Network-Contingency planning Essay
Network is one of the valuable resources in the organization. Many Organizations uses the wide area network to interconnect the organization worldwide. Organization must take necessary steps to prevent network from various disaster by having the contingency planning activities in practice. Organization can go either for leased circuits or open/virtual circuit networks. The leased circuits have a high advantage over the virtual circuits.
The leased circuit provides high availability and control to the network. The dedicated lines guarantees no interference hence high data transfer can be taken place. During disaster recovery, the multiple data centers are needed to be linked. Multiple sites can be easily linked with the leased lines. Leased lines provide high bandwidth for data transfer, so it will be very useful during the disaster recovery. However, the major disadvantage of leased line is the implementation cost.
The private WAN suffers from following disadvantages: high cost, In Line management, fixed bandwidth etc. So, many organization are going towards the public WAN because of many advantages that cannot be harvested from private WAN. The redundant communications are needed to be placed in the WAN that would be very helpful during the disaster recovery. Single point communication failures can be prevented if
Need essay sample on "Network-Contingency planning"? We will write a custom essay sample specifically for you for only $ 13.90/page
The redundancy must also be introduced in the following for better protection from disaster: service providers, Components, connecting devices etc. However multiple connections can cause redundancy but it should be in the controlled manner. All the activities performed in the WAN should be carried by trained personnel for effective and proper usage. Architecture and other protocols to be used are need to be documented which would be useful for disaster recovery and contingency planning activities.
The WAN architecture must ensure that it is in inline with the security policies of the organization and it does not affect the security principles, policies and goals of the organization.
References Marianne. S. , and others. (June 2002) Contingency Planning Guide for Information Technology Systems. National institute of standards and technology. NIST special publication 800-34. Wireless Center. June 2007. Private Versus Public WANs. Retrieved on 5-8-09 from http://www. wireless-center. net/WLANs-WPANs/1496. html