Font
Large
Medium
Small
Night
Prev Index    Favorite Next

11.2

At 10:00 a.m. on New Year's Day, Manager Yu organized the project department and project party to hold the last coordination meeting to discuss the specific implementation of this network separating plan.

This meeting lasted a whole day, mainly discussing how to deal with the risk of cutting and seizure?!

In fact, ten days ago, the technical team led by Manager Yu had already made corresponding preparations, including how to cut, how to avoid risks, how to eliminate the impact on system operation, etc., and finally formed the current implementation plan.

At the morning meeting, the main problem of system data delivery was mainly solved.

The ultimate goal of this is to further solve various problems that may arise before and after the migration of system data, as well as countermeasures, and to prepare for the migration of physical equipment in the old system.

The project company first reported the data migration of previous old systems and raised some current problems during the transfer process. Then the participants conducted specific analysis and discussion on these existing problems.

Migrating old data in the system is not a particularly difficult task for managers and others.

What the two sides discussed next is the data problems that may arise after the new system is cut.

After some discussion, the two parties reached a basic agreement based on the solution proposed by the manager.

First, for data that may have differences after the summary data migration, Manager Yu asked the project company to arrange a special person to conduct sampling inspections and analyze and find the reasons for the differences in the data. For those inconsistent in the system database, one case will be found and the other case will be corrected.

Second, the project company must conduct data comparison, the difference is between technical and non-technical problems. For the difference data of technical problems, the manager arranges personnel to be responsible for solving; for the difference data of non-technical problems, the project company will check the difference data, and then both parties will find a way to solve it on the spot.

The third is to migrate the physical equipment of the stored original system and complete the full backup of the old system data. This will prevent the network structure of the original system from changing after the migration and ensure the normal operation of the system.

In addition, after the new system is officially launched, both parties will seize the time to clean up the historical data in the "cache pool" at the same time, and try to complete the cleanup of historical data before the end of October.

During the short time of lunch, Wang Youjie found Manager Yu who was eating a boxed lunch and reported to him a not-so-good news in the temporary test room.

In the last simulation test, Wang Youjie finally found that this network separating may cause the risk that some users will not be able to access the system.

In fact, not only did he, but all the personnel in the test team also agreed and supported Wang Youjie's view.

The King of the morning meeting did not attend.

This time, Wang Youjie decided to be responsible for the separation of the customer network in accordance with the company's arrangements in the project coordination and specific implementation. Therefore, from morning to now, he has been conducting various final tests before going online in the temporary work room prepared by the project party.

Manager Yu was surprised and stared at Wang Youjie.

Wang Youjie once again explained the discoveries and opinions of his own team and the test team, and then proposed solutions from his own perspective.

Manager Yu looked away and looked at the snow-white wall in front of him. There was no movement for a long time.

The room was quiet and the needle could be heard.

"Although the risks are foreseeable, time no longer allows us to make any major adjustments to the plan." After a long time, Manager Yu thought about it and said, "Because the companies of both parties have already decided that the Internet must be cut tonight on the 1st, that is, tonight, and the new system must be launched on the 2nd, that is, tomorrow."

The king has no sound.

He knew that in fact, not only the new system must be launched at the specified time, but also the stable operation must be ensured. On the Fourth, the morning of the first day after the holiday, the new system was launched. As a major event for himself and the client company, the senior management of both units were actually in Shanghai at this moment, waiting for them to settle and then hold a celebration of champagne.

To what Mr. An said to himself, no matter what, the project must be foolproof and the beginning must be achieved.

Manager Yu stared at Wang Youjie and said slowly: "You should also know that it seems that at this time, we can only solve these risks while doing it."

Wang Youjie lowered his head and said nothing.

As the manager walked away, Sister Zhou came over to comfort Wang Youjie and said, "It's only half past one now. We have nearly ten hours to go online. We can still do a lot of work."

Wang Youjie sighed and said, "Go and call all your brothers and sisters over."

Continue the meeting in the afternoon.

This time, it was Wang Youjie's turn to give a lecture on the projected large screen. The focus of his explanation was on the perspective of system cutting and safety.

The company's IT business covers information system development, system operation and maintenance and information services. The development, testing and daily operation and maintenance of business systems are outsourcing.

Judging from the structural diagram, the company's existing network system is a secondary architecture, including its headquarters and more than 20 offices below.

Wang Youjie said that according to the actual situation of the project company, when performing system separating, this time, some structural divisions were focused on the security domain planning:

The domain is the first layer structure of this security domain division, and the principle of division is business behavior. The overall design plan of the project company's security domain is divided into 4 domains, namely the security service domain, the security management support domain, the secure access domain and the security interconnection domain. The subdomain is the second layer structure of this security domain division, and the principle of division is the level and type of threats, and it is further divided into 7 areas in the design.

Then, Wang Youjie opened the corresponding network topology diagram drawn and explained and explained it in detail one by one.

In addition to physical lines, including the preparation of optical fiber and network cables, he focused on explaining and emphasizing two points:

First, key tasks in the security field include interception of external service areas and security interconnection areas; interception of core/non-core business service areas; interception of development/test service areas; interception of headquarters and office office access areas, etc.

The second is implementation requirements. All relevant parties clarify their tasks and corresponding responsibilities, divide the personnel, perform their duties, and have their own responsibilities; make necessary switching preparations; all new equipment is offline configured, and the test work is mainly conducted during cutting; estimate the switching time; specify detailed factual steps and corresponding inspection procedures in chronological order.
Chapter completed!
Prev Index    Favorite Next