DCI Final Assignment (HARISH)
DCI Final Assignment (HARISH)
Introduction
Data centers are made up of different elements that provide reliable, secure positions for data and
materials. The elements shown in the data center encompass power sources, connectivity and
informational support, fire suppression materials, heat ventilation and air conditioning (HVAC)
equipment and monitoring systems. It is an essential platform which can be used as a single or
multiple building with such a designated section to house and host computer servers to generate
and deliver data and services to multiple workstations or customer computer systems. The data
center can be used as an extra-large CPU with an immense storage capacity, cooling and air
conditioning, an infinite power source where the casting can be recognized as the building and
the walls themselves. Data centers behave as a warehouse for such a business that supports
related applications, virtual services and memory size with data to perform advertisement tasks
through the organization's computer networks (T. J.-L. Courvoisier, 2003).
Temperature control:
The main part of data center is where the data are stored i.e., Server room. Constant
temperature should be maintained in server room with 18 degrees. The inaccurate
fluctuation ends up affecting device performance which may cause damage.
Power System:
Proper power should be maintained because it is an important part of data center. The
main power electricity which is AP electricity board passed to building through UPS. The
UPS makes sure that server is running accurately even though the power is running
effectively and also consists 30 min of backup. When the power gets low there will be
automatic switch on-off generator for system action.
Air Conditioning:
For comfortable and effective environment, the air conditioner is required which helps in
maintaining work environment of co-workers within the company. By placing air
conditioner at the top of the building might help for co-worker to work smoothly.
Live data monitoring:
Live data monitoring is one of the new and innovative features that helps in monitoring
data in real-time environment. When there is any Ups and Downs in the system, the data
center administration can manage the issues and deal with that in proper manner (Bryan
Anderson, 2016).
Protocol:
In TechSys we have to designed for HVAC control, many others facilities are composite
here like lighting, computerized maintenance scheduling, and other life safety functions.
Building should consist of sensors and controllers, actuators and software, all these
functions are controlled by central workstation or web browser.
We have chosen Tier IV for M-Care data center design because all IT equipment is double
managed and fully installed to be consistent with the configuration of the site architecture. With
a Tier IV data center, we can predict good output at all times of the year with just 26 minutes of
downtime. This is done by a fully redundant grid as well as robust power outage security, which
can last up to 96 hours.
3.3. Location
Location is amongst the most significant considerations when choosing a data center for M-Care
data center design. Huge funding is required for the establishment of a fully redundant and stable
data center as well as a dedication to continual service and maintenance operational costs. There
are several factors which should be included in the decision-making process for M-Care data
center design as seen below (Gault, 2002):
Location of the for M-Care data center design on the first floor on grade has benefits as
Freight elevators are not used to transfer massive power and cooling appliances or filled
IT rack in or out and floor loading structural capability is less of a problem as the ground
floor concrete slab is usually much tougher than that of the upper floor office.
Cooling devices should be placed on the roof or next to the for M-Care data center design
in order to reduce the distance between air and water to be transferred. And roofing
equipment such as air handlers can require a reinforced roof framework (Gault, 2002).
Without connections to commercial electricity and redundancy or complete access to
secure connectivity, the data center will be useless. To ensure ease of redundancy, a
location with multiple commercial power feeds should be selected for M-Care data center
design. Connection to a wide range of Tier One network providers is important for the
most secure connectivity and consistent uptime (Gault, 2002).
3.4. Logical Design
The importance of the logical model is to provides a description of concepts on a single paper to
promote accountability, coordination and cooperation with stakeholders. Logical models are
popular in public health, although many non-public healthcare organizations have adopted this
methodology. Software logic frameworks track software operation through start to end. Central,
aggregation and access layers are also the basic statistical data center design layers. However, the
architecture model used during the architecture of the M-Care data center seems to be the Multi-
tier Design Model (Underwood, 2002). Which architecture mainly composed of a web, database
and application system tiers operating on various architectures, like a blade server, a single rack
server and mainframes. The Multi-Tier Model consists of 3 layers which are described below.
DC Core layer: The core layer includes a high-speed packet swapping backplane for
certain motions in and out of the data center. That core layer offers access to several
aggregation modules and enables a resilient Layer 3 lined fabric with little system
failure. The core layer operates an internal routing mechanism, such as OSPF or EIGRP,
which carry balances traffic in between campus core and aggregation layers using Cisco
Express Forwarding (CEF)-based hashing algorithms. The core layer is really a layer 3
environment. As just a consequence, the core layer is free from the tree span and the vPC
(Underwood, 2002).
DC Aggregation layer: The aggregation layer is the border between Layer 3 and Layer 2
for data center infrastructure. The aggregation layer is already a link source for data
center firewalls as well as other utilities in typical designs. Mostly as result, it
consolidates Layer 2 traffic in a higher transmission rate of switching fabric and provides
opportunities for network-based applications just at interface across L2 and L3 in the data
center. The resources offered by aggregation layer are Load balancing, firewalling, and
SSL offloading to databases through access points (Underwood, 2002). Aggregation
layer should be considered a vital component throughout the data center whereas port
density, CPU processing, over-subscription and service modules have particular
consequences for the overall architecture.
DC Access layer: This is the lowest architecture, in which all servers are mechanically
linked to the network. Usually, it is a fully-fledged L2 domain that may provide L3
access to restrict transmitted domains. While using L3 mostly on access layer, it's really
challenging when using numerous high-availability (HA) functions, including such
VMware HA, NIC teaming, and so on, due to IP addressing specifications. It is proposed
that only L2 be used on the entry layer. The Ethernet or Fiber Channel (FC) protocols
may be used for the storage route. The FC interfaces compose of 1/2/4GBps interfaces
and are connected to the SAN switch, the Cisco MDS network. That back-end elevated
fabric and storage route (10 GE) could also be a popular transmission mechanism by
using IP over Ethernet to access storage (Underwood, 2002).
3.5. Business and Technical Goals
The ultimate purpose of each data center is just to organize the data center facilities efficiently
for 24/7 days. Earlier, company divisions have always had just one approach when advanced
technology was considered essential. Today, there are infinite possibilities. The corporate plan of
the Data Center is not generated out of nowhere and. For making project successful we need
some of the business and technical goals (Chris Loken, 2010). Some of the steps can be carried
out for performing business technology:
Read more about the goals of the data center plan.
To implement the basic IT atmosphere.
Consider the evolution of the IT world.
Determine the available data center infrastructure.
Decide whether to be in the data center sector seems to be right choice because, if that is
so, with what degree.
Recognize the new TCO data center.
Document And report the specifications of the data center.
Create the possibilities suggested.
Contrast the present situation with each hypothetical model.
Pick the right plan and create a path map to incorporate it.
It needs time to execute the plan of the Data Center.
Service Provider as a IT (Chris Loken, 2010).
Figure 6: Cables
Storage:
NAS as well as SAN are the two mains widely used methods of storage systems in
modern data centers, including SAN allowing greater acceleration and much more
reliable access to stored files with block level information. Except for these specific units,
and without it the Data Center cannot perform, there are a few other aspects which often
do not lend the same value to those of us who set up or participate in it (Andreades,
2019).
Figure 8: Storage
Blade Server:
Blade servers need less bandwidth, reduced power and much less time to launch. Another
of the key benefits of blade servers is that they now offer solid state drives as default
internal storage. When blade technology progresses and hardware configurations begin to
decrease, they will become the regular feature of the world’s largest data centers
(Andreades, 2019).
Preventive Maintenance: It helps to reduce the risk associated with operating software
for a long time, helping it to become more stable, understandable, and maintainable
(Luca Chiaraviglio, 2018). Similarly, it makes changes and adaptations to your software
so that it can work for a longer period of time to prevent the deterioration of your
software as it continues to adapt and change.
Corrective Maintenance: Corrective maintenance associates with the maintenance of
any kind which addresses the errors and faults within software applications that could
impact various parts of your software, including the design, logic, and code. These
corrections usually come from bug reports that were created by customers but it can help
to spot them before your customer’s do (Luca Chiaraviglio, 2018).
5. Security
Physical Security: The purpose of physical data center security is to provide unified physical
security solution that integrate with various systems such as CCTV, fire alarm, access control,
intrusion alarm and building management systems (Cabuk, 2010). Some essential Physical
security that we have implemented for building a Data Center are:
The data center building is kept away from headquarters (20 miles typical) and 100 feet
away from the main road, bad neighbors: airports, chemical facilities, power plants etc.
The data center building wall is made with foot-thick concrete which is a cheap and
effective barrier against the elements and explosive devices.
A combination of motion-detection devices, low-light cameras, pan-tilt-zoom cameras
are installed around the perimeter of the building.
Fire protection systems with double interlock and to protect the data and IT equipment,
fire suppression is used with a zoned dry-pipe sprinkler.
Controlling and monitoring temperature and humidity through proper control of air
conditioning and indirect cooling (Cabuk, 2010).
Logical Security
Logical threats are those that may damage your software systems, data, or network without
actually damaging your hardware. Viruses, DoS attacks, phishing, and Trojans are all examples
of logical threats that spreads through the use of flash drives. To prevent such logical threats
following logical security are implemented in our data center building (Cabuk, 2010):
Create and maintain excellent backups, in case a breach occurs you can restore your data.
Firewalls on network access and keeping Anti-spyware and virus detection up to date.
Training employees on being cautious of social engineering and hacker techniques.
Authentication, encryption, and having a strong password and changing it regularly.
Data management tool like VERITAS 360 data management to carry out the task of data
Protection, Availability, and Insight for data (Cabuk, 2010).
6. Conclusion
To sum up, all our team had to recommend the infrastructure of the data center, the appropriate
hardware including technologies. We therefore introduced all of the theoretical concepts to
correctly accomplish the task. Throughout this project, we demonstrated how and where to
layout the architecture of the datacenter. We have attempted to establish a safe data center with
security improvements that is easy for the customer to navigate. The scheme we have suggested
is also cost-effective placement. Similarly, our team addressed cooling capacities, energy
conservation, innovations and strategies that facilitate green data center computing (Beloglazov
& Buyya, 2010).