- Introduction
The alternate processing site is an alternate location that helps in the deployment of business processes in case of a disaster. The site should be geographically located away from the usual location of Pixel Inc. The location should not be prone to environmental hazards and calamities such as blizzards and earthquakes. It should be far from seismic zones that can always trigger an earthquake. It should be capable of providing immediate data processing to maintain the critical services (Rittinghouse & Ransome, 2005).
- Implementing an alternate processing site
Pixel Inc ensures that there is continuity at the alternate processing site in case of a disaster. This helps the information system to be operational, and as such helps the business to transfer its processes and information systems within the specific time frame. The critical equipment includes servers, network switches for the alternative local area network. They can be configured, deployed and synchronized for a smooth transition. On the other hand, security surveillance and biometric systems are installed for controlled admission to accredited staff, and for communication purposes, IP phones are installed at the site to allow for communication. The backup storage systems will be online with incremental backups done to ensure for consistent and constant updates on information. The overall site is on a raised access floor since it helps in proper cable distribution (Curtis, 2011). Servers require Heating ventilation and cooling systems to be installed at the site to help in maintaining optimum temperature and other special ventilation functions that are conducive for proper server functioning (Bearg, 1993), and to improve the quality of indoor air.
Rack
- Mission critical services
Mission critical services on the other hand are crucial services for business process (Weinhardt et al. 2011). They cannot easily be replaced and require a certain level of customization. They are responsible for flawless execution of a whole business unit. This service consists of main servers that control the entire computer system. The servers include Web server, file and print sharing server, database servers, email and Microsoft exchange server. These mission critical services assist employees of Pixel Inc in executing their responsibilities. The web server helps in the management of the web content to help the firm market its services. The print and file server assists in distribution of printers in the network as well as managing documents and the latter provides emailing functions. Another sensitive application is the firewall. This network appliance monitors network traffic and provides a point of demarcation between an internal and a public network. The firewall configurations depend on the access policies, to allow remote connection at given times. The firewall is configured in two dimensions, with the first configuration to monitor the overall network traffic by inspecting individual packets entering the network while the other is implemented on specific computers. DHCP server helps in dynamic allocation of configured IP addresses to computers, printers and other wireless equipment installed at the alternate site. This is made possible by the SOHO firewall, which functions as a DHCP server. Apart from this, other non mission critical services are available that assist in the normal business operations. These include the software’s installed such as the Microsoft office suite, antivirus software and the multimedia authoring software. They are not critical because their breakdown cannot affect the whole network, rather the computers can be isolated and be reconfigured.
The alternate processing site functions on power systems, which act to prevent power problems during power surges. The site utilizes an auto computing mechanism that allows for synchronization with the main site. It uses automatic sensors to trigger the network when the main site goes off at any time. Remote access on the other side allows an administrator to monitor the network health status. The remote access is implemented through a tunneling mechanism called a Virtual Private Network. This technology implements a private network over a public network, such as the internet (Erwin, 1998). It relies on virtual connections rather than a physical connection, which is used to remotely access the site. Security is established through the means of a tunnel, at the same time using an IPSec security protocol. This allows for data encryption by scrambling original text into a text that cannot be intercepted along the way.
The main function of this technology is to secure the remote access and to prevent attacks on Pixel’s Inc computing systems such as the critical services. It utilizes a routing protocol called the Exterior Gateway Routing Protocol, a Cisco proprietary protocol that routes data across the internet. This is provided by a service provider through a set of allocated public IP address. Network address translation is also done at the router and public IP address translated to internal IP addresses for the existing computing devices. On the other hand, an access point broadcasts the network configurations by means of radio waves for laptops to access the network and other resources.
The Cisco Pix firewall adds another layer of security, by inspecting network traffic and drawing inconsistent patterns for further analysis, in order to detect any abnormal behavior. The window server provides DNS services for its services, and translates the domain name into IP based information for processing when other external web servers requests for services. 4. Power Consumption
The Xeon server processor utilizes faster clock speed due to the work specifications. This is because it handles heavy multimedia authoring software, and high speed gigabit bandwidth connection. The server utilizes 60% of power since it is constructed on green technology. 5. Securing the hosting provider’s siteThe hosting provider employs physical security mechanisms for controlled access. This is done using biometric technology that captures individual unique features such as the palm. Through this, only individuals whose features are captured and programmed for access are allowed to access the premises.The site is under the control of a disaster management team who have the responsibility of coordinating the transfer after a disaster. The operations control assists in evacuating personnel, after an automatic dynamic shift of the computing system. A security officer is present to help in providing security to the damaged site and also to assist in documenting salvageable equipment. 6. Bandwidth estimatePixel Inc needs a reliable internet connection to assist the business in its operations. This facilitates the movie shorts when clients are in far locations. It also helps in web connectivity and in the display of multimedia content over the internet. This is because the files that reside in the servers always need to be accessed.This site is crucial for a business. It helps in the continuation of activities in case of an emergency.
References
Bearg, D. W. (1993). Indoor air quality and HVAC systems. Boca Raton, Fla: Lewis Publishers.
Curtis, P. M. (2011). Maintaining mission critical systems in a 24/7 environment. Hoboken, NJ: Wiley.
Mike, E. (1998). Virtual Private Networks, Second Edition. Sebastopol, CA: O'Reilly.
Rittinghouse, J. W., & Ransome, J. F. (2005). Business continuity and disaster recovery for infosec managers. Amsterdam: Elsevier Digital Press.
Weinhardt, C. (2011). Business aspects of web services. Berlin: Springer.