This section contains Mobile Wireless Networking Regulations as approved by ICTC. These rules and regulations will evolve as experience is gained, and should be considered a supplement to the existing University IT facility regulations.
The following represents the current thinking and is similar to that in use elsewhere; a short rationale for each point is given.
To avoid ambiguities, we have used particular terminology when explaining the rules.
Must, required and shall
'Must', 'required' and 'shall' mean that the item is an absolute requirement of any Mobile Wireless Network.
Must not and shall not
'Must not' and 'shall not' mean that the item is an absolute prohibition of any Mobile Wireless Network.
Should or recommended
'Should' or 'recommended' mean that there may exist valid reasons in particular circumstances to ignore a particular item, but the full implications must be understood and carefully weighed before choosing a different course.
Should not and not recommended
'Should not' and 'not recommended' mean that there may exist valid reasons in particular circumstances when the particular behavior is acceptable or even useful, but the full implications should be understood and the case carefully weighed before implementing any behavior described with this label.
a. Only authorized wireless networks are allowed.
A wireless network must not be operated without the knowledge and permission of the unit in which it operates. Rogue access points compromise security and interfere with normal operations.
b. The service set identifier (SSID) 'OWL'
The service set identifier (SSID) 'OWL', or any prefix or suffix on that identifier, may only be used according to a naming scheme released by IT Services, and the OWL family of SSIDs will be used only to provide standardised OWL services This is in order to ensure users can configure their clients in any part of the collegiate University, and receive an equivalent service wherever else that SSID is in use.
c. The SSID 'Eduroam'
The SSID 'Eduroam', or any prefix or suffix on that identifier, may not be used except for the purposes of the international Eduroam service. It is a requirement of the University's participation in the Eduroam Federation that we undertake to protect the use of the Eduroam SSID namespace.
d. All wireless networks must be registered with IT Services
All wireless networks must be registered with IT Services by the local IT support staff. A database of all established networks, and who is responsible for them, will assist in maintaining control of the network and when considering and advising upon the installation of further networks.
e. The wireless network must be separated from any other University connected network
This is a basic security procedure. If it is part of a unit's main network, then anyone who connects to that access point will become part of that network.
f. User authorization is required before network access is allowed
This is self-explanatory, and exists to support the University and Janet IT use regulations.
g. Strong data encryption must be used
Wireless network traffic is readily available for anyone to see, even if they have not associated with an access point. Encryption is necessary to ensure that data, such as passwords, cannot be seen.
h. Hosts offering services that compromise security shall not be permitted
Examples of this include proxy, relay, DHCP, routing services etc. This refers to client operations, not system provided facilities.
i. All associations must be recorded
In the event of abuse of the connection, for whatever reason, it is vital that the user concerned can be identified.
a. The IEEE 802.11g wireless standard should be supported
This is the wifi standard most commonly be available on clients.
b. Wifi-approved equipment should be used
Compatibility between equipment cannot be guaranteed unless it has been tested. Wifi approved equipment has been through the approval process - so it will work.
c. Only the IP protocol should be supported
IP is the protocol of choice - all others are treated as legacy protocols by the University and have dwindling support.
d. The minimum necessary power to provide coverage of your area should be used
Use of high signal strengths causes the signal to propagate into areas where coverage may not be required and, indeed, could provide potential connectivity to people for whom it is not intended. Reducing power levels reduces leakage and interference problems.
e. Use different frequencies to those of nearby access points (which may be in another building)
Suitable choices of channel allocations can reduce interference between multiple access points, thus improving signal strength to clients and allowing higher throughput. The limited number of available channels (three) at 2.4 GHz means that this is recommended.
f. High bandwidth utilization applications should not be allowed
As wireless technology is a shared medium with limited bandwidth, it is possible for one user to utilize the majority of the bandwidth. If anyone has high bandwidth needs then a normal 'wired' connection should be used.