 
Major project 1 ppt new
Major project 1 ppt newMajor project 1 ppt new
Major project 1 ppt new
jenice
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
jenice
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
boone1
 
Tech. ppt new
Tech. ppt newTech. ppt new
Tech. ppt new
jenice
 

Mais procurados (19)

CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation SecurityCASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
 
Educause2011PresentationFinal
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinal
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Use of technology in education
Use of technology in education Use of technology in education
Use of technology in education
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Mobile learning for care workers
Mobile learning for care workersMobile learning for care workers
Mobile learning for care workers
 
Middle School Technology
Middle School TechnologyMiddle School Technology
Middle School Technology
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Major project 1 ppt new
Major project 1 ppt newMajor project 1 ppt new
Major project 1 ppt new
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Tech. ppt new
Tech. ppt newTech. ppt new
Tech. ppt new
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Education
 
Gareth Frith & Dr Gill Taylor, ALPS
Gareth Frith & Dr Gill Taylor, ALPSGareth Frith & Dr Gill Taylor, ALPS
Gareth Frith & Dr Gill Taylor, ALPS
 
How byod can be leveraged in education sector
How byod can be leveraged in education sectorHow byod can be leveraged in education sector
How byod can be leveraged in education sector
 
Distance Learning
Distance LearningDistance Learning
Distance Learning
 
7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT Infrastructure7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT Infrastructure
 
Disadvantages of technology
Disadvantages of technologyDisadvantages of technology
Disadvantages of technology
 
Assistive technology presentation
Assistive technology presentation Assistive technology presentation
Assistive technology presentation
 

Destaque

Destaque (8)

What is the Global Heart Network
What is the Global Heart NetworkWhat is the Global Heart Network
What is the Global Heart Network
 
Bases legales
Bases legalesBases legales
Bases legales
 
Bangalore's Greenest Homes: Chockalingam Muthiah on his green home
Bangalore's Greenest Homes: Chockalingam Muthiah on his green homeBangalore's Greenest Homes: Chockalingam Muthiah on his green home
Bangalore's Greenest Homes: Chockalingam Muthiah on his green home
 
How to put a story to your pictures by Peevee
How to put a story to your pictures by PeeveeHow to put a story to your pictures by Peevee
How to put a story to your pictures by Peevee
 
Ravindra green home
Ravindra green homeRavindra green home
Ravindra green home
 
Viruset
VirusetViruset
Viruset
 
Philippines Art
Philippines ArtPhilippines Art
Philippines Art
 
Epic story of Ibalon
Epic story of IbalonEpic story of Ibalon
Epic story of Ibalon
 

Semelhante a Mobile

Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13
Sheryl Abshire
 
Building An Education Network for the Future
Building An Education Network for the FutureBuilding An Education Network for the Future
Building An Education Network for the Future
Michael Przytula
 
Action Model
Action ModelAction Model
Action Model
u082934
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
spaul6414
 
Poteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the FuturePoteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the Future
Jennifer Lopez
 
Networking in a k 12 school
Networking in a k 12 schoolNetworking in a k 12 school
Networking in a k 12 school
biggsboys
 
Wireless Requirements and Benefits in the Academics Domain
Wireless Requirements and Benefits in the Academics DomainWireless Requirements and Benefits in the Academics Domain
Wireless Requirements and Benefits in the Academics Domain
Associate Professor in VSB Coimbatore
 
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Cisco Service Provider Mobility
 
Review Of A De Technology (Report)
Review Of A De Technology (Report)Review Of A De Technology (Report)
Review Of A De Technology (Report)
u068704
 

Semelhante a Mobile (20)

BYOD for digital exams
BYOD for digital examsBYOD for digital exams
BYOD for digital exams
 
Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13Lacue-SITE Conference Mobile Learning 3 25-13
Lacue-SITE Conference Mobile Learning 3 25-13
 
Building An Education Network for the Future
Building An Education Network for the FutureBuilding An Education Network for the Future
Building An Education Network for the Future
 
Internet based learning slideshare
Internet based learning slideshareInternet based learning slideshare
Internet based learning slideshare
 
Internet based learningv slideshare
Internet based learningv slideshareInternet based learningv slideshare
Internet based learningv slideshare
 
21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow21st Century Learning Initiative Training Slideshow
21st Century Learning Initiative Training Slideshow
 
Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
 
Action Model
Action ModelAction Model
Action Model
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Poteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the FuturePoteet ISD Technology Plan for the Future
Poteet ISD Technology Plan for the Future
 
BYOD for exams: leaving students to their own devices
BYOD for exams: leaving students to their own devicesBYOD for exams: leaving students to their own devices
BYOD for exams: leaving students to their own devices
 
Networking in a k 12 school
Networking in a k 12 schoolNetworking in a k 12 school
Networking in a k 12 school
 
Wireless Requirements and Benefits in the Academics Domain
Wireless Requirements and Benefits in the Academics DomainWireless Requirements and Benefits in the Academics Domain
Wireless Requirements and Benefits in the Academics Domain
 
Networks pres
Networks presNetworks pres
Networks pres
 
M learning in education
M learning in educationM learning in education
M learning in education
 
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
Should You Restrict Certain Devices from Accessing Your Campus Wi-Fi Network?
 
The Future of Technology and Education
The Future of Technology and EducationThe Future of Technology and Education
The Future of Technology and Education
 
Review Of A De Technology (Report)
Review Of A De Technology (Report)Review Of A De Technology (Report)
Review Of A De Technology (Report)
 
E learning
E learningE learning
E learning
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016
 

Último

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Mobile

  • 1. How to Add Mobile Devices to Your School Network WiFi For Mobile Networks
  • 2. Issues to Consider  What is a Network?  Current Network  Needs Analysis:  Why do we need mobile devices?  Access points  Teacher, Staff and Administrator needs  Student needs  Budget & Infrastructure  Implementation  Maintenance & Testing  Network Security  Acceptable Use Policy  Local Results
  • 3.  A network connects computers to each other, and often to the Internet  Switches connect computers and printers within a building, creating a network, or Intranet.  Routers connect computers to other networks, or the Internet What is a Network?
  • 4. What is a Wireless Network?  A wireless network allows devices to access each other (computers, printers etc) and the Internet without cables. Prior to wireless technology , most computers connected via phone modems or Ethernet cables.  Most newer computers have built-in wireless networking; older computers may require a wireless network adapter card (Cisco).  A wireless router typically extends up to 300 feet, sufficient for a room or home space. (Cisco).
  • 5. Current Network  How many computers, peripherals and other devices?  What servers, operating systems are running?  What is the speed of the network? Photo source: http://www.flickr.com/photos/ash-brown/955897562/
  • 6. Why Mobile Devices?  Students need laptops, tablets and other devices for school work  Teachers want to use iPads or other devices in the classroom  The computer lab is overused or overscheduled  School wants to use cloud storage
  • 7. Access Points  Existing computer lab/facilities  Classrooms  Common areas: hallways, locker rooms, library, lunch room.  Other areas on campus:  Teachers lounge  Labs, gym, field  Do visitors need access? Photo source: http://www.flickr.com/photos/cimatti/433593238/
  • 8. Teacher & Staff Needs  How do teachers plan to use mobile devices?  Streaming movies in class  Use iPad apps  Use student response systems  Use their own laptop in the classroom  How do staff members plan to use mobile devices?  Attendance  Contact with parents  Training purposes
  • 9. Student Needs  Where will students use wireless?  In classrooms for learning  In common areas  Possibly outside buildings to extend the classroom  Can students bring their own device (BYOD) ?  How will students connect?  Automatically, or password? Photo source: http://www.flickr.com/photos/56155476@N08/6660042 699/
  • 10. Budget  Faster speeds and higher capacity = Higher costs  Consider the following:  Number of devices: Each user may have multiple devices such as a laptop, tablet and smartphone  Number of access points – each classroom, common areas, etc.  Bandwidth limitations – consider the busiest times of day and usage expectations.  Maintenance/Hardware costs  Initial Setup  Ongoing maintenance and upgrades  Plan for expansion
  • 11. Security  Network security starts with the router. Becky Waring of PCWorldsuggests, “If you haven't already, enable your router's encryption... The Wireless Protected Access (WPA) protocol and more recent WPA2 have supplanted the older (WEP).  The router firewall prevents users on the Internet from accessing your computer, but does not protect the network from being used.  Make sure you change the default network name and password on your router.  Students should keep passwords Photo source: http://www.flickr.com/photos/simon_cocks/453 4589059/
  • 12. Maintenance & Testing  After the network is configured, Education world suggests that you check and test the coverage.  “Do you have coverage in the areas you expected? Is the performance what you expected? Keep an open mind and remember that some adjustments may be needed.”  On-going maintenance includes back-ups, security software checks and hardware tests  Change password regularly/annually for schools  Make plans for expansion as needs change
  • 13. Acceptable Use Policy  The Acceptable Use Policy (AUP) document communicates expectations to students and parents  The policy can lay out the school vision, list specific do’s and don’ts or discuss hardware care and maintenance.  It defines the student’s and school’s responsibility in case of inappropriate use, accessing content, and loss of equipment.
  • 14. Local Results  In my previous high school, a wireless network was put in place several years ago:  All teachers, staff and students had access  Devices were configured for each community member – passwords were not handed out except for guest access  Each person had a unique email address, server space  Each full-time staffer and student has an iPad (beginning 2012)  Laptop, iPad and smartphone use prevalent  Network frequently does not have enough bandwidth for streaming video or accessing server mid-day, but improvements are made annually.  Network extends through multiple school buildings
  • 15. References Education World (n.d.). Setting Up School Wi-Fi Part 2: Larger Networks. Retrieved June 21, 2013 from:http://www.educationworld.com/a_tech setting_up_school_wifi_part_2.shtml Cisco Systems (n.d.). What is a Network Switch vs. a Router? Retrieved June 24, 2013 from: http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti cles/connect_employees_and_offices/what_is_a_network_switch/index.html Cisco Systems (n.d.) Wireless Network FAQ. Retrieved June 24, 2013 from: http://www.cisco.com/cisco/web/solutions/small_business/resource_center/arti cles/work_from_anywhere/wireless_networking_faq/index.html Waring, Becky. (2007). How to secure your wireless network. PCWorld. Retrieved from: http://www.pcworld.com/article/130330/article.html