Network and Connectivity Management

What is this service?

The Network and Connectivity Management service at the University of Central Oklahoma (UCO) encompasses the architecture, installation, and operation of infrastructure items required to offer reliable and secure network connectivity to faculty, staff, students, and devices across the university campus. This service includes deploying and managing network cabling, routers, switches, firewalls, and related components to facilitate seamless communication, data transfer, and access to network resources. Additionally, it involves connecting a diverse range of devices, including Internet of Things (IoT) devices, to the network, implementing network access management solutions, securing access to networks, and ensuring appropriate authentication mechanisms to safeguard network integrity and data confidentiality.

What are the benefits?

  • Enhanced Connectivity: Provides reliable and high-speed network connectivity to support academic, administrative, and research activities across the university campus.
  • Scalability: Offers scalable network infrastructure solutions capable of accommodating the evolving needs and growth of the university community and its diverse range of connected devices.
  • Improved Productivity: Facilitates seamless communication, collaboration, and access to online resources and applications, enhancing productivity and efficiency for faculty, staff, and students.
  • Enhanced Security: Implements robust network security measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and encryption protocols, to protect against cyber threats and unauthorized access.
  • Compliance: Ensures compliance with regulatory requirements and industry standards for data protection, privacy, and network security, safeguarding sensitive information and maintaining institutional integrity.

What is covered?

  • Network Infrastructure: Design, deployment, and management of network infrastructure components, including routers, switches, access points, cabling, and network appliances, to ensure optimal performance and reliability.
  • Device Connectivity: Configuration and integration of a wide range of devices, including computers, laptops, mobile devices, IoT devices, and peripherals, to connect to the university network securely and efficiently.
  • Network Access Management: Implementation of network access control (NAC) solutions, network segmentation, and VLAN configurations to manage and control access to network resources based on user identity, device type, and security posture.
  • Security Measures: Deployment of firewalls, intrusion detection/prevention systems (IDS/IPS), virtual private networks (VPN), encryption protocols, and authentication mechanisms to secure network traffic, protect against cyber threats, and enforce access policies.
  • Authentication Systems: Provisioning and management of authentication systems, such as network registration systems, VPN gateways, and single sign-on (SSO) solutions, to authenticate users and devices accessing the network.

What is not covered?

  • End-User Support: While the service includes network connectivity and access management, it does not encompass general end-user support for device troubleshooting, software installations, or user training.
  • Hardware Procurement: The procurement and acquisition of network hardware and devices are outside the scope of this service and are managed separately through procurement processes.

How to access the service?

Faculty, staff, and departments can access the Network and Connectivity Management service by contacting the university's IT Help Desk or designated network support team. Requests for network installations, device connections, access configurations, and security assessments can be submitted through the IT service portal or by contacting the support team directly.

Service Availability:

The Network and Connectivity Management service is available during regular business hours, with 24/7 support for critical incidents and emergencies. Scheduled maintenance and updates may occur outside of business hours to minimize disruption to network services.

Additional Notes:

  • Continuous monitoring, testing, and optimization of network performance and security are integral to maintaining the reliability and integrity of network services.
  • Regular security assessments, vulnerability scans, and compliance audits are conducted to identify and address potential risks and vulnerabilities in the network infrastructure.