Ethernet service is available in the following locations:
- all rooms at the main College site;
- all rooms at Owlstone Croft;
- all rooms in the College houses at 61-63-65 and 75-77 Panton Street
- all rooms in 98-100 Norwich Street;
- all rooms in the College houses at 71-73 Maids Causeway;
- all flats above the Boathouse.
- all Newnham houses.
Longer network cables are available from the IT Department at a fraction of the cost compared to high street shops.
The prime purpose of the network connection is the furtherance of your academic studies. Whilst recreational use is not forbidden, it will be subject to a higher degree of regulation than academic use, and the College makes no commitment to ongoing support of recreational use. Having a network connection available does not give you carte blanche to do as you will, particularly as some of your actions might cause charges to fall on the College. The College reserves the right to caution or possibly charge users who are responsible for excessive chargeable traffic.
The user is also responsible for the correct configuration of any device connected to the College network. Generic instructions are provided on-line for Windows and for Apple Macintosh. Specific network addresses for your computer will be provided automatically by Firerack once registration has been completed.
Use of the network socket by the user is subject to the following rules. Some rules change from time to time and will not be reproduced here: current URLs are indicated as references:
a. Rules made by the UIS Syndicate of the University of Cambridge:
b. Rules relating to the use of IP addresses in the University of Cambridge:
c. The CUDN Acceptable Use Policy:
d. That the user agrees and consents to statistical data being gathered on their network usage, including identification of remote sites and traffic volumes to or from those sites. This data may be used for (a) network administration; (b) advice to or cautioning of that user; (c) possible charging for excessive use. This data may be shared between the network administrators of the College and of the University.
e. The following local rules:
1. The good name of the College shall not be brought into disrepute.
2. The use of high-bandwidth applications (such as streaming audio, streaming video, internet phone/video/conferencing, Real Player, QuickTime audio/video, Windows Media Player, NetMeeting and so on), or high-volume applications (such as file- sharing or download management systems), using servers outside the .cam.ac.uk domain should be avoided, as they will cause traffic charges which might be relayed to you.
3. It is forbidden to run peer-to-peer file-sharing systems (including, but not limited to, Gnutella, LimeWire, AudioGalaxy, KaZaA, Morpheus, eMule, eDonkey, WinMX, BitTorrent and any other application using those file-sharing protocols) as file servers to clients outside Cambridge (.cam.ac.uk). They may be used as clients subject to the avoidance of chargeable traffic.
4. You may not use your network connection to breach Copyright Law.
5. All users of the Windows operating system must keep it up-to-date by configuring Automatic Updates to Automatic, Every Day, and by regular use of the Windows Update service. It is essential to install all Windows critical updates and service packs before first use of Any Email client. Users of Mac OS X must turn on automatic software updates. Users are recommended to set their email client to receive and send emails in Plain Text only.
6. All users must have an anti-virus product running on their computers at all times and theymust be configured to update its definitions at daily intervals. See http://www.ucs.cam.ac.uk/support/anti-virus
7. The use of a wireless access point or router requires permission from the College. The College will specify from time to time which wireless channel you may use, so as to avoid conflicts. Unencrypted or WEP-encrypted wireless will not be permitted: the encryption must be of WPA2 or higher.
8. All user machines must respond to a received ICMP Echo Request by replying with an ICMP Echo Reply. This means that you must not configure a firewall to block or "stealth" ICMP Echo. With Windows Firewall, you must allow an exception for ICMP. See Configuring firewall-updates-Windows.pdf document.
9. VPN connections to/from your computer, for use by third parties, are strictly forbidden.
1. Network traffic monitoring is forbidden.
2. User machines are forbidden to saturate the network to attempt any other form of denial of service to others.
3. Only the IP address(es) issued by College shall be used on the socket specified.
4. Only the DNS name issued by the College shall be used.
5. Electronic mail may not be emitted other than via official SMTP mail servers in the .cam.ac.uk domain, such as Hermes, or other University machines which you have been authorised to use. It is generally expected that outward e-mail will be emitted via the SMTP server on the machine on which the user has an inward e-mail account.
6. Inward e-mail to private SMTP (e-mail) servers is not permitted.
7. DHCP or BootP servers are not permitted to offer service to the college network.
8. Private routers or routing daemons that offer service to the college network are not permitted. For the avoidance of doubt, NAT routers which offer routing within your bedroom only are permitted, provided that the college network is connected only to the WAN port of such a router.
9. IP packet forwarding is forbidden (note that you might have to explicitly turn off IP
forwarding with some versions of Linux).
10. Where a user machine offers a permitted service to the network, the service thereby made available must comply with relevant acceptable use policies.
11. It is forbidden to launch or copy applications which are subject to commercial copyright restrictions and licensing unless the client user is in possession of a valid licence for that application.
Please note that many of the above have severe implications on the security of your computer, and you should only offer these services if you are confident that you understand the security implications and have taken appropriate precautions. This is doubly important because compromise of your machine's security might permit intruders to monitor network traffic other than your own and thereby acquire information about other users in College. Advanced users should note that inward connections to private SMTP, POP, IMAP servers, and Microsoft File and Printer Sharing (and indeed many other services) from outside Cambridge are blocked by the CUDN as a security measure. Some are also blocked between each college/department.
Please note the general prohibition or discouragement on causing chargeable traffic to/from outside Cambridge. Your subscription includes free usage on connections to other computers within the .cam.ac.uk domain (i.e. within the University of Cambridge). All traffic to or from places outside .cam.ac.uk is subject to volume-related charges by the University on the College. Your subscription charge includes reasonable amounts of academic-related usage of the internet outside Cambridge, but excessive usage, or non-academic usage, might be subject to extra charges, to recover the College's costs. E-mail is free of charge to or from anywhere in the world, provided you use a Cambridge e-mail server such as Hermes.
The prohibition on causing chargeable traffic extends to all high-bandwidth (audio, video) or high-volume (web, FTP, news-reading) applications. Instant Messaging (chat) applications (such as Windows Messenger, Yahoo Messenger, Skype, and so on) all use the external internet to communicate with their master servers (to register you on-line or off-line, and allow you to see who else is on-line) regardless of whether you chat only with other users in Cambridge. Instant Messaging is regarded as recreational and its use of the outside internet is not approved but will be reluctantly tolerated for messaging only until such time as the costs get out of hand, when it might be necessary to prohibit it. Usage of Instant Messaging clients for purposes other than messaging is subject to the same restrictions as those applying to high-bandwidth or high-volume applications.
Computer games and other recreational activities which use the network are not approved, but will be reluctantly tolerated so long as other network use is not affected. Recreational use which loads the College's link to CUDN, or the University's link to Janet, is particularly sensitive and likely to attract sanctions. It is forbidden to host games servers which advertise their presence to players outside .cam.ac.uk.
Use of peer-to-peer (P2P) file-sharing systems will almost certainly render you vulnerable to being charged for usage. They might also cause you to be in breach of copyright law, which will not be tolerated.
If your computer has been issued with an IP address for use with the socket in your bedroom, then you are also permitted to plug the same computer into any network socket in the College Library, subject to the Librarian permitting the computer into the Library.
If you have more than one network device to connect to the network, each one will require separate registration. If you wish to connect multiple devices to your one network socket, you might need to use an Ethernet switch. Use of a private Ethernet switch is permitted, but possible only by prior notice to the IT Department: it might be necessary to adjust the College Network before a private switch will work.
All registration requests are dealt with automatically within College. You should not approach the University Computing Service.
For IP networking:
- the IP address will be issued to the user by Firerack.
- the DNS name will be of the form: crsid.queens.cam.ac.uk where the CRSid is that issued by the Computing Service for the user (the same as their @cam.ac.uk e-mail address).
For Microsoft File and Print Sharing:
- the workgroup or domain name will be: QUEENS
- the machine name will be the CRSid of the user.
For AppleTalk networking:
- the EtherTalk zone name will be: queens.cam.ac.uk-ethertalk
- The computer name will be the CRSid of the user (set in the File Sharing or Sharing Setup control panels)