Extending Campus Network Via Intranet and IP-Telephony For Better Performance and Service Delivery: Meeting Organizational Goals
Viewed = 115 time(s)
The adoption of information and communication technology (ICT) tools and medium in today’s business, is geared to advance data processing tasks, timely exchange of data, easy access to the Internet at increased speed, extended memory to house large volumes of data, and better communications, etc. Businesses grow in lieu of advancing the services they offer; But, they require as a matter of urgency, a corresponding need for effective communication to grow exponentially. The Intranet provides an option to advance such via its many features (not limited to) collaborative communication channel, ease in business processes, etc. We posit that many businesses lack a clear strategy to implement an effective Intranet design. This often leads to investment profit loss, loss of time, unproductivity, and complete failure in achieving its set goals. Extending Ojugo and Eboka (2020) via a multi-service intranet, the study outcomes an infrastructure that allows the effective integration of data solutions via an open-source protocol, application, hardware, and software. Three common issues observed therein includes: packet loss, jitters, and latency. Jitters and packet loss can be resolved via increased bandwidth allocation; while, latency is minimized via upgrade in the infrastructure. Thus, our proposed solution seeks to provide users with mobility, resilience, economy, flexibility, and productivity with improved service delivery and performance. The study recommends that to harness the full benefits of Intranet and improve communication within businesses and organizations today, there is the need for a constant knowledge update is imperative, which will in turn improve effective communication in the implemented infrastructure.
Dye, M., McDonald, R., and Rufi, A. (2008) Network Fundamentals: CCNA Exploration Companion Guide. 1st edn. ed. by Ray, M. Indianapolis, Indiana, USA: Cisco Press
White, C. (2011) Data Communications and Computer Networks: A Business User’s Approach. Boston, USA: Course Technology Publications
Derfler, F.J. (2000) Practical Networking. Indiana: Que
Comer, D. (2008) Computer Networks and Internets. 5th edn. London: Addison-Wesley
Beasley, J. (2008) Networking. 2nd edn. USA: Prentice Hall
Tanenbaum, A. and Wetherall, D. (2010) Computer Networks. 5th edn. USA: Prentice Hall
Ojugo, A.A., Yoro, R., Oyemade, D.A., Eboka, A.O., Ugboh, E., Aghware, F., (2013). Robust cellular network rural telephony in Southern Nigeria, American J. of Net. Comm. 2(5): 125-132 www.article.sciencepublishinggroup.com/html/10.11648.j.ajnc.20130205.12.html
Ojugo, A.A., Abere, R., Orhionkpaiyo, B., Yoro, R., Eboka, A., (2013). Technical issues for IP-based telephony in Nigeria, Int. J. Wireless Comm. & Mobile Comp., 1(2): 58-67, [web]: www.article.sciencepublishinggroup.com/html/10.11648.j.ajnc.20130102.14.html
Ojugo, A.A., Eboka, A.O., (2020). Mitigating technical challenges via redesigning a campus network for greater efficiency, scalability and robustness: logical view, Int. J. Modern Edu. Comp. & Sci., 10(1): pp126-132 [web]: http://ijmecs.com/20403
Eung-Ha, K., Cho, K.S and Ryu, W., “Amendment to MSF whitepaper on personalized converged services: network-to-network”, [online]: www.msforum.org/techninfo/reports.shtml, last accessed March 2013.
Stallings, W and Van Slyke, R., Business data communications, 6th Ed., 2010, Prentice Hall Int. Ed., ISBN – 1-13-761230-3, pp316-340.
Kurose, J. and Ross, K. (2013) Computer Networking: A Top-Down Approach. 6th edn. ed. by Hirsch, M. and Snider, E. Boston: Pearson Education Limited
Ojugo, A.A., R.E. Yoro., A. Eboka., M. Yerokun and I. Iyawa., (2012). Implementation issues of VoIP to enhance rural telephony in Nigeria, Journal of Emerging Trends in Computing & Information Systems, 4(2): pp113-120, [web]: cisjournal.org/journalofcomputing/Archive_Feb_2013.aspx
Garg, V., Smolik, K and Wilkes, J., “CDMA application in wireless communications”, 1997, Prentice Hall publications, New Jersey: Upper Saddle River.
Helgert, H., “Integrated services digital net: Architecture, protocols and standards”, 1991, Readings: MA: Addison-Wesley.
Brennen, R and Dipak, G., “Secure IP telephony via multi-layered protection”, 2009, Technical University of Denmark report, Centre for ICT, Denmark: Lyngby
Martins, J.A.H., “Telecommunications and the computer”, 1990, Prentice Hall publications, New Jersey: Upper Saddle River
Rosa, J., “Rural telecommunications via satellite”, Journal of Telecommunications, 2005, 3(2), pp 75 – 81.
Ojugo, A.A., F. Aghware., R. Yoro., M. Yerokun., A. Eboka., C. Anujeonye., F. Efozia., (2015a). Dependable community-cloud framework for smartphones, American J. of Networks and Communications, 4(4): pp95-103, [web]: article.sciencepublishinggroup.com/html/10.11648.j.ajnc.20150404.13.html
Conte, R., “Rural telephony: new approach via mobile satellite communication”, Proceedings of Pacific telemmunication conf., 1994, Hawai: Honolulu
Ojugo, A.A., D. Oyemade., D. Allenotor., R.E. Yoro., C.N. Anujeonye., (2015b). Immunization problem for Ebola virus in rural Sierra-Leone, African J. of Comp. & ICT., 8(1): pp1 –10: [web]: www.afrjcict.net/
V. S. Lai, “Intraorganizational communication with intranets,” Communications of the ACM, vol/issue: 44(7), pp. 95-100, 2001.
M. Edenius and J. Borgerson, “To manage knowledge by intranet," Journal of Knowledge Management, 7(5), pp. 124-136, 2003.
P. Raeth and S. Smolnik, “Antecedents and consequences of corporate weblog usage in the intranet: A process perspective,” System Sciences (HICSS), 2010 43rd Hawaii International Conference on. IEEE, 2010.
L. E. Chang and S. P. Lin, “Newcomers' Socialization by Intranet System,” Computer and Information Science (ICIS), 2011 IEEE/ACIS 10th International Conference on. IEEE, 2011.
Neill, W. D. and James E. R., “Intranet portals: marketing and managing individuals’ acceptance and use,” Australasian Marketing Journal (AMJ), vol/issue: 20(2), pp. 147-157, 2012.
S. Lee and B. G. Kim, “Factors affecting the usage of intranet: A confirmatory study,” Computers in Human Behavior, vol/issue: 25(1), pp. 191-201, 2009.
D.R. Roshan and K.S. Rao., Intranet design strategies, Int. J. Elect. & Comp. Eng., 2016, 6(3): 936 - 944
R Hall, “Agile Design on Your Intranet,” http://www.intranetconnections.com/blog/ agile-design-on-your-intranet/, 2014.
R.E. Yoro., Ojugo, A.A., (2019). An intelligent client-trusted and dependable security framework to ease smartphone portability on community cloud computing, J. of Network and Communication, 4(3): pp79-90
A.A. Ojugo., R.E. Yoro., A. Eboka., M. Yerokun and I. Iyawa., (2012). Implementing VoIP on a campus network, Technical report of Federal University of Petroleum Resources Effurun (TRON-3201), pp113-120
Ojugo, A.A., Eboka, A.O., (2014). Social engineering detection model for mobile smartphone clients, African J. of Computing & ICT, 7(3): pp91–100. [web]: www.africanjournalofcomputingict1.files.wordpress.com/2017/08/vol-7-no-3-september-2014.pdf
D.A. Oyemade., J. Akpojaro., A.A. Ojugo., R. Ureigho., F. Imouokhome., E. Omoregbee., (2016). A three tier learning model for universities in Nigeria, Journal of Technologies in Society, 12(2): pp9-20, [web]: https://jts.cgpublisher.com
Ojugo, A.A., O.D. Otakore., (2018a). Mitigating social engineering menace in Nigerian Universities, J. of Comp. Sci. & Application, 6(2): pp64–68, doi: 10.12691/jcsa-6-2-2, [web]: www.sciepub.com/jcsa/content/6/2
Ojugo, A.A., D.O. Otakore., (2018b). Redesigning academic website for better visibility and footprint: a case of Federal University of Petroleum Resources Effurun website, Network & Communication Technologies, 3(1): pp33 –44, https://doi.org/10.5539/nct.v3n1p33, [web]: www.ccsenet.org/journal/index.php/nct/
Ojugo, A.A., A.O. Eboka., (2018). Assessing user satisfaction and experience on academic websites: a case of selected Nigerian Universities websites, Int. J. Tech & Comp. Sci., 10(7): pp53-61, doi: 10.5815/ijitcs.2018.10.07
Subramoni, H., Kandalla, K., Vienne, J., Sur, S., Barth, B., Tomko, K., Mclay, R., Schulz, K., and Panda, D.K. (2011) “Design and Evaluation of Network Topology-/Speed- Aware Broadcast Algorithms for InfiniBand Clusters”. 2011 IEEE International Conference on Cluster Computing [online] 317–325. available from <http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6061150> [8 June 2014]
Kumar, H. (2013). Physical vs. logical topologies [online] available from http://egyaan.in/2013/04/22/physical-vs-logical-topologies/
Sun, X. and Xie, G.G. (2013) “Minimizing Network Complexity through Integrated Top-down Design”. Proceedings of the ninth ACM conference on Emerging networking experiments and technologies - CoNEXT ’13 [online] 259–270. available from http://dl.acm.org/citation.cfm?doid=2535372.2535376
DiNicolo, D. (2007) Advantages and Disadvantages of Different Network Design Approaches [online] available from <http://www.2000trainers.com/ccda-study-guide/comparing-network-design-approaches/> [2 June 2014]
Huynh, M., Goose, S., and Mohapatra, P. (2010) “Resilience Technologies in Ethernet”. Computer Networks [online] 54 (1), 57–78. available from <http://linkinghub.elsevier.com/retrieve/pii/S1389128609002692> [1 June 2014]
Iqbal, R. and Xingang, W. (2014) Network Planning and Management [online] Coventry. available from http://cumoodle.coventry.ac.uk/course/view.php?id=10062
Lanxiaopu, M. (2012) An Investigation and Comparison on Network Performance Analysis [online] UNIVERSITY OF OSLO. available from https://www.duo.uio.no/bitstream/handle/10852/9087/MxMT.pdf?sequence=1
McCabe, J. (2008) Network Analysis, Architecture and Design. 3rd edn. London: Morgan Kaufmann
Rouse, M. (2010) Network Topology [online] available from <http://whatis.techtarget.com/definition/network-topology> [23 May 2014]
Duboc, L., Letier, E., and Rosenblum, D.S. (2013) “Systematic Elaboration of Scalability Requirements through Goal-Obstacle Analysis”. IEEE Transactions on Software Engineering [online] 39 (1), 119–140. available from http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6152130
Oppenheimer, P. (2011) Top-Down Network Design. 3rd edn. Indianapolis: Cisco Systems Inc.
Derbel, H., Agoulmine, N., and Salaün, M. (2009) “ANEMA: Autonomic Network Management Architecture to Support Self-Configuration and Self-Optimization in IP Networks”. Computer Networks [online] 53 (3), 418–430. available from <http://linkinghub.elsevier.com/retrieve/pii/S138912860800354X> [13 June 2014]
Ergu, D., Kou, G., Shi, Y., and Shi, Y. (2014) “Analytic Network Process in Risk Assessment and Decision Analysis”. Computers & Operations Research [online] 42, 58–74. available from <http://linkinghub.elsevier.com/retrieve/pii/S0305054811000785> [11 June 2014]
Kizza, J.M., (2013) Computer Communication and Networks: A Guide to Computer Network Security. 2nd edn. London: Springer
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., and Wu, Q. (2010) “A Survey of Game Theory as Applied to Network Security”. 2010 43rd Hawaii International Conference on System Sciences [online] 1–10. available from http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5428673
Miaji, Y. and Ph, D. (2014) “Novel Performance Enhancement of University ’ S Network Exploiting Cisco Network Design Model : Study Case on IUKL Network”. in International Conference on Computer Security and Digital Investigation [online] held 2014 at Malaysia. 36–41. available from http://sdiwc.net/digital-library/novel-performance-enhancement-of-universitys-network-exploiting-cisco-network-design-model-study-case-on-iukl-network
Copyright (c) 2019 Arnold Adimabua Ojugo, Andrew Okonji Eboka (Author)
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.