Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

Company Profile of

dotsilicon
Limited

WWW.DOTSiLiCON.COM
This Page Intentionally Left Blank.
Every Imagination starts from a DOT and the
Technology of this current Universe is running on
SILICON chip. We represent fabulous creativity in
our every single work with the blend of
Imagination and Technology. It is what we
called “The State of Technology”.
TABLE OF CONTENTS
1. At A Glance .................................................................................................... : Page 1 - 2

 Beginning

 Meaning of the name

 A Brief

 Mission

 Products

 Services

 Virtual Products
 Digital Services

2. About Dotsilicon ................................................................................................... : Page 3

3. Datacenter & Network Details ............................................................................... : Page 3

4. Our Virtual Datacenter Details .............................................................................. : Page 4

5. Why our Virtual Datacenter? ............................................................................ : Page 4 - 5

6. Security ........................................................................................................... : Page 5 - 9

7. 24 X 7 Server Monitoring ................................................................................ : Page 9 -10

8. Data Protection & Disaster Recovery Plans .................................................. : Page 10 - 11

9. Load Balancing Configuration ...................................................................... : Page 11 - 12

10. Contact Address ............................................................................................... : Page 13

11. Our Social Presencea ........................................................................................ : Page 14


AT A GLANCE

DOTSILICON LIMITED : COMPANY PROFILE | PAGE 1 OF 14


 Beginning: Founded in October 27, 2007.

 Meaning of the name: Beginning of everything is starts from a DOT, no matter whether it is a
Thinking, an Imagination, a Dream, a Star, or a Galaxy; even the beginning of this universe started
from a DOT.

And, the Technology of this current Universe is running on SILICON chip. A silicon chip, also known as
a semiconductor chip or integrated circuit (IC), is a small piece of silicon that contains electronic
circuits. It serves as the foundation for most modern electronics and is used in various applications
1
such as computers, smartphones, and communication devices.

In 1824 Swedish chemist Jöns Jacob Berzelius in Stockholm discovered Silicon. The name “Silicon” is
2
derived from the Latin 'silex' or 'silicis', meaning flint.

3
Now it is called digital gold. It is the material of choice in the chip industry. Unlike the metals
normally used to conduct electrical currents, silicon is a ‘semiconductor’, meaning that its conductive
properties can be increased by mixing it with other materials such as phosphorus or boron. This
4
makes it possible to turn an electrical current on or off.

The presence of Silicon is everywhere! 27.7% of Planet Earth is Silicon. It is made from sand, and it is
5
the second most abundant element on earth after oxygen.

The interesting thing is, Silicon used in a semiconductors such as an integrated circuits (IC) is
6
99.999999999% pure, it is ultra-high-purity (the so-called “eleven nines”).

The essence of our company name is DOT and SILICON, Because, we represent fabulous creativity in
our every single work with the blend of Imagination and Technology. It is what we called “The State of
Technology”.

REFERENCES:
www.dotsilicon.com

1. Lenovo: https://www.lenovo.com/us/en/glossary/silicon-chip
2. Royal Society of Chemistry: https://www.rsc.org/periodic-table/element/14/silicon#hdr_col_history
3. Pulse Tech: https://www.youtube.com/watch?v=woDLbw3nfT4
4. ASML: https://www.asml.com/en/technology/all-about-microchips/microchip-basics
5. Royal Society of Chemistry: https://www.rsc.org/periodic-table/element/14/silicon#hdr_exp_uses
6. Hitachi: https://www.hitachi-hightech.com/global/en/knowledge/semiconductor/room/about/silicon.html

DOTSILICON LIMITED | Holding # 1/A, Plot # 27 (2nd Floor), Milk Vita Road, Mirpur-7, Dhaka – 1216 | Hotline: +88 01617 222 444 | Email: info@dotsilicon.com
 A Brief: Dotsilicon is an arena of Sales Automation, Web Design, Web Based Software Development,

DOTSILICON LIMITED : COMPANY PROFILE | PAGE 2 OF 14


Web Hosting, Corporate Email Hosting, Domain Registration, and Digital (SSL) Certificate Provider. We
are popular for our attractive design concepts. Serving more than 700+ valued customers from SME to
Corporate, Personal to Government Organizations since 2007.

In June 2015 we launched our first foreign office in Sydney, Australia. After Covid-19 pandemic we
started marketing and supply Electrics Gadgets, Office Accessories, Souvenirs, Gift Items, and
Showpieces. Also, we are capable to supply large volume of printing items such as customized printed
T-shirts, Mugs, Crests, NFC Business Cards, Elite Quality Business Cards, and Royal Standard
Certificates.

 Mission: Providing International standard products and quality services in a native flavor.

 Products: Electrics Gadgets, Office Accessories, Souvenirs, Gift Items, and Showpieces

 Services: Corporate Branding, Offset Lithography Printing, Display Printing, UV Printing, Transfer
Printing, Dye Sublimation Printing, Digital Printing, and Screen Printing.

 Virtual Products: Customized CMS - Siteadmin, Inventory Manager, CRM, Accounting & Billing
Software, Bloodbank Directory, Web Hosting, VPS, Dedicated Server, Corporate Email Hosting, Digital
Certificate.

 Digital Services: Corporate and SME Website Development, Online News Portal Development,
eCommerce Website Development, Domain Name Registration, Corporate Logo Design, Video Editing,
Digital Content Creation, IT Consultancy.
www.dotsilicon.com

DOTSILICON LIMITED | Holding # 1/A, Plot # 27 (2nd Floor), Milk Vita Road, Mirpur-7, Dhaka – 1216 | Hotline: +88 01617 222 444 | Email: info@dotsilicon.com
Dotsilicon - A state of technology

DOTSILICON LIMITED : COMPANY PROFILE | PAGE 3 OF 14


Dotsilicon Limited is a comprehensive provider of business and sales automation, cloud-based software
development, eCommerce solutions, web development, web hosting, corporate email hosting, domain
registration, and digital (SSL) certificates. Since our inception in 2007, we have proudly served over 700 clients,
ranging from SMEs to large corporations, and including private and government organizations.

Our Strengths
We are renowned for our attractive design concepts, unique ideas, and exceptional customer support. Our
products are designed to be dynamic, contemporary, and user-friendly, requiring no downloads or
programming knowledge. Simply connect online to access our cloud-based solutions from anywhere, at any
time.

Security and Data Protection


Security and data protection are paramount in our cloud-based products. We utilize cutting-edge RAID
hardware to safeguard all server data against hard disk failures. Additionally, our specialized software enables
24/7 server monitoring, preventing unauthorized access and ensuring data integrity.

Global Presence
In June 2015, we expanded our reach by launching our first international office in Sydney, Australia.

New Ventures Post-Covid-19


Following the Covid-19 pandemic, we have diversified our offerings to include marketing and supplying a
variety of electronic gadgets, office accessories, souvenirs, gift items, and showpieces. We are also equipped
to handle large volume printing projects, offering customized printed t-shirts, mugs, crests, NFC business
cards, elite quality business cards, and royal standard certificates.

Dotsilicon Limited continues to innovate and expand, providing high-quality, user-friendly solutions to meet
the evolving needs of our clients.

Datacenter & Network Details


www.dotsilicon.com

We have pioneered the concept of a Globally distributed Virtual Datacenter. Our Virtual Datacenter is a
globally distributed collection of redundant server infrastructure which hosts all our Products and Services.

Salient features of our Virtual Datacenter


 Integrates hundreds of distributed servers seamlessly
 Provides high-availability, redundancy and unmatched reliability

DOTSILICON LIMITED | Holding # 1/A, Plot # 27 (2nd Floor), Milk Vita Road, Mirpur-7, Dhaka – 1216 | Hotline: +88 01617 222 444 | Email: info@dotsilicon.com
Our Virtual Datacenter Details

DOTSILICON LIMITED : COMPANY PROFILE | PAGE 4 OF 14


Our Virtual Datacenter consists of servers distributed across various Datacenters worldwide. Most of these
datacenters have certain common qualifications described below -

Network
The datacenters are connected to the internet through Gigabit ethernet connections from separate backbone
providers, who each run fiber optic cables into the data center through separate entry points.

Security
To guard against line failure or intrusion, the data center is staffed 24 hours a day. Movement throughout the
facility is escorted at ALL times. There is 24x7 closed circuit monitoring of all areas and entrances. Between the
cameras, access control, and the security team, the datacenter facilities are pretty secure.

Power
The total incoming power is a multiple of what is required to run the datacenter. There is an ATS (Automatic
Transfer switch) in place to automatically kick in a generator in case of a power failure. The datacenters are
also equipped with redundant UPS systems to ensure clean power.

Cooling
Redundant A/C systems, each running at a fraction of their capacity, keep the server rooms cool. The units are
alternated so that each one is kept in optimal condition.

Advanced Smoke Detection & Fire Protection Systems


The datacenters are equipped with specialized fire detection and protection systems meant specifically for
protecting servers as using ordinary water based systems would cause just as much damage as fire.

Why our Virtual Datacenter?


Scalability & Reliability
www.dotsilicon.com

Our Virtual Datacenter consists of a complex mesh of global servers that interact with each other. The entire
architecture is built upon common principles of High-Availability, Clustering and n+1 Architecture. This allows
us to scale our solutions to match your exponential growth by simply adding infrastructure and linking it to this
architecture. You are abstracted from worrying about variables such as scalability, uptime, network response
etc.

DOTSILICON LIMITED | Holding # 1/A, Plot # 27 (2nd Floor), Milk Vita Road, Mirpur-7, Dhaka – 1216 | Hotline: +88 01617 222 444 | Email: info@dotsilicon.com
Global Reach

DOTSILICON LIMITED : COMPANY PROFILE | PAGE 5 OF 14


We and our partners have invested in infrastructure deployments at various locations globally. You can now
leverage upon this global infrastructure and offer a completely private-labeled global experience to your
Customers without any investments. We handle the selection, negotiation and relationship management with
Infrastructure providers around the world.

Security
Our Holistic Security Approach
In order to reduce security risks to minimum, a holistic approach to security is required. Our security processes
are born out of a clear definition of the threats to our system.

Security threats are a result of the various interaction points that an application provides to the external world,
and the various users that can interact with these interfaces. For instance Your Customers, Your Resellers, Your
staff, Our Staff, Anonymous Internet Users and Third Party Servers are interacting with our Systems at any
given point of time. Each of these actors need to have different access levels and different rights and
permissions.

Security Goals
 Privacy - Information within our infrastructure and systems will only be accessible by authorized users
 Integrity - Data and information within our infrastructure cannot be tampered with by any
unauthorized user
 Data Protection - Data within the systems cannot be harmed, deleted or destroyed
 Identification and Authentication - Ensures that any user of the system is who he claims to be and
eliminates chances of impersonation
 Network Service Protection - Ensures that networking equipment is protected from malicious hacking
attempts or attacks that threaten uptime

Our Holistic Security Model


Our global datacenter partnerships are a result of a comprehensive Due diligence process. Security and
www.dotsilicon.com

stability are two of the most important variables in our due diligence process. All datacenters are equipped
with surveillance cameras, biometric locks, authorization-based access policies, limited datacenter access,
security personnel, and similar standard security equipment, processes and operations. What separates us
however is the fact that our due diligence process also incorporates a measure of proactiveness demonstrated
by the datacenter towards security. This is measured by evaluating past practices, customer case studies, and
the amount of time the datacenter dedicates towards security research and study.

DOTSILICON LIMITED | Holding # 1/A, Plot # 27 (2nd Floor), Milk Vita Road, Mirpur-7, Dhaka – 1216 | Hotline: +88 01617 222 444 | Email: info@dotsilicon.com
Level 1 - Datacenter Security

DOTSILICON LIMITED : COMPANY PROFILE | PAGE 6 OF 14


Our global datacenter partnerships are a result of a comprehensive Due diligence process. Security and
stability are two of the most important variables in our due diligence process. All datacenters are equipped
with surveillance cameras, biometric locks, authorization-based access policies, limited datacenter access,
security personnel, and similar standard security equipment, processes and operations. What separates us
however is the fact that our due diligence process also incorporates a measure of proactiveness demonstrated
by the datacenter towards security. This is measured by evaluating past practices, customer case studies, and
the amount of time the datacenter dedicates towards security research and study.

Level 2 - Network Security


Our global infrastructure deployments incorporate DDOS mitigators, Intrusion Detection systems, and
Firewalls both at the edge and the Rack level. Our deployments have weathered frequent hacking and DDOS
attempts (sometimes as many as 3 in a single day) without any degradation.

Protection against Distributed Denial-of-Service (DDoS) Attacks


Denial of Service is currently the top source of financial loss due to cybercrime. The goal of a Denial-of-Service
attack is to disrupt your business activities by stopping the operation of your web site, email or web
applications. This is achieved by attacking the servers or network that host these services and overloading the
key resources such as bandwidth, CPU and memory. The typical motives behind such attacks are extortion,
bragging rights, political statements, damaging competition etc. Virtually any organization that connects to the
Internet is vulnerable to these attacks. The business impact of large sustained DoS attacks is colossal, as it
would lead to lost profits, customer dissatisfaction, productivity loss etc due to inavailability or deterioration of
service. A DoS attack in most cases would even land you with the largest bandwidth overage invoice that you
have ever seen.

Our Distributed Denial-of-Service protection system provides unrivaled protection against DoS and DDoS
attacks on your internet-facing infrastructures i.e. your websites, email and mission critical web applications,
by using sophisticated state-of-the-art technology which automatically triggers itself as soon as an attack is
launched. The DDoS mitigator's filtering system blocks almost all fraudulent traffic and ensures that legitimate
traffic is allowed up to the largest extent possible. These systems have seamlessly protected several web sites
from large service outages caused by simultaneous attacks as large as 300+ Mbps in the past, thus allowing
organizations to focus on their Business.
www.dotsilicon.com

Firewall Protection
Our round-the-clock firewall protection system secures the perimeter and delivers the very best first line of
defense. It uses highly adaptive and advanced inspection technology to safeguard your data, website, email
and web applications by blocking unauthorized network access. It ensures controlled connectivity between the
servers that store your data and the Internet through the enforcement of security policies devised by subject
matter experts.

DOTSILICON LIMITED | Holding # 1/A, Plot # 27 (2nd Floor), Milk Vita Road, Mirpur-7, Dhaka – 1216 | Hotline: +88 01617 222 444 | Email: info@dotsilicon.com
DOTSILICON LIMITED : COMPANY PROFILE | PAGE 7 OF 14
Network Intrusion Detection system
Our network intrusion detection, prevention and vulnerability management system provides rapid, accurate
and comprehensive protection against targeted attacks, traffic anomalies, "unknown" worms,
spyware/adware, network viruses, rogue applications and other zero-day exploits. It uses ultramodern high-
performance network processors that carry out thousands of checks on each packet flow simultaneously with
no perceivable increase in latency. As packets pass through our systems, they are fully scrutinized to
determine whether they are legitimate or harmful. This method of instantaneous protection is the most
effective mechanism of ensuring that harmful attacks do not reach their targets.

Level 3 - Host Security


Hardware Standardization
We have standardized on hardware vendors that have a track record of high security standards and quality
support. Most of our infrastructure and datacenter partners use equipment from Cisco, Juniper, HP, Dell etc.

Host Based Intrusion Detection System


With the advent of tools that are able to bypass port blocking perimeter defense systems such as firewalls, it is
now essential for enterprises to deploy Host-based Intrusion Detection System (HIDS) which focuses on
monitoring and analyising the internals of a computing system. Our Host-based Intrusion Detection System
assists in detecting and pinpointing changes to the system and configuration files - whether by accident, from
malicious tampering, or external intrusion - using heuristic scanners, host log information, and by monitoring
system activity. Rapid discovery of changes decreases risk of potential damage, and also reduces
troubleshooting and recovery times, thus decreasing overall impact and improving security and system
availability.

Level 4 - Software Security


Our applications run on myriad systems with myriad server software. Operating Systems include various
flavors of Linux, BSD, Windows. Server Software includes versions and flavors of Apache, IIS, Resin, Tomcat,
Postgres, MySQL, MSSQL, Qmail, Sendmail, Proftpd etc etc. We ensure security despite the diverse portfolio of
software products we utilize by following a process-oriented approach.

Timely Application of Updates, Bug Fixes and Security Patches


www.dotsilicon.com

All servers are registered for automatic updates to ensure that they always have the latest security patch
installed and that any new vulnerabilities are rectified as soon as possible. The largest number of intrusions
result from exploitation of known vulnerabilities, configuration errors, or virus attacks where countermeasures
ARE already available. According to CERT, systems and networks are impacted by these events as they have
"not consistently" deployed the patches that were released.

DOTSILICON LIMITED | Holding # 1/A, Plot # 27 (2nd Floor), Milk Vita Road, Mirpur-7, Dhaka – 1216 | Hotline: +88 01617 222 444 | Email: info@dotsilicon.com
We fully understand the requirement for strong patch and update management processes. As operating

DOTSILICON LIMITED : COMPANY PROFILE | PAGE 8 OF 14


systems and server software get more complex, each newer release is littered with security holes. Information
and updates for new security threats are released on an almost daily basis. We have built consistent,
repeatable processes and a reliable auditing and reporting framework which ensures that all our systems are
always up-to-date.

Periodic Security Scans


Frequent checks are run using enterprise grade security software to determine if any servers have any known
vulnerabilities. The servers are scanned against the most comprehensive and up-to-date databases of known
vulnerabilities. This enables us to proactively protect our servers from attacks and ensure business continuity
by identifying security holes or vulnerabilities before an attack occurs.

Pre-Upgrade testing processes


Software upgrades are released frequently by various software vendors. while each vendor follows their own
testing procedures prior to release of any upgrade, they cannot test inter-operability issues between various
software. For instance a new release of a database may be tested by the Database vendor. However the
impact of deploying this release on a production system running various other FTP, Mail, Web Server software
cannot be directly determined. Our system administration team documents the impact analysis of various
software upgrades and if any of them are perceived to have a high-risk, they are first beta-tested in our labs
before live deployment.

Level 5 - Application Security


All of the application software that is used in the platform is built by us. We do not outsource development.
Any 3rd party Products or Components go through comprehensive training and testing procedures where all
elements of such products are broken down and knowledge about their architecture and implementation is
transferred to our team. This allows us to completely control all variables involved in any particular Product. All
applications are engineered using our proprietary Product Engineering Process which follows a proactive
approach towards security. Each application is broken down into various components such as User Interface,
Core API, Backend Database etc. Each layer of abstraction has its own security checks, despite the security
checks performed by a higher abstraction layer. All sensitive data is stored in an encrypted format. Our
engineering and development practices ensure the highest level of security with regards to all application
software.
www.dotsilicon.com

Level 6 - Personnel Security


The weakest link in the security chain is always the people you trust. Personnel, Development staff, Vendors,
essentially anyone that has privileged access to your system. Our Holistic Security Approach attempts to
minimize security risk brought on by the "Human Factor". Information is divulged only on a "need-to-know"

DOTSILICON LIMITED | Holding # 1/A, Plot # 27 (2nd Floor), Milk Vita Road, Mirpur-7, Dhaka – 1216 | Hotline: +88 01617 222 444 | Email: info@dotsilicon.com
basis. Authorization expires upon the expiry of the requirement. Personnel are coached specifically in security

DOTSILICON LIMITED : COMPANY PROFILE | PAGE 9 OF 14


measures and the criticality of observing them.

Every employee that has administrator privileges to any of our servers goes through a comprehensive
background check. Companies that skip out on this are putting to risk all sensitive and important data
belonging to their customers, as no matter how much money is invested into high-end security solutions, one
wrong hire - having the right amount of access - can cause greater damage than any external attack.

Level 7 - Security Audit Processes


In a vast deployment of globally distributed servers, audit processes are required to ensure process replication
and discipline. Are all servers being patched regularly? Are the backup scripts running all the time? Are offsite
backups being rotated as desired? Are appropriate reference checks being performed on all personnel? Is the
security equipment sending out timely alerts? These and many such questions are regularly verified in an out-
of-band process that involves investigation, surveys, ethical hacking attempts, interviews etc. Our audit
mechanisms alert us to a kink in our security processes before it is discovered by external users.

24 X 7 Server Monitoring
Our infrastructure comprises of high availability clusters of different machines, with varied operating systems
and applications, spread across multiple continents.

An effective monitoring system is extremely crucial for ensuring maximum uptime. Today, any web services
company manages hundreds of servers with a large number of services running on each server. Manually
checking each service on just one server 24 x 7 is extremely difficult - across a number of servers - is humanly
impossible. Companies that do not have a good monitoring system, or worse, don't have one at all, have larger
downtimes and are increasing the risk of potential damage caused due to service disruptions. An undetected
minor issue can change into a major issue rapidly, increasing the amount of damage caused.

Our monitoring systems and tools provide our system administrators with an all-encompassing view into the
health of our globally distributed infrastructure. We monitor a large number of parameters related to the
health of our servers and individual services that reside on them.
www.dotsilicon.com

Services monitored include -

 Network Connectivity
 Server Disk Space
 Server CPU Usage

DOTSILICON LIMITED | Holding # 1/A, Plot # 27 (2nd Floor), Milk Vita Road, Mirpur-7, Dhaka – 1216 | Hotline: +88 01617 222 444 | Email: info@dotsilicon.com
 Server Memory Usage

DOTSILICON LIMITED : COMPANY PROFILE | PAGE 10 OF 14


 Web Services - HTTP, HTTPS & FTP
 Email Services - SMTP, POP & IMAP
 Database Services - MySQL, MSSQL
 DNS Services
 All Log Files

and More...
If any server or service fails, or any resource utilization exceeds specified limits, then a notification pops-up
immediately on the screens of all our Infrastructure Monitoring Staff. The notification system also handles
escalation of issues i.e. if the issue is not resolved within 'x' minutes, SMS alerts are sent out to higher level
system administrators, and subsequently to the Management.

All of this allows us to detect and resolve any issue within minutes of it happening and ensures maximum
uptime for your customers.

Data Protection & Disaster Recovery Plans


We understand that data is the lifeblood of most companies today and organizations increasingly require 100%
uptime, where data is constantly online and accessible. We have therefore implemented solid solutions that
allows you to protect your data in the unfortunate event of software malfunction, system failure, events of
loss of data due to hacking or viruses etc.

Live Backup (RAID Technology)


We use cutting-edge RAID Hardware to protect all data on the server against harddisk failures. This technology
works by creating a mirror of all data on more than one harddisk automatically, without any delay i.e. all data
is written to multiple harddisks simultanously so that if any harddisk fails, that harddisk will be marked as
deactivated and the system will still continue to function as though nothing has happened by using the copy of
the data on the other harddisk(s). The best part is that you do not require to make any changes or special code
modifications in your website/web application for this technolgy to function.
www.dotsilicon.com

RAID systems offer a significant advantage over non-RAID systems, both in terms of data protection and ability
to maintain 100% uptime, as the system continues to function perfectly in case of disk failures. RAID
technology also marginally improves the performance of the various services on the server.

DOTSILICON LIMITED | Holding # 1/A, Plot # 27 (2nd Floor), Milk Vita Road, Mirpur-7, Dhaka – 1216 | Hotline: +88 01617 222 444 | Email: info@dotsilicon.com
If as a harddisk fails, notification alerts are sent out, so that the failed harddisk can be replaced by the system

DOTSILICON LIMITED : COMPANY PROFILE | PAGE 11 OF 14


administrators. As such, the system continues to perform normally despite disk failures, using the mirror of the
data on the additional harddisk(s).

Daily & Weekly Server Backups


Important data exists across various locations on a server. Our subject-matter experts have conducted
comprehensive research and have prepared complex backup scripts that automatically maintain copies of all
important files and folders, in a secure manner, on a regular pre-defined interval, such that we can restore a
server in the shortest possible time, in the event of a total failure.

Your Own Backup Policy Manager


All our services involve your critical data. Most of our Products have a built-in Backup Manager that provides
comprehensive and cost effective protection by allowing you to define highly flexible backup policies that will
protect your critical data. A web-based backup policy manager provides an easy-to-use one-step wizard to
define the backup scope, backup frequency and backlogs.

Load Balancing Configuration


All our Web Services are developed and deployed in a fashion so as to support Load Balancing in order to
provide redundancy and high availability. A Load-Balanced deployment of any Product consists of n+1 Nodes.
Clients are oblivious of the Node that they establish a connection to. Our Products support stateless
connections to ensure that the behavior of the application is independent of the node to which the client
connects.

This document describes the special configuration that our Products support for a Load Balanced Deployment -

Session Persistence
The very essence of load balancing means that if a node goes down a client is seamlessly served by another
node which is up. A client however at any point in time has a large amount of context data that identifies the
clients session with the server, such as shopping cart data, user information, preferences etc. In order to
www.dotsilicon.com

ensure that clients do not perceive any downtime when switching between nodes, our Products create a
central persistent session store which is used commonly by all the nodes

Sticky Sessions
A Node does not go down frequently. Therefore it is an additional performance overhead to load the session
data from the persistent store for every client request. The load balanced architecture is configured in such a

DOTSILICON LIMITED | Holding # 1/A, Plot # 27 (2nd Floor), Milk Vita Road, Mirpur-7, Dhaka – 1216 | Hotline: +88 01617 222 444 | Email: info@dotsilicon.com
fashion that a client continues to connect to the same Node unless that Node goes down, and session data is

DOTSILICON LIMITED : COMPANY PROFILE | PAGE 12 OF 14


fetched from the persistent session store only when a modification is made.

Live monitoring and instant detection of any downtime


Several scripts monitor the health of the various nodes and respond to any downtime. Some of these simply
need to be configured on the Load Balancer. However downtimes are of varied nature. On many occasions a
Node may continue to respond to a port 80 request, but the application itself may not be responding. This
could be due to any resource locks, resource unavailability, memory or Application Server issues. Various
additional scripts also monitor these circumstances and trigger appropriate flags on the Load Balancer to allow
for automated steps to be taken to bring a node back to Operational status.

Upgrades and Bug Patching


With an n+1 architecture it is important to ensure that all Nodes are running the same code at all times. It
would be catastrophic to Data Integrity if there were different codebases running on different nodes. For this
purpose a separate set of deployment scripts are implemented for a Load Balanced setup which ensure that all
modifications, upgrades and patches to any code are replicated across all the Nodes automatically

Synchronous modification of settings


Various parameters and meta-data that the application requires is stored in XML and property files. Each node
has a separate copy of these files that are loaded at start-up time and maintained in memory. Our
implementation ensures that any modification to these files is replicated across the nodes.

Multi-Node Backups
Each node has a separate dynamic data store for various dynamic files that are generated at run-time. When
multiple nodes stretch across servers an intelligent backup agent ensures that all these files are backed up
across all nodes.

NAT to look like a Single Server


Despite the fact that a Load Balanced setup consists of a cluster of servers, various applications require a load
balanced cluster to appear as a single server to the external world. For instance - external resources that these
Web servers connect to may have firewalls which allow connectivity from a set of specified IP addresses. As
the Web Nodes multiply the number of source IP addresses increase. Not all external vendors allow provisions
www.dotsilicon.com

for multiple IP addresses. Therefore an IP Masquerade is setup between the Web Nodes and the Load
Balancer, such that the Web Nodes attempt connections to external resources using virtual IP Addresses which
are then masqueraded by the Load Balancer to the actual live IP Addresses. This allows the entire Load
Balanced cluster to appear as a single server to the external world.

DOTSILICON LIMITED | Holding # 1/A, Plot # 27 (2nd Floor), Milk Vita Road, Mirpur-7, Dhaka – 1216 | Hotline: +88 01617 222 444 | Email: info@dotsilicon.com
Contact Address

DOTSILICON LIMITED : COMPANY PROFILE | PAGE 13 OF 14


DOTSILICON LIMITED
Bangladesh Office # 1: Australia Office:
Holding # 1/A, Plot # 27 (2nd Floor) 12 Campbell Street, Punchbowl, Australia.
Milk Vita Road, Mirpur-7, Dhaka – 1216 ABN: 55 671 828 247
Bangladesh. ACN: 671 828 247

Bangladesh Office # 2: Hotline: +61 045 775 7756


House # 485, Level # 1, Road # 05 Cell & WhatsApp: +8801615678000
Madrasha Road, East Kazipara Email: info@dotsilicon.au
Mirpur, Dhaka – 1216, Bangladesh.

Hotline: +88 01617 222 444


Email: info@dotsilicon.com
Complaint: report@dotsilicon.com
Website: www.dotsilicon.com

www.dotsilicon.com

DOTSILICON LIMITED | Holding # 1/A, Plot # 27 (2nd Floor), Milk Vita Road, Mirpur-7, Dhaka – 1216 | Hotline: +88 01617 222 444 | Email: info@dotsilicon.com
Our Social Presence

DOTSILICON LIMITED : COMPANY PROFILE | PAGE 14 OF 14


a

www.facebook.com/dotsilicon

www.twitter.com/dotsilicon

www.instagram.com/dotsilicon

www.linkedin.com/company/dotsilicon

www.youtube.com/dotsilicon

www.dribbble.com/dotsilicon

www.behance.net/dotsilicon

www.tumblr.com/dotsilicon

www.pinterest.com/dotsilicon

www.slideshare.net/dotsilicon

www.vimeo.com/dotsilicon

www.soundcloud.com/dotsilicon

www.github.com/dotsilicon
www.dotsilicon.com

www.trello.com/dotsilicon

www.scribd.com/dotsilicon

DOTSILICON LIMITED | Holding # 1/A, Plot # 27 (2nd Floor), Milk Vita Road, Mirpur-7, Dhaka – 1216 | Hotline: +88 01617 222 444 | Email: info@dotsilicon.com

You might also like