Architecting the Network

When planning an institution’s technology infrastructure, today’s campus IT architects face new challenges brought on by users’ increasing reliance on converged networks.

NetworkingTHE WORD ‘ARCHITECT’ calls to mind a designer of buildings. An architect’s job is to develop a structure to fit the client’s needs, some of which are conflicting (or seem to be). When it comes to designing your campus network, IT infrastructure architects have a similar function. Like a building architect, an IT architect must develop a well-considered blueprint before the construction or remodeling starts. A technology infrastructure-planning effort must take into account organizational policies, user requirements, and design goals such as uptime, resiliency, security, and data privacy. Ultimately, the IT architect’s role is to develop a vision for a campus infrastructure that can best meet the organization’s current and foreseen needs, while keeping in perspective real-world problems that could cloud that vision.

One of the primary challenges facing IT architects today is converged networks. Now that users expect to view video and listen to audio (including two-way conversations) via the network, a whole new set of design goals must be considered when “architecting” networks and the supporting services for those networks. Not only are voice and video joining the network, but critical systems such as video surveillance (security cameras), intrusion detection, and building automation/control—which in the past were isolated systems—are increasingly “riding” on the local area network. Now add to this the traffic of users with mobile wireless devices.

While convergence benefits the institution by reducing support for so many disparate systems, it greatly adds to the scope of the IT architect’s responsibilities. When one contemplates all of the components of a campus infrastructure, converged networks set a higher bar.

How Much Can You Tolerate?

Networks carrying “converged” traffic can’t tolerate much in the way of delay, jitter, and downtime, not only because critical systems are now part of the network, but also because users expect more uptime, and demand highquality audio/video. Specific hurdles for the IT architect/ designer include far greater needs for robustness, as well as delivery guarantee requirements for synchronous traffic. For example, traditional TDM (time division multiplex) voice systems typically have experienced downtime of just minutes per year. Substituting “data” servers for a traditional voice switch changes that equation. More frequent software upgrades alone make for more downtime—even if it is planned—because to perform an upgrade, the active system has to be temporarily taken out of use. Yet, users at higher ed institutions now tend to access network services at all hours, and expect those services to just “be there.” An outage at 1 am isn’t as well tolerated as it once was, for instance, and the campus security force doesn’t take kindly to the security and video surveillance systems being non-functional during that downtime, either.

Another part of the problem lies with IP and Ethernet, which we take for granted as delivery mechanisms, but which weren’t designed with synchronous traffic in mind. Video, for example, presents a true test for networks, even upping the ante from voice traffic, because while it also carries delay-sensitive audio, it needs much greater bandwidth for video images. Most industry watchers expect video over the network to grow exponentially over the next 12 to 18 months for all types of users, due primarily to the expanded use of watching video via the internet (thanks to sites such as YouTube.com). Colleges and universities often feel the impact of these technologies first, because of the large percentage of Gen Y users. These digital natives have difficulty understanding why video traffic would ever be a problem; after all, most of them have had broadband internet access at home all their lives.

Power Struggle

Then there’s the power issue—electrical, not political, that is. Nearly all of the critical systems that used to be on separate networks had their own backup power systems, usually centralized uninterruptable power supply (UPS) systems connected to a generator for longer-duration outages. Now, however, both IP telephones and wireless access points draw their electrical power from the Ethernet network. The network switches to which these devices are connected are much more distributed than were electronics for legacy systems. So now the IT architect must take on the role of, or at least understand how to communicate well with, an electrical engineer.

Higher ed users now tend to access network services at all hours, and expect those services to just 'be there.'

By the way, although not caused by convergence, electrical power in the server/data center recently has also become a much greater issue. This is primarily due to the concentration of server processors in much smaller amounts of space. These days, it’s possible to place up to 48 servers in one 7-foot-tall rack. (Think of all the electrical power required in about 6 square feet of floor space!) This poses yet another concern for IT architects—yes, their job descriptions often include planning data centers.

And as if that weren’t enough, the cooling (air conditioning) of data centers is also a rapidly growing concern, because all those additional servers that are drawing more power also generate more heat (just ask a physicist how this works). Most network architects shudder at the idea that they may have to add liquid cooling (similar to the way car radiators work) to these very moisture-sensitive environments, just to keep the contents from literally burning up.

Who Are You?

Another major dilemma in designing campus infrastructures is security. It can no longer be “tacked on” after the fact, but must be planned in as part of any new installation or upgrade. One of the stumbling blocks for many institutions has been the lack of a cost-effective means of assigning and tracking the identity and authorizations (privileges/ access to information) of individual network users. There are now two entire categories of software and services— identity management and network access control—that have been developed to help solve this problem. However, these solutions are still very costly (at least to always cashstarved higher ed organizations), requiring hundreds of thousands of dollars to implement. To better understand the security aspects of identity management that IT architects now have to take into consideration in their planning efforts, please see “The Case for Identity Management” (CT August 2006) and “Trend Report: Identity Management” (CT November 2005).

Coping Mechanisms

While campus infrastructure architects may begin to feel their “building” is about to collapse, there are some measures that can help shore up the foundation. First and foremost, remind faculty, administrators, and staff members to get to know their infrastructure architect. They can be an asset to the architect by helping both to monitor the system and to gain mindshare among those who develop budgets. Tell them to remember that the campus infrastructure architects help keep them in business!

Primary steps for the IT architect include assessing the current situation, envisioning the ultimate goals (seek input from your users—perhaps via an advisory group), and developing a conceptual design. Each goal may require several initiatives. Think of these as separate but related projects. Don’t stint on time spent considering the potential ramifications of proposed changes! Plan to actively manage change—including educating users about it long before it occurs.

Think big, but implement incrementally. Pilot each initiative with selected, interested users who are willing to provide feedback. A successful pilot makes it much easier to obtain approval and funding to move forward. Consider phasing projects over multiple terms or years, to level out resource needs (both budgetary and personnel) over time. It’s also important to keep abreast of new developments and to review and revise the plan regularly, to account for those changes. But always keep in mind it isn’t necessary to change the world overnight!

Featured