Nos tutelles

CNRS Université de Strasbourg

Nos partenaires

Ecole et Observatoire des Sciences de la Terre Ecole Nationale du Génie de l'Eau et de l'Environnement de Strasbourg

Rechercher




Accueil > Services communs > Informatique

IT department

publié le , mis à jour le

Equipment

The Geology Institute’s hardware and software infrastructure is organized around Cisco and Juniper switches. Federated by the OSIRIS metropolitan network, this Ethernet network complies with standard gigabit TCP / IP communication protocols. It represents the way of communication both internally and externally.
The computers of LHyGeS are spread over 5 levels in the building. More than 300 heterogeneous devices are connected to Internet : about 20 Unix workstations, 40 computers under MacOS and 250 Windows computers linked to an Active Directory which is managed by several domain controllers.
The servers are stored in 2 air-conditioned rooms. In order to ensure service continuity, "strategic" servers are redundant and distributed in the 2 rooms.

Services

Main network services :
- Hardware resources sharing (printers, scanners, disk space ...)
- Software resources sharing
- File servers, computation servers
- DNS, DHCP servers
- WEB servers
- Data backup servers
- Administration of messaging service, mailing lists, electronic certificates in interface with CNRS and University of Strasbourg teams.

All services are available to researchers and PhD students of LHyGeS and to all members of the staff of the Institute of Geology which, in addition to LHyGeS, includes a research team from the Institut de Physique du Globe (UMR-7516 ), the Laboratory of Atmospheric Physics and Chemistry (UMR-7515) and the Museum of Mineralogy.

Security

For performance and safety, monitoring of the systems and of the local network is carried out regularly. Computer security is ensured by a firewall in high availability version. It controls all In/Out Internet communications. The stations are protected individually by antivirus tools. Users are regularly informed about the evolution of computer threats. As much as possible, means to face these threats are provided.

Staff
A. Clément, IR ; N. Mahr, IE

17/02/17