Networking Technologies for Business Continuity

Networking Technologies for Business Continuity

Nijaz Bajgoric (University of Sarajevo, Bosnia)
DOI: 10.4018/978-1-60566-160-5.ch012
OnDemand PDF Download:
$37.50

Abstract

Continuous computing technologies explored in previous chapters, in many cases, are located on different locations. However, they depend on each other and are bound to data communication and networking technologies that are used in order to ensure data transfers. Therefore, the data communications technologies are crucial in ensuring continuous computing each time when computing devices and users are located in different locations. Chapter XII provides some explanations on them and their role in business continuity.
Chapter Preview
Top

Network Infrastructure And Network Downtime

Networking infrastructure is a prerequisite for any kind of e-business in networked economy. It consists of several data communications and computer network technologies that are implemented in order to come up with appropriate data communications—computer network platform. Computer network infrastructure is very important from business continuity perspective since any disconnection failure that occurs on it can cause data unavailability.

As shown in Figure 1, these technologies make the third layer of an information system that enables continuous computing.

Figure 1.

Continuous computing layers: The role of networking infrastructure (Layer 3)

They include technologies such as communication devices, communication media, communication protocols, network operating systems, networking protocols, data protection and security standards. Network cards, modems, cable modems, DSL modems, routers, bridges, switches, hubs, firewalls, and so forth, are used to connect computers within local area networks, wide area networks, virtual private networks, campus networks, metropolitan networks. Several communication media, guided and non-guided, such as leased lines, ISDN, ATM, frame-relay, wireless communications devices and protocols, satellite communications, and so forth, are used in order to establish several types of computer networks. These networks are in turn basis for networked enterprises, e-business, e-government and e-economy. Hunter (2008) noted that recent Internet outages in the Middle-East bring customary boom in business continuity.

In addition to data communication hardware and software glitches and failures, another threat with regard to business continuity is in network attacks. Network attacks today can come in the form of competitive espionage, disgruntled ex-employees, hackers, crackers, other forms of outsiders willing to use our servers to store music, movies, pornography, pirated software and so on.

In modern Internet era, in what is called “networked business,” the network security in an organization that operates in such a kind of environment is a business continuity problem. A famous saying, “A chain is only as strong as its weakest link” applies as a rule in modern e-business.

Network downtime caused by security attacks is costing large enterprises more than $30 million a year, according to a recent study by Infonetics Research.

According to the study, “The Costs of Network Security Attacks: North America 2007,” large organizations are losing an average of 2.2% of their annual revenue because of security attacks. That may sound relatively small, but when coupled with the extra few percentage points of revenue companies lose to non-security related downtime, the loss is much higher.

Large companies take the biggest hit from security-related downtime, but results show that small and midsized businesses (SMBs) stand to lose about half a percent of their annual revenue to security-related downtime, which can translate to hundreds of thousands of dollars annually. Cisco provides a framework of the impacts of network failures (Cisco White Paper, 2004).

Measures that have to be implemented in order to have the networking infrastructure more secure include:

Complete Chapter List

Search this Book:
Reset
Dedication
Nijaz Bajgoric
Table of Contents
Foreword
Angappa Gunasekaran
Preface
Nijaz Bajgoric
Acknowledgment
Nijaz Bajgoric
Chapter 1
Nijaz Bajgoric
The first chapter aims at defining a “big picture” of contemporary business and business computing. Business pressures and business risks are... Sample PDF
Business Computing in the Internet Era
$37.50
Chapter 2
Economics of Downtime  (pages 23-39)
Nijaz Bajgoric
After introducing some basic facts on how today’s businesses are faced with several types of business risks, the second chapter tends to explain one... Sample PDF
Economics of Downtime
$37.50
Chapter 3
Nijaz Bajgoric
The previous chapter introduced the two major concepts of continuous computing: downtime and uptime. Chapter three goes a step further and aims at... Sample PDF
Business Continuity and Business Continuity Drivers
$37.50
Chapter 4
Nijaz Bajgoric
Based on the framework defined in Chapter III, the fourth chapter discusses the models of information architectures that are used in implementing... Sample PDF
Information Architectures for Business Continuity
$37.50
Chapter 5
Nijaz Bajgoric
After identifying major downtime points within a client-server architecture in Chapter IV, Chapter V discusses in more details enterprise servers... Sample PDF
Server Operating Environment and Business Continuity Drivers
$37.50
Chapter 6
Server Operating Systems  (pages 103-131)
Nijaz Bajgoric
Server configurations described in Chapter V are operated by server operating systems. Server-based application software and business-critical... Sample PDF
Server Operating Systems
$37.50
Chapter 7
Nijaz Bajgoric
Server operating systems described in Chapter VI usually come preinstalled. Additional components can be installed “on-demand” in the form of... Sample PDF
Advanced Server Technologies for Business Continuity
$37.50
Chapter 8
Nijaz Bajgoric
Chapter VIII discusses the server operating systems’ main attributes from the selection perspective. Several selection criteria are explained... Sample PDF
Choosing the Server Operating Platform for Business Continuity
$37.50
Chapter 9
Nijaz Bajgoric
Chapter IX focuses on the role of system administration as an IT-profession and system administrator as a person who does the administrative... Sample PDF
System Administration and System Administrator's Role in Business Continuity
$37.50
Chapter 10
Nijaz Bajgoric
Chapters V-IX dealt with server operating environment and its role in ensuring business continuity mostly in cases of ongoing data processing... Sample PDF
Backup and Recovery Technologies for Business Continuity
$37.50
Chapter 11
Nijaz Bajgoric
In addition to standard storage and traditional tape-based backup technologies explained in Chapter X, businesses employ advanced storage... Sample PDF
Advanced Storage Technologies for Business Continuity
$37.50
Chapter 12
Nijaz Bajgoric
Continuous computing technologies explored in previous chapters, in many cases, are located on different locations. However, they depend on each... Sample PDF
Networking Technologies for Business Continuity
$37.50
Chapter 13
Nijaz Bajgoric
After explaining several continuous computing technologies in previous chapters, the book focuses on business continuity management in Chapter XIII.... Sample PDF
Business Continuity Management
$37.50
Chapter 14
Nijaz Bajgoric
Continuous computing technologies are employed in order to achieve business continuity from the business operations perspective. In the same time... Sample PDF
Business Continuity for Business Agility
$37.50
About the Author