51
1 List of figures Figure 1: Site view / building layout of Teratai Data Center ....................................................................... 11 Figure 2: Ground floor plan of TDC building............................................................................................. 12 Figure 3: First floor plan of TDC building. ................................................................................................ 13 Figure 4: Second floor plan of TDC building. ............................................................................................ 14 Figure 5: Server room plan with NOC & Command Center Room............................................................ 15 Figure 6: Legends of Server Room floor plan ............................................................................................ 15 Figure 7: Movement of air flow in the server room | Source: Google image ............................................. 16 Figure 8: Organized cables under subfloor | Source: Google image ........................................................... 17 Figure 9: Data cable in a cable tray install under raised floor | Source: Google image .............................. 17 Figure 10: A model of server rack | Source: Google image ........................................................................ 18 Figure 11: Ramps use in the hallway at ground floor of Teratai Data Center | Source: Google image ...... 18 Figure 12: Plenum installation in the server room | Source: Google image................................................ 19 Figure 13: Perforated tiles | Source: Figure 14: Solid tiles | Source: Google image Google image .......................................... 20 Figure 15: Height of ceiling ........................................................................................................................ 20 Figure 16: APC battery backup power | Source: Google image ................................................................. 21 Figure 17: Power generator | Source: Google image .................................................................................. 22 Figure 18: Temperature flow | Source: Google image ................................................................................ 23 Figure 19: Rack Server | Source: Google image.......................................................................................... 24 Figure 20: Rack Server | Source: Google image.......................................................................................... 24 Figure 21: Blade Server | Source: Google image ........................................................................................ 25 Figure 22: Blade Server | Source: Google image ........................................................................................ 26 Figure 23: Tower Server | Source: Google image ....................................................................................... 26 Figure 24: Biometric | Source: Google image ............................................................................................. 28 Figure 25: Biometric | Source: Google image ............................................................................................. 28 Figure 26: Photo Scanner IDs | Source: Google image ............................................................................... 29 Figure 27: Mantrap | Source: Google image .............................................................................................. 30 Figure 28: Server Cage | Source: Google image ......................................................................................... 30 Figure 29: Vehicle Barrier | Source: Google image..................................................................................... 31 Figure 30: Vehicle Barrier | Source: Google image..................................................................................... 31 Figure 31: Security Alarm | Source: Google image ..................................................................................... 32 Figure 32: CCTV | Source: Google image .................................................................................................... 33 Figure 33: CCTV | Source: Google image .................................................................................................... 33 Figure 34: Fire Suppression Systems | Source: Google .............................................................................. 34 Figure 35: Wireless Smoke Detector | Source: Google image .................................................................... 35 Figure 36: Wireless Smoke Detector | Source: Google image .................................................................... 35 Figure 37: APC | Source: Google image ...................................................................................................... 36 Figure 38: Avocent | Source: Google image ............................................................................................... 36 Figure 39: BayTech | Source: Google image ............................................................................................... 36 Figure 40: CPI | Source: Google image ....................................................................................................... 37

Contoh report Data Center IMS506

Embed Size (px)

DESCRIPTION

Universiti Teknologi MARa

Citation preview

Page 1: Contoh report Data Center IMS506

1

List of figures

Figure 1: Site view / building layout of Teratai Data Center ....................................................................... 11 Figure 2: Ground floor plan of TDC building ............................................................................................. 12 Figure 3: First floor plan of TDC building. ................................................................................................ 13 Figure 4: Second floor plan of TDC building. ............................................................................................ 14 Figure 5: Server room plan with NOC & Command Center Room ............................................................ 15 Figure 6: Legends of Server Room floor plan ............................................................................................ 15 Figure 7: Movement of air flow in the server room | Source: Google image ............................................. 16 Figure 8: Organized cables under subfloor | Source: Google image ........................................................... 17 Figure 9: Data cable in a cable tray install under raised floor | Source: Google image .............................. 17 Figure 10: A model of server rack | Source: Google image ........................................................................ 18 Figure 11: Ramps use in the hallway at ground floor of Teratai Data Center | Source: Google image ...... 18 Figure 12: Plenum installation in the server room | Source: Google image................................................ 19 Figure 13: Perforated tiles | Source: Figure 14: Solid tiles | Source: Google image Google image .......................................... 20 Figure 15: Height of ceiling ........................................................................................................................ 20 Figure 16: APC battery backup power | Source: Google image ................................................................. 21 Figure 17: Power generator | Source: Google image .................................................................................. 22 Figure 18: Temperature flow | Source: Google image ................................................................................ 23 Figure 19: Rack Server | Source: Google image .......................................................................................... 24 Figure 20: Rack Server | Source: Google image .......................................................................................... 24 Figure 21: Blade Server | Source: Google image ........................................................................................ 25 Figure 22: Blade Server | Source: Google image ........................................................................................ 26 Figure 23: Tower Server | Source: Google image ....................................................................................... 26 Figure 24: Biometric | Source: Google image ............................................................................................. 28 Figure 25: Biometric | Source: Google image ............................................................................................. 28 Figure 26: Photo Scanner IDs | Source: Google image ............................................................................... 29 Figure 27: Mantrap | Source: Google image .............................................................................................. 30 Figure 28: Server Cage | Source: Google image ......................................................................................... 30 Figure 29: Vehicle Barrier | Source: Google image ..................................................................................... 31 Figure 30: Vehicle Barrier | Source: Google image ..................................................................................... 31 Figure 31: Security Alarm | Source: Google image ..................................................................................... 32 Figure 32: CCTV | Source: Google image .................................................................................................... 33 Figure 33: CCTV | Source: Google image .................................................................................................... 33 Figure 34: Fire Suppression Systems | Source: Google .............................................................................. 34 Figure 35: Wireless Smoke Detector | Source: Google image .................................................................... 35 Figure 36: Wireless Smoke Detector | Source: Google image .................................................................... 35 Figure 37: APC | Source: Google image ...................................................................................................... 36 Figure 38: Avocent | Source: Google image ............................................................................................... 36 Figure 39: BayTech | Source: Google image ............................................................................................... 36 Figure 40: CPI | Source: Google image ....................................................................................................... 37

Page 2: Contoh report Data Center IMS506

2

Figure 41: dataprobe | Source: Google image ............................................................................................ 37 Figure 42: EATON | Source: Google image ................................................................................................. 37 Figure 43: EMERSON | Source: Google image ............................................................................................ 37 Figure 44: Great Lakes | Source: Google image.......................................................................................... 38 Figure 45: LEVITON | Source: Google image .............................................................................................. 38 Figure 46: Liebert | Source: Google image ................................................................................................. 38 Figure 47: MINICOM TRIPP.LITE | Source: Google image ........................................................................... 38 Figure 48: RITTAL | Source: Google image ................................................................................................. 39 Figure 49: Shown how the labeling will looks like| Source: Google image ................................................ 40 Figure 50: Shown the label for each of the cable | Source: Google image ................................................ 41 Figure 51: Shown the APIs process works | Source: Google image ........................................................... 48

Page 3: Contoh report Data Center IMS506

3

List of tables

Table 1: Basic information of Teratai Data Center ....................................................................................... 4 Table 2: Total cost ......................................................................................................................................... 7 Table 3: Label and signage .......................................................................................................................... 42 Table 4: Possible position............................................................................................................................ 46

Page 4: Contoh report Data Center IMS506

4

1.0 INTRODUCTION Teratai Data Center is a facility designed to house computer hardware in order to

effectively manage mission critical data for companies and our clients. These

facilities can host network equipment, including website servers, data storage and

back-up servers, software applications for large companies, and more. At Teratai

Data Center, our customers‟ satisfaction is our top priority. Which is why we look

for the best co- location services that ensures high availability is secured and offers

round the clock support.

Teratai Data Center will be established in February 2020. It will be located

strategically at Cyberjaya which is in Selangor. It is developed in between rural and

urban area. This is because a data center should locate near corporate headquarters

with the ease of remote access to computers and a robust telecommunications

infrastructure. Besides that, Teratai Data Center will hire experience staffs in system

management. Teratai Data Center will responsible in managing the data and all

services offered. Teratai Data Center will ensure that customers will always satisfy

with the treatment given. Table below is the basic information of the Teratai Data

Center:

Table 1: Basic information of Teratai Data Center

Name of organization Teratai Data Center

Address No. 1, Jalan Cyber Point 4, Cyber 8, 63000 Cyberjaya,

Selangor Darul Ehsan, Malaysia

Phone Number +603 2330 1900

Fax Number +603 2330 1901

Email info@ terataidatacenter.com

Operating hours Monday to Friday: 8.00 a.m. - 5.00 p.m.

Page 5: Contoh report Data Center IMS506

5

2.0 DATA CENTER SITE/ LOCATION Teratai Data Center will locate strategically at Cyberjaya, Selangor. We decided to

build data center building in this area because of the area are suitable to build the

data center building. This is because the location safe fom man-made disaster. Based

on energy and construction costs, telecom infrastructure reliability, and the risk of

natural disasters take on added importance when we do selection of Teratai Data

Center.

Teratai Data Center consists of three levels which are ground floor, 1st floor and 2nd

floor. Ground floor contains entrance area, server room, security room, NOC and

command center room, and UPS and battery room. 1st floor contains seminar room,

meeting room, toilet, musolla, pantry, store room, and media storage room. 2nd floor

contains CEO room, meeting room, office, pantry and toilet.

We decide to choose this location because of several factors. First is the location is

the place that completely for technologies area. This location to build the data center

also near with several accommodation such as rapid bus, mosque and so on. In

addition, this location is very strategically and secured from any disaster

phenomenon such as flood, typhoon and earthquake. Next, the location we choose

also safe and far away from man-made disaster.

3.0 INFRASTRUCTURE TIERS Teratai Data Center is currently at Tier 3 which is ideal for large-business Company

that is required for saving large data. At Tier 3, our company is 99.982 percent

uptime yearly which equal to 1.6 hours downtime yearly only. Unlike Tier 1 or Tier

2 which are required to shut down any computer equipment, our Tier 3 data center

72 hours power outrage protection that are readily to backup any computer

equipment that located in this facility.

Teratai Data Center is a concurrently maintainable data center that has plenty of

capacity components and multiple independent distribution paths components and

Page 6: Contoh report Data Center IMS506

6

multiple independent distribution paths serving the computer equipment at any time.

Other than that, our Tier 3 data center is generally N+1 fault tolerant. Our data center

is providing high security system that is meeting the requirement of those tier 3 data

center.

Teratai Data Center also providing friendly and best services for the clients that

provided by Teratai Data Center engineers and technician. Teratai Data Center also

provide unique infrastructure and design that are different from others data center.

Page 7: Contoh report Data Center IMS506

7

4.0 TOTAL COST

Table 2: Total cost

No. Item and specifications Cost per item (RM)

Total cost (RM)

1. Rack server (30 units)

Company: Dell

Specifications:

Processor

� Intel® Xenon® processor E3-

1200 product family

� Intel® Xenon® processor E3-

1200 V2 product family

� Intel® Pentium® G600 and

G800 series

� Intel® Celeron® G400 and

G500 series

Operating system

� Microsoft® Windows Server®

2012

� Microsoft® Windows Small

Business Server 2011

� Microsoft® Windows Server

2008 R2 Foundation SP1

� Microsoft® Windows Server

2008 SP2, x86/x64

70,000 2,100,000

2. Power generator (4 units)

Company: Safesidepower

Specifications:

i. Fuel type: the generator uses diesel as

1,050,000 4,200,000

Page 8: Contoh report Data Center IMS506

8

its operating fuel

ii. Portability: industrial backup generator

iii. Phase: generator outputs standard

single phase voltage

iv. Voltage: generator output voltage can

be set to 120 volts or 240 volts

3. HVAC (6 units)

Company: GETEX Supply and Engineering

Specifications:

i. 80% AFUE

ii. Heating input range 50,000 – 125,000

Btuh

iii. Two stage heating

iv. Multi position, upflow, downflow,

horizontal left or right

v. 115v humidifier and electronic air

cleaner connections

vi. Fused low voltage circuit protection

800,000 4,800,000

4. Biometrics (7 units)

Company: ASIS Technologies

Specifications:

i. Size: dimension 181.6 x 126 x 49mm

ii. User capacity: 1500

iii. Transaction storage: 10000

iv. Sensing area: 18mm x 22mm

v. Identification time: =2s

vi. Operating temperature: 0 – 45 degree

vii. Operating humidity: 20% - 80%

30,000 210,000

6. CCTV (30 units)

Company: ASIS Technologies

Specifications:

80,000 2,400,000

Page 9: Contoh report Data Center IMS506

9

i. Pattern: PAL/NTSC

ii. Image device: ¼” sharp ccd

iii. Resolution: 420TVL

iv. Lens: 3.6/6/8mm

v. Infrared distance: 35m

vi. Angel: >=45q

7. Fire Suppression (15 units)

Company: Marioff Corporation

Specifications:

i. FM 200 nontoxic gas based fire

suppression

ii. Environmentally clean agent

iii. Fast-acting and efficient

extinguishment

iv. Safe for occupied spaces

500,000 7,500,000

8. UPS (12 units)

Company: Dell

Specifications:

i. Capacity 40

ii. Dimensions 450 x 1200 x 640

iii. Battery internal or external 360 – 372

cells

iv. Power factor 0.99

v. Frequency 50/60 Hz (45-65 Hz)

80,000 960,000

9. Cable

Company: CABLExpress Corporation

Specifications:

Color Cable spec Network

Blue Cat6 Production

Green Cat5e Management

Orange Cat5e Serial

200,000 200,000

Page 10: Contoh report Data Center IMS506

10

Red Cat5e Out of band

access

Yellow 9/125

singlemode

fiber

All fiber

connctions

Total 22,370,000

Page 11: Contoh report Data Center IMS506

11

5.0 DATA CENTER DESIGN Teratai Data Center consists of different types of layout which explain different

functions.

5.1 Site View / Building Layout

Figure 1: Site view / building layout of Teratai Data Center

Page 12: Contoh report Data Center IMS506

12

5.2 Floor Plan

Figure 2: Ground floor plan of TDC building

Page 13: Contoh report Data Center IMS506

13

Figure 3: First floor plan of TDC building.

Page 14: Contoh report Data Center IMS506

14

Figure 4: Second floor plan of TDC building.

Page 15: Contoh report Data Center IMS506

15

5.3 Server Room Plan

Figure 5: Server room plan with NOC & Command Center Room

Figure 6: Legends of Server Room floor plan

Page 16: Contoh report Data Center IMS506

16

6.0 DATA CENTER INSTALLATION

Data center installation explains several things about the installation on the server layout.

These include cables, tiles, arrangement of racks, ceiling height, and ramp.

Figure 7: Movement of air flow in the server room | Source: Google image

How air flows in server room?

i. Cold air from HVAC flow from the perforated floor to cold the server.

ii. Hot air from the server rise up to the ceiling.

iii. Cold air out from the perforated floor (hot aisle) went through the cold aisle to cold the

hot air which reflects from the solid tiles floor.

iv. Hot air that rises up the ceiling collects by the HVAC.

v. The HVAC forced to chill the air in subfloor plenum.

6.1 Under-floor installation Under-floor cabling contributes to energy losses. When new network or power cables

are added under the floor, older unused cables are rarely pulled out to make room.

Instead the cables are left undisturbed to minimize risk of downtime. The build-up of

cables causes blockages in air flow which contribute to hot spots in the data center.

Page 17: Contoh report Data Center IMS506

17

Figure 8: Organized cables under subfloor | Source: Google image

6.2 Modular cable trays A cable tray system is used to support insulated electric cables used for power

distribution and communication. Cable trays are used as an alternative to open wiring

or electrical conduit systems. Modular cable trays allow for layered placement of

cables which allows for simpler cable maintenance.

Figure 9: Data cable in a cable tray install under raised floor | Source: Google image

Page 18: Contoh report Data Center IMS506

18

6.3 Server rack A rack server, also called a rack-mounted server, is a computer dedicated to use as a

server and designed to be installed in a framework called a rack. The rack contains

multiple mounting slots called bays, each designed to hold a hardware unit secured in

place with screws.

Figure 10: A model of server rack | Source: Google image

6.4 Ramps

The ramp must support the weight of equipment, people, and mechanical devices

used to lift the equipment (such as electrical-powered pallet jacks). Ramps that must

support heavy weight are made of poured concrete.

Figure 11: Ramps use in the hallway at ground floor of Teratai Data Center | Source: Google image

Page 19: Contoh report Data Center IMS506

19

6.5 Plenum A plenum space is a part of a building that can facilitate air circulation for heating and

air conditioning systems. Space between the structural floor and the dropped ceiling

or under a raised floor is typically considered plenum; however, some drop-ceiling

designs create a tight seal that does not allow for airflow and therefore may not be

considered a plenum air-handling space.

Figure 12: Plenum installation in the server room | Source: Google image

6.6 Floor tiles There are two types of floor tiles which are solid and perforated tiles. The raised floor

consists of tiles or floor panel that provide a supporting base for racks and equipment

generally 2-feet squares. Usually the tiles made of metal such as cast aluminum. A

good floor tiles must support maximum load specifications exceed the requirements.

Page 20: Contoh report Data Center IMS506

20

Figure 13: Perforated tiles | Source: Figure 14: Solid tiles | Source: Google image Google image

6.7 Ceiling

To help the movement of hot air from hot aisle to infuse in HVAC, a 16” ceiling

height is needed. Moreover, it is also for installing smoke detector.

Figure 15: Height of ceiling

16”

Page 21: Contoh report Data Center IMS506

21

7.0 POWER CONSUMPTION 7.1 Main power supply

TDC were using electricity from Tenaga Nasional Berhad Malaysia (TNB) and

generate running smoothly in TDC. With using 11kV HT Power Feed from TNB

Power Grid.

7.2 UPS and battery An uninterruptible power supply, also uninterruptible power source, UPS or

battery/flywheel backup is an electrical apparatus that provides emergency power to a

load when the input power source, typically mains power, fails. A UPS differs from

an auxiliary or emergency power system or standby generator in that it will provide

near-instantaneous protection from input power interruptions, by supplying energy

stored in batteries, super capacitors, or flywheels. The on-battery runtime of most

uninterruptible power sources is relatively short (only a few minutes) but sufficient to

start a standby power source or properly shut down the protected equipment.

Figure 16: APC battery backup power | Source: Google image

Page 22: Contoh report Data Center IMS506

22

7.3 Battery Battery functions as to supply current when power is lost. While sealed lead-acid

(SLA) batteries remain the standard power source for about 50 percent of existing

data center battery backup unit, their limitations are widely known. Lead acid

batteries need to either be topped off with water every few years or completely

replaced data center battery.

7.4 Power generator TDC decided to outsource the power generator from WCM Power Sdn. Bhd.

(Formerly known as AEP POWER SDN BHD) which located at Lot 16, Jalan

Teknologi 3/5, Taman Sains Selangor 1, 47810 Kota Damansara, Selangor Darul

Ehsan, Malaysia. WCM Power Sdn. Bhd. as one-stop turnkey machinery solutions

provider in the power generator industry emphasizes very much on quality and

comprehensiveness of their products and services. Their generator sets are used

throughout a wide range of industries including healthcare, manufacturing, oil and

gas, telecommunications, leisure, construction, retail, event management and

emergency aid relief.

WCM Power is able to design and build generator sets, which are specific to the pre-

requisite project requirements set by clients. WCM Power‟s house brand, WCM

Energy can be designed and customized to meet specific power needs. Each WCM

generator set is built with high quality engines, which assures fuel efficiency and low

operating and maintenance costs. All WCM Energy generator sets are fully tested at

WCM Power‟s factories before delivery to the clients.

Figure 17: Power generator | Source: Google image

Page 23: Contoh report Data Center IMS506

23

7.5 Air conditioner (heating, ventilation and air conditioning), HVAC HVAC is the technology of indoor and vehicular environmental comfort. Its goal is to

provide thermal comfort and acceptable indoor air quality. HVAC system design is a

sub discipline of mechanical engineering, based on the principles of thermodynamics,

fluid mechanics, and heat transfer. It is important in the design of medium to large

industrial and office buildings such as skyscrapers and in marine environments such

as aquariums, where safe and healthy building conditions are regulated with respect

to temperature and humidity, using fresh air from outdoors.

Figure 18: Temperature flow | Source: Google image

Page 24: Contoh report Data Center IMS506

24

8.0 TYPES OF SERVERS 8.1 Rack Server

A rack server, also called a rack-mounted server, is a computer dedicated to use as

a server and designed to be installed in a framework called a rack.

The rack contains multiple mounting slots called bays, each designed to hold a

hardware unit secured in place with screws. Rack server created because to save

the physical floor space and other servers. One rack can support about 20-25 units

of servers but it depends on the equipment.

Figure 19: Rack Server | Source: Google image

Figure 20: Rack Server | Source: Google image

Page 25: Contoh report Data Center IMS506

25

8.2 Blade Server HP Blade System is a modular infrastructure platform that converges server,

storage and network fabric to accelerate operations and speeds delivery of

applications and services running in physical, virtual, and cloud-computing

environments. Designed to optimize virtually any workload, it is managed by a

consumer inspired management platform that delivers unprecedented ease of use

allowing you to deploy and manage your environment faster, at lower cost, and

maximize productivity at any scale. The blade servers themselves contain only the

core processing elements, making them hot- swappable. HP refers to the entire

package as a Blade System.

Figure 21: Blade Server | Source: Google image

Page 26: Contoh report Data Center IMS506

26

Figure 22: Blade Server | Source: Google image

8.3 Tower Server

A tower server is a computer intended for use as a server and built in an upright

cabinet that stands alone. The cabinet, called a tower, is similar in size and shape

to the cabinet for a tower-style personal computer. This is in contrast to

rack server s or blade server s, which is designed to be rack-mounted. By using

tower server, our server cans easier cooling, because the overall component

density is fairly low. Besides, the scalability of the tower server because an

unlimited number of servers can be added to an existing network.

Figure 23: Tower Server | Source: Google image

Page 27: Contoh report Data Center IMS506

27

9.0 PHYSICAL AND ENVIRONTMENTAL SECURITY 9.1 Physical Security

Teratai Data Center have their own ways to maintains their physical securuty to

secure the data center. Teratai Data Center have highest standards of physical

security to ensure it secure to all staff. To maintain the high value assets and high

protection to data center, we need to ensure the security in high standards of

protection. With this security, to protect the employees, information and physical

assets that contain in data center. There are several type of physical security that

have contain in Teratai Data Center:

a) Biometric In Teratai Data Center provide biometrics scanner to employees to enter

the building. This is a high tech, small terminal that will read an

employee‟s fingerprint and then store it as a mathematical algorithm. This

is an important point, as many employees express concern that their

fingerprint is being kept on record. This is not the case; the algorithm is

simply a code to allow the reader to check the fingerprint. There is no way

to reconstruct a fingerprint from the algorithm.

Fingerprint Readers experience an extremely low number of false accepts

or false rejects. When using the fingerprint reader for access control, you

may assign a „duress fingerprint‟. This means another finger can be used

in times of duress for example if you are being forced to open a door. The

door will open as normal but the system will silently send a duress signal

to the main terminal or guard room.

Page 28: Contoh report Data Center IMS506

28

Figure 24: Biometric | Source: Google image

Figure 25: Biometric | Source: Google image

b) Photo Scanner Ids For Employee Teratai Data Center also provide photo scanner IDs for employee to

identify their ID before enter the building. Our Photo ID Scanner captures

data from both sides of the ID to help provide the most accurate data

possible. These durable ID scanners are the best in the industry and prove

to be very reliable. When an ID is inserted, the ID scanner will grab the ID

and pull it through the scanner. Within a few seconds, the ID is scanned.

Page 29: Contoh report Data Center IMS506

29

Besides that, photo scanner also for visitor to access the building

especially into the data center. All staff in Teratai Data Center must be

identifiable by their staff card.

c) Mantrap At the entry of Teratai Data Center have a mantrap. Mantrap means that

a mantrap, air lock, sally port or access control vestibule is a physical

security access control system comprising a small space with two sets of

interlocking doors, such that the first set of doors must close before the

second set opens. In a manual mantrap, a guard locks and unlocks each

door in sequence. An intercom and or video camera are often used to

allow the guard to control the trap from a remote location.

In aquatic situations and in space, mantraps are known as airlocks. This is

counterintuitive, because exactly the same design is used for the opposite

purpose. A mantrap is used to keep an individual in, whereas an airlock is

used to facilitate ingress or egress.

Figure 26: Photo Scanner IDs | Source: Google image

Page 30: Contoh report Data Center IMS506

30

Figure 27: Mantrap | Source: Google image

d) Server Cages In Teratai Data Center provides server cage for the server racks. The

server racks should be secure with lock and access in controlled. Server

room is behind from security so we need to secure the server racks from

missing. In Teratai Data Center not able anyone to access the data center

or server room to protect the security. The server cages can keep away

from delicate equipment with lockable.

Figure 28: Server Cage | Source: Google image

Page 31: Contoh report Data Center IMS506

31

e) Vehicle Barrier The barrier security system is the security to protect people enters the data

center without permission. Visitor will be asking with security guard

before the vehicle barrier is open to enter in Teratai Data Center. The

vehicle barrier has at post guard, the security entrance and before exit

from the Teratai Data Center.

Figure 29: Vehicle Barrier | Source: Google image

Figure 30: Vehicle Barrier | Source: Google image

Page 32: Contoh report Data Center IMS506

32

f) Security Alarm Security alarm is important security to contain in Teratai Data Center. A

security alarm is a system designed to detect intrusion unauthorized entry

into a building or area. Security alarms are used in residential,

commercial, industrial, and military properties for protection against

burglary (theft) or property damage, as well as personal protection against

intruders.

Figure 31: Security Alarm | Source: Google image

9.2 Environment Security

9.2.1 CCTV Inside Teratai Data Center is containing 30 secure cameras to monitor the

data center. Closed-circuit television (CCTV), also known as video

surveillance, is the use of video cameras to transmit a signal to a specific

place, on a limited set of monitors. It differs from broadcast television in

that the signal is not openly transmitted, though it may employ point to

point (P2P), point to multipoint, or mesh wireless links. In Teratai Data

Center, CCTV equipment may be used to observe parts of a process from

a central control room. CCTV systems may operate continuously or only

as required to monitor a particular event. A more advanced form of

CCTV, utilizing digital video recorders (DVRs), provides recording for

possibly many years, with a variety of quality and performance options

and extra features such as motion detection and email alerts. Teratai Data

Page 33: Contoh report Data Center IMS506

33

Center put CCTV around the building, at all entrance and exits, and every

access point throughout the building. So, the security guard can see the

area around Teratai Data Center.

Figure 32: CCTV | Source: Google image

Figure 33: CCTV | Source: Google image

9.2.2 Fire Suppression Systems Fire Suppression Systems are commonly used on heavy power

equipment. Suppression systems use a combination of dry chemicals

and/or wet agents to suppress equipment fires. Suppression systems have

Page 34: Contoh report Data Center IMS506

34

become a necessity to several industries as they help control damage and

loss to equipment. In Teratai Data Center are providing 15 fire

suppression installed. For each floor that contain 5 or more fire

suppression to prevent the data center for loss of information. In Teratai

Data Center, automatic fire suppression systems control and extinguish

fires without human intervention. Examples of automatic systems include

fire sprinkler system, gaseous fire suppression, and condensed aerosol

fire suppression.

Figure 34: Fire Suppression Systems | Source: Google

9.2.3 Wireless Smoke Detector Teratai Data Center installed every floor of data center wireless smoke

detector to protect the data center. This wireless smoke detectors two-

way communication enables it to activate the built-in sounders of all

enrolled smoke detectors during an alarm, notifying the whole area of an

incident. This device is powered by long-life 3V Lithium batteries and

utilizes photoelectric smoke detection technology. It also includes rapid

“rate-of-rise” temperature detection. There are invisible intruders, for

example fire or smoke, which are more dangerous than the sneaked-in

intruders. These incidents are unpredictable and it can start from the

Page 35: Contoh report Data Center IMS506

35

interior anytime. It is not feasible to have security guards monitor fire

incident all day long, at all points of the building. Instead, you can install

another type of interior volumetric detection system, for example

smoke/heat sensor, around all corners to detect smoke or fire once it

started.

Figure 35: Wireless Smoke Detector | Source: Google image

Figure 36: Wireless Smoke Detector | Source: Google image

Page 36: Contoh report Data Center IMS506

36

10.0 LIST OF VENDORS

a) Figure 37: APC | Source: Google image

APC specializes in rack, UPS, power, datacenter monitoring, and data center

infrastructure cooling.

b) Figure 38: Avocent | Source: Google image

Avocent specializes in Data Center Management, Outlet Level Power, KVM over IP

and Analog Cat5 KVM Switches.

c) Figure 39: BayTech | Source: Google image

BayTech specializes in Ethernet and RS232 Remote Power Switches and Remote

Power Management Software

Page 37: Contoh report Data Center IMS506

37

d) Figure 40: CPI | Source: Google image

Chatsworth Products, Inc. (CPI) specializes in server racks and cable management

solutions.

e) Figure 41: dataprobe | Source: Google image

DataProbe specializes in Web Controlled Remote Reboot / Power Cycle Products.

f) Figure 42: EATON | Source: Google image

Eaton Powerware provides power quality and UPS (uninterruptible power supply)

management solutions.

g) Figure 43: EMERSON | Source: Google image

Emerson uninterruptible power and precision cooling systems that protect the world‟s

most critical data centers.

Page 38: Contoh report Data Center IMS506

38

h) Figure 44: Great Lakes | Source: Google image

Great Lakes Case & Cabinet Co., Inc. is a leading manufacturer of racks, wall mount

and free-standing enclosures.

i) Figure 45: LEVITON | Source: Google image

Leviton Manufacturing Company is the largest privately held manufacturer of

electrical wiring equipment in North America.

j) Figure 46: Liebert | Source: Google image

Liebert uninterruptible power and precision cooling systems that protect the world‟s

most critical data centers.

k) Figure 47: MINICOM TRIPP.LITE | Source: Google image

Minicom by Tripplite specializes in Cat5 KVM Switches, Cat5 KVM Extenders and

AV Splitters.

Page 39: Contoh report Data Center IMS506

39

l) Figure 48: RITTAL | Source: Google image

Rittal is a leader in Liquid Cooling, Rack Enclosures and Data Center Infrastructure

Solutions.

Page 40: Contoh report Data Center IMS506

40

11.0 LABELLING AND SIGNAGE As for labeling in our Data Center, we decide to label all of our equipment especially

for the servers and also other appliances such as firewall and switches, we decide to

do some deploying in labeling. While labeling the format system in order to specify

each of the components will be maintain well and to ease the process of network and

housekeeping so that it will be going as smooth as can.

Then for the text or word on the labels should be machine generated, and labels

should be visible during normal maintenance of the infrastructure. Labels should be

resistant to the environmental conditions (such as moisture, heat or ultraviolet light)

at the point of installation and should have a design life equal to or greater than that

of the labeled component. Keeping and maintaining good records is the most

important aspect of a labeled infrastructure, and identifier information must be

referenced in permanent records, backed up and secured by building administration.

Figure 49: Shown how the labeling will looks like| Source: Google image

Page 41: Contoh report Data Center IMS506

41

Figure 50: Shown the label for each of the cable | Source: Google image

Page 42: Contoh report Data Center IMS506

42

Table 3: Label and signage

No.

Signage

Terms

1.

In the Data Center area, not all of the

department or division people can use their

smartphones. Some departments are

prohibited from bringing any smartphones

because it will be ringing at any time,

especially in the server room. This is because

it can allowed people to record or steal and

captured the data in the data center.

2.

This label means that in this area, do not eat

and enter the outside food in the data center.

This is because the food will be able to make

the data center become dirty and also can

effect on the server.

3.

In the Data Center, the label of No smoking is

prohibited. Smoking is strictly not allowed in

the data center. This is because the smoke can

be detected by the smoke detector devices

that required in the data center.

Page 43: Contoh report Data Center IMS506

43

4.

In the Data Center, people are strictly

prohibited from take any pictures in the data

center especially in the server room. This is

because it can allow people to captured the

data in the data center and easily give it to

other agencies.

5.

In Data Center, people are not allowed to

bring their pets inside especially cats, dog and

so on. This is because this area is not suitable

for animals to walk in around the data center.

6.

In the Data Center, if this label is shown it

means that it is the direction to go to the toilet

or restroom that provided in the data center.

7.

This symbol is take place at the M&E

Standby and Generator Room. This is

because these rooms contain lots of electric

wire that can be dangerous towards people.

Only authorized person or in charge person

allowed to enter this area or it will give harm

to those people who enter this room.

Page 44: Contoh report Data Center IMS506

44

8.

In the Data center, there are several areas that

cannot be entered but only can be access by

an authorized person which have their own

identification card (ID). This area could be

server room, UPS and battery room,

generators room and so on.

9.

In the Data Center, people are strictly cannot

throw the rubbish anywhere they want.

People either staff or clients are prohibited to

throw the rubbish in the data center either

inside or outside the data center.

10.

As for Muslim, prayer room is also provided

in the data center. So that it can make people

either staff or clients to do the solah.

Page 45: Contoh report Data Center IMS506

45

11.

In the Data Center,emergency exit symbol are

placed in the building because it can helps

staff and clients exit when disaster are happen

for an example like fire, earthquake and so

on.

Page 46: Contoh report Data Center IMS506

46

12.0 POSSIBLE POSITION

Table 4: Possible position

Position

No. of people

required

Duties

Data Center

Manager

1

9 Responsible for equipment maintenance tasks

such as managing and installing custom

upgrades for customers such as replacing cables,

components and accessories; maintaining

records and drawing schematics of the center to

detail what equipment is installed.

9 Administrative duties might include scheduling

employee shifts, planning for capacity changes,

maintaining corporate databases and ensuring

compliance with government regulations.

Data Center

Operation Manager

2

9 Supervises day-today activities of Data Center

Operations Technicians across all shifts in a

24x7 environment through a team of Team

Leaders.

9 Recommends changes in procedures or

equipment that would increase productivity,

reduce cost, and better serve Data Center

requirements and customers

Data Center Operation

2

9 Understand, troubleshoot, and fix broken

servers/Linux OS related issues on server.

Page 47: Contoh report Data Center IMS506

47

Technician

Data Center Operation Analyst

2

9 Install new servers, design rack layout and

power allocation.

9 Responsible for monitoring and operation of

data center critical functions and facilities.

9 Perform customer installation activities to

include but not limited to physical server

racking, cabling, rack layout definition,

electrical requirements, HVAC requirements

configuration, etc.

Data Center

Operation Engineer

3

9 Enhance platform automation, documentation,

and system performance

9 Adhere to stringent security and

change/configuration management procedures

and policies.

SARGENT- Data Center Specialist

5

9 Monitor, troubleshoot and resolve Windows

server environment as well as backup

infrastructure

9 Identify network/applications issues.

IT Server Engineer

3

9 Help establish a customer experience strategy

while working with the local site Data Center

Management team, as well as local Operations,

and Critical Environments teams.

Page 48: Contoh report Data Center IMS506

48

13.0 OTHER TECHNOLOGIES OR SYSTEM USED In our Data Center or also known as TDC, we will provide other technology that will

be very useful in our operations. It known as API (Application Programming Interface).

13.1 Introduction of APIs APIs are helping to usher in new mechanisms for making data center

management more automated and scalable. They‟re also key to network

virtualization and private clouds. APIs are driving the evolution of data

center management from manual configuration of hardware and software

to more automated and scalable techniques. Any discussion of public or

private clouds, and software-defined everything, must include APIs.

However, for many enterprises, the rise of APIs for configuration is a

new(ish) concept. Here's what you need to know. Traditionally, IT would

configure software and hardware manually, or use scripts driven by the

CLI, screen scraping and so on. This approach is time-consuming, error-

prone, and unsuited in an age when virtualization can speed deployment of

resources and services. Enter the API. An API is an interface that allows

software components to talk to one another; it's a library of specifications

of objects, routines and data structures. An API isn't restricted to software;

even hardware requires software as an interface for configuration and

management.

Figure 51: Shown the APIs process works | Source: Google image

Page 49: Contoh report Data Center IMS506

49

13.2 Functionality of APIs A major function of APIs for high-level management is in the integration.

Without an API, the managing system code must be tightly coupled with

the standard configuration interface of the object (CLI, GUI, and so on).

Using a well-built API abstracts that complexity, which allows for more

seamless integration. This also helps with upgradability dependencies.

Besides that, APIs provide a programmable interface for the components

of the data center. This allows both custom configuration and better

integration with higher-level management systems.

Page 50: Contoh report Data Center IMS506

50

14.0 CONCLUSION As a nutshell, Data Center is known as a mission critical site that is as a facility used

for housing a large amount of computer and communications equipment maintained

by an organization for the purpose of handling the data necessary for its operation.

Data center is a must nowadays for a company, especially large-sized company. For

a company to organize their excessive data, they required the services of a data

center. With fast growing of technologies nowadays, each of the data center are now

upgrading in order to meet the clients demands and standard. Every data center is

competing each other in order to meet the customers favor, but it is up to the

customers choose which one they prefer. Besides, Data Center helps the process of

business transaction and also stores your intellectual property.

Page 51: Contoh report Data Center IMS506

51

15.0 REFERENCE Google. Inc. (n.d). data center – Google. Retrieved April 10, 2015 from http://www.google.com/about/datacenters/ Zimrock Marketing. (n.d). the data center journal industry. Retrieved April 10, 2015 from http://www.datacenterjournal.com/it/industry-perspective-labeling-data -center/