Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1992896.1992916acmconferencesArticle/Chapter ViewAbstractPublication PagesuccsConference Proceedingsconference-collections
research-article

Multifaceted faculty network design and management: practice and experience

Published: 16 May 2011 Publication History

Abstract

We report on our experience on multidimensional aspects of our faculty's network design and management, including some unique aspects such as campus-wide VLANs and ghosting, security and monitoring, switching and routing, and others. We outline a historical perspective on certain research, design, and development decisions and discuss the network topology, its scalability and management, and its evolution. We overview the security aspects of the management as well as data management and automation and the use of the data by other members of the IT group in the faculty.

References

[1]
R. Bejtlich. The Tao of Network Security: Beyond Intrusion Detection. Addison-Wesley, 2005. ISBN: 0-321-24677-2.
[2]
A. Bennett and M. J. Assels. Computer security at Concordia: Past problems, proposed plans. {online}, 1995. http://alcor.concordia.ca/nonalcor/ssg/contributions/security-report/main.html.
[3]
M. Blanchet. Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks. John Wiley & Sons Ltd., 2006. ISBN: 978-0471-49892-6, http://www.ipv6book.ca/.
[4]
D. N. Blank-Edelman. Perl for System Administration. O'Reilly, 2000. ISBN: 1-56592-609-9.
[5]
Cisco. Spanning tree protocol (STP). {online}, 2011. http://www.cisco.com/en/US/tech/tk389/tk621/tsd_technology_support_protocol_home.html/.
[6]
K. Clark and K. Hamilton. Cisco LAN Switching. Cisco Press, 1999. ISBN: 1-57870-094-9.
[7]
C. Hunt. TCP/IP Network Administration. O'Reilly, 1993. ISBN: 0-937175-82-X.
[8]
T. A. Limoncelli and C. Hogan. The Practice of System and Network Administration. Addison-Wesley, 2002. ISBN: 0-201-70271-1.
[9]
D. R. Mauro and K. J. Schmidt. Essential SNMP. O'Reilly, 2001. ISBN: 0-596-00020-00.
[10]
M. Rash. Linux Firwalls: Attack Detection and Response with iptables, psad, and fwsnort. No Starch Press, Inc., San Francisco, 3 edition, 2007. ISBN: 978-1-59327-141-1.
[11]
C. Schroder. Linux Networking Cookbook. O'Reilly, 2008. ISBN: 978-0-596-10248-7.
[12]
L. D. Stein. Network Programming with Perl. Addison-Wesley, 2001. ISBN: 0-201-61571-1.
[13]
M. Subramanian. Network Management: Principles and Practice. Addison-Wesley, 2000. ISBN: 0-201-35742-9.

Cited By

View all
  • (2015)Automating MAC Spoofer Evidence Gathering and Encoding for InvestigationsFoundations and Practice of Security10.1007/978-3-319-17040-4_11(168-183)Online publication date: 5-Apr-2015
  • (2014)Toward Automated MAC Spoofer InvestigationsProceedings of the 2014 International C* Conference on Computer Science & Software Engineering10.1145/2641483.2641540(1-6)Online publication date: 3-Aug-2014

Index Terms

  1. Multifaceted faculty network design and management: practice and experience

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          C3S2E '11: Proceedings of The Fourth International C* Conference on Computer Science and Software Engineering
          May 2011
          162 pages
          ISBN:9781450306263
          DOI:10.1145/1992896
          • General Chair:
          • Bipin C. Desai,
          • Program Chairs:
          • Alain Abran,
          • Sudhir P. Mudur
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 16 May 2011

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. VLANs
          2. network management
          3. network security
          4. network topology
          5. spanning tree

          Qualifiers

          • Research-article

          Conference

          C3S2E '11
          Sponsor:
          • ACM
          • Concordia University

          Acceptance Rates

          Overall Acceptance Rate 12 of 42 submissions, 29%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 01 Nov 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2015)Automating MAC Spoofer Evidence Gathering and Encoding for InvestigationsFoundations and Practice of Security10.1007/978-3-319-17040-4_11(168-183)Online publication date: 5-Apr-2015
          • (2014)Toward Automated MAC Spoofer InvestigationsProceedings of the 2014 International C* Conference on Computer Science & Software Engineering10.1145/2641483.2641540(1-6)Online publication date: 3-Aug-2014

          View Options

          Get Access

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media