ISP blueprint/architecture request.
Results 1 to 2 of 2

Thread: ISP blueprint/architecture request.

  1. #1
    Join Date
    Mar 2002
    Location
    UK
    Posts
    62

    ISP blueprint/architecture request.

    Dear all,

    We are approaching to design an architecture for an (internal) ISP for a huge university, something to support 40,000 mailboxes, it's not offical tender yet, but we are doing it as an internal workshop and how do we want the paltform design looks like.

    Does anyone has a blueprint, template, or a typical example of an ISP's architecture? based on Sun systems and software, diagrams if possible.

    I did many searches on the net, but most of the results came up on "Enterprise Architect" sites and references. I couldn't find an example of a real ISP architecture.

    Also, we learned that a typical ISP architecture usually can be segmented into the following four areas:

    - basic services (Mail, Web Hosting, Proxy, ..etc)
    - value-added services (Calendar, WebMail, SMS, AddressBook, Search Engine, ..etc), these can vary from and ISP to another based on the competition.
    - infrastructure services (FTP, DHCP, HTTP, IMPA
    - and operation and management services (JumpStart, Monitoring, Provisioning, Backup, ..etc)

    One more thing, there is a VERY dedicated blueprint book, written by a Sun engineer, but it's not for free, so you have to pay for it. It's very focused on ISP architecture and solution design, but it's out of our reach.

    I couldn't find a good place (forums or anything) to post my request, so I referred back to my favorite place to ask for some help.

    Any ideas? references? links? PDF files? please help us to make a draft architecture.

    Thanks for your assistance
    Drag me ... from my feet .. :P

  2. #2
    Join Date
    Feb 2000
    Location
    26.03°N 80.14°W
    Posts
    9,410
    Books: Web pages:
    Vernon Frazee, Microsoft MVP (Windows - Shell/User)

    Defenses Up!
    Tip: When prompted for a password, give an incorrect one first. A phishing site will accept it; a legitimate one won't.


    Inside Spyware: A Guide to Finding, Removing and Preventing Online Pests


    If you don't keep up with security fixes, your computer|network won't be yours for long.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •