Chris Wiginton
IS-3120 Unit 6 Assignment 6
Cisco-Layer 2 Resiliency Compared to HP’s IRF
In order to provide speed and reliability, large and enterprise-level networks today are typically constructed in multiple layers. They are the access layer, also called the network edge layer, the aggregation or distribution layer; and the network core layer. The access layer is usually a mesh of network switches, linked to other switches in the aggregation layer, which in turn is linked to the core.
This mesh type application of switches provides multiple paths for network traffic to flow. What this means is that if one link in the traffic flow or a switch goes down, traffic can continue to flow using an alternate path. This type of mesh
…show more content…
In contrast, Cisco Layer 2 Resiliency advantages are claimed to offer rapid failover without service disruption. The layer 2 is designed to streamline change management and service turn-up without WAN disruption with fewer errors. It offers a high availability through real-time recovery and resiliency at the network, device and design levels. Cisco Layer 2 Resiliency offers increased system redundancy at the platform level, network security through access layer defense, identity-based trust, pervasive security and management as well as providing device posture assessments. Operational efficiency is achieved through automated configuration, proactive diagnostics and simplified troubleshooting. This is designed to provide predictable application performance to support converged applications as well as support IP multicast for new applications. As with HP’s IRF Resiliency, there are several disadvantages associated with Cisco Layer 2 Resiliency. The router supports REP only when the router is running the metro IP access or the metro access image. You have to configure each segment port or an incorrect configuration will cause forwarding loops in networks. REP can only manage one failed port within a segment. Multiple port failures within the REP segment cause high loss of network connectivity.
Due to its simplistic manageability and scalability I would recommend HP’s IRF Resiliency over Cisco Layer
This will benefit me while generating a security strategy for the Network and its hardware.
Network reliability is the ability of a network to maintain or restore an acceptable level of performance during network failures by application various restoration techniques and prevention of service outages from network failures by applying preventative techniques. (Network Survivability, 2001). Computing the reliability of a network is quite difficult; therefore estimation by means of simulation is a popular choice for determining network reliability.
GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence. GFI’s failure to incorporate proper firewall devices at Internet access points can be linked to DOS network attacks and Oracle database and email servers being down.
IntraVet also offers many solutions for support. It has fast solutions to hardware issues and has enhanced expandability and compatible. Most importantly IntraVet has a disaster recovery contingency plan for downed systems (IntraVet, 2014). As you know disasters can occur at anytime so this is the most important feature.
Since it was critical to Cisco’s strategic commitment of advancing, the company had to pick the best option to implement quickly. The two alternatives were know as: create knowledge and expand the community. With key decision criteria , this report carefully examines both of the options that can quickly be implemented and yet help Cisco integrate into IoE era.
In order to reach high network uptime networks can implement HSRP from Cisco to enable network redundancy towards IP networks. This can be in place so that traffic from users is efficiently dealt with straight away and the network can first hop failures from network devices.
As the world progresses technology everyday, the reliance on the Internet and its uses become more and more necessary. Many people connect to hundreds of applications and devices they use every single day. Behind these applications are extremely complex networks that allow users to connect in ways that expand every single day. To achieve this, companies must design their networks for secure access and reliability to allow seamless access for users. On the back-end these companies must also have a secure network in place for their offices, remote workers, and any other remote resource to access confidential materials and other sensitive matter. This can be accomplished through a variety of WAN technologies that are used in the world today.
Identify hardware and also software needed to secure your choice of networks against all form of electronic threats.
Cisco provides a number of its solutions over cloud rather than preferring the infrastructure implementation since it can reduce the cost of
in [3], developed performance characterizations in terms of the outage events and the associated outage probabilities.
As shown on Figure 2, Internet and perimeter-based firewalls, proxy servers, DLP solutions and other technologies. The access layer is where all the action is. This is where BYOD movement has its greatest impact in the network to monitor and bring security analysis such as smartphones and virtualized infrastructure at this layer.
play a vital role in the reliability and availability of network services. However, how to employ
In Routers and Switches we learned several things such as: what is a Router, why we need Routers, what is the importance of a Router. We also learned what VLSM is and how to do it and use it. Throughout CCNA we learned how to configure a Router; the different types of Routing protocols and most importantly what, when and how to use those protocols in the field. Finally I will discuss Switches in how they are use to set up a LAN. Throughout this paper these topic will be discuss to cover what was learned through class lecture and text book (CCNA study guide by Lammle) and actually applied through hands on labs which were done with actual Cisco Router and Switches within a working LAN and Ethernet connection
In this piece of work I will talk about different network types, topologies, architectures and specify the standards and protocols often related to them. Furthermore I will discuss network hardware and software required by a PC to join a network and access shared resources. Finally, I will look into different network services provided by the networks and the Internet.
Today, a single network provides many different services like voice, data, chat, video, and many more. This convergence in the networking field has introduced many challenges since they share the common medium but are of different nature and priority. In my network I will provide high priority to the