© University of Reading 2006www.reading.ac. uk 20 April 2014 Network Infrastructure IT Supporters Update – 26 June 2007.

Slides:



Advertisements
Similar presentations
Introduction to the WatchGuard AP Device
Advertisements

Computer Networks TCP/IP Protocol Suite.
Virtual Trunk Protocol
1 Introduction of IPv6 in Vienna University's LAN, ACOnet, VIX, ccTLD name service Wilfried Wöber, UniVie - ACOnet for FLIP-6, San Jose, CR Octoberber.
© University of Reading Finance and Corporate Services 20 April 2014 Purchase To Pay Phil Southwell – Head of Financial and HR Systems.
© University of Reading Go to View > Master > Slide Master to put your unit name here 20 April 2014 IT Services Identity Management.
Chapter 1: Introduction to Scaling Networks
SITE INTERNET DE LA CONFEDERATION CONSTRUCTION RUBRIQUE TRANSPORT ET MOBILITE.
Physics Network Integration Chris Hunter. Physics network team Chris Hunter : Network Manager David Newton : Network Support Technician Room DWB 663 Phone.
CY-SWR1100 Dual Band Wireless N Router
DMZ (De-Militarized Zone)
DMZ (De-Militarized Zone)
Chapter 7: Intranet LAN Design
CS332 Victor Norman Spring 2014
Southampton Open Wireless Network The Topology Talk.
Ethernet and switches selected topics 1. Agenda Scaling ethernet infrastructure VLANs 2.
How topology decisions affect speed/availability/security/cost/etc. Network Topology.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
RIT Campus Data Network. General Network Statistics Over 23,000 wired outlets Over 14,500 active switched ethernet ports > 250 network closets > 1,000.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Terri Lahey LCLS Facility Advisory Committee 20 April 2006 LCLS Network Security Terri Lahey.
1 Installing a Wireless Network for University Members Oliver Gorwits, Roger Treweek Oxford University Computing Services
A Guide to major network components
Layer 2: Redundancy and High Availability Part 1: General Overview on Assignment 1.
Campus Networking Best Practices Session 2: Layer 3 Dale Smith University of Oregon & NSRC
INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : ,
Networking Components
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Treaded Case Study Computer Networks 2002 Daire Sheriden Ronan Monaghan Mark Gilmore.
SOHO Wireless Networking SCATA Nov 2005 Dr Duncan Hancox.
Terri Lahey EPICS Collaboration Meeting June June 2006 LCLS Network & Support Planning Terri Lahey.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Computer communication
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
1 APNIC26 Network Jonny Martin 1.
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
Altai Certification Training Backend Network Planning
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
University of Montana - Missoula Adam Ormesher & Chase Maier.
SDN based Network Security Monitoring in Dynamic Cloud Networks Xiuzhen CHEN School of Information Security Engineering Shanghai Jiao Tong University,
Computer Networks. Why Create Networks? Communication Communication technologies such as , sms, video-conference can be used Makes communication.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
1 Second ATLAS-South Caucasus Software / Computing Workshop & Tutorial October 24, 2012 Georgian Technical University PhD Zaza Tsiramua Head of computer.
CAEN Wireless Network College of Engineering University of Michigan October 16, 2003 Dan Maletta.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
Update on Campus Networks December 2009 Bruce Campbell Director, Network Services Information Systems and Technology.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Chapter 7 Backbone Network. Announcements and Outline Announcements Outline Backbone Network Components  Switches, Routers, Gateways Backbone Network.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Supporting a Wireless Network By Gareth Ayres.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Security fundamentals Topic 10 Securing the network perimeter.
Networking Components WILLIAM NELSON LTEC HUB  Device that operated on Layer 1 of the OSI stack.  All I/O flows out all other ports besides the.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /04/2011 www2.widener.edu/wins
NETWORK DEVICES RONALD SHERGA OCTOBER 13, 2015 LTEC 4550.
Networking Components Assignment 3 Corbin Watkins.
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
NT1210 Introduction to Networking
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Security fundamentals
Switch Setup Connectivity to Other locations Via MPLS/LL etc
Wireless Modes.
Introduction to Networking
I. Basic Network Concepts
Presentation transcript:

© University of Reading 2006www.reading.ac. uk 20 April 2014 Network Infrastructure IT Supporters Update – 26 June 2007

To put your footer here go to View > Header and Footer2 Contents Network overview Server connectivity upgrade Wireless network changes Subnet changes DNS and DHCP infrastructure

To put your footer here go to View > Header and Footer3 Network overview Two separate networks –readingConnect (for halls of residence) –Campus network Both networks share common border area Focus on campus network –Each building connected at a minimum of 1Gbit/s –Except for Bulmershe and halls of residence New router to be installed at Bulmershe to make better use of existing switches and infrastructure Halls of residence too far away for more than 100Mbit/s

To put your footer here go to View > Header and Footer4 Network overview Border network forms connection between campus network, readingConnect and JANET Two JANET connections –Each 1Gbit/s over long-range fibre –Diverse routes –Endpoints over 1.5Km apart Fully resilient Traffic split across both links during normal operation –Campus traffic one way –readingConnect traffic goes the other

To put your footer here go to View > Header and Footer5 Network overview IP addresses in use by 8964 unique hosts 1844 hosts registered but not seen on network since Feb –These will be removed at the end of July –A list will be distributed to IT Supporters at start of July Monthly stats (2 hour average) show: –92.81Mbit/s peak traffic flow from JANET to campus –Average flow of 27.17MBit/s inbound and 15.39MBits/ outbound –95 th percentile is 73.02Mbit/s

To put your footer here go to View > Header and Footer6

7 Server connectivity upgrade Introduction of 10Gbit Ethernet into the core Two new (large) switches to be installed into ITS machine rooms –Each switch will have 10GBit/s to each core router (20Gbit/s) –Two switches connected to each other at 20Gbit/s –Each switch configured to connect up to 240 ports at 1Gbit/s –Switches configured as redundant pair for routing server VLANs Two small switches will provide secondary connections –To be used by important systems only (Exchange, etc)

To put your footer here go to View > Header and Footer8

9 Server connectivity upgrade

To put your footer here go to View > Header and Footer10 Guest / wireless network changes Deployment of JANET Roaming / Eduroam –Web-based redirect no longer permitted to be advertised as eduroam name –New wireless network across campus to sit alongside existing service SSID eduroam Requires 802.1x and WPA / WPA2 encryption Set up and forget – works everywhere that has Eduroam

To put your footer here go to View > Header and Footer11 Guest / wireless network changes Changes to existing rdg.ac.uk service –Will move outside firewall But retain protection from Internet hosts Same set of base services as for JANET Roaming Additional resilience through second BlueSocket device –Web-based login will accept eduroam / JANET Roaming credentials –Proposed service changes Summer 2008: Users will no longer be able to sign on with plain username –Must use instead Native CIFS access will be turned off – shares still accessible through NetDrive service (WebDAV gateway)

To put your footer here go to View > Header and Footer12 Guest / wireless network changes New IP address ranges: – – for JANET Roaming service – – for plug-in and rdg.ac.uk service Old address ranges to be removed by September 2007: – –

To put your footer here go to View > Header and Footer13 Subnet changes Psychology to complete move to.114 subnet Soil and Plant Science to move to own subnets Systems Engineering to vacate.4 and.56 subnets Student subnets in Careers, Chaplaincy and RUSU to be separated

To put your footer here go to View > Header and Footer14 DNS / DHCP infrastructure Currently two central servers –Sun hardware –Open source software –A bunch of in-house scripts to generate DNS zones –More in-house scripts to generate DHCP configuration –Painful to manage –Relatively slow turn-around for IP address allocation

To put your footer here go to View > Header and Footer15 DNS / DHCP infrastructure New Infoblox 1550 appliances (HA pair) –Take over as master DNS database –Replace Sun boxes for DHCP –GUI for managing IP address and hostname allocation –Should give faster turn-around on IP allocations –Possibility of delegation (at least read- only) to IT supporters Expansion of DNS topology –Existing Sun boxes become dedicated DNS cache servers –Addition of DNS servers into DMZ for best practise –Possible additional IT Services managed DNS secondary server at off-site co-location facility