As the NC State Data Network matures, wireless connectivity becomes even more important. Although in its infant stages at NC State, wireless technologies will soon be commonplace. ComTech is responsible for ensuring that the data network here at NC State remains stable and reliable.
The wireless connections at NC State allow for anyone with a wireless card in their computer to login into the campus network. There is no longer a need to tether yourself to a wall with an ethernet cable. With wireless you can do everything you could do with your wired connection including:
However, keep in mind that the range is less than 300 feet, and is diminished further if the signal has to travel through walls or is hampered by other obstacles. Therefore, it may be helpful to know the wireless coverage area.
As of now, there is only partial coverage of the campus. Both Daniels Hall and EGRC, on Centenial Campus, are fully covered. A complete coverage map can be found on the Coverage Maps page. Campus coverage areas include:
If there is a place you want wireless, and it's not available, you can vote to have it added. In addition to other scheduled installations, each month NC State will add another wireless access point to a new location based upon votes received at http://wireless.ncsu.edu/hotspot.htm.
To login to NCSU's Nomadic Computing System, follow the steps below. You will then remain connected to the Nomad network, provided your computer does not go network idle for two hours or you are off the network for 10 minutes.
For additional information about wireless access at NC State, please visit http://wireless.ncsu.edu/.
NOMAD Registration System
Tired of having to authenticate through NOMAD every time you want to use wireless on your laptop? Is authenticating with your PDA a real hassle?
ITD has released the new NOMAD Registration System for open beta testing. When you register a device it will be able to gain network access immediately without requiring you to sign in using your username and password. Once a device has been registered, it will transparently authenticate itself to the Nomad system using the registration profile that is associated with your account.
From your wireless device, head to http://nomad.ncsu.edu, login, and register your laptop/pda. You'll see "Add Device" on the left-hand navigation.
NOTE: You must do this FROM the laptop and you MUST be on NCSU wireless when you try to do this.
There is a limit of 5 devices per person. Renewal of your registered devices is required each semester.
NCSU has rolled out a new Guest Wireless system throughout campus. This will allow visitors/guests to have access to the internet without having to authenticate to the NOMAD system. This service is limited to http/https usage (i.e., they can only browse the web). Most VPN clients will also function.
Visitors will need to select the NCSU-GUEST network when attempting to access the Internet. NCSU remains the regular NOMAD protected network. If there are any problems connecting, please contact the NOC at 513-9675 or email@example.com.
Commonly Asked Questions
For further information and additional frequently asked questions regarding wireless, visit the online FAQ.
What kind of service can I expect from Mobile Computing?
The goal of the NCSU wireless will be pervasive connectivity of the highest speed technologically possible, and will be maintainable so that users will experience the minimum of slowdowns and disruptions with the design goal being for pervasive 11MBps coverage. Faster speeds (54MBps) will be considered a bonus. There may be areas where it is not pragmatic to design for 11MBps. These areas would probably be "pockets" with few occupants where improving coverage would significantly impact the design and costs.
What rules are there for using the Nomadic wireless network?
Running remote services (web server, ftp server, nfs server, any person-to-person file sharing services, etc) is prohibited. All traffic to and from the Nomad System is logged and associated with the user, as permitted by the NC State Administrative Regulations, section II, G.
Is the NC State wireless Nomadic network secure?
Wireless network users are responsible for the security of the data transmissions they send over the wireless network. Transmissions over the wireless network are not encrypted or secure. Users are strongly encouraged to use secure application-level protocols when sensitive information traverses the wireless network; otherwise, they should move to the wired network. Example secure application-level protocols are: https, ssh, scp, vpn.