Distributed campus computer infrastructure: integrate education, research, library and office activities

H Masuda, K Murata, Y Shibuya, Y Kuroe - Proceedings of the 42nd …, 2014 - dl.acm.org
H Masuda, K Murata, Y Shibuya, Y Kuroe
Proceedings of the 42nd annual ACM SIGUCCS conference on User services, 2014dl.acm.org
We have replaced our Campus Computer Infrastructure (that we call" System9") in March.
This system integrated education and research activities, library and office activities. Our
new system has the following major features:(1) Servers of this system are distributed into
three buildings and connected with a 10-giga Ethernet based network (that we call" KITnet5"
introduced in SIGUCCS 2013). All service processes are running on Virtual Machines
(VMware Infrastructure) and can be migrated from each location to another without stopping …
We have replaced our Campus Computer Infrastructure (that we call "System9") in March. This system integrated education and research activities, library and office activities. Our new system has the following major features: (1) Servers of this system are distributed into three buildings and connected with a 10-giga Ethernet based network (that we call "KITnet5" introduced in SIGUCCS 2013). All service processes are running on Virtual Machines (VMware Infrastructure) and can be migrated from each location to another without stopping the service. (2) The backup system is also distributed into two campuses (Matsugasaki and Saga) and is synchronized in real-time. Moreover this system can be a very stable archiving system because it has the capability of acquiring more than 10,000 snapshots, which can support a better BCP (Business Continuous Plan) in the data availability point of view. (3) All of the University members' electric identification data are provided from our system. In our University, there are several management bodies, such as Educational Affairs, Human Resources Department, International Affairs and Research Department. The system has a function of semi-automatically synchronizing the user's data from the database of each management section. (4) The new identification service provides a feature so that each user can have multiple authorization tokens for each service, protected by a master password. It enables users to store the individual authorization tokens into devices such as BYOD which is considered to be more secure than a single unified password all over the system.
ACM Digital Library