Now more than ever, today’s businesses require reliable network connectivity and access to corporate resources. Connections to and from business units, vendors and SOHOs are all equally important to keep the continuity when needed. Business runs all day, every day and even in off hours. Most companies run operations around the clock, seven days a week so it’s important to realize that to keep a solid business continuity strategy, redundancy technologies should be considered and/or implemented.
So, we need to keep things up and available all the time. This is sometimes referred to five nines (99.999) uptime. The small percentage of downtime is accounted for unforeseen incidents, or ‘scheduled maintenance’ and usually set to take place during times of least impact, like in the middle of the night, or on holiday weekends if planned. If this is not a part of your systems and network architecture it should be considered if you want to keep a high level of availability. Because things break and unforeseen events do take place, we need to evaluate the need for creating an architecture that is ‘highly available’, or up as much as possible, with failures foreseen ahead of time and the only downtime, is to do planned maintenance.
1. LAN Network with Redundancy
Efforts By:-
Santanu Mukhopadhyay-A1607111013
Aditya Sharma-A1607111022
2. What is a LAN Network????
A local area network (LAN) is a computer network which extends in a small coverage of geographical
area (ex-home, school, computer laboratory, office building or group of buildings)
A LAN is composed of internally connected functional workstations and pc’, each capable of
accessing and sharing data and devices inside the network (ex- printers, scanners and data storage
devices, anywhere on the LAN).
3. The sole concept of network redundancy is to provide alternate and efficient paths for data to travel along
without any interruption.
Importance
In our 21st century all networks are high-tech build and high speed. A simple example would be if you
have a single network connection from your core site to each remote office you connect with. What will
happen if the link went down?? In this section we will find the solution of this scenario to help
designing and plan for a backup solution that you can count on and one that is cost effective and will not
break the bank.
Network redundancy is very simple concept. If there is a single point of failure and it fails the network,
then there is nothing to rely on.
What is Network Redundancy?
4. Important steps to build redundancy
A risk analysis assessment must take place.
The core sites must be taken into
consideration if that is where the bulk of
network resources are located.
Routing and routing protocols need to be
considered.
Solutions exist only when specific routing
and switching (ex-HSRP,VRRP,GLBP)
protocols are applied the designing of the
network to achieve redundancy.
6. Redundancy Protocols
HSRP
Hot Standby Router Protocol (HSRP) is a Cisco proprietary redundancy protocol for establishing
a fault-tolerant default gateway. The protocol establishes a framework between network routers in
order to achieve default gateway failover if the primary gateway becomes inaccessible, in close
association with a rapid-converging routing protocol like EIGRP or OSPF. By multicasting packets,
HSRP sends its hello messages to the multicast address 224.0.0.2 (all routers) for version 1.
VRRP
Virtual Router Redundancy Protocol (VRRP) is a networking protocol that provides for
automatic assignment of available Internet Protocol (IP) routers to participate as a host. This
increases the availability and reliability of routing paths via automatic default gateway selections
on an IP sub-network.
7. Commands for Configuring HSRP
R3#config t
R3(conf)#vlan database
R3(vlan)#vlan 50 name ssales
R3(conf)#int ra fa 1/0 – 1
R3(config-if-ra)#no sh
R3(config-if-ra)#switchport mode access
R3(config-if-ra)#switchport access vlan 50
R3(config-if-ra)#exit
R3(conf)#int vlan 50
R3(config-if)#ip address 192.168.1.2 255.255.255.0
R3(conf)#standby 8 ip 192.168.1.1
R3(conf)#sh standby
8.
9. VPN(Virtual Private Network)
A VPN is a type of a secured network that allows the provisioning of private
network services for an organization over the unsecured network using
tunneling protocols.
By the unsecured network, we mean a public or shared infrastructure such as
the internet or service provider backbone network. The shared service provider
backbone network is also known as the VPN Backbone.
VPN is provisioned using technologies such as Frame Relay and Asynchronous
Transfer Mode virtual circuits for long time. However over the past few years
IP and MPLS based VPN’s have been a part of innovations.
11. Basic Routing
Router> Enable
Router# Configure terminal
Router(config) # int fa (0/0, 1/0)
Route (config-if)# ip address (ip address) (subnet mask)
Router(config-if)# no shutdown
Router(config-if)#exit
Router(config)#int serial 2/0
Router(config-if)# ip address (ip address) (subnet mask)
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)#int serial 3/0
Router(config-if)# ip address (ip address) (subnet mask)
Router(config-if)# no shutdown
Router(config-if)# exit
No Shutdown command is used to change the state of Interface from UP to DOWN or from
DOWN to UP.
13. MPLS Routing
It is a mechanism in high-
performance telecommunications networks
that directs data from one network node to
the next based on short path labels rather
than long network addresses, avoiding
complex lookups in a routing table.
The labels identify virtual links (paths)
between distant nodes rather than
endpoints. MPLS can encapsulate packets
of various network protocols. MPLS
supports a range of access technologies,
including ATM, Frame Relay, and DSL.
A Label Switched Path is a path via
Label Switched Routers (LSR) in
a MPLS enabled network. Packets
are switched based on labels
applied to the packet. LSP’s may be
signaled using the Tag
Distribution Protocol (TDP), the
Label Distribution Protocol
(LDP) and the Resource
Reservation Protocol (RSVP).
14. Access List
Router # configure
Router(configure) #access-list udp 150 permit any ip address netmask port number
Router(configure)# access-list tcp 150 permit any ip address netmask port number
Router(configure)# access-list tcp 150 deny ip address netmask ip address netmask
Router(configure)# access-list tcp permit any any
Router(configure)# int s1
Router(configure-if)# ip access-group 150 in
Router(configure-if)# exit
Router(configure)# exit
15. NAT &PAT
Static NAT
Router (config )# int e 0/0
Router (config-if)# ipnat inside
Router (config)# int s0/0
Router(config-if)# ipnat outside
Router(Config)# ipnat inside source static
(ip address)(ip address)
Dynamic NAT
Router (config )# int e 0/0
Router (config-if)# ipnat inside
Router (config)# int s0/0
Router(config-if)# ipnat outside
Router(Config)# ipnat pool Amity ip address ip
address netmask
PAT
Router(config)# interface fastethernet
0/0
Router(config-if)# ip nat inside
Router(config)#interface serial 0/0/0
Router(config-if)# ip nat outside
Router(config)# ip nat inside source list
10 interface serial 0/0/0 overload
Router(config)# access-list 10 permit ip
add. Subnetmask
16. Redundant LAN Connection
To handle a system communication failure that use to occur within or outside
of a server's local subnet. The server's
1. NIC Card
2. Default gateway
Steps
Go to Control Panel, Network and Dial-up Connections- Local Area Connection-
Properties.
Select Internet Protocol and click Properties.
On the General tab, click Advanced.
Clear the Automatic Metric check box at the bottom of resulting dialog box.
Enter the metric you want to assign to this NIC.
17.
18. Conclusion(s)
We had done a practical project under the supervision of an
University for the first time in our life.
Minor Project has taught us all the networking operations which
are done in an organization.
Running Network programs in a stipulated time period makes
any student perfect and updated.
Going through the working of minor project, we had our broader
view about discipline and integrity of networking operations in
an organization.