Home
Add Document
Sign In
Register
Contoh report Data Center IMS506
Home
Contoh report Data Center IMS506
Universiti Teknologi MARaFull description...
Author:
AzlinAziz
32 downloads
261 Views
2MB Size
Report
DOWNLOAD .PDF
Recommend Documents
Contoh SOP Data Center
contoh sop coyFull description
Contoh SOP Data Center
contoh sop coyDeskripsi lengkap
Data Center
Descripción completa
Data Center
CCNAFull description
Informe Data Center
Data Center Design Guide
123
Justificacion Servidor Data Center
Descripción completa
Makalah Data Center
PTI 2012 UNPFull description
CCNA Data Center Technology.pdf
Instalacion Electrica Data Center
Descripción completa
sop data center
penjelasan tentang sop data center perusahaan
Data Center: E-Book
Full description
Data Center (Electricidad)
electricidadDescripción completa
Intel Data Center Design
72467969 Data Center Checklist
Informe Seguridad Data Center
Informe de seguridad data center
Data Center Baseline
Descripción: data center energy baselining
Estructura de Data Center
componentes necesarios y basicos para implementar un data centerFull description
Humidity Effects Data Center
Normativas Para Data Center
data centerFull description
RIESGOS DATA CENTER
Data Center Relocation
Data Center Audit Checklist
Full description
CCNA Data Center Technology.pdf
Full description
List of figures #$%&'( ") *$+( ,$(- . /&$01$2% 0345&+ 56 7('3+3$ 7( '3+3$ 83+3 9(2+(' ::::::::::::::::: ::::::::::::::::::::::::::: ::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::::::::: :::::::: ""
Figure 2: Ground floor plan of TDC building ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: "; Figure 3: First floor plan of TDC building. :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: "< Figure 4: Second floor plan of TDC building. :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: "= Figure 5: Server room plan with NOC & Command Center Room :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: "> Figure 6: Legends of Server Room floor plan :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: "> Figure 7: Movement of air flow in the server room | Source: Google image ::::::::::::::::::::::::::::::::::::::::::::: "? Figure 8: Organized cables under subfloor | Source: Google image ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: "@ Figure 9: Data cable in a cable tray install under raised floor | Source: Google image :::::::::::::::::::::::::::::: "@ Figure 10: A model of server rack | Source: Google image :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: "A Figure 11: Ramps use in the hallway at ground floor of Teratai Data Center | Source: Google image :::::: "A Figure 12: Plenum installation in the server room | Source: Google image :::::::::::::::::::::::::::::::::::::::::::::::: "B Figure 13: Perforated tiles | Source: Figure 14: Solid tiles | Source: :::::::::::::::::: :::::::::::::::::::::::: ::::::: ;C Google image Google image ::::::::::::::::::::::::::::::::::: Figure 15: Height of ceiling :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: ;C Figure 16: APC battery backup power | Source: Google image ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: ;" Figure 17: Power generator | Source: Google image :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: ;; Figure 18: Temperature flow | Source: Google image :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: ;< #$%&'( "B) D3EF *(',(' G *5&'E() H55%0( $I3%(:::::::::::::::::: ::::::::::::::::::::::::::: :::::::::::::::::: ::::::::::::::::::: ::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::::::::: :::::::: ;= #$%&'( ;C) D3EF *(',(' G *5&'E() H55%0( $I3%(:::::::::::::::::: ::::::::::::::::::::::::::: :::::::::::::::::: ::::::::::::::::::: ::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::::::::: :::::::: ;= #$%&'( ;") J031( *(',(' G *5&'E() H55%0( $I3%( ::::::::::::::::::::: :::::::::::::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::::::::::: ::::::::::::::::::: :::::::::::::::::: :::::::::::: ::: ;> #$%&'( ;;) J031( *(',(' G *5&'E() H55%0( $I3%( ::::::::::::::::::::: :::::::::::::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::::::::::: ::::::::::::::::::: :::::::::::::::::: :::::::::::: ::: ;? #$%&'( ;<) 75-(' *(',(' G *5&'E() H55%0( $I3%( ::::::::::::::: :::::::::::::::::::::::: :::::::::::::::::: ::::::::::::::::::: ::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::::::::: :::::::: ;? #$%&'( ;=) J$5I(+'$E G *5&'E() H55%0( $I3%( :::::::::::::: ::::::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::::::::::: ::::::::::::::::::: :::::::::::::::::: ::::::::::::::: :::::: ;A #$%&'( ;>) J$5I(+'$E G *5&'E() H55%0( $I3%( :::::::::::::: ::::::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::::::::::: ::::::::::::::::::: :::::::::::::::::: ::::::::::::::: :::::: ;A #$%&'( ;?) KL5+5 *E322(' M8N G *5&'E() H55%0( $I3%( :::::::::::::::: ::::::::::::::::::::::::: ::::::::::::::::::: ::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::::::::: :::::::: ;B #$%&'( ;@) O32+'3P G *5&'E() H55%0( $I3%( :::::::::::::::::: ::::::::::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::::::::::: ::::::::::::::::::: :::::::::::::::::: :::::::::::: :::
) S$'(0(NN *I5F( 8(+(E+5' G *5&'E() H55%0( $I3%( :::::::::::::::::: ::::::::::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::: ::::: <> #$%&'( ) S$'(0(NN *I5F( 8(+(E+5' G *5&'E() H55%0( $I3%( :::::::::::::::::: ::::::::::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::: ::::: <> #$%&'( <@) RK9 G *5&'E() H55%0( $I3%( :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: #$%&'(
#$%&'( =") 13+3P'5/( G *5&'E() H55%0( $I3%(:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: $I3%(:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: <@ #$%&'( =;) TR7UV G *5&'E() H55%0( $I3%( ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: <@ #$%&'( =<) TOTD*UV G *5&'E() H55%0( $I3%( ::::::::::::::::::: :::::::::::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::::::::::: ::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::: <@ #$%&'( ==) H'(3+ W3F(N G *5&'E() H55%0( $I3%(:::::::::::::::::: $I3%(::::::::::::::::::::::::::: :::::::::::::::::: ::::::::::::::::::: ::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::::::::: ::::::::
) WTQM7UV G *5&'E() H55%0( $I3%( :::::::::::::::::: ::::::::::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::::::::::: ::::::::::::::::::: :::::::::::::::::: :::::::::::: :::
C) *L5-2 +L( 03/(0 65' (3EL 56 +L( E3/0( G *5&'E() H55%0( $I3%( ::::::::::::::::::: :::::::::::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::: :: =" #$%&'( >") *L5-2 +L( RKMN P'5E(NN -5'FN G *5&'E() H55%0( $I3%( :::::::::::::::::: ::::::::::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::: ::::: =A
;
List of tables 73/0( ") J3N$E $265'I3+$52 56 5 6 7('3+3$ 83+3 9(2+(' :::::::::::::::::: ::::::::::::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: :::::::::::::::::: ::::::::::::::::::: ::::::::::::::::::: :::::::::::::: ::::: = 73/0( ;) 75+30 E5N+ ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: @ 73/0( <) W3/(0 321 N$%23%( :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: =; 73/0( =) K5NN$/0( P5N$+$52:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: =?
<
1.0
INTRODUCTION
Teratai Data Center is a facility designed to house computer hardware in order to effectively manage mission critical data for companies and our clients. These facilities can host network equipment, including website servers, data storage and back-up servers, software applications for large companies, and more. At Teratai Data Center, our customers‟ satisfaction is our top priority. Which is why we look for the best co- location services that ensures high availability is secured and offers round the clock support.
Teratai Data Center will be established in February 2020. It will be located strategically at Cyberjaya which is in Selangor. It is developed in between rural and urban area. This is because a data center should locate near corporate headquarters with the ease of remote access to computers and a robust telecommunications infrastructure. Besides that, Teratai Data Center will hire experience staffs in system management. Teratai Data Center will responsible in managing the data and all services offered. Teratai Data Center will ensure that customers will always satisfy with the treatment given. Table below is the basic information of the Teratai Data Center:
!"#$% '( )"*+, +-./01"2+/- /. !%0"2"+ 3"2" 4%-2%0
Name of organization
Teratai Data Center
Address
No. 1, Jalan Cyber Point 4, Cyber 8, 63000 Cyberjaya, Selangor Darul Ehsan, Malaysia
Phone Number
+603 2330 1900
Fax Number
+603 2330 1901
Email
info@ terataidatacenter.com
Operating hours
Monday to Friday: 8.00 a.m. - 5.00 p.m.
=
2.0
DATA CENTER SITE/ LOCATION
Teratai Data Center will locate strategically at Cyberjaya, Selangor. We decided to build data center building in this area because of the area are suitable to build the data center building. This is because the location safe fom man-made disaster. Based on energy and construction costs, telecom infrastructure reliability, and the risk of natural disasters take on added importance when we do selection of Teratai Data Center. st
nd
Teratai Data Center consists of three levels which are ground floor, 1 floor and 2
floor. Ground floor contains entrance area, server room, security room, NOC and st
command center room, and UPS and battery room. 1 floor contains seminar room, nd
meeting room, toilet, musolla, pantry, store room, and media storage room. 2 floor contains CEO room, meeting room, office, pantry and toilet. We decide to choose this location because of several factors. First is the location is the place that completely for technologies area. This location to build the data center also near with several accommodation such as rapid bus, mosque and so on. In addition, this location is very strategically and secured from any disaster phenomenon such as flood, typhoon and earthquake. Next, the location we choose also safe and far away from man-made disaster. d isaster.
3.0
INFRASTRUCTURE TIERS
Teratai Data Center is currently at Tier 3 which is ideal for large-business Company that is required for saving large data. At Tier 3, our company is 99.982 percent uptime yearly which equal to 1.6 hours downtime yearly only. Unlike Tier 1 or Tier 2 which are required to shut down any computer equipment, our Tier 3 data center 72 hours power outrage protection that are readily to backup any computer equipment that located in this facility.
Teratai Data Center is a concurrently maintainable data center that has plenty of capacity components and multiple independent distribution paths components and >
multiple independent distribution paths serving the computer equipment at any time. Other than that, our Tier 3 data center is generally N+1 fault tolerant. Our data center is providing high security system that is meeting the requirement of those tier 3 data center.
Teratai Data Center also providing friendly and best services for the clients that provided by Teratai Data Center engineers and technician. Teratai Data Center also provide unique infrastructure and design that are different from others data center.
?
4.0
TOTAL COST !"#$% 5( !/2"$ ,/*2
No.
1.
Item and specifications
Rack server (30 units)
Cost per item
Total cost
(RM)
(RM)
70,000
2,100,000
1,050,000
4,200,000
Company: Dell Specifications: Processor
Intel® Xenon® processor E31200 product family
Intel® Xenon® processor E31200 V2 product family
Intel® Pentium® G600 and G800 series
Intel® Celeron® G400 and G500 series
Operating system
Microsoft® Windows Server® 2012
Microsoft® Windows Small Business Server 2011
Microsoft® Windows Server 2008 R2 Foundation SP1
Microsoft® Windows Server 2008 SP2, x86/x64
2.
Power generator (4 units) Company: Safesidepower Specifications: i.
Fuel type: the generator uses diesel as
@
its operating fuel ii.
Portability: industrial backup generator
iii.
Phase:
generator
outputs
standard
single phase voltage iv.
Voltage: generator output voltage can be set to 120 volts or 240 volts
3.
HVAC (6 units)
800,000
4,800,000
30,000
210,000
80,000
2,400,000
Company: GETEX Supply and Engineering Specifications: i.
80% AFUE
ii.
Heating input range 50,000 – 50,000 – 125,000 Btuh
iii.
Two stage heating
iv.
Multi position, upflow, downflow, horizontal left or right
v.
115v humidifier and electronic air cleaner connections
vi. 4.
Fused low voltage circuit protection
Biometrics (7 units) Company: ASIS Technologies Specifications: i.
Size: dimension 181.6 x 126 x 49mm
ii.
User capacity: 1500
iii.
Transaction storage: 10000
iv.
Sensing area: 18mm x 22mm
v.
6.
Identification time: =2s
vi.
Operating temperature: 0 – 0 – 45 45 degree
vii.
Operating humidity: 20% - 80%
CCTV (30 units) Company: ASIS Technologies Specifications: A
i.
Pattern: PAL/NTSC
ii.
Image device: ¼” sharp ccd
iii.
Resolution: 420TVL
iv.
Lens: 3.6/6/8mm
v. vi. 7.
Infrared distance: 35m Angel: >=45
Fire Suppression (15 units)
500,000
7,500,000
80,000
960,000
200,000
200,000
Company: Marioff Corporation Specifications: i.
FM 200 nontoxic gas based fire suppression
ii.
Environmentally clean agent
iii.
Fast-acting
and
efficient
extinguishment iv. 8.
Safe for occupied spaces
UPS (12 units) Company: Dell Specifications: i.
Capacity 40
ii.
Dimensions 450 x 1200 x 640
iii.
Battery internal or external 360 – 372 cells
iv. v. 9.
Power factor 0.99 Frequency 50/60 Hz (45-65 Hz)
Cable Company: CABLExpress Corporation Specifications: Color
Cable spec
Network
Blue
Cat6
Production
Green
Cat5e
Management
Orange
Cat5e
Serial B
Red
Cat5e
Out of band access
Yellow
9/125
All
fiber
singlemode
connctions
fiber Total
22,370,000
"C
5.0
DATA CENTER DESIGN
Teratai Data Center consists of different types of layout which explain different functions.
5.1 Site View / Building Layout
6+780% '( 9+2% :+%; < #8+$=+-7 $">/82 /. !%0"2"+ 3"2" 4%-2%0
""
5.2 Floor Plan
Figure 2: Ground floor plan of TDC building
";
Figure 3: First floor plan of TDC building.
"<
Figure 4: Second floor plan of TDC building.
"=
5.3 Server Room Plan
Figure 5: Server room plan with NOC & Command Center Room
Figure 6: Legends of Server Room floor plan ">
6.0 DATA CENTER INSTALLATION
Data center installation explains several things about the installation on the server layout. These include cables, tiles, arrangement of racks, ceiling height, and ramp.
Figure 7: Movement of air flow in the server room | Source: Google image
How air flows in server room? i.
Cold air from HVAC flow from the perforated floor to cold the server.
ii.
Hot air from the server rise up to the ceiling.
iii.
Cold air out from the perforated floor (hot aisle) went through the cold aisle to cold the hot air which reflects from the solid tiles floor.
iv.
Hot air that rises up the ceiling collects by the HVAC.
v.
The HVAC forced to chill the air in subfloor plenum.
6.1 Under-floor installation
Under-floor cabling contributes to energy losses. When new network or power cables are added under the floor, older unused cables are rarely pulled out to make room. Instead the cables are left undisturbed to minimize risk of downtime. The build-up of cables causes blockages in air flow which contribute to hot spots in the data center.
"?
Figure 8: Organized cables under subfloor | Source: Google image
6.2 Modular cable trays
A cable tray system is used to support insulated electric cables used for power distribution and communication. Cable trays are used as an alternative to open wiring or electrical conduit systems. Modular cable trays allow for layered placement of cables which allows for simpler cable maintenance.
Figure 9: Data cable in a cable tray install under raised floor | Source: Google image
"@
6.3 Server rack
A rack server, also called a rack-mounted server, is a computer dedicated to use as a server and designed to be installed in a framework called a rack. The rack contains multiple mounting slots called bays, each designed to hold a hardware unit secured in place with screws.
Figure 10: A model of server rack | Source: Google image
6.4 Ramps
The ramp must support the weight of equipment, people, and mechanical devices used to lift the equipment (such as electrical-powered pallet jacks). Ramps that must support heavy weight are made of poured concrete.
Figure 11: Ramps use in the hallway at ground floor of Teratai Data Center | Source: Google image
"A
6.5 Plenum
A plenum space is a part of a building that can facilitate air circulation for heating and air conditioning systems. Space between the structural floor and the dropped ceiling or under a raised floor is typically considered plenum; however, some drop-ceiling designs create a tight seal that does not allow for airflow and therefore may not be considered a plenum air-handling space.
Figure 12: Plenum installation in the server room | Source: Google image
6.6 Floor tiles
There are two types of floor tiles which are solid and perforated tiles. The raised floor consists of tiles or floor panel that provide a supporting base for racks and equipment generally 2-feet squares. Usually the tiles made of metal such as cast aluminum. A good floor tiles must support maximum load specifications exceed the requirements.
"B
Figure 13: Perforated tiles | Source:
Figure 14: Solid tiles | Source:
Google image
Google image
6.7 Ceiling
To help the movement of hot air from hot aisle to infuse in HVAC, a 16” ceiling height is needed. Moreover, it is also for installing smoke d etector.
16”
Figure 15: Height of ceiling
;C
7.0 POWER CONSUMPTION 7.1 Main power supply
TDC were using electricity from Tenaga Nasional Berhad Malaysia (TNB) and generate running smoothly in TDC. With using 11kV HT Power Feed from TNB Power Grid.
7.2 UPS and battery
An uninterruptible power supply, also uninterruptible power source, UPS or battery/flywheel backup is an electrical apparatus that provides emergency power to a load when the input power source, typically mains power, fails. A UPS differs from an auxiliary or emergency power system or standby generator in that it will provide near-instantaneous protection from input power interruptions, by supplying energy stored in batteries, super capacitors, or flywheels. The on-battery runtime of most uninterruptible power sources is relatively short (only a few minutes) but sufficient to start a standby power source or properly shut down the protected equipment.
Figure 16: APC battery backup power | Source: Google image
;"
7.3 Battery
Battery functions as to supply current when power is lost. While sealed lead-acid (SLA) batteries remain the standard power source for about 50 percent of existing data center battery backup unit, their limitations limitations are widely known.
Lead acid
batteries need to either be topped off with water every few years or completely replaced data center battery.
7.4 Power generator
TDC decided to outsource the power generator from WCM Power Sdn. Bhd. (Formerly known as AEP POWER SDN BHD) which located at Lot 16, Jalan Teknologi 3/5, Taman Sains Selangor 1, 47810 Kota Damansara, Selangor Darul Ehsan, Malaysia. WCM Power Sdn. Bhd. as one-stop turnkey turnkey machinery solutions provider in the power generator industry emphasizes very much on quality and comprehensiveness of their products and services. Their generator sets are used throughout a wide range of industries including healthcare, manufacturing, oil and gas, telecommunications, leisure, construction, retail, event management and emergency aid relief.
WCM Power is able to design and build generator sets, which are specific to the prerequisite project requirements set by clients. WCM Power‟s house brand, WCM Energy can be designed and customized to meet specific power needs. Each WCM generator set is built with high quality engines, which assures fuel efficiency and low operating and maintenance costs. All WCM Energy generator sets are fully tested at WCM Power‟s factories before delivery to the clients.
Figure 17: Power generator | Source: Google image
;;
7.5 Air conditioner (heating, ventilation and air conditioning), HVAC
HVAC is the technology of indoor and vehicular environmental comfort. Its goal is to provide thermal comfort and acceptable indoor air quality. HVAC system design is a sub discipline of mechanical engineering, based on the principles of thermodynamics, fluid mechanics, and heat transfer. It is important in the design of medium to large industrial and office buildings such as skyscrapers and in marine environments such as aquariums, where safe and healthy building conditions are regulated with respect to temperature and humidity, using fresh air from outdoors.
Figure 18: Temperature flow | Source: Google image
;<
8.0 TYPES OF SERVERS 8.1 Rack Server
A rack server, also called a rack-mounted server, is a computer dedicated to use as a server and
designed
to
be
installed
in
a
framework
called
a rack.
The rack contains multiple mounting slots called bays, each designed to hold a hardware unit secured in place with screws. Rack server created because to save the physical floor space and other servers. One rack can support about 20-25 units of servers but it depends on the equipment.
6+780% '?( @",A 9%0:%0 B 9/80,%( C//7$% +1"7%
6+780% 5D( @",A 9%0:%0 B 9/80,%( C//7$% +1"7%
;=
8.2 Blade Server
HP Blade System is a modular infrastructure platform that converges server, storage and network fabric to accelerate operations and speeds delivery of applications and services running in physical, virtual, and cloud-computing environments. Designed to optimize virtually any workload, it is managed by a consumer inspired management platform that delivers unprecedented ease of use allowing you to deploy and manage your environment faster, at lower cost, and maximize productivity at any scale. The blade servers themselves contain only the core processing elements, making them hot- swappable. HP refers to the entire package as a Blade System.
6+780% 5'( )$"=% 9%0:%0 B 9/80,%( C//7$% +1"7%
;>
6+780% 55( )$"=% 9%0:%0 B 9/80,%( C//7$% +1"7%
8.3 Tower Server
A tower server is a computer intended for use as a server and built in an upright cabinet that stands alone. The cabinet, called a tower, is similar in size and shape to the cabinet for a tower-style personal computer. compu ter. This is in contrast to rack server s or blade server s, which is designed to be rack-mounted. By using tower server, our server cans easier cooling, because the overall component density is fairly low. Besides, the scalability of the tower server because an unlimited number of servers can be added to an existing network.
6+780% 5E( !/;%0 9%0:%0 B 9/80,%( C//7$% +1"7%
;?
9.0
PHYSICAL AND ENVIRONTMENTAL SECURITY 9.1 Physical Security
Teratai Data Center have their own ways to maintains their physical securuty to secure the data center. Teratai Data Center have highest standards of physical security to ensure it secure to all staff. To maintain the high value assets and high protection to data center, we need to ensure the security in high standards of protection. With this security, to protect the employees, information and physical assets that contain in data center. There are several type of physical security that have contain in Teratai Data Center:
a) Biometric
In Teratai Data Center provide biometrics scanner to employees to enter the building. This is a high tech, small terminal that will read an employee‟s fingerprint and then store it as a mathematical algorithm. This is an important point, as many employees express concern that their fingerprint is being kept on record. This is not the case; the algorithm is simply a code to allow the reader to check the fingerprint. There is no way to reconstruct a fingerprint from the algorithm.
Fingerprint Readers experience an extremely low number of false accepts or false rejects. When using the fingerprint reader for access control, you may assign a „duress fingerprint‟. This means another finger can be used in times of duress for example if you are being forced to open a door. The door will open as normal but the system will silently send a duress signal to the main terminal or guard room.
;@
6+780% 5F( )+/1%20+, B 9/80,%( C//7$% +1"7%
6+780% 5G( )+/1%20+, B 9/80,%( C//7$% +1"7%
b) Photo Scanner Ids For Employee
Teratai Data Center also provide photo scanner IDs for employee to identify their ID before enter the building. Our Photo ID Scanner captures data from both sides of the ID to help provide the most accurate data possible. These durable ID scanners are the best in the industry and prove to be very reliable. When an ID is inserted, the ID scanner will grab the ID and pull it through the scanner. Within a few seconds, the ID is scanned.
;A
Besides that, photo scanner also for visitor to access the building especially into the data center. All staff in Teratai Data Center must be identifiable by their staff card.
6+780% 5H( IJ/2/ 9,"--%0 K3* B 9/80,%( C//7$% +1"7%
c) Mantrap
At the entry of Teratai Data Center have a mantrap. Mantrap means that a mantrap, air lock, sally port or access control vestibule is a physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens. In a manual mantrap, a guard locks and unlocks each door in sequence. An intercom and or video camera are often used to allow the guard to control the trap from a remote location.
In aquatic situations and in space, mantraps are known as airlocks. This is counterintuitive, because exactly the same design is used for the opposite purpose. A mantrap is used to keep an individual in, whereas an airlock is used to facilitate ingress or egress.
;B
6+780% 5L( M"-20"N B 9/80,%( C//7$% +1"7%
d) Server Cages
In Teratai Data Center provides server cage for the server racks. The server racks should be secure with lock and access in controlled. Server room is behind from security so we need to secure the server racks from missing. In Teratai Data Center not able anyone to access the data center or server room to protect the security. The server cages can keep away from delicate equipment with lockable.
6+780% 5O( 9%0:%0 4"7% B 9/80,%( C//7$% +1"7%
e) Vehicle Barrier
The barrier security system is the security to protect people enters the data center without permission. Visitor will be asking with security guard before the vehicle barrier is open to enter in Teratai Data Center. The vehicle barrier has at post guard, the security entrance and before exit from the Teratai Data Center.
6+780% 5?( P%J+,$% )"00+%0 B 9/80,%( C//7$% +1"7%
6+780% ED( P%J+,$% )"00+%0 B 9/80,%( C//7$% +1"7%
<"
f) Security Alarm
Security alarm is important security to contain in Teratai Data Center. A security alarm is a system designed to detect intrusion unauthorized entry into a building or area. Security alarms are used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders.
6+780% E'( 9%,80+2> Q$"01 B 9/80,%( C//7$% +1"7%
9.2 Environment Security 9.2.1
CCTV
Inside Teratai Data Center is containing 30 secure cameras to monitor the data center.
Closed-circuit television (CCTV), also known as video
surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point to point (P2P), point to multipoint, or mesh wireless links. In Teratai Data Center, CCTV equipment may be used to observe parts of a process from a central control room. CCTV systems may operate continuously or only as required to monitor a particular event. A more advanced form of CCTV, utilizing digital video recorders (DVRs), provides recording for possibly many years, with a variety of quality and performance options and extra features such as motion detection and email alerts. Teratai Data <;
Center put CCTV around the building, at all entrance and exits, and every access point throughout the building. So, the security guard can see the area around Teratai Data Center.
6+780% E5( 44!P B 9/80,%( C//7$% +1"7%
6+780% EE( 44!P B 9/80,%( C//7$% +1"7%
9.2.2
Fire Suppression Systems
Fire Suppression Systems are commonly used on heavy power equipment. Suppression systems use a combination of dry chemicals and/or wet agents to suppress equipment fires. Suppression systems have
<<
become a necessity to several industries as they help control damage and loss to equipment. In Teratai Data Center are providing 15 fire suppression installed. For each floor that contain 5 or more fire suppression to prevent the data center for loss of information. In Teratai Data Center, automatic fire suppression systems control and extinguish fires without human intervention. Examples of automatic systems include fire sprinkler system, gaseous fire suppression, and condensed aerosol fire suppression.
6+780% EF( 6+0% 98NN0%**+/- 9>*2%1* B 9/80,%( C//7
%$9.2.3
Wireless Smoke Detector
Teratai Data Center installed every floor of data center wireless smoke detector to protect the data center. This wireless smoke detectors twoway communication enables it to activate the built-in sounders of all enrolled smoke detectors during an alarm, notifying the whole area of an incident. This device is powered by long-life 3V Lithium batteries and utilizes photoelectric smoke detection technology. It also includes rapid “rate-of“rate-of-rise” rise” temperature detection. There are invisible intruders, for example fire or smoke, which are more dangerous than the sneaked-in intruders. These incidents are unpredictable and it can start from the <=
interior anytime. It is not feasible to have security guards monitor fire incident all day long, at all points of the building. Instead, you can install another type of interior volumetric detection system, for example smoke/heat sensor, around all corners to detect smoke or fire once it started.
6+780% EG( R+0%$%** 91/A% 3%2%,2/0 B 9/80,%( C//7$% +1"7%
6+780% EH( R+0%$%** 91/A% 3%2%,2/0 B 9/80,%( C//7$% +1"7%
<>
10.0
LIST OF VENDORS
"S 6+780% EL( QI4 B 9/80,%( C//7$% +1"7%
APC specializes in rack, UPS, power, datacenter monitoring, and data center infrastructure cooling.
#S 6+780% EO( Q:/,%-2 B 9/80,%( C//7$% +1"7%
Avocent specializes in Data Center Management, Outlet Level Power, KVM over IP and Analog Cat5 KVM Switches.
,S 6+780% E?( )">!%,J B 9/80,%( C//7$% +1"7%
BayTech specializes in Ethernet and RS232 Remote Power Switches and Remote Power Management Software
=S 6+780% FD( 4IK B 9/80,%( C//7$% +1"7%
Chatsworth Products, Inc. (CPI) specializes in server racks and cable man agement solutions.
%S 6+780% F'( ="2"N0/#% B 9/80,%( C//7$% +1"7%
DataProbe specializes in Web Controlled Remote Reboot / Power Cycle Products.
.S 6+780% F5( TQ!UV B 9/80,%( C//7$% +1"7%
Eaton Powerware provides power quality and UPS (uninterruptible power supply) management solutions.
7S 6+780% FE( TMT@9UV B 9/80,%( C//7$% +1"7%
Emerson uninterruptible power and precision cooling systems that protect the world‟s most critical data centers.
<@
JS 6+780% FF( C0%"2 W"A%* B 9/80,%( C//7$% +1"7%
Great Lakes Case & Cabinet Co., Inc. is a leading manufacturer of racks, wall mount and free-standing enclosures.
+S 6+780% FG( WTPK!UV B 9/80,%( C//7$% +1"7%
Leviton Manufacturing Company is the largest privately held manufacturer of electrical wiring equipment in North America.
XS 6+780% FH( W+%#%02 B 9/80,%( C//7$% +1"7%
Liebert Liebert uninterruptible power and precision cooling systems that protect the world‟s most critical data centers.
AS 6+780% FL( MKVK4UM !@KIIYWK!T B 9/80,%( C//7$% +1"7%
Minicom by Tripplite specializes in Cat5 KVM Switches, Cat5 KVM Extenders and AV Splitters.
$S 6+780% FO( @K!!QW B 9/80,%( C//7$% +1"7%
Rittal is a leader in Liquid Cooling, Rack En closures and Data Center Infrastructure Solutions.
11.0
LABELLING AND SIGNAGE
As for labeling in our Data Center, we decide to label all of our equipment especially for the servers and also other appliances such as firewall and switches, we decide to do some deploying in labeling. While labeling the format system in order to specify each of the components will be maintain well and to ease the process of network and housekeeping so that it will be going as smooth as can.
Then for the text or word on the labels should be machine generated, and labels should be visible during normal maintenance of the infrastructure. Labels should be resistant to the environmental conditions (such as moisture, heat or ultraviolet light) at the point of installation and should have a design life equal to or greater than that of the labeled component. Keeping and maintaining good records is the most important aspect of a labeled infrastructure, and identifier information must be referenced in permanent records, backed up and secured by building administration.
6+780% F?( 9J/;- J/; 2J% $"#%$+-7 ;+$$ $//A* $+A%B 9/80,%( C//7$% +1"7%
=C
6+780% GD( 9J/;- 2J% $"#%$ ./0 %",J /. 2J% ,"#$% B 9/80,%( C//7$% +1"7%
="
!"#$% E( W"#%$ "-= *+7-"7%
No.
Signage
Terms
In the Data Center area, not all of the 1.
department or division people can use their smartphones.
Some
departments
are
prohibited from bringing any smartphones because it will be ringing at any time, especially in the server room. This is because it can allowed people to record or steal and captured the data in the data center.
2.
This label means that in this area, do not eat and enter the outside food in the data center. This is because the food will be able to make the data center become dirty and also can effect on the server.
3.
In the Data Center, the label of No smoking is prohibited. Smoking is strictly not allowed in the data center. This is because the smoke can be detected by the smoke detector devices that required in the data center.
=;
4.
In the Data Center, people are strictly prohibited from take any pictures in the data center especially in the server room. This is because it can allow people to captured the data in the data center and easily give it to other agencies.
5.
In Data Center, people are not allowed to bring their pets inside especially cats, dog and so on. This is because this area is not suitable for animals to walk in around the data d ata center.
6.
In the Data Center, if this label is shown it means that it is the direction to go to the toilet or restroom that provided in the data center.
7.
This symbol is take place at the M&E Standby
and
Generator
Room.
This
is
because these rooms contain lots of electric wire that can be dangerous towards people. Only authorized person or in charge person allowed to enter this area or it will give harm to those people who enter this room.
=<
8.
In the Data center, there are several areas that cannot be entered but only can be access by an authorized person which have their own identification card (ID). This area could be server
room,
UPS
and
battery
room,
generators room and so on.
9.
In the Data Center, people are strictly cannot throw the rubbish anywhere they want. People either staff or clients are prohibited to throw the rubbish in the data center either inside or outside the data center.
10.
As for Muslim, prayer room is also provided in the data center. So that it can make people either staff or clients to do the solah.
==
11.
In the Data Center,emergency exit symbol are placed in the building because it can helps staff and clients exit when disaster are happen for an example like fire, earthquake and so on.
=>
12.0
POSSIBLE POSITION !"#$% F( I/**+#$% N/*+2+/-
Position
No. of
Duties
people required
Data Center
1
Responsible for equipment maintenance tasks such
Manager
as
managing
and
installing
custom
upgrades for customers such as replacing cables, components
and
accessories;
maintaining
records and drawing schematics of the center to detail what equipment is installed. Administrative duties might include scheduling employee shifts, planning for capacity changes, maintaining corporate databases and ensuring compliance with government regulations.
Data Center
2
Supervises day-today activities of Data Center Operations Technicians across all shifts in a
Operation Manager
24x7 environment through a team of Team Leaders. Recommends
changes
in
procedures
or
equipment that would increase productivity, reduce cost, and better serve Data Center requirements and customers
Data Center Operation
2
Understand, troubleshoot, and fix broken servers/Linux OS related issues on server.
=?
Install new servers, design rack layout and
Technician
power allocation.
Data Center
2
Responsible for monitoring and operation of data center critical functions and facilities.
Operation Analyst
Perform
customer
installation
activities
to
include but not limited to physical server racking,
cabling,
rack
layout
definition,
electrical requirements, HVAC requirements configuration, etc.
Data Center
Enhance platform automation, documentation,
3
Operation Engineer
and system performance Adhere
to
stringent
security
and
change/configuration management procedures and policies.
SARGENT- Data
Monitor, troubleshoot and resolve Windows
5
server
Center Specialist
environment
as
well
as
backup
infrastructure Identify network/applications issues.
IT Server Engineer
3
Help establish a customer experience strategy while working with the local site Data Center Management team, as well as local Operations, and Critical Environments teams.
=@
13.0
OTHER TECHNOLOGIES OR SYSTEM USED
In our Data Center or also known as TDC, we will provide other technology that will be very useful in our operations. It known as API (Application Programming Interface).
13.1
Introduction of APIs
APIs are helping to usher in new mechanisms for making data center management management more automated and scalable. They‟re also key to network virtualization and private clouds. APIs are driving the evolution of data center management from manual configuration of hardware and software to more automated and scalable techniques. Any discussion of public or private clouds, and software-defined everything, must include APIs. However, for many enterprises, the rise of APIs for configuration is a new(ish) concept. Here's what you need to know. Traditionally, IT would configure software and hardware manually, or use scripts driven by the CLI, screen scraping and so on. This approach is time-consuming, error prone, and unsuited in an age when virtualization can speed deployment of resources and services. Enter the API. An API is an interface that allows software components to talk to one another; it's a library of specifications of objects, routines and data structures. An API isn't restricted to software; even hardware requires software as an interface for configuration and management.
6+780% G'( 9J/;- 2J% QIK* N0/,%** ;/0A* B 9/80,%( C//7$% +1"7%
=A
13.2
Functionality of APIs
A major function of APIs for high-level management is in the integration. Without an API, the managing system code must be tightly coupled with the standard configuration interface of the object (CLI, GUI, and so on). Using a well-built API abstracts that complexity, which allows for more seamless integration. This also helps with upgradability dependencies. Besides that, APIs provide a programmable interface for the compon ents of the data center. This allows both bo th custom configuration and better integration with higher-level management systems.
=B
14.0
CONCLUSION
As a nutshell, Data Center is known as a mission critical site that is as a facility used for housing a large amount of computer and communications equipment maintained by an organization for the purpose of handling the data necessary for its operation. Data center is a must nowadays for a company, especially large-sized company. For a company to organize their excessive data, they required the services of a data center. With fast growing of technologies nowadays, each of the data center are now upgrading in order to meet the clients demands and standard. Every data center is competing each other in order to meet the customers favor, but it is up to the customers choose which one they prefer. Besides, Data Center helps the process of business transaction and also stores your intellectual property. property.
>C
15.0
REFERENCE
Google. Inc. (n.d). data center – Google. Google. Retrieved April 10, 2015 from http://www.google.com/about/datacenters/ Zimrock Marketing. (n.d). the data center journal industry. Retrieved April 10, 2015 from http://www.datacenterjournal.com/it/industry-perspective-labeling-data -center/
>"
×
Report "Contoh report Data Center IMS506"
Your name
Email
Reason
-Select Reason-
Pornographic
Defamatory
Illegal/Unlawful
Spam
Other Terms Of Service Violation
File a copyright complaint
Description
×
Sign In
Email
Password
Remember me
Forgot password?
Sign In
Our partners will collect data and use cookies for ad personalization and measurement.
Learn how we and our ad partner Google, collect and use data
.
Agree & close