Ciena Carrier-Grade Ethernet As a Foundation for Campus Access

Total Page:16

File Type:pdf, Size:1020Kb

Ciena Carrier-Grade Ethernet As a Foundation for Campus Access CARRIER-GRADE ETHERNET AS A FOUNDATION FOR CAMPUS ACCESS NETWORKS Introduction to Ethernet increase overall network reliability, targeting Existing campus access networks are constrained by dissimilar five- or six-9s availability using classic telecommunications and often stressed data networks—typically using numerous equipment supplier specifications to produce network legacy technologies such as ATM and Frame Relay. These elements with ultra-high reliability. In addition to increased disparate networks are becoming increasingly difficult to reliability, the scalability of carrier-grade Ethernet is several manage, leading to higher operational and maintenance costs. orders of magnitude higher than traditional Local Area Additionally, these legacy networks do not cater to the kinds Network (LAN) designs. of emerging real-time applications that are crucial for an Carrier-grade Ethernet technology has become widely effective Information and Communications Technology (ICT) adopted in the carrier and enterprise environments because environment, including VoIP, video, and cloud-based data of its ability to offer differentiated service at a highly attractive processing. These applications are all IP/Ethernet based, cost. Standards-based carrier Ethernet is defined by the Metro requiring a next-generation, highly resilient, scalable, and Ethernet Forum (MEF) and the Optical Interworking Forum packetized campus access network. (OIF) as a connection-oriented Layer 2 service. Carrier-grade To this end, many government agencies have embarked upon Ethernet enables the ability to offer bandwidth-assured, Layer modernization efforts that intend to transform ageing and 2 Virtual Private Networks (VPNs) with up to eight layers of legacy communications infrastructure into a consolidated, Quality of Service (QoS), allowing differentiated service next-generation network. This usually includes refreshing the offerings for voice, video, and data IP networks. desktop environment to provide a more efficient and cost- It is important to note that the carrier-grade Ethernet standards effective method to transport packet-based applications and frameworks mentioned above are built on the well-known, to a high density of end-users. existing networking principles defined by IEEE 802.3. When There are several approaches available that attempt to provide applied to Carrier-grade Ethernet, the benefit of this a cost-effective access network. These include a pure Layer 2 adherence to established principles is that the technologies Ethernet-based solution, otherwise known as “carrier-grade still use standards-based Ethernet components to realize the Ethernet;” Passive Optical Networking (PON), which uses a lowest-cost solution per bit, delivered by leveraging the shared medium to distribute traffic; and a Layer 3 IP/ millions of ports of Ethernet deployed around the world. MultiProtocol Label Switching (MPLS)-based solution. For an optical LAN or campus environment, carrier-grade This paper will examine how a Layer 2 switching capability Ethernet provides the following benefits, described in based on carrier-grade Ethernet offers the most scalable, detail below: reliable, and secure networking solution for a campus-based > Increased network flexibility access network, and provides the lowest Total Cost of > Flexible deployment options Ownership (TCO). > High levels of resiliency Carrier-grade Ethernet as a Network Layer > Network and user scalability Carrier-grade Ethernet leverages well-known Layer 2 > Service security networking principles to provide standards-based transport > Carrier-grade Operations, Administration, for packet-based applications. Carrier-grade extensions and Maintenance (OAM) A Application Note Model NNI/UNI Ports UNI Ports Total Gbps Form Factor Target Markets Temp Range 3000 Family (Service Delivery Switches) (8) 10/100M RJ45 3180 (2) 100M/1G SFP (8) T1/E1 2 1RU Multiservice Delivery -40°C to +65°C (8) 10/100M RJ45 3181 (2) 100M/1G SFP (16) T1/E1 2 1RU Multiservice Delivery -40°C to +65°C (40) 100M/1G SFP (16/32) STM-1/OC-3 3190 (2+2) 10G SFP+ (4/8/32) STM-4/OC-12 84 3RU Multiservice Aggregation 0° to +50°C 3902 (1) 100M/1G SFP (1) 10/100/1G RJ45 2 Desk/Wall SMB Intelligent NID (2 port) 0° to +50°C 3911 (2) 100M/1G SFP (8) 10/100/1G RJ45 10 Outdoor Weather-proof Ethernet Demarcation -40°C to +65°C (2) 100M/1G SFP 3916 (2) 100M/1G SFP (2) 100M/1G SFP/RJ45 6 1RU, ETSI Ethernet Demarcation 0° to +50°C 3920 (2) 1G/10G SFP+ (8) 10/100/1G RJ45 12 1RU, ETSI Ethernet Demarcation 0° to +50°C (4) 100M/1G SFP Extended-temp Ethernet 3930 (2) 1G/10G SFP+ (4) 100M/1G SFP/RJ45 28 1RU, ETSI Service Delivery -40°C to +65°C (4) 100M/1G SFP Weather-proof Ethernet 3931 (2) 1G/10G SFP+ (4) 10/100M/1G RJ45 28 Outdoor Service Delivery -40°C to +70°C (4) 100/1G SFP/RJ45 Ext-temp Ethernet/TDM 3932 (2) 1G/10G SFP+ (4) 100/1G SFP (16) T1/E1 29 1RU, ETSI Service Delivery -40°C to +65°C 3940 (4) 100M/1G SFP/RJ45 (20) 100M/1G SFP/RJ45 24 1RU 1st Tier Ethernet Aggregation 0° to +50°C (2) 10G XFP 10G Premium Ethernet 3960 (2) 10G XFP (8) 100M/1G SFP/RJ45 48 1RU Service Delivery 0° to +50°C 5000 Family (Service Aggregation Switches) 5140 (4) 100M/1G SFP/RJ45 (20) 100M/1G SFP/RJ45 24 2RU, ETSI Ext-temp 1st Tier Aggregation -40°C to +65°C Ext-temp 1st Tier dense 5142 (4) 1G/10G SFP+ (20) 100/1G SFP/RJ45 60 1RU, ETSI 1GbE Aggregation -40°C to +65°C (2) Dual 10G XFP 5150 Option Slots (48) 100M/1G SFP 88 2RU, ETSI Ext-temp Ethernet Aggregation -40°C to +65°C 5160 (24) 1G/10G SFP+ (UNI or NNI) 240 1RU, ETSI Ext-temp dense 10GbE Aggr -40°C to +65°C (5) Slots->(2) 10G XFP 5305 or (24) 100M/1G SFP N/A 50 6RU Ethernet Aggr/MPLS Edge 0° to +40°C (10) Slots->(10) 10G XFP 5410 or (32) 1G SFP N/A 1000 22RU High-capacity Aggr/MPLS Edge 0° to +40°C Figure 1. Ciena’s Packet Networking Portfolio These attributes are critical for an effective campus network, flooding and learning, Ethernet can automatically discover especially in an environment that requires a highly available, paths through the network to enable communication. With this scalable, and secure network. Carrier-grade Ethernet is the high level of built-in intelligence and adaptability, Ethernet can best option for a campus-based access network, compared be deployed in any physical topology. Topologies include to alternative technologies such as PON. mesh, partial mesh, ring, and hub-and-spoke, or any mix of these architectures. Because Ethernet networks can adapt to Network Flexibility growth and change, these topologies can expand easily or Ethernet is inherently a multi-point technology routinely change over time. characterized as “plug and play” when adding devices to the All of these topologies have advantages depending on their network. With well-established mechanisms such as MAC application. With the flexibility Ethernet provides, there is no 2 restriction on how fiber can be rolled out to accommodate Ethernet Configurations and Equipment Flexibility the network. This increased flexibility reduces overall Ethernet has widespread global deployment and can be installation cost. thought of as the de facto data link standard for carrying Additionally, Ethernet standards provide for the use of bi- TCP/IP-based traffic. Deployments are ubiquitous in the user directional optics, where both transmit and receive are appliance connection to the edge, campus networks, and the performed on a single fiber, from 100 Mb/s to Gigabit Ethernet Wide Area Network (WAN). As such, equipment manufacturers (GbE). This efficiency greatly maximizes the use of fiber—often have created a large range of devices with varying options for cutting fiber costs in half. port type, speed, density, and multiple form factors. Ciena offers a wide breadth of carrier-grade Ethernet devices in its Along with flexibility in physical topology, Ethernet provides Packet Networking Portfolio, as shown in Figure 1. flexibility in “logical” topology. This refers to how services (Layer 2) are routed in the network. Traditionally, Ethernet Ciena’s Ethernet product portfolio is particularly robust in the networks were completely auto-learning, as mentioned above. campus environment, which was the initial design target, so This is still a valid premise in a campus environment, but these options effectively meet the requirements of medium enhancements have been made to Ethernet that allow for to large enterprises. Included are options for high-density, connection-oriented switching, with paths defined by low-footprint switches, high port count (48 Ethernet ports or identifying specific connections during route provisioning. more) for high-density fan-out, and small, single-port desktop This arrangement allows deterministic path identification, devices. A variety of physical interfaces are available, including letting network operators choose the network path services multi-speed copper RJ45 or fiber-based options, which can be take to better manage latency or maximize fiber and changed with the simple addition of an SFP module. bandwidth utilization. This becomes more relevant as network topologies change and grow. Connection-oriented switching Resiliency gives the network operator the ability to offer network security Networks carrying mission-critical information require high on par with circuit-based applications, yet with the flexibility tolerance to network disruptions such as fiber cuts or and robustness of packet switching. Combined with carrier- equipment outage. Network resiliency is essential to the ability grade Ethernet’s OAM tools, a network operator can define to support critical command and control applications, data and monitor network performance while providing assured center connectivity, and even desktop applications. information technology infrastructures for critical missions. Due to Ethernet’s ability to be deployed in various topologies, Finally, because Ethernet is a well-defined standard, new it is possible to set up multiple physical paths to specific vendor equipment can be interconnected to existing networks network elements.
Recommended publications
  • Designing a Robust and Cost-Effective Campus Network
    CAMPUS LAN Designing a Robust and Cost-Effective Campus Network Brocade is taking groundbreaking performance and reliability from the data center and extending it across the entire network all the way to the edge. Now, superior performance can be maximized across the entire campus network, giving you a more managed and efficient approach to growth. CAMPUS LAN DESIGN BRIEF CONTENTS Introduction........................................................................................................................................................................................................................................ 3 The Campus LAN............................................................................................................................................................3 Performance and Availability.........................................................................................................................................4 Security...........................................................................................................................................................................4 Management..................................................................................................................................................................4 Reducing Operational Expense.....................................................................................................................................4 Building a Tiered Campus Network .........................................................................................................................................................................................
    [Show full text]
  • Campus Network Security and Management
    International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: [email protected] Volume 3, Issue 6, November-December 2014 ISSN 2278-6856 CAMPUS NETWORK SECURITY AND MANAGEMENT 1S. Sudharsan, 2M. Naga Srinivas, 3G. Sai Shabareesh, P.Kiran Rao 1 Department of Computer science 2Department of Computer science 3Department of Computer science ABSTRACT organizations, and does not need to “span large This project is totally dedicated to the Network Engineer for geographical distances.” new and smart learning of the Network Structure. In this MAN (Metropolitan Area Network):- A MAN is concept it is possible for the networker to check the Network defined as a network that spans several LAN’s across a Structure of a company spread in the big campus area. The city-wide geographic area. The term “MAN” is less incoming & the outgoing traffic can be maintained along with prevalent than either LAN or WAN. Generally a network some security concepts as well. In this logic we use the is purely based on what TOPOLOGY it is using, generally multiple Routing Protocols in different areas of the company. a computer network topology is the way various The practical shows us the proper movement of the packet components of a network (like nodes, links, peripherals, from one part of the company to the other part of the etc) are arranged. Network topologies define the layout, company. The project comprises of the different Departments of a Campus spread in different buildings. Multiple Routing virtual shape or structure of network, not only physically protocols have been used in different branches of and all the but also logically.
    [Show full text]
  • Nick Feamster
    Nick Feamster Neubauer Professor [email protected] Department of Computer Science https://people.cs.uchicago.edu/˜feamster/ University of Chicago https://noise.cs.uchicago.edu/ 5730 South Ellis Avenue https://medium.com/@feamster/ Chicago, Illinois 60637 Research Interests My research focuses on networked computer systems, with an emphasis on network architecture and protocol design; network security, management, and measurement; routing; and anti-censorship techniques. The primary goal of my research is to design tools, techniques, and policies to help networks operate better, and to enable users of these networks (both public and private) to experience high availability and good end-to-end performance. The problems that I tackle often involve the intersection of networking technology and policy. I study problems in the pricing and economics of Internet interconnection, global Internet censorship and information control, the security and privacy implications of emerging technologies, and the performance of consumer, commercial, and enterprise networks. My research achieves impact through new design paradigms in network architecture, the release of open-source software systems, and data and evidence that can influence public policy discourse. Education Degree Year University Field Ph.D. 2005 Massachusetts Institute of Technology Computer Science Cambridge, MA Dissertation: Proactive Techniques for Correct and Predictable Internet Routing Sprowls Honorable Mention for best MIT Ph.D. dissertation in Computer Science Advisor: Hari Balakrishnan
    [Show full text]
  • High Availability Campus Network Design - Routed Access Layer Using EIGRP Or OSPF System Assurance Guide
    High Availability Campus Network Design - Routed Access Layer using EIGRP or OSPF System Assurance Guide Cisco Validated Design Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 The Cisco Validated Design Program consists of systems and solutions designed, tested, and documented to facilitate faster, more reliable, and more predictable customer deployments. For more information visit www.cisco.com/go/validateddesigns. ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, "DESIGNS") IN THIS MANUAL ARE PRESENTED "AS IS," WITH ALL FAULTS. CISCO AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THE DESIGNS, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR THEIR APPLICATION OF THE DESIGNS. THE DESIGNS DO NOT CONSTITUTE THE TECHNICAL OR OTHER PROFESSIONAL ADVICE OF CISCO, ITS SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT THEIR OWN TECHNICAL ADVISORS BEFORE IMPLEMENTING THE DESIGNS.
    [Show full text]
  • Itap: In-Network Traffic Analysis Prevention Using Software-Defined
    iTAP: In-network Traffic Analysis Prevention using Software-Defined Networks https://itap.ethz.ch Roland Meier David Gugelmann Laurent Vanbever ETH Zürich ETH Zürich ETH Zürich [email protected] [email protected] [email protected] ABSTRACT CCS Concepts Advances in layer 2 networking technologies have fostered •Security and privacy ! Pseudonymity, anonymity and the deployment of large, geographically distributed LANs. untraceability; Network security; •Networks ! Network Due to their large diameter, such LANs provide many van- privacy and anonymity; Programmable networks; tage points for wiretapping. As an example, Google’s inter- nal network was reportedly tapped by governmental agen- Keywords cies, forcing the Web giant to encrypt its internal traffic. While using encryption certainly helps, eavesdroppers can Anonymous communication; wiretapping; SDN still access traffic metadata which often reveals sensitive information, such as who communicates with whom and 1. INTRODUCTION which are the critical hubs in the infrastructure. Since the Snowden revelations, it is well-known that net- This paper presents iTAP, a system for providing strong work eavesdropping was (and probably still is) performed in anonymity guarantees within a network. iTAP is network- the Internet core, particularly on undersea cables [22]. While based and can be partially deployed. Akin to onion rout- worrying, these threats can be mitigated to a large degree ing, iTAP rewrites packet headers at the network edges by by hiding connection metadata (e.g., using Tor [14]) and by leveraging SDN devices. As large LANs can see millions relying on pervasive encryption (e.g., using VPNs). of flows, the key challenge is to rewrite headers in a way However, network eavesdropping is not limited to the that guarantees strong anonymity while, at the same time, Internet backbone.
    [Show full text]
  • ALE Converged Campus Network Solution
    ALCATEL-LUCENT ENTERPRISE CONVERGED CAMPUS NETWORK SOLUTION Deliver a consistent, high-quality user experience, streamline operations, and reduce costs For more info contact Sol Distribution Ltd. Tel: 01691 680 830 Email: [email protected] Web: www.sol-distribution.co.uk CHALLENGES TO BECOMING A NEXT-GENERATION ORGANIZATION Technology is essential for enterprises to be efficient and to differentiate in a dynamic and demanding market. Network infrastructure is the backbone that, if done correctly, enables the successful adoption of this technology. Corporations are adopting major trends, such as support for next-generation devices, mobility, the bring-your-own-device (BYOD) phenomena, and the movement to the cloud. These trends are driving new demands on the network and creating increased complexity to existing network infrastructures. The rapid growth of real-time applications such as Voice over Internet Protocol (VoIP), video and collaboration suites, and their importance to organizations, push legacy networks to their limit with increasing demands for bandwidth and enhanced quality of service (QoS). Furthermore, a large number of new applications, both business and personal, are competing for available bandwidth. It is important to have visibility into the applications traversing the network and to provide mechanisms to prioritize business-critical applications. Many new devices, such as smartphones, IP cameras, smart boards and feature-rich next-generation IP phones demand additional bandwidth that are above the limits of today’s networks. Many employees insist on using their own devices, such as smartphones and tablets, and need to connect them to corporate networks. This new use of personal devices, combined with the need to support mobility, not only creates an unpredictable bandwidth use but also increases security risks.
    [Show full text]
  • A Higher Education Networking Solution Guide
    Higher Education Networking Guide Building the Foundation for Tomorrow’s Digital Campus: A higher education networking solution guide Technology has become integral to the lives of many post When designing a campus network, it must meet the secondary students. Most don’t remember a time without technology expectations of students, but the university the internet. A time before it became so ubiquitous. Today, administration, staff, faculty, and IT department should also be considered. For IT, security will be one of the students expect to be able to connect with any device, primary concerns, but other concerns include deployment anywhere on campus — whether it’s to communicate, and procurement costs, device on-boarding, network be entertained, or to access educational resources. speed and coverage, and training and operational For modern students, the way a college or university integrates issues. University administrators will want to leverage information technology (IT) into the fabric of campus life can be technology to create an environment that attracts more just as important as their chosen field of study or the structure students, enhances the success rates of existing students, of the curriculum. enables access to advanced research, and improves the rankings and reputation of the school. The administration In response to the wide adoption of technology, the methods will also have budget concerns but most will understand used for student learning continue to evolve. Digital learning the importance of building a strong and secure network, processes and experiences are now equal in importance to with excellent coverage for the entire campus. traditional lectures and seminars for many students.
    [Show full text]
  • Private Area Network” for Smooth As Well As Hassle-Free Computing in the University Campus
    IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 1, Ver. I (Jan. - Feb .2016), PP 72-77 www.iosrjournals.org Design and Implementation of a Cost-effective and Secured “Private Area Network” for smooth as well as hassle-free Computing in the University Campus Joysankar Bhattacharjee Master of Technology, Electronics & Communication Engineering Visionary Entrepreneur; New Delhi, India Abstract: In recent days, the wide use of computer networks has been marked its sign to the modern civilization. Almost in all the organizations, various types of computer networks, namely, LAN, MAN, WAN, PAN, CAN, SAN etc. are used. While using a computer network, the main factors, which arise are, 1. Construction of the network, 2. Type of the network, 3. Good features of the network for smooth computing, and 4. Security of the network. In this theoretical paper, a different concept, „Private Area Network‟ is designed which should be implemented in the university or college campuses for cost effective, smooth and secured routing. This paper is basically a combinational implementation of „Cisco EIGRP‟, „ACL mechanism‟ and a different „CAN (Campus Area Network)‟ with Networking Security Concept. In this system, the higher authority can directly contact to the desired department with secured and hassle-free computing. The network should be implemented with the help of construction plans mentioned in this paper. Protocols must be maintained according to the guidelines and then the security concept will prevent the network from various attacks. Keywords: ACL, Campus Network, EIGRP, Firewall, Network Security, Security Management, VLAN, VPN.
    [Show full text]
  • VTC2021-Spring Final Program
    VTC2021-Spring Final Program 2021 IEEE 93rd Vehicular Technology Conference 25 – 28 April 2021 • Virtual Event The flaglaagsagshhiph coconfnferferferencerennncence ofo IEEEI E VVeVehiccucular Techechchhhnnolon loogyy SSociSoccietyietyy Final Program rd 2021 IEEE 93 Vehicular T echnology Conference 25 – 28 April 2021 Online Virtual Conference Welcome from the General Chair On behalf of the organizing committee it is my honor to invite you to an onsite conference in Helsinki when to welcome you to VTC2021-Spring. While this is the global pandemic is behind us. already the third virtual edition of the Vehicular Organizing a world-class conference is possible only Technology Society flagship conference, we have with a dedicated team. I thank General Co-Chair received a notable amount of high-quality submissions Merouane Debbah and Honorary Chair Pertti providing a basis for an excellent technical program. Lukander. Special recognition for the Technical On top of the cutting-edge research in vehicular Program Chair Mikko Valkama and Co-Chairs Rui technology presented in technical tracks, we are Dinis and Daniel B. da Costa. I also give my bringing together in panels, keynotes and tutorials appreciation to other members of the organizing widely acknowledged and valued experts and committee and recall that this conference would not be visionaries. As is known, the Vehicular Technology possible without a large number of TPC members and Conference follows closely the recent progress in both reviewers who dedicate their time to ensure a high- academic and industry research domains, the most quality review process. Finally, I want to recall an visible topics in this spring being 5G and its important aspect: Solid and professional support from applications, and emerging ideas for 6G.
    [Show full text]
  • LAN Deployment Guide
    LAN Deployment Guide Revision: H2CY10 Who Should Read Related Documents This Guide Before reading this guide Design Overview This document is for the reader who: Internet Edge Deployment Guide • Has in total 2000 to 10,000 connected employees • Has one or more Local Area Networks that support up to 5000 connected employees each WAN Deployment Guide • Needs wired and wireless network access for employees • Requires wireless guest access Optional documents • Requires solutions for wired and wireless voice access • Has IT workers with a CCNA® certification or equivalent experience Midsize Foundation Design Overview • Wants to deploy their network infrastructure efficiently • Wants the assurance of a tested solution • Requires a migration path for growth Design Guides Deployment Guides Foundation Deployment Design Overview Guides LAN Deployment You are Here Guide LAN Configuration Guide Network Management Guides Who Should Read This Guide Table of Contents Introduction ................................................................ 1 Core Layer ............................................................... 36 Agency Overview ......................................................... 4 Wireless Local Area Network ............................................ 42 Architecture Overview ..................................................... 6 Appendix A: Large Agencies LAN Deployment Product List ............. 69 Access Layer ............................................................. 10 Appendix B: SBA for Large Agencies Document System ................
    [Show full text]
  • Networking Resources Brochure
    provided by multiple commodity ISPs. These are similar to KINBER the providers that are used in your home network; however, Drexel University is a founding member of the Keystone these tier-1 providers have direct, unfiltered access to Initiative for Network Based Education (KINBER). KINBER, all other networks. Currently, Drexel purchases over 2 a non-profit coalition of education, research, healthcare, Gbps of commodity Internet service and can dynamically economic development, and other non-profit based accommodate up to 20 Gbps of bandwidth to address any communities, received a $99 million Federal Broadband sudden demand. Technology Opportunity Program (BTOP) grant to build the The Office of Information Resources and Technology engineers optical network in the Commonwealth of Pennsylvania. This and operates networks that provide the crucial connections Research Networks network, named PennREN, lights over 1,600 miles of fiber used daily to communicate, collaborate, teach, learn, and Internet2 (http://internet2.edu) is a non-profit, advanced connecting over 70 locations across Pennsylvania. research. Few people realize the depth and breadth of Drexel’s networking consortium, operating a revolutionary-class IP superior network infrastructure or recognize the unmatched and optical network, led by the U.S. research and education Drexel representatives serve on the KINBER board, its connectivity that it provides. community. committees, and workgroups. The University City campus is one of the 70 PennREN locations and the collection of Drexel Campus Networking Drexel, in partnership with the Three Rivers Optical Exchange campus networks will be directly connected to the PennREN The Drexel campus network infrastructure is provisioned using (3ROX) of Carnegie Mellon University, is one of twenty network.
    [Show full text]
  • Design of an Inter Campus Wide Area Network - Based Exchanged Point for Optimal Routing
    American Journal of Education and Information Technology 2020; 4(1): 28-32 http://www.sciencepublishinggroup.com/j/ajeit doi: 10.11648/j.ajeit.20200401.14 Design of an Inter Campus Wide Area Network - Based Exchanged Point for Optimal Routing Enyia Emmanuel Chijioke *, Amadi Emmanuel Chukwudi Department of Information Technology, School of Computing and InformationTechnology, Federal University of Technology Owerri, Owerri, Nigeria Email address: *Corresponding author To cite this article: Enyia Emmanuel Chijioke, Amadi Emmanuel Chukwudi. Design of an Inter Campus Wide Area Network - Based Exchanged Point for Optimal Routing. American Journal of Education and Information Technology. Vol. 4, No. 1, 2020, pp. 28-32. doi: 10.11648/j.ajeit.20200401.14 Received : February 25, 2020; Accepted : March 16, 2020; Published : April 21, 2020 Abstract: Avialabiliity of stable internet link in institution of learning has become a thing of concern in developing nations like Nigeria. Exchange Point Network approach were used in this study in designing an Inter- Campus Wide Area Network- Based for Optimal Routing. The internetwork system connected five (5) campuses in Imo State Nigeria which includes Federal University of Technology Owerri, Federal Polytechnic Nekede, Imo state Polytechnic Umugawo. Alvan Ikoku Federal College of Education and Imo State University Owerri. They institutions have challages ranges from the cost of internet subscription, maitainance of network facilites, electricity challenges amongst others. This work makes use of the internet exchange point (IXP) technology to design and simulate a typical exchangepoint network for tertiary institution in Imo state Nigeria and to establish the best routing protocols. Five institutions where considered and their networks modeled.
    [Show full text]