0% found this document useful (0 votes)
81 views16 pages

DCI Final Assignment (HARISH)

TechSys is a data center company that offers configuration and technical services. It aims to design a new data center called M-Care to store healthcare data. The design involves critical building systems like temperature control, power systems, air conditioning, and live data monitoring. It will follow a tier 4 fault-tolerant design with redundant components. The location on the first floor provides benefits for equipment access and cooling. A multi-tier logical design with core, aggregation, and access layers will organize the network topology.

Uploaded by

Gaming World
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views16 pages

DCI Final Assignment (HARISH)

TechSys is a data center company that offers configuration and technical services. It aims to design a new data center called M-Care to store healthcare data. The design involves critical building systems like temperature control, power systems, air conditioning, and live data monitoring. It will follow a tier 4 fault-tolerant design with redundant components. The location on the first floor provides benefits for equipment access and cooling. A multi-tier logical design with core, aggregation, and access layers will organize the network topology.

Uploaded by

Gaming World
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

1.

Introduction
Data centers are made up of different elements that provide reliable, secure positions for data and
materials. The elements shown in the data center encompass power sources, connectivity and
informational support, fire suppression materials, heat ventilation and air conditioning (HVAC)
equipment and monitoring systems. It is an essential platform which can be used as a single or
multiple building with such a designated section to house and host computer servers to generate
and deliver data and services to multiple workstations or customer computer systems. The data
center can be used as an extra-large CPU with an immense storage capacity, cooling and air
conditioning, an infinite power source where the casting can be recognized as the building and
the walls themselves. Data centers behave as a warehouse for such a business that supports
related applications, virtual services and memory size with data to perform advertisement tasks
through the organization's computer networks (T. J.-L. Courvoisier, 2003).

1.1. Service offered by TechSys


TechSys is a data center company that offers configuration and technical services for the
application and network of organizations and also, gives access to small and medium sized
enterprises to multinational companies. TechSys preserves all confidentiality, unbroken power,
efficient bandwidth, construction-resistant disasters, etc. So, more precisely, TechSys represents
the data storage service to its data center to charge a certain proportion as per the customer's
requirements.
2. Problem Statement
The company is required to have a personal database in order to keep the data contained in a
designated data center system that offers a records management service and a database
strengthen accountability between health care company itself and patients for online analytics
and statistics on confidential information.
3. Design
3.1. Critical Building System:
TechSys is a data center company consisting 10 million customers which has designed a building
automation system is looking for the M-Care. Here, TechSys offers a 3d building visualization
and control. As being employee of TechSys focusing on designing a TechSys with various
system such as illumination system, electric power control system, HVAC system, Power
system, security system, heat tracing, plumbing and fire alarm system and so on. Listed features
provided in TechSys (Bryan Anderson, 2016)are:

Figure 1: Critical Building System

 Temperature control:
The main part of data center is where the data are stored i.e., Server room. Constant
temperature should be maintained in server room with 18 degrees. The inaccurate
fluctuation ends up affecting device performance which may cause damage.
 Power System:
Proper power should be maintained because it is an important part of data center. The
main power electricity which is AP electricity board passed to building through UPS. The
UPS makes sure that server is running accurately even though the power is running
effectively and also consists 30 min of backup. When the power gets low there will be
automatic switch on-off generator for system action.
 Air Conditioning:
For comfortable and effective environment, the air conditioner is required which helps in
maintaining work environment of co-workers within the company. By placing air
conditioner at the top of the building might help for co-worker to work smoothly.
 Live data monitoring:
Live data monitoring is one of the new and innovative features that helps in monitoring
data in real-time environment. When there is any Ups and Downs in the system, the data
center administration can manage the issues and deal with that in proper manner (Bryan
Anderson, 2016).
 Protocol:
In TechSys we have to designed for HVAC control, many others facilities are composite
here like lighting, computerized maintenance scheduling, and other life safety functions.
Building should consist of sensors and controllers, actuators and software, all these
functions are controlled by central workstation or web browser.

3.2. Planning and Design:


Planning and Design is taken as most important part of the system. For every project like data
center the design planning has huge involvement. Some of the listed features for designing and
planning data center are (R. Rahmani, 2018):

 Design and development of IT Infrastructure Focused Specifications


 Thermal and Power Management
 Building Design Credit
 Proper treatment of disasters
 Concentration
 Redundancy
 Global implementation
Figure 2: Integrated design of datacenter
The Tier 4 data center seems to be fault-tolerant, permitting any unexpected behavior to occur
while still continuing operations. Tier 4 services do not have a single point of failure. The basic
principle is that the Tier 4 architecture includes a replication of the Tier III design infrastructure.
A fault-tolerant (Tier IV) data center features sufficient capacity resources as well as several
delivery networks servicing the site's computing facilities respectively (R. Rahmani, 2018).

We have chosen Tier IV for M-Care data center design because all IT equipment is double
managed and fully installed to be consistent with the configuration of the site architecture. With
a Tier IV data center, we can predict good output at all times of the year with just 26 minutes of
downtime. This is done by a fully redundant grid as well as robust power outage security, which
can last up to 96 hours.

3.3. Location
Location is amongst the most significant considerations when choosing a data center for M-Care
data center design. Huge funding is required for the establishment of a fully redundant and stable
data center as well as a dedication to continual service and maintenance operational costs. There
are several factors which should be included in the decision-making process for M-Care data
center design as seen below (Gault, 2002):
 Location of the for M-Care data center design on the first floor on grade has benefits as
Freight elevators are not used to transfer massive power and cooling appliances or filled
IT rack in or out and floor loading structural capability is less of a problem as the ground
floor concrete slab is usually much tougher than that of the upper floor office.
 Cooling devices should be placed on the roof or next to the for M-Care data center design
in order to reduce the distance between air and water to be transferred. And roofing
equipment such as air handlers can require a reinforced roof framework (Gault, 2002).
 Without connections to commercial electricity and redundancy or complete access to
secure connectivity, the data center will be useless. To ensure ease of redundancy, a
location with multiple commercial power feeds should be selected for M-Care data center
design. Connection to a wide range of Tier One network providers is important for the
most secure connectivity and consistent uptime (Gault, 2002).
3.4. Logical Design
The importance of the logical model is to provides a description of concepts on a single paper to
promote accountability, coordination and cooperation with stakeholders. Logical models are
popular in public health, although many non-public healthcare organizations have adopted this
methodology. Software logic frameworks track software operation through start to end. Central,
aggregation and access layers are also the basic statistical data center design layers. However, the
architecture model used during the architecture of the M-Care data center seems to be the Multi-
tier Design Model (Underwood, 2002). Which architecture mainly composed of a web, database
and application system tiers operating on various architectures, like a blade server, a single rack
server and mainframes. The Multi-Tier Model consists of 3 layers which are described below.

Figure 3: Multi-tier Network topology

 DC Core layer: The core layer includes a high-speed packet swapping backplane for
certain motions in and out of the data center. That core layer offers access to several
aggregation modules and enables a resilient Layer 3 lined fabric with little system
failure. The core layer operates an internal routing mechanism, such as OSPF or EIGRP,
which carry balances traffic in between campus core and aggregation layers using Cisco
Express Forwarding (CEF)-based hashing algorithms. The core layer is really a layer 3
environment. As just a consequence, the core layer is free from the tree span and the vPC
(Underwood, 2002).
 DC Aggregation layer: The aggregation layer is the border between Layer 3 and Layer 2
for data center infrastructure. The aggregation layer is already a link source for data
center firewalls as well as other utilities in typical designs. Mostly as result, it
consolidates Layer 2 traffic in a higher transmission rate of switching fabric and provides
opportunities for network-based applications just at interface across L2 and L3 in the data
center. The resources offered by aggregation layer are Load balancing, firewalling, and
SSL offloading to databases through access points (Underwood, 2002). Aggregation
layer should be considered a vital component throughout the data center whereas port
density, CPU processing, over-subscription and service modules have particular
consequences for the overall architecture.
 DC Access layer: This is the lowest architecture, in which all servers are mechanically
linked to the network. Usually, it is a fully-fledged L2 domain that may provide L3
access to restrict transmitted domains. While using L3 mostly on access layer, it's really
challenging when using numerous high-availability (HA) functions, including such
VMware HA, NIC teaming, and so on, due to IP addressing specifications. It is proposed
that only L2 be used on the entry layer. The Ethernet or Fiber Channel (FC) protocols
may be used for the storage route. The FC interfaces compose of 1/2/4GBps interfaces
and are connected to the SAN switch, the Cisco MDS network. That back-end elevated
fabric and storage route (10 GE) could also be a popular transmission mechanism by
using IP over Ethernet to access storage (Underwood, 2002).
3.5. Business and Technical Goals
The ultimate purpose of each data center is just to organize the data center facilities efficiently
for 24/7 days. Earlier, company divisions have always had just one approach when advanced
technology was considered essential. Today, there are infinite possibilities. The corporate plan of
the Data Center is not generated out of nowhere and. For making project successful we need
some of the business and technical goals (Chris Loken, 2010). Some of the steps can be carried
out for performing business technology:
 Read more about the goals of the data center plan.
 To implement the basic IT atmosphere.
 Consider the evolution of the IT world.
 Determine the available data center infrastructure.
 Decide whether to be in the data center sector seems to be right choice because, if that is
so, with what degree.
 Recognize the new TCO data center.
 Document And report the specifications of the data center.
 Create the possibilities suggested.
 Contrast the present situation with each hypothetical model.
 Pick the right plan and create a path map to incorporate it.
 It needs time to execute the plan of the Data Center.
 Service Provider as a IT (Chris Loken, 2010).

3.6. Design Requirement or IT hardware requirement


 Power Equipment: Data centers include 24x7 power reliability and availability and must
also use backup systems and multiple network pathways to maintain uninterrupted power
supply (UPS). That's also relevant regardless of the physical placement of the facility,
although it is especially important whenever the data center is situated in a nation or area
where supply voltage is considered to be unstable (Andreades, 2019).
Figure 4: Power Equipment

 Cooling Systems: Data centers enable several processors to be positioned in a small


room in immediate contact to one another. That would be the situation, considering the
interior fans of devices, there seems to be a strong risk that equipment will heat up easily.
Server rooms should also be kept at a particular temperature, as recommended and
designed throughout construction, by means of external HVAC equipment for proper
functioning (Andreades, 2019).

Figure 5: Cooling System


 Cables: Some of the cable are coaxial, twister and fiber optic cables they are mainly used
in data centers for connecting switches, storage devices and applications. The optic fiber
cables allow quicker communication and hence are commonly used during modern data
centers. Even though cables were often consequently accountable for the success and
accurate propagation of data within the network, they play a significant role mostly in
performing of the data center (Andreades, 2019).

Figure 6: Cables

 100 GB Ethernet Switches:


High-speed Ethernet is a necessity for the sharing of massive amounts of data amongst
networks. 100Gb Ethernet seems to be the latest transition to intense internet access in
every data center. Server-to-server connections must be close to automatic for sensitive
workloads, and 100Gb Ethernet takes you one step closer towards this target (Andreades,
2019).
Figure 7: 100 GB Ethernet Switches

 Storage:
NAS as well as SAN are the two mains widely used methods of storage systems in
modern data centers, including SAN allowing greater acceleration and much more
reliable access to stored files with block level information. Except for these specific units,
and without it the Data Center cannot perform, there are a few other aspects which often
do not lend the same value to those of us who set up or participate in it (Andreades,
2019).

Figure 8: Storage

 Blade Server:
Blade servers need less bandwidth, reduced power and much less time to launch. Another
of the key benefits of blade servers is that they now offer solid state drives as default
internal storage. When blade technology progresses and hardware configurations begin to
decrease, they will become the regular feature of the world’s largest data centers
(Andreades, 2019).

Figure 9: Blade Server


4. Maintenance
Unfortunately, often-used machinery can periodically malfunction, crash, or slow down at some
point due to normal wear and tear, however we should take measures to prolong the lifetime of
the most essential assets listed below (Luca Chiaraviglio, 2018):

 Preventive Maintenance: It helps to reduce the risk associated with operating software
for a long time, helping it to become more stable, understandable, and maintainable
(Luca Chiaraviglio, 2018). Similarly, it makes changes and adaptations to your software
so that it can work for a longer period of time to prevent the deterioration of your
software as it continues to adapt and change.
 Corrective Maintenance: Corrective maintenance associates with the maintenance of
any kind which addresses the errors and faults within software applications that could
impact various parts of your software, including the design, logic, and code. These
corrections usually come from bug reports that were created by customers but it can help
to spot them before your customer’s do (Luca Chiaraviglio, 2018).
5. Security
Physical Security: The purpose of physical data center security is to provide unified physical
security solution that integrate with various systems such as CCTV, fire alarm, access control,
intrusion alarm and building management systems (Cabuk, 2010). Some essential Physical
security that we have implemented for building a Data Center are:

Figure 10: Physical security in data center

 The data center building is kept away from headquarters (20 miles typical) and 100 feet
away from the main road, bad neighbors: airports, chemical facilities, power plants etc.
 The data center building wall is made with foot-thick concrete which is a cheap and
effective barrier against the elements and explosive devices.
 A combination of motion-detection devices, low-light cameras, pan-tilt-zoom cameras
are installed around the perimeter of the building.
 Fire protection systems with double interlock and to protect the data and IT equipment,
fire suppression is used with a zoned dry-pipe sprinkler.
 Controlling and monitoring temperature and humidity through proper control of air
conditioning and indirect cooling (Cabuk, 2010).

Logical Security

Logical threats are those that may damage your software systems, data, or network without
actually damaging your hardware. Viruses, DoS attacks, phishing, and Trojans are all examples
of logical threats that spreads through the use of flash drives. To prevent such logical threats
following logical security are implemented in our data center building (Cabuk, 2010):

 Create and maintain excellent backups, in case a breach occurs you can restore your data.
 Firewalls on network access and keeping Anti-spyware and virus detection up to date.
 Training employees on being cautious of social engineering and hacker techniques.
 Authentication, encryption, and having a strong password and changing it regularly.
 Data management tool like VERITAS 360 data management to carry out the task of data
Protection, Availability, and Insight for data (Cabuk, 2010).

6. Conclusion
To sum up, all our team had to recommend the infrastructure of the data center, the appropriate
hardware including technologies. We therefore introduced all of the theoretical concepts to
correctly accomplish the task. Throughout this project, we demonstrated how and where to
layout the architecture of the datacenter. We have attempted to establish a safe data center with
security improvements that is easy for the customer to navigate. The scheme we have suggested
is also cost-effective placement. Similarly, our team addressed cooling capacities, energy
conservation, innovations and strategies that facilitate green data center computing (Beloglazov
& Buyya, 2010).

You might also like