New in Wireless...

A fast review of what’s next in higher ed wireless networking technologies.

If you’re involved with the care and construction of campus networks, you know that keeping up with developments in the wireless world is nearly a full-time job. But what if you cannot devote about 40 hours each week to keeping informed? To the rescue: A summary of some of the emerging changes and issues follows.

Ubiquity

Wireless LANs on most campuses consist of islands of coverage. Students, however, now have begun to expect wireless data coverage to be just as available as coverage for their mobile phones—in some cases, even off campus. You may wish to compare your institution to Intel Corporation’s top 100 list of “Most Unwired Colleges.” While 100 percent campuswide coverage isn’t yet widespread, it is out there: For example, Case Western Reserve University (OH) features the world’s largest, free, public wireless network, covering its 90-acre campus with more than 1,315 access points. You can expect ubiquitous wireless, or at least the expectation of it, to head your way soon.

Interference

In an unlicensed arena like Wi-Fi, it’s too easy for a student or staffer to set up a new wireless network without understanding or dealing with the potential interference to existing networks. By now, the controversy generated in September 2004 at the University of Texas at Dallas (about restricting students’ use of Wi-Fi in dorms, due to wireless interference) has subsided, but that’s because the administration backed down from its initial stance. UT’s proposal to prohibit the use of private Wi-Fi networks fizzled due to protests that only the FCC has jurisdiction over the interference of radio signals. In the long run, most higher ed institutions will need to create policies dealing with interference and security. One option: Apply existing Acceptable Use Policy (AUP) boundaries to prevent harm to the university’s network environment.

Security

The first recent development in security—the new IEEE 802.11i standard—was ratified in June 2004 and is available in some products now. The biggest change is support for the AES encryption standard, which although requiring new hardware in access points, can greatly enhance the privacy of wireless communications. Products that meet the 802.11i standard should be labeled as WPA2-compliant.

Another development in this area is the use of centralized “wireless switches” to configure security settings and enforce policies across the entire wireless network, from one point. Aruba (www.arubanetworks.com) and Airespace (www.airespace.com) are the market leaders, but the big networking vendors are moving in. One instance is the Cisco Systems ( www.cisco.com) purchase of AirDefense in October 2004, to strengthen its wireless security story (the Airespace buyout is next). New products should be available in March that incorporate the RF monitoring capabilities boasted by AirDefense. Key features include detection of “rogue” access points, protection against unauthorized intrusions, and the ability to track a wireless network’s overall “health.”

Remember, security can be imposed at several layers in the OSI model, and a multilayer defense is more effective than any single method. (American University in Washington, DC uses a combo of encryption keys; unique Service Set Identifier, or SSID, names; and required registration to a university computer account.) If your campus has Remote Authentication Dial-In User Services (RADIUS) authentication in place, be sure to utilize it for your wireless LANs, too.

Voice Over the Wireless LAN (Wireless VoIP)

For those who understand just how different wireless is from wired networking, wireless VoIP is a somewhat frightening prospect. Why? Because to achieve good voice quality requires very consistent network conditions, and it’s tough to design a wireless network that meets those stringent requirements. Dartmouth College (NH) is piloting students’ use of softphones (a program on the computer that allows it to be used like a phone; a headset is highly recommended) over the campus network, including the wireless network. The college is testing a combination of equipment including such from Cisco Systems. Another manufacturer working in this area is Extreme Networks (www.extremenetworks.com), which is supporting voice over wireless by implementing the SpectraLink Voice Priority Protocol and Inter-Access Point Protocol in its Layer 3 switches.

Handhelds on the WLAN

Remember the softphones at Dartmouth? That software is also available on some personal digital assistants (PDAs), permitting users to make voice calls over the wireless LAN via handheld devices. This will be an added boon to many: Wireless PDAs have really taken off in the university healthcare environment where practitioners use the devices to access patient records, record vital signs, and review medication orders. Now, they’ll be able to communicate, too.

Other Trends…and You

Watch for increases in wireless throughput to 100 Mbps via 802.11n (planned to be ratified in 2006), with pre-standard implementations as early as this summer. Another IEEE standard in the making is 802.11e, which will specify quality of service (QoS). This standard is expected to be ratified by mid-year. However, packet prioritization or Wi-Fi Multimedia (WMM) is already here.

Also coming soon are phones that can use both traditional cell/PCS and Wi-Fi. The first of these have come to market, but are not yet widely available.

As for the trends in general, and what action you should take: Frankly, it isn’t a question of whether, but when these trends will affect your institution. Prepare yourself now for the future of wireless on your campus by researching and piloting some of these new technologies; in short, work now to get those policies in place.

Featured

  • geometric grid of colorful faculty silhouettes using laptops

    Top 3 Faculty Uses of Gen AI

    A new report from Anthropic provides insights into how higher education faculty are using generative AI, both in and out of the classroom.

  • black analog alarm clock sits in front of a digital background featuring a glowing padlock symbol and cybersecurity icons

    The Clock Is Ticking: Higher Education's Big Push Toward CMMC Compliance

    With the United States Department of Defense's Cybersecurity Maturity Model Certification 2.0 framework entering Phase II on Dec. 16, 2025, institutions must develop a cybersecurity posture that's resilient, defensible, and flexible enough to keep up with an evolving threat landscape.

  • laptop displaying a phishing email icon inside a browser window on the screen

    Phishing Campaign Targets ED Grant Portal

    Threat researchers at cybersecurity company BforeAI have identified a phishing campaign spoofing the U.S. Department of Education's G5 grant management portal.

  • abstract pattern of shapes, arrows and circuit lines

    Internet2 Announces a New President and CEO to Step Up in October

    Internet2, the member-driven nonprofit offering advanced network technology services and cyberinfrastructure to the research and education community has completed its search, which began this past May, for a new president and CEO to take the helm.