Pages

Wednesday, 24 April 2013

Infrastructure Network Diagrams

Delineated are network diagrams which were designed to fit together precisely within our infrastructure. Most of the pictorial representations are self-explanatory. I tried to improve the quality of representations via e-Draw Max 6.1 and Visio 2013.  Being the Systems & Infrastructure Manager for the past years I have provisioned all possible redundancy solutions within our budgeted infrastructure right from production site to the disaster recovery site leveraging counterproductive threats and balancing risks.
Our Data Center is of Tier 4 world class methodology, designed to host mission critical servers and computer systems, with fully redundant subsystems (cooling, power, network links, storage etc) and compartmentalized security zones controlled by biometric access controls methods, CCTVs etc.  Components are fully fault-tolerant including uplinks, chillers, HVAC systems, everything is indeed dual-powered. DR Site is another integral part of our architecture.

Cluster of Business Applications
Cluster of Database Servers. Based on audit recommendations we had to move out few elements out of domain. Complete admin privilege was granted to non-IT selective staff. We are currently working with Microsoft for the Azure Cloud hosting for our website. Evaluation for which has been completed. appox. USD25k agreed for the services on Azure Cloud.
Under virtual infrastructure we have VMWare and Microsoft HyperV with almost 100 VMs hosted under it both production and development. Other Database servers and SAN dependency servers includes Citrix XenApps with OTP, MSExchange 2010, SharePoint 2010, Symantec Enterprise Vault, Microsoft GP, McAfee Anti-virus and Anti-spyware, Blackberry, In-house developed Apps and SharePoint 2010 Website.
Infrastructure Management Servers.
Most of the monitoring, alerting and auditing third party apps what we have are from ManageEngine viz. ManageEngine Service Desk, ManageEngine AD Audit Plus, ManageEngine AD Manager, ManageEngine Desktop Central, ManageEngine OpManager, NEXTThink Finder, McAfee Endpoint Encryption for laptops, RAIDar NAS Storage and Real-Time replication apps - DocAve from Avepoint.
Production Servers – BluePrint
Three-Tier SharePoint 2010 Architecture (workflow). SharePoint 2010 intranet services remains uninterrupted even if 4 servers listed above goes offline. SQL failover cluster takes care of switching over from passive mode to active mode. Application layer doesn't really matter even if that breaks down. We have indexing and crawling server and CA server at the middle tier. At web front end layer we have NLB enabled servers to distribute the load and redundancy.
SharePoint 2010 replication to the disaster recovery site is performed using a third-party tool from AvePoint titled DocAve. It works great.
Consolidated SQL Cluster Farm
- one of my objectives in the past was to consolidate the SQL environment so as to cut short the massive licensing cost (USD20k perpetual per SQL) of SQL Enterprise counts. I took this lead to achieve the target by migrating and upgrading the SQL mix environments from SQL 2005 32bit/64bit to SQL 2008R2 Ent. with Failover Cluster on Windows Server 2008 R2 Failover Cluster. 
Consolidated environment
Proposed architecture when we had MOSS 2007. We upgraded MOSS 2007 to SharePoint 2010. It was an in place upgrade.


Architecture Includes the following hardware and OS:

H/w used: 
Avaya VoIP Telephony Rack Switch

Citrix Access Gateway

HP BL460c G6

HP Blade System Enclosure C7000

HP DL360 G4p

HP DL360 G5

HP DL380 G4

HP DL380 G5

HP DL380 G7

HP DL380p Gen8

Quantum Scalari500 Tape Library

Tipping Point210E

HP 42U Rack
Avaya 42U Rack

OS: Microsoft Windows Server 2008 R2 Enterprise SP1 (32bit/ 64bit), Server 2003 Ent. R2

1 comment:

  1. To keep your devices secure from unwanted breaches, you should use trusted security software. McAfee Activate can keep your personal information protected from the risks of cyber attacks and unauthorized intrusions. To maintain the subscription and activate the full version of McAfee Total Security, you can purchase the McAfee product key. Unlike other security software, McAfee Activation is easy to set up and start protection for your computers and smart phones.

    ReplyDelete