The University of Reading

advertisement
The University of Reading
Wireless Network Policy
1. PURPOSE
The effective management of information technology resources is crucially important to the
success of the academic, research, and public service objectives of the University of Reading.
Because of the inherent nature of wireless communication, wireless networks require increased
cooperation and coordination to safely and securely exploit the benefits of the technology to the
staff and students of the University, to allow connection to wireless networks in different campus
buildings, and eventually, to facilitate the ability to roam from building to building without
losing network connectivity.
This document sets out the policies for using wireless technologies and assigns responsibilities
for the deployment of wireless services and the administration of the wireless radio frequency
spectrum in the University. This policy expands the Rules for the Use of University Computers
and Data Networks by including specific direction regarding wireless communications and the
resolution of issues that may arise.
This policy is subject to change as new technologies and processes emerge.
2. REFERENCES



University of Reading Rules for the Use of University Computers and Data Networks.
JANET Acceptable Use Policy
Rules for the use of the University Library
3. DEFINITIONS
1. Wireless Network means local area network technology that uses radio frequency
spectrum to connect computing devices to university, school, directorate and department
wired networks and may connect to the Campus Network Backbone and the Internet.
This technology is sometimes referred to as Wireless Local Area Network (WLAN).
2. Access Point means any electronic hardware that serves as a common connection point
for devices in a wireless network. An access point acts as a network hub that is used to
connect segments of a LAN, using transmit and receive antennas instead of physical ports
for access by multiple users of the wireless network. Access points are shared bandwidth
devices and can be connected to the wired network, allowing access to the campus
network backbone. This includes computers equipped with wireless network card and
configured to operate as a wireless access point.
3. Wireless Infrastructure means wireless access points, antennas, cabling, power, and
network hardware associated with the deployment of a wireless communications
network.
4. Coverage means the geographical area where a baseline level of wireless connection
service quality is possible.
5. Interference means the degradation of a wireless communication signal caused by
electromagnetic radiation from another source. Interference can slow down or eliminate
a wireless transmission depending on the strength of the interfering signal.
4. SCOPE
1. This policy applies to all wireless network devices utilising the University of Reading IP
space (including private IP space within University networks) and all users of such
devices, and governs all wireless connections to the campus network backbone,
frequency allocation, network assignment, registration in the Domain Name System, and
services provided over wireless connections to the campus network backbone to schools,
directorates or departments of the University of Reading.
2. This policy does not apply to any wireless connections allowing cordless connection of
computer components or peripheral devices e.g. wireless keyboard, wireless mouse.
5. AUTHORITY
1. This policy falls under the authority and oversight of the Information Strategy Committee
(ISC).
2. Technical review of this document is under the direction of IT Services under the
guidance of the Advisory Group for IT Services (AGITS).
6. POLICY
1. All network connection policies and acceptable use provisions of the University of
Reading Rules for the Use of University Computers and Data Networks apply to wireless
network services.
2. Eavesdropping, intrusion or disruption of other authorised communications that result
from the intentional or incidental misuse or misapplication of wireless network radio
frequency spectrum is prohibited.
3. Any Wireless Infrastructure must abide by all national and local laws, rules or regulations
pertaining to wireless networks.
4. Deployment and management of centrally provided wireless access points is the
responsibility of the University IT Services (ITS) department.
5. Heads of schools, directorates and halls must ensure that wireless networks under their
control are managed in accordance with this policy.
6. University schools, directorates , halls and other departments must register for the
location of all wireless access points, frequency of operation, approximate coverage
together with a named “Point of Contact” for each wireless network with ITS, prior to
implementation of wireless networks.
7. Students must not install or operate wireless infrastructure in the halls of residence, or
other University owned and/or operated accommodation.
8. Wireless networks shall require user authentication at the access point before granting
access to campus or Internet services. Wireless network interfaces and end-user devices
shall support authentication to access wireless networks that allow connectivity to the
Campus Network Backbone.
9. Physical security must be considered and ensured when planning the location of wireless
access point and other wireless network components.
10. Wireless networks must be designed and deployed to avoid physical and logical
interference between components of different network segments and other equipment. In
the event that a wireless device interferes with other equipment, IT Services will resolve
the interference taking into account the priority of conflicting usage. The arbiter, in case
of conflict, is the AGITS operating under the authority of the ISC.
11. IT Servicess will attempt to resolve any interference or security incidents by coordinating with the registered Point of Contact for the wireless network. If a Point of
Contact is not available, the incident will be resolved through administration of the
network connection to the backbone.
12. IT Services is authorised to take whatever reasonable steps are necessary to ensure
compliance with this, and other network related policies that are designed to protect the
integrity and security of the campus network.
13. Grievances concerning this policy or conflicts between ITS and any University school,
directorate or department should be directed to the Director of IT Services in the first
instance. If the conflict is not resolved to the satisfaction of ITS and the school,
directorate or department involved, the matter will be escalated through existing
mechanisms.
Author:
Version:
Date:
Latest Date for Review:
IT Services / Improcom Ltd
0.4dmr Draft
2nd October 2003
24th September 2005
Acknowledgements:
This policy has been compiled with reference to the following documents:
 University of Utah Wireless Network Policy
 Monash University Policy on Wireless Networks
 UC Davis Wireless Communications Policy
 McMaster University Wireless Network Access Policy
Download