Network Overview
SUNY Polytechnic Institute’s Network (SITNet) is a state-of-the-art, high-speed infrastructure that supports a broad range of academic, administrative, and student computing requirements. The network provides more than 4,500 physical connection points as well as wireless access throughout the campus, it represents a major capital investment on the part of the Institute.
In recent years SUNY Poly has heavily invested in our network infrastructure. The network consists of a dedicated 10 GB dedicated gateway connection, multiple Gigabit Ethernet (10 GB) backbone connections distributed between campus buildings, campus network connection speeds of 1 Gbps or greater, including wireless internet access throughout the campus.
SUNY Poly currently maintains a policy of not blocking Internet content. No specific type of network traffic is denied access unless outlined in policy documents or determined to be detrimental to the network as outlined in any publicly published Internet network security alert. However, elements of traffic control and network security are routinely used and students should be aware that using particular applications on the network may contribute to a degradation of service of their network access.
PC Recommendations
The minimum system requirements for SUNY Poly's Residential Halls are posted in the requirement section of the ResNet Connection policy manual. Because some students choose to purchase new computers for school we have constructed a new PC recommendation site to aid students and parents in choosing a new PC.
Resident Student PC Recommendations:
PC
Hardware
Technology Type |
Minimum Recommendation |
CPU |
Intel Core i7 Processor (or better) |
RAM |
12 GB |
Hard Drive |
1 TB |
Video Card |
Integrated Graphics Card |
Ports |
|
Audio |
|
Network Access |
|
Software
Type of Technology |
Recommendation |
Operating System |
|
Productivity Tools |
|
Web Browser |
|
E-mail Programs |
|
Virus/Anti-spyware Protection |
|
External Storage Devices |
|
Printing |
|
Mac
Hardware
Type of Technology |
Minimum Recommendation |
Model Recommendation |
|
RAM |
|
Hard Drive |
|
Video Card |
|
Ports |
|
Audio |
|
Network Access |
|
Software
Type of Technology |
Recommendation |
Operating System |
|
Productivity Tools |
|
Web Browser |
|
E-mail Programs |
|
Virus/Anti-spyware Protection |
|
|
ITS Helpdesk personnel are not allowed to service any computer system without permission and physical presence, at the time of service, of the owner of the specified system.
ResNet Connections - Restrictions on Use
Wired and Wireless Internet access is provided in the Residence Halls. Access to the wireless network requires the use of your SITNet ID and password.
Wired access is provided in each assigned student room. Wireless access is provided throughout the campus. Only one system may be connected to the wired jack at any time.
***Use of personal Access Points, Routers, Switches or Hubs is prohibited.
Network connections may not be used:
- In contravention of SUNY Poly’s Acceptable Use Policy. (Students should read and understand this document).
- To attach personally owned communication hubs or switches directly to the college network.
- Students may not run their own:
Public IP sub-networks
Private IP sub-networks
Network Translation (NAT) Services
- To run a web server, Windows/NT Server, Windows 2000/2003 Server, Novell NetWare Server, or UNIX file server without the express written consent of the Chief Information Officer.
- To provide anonymous FTP services or any other user service that does not authenticate a user with password protected access. (Generic user Ids and passwords associated with these services will be considered anonymous and are prohibited.)
- With an IP address other than the one assigned to the student for the registered machine in the registered location.
- To provide any proxy application services or configurations intended to bypass any network security feature.
- To provide any DHCP, BOOTP, DNS, mail exchange services or any other IP/TCP/UDP port service that the Institution deems dangerous to network security or performance.
- To establish, program or register their IP address to obtain a DNS alias name and/or DNS MX record.
- To utilize an excess amount of available bandwidth disproportionate to network total usage. The determined level at which a student is considered an excessive user is at the sole discretion of ITS department and may vary depending on current network traffic conditions or network status.
- In contravention of any federal, state, or local law, rule, or regulation.
Information Technology Services maintains a list of network TCP/IP services that are not permitted because of network degradation, security, or similar concerns. This list will be e-mailed to owners of registered “Server” systems, and amendments will be similarly e-mailed as issued.
Students permitted to run such systems agree not to run prohibited services without the express written consent of the Chief Information Officer.
Support
The ITS Helpdesk provides support for Res Hall network connections. Requests for service should be directed to the ITS Helpdesk. Requests for service are only to be submitted by the student who owns the computer system, and legitimately occupies the room in which the system is located.
- Users who violate institutional policies outlined in the “Acceptable Use Policy” or policies contained herein.
- Users who repeatedly alter their computer configuration in such a manner as to disrupt or destroy hardware or software configurations necessary for enabling network access.
- Users who repeatedly degrade network performance due to unclean machine conditions such as virus, worm, trojan horse or malicious code infections, or attaching an improperly secured system requiring system software patches.
- Users who fail to respond to notifications of Copyright violation under the guidelines of the “Digital Millennium Copyright Act”.
- Users who treat support personnel in a rude, abusive or otherwise inappropriate manner.
SUNY Poly makes every effort to keep the data network up and available. It assumes no liability for times when the network or parts thereof are unavailable. Resident students should be aware that SUNY Poly does not employ second, third, or weekend shift staff, and a network disruption that occurs after normal business hours may not receive complete attention until the start of the next business day.
Security
SUNY Poly’s data network is used for many important activities including interoffice communication, electronic mail, Internet access and support for numerous classroom laboratory environments. It is essential that the network be maintained in a secure and reliable state. To this end, ITS has installed and configured data communications equipment that prevents some forms of malicious behavior from compromising the integrity of the data network.
Additionally, students should be reluctant to have their systems configured by unqualified third parties such as friends or fellow classmates. Unintended results may occur when third parties are not fully knowledgeable about the Institution’s networked environment.
SUNY Poly assumes no liability for personal data loss or unwanted data proliferation due to unsecured system configurations, misconfigured or virus infected systems.
Data communications equipment installed by ITS has been programmed with the following restrictions:
- All student dormitory connections implement data eavesdrop prevention. No student has the capability to read network traffic produced by any other computer system on the network. However institutional personnel may employ sniffing techniques while conducting investigations involving network performance, security, or where there is reason to believe that a violation of policy has occurred.
- SITNet addresses (IP addresses) are issued electronically during the bootup of the student’s computer system. The address assignment is controlled through the use of special computers called DHCP servers that are located on the campus network. Attempts to alter PC configurations in a way that changes or conceals the IP address is prohibited. Such attempts are also automatically recorded and easily traced.
- In addition to IP addresses, registered computers are assigned a unique name. Names are automatically managed through a Domain Name System (DNS) server.
Altering or bypassing this service is prohibited. In the event that a computer does not get a host name programmed into the campus DNS server, many Internet Web sites will not service requests from that computer.
Additionally, unregistered hosts are automatically denied access to all of the college’s central time-share systems. - Consistent with SUNY Poly’s Acceptable Use Policy, ITS reserves the right to monitor network activity in compliance with its “...responsibility to take action against abusers of computing resources.”
ITS personnel may use other tools and programmed devices to investigate unusual network traffic patterns that indicate probable violation of institutional policies.
Students found using excessive bandwidth will have their connections automatically restricted to a reduced traffic throughput level without prior warning or notification. More severe policy infractions may result in the immediate disconnection of service without prior warning or notification.
It is important that a student understand all the possible implications of installing any new operating systems, software packages, network utility programs, or peer-to-peer file sharing programs onto their system. The outcome of such installations may result in an unsafe system condition and subsequent network termination.
Cooperation with Law Enforcement Authorities
It is the policy of SUNY Poly to cooperate fully with federal, state, and local authorities in the conduct of criminal investigations. Furthermore, students are reminded that SUNY Poly will file criminal complaints against those who access or use the Institution’s data network in excess of authority, or in the conduct of any other criminal act.
It is the policy of SUNY Poly to cooperate with all copyright entities registering complaints, within the guidelines issued in the “Online Copyright Infringe Liability Limitation Act”, to notify users of our data network that they are in violation of the “Digital Millennium Copyright Act”.