Network Redundancy & Cybersecurity Requirements

Network Redundancy & Cybersecurity Requirements

Name

Course Code

Professor’s Name

Date

Network Redundancy & Cybersecurity Requirements

Introduction

Network redundancy (down time) is the process where there are additional communication equipment, alternative networks and mediums are installed so as to ensure network availability in case a network device or the network path fails.

Significance and Importance of redundancy

It might be extremely costly to procure dedicated lines in case of failure. Redundancy enables a business to have multiple networks active so that in case of line cuts and equipment failure, the normal processes of the business do not stop. A full mesh topology provides a structure for connecting all the available nodes in a network which helps improve tolerance to system faults (Jenelius, 2010). In case of failure in any of the nodes, data can still flow through the remaining nodes and get to its desired destination.

Vulnerability associated to redundancy

It follows that the main objective of redundancies in a network is to activate an alternate node to keep communication going. But it is imperative to note that redundancies only help a network to recover for a single node failure. This means that an instance of multiple node failure renders redundancy powerless and therefore the system is unable to activate a new node and the communication line is cut off. Mos common instances of this vulnerability are caused by power problems associated to outages and power. This is because power does not affect a single node but multiple nodes.

Security requirements for a Redundant Network

Using Multiple MICs for a single subnet

It entails configuring IPs on the same subnet. This can be done by connecting the NICs on different switches or on the same switch. The system metrics regulates which the one that is going to be active and the NIC system will then rely on outgoing traffic. At this point the system is using the lowest integer in the interface metrics.

Multiple Default Gateways

This involves installing a multiple number of routers to increase fault tolerance. Routers as the Hot standby router protocol (HSRP) and (VRRP) do not require reconfiguration to be able support such tolerance. It allows implementation of multiple gateways by defining a similar IP for each.

Link Aggregation

Link aggregation works with the link aggregation protocols that enable the network components to connect in a multiple and parallel switch to user and switch to switch connections. Such a connection fundamentally increases the band width, fault tolerance and load balancing capabilities.

References

Jenelius, E. (2010). Redundancy importance: Links as rerouting alternatives during road network disruptions. Procedia Engineering

Pallotti, E., & Mangiatordi, F. (2011, May). Smart grid cyber security requirements. In Environment and Electrical Engineering (EEEIC), 2011 10th International Conference on (pp. 1-4). IEEE.

Place an Order

Plagiarism Free!

Scroll to Top