We track consumption per user and have an automatic "penalty box" type system when they exceed their weekly allocation (greatly rate-limited Internet traffic, but on-campus is not affected). Users are automatically restored to full service at the end of the week.
We have approximately 60,000 wireless users (which is still short of the total population on our campus) and over 120,000 distinct authenticated wireless devices on our network (many users have multiple devices). We see peaks of over 40,000 concurrent devices and average 30,000-35,000 concurrent wireless devices online throughout the middle hours of the day (10a-4p). This only includes users/devices that have logged onto our network using University credentials (random passerby associations are not counted).
Jason On 04/10/2013 09:13 AM, Craig Eyre wrote:
Hi Everyone, I'm just curious to know how big of Internet pipe your organization has for your wireless network (5000 users and above) and is it dedicated to strictly wireless or is it combined with your production employee network? Also, how do you shape your traffic, is it a per user, per group, "penalty box" type of scenario when people exceed daily limits? Do you shape all Internet traffic or just http, YouTube, P2P? I know its kind of a broad question but I'm interested in what other places are doing. Thanks and have a great day. Craig Eyre Network Analyst IT Services Department Mount Royal University 4825 Mount Royal Gate SW Calgary AB T2P 3T5 P. 403.440.5199 E. [email protected] "The difference between a successful person and others is not a lack of strength, not a lack of knowledge, but rather in a lack of will." Vincent T. Lombardi ------------------------------------------------------------------------------------------------------------------------ This communication is intended for the use of the recipient to which it is addressed, and may contain confidential, personal, and or privileged information. Please contact the sender immediately if you are not the intended recipient of this communication, and do not copy, distribute, or take action relying on it. Any communication received in error, or subsequent reply, should be deleted or destroyed.__________________________________________________________________________ This communication is intended for the use of the recipient to which it is addressed, and may contain confidential, personal, and or privileged information. Please contact the sender immediately if you are not the intended recipient of this communication, and do not copy, distribute, or take action relying on it. Any communication received in error, or subsequent reply, should be deleted or destroyed. ********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
smime.p7s
Description: S/MIME Cryptographic Signature
