myIIT Portal

    IIT Wireless Services

    Wireless Internet is available throughout the IIT Main Campus; see the Wireless Coverage Map. This page provides links to view live status of wireless service on campus and information on how to use the system effectively.

    There are six OTS-managed network connections (SSIDs) on Main Campus:

    • SSID IIT-Secure supports 802.11a/g/n and is encrypted
    • SSID IIT-WiFi supports 802.11a/g/n
    • SSID IIT-Console supports gaming systems in IIT residence halls
    • SSID Eduroam supports 802.11g and 802.11n

    Two SSIDs are available for guests of IIT:

    • SSID IIT-Connect supports 802.11a/g/n
    • SSID IIT-IWS supports 802.11g

    Network connections other than those listed above are not managed or supported by OTS.

    Instructions for connecting to the IIT-Secure wireless network

    Average Daily Internet Traffic on Main Campus


    Click here for LIVE traffic maps in Campus Housing.

    About Wireless Technology
    On Main Campus, there are four primary network names (SSID):
    • SSID "IIT-Secure" supports 802.11g and 802.11n.
    • SSID "IIT-Console" supports gaming systems in IIT Housing.
    • SSID "IIT-Connect" is used to configure access to "IIT-Secure" or for guest access.
    • SSID "Eduroam" supports 802.11g and 802.11n
    802.11b is a technology that provides data rates up to 10Mbps on the 2.4 GHz frequency range.  IIT does not support 802.11b.

    802.11g is a technology that provides data ranges up to 54 Mbps on the 2.4 GHz frequency range.  IIT's minimum support is 802.11g.

    802.11n can provide data rates up to 600 Mbps in both the 2.4 GHz frequency and 5 GHz frequency ranges.

    Despite its convenience and rapidly-growing popularity, wireless service is very unlikely to provide the same performance, consistency, or reliability as wired Ethernet service.

    Wireless should not be used to:
    • Connect servers to the network.  These devices should be connected by Ethernet.
    • Connect devices running applications in which significant latency (how much time it takes for a packet of data to get from one designated point to another) or jitter (variation in the time between packets arriving, caused by network congestion, timing drift, or route changes) are a problem.
    • Connect devices running applications with high data rates.
    Wireless Client Configuration

    Network Name (SSID):  IIT-Secure, IIT-Connect, IIT-Console, and Eduroam

    • IIT has four SSIDs for IIT student, faculty, and staff use:

      "IIT-Secure" is the primary SSID.

      "IIT-Connect" is used to assist devices connecting to "IIT-Secure" and IIT guest use.

      "IIT-Console" is for gaming systems and entertainment applications.

      "Eduroam" is a secure, world-wide roaming access service developed for the international research and education community.  Eduroam allows students, researchers, and staff from participating institutions to obtain Internet connectivity across campus and when visiting other participating institutions.

    • Any network SSIDs other than those listed above are not managed or supported by OTS, and would be used at your own risk.

    Rogue Access Points

    • A rogue access point is a device that has been installed and managed on the IIT network by someone other than OTS. Unauthorized access points are prohibited by OTS. These measures also help facilitate a common standard for wireless networking that will be available to all legitimate users.
    • If an unauthorized access point is identified, OTS will request the owner to remove the device from the network within three business days. If the device is not promptly removed, OTS will disable all network access to the rogue access point as directed by OTS management.

    Encryption

    • The IIT-Secure/Eduroam network uses WPA2 and 802.1X (PEAP) for maximum data security. You will need a notebook or wireless device which supports WPA2 Enterprise and AES in order to connect to the encrypted network.

    DHCP Registration

    • When connecting for the first time, you will be directed to the DHCP website when you start your web browser. Follow the registration instructions, restrt your device, and your device will be on the network.
    • Some devices, such as game consoles, may not have a web browser. You may call the Support Desk (x73375, x7-DESK) to have these devices registered.

    Roaming

    • IIT's wireless network supports roaming between access points on each SSID for mobile devices. You do not need to reconnect or reconfigure your device when mobile.
    • If you are switching between SSIDs, e.g., IIT-Secure to IIT-Console, you will need to disconnect from one SSID and reconnect to the next SSID.

    Wireless Client Hardware Requirements
    Illinois Institute of Technology supports the following devices and equipment for accessing our network and systems wirelessly:

    • Access Points installed by the Office of Technology Services (OTS) department.
    • Computers using Windows Vista/7/8 or Mac OS X 10.7 and above.
    • All other devices will be supported on a best-effort basis.
    Network Performance
    Your network experience is an outcome of many factors, including, but not limited to, the following:
    • Capabilities and drivers of the device's network adapters.
    • The number of simultaneous sessions that are uploading or downloading data, such as download managers, number of browser tabs, etc.
    • When using wireless, the overall utilization of the wireless infrastructure by people around you.  Wireless is a shared service; if there are 50 people around you who are consuling a lot of bandwidth at the same time, the speed and quality of the service you are experiencing will be impacted.
    Directions to manually configure mobile devices can be found here:
    Negative Impact Devices
    Many wireless and other transmitting devices interfere with the IIT wireless network radios. Below are some common devices that have this impact. OTS asks that users be aware of the impact of these devices and use alternative devices, if available.
    • Microwave ovens
    • Cordless phones
    • Wireless video cameras
    • Wireless game controllers
    • Zigbee devices
    • WiMAX
    • Wireless speakers
    • Bluetooth devices
    IIT Bandwidth Shaping
    Network Performance

    Your network experience is an outcome of many factors, including but not limited to the following:

    • Personal equipment connection capabilities and drivers (i.e., the tool being used to connect to the wired/wireless environment).
    • The number of simultaneous sessions (open windows) that are uploading or downloading data.
    • When using wireless, the overall utilization of the wireless infrastructure by people around you.  Wireless is a shared service, if there are 50 people around you who are consuming a lot of bandwidth at the same time, the speed and quality of the service you are experiencing will be impacted.
    • Higher latency and jitter may be experienced on wireless infrastructure.

    Bandwidth Shaping

    A shaping policy is a tool that any technology service provider might use to optimize the network’s performance to the community it serves.  One example of a shaping policy is “traffic prioritization” where an Internet phone conversation via Vonage or Google Voice will get higher priority than downloading an email, because the voice application has lower tolerance for “problematic connections”.

    To enable network optimization, IIT limits and prioritizes traffic according to:

    • Location within the campus; academic area or residential area.
    • Type of traffic; for example, a voice conversation has higher priority than email; viewing an IIT Online course has higher priority than downloading music.

    The highlights of IIT’s Main Campus shaping policy are:

    Usage per user:

    • Video streaming, 720p HD
    • General downloads, 20 Mbps
    • iTunes Store, 12 Mbps

    Common types of traffic in order of prioritization:

    1. IIT Online (distance learning)
    2. Voice over IP (i.e., Skype, Vonage., Google Voice)
    3. IIT’s Server traffic (Blackboard, myIIT, etc.)
    4. Gaming (using IIT’s network)
    5. iTunes Store
    6. General downloads and Internet surfing
    7. Peer to peer – lowest priority

    There are many specific protocols or applications that might have priority that will overwrite the above general rules.

    While the highlights of the shaping policy are provided, the values mentioned should be considered best case scenario (upper limits).  As mentioned, actual experience is influenced by many additional factors.

    Disclaimer: IIT reserves the right to change our shaping policy as we determine to be necessary and without any prior notice.

     

    Last modified: 08/28/2014 10:56:01