Figure 4 - uploaded by Md. Nadir Bin Ali
Content may be subject to copyright.
Hierarchical Campus Network Architecture 5.1 Requirement of the proposed Campus Network The campus network infrastructure consists of an enormous range of equipment including email & web servers, network storage devices, directory servers, cabling systems, network switches, and routers, and more. Considering the fact we have to ensure the layer 3 devices and device selection matter should be careful.  

Hierarchical Campus Network Architecture 5.1 Requirement of the proposed Campus Network The campus network infrastructure consists of an enormous range of equipment including email & web servers, network storage devices, directory servers, cabling systems, network switches, and routers, and more. Considering the fact we have to ensure the layer 3 devices and device selection matter should be careful.  

Source publication
Conference Paper
Full-text available
Network architecture with its security is a growing concern in the present time. A campus network faces challenges to address core issues of security which are governed by network architecture. This paper is mainly targeted towards campus networks which deliver required security. This is essential because, it prevents the institution from suffering...

Similar publications

Article
Full-text available
Realization by the Department of Knowledge Management in the Nofer Institute of Occupational Medicine in Lodz (NIOM) of the project entitled ‘Work, Health, Environment – IT for the effective knowledge and research management’ over the years 2011-2014 constitutes an excellent example of obtaining funds for activity of scientific libraries. In 2010 N...
Article
Full-text available
Security has been a pivotal issue in the design and deployment of an enterprise network. With the innovation and diffusion of new technology such as Universal computing, Enterprise mobility, E-commerce and Cloud computing, the network security has still remained as an ever increasing challenge. A Campus network is an important part of campus life a...

Citations

... Misconfiguration of hardware or software equipment, bad network design and deployment, technological flaws, or end-user negligence can all result in security threats (M. N. B. Ali, et al., 2014). ...
Preprint
Full-text available
Despite of fast advancements in the field of cloud computing, still security is one of the primary barriers to cloud computing adoption. Security as well as effective management of data center are also major concerns. Because virtualization is a basic technology for cloud computing, any cloud vulnerabilities and threats have an impact on virtualization. This paper proposes a secured data center design with cloud virtualization that offers user end protection. It also incorporates the load balancing feature, microservice with containerization and storage management with scalability. Moreover, this paper will also focus on managing the cloud data center effectively and eliminating inside and outside attacks by using zero trust security model. The proposed design ensures disaster recovery, data redundancy, and high availability of data. Access for the militarized and demilitarized zones are filtered to enhance the security of the data center. All the components used in the design of the data center are described elaborately. This design will overcome the current challenges that the industry is facing.
... There are many indications that the pandemic crisis will transform many aspects of life including education if distance learning proves to be successful. The paper [3] emphasizes in order for the Universities to prepare the students to be successful for the future they should provide a strong and flexible learning infrastructure, capable of supporting and providing ubiquitous access to technology tools that allow students to create, design and explore. Essential components of an infrastructure capable of supporting transformative learning experiences include (i) Ubiquitous connectivity, (ii) Powerful learning devices, (iii) High-quality digital learning content, (iv) Responsible use policies (RUPs). ...
Preprint
Full-text available
The COVID-19 pandemic has caused changes in terms of traditional teaching globally. In Kosova context, the Universities have found the transition from teaching in class to online classes quite challenging. This study investigates the transformation process from in-campus classes to online classes from the technical perspective within five Higher Education Institutions (HEI) in Kosovo. The data was collected using the qualitative methods and its analysis followed the 3C Lichtman approach. The results show that each of the Universities followed a different approach, by using either their limited premises infrastructure or using additional cloud infrastructure.
... The term of Wi-Fi is used to describe a class of certified wireless networking products that meet the IEEE's set of 802.11 wireless standards [12]. 802.11Wi-Fi networks have become increasingly important in people's daily lives as the number of Wi-Fi devices may rise up to 20 billion in future trend [13]. ...
Article
Full-text available
The implementation of Wi-Fi on campuses brings huge benefits for campus users in communications and education development. Some campuses face existing poor Quality of Service (QoS) on the Wi-Fi performance which is also unjustified and issues on unsatisfied connections. This research aims to analyses the Wi-Fi performance of the campus network for three indoor access points. Signal strength, usage percentage, channel utilization, and the number of clients count per access points are measured. Results show that 56% is the highest signal percentage and the lowest signal percentage is at 1%. Access point of Ustudent is the highest at 53% and lowest at 38%. The highest signal strength of -45dBm is found and the other two are below by -2 dBm. The lowest signal strength is at -95 dBm. SSID CCNA_1 is identified has the best signal strength compared to other SSIDs because it runs on 5 GHz frequency. The most channels used are channels 1, 4, and 6. Respectively 151, 67, and 57 users are connected to Ustudent, UHotspot, and CCNA_1. This study is significant for the QoS in a campus network in providing good network services. Thus, the QoS on Wi-Fi performance is improvised, monitored and analyzed for continues supports users in the campus network successfully
... When we concerns about network security terms it includes authorization, identification, authentication and surveillance to the protection of computer hardware or network physical equipment and all other virtual and sophisticated things related with network infrastructure. Threats may arise from mis-configuration of hardware or software equipment, poor network design and deployment, technology weaknesses, or carelessness of end-user [3]. There is no specific laid-down procedure for secure network design and deployment. ...
Article
Full-text available
Security is an important issue for organizational network design and development. With an increasing technology in cloud computing sector, enterprise Sector and specific organizational network Infrastructure development, network security always has remained as a great challenge. Our considerable Organization like different scientific/institutional institution faces core security issues challenges in network architecture design and development. A Secured infrastructure of a network always considers or concerns about different security attacks. Network security will prevent a organization network infrastructure from different types of attacks and threats. This paper intends to give an idea to design and deployment of a simple but better network security model and cost effective approach using routers and firewall. This research aim is also that how a network will be protected against vulnerabilities, configuration and security policy weaknesses. Our proposed network infrastructure is adaptable with secure structure.
... Furthermore, the system availability can be improved significantly by decreasing the MTTR which means that the time to recover from a failure. Therefore, system availability can be considerably enhanced in hierarchical networks by the implementation of redundancy [8]. The network devices can be connected either in series or in parallel. ...
... Equation (4) shows that the system will only be unavailable when both components are unavailable. It is noted in [8] that system availability can be increased significantly in hierarchical networks by the implementation of redundancy. Therefore, to prevent being cut off from other network, an appropriate gateway redundancy is required in a campus network. ...
Article
Full-text available
Computer networks have contributed immensely to the development of educational systems globally by enabling timely access to information both in and out of the lecture rooms. This technology serves among its numerous uses as a bedrock of e-learning, e-library, telepresence and access to different research materials. The need for high network availability is therefore of paramount importance in an educational systems. This paper presents how high reliability, availability, and serviceability can be achieved in a campus network by the implementation of network architecture and standardised protocols that enable the network hardware to be more intelligent in load balancing and fail-over functionality in order to eliminate downtime during crashes and device upgrades. The approach enables a scalable and manageable network which allows devices from different vendors to interoperate.