Data Centre (DC)
A data centre is a physical facility that organizations use to store their critical applications hosted and store data. Its made to achieve the business goals of an organization.
A traditional DC consists of core routers and Switches. The common infrastructure of the date center broadly includes:
- Active/Passive Infrastructure
- Compute Infrastructure
- Storage Infrastructure
- Network & Security Infrastructure
A data Centre’s design is based on both IT and Non-IT assets. Out of IT assets there are many network devices, security devices, servers and storage solutions that enable the delivery of shared applications. Those includes PCs, routers, switches, firewalls, storage systems, servers, and application-delivery controllers.
Basic IT Systems:
- Compute System - Rack Servers, Blade
- Network System - Router, Spine Switches, Leaf Switches, Management Switches , Link Load Balancer, SDN Controller.
- Storage System - SAN Switches, Enterprise Storage, Tape Library.
- Cyber Security System - Next Generation Firewall, AAA , DDoS, Anti APT, DLP , Vulnerability Solution.
- Endpoint Security - Antivirus, HIPS, E-mail & Spam Protection.
- VM Based Licenses - Cloud Management & Orchestration, Enterprise Management System.
- Licenses - Windows, MS Office, Oracle DB, MS SQL, My SQL, RHEL, Post gre Sql.
The commonly used standard for infrastructure design of DC is ANSI/TIA-942. Along with this DC design has been distinguished in to four (4) no of tiers (T-I, T-II, T-III and T-IV).
- Highly software-centric.
- Highly virtualized across compute, networking, and storage elements.
- Appropriate context of users, applications, devices, locations Virtual Machine, Network attributes, Advanced infrastructure needs, Security and audit, Performance management.
- Adaptable and extensible though modular software and hardware components.
- Service-oriented architecture (SOA)
- Agile components.
- ITIL and ISO/IEC standard processes
- AAA
- Access control
- Secure and encrypted data handling
- Resistance against attacks
- Strong authentication between components that interact.
- Physical Security deployment
- Perimeter security configuration
- Performance related Service level
- IT infrastructure related service level
- Virtual Infrastructure related Service level
- Security and Incident Management related service level
- Helpdesk support services
- Manpower related service level
- Compliance & MIS reporting related service level
- Civil major and minor Works
No comments:
Post a Comment