Network Redundancy & Cybersecurity Requirements
Name
Course Code
Professor’s Name
Date
Network Redundancy & Cybersecurity Requirements
Introduction
Network redundancy (down time) is the process where there are additional communication equipment, alternative networks and mediums are installed so as to ensure network availability in case a network device or the network path fails.
Significance and Importance of redundancy
It might be extremely costly to procure dedicated lines in case of failure. Redundancy enables a business to have multiple networks active so that in case of line cuts and equipment failure, the normal processes of the business do not stop. A full mesh topology provides a structure for connecting all the available nodes in a network which helps improve tolerance to system faults (Jenelius, 2010). In case of failure in any of the nodes, data can still flow through the remaining nodes and get to its desired destination.
Vulnerability associated to redundancy
It follows that the main objective of redundancies in a network is to activate an alternate node to keep communication going. But it is imperative to note that redundancies only help a network to recover for a single node failure. This means that an instance of multiple node failure renders redundancy powerless and therefore the system is unable to activate a new node and the communication line is cut off. Mos common instances of this vulnerability are caused by power problems associated to outages and power. This is because power does not affect a single node but multiple nodes.
Security requirements for a Redundant Network
Using Multiple MICs for a single subnet
It entails configuring IPs on the same subnet. This can be done by connecting the NICs on different switches or on the same switch. The system metrics regulates which the one that is going to be active and the NIC system will then rely on outgoing traffic. At this point the system is using the lowest integer in the interface metrics.
Multiple Default Gateways
This involves installing a multiple number of routers to increase fault tolerance. Routers as the Hot standby router protocol (HSRP) and (VRRP) do not require reconfiguration to be able support such tolerance. It allows implementation of multiple gateways by defining a similar IP for each.
Link Aggregation
Link aggregation works with the link aggregation protocols that enable the network components to connect in a multiple and parallel switch to user and switch to switch connections. Such a connection fundamentally increases the band width, fault tolerance and load balancing capabilities.
References
Jenelius, E. (2010). Redundancy importance: Links as rerouting alternatives during road network disruptions. Procedia Engineering
Pallotti, E., & Mangiatordi, F. (2011, May). Smart grid cyber security requirements. In Environment and Electrical Engineering (EEEIC), 2011 10th International Conference on (pp. 1-4). IEEE.
Place an Order
Plagiarism Free!
Create an Account
Create an account at Top Tutor Online
- Allows you to track orders.
- Receive personal messages.
- Send messages to a tutor.
Post a Question/ Assignment
Post your specific assignment
- Tutors will be notified of your assignment.
- Review your question and include all the details.
- A payment Link will be sent to you.
Wait for your Answer!
Make payment and wait for your answer
- Make payment in accordance with the number of pages to be written.
- Wait for your Answer as a professional works on your paper.
- You will be notified when your Answer is ready.