![]() |
|
![]() |
![]() |
HOSTING ARCHITECTURE AND SYSTEMS ICG Link's shared hosting systems and VPS cloud systems architecture is best described as a high-availability private cloud. Services such as web, mail and others are spread across multiple servers with monitoring systems watching everything. If a failure occurs, the system switches the necessary services to backups and notifies our technical people. We maintain a presence in several data centers in Nashville, TN, Atlanta, GA and Phoenix, AZ. Our private hosting cloud spans ATL and PHX in order to be in one of the most connected cities in the country and in a city that is as geographically diverse from the first as possible. From a hardware perspective, the system has a high availability SAN (file storage system) in both ATL and PHX with an N+1 VMware ESXi cluster. Our hosting platform operates across dozens of virtual machines. That the hardware is N+1 means we have enough physical equipment such that if a physical machine breaks, the VMs are automatically moved to another machine until a repair is affected. Some additional highlights of the operations include the following:
In order to avoid overloads, our servers report to our technical people whenever they approach pre-established limits. This allows us to plan well in advance for necessary hardware and software expansions. A two week comparison of our system with the Top 40 business sites on the Internet showed us to be approximately 30% faster than the average. ICG Link, Inc. is committed to providing world-class service from both a people and systems perspective. Our goal is that our experienced staff and system architecture will combine to deliver the support, reliability and performance you need for 24/7/365 web site operation.
ICG Link's server systems are layered for security purposes. The first level of security is our fully redundant firewall/router system. On the second level, only those machines that have a reason to directly access the Internet are located on our "external" network. Client data and monitoring systems exist on our "internal" network behind a third level of security.
|
![]() |
|
![]() |
|