SlideShare a Scribd company logo
1 of 22
WiFi for Mobile
Networks
Teresa Ulmer
EdTech 541
What is WiFi?
 “Wireless Fidelity”
 Wireless communication between a computer
and an Access Point (AP) and the Internet
What is WiFi?
Antenna
transmits
radio waves
Access point
sends info to the
Internet
Wireless Adaptor
converts data
into radio waves
Access Point
(connected to LAN)
translates radio waves
into data
Internet
responds to
data
Internet data
travels to Access
Points
AP sends
data in form
of radio
waves to
wireless
devices
What is WiFi?
 One access point
connects several
devices to the
Internet
 If AP fail or if too
many people try to
use high-bandwidth
applications
simultaneously
 Interference can
occur
 Connections can be
lost
Why have WiFi in High School
Classrooms?
 Data Sharing
 Access to Internet for Research
 Access to Tools that Enhance Learning
 Graphing calculators
 Simulations
 Virtual labs
 E-books
 Student response systems
 Improves Classroom Communication
ALLOWS FOR:
Steps for integrating a WiFi
Network in a High School
1. Identify users
Who will the network serve?
 Students
 Teachers
 Administrators
 Counselors
 Support staff
 Guests
Steps for integrating a WiFi
Network in a High School
2. Define coverage area
Where are the people who will be served by the
network?
 classrooms
 media center
 cafeteria
 common areas
 offices
 outside of buildings
 gymnasium
 sports fields
Steps for integrating a WiFi
Network in a High School
3. Determine uses for the network
What are the users going to do on the
wireless network?
 Gather/organize student data
 Grade students
 Communication
 Research
 Planning/prepping for courses
 Using educational tools
Steps for integrating a WiFi
Network in a High School
4. Plan for growth
 How many users will be accessing the
network (today and in the future)?
 Students
 Staff
 Guests
Steps for integrating a WiFi
Network in a High School
5. Determine network layout
a. How many access points (AP) will be
needed
 Each AP supports a set number of devices
b. Where the AP should be located
 Each AP needs an Ethernet cable and power
Steps for integrating a WiFi
Network in a High School
6. Install Access Points and Connect them to
the Network
Modem
(Cable/DSL)Internet
Router Wireless
Access
Point (WAP)
Clients
Steps for integrating a WiFi
Network in a High School
7. Configure network
 Set SSID (service set identifier)for the Network
 Unique name of wireless local area network
(WLAN)
 Case-sensitive sequence of alphanumeric
characters (up to 32)
 Enable encryption (WPA-PSK2 etc.) and
“password” to allow only authorized devices to
access the network
 Set WAPs with same SSID and encryption set
 Push configurations from a central controller
or configure each individual AP
Steps for integrating a WiFi
Network in a High School
8. Test the network and
trouble shoot
 Dead zones
 Interference (file
cabinets; lockers;
microwaves; building
materials
 Performance issues (low
speeds, etc. requires
software tools)
 Move WAPs to achieve
optimal
coverage/performance
Steps for integrating a WiFi
Network in a High School
9. Provide access to the network
 Students
 Teachers
 Administrators
 Counselors
 Support staff
 Guests
Potential Problems
 Should overlap
 # of APs required to provide wireless coverage in
desired locations
 Coverage
Potential Problems
 Depends on usage (can be projected using packet analyzer
software)
 # of APs required to provide the minimum acceptable data
rates
 min data rate = size of cell = Access Points
 Capacity
Potential Problems
 Security
 Encrypt data being transmitted
 Authenticate users
 Eliminate of rogue access points
Potential Problems
 Security
 Needs depend on the type of WLAN you're
accessing and the level of data encryption
required
 Three options for secure WLAN encryption and
authentication:
1. Wi-Fi Protected Access (WPA)
2. Wi-Fi Protected Access 2 (WPA2)
3. Virtual Private Networking (VPN)
 effective security for mobile users accessing the
network
WPA and WPA2
Virtual Private Networking (VPN)
Potential Problems
 Misuse
Resources
 Education World and Smith, R. (2011). Setting Up School WiFi Part II: Larger Networks. In Education World. Retrieved Sept 13, 2013, from
http://www.educationworld.com/a_tech/setting_up_school_wifi_part_2.shtml.
 Dannenfeldt, D. (1998-2013). How Portable Internet Devices Work?. In How Stuff Works. Retrieved Sept 13, 2013, from
http://computer.howstuffworks.com/portable-internet-devices.htm.
 undefined. (Nov 1, 2002). Classrooms with WiFi. In The Journal. Retrieved Sept 13, 2013, from
http://thejournal.com/articles/2002/11/01/classrooms-with-wifi.aspx.
 undefined. (undefined). Securing Wireless Networks. In Cisco. Retrieved Sept 13, 2013, from
http://www.cisco.com/en/US/solutions/collateral/ns339/ns639/ns642/net_customer_profile0900aecd803ee938.html.
 Mitchell, B. (2013). SSID: Service Set Identifier. In About.com. Retrieved Sept 14, 2013, from
http://compnetworking.about.com/cs/wireless/g/bldef_ssid.htm.
 Shields, G. (Sept 21, 1012). 10 Things You Were Never Told about Wireless Network Planning. In Dell Software. Retrieved Sept 14, 2013, from
http://communities.quest.com/community/nms/blog/2012/09/21/10-things-you-were-never-told-about-wireless-network-planning.
 Undefined. (undefined). Securing your wifi network. In YouTube. Retrieved Sept 15, 2013, from
http://www.youtube.com/watch?v=_WHynHcXm7c
IMAGES
 [I-pad mini]. Retrieved Sept 15,2013, from: http://cdn.toucharcade.com/wp-content/uploads/2012/10/apple-ipad-mini-pr.jpeg
 [WiFi symbol]. Retrieved Sept 15, 2013, from: http://images.clipartlogo.com/files/images/16/164074/wireless-wifi-symbol_t
 [Wireless network ]. Retrieved Sept 15, 2013, from: http://www.vicomsoft.com/learning-center/wireless-networking/
 [Wireless chart]. Retrieved Sept 15, 2013, from: http://homepages.wmich.edu/~s5lu/images/wireless_chart.jpg
 [VPN}. Retrieved Sept 15, 2013, from: http://www.bath.ac.uk/bucs/networking/Images/VPNExample.PNG
 [WPA/Firewall ]. Retrieved Sept 15, 2013, from: http://www.techieapps.com/wp-content/uploads/2012/06/gfx2.gif
 [coverage and capacity plan]. Retrieved Sept 16, 2013, from: http://communities.quest.com/community/nms/blog/2012/09/21/10-
things-you-were-never-told-about-wireless-network-planning
 [encryption]. Retrieved Sept 16, 2013, from: http://gdp.globus.org/gt4-tutorial/multiplehtml/images/security_concepts_encryption.png
 [football interference]. Retrieved Sept 15, 2013, from: http://d.yimg.com/i/ng/sp/reuters/20110724/02/731199012-24072011022828.jpg
 [cyberbullying]. Retrieved Sept 15, 2013, from: http://info.uknowkids.com/Portals/176530/images/cyberbullying.jpg
 [hacking]. Retrieved Sept 15, 2013, from: http://hacknmod.com/hack/thousands-of-free-scanned-hacking-books/
 [plagiarism]. Retrieved Sept 15, 2013, from: http://library.austincc.edu/gen-info/plagiarism_theft.jpg
 [social media]. Retrieved Sept 15, 2013, from: http://blog.socialmaximizer.com/wp-content/uploads/2013/02/social_media.jpg
 [online games]. Retrieved Sept 15, 2013, from:
https://lh5.googleusercontent.com/oE0_zHsex8eWjXVykWER88CAC7NHd2LoIN9YXJPCVZjByefYXiYGtHhXTI0gqGsxUA0Mblqq=s640-h400-
e365

More Related Content

What's hot

Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and development
iarthur
 
Prototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on InternetPrototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on Internet
Afrah Fathima
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
heidirobison
 

What's hot (15)

Info systems design and development
Info systems design and developmentInfo systems design and development
Info systems design and development
 
Prototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on InternetPrototyping a Distance Learning Environment on Internet
Prototyping a Distance Learning Environment on Internet
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
2 1 lan
2 1 lan2 1 lan
2 1 lan
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
Lesson 25
Lesson 25Lesson 25
Lesson 25
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Computer Communications - R.D.Sivakumar
Computer Communications - R.D.SivakumarComputer Communications - R.D.Sivakumar
Computer Communications - R.D.Sivakumar
 
NETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D SivakumarNETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D Sivakumar
 
Computer networks
Computer networksComputer networks
Computer networks
 
Synopsis
SynopsisSynopsis
Synopsis
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Networks
NetworksNetworks
Networks
 
Examen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra TorresExamen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra Torres
 

Similar to WiFi for mobile networks

biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdf
JOMan21
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
Saravana Kumar
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
Yogesh Kumar
 
Integrating wi fi for mobile networks
Integrating wi fi for mobile networksIntegrating wi fi for mobile networks
Integrating wi fi for mobile networks
Bev Anderson
 
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
FAS 110CL QEP Assignment Why Study Theatre   Inst.docxFAS 110CL QEP Assignment Why Study Theatre   Inst.docx
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
ssuser454af01
 

Similar to WiFi for mobile networks (20)

Wireless and intranet
Wireless and intranetWireless and intranet
Wireless and intranet
 
All Chapter
All ChapterAll Chapter
All Chapter
 
biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdf
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Effect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video TransmissionEffect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video Transmission
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Wireless network
Wireless networkWireless network
Wireless network
 
final IT ppt.pptx
final IT ppt.pptxfinal IT ppt.pptx
final IT ppt.pptx
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
 
Integrating wi fi for mobile networks
Integrating wi fi for mobile networksIntegrating wi fi for mobile networks
Integrating wi fi for mobile networks
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
FAS 110CL QEP Assignment Why Study Theatre   Inst.docxFAS 110CL QEP Assignment Why Study Theatre   Inst.docx
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

WiFi for mobile networks

  • 2. What is WiFi?  “Wireless Fidelity”  Wireless communication between a computer and an Access Point (AP) and the Internet
  • 3. What is WiFi? Antenna transmits radio waves Access point sends info to the Internet Wireless Adaptor converts data into radio waves Access Point (connected to LAN) translates radio waves into data Internet responds to data Internet data travels to Access Points AP sends data in form of radio waves to wireless devices
  • 4. What is WiFi?  One access point connects several devices to the Internet  If AP fail or if too many people try to use high-bandwidth applications simultaneously  Interference can occur  Connections can be lost
  • 5. Why have WiFi in High School Classrooms?  Data Sharing  Access to Internet for Research  Access to Tools that Enhance Learning  Graphing calculators  Simulations  Virtual labs  E-books  Student response systems  Improves Classroom Communication ALLOWS FOR:
  • 6. Steps for integrating a WiFi Network in a High School 1. Identify users Who will the network serve?  Students  Teachers  Administrators  Counselors  Support staff  Guests
  • 7. Steps for integrating a WiFi Network in a High School 2. Define coverage area Where are the people who will be served by the network?  classrooms  media center  cafeteria  common areas  offices  outside of buildings  gymnasium  sports fields
  • 8. Steps for integrating a WiFi Network in a High School 3. Determine uses for the network What are the users going to do on the wireless network?  Gather/organize student data  Grade students  Communication  Research  Planning/prepping for courses  Using educational tools
  • 9. Steps for integrating a WiFi Network in a High School 4. Plan for growth  How many users will be accessing the network (today and in the future)?  Students  Staff  Guests
  • 10. Steps for integrating a WiFi Network in a High School 5. Determine network layout a. How many access points (AP) will be needed  Each AP supports a set number of devices b. Where the AP should be located  Each AP needs an Ethernet cable and power
  • 11. Steps for integrating a WiFi Network in a High School 6. Install Access Points and Connect them to the Network Modem (Cable/DSL)Internet Router Wireless Access Point (WAP) Clients
  • 12. Steps for integrating a WiFi Network in a High School 7. Configure network  Set SSID (service set identifier)for the Network  Unique name of wireless local area network (WLAN)  Case-sensitive sequence of alphanumeric characters (up to 32)  Enable encryption (WPA-PSK2 etc.) and “password” to allow only authorized devices to access the network  Set WAPs with same SSID and encryption set  Push configurations from a central controller or configure each individual AP
  • 13. Steps for integrating a WiFi Network in a High School 8. Test the network and trouble shoot  Dead zones  Interference (file cabinets; lockers; microwaves; building materials  Performance issues (low speeds, etc. requires software tools)  Move WAPs to achieve optimal coverage/performance
  • 14. Steps for integrating a WiFi Network in a High School 9. Provide access to the network  Students  Teachers  Administrators  Counselors  Support staff  Guests
  • 15. Potential Problems  Should overlap  # of APs required to provide wireless coverage in desired locations  Coverage
  • 16. Potential Problems  Depends on usage (can be projected using packet analyzer software)  # of APs required to provide the minimum acceptable data rates  min data rate = size of cell = Access Points  Capacity
  • 17. Potential Problems  Security  Encrypt data being transmitted  Authenticate users  Eliminate of rogue access points
  • 18. Potential Problems  Security  Needs depend on the type of WLAN you're accessing and the level of data encryption required  Three options for secure WLAN encryption and authentication: 1. Wi-Fi Protected Access (WPA) 2. Wi-Fi Protected Access 2 (WPA2) 3. Virtual Private Networking (VPN)  effective security for mobile users accessing the network
  • 22. Resources  Education World and Smith, R. (2011). Setting Up School WiFi Part II: Larger Networks. In Education World. Retrieved Sept 13, 2013, from http://www.educationworld.com/a_tech/setting_up_school_wifi_part_2.shtml.  Dannenfeldt, D. (1998-2013). How Portable Internet Devices Work?. In How Stuff Works. Retrieved Sept 13, 2013, from http://computer.howstuffworks.com/portable-internet-devices.htm.  undefined. (Nov 1, 2002). Classrooms with WiFi. In The Journal. Retrieved Sept 13, 2013, from http://thejournal.com/articles/2002/11/01/classrooms-with-wifi.aspx.  undefined. (undefined). Securing Wireless Networks. In Cisco. Retrieved Sept 13, 2013, from http://www.cisco.com/en/US/solutions/collateral/ns339/ns639/ns642/net_customer_profile0900aecd803ee938.html.  Mitchell, B. (2013). SSID: Service Set Identifier. In About.com. Retrieved Sept 14, 2013, from http://compnetworking.about.com/cs/wireless/g/bldef_ssid.htm.  Shields, G. (Sept 21, 1012). 10 Things You Were Never Told about Wireless Network Planning. In Dell Software. Retrieved Sept 14, 2013, from http://communities.quest.com/community/nms/blog/2012/09/21/10-things-you-were-never-told-about-wireless-network-planning.  Undefined. (undefined). Securing your wifi network. In YouTube. Retrieved Sept 15, 2013, from http://www.youtube.com/watch?v=_WHynHcXm7c IMAGES  [I-pad mini]. Retrieved Sept 15,2013, from: http://cdn.toucharcade.com/wp-content/uploads/2012/10/apple-ipad-mini-pr.jpeg  [WiFi symbol]. Retrieved Sept 15, 2013, from: http://images.clipartlogo.com/files/images/16/164074/wireless-wifi-symbol_t  [Wireless network ]. Retrieved Sept 15, 2013, from: http://www.vicomsoft.com/learning-center/wireless-networking/  [Wireless chart]. Retrieved Sept 15, 2013, from: http://homepages.wmich.edu/~s5lu/images/wireless_chart.jpg  [VPN}. Retrieved Sept 15, 2013, from: http://www.bath.ac.uk/bucs/networking/Images/VPNExample.PNG  [WPA/Firewall ]. Retrieved Sept 15, 2013, from: http://www.techieapps.com/wp-content/uploads/2012/06/gfx2.gif  [coverage and capacity plan]. Retrieved Sept 16, 2013, from: http://communities.quest.com/community/nms/blog/2012/09/21/10- things-you-were-never-told-about-wireless-network-planning  [encryption]. Retrieved Sept 16, 2013, from: http://gdp.globus.org/gt4-tutorial/multiplehtml/images/security_concepts_encryption.png  [football interference]. Retrieved Sept 15, 2013, from: http://d.yimg.com/i/ng/sp/reuters/20110724/02/731199012-24072011022828.jpg  [cyberbullying]. Retrieved Sept 15, 2013, from: http://info.uknowkids.com/Portals/176530/images/cyberbullying.jpg  [hacking]. Retrieved Sept 15, 2013, from: http://hacknmod.com/hack/thousands-of-free-scanned-hacking-books/  [plagiarism]. Retrieved Sept 15, 2013, from: http://library.austincc.edu/gen-info/plagiarism_theft.jpg  [social media]. Retrieved Sept 15, 2013, from: http://blog.socialmaximizer.com/wp-content/uploads/2013/02/social_media.jpg  [online games]. Retrieved Sept 15, 2013, from: https://lh5.googleusercontent.com/oE0_zHsex8eWjXVykWER88CAC7NHd2LoIN9YXJPCVZjByefYXiYGtHhXTI0gqGsxUA0Mblqq=s640-h400- e365