3. Critical BC/DR Program Elements Corporate Charter Established in order to develop the mission and goals of the BC/DR program Executive-Level Champions Identify individuals within the organization who promote, support, and lead the BC/DR team Resources Align resources to ensure the plan can be implemented if needed Level of Exposure Determine the appropriate level of exposure your organization can tolerate
4.
5.
6.
7.
8. PAETEC’s Network Diversity / Redundancy Options PAETEC’s portfolio of network diversity options can be used to mitigate threats to the key components in your network architecture. These options provide inherent (core) diversity, as well as customized (edge) diversity solutions: Inherent Central Office Redundancy Access Diversity Solutions Call Rerouting Solutions MPLS and Internet Redundancy Solutions Email Scanning as a Backup Email Solution
9. Access Diversity Solutions Carrier Line Diversity Underlying Carrier Diversity Access Provider Diversity POP Diversity TruConnect Diversity Inherent Central Office Redundancy Switch Module Diversity Back-up Power and Routine Diagnostics
10.
11. Inherent Diversity - Central Office Facilities Power Commercial power backed up by diesel powered generator DC Plant has N+1 redundancy (For DC power rectification) Battery plant is engineered for a Minimum of 4 hr backup Generator is tested bi weekly and can run for 12 - 24 hrs on one tank of fuel. Routine Diagnostic Exercise Each week every redundant piece of equipment is tested and switched to the redundant side to verify that the hardware is working properly. Battery Plant Central Office Commercial Power Generator Rectifier Transfer Switch
22. Call Re-routing Solutions – 800# Redundancy PAETEC will also be able to provide 800# redundancy in markets with multiple central offices. PBX POP POP Rochester 5ESS POP POP Customer Premises Albany 5ESS PAETEC can provision part of a customers circuit with DID numbers for the 800 service 800#’s will be provisioned in 2 diverse switches. If the one switch is unavailable PAETEC can update SMS national to send the 800 traffic thru the secondary switch. Inbound 800 Calls
23. MPLS and Internet Redundancy Solutions MPLS with redundant application servers MPLS for redundant Internet access Redundant Data Connectivity using BGP E-mail Scanning Email Scanning as a Backup Email Solution
24. Customer Example MPLS customer with 3 remote sites Data Center at Corporate Site Remote sites connected via PAETEC’s redundant MPLS Network SECURETEC Private-IP MPLS MPLS is PAETEC’s next-generation VPN solution used to connect two or more customer locations in a shared secure environment as opposed to using point-to-point connections. With MPLS, each site is virtually connected to every other site providing a fully meshed data network. Single point of failure is the loss of the corporate site since it houses the only data center. MPLS Routing Domain Aggregate Router Router IP Phone ETHERNET Corporate Site Site 3 Site 2 Data Center Firewall Internet ETHERNET
25. SECURETEC Private-IP MPLS - DR Solution Redundant Application Servers Since MPLS provides a fully meshed data network, any remote site can be used as a redundant data center instead of a spoke and hub architecture. Mission-critical applications continue to function due to MPLS and the Redundant App Server. If the Corporate Site is lost, all other locations traffic automatically re-routes to the back-up site. Add a redundant application server at Site 3 to mitigate the single point-of-failure. MPLS Routing Domain Aggregate Router Router IP Phone ETHERNET Corporate Site Back-up DR Site Site 2 Data Center Firewall Internet Back-up App Server ETHERNET
26.
27.
28. Access Diversity Solutions – Redundant Data Connectivity Using BGP By using BGP 4, PAETEC can provision diverse redundant connectivity for your Data Services. BGP constantly checks for the best route for your data traffic. By provisioning multiple data circuits sent to two aggregate routers companies can provision geographically diverse data paths. In the event your first connection is unavailable traffic will be re-routed via the secondary path. Data Network Aggregate Router 2 Router ETHERNET Corporate Site Data Center Firewall Aggregate Router 1 ETHERNET Terminating Location Data Network
32. Voice Service Overview Current Architecture 2 T1’s at Corporate 1 T1 at all remote sites Proposed Suggestions POP Diversity Have Each T1 at corporate sent to different POPS Switch Module Diversity Terminate Each T1 at a diverse Switch Module Carrier Line Diversity Add POTS service that is not provisioned thru the PBX at all remote sites. Lines should be set up to hunt. Direct Trunk Overflow Add Direct Trunk Overflow to each site Interrelate the 2 diverse T1’s at corporate to auto fail over Interrelate the remote sites to auto failover to POT’s service PSTN Site 4 Site 2 Site 3 Corporate Site PBX POP DTO
33. Current Architecture 1 T1 Point-to-Point at each location to corporate Data Center is at Corporate Site 4 Site 2 Site 3 Corporate Site Router Proposed Changes Replace Point-to-Point service with MPLS Provision a backup application server at one of the customers remote sites Add a secondary route to the Internet from backup site Data Service Overview MPLS Routing Domain Internet
34.
35. Thank You For Your Attention! Questions, Comments? Please contact Mark Lawrence Peay 310.621.8226 [email_address]
Notes de l'éditeur
MessageLabs provides a completely managed service which means it removes the cost and operational burden of constantly monitoring and updating e-mail systems, significantly reducing the total cost of ownership of any organization’s e-mail infrastructure. This slide outlines the benefits of the MessageLabs service. What we deliver: Up to 100% clean inbox without viruses, spam or unwanted content e-mail threats stopped and stored away from your network A predictable cost that requires no additional hardware, software or updates, delivering low total cost of ownership (TCO) Easy and location independent setup and administration Worldwide 24 x 7 service and support with threat monitoring and response Dynamic service providing real time protection at time of virus outbreaks Added e-mail management services such as e-mail continuity, disaster recovery, e-mail attack and directory harvest protection Ability to easily and rapidly deliver future e-mail security services Benefits Protects Internet bandwidth and e-mail infrastructure, storage and archiving by reducing e-mail volumes Protects internal resources and productivity Increased continuity and accessibility of e-mail applications and infrastructure Protects and controls users and company image with detection of unacceptable images and content according to e-mail acceptable usage policies Protects and controls against loss of intellectual property, disclosure of confidential information, defamation of company name, abuse of e-mail and protection from potential legal action.
MessageLabs provides a completely managed service which means it removes the cost and operational burden of constantly monitoring and updating e-mail systems, significantly reducing the total cost of ownership of any organization’s e-mail infrastructure. This slide outlines the benefits of the MessageLabs service. What we deliver: Up to 100% clean inbox without viruses, spam or unwanted content e-mail threats stopped and stored away from your network A predictable cost that requires no additional hardware, software or updates, delivering low total cost of ownership (TCO) Easy and location independent setup and administration Worldwide 24 x 7 service and support with threat monitoring and response Dynamic service providing real time protection at time of virus outbreaks Added e-mail management services such as e-mail continuity, disaster recovery, e-mail attack and directory harvest protection Ability to easily and rapidly deliver future e-mail security services Benefits Protects Internet bandwidth and e-mail infrastructure, storage and archiving by reducing e-mail volumes Protects internal resources and productivity Increased continuity and accessibility of e-mail applications and infrastructure Protects and controls users and company image with detection of unacceptable images and content according to e-mail acceptable usage policies Protects and controls against loss of intellectual property, disclosure of confidential information, defamation of company name, abuse of e-mail and protection from potential legal action.