Work Arounds

Over the last few months we have been rebuilding our network infrastructure which has been evolving with our business over the last 25 years. The last major upgrade we did was in 2002 and since then there have been a lot of additional servers and people added to the company. As we grew and added to our network we kept adapting what we had to make it work, so there were many work arounds and slowly but surely we grew a very complicated tapestry of a network design.  Last year we decided that our engineering team would slowly rebuild our network infrastructure and storage design in between working on customer issues and storage implementations. In addition, we would change our phone system (VOIP) also, but we manage the phone system as part of Administration and not part of our Network.

Once we determined that a rebuild was required we had to decide what was critical infrastructure and what order things could be worked on. Based on what we learned about the new insurance rules on Cyber Liability and Data Breach we determined that we had to keep all data and email functions in house to remain in compliance with the insurance rules and the contracts we had with customers in regards to data security.

Changing our Physical Servers into Virtual Machines was one of the first things we did and the project went well. We were able to reduce our footprint in our server rooms and we learned some tricks of the trade that already have helped us in supporting our customers who are working in Virtual Machine environments. In the process of virtualizing we were able to clean up quite a few accumulated workarounds in our server architecture and we modernized quite a few of the bits and pieces of our network.

Next came the task of upgrading our routing and switching between our locations to help with our Disaster Recovery and Business Continuity plans.  As our network had grown over the last 12 years we had added some interesting work arounds that allowed applications to talk to each other and created subnets for projects that no longer existed. Throughout the process of reengineering our network we had to keep considering what we had to be prepared for over the next few years in business and as we got closer to completing the project a customer had a request that we had not considered and we needed to consider whether to start the work around process again or purchase new equipment to handle the new customer request.

We also decided to outsource our phone system and got rid of our Nortel Meridian system. We researched a lot of providers and when we decided on the provider to go with we still did a lot of testing and tried to anticipate everything that our company and our customers would request. Even though we thought we had covered everything we would need, within a week we had to figure out a way to insert a code into the displayed number to indicate the call routing to the individual user along with a redesign of the way our follow me and hunt groups worked.

Despite our attempt to remove all workarounds, it seems we are constantly having to adapt one part of our Network, Servers  or Storage to some new trigger or requirement, whether it be a virus, malware or a new customer request or service enhancement that we are going to provide.  As a company we are all pretty adaptable to new situations and customer requests, and as we rebuild our network it has become clear that no matter how much we try to build a logical network design, inevitably we are going to have to have some workarounds in the tapestry that is our Zerowait infrastructure.

 

 

This entry was posted in Uncategorized. Bookmark the permalink.