Architecting the Network
        
        
        
			- By Wendy Chretien
 - 03/01/07
 
		
        When planning an institution’s technology infrastructure,
today’s campus IT architects face new challenges brought on
by users’ increasing reliance on converged networks.
THE WORD ‘ARCHITECT’ calls to mind a designer of
  buildings. An architect’s job is to develop a structure to fit
  the client’s needs, some of which are conflicting (or seem to
  be). When it comes to designing your campus network, IT
  infrastructure architects have a similar function. Like a building
  architect, an IT architect must develop a well-considered
  blueprint before the construction or remodeling starts. A
  technology infrastructure-planning effort must take into
  account organizational policies, user requirements, and
  design goals such as uptime, resiliency, security, and data
  privacy. Ultimately, the IT architect’s role is to develop a
  vision for a campus infrastructure that can best meet the
  organization’s current and foreseen needs, while keeping in
perspective real-world problems that could cloud that vision.
One of the primary challenges facing IT architects today
  is converged networks. Now that users expect to view
  video and listen to audio (including two-way conversations)
  via the network, a whole new set of design goals must be
  considered when “architecting” networks and the supporting
  services for those networks. Not only are voice and
  video joining the network, but critical systems such as video
  surveillance (security cameras), intrusion detection, and
  building automation/control—which in the past were isolated
  systems—are increasingly “riding” on the local
  area network. Now add to this the traffic of users
  with mobile wireless devices.
While convergence benefits the institution by
  reducing support for so many disparate systems,
  it greatly adds to the scope of the IT
  architect’s responsibilities. When one contemplates
  all of the components of a campus infrastructure,
  converged networks set a higher bar.
How Much Can You Tolerate?
Networks carrying “converged” traffic can’t tolerate much
  in the way of delay, jitter, and downtime, not only because
  critical systems are now part of the network, but also
  because users expect more uptime, and demand highquality
  audio/video. Specific hurdles for the IT architect/
  designer include far greater needs for robustness, as well
  as delivery guarantee requirements for synchronous traffic.
  For example, traditional TDM (time division multiplex) voice
  systems typically have experienced downtime of just minutes
  per year. Substituting “data” servers for a traditional
  voice switch changes that equation. More frequent software
  upgrades alone make for more downtime—even if it
  is planned—because to perform an upgrade, the active
  system has to be temporarily taken out of use. Yet, users at
  higher ed institutions now tend to access network services
  at all hours, and expect those services to just “be
  there.” An outage at 1 am isn’t as well tolerated as it once
  was, for instance, and the campus security force doesn’t
  take kindly to the security and video surveillance systems
  being non-functional during that downtime, either.
Another part of the problem lies with IP and Ethernet,
  which we take for granted as delivery mechanisms, but
  which weren’t designed with synchronous traffic in mind.
  Video, for example, presents a true test for networks, even
  upping the ante from voice traffic, because while it also carries
  delay-sensitive audio, it needs much greater bandwidth for video images. Most industry watchers expect video over
  the network to grow exponentially over the next 12 to 18
  months for all types of users, due primarily to the expanded
  use of watching video via the internet (thanks to sites such
  as YouTube.com). Colleges and universities often feel the
  impact of these technologies first, because of the large percentage
  of Gen Y users. These digital natives have difficulty
  understanding why video traffic would ever be a problem;
  after all, most of them have had broadband internet access
  at home all their lives.
  
Power Struggle
Then there’s the power issue—electrical, not political, that
  is. Nearly all of the critical systems that used to be on separate
  networks had their own backup power systems, usually
  centralized uninterruptable power supply (UPS) systems
  connected to a generator for longer-duration outages.
  Now, however, both IP telephones and wireless access
  points draw their electrical power from the Ethernet network.
  The network switches to which these devices are
  connected are much more distributed than were electronics
  for legacy systems. So now the IT architect must take
  on the role of, or at least understand how to communicate
  well with, an electrical engineer.
Higher ed users now tend to access network services at
all hours, and expect those services to just 'be there.'
 
By the way, although not caused by convergence, electrical
  power in the server/data center recently has also
  become a much greater issue. This is primarily due to the
  concentration of server processors in much smaller
  amounts of space. These days, it’s possible to place up to
  48 servers in one 7-foot-tall rack. (Think of all the electrical
  power required in about 6 square feet of floor space!) This
  poses yet another concern for IT architects—yes, their job
  descriptions often include planning data centers.
And as if that weren’t enough, the cooling (air conditioning)
  of data centers is also a rapidly growing concern,
  because all those additional servers that are drawing more
  power also generate more heat (just ask a physicist how this
  works). Most network architects shudder at the idea that
  they may have to add liquid cooling (similar to the way car
  radiators work) to these very moisture-sensitive environments,
  just to keep the contents from literally burning up.
Who Are You?
Another major dilemma in designing campus infrastructures
  is security. It can no longer be “tacked on” after the
  fact, but must be planned in as part of any new installation
  or upgrade. One of the stumbling blocks for many institutions
  has been the lack of a cost-effective means of assigning
  and tracking the identity and authorizations (privileges/
  access to information) of individual network users. There
  are now two entire categories of software and services—
  identity management and network access control—that
  have been developed to help solve this problem. However,
  these solutions are still very costly (at least to always cashstarved
  higher ed organizations), requiring hundreds of
  thousands of dollars to implement. To better understand
  the security aspects of identity management that IT architects
  now have to take into consideration in their planning
  efforts, please see “The Case for Identity Management”
  (CT August 2006) and “Trend Report: Identity Management”
  (CT November 2005).
Coping Mechanisms
While campus infrastructure architects may begin to feel their
“building” is about to collapse, there are some measures that
  can help shore up the foundation. First and foremost, remind
  faculty, administrators, and staff members to get to know
  their infrastructure architect. They can be an asset to the
  architect by helping both to monitor the system and to gain
  mindshare among those who develop budgets. Tell them to
  remember that the campus infrastructure architects help
  keep them in business!
Primary steps for the IT architect include assessing the current
  situation, envisioning the ultimate goals (seek input from
  your users—perhaps via an advisory group), and developing
  a conceptual design. Each goal may require several initiatives.
  Think of these as separate but related projects. Don’t
  stint on time spent considering the potential ramifications of
  proposed changes! Plan to actively manage change—including
  educating users about it long before it occurs.
Think big, but implement incrementally. Pilot each initiative
  with selected, interested users who are willing to provide
  feedback. A successful pilot makes it much easier to obtain
  approval and funding to move forward. Consider phasing
  projects over multiple terms or years, to level out resource
  needs (both budgetary and personnel) over time. It’s also
  important to keep abreast of new developments and to
  review and revise the plan regularly, to account for those
  changes. But always keep in mind it isn’t necessary to
  change the world overnight!