Explore chapters and articles related to this topic
Science and Technology in China
Published in Michael Pecht, Chung-Shing Lee, Zong Xiang Fu, Jiang Jun Lu, Wang Yong Wen, The Chinese Electronics Industry, 2018
Michael Pecht, Chung-Shing Lee, Zong Xiang Fu, Jiang Jun Lu, Wang Yong Wen
The Networking and Computing Facility of China (NCFC) was jointly invested in by the State Planning Commission and the World Bank’s Key Scientific Development Project. The facility is run by the Chinese Academy of Sciences’ Computer Network Information Center (CAS-CNIC) and linked together with Peking University and Tsinghua University. The NCFC network is made up of four parts: Wide Area Network (WAN), Urban Area Network (main network), Campus Network, and Local Area Network (LAN).
Case Study: Yale Maxnet
Published in Viktor Boed, Ira Goldschmidt, Robert Hobbs, John J. McGowan, Roberto Meinrath, Frantisek Zezulka, of Facilities Automation Systems, 1999
To move ahead with BAS system integration, we had to make the following decisions (Figure 14.6): We have decided to utilize the Metasys front-end OWS as an operator interface. JCI has introduced a new OWS upgrade with split screens and multiple CRTs connected to the same OWS-PC. This allowed us to retain the PMIs familiar to our operators. Each vendor specific system can be viewed on a dedicated screen if the operators desire to do so, or the CRTs can be utilized in any combination, including split screens on each of them. This provides a universal set-up with nearly unlimited options for the operators. The same PMIs (color graphics, etc.) are also used for the web server. This saves programming cost, since the graphics do not have to be developed twice.Building level communication, provided by each vendor, is a serial communication with LonTalk protocol. This allows interchangeability of network components and universal interface to third party controllers.Campus level communication among BAS systems is via the Ethernet campus network. Each vendor provides its own OWS-PC. The PC is used for the control mechanics to have full access to vendor-specific controllers, and in case of failure of the campus network, it provides access to each vendor-specific network. Each vendor-specific OWS-PC has a BACnet interface to share information with each other. In our situation, BACnet provides information from vendor-specific systems to the “front end Metasys OWS-PC.”We need to have only one interface to transfer information from the BAS systems to the Maxnet. This allows full utilization of the existing networks and interfaces without the need to redevelop them.
Virtualised Environment for Learning SDN-based Networking
Published in IETE Journal of Education, 2020
Oscar Polanco, Fabio G. Guerrero
Many other network concepts such as, for instance, routing (BGP, MP-BGP, OSPF, IS-IS, EIGRP, etc.), multiple protocol label switching (MPLS) networks, and services can also be practised. We have also found the virtualisation approach to be useful for network security analysis, MPLS traffic engineering, and IPv6 based networks. Using the virtualised educational network environment, students can work autonomously to implement a campus network with layer 2 technologies and protocols (e.g. VLANs, IEEE 802.1q, STP, multiple STP, link aggregation control protocol) as well as layer 3 technologies and protocols (e.g. virtual router redundancy protocol, OSPF, IPv4, and IPv6). Students can also implement scenarios for management and automation (SNMP, Ansible) of a basic ISP infrastructure and, if necessary, connect it to the physical world, along with configuring MPLS services that ISPs usually provide to users (e.g. VPN-MPLS, central services, access to the Internet, etc.). The virtualization approach has several practical advantages. Owing to its associated costs, it is difficult to keep the network equipment of a computer network laboratory always updated. Internet service providers, for obvious reasons, hardly allow outsiders to get details of their network topologies, protocols, and settings. Carrying out an instructional activity involving sensitive aspects such as routing in an operational network is not realistic.