Preview

Data Center

Powerful Essays
Open Document
Open Document
1549 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Center
The Difference Between Data Centers and Computer Rooms

By Peter Sacco

Experts for Your Always Available Data Center

White Paper #1

EXECUTIVE SUMMARY
The differences between a data center and a computer room are often misunderstood. Furthermore, the terms used to describe the location where companies provide a secure, power protected, and environmentally controlled space are often used inappropriately. This paper provides a basis for understanding the differences between these locations and how they relate to each other.

2
©2006 PTS Data Center Solutions. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or Rev 2006-0 stored in any retrieval system of any nature, without the written permission of the copyright owner. www.PTSdcs.com

Data Center Function
The functional requirements of any data center space are fourfold: 1. To provide a safe and secure place to locate mission critical equipment 2. To provide sufficient power protection to maintain the critical load 3. To provide adequate environmental controls, including cooling and fire safety, to operate the space within the critical loads operating parameters 4. To provide communications connectivity both inside and outside the space

Data Center Philosophy
The goal of any data center is to provide continuous availability of all network services. Therefore, whether discussing the network design strategy or the facility design strategy the overall philosophy remains the same: Keep it as simple as possible Design for scalability Utilize modularity wherever possible Be flexible and adaptable to change

Data Center Description
The term ‘data center’ is used ubiquitously to describe the space(s) serving as the operating theatre for the enterprise’s network service delivery. It has also been described by many other names including computer room, datacenter (spelled incorrectly), data centre (European), server room, network room, network closet,

You May Also Find These Documents Helpful

  • Good Essays

    NTC362 Week 2 INDP part 1

    • 719 Words
    • 3 Pages

    The IT data center houses the hospital HIS system. There are three servers in the data center: A Windows exchange server, Internet server, and a RAS server. All three servers are IBM 3250’s with MS Windows Exchange Server and Linux Apache operating systems. There are also a 10 Tera Byte NAS, Cisco…

    • 719 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    The company also uses the databases from other catalogues sales companies and from internet. So therefore they will require large amount of user space which can be provided by Datacenter.…

    • 776 Words
    • 4 Pages
    Good Essays
  • Better Essays

    INDP Final Project

    • 3551 Words
    • 12 Pages

    data center’s workstations are all Apple iMACs that run a MAC OS X from a remote desktop.…

    • 3551 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Observing the network structured layout (Apollo Group Inc., 2008) reveals that the deployment decisions were made depending on the physical distances between the nods in each major network part. In the first part, it was obvious that the nods where in one physical place and the distances between them is not more than three hundred meters, this assumption were made depending on the fact that the 1000Base T network cannot be efficient more than the distance mentioned above. Where the second major part is in physical locations that more in distance than the executive network, this was based on the assumption the multi-core fiber network can be distanced up to two to three kilometers.…

    • 948 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Pos420 Final Paper

    • 2424 Words
    • 10 Pages

    The objective is critiquing possible Servers that will improve the protection of data, provide a stable environment to support business, allow transaction monitoring, store sales transactions from POS terminals, backup data, and manage databases.…

    • 2424 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    The system is divided up into four main areas, office automation, research and development (R & D), servers and network attached storage (NAS), and communication (Apollo Group, Inc., 2013). The IT staff in China are all contract workers reporting to a local IT manager. The IT manager for the China facility reports to Maria Trinh, Riordan Manufacturing’s Chief Information Officer (CIO). None of the China IT department’s employees, except for the Manager are Riordan employees (Apollo Group, Inc., 2013).…

    • 1596 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Nt1210 Chapter 1

    • 4800 Words
    • 20 Pages

    CHAPTER 1 INFORMATION TECHNOLOGY1.0 Introduction Information technology (IT) is the design, development, implementation, support, and management of computer hardware and software applications. An IT professional is knowledgeable about computer systems and operating systems. This chapter will review IT certifications and the components of a basic personal computer system.After completing this chapter, you will meet these objectives: * Explain IT industry certifications. * Describe a computer system. * Identify the names, purposes, and characteristics of cases and power supplies. * Identify the names, purposes, and characteristics of internal components. * Identify the names, purposes, and characteristics of ports and cables. * Identify…

    • 4800 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    The security analyst of the accounting firm suggested that it's a good practice to have a dedicated room for server’s equipment to avoid any damages. This could be quite costly for the small company, however it would make a good investment in order to secure the company's network. The servers would be positioned on a server rack in the designated room with network devices such as modems, switches, routers, firewalls, and the Intrusion Detection System. This room should have restricted access and only authorized personnel must have access to it, by using sophisticated keycard systems and even having additional security procedures such as biometrical readers etc. It was also proposed to get rid of Motorola SB3100 and Net Gear MR814 to increase…

    • 940 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Ho Yu ITGC

    • 1328 Words
    • 5 Pages

    visitors must first contact the data center manager for entry into the computer room. Each must…

    • 1328 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Research Paper 1 It 221

    • 5150 Words
    • 21 Pages

    With unlimited virtualization use rights and a hypervisor-based virtualization technology, Windows Server 2008 R2 Datacenter provides both flexibility and cost savings. Windows Server 2008 R2 Datacenter also supports the memory and processing needs of large-scale, business-critical workloads such as ERP, databases, server consolidations, and custom and line-of-business applications.…

    • 5150 Words
    • 21 Pages
    Powerful Essays
  • Best Essays

    554 Infrastructure

    • 3120 Words
    • 13 Pages

    Iniewski, K., McCrosky, C., & Minoli, D. (2008). Network infrastructure and architecture: Designing high-availability networks. Hoboken, NJ: Wiley-Interscience.…

    • 3120 Words
    • 13 Pages
    Best Essays
  • Powerful Essays

    Final

    • 2470 Words
    • 10 Pages

    Nici, A. (2012, June 12). Live Chat 7. Retrieved June 17, 2012, from Colorado Technical University Online: http://ctuadobeconnect.careeredonline.com/p12221060/?session=breezzdc9uddrsheofqz2…

    • 2470 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    In order to reduce the risks and vulnerabilities of each location, we must implement access control to ensure confidentiality, integrity, and availability. For the Billing, Montana location we have to consolidate 14 Hewlett Packard Unix servers to 1 UNIX server. Upgrade 75 Microsoft Windows servers to Windows server 2008 R2. Upgrade MS exchange e-mail to latest version. We must find another software vendor to replace Oracle financials for accounting and financial systems, Logisuite 4.2.2, and RouteSim. We have to hire developers to standardize the office automation hardware and software. Convert telecommunications system to a VOIP system. Design and implement a new Acceptable Use Policy (AUP) and upgrade WAN to a T1 MPLS to increase bandwidth. The Warsaw, Poland location, we must…

    • 622 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It/242 Week 9 FInal

    • 1090 Words
    • 5 Pages

    For the headquarters and engineering offices in Atlanta a LAN setup with routers and Ethernet wires will be introduced. This choice is based on higher speeds for the network as well as a significant reduction in cost. For the offices in New York, Chicago, and Phoenix a Satellite link will be added to ensure communication with the network located at the headquarters in Atlanta. A satellite link will be made available to China as well to ensure that all locations have access to the main headquarters. Having all offices linked to a central location will allow interactions to be achieved for orders, manufacturing, communication, and other correspondence. This will allow the information and communication to be delivered at a higher standard than other means.…

    • 1090 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Treats that this company is vulnerable to are but not limited to tornado, malware, equipment failure, stolen data, DoS attacks & social engineer. The like likelihood of each is moderate to high. Headquarter is located right in tornado alley. Since this building house all three serves, a direct hit would result in a total loss. Since the users connect to the LAN with Windows Vista which is very outdate the risk of malware is also high. Along with having all three servers in a central location, there is no mention of any backup locations or even if a DRP is in place. Therefore equipment failure (loss of data) is very high. There is a mention of a direct attached storage but it appears that there is no AUP in place. This means everyone has access to the data. Stolen confidential data of a customer is a serious and costly risk. There is no mention of any firewalls in place. If the servers are not protected by firewalls or intrusion detection systems can result in loss of availability. Users and social engineering is the weakest and easily the most vulnerable. Lack of access controls and security awareness can result in serious loss of confidentiality and hackers are real threat in today’s world. With the sales people accessing the network through a home office and share internet connection with headquarters, this is the bulk of the concern.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays

Related Topics