Background of the project
In this report, it is about call of the proposal for the Data Centre planning. In this proposal it examines the planning of the Data Centre for the General Data and Network Services GlobalNets Pty Ltd. This organization has been tasked with the objective to build and manage a data center for an IT organization. In this proposal it would enable the GlobalNets organization to build as well as operate such data centre to the variety of the network services in the cloud (Coakley, Raftery & Keane, 2014). The aspects which would be considered in this research are specifications and the standards to build on the data centre, architecture and the topology to the data centre and its integration to all the branches, offices as well as other components of the organizations which are to be served (Aljohani, King & Narayanaswamy, 2016). Additionally, the research would examine on the databases for the big data, distributed file storage as well as its management. The research would also mention on the mechanisms, tools and the potential software for the management to numerous servers and other equipment.
General specifications and standard for building the data centre
To build a secure data centre there certain specifications and standards which should be met; the following are these requirements.
Site selection
This is the locality to in which the facility would be located. It must be selected very carefully by GlobalNets organization to get the best mix of the ideal features (Aljohani, King & Narayanaswamy, 2016). The site needs to be safe area which is not subjected any natural environmental risk such as the flood planes or the areas which are subjected to the landslides. Based on the case study GlobalNets aims to building it to the regional town which is about one hundred kilometers away from the major capital city. The site selected in the regional town need to have adequate drainage and the runoff path so that the localized floods do not take place during the heavy rains or the snow melts (Bertoldi, Avgerinou & Castellazzi, 2017). In case the facility would be below the grade spaces it is important to make sure that there is a perk test which has been done (Bertoldi, Avgerinou & Castellazzi, 2017). The protected data center needs to be constructed in the quiet areas which have low surface traffic, but together it must have multiple access roads into the area. It must be innocuous and unassuming.
Utilities
A site which is good is usually located in an area where there is availability to the fiber from numerous providers as well as redundant power grids (Bittner, Schietinger, Schroth & Weinkopf, 2017). When this is done it would be less likely for this organization to rely on the backup generators if the facility is drawing power from the multiple grids. Given that the organization has the option to choose where the data center would be located they need to look at the historical data from the local power providers (Bertoldi, Avgerinou & Castellazzi, 2017). These are all not created equally. The aspect of the fiber access would be more dependable as well as cost effective should they have the options from the numerous providers. It is also important that the organization looks close to the municipal services such as the fire and the police (Coakley, Raftery & Keane, 2014). However, it is hopeful that the organization might not need them but if they do they would respond on time on their issue.
Building design
The building design should be located to the center of the site and needs to be clear from any specific unimpeded views to all the sides. The extreme critical installations have to be fenced. It is important that the organization should not advertise on the nature of their facility. False name to the building could help to camouflage their operations (Bittner, Schietinger, Schroth & Weinkopf, 2017). The design of the data center needs to be based on the durable materials which could exceed the normal design loads (Coakley, Raftery & Keane, 2014). On the roofs as well as the materials they should be chosen and designed in order to refrain from not only the water but also the winds, ponding, snow loads as well as the uplift (Coakley, Raftery & Keane, 2014).
Mechanism/ Electrical systems
The data center needs to be best with dual electrical service feeds and distribution from the numerous energy grid sub-stations (Baghdadi et. al 2015). It is important for the organization to protect on their equipments with the use of the power conditioning for the purposes of the surges, brownouts and the blackouts along with the high energy transients (Coakley, Raftery & Keane, 2014). It is important for the electrical power design to have isolated end point distribution in order to address on the harmonic loads as well as the surges which could be caused by the internal equipments (Eastman, 2018). It is crucial for the GlobalNets organization to avoid the ground loops to their power design (Baghdadi et. al 2015). This might happen in case they ties to the grounds building equipments as well as the computers together (Di Rocco, Di Ruscio, Iovino & Pierantonio, 2015). The surges which are from the equipment startup could back the feed to the ground wire leg and perhaps damage on the sensitive gears such as the computers.
In the computer rooms it should have numerous pieces of the electrical equipment which is often used. You will need to provide an access floor in order to create an interstitial holding place to the cords as well as the cables which are required for the system (Di Rocco, Di Ruscio, Iovino & Pierantonio, 2015). The access rooms are usually constructed of 24 inch by 24 inch panels on the frame. The panels are usually interchanged so they allow the wire as well as the cable changes without the disrupting on the center for the operations.
Facility security/Monitoring
When it comes to monitoring of the environmental system, there is need to equip the data center with numerous security systems (Eastman, 2018). There should be control of the passage into and out of the facility through use of a card or the biometric access systems. It is also important to monitor all day long on the activities which have been logged onsite as well as through any remote location (Eastman, 2018). The alarm need to specify the exact location to the fault to that there is no wastage of the time especially in searching on the source of an issue if it arises. The workers should only have an access to the areas which are required through particular duties (Coakley, Raftery & Keane, 2014). All the visitors who have been appointed are usually equipped before they are allowing the escorted access only to the locations which are necessary.
Construction Monitoring
The monitoring and access control to the data center facility must start in the beginning whenever the construction is done before the foundations are even excavated . This really is important to the critical business such as this IT firm (Bertoldi, Avgerinou & Castellazzi, 2017). It is important to ensure that all the construction has been monitored and the site has been secured completely even at night. In case the organization feels they are at risk, the building should be swept to the various stages of the construction for any devices which could be implanted.
GlobalNets organization aims at building a new data centre to provide integrated and cloud services to the IT organization (Eastman, 2018). The data center is a haven for the computational power, storage space and programs which are important to support on this enterprise business. The infrastructure of the data centre is the central to the IT architecture, from which the content continues to be sourced. Proper planning facets of the data center infrastructure design are vital along with the performance, resiliency as well as scalability (Flucker, Tozer & Whitehead, 2018). The crucial aspect to the data center design is the aspect of the flexibility in deployment as well as supporting on the new services. The data center network architecture is designed on the proven layered approach which has been tested and improved in the past years to some of the largest data center implementation in the globe.
In this organization it will utilize the multi-tier model which has been dominated by the HTTP-based application to the multi-tier approach (Bittner, Schietinger, Schroth & Weinkopf, 2017). The multi-tier incorporates the web, application as well as the database tiers of the servers. Presently, many of the web applications are usually built as the multi-tier programs ( Manvi & Shyam , 2014 ) . They use software which could run as the separate processes to the same machine utilizing the intercrosses communication or maybe on different machines with the communications over the coverage. GlobalNets organization aims utilizing the cloud services in their integration with other companies therefore the architecture they would use is the Tree DCN to their data center (Manvi & Shyam, 2014).
This data center network is usually composed by three years of the switches. On the architecture the top layer as the root it is thought to be the core layer (Peng et .al 2015). On the middle layer it really is regarded as the aggregation layer, and at the bottom it is known as the access layer. On the higher layer the devices usually possess as the higher performance as well as value (Bittner, Schietinger, Schroth & Weinkopf, 2017). The core layer is comprised with numerous routers that have equal redundancies when accessing on the external coverage on just one of the side, or implementing on the external Border Gateway Protocol or even the static routing protocol and using on the internal network to the other side, or implementing Interior Gateway Protocol.
Topology architecture
Figure 1: Topology of a fat-tree architecture
There are ranges of switches in the square which are regarded as the Pod. There are K=4 switches to each of the pod and half of these belong to the edge switches and have are the aggregation switches (Bittner, Schietinger, Schroth & Weinkopf, 2017). The aggregation switches usually use each of the k/2 ports while they are connecting to the edge and the core switches. Thus, the maximum number of the servers in this would be K3/4 and 5K2/4 switches. This architecture in most of the time uses the 10.0.0.0/8 on the private range setting to the interior DCN address and the format deployed for the switch is 10.pod.switch.1 (Bittner, Schietinger, Schroth & Weinkopf, 2017). The use of this architecture improves on the cost effectiveness through deployment of the large number of the low cost switches with the use of the complex connections in order to replace the expensive as well as more complex switches (Lemoudden & El Ouahidi, (2015). It is also important to note that the equal number of the links in the various layers usually attains non-blocking communication amongst the servers, and this aids in reducing on the network bandwidth issues. Nevertheless, the scale of the fat-tree architecture is restricted by the amount of the devices in the port (Tselios & Tsolis, 2016). For instance a range of the 48 ports switches usually support a maximum of twenty seven thousand six hundred and forty eight servers only.
Network design integration
Figure 2: Network design for the data center
In this topology it comprises of 1st tier of the web servers, each has at the least has 2 NIC cards; a public interfaces and the network interface (Mao & Wang, 2015). The public interface could use the public IP address or the private address that has a firewall or even the load balancer hence offering the Network Address Translation that is NAT (Newcombe, 2017). On the private address interfaces it generally utilizes the address and provides an usage of the application server through the pair of the firewalls subsequently the servers of the applications have a minimum of two NICsone for the purpose of the communication with the server within the web and the other to communication with the database servers (Newcombe, 2017).
This architecture present numerous advantages of the ease of the wire when there is adding a number of the ports as well as the levels on the switches (Newcombe, 2017). Therefore, GlobalNets Company needs to utilize this data center architecture to ensure they integrate to all their other branches and the offices so that they could all be connected to a common center.
Big data is the fashionable subject which has been used by many individuals in numerous contexts and without precise semantics ( Newcombe , 2017 ) . For the storage as well as processing of the Big Data there are 2 functions which are preferred which are scalability and the high speed use of the massive volume of the data (Newcombe, 2017). There are numerous Big Data databases these are discussed as follows;
NoSQL databases
This is a relatively new kind of the database that has been initiated by the Web companies. Some of the popular list of them includes the non-relational data stores such as the XML databases (Bittner, Schietinger, Schroth & Weinkopf, 2017). Besides their typical features such as the simplified data model, rather than the query driven database design they provide little to no support to the OLTP which is essential to most organizations applications. Some of the NoSQL databases are usually part to the more complex software architecture such as the Hadoop stack or perhaps the Big Data Management systems (Funnell, Shi, Costa, Watts, Ballani, & Thomsen, 2017). DBMS layers usually allow for the manipulating data and these systems could allow access to the data through the numerous means which are different layers.
NewSQL databases
This is the subcategory to the RDBMSs preserving the SQL language as well as the ACID properties (Salom, Oró & Garcia, 2015). These types of the databases usually attain the high performance as well as scalability through offering of the architectural redesigns which could take many core machines that have huge or non-volatile in the memory storage (Salom, Oró & Garcia, 2015). They usually allow the real time analytics as well as transaction processing at same time.
Distributed file storage and management
The distributed file system to the cloud services which would be implemented by GlobalNets organization would enable the IT organization to have access to the data as well as the support operation on that particular data. Each of the data file will be partitioned into numerous parts regarded as the chunks (Dhers, Feltham & Brooker, 2015). Each of these chunks will be stored on various remote machines, which facilitate on the parallel execution to the applications within the system. The users will share the computing resources through the internet via the cloud services which will be implemented.
The network file system which utilizes the client server architecture would allow the sharing of the files between the numerous machines on the network as if they are located locally, and this provide standardized view (Ramachandran, 2016). The NFS protocol would allow the heterogeneous process of the clients, which might run on the various machines under different OS, to gain access to the files on the servers that are at distant.
Cloud based synchronization
There are more users who have many devices that have the ad hoc connectivity within this organization (Bittner, Schietinger, Schroth & Weinkopf, 2017). The data sets which are replicated on these devices of the IT firm should be synchronized among the arbitrary number of the servers (Bittner, Schietinger, Schroth & Weinkopf, 2017). This is important to backup especially for the offline operation. When the network of the users is not good, then their devices would selectively replicate on the part of the data which would be modified later as well as offline. Once the network condition becomes good, then the device has been synchronized (Harrison, Wright & Trembath, 2017). There are two approaches to which exists in order to address the distributed synchronization problems they are the controlled peer to peer synchronization and the cloud master replica synchronization (Nativi, Mazzetti, Santoro, Papeschi, Craglia & Ochiai, 2015). With regards to the user controlled peer to peer, software such as the rsync should be installed to the whole user’s PC which contains their data. The files are then synchronized through the peer to peer synchronization software in which the customers could highlights on the network addresses as well as the synchronization parameters (Royapoor & Roskilly, 2015). This process is done manually. On the second approach is on the cloud master replica synchronization, this is the one which would be utilized by GlobalNets Company to synchronize on the data for this IT organization (Salom, Oró & Garcia, 2015). This method is used by the cloud services, where there is a master replica that is maintained in cloud. All the upgrades as well as synchronization operations are usually on the master copy (Salom, Oró & Garcia, 2015). This strategy provides an excellent degree of the availability and dependability in the event of any failures.
Distributed file management backup
A universal issue among businesses such as this IT firm which operate numerous branches that are separated geographically is on the issue of the file storage (Gorton & Klein, 2015). This could present numerous issues which could include duplicating of the files, difficulties to identify on the latest version to the files, protection of the files from being corrupted or changed by the individuals who are unauthorized, and the focus to the necessitate to backing up all the data to the various branch locations (Gorton & Klein, 2015). To address on this issue the GlobalNets organization would create a centralized data center at the main office which is 100km from the regional town (Hill, 2018).They would establish a secure, coherent, consistent as well as scalable and managed system which would support all the branch offices all across the nation and around the world (Hill, 2018). This solution need to offer the same level of the performance to the workers anywhere in the nation. The business would establish this centralized pool of the data then utilize CloudFast software in order to offer access to different branch offices (Salom, Oró & Garcia, 2015). This would support the file locking and at the same time provide high performance access to all the employees everywhere (Salom, Oró & Garcia, 2015). Consolidating and centralizing of the data would simplify the backup process. Once they have done this GlobalNets would no longer need to deploy on the backup solutions to all the branch offices they would only need to back up at their operational headquarters (Salom, Oró & Garcia, 2015). This would save on a lot of costs in numerous ways such as cost associated to the hardware, security issues which surround the backup files as well as personnel who ensure that the backup systems are secure (Yu, Cheng & Qiang, 2016).
Management tools and software for server and other equipment
Server management is regarded as the acts to manage server infrastructure as well as overseeing their performance through continuous monitoring using tools (Dhers, Feltham & Brooker, 2015). The tools and software that will be used by the GlobalNets organization to manage on the server as well as other equipments are;
OpManager
With numerous applications as well as services moving the data center, virtualization as well as server consolidation are creating new challenges (Salom, Oró & Garcia, 2015). The use of this tool will assist the IT administrators, single management console to the depth visibility as well as control the physical as well as virtual servers across different platforms (Hill, 2018). This tool helps in monitoring of the physical and the virtual servers, troubleshooting any faults, automating the repeated management task, management of the SLA as well as capacity planning (Hill, 2018).
Network traffic analyzer
This would help to test the performance of the network rather than the devices which are connected to it (Hill, 2018). Most of the monitoring tools which focus on the traffic analysis usually rely on the information that is underlying system that are provided by the manufacturers devices to which run on the network (Hill, 2018).
Endpoint Manager
The endpoint management mechanisms system keeps track of the network endpoints to which the traffic originates (Hill, 2018). It is possible to see the applications which are running over the network from the endpoint and which protocols they are using.
GFI Network server Monitor software
This software helps to monitor on the network as well as the servers for the software and the hardware failures (Hill, 2018).. This organization will use this software to monitor their server and network to ensure they are working effectively (Hill, 2018). The usage of this software would automatically alerts as well as corrects the networks and the issues in the server. Moreover, it would monitor on the exchange such as ISA, SQL along with the Web server (Hill, 2018). The organization has selected on this software since it is to learn and at the same time easy to use and deploy.
Database tables’ mechanism
There would be use of this mechanism by GlobalNets organization to maintain on the complex or the high volume state of the information (Salom, Oró & Garcia, 2015). It offers an automatic temporary table mechanism which is able to maintain on the state through its state management component.
Conclusion
In this proposal it has discussed on various aspect which GlobalNets organization will need to consider when they are building on the data centre and then operate on this data centre for the numerous network services in the cloud. The aspects which have been discussed in details in these proposals that will be consider are on; specifications and the standards to build on the data centre, architecture and the topology to the data centre and its integration to all the branches, offices and other components of the organizations which are to be served. Other aspects discussed in the proposal are databases for the big data, distributed file storage as well as its management. The research would also mention on the mechanisms, tools and the potential software for the management to numerous servers and other equipment.
References
Aljohani, F. J., King, A. J. C., & Narayanaswamy, R. (2016). Comparison between k-ε RANS Model and SST k-ω SAS Model in Data Centre Simulations.
Baghdadi, N., Leroy, M., Maurel, P., Cherchali, S., Stoll, M., Faure, J. F., … & Pacholczyk, P. (2015). The Theia Land Data Centre. In Remote Sensing Data Infrastructures (RSDI) International Workshop. La grande motte, France.
Bertoldi, P., Avgerinou, M., & Castellazzi, L. (2017). Trends in data centre energy consumption under the European Code of Conduct for Data Centre Energy Efficiency.
Bittner, S., Schietinger, M., Schroth, J., & Weinkopf, C. (2017). Call centres in Germany: Employment, training and job design. Re-organising Service Work: Call Centres in Germany and Britain: Call Centres in Germany and Britain, 63.
Coakley, D., Raftery, P., & Keane, M. (2014). A review of methods to match building energy simulation models to measured data. Renewable and sustainable energy reviews, 37, 123- 141.
Eastman, C. M. (2018). Building product models: computer environments, supporting design and construction. CRC press.
Dhers, S., Feltham, H. L., & Brooker, S. (2015). A toolbox of building blocks, linkers and crystallisation methods used to generate single-chain magnets. Coordination Chemistry Reviews, 296, 24-44
Di Rocco, J., Di Ruscio, D., Iovino, L., & Pierantonio, A. (2015). Collaborative repositories in model-driven engineering [software technology]. IEEE Software, 32(3), 28-34.
Flucker, S., Tozer, R., & Whitehead, B. (2018). Data centre sustainability–Beyond energy efficiency. Building Services Engineering Research and Technology, 0143624417753022.
Funnell, A. C., Shi, K., Costa, P., Watts, P., Ballani, H., & Thomsen, B. C. (2017). Hybrid Wavelength Switched-TDMA High Port Count All-Optical Data Centre Switch. Journal of Lightwave Technology, 35(20), 4438-4444.
Gorton, I., & Klein, J. (2015). Distribution, data, deployment: Software architecture convergence in big data systems. IEEE Software, 32(3), 78-85.
Harrison, K. A., Wright, D. G., & Trembath, P. (2017). Implementation of a workflow for publishing citeable environmental data: successes, challenges and opportunities from a data centre perspective. International Journal on Digital Libraries, 18(2), 133-143.
Hill, K. E. (2018). U.S. Patent No. 9,875,096. Washington, DC: U.S. Patent and Trademark Office.
Lemoudden, M., & El Ouahidi, B. (2015, October). Managing cloud-generated logs using big data technologies. In Wireless Networks and Mobile Communications (WINCOM), 2015 International Conference on (pp. 1-7). IEEE.
MAO, B., & WANG, D. (2015). Finite-time chaos synchronization of a class of complex networks systems based on self-adapt approach. Journal of Central China Normal University (Natural Sciences), 4, 013.
Manvi, S. S., & Shyam, G. . (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of Network and Computer Applications, 41, 424-440.
Nativi, S., Mazzetti, P., Santoro, M., Papeschi, F., Craglia, M., & Ochiai, O. (2015). Big data challenges in building the global earth observation system of systems. Environmental Modelling & Software, 68, 1-26.
Newcombe, L. (2017). U.S. Patent No. 9,830,407. Washington, DC: U.S. Patent and Trademark Office.
Peng, S., Guo, ., Jackson, C., Nejabati, R., Agraz, F., Spadaro, S., … & Simeonidou, D. (2015). Multi-tenant software-defined hybrid optical switched data centre. Journal of Lightwave Technology, 33(15), 3224-3233.
Peng, Y., Li, Y., Ban, Y., Jin, H., Jiao, W., Liu, X., & Yang, W. (2014). Metal-organic framework nanosheets as building blocks for molecular sieving membranes. Science, 346(6215), 1356-1359.
Rogers, P. (2016). U.S. Patent Application No. 15/093,252.
Ramachandran, M. (2016). Software security requirements management as an emerging cloud computing service. International Journal of Information Management, 36(4), 580-590.
Royapoor, M., & Roskilly, T. (2015). Building model calibration using energy and environmental data. Energy and Buildings, 94, 109-120.
Salom, J., Oró, E., & Garcia, A. (2015, December). Dynamic Modelling of Data Centre Whitespaces, Validation with Collected Measurements. In Building Simulation 2015, 14th International Conference of the International Building Performance Simulation Association.
Tselios, C., & Tsolis, G. (2016). A survey on software tools and architectures for deploying multimedia-aware cloud applications. In Algorithmic Aspects of Cloud Computing (pp. 168-180). Springer, Cham.
Yu, Y., Cheng, G., & Qiang, X. (2016, October). Data centre transformation: Integrated business model framework of cloud computing oriented data centre. In Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), 2016 IEEE (pp. 1848-1855). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download