Network Services continuously monitors bandwidth on both the wired and wireless networks and begins to plan for added capacity when the network averages 50% usage. By evaluating historical data we will define the upgrade roadmap for the next 5 years.
Re-architecting the departmental wireless network solution to eliminate bridging departmental wired networks to the wireless network core will improve wireless reliability so that “bad acting” devices on the wired network can not interfere with the wireless network.
The current campus network has worked to provide redundancy and resiliency to the campus core and access layers. The greatest challenges here have been with adaptability and provisioning time needed to address dynamic changes. The objective with the Next Gen2 Network will be to retain the redundancy and resiliency traits while adding dynamic provisioning mechanisms via automation and/or network overlays.
Research networking has significantly outpaced other demands placed on the campus network over the last 5 years leading to the current campus network configurations. The commoditization of networking equipment capable of delivering these capabilities could again allow the unification of the network on campus. The Next Gen2 Network will explore this as a future design consideration.
The Next Gen² Network project team is partnering with Cybersecurity Interoperability initiatives to build this functionality into the fabric of the network design, by investigating the use of role-based access and zero-trust strategy.
The Next Gen² Network initiative will explore new opportunities for automation for network management, monitoring, and load balancing. The team will discover and evaluate new tools that will allow more comprehensive big picture views of the network reducing the need to jump from tool to tool to troubleshoot.
The current Trust Model revolves around securing the network perimeters. The departmental networks are bordered by firewalls and internal traffic is trusted by default. Once inside the border of the layer 3 network you have network visibility to almost everything with an “implied trust model.” We would like to move controls as close as possible to what is referred to as the “Protect Surface in the Zero Trust Strategy.”