Wireless LAN service for attendees of conferences or seminars


Attendees of conferences or seminars may use the wireless LAN service. Use the following instructions to apply for a wireless LAN ID.

 Wireless LAN ID application:

1)Send a request to use the wireless LAN to the head of the CMIT.

2) Indicate the number of people expected to be using the network during the event.

3)A representative of the CMIT will create an ID and password and provide them along with information about how to use them.

4) Print out the "user instructions" and "administration form" (called the "necessary documents" below), one set each for each person requiring access.

5) Establish a reception desk at the event, administer the above necessary documents, and answer any questions.

6) Keep the user information

The reception desk mentioned in (5) above will be manned during the event. All steps other than (3) will be handled by the conference organizer. The following is a detailed explanation of each item above.
 

1) Send a request to use the wireless LAN to the head of the CMIT.

This is a formality, but you can format it any way you like as long as it contains the reason why you want to use the network, the name of the organization, the person in charge, the period of use, and where you plan to use the wireless LAN.

2) Indicate the number of people expected to be using the network during the event.

Whether on the university's wired or wireless networks, we do not want unauthorized people to have free access to the network. So, we create a network ID that is only valid for the term of the event.
   Each person will be issued an ID for use during the term of the event, and we would like to know approximately how many people will be attending.

3)A representative of the CMIT will create an ID and password and provide them along with information about how to use them.

The CMIT will create IDs for the number of people given in (2) above.  The ID and password will be issued as digital data on a floppy disk or other medium.

4) Print out the "user instructions" and "administration form" (called the "necessary documents" below), one set each for each person requiring access.

Whether using the wired or wireless network, the user must be informed of his/her ID/password. To do so, we require information about the persons who will be using that ID. This is the minimum requirement for preventing unauthorized access to the university's Internet service. There is a sample on this pagee.  Finally, after altering the above example to fit your circumstances, insert the ID/password data created in (3), and print out enough copies for all expected attendees.

5) Establish a reception desk at the event to administer the above necessary documents and answer any questions.

At the event, you will set up a network use reception desk to handle those who wish to use the network. When they come to the desk, they will fill in their names and other information required on the necessary documentation mentioned in (4) above, and you will cut off that portion of the form with their information on it, and issue the remaining part (with the user instructions and ID/password) to the user. Please strictly store the personal information sheets received at the reception desk. You will also need to respond to and resolve any connectivity issues or other user problems.

(*) Unfortunately, the CMIT does not have the personnel to perform this function during events.

6) Keep the user information

Following the conclusion of the event, please retain the personal information provided by the users as described in (5) above. That information will be necessary for any investigations of unauthorized use of university networks. This information will not be used for any other purpose.