Solved

Vantages and advantages of using 2 internet connection in Failover mode

Posted on 2010-11-21
4
544 Views
Last Modified: 2012-05-10
Hello
How are you?

What is the Vantages and advantages of using 2 internet connection in Failover mode?

THANKS
REGARDS
William
0
Comment
Question by:williamit
4 Comments
 
LVL 23

Accepted Solution

by:
Dr. Klahn earned 250 total points
ID: 34183005
In failover mode, if one of the two network cards in the computer fails, or either cable is cut or damaged, or one of the two modem/router/interfaces fails, the internet will still be available so long as either modem/router/interface has access to the internet.  There is no speed advantage to using two connections in failover mode; the second connection is used only if the first fails.
0
 

Author Comment

by:williamit
ID: 34183040
Thanks,
What is disadvantages of using  2 internet connection in Failover mode?
I know that we need to pay 2 internet providers. What is the other disadvantages?

Thanks
Regards
William
0
 
LVL 15

Expert Comment

by:getzjd
ID: 34184110
The only disadvantage I see is paying for a line that you are not using.  
0
 
LVL 8

Assisted Solution

by:akalbfell
akalbfell earned 250 total points
ID: 34200463
You would need to get address space from ARIN, get service via 2 tier 1 providers for best redundancy and setup BGP. Other than cost, the only downside is that running BGP exposes you to some problems you wouldn't have when running just the 1 connection. Like with anything if the setup is done correctly you minimize any problems but they can still occur.
With a correct setup if your main line goes down you can be 100% operational on the other line within a minute or so.

You dont necessarily need to use the two lines as active/standby failover. you could load balance between the two using BGP and see a better return on your investment.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Hello to you all, I hear of many people congratulate AWS (Amazon Web Services) on how easy it is to spin up and create new EC2 (Elastic Compute Cloud) instances, but then fail and struggle to connect to them using simple tools such as SSH (Secure…
Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now