11.2

At 10 a.m. on New Year's Day, Manager Yu organized the project department and the project team to hold a final coordination meeting to discuss the specific implementation of the network cutover plan.

This meeting was held for a whole day, mainly discussing how to deal with cutover risks once they appear.

In fact, as early as the previous ten days, the technical team led by Manager Yu had been making corresponding preparations, including how to cutover, how to avoid risks, how to eliminate the impact on system operation, etc., and finally formed the current implementation plan.

At the morning meeting, the main issue was the delivery of system data.

The ultimate goal of this is to further solve the various problems that may arise before and after the system data migration, as well as how to deal with them, and to prepare for the completion of the physical device migration of the old system.

The project company first reported the data migration situation of the old system and put forward some current problems in the transfer process. Then the participants made specific analysis and discussion on these existing problems.

Migrating old data from the system is not a particularly difficult task for managers.

The next discussion between the two sides is the data problem that may arise after the new system is cutover.

After some discussion, the two parties reached a basic agreement on the basis of the solution proposed by the manager.

First, for the data that may be different after the migration of the summary data, Manager Yu asks the project company to arrange a special person to conduct a sampling inspection, and analyze and find the reasons for the data discrepancies. For inconsistencies in the system database, one case is found and one case is corrected.

Second, the project company should conduct data comparison, and the difference is between technical problems and non-technical problems. For the discrepancy data of technical problems, the manager arranges manpower to be responsible for solving them; For the discrepancies of non-technical problems, the project company will check them, and then the two parties will find a way to solve them on site.

The third is to migrate the physical equipment of the original system and complete the full backup of the old system data. In this way, the network structure of the original system can not be changed after migration, and the normal operation of the system can be ensured.

In addition, after the new system is officially put into operation, both parties will seize the time to clean up the historical data in the "cache pool" at the same time, and try to complete the cleaning of historical data before the end of October.

In the short time of lunch, Wang Youjie found Manager Yu, who was eating a boxed lunch, and reported to him in the temporary test room a not very good news.

In the last simulation test, Wang Youjie finally found that this network cutover may cause some users to lose access to the system.

In fact, not only him, but also all the personnel in the test team agreed with and supported Wang Youjie's view.

Wang Youjie did not attend the morning meeting.

The cutover of the customer network, according to the company's arrangement, decided that Wang Youjie would be responsible for the work of project coordination and specific implementation. Therefore, from this morning until now, he has been doing all kinds of final tests before going online in this temporary workshop prepared by the project team.

Manager Yu was surprised and stared at Wang Youjie.

Wang Youjie once again expounded the findings and views of himself and the test team, and then put forward solutions from his own perspective.

Manager Yu looked away and looked at the snow-white wall in front of him, and there was no movement for a long, long time.

The room was quiet and you could hear the pins dropping.

"Although the risks are predictable, time does not allow us to make any more major adjustments to the plan." After a long time, Manager Yu thought about it and said, "Because the two companies have already decided that the network cutover must be carried out on the night of the 1st, that is, tonight, and on the 2nd, that is, tomorrow, the new system must be launched." ”

The king did not make a sound.

He knew that in fact, not only must the new system be launched at the specified time, but also must ensure its stable operation. On the 4th, that is, the morning of the first day of work after the holiday, the new system was put into operation, as a major event for themselves and the customer company, the senior management of both units, at this moment, are actually already in Shanghai, just waiting for them to settle down, and then hold a celebration meeting of champagne.

In what Mr. An said himself, no matter what, the project must be guaranteed to be foolproof and a good start must be achieved.

Manager Yu stared at Wang Youjie and said slowly: "You should also know that it seems that these risks, at this time, we can only solve them while doing it." ”

Wang Youjie bowed his head and remained silent.

It is equivalent to the manager walking away, Sister Zhou came over to comfort Wang Youjie, and said: "It's only half past one now, and we still have nearly ten hours left in the planned online time, and we can still do a lot of work." ”

Wang Youjie sighed and said, "Go and call all your brothers and sisters." ”

The meeting resumed in the afternoon.

This time, it was Wang Youjie's turn to speak on the big screen of the projection. The focus of his explanation was on the security of this system cutover.

The IT business of this company covers information system development, system operation and maintenance and information services. The development, testing, and daily operation and maintenance of business systems are outsourced.

Judging from the structure diagram, the company's existing network system is a two-level structure, including the headquarters, and more than 20 offices underneath.

Wang Youjie said, so according to the actual situation of the project company, when the system cutover, this time the security domain planning focused on some structural divisions:

Domains are the first layer of security domain division, and the principle of division is business behavior. The overall design plan of the security domain of the project company is divided into four domains, namely the security service domain, the security management support domain, the security access domain and the security interconnection domain. Subdomains are the second layer of security domain division, which is based on the level and type of threats, and is subdivided into seven zones in the design.

Then, Wang Youjie opened the corresponding network topology diagram drawn and explained and explained in detail one by one.

In addition to the basic work such as the preparation of physical lines, including optical fibers and network cables, he focused on two points:

The first is the key work of the security domain, including the cutover of the external service area and the security interconnection domain; Core/non-core business service area cutover; Dev/Test service area cutover; Headquarters, office access area cutover, etc.

The second is the implementation requirements. Relevant parties clarify their own tasks and corresponding responsibilities, carry out the division of labor, perform their own duties, and have their own responsibilities; Make the necessary preparations for the switchover; All new devices are configured offline, and the cutover is mainly for testing. Estimated changeover time; In chronological order, specify detailed factual steps and corresponding examination procedures.

Finally, Wang Youjie emphasized two principles, one is to effectively estimate the risks and consequences of the switchover, make all backups, and prepare a rollback plan; The second is to communicate fully and instantly with relevant business departments.