Professional Documents
Culture Documents
Network Architectureand Security Issuesin Campus Networks
Network Architectureand Security Issuesin Campus Networks
net/publication/271557256
CITATIONS READS
9 16,732
3 authors, including:
All content following this page was uploaded by Md. Nadir Bin Ali on 29 March 2016.
Abstract— Network architecture with its security is a growing own issues and challenges. Present educational institution pay
concern in the present time. A campus network faces challenges more attention to IT to improve their students learning
to address core issues of security which are governed by network experience. Architects of Campus can achieve this if IT
architecture. This paper is mainly targeted towards campus managers hold on to the fundamental principles addressed in
networks which deliver required security. This is essential
this reference architecture, namely LAN or WAN connectivity
because, it prevents the institution from suffering any significant
attacks associated with network. A university network has a design considerations, security, and centralized management
number of uses such as teaching, learning, research, [1].
management, e-library, and connections with the external uses.
Therefore, network architecture and its security are vital issues The physical network infrastructure is required for a
for any university. In this work, a network infrastructure is contemporary university network. University Management
proposed on the basis of the practical and experimental and IT manger may know exactly what kind of network they
requirements. The proposed network infrastructure is realizable want to setup, upcoming plans, and expected growths are more
with adaptable infrastructure. complicated to understand. So far contingencies for future
area, power, and other resource must be part of the physical
Keywords- Campus network architecture, Hierarchical network plan of a university. Building a contemporary university
architecture, Redundant network design, Network security, network atmosphere also contains functional and safety
Network threats. elements that also go beyond the IT department’s obligations
I. INTRODUCTION and skills. Modern networks need to develop more concrete in
Nowadays a campus network is essential and it plays many ways beyond the network topology and devices
important role for any organization. Network architecture and themselves to meet the needs of the present social media
its security are almost as important as air, water, food, and atmosphere. Failures due to air conditioner problems, random
shelter. Computer network security threat and network routine draws, and shortages of area and information all lead
architecture are always serious issues and are important. A to stability issues that now impact an incredible number of
campus network is an autonomous network under the control customers globally.
of a university which is within a local geographical place and
sometimes it may be a metropolitan area network.
II. BACKGROUND
Generally, IT manager in a Computer network faces plenty of We know, Computer networks are of many different types
challenges in the course of maintaining elevated availability, such as Personal Area Network (PAN), Local Area Network
excellent performance, perfect infrastructure, and security. (LAN), Metropolitan Area Network (MAN), Campus Area
Securing a big network has been always an issue to an IT Network (CAN), Storage Area Network (SAN) and Wide
Manger. There are a lot of similarities between securing an Area Network (WAN). LANs are capable of higher data
outsized network and university network but each one has its transfer within small geographical area. LAN usually operates
high speed data transfer usage. CAN has larger network than improvement in several areas, most notably reliable
LAN. CAN is usually established in university campus to convergence in the 60–200 ms range [1].
connect among different buildings, computer labs, library,
research labs, registration, and different academic units.
Figure 6. FTP response time (1st line without redundancy and second line with
redundancy)
CONCLUSION
REFERENCES