myIIT Portal

    IIT Wireless Services

    Wireless Internet is available throughout the IIT Main Campus; see the Wireless Coverage Map. This page provides links to view live status of wireless service on campus and information on how to use the system effectively.

    There are six OTS-managed network connections (SSIDs) on Main Campus:

    • SSID IIT-Secure supports 802.11a/g/n and is encrypted
    • SSID IIT-WiFi supports 802.11a/g/n
    • SSID IIT-Console supports gaming systems in IIT residence halls
    • SSID iit supports 802.11g and 802.11a where it is available.

    Two SSIDs are available for guests of IIT:

    • SSID IIT-Connect supports 802.11a/g/n
    • SSID IIT-IWS supports 802.11g

    Network connections other than those listed above are not managed or supported by OTS.

    Instructions for connecting to the IIT-Secure wireless network

    Average Daily Internet Traffic on Main Campus

    Click here for LIVE traffic maps in Campus Housing.

    About Wireless Technology
    Despite its convenience and rapidly growing popularity, wireless service is very unlikely to provide the same performance, consistency, or reliability as wired Ethernet service in the foreseeable future. OTS's view is that wireless service complements wired service; it is not a substitute.


    • "SSID" stands for Service Set IDentifier, and is the name attached to a Wi-Fi (wireless) network.
    • 802.11b provides data rates up to 11Mbps in the 2.4 Ghz frequency range. IIT wireless infrastructure no longer supports 802.11b
    • 802.11g provides data rates up to 54Mbps in the 2.4 GHz frequency range.
    • 802.11a provides data rates up to 54Mbps in the 5 GHz frequency range.
    • 802.11n provides data rates up to 600Mbps in both the 2.4 GHz and 5 GHz frequency ranges
    • 802.11ac provides data rates up to 1.7 Gbps in the 5 Ghz frequency range. Currently, IIT has not started deploying 802.11ac.
    • Encryption is a technology that secures communication between an end user device and a wireless access point.
    • A rogue access point is a device  providing wireless access within IIT property without OTS approval
    • Latency is a measure of time it takes a packet of data to get from one designated point to another.
    • Jitter is a measure of variation in the time between packets arriving.

    Wireless should not be used to connect devices running applications with high data rates, servers, printers, security and monitoring devices. These should be connected by Ethernet.

    Secure Wireless Configuration
    Users must authenticate with their IIT e-mail address and myIIT password in order to utilize the IIT-Secure wireless network. Wireless devices must be capable of WPA2 Enterprise.

    OTS provides a tool for configuring secure wireless on your device than can be accessed by connecting to IIT-Connect SSID. Once connected, please open a web browser and click on the Students, Faculty and Staff link. If you have any questions or problems, please contact Support Desk.

    Directions to manually configure mobile devices can be found here:

    Android Configuration
    Phone Configuration
    iPad Configuration
    Mac Configuration
    Windows Configuration

    Network device registration

    • All devices are required to be registered when connecting to IIT network for the first time. After connecting, please open in your web browser and follow the directions to register the device; if you have any problems, please contact Support Desk. 
    • Some devices, such as game consoles, may not have a web browser. Please contact Support Desk to have these devices registered.


    The IIT wireless network supports roaming between access points using the same SSID for wireless devices. You do not need to reconnect or reconfigure your device when mobile.

    Negative Impact Devices
    Many wireless and other transmitting devices interfere with the IIT wireless network. Below are some common devices that have a negative impact. While use of these devices is not prohibited, users should be aware of their impact and limit their use or find alternatives when possible.
    • Microwave ovens
    • Cordless phones
    • Wireless video cameras
    • Wireless game controllers
    • Zigbee devices
    • Wireless speakers
    • Bluetooth devices

    IIT Bandwidth Shaping
    Network Performance

    Your network experience is an outcome of many factors, including but not limited to the following:

    • Personal equipment connection capabilities and drivers (i.e., the tool being used to connect to the wired/wireless environment).
    • The number of simultaneous sessions (open windows) that are uploading or downloading data.
    • When using wireless, the overall utilization of the wireless infrastructure by people around you.  Wireless is a shared service, if there are 50 people around you who are consuming a lot of bandwidth at the same time, the speed and quality of the service you are experiencing will be impacted.
    • Higher latency and jitter may be experienced on wireless infrastructure.

    Bandwidth Shaping

    A shaping policy is a tool that any technology service provider might use to optimize the network’s performance to the community it serves.  One example of a shaping policy is “traffic prioritization” where an Internet phone conversation via Vonage or Google Voice will get higher priority than downloading an email, because the voice application has lower tolerance for “problematic connections”.

    To enable network optimization, IIT limits and prioritizes traffic according to:

    • Location within the campus; academic area or residential area.
    • The time of day; at night, IIT relaxes the limits for the residential area:
          Day time hours are 7:01 AM to 9:00 PM
          Night time hours are 9:01 PM to 7:00 AM
    • Type of traffic; for example, a voice conversation has higher priority than email; viewing an IIT Online course has higher priority than downloading music.

    The highlights of IIT’s Main Campus shaping policy are:

    Day usage per user:

    • Video streaming, 720p HD
    • General downloads, 8 Mbps
    • iTunes Store, 4 Mbps

    Night usage per user:

    • Video streaming, 720p HD
    • General downloads, 10 Mbps
    • iTunes Store, 4 Mbps

    Common types of traffic in order of prioritization:

    1. IIT Online (distance learning)
    2. Voice over IP (i.e., Skype, Vonage., Google Voice)
    3. IIT’s Server traffic (Blackboard, myIIT, etc.)
    4. Gaming (using IIT’s network)
    5. iTunes Store
    6. General downloads and Internet surfing
    7. Peer to peer – lowest priority

    There are many specific protocols or applications that might have priority that will overwrite the above general rules.

    While the highlights of the shaping policy are provided, the values mentioned should be considered best case scenario (upper limits).  As mentioned, actual experience is influenced by many additional factors.

    Disclaimer: IIT reserves the right to change our shaping policy as we determine to be necessary and without any prior notice.


    Last modified: 04/29/2014 09:09:48