Upload
dipak-bora
View
236
Download
2
Tags:
Embed Size (px)
Citation preview
A STUDY ON
DATA CENTRE MANAGEMENT WITH REGARD TO TOPCEM CEMENT
A Report submitted in partial fulfillment of the requirement for the Degree of Master of Business Administration (MBA) in ASSAM DON BOSCO UNIVERSITY (Online and Distance Education)
Submitted by:
DIPOK BORA
MBA 3rd SEMESTER
Roll no- DG2013MTM0172
Registration Number: DE-1-2013-000918
UNDER THE GUIDANCE OF:
Organizational Guide:
Mr. Ratish Kr Pratihast
IT MANAGER
TOPCEM CEMENT
ASSAM DON BOSCO UNIVERSITY
N.H. 37, Airport Rd, Dharapur, Azara, Guwahati, Assam 781017
ACKNOWLEDGEMENTS
The completion of this project report has been a great experience and has given me the opportunity to
express my profound gratitude to all those who have made it possible for me to carry on the project
report.
I am especially thankful to my organizational guide Mr. Ratish Kr Pratihast, IT Manager, TOPCEM
India Ltd., Guwahati for giving me this opportunity to undergo a project study under her guidance in
the esteemed organization.
Finally I wish to extend my heartfelt thanks to the Company for giving me opportunity and carrying
out the project work and providing me relevant research training for carrying out the project. I would
also like to thank to all those persons, who have assisted me with co- operation, books and articles &
the other important materials.
EXECUTIVE SUMMARY
NAME OF THE STUDENT: Dipok Bora
NAME OF THE ORGANISATION: TOPCEM CEMENT
NAME OF ORGANIZATIONAL GUIDE: Mr. Ratish kr Prathihast
TOPIC OF THE STUDY: DATA CENTRE MANAGEMENT IN TOPCEM
CEMENT Ltd.
OBJECTIVES OF THE STUDY: Primary Objective
Manage and troubleshoot servers, serial devices, storage, and other equipment locally or remotely, through a single administrative interface.
Reduce system and network downtime by enabling immediate access to failed resources - Centralize data center control and provide efficient management and maintenance processes, using fewer IT resources
Enhance system security by leveraging existing authentication schema such as Active Directory, TACACS+, etc.
Provide visibility to daily operations and occurrences through comprehensive audit logging and reporting tools.
Improve physical site security by allowing IT staff to work remotely without access to the data center
SOURCES OF INFORMATION: PRIMARY DATA
The primary data was collected from the IT manager of Topcem Cement Ltd.
SECONDARY DATA
Secondary data is the data which is not collected first hand. It is collected from other published source. In this report, the secondary data has been collected with the help of different books and through internet.
LIST OF FIGURES
Figure Name Fig Num Page numberContext Diagram 2.1
Racks 3.1
Patch Panels, Cables and Punch Down 3.2
Switches and Routers 3.3
Servers 3.4
Smoke Detectors 3.5
Cooling System in Data Center 3.6
Power Backup Devices 3.7
Simple Data Center Connectivity Diagram 3.8
Top of Rack Design 4.1
End of Row Design 4.2
Middle of Row Design 4.3
Fibre Extender Design 4.4
Design In Topcem Cement 4.5
Network Connectivity in Topcem 7.1
Server connectivity with Network in Topcem 7.2
CONTENTS
Declaration
Acknowledgement
Executive Summary
List of Figures
CHAPTER 1
ABOUT THE SUBJECT
1.1 About Cement Industry
1.2 About Company Profile
CHAPTER 2
RESEARCH METHODOLOGY
2.1 Statement of the Problem
2.2 Objective of the Study
2.3 Scope of the Study
2.4 Research Type
2.5 Sources of Data
2.6 Plan of Analysis
2.7 Feasibility Analysis
2.8 Structural Analysis
CHAPTER 3
DATA CENTRE INFRASTRUCTURE
3.1 Introduction
3.2 Room to make Data Centre
3.3 Devices and Equipments required for a Data Centre.
3.4 Safety and Security
3.5 Disaster Management.
3.6 Backup and Storage.
3.7 Cooling.
3.8 Power.
3.9 Conclusion
CHAPTER 4
DATA CENTER DESIGN
4.1 Rack Design
4.2 End of Row Design
4.3 Middle of Row Design
4.4 Fabric Extender Design
4.5 Designed In Topcem Cement Ltd.
CHAPTER 5
SECURITY & DISASTER MANAGEMENT
5.1 Physical Security
5.2 Data Security
5.3 Disaster Management
CHAPTER 6
TESTING AND DEBUGGING
6.1 System Testing
6.2 Debugging
6.3 Training according to Job Profile.
6.4 Implementation
CHAPTER 7
DIAGRAMATIC REPRESENTATION
7.1 Network Connectivity Diagram
7.2 Server Connectivity with Network Diagram
CHAPTER 8
CONCLUSION
Bibliography
CHAPTER 1
ABOUT SUBJECT
1.1 About Cement Industry
1.2 About Company Profile
ABOUT SUBJECT
This study focuses on the Implementation and the Management of Data Center in Topcem Cement
Ltd. A data center or computer Centre (also datacenter) is a facility used to house computer systems
and associated components, such as telecommunications and storage systems. It generally includes
redundant or backup power supplies, redundant data communications connections, environmental
controls (e.g., air conditioning, fire suppression) and security devices.Data centers have their roots in
the huge computer rooms of the early ages of the computing industry. Early computer systems were
complex to operate and maintain, and required a special environment in which to operate. Many cables
were necessary to connect all the components and methods to accommodate and organize these were
devised, such as standard racks to mount equipment, elevated floors, and cable trays (installed
overhead or under the elevated floor). Also, a single mainframe required a great deal of power, and
had to be cooled to avoid overheating. Security was important – computers were expensive, and were
often used for military purposes. Basic design guidelines for controlling access to the computer room
were therefore devised. The boom of data centers came during the dot-com bubble. Companies needed
fast Internet connectivity and nonstop operation to deploy systems and establish a presence on the
Internet. Data Centre IT equipment’s consists of many individual devices like storage devices, servers,
network equipment’s Viz. Routers, switches, firewalls etc. The essentials of Data Center are Location
–Where in the building, Racks-to mount Servers, Network cables and Network Equipment’s in orderly
state .Disaster planning, Wiring, Access to Data Centre and Security.
1.1 ABOUT CEMENT INDUSTRY
AN OVERVIEW OF CEMENT INDUSTRY IN NORTH-EAST
In North-East there is much better scope for cement industries. Meghalaya being the heart state of
North-East has got its ancestral values in India. Known for one of the highest rainfall at Cherrapunji,
its environmental friendly and good climatic conditions attract people all over India.
Being rich in minerals particularly limestone, coal, shale, bauxite, laterite etc.
The Jaintia Hills district of Meghalaya has become a boon to the cement industry. In Lumshlong,
Thangskai, Mynkree, Nongsning etc. there are a number of cement factories in operation as well as the
project stage. Major plants like Cement manufacturing Company Ltd. (Star Cement), Meghalaya
Cement Ltd. (TOPCEM) etc. are already in operation and are catering to the need for cement of the
North East region. The other cement plant M/s JUD Cement Ltd., has also started its production few
years back. The cement projects e.g. M/s Adhunik Cement Ltd., M/s Hills Cement Ltd., M/s Amrit
Cement & M/s Green Valley Industries Pvt. Ltd. are also completing their cement projects at a rapid
pace.
Further, major groups like Lafarge Cement, Dalmia Group, Balaji etc. are also exploring possibilities
to set up major cement plants in Meghalaya. Besides cement industries, other industries are also
operating in the state such as timber/plywood, coke, brick moulding, stone chips etc. Mawmluh Cherra
cement Limited (Government of Meghalaya undertaking is also located in eastern region of the state.
The limestone from Shella of East Khasi Hills district is supplied to Bangladesh through belt conveyor
(17kms in length) further for its Lafarge Cement plant.
Therefore, it is essential and even mandatory for industrialists to take care of the natural environment
and peripheral development of local area infrastructures, community centres, health and education of
local people taken care of properly.
1.2 ABOUT COMPANY PROFILE
Topcem cement is a division of Meghalaya Cements Limited (MCL) of Lohia Group of Industries,
which has diversified interest in cement and steel. MCL has emerged as one of the most successful
players in the North-East region. They have the second largest market share of 24% in the eastern
region of India. It has also taken up a project for expansion by establishing a grinding unit in
Amingaon, Guwahati.
Meghalaya Cements thrives with picturesque natural splendor on the bosom of Jaintia Hills in the state
of Meghalaya. While many companies have to transport cement over several days and weeks from the
plains to reach the North-East region or transport limestone or clinker over similar industries,
TOPCEM cement is made at a large new integrated cement plant next to captive limestone mines, very
close to the market. The cement, thus produced from this plant is of high early strength and better
workability.
Some of the top technical factors for choosing TOPCEM cement apart from the above mentioned
reasons includes that the TOPCEM uses low heat of hydration resulting in resistance to cracking, it
takes shorter final setting time and hence faster construction, also resist to corrosive water and
chemical attacks and hence longer life to steel reinforcement, higher compressive strength, higher
degree of fineness resulting in complete chemical reaction, easy workability and increased plasticity.
PRODUCTS
Topcem Cement mainly produces three types of cement namely-
1. Ordinary Portland Cement (OPC) 43
2. Ordinary Portland Cement (OPC) 53
3. Portland Pozzolona Cement (PPC)
MANAGEMENT
Kailash Chandra Lohia is the Chairman of the company. He is also the chairman of Lohia Group of
Industries that has a diversified interest in the NorthEast region (NER). Kailash has taken the steel
sector of Lohia group to a new horizon in north east in terms of CGI sheets, TMT bars, Ferro alloys
and Industrial oxygen. The group has a vast chain distribution network throughout the north east.
Kailash has the interest in education and the career of the upcoming ones and founded Delhi Public
School at Guwahati. He had the vision of the requirement of departmental stores in the modern society
and set up Sohum Shoppe which is concerned to be the largest departmental chain stores in North
East.
Bijay Kumar Garodia is the Vice-Chairman of the company, and is leading industrialist, having a
cheqered career spanning over two decades with interst in steel, tea, cement, plywood, rubber and
construction. Bijay held the positioning of Hony, Director on the Board of Arunachal Pradesh Forest
Corporation Limited. He was conferred on on the national citizenship award by the Prime Minister of
India in 1995.
Mahendra Kumar Agarwal is the Managing Director of the company having a rich experience in
establishing and running industries in sectors as diverse as cigarette, cosmetics, toiletries and
construction. He is the founder Director of Ban Cements Ltd. His rich experience in setting up of
BVCL strengthened MMCL to set up cement plant in Meghalaya.
Ram Avtar Agarwalla is the Managing Director of the company and successful in having diversified
interests in manufacturing TMT bars, Ferro Alloys and Byrnihat Ox Ltd. He has promoted a steel
industry in Tripura. He takes keen initiative in running Public School of Guwahati.
Phone Syieh is the Director of the company and the Headman of Thanskai village in Ja district of
Meghalaya state. He is an active social server, dedicated to the development of people of Meghalaya.
His vision of employing the youth of Meghalaya came true setting up of the Dolomite Plant and the
Cement manufacturing unit of MCL.
VISION AND MISSION
Vision:
Meghalaya Cements Ltd is committed to achievement of customer satisfaction in our business of
cement manufacturing and marketing through meeting all requirements and constant improvement
effectiveness of the Quality Management Policy.
Mission:
To provide meaningful service to our customers by continually improving the products and processes
use the latest tools and techniques of performance improvement and innovation.
VARIOUS DEPARTMENTS OF TOPCEM CEMENT
1. IT department
2. Sales and Marketing department
3. Production department
4. Logistic department
5. Purchase department
6. HR department
7. Technical department
8. Accounts department
IT DEPARTMENT FUNCTIONAL CHART
MANAGER IT
Mr. Ratish Kr Pratihast
IT EXECUTIVE SERVER
IT EXECUTIVE SAP
IT EXECUTIVE NETWORKS
IT EXECUTIVE SAP
IT EXECUTIVE EUS
ASSISTANT MANAGER
CHAPTER 2
RESEARCH METHODOLOGY
2.1 Statement of the problem,2.2 Objective of the study.2.3 Scope of the Study.2.4 Research Type.2.5 Sources of Data.2.6 Plan of Analysis.2.7 Feasibility Analysis.2.8 Structural Analysis.
RESEARCH METHODOLOGY
Research methodology is a way to systematically solve the research problem. It may be understood as
a science of how research is done systematically. In simple words; all those methods that are used by
the researcher during the course of studying the research problem are termed research methodology.
2.1 STATEMENT OF THE PROBLEM
As found out that without Data Center the whole IT system is haphazard. The risk factor is high as the
IT assets are not centralized. So managing the IT assets is a tiresome job. Whenever there is any issue
it becomes difficult for a engineer to identify actually where the issue lies. The company has got
fifteen Zonal Offices, Two plants, Head Office and a Sales & Marketing office so to manage the IT
infra is very hard. Therefore a Data Center is made to make the IT work without any downtime and
failure. During Research it was found that a very minor system failure causes loss of job which
hampers business growth and sometimes loss of data as centralized storage system is not available. So
after suggestions and planning to decided to make IT centralized.
2.2 OBJECTIVES OF THE SUDY
Primary Objective
To study the flow of IT works and to bring in to notice the drawbacks of not having Data center in
TOPCEM.
Secondary Objective
1. To study about the different Issues in IT.
2. To study about the different factors related to IT that affects the business.
3. To study the growth of company after centralized IT system.
4. To know whether the company suffers from the problem of IT management.
2.3 SCOPE OF THE STUDY
The study covers the need and the effectiveness of Data Center Management in TOPCEM. It covers
the responses from the senior level executives regarding their view about the IT process and about its
effectiveness. The study also attempts to find if there exist any loopholes in the present IT process.
The findings of the study are expected to give an idea of the prevailing IT process and certain areas of
improvement.
2.4 RESEARCH TYPE
The Success of a system largely depends on how accurately a problem is defined complete and
accurate information requirements are essential in building a Data Center and managing it. The
research type is asking pattern in form of questionnaire and discussions.
2.5 SOURCES OF DATA
PRIMARY DATA
The primary data was collected through survey conducted with the help of questionnaire in TOPCEM
in Guwahati, Meghalaya, Kolkata, through personal visit to individuals in addition to telephonic
interviews and through asking (Questions, Brainstorming Group discussions)
Asking: Here we obtain information from users by simply asking them Questions. Here it is assumed
that the users are well informed and can overcome biases in defining there problem.
Questions: Questions may be either open-ended or closed. An open–ended question allows the user to
formulate a question .A closed question on other hand has a answer from a specific set of responses.
Brainstorming: This technique is used for generation new ideas and obtaining general information
requirements .Here each user is asked to provide or define ideal solution and selects the best.
Group Consensus: Here the participants are asked their expectations regarding specific variables. The
results are summarized and given to participants with follow-up questionnaires. Participants are
invited to change their responses .The results are than summarized and given to the participants. These
debate by questionnaire continues their response have converged enough.
SECONDARY DATA
Secondary data is the data which is not collected first hand. It is collected from other published source.
In this report, the secondary data has been collected with the help of existing system, different books,
The Topcem IT Manager and through internet.
Information from Existing system: Determining information from existing system is known as data
analysis approach. Here the user is asked what information is currently received and what other
information is required. It relies heavily on the user to articulate information needs.
LIMITATIONS OF THE STUDY
The study has certain limitations which are as follows:
1. The research, as a part of an academic study, was conducted within a short period of time which was not
enough to conduct an extensive survey.
2. Lack of interest and unenthusiastic response on the part of respondents was another limitation in conducting
the study.
3. The research was confined to Only Three locations. Hence the result may vary in different cities.
4. The users are not well versed with IT terms like network, Storage etc.
2.6 PLAN OF ANALYSIS
Data analysis is the process of placing data in ordered form, combining them with existing information
and extracting meaning from them. Interpretation is the process of drawing conclusions from the
gathered data in a study. Simple statistical tool, i.e. the percentage method has been used to analyse the
data. Analysis done on the number of System, Server, Network devices required to make a data center
accordingly asked by the user of the company.
2.7 FEASIBILITY ANALYSIS:
After Initial investigation, feasibility study is carried out to check the workability of the candidate
system. Its impact on the organizational ability to meet user needs and effective use of the system. Its
impact on the organizational ability to meet user needs and effective use of the system. Feasibility
study is the testing of the proposed system according to its workability. The project of feasibility
system is not to solve the problem definition i.e. centralized and aspects of the problem to be included
in the system are determined. Consequently cost and benefits are estimated with greater accuracy at
this stage. This simply a report a formal document detailing the normal and scope of the proposed
system. The proposal summarizes what is known and what is going to be done.
There are three key considerations involved in the feasibility analysis. They are
1. Economical Feasibility.
2. Technical Feasibility.
3. Behavioral Feasibility.
1. Economical Feasibility:
Economic Analysis is the most frequently used method for evaluating the effectiveness of the candidate system.
More commonly known as cost/benefit analysis, the procedure is to determine the benefits and saving that are
expected from a Data Center Implementation and comparing them with costs. A proposed system is
economically feasible as the cost incurred in the development of the system is minimal. Among the most
important information contain in a feasibility study is cost-benefit analysis.The various cost factors that are
looked into are-
a. Procurement Cost.
b. Consulting Cost.
c. Actual Equipment purchase or lease cost.
d. Equipment Installation cost.
e. Cost for making the room for Data Center (AC, security etc)
f. Cost of capital
g. Cost of management and staff dealing with procurement.
h. System Maintenance Cost.
i. Rental costs(electricity etc)
j. Depreciation cost on Hardware.
Data Center has many cost advantages viz. less manpower, Easy to track any major Failures etc.
2. Technical Feasibility :
During technical analysis, the analysis evaluates the technical merits of the system, at the same time collecting
additional information about performance, reliability, maintainability and product ability in some cases, their
system analysis steps also includes a limited amount of research and design.
Technical Feasibility centers on the existing computer system (hardware, software
etc) and to what extent it can support the proposed system. This may also involve financial consideration to
accommodate technical enhancement. The resource required for a small Data Centre is a Server Engineer a
Network Engineer and an Electric Engineer.
3. Behavioral Feasibility:
In General, People resistant to change and computers have been known to facilitate change. A survey should be
made of how strong a reaction the user staff is likely to have towards the development of the computerized
system. It is common knowledge that the computer installations have something to do with turnover, transfer,
retaining and changes in employee status. Therefore it is understandable that the introduction of a new system
requires efforts to educate, sell and train the staff on new ways of conducting business.
STEPS OF FEASIBILITY STUDY:
1. From A project team and appoint a project leader.
2. Proposed system Flowchart
3. Study existing systems.
4. Describe and identify the need for change.
5. Weigh performance and cost data.
6. Select the best procedure to do the change.
7. Prepare and report final project directives to management.
2.8 STRUCTURAL ANALYSIS:
The various tools of structured analysis are -
1. Context Diagram
2. Data Flow Diagram
1. Context Diagram:
In the initial stage of the system analysis, context diagram is constructed to show the highest-level model of
the system. Context diagram is used to represent pictorially the boundaries of the system. Context diagram is
generally used to show the sources of data and the destination where the processed data goes.
Fig 2.1 : Context Diagram
People & Process
Servers
Storage
Backup
NetworkSecurity
Power & Cooling
Management
Infrastructure
Data Centres
CHAPTER 3
DATA CENTRE INFRASTRUCTURE
3.1 Room to make a Data Center3.2 IT Devices and equipments required for a
Data Center3.3 Safety and Security3.4 Disaster Management3.5 Backup and Storage3.6 Cooling3.7 Power3.8 Conclusion
DATA CENTRE INFRASTRUCTURE
Data center Infrastructure includes storage, desktop, server virtualization, Network devices etc
reduces overall IT equipment electrical load through consolidation of systems. It also includes
redundant or backup power supplies, redundant data communications connections,
environmental controls (e.g., air conditioning, fire suppression) and security devices. A data
center can occupy one room of a building or more floors or entire building. Most of the
equipment is often in the form of servers mounted in rack cabinets. Three elements of the
building of data center are facility topology design (space planning), engineering infrastructure
design (mechanical systems such as cooling and electrical systems including power) and
technology infrastructure design (cable plant).
3.1 Room to make a Data Center:
A data center can occupy one room of a building, one or more floors, or an entire building. Most of the
equipment is often in the form of servers mounted in 19 inch rack cabinets, which are usually placed in
single rows forming corridors (so-called aisles) between them. This allows people access to the front
and rear of each cabinet. Some equipment such as mainframe computers and storage devices are often
as big as the racks themselves, and are placed alongside them. Other than the architecture of the
building itself there are three elements to design programming for data centers: facility topology
design (space planning), engineering infrastructure design (mechanical systems such as cooling and
electrical systems including power) and technology infrastructure design (cable plant).While making a
plan for room of a Data Centre some future aspects are also kept in mind like scenarios for space,
power, cooling, and costs. The aim is to create a master plan with parameters such as number, size,
location, topology, IT floor system layouts, and power and cooling technology and configurations. The
infrastructure is identified and planning criteria is developed, such as critical power capacities, overall
data center power requirements using an agreed upon PUE (power utilization efficiency), mechanical
cooling capacities, kilowatts per cabinet, raised floor space, and the resiliency level for the facility.
Points to keep in view while planning a Data Center :
a. Consider natural disaster possibilities in area prone to flood don’t locate Data Centre in
basement.
b. Strength of floor
c. Access to electrical / telecom service
d. Location of UPS / ATS / generators
e. Raised floor
f. Hot Site availability in case of disaster
g. Must have all necessary electric, Security, Safety and Data communications in case of Disaster.
h. A least two entry / exit points
i. Doors wide enough to move equipment thru
j. Ramps may be required if raised flooring is used
k. Access to an elevator if on upper floors, Access from the delivery dock.
3.2 IT Devices and Equipments Required for a Data Center:
a. Racks
b. Patch Panels Punch Down and cables
c. Routers and Switches
d. Servers
a. Racks:
Iron Almera’s to keep the Equipment in ordered way. Advantage of Racks.
a. Saves Floor Space
b. Ease of maintenance
c. Air circulation to Equipment
d. Easy to mount Equipments .
e. Stability or protection of Equipment from moving or falling down.
f. Easy to manage Cables.
g. Easy to move the Racks as it has Rails and Drawers to keep Keyboard and Mouse.
Server Rack Network Rack
Fig 3.1 RACKS
b. Patch Panels, Punch Down and cables:
Patch Panels: Are the panels from which CAT 6 cables are connected for flow of data. Cables are
connected in some series according to color.
Punch Down: It is a platform where cables are punched down for a data access.
Cables: These are of various types Viz. Fiber Optic, CAT 6,Twisted pair etc via these cables data
flows.
PATCH PANEL
PUNCH DOWN
CABLES
Fig 3.2 Patch Panels, Punch Down and cables
c. Routers and Switches:
Routers- A router is a device that forwards data packets between computer networks, creating an
overlay internetwork. A router is connected to two or more data lines from different networks. When a
data packet comes in one of the lines, the router reads the address information in the packet to
determine its ultimate destination. Then, using information in its routing table or routing policy, it
directs the packet to the next network on its journey. Routers perform the "traffic directing" functions
on the Internet. A data packet is typically forwarded from one router to another through the networks
that constitute the internetwork until it reaches its destination node.
Switches - A network switch is a computer networking device that links network segments or
network devices. A switch is a telecommunication device that receives a message from any device
connected to it and then transmits the message only to the device for which the message was meant.
This makes the switch a more intelligent device than a hub (which receives a message and then
transmits it to all the other devices on its network). The network switch plays an integral part in most
modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number of linked
managed switches. Small office/home office (SOHO) applications typically use a single switch, or an
all-purpose converged device such as a residential gateway to access small office/home broadband
services such as DS or cable Internet.
ROUTERS
NETWORK SWITCH
Fig: 3.3 Routers and Switches
d. Servers:
A server is a running instance of an application (software) capable of accepting requests from the
client and giving responses accordingly. Servers can run on any computer including dedicated
computers, which individually are also often referred to as "the server". In many cases, a computer can
provide several services and have several servers running. The advantage of running servers on a
dedicated computer is security. For this reason most of the servers are daemon processes and designed
in such a way that they can be run on specific computer. Servers operate within a client-server
architecture. Servers are computer programs running to serve the requests of other programs, the
clients. Thus, the server performs some tasks on behalf of clients. It facilitates the clients to share data,
information or any hardware and software resources. The clients typically connect to the server
through the network but may run on the same computer. In the context of Internet Protocol (IP)
networking, a server is a program that operates as a socket listener.
Servers often provide essential services across a network, either to private users inside a large
organization or to public users via the Internet. Typical computing servers are database server, file
server, mail server, print server, web server, gaming server, and application server.
Numerous systems use this client server networking model including Web sites and email services. An
alternative model, peer-to-peer networking enables all computers to act as either a server or client as
needed.
IBM Blade Center S Server
IBM X3500 Series Server
Fig 3.4: SERVERS
3.3 Safety and Security:
For Safety and Security Data Center Install Fire Protection System which Includes, Smoke detectors
are usually installed to provide early warning of a fire at its incipient stage. This allows investigation,
interruption of power, and manual fire suppression using hand held fire extinguishers before the fire
grows to a large size. An active fire protection system, such as a fire sprinkler system or a clean agent
fire suppression gaseous system is often provided to control a full scale fire if it develops. High
sensitivity smoke detectors, such as Aspirating smoke detectors, activating clean agent fire
suppression gaseous systems activate earlier than fire sprinklers. However, as gaseous systems have a
limited fire suppression agent storage quantity, the provision of a clean agent system and a sprinkler
system protects the building should the fire reignite after the gaseous agent has dispersed.
Fig 3.5 Smoke Detectors
Fire Resistant Tiles, Fire retardant Doors and Glasses, Fire Alarms, Water Leak Detection , Pest
Replient etc are installed in Data Center.
For Physical Security Manned Security Guards should be present in the Data Center
Premises 24 * 7.Acces Cards should be made based on user authentication. Biometrics Scan can also
be installed for added security. Surveillance Cameras with Digital video recording facility should be
installed inside the premises with remote access to security chamber using a pc.
3.4 Disaster Management:
Disasters can be classified into two broad categories. The first is natural disasters such as floods,
hurricanes, tornadoes or earthquakes. While preventing a natural disaster is very difficult, risk
management measures such as avoiding disaster-prone situations and good planning can help. The
second category is manmade disasters, such as hazardous material spills, infrastructure failure, bio-
terrorism, and disastrous IT bugs or failed change implementations. In these instances, surveillance,
testing and mitigation planning are invaluable. IT disaster recovery control measures can be classified
into the following three types:
1. Preventive measures - Controls aimed at preventing an event from occurring.
2. Detective measures - Controls aimed at detecting or discovering unwanted events.
3. Corrective measures - Controls aimed at correcting or restoring the system after a disaster or an
event.
3.5 Backup and storage
In information technology, a backup, or the process of backing up, refers to the copying and
archiving of computer data so it may be used to restore the original after a data loss event.
Backups have two distinct purposes. The primary purpose is to recover data after its loss, be it by
data deletion or corruption. Data loss can be a common experience of computer users the
secondary purpose of backups is to recover data from an earlier time, according to a user-
defined data retention policy, typically configured within a backup application for how long copies
of data are required. Before data are sent to their storage locations, they are selected, extracted,
and manipulated. The data has to be stored on some data storage medium. Some of them are -
Magnetic tape , Hard disk, Optical storage, Solid state storage (Pen Drive),Cloud data Backup etc.
3.6 Cooling:
Air conditioning is the process of altering the properties of air (primarily temperature and humidity) to
more favorable conditions. More generally, air conditioning can refer to any form of technological
cooling, heating ventilation, or disinfection that modifies the condition of air.
Refrigeration air-conditioning equipment usually reduces the absolute humidity of the air processed by
the system. The relatively cold (below the dew point) evaporator coil condenses water vapor from the
processed air (much like an ice-cold drink will condense water on the outside of a glass), sending the
water to a drain and removing water vapor from the cooled space and lowering the relative humidity in
the room. Since humans perspire to provide natural cooling by the evaporation of perspiration from the
skin, drier air (up to a point) improves the comfort provided. The comfort air conditioner is designed
to create a 40% to 60% relative humidity in the occupied space. In food-retailing establishments, large
open chiller cabinets act as highly effective air dehumidifying units. Following points should be
considered for cooling-
a. Hot aisle and cool aisle to be kept separate.
b. Size of the Air openings should be enough for cooling.
c. Structured Cabling should be done in racks so that Air can flow to and fro the racks.
Fig 3.6 Cooling System In Data Center
3.7 Power:
Electrical infrastructure design is focused on designing electrical configurations that accommodate
various reliability requirements and data center sizes. Aspects may include utility service planning;
distribution, switching and bypass from power sources; uninterruptable power source (UPS) systems;
and more.
These designs should dovetail to energy standards and best practices while also meeting business
objectives. Electrical configurations should be optimized and operationally compatible with the data
center user’s capabilities. Modern electrical design is modular and scalable, and is available for low
and medium voltage requirements as well as DC (direct current).
UPS BATTERY BANK
GENERATOR
Fig 3.7: Power Backup Devices
3.8 Conclusion:
A data center has been configured in Topcem Cement keeping all the above steps in mind. The Data
Center consists of Nine Servers, Seven Network Switches, Three Routers, Four types of Links for
Data Communication and Internet. Cooling and Power backup is also implemented within the Data
Center. Fire Extinguishers and Door Access card system implemented in the data center for Safety and
Security. Daily Backup Scheduled and storage is also configured as NAS (Network Access
Storage)and also cloud storage implemented for any Disaster. The whole Data Center works on
primary and secondary methodology i.e. when primary fails than secondary starts working
automatically. This process is also called failover.
Fig:3.8 Simple Data Center Connectivity Diagram
CHAPTER 4
DATA CENTRE DESIGN
4.1 Top of Rack Design
4.2 End of Row Design
4.3 Middle of Row Design
4.4 Fabric Extender Design
4.5 Designed in Topcem Cement Ltd.
DATA CENTER DESIGN
Designing a Data Center is a crucial task it should be design in a very clear way so that it becomes
easy to find out which server is connected to which network devices and vice versa .Design should be
in such way so that cooling can be done easily and spacious so that movement can be done easily
inside the Data Center. There are few steps in which Rack are designed.
4.1Top of Rack Design:
In the Top of Rack design servers connect to one or two Ethernet switches installed inside the rack.
The term “top of rack” has been coined for the design however the actual physical location of the
switch does not necessarily need to be at the top of the rack. Other switch locations could be bottom of
the rack or middle of rack, however top of the rack is most common due to easier accessibility and
cleaner cable management. This design may also sometimes be referred to as “In-Rack”. The Ethernet
top of rack switch is typically low profile (1RU-2RU) and fixed configuration. The key characteristic
and appeal of the Top of Rack design is that all copper cabling for servers stays within the rack as
relatively short RJ45 patch cables from the server to the rack switch. The Ethernet switch links the
rack to the data center network with fiber running directly from the rack to a common aggregation area
connecting to redundant “Distribution” or “Aggregation” high density modular Ethernet switches.
Each rack is connected to the data center with fiber. Therefore, there is no need for a bulky and
expensive infrastructure of copper cabling running between racks and throughout the data center.
Large amounts of copper cabling places an additional burden on data center facilities as bulky copper
cable can be difficult to route, can obstruct airflow, and generally requires more racks and
infrastructure dedicated to just patching and cable management. Long runs of twisted pair copper
cabling can also place limitations on server access speeds and network technology. The Top of Rack
data center design avoids these issues as there is no need to for a large copper cabling infrastructure.
Each rack can be treated and managed like an individual and modular unit within the data center. It is
very easy change out or up-grade the server access technology rack-by-rack. Any network upgrades or
issues with the rack switches will generally only affect the servers within that rack, not an entire row
of servers. Given that the server connects with very short copper cables within the rack, there is more
flexibility and options in terms of what that cable is and how fast of a connection it can support. Fiber
to each rack provides much better flexibility and investment protection than copper because of the
unique ability of fiber to carry higher bandwidth signals at longer distances.
Fig 4.1: Top of Rack Design
4.2 End of Row Design:
Server cabinets (or racks) are typically lined up side by side in a row. Each row might contain, for
example, 12 server cabinets. The term “End of Row” was coined to describe a rack or cabinet placed
at either end of the “server row” for the purpose of providing network connectivity to the servers
within that row. Each server cabinet in this design has a bundle of twisted pair copper cabling
(typically Category 6 or 6A) containing as many as 48 (or more) individual cables routed to the “End
of Row”. The “End of Row” network racks may not necessarily be located at the end of each actual
row. There may be designs where a handful of network racks are placed in a small row of their own
collectively providing “End of Row” copper connectivity to more than one row of servers.
For a redundant design there might be two bundles of copper to each rack, each running to opposite
“End of Row” network racks. Within the server cabinet the bundle of copper is typically wired to one
or more patch panels fixed to the top of the cabinet. The individual servers use a relatively short RJ45
copper patch cable to connect from the server to the patch panel in the rack. The bundle of copper
from each rack can be routed through over head cable troughs or “ladder racks” that carry the dense
copper bundles to the “End of Row” network racks. Copper bundles can also be routed underneath a
raised floor, at the expense of obstructing cool air flow. Depending on how much copper is required, it
is common to have a rack dedicated to patching all of the copper cable adjacent to the rack that
contains the “End of Row” network switch. Therefore, there might be two network racks at each end
of the row, one for patching, and one for the network switch itself. Again, an RJ45 patch cable is used
to link a port on the network switch to a corresponding patch panel port that establishes the link to the
server. The large quantity of RJ45 patch cables at the End of Row can cause a cable management
problem and without careful planning can quickly result in an ugly unmanageable mess.
Fig 4.2: End of Row Design
4.3 Middle of Row Design:
Middle of Row Design routes the copper cable from each server rack to a pair of racks positioned next
to each other in the middle of the row. This approach reduces the extreme cable lengths from the far
end server cabinets, however potentially exposes the entire row to a localized disaster at the “Middle
of Row” (such as leaking water from the ceiling) that might disrupt both server access switches at the
same time.
Fig 4.3: Middle of Row Design
4.4 Fabric Extender Design:
The fabric extender is a new data center design concept that allows the for the “Top of Rack”
placement of server access ports as a Layer 1 extension of an upstream master switch. Very fewer
switches to manage and fewer ports required in the aggregation area. Racks connected at Layer 1 via
fiber, extending Layer 1 copper to server’s in-rack. Unique control plane per hundreds of ports, lower
skill set required for replacement. Copper stays “In Rack”. No large copper cabling infrastructure
required. Lower cabling costs. Fewer infrastructures dedicated to cabling and patching. Cleaner cable
management, Modular and flexible “per rack” architecture. Easy “per rack” upgrades/changes. Short
copper cabling to servers allows for low power, low cost.
Fig 4.4 Fabric Extender Design
4.5 Designed in Topcem Cement Ltd:
In Topcem Cement we have used Fabric Extender Design. Here Copper cables are connected to a
switch from a Master Switch. Servers and Clients are connected to switch in which a cable is
connected to the Master Switch.
Fig 4.5: Design in Topcem Cement Ltd.
CHAPTER 5
SECURITY & DISASTER MANAGEMENT
5.1 Physical Security
5.2 Data Security
5.3 Disaster Management
SECURITY & DISASTER MANAGEMENT
The data center security measure to some extent reaches the same level as that of the any big private
corporate house would have installed under its scope. Safety and security of a data center is very much
important as the centre consist of various costly devices as well as data of an organization.
5.1 Physical Security:
A data Center should have facility like proper security system to be built that could cope with any
adverse situation which might occur like fire fighting equipments, proper ventilation in order to
remove smoke, authorized access, surveillance through video camera and even alarms in case of fire.
The points which has been taken for Security are –
a) The first and the most initial step that is taken is to restrict the access of data centers to only limited authorized person who must possess and show photo ID proof at entry point.
b) There is properly trained staff personal and security personnel present each hour of the day.
c) Even if someone enters the premises, there is proper biometric access installed to restrict such unauthorized access by such individual in server rooms.
d) There is constant surveillance through closed circuit camera or CCTV on each and every activity of the person in and outside the premises.
e) There exist a fool proof fire detection mechanism for early detection of fire and appropriate measure to be taken in such a situation.
f) If possible there should be check points installed at intervals in highly confidential areas.
g) An intruder revealing system is placed so that alarms and alerts are immediately sent to the higher authority and appropriate measures can be taken.
5.2 Data Security:
Data Security has become increasingly important in the age of hackers and viruses. Data of an
organization is very important it should be kept safe so that it does not falls in wrong hand. Data
transfer take place in encrypted form so that it cannot be decoded by any third party. Only the
authorized persons have access to servers, Network Equipments and storage for data transfer.
Authorized persons have their own Username and Password to login to devices. Any external storage
devices access is blocked in the system it can be opened only after proper approval from management.
5.3 Disaster Management
Disasters can be classified into two broad categories. The first is natural disasters such as floods,
hurricanes, tornadoes or earthquakes. While preventing a natural disaster is very difficult, risk
management measures such as avoiding disaster-prone situations and good planning can help. The
second category is manmade disasters, such as hazardous material spills, infrastructure failure, bio-
terrorism, and disastrous IT bugs or failed change implementations. In these instances, surveillance,
testing and mitigation planning are invaluable. Steps taken to prevent Disaster –
a) Primary and Secondary methodology has been used for uninterrupted work. Secondary
infrastructure has been placed in different location. A replica of primary has been made the
secondary infrastructure. Failover has been mapped so that if primary fails secondary gets live
automatically with any interruption.
b) Daily Data Backup has been scheduled. Data is kept on NAS and also in Cloud storage so that
in case of Disaster Data remains intact.
c) Hardware log is being monitored regularly so that any hardware failure can be detected easily
and it can be replaced. Regular firmware update is also checked to upgrade the hardware
firmware.
d) Tape Drives in which data is stored is kept in fire proof and dust free lockers.
CHAPTER 6
TESTING AND DEBUGGING
6.1 System Testing
6.2 Debugging
6.3 Training according to Job Profile.
6.4 Implementation
TESTING AND DEBUGGING
A system should always be tested thoroughly before implementing it, as regarded its individual
programs, the system as a whole, user acceptance etc. this is because implementing a new system is a
major job, which requires lot of man power, time and lot of resources(IT assets).So an error not
detected before implementation may cost a lot. Effective testing early in the process translates directly
into long term cost savings from reduced number of errors. This is also necessary because in some
cases, a small error not detected and corrected before installation may explode into much larger
problem.
Testing and Debugging is followed by the stage of installing the new computer based
system. Actual Implementation of the system can began at this point using either parallel or direct
change over plan, or some blend of the two.
6.1 System Testing:
After a successful testing of individual devices and Links ,the new system run through a series of test
to ensure the working of the system as a whole .The objective of testing the entire system is to verify
that it meet all the Data center specification .Testing in all field from Network Links ,Server working
ability, Power, Cooling, Security, Data Backup, Failover and disaster management is done successful.
6.2 Debugging:
Debugging Occurs as a consequence of successful testing. That is, when a test case uncovers an error,
debugging can should be an orderly process that results in the removal of the error .Although
debugging can should be an orderly process, it is still very much an art. The debugging process will
always have one of the two outcomes –
a) The bug will be found, corrected and removed or
b) The bug will not be found if there is no error.
The Devices and the process were tested thoroughly before
implementation and when errors were found they were corrected and removed.
6.3 Training according to Job Profile :
Training is an important aspect to be taken into account before implementing a system for the proper
functioning and utilization of the system. The extent of the training and education to be provided to the
user depends upon the complexity of the system and there scope of work.viz. –
Server Training-Given to Server Administrators how to troubleshoot Data Backup, Disaster
Management etc.
Network Training- Given to Network Engineer how to troubleshoot.
AC Engineer –Given training for cooling and maintain the temperature.
Electrician- Given Training to manage power required.
Safety and Security- Security personal are trained about the Data Center Security and Training given
to meet any adverse situation like fire etc.
6.4 Implementation:
A crucial phase in the system life cycle is the successful implementation of the new system Design
into operational one.
After through testing and training of the different aspect of the system as described above the Data
Center is made live.
CHAPTER 7
DIAGRAMATIC REPRESENTATION
7.1 Network Connectivity Diagram in Topcem
7.2 Server Connectivity with Network Diagram in Topcem
DIAGRAMATIC REPRESENTATION
Here we will show how the IT Devices in Data Center is being connected.
7.1 Network connectivity Diagram:
Router1 Router2
LAN
Firewall
PLANTS MSW1 Branch Offices
Office
Fig 7.1: Network Connectivity
7.2 Server connectivity with Network Diagram:
SRV2 SRV1 SRV3
Fig 7.2: Server Connectivity with Network
STORAGE STORAGE
CHAPTER 8
CONCLUSION
CONCLUSION
The Data Center is made to make IT centralized and easy for users of Topcem Cement as far as
possible. The system provides scope for further enhancement depending upon user’s requirement.
Even though the system satisfies requirements still more and more additional work can be carried out.
Finally it can be concluded that the overall Data Center Management process in Topcem is
implemented successfully. The IT process has been centralized and user problem are resolved as soon
as they logged a call for complaint.
BIBLIOGRAPHY
BOOKS
1. Kothari C. R. (2009), Data Center Infrastructure Management
2. Journal Digit.
WEBSITES
1. http://www.slideshare.com
2. http://webhostingindiainfo.blogspot.in
3. http://www.topcem.in