Solved

Standard network Setup

Posted on 2014-12-23
3
88 Views
Last Modified: 2015-02-10
I am in the process of restructuring our network infrastructure with the new design . what is the best standard approach to have redundancy in mind

10 story building with 3 columns . Our IT room located in the 4th floor and having two manage high end switches in the core level . second one is not live but it has the same configuration . most of the floor are having fiber single core ones . one of my friend told me to go with 2 or 4 core to have redundant . I did not understand the redundancy with one cable with 2 0r 4 core one will help .I got to know is batter to have two cables fiber connection to each floor and then distribute within the floor .
please advice me on the best practice on the above implementation .
0
Comment
Question by:cur
  • 2
3 Comments
 
LVL 26

Assisted Solution

by:Fred Marshall
Fred Marshall earned 500 total points
ID: 40515145
First, define "redundancy" in the context of what you intend to accomplish.

Here is an example of what I would call "full redundancy":

"Separate switches and routers and firewall throughout.  Separate cable runs in different physical locations in the building backbone.  Two internet connections which arrive using different physical mechanisms and through different physical routes from two different ISPs."

This would be for one site/building.  
Then you could consider having a separate site for backing up the whole thing.

Given this, you could back off from some of it if it seems to make sense to you.  Only you can decide what makes sense for your situation.  What kinds of failures, threats and vulnerabilities are you wanting to address?  

Example in your case:

Using more than a single fiber for intra-site communications would make sense if the concern is failed switch ports, failed switches, etc.  This implies that those added switch capabilities are also present.

Using more than a single fiber with the fiber runs in different physical locations for intra-site communications would make sense if physical damage to the runs is the concern.  In this case, the redundant switches might also be in separate locations.

If you eliminate physical damage as a likely vulnerability (e.g. a localized fire or a fully-involved building fire), then you get back to failed electronics and failed internet service pretty much.
0
 

Author Comment

by:cur
ID: 40553156
is there any diagram or case studies on the industry standard
0
 
LVL 26

Accepted Solution

by:
Fred Marshall earned 500 total points
ID: 40554732
What I was trying to convey is that there is no one "standard".  Perhaps if you express your requirements along the lines that I outlined then we might be able to zero in on what approach is "more standard" for that set of objectives.
0

Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco 2921 WIC card 2 63
Add Mac address reservation to Sonicwall TZ 210 router 1 62
Internet Protocol Security question 3 94
Connectivity issues after power outage 5 33
When posting a question about a Cisco ASA, Cisco Router or Cisco Switch, it can aid diagnosis if a suitably sanitised copy of the config is provided. It is much better to leave as much of the configuration as original as possible, as it could be tha…
Before I go to far, let's explain HA (High Availability) and why you should consider it.  High availability is the mechanism used to provide redundancy to any service at the same site and appears as a single service to the users of that service.  As…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question