Network Details

WiredHub
strives to keep its hardware and technology up to date
to provide our customers with the very best in performance
and quality.
General
Network Security
Measures taken to minimize malicious attacks and ensure
site availability include the use of:
- Redundant Cisco 7500 Series Routers,
capable of routing up to 120 Gigabits of total traffic
- Fully switched network to prevent
the packet sniffing of TCP connections
- Resistant routing to hold network
attacks at bay by configuration
- Tracking systems to trace malicious
acts (attacks, spamming) to their sources.
- ICMP Filtering and Syn Flood Protection
The Network Operations Center (NOC) provides a 24 x 7
monitoring service, and is capable of responding within
minutes to server failures, attacks or Internet backbone
problems. As a result, the adverse effects of distributed
denial of service (DDoS) and other attacks are minimized.
Network
Providers
The network is fully meshed
and redundant with multiple backbone providers. |
- AT&T
- AboveNet
- NTT
- Savvis
- Global Crossing
- Level 3
- Time Warner Telecom
|
Network Hardware
The Network is comprised of all top-quality Cisco Systems
components including:
- Cisco 7500 Series Border Routers
- Cisco 7200 Series Routers
- Cisco 6500 Series Distribution
Switches
- Cisco 5500 Series Distribution
Switches
- Cisco 3500 Series Switches
|
 |
Complete Power Redundancy
The facility sits atop multiple power grids driven by
TXU electric, includes Liebert and PowerWare UPS battery
backup power, and onsite permanent generator power.
HVAC Climate Control
Our HVAC systems are a combination of glycol, chilled
water, and condenser units by Liebert and Data Aire to
provide redundancy in cooling.
Fire Suppression
Fire suppression includes a pre-action dry pipe system
in both facilities including VESDA (very early smoke detection
apparatus) along with over 600 smoke detectors.
Location Security
The Network Operations Center is protected 24 hours a
day by:
- Security personnel
- Closed-circuit TV system
- Video tape recording
- Individual authentication
- Systems access audits