52
Regents Education Program Regents Education Program September 2006 September 2006 Information Technology and Higher Education: Managing Achievements and Expectations Kurt A. Snodgrass Vice Chancellor, IT & Telecommunications

Regents Education Program September 2006

  • Upload
    chapa

  • View
    30

  • Download
    0

Embed Size (px)

DESCRIPTION

Regents Education Program September 2006. Information Technology and Higher Education:  Managing Achievements and Expectations Kurt A. Snodgrass Vice Chancellor, IT & Telecommunications. Perfect Storm or New Dawn?. - PowerPoint PPT Presentation

Citation preview

Page 1: Regents Education Program September 2006

Regents Education ProgramRegents Education Program September 2006September 2006

Regents Education ProgramRegents Education Program September 2006September 2006

Information Technology and Higher Education:

 Managing Achievements and Expectations

Kurt A. SnodgrassVice Chancellor, IT & Telecommunications

Information Technology and Higher Education:

 Managing Achievements and Expectations

Kurt A. SnodgrassVice Chancellor, IT & Telecommunications

Page 2: Regents Education Program September 2006

Perfect Storm or New Perfect Storm or New Dawn?Dawn?Perfect Storm or New Perfect Storm or New Dawn?Dawn?

In today’s knowledge economy, the role of higher education is being

redefined – not simply tweaked and fine-tuned but, rather, fundamentally

redefined.

James Hilton, Associate Provost for Academic, Information, and Instructional Technology Affairs and Interim University Librarian at the University of Michigan

In today’s knowledge economy, the role of higher education is being

redefined – not simply tweaked and fine-tuned but, rather, fundamentally

redefined.

James Hilton, Associate Provost for Academic, Information, and Instructional Technology Affairs and Interim University Librarian at the University of Michigan

Page 3: Regents Education Program September 2006

A Balancing Act for Higher A Balancing Act for Higher EdEdA Balancing Act for Higher A Balancing Act for Higher EdEd

• Striking a fine balance is key for institutional CIOs

• Striking a fine balance is key for institutional CIOs

InstitutionalMission

InstitutionalMission

Student Needs &Expectations

Student Needs &Expectations

Page 4: Regents Education Program September 2006

A Balancing Act for Higher A Balancing Act for Higher EdEdA Balancing Act for Higher A Balancing Act for Higher EdEd

• Institutional mission can be jeopardized• Security, Data Integrity can be compromised• Bandwidth bottleneck can affect networking,

communications and research

• Institutional mission can be jeopardized• Security, Data Integrity can be compromised• Bandwidth bottleneck can affect networking,

communications and research

InstitutionalMission

InstitutionalMissionStudent Needs &Expectations

Student Needs &Expectations

Page 5: Regents Education Program September 2006

A Balancing Act for Higher A Balancing Act for Higher EdEdA Balancing Act for Higher A Balancing Act for Higher EdEd

• Overly tight controls limit access to technologies and information

• Curbs innovation in teaching and learning• Will likely result in student dissatisfaction

• Overly tight controls limit access to technologies and information

• Curbs innovation in teaching and learning• Will likely result in student dissatisfaction

Institutional

MissionInstitutional

Mission

Student Needs &

ExpectationsStudent Needs &

Expectations

Page 6: Regents Education Program September 2006

State System CIO State System CIO PerspectivePerspectiveState System CIO State System CIO PerspectivePerspective• Council on Information Technology 2005

survey identified key issues facing system CIOs– Top 5 IssuesTop 5 Issues

• FundingFunding• Security threatsSecurity threats• Upgrading and maintaining infrastructureUpgrading and maintaining infrastructure• Simplification (Enterprise Contracts and Collaboration)Simplification (Enterprise Contracts and Collaboration)• Moving faculty toward better use of technologyMoving faculty toward better use of technology

• Council on Information Technology 2005 survey identified key issues facing system CIOs– Top 5 IssuesTop 5 Issues

• FundingFunding• Security threatsSecurity threats• Upgrading and maintaining infrastructureUpgrading and maintaining infrastructure• Simplification (Enterprise Contracts and Collaboration)Simplification (Enterprise Contracts and Collaboration)• Moving faculty toward better use of technologyMoving faculty toward better use of technology

Page 7: Regents Education Program September 2006

Proliferation of New Proliferation of New TechnologiesTechnologiesProliferation of New Proliferation of New TechnologiesTechnologies• Distance Learning

– Synchronous (2-way interactive)Synchronous (2-way interactive)– Asynchronous (Web-based)Asynchronous (Web-based)

• Wireless– Anytime, anywhere accessAnytime, anywhere access– Mobile computing and communicationsMobile computing and communications

• Bandwidth Management– Peer-to-Peer (P2P)Peer-to-Peer (P2P)

• Music and movie downloadsMusic and movie downloads

• Distance Learning – Synchronous (2-way interactive)Synchronous (2-way interactive)– Asynchronous (Web-based)Asynchronous (Web-based)

• Wireless– Anytime, anywhere accessAnytime, anywhere access– Mobile computing and communicationsMobile computing and communications

• Bandwidth Management– Peer-to-Peer (P2P)Peer-to-Peer (P2P)

• Music and movie downloadsMusic and movie downloads

Page 8: Regents Education Program September 2006

Electronic Media Trends Electronic Media Trends 1998-20041998-2004Electronic Media Trends Electronic Media Trends 1998-20041998-2004

1,566

6,833

5,724

4,551

3,5482,884

0

1,000

2,000

3,000

4,000

5,000

6,000

7,000

8,000

1998-99 1999-00 2000-01 2001-02 2002-03 2003-04

H.323 IP VideoProliferation

Page 9: Regents Education Program September 2006

Electronic Media Enrollment Electronic Media Enrollment Trends 1998-2004Trends 1998-2004Electronic Media Enrollment Electronic Media Enrollment Trends 1998-2004Trends 1998-2004

20,713

90,876

65,790

49,56340,706

33,259

0

20,000

40,000

60,000

80,000

100,000

1998-99 1999-00 2000-01 2001-02 2002-03 2003-04

Page 10: Regents Education Program September 2006

2004 Student Credit Hours 2004 Student Credit Hours (By Tier and Delivery Method)(By Tier and Delivery Method)2004 Student Credit Hours 2004 Student Credit Hours (By Tier and Delivery Method)(By Tier and Delivery Method)

26,10837,874

108,898

17,14030,143 25,044

0

20,000

40,000

60,000

80,000

100,000

120,000

Online ITV

Research Regional Community College

Page 11: Regents Education Program September 2006

In Higher Education In Higher Education Alone…Alone…In Higher Education In Higher Education Alone…Alone…

Over 245K Credit Hours Delivered Via Technology!

Over 245K Credit Hours Delivered Via Technology!

Page 12: Regents Education Program September 2006

Rationale for GrowthRationale for GrowthRationale for GrowthRationale for Growth

• Increased comfort and familiarity with technology by both faculty and students

• Enhancements in Content Management Systems (CMS)– QualityQuality– Ease of useEase of use

• More schools developing hybrid classes• More emphasis on reaching non-

traditional and/or adult students

• Increased comfort and familiarity with technology by both faculty and students

• Enhancements in Content Management Systems (CMS)– QualityQuality– Ease of useEase of use

• More schools developing hybrid classes• More emphasis on reaching non-

traditional and/or adult students

Page 13: Regents Education Program September 2006

• Sprint Higher Education Advisory Board Findings– TrendsTrends

• Cellular dominatesCellular dominates – students prefer it and use it almost – students prefer it and use it almost exclusivelyexclusively

– Decline of landline phonesDecline of landline phones• Adoption ofAdoption of personal emailpersonal email (gmail, yahoo mail, hotmail, (gmail, yahoo mail, hotmail,

etc.)etc.)– University emails go unreadUniversity emails go unread

• 3rd party portals3rd party portals (FaceBook, DailyJolt, MySpace) (FaceBook, DailyJolt, MySpace)– University portal usage decliningUniversity portal usage declining

• Sprint Higher Education Advisory Board Findings– TrendsTrends

• Cellular dominatesCellular dominates – students prefer it and use it almost – students prefer it and use it almost exclusivelyexclusively

– Decline of landline phonesDecline of landline phones• Adoption ofAdoption of personal emailpersonal email (gmail, yahoo mail, hotmail, (gmail, yahoo mail, hotmail,

etc.)etc.)– University emails go unreadUniversity emails go unread

• 3rd party portals3rd party portals (FaceBook, DailyJolt, MySpace) (FaceBook, DailyJolt, MySpace)– University portal usage decliningUniversity portal usage declining

Wireless TechnologiesWireless TechnologiesWireless TechnologiesWireless Technologies

Page 14: Regents Education Program September 2006

Wireless TechnologiesWireless TechnologiesWireless TechnologiesWireless Technologies

• Sprint Higher Education Advisory Board Findings– Effects Effects

• It’s It’s hard to communicatehard to communicate with students! with students!

• Emergency callsEmergency calls bypass campus safety bypass campus safety

• Decrease in sense of Decrease in sense of communitycommunity

• Decrease in long distance Decrease in long distance revenuerevenue

• Sprint Higher Education Advisory Board Findings– Effects Effects

• It’s It’s hard to communicatehard to communicate with students! with students!

• Emergency callsEmergency calls bypass campus safety bypass campus safety

• Decrease in sense of Decrease in sense of communitycommunity

• Decrease in long distance Decrease in long distance revenuerevenue

Page 15: Regents Education Program September 2006

Wireless TechnologiesWireless TechnologiesWireless TechnologiesWireless Technologies

• Campus Local Area Networks (LANs) and Wide Area Networks (WANs)– 90 percent of campuses in the United States have

some form of wireless networking, according to the Campus Computing Project

– Relatively low cost with big impact• Significantly reduces cabling costs

– Increases access and productivity– Provides for scalability and flexibility

• Campus Local Area Networks (LANs) and Wide Area Networks (WANs)– 90 percent of campuses in the United States have

some form of wireless networking, according to the Campus Computing Project

– Relatively low cost with big impact• Significantly reduces cabling costs

– Increases access and productivity– Provides for scalability and flexibility

Page 16: Regents Education Program September 2006

Wireless TechnologiesWireless TechnologiesWireless TechnologiesWireless Technologies

• Can be isolated– Classroom or building-basedClassroom or building-based

• Can be campus-wide• Increases competitiveness of institution• Supports innovation

– Provides enhanced collaboration and e-learning Provides enhanced collaboration and e-learning environmentsenvironments

• Can be isolated– Classroom or building-basedClassroom or building-based

• Can be campus-wide• Increases competitiveness of institution• Supports innovation

– Provides enhanced collaboration and e-learning Provides enhanced collaboration and e-learning environmentsenvironments

Page 17: Regents Education Program September 2006

Wireless TechnologiesWireless TechnologiesWireless TechnologiesWireless Technologies

• Security is a major concern– A multitude of operating systems, devices and A multitude of operating systems, devices and

platforms accessing the network creates specific platforms accessing the network creates specific challengeschallenges

– Unmanaged devices can become infected off-site Unmanaged devices can become infected off-site and introduce issues when connected to the and introduce issues when connected to the campus networkcampus network

• Students, staff & faculty with laptopsStudents, staff & faculty with laptops• Clean AccessClean Access

– Security and authentication are paramountSecurity and authentication are paramount

• Security is a major concern– A multitude of operating systems, devices and A multitude of operating systems, devices and

platforms accessing the network creates specific platforms accessing the network creates specific challengeschallenges

– Unmanaged devices can become infected off-site Unmanaged devices can become infected off-site and introduce issues when connected to the and introduce issues when connected to the campus networkcampus network

• Students, staff & faculty with laptopsStudents, staff & faculty with laptops• Clean AccessClean Access

– Security and authentication are paramountSecurity and authentication are paramount

Page 18: Regents Education Program September 2006

Wireless TechnologiesWireless TechnologiesWireless TechnologiesWireless Technologies

• Wardriving – Is searching for Wi-Fi wireless networks by moving Is searching for Wi-Fi wireless networks by moving

vehicle. It involves using a car or truck and a Wi-vehicle. It involves using a car or truck and a Wi-Fi-equipped computer, such as a laptop or a PDA, Fi-equipped computer, such as a laptop or a PDA, to detect the networks to detect the networks

– Normally engaged in to gain free internet access Normally engaged in to gain free internet access or illegal access to an organization’s or illegal access to an organization’s data though some do it for sport

– No longer have to have physical access to an No longer have to have physical access to an institution’s facilities to gain access to private datainstitution’s facilities to gain access to private data

• Wardriving – Is searching for Wi-Fi wireless networks by moving Is searching for Wi-Fi wireless networks by moving

vehicle. It involves using a car or truck and a Wi-vehicle. It involves using a car or truck and a Wi-Fi-equipped computer, such as a laptop or a PDA, Fi-equipped computer, such as a laptop or a PDA, to detect the networks to detect the networks

– Normally engaged in to gain free internet access Normally engaged in to gain free internet access or illegal access to an organization’s or illegal access to an organization’s data though some do it for sport

– No longer have to have physical access to an No longer have to have physical access to an institution’s facilities to gain access to private datainstitution’s facilities to gain access to private data

Page 19: Regents Education Program September 2006
Page 20: Regents Education Program September 2006

First WardriverFirst WardriverFirst WardriverFirst Wardriver

Page 21: Regents Education Program September 2006

Real Wardriving GearReal Wardriving GearReal Wardriving GearReal Wardriving Gear

Page 22: Regents Education Program September 2006

Security Incidents on the Security Incidents on the RiseRiseSecurity Incidents on the Security Incidents on the RiseRise

0

20,000

40,000

60,000

80,000

100,000

120,000

140,000

1995 1996 1997 1998 1999 2000 2001 2002 20030

20,000

40,000

60,000

80,000

100,000

120,000

140,000

1995 1996 1997 1998 1999 2000 2001 2002 2003

Source: CERT: Carnegie Mellon Software Engineering Institute, IDC

Page 23: Regents Education Program September 2006

Security Incidents on the Security Incidents on the RiseRiseSecurity Incidents on the Security Incidents on the RiseRise

One virus/worm incident costs

$100,000

-Source: International Computer Security Association (ICSA) 2003 Annual Virus Survey

One virus/worm incident costs

$100,000

-Source: International Computer Security Association (ICSA) 2003 Annual Virus Survey

Page 24: Regents Education Program September 2006

Network Security ThreatsNetwork Security ThreatsNetwork Security ThreatsNetwork Security Threats

• Worm• Virus• Spyware/Malware• Denial of Service (DOS) Attack• Trojan Horse

• Worm• Virus• Spyware/Malware• Denial of Service (DOS) Attack• Trojan Horse

Page 25: Regents Education Program September 2006

Security is no longer an Security is no longer an option… It’s a necessityoption… It’s a necessitySecurity is no longer an Security is no longer an option… It’s a necessityoption… It’s a necessity

•Security as an Option

•Security is an add-on

•Challenging integration

•Not cost-effective

•Cannot focus on core priority

•Security as an Option

•Security is an add-on

•Challenging integration

•Not cost-effective

•Cannot focus on core priority

•Security as INTEGRAL of a System

•Security is built-in

•Intelligent collaboration

•Appropriate security

•Direct focus on core priority

•Security as INTEGRAL of a System

•Security is built-in

•Intelligent collaboration

•Appropriate security

•Direct focus on core priority

Source: Cisco Systems

Page 26: Regents Education Program September 2006

Recent State Security Recent State Security MandatesMandatesRecent State Security Recent State Security MandatesMandates• HB2935

– Requires risk assessments be completed for all Requires risk assessments be completed for all agencies and institutionsagencies and institutions

• Will remain confidentialWill remain confidential• Will classify each site as low to high in profileWill classify each site as low to high in profile

– Two vendors will be chosen to conduct full security Two vendors will be chosen to conduct full security assessmentsassessments

• Institutions can accomplish this independently Institutions can accomplish this independently

– No funds were appropriated to assist in the third-No funds were appropriated to assist in the third-party engagementsparty engagements

– All security audits due by December 1All security audits due by December 1stst, 2006, 2006

• HB2935– Requires risk assessments be completed for all Requires risk assessments be completed for all

agencies and institutionsagencies and institutions• Will remain confidentialWill remain confidential• Will classify each site as low to high in profileWill classify each site as low to high in profile

– Two vendors will be chosen to conduct full security Two vendors will be chosen to conduct full security assessmentsassessments

• Institutions can accomplish this independently Institutions can accomplish this independently

– No funds were appropriated to assist in the third-No funds were appropriated to assist in the third-party engagementsparty engagements

– All security audits due by December 1All security audits due by December 1stst, 2006, 2006

Page 27: Regents Education Program September 2006

Bandwidth ManagementBandwidth ManagementBandwidth ManagementBandwidth Management

• Putting it in perspective– Kinda’ like not knowing if you have Kinda’ like not knowing if you have

enough gas to get you to the next enough gas to get you to the next stationstation

• Leaves a sick feeling in your Leaves a sick feeling in your stomach until you get there…stomach until you get there…

• IF you get thereIF you get there

– Better yet, its like having a dinner Better yet, its like having a dinner party and not knowing if you have party and not knowing if you have enough brisketenough brisket

– Then you realize…Then you realize…

• Putting it in perspective– Kinda’ like not knowing if you have Kinda’ like not knowing if you have

enough gas to get you to the next enough gas to get you to the next stationstation

• Leaves a sick feeling in your Leaves a sick feeling in your stomach until you get there…stomach until you get there…

• IF you get thereIF you get there

– Better yet, its like having a dinner Better yet, its like having a dinner party and not knowing if you have party and not knowing if you have enough brisketenough brisket

– Then you realize…Then you realize…

Page 28: Regents Education Program September 2006

Bandwidth ManagementBandwidth ManagementBandwidth ManagementBandwidth Management

Page 29: Regents Education Program September 2006

Bandwidth ManagementBandwidth ManagementBandwidth ManagementBandwidth Management

Page 30: Regents Education Program September 2006

Bandwidth ManagementBandwidth ManagementBandwidth ManagementBandwidth Management

Page 31: Regents Education Program September 2006

Bandwidth ManagementBandwidth ManagementBandwidth ManagementBandwidth Management

• Usual Bandwidth Hog Suspects– Limited few computer Limited few computer

engineering geeks engineering geeks developing network-developing network-intensive computer intensive computer models & algorithmsmodels & algorithms

– Normally maintain some Normally maintain some level of anonymitylevel of anonymity

– An “underground” group An “underground” group difficult to identifydifficult to identify

• Usual Bandwidth Hog Suspects– Limited few computer Limited few computer

engineering geeks engineering geeks developing network-developing network-intensive computer intensive computer models & algorithmsmodels & algorithms

– Normally maintain some Normally maintain some level of anonymitylevel of anonymity

– An “underground” group An “underground” group difficult to identifydifficult to identify

Page 32: Regents Education Program September 2006

Bandwidth ManagementBandwidth ManagementBandwidth ManagementBandwidth Management

• The reality is…– The general The general

student population student population is the real culpritis the real culprit

– Peer-to-Peer (P2P) Peer-to-Peer (P2P) file sharing is file sharing is bringing many bringing many networks to their networks to their knees knees

• The reality is…– The general The general

student population student population is the real culpritis the real culprit

– Peer-to-Peer (P2P) Peer-to-Peer (P2P) file sharing is file sharing is bringing many bringing many networks to their networks to their knees knees

Page 33: Regents Education Program September 2006

Peer-to-Peer DefinedPeer-to-Peer DefinedPeer-to-Peer DefinedPeer-to-Peer Defined

• P2P is a type of network in which each workstation has equivalent capabilities and responsibilities. – Files are propagated on every machine accessing the Files are propagated on every machine accessing the

service and then shared with othersservice and then shared with others

• Once considered as totally illegal and now has legitimate sites

• Not all P2P is bad.– Grid computingGrid computing– Operating system distribution (Condor)Operating system distribution (Condor)– Legitimate music and movie sitesLegitimate music and movie sites

• P2P is a type of network in which each workstation has equivalent capabilities and responsibilities. – Files are propagated on every machine accessing the Files are propagated on every machine accessing the

service and then shared with othersservice and then shared with others

• Once considered as totally illegal and now has legitimate sites

• Not all P2P is bad.– Grid computingGrid computing– Operating system distribution (Condor)Operating system distribution (Condor)– Legitimate music and movie sitesLegitimate music and movie sites

Page 34: Regents Education Program September 2006

Peer-to-Peer ApplicationsPeer-to-Peer ApplicationsPeer-to-Peer ApplicationsPeer-to-Peer Applications

• Napster• Kazaa• Ares • BitTorrent • Direct Connect • eDonkey • FastTrack

• Napster• Kazaa• Ares • BitTorrent • Direct Connect • eDonkey • FastTrack

• Filetopia • Gnutella • IRC • Manolito P2P • OpenNap • SoulSeek

• Filetopia • Gnutella • IRC • Manolito P2P • OpenNap • SoulSeek

– Many applications are disguising their code as normal Many applications are disguising their code as normal Web traffic (BitTorrent)Web traffic (BitTorrent)

– Costs are staggering in terms of operationsCosts are staggering in terms of operations

– Many applications are disguising their code as normal Many applications are disguising their code as normal Web traffic (BitTorrent)Web traffic (BitTorrent)

– Costs are staggering in terms of operationsCosts are staggering in terms of operations

Page 35: Regents Education Program September 2006

Peer-to-Peer RealitiesPeer-to-Peer RealitiesPeer-to-Peer RealitiesPeer-to-Peer Realities

• Affects both institutional and statewide networks• Can impact distance learning missions if not kept

in check– Clogs the network pipes Clogs the network pipes

• Continues to morph and become harder to identify and manage

• Can compromise Disaster Recovery/Business Continuity efforts

• Recording Industry Association of America– Those pirating music and movies are being sued and Those pirating music and movies are being sued and

arrestedarrested

• Affects both institutional and statewide networks• Can impact distance learning missions if not kept

in check– Clogs the network pipes Clogs the network pipes

• Continues to morph and become harder to identify and manage

• Can compromise Disaster Recovery/Business Continuity efforts

• Recording Industry Association of America– Those pirating music and movies are being sued and Those pirating music and movies are being sued and

arrestedarrested

Page 36: Regents Education Program September 2006

EZ to get TV…EZ to get TV…EZ to get TV…EZ to get TV…

Page 37: Regents Education Program September 2006

One Solution to P2P TrafficOne Solution to P2P TrafficOne Solution to P2P TrafficOne Solution to P2P Traffic

• Ruckus– A digital entertainment service for universitiesA digital entertainment service for universities– Ruckus offers:Ruckus offers:

• National, local, and campus based programming National, local, and campus based programming • 1.5 million licensed tracks of music from major labels 1.5 million licensed tracks of music from major labels • Hollywood blockbusters, cult classics, and independent films Hollywood blockbusters, cult classics, and independent films • Robust community features that allow students with similar Robust community features that allow students with similar

music, video and programming interests to connect, share and music, video and programming interests to connect, share and explore on their campusexplore on their campus

– A few campuses already have agreementsA few campuses already have agreements– OneNet is exploring an enterprise solution for the systemOneNet is exploring an enterprise solution for the system

• Will keep traffic within the state network and off commodity Will keep traffic within the state network and off commodity InternetInternet

• Ruckus– A digital entertainment service for universitiesA digital entertainment service for universities– Ruckus offers:Ruckus offers:

• National, local, and campus based programming National, local, and campus based programming • 1.5 million licensed tracks of music from major labels 1.5 million licensed tracks of music from major labels • Hollywood blockbusters, cult classics, and independent films Hollywood blockbusters, cult classics, and independent films • Robust community features that allow students with similar Robust community features that allow students with similar

music, video and programming interests to connect, share and music, video and programming interests to connect, share and explore on their campusexplore on their campus

– A few campuses already have agreementsA few campuses already have agreements– OneNet is exploring an enterprise solution for the systemOneNet is exploring an enterprise solution for the system

• Will keep traffic within the state network and off commodity Will keep traffic within the state network and off commodity InternetInternet

Page 38: Regents Education Program September 2006

Aggregate Bandwidth Aggregate Bandwidth UsageUsageAggregate Bandwidth Aggregate Bandwidth UsageUsage

Approx. 1,500 T-1s

Looks like another new application or more IPODs on campuses

Page 39: Regents Education Program September 2006

Meeting Research NeedsMeeting Research NeedsMeeting Research NeedsMeeting Research Needs

• Research needs cannot be compromised by limitations in bandwidth

• National efforts in place to assure network resources are available

• Network demands have grown from megabytes to gigabytes, to terabytes and now petabytes– States can’t afford this type of commodity InternetStates can’t afford this type of commodity Internet

• Research needs cannot be compromised by limitations in bandwidth

• National efforts in place to assure network resources are available

• Network demands have grown from megabytes to gigabytes, to terabytes and now petabytes– States can’t afford this type of commodity InternetStates can’t afford this type of commodity Internet

Page 40: Regents Education Program September 2006

Internet2Internet2Internet2Internet2

• Goals – Enable a new generation of

applications

– Recreate a leading edge research and education network capability

– Transfer new capabilities to the global production Internet

• Goals – Enable a new generation of

applications

– Recreate a leading edge research and education network capability

– Transfer new capabilities to the global production Internet

Page 41: Regents Education Program September 2006

Time Required to Download 2-hour Course Time Required to Download 2-hour Course Lecture DVDLecture DVDTime Required to Download 2-hour Course Time Required to Download 2-hour Course Lecture DVDLecture DVD

56 kbpsISDN DSL/

Cable T1

Internet2 Land Speed Record6 Seconds

Internet2 Land Speed Record6 Seconds

168 Hours168 Hours 74 Hours74 Hours 25 Hours25 Hours 6.4 Hours6.4 Hours

Now That’s Fast!!!Now That’s Fast!!!Now That’s Fast!!!Now That’s Fast!!!

Page 42: Regents Education Program September 2006

Sea Change in R&E Impacting Sea Change in R&E Impacting Networking NeedsNetworking NeedsSea Change in R&E Impacting Sea Change in R&E Impacting Networking NeedsNetworking Needs

• Growing urgency for new network technologies

• Increased collaboration worldwide on "Big” Science projects

• Exponential growth in size of data sets being accessed (High Energy Physics)

• Need for multiple dedicated/private research networks

• Growing urgency for new network technologies

• Increased collaboration worldwide on "Big” Science projects

• Exponential growth in size of data sets being accessed (High Energy Physics)

• Need for multiple dedicated/private research networks

Page 43: Regents Education Program September 2006

The National LambdaRail The National LambdaRail (NLR)(NLR)The National LambdaRail The National LambdaRail (NLR)(NLR)• A major initiative of U.S. research

universities and private sector technology companies to provide a national scale infrastructure for research and experimentation in networking technologies and applications. – Focus is on ownership and control of infrastructureFocus is on ownership and control of infrastructure

• A major initiative of U.S. research universities and private sector technology companies to provide a national scale infrastructure for research and experimentation in networking technologies and applications. – Focus is on ownership and control of infrastructureFocus is on ownership and control of infrastructure

Page 44: Regents Education Program September 2006

Participation in the NLR Participation in the NLR will:will:Participation in the NLR Participation in the NLR will:will:• Move Oklahoma to the forefront in

advanced network initiatives• Position Oklahoma Universities on

an equal footing • Facilitate creation of new

technologies and markets• Provide robust technical support

services

• Move Oklahoma to the forefront in advanced network initiatives

• Position Oklahoma Universities on an equal footing

• Facilitate creation of new technologies and markets

• Provide robust technical support services

Page 45: Regents Education Program September 2006

National LambdaRail Members National LambdaRail Members and Associatesand AssociatesNational LambdaRail Members National LambdaRail Members and Associatesand Associates

• CENIC

• Pacific Northwest Gigapop

• Pittsburgh Supercomputing Center/University of Pittsburgh

• Duke University, representing a coalition of NC universities

• Mid-Atlantic Terascale Partnership

• Cisco Systems

• Internet2

• Florida LambdaRail

• Georgia Institute of Technology

• CENIC

• Pacific Northwest Gigapop

• Pittsburgh Supercomputing Center/University of Pittsburgh

• Duke University, representing a coalition of NC universities

• Mid-Atlantic Terascale Partnership

• Cisco Systems

• Internet2

• Florida LambdaRail

• Georgia Institute of Technology

• Committee on Institutional Cooperation (CIC)

• Cornell University• Louisiana Board of Regents• Oklahoma State Regents• Lonestar Education and Research

Network (LEARN)• University of New Mexico

(on behalf of the State of New Mexico)

• UCAR/FRGP• SURA• Oak Ridge National Lab (ORNL)• Case Western Reserve University

• Committee on Institutional Cooperation (CIC)

• Cornell University• Louisiana Board of Regents• Oklahoma State Regents• Lonestar Education and Research

Network (LEARN)• University of New Mexico

(on behalf of the State of New Mexico)

• UCAR/FRGP• SURA• Oak Ridge National Lab (ORNL)• Case Western Reserve University

Page 46: Regents Education Program September 2006

OneNet NLR Connection OneNet NLR Connection CompleteCompleteOneNet NLR Connection OneNet NLR Connection CompleteComplete

• Infrastructure – Fault-tolerant DWDM

connection live March, 2006• Cisco 15454 Architecture

• Same as OneNet’s Core

• Infrastructure – Fault-tolerant DWDM

connection live March, 2006• Cisco 15454 Architecture

• Same as OneNet’s Core

Page 47: Regents Education Program September 2006

Differences of I2 and the Differences of I2 and the NLRNLRDifferences of I2 and the Differences of I2 and the NLRNLR• Internet2 is a large, shared network resource

– Difficult to dedicate large capacity to a single userDifficult to dedicate large capacity to a single user

• NLR is architected on a DWDM infrastructure– Capability to guarantee and dedicate specific Capability to guarantee and dedicate specific

bandwidthbandwidth– Maximum of 32 10GigE lambdasMaximum of 32 10GigE lambdas

• Same architecture as Oklahoma Research NetworkSame architecture as Oklahoma Research Network

– 50% of infrastructure is dedicated to network research50% of infrastructure is dedicated to network research

• Internet2 is a large, shared network resource– Difficult to dedicate large capacity to a single userDifficult to dedicate large capacity to a single user

• NLR is architected on a DWDM infrastructure– Capability to guarantee and dedicate specific Capability to guarantee and dedicate specific

bandwidthbandwidth– Maximum of 32 10GigE lambdasMaximum of 32 10GigE lambdas

• Same architecture as Oklahoma Research NetworkSame architecture as Oklahoma Research Network

– 50% of infrastructure is dedicated to network research50% of infrastructure is dedicated to network research

Page 48: Regents Education Program September 2006

Oklahoma Research Oklahoma Research NetworkNetworkOklahoma Research Oklahoma Research NetworkNetwork

Statewide Statewide ScopeScopeStatewide Statewide ScopeScope

Page 49: Regents Education Program September 2006

Regional Optical Networks (RONs)

Regional Optical Networks (RONs)

Regional Regional ScopeScopeRegional Regional ScopeScope

Page 50: Regents Education Program September 2006

National LambdaRail Architecture

National LambdaRail Architecture

National National ScopeScopeNational National ScopeScope

Page 51: Regents Education Program September 2006

Global Integrated FacilityGlobal Integrated FacilityGlobal Integrated FacilityGlobal Integrated Facility

Page 52: Regents Education Program September 2006

Other Areas of InterestOther Areas of InterestOther Areas of InterestOther Areas of Interest

• Communications Assistance Law Enforcement Act (CALEA)– Recent interpretations of FCC ruling by Educause Recent interpretations of FCC ruling by Educause

provide that all institutional networks are exemptprovide that all institutional networks are exempt• Institutions will, however, cooperate fully on interceptsInstitutions will, however, cooperate fully on intercepts

– No clarity on OneNet as of yetNo clarity on OneNet as of yet

• Net Neutrality– May impact providers’ ability to deliver contentMay impact providers’ ability to deliver content

• Identity Management– Single sign-on to multiple information resourcesSingle sign-on to multiple information resources

• Communications Assistance Law Enforcement Act (CALEA)– Recent interpretations of FCC ruling by Educause Recent interpretations of FCC ruling by Educause

provide that all institutional networks are exemptprovide that all institutional networks are exempt• Institutions will, however, cooperate fully on interceptsInstitutions will, however, cooperate fully on intercepts

– No clarity on OneNet as of yetNo clarity on OneNet as of yet

• Net Neutrality– May impact providers’ ability to deliver contentMay impact providers’ ability to deliver content

• Identity Management– Single sign-on to multiple information resourcesSingle sign-on to multiple information resources