فروشگاه

توضیحات

A Model For Monitoring And Control Of Data Center Entrance And Exit Scenario

The need for high availability did not originate with the Internet or e-commerce. It has existed for thousands of years. Also With the recent

 

explosive growth of the Internet and our dependence on information systems, high availability has taken on a new meaning and importance. Businesses and consumers are turning to the Internet for purchasing goods and services. People conduct business anytime from their computer. They expect to buy clothes at 2 a.m. on the Web and expect the site to function properly, without problem or delay, from the first click to the last. If the Web site is slow or unavailable, they will click away to a competitor’s site.
On the other hand every Downtime can make big financial damages to companies. Some causes of Downtime are made by process and people which are called unplanned Downtime. While other planned tasks that lead to host or application outage are scheduled activities such as application or operating system upgrades, adding patches, hardware changes, and so forth.
Therefore unplanned service outages are expensive and are caused by hardware and software failures, human errors, Internet viruses and attacks, natural disasters, and human-caused crises

  ۸۲صفحه فایل ورد (Word) فونت ۱۴ 

 

پس از پرداخت آنلاین میتوانید فایل کامل این پروژه را دانلود کنید 

انجام پروپوزال،شبیه سازی مقاله و پایان نامه کامپیوتر در کوتاهترین زمان با موضوعات خاص شما. منتظر تماس شما هستیم

 

۱-۱-۱- Data Centers Concepts
A data center is a computer system’s most important and vulnerable component. At its most basic, the data center is a physical place that houses a computer network’s most critical systems, including backup power supplies, air conditioning, and security applications. We’re talking a large amount of data here, stored in a large number of computers.
A typical example of a company that almost certainly has a data center is a bank or other kind of financial institution. A bank’s data center will have a mainframe or other kind of computer network, on which customers’ account information and other data are stored. A university will also have a data center, which includes not only personal information about the university’s employees and students, but also information on the university’s buildings, construction projects, and physical and intellectual history.
These kinds of data centers contain information that is critical to the continued operation of the bank, university, or other business. Therefore, that data cannot be lost. Security measures surrounding such data centers are usually very strong, as are systems of climate control that keep the data center’s computer systems from malfunctioning. Data centers will also almost certainly contain backup computers or mirror drives that protect against massive data loss. Such backup computers or mirror drives are routinely dependent not only on electronic power but also on battery power, so that they can continue to function in the case of an interruption of electronic power.
Other kinds of data centers can be found in government institutions; companies that have multiple headquarters; and providers of electronic services such as television, mobile phones, and the like. A data center can also be a single computer, storing and accessing one company’s or one person’s critical data. Smaller data centers usually have less complicated forms of data protection. No matter the size, all data centers serve the same function: to compile and protect the data of a person or company.
۱-۱-۲- Importance of Data Center
One of the most important parts of a business in the technologically advanced world of today is the data center. These centers house computer systems, storage systems, telecommunications, and more. Also in the center are often forms of environmental control, such as air conditioning to keep the area cool and fire control devices to keep the machines safe and running.
The reason that these centers are so important is that they handle and store much of the data of a number of companies. This data could be operational, business, and customer related.
Some companies develop their own data storage centers in house, but the majority use external companies and systems. This allows the company to focus on running the daily business operations without having to worry about the safety and storage of their data. Some of these centers deal with only the operations architecture of a company; others are more comprehensive.
One of the largest and most common uses of a data center is for offsite data storage. This provides a safe, secure place for the storage of a company’s data. The backup services provided by these centers keep the data safe not only from theft, but from fire and flooding as well.
Sending data to the center is often quite easy. While some companies still use backup tapes, many are now using encrypted backups sent over the Internet. With a company’s entire data safe within one of these centers, it takes a lot of worry off the mind of the business owners.
۱-۲- Data Center Architecture
۱-۲-۱- Requirements for modern Data Centers
IT operations are a crucial aspect of most organizational operations. One of the main concerns is business continuity; companies rely on their information systems to run their operations. If a system becomes unavailable, company operations may be impaired or stopped completely. It is necessary to provide a reliable infrastructure for IT operations, in order to minimize any chance of disruption. Information security is also a concern, and for this reason a data center has to offer a secure environment which minimizes the chances of a security breach. A data center must therefore keep high standards for assuring the integrity and functionality of its hosted computer environment. This is accomplished through redundancy of both fiber optic cables and power, which includes emergency backup power generation. [1]
Effective data center operation requires a balanced investment in both the facility and the housed equipment. The first step is to establish a baseline facility environment suitable for equipment installation. Standardization and modularity can yield savings and efficiencies in the design and construction of telecommunications data centers.
Standardization means integrated building and equipment engineering. Modularity has the benefits of scalability and easier growth, even when planning forecasts are less than optimal. For these reasons, telecommunications data centers should be planned in repetitive building blocks of equipment, and associated power and support (conditioning) equipment when practical. The use of dedicated centralized systems requires more accurate forecasts of future needs to prevent expensive over construction, or perhaps worse — under construction that fails to meet future needs.

A Model For Monitoring And Control Of Data Center Entrance And Exit Scenario

۱-۲-۲- Data center classification
The simplest is a Tier1 data center, which is basically a server room, following basic guidelines for the installation of computer systems. The most stringent level is a Tier4 data center, which is designed to host mission critical computer systems, with fully redundant subsystems and compartmentalized security zones controlled by biometric access controls methods. [2]
The four levels are defined, and copyrighted, by the Uptime Institute, a Santa Fe, New Mexico-based think tank and professional services organization. The levels describe the availability of data from the hardware at a location. The higher the Tier, the greater the accessibility. You can see these levels in table1. [3] [4] [5]
Table1-1: Requirements in different Tier in Data Center
Tier Level Requirements
۱ • Single non-redundant distribution path serving the IT equipment
• Non-redundant capacity components
• Basic site infrastructure guaranteeing 99.671% availability
۲ • Fulfills all Tier 1 requirements
• Redundant site infrastructure capacity components guaranteeing 99.741% availability
۳ • Fulfills all Tier 1 & Tier 2 requirements
• Multiple independent distribution paths serving the IT equipment
• All IT equipment must be dual-powered and fully compatible with the topology of a site’s architecture
• Concurrently maintainable site infrastructure guaranteeing 99.982% availability
۴ • Fulfills all Tier 1, Tier 2 and Tier 3 requirements
• All cooling equipment is independently dual-powered, including chillers and Heating, Ventilating and Air Conditioning (HVAC) systems
• Fault tolerant site infrastructure with electrical power storage and distribution facilities guaranteeing 99.995% availability
Another consideration is the placement of the data center in a subterranean context, for data security as well as environmental considerations such as cooling requirements.
۱-۲-۳- Data Center Design
A data center can occupy one room of a building, one or more floors, or an entire building. Most of the equipment is often in the form of servers mounted in 19 inch rack cabinets, which are usually placed in single rows forming corridors (so-called aisles) between them. This allows people access to the front and rear of each cabinet. Servers differ greatly in size from 1U servers to large freestanding storage silos which occupy many tiles on the floor. Some equipment such as mainframe computers and storage devices are often as big as the racks themselves, and are placed alongside them. Very large data centers may use shipping containers packed with 1,000 or more servers each;[6] when repairs or upgrades are needed, whole containers are replaced (rather than repairing individual servers).[7]

Figure 1-2: A one Floor large Data Center
۱-۲-۴- Network infrastructure in a Data Center
Communications in data centers today are most often based on networks running the IP protocol suite. Data centers contain a set of Routers and Switches that transport traffic between the servers and to the outside world. Redundancy of the Internet connection is often provided by using two or more upstream service providers.

Figure 1-3: An Example of Network infrastructure
Some of the servers at the data center are used for running the basic Internet and Intranet services needed by internal users in the organization, e.g., E-mail servers, Proxy servers, and DNS servers.
Network security elements are also usually deployed: Firewalls, VPN gateways, intrusion detection systems, etc. Also common are monitoring systems for the network and some of the applications. Additional off site monitoring systems are also typical, in case of a failure of communications inside the data center.
۱-۲-۵- Electrical power Distributed in a Data Center
Electrical power Distributed in a Data Center is more important. Therefore every Data Center should has a good Power, Electrical Generator and Backup power.
Backup power consists of one or more uninterruptible power supplies and/or diesel generators. [12]
To prevent single points of failure, all elements of the electrical systems, including backup systems, are typically fully duplicated, and critical servers are connected to both the “A-side” and “B-side” power feeds. This arrangement is often made to achieve N+1 redundancy in the systems. Static switches are sometimes used to ensure instantaneous switchover from one supply to the other in the event of a power failure.
Data centers typically have raised flooring made up of 60 cm (2 ft) removable square tiles. The trend is towards 80–۱۰۰ cm (31–۳۹ in) void to cater for better and uniform air distribution. These provide a plenum for air to circulate below the floor, as part of the air conditioning system, as well as providing space for power cabling. Also, usually it is made a place for Electrical Generators in out of building of Data Center.
۱-۲-۶- Data Center HVAC
As you know, there are a lot of facilities and equipments in Data centers such as: servers, network equipments and etc. Because when all of them become up, Temperature will rise therefore it should be fixed between 21 to 23 degrees. Otherwise some tools do not work in high degrees. Best temperature is approximately 22, because it is easy to control of humidity fluctuation.
Data Center Humidity is controlled by HVAC. A suitable Relative humidity is between45% to 50% for Data Centers. Also Air circulation is more important in Data Center, therefore Racks and HVAC should placed that Cold weather be entered to Rack next it return to HVAC.
۱-۳- Data Center Maintenance
It is more important to maintenance and usual upkeep of a data center, including NOC monitoring, security practices, and data-center cleaning.
The network operations center (NOC) is a dedicated facility staffed with people (usually at all hours) who monitor the availability of all devices and services within the data center and respond to any data-center problems. The NOC has servers, consoles, and network monitoring software such as HP Open View, BMC Patrol, IBM Tivoli, and Computer Associate’s UniCenter. The software is used to monitor the health, status, and load of each piece of equipment and communication between all devices.
A NOC serves as a central logging point for all alarms and a location for evaluating the present status of the data center.
Simple network monitoring protocol (SNMP) agents can be used with storage devices such as UPS systems, HVAC, and storage devices such as NAS filers and storage area network (SAN) switches to get reports on their status and health on the monitoring software.
۱-۴- Security in Data Center
A critical component of server and data security is the security of the data center itself. Therefore security in Data Center which includes: Physical and Logical security.
The Data Center needs a comprehensive written security plan to minimize exposure to all threats and risks. Security is the responsibility of every employee within the Data Center, not just those working in IT-related departments. Data Center security awareness training puts emphasis on Data Center security responsibilities.
۱-۴-۱- Physical Security
Physical security refers to the various measures or controls that protect the confidentiality, integrity, and availability of information and systems from threats of theft, fire, flood, malicious destruction, mechanical failure, or power failure. Management can establish physical security by creating physical barriers around the business premises and information processing areas. Examples of physical barriers are walls, locked (electronic or conventional) entry gates, or staffed reception and guard desks.
۱-۴-۲- Logical Security
All valuable information of almost all organizations is stored online. It is, therefore, mandatory that the data and servers be protected from people with malicious intent. Preventing illicit access to the data is of utmost importance. It is important to keep out people who have no business being physically there (physical security) and to prevent unauthorized access via the network (logical security).
Logical security is making it more difficult for intruders to reach a login prompt on the hosts or other devices. The telnet port should be closed. Use SSH instead to log in to UNIX servers. Protocols using low-number ports (less than 1,024) should be allowed only if necessary.

Chapter 2
Importance of Data Center

One of the all important parts of a commercial enterprise is the data center. These centers house computing systems, storage systems, telecoms, and many another. Also in the center are much forms of environmental control, such as air conditioner and fire control devices.
The reason that these centers are so important is that they handle and store much of the data of a number of companies. This data could be operational, business, and customer related.
۲-۱- Data Center Services in Growing Business
If you own the multiple servers then it might be difficult task to handle them individually, because the responsibilities of maintenance and server monitoring is larger than you imagine. Also you have to make sure they perform well. Usually the organizations that have the large number of servers need to select the data center services.
The main task of the data center is to keep running your applications in any condition. Like if suppose one server face some problem then immediately another one takes place to keep your applications available on web. Usually the data center contains server, routers and switches to make communication between these servers with each other.
If server management is so complex, then you can think how complex data center can be. Do not jump into getting data center before analyzing your requirements. Suppose your organization is small and that works with a only one or two servers, do not add a level of complexity by getting data center. Bigger organizations that work with multiple servers should, however, go for this service for better management and improved performance of their servers.
The benefits of data center included high availability, security, safety, redundancy, reliability, scalability, and technology. Its management, however, requires you to invest a lot of time and effort. I would recommend you to keep your servers in data center if it is too complicated for you this will relieving you of the trouble of monitoring it.
The cost is not too much when you compare them to the benefits you will be receiving, including peace of mind. This service has been designed to provide the highest quality of services at inexpensive prices. The highly secure physical infrastructure bounded with best-in-class connectivity and technology.
However, if you choose the datacenter services for your Website business, you can easily concentrate on your core business. Data centers allow you to grow your business without any trouble. It is highly scalable and helpful for the increasing requirements of your business comfortably.
۲-۲- Data Center Environmental Assessment
Modern data centers and computer rooms house critical business applications and data and therefore it is important to ensure that every reasonable effort is made to provide a resilient support infrastructure through proactive data center management.(Perry.Szarka, http://blog.mcpc.com )
Despite the use of high quality hardware and careful software configuration, problems can still occur if unseen infrastructure weaknesses exist. This is why comprehensive data assessments can be of a great benefit to many organizations.
The goal of a thorough data center assessment is to confirm that the data center environment is running smoothly, and providing a safe and secure home to your organization’s most sensitive data and information.
There are of course wide-ranging differences between data centers and therefore assessments should be tailored to the particular data center being evaluated.
However there are several standard procedures for determining the overall quality of your data center:
۲-۲-۱- Inspection of the physical space and Thermal Assessment
As menial as it may sound, it’s important to inspect center’s physical environment including the floors, walls, ceilings and the space under a raised floor (if present). The intent here is to ensure that the space is suitable for the machinery it houses and that no obvious structural concerns exist.
A suboptimal environment may contain cooling or airflow problems and a detailed thermal assessment may be needed to test the airflow. ……………….

Chapter 4
Cisco Model Data Center Design

This chapter provides details about the multi-tier design that Cisco recommends for data centers. The multi-tier design model supports many web service architectures, including those based on Microsoft .NET and Java 2 Enterprise Edition. These web service application environments are used for common ERP solutions, such as those from PeopleSoft, Oracle, SAP, BAAN, and JD Edwards; and CRM solutions from vendors such as Siebel and Oracle.
The multi-tier model relies on a multi-layer network architecture consisting of core, aggregation, and access layers, as shown in Figure 4-1.
۴-۱- Data Center Multi-Tier Design Overview
The multi-tier model is the most common model used in the enterprise today. This design consists primarily of web, application, and database server tiers running on various platforms including blade servers, one rack unit (1RU) servers, and mainframes.
Figure 4-1 shows the data center multi-tier model topology. Familiarize yourself with this diagram before reading the subsequent sections, which provide details on each layer of this recommended architecture.

Figure 4-1: Data Center Multi-Tier Model Topology

۴-۲- Data Center Core Layer
The data center core layer provides a fabric for high-speed packet switching between multiple aggregation modules. This layer serves as the gateway to the campus core where other modules connect, including, for example, the extranet, WAN, and Internet edge. All links connecting the data center core are terminated at Layer 3 and typically use 10 GigE interfaces for supporting a high level of throughput, performance, and to meet oversubscription levels.
The data center core is distinct from the campus core layer, with a different purpose and responsibilities. A data center core is not necessarily required, but is recommended when multiple aggregation modules are used for scalability. Even when a small number of aggregation modules are used, it might be appropriate to use the campus core for connecting the data center fabric.
When determining whether to implement a data center core, consider the following:
• Administrative domains and policies—Separate cores help isolate campus distribution layers and data center aggregation layers in terms of administration and policies, such as QoS, access lists, troubleshooting, and maintenance.
• ۱۰ GigE port density—A single pair of core switches might not support the number of 10 GigE ports required to connect the campus distribution layer as well as the data center aggregation layer switches.
• Future anticipation—The business impact of implementing a separate data center core layer at a later date might make it worthwhile to implement it during the initial implementation stage.
۴-۳- Data Center Aggregation Layer
The aggregation layer, with many access layer uplinks connected to it, has the primary responsibility of aggregating the thousands of sessions leaving and entering the data center. The aggregation switches must be capable of supporting many 10 GigE and GigE interconnects while providing a high-speed switching fabric with a high forwarding rate. The aggregation layer also provides value-added services, such as server load balancing, firewalling, and SSL offloading to the servers across the access layer switches.
The aggregation layer switches carry the workload of spanning tree processing and default gateway redundancy protocol processing. The aggregation layer might be the most critical layer in the data center because port density, over-subscription values, CPU processing, and service modules introduce unique implications into the overall design.
۴-۴- Data Center Access Layer
The access layer provides the physical level attachment to the server resources, and operates in Layer 2 or Layer 3 modes. The mode plays a critical role in meeting particular server requirements such as NIC teaming, clustering, and broadcast containment. The access layer is the first oversubscription point in the data center because it aggregates the server traffic onto Gigabit Ether Channel or 10 GigE/10 Gigabit Ether Channel uplinks to the aggregation layer. Spanning tree or Layer 3 routing protocols are extended from the aggregation layer into the access layer, depending on which access layer model is used. Cisco recommends implementing access layer switches logically paired in groups of two to support server redundant connections or to support diverse connections for production, backup, and management Ethernet interfaces.
The access layer consists mainly of three models: Layer 2 looped Layer 2 loop-free, and Layer 3.
Figure 4-2 illustrates the access layer using the Layer 2 loop

بلافاصله بعد از پرداخت موفق میتوانید فایل کامل این پروژه را با سرعت و امنیت دانلود کنید

 

 

………………………..

نقد وبررسی

نقد بررسی یافت نشد...

اولین نفر باشید که نقد و بررسی ارسال میکنید... “A Model For Monitoring And Control Of Data Center Entrance And Exit Scenario”

A Model For Monitoring And Control Of Data Center Entrance And Exit Scenario

0 نقد و بررسی
وضعیت کالا : موجود است.
شناسه محصول : 2231

A Model For Monitoring And Control Of Data Center Entrance And Exit Scenario

قیمت : تومان35,000