Вы находитесь на странице: 1из 51

List of figures

Figure 1: Site view / building layout of Teratai Data Center ....................................................................... 11


Figure 2: Ground floor plan of TDC building............................................................................................. 12
Figure 3: First floor plan of TDC building. ................................................................................................ 13
Figure 4: Second floor plan of TDC building. ............................................................................................ 14
Figure 5: Server room plan with NOC & Command Center Room ............................................................ 15
Figure 6: Legends of Server Room floor plan ............................................................................................ 15
Figure 7: Movement of air flow in the server room | Source: Google image ............................................. 16
Figure 8: Organized cables under subfloor | Source: Google image ........................................................... 17
Figure 9: Data cable in a cable tray install under raised floor | Source: Google image .............................. 17
Figure 10: A model of server rack | Source: Google image ........................................................................ 18
Figure 11: Ramps use in the hallway at ground floor of Teratai Data Center | Source: Google image ...... 18
Figure 12: Plenum installation in the server room | Source: Google image................................................ 19
Figure 13: Perforated tiles | Source:
Figure 14: Solid tiles | Source:
Google image
Google image .......................................... 20
Figure 15: Height of ceiling ........................................................................................................................ 20
Figure 16: APC battery backup power | Source: Google image ................................................................. 21
Figure 17: Power generator | Source: Google image .................................................................................. 22
Figure 18: Temperature flow | Source: Google image ................................................................................ 23
Figure 19: Rack Server | Source: Google image.......................................................................................... 24
Figure 20: Rack Server | Source: Google image.......................................................................................... 24
Figure 21: Blade Server | Source: Google image ........................................................................................ 25
Figure 22: Blade Server | Source: Google image ........................................................................................ 26
Figure 23: Tower Server | Source: Google image ....................................................................................... 26
Figure 24: Biometric | Source: Google image ............................................................................................. 28
Figure 25: Biometric | Source: Google image ............................................................................................. 28
Figure 26: Photo Scanner IDs | Source: Google image ............................................................................... 29
Figure 27: Mantrap | Source: Google image .............................................................................................. 30
Figure 28: Server Cage | Source: Google image ......................................................................................... 30
Figure 29: Vehicle Barrier | Source: Google image..................................................................................... 31
Figure 30: Vehicle Barrier | Source: Google image..................................................................................... 31
Figure 31: Security Alarm | Source: Google image ..................................................................................... 32
Figure 32: CCTV | Source: Google image .................................................................................................... 33
Figure 33: CCTV | Source: Google image .................................................................................................... 33
Figure 34: Fire Suppression Systems | Source: Google .............................................................................. 34
Figure 35: Wireless Smoke Detector | Source: Google image .................................................................... 35
Figure 36: Wireless Smoke Detector | Source: Google image .................................................................... 35
Figure 37: APC | Source: Google image ...................................................................................................... 36
Figure 38: Avocent | Source: Google image ............................................................................................... 36
Figure 39: BayTech | Source: Google image ............................................................................................... 36
Figure 40: CPI | Source: Google image ....................................................................................................... 37
1

Figure 41: dataprobe | Source: Google image............................................................................................ 37


Figure 42: EATON | Source: Google image ................................................................................................. 37
Figure 43: EMERSON | Source: Google image ............................................................................................ 37
Figure 44: Great Lakes | Source: Google image.......................................................................................... 38
Figure 45: LEVITON | Source: Google image .............................................................................................. 38
Figure 46: Liebert | Source: Google image ................................................................................................. 38
Figure 47: MINICOM TRIPP.LITE | Source: Google image ........................................................................... 38
Figure 48: RITTAL | Source: Google image ................................................................................................. 39
Figure 49: Shown how the labeling will looks like| Source: Google image ................................................ 40
Figure 50: Shown the label for each of the cable | Source: Google image ................................................ 41
Figure 51: Shown the APIs process works | Source: Google image ........................................................... 48

List of tables
Table 1: Basic information of Teratai Data Center ....................................................................................... 4
Table 2: Total cost ......................................................................................................................................... 7
Table 3: Label and signage .......................................................................................................................... 42
Table 4: Possible position............................................................................................................................ 46

1.0

INTRODUCTION
Teratai Data Center is a facility designed to house computer hardware in order to
effectively manage mission critical data for companies and our clients. These
facilities can host network equipment, including website servers, data storage and
back-up servers, software applications for large companies, and more. At Teratai
Data Center, our customers satisfaction is our top priority. Which is why we look
for the best co- location services that ensures high availability is secured and offers
round the clock support.
Teratai Data Center will be established in February 2020. It will be located
strategically at Cyberjaya which is in Selangor. It is developed in between rural and
urban area. This is because a data center should locate near corporate headquarters
with the ease of remote access to computers and a robust telecommunications
infrastructure. Besides that, Teratai Data Center will hire experience staffs in system
management. Teratai Data Center will responsible in managing the data and all
services offered. Teratai Data Center will ensure that customers will always satisfy
with the treatment given. Table below is the basic information of the Teratai Data
Center:

Table 1: Basic information of Teratai Data Center

Name of organization

Teratai Data Center

Address

No. 1, Jalan Cyber Point 4, Cyber 8, 63000 Cyberjaya,


Selangor Darul Ehsan, Malaysia

Phone Number

+603 2330 1900

Fax Number

+603 2330 1901

Email

info@ terataidatacenter.com

Operating hours

Monday to Friday: 8.00 a.m. - 5.00 p.m.

2.0

DATA CENTER SITE/ LOCATION


Teratai Data Center will locate strategically at Cyberjaya, Selangor. We decided to
build data center building in this area because of the area are suitable to build the
data center building. This is because the location safe fom man-made disaster. Based
on energy and construction costs, telecom infrastructure reliability, and the risk of
natural disasters take on added importance when we do selection of Teratai Data
Center.
Teratai Data Center consists of three levels which are ground floor, 1st floor and 2nd
floor. Ground floor contains entrance area, server room, security room, NOC and
command center room, and UPS and battery room. 1st floor contains seminar room,
meeting room, toilet, musolla, pantry, store room, and media storage room. 2nd floor
contains CEO room, meeting room, office, pantry and toilet.
We decide to choose this location because of several factors. First is the location is
the place that completely for technologies area. This location to build the data center
also near with several accommodation such as rapid bus, mosque and so on. In
addition, this location is very strategically and secured from any disaster
phenomenon such as flood, typhoon and earthquake. Next, the location we choose
also safe and far away from man-made disaster.

3.0

INFRASTRUCTURE TIERS
Teratai Data Center is currently at Tier 3 which is ideal for large-business Company
that is required for saving large data. At Tier 3, our company is 99.982 percent
uptime yearly which equal to 1.6 hours downtime yearly only. Unlike Tier 1 or Tier
2 which are required to shut down any computer equipment, our Tier 3 data center
72 hours power outrage protection that are readily to backup any computer
equipment that located in this facility.
Teratai Data Center is a concurrently maintainable data center that has plenty of
capacity components and multiple independent distribution paths components and
5

multiple independent distribution paths serving the computer equipment at any time.
Other than that, our Tier 3 data center is generally N+1 fault tolerant. Our data center
is providing high security system that is meeting the requirement of those tier 3 data
center.
Teratai Data Center also providing friendly and best services for the clients that
provided by Teratai Data Center engineers and technician. Teratai Data Center also
provide unique infrastructure and design that are different from others data center.

4.0

TOTAL COST
Table 2: Total cost

No.
1.

Item and specifications


Rack server (30 units)

Cost per item

Total cost

(RM)

(RM)

70,000

2,100,000

1,050,000

4,200,000

Company: Dell
Specifications:
Processor
Intel Xenon processor E31200 product family
Intel Xenon processor E31200 V2 product family
Intel Pentium G600 and
G800 series
Intel Celeron G400 and
G500 series
Operating system
Microsoft Windows Server
2012
Microsoft Windows Small
Business Server 2011
Microsoft Windows Server
2008 R2 Foundation SP1
Microsoft Windows Server
2008 SP2, x86/x64
2.

Power generator (4 units)


Company: Safesidepower
Specifications:
i.

Fuel type: the generator uses diesel as

its operating fuel


ii.

Portability: industrial backup generator

iii.

Phase:

generator outputs

standard

single phase voltage


iv.

Voltage: generator output voltage can


be set to 120 volts or 240 volts

3.

HVAC (6 units)

800,000

4,800,000

30,000

210,000

80,000

2,400,000

Company: GETEX Supply and Engineering


Specifications:
i.

80% AFUE

ii.

Heating input range 50,000 125,000


Btuh

iii.

Two stage heating

iv.

Multi position, upflow, downflow,


horizontal left or right

v.

115v humidifier and electronic air


cleaner connections

vi.
4.

Fused low voltage circuit protection

Biometrics (7 units)
Company: ASIS Technologies
Specifications:

6.

i.

Size: dimension 181.6 x 126 x 49mm

ii.

User capacity: 1500

iii.

Transaction storage: 10000

iv.

Sensing area: 18mm x 22mm

v.

Identification time: =2s

vi.

Operating temperature: 0 45 degree

vii.

Operating humidity: 20% - 80%

CCTV (30 units)


Company: ASIS Technologies
Specifications:
8

7.

i.

Pattern: PAL/NTSC

ii.

Image device: sharp ccd

iii.

Resolution: 420TVL

iv.

Lens: 3.6/6/8mm

v.

Infrared distance: 35m

vi.

Angel: >=45

Fire Suppression (15 units)

500,000

7,500,000

80,000

960,000

200,000

200,000

Company: Marioff Corporation


Specifications:
i.

FM 200 nontoxic gas based fire


suppression

ii.

Environmentally clean agent

iii.

Fast-acting

and

efficient

extinguishment
iv.
8.

Safe for occupied spaces

UPS (12 units)


Company: Dell
Specifications:
i.

Capacity 40

ii.

Dimensions 450 x 1200 x 640

iii.

Battery internal or external 360 372


cells

9.

iv.

Power factor 0.99

v.

Frequency 50/60 Hz (45-65 Hz)

Cable
Company: CABLExpress Corporation
Specifications:
Color

Cable spec

Network

Blue

Cat6

Production

Green

Cat5e

Management

Orange

Cat5e

Serial
9

Red

Cat5e

Out of band
access

Yellow

9/125

All

fiber

singlemode

connctions

fiber
Total

22,370,000

10

5.0

DATA CENTER DESIGN


Teratai Data Center consists of different types of layout which explain different
functions.

5.1 Site View / Building Layout

Figure 1: Site view / building layout of Teratai Data Center

11

5.2 Floor Plan

Figure 2: Ground floor plan of TDC building

12

Figure 3: First floor plan of TDC building.

13

Figure 4: Second floor plan of TDC building.

14

5.3 Server Room Plan

Figure 5: Server room plan with NOC & Command Center Room

Figure 6: Legends of Server Room floor plan


15

6.0 DATA CENTER INSTALLATION


Data center installation explains several things about the installation on the server layout.
These include cables, tiles, arrangement of racks, ceiling height, and ramp.

Figure 7: Movement of air flow in the server room | Source: Google image
How air flows in server room?
i.

Cold air from HVAC flow from the perforated floor to cold the server.

ii.

Hot air from the server rise up to the ceiling.

iii.

Cold air out from the perforated floor (hot aisle) went through the cold aisle to cold the
hot air which reflects from the solid tiles floor.

iv.

Hot air that rises up the ceiling collects by the HVAC.

v.

The HVAC forced to chill the air in subfloor plenum.


6.1 Under-floor installation
Under-floor cabling contributes to energy losses. When new network or power cables
are added under the floor, older unused cables are rarely pulled out to make room.
Instead the cables are left undisturbed to minimize risk of downtime. The build-up of
cables causes blockages in air flow which contribute to hot spots in the data center.

16

Figure 8: Organized cables under subfloor | Source: Google image

6.2 Modular cable trays


A cable tray system is used to support insulated electric cables used for power
distribution and communication. Cable trays are used as an alternative to open wiring
or electrical conduit systems. Modular cable trays allow for layered placement of
cables which allows for simpler cable maintenance.

Figure 9: Data cable in a cable tray install under raised floor | Source: Google image

17

6.3 Server rack


A rack server, also called a rack-mounted server, is a computer dedicated to use as a
server and designed to be installed in a framework called a rack. The rack contains
multiple mounting slots called bays, each designed to hold a hardware unit secured in
place with screws.

Figure 10: A model of server rack | Source: Google image

6.4 Ramps
The ramp must support the weight of equipment, people, and mechanical devices
used to lift the equipment (such as electrical-powered pallet jacks). Ramps that must
support heavy weight are made of poured concrete.

Figure 11: Ramps use in the hallway at ground floor of Teratai Data Center | Source:
Google image

18

6.5 Plenum
A plenum space is a part of a building that can facilitate air circulation for heating and
air conditioning systems. Space between the structural floor and the dropped ceiling
or under a raised floor is typically considered plenum; however, some drop-ceiling
designs create a tight seal that does not allow for airflow and therefore may not be
considered a plenum air-handling space.

Figure 12: Plenum installation in the server room | Source: Google image

6.6 Floor tiles


There are two types of floor tiles which are solid and perforated tiles. The raised floor
consists of tiles or floor panel that provide a supporting base for racks and equipment
generally 2-feet squares. Usually the tiles made of metal such as cast aluminum. A
good floor tiles must support maximum load specifications exceed the requirements.

19

Figure 13: Perforated tiles | Source:

Figure 14: Solid tiles | Source:

Google image

Google image

6.7 Ceiling
To help the movement of hot air from hot aisle to infuse in HVAC, a 16 ceiling
height is needed. Moreover, it is also for installing smoke detector.

16

Figure 15: Height of ceiling

20

7.0 POWER CONSUMPTION


7.1 Main power supply
TDC were using electricity from Tenaga Nasional Berhad Malaysia (TNB) and
generate running smoothly in TDC. With using 11kV HT Power Feed from TNB
Power Grid.

7.2 UPS and battery


An uninterruptible power supply, also uninterruptible power source, UPS or
battery/flywheel backup is an electrical apparatus that provides emergency power to a
load when the input power source, typically mains power, fails. A UPS differs from
an auxiliary or emergency power system or standby generator in that it will provide
near-instantaneous protection from input power interruptions, by supplying energy
stored in batteries, super capacitors, or flywheels. The on-battery runtime of most
uninterruptible power sources is relatively short (only a few minutes) but sufficient to
start a standby power source or properly shut down the protected equipment.

Figure 16: APC battery backup power | Source: Google image

21

7.3 Battery
Battery functions as to supply current when power is lost. While sealed lead-acid
(SLA) batteries remain the standard power source for about 50 percent of existing
data center battery backup unit, their limitations are widely known.

Lead acid

batteries need to either be topped off with water every few years or completely
replaced data center battery.

7.4 Power generator


TDC decided to outsource the power generator from WCM Power Sdn. Bhd.
(Formerly known as AEP POWER SDN BHD) which located at Lot 16, Jalan
Teknologi 3/5, Taman Sains Selangor 1, 47810 Kota Damansara, Selangor Darul
Ehsan, Malaysia. WCM Power Sdn. Bhd. as one-stop turnkey machinery solutions
provider in the power generator industry emphasizes very much on quality and
comprehensiveness of their products and services. Their generator sets are used
throughout a wide range of industries including healthcare, manufacturing, oil and
gas, telecommunications, leisure, construction, retail, event management and
emergency aid relief.
WCM Power is able to design and build generator sets, which are specific to the prerequisite project requirements set by clients. WCM Powers house brand, WCM
Energy can be designed and customized to meet specific power needs. Each WCM
generator set is built with high quality engines, which assures fuel efficiency and low
operating and maintenance costs. All WCM Energy generator sets are fully tested at
WCM Powers factories before delivery to the clients.

Figure 17: Power generator | Source: Google image


22

7.5 Air conditioner (heating, ventilation and air conditioning), HVAC


HVAC is the technology of indoor and vehicular environmental comfort. Its goal is to
provide thermal comfort and acceptable indoor air quality. HVAC system design is a
sub discipline of mechanical engineering, based on the principles of thermodynamics,
fluid mechanics, and heat transfer. It is important in the design of medium to large
industrial and office buildings such as skyscrapers and in marine environments such
as aquariums, where safe and healthy building conditions are regulated with respect
to temperature and humidity, using fresh air from outdoors.

Figure 18: Temperature flow | Source: Google image

23

8.0 TYPES OF SERVERS


8.1 Rack Server
A rack server, also called a rack-mounted server, is a computer dedicated to use as
a server and designed to be installed in a framework called a rack.
The rack contains multiple mounting slots called bays, each designed to hold a
hardware unit secured in place with screws. Rack server created because to save
the physical floor space and other servers. One rack can support about 20-25 units
of servers but it depends on the equipment.

Figure 19: Rack Server | Source: Google image

Figure 20: Rack Server | Source: Google image

24

8.2 Blade Server


HP Blade System is a modular infrastructure platform that converges server,
storage and network fabric to accelerate operations and speeds delivery of
applications and services running in physical, virtual, and cloud-computing
environments. Designed to optimize virtually any workload, it is managed by a
consumer inspired management platform that delivers unprecedented ease of use
allowing you to deploy and manage your environment faster, at lower cost, and
maximize productivity at any scale. The blade servers themselves contain only the
core processing elements, making them hot- swappable. HP refers to the entire
package as a Blade System.

Figure 21: Blade Server | Source: Google image

25

Figure 22: Blade Server | Source: Google image

8.3 Tower Server


A tower server is a computer intended for use as a server and built in an upright
cabinet that stands alone. The cabinet, called a tower, is similar in size and shape
to the cabinet for a tower-style personal computer. This is in contrast to
rack server s or blade server s, which is designed to be rack-mounted. By using
tower server, our server cans easier cooling, because the overall component
density is fairly low. Besides, the scalability of the tower server because an
unlimited number of servers can be added to an existing network.

Figure 23: Tower Server | Source: Google image

26

9.0

PHYSICAL AND ENVIRONTMENTAL SECURITY


9.1 Physical Security
Teratai Data Center have their own ways to maintains their physical securuty to
secure the data center. Teratai Data Center have highest standards of physical
security to ensure it secure to all staff. To maintain the high value assets and high
protection to data center, we need to ensure the security in high standards of
protection. With this security, to protect the employees, information and physical
assets that contain in data center. There are several type of physical security that
have contain in Teratai Data Center:

a) Biometric
In Teratai Data Center provide biometrics scanner to employees to enter
the building. This is a high tech, small terminal that will read an
employees fingerprint and then store it as a mathematical algorithm. This
is an important point, as many employees express concern that their
fingerprint is being kept on record. This is not the case; the algorithm is
simply a code to allow the reader to check the fingerprint. There is no way
to reconstruct a fingerprint from the algorithm.
Fingerprint Readers experience an extremely low number of false accepts
or false rejects. When using the fingerprint reader for access control, you
may assign a duress fingerprint. This means another finger can be used
in times of duress for example if you are being forced to open a door. The
door will open as normal but the system will silently send a duress signal
to the main terminal or guard room.

27

Figure 24: Biometric | Source: Google image

Figure 25: Biometric | Source: Google image

b) Photo Scanner Ids For Employee


Teratai Data Center also provide photo scanner IDs for employee to
identify their ID before enter the building. Our Photo ID Scanner captures
data from both sides of the ID to help provide the most accurate data
possible. These durable ID scanners are the best in the industry and prove
to be very reliable. When an ID is inserted, the ID scanner will grab the ID
and pull it through the scanner. Within a few seconds, the ID is scanned.
28

Besides that, photo scanner also for visitor to access the building
especially into the data center. All staff in Teratai Data Center must be
identifiable by their staff card.

Figure 26: Photo Scanner IDs | Source: Google image

c) Mantrap
At the entry of Teratai Data Center have a mantrap. Mantrap means that
a mantrap, air lock, sally port or access control vestibule is a physical
security access control system comprising a small space with two sets of
interlocking doors, such that the first set of doors must close before the
second set opens. In a manual mantrap, a guard locks and unlocks each
door in sequence. An intercom and or video camera are often used to
allow the guard to control the trap from a remote location.
In aquatic situations and in space, mantraps are known as airlocks. This is
counterintuitive, because exactly the same design is used for the opposite
purpose. A mantrap is used to keep an individual in, whereas an airlock is
used to facilitate ingress or egress.

29

Figure 27: Mantrap | Source: Google image

d) Server Cages
In Teratai Data Center provides server cage for the server racks. The
server racks should be secure with lock and access in controlled. Server
room is behind from security so we need to secure the server racks from
missing. In Teratai Data Center not able anyone to access the data center
or server room to protect the security. The server cages can keep away
from delicate equipment with lockable.

Figure 28: Server Cage | Source: Google image

30

e) Vehicle Barrier
The barrier security system is the security to protect people enters the data
center without permission. Visitor will be asking with security guard
before the vehicle barrier is open to enter in Teratai Data Center. The
vehicle barrier has at post guard, the security entrance and before exit
from the Teratai Data Center.

Figure 29: Vehicle Barrier | Source: Google image

Figure 30: Vehicle Barrier | Source: Google image

31

f) Security Alarm
Security alarm is important security to contain in Teratai Data Center. A
security alarm is a system designed to detect intrusion unauthorized entry
into a building or area. Security alarms are used in residential,
commercial, industrial, and military properties for protection against
burglary (theft) or property damage, as well as personal protection against
intruders.

Figure 31: Security Alarm | Source: Google image

9.2 Environment Security


9.2.1

CCTV

Inside Teratai Data Center is containing 30 secure cameras to monitor the


data center.

Closed-circuit television (CCTV), also known as video

surveillance, is the use of video cameras to transmit a signal to a specific


place, on a limited set of monitors. It differs from broadcast television in
that the signal is not openly transmitted, though it may employ point to
point (P2P), point to multipoint, or mesh wireless links. In Teratai Data
Center, CCTV equipment may be used to observe parts of a process from
a central control room. CCTV systems may operate continuously or only
as required to monitor a particular event. A more advanced form of
CCTV, utilizing digital video recorders (DVRs), provides recording for
possibly many years, with a variety of quality and performance options
and extra features such as motion detection and email alerts. Teratai Data
32

Center put CCTV around the building, at all entrance and exits, and every
access point throughout the building. So, the security guard can see the
area around Teratai Data Center.

Figure 32: CCTV | Source: Google image

Figure 33: CCTV | Source: Google image

9.2.2

Fire Suppression Systems


Fire Suppression Systems are commonly used on heavy power
equipment. Suppression systems use a combination of dry chemicals
and/or wet agents to suppress equipment fires. Suppression systems have

33

become a necessity to several industries as they help control damage and


loss to equipment. In Teratai Data Center are providing 15 fire
suppression installed. For each floor that contain 5 or more fire
suppression to prevent the data center for loss of information. In Teratai
Data Center, automatic fire suppression systems control and extinguish
fires without human intervention. Examples of automatic systems include
fire sprinkler system, gaseous fire suppression, and condensed aerosol
fire suppression.

Figure 34: Fire Suppression Systems | Source: Google

9.2.3

Wireless Smoke Detector

Teratai Data Center installed every floor of data center wireless smoke
detector to protect the data center. This wireless smoke detectors twoway communication enables it to activate the built-in sounders of all
enrolled smoke detectors during an alarm, notifying the whole area of an
incident. This device is powered by long-life 3V Lithium batteries and
utilizes photoelectric smoke detection technology. It also includes rapid
rate-of-rise temperature detection. There are invisible intruders, for
example fire or smoke, which are more dangerous than the sneaked-in
intruders. These incidents are unpredictable and it can start from the
34

interior anytime. It is not feasible to have security guards monitor fire


incident all day long, at all points of the building. Instead, you can install
another type of interior volumetric detection system, for example
smoke/heat sensor, around all corners to detect smoke or fire once it
started.

Figure 35: Wireless Smoke Detector | Source: Google image

Figure 36: Wireless Smoke Detector | Source: Google image

35

10.0

LIST OF VENDORS

a)
Figure 37: APC | Source: Google image

APC specializes in rack, UPS, power, datacenter monitoring, and data center
infrastructure cooling.

b)
Figure 38: Avocent | Source: Google image

Avocent specializes in Data Center Management, Outlet Level Power, KVM over IP
and Analog Cat5 KVM Switches.

c)
Figure 39: BayTech | Source: Google image

BayTech specializes in Ethernet and RS232 Remote Power Switches and Remote
Power Management Software

36

d)
Figure 40: CPI | Source: Google image

Chatsworth Products, Inc. (CPI) specializes in server racks and cable management
solutions.

e)
Figure 41: dataprobe | Source: Google image

DataProbe specializes in Web Controlled Remote Reboot / Power Cycle Products.

f)
Figure 42: EATON | Source: Google image

Eaton Powerware provides power quality and UPS (uninterruptible power supply)
management solutions.

g)
Figure 43: EMERSON | Source: Google image

Emerson uninterruptible power and precision cooling systems that protect the worlds
most critical data centers.

37

h)
Figure 44: Great Lakes | Source: Google image

Great Lakes Case & Cabinet Co., Inc. is a leading manufacturer of racks, wall mount
and free-standing enclosures.

i)
Figure 45: LEVITON | Source: Google image

Leviton Manufacturing Company is the largest privately held manufacturer of


electrical wiring equipment in North America.

j)
Figure 46: Liebert | Source: Google image

Liebert uninterruptible power and precision cooling systems that protect the worlds
most critical data centers.

k)
Figure 47: MINICOM TRIPP.LITE | Source: Google image

Minicom by Tripplite specializes in Cat5 KVM Switches, Cat5 KVM Extenders and
AV Splitters.
38

l)
Figure 48: RITTAL | Source: Google image

Rittal is a leader in Liquid Cooling, Rack Enclosures and Data Center Infrastructure
Solutions.

39

11.0

LABELLING AND SIGNAGE


As for labeling in our Data Center, we decide to label all of our equipment especially
for the servers and also other appliances such as firewall and switches, we decide to
do some deploying in labeling. While labeling the format system in order to specify
each of the components will be maintain well and to ease the process of network and
housekeeping so that it will be going as smooth as can.
Then for the text or word on the labels should be machine generated, and labels
should be visible during normal maintenance of the infrastructure. Labels should be
resistant to the environmental conditions (such as moisture, heat or ultraviolet light)
at the point of installation and should have a design life equal to or greater than that
of the labeled component. Keeping and maintaining good records is the most
important aspect of a labeled infrastructure, and identifier information must be
referenced in permanent records, backed up and secured by building administration.

Figure 49: Shown how the labeling will looks like| Source: Google image

40

Figure 50: Shown the label for each of the cable | Source: Google image

41

Table 3: Label and signage

No.

Signage

Terms
In the Data Center area, not all of the

1.

department or division people can use their


smartphones.

Some

departments

are

prohibited from bringing any smartphones


because it will be ringing at any time,
especially in the server room. This is because
it can allowed people to record or steal and
captured the data in the data center.
2.

This label means that in this area, do not eat


and enter the outside food in the data center.
This is because the food will be able to make
the data center become dirty and also can
effect on the server.

3.

In the Data Center, the label of No smoking is


prohibited. Smoking is strictly not allowed in
the data center. This is because the smoke can
be detected by the smoke detector devices
that required in the data center.

42

4.

In the Data Center, people are strictly


prohibited from take any pictures in the data
center especially in the server room. This is
because it can allow people to captured the
data in the data center and easily give it to
other agencies.

5.

In Data Center, people are not allowed to


bring their pets inside especially cats, dog and
so on. This is because this area is not suitable
for animals to walk in around the data center.

6.

In the Data Center, if this label is shown it


means that it is the direction to go to the toilet
or restroom that provided in the data center.

7.

This symbol is take place at the M&E


Standby and Generator Room. This is
because these rooms contain lots of electric
wire that can be dangerous towards people.
Only authorized person or in charge person
allowed to enter this area or it will give harm
to those people who enter this room.

43

8.

In the Data center, there are several areas that


cannot be entered but only can be access by
an authorized person which have their own
identification card (ID). This area could be
server

room,

UPS

and

battery

room,

generators room and so on.

9.

In the Data Center, people are strictly cannot


throw the rubbish anywhere they want.
People either staff or clients are prohibited to
throw the rubbish in the data center either
inside or outside the data center.

10.

As for Muslim, prayer room is also provided


in the data center. So that it can make people
either staff or clients to do the solah.

44

11.

In the Data Center,emergency exit symbol are


placed in the building because it can helps
staff and clients exit when disaster are happen
for an example like fire, earthquake and so
on.

45

12.0

POSSIBLE POSITION
Table 4: Possible position

Position

No. of

Duties

people
required
Data Center

Responsible for equipment maintenance tasks


such as managing and installing custom

Manager

upgrades for customers such as replacing cables,


components

and

accessories;

maintaining

records and drawing schematics of the center to


detail what equipment is installed.
Administrative duties might include scheduling
employee shifts, planning for capacity changes,
maintaining corporate databases and ensuring
compliance with government regulations.

Data Center

Supervises day-today activities of Data Center


Operations Technicians across all shifts in a

Operation Manager

24x7 environment through a team of Team


Leaders.
Recommends

changes

in

procedures

or

equipment that would increase productivity,


reduce cost, and better serve Data Center
requirements and customers

Data Center
Operation

Understand, troubleshoot, and fix broken


servers/Linux OS related issues on server.

46

Install new servers, design rack layout and

Technician

power allocation.

Data Center

Responsible for monitoring and operation of


data center critical functions and facilities.

Operation Analyst

Perform customer installation activities to


include but not limited to physical server
racking,

cabling,

rack

layout

definition,

electrical requirements, HVAC requirements


configuration, etc.

Data Center

Operation Engineer

Enhance platform automation, documentation,


and system performance
Adhere

to

stringent

security

and

change/configuration management procedures


and policies.

SARGENT- Data

Monitor, troubleshoot and resolve Windows


server

Center Specialist

environment

as

well

as

backup

infrastructure
Identify network/applications issues.

IT Server Engineer

Help establish a customer experience strategy


while working with the local site Data Center
Management team, as well as local Operations,
and Critical Environments teams.

47

13.0

OTHER TECHNOLOGIES OR SYSTEM USED


In our Data Center or also known as TDC, we will provide other technology that will
be very useful in our operations. It known as API (Application Programming
Interface).

13.1

Introduction of APIs
APIs are helping to usher in new mechanisms for making data center
management more automated and scalable. Theyre also key to network
virtualization and private clouds. APIs are driving the evolution of data
center management from manual configuration of hardware and software
to more automated and scalable techniques. Any discussion of public or
private clouds, and software-defined everything, must include APIs.
However, for many enterprises, the rise of APIs for configuration is a
new(ish) concept. Here's what you need to know. Traditionally, IT would
configure software and hardware manually, or use scripts driven by the
CLI, screen scraping and so on. This approach is time-consuming, errorprone, and unsuited in an age when virtualization can speed deployment of
resources and services. Enter the API. An API is an interface that allows
software components to talk to one another; it's a library of specifications
of objects, routines and data structures. An API isn't restricted to software;
even hardware requires software as an interface for configuration and
management.

Figure 51: Shown the APIs process works | Source: Google image

48

13.2

Functionality of APIs
A major function of APIs for high-level management is in the integration.
Without an API, the managing system code must be tightly coupled with
the standard configuration interface of the object (CLI, GUI, and so on).
Using a well-built API abstracts that complexity, which allows for more
seamless integration. This also helps with upgradability dependencies.
Besides that, APIs provide a programmable interface for the components
of the data center. This allows both custom configuration and better
integration with higher-level management systems.

49

14.0

CONCLUSION
As a nutshell, Data Center is known as a mission critical site that is as a facility used
for housing a large amount of computer and communications equipment maintained
by an organization for the purpose of handling the data necessary for its operation.
Data center is a must nowadays for a company, especially large-sized company. For
a company to organize their excessive data, they required the services of a data
center. With fast growing of technologies nowadays, each of the data center are now
upgrading in order to meet the clients demands and standard. Every data center is
competing each other in order to meet the customers favor, but it is up to the
customers choose which one they prefer. Besides, Data Center helps the process of
business transaction and also stores your intellectual property.

50

15.0

REFERENCE
Google. Inc. (n.d). data center Google. Retrieved April 10, 2015 from
http://www.google.com/about/datacenters/
Zimrock Marketing. (n.d). the data center journal industry. Retrieved April 10, 2015
from
http://www.datacenterjournal.com/it/industry-perspective-labeling-data
-center/

51

Вам также может понравиться