How many individuals use the Eaglenet wireless network daily?
Depending on the time of the day, the number of wireless users connected to the Eaglenet wireless network ranges from 400 to 2800 simultaneous users. Back to List
Can I roam with my laptop between campus buildings without having to login into Cisco Clean Access again?
The Eaglenet wireless network was overhauled during the summer of 2008. New equipment was installed and access points were upgraded, with the primary objective of enabling wireless users to move across the campus without having to re-authenticate to the Cisco Clean Access (CCA) system. Before this upgrade, moving from one building to another forced an Internet Protocol (IP) address change. The CCA system would then require a re-authentication to continue your network session. The new wireless network architecture allows you to maintain your original IP address after you move to another location. Back to List
Why do I have to login to CCA several times?
If you are being prompted to login to CCA more than once per session, your computer likely has both the wired and wireless connections enabled simultaneously. As a result, it goes back and forth from one connection to the other, forcing you to login to CCA each time. You should always disable your wireless connection, if you are connected to the wired network. Back to List
Why isn't the wireless network as fast as the wired network?
The Eaglenet wireless network supports both the 802.11b and 802.11g standards with the maximum bandwidth shared among the wireless users connected to each access point. The 802.11b standard has a maximum bandwidth of 11 million bits per second (Mbps), while the 802.11g standard has a maximum bandwidth of 54 Mbps. The wired network provides ports with a dedicated bandwidth of 10 to 100 Mbps per connected user. Wireless performance is distance sensitive, meaning that maximum performance will degrade on computers located farther away from the wireless antennas or other access points. As more wireless devices utilize the wireless network more heavily, performance degrades even further. Back to List
Is the wireless network as reliable as the wired network?
The wireless network is not as reliable as the wired network, because it uses radio frequencies to transmit data. The 802.11b and 802.11g wireless standards operate in an unlicensed frequency band of 2.4 GHz and are subject to frequency interference from sources, such as: microwave ovens, cordless phones, and other RF emitting devices. Additionally, overlapping frequencies from one or more rogue access points in one area can cause interference. Back to List
Is the wireless network as secure as the wired network?
The wireless network is less secure than the wired network, because wireless communication signals travel through the air and can be more easily intercepted by someone with malicious intentions. It is important to limit your transmission of sensitive information as much as possible, when you are connected to the wireless network. Back to List
Why does my wireless occasionally get disconnected?
There are several factors which may cause occasional wireless connectivity issues. Each is explored in more detail below:
A wireless access point is a small dedicated hardware device with a built-in network adapter, antenna, radio transmitter, and receiver. Access points act as the central transmitter and receiver of wireless network radio signals. Back to List
How many users can be connected to one access point simultaneously?
There is no hard and fast rule to determine how many users can be simultaneously connected to a single access point. The bandwidth allocated per user varies depending on the applications used and the number of other connected users, since it is shared. The available bandwidth per user decreases, as more users coonect to the same access point. Back to List
Should I configure my wireless adapter to use ad-hoc/peer-to-peer or infrastructure mode?
Your wireless card should be configured to use infrastructure mode, not the ad-hoc mode. Back to List
What is a wireless ad-hoc or peer-to-peer mode?
Operating in an ad-hoc or peer-to-peer mode allows all wireless devices within range of each other to discover and communicate directly with each other without going through an access point. This is not compatible with Eaglenet. Back to List
What is a wireless infrastructure mode?
Operating in infrastructure mode allows all wireless users within range of an access point to connect to it, share the same channel, and receive packets forwarded by the central access point. An infrastructure wireless network provides a more reliable network connection for the wireless users. Back to List
What is an SSID?
The Eaglenet SSID is eaglenet. The acronym SSID stands for Service Set Identifier. It is an alphanumeric key that uniquely identifies a wireless network. The SSID differentiates one wireless network from another. All access points and devices attempting to connect a specific wireless network must be configured with the same SSID. Back to List
What are the 802.11, 802.11b, and 802.11g standards?
The first wireless network standard created by the Institute of Electrical and Electronics Engineers (IEEE) was called 802.11. It only supported a maximum network bandwidth of 2 Mbps, which was slow for most applications. For this reason, ordinary 802.11 wireless products are no longer manufactured. In 1999, IEEE expanded on the original 802.11 standard, creating 802.11b specifications. It supports bandwidth of up to 11 Mbps, which is comparable to traditional Ethernet. In 2002 and 2003, wireless network products supporting a newer standard called 802.11g emerged on the market. 802.11g supports bandwidth of up to 54 Mbps. Back to List
Are the 802.11b and 802.11g standards compatible?
802.11g is backwards compatible with 802.11b, so 802.11g access points will work with 802.11b wireless network adapters and vice versa. Back to List
Why can't I install my own access point (AP)? What is a rogue access point?
You can not install your own access point. Any access point that has not been authorized, configured, and connected to the AU network by OIT is called a rogue access point. Rogue access points do not conform to AU's IT security policy. Rogue access points are security risks, cause radio frequency interference, and create an unstable wireless network environment. Back to List
Is there any signal interference or signal degradation because both wireless data and voice are carried through the same antenna?
There is no negative impact on the signal quality for wireless data, because each service works on a different frequency band. Back to List
Should I be concerned about the radiation from the ceiling mounted wireless antennas?
Wireless network antennas conform to radio frequency emission safety limits adopted by the FCC. These antennas are mounted on indoor structures providing a separation distance of several feet from all persons during the normal operation, which is well above the specified minimum distance of 20 centimeters. Back to List