Login | Register

Multifaceted Faculty Network Design and Management: Practice and Experience Report


Multifaceted Faculty Network Design and Management: Practice and Experience Report

Assels, Michael John and Echtner, Dana and Spanner, Michael and Mokhov, Serguei A. and Carrière, François and Taveroff, Manny (2011) Multifaceted Faculty Network Design and Management: Practice and Experience Report. Proceedings of The Fourth International C* Conference on Computer Science and Software Engineering (C3S2E '11). 2011, ACM, New York, NY, USA, . pp. 151-155.

PDF (Expanded version)

Official URL: http://dx.doi.org/10.1145/1992896.1992916


We report on our experience on multidimensional aspects of our faculty's network design and management, including some unique aspects such as campus-wide VLANs and ghosting, security and monitoring, switching and routing, and others. We outline a historical perspective on certain research, design, and development decisions and discuss the network topology, its scalability, and management in detail; the services our network provides, and its evolution. We overview the security aspects of the management as well as data management and automation and the use of the data by other members of the IT group in the faculty.

Divisions:Concordia University > Faculty of Engineering and Computer Science
Item Type:Article
Authors:Assels, Michael John and Echtner, Dana and Spanner, Michael and Mokhov, Serguei A. and Carrière, François and Taveroff, Manny
Journal or Publication:Proceedings of The Fourth International C* Conference on Computer Science and Software Engineering (C3S2E '11). 2011, ACM, New York, NY, USA,
Date:May 2011
  • ENCS Network
  • Faculty of Engineering and Computer Science, Concordia University
Digital Object Identifier (DOI):10.1145/1992896.1992916
Keywords:network topology, spanning tree, network security, network management, VLANs
ID Code:7785
Deposited By: Serguei Mokhov
Deposited On:30 Aug 2011 15:01
Last Modified:24 Aug 2016 21:26
Related URLs:
[1] Paul Albitz and Cricket Liu. DNS and BIND. O'Reilly, 3 edition, 1998. ISBN: 1-56592-512-2.

[2] Richard Bejtlich. The Tao of Network Security: Beyond Intrusion Detection. Addison-Wesley, 2005.
ISBN: 0-321-24677-2.

[3] Anne Bennett and Michael J. Assels. Computer security at Concordia: Past problems, proposed plans. [online], 1995. http://alcor.concordia.ca/nonalcor/ssg/contributions/security-report/main.html.

[4] Brian Berliner, david d `zoo' zuhn, Je� Polk, Larry Jones, Derek Robert Price, Mark D. Baushke, et al. Concurrent Versions System (CVS). [online], 1989-2011. http://savannah.nongnu.org/projects/cvs/.

[5] Marc Blanchet. Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed
Networks. John Wiley & Sons Ltd., 2006. ISBN: 978-0471-49892-6, http://www.ipv6book.ca/.

[6] David N. Blank-Edelman. Perl for System Administration. O'Reilly, 2000. ISBN: 1-56592-609-9.

[7] Wesley J. Chun. Core Python Programming. Pearson Education, Inc., 2 edition, 2007. ISBN:

[8] Cisco. Spanning tree protocol (STP). [online], 2011. http://www.cisco.com/en/US/tech/tk389/

[9] Cisco Systems, Inc. Catalyst 2950 Switch Hardware Installation Guide, October 2003.

[10] Kennedy Clark and Kevin Hamilton. Cisco LAN Switching. Cisco Press, 1999. ISBN: 1-57870-094-9.

[11] Sheila Frankel, Richard Graveman, John Pearce, and Mark Rooks. Guidelines for the secure de-
ployment of IPv6. Technical Report Special Publication 800-119, NIST, December 2010. http:

[12] Je�rey E. F. Friedl. Mastering Regular Expression: Powerful Techniques for Perl and Other Tools.
O'Reilly, 1997. ISBN: 1-56592-257-3.

[13] Eric Gamess and Neudith Morales. Implementing IPv6 at Central University of Venezuela. In Pro-
ceedings of the 4th international IFIP/ACM Latin American conference on Networking (LANC'07),
pages 43{51, New York, NY, USA, 2007. ACM.

[14] Craig Hunt. TCP/IP Network Administration. O'Reilly, 1993. ISBN: 0-937175-82-X.

[15] Leszek Lilien, Adawia Al-Alawneh, and Lot� Ben Othmane. The pervasive trust foundation for security in next generation networks. In NSPW'10, pages 129-141. ACM, September 2010. A Position Paper.

[16] Thomas A. Limoncelli and Christine Hogan. The Practice of System and Network Administration. Addison-Wesley, 2002. ISBN: 0-201-70271-1.

[17] Douglas R. Mauro and Kevin J. Schmidt. Essential SNMP. O'Reilly, 2001. ISBN: 0-596-00020-00.

[18] Eric Miller, Bill Fenner, Oliver Gorwits, Jeroen van Ingen, Max Baker, and the Netdisco Community. NETDISCO - network management tool. [online], 2009{2011. http://netdisco.org/.

[19] Tobi Oetiker, Dave Rand, and the MRTG Community. Tobi oetiker's MRTG - the Multi Router Traffc Grapher. [online], 2008-2011. http://oss.oetiker.ch/mrtg/.

[20] Radia Perlman. An algorithm for distributed computation of a spanning tree in an extended lan.
SIGCOMM Comput. Commun. Rev., 15:44-53, September 1985.

[21] Gregor N. Purdy. Linux iptables: Pocket Reference. O'Reilly, 2004. ISBN: 978-0-596-00569-6.

[22] QoSient, LLC. Argus: Auditing network activity. [online], 2000-2011. http://www.qosient.com/argus/.

[23] Michael Rash. Linux Firwalls: Attack Detection and Response with iptables, psad, and fwsnort. No Starch Press, Inc., San Francisco, 3 edition, 2007. ISBN: 978-1-59327-141-1.

[24] Aviel D. Rubin. White-hat Security Arsenal: Tackling the Threats. Addison-Wesley Longman Ltd.,
Essex, UK, 2001.

[25] Carla Schroder. Linux Networking Cookbook. O'Reilly, 2008. ISBN: 978-0-596-10248-7.

[26] Randal L. Schwartz and Tom Phoenix. Learning Perl Objects, References and Modules. O'Reilly, 2003. ISBN: 0-596-00478-8.

[27] Jordan Sissel. Making iptables changes atomically and not dropping packets. [online], March 2010. http://www.semicomplete.com/blog/geekery/

[28] Source�re. Snort: Open-source network intrusion prevention and detection system (IDS/IPS). [on-
line], 2010. http://www.snort.org/.

[29] William Stallings. SNMP, SNMPv2, SNMPv3, and RMON 1 and 2. Addison-Wesley, 3 edition, 1999. ISBN: 0-201-48534-6.

[30] Richard Stallman, Roland McGrath, Paul Smith, and the GNU Project. GNU Make. Free Software Foundation, Inc., [online], 1997-2006. http://www.gnu.org/software/make/.

[31] Lincoln D. Stein. Network Programming with Perl. Addison-Wesley, 2001. ISBN: 0-201-61571-1.

[32] Mani Subramanian. Network Management: Principles and Practice. Addison-Wesley, 2000. ISBN: 0-201-35742-9.

[33] Steve Suehring and Robert L. Ziegler. Linux Firwalls. Pearson Education, Inc. and Novell Press, 3 edition, 2006. ISBN: 978-0-672-32771-1.

[34] Tenable Network Security. Nessus: the network vulnerability scanner. [online], 2002-2011. http://www.nessus.org/nessus/.

[35] The IPv6 Experts. The IPv6 experts .net: Your black and white guide to the new internet. [online], 2010. http://www.theipv6experts.net.

[36] The OpenNMS Community. The OpenNMS project. [online], 1999-2011. http://www.opennms.org/.

[37] The PostgreSQL Global Development Group. PostgreSQL { the world's most advanced open-source database. [ditigal], 1996{2011. http://www.postgresql.org/, last viewed January 2010.

[38] Wikipedia. Spanning tree protocol | Wikipedia, the free encyclopedia, 2010. [on-line; accessed 13-December-2010], http://en.wikipedia.org/w/index.php?title=Spanning_
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Back to top Back to top