INFORMATION CHANGE THE WORLD

International Journal of Modern Education and Computer Science (IJMECS)

ISSN: 2075-0161 (Print), ISSN: 2075-017X (Online)

Published By: MECS Press

IJMECS Vol.12, No.6, Dec. 2020

Mitigating Technical Challenges via Redesigning Campus Network for Greater Efficiency, Scalability and Robustness: A Logical View

Full Text (PDF, 1079KB), PP.29-45


Views:5   Downloads:0

Author(s)

A.A. Ojugo, A.O. Eboka

Index Terms

Telephony, security, jitters, packet loss, resilience, redundancy

Abstract

Data transfer over the Internet comes with its range of challenges and associated prospects as a major milestone in the convergence of information and communication technology (ICT). Campus network implemented on IP-telephony defines a range of convergence technologies and applications that refers to a multi-service network that allows integration of data, audio, voice, and video solutions onto a converged infrastructure so that data can be transported via the use of open-source applications, protocols, hardware, and software. The study adopts the Federal College of Education Technical Asaba. It is observed that some issues in its implementation include packet loss, jitters, and latency. Jitters and packet loss can be curbed via an increased bandwidth allocation; while latency is minimized via constant upgrade in network infrastructure to increase speed. Overall, the proposed network seeks to provide its users with mobility, resilience, economy, flexibility, and productivity. Its results recommends that organizations wishing to harness its potentials should join forums and user-groups that will constantly update their knowledge in a bid to help them improve the efficiency and effectiveness of their infrastructure implementation.

Cite This Paper

A.A. Ojugo, A.O. Eboka, " Mitigating Technical Challenges via Redesigning Campus Network for Greater Efficiency, Scalability and Robustness: A Logical View", International Journal of Modern Education and Computer Science(IJMECS), Vol.12, No.6, pp. 29-45, 2020.DOI: 10.5815/ijmecs.2020.06.03

Reference

[1]Kurose, J. and Ross, K. (2013) Computer Networking: A Top-Down Approach. 6th edn. ed. by Hirsch, M. and Snider, E. Boston: Pearson Education Limited

[2]Ojugo, A.A., R.E. Yoro., A. Eboka., M. Yerokun and I. Iyawa., (2012). Implementation issues of VoIP to enhance rural telephony in Nigeria, Journal of Emerging Trends in Computing & Information Systems, 4(2): pp113-120, [web]: cisjournal.org/journalofcomputing/Archive_Feb_2013.aspx 

[3]Ojugo, A.A., Eboka, A.O., (2014). Social engineering detection model for mobile smartphone clients, African J. of Computing & ICT, 7(3): pp91–100. [web]: www.africanjournalofcomputingict1.files.wordpress.com/2017/08/vol-7-no-3-september-2014.pdf

[4]Ojugo, A.A., A.O. Eboka., (2019). Inventory prediction and management in Nigeria using market basket analysis associative rule mining: memetic algorithm approach, Int. Journal of Information and Communication Technology, 8(3): pp128-138, doi: 10.11591/ijict.v8i3, [web]: www.ijict.iaescore.com/index.php/IJICT/issue/view/554

[5]Ojugo, A.A., A.O. Eboka., (2020). Memetic algorithm for short messaging service spam filter text normalization and semantic approach, Int. Journal of Information and Communication Technology, 9(1): pp13 – 27, doi: 10.11591/ijict.v9i1, [web]: www.ijict.iaescore.com/index.php/IJICT/issue/view/555

[6]D.A. Oyemade., J. Akpojaro., A.A. Ojugo., R. Ureigho., F. Imouokhome., E. Omoregbee., (2016). A three tier learning model for universities in Nigeria, Journal of Technologies in Society, 12(2): pp9-20, [web]: https://jts.cgpublisher.com

[7]Ojugo, A.A., O.D. Otakore., (2018a). Mitigating social engineering menace in Nigerian Universities, J. of Comp. Sci. & Application, 6(2): pp64–68, doi: 10.12691/jcsa-6-2-2, [web]: www.sciepub.com/jcsa/content/6/2

[8]Ojugo, A.A., D.O. Otakore., (2018b). Redesigning academic website for better visibility and footprint: a case of Federal University of Petroleum Resources Effurun website, Network & Communication Technologies, 3(1): pp33 –44, https://doi.org/10.5539/nct.v3n1p33,  [web]: www.ccsenet.org/journal/index.php/nct/ 

[9]Ojugo, A.A., A.O. Eboka., (2018). Assessing user satisfaction and experience on academic websites: a case of selected Nigerian Universities websites, Int. J. Tech & Comp. Sci., 10(7): pp53-61, doi: 10.5815/ijitcs.2018.10.07, [web]: www.mecs-press.net/ijitcs 

[10]Ojugo, A.A., I.P. Okobah., (2018). Prevalence rate of hepatitis-B virus infection in Niger Delta region of Nigeria using graph-based diffusion heuristic model, IJCAOnline International Journal of Computer Application, 179(39): pp27 –33, [web]: www.ijcaonline.org/archives/volume179/number39/ 

[11]R.E. Yoro., Ojugo, A.A., (2019a). An intelligent model to predict the relationship of weather conditions for fish farming production yield in Nigeria, American Journal of Modeling and Optimization, 4(3): pp79-90

[12]R.E. Yoro., Ojugo, A.A., (2019b). Quest for prevalence rate of Hepatitis-B Virus infection in Nigeria: comparative study of supervised versus unsupervised model, American J. of Modeling & Optimization, 4(3): pp79-90

[13]R.E. Yoro., Ojugo, A.A., (2019c). An intelligent client-trusted and dependable security framework to ease smartphone portability on community cloud computing, J. of Network and Communication, 4(3): pp79-90

[14]Dye, M., McDonald, R., and Rufi, A. (2008) Network Fundamentals: CCNA Exploration Companion Guide. 1st edn. ed. by Ray, M. Indianapolis, Indiana, USA: Cisco Press

[15]White, C. (2011) Data Communications and Computer Networks: A Business User’s Approach. Boston, USA: Course Technology Publications

[16]Derfler, F.J. (2000) Practical Networking. Indiana: Que

[17]Comer, D. (2008) Computer Networks and Internets. 5th edn. London: Addison-Wesley

[18]Beasley, J. (2008) Networking. 2nd edn. USA: Prentice Hall

[19]Tanenbaum, A. and Wetherall, D. (2010) Computer Networks. 5th edn. USA: Prentice Hall

[20]Ojugo, A.A., Yoro, R., Oyemade, D.A., Eboka, A.O., Ugboh, E., Aghware, F., (2013a). Robust cellular network rural telephony in Southern Nigeria, American J. of Net. Comm. 2(5): 125-132 www.article.sciencepublishinggroup.com/html/10.11648.j.ajnc.20130205.12.html

[21]Ojugo, A.A., Abere, R., Orhionkpaiyo, B., Yoro, R., Eboka, A., (2013b). Technical issues for IP-based telephony in Nigeria, Int. J. Wireless Comm. & Mobile Comp., 1(2): 58-67, [web]: www.article.sciencepublishinggroup.com/html/10.11648.j.ajnc.20130102.14.html

[22]Eung-Ha, K., Cho, K.S and Ryu, W., “Amendment to MSF whitepaper on personalized converged services: network-to-network”, [online]: www.msforum.org/techninfo/reports.shtml, last accessed March 2013.

[23]Schwartz, R., “Wireless communications in developing nations: cellular and satellite net systems”, 1997, Artech house. MA: Boston.

[24]Stallings, W and Van Slyke, R., “Business data communications”, 6th Ed., 2010, Prentice Hall Int. Ed., ISBN – 1-13-761230-3, pp316-340.

[25]Williams, M., Ewan, S and Reza, T., “Convergence, IP telephony and regulations: issues and opportunities for network development in India”, 2005, Technical University of Denmark Center for ICT, Denmark: Lyngby.

[26]Conte, R., “Rural telephony: new approach via mobile satellite communication”, Proceedings of Pacific telemmunication conf., 1994, Hawai: Honolulu

[27]Garg, V., Smolik, K and Wilkes, J., “CDMA application in wireless communications”, 1997, Prentice Hall publications, New Jersey: Upper Saddle River.

[28]Helgert, H., “Integrated services digital net: Architecture, protocols and standards”, 1991, Readings: MA: Addison-Wesley.

[29]Brennen, R and Dipak, G., “Secure IP telephony via multi-layered protection”, 2009, Technical University of Denmark report, Centre for ICT, Denmark: Lyngby

[30]Martins, J.A.H., “Telecommunications and the computer”, 1990, Prentice Hall publications, New Jersey: Upper Saddle River

[31]Rosa, J., “Rural telecommunications via satellite”, Journal of Telecommunications, 2005, 3(2), pp 75 – 81.

[32]Hafner, K and Lyon, M., “Where wizards stay up late”, 1996, Simon and Schuster, New York.

[33]Ojugo, A.A., F. Aghware., R. Yoro., M. Yerokun., A. Eboka., C. Anujeonye., F. Efozia., (2015a). Dependable community-cloud framework for smartphones, American J. of Networks and Communications, 4(4): pp95-103, [web]: article.sciencepublishinggroup.com/html/10.11648.j.ajnc.20150404.13.html

[34]Ojugo, A.A., D. Oyemade., D. Allenotor., R.E. Yoro., C.N. Anujeonye., (2015b). Immunization problem for Ebola virus in rural Sierra-Leone, African J. of Comp. & ICT., 8(1): pp1 –10: [web]: www.afrjcict.net/ 

[35]Subramoni, H., Kandalla, K., Vienne, J., Sur, S., Barth, B., Tomko, K., Mclay, R., Schulz, K., and Panda, D.K. (2011) “Design and Evaluation of Network Topology-/Speed- Aware Broadcast Algorithms for InfiniBand Clusters”. 2011 IEEE International Conference on Cluster Computing [online] 317–325. available from <http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6061150> [8 June 2014]

[36]Kumar, H. (2013). Physical vs. logical topologies [online] available from http://egyaan.in/2013/04/22/physical-vs-logical-topologies/

[37]Sun, X. and Xie, G.G. (2013) “Minimizing Network Complexity through Integrated Top-down Design”. Proceedings of the ninth ACM conference on Emerging networking experiments and technologies - CoNEXT ’13 [online] 259–270. available from http://dl.acm.org/citation.cfm?doid=2535372.2535376

[38]DiNicolo, D. (2007) Advantages and Disadvantages of Different Network Design Approaches [online] available from <http://www.2000trainers.com/ccda-study-guide/comparing-network-design-approaches/> [2 June 2014]

[39]Huynh, M., Goose, S., and Mohapatra, P. (2010) “Resilience Technologies in Ethernet”. Computer Networks [online] 54 (1), 57–78. available from <http://linkinghub.elsevier.com/retrieve/pii/S1389128609002692> [1 June 2014]

[40]Iqbal, R. and Xingang, W. (2014) Network Planning and Management [online] Coventry. available from http://cumoodle.coventry.ac.uk/course/view.php?id=10062

[41]Lanxiaopu, M. (2012) An Investigation and Comparison on Network Performance Analysis [online] UNIVERSITY OF OSLO. available from https://www.duo.uio.no/bitstream/handle/10852/9087/MxMT.pdf?sequence=1

[42]McCabe, J. (2008) Network Analysis, Architecture and Design. 3rd edn. London: Morgan Kaufmann

[43]Rouse, M. (2006) Definition: Scalability [online] <http://searchdatacenter.techtarget.com/definition/scalability> [23 June 2014]

[44]Rouse, M. (2010) Network Topology [online] available from <http://whatis.techtarget.com/definition/network-topology> [23 May 2014]

[45]Duboc, L., Letier, E., and Rosenblum, D.S. (2013) “Systematic Elaboration of Scalability Requirements through Goal-Obstacle Analysis”. IEEE Transactions on Software Engineering [online] 39 (1), 119–140. available from http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6152130

[46]Oppenheimer, P. (2011) Top-Down Network Design. 3rd edn. Indianapolis: Cisco Systems Inc.

[47]Derbel, H., Agoulmine, N., and Salaün, M. (2009) “ANEMA: Autonomic Network Management Architecture to Support Self-Configuration and Self-Optimization in IP Networks”. Computer Networks [online] 53 (3), 418–430. available from <http://linkinghub.elsevier.com/retrieve/pii/S138912860800354X> [13 June 2014]

[48]Jang, W.S. and Healy, W.M. (2010) “Wireless Sensor Network Performance Metrics for Building Applications”. Energy and Buildings [online] 42 (6), 862–868. available from <http://linkinghub.elsevier.com/retrieve/pii/S0378778809003314> [23 May 2014]

[49]Trivedi, K.S., Kim, D.S., and Ghosh, R. (2009) “Resilience in Computer Systems and Networks”. Proceedings of the 2009 International Conference on Computer-Aided Design - ICCAD ’09 [online] 74. available from http://portal.acm.org/citation.cfm?doid=1687399.1687415

[50]Sterbenz, J.P.G., Hutchison, D., Çetinkaya, E.K., Jabbar, A., Rohrer, J.P., Schöller, M., and Smith, P. (2010) “Resilience and Survivability in Communication Networks: Strategies, Principles, and Survey of Disciplines”. Computer Networks [online] 54 (8), 1245–1265. available from <http://linkinghub.elsevier.com/retrieve/pii/S1389128610000824> [30 May 2014]

[51]Digital Project Advisory Group (2008) Guidelines on File Naming Conventions for Digital Collections [online] available from http://ucblibraries.colorado.edu/systems/digitalinitiatives/docs/filenameguidelines.pdf

[52]Robinson, M. (2007) Record Management Guidance [online] United Kingdom. available from http://www.st-andrews.ac.uk/media/business-improvements/recordsmanagement/documents/NamingConventionsV01.pdf

[53]Ergu, D., Kou, G., Shi, Y., and Shi, Y. (2014) “Analytic Network Process in Risk Assessment and Decision Analysis”. Computers & Operations Research [online] 42, 58–74. available from <http://linkinghub.elsevier.com/retrieve/pii/S0305054811000785> [11 June 2014]

[54]Cárdenas, A.A., Amin, S., and Lin, Z. (2011) “Attacks Against Process Control Systems : Risk Assessment , Detection , and Response Categories and Subject Descriptors”. in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security [online] held 2011. available from http://delivery.acm.org/10.1145/1970000/1966959/p355-cardenas.pdf?ip=194.66.32.1&id=1966959&acc=ACTIVESERVICE&key=BF07A2EE685417C5%2E7D2D40990  E9ACC88%2E390D382F189BE0B3%2E4D4702B0C3E3 8B35&CFID=475734200&CFTOKEN=24026082 &__acm__=1402505101_fcc3872ecbd6835d17a0b00d66bd540f

[55]Kizza, J.M., (2013) Computer Communication and Networks: A Guide to Computer Network Security. 2nd edn. London: Springer

[56]Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., and Wu, Q. (2010) “A Survey of Game Theory as Applied to Network Security”. 2010 43rd Hawaii International Conference on System Sciences [online] 1–10. available from http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5428673

[57]Miaji, Y. and Ph, D. (2014) “Novel Performance Enhancement of University ’ S Network Exploiting Cisco Network Design Model : Study Case on IUKL Network”. in International Conference on Computer Security and Digital Investigation [online] held 2014 at Malaysia. 36–41. available from http://sdiwc.net/digital-library/novel-performance-enhancement-of-universitys-network-exploiting-cisco-network-design-model-study-case-on-iukl-network