SlideShare une entreprise Scribd logo
1  sur  35
PAETEC Disaster Recovery & Network Diversity Solutions
Network Diversity and Your Disaster Recovery Plan   ,[object Object],[object Object],[object Object],[object Object],Developing a strong Business Continuity/Disaster Recovery (BC/DR) program is critical to protecting the underlying investments in your business.
Critical BC/DR   Program Elements Corporate Charter Established in order to develop the mission and goals of the BC/DR program Executive-Level Champions   Identify individuals within the organization who promote, support, and lead the BC/DR team Resources Align resources to ensure the plan can be implemented if needed Level of Exposure Determine the appropriate level of exposure your organization can tolerate
Assess Your Business’ Risk of Exposure   ,[object Object],[object Object],[object Object],[object Object],[object Object],Once the BC/DR program development has been established, the next step is to evaluate the current risk exposure for your business.
[object Object],[object Object],[object Object],[object Object],[object Object],Business Impact Analysis   The next step is to perform a comprehensive Business Impact Analysis (BIA). The results of the BIA will  identify business vulnerabilities which will help you develop strategies to minimize risks. Rank business vulnerabilities by level of importance. Map all identified threats to your critical business functions.
Creating your Recovery Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Now that you have accessed your companies primary vulnerabilities the time has come to document a recovery plan in the event the situation occurs.
Network Diversity/Redundancy Options ,[object Object],[object Object],[object Object],[object Object],[object Object],Based on your results, you will need to implement network diversity options, which are available to you through communication service providers such as PAETEC.  Understanding the available options will enable you to determine the appropriate level of investment to make in mitigating these risks.
PAETEC’s Network Diversity / Redundancy Options PAETEC’s portfolio of network diversity options can be used to mitigate threats to the key components in your network architecture.  These options provide inherent (core) diversity, as well as customized (edge) diversity solutions: Inherent Central Office Redundancy  Access Diversity Solutions Call Rerouting Solutions MPLS and Internet Redundancy Solutions   Email Scanning as a Backup Email Solution
Access Diversity Solutions Carrier Line Diversity  Underlying Carrier Diversity  Access Provider Diversity  POP Diversity TruConnect Diversity Inherent Central Office Redundancy  Switch Module Diversity Back-up Power and Routine Diagnostics
Inherent Diversity - Switch Module Switch Module Diversity provides protection from hardware failures within a PAETEC switch.  Each PAETEC 5ESS switch is engineered with redundant switch module cards. ,[object Object],[object Object],Switching Modules 1 2 Customer  Premises PBX POP POP Lucent  5ESS
Inherent Diversity - Central Office Facilities Power Commercial power backed up by diesel powered generator DC Plant has N+1 redundancy (For DC power rectification) Battery plant is engineered for a Minimum of 4 hr backup Generator is tested bi weekly and can run for 12 - 24 hrs on one tank of fuel. Routine Diagnostic Exercise Each week every redundant piece of equipment is tested and  switched to the redundant side to verify that the hardware is  working properly. Battery Plant Central Office Commercial  Power Generator Rectifier Transfer  Switch
B y provisioning a percentage of POTs lines outside your PBX, you can protect yourself in the event of a failure in that system.  Since POTS is line-powered, your location will still have connectivity to the outside world in the event of a power outage. Call Re-routing Solutions – Carrier Line Diversity  ,[object Object],PBX POP POP Lucent  5ESS ILEC Central  Office Customer  Premises POP POTS  Service
Access Diversity Solutions – Underlying Carrier Diversity  PAETEC designed our network with the ability to change underlying Long Distance (LD) carriers within minutes.  ,[object Object],Customer  Premises ,[object Object],PBX POP POP Lucent  5ESS LD Carrier  1 LD Carrier  2 LD Carrier  3
Access Diversity Solutions – Access Provider Diversity PAETEC designed our fully redundant data backbone to peer with multiple Tier 1 upstream Internet providers.  ,[object Object],Customer  Premises ,[object Object],PBX POP POP Lucent  5ESS Peering  Partner 1 Peering  Partner 2 Peering  Partner 3
[object Object],[object Object],[object Object],[object Object],Access Diversity Solutions – Local POP Diversity  Customer  Premises POP Diversity is a mitigation strategy aimed at protecting your business from any disruptions in the connectivity between your location and your service provider’s central office.  PBX POP POP Lucent  5ESS POP POP
[object Object],[object Object],[object Object],Access Diversity Solutions – TruConnect Diversity  TruConnect is a diversity product that provides total voice redundancy and encompasses:
Access Diversity Solutions – TruConnect Diversity  With TruConnect, PAETEC will provision your voice services through multiple central office switching centers.  ,[object Object],[object Object],[object Object],[object Object],PBX POP POP NY 1  5ESS POP POP Customer  Premises NY 2 5ESS
PAETEC’s Call Re-routing Solutions Direct Trunk Overflow DTO Remote Access 800# Call Forwarding 800# Diversity
DTO is a mitigation strategy aimed at protecting your business from a disruption at the POP or at your business location.  Call Re-routing Solutions – Direct Trunk Overflow (DTO) ,[object Object],[object Object],[object Object],PBX POP Lucent  5ESS Customer  Premises Back-up  Call Center
DTO Remote Access takes DTO to the next level. With the service customers have the ability to change their DTO forwarding number without contacting the NOC.  Call Re-routing Solutions – DTO Remote Access  ,[object Object],[object Object],PBX POP Lucent  5ESS Customer  Premise Back-up  Call Center
Call Re-routing Solutions – 8XX Call Forwarding ,[object Object],[object Object],[object Object],Toll-Free customers have the ability to subscribe to 8XX Call Forwarding, a service used to overflow calls to a secondary route choice when a busy, no answer, or out-of-service state is encountered at a facility. Second Location Unavailable Call Goes to Voicemail Call is Routed to  Secondary Location Main Reception Line Is Out of Service Customer  places a call  to Main 800#
Call Re-routing Solutions – 800# Redundancy  PAETEC will also be able to provide 800# redundancy in markets with multiple central offices. PBX POP POP Rochester  5ESS POP POP Customer  Premises Albany 5ESS PAETEC can provision part of a customers circuit with DID numbers for the 800 service 800#’s will be provisioned in 2 diverse switches. If the one switch is unavailable PAETEC can update SMS national to send the 800 traffic thru the secondary switch. Inbound  800 Calls
MPLS and Internet Redundancy Solutions   MPLS with redundant application servers MPLS for redundant Internet access   Redundant Data Connectivity using BGP  E-mail Scanning Email Scanning as a Backup Email Solution
Customer Example MPLS customer with 3 remote sites Data Center at Corporate Site Remote sites connected via PAETEC’s redundant MPLS Network SECURETEC Private-IP MPLS MPLS is PAETEC’s next-generation VPN solution used to connect two or more customer locations in a shared secure environment as opposed to using point-to-point connections. With MPLS,  each site is virtually connected to every other site providing a fully meshed data network. Single point of failure is the loss of the corporate site since it houses the only data center.  MPLS Routing  Domain Aggregate  Router Router IP  Phone ETHERNET Corporate Site Site 3 Site 2 Data Center Firewall Internet ETHERNET
SECURETEC Private-IP MPLS - DR Solution Redundant Application Servers Since MPLS provides a fully meshed data network, any remote site can be used as a redundant data center instead of a spoke and hub architecture. Mission-critical applications continue to function due to MPLS and the Redundant App Server. If the Corporate Site is lost, all other locations traffic automatically re-routes to the back-up site.   Add a redundant application server at Site 3 to mitigate the single point-of-failure. MPLS Routing  Domain Aggregate  Router Router IP  Phone ETHERNET Corporate Site Back-up DR  Site Site 2 Data Center Firewall Internet Back-up App  Server ETHERNET
SECURETEC Private-IP MPLS - DR Solution Diverse Internet Routes Many companies will backhaul all Internet traffic to the Corporate Site over MPLS to save costs.   ,[object Object],[object Object],MPLS Routing  Domain Aggregate  Router Router IP  Phone ETHERNET Corporate Site Back-up DR  Site Site 2 Data Center Firewall Internet Back-up App  Server Firewall Aggregate  Router Router ETHERNET
SECURETEC Private-IP MPLS – with Network Firewall MPLS Routing  Domain Router IP  Phone ETHERNET Corporate Site Back-up DR  Site Site 2 Data Center Internet Back-up App  Server Network  Firewall By utilizing PAETEC’s new network firewall product with MPLS you can add additional Internet diversity to  your network architecture.   ,[object Object],[object Object],[object Object],ETHERNET Network  Firewall
Access Diversity Solutions – Redundant Data Connectivity Using BGP  By using BGP 4, PAETEC can provision diverse redundant connectivity for your Data Services. BGP constantly checks for the best route for your data traffic.  By provisioning multiple data circuits sent to two aggregate routers companies can provision geographically diverse data paths.  In the event your first connection is unavailable  traffic will be re-routed via the secondary path.  Data  Network Aggregate  Router 2 Router ETHERNET Corporate Site Data Center Firewall Aggregate  Router 1 ETHERNET Terminating  Location Data  Network
[object Object],[object Object],[object Object],[object Object],E-mail Scanning is PAETEC’s   fully managed, Internet-level, e-mail security product that provides your company with premier virus and spam protection, as well as remote back-up e-mail storage.  E-mail Scanning Service – DR Solution  E-mail Scanning  Server Farm E-mail Sender E-mail Receiver E-mail Server  (Receiver) E-mail Server (Sender) Internet
Sample Customer Architecture
[object Object],[object Object],[object Object],[object Object],Sample Customer Architecture Primary Method of Interfacing with customers is via 800 or Web. ,[object Object],[object Object],[object Object],[object Object],[object Object],PSTN Router Site 4 Site 2 Internet Site 3 Corporate Site PBX
Voice Service Overview Current Architecture 2 T1’s at Corporate 1 T1 at all remote sites Proposed Suggestions POP Diversity Have Each T1  at corporate sent to different POPS Switch Module Diversity Terminate Each T1 at a diverse Switch Module Carrier Line Diversity Add POTS service that is not provisioned thru the PBX at all remote sites.  Lines should be set up to hunt. Direct Trunk Overflow Add Direct Trunk Overflow to each site Interrelate the 2 diverse T1’s at corporate to auto fail over Interrelate the remote sites to auto failover to  POT’s service PSTN Site 4 Site 2 Site 3 Corporate Site PBX POP DTO
Current Architecture 1 T1 Point-to-Point at each location to corporate Data Center is at Corporate Site 4 Site 2 Site 3 Corporate Site Router Proposed Changes Replace Point-to-Point service with MPLS Provision a backup application server at one of the customers remote sites  Add a secondary route to the Internet from backup site Data Service Overview MPLS Routing  Domain Internet
Current Architecture 8XX services are currently designed to terminate at the customers Corporate location. Proposed Suggestions 8XX Call Forwarding Add 8XX call forwarding and create custom Decision Graphs for various  Disaster Scenarios. ,[object Object],[object Object],8XX Service Overview PSTN Site 4 Site 2 Site 3 Corporate Site PBX
Thank You For Your Attention! Questions, Comments? Please contact Mark Lawrence Peay 310.621.8226 [email_address]

Contenu connexe

Tendances

Panasonic KX-NS700 Telephone System Info
Panasonic KX-NS700 Telephone System InfoPanasonic KX-NS700 Telephone System Info
Panasonic KX-NS700 Telephone System Infobest4systems
 
z/OS V2R2 Communications Server Overview
z/OS V2R2 Communications Server Overviewz/OS V2R2 Communications Server Overview
z/OS V2R2 Communications Server OverviewzOSCommserver
 
Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...
Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...
Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...zOSCommserver
 
Aspect UIP Logical Architecture
Aspect UIP Logical ArchitectureAspect UIP Logical Architecture
Aspect UIP Logical ArchitectureVishad Garg
 
CoLab session 1 deployment best practices and architecture
CoLab session 1   deployment best practices and architectureCoLab session 1   deployment best practices and architecture
CoLab session 1 deployment best practices and architectureChristina Inge
 
Sysplex in a Nutshell
Sysplex in a NutshellSysplex in a Nutshell
Sysplex in a NutshellzOSCommserver
 
Beyond trunking: The next wave of SIP transformation
Beyond trunking: The next wave of SIP transformationBeyond trunking: The next wave of SIP transformation
Beyond trunking: The next wave of SIP transformationAvaya Inc.
 
TN3270 Access to Mainframe SNA Applications
TN3270 Access to Mainframe SNA ApplicationsTN3270 Access to Mainframe SNA Applications
TN3270 Access to Mainframe SNA ApplicationszOSCommserver
 
Contact Center Terminology
Contact Center TerminologyContact Center Terminology
Contact Center TerminologyVishad Garg
 
Avaya AMTELCO Infinity Operator Console integration notes
Avaya AMTELCO Infinity Operator Console integration notesAvaya AMTELCO Infinity Operator Console integration notes
Avaya AMTELCO Infinity Operator Console integration notesAMTELCO
 
entVoice Unified Communication System
entVoice Unified Communication SystementVoice Unified Communication System
entVoice Unified Communication SystemAshvini Gaur
 
Contact Center fundamentals for Kids
Contact Center fundamentals for KidsContact Center fundamentals for Kids
Contact Center fundamentals for KidsJulian Frank
 
z/OS Through V2R1Communications Server Performance Functions Update
z/OS Through V2R1Communications Server Performance Functions Updatez/OS Through V2R1Communications Server Performance Functions Update
z/OS Through V2R1Communications Server Performance Functions UpdatezOSCommserver
 
Lik Brochure V 5.6
Lik Brochure V 5.6Lik Brochure V 5.6
Lik Brochure V 5.6andrewkc
 
IMS DC Self Study Complete Tutorial
IMS DC Self Study Complete TutorialIMS DC Self Study Complete Tutorial
IMS DC Self Study Complete TutorialSrinimf-Slides
 
z/OS Communications Server: z/OS Resolver
z/OS Communications Server: z/OS Resolverz/OS Communications Server: z/OS Resolver
z/OS Communications Server: z/OS ResolverzOSCommserver
 
Siphon Networks Overview V1
Siphon Networks Overview V1Siphon Networks Overview V1
Siphon Networks Overview V1guest82fe9d6
 

Tendances (20)

Panasonic KX-NS700 Telephone System Info
Panasonic KX-NS700 Telephone System InfoPanasonic KX-NS700 Telephone System Info
Panasonic KX-NS700 Telephone System Info
 
z/OS V2R2 Communications Server Overview
z/OS V2R2 Communications Server Overviewz/OS V2R2 Communications Server Overview
z/OS V2R2 Communications Server Overview
 
[브로셔]NGN
[브로셔]NGN[브로셔]NGN
[브로셔]NGN
 
Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...
Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...
Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...
 
Aspect UIP Logical Architecture
Aspect UIP Logical ArchitectureAspect UIP Logical Architecture
Aspect UIP Logical Architecture
 
CoLab session 1 deployment best practices and architecture
CoLab session 1   deployment best practices and architectureCoLab session 1   deployment best practices and architecture
CoLab session 1 deployment best practices and architecture
 
IP Routing on z/OS
IP Routing on z/OSIP Routing on z/OS
IP Routing on z/OS
 
CAMEL
CAMELCAMEL
CAMEL
 
Sysplex in a Nutshell
Sysplex in a NutshellSysplex in a Nutshell
Sysplex in a Nutshell
 
Beyond trunking: The next wave of SIP transformation
Beyond trunking: The next wave of SIP transformationBeyond trunking: The next wave of SIP transformation
Beyond trunking: The next wave of SIP transformation
 
TN3270 Access to Mainframe SNA Applications
TN3270 Access to Mainframe SNA ApplicationsTN3270 Access to Mainframe SNA Applications
TN3270 Access to Mainframe SNA Applications
 
Contact Center Terminology
Contact Center TerminologyContact Center Terminology
Contact Center Terminology
 
Avaya AMTELCO Infinity Operator Console integration notes
Avaya AMTELCO Infinity Operator Console integration notesAvaya AMTELCO Infinity Operator Console integration notes
Avaya AMTELCO Infinity Operator Console integration notes
 
entVoice Unified Communication System
entVoice Unified Communication SystementVoice Unified Communication System
entVoice Unified Communication System
 
Contact Center fundamentals for Kids
Contact Center fundamentals for KidsContact Center fundamentals for Kids
Contact Center fundamentals for Kids
 
z/OS Through V2R1Communications Server Performance Functions Update
z/OS Through V2R1Communications Server Performance Functions Updatez/OS Through V2R1Communications Server Performance Functions Update
z/OS Through V2R1Communications Server Performance Functions Update
 
Lik Brochure V 5.6
Lik Brochure V 5.6Lik Brochure V 5.6
Lik Brochure V 5.6
 
IMS DC Self Study Complete Tutorial
IMS DC Self Study Complete TutorialIMS DC Self Study Complete Tutorial
IMS DC Self Study Complete Tutorial
 
z/OS Communications Server: z/OS Resolver
z/OS Communications Server: z/OS Resolverz/OS Communications Server: z/OS Resolver
z/OS Communications Server: z/OS Resolver
 
Siphon Networks Overview V1
Siphon Networks Overview V1Siphon Networks Overview V1
Siphon Networks Overview V1
 

En vedette

Mumford, kelsey graphing
Mumford, kelsey graphingMumford, kelsey graphing
Mumford, kelsey graphingKSMumford
 
Case Study - HPs Own Data Centre Transformation
Case Study - HPs Own Data Centre TransformationCase Study - HPs Own Data Centre Transformation
Case Study - HPs Own Data Centre TransformationHPDutchWorld
 
Internet Data Center the Business
Internet Data Center   the BusinessInternet Data Center   the Business
Internet Data Center the BusinessMehmet Cetin
 
IDC : Intelligent systems - next big opportunity
IDC : Intelligent systems - next big opportunityIDC : Intelligent systems - next big opportunity
IDC : Intelligent systems - next big opportunityalain Clapaud
 
Cisco Sona
Cisco SonaCisco Sona
Cisco Sonajayconde
 
Simplex Cyprus Data Center Presentation
Simplex Cyprus Data Center PresentationSimplex Cyprus Data Center Presentation
Simplex Cyprus Data Center PresentationSimplex
 
The Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINALThe Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINALJohn Baumgarten
 
Less14 Br Concepts
Less14 Br ConceptsLess14 Br Concepts
Less14 Br Conceptsvivaankumar
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
Network Admin D R P
Network  Admin    D R PNetwork  Admin    D R P
Network Admin D R Pcolmbennett
 
Datacenter and cloud developments and challenges in China
Datacenter and cloud developments and challenges in ChinaDatacenter and cloud developments and challenges in China
Datacenter and cloud developments and challenges in ChinaTerry Graham
 
Factors Affecting the Continuity of Architectural Identity
Factors Affecting the Continuity of Architectural IdentityFactors Affecting the Continuity of Architectural Identity
Factors Affecting the Continuity of Architectural Identitydrboon
 
Mobile Internet Connectivity
Mobile Internet ConnectivityMobile Internet Connectivity
Mobile Internet Connectivitynayakslideshare
 
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...CAST
 
Challenges of Growing Internet Connectivity in India
Challenges of Growing Internet Connectivity in IndiaChallenges of Growing Internet Connectivity in India
Challenges of Growing Internet Connectivity in IndiaAPNIC
 
Next Generation Data Centre - IDC Infravision
Next Generation Data Centre - IDC InfravisionNext Generation Data Centre - IDC Infravision
Next Generation Data Centre - IDC InfravisionDamian Hamilton
 
Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Likan Patra
 
Project Report On Data Center Management
Project Report On Data Center ManagementProject Report On Data Center Management
Project Report On Data Center ManagementDipak Bora
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsGene Carboni
 
Getting Started with the Hybrid Cloud: Enterprise Backup and Recovery
Getting Started with the Hybrid Cloud: Enterprise Backup and RecoveryGetting Started with the Hybrid Cloud: Enterprise Backup and Recovery
Getting Started with the Hybrid Cloud: Enterprise Backup and RecoveryAmazon Web Services
 

En vedette (20)

Mumford, kelsey graphing
Mumford, kelsey graphingMumford, kelsey graphing
Mumford, kelsey graphing
 
Case Study - HPs Own Data Centre Transformation
Case Study - HPs Own Data Centre TransformationCase Study - HPs Own Data Centre Transformation
Case Study - HPs Own Data Centre Transformation
 
Internet Data Center the Business
Internet Data Center   the BusinessInternet Data Center   the Business
Internet Data Center the Business
 
IDC : Intelligent systems - next big opportunity
IDC : Intelligent systems - next big opportunityIDC : Intelligent systems - next big opportunity
IDC : Intelligent systems - next big opportunity
 
Cisco Sona
Cisco SonaCisco Sona
Cisco Sona
 
Simplex Cyprus Data Center Presentation
Simplex Cyprus Data Center PresentationSimplex Cyprus Data Center Presentation
Simplex Cyprus Data Center Presentation
 
The Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINALThe Edge of Disaster Recovery - May Events Presentation FINAL
The Edge of Disaster Recovery - May Events Presentation FINAL
 
Less14 Br Concepts
Less14 Br ConceptsLess14 Br Concepts
Less14 Br Concepts
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Network Admin D R P
Network  Admin    D R PNetwork  Admin    D R P
Network Admin D R P
 
Datacenter and cloud developments and challenges in China
Datacenter and cloud developments and challenges in ChinaDatacenter and cloud developments and challenges in China
Datacenter and cloud developments and challenges in China
 
Factors Affecting the Continuity of Architectural Identity
Factors Affecting the Continuity of Architectural IdentityFactors Affecting the Continuity of Architectural Identity
Factors Affecting the Continuity of Architectural Identity
 
Mobile Internet Connectivity
Mobile Internet ConnectivityMobile Internet Connectivity
Mobile Internet Connectivity
 
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
Big Data, Big Problems: Avoid System Failure with Quality Analysis - Webinar ...
 
Challenges of Growing Internet Connectivity in India
Challenges of Growing Internet Connectivity in IndiaChallenges of Growing Internet Connectivity in India
Challenges of Growing Internet Connectivity in India
 
Next Generation Data Centre - IDC Infravision
Next Generation Data Centre - IDC InfravisionNext Generation Data Centre - IDC Infravision
Next Generation Data Centre - IDC Infravision
 
Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?Who are the INTERNET SERVICE PROVIDERS?
Who are the INTERNET SERVICE PROVIDERS?
 
Project Report On Data Center Management
Project Report On Data Center ManagementProject Report On Data Center Management
Project Report On Data Center Management
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery Methods
 
Getting Started with the Hybrid Cloud: Enterprise Backup and Recovery
Getting Started with the Hybrid Cloud: Enterprise Backup and RecoveryGetting Started with the Hybrid Cloud: Enterprise Backup and Recovery
Getting Started with the Hybrid Cloud: Enterprise Backup and Recovery
 

Similaire à PAETEC Disaster Recovery & Business Continuity Solutions

Business Continuity from PAETEC
Business Continuity from PAETECBusiness Continuity from PAETEC
Business Continuity from PAETECTracey Gaffney
 
Telepacific's Hosted Telephone System
Telepacific's Hosted Telephone System Telepacific's Hosted Telephone System
Telepacific's Hosted Telephone System Bob Moore
 
Implementing High-Quality Global Voice Solutions
Implementing High-Quality Global Voice SolutionsImplementing High-Quality Global Voice Solutions
Implementing High-Quality Global Voice SolutionsProdapt Solutions
 
Telesphere Presentation Linked In
Telesphere Presentation Linked InTelesphere Presentation Linked In
Telesphere Presentation Linked Inguest6c3339
 
Linked In Bob Johnson
Linked In Bob JohnsonLinked In Bob Johnson
Linked In Bob Johnsonwaregl
 
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISEANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISEAIRCC Publishing Corporation
 
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISEANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISEijcsit
 
DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...
DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...
DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...AIRCC Publishing Corporation
 
IP Telephony ROI Presentation.pptx
 IP Telephony ROI Presentation.pptx IP Telephony ROI Presentation.pptx
IP Telephony ROI Presentation.pptxWissamRichani1
 
Crosscode Technologies Private Limited - Company profile
Crosscode Technologies Private Limited - Company profileCrosscode Technologies Private Limited - Company profile
Crosscode Technologies Private Limited - Company profileacuser30
 
Contact Center Call Detail Reporting
Contact Center Call Detail ReportingContact Center Call Detail Reporting
Contact Center Call Detail ReportingConnect First
 
ADC FSN-EH-2
ADC FSN-EH-2ADC FSN-EH-2
ADC FSN-EH-2savomir
 
Teckinfo- Call center software solutions | Complete inbound and outbound solu...
Teckinfo- Call center software solutions | Complete inbound and outbound solu...Teckinfo- Call center software solutions | Complete inbound and outbound solu...
Teckinfo- Call center software solutions | Complete inbound and outbound solu...Teckinfo Solutions Pvt. Ltd.
 
Nortel NTN424BH
Nortel NTN424BHNortel NTN424BH
Nortel NTN424BHsavomir
 

Similaire à PAETEC Disaster Recovery & Business Continuity Solutions (20)

Business Continuity from PAETEC
Business Continuity from PAETECBusiness Continuity from PAETEC
Business Continuity from PAETEC
 
Telepacific's Hosted Telephone System
Telepacific's Hosted Telephone System Telepacific's Hosted Telephone System
Telepacific's Hosted Telephone System
 
Srikanth-Resume
Srikanth-ResumeSrikanth-Resume
Srikanth-Resume
 
World Phone IP_PBX_Proposal
World Phone IP_PBX_ProposalWorld Phone IP_PBX_Proposal
World Phone IP_PBX_Proposal
 
Talking SIP Sales Presentation
Talking SIP Sales PresentationTalking SIP Sales Presentation
Talking SIP Sales Presentation
 
Plexus Bpo Services Pvt. Ltd.
Plexus Bpo Services Pvt. Ltd.Plexus Bpo Services Pvt. Ltd.
Plexus Bpo Services Pvt. Ltd.
 
Hosted PBX Suite
Hosted PBX SuiteHosted PBX Suite
Hosted PBX Suite
 
Implementing High-Quality Global Voice Solutions
Implementing High-Quality Global Voice SolutionsImplementing High-Quality Global Voice Solutions
Implementing High-Quality Global Voice Solutions
 
Telesphere Presentation Linked In
Telesphere Presentation Linked InTelesphere Presentation Linked In
Telesphere Presentation Linked In
 
Linked In Bob Johnson
Linked In Bob JohnsonLinked In Bob Johnson
Linked In Bob Johnson
 
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISEANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
 
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISEANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
 
DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...
DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...
DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...
 
IP Telephony ROI Presentation.pptx
 IP Telephony ROI Presentation.pptx IP Telephony ROI Presentation.pptx
IP Telephony ROI Presentation.pptx
 
Jvvnl 071108
Jvvnl 071108Jvvnl 071108
Jvvnl 071108
 
Crosscode Technologies Private Limited - Company profile
Crosscode Technologies Private Limited - Company profileCrosscode Technologies Private Limited - Company profile
Crosscode Technologies Private Limited - Company profile
 
Contact Center Call Detail Reporting
Contact Center Call Detail ReportingContact Center Call Detail Reporting
Contact Center Call Detail Reporting
 
ADC FSN-EH-2
ADC FSN-EH-2ADC FSN-EH-2
ADC FSN-EH-2
 
Teckinfo- Call center software solutions | Complete inbound and outbound solu...
Teckinfo- Call center software solutions | Complete inbound and outbound solu...Teckinfo- Call center software solutions | Complete inbound and outbound solu...
Teckinfo- Call center software solutions | Complete inbound and outbound solu...
 
Nortel NTN424BH
Nortel NTN424BHNortel NTN424BH
Nortel NTN424BH
 

PAETEC Disaster Recovery & Business Continuity Solutions

  • 1. PAETEC Disaster Recovery & Network Diversity Solutions
  • 2.
  • 3. Critical BC/DR Program Elements Corporate Charter Established in order to develop the mission and goals of the BC/DR program Executive-Level Champions Identify individuals within the organization who promote, support, and lead the BC/DR team Resources Align resources to ensure the plan can be implemented if needed Level of Exposure Determine the appropriate level of exposure your organization can tolerate
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. PAETEC’s Network Diversity / Redundancy Options PAETEC’s portfolio of network diversity options can be used to mitigate threats to the key components in your network architecture. These options provide inherent (core) diversity, as well as customized (edge) diversity solutions: Inherent Central Office Redundancy Access Diversity Solutions Call Rerouting Solutions MPLS and Internet Redundancy Solutions Email Scanning as a Backup Email Solution
  • 9. Access Diversity Solutions Carrier Line Diversity Underlying Carrier Diversity Access Provider Diversity POP Diversity TruConnect Diversity Inherent Central Office Redundancy Switch Module Diversity Back-up Power and Routine Diagnostics
  • 10.
  • 11. Inherent Diversity - Central Office Facilities Power Commercial power backed up by diesel powered generator DC Plant has N+1 redundancy (For DC power rectification) Battery plant is engineered for a Minimum of 4 hr backup Generator is tested bi weekly and can run for 12 - 24 hrs on one tank of fuel. Routine Diagnostic Exercise Each week every redundant piece of equipment is tested and switched to the redundant side to verify that the hardware is working properly. Battery Plant Central Office Commercial Power Generator Rectifier Transfer Switch
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. PAETEC’s Call Re-routing Solutions Direct Trunk Overflow DTO Remote Access 800# Call Forwarding 800# Diversity
  • 19.
  • 20.
  • 21.
  • 22. Call Re-routing Solutions – 800# Redundancy PAETEC will also be able to provide 800# redundancy in markets with multiple central offices. PBX POP POP Rochester 5ESS POP POP Customer Premises Albany 5ESS PAETEC can provision part of a customers circuit with DID numbers for the 800 service 800#’s will be provisioned in 2 diverse switches. If the one switch is unavailable PAETEC can update SMS national to send the 800 traffic thru the secondary switch. Inbound 800 Calls
  • 23. MPLS and Internet Redundancy Solutions MPLS with redundant application servers MPLS for redundant Internet access Redundant Data Connectivity using BGP E-mail Scanning Email Scanning as a Backup Email Solution
  • 24. Customer Example MPLS customer with 3 remote sites Data Center at Corporate Site Remote sites connected via PAETEC’s redundant MPLS Network SECURETEC Private-IP MPLS MPLS is PAETEC’s next-generation VPN solution used to connect two or more customer locations in a shared secure environment as opposed to using point-to-point connections. With MPLS, each site is virtually connected to every other site providing a fully meshed data network. Single point of failure is the loss of the corporate site since it houses the only data center. MPLS Routing Domain Aggregate Router Router IP Phone ETHERNET Corporate Site Site 3 Site 2 Data Center Firewall Internet ETHERNET
  • 25. SECURETEC Private-IP MPLS - DR Solution Redundant Application Servers Since MPLS provides a fully meshed data network, any remote site can be used as a redundant data center instead of a spoke and hub architecture. Mission-critical applications continue to function due to MPLS and the Redundant App Server. If the Corporate Site is lost, all other locations traffic automatically re-routes to the back-up site. Add a redundant application server at Site 3 to mitigate the single point-of-failure. MPLS Routing Domain Aggregate Router Router IP Phone ETHERNET Corporate Site Back-up DR Site Site 2 Data Center Firewall Internet Back-up App Server ETHERNET
  • 26.
  • 27.
  • 28. Access Diversity Solutions – Redundant Data Connectivity Using BGP By using BGP 4, PAETEC can provision diverse redundant connectivity for your Data Services. BGP constantly checks for the best route for your data traffic. By provisioning multiple data circuits sent to two aggregate routers companies can provision geographically diverse data paths. In the event your first connection is unavailable traffic will be re-routed via the secondary path. Data Network Aggregate Router 2 Router ETHERNET Corporate Site Data Center Firewall Aggregate Router 1 ETHERNET Terminating Location Data Network
  • 29.
  • 31.
  • 32. Voice Service Overview Current Architecture 2 T1’s at Corporate 1 T1 at all remote sites Proposed Suggestions POP Diversity Have Each T1 at corporate sent to different POPS Switch Module Diversity Terminate Each T1 at a diverse Switch Module Carrier Line Diversity Add POTS service that is not provisioned thru the PBX at all remote sites. Lines should be set up to hunt. Direct Trunk Overflow Add Direct Trunk Overflow to each site Interrelate the 2 diverse T1’s at corporate to auto fail over Interrelate the remote sites to auto failover to POT’s service PSTN Site 4 Site 2 Site 3 Corporate Site PBX POP DTO
  • 33. Current Architecture 1 T1 Point-to-Point at each location to corporate Data Center is at Corporate Site 4 Site 2 Site 3 Corporate Site Router Proposed Changes Replace Point-to-Point service with MPLS Provision a backup application server at one of the customers remote sites Add a secondary route to the Internet from backup site Data Service Overview MPLS Routing Domain Internet
  • 34.
  • 35. Thank You For Your Attention! Questions, Comments? Please contact Mark Lawrence Peay 310.621.8226 [email_address]

Notes de l'éditeur

  1. MessageLabs provides a completely managed service which means it removes the cost and operational burden of constantly monitoring and updating e-mail systems, significantly reducing the total cost of ownership of any organization’s e-mail infrastructure. This slide outlines the benefits of the MessageLabs service. What we deliver: Up to 100% clean inbox without viruses, spam or unwanted content e-mail threats stopped and stored away from your network A predictable cost that requires no additional hardware, software or updates, delivering low total cost of ownership (TCO) Easy and location independent setup and administration Worldwide 24 x 7 service and support with threat monitoring and response Dynamic service providing real time protection at time of virus outbreaks Added e-mail management services such as e-mail continuity, disaster recovery, e-mail attack and directory harvest protection Ability to easily and rapidly deliver future e-mail security services   Benefits Protects Internet bandwidth and e-mail infrastructure, storage and archiving by reducing e-mail volumes Protects internal resources and productivity Increased continuity and accessibility of e-mail applications and infrastructure Protects and controls users and company image with detection of unacceptable images and content according to e-mail acceptable usage policies Protects and controls against loss of intellectual property, disclosure of confidential information, defamation of company name, abuse of e-mail and protection from potential legal action.
  2. MessageLabs provides a completely managed service which means it removes the cost and operational burden of constantly monitoring and updating e-mail systems, significantly reducing the total cost of ownership of any organization’s e-mail infrastructure. This slide outlines the benefits of the MessageLabs service. What we deliver: Up to 100% clean inbox without viruses, spam or unwanted content e-mail threats stopped and stored away from your network A predictable cost that requires no additional hardware, software or updates, delivering low total cost of ownership (TCO) Easy and location independent setup and administration Worldwide 24 x 7 service and support with threat monitoring and response Dynamic service providing real time protection at time of virus outbreaks Added e-mail management services such as e-mail continuity, disaster recovery, e-mail attack and directory harvest protection Ability to easily and rapidly deliver future e-mail security services   Benefits Protects Internet bandwidth and e-mail infrastructure, storage and archiving by reducing e-mail volumes Protects internal resources and productivity Increased continuity and accessibility of e-mail applications and infrastructure Protects and controls users and company image with detection of unacceptable images and content according to e-mail acceptable usage policies Protects and controls against loss of intellectual property, disclosure of confidential information, defamation of company name, abuse of e-mail and protection from potential legal action.