top of page


Public·88 members
Nolan Williams
Nolan Williams

Wireless LAN FAQ

If you are in a wired location, we highly recommend you obtain a wireless router. ResNet can help you configure your wireless router. WiFi extenders are not permitted. See Wired Access for more details.

Wireless LAN FAQ

Locations with wireless ResNet (ResWiFi) have wireless access points (APs) permanently installed on the ceiling. These provide internet access to devices in your residence hall or apartment. Occasionally, ResNet technicians may ask for you to provide a photo of the access point in your bedroom or apartment. Here are some examples:

As an on-campus student, ResNet services are paid for by your housing fees. Support emails, calls, and repairs are at no additional charge. Students must obtain their own hardware for connecting (i.e. wireless adapters) or repairs (i.e. replacement hard drives).

There are many complex factors determining WiFi compatibility. Meeting these requirements is not a guarantee that your device will work on ResNet. Additional steps may be required for setup. Open a ticket with ResNet and provide the manufacturer, model, and wireless MAC address of your device for clarifications.

In a standard residential WiFi setup, your device is connected to a single wireless router. At a large campus like UCSC, there are thousands of wireless access points (APs). Your device will dynamically connect to the access point that it thinks is closest. When you walk around, your device should maintain your connection and seamlessly move between access points. The network has no control over these decisions. This selection and handoff process is known as roaming.

Service providers are expected to use CBRS to replace last-mile fiber access to customer sites, deliver fixed-wireless services, and even point-to-multipoint connections. Enterprises and managed service providers could exploit it for IoT connectivity and even for Wi-Fi replacement or supplementary services. LTE services could hit 1Gbps indoors and maybe five or 10 times that for outdoor uses with line-of-sight access. 5G could be 10 times faster than LTE.

With more than 3,200 Wireless Access Points (APs) installed across campus, WiFi is available in most buildings and can accommodate thousands of wireless devices at any given time. GV-Student, GV-Faculty-Staff, GV-Visitor, GV-GameNet, and eduroam are available anywhere there is wireless access.

A wireless connection is shared across all the users on a specific access point. A wired connection is not shared in the same way. Wireless technology is also susceptible to many forms of interference and the network adapter drivers can cause complications.

Note: Streaming devices, smart speakers and other smart home devices are primarily intended for use on residential wireless networks. These devices may or may not function properly on the UK wireless network. ITS is happy to assist onboarding devices and resolving any device authentication issues. However, due to the growing number of devices that are available, communication issues between smart home devices is not supported at this time.

Every department on campus is expected to support a wireless Web page at the subdirectory wireless below their main page. Ours provides information specific to our department and the College of Science, and includes a link to the campus-wide wireless page.

Access to campus wireless networks requires a University of Utah Network ID and password, the same one that students use to access grades and personal portals, and faculty and staff use for administrative purposes. In addition, on Microsoft Windows and older Mac OS X systems, it requires installation of a special client program on your computer that is used in the initial connection to provide for authentication, as described here.

There are two parts of a wireless connection: a (usually powerful) wireless access point (WAP), and a (relatively puny) laptop, PDA, etc. The latter can often see one or more network access points, but not have enough power to reach them. This is particularly a problem for outdoor connections.

Because a wireless network is a broadcast medium, all wireless traffic is visible to anyone with suitable equipment within the range of any transmitter, including the access points mounted on building walls and rooftops, and wireless cards inside computers, PDAs, newer cell phones, ... Moreover, sniffing attacks are common, and should always be expected to be present. Thus, it is inherently insecure.

As a matter of campus network policy, during the authentication procedure, we provide two flavors of wireless access: the first is to (gradually being replaced by during Fall 2006) and the second (and much preferred) is to (gradually being replaced by during Fall 2006). Please use the newer addresses if your computer can see them. The changeover time varies from department to department, and some may offer both sets of services during the transition. The old networks should disappear by 1 January, 2007.

Connections on and use an encrypted channel so as to conceal traffic contents from attackers. Unfortunately, the wireless industry's attempts to provide encryption have been seriously flawed, so all of the current protocols, including WEP (Wireless Encryption Protocol, or Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), (L)EAP ((Lightweight) Extensible Access Protocol), and TKIP (Temporal Key Integrity Protocol) have been successfully attacked, and software for doing so is readily available. The insecurities are well-documented in a recent book, Wi-Foo: The Secrets of Wireless Hacking.

The and networks are completely untrusted, and reside outside the campus IP address space. In particular, this means that some campus services, such as access to licensed databases at campus libraries, are not available on these networks. However, you should still be able to do everything that you can do with a network connection at home, or with a public wireless connection offered by many businesses and local governments.

Until a future wireless protocol uses encryption based on the believed to be extremely secure NIST Advanced Encryption Standard (AES), you should assume that your wireless traffic can be, and will be, monitored and decrypted by attackers.

Eduroam is the primary wireless network at UNC. Configuring your device to use the UNC eduroam network gives you access at all eduroam institutions worldwide. You'll need to re-configure your devices once a year.

See these instructions for a detailed, step-by-step walk though of how to configure other UNC wireless networks on your computer or mobile device. Select the wireless network you would like to join to see specific instructions for that network.

All wireless devices* must first be registered in the Stanford network database (NetDB) before they can connect to SUNet. Note for laptop users: even if you have already registered your laptop's wired Ethernet connection, you must also register your wireless connection.

Some WiFi routers limit the number of wireless devices that can connect to the Internet. To test whether this is the problem, shut down one of the other WiFi-enabled devices in your home. Once that device is completely shut down, try once again to connect your WiFi Thermostat to the network. If the WiFi Thermostat connects successfully, consult the documentation for your access point or contact your Internet Service Provider (ISP) to find out if you can increase the number of simultaneous connections to your WiFi network.

The dynamic nature of a wireless network's radio frequency is susceptible to obstructions such as walls, bookshelves, large metal objects, and trees. Microwave ovens, cordless phones, baby monitors, and plasma cutters also operate on the same frequency as the wireless access points and can cause interference as well. Incorrectly configured clients can also disrupt your wireless network connection.

Make sure you have installed all available patches for your PC wireless card. Check the manufacturer's website for the latest updates as older versions may not work with the campus network. Macintosh users should install all patches, including those for Airport. Run Software Update from the Apple menu. Note:The wireless network is not intended as a replacement for the wired network. If you are working from a fixed location, you should use a traditional Ethernet connection.

No. Students are not permitted to run individual wireless routers/access points in their rooms. Running a wireless router/access point is a violation of Lehigh's Acceptable Use policy and can result in a loss of network access for violators. There are many reasons for this prohibition. Student-run routers/access points interfere with Lehigh's wireless signal and will cause problems for other students living nearby who are trying to use it. Also, they pose a security risk. Misconfigured or poorly secured routers/access points can leave a student's computer vulnerable to possible hacking and other security threats.

Generally, no. Very few wireless printers support the type of security protocol that allows them provide the needed username and password, and doing so would require storing those credentials in a potentially insecure fashion.

Big. The 'lehigh' wireless network provides high-speed connectivity to all of the university's networked systems, just like the wired LAN. The 'lehigh-guest' network only provides access to the internet, and at a very low speed, strictly as a convenience for guests of the university. It's only intended for temporary light-duty email and browsing. It has no security at all, and really should not be used by students, faculty or staff on any regular basis. The regular 'lehigh' network is broadcast by the same access points, and is available at the same signal strength. 350c69d7ab


Welcome to the group! You can connect with other members, ge...


  • tpeters20
  • Max Henty
    Max Henty
  • Chris Hemstone
    Chris Hemstone
  • Check Balance
    Check Balance
  • Anastasy
bottom of page