OUR LAYERED APPROACH
All Easynet solutions are uniquely developed to meet our
customers’ needs, using a layered approach. Let us show you
how Easynet could develop such an infrastructure for your
business in the following scenario, using web-oriented
architecture as an example:
Internet Connectivity Traffic Management
Our global broadband IP backbone with carrier-class routing and Individual servers often do not cope with the high volume inquiries
switches, transfers in and outgoing IP traffic from the Internet to they face, so we use traffic controllers to distribute the load
your server farm and again back into the Internet. The on-net transparently by individual routes to several systems. This has the
infrastructure ensures high availability, fast response times and benefit of increased output and a higher availability at load peaks.
quality of service and direct connectivity to all major internet Traffic controlling can also steer data between different data
exchanges around the world, as well as network termination with centre locations.
more than 500 leading global networks through direct peering.
Front-end
Security Solutions
Web and Application Servers perform the primary work of the
The latest firewalls and content security appliances protect your hosting solution. They also represent the presentation layer of a
data against unauthorised access. solution. Web servers will deliver the content to the end users
supported by the application servers which will compile the
The security solutions can deliver: information.
identity management providing secure application access Back-end
and management according to your security policy
This layer contains the database service and storage systems that
controlled access from the public internet so that your store e-commerce data such as product catalogues, user
administrators and editors will have a secure connection information, and shipping information.
to the hosting platform
The structure of front-end and back-end servers differs in each
protection against malicious code, spam, trojans, and hosting environment. This will depend very strongly on your
denial of service attacks on your hosting solution. individual requirements. There are different storage system options
(dedicated or shared) and often customers will have several
systems, for the different tasks, in place. Through the economical
employment of shared systems, advantages such as large capacity,
high availability and performance can be made available right from
the start of your solution.
7
8