wp header logo 195

Ensure network resilience in a network disaster recovery plan – TechTarget

Local News MP News

Getty Images
A key attribute of resilience is the ability of an item to adapt to a situation and overcome a problem to the point where it returns as close to how it was before the event occurred.
The notion of resilience has grown because of the COVID-19 pandemic, which forced many organizations to reinvent how they worked due to employees getting sick from the virus and working remotely.
In the case of networking, network availability is an important business asset. Loss of internet access, loss of wireless communications and loss of the ability to connect with other employees, offices and customers are among the worst-case networking scenarios organizations currently face.
A truly resilient network can adapt to an outage, whether it involves transmission channels, switching systems or both. It then returns to “networking as usual” or to a performance level as close to the network’s pre-incident status as possible.
The use of technology disaster recovery (DR) plans is an important step toward protecting the integrity of voice and data communications networks. But does a network DR plan — and its associated technology resources — ensure network resilience?
Figure 1 shows a typical network infrastructure and its many risk points or potential points of failure. One immediate risk factor teams should investigate is where network resources are located — e.g., in a secure building, buried underground, or aboveground on telephone poles or metal towers.
A variety of events can disable or damage each of the items highlighted in Figure 1. How teams deploy those resources can make a difference when a severely disruptive event occurs. This means it’s essential for teams to identify all possible risk points along likely transmission routes when developing a network DR plan.
Logically, network resources located in a secure building and placed underground in conduit are less likely to be at risk from aboveground events, such as severe weather. However, flooding can cause problems if rising water infiltrates belowground cable and equipment vaults and storage areas, especially if these resources aren’t housed in waterproof enclosures.
Typical risks and threats to network integrity include the following:
Before building a network plan to achieve resilience, network teams should first determine what constitutes resilience to their company. This process factors in how the firm operates and uses networks, employee dependence on networks and how senior management views resilience.
It can be expensive to achieve a truly resilient network infrastructure — one that identifies all possible failure points and has enough redundancy to recover quickly. Figure 2 depicts a hub-and-spoke network, or star topology, that limits connectivity to phones and business systems to a single communications link. This is how many networks were configured before the advent of the internet.
In contrast, Figure 3 depicts a mesh network, in which network points are connected to each other. The loss of one or more network channels likely won’t disrupt communications, as each network node can redirect traffic to an alternate path.
The cost to configure such a network, especially when using direct point-to-point channels, can be expensive. The internet also uses this configuration, which is one reason why the topology has become a popular tool for building secure network infrastructures. The choice of network topology is an important factor to consider when building a network DR plan.
As such, building a network DR plan that facilitates resilience assumes the network infrastructure itself is as resilient as possible, considering the costs and options available.
Once network teams have defined the characteristics of resilience, they can follow the steps from disaster recovery to resilience, as shown in Figure 4.
Figure 4 shows a possible scenario in which a disruptive event occurs and the extent to which a DR plan can assist the organization. The network resilience portion of Figure 4 suggests a state of network operations that might be beyond the level a DR plan can achieve. The results can vary considerably based on management’s expectations and the available budget.
Teams can achieve network resilience in the following situations:
Figure 5 presents one way to increase resilience when using a VoIP PBX system. In Figure 5, all elements of the PBX system are linked using the internet. In effect, the internet provides a network-as-a-service arrangement.
Because the internet is a virtually indestructible network and not likely to fail, the next challenge for teams is arranging internet access. While ISPs, MSPs and local exchange carriers access the internet, customers still have to connect to their switching offices. This is traditionally called the last mile and is represented by Figure 5.
Two techniques to increase access redundancy to local carriers — and then ISPs, MSPs and others — are depicted in Figure 6.
Enterprises can access a second local access carrier’s central office via alternate routes to increase resilience at the local level, but this option can be quite expensive. Figure 6 also depicts two alternate cable entry points into a building, something which might be prohibitively expensive unless the building was originally built with separate cable access routes.
Another alternative is wireless local access using cellular technology or possibly point-to-point microwave. A combination of these approaches might provide additional redundancy.
Other ways to increase network redundancy and survivability include the following:
On top of all these assets, teams should regularly exercise their DR plans and redundant network components to ensure they’re working. They should also ensure that all network management teams are trained in DR procedures, check that all vendor and carrier contacts are current, and engage the carriers and vendors when planning a DR test.
It is important for vendors and carriers to understand what their customer expectations are in a disruption. Ensure that service-level agreements address vendor and carrier responsibilities in an emergency.
True network resilience is often just out of reach. However, enterprises can get close to a state of real network resilience by following the criteria noted in this article.
Part of: How to implement a network disaster recovery plan
Don’t wait until disaster strikes to consider network resiliency and recovery. Use these six practical steps to build a network disaster recovery plan that fits your business needs.
A network disaster recovery plan should include components like documentation, emergency contacts, step-by-step procedures, provider and vendor details, backup info and more.
Enterprises can audit their network disaster recovery plans to ensure thorough protection and preparation. Consider factors like documentation, management support and audit type.
A network disaster recovery plan doesn’t always mean network resilience. Learn how factors like funding, identifying potential risks and constant updates make a difference.
UCaaS vendors are developing tools that let remote workers collaborate on their own time. That flexibility can reap benefits, but…
Replacing redundant collaboration tools with a UCaaS platform is the focus of many companies looking to cut unified …
Hot desking is one way to manage workspaces in a hybrid office. Learn some hot desking pros and cons to decide if it’s the right …
When users bring personal Android devices to the workplace, IT should consider using work profiles on these devices. Learn about …
A business mobile plan is common in the enterprise, but the picture isn’t as clear for SMBs. If an SMB opts to purchase a phone …
When SMBs deploy mobile devices, they need to find a viable MDM that can meet their needs. Read about 5 key features to look for …
Quantum computing has lots of potential for high compute applications. But the technology is still in the early stages, so it may…
Data lakes and data warehouses both store big data. When choosing a lake or warehouse, consider factors such as cost and what …
Classical and quantum computers have many differences in their compute capabilities and operational traits. Know their …
IT services executives predicted greater focus on user training and protection, supply chain security and machine learning. And …
IT services providers use a mix of diesel generators, portable power stations, Starlink and creative work scheduling to press on …
Economic uncertainty complicates the business outlook for professional services firms MSPs. The environment could reinforce cloud…
All Rights Reserved, Copyright 2000 – 2023, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell or Share My Personal Information


Leave a Reply

Your email address will not be published. Required fields are marked *