Objectives: Chapter 9: Data Centre Architecture VLAN definition and benefits * VLANs and broadcast domains * Routers role in VLANs * Types of VLANs * VLANs.

Slides:



Advertisements
Similar presentations
NETWORK TRANSFORMATION THROUGH VIRTUALIZATION
Advertisements

GCSE ICT Networks & Security..
NASK RESEARCH AND ACADEMIC COMPUTER NETWORK Collocation at the NASK Collocation and Hosting Centre.
Chapter 7: Physical & Environmental Security
Antonio González Torres
Hardware & the Machine room Week 5 – Lecture 1. What is behind the wall plug for your workstation? Today we will look at the platform on which our Information.
Chapter 7: Intranet LAN Design
MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
Cooling Strategies for Small IT Rooms Presented by Jim Magallanes TechniCool Innovations Inc Upham Street Suite B-1, Broomfield.
Chapter 4 Infrastructure as a Service (IaaS)
Enhancing protection for the most valuable assets of the Knowledge Economy.
CIT 470: Advanced Network and System Administration
Cold Fusion High Availability “Taking It To The Next Level” Presenter: Jason Baker, Digital North Date:
1 Northwestern University Information Technology Data Center Elements Research and Administrative Computing Committee Presented October 8, 2007.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Unit Outline Information Security Risk Assessment Module 1: Introduction to Risk Module 2: Definitions and Nomenclature Module 3: Security Risk Assessment.
ROYAL PALM NETWORK PROJECT John Healy Tom Jamieson
Networking Project Ailis&Louise. General Requirements The Washington School District is in the process of implementing an enterprise wide network which.
Copyright 2002 Year 2 - Chapter 4/Cisco 3 - Module 4 LAN Design By Carl Marandola.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Business Template. We are T.E.A.M. Technology "Connections with cost efficiency in mind“ Cost efficient design for an expanding business. Made the most.
Data Center Services Facilities Management Production Support Operations.
Campus Network Infrastructure Bangladesh University of Professionals(BUP) Prepared By: Mazharul Islam Tuhin.
Networking, Hardware Issues, SQL Server and Terminal Services Session VII.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
MANIT WEB HOSTING SERVICES Presented by - Sandeep Jain & Devesh Lal CRISP, Bhopal.
Mike Meyers’ CompTIA Network+ ® Guide to Managing and Troubleshooting Networks, Third Edition (Exam N ) © 2012 The McGraw-Hill Companies, Inc. All.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
IT Infrastructure Chap 1: Definition
Exploring the Network.
Technical Details – SAN PHARMA SFA. Front End / Back End Details  ASP  ASP.net  XML  JAVA Script  DHTML  MS SQL SERVER.
Objective  CEO of a small company  Create a small office network  $10,000 and $20,000 Budget  Three servers (workstations)  Firewall device  Switch.
Cluster Computers. Introduction Cluster computing –Standard PCs or workstations connected by a fast network –Good price/performance ratio –Exploit existing.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Cisco 3 - Switches Perrine - Brierley Page 112/1/2015 Module 5 Switches.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Security fundamentals Topic 11 Maintaining operational security.
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
CHAPTER 7 CLUSTERING SERVERS. CLUSTERING TYPES There are 2 types of clustering ; Server clusters Network Load Balancing (NLB) The difference between the.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Physical Security Concerns for LAN Management By: Derek McQuillen.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning a Network Upgrade Working at a Small-to-Medium Business or.
Analysis and Forming of Energy Efficiency and Green IT Metrics Framework for Sonera Helsinki Data Center HDC Matti Pärssinen Thesis supervisor: Prof. Jukka.
By Harshal Ghule Guided by Mrs. Anita Mahajan G.H.Raisoni Institute Of Engineering And Technology.
As business and traffic grows a company finds that shared hosting is inadequate to meet demands and even VPS is not sufficient. In both instances security.
West Cambridge Data Centre Ian Tasker Information Services.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Onsite CRM Security
Nexbase Invites You To Our Special Products
Chapter 1: Exploring the Network
CONNECTING TO THE INTERNET
UNIT 19 Data Security 2.
MUNIS Platform Migration Project
Computer Technology Notes #4
DATA CENTERS C21 Engineering Consultancy Services for Telecom Industry
Presentation transcript:

Objectives: Chapter 9: Data Centre Architecture VLAN definition and benefits * VLANs and broadcast domains * Routers role in VLANs * Types of VLANs * VLANs protocols: ISL and 802.1Q * Configure static VLANs * Geographic VLANs

Why we build Data Centre Data center is a term used to describe the physical hosting of computer equipment in a shared data center environment that is mutually beneficial to various tenants without each incurring the full cost of designing, building, and maintaining the environment. Campus data center is designed to function as a hardware facility for the purpose of housing computing systems providing various mission-critical services to the campus. The data center is the heart of any Organization

What is it that makes a Data Center? Power Cooling Fire Security 100% Uptime Puzzle

Data Center Security There are four levels of security for physical access to securely hosted servers and equipment in data center. The first level is code access to the building. Everyone will need a private code or someone with a code to assist you to get into the building. The second level is biometric access to the floor. employees or data center visitors will need to pass a biometric Palm scanner to gain access to Data Center.

Data Center Security The third level is the card reader access to the server area. All access information such who and when gained access to the server area are logged. Security manager can review such access information at anytime. The fourth level is locked cabinets for securely hosted servers. Keys are required to open such locked cabinets.

Data Center Security In addition to four level physical access control, the data center is also monitored by security cameras.

Fire Detection & Suppression Supply, Testing and Commissioning of Kidde Fire Protection System or Approved Equal include optical / ionization smoke detectors and rate of rise heat detectors located within floors / ceilings and room space & Area below raised floor. FM200 extinguishing systems in both large data centers and small computer rooms Hi Fog fire suppression systems in some of the larger data centers.

Fire Detection & Suppression zoned fire alarm panelbreak glass units, sounders and alarm bells. optical / ionisation smoke detectors Gas going out valve

Data Center: Computer Room Power Ensuring the availability of critical data centre, power is at the top of a designers list. IT equipment must be supplied with a clean, consistent source of electrical power, which allows the equipment to avoid system errors and / or a system crash. The following systems are available in a Data centre: Power conditioning and UPS (interruptible Power Supply) systems. Standby diesel generator systems. Mains switchgear. General distribution and lighting.

Data Center: Room Air Conditioning power and environmental control / cooling are inseparable design criteria to achieve cost effective and reliable solutions, by using the following systems : Air conditioning - close control and comfort. ventilation and extract systems. Water detection systems - local and perimeter sensing.

Data Center: Room Build Raised floor (for cabling) Control Room Secure environment

< 1500 m Data Centre < 1500 m IDF IDF IDF IDF MDF OF MDF: Main Distribution Facility IDF: Intermediate Distribution Facility

1000BASE-TX 1000BASE-SX 1000BASE-LX Data centre bandwidth: Gigabit and 10 Giga Ethernet Gigabit Ethernet IEEE 802.3z

Data Centre Architecture

4x CPUs, 12GB Memory With Windows 2003 OS Storage SAN Fiber Connect GE (1000Mb/s) connection FE (100Mb/s) connection SCSI connection Users Workstation Main Network Datbase VLAN 2x 2Gbit Fiber Connections for Storage SAN to different Fiber Channel Switches for Load Balancing and Failover 2Gb/s Fiber Channel 16 Ports Switches Tap Library Store Edge L500 LTO 2 MS SQL Cluster MS Exchange Cluster Internal Web Server SAN Storage SQL Front- End Server Public Web Server Exchange Front -End Server Domain Controller Servers ISA Firewall and Caching Server Anti-virus ServerTest Server SMS Server Backup Server Data Center Network Servers Design 2x CPUs, 8GB Memory With Windows 2003 OS

Data Center Servers Configuration Design Network Services Application Services Visualization Services Storage services

Data Center Secure Connections Data Center network security are customized to each customer's needs. It can be a combination of : firewall on network routers and switches, dedicated network firewalls and checkpoints such as Netscreen, Cisco Pix, Watchguard firewalls, Firewall and antivirus Software on each server. Data transfers can be secured by VPN, SSL, and SSH Windows 2000-based Server/Router Windows 2000-based Server/Router Security Between NetworksRouter Router