Solved

Standard network Setup

Posted on 2014-12-23
3
85 Views
Last Modified: 2015-02-10
I am in the process of restructuring our network infrastructure with the new design . what is the best standard approach to have redundancy in mind

10 story building with 3 columns . Our IT room located in the 4th floor and having two manage high end switches in the core level . second one is not live but it has the same configuration . most of the floor are having fiber single core ones . one of my friend told me to go with 2 or 4 core to have redundant . I did not understand the redundancy with one cable with 2 0r 4 core one will help .I got to know is batter to have two cables fiber connection to each floor and then distribute within the floor .
please advice me on the best practice on the above implementation .
0
Comment
Question by:cur
  • 2
3 Comments
 
LVL 25

Assisted Solution

by:Fred Marshall
Fred Marshall earned 500 total points
ID: 40515145
First, define "redundancy" in the context of what you intend to accomplish.

Here is an example of what I would call "full redundancy":

"Separate switches and routers and firewall throughout.  Separate cable runs in different physical locations in the building backbone.  Two internet connections which arrive using different physical mechanisms and through different physical routes from two different ISPs."

This would be for one site/building.  
Then you could consider having a separate site for backing up the whole thing.

Given this, you could back off from some of it if it seems to make sense to you.  Only you can decide what makes sense for your situation.  What kinds of failures, threats and vulnerabilities are you wanting to address?  

Example in your case:

Using more than a single fiber for intra-site communications would make sense if the concern is failed switch ports, failed switches, etc.  This implies that those added switch capabilities are also present.

Using more than a single fiber with the fiber runs in different physical locations for intra-site communications would make sense if physical damage to the runs is the concern.  In this case, the redundant switches might also be in separate locations.

If you eliminate physical damage as a likely vulnerability (e.g. a localized fire or a fully-involved building fire), then you get back to failed electronics and failed internet service pretty much.
0
 

Author Comment

by:cur
ID: 40553156
is there any diagram or case studies on the industry standard
0
 
LVL 25

Accepted Solution

by:
Fred Marshall earned 500 total points
ID: 40554732
What I was trying to convey is that there is no one "standard".  Perhaps if you express your requirements along the lines that I outlined then we might be able to zero in on what approach is "more standard" for that set of objectives.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The following recovery method will work on All Cisco Switchs that run ISO software. You will need a good copy of the IOS version you want you use saved on your PC and a Com's Cable. The software for these switches comes as a .tar file. Tar is …
This article will step through configuring a SonicWALL appliance to utilize an internal DHCP server for Global VPN Client (GVC) hosts.  There are times when using an external (external to the SonicWALL) DHCP server, such as Windows Servers, isn’t pr…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question