Here are the key points of a collapsed multitier design:
- All server farms are directly connected without physical separation between Layer 2 switches. This reduces hardware costs.
- Services like load balancing, firewalling, etc. are concentrated at the aggregation layer rather than being distributed between tiers.
- Less hardware is required compared to an expanded design as there is no need for separate switches and devices at each tier.
- However, it provides less control and scalability compared to an expanded design as tiers are not physically isolated. For example, if one tier needs to be scaled out, it affects the other tiers.
- Security may also be weaker as there is no firewall segmentation between tiers.
Data Center Proposal (System Network Administration)Muhammad Ahad
Introduction to Data Center.
Data Center Network Design.
Data Center Network Application Architecture Models.
Data Center Architecture.
Data Center Typologies.
Data Center Services.
What Does It Cost to Build a Data Center? (SlideShare)SP Home Run Inc.
http://DataCenterLeadGen.com
What Does It Cost to Build a Data Center? (SlideShare).
The “build a data center” decision is not to be taken lightly. Consider these different cost factors to see if a build or lease is better.
Copyright (C) SP Home Run Inc. All worldwide rights reserved.
Data Center Proposal (System Network Administration)Muhammad Ahad
Introduction to Data Center.
Data Center Network Design.
Data Center Network Application Architecture Models.
Data Center Architecture.
Data Center Typologies.
Data Center Services.
What Does It Cost to Build a Data Center? (SlideShare)SP Home Run Inc.
http://DataCenterLeadGen.com
What Does It Cost to Build a Data Center? (SlideShare).
The “build a data center” decision is not to be taken lightly. Consider these different cost factors to see if a build or lease is better.
Copyright (C) SP Home Run Inc. All worldwide rights reserved.
Determining your data center strategy is critical in this expanding world of big data, cloud and mobility. Should you build your own data center, consider a wholesale arrangement, colocate with another carrier or transfer your critical information to the cloud? Or, does some combination of these options best suit your needs? Where do you even begin when planning these large enterprise decisions?
Join Randy Ortiz, VP of Data Center Design and Engineering, from Internap as he breaks down the steps you need to take to achieve a successful outcome for your data center initiatives.
Key topics include:
*Important decision-making considerations
*Why flexibility matters
*Top trends to watch today
The worlds of IT and Telecommunications Networking are converging bringing with them new possibilities and capabilities that can be deployed into the network A key transformation has been the ability to run IT based servers at network edge, applying the concepts of cloud computing.
It’s a key decision most data center managers will face in the next couple of years:
Should you retrofit, build, colocate, or move to the cloud? Each has its benefits, and own inherent risks and costs
This Slide's will help those guys who are looking for to study the Data Center Design . In these Slide's, you can understand the concept of raised floor, importance of raised floor, why raised floor is needed in a Data Center, and many more concepts ..
Hope it will gave you the good understanding to related topic.
Data Center Infrastructure Management Powerpoint Presentation SlidesSlideTeam
Introducing Data Center Infrastructure Management PowerPoint Presentation Slides. You can present key drivers for sustainable infrastructure by using our readily available PPT slide deck. The PowerPoint slide deck helps to illustrate the market size, key funding areas of infrastructure, key technology trends in infrastructure in a presentable manner. Further, the slideshow also showcases the asset management process with lifecycle and framework. Utilize our visually-attention-grabbing asset infrastructure PowerPoint templates to mention inventory assets for manufacturing companies. Showcase the deterioration modeling and the types of deterioration modeling such as asset and risk assessment deterioration modeling with the help of asset infrastructure PPT visual. With this infrastructure management PPT slide deck, explain each deterioration modeling in detail using this PPT slideshow. It is possible to depict asset management decision journey, and performance and cost functions by downloading this PPT presentation. https://bit.ly/3c8cORj
One word that you often see associated with any data center is its “tier,” or its level of service. Virtually every data center has a tier ranking of I, II, III, or IV, and this ranking serves as a symbol for everything it has to offer: its physical infrastructure, its cooling, power infrastructure, redundancy levels, and promised uptime.
This presentation takes a look at each of the 4 data center tiers, examining the key components for each tier, as well the total expected uptime level for each tier. If you are in the process of evaluating data centers, this is no doubt a term you will come across in your search, so we hope this presentation helps provide some solid background in to how you can better choose a data center for your specific needs.
For more insights into the data center world, and to learn more about Data Cave, check out our website at www.thedatacave.com.
Every business has a data center, regardless of the size. Even the smallest business has it. It is an ever-growing part of business in the modern world and a key business parameter, since data center influences the functioning of business enterprise. Imagine what happens to the business operation when the data center is interrupted. Any interruption can lead to serious breakdown. That is why efficient backup strategy is essential.
This training - Volume 1- explains fundamentals notions about data centre construction, key data centre issues, design guidelines, energy efficiency, data centre systems and facilities, data storage options and an overview of the market in the EU.
The data center market has expanded dramatically in the past few years, and it doesn’t show signs of slowing down. Many clients and building owners are requesting modular data centers, which can be placed anywhere data capacity is needed. Modular data centers can help cash-strapped building owners add a new data center (or more capacity) to their site, and can assist facilities with unplanned outages, such as disruptions due to storms. Owners look to modular data centers to accelerate the “floor ready” date as compared to a traditional brick and mortar.
When it comes to designing, building, and operating mission-critical data centers, simple is better. Data centers are faster and cheaper to build, and more reliable with lower total cost of ownership (TCO), when they start with a dramatically simplified design and build process that incorporates these elements: reference designs, pre-fabricated/modular architecture, partners that bring comprehensive capabilities into play, and coordinated planning around software, operations, and service. What you will learn: The top 5 weaknesses of today’s design/bid/build approach A simplified approach using reference designs and pre-fab products can preserve Day 1 capital and improve speed to market An integrated solution provider (Design, Build, Hardware and Operations) can optimize CapEx, OpEx and TCO.
Review of TIA-942 data standards and some of the best practices surrounding a data center.
Sri Chalasani (Plante & Moran) is available to provide consulting on data center and infrastructure solutions.
Determining your data center strategy is critical in this expanding world of big data, cloud and mobility. Should you build your own data center, consider a wholesale arrangement, colocate with another carrier or transfer your critical information to the cloud? Or, does some combination of these options best suit your needs? Where do you even begin when planning these large enterprise decisions?
Join Randy Ortiz, VP of Data Center Design and Engineering, from Internap as he breaks down the steps you need to take to achieve a successful outcome for your data center initiatives.
Key topics include:
*Important decision-making considerations
*Why flexibility matters
*Top trends to watch today
The worlds of IT and Telecommunications Networking are converging bringing with them new possibilities and capabilities that can be deployed into the network A key transformation has been the ability to run IT based servers at network edge, applying the concepts of cloud computing.
It’s a key decision most data center managers will face in the next couple of years:
Should you retrofit, build, colocate, or move to the cloud? Each has its benefits, and own inherent risks and costs
This Slide's will help those guys who are looking for to study the Data Center Design . In these Slide's, you can understand the concept of raised floor, importance of raised floor, why raised floor is needed in a Data Center, and many more concepts ..
Hope it will gave you the good understanding to related topic.
Data Center Infrastructure Management Powerpoint Presentation SlidesSlideTeam
Introducing Data Center Infrastructure Management PowerPoint Presentation Slides. You can present key drivers for sustainable infrastructure by using our readily available PPT slide deck. The PowerPoint slide deck helps to illustrate the market size, key funding areas of infrastructure, key technology trends in infrastructure in a presentable manner. Further, the slideshow also showcases the asset management process with lifecycle and framework. Utilize our visually-attention-grabbing asset infrastructure PowerPoint templates to mention inventory assets for manufacturing companies. Showcase the deterioration modeling and the types of deterioration modeling such as asset and risk assessment deterioration modeling with the help of asset infrastructure PPT visual. With this infrastructure management PPT slide deck, explain each deterioration modeling in detail using this PPT slideshow. It is possible to depict asset management decision journey, and performance and cost functions by downloading this PPT presentation. https://bit.ly/3c8cORj
One word that you often see associated with any data center is its “tier,” or its level of service. Virtually every data center has a tier ranking of I, II, III, or IV, and this ranking serves as a symbol for everything it has to offer: its physical infrastructure, its cooling, power infrastructure, redundancy levels, and promised uptime.
This presentation takes a look at each of the 4 data center tiers, examining the key components for each tier, as well the total expected uptime level for each tier. If you are in the process of evaluating data centers, this is no doubt a term you will come across in your search, so we hope this presentation helps provide some solid background in to how you can better choose a data center for your specific needs.
For more insights into the data center world, and to learn more about Data Cave, check out our website at www.thedatacave.com.
Every business has a data center, regardless of the size. Even the smallest business has it. It is an ever-growing part of business in the modern world and a key business parameter, since data center influences the functioning of business enterprise. Imagine what happens to the business operation when the data center is interrupted. Any interruption can lead to serious breakdown. That is why efficient backup strategy is essential.
This training - Volume 1- explains fundamentals notions about data centre construction, key data centre issues, design guidelines, energy efficiency, data centre systems and facilities, data storage options and an overview of the market in the EU.
The data center market has expanded dramatically in the past few years, and it doesn’t show signs of slowing down. Many clients and building owners are requesting modular data centers, which can be placed anywhere data capacity is needed. Modular data centers can help cash-strapped building owners add a new data center (or more capacity) to their site, and can assist facilities with unplanned outages, such as disruptions due to storms. Owners look to modular data centers to accelerate the “floor ready” date as compared to a traditional brick and mortar.
When it comes to designing, building, and operating mission-critical data centers, simple is better. Data centers are faster and cheaper to build, and more reliable with lower total cost of ownership (TCO), when they start with a dramatically simplified design and build process that incorporates these elements: reference designs, pre-fabricated/modular architecture, partners that bring comprehensive capabilities into play, and coordinated planning around software, operations, and service. What you will learn: The top 5 weaknesses of today’s design/bid/build approach A simplified approach using reference designs and pre-fab products can preserve Day 1 capital and improve speed to market An integrated solution provider (Design, Build, Hardware and Operations) can optimize CapEx, OpEx and TCO.
Review of TIA-942 data standards and some of the best practices surrounding a data center.
Sri Chalasani (Plante & Moran) is available to provide consulting on data center and infrastructure solutions.
Class lecture by Prof. Raj Jain on Data Center Network Topologies. The talk covers Google’s Data Center, Cooling Plant, Modular Data Centers, Containerized Data Center, Unstructured Cabling, Structured Cabling, Data Center Equipment Cabinets, Data Center Physical Layout, ANSI/TIA-942-2005 Standard, ANSI/TIA-942-2005 Standard, Data Center Network Topologies, Data Center Networks, Switch Locations, ToR vs EoR, Hierarchical Network Design, Access Aggregation Connections, Data Center Networking Issues, DCN Requirements, 4-Post Architecture at Facebook, Clos Networks, Fat-Tree DCN Example. Video recording available on You
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...Juniper Networks
The benefits of virtualization are driving data center operators to rethink their legacy data center networks and look for new ways to reduce costs and improve efficiency in the data center. Moving from a legacy network to a state-of-the-art solution allows you to deploy new applications in seconds rather than days, weeks, or months. If you want to harness the power of virtualization in your data center network, this guide will help you to achieve your goal.
We are using data at a record pace. This directly impacts data centers and how they manage the increase in demand. Check out the data center trends for 2014.
What makes Equinix Hong Kong your most dependable data center choice?Equinix
With over 170,000 sq ft of colocation space across our three Hong Kong IBX data centers, Equinix gives you access to the world’s largest stock exchanges and financial companies, and dense hubs of wired and wireless networks.
Data Center Project Management: Key Components of a Successful Systemdpsir
Without proper data center project management, a design/build project can experience delays, increased costs and frustrated team members. Take a look at this presentation by Arnie W. Evdokimo, Chief Executive Officer of DP Air Corporation, a leading provider of data center design, build and maintenance services based in Phoenix, Arizona. For more information about Data Center Project Management, visit http://www.DPAir.com today.
The Evolving Data Center – Past, Present and FutureCisco Canada
The journey to Cloud is not linear. Realistically, most environments will have workloads that continue to run on both physical and virtualized infrastructures for some time. Join Cisco’s Data Centre Experts, as they outline the key technologies transforming the Data Centre, enabling an intelligent infrastructure which will support physical, virtualized and cloud applications as part of Cisco’s Unified Data Centre Architecture.
Introduction and Basics to web technology .pptxLEENASAHU42
Introduction: Web system architecture- 1,2,3 and n tier
architecture, URL, domain name system, overview of
HTTP , Web Site Design Issues and Introduction to role of
SEO (Search Engine Optimization) on web page
development.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
4. Content:
• Introduction to Data Centre.
• Data Center Network Design.
• Data Center Network Application
Architecture Models.
• Data Center Architecture.
• Data Center Topologies.
• Data Center Services.
5. Data Center:
• A data center is a centralized
repository, either physical or virtual,
for the storage, management, and
dissemination of data and
information organized around a
particular body of knowledge or
pertaining to a particular business or
education.
6. Data Centre can be Classified as either:
• Enterprise (Private):
Privately owned and operated by private corporate, institutional
or government entitles.
• Co-Location/Hosting (Public):
Owned and operated by Telco’s or service providers.
• Data Centers house critical computing resources in controlled
environments and under centralized management, which
enable enterprises to operate around to the clock or according
to their business/educational needs.
• These computing resources include mainframes, web and
application servers, file and print servers, messaging servers,
application software and the operating systems that run them,
storage subsystems, and the network infrastructure, whether IP
or storage-area network (SAN).
7. Additionally, a number of servers support network
operations and network-based applications.
Network operation applications include:
• Network Time Protocol (NTP).
• Terminal Emulator (TN3270).
• File transfer protocol (FTP).
• Domain Name System (DNS).
• Dynamic Host Configuration Protocol (DHCP).
• Simple Network Management Protocol (SNMP).
• Trivial File Transfer Protocol (TFTP).
• Network File System (NFS).
• Network-based applications, including IP telephony,
video streaming over IP, IP video conferencing.
8. Data Centre Network Design:
The following section summarizes some of the technical
considerations for designing a modern day data center network.
• Infrastructure Services: Routing, switching, and server-farm
architecture.
• Application Services: Load balancing, Secure Socket Layer
(SSL) offloading, and caching.
• Security Services: Packet filtering and inspection, intrusion
detection, and intrusion prevention.
• Storage Services: SAN architecture, Fiber Channel switching,
backup, and archival.
• Campus Continuance: SAN extension, site selection, and Data
Center interconnectivity.
Data Center Roles:
Figure 1 presents the different building blocks used in the
enterprise network and illustrates the location of the Data Center
within that architecture.
The building blocks of this typical enterprise network include:
• Campus Network:
• Private WAN:
9. Data Centre Network Design:
• Remote Access:
• Internet Server Farm:
• Extranet Server Farm:
• Intranet Server Farm:
• Data Centers typically house many components that support
the infrastructure building blocks, such as the core switches of
the campus network or the edge routers of the private WAN.
• Data Center designs can include any or all of the building
blocks in Figure 1-1, including any or all server farm types.
• Each type of server farm can be a separate physical
entity, depending on the business requirements of the
enterprise.
• For example, a company might build a single Data Center and
share all resources, such as servers, firewalls, routers,
switches, and so on. Another company might require that the
three server farms be physically separated with no shared
equipment.
11. Data Center Network Application Architecture
Models:
• Architectures are constantly evolving, adapting to new
requirements, and using new technologies.
• The most pervasive models are the client/server and n-tier
models that refer to how applications use the functional
elements of communication exchange.
• The client/server model, in fact, has evolved to the n-tier model,
which most enterprise software application vendors currently
use in application architectures.
The Client/Server Model and Its Evolution:
The classic client/server model describes the communication
between an application and a user through the use of a server and
a client. The classic client/server model consists of the
following:
• A thick client that provides a graphical user interface (GUI) on
top of an application or business logic where some processing
occurs.
12. The Client/Server Model and Its Evolution:
• A server where the remaining business logic resides.
• A thick client is then a portion of the application code running at
the client’s computer that has the responsibility of retrieving
data from the server and presenting it to the client.
• The thick client code requires a fair amount of processing
capacity and resources to run in addition to the management
overhead caused by loading and maintaining it on the client
base.
• The server side is a single server running the presentation,
application, and database code that uses multiple internal
processes to communicate information across these distinct
functions.
• The most fundamental changes to the thick client and single-
server model started when web-based applications first
appeared.
13. The Client/Server Model and Its Evolution:
• Web-based applications rely on more standard interfaces and
message formats where applications are easier to share.
i.e. HTML and HTTP.
•
The migration from the classic client/server to a web-based
architecture implies the use of thin clients (web browsers), web
servers, application servers, and database servers. The web
browser interacts with web servers and application servers, and
the web servers interact with application servers and database
servers.
14. The n-tier Model:
• Part b of Figure 2 shows the n-tier model. Figure 2 presents the
evolution from the classic client/server model to the n-tier
model.
• The n-tier model uses a thin client and a web browser to
access the data in many different ways.
• The server side of the n-tier model is divided into distinct
functional areas that include the web, applicationand
database servers.
• The n-tier model relies on a web architecture where the web
browser formats and presents the information received from the
web server.
• The server side in the web architecture consists of multiple and
distinct servers that are functionally separate. The n-tier model
can be the client and a web server; or the client, the web
server, and an application server.
• This model is more scalable and manageable it enables
application environments to evolve toward distributed
computing environments.
16. Multitier Architecture Application Environment:
• Multitier architectures refer to the Data Center server farms
supporting applications that provide a logical and physical
separation between various application functions, such as
web, application, and database (n-tier model).
• For each server-side tier, there is a one-to-one mapping to a
network segment that supports the specific application function
and its requirements.
• Figure 4 presents the mapping from the n-tier model to the
supporting network segments used in a multitier design.
17. Multitier Architecture Application Environment:
• The web server tier is mapped to the front-end segment, the
business logic to the application segment, and the database tier
to the back-end segment.
• Notice that all the segments supporting the server farm connect
to access layer switches, which in a multitier architecture are
different access switches supporting the various server
functions.
Types of Server Farms:
• As depicted in Figure 1, three distinct types of server farms exist:
• Internet Server Farm.
• Extranet Server Farm.
• Intranet Server Farm.
• Server farms are at the heart of the Data Center.
• In fact, Data Centers are built to support at least one type of
server farm.
• Although different types of server farms share many architectural
requirements, their objectives differ.
18. Types of Server Farms:
• Each type of server farm has a distinct set of infrastructure,
security, and management requirements that must be
addressed in the design of the server farm.
• Although each server farm design and its specific topology might
be different, the design guidelines apply equally to them all.
Internet Server Farms:
• As their name indicates, Internet server farms face the Internet.
This implies that users accessing the server farms primarily are
located somewhere on the Internet and use the Internet to reach
the server farm.
• The server farm services and their users rely on the use of web
interfaces and web browsers, which makes them pervasive on
Internet environments.
Two distinct types of Internet server farmsexist:
• Dedicated Internet Server Farm.
• DMZ Server Farms (demilitarized zone).
19. Dedicated / DMZ Internet Server Farm :
• The dedicated Internet server farm, shown in Figure is built to
support large-scale Internet-facing applications that support the
core business function. Typically, the core business function is
based on an Internet presence or Internet commerce.
• Security and scalability are a major concern in this type of server
farm. On one hand, most users accessing the server farm are
located on the Internet, thereby introducing higher security risks;
on the other hand, the number of likely users is very high, which
could easily cause scalability problems.
• The Data Center that supports this type of server farm is often
referred to as an Internet Data Center (IDC).
• The next type of Internet server farm, shown in Figure 6, is built
to support Internet-based applications in addition to Internet
access from the enterprise. This means that the infrastructure
supporting the server farms also is used to support Internet
access from enterprise users. These server farms typically are
located in the demilitarized zone (DMZ) because they are part of
the enterprise network yet are accessible from the Internet.
These server farms are referred to as DMZ server farms, to
differentiate them from the dedicated Internet server farms.
22. Intranet Server Farm :
• The evolution of the client/server model and the wide adoption of
web-based applications on the Internet was the foundation for
building intranets.
• Intranet server farms resemble the Internet server farms in their
ease of access, yet they are available only to the enterprise’s
internal users.
• Notice that the intranet server farm module is connected to the
core switches that form a portion of the enterprise backbone and
provide connectivity between the private WAN and Internet Edge
modules.
• Internet users typically are not permitted access to the intranet;
however, internal users using the Internet as transport have
access to the intranet using virtual private network (VPN)
technology.
• The Internet Edge module supports several functions that
include the following:
• Securing the enterprise network
• Controlling Internet access from the intranet
• Controlling access to the Internet server farms
• The Data Center provides additional security to further protect
the data in the intranet server farm. This is accomplished by
applying the security policies to the edge of the Data Center as
well as to the applicable application tiers when attempting to
harden communication between servers on different tiers.
24. Extranet Server Farm :
• From a functional perspective, extranet server farms sit between
Internet and intranet server farms. Extranet server farms
continue the trend of using web-based applications, but, unlike
Internet- or intranet-based server farms, they are accessed only
by a selected group of users that are neither Internet- nor
intranet-based.
• The main purpose for extranets is to improve business-to-
business communication by allowing faster exchange of
information in a user-friendly and secure environment.
• The purpose of the extranet is to provide server farm services to
trusted external end users, there are special security
considerations.
• Many factors must be considered in the design of the extranet
topology, including scalability, availability, and security.
Dedicated firewalls and routers in the extranet are the result
of a highly secure and scalable network infrastructure for partner
connectivity.
• Notice that the extranet server farm is accessible to internal
users, yet access from the extranet to the intranet is prevented
or highly secured. Typically, access from the extranet to the
intranet is restricted through the use of firewalls.
27. Data Center Architecture
• Aggregation Layer
1) aggregation point for
switches,
devices
firewalls,
that
load
provide
balancers)services.(multilayer
2) multilayer switches referred as aggregation switches
because of the aggregation function they perform.
3) Service devices are shared by all server farms.
4) Support traditional switching, packets on Layer 3 Layer2.
5) support Layer 3 and Layer 2 connectivity, protocols and
features.
30. Data Center Architecture
• Storage Layer
1) consists of the storage infrastructure (switches ,
routers, iSCSI, FCIP).
2) Storage network devices provide the connectivity to
servers.
3) network used by these storage devices is referred to as a
SAN.
4) The Data Center is the location where the consolidation
of applications, servers, and storage occurs.
5) The current trends in server and storage consolidation
are the result of the need for increased efficiency in the
environments and for lower costs ofapplication
operation.
31. Data Center Architecture
• Data Center environments are expected to
support high-speed communication between
servers and storage and between storage devices.
32. Data Center Architecture
Transport Layer
• Builds on the network layer to deliver the data
across the networks.
• Provide end-to-end connectivity across the
network. And segments carry the data from
one network to another.
• Different kind of transport services TCP and
UDP.
• 4) D-C transport layer includes the transport
technologies such as,
1)Communication between distributed Data
Centers for rerouting client-to-server traffic.
2)Communication between distributed server
farms located in distributed Data Centers.
• Transport technologies must support a wide
range of requirements for bandwidth and
latency depending on the traffic profiles.
33. Data Center Architecture
• For user-to-server communication, the possible
technologies include Frame Relay, ATM, DS
channels in the form of T1/E1 circuits, Metro
Ethernet, and SONET.
• For server-to-server and storage-to-storage
communication, the technologies required are
dictated by server media types and the transport
technology that supports them transparently.
Systems Connectivity (ESCON), GE, and ATM.
35. Data Center Topologies
• Forwarding packets based on Layer 3 information
between the server farm and the rest of the network,
1) Maintaining a “view” of the routed network that is
expected to change dynamically as network changes
take place.
2) Supporting default gateways for the server farms.
• The key Layer 2 functions
aggregation switches are
performed by the
as follows,
1) Spanning Tree Protocol (STP) 802.1d between
aggregation and access switches to build a loop-free
forwarding topology.
2) STP enhancements beyond 802.1d that improve the
default spanning-tree behavior, such as 802.1s,
802.1w, Uplink fast, Backbone fast, and Loop guard.
3) VLANs for logical separation of server farms.
4) Other services, such as multicast and ACLs for services
such as QoS, security, rate limiting, broadcast
suppression, and so on.
38. Multiple-tier designs
Most applications conform to either the client/server model or the
n-tier model, which implies most networks, and more server farms
needed who support these application environments
The tiers supported by the Data Center infrastructure are driven by
the specific applications and could be any combination of applications
from the client/server to the client/web server/application
server/database server.
The communication requirements between tiers are typically highe
security(firewalling), scalability and performance(load balancers).
40. Example::
I. Suppose that you have multiple types of web servers supporting
different applications, and some of these applications follow the
n-tier model.
II. The server farm could be partitioned along the lines of applications
or functions.
All web servers, regardless of the application(s) they support,
could be part of the same server farm
the application servers could be part of a separate server
farm on a different subnet
III. The same logic used to scale the web tier, a load balancer logically
could be placed between the web tier and the application tier to
scale the application tier from the web tier perspective.
42. Expanded Multi Tier Design:
In Figure that there is physical separation between the tiersof
servers.
Physical separation is used to achieve greater control overthe
deployment and scalability of services.
The expanded design is more costly because it uses more devices,
yet it allows for more control and better scalability
For example, placing a firewall between tiers is regarded as a more
secure approach because of the physical separation between the
Layer 2 switches
45. Collapsed Multitier Design
A collapsed multitier design is one in which all the server farms
are directly connected.There Is no physical separation betweenthe
Layer 2 switches
The services are concentrated at the aggregation layer
The service devices are used by the front-end tier and between
tiers
Using a collapsed model, there is no need to have a set of load
balancers dedicated to a particulartier.
This reduces cost but management of devices is more challenging
and the performance demands are higher.
The service devices, such as the firewalls, protect all server tiers
from outside the Data Center, but also from each other.
48. Redundancy
Up to this point, all the topologies that have been
presented are fully redundant. By Looking at these
aspects we want to answer following question::
Why We Need Of Redundancy???
Answer It With An Example..
49. The Need Of Redundancy
Following Figure explains the steps for building a redundant
topology
We Will make the topology Redundant By FollowingSOME
logical steps
There is a single NIC and a single switch, and if the NIC orswitch
fails, the server and applications become unavailable
Step 1: Make dual power supplies Add a second
switch (Figure Part b)
In options a and b, the port density is limited to the capacity ofthe
two switches
Step 2: Add Layer 2 access switches to the topology to provide
direct server connectivity.(Figure Part c)
51. The need of redundancy
The design described in option c still has a problem If the Layer 2
switch fails, the servers lose their only means of communication.
Step 3: The solution is to dual-home servers to two different
Layer 2 access switches (Figure Part d)
53. Data Center Services
• This section presents an overview of the services supported by the
Data Center architecture Related technology and features make up
each service.
• Data Center Services is that
– IP Infrastructure Services
– Application Services
– Security Services
– Storage Services
54. IP Infrastructure Services:
A packet is like an envelope for mail.
• The IP infrastructure represents a key boundary between a
communications medium and the applications that are built upon this
medium.
• The basic unit of the IP infrastructure is the "packet".
•
• The IP infrastructure features are organized as follows:
– Layer 2
– Layer 3
– Intelligent Network Services
55. Layer 2
• Layer 2 is a data link layer
• Layer 2 refers to the Data Link layer of the commonly-referenced
multilayered communication model, Open Systems Interconnection (OSI).
The Data Link layer is concerned with moving data across the physical links
in the network.
• The Open Systems Interconnection model (OSI model) is a
conceptual model that characterizes and standardizes the communication
functions of a telecommunication or computing.
• Layer 2 features support the Layer 2 adjacency between the server farms
and the service devices virtual local area network (VLANs),Media Access
Control (MAC), Spanning Tree Protocol (STP).
57. VLAN
• A VLAN is a group of devices on one or more LANs that are configured
to communicate as if they were attached to the same wire, when in fact
they are located on a number of different LAN segments.
58. Spanning Tree Protocol (STP)
• Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on
bridges and switches.
• The main purpose of STP is to ensure that you do not create loops
when you have redundant paths in your network.
• The specification for STP is IEEE(Institute of Electrical and Electronics
Engineers) 802.1D
59. Layer 3
• Layer 3 is a network layer
• The network layer is responsible for packet forwarding including routing
through intermediate routers, whereas the data link layer is responsible for
media access control, flow control and error checking.
• Connection model
– connectionless communication
• Host addressing
– Every host in the network must have a unique address that determines
where it is
• Message forwarding
– Since many networks are partitioned into sub-networks and connect to
other networks for wide-area communications, networks use
specialized hosts, called gateways or routers, to forward packets
between networks
61. Intelligent Network Services
• The most common features are QoS and multicast
• Quality of service (QoS)
• is the overall performance of a telephony or computer network,
particularly the performance seen by the users of the network.
• important intelligent network services such as private
VLANs (PVLANs) and policy-based routing (PBR)
• private VLANs:
Private VLANs also known as port isolation, is a technique in computer
networking where a VLAN contains switch ports that are restricted such
that they can only communicate with a given "uplink". The restricted
ports are called "private ports"
• policy-based routing:
including source or destination network, source or destination address,
source or destination port, packet size, and packet classification among
others
64. Multicast
• multicast (one-to-many or many-to-many distribution) is
group communication where information is addressed to
a group of destination computers simultaneously
• Multicast in the Data Center enables the capabilities
needed to reach multiple users concurrently
65. Application Services
• The following is a list of those features
• Load balancing
• Caching
• SSL termination
• Load balancing:
Load balancing is dividing the amount of work that a computer has to do
between two or more computers so that more work gets done in the same
amount of time and, in general, all users get served faster.
• Load balancers perform two core functions:
1. Scale and distribute the load to serverfarms
2. Track server health to ensure highavailability.
You also can add new servers, thus scaling the capacity of a server farm,
without any disruption to existing services.
66. • Caching:
Caching is an area of a computer’s memory devoted to temporarily storing
recently used information.
• SSL(Secure Sockets Layer) termination:
SSL termination refers to the process that occurs at the server end of
an SSL connection, where the traffic transitions between encrypted and
unencrypted forms.
68. • Service Deployment Options
• Design Considerations with Service Devices
Intrusion Detection System
69. Security Services
• Access control lists
An access control list (ACL), with respect to a computer file system, is a list
of permissions attached to an object. An ACL specifies which users or
system processes are granted access to objects , as well as what
operations are allowed on given objects.
ACLs filter packets. Packet filtering through ACLs can prevent unwanted
access to network infrastructure devices.
• Firewalls
A firewall is a system designed to prevent unauthorized access to or from a
private network. Firewalls can be implemented in both hardware and
software, or a combination of both.
70. Security Services
• Secure management
– Simple Network Management Protocol (SNMP)
it is a standard way of monitoring hardware and software
• Provide Read/Write abilities configure IP addresses
• Collect information on how much bandwidth is beingused
• devices can send alerts to a monitoring station on errorconditions
– Secure shall (SSH)
sometimes known as Secure Socket Shell, is a UNIX-based command
interface and protocol for securely getting access to a remote
computer. It is widely used by network administrators to control Web
and other kinds of servers remotely.
– authentication authorization and accounting(AAA)
The transactions of all authorized and authenticated users are
logged for accounting purposes, for billing, or for postmortem analysis
71. Storage Services
• Storage
– storage is the place where data is held in an electromagnetic or optical
form for access by a computer processor
• Storage services include the capability of consolidating direct attached
disks by using disk arrays that are connected to the network.
• SAN(storage area network) is a high-speed network of storage devices
that also connects those storage devices with servers. It provides block-
level storage that can be accessed by the applications running on any
networked servers.
• Types of managed storage
• locally managed storage
Advantages of this type of storage include a high-speed access to data and greater control
over data availability. A disadvantage is that additional space is required at local site
to store the data
• remotely managed storage
Advantages of this type of storageare that it may be used an off site backup, it offers global
access (depending upon configuration) and adding storage will not require additionalspace
at the local site. However, if the network providing connectivity to the remote data is
interrupted, there will be data availability issues, unless distributed file systems are in use.
72. Cost:
.
Description Material cost Labor cost Total cost
Engineering 3,00,000 2,00,000/ 5,00,000/-
Web server 1,00,000 1,00,000 2,00,000/-
All Devices & wire 12,00,000 8,00,000 20,00,000/-
Network equipment 4,00,000 1,00,000 5,00,000/-
Database Server 5,00,000 1,00,000 6,00,000/-
App server 1,00,000 4,00,000 5,00,000/-
CCTV system 2,00,000 50,000 2,50,000/-
Total 45,50,000/-