AUDIENCE
This document can be used as a reference by people who are working in the various aspects of the data center. Some knowledge in the subject of Cloud computing is required to understand this document. Additional knowledge of Networking and Securities in computer devices can be really helpful. This document will describe the various topologies of data centers and also how to secure data centers. It also includes the important features of data centers like resiliency and expansion.
Page | 2
Table of Contents
Table of Contents…………………………………………………………………………………………………….3 Table of Figures ………………………………………………………………………………………………………4 Introduction …………………………………………………………………………………………………………..5 Chapter-1 ………………………………………………………………………………………………………………6 Data Center Topology ………………………………………………………………………………………………6
1.2 Data Center Networks …………………………………………………………………………………………….8
1.3 Switch Locations …………………………………………………………………………………………………….9
1.7 Data Center Network Requirements…………………………………………………………………………13
Chapter-2 …………………………………………………………………………………………………………….14 Data Center Resiliency ……………………………………………………………………………………………14
2.1 What is resiliency?………………………………………………………………………………………………..14
2.2 Achieving a Resilient Data Center…………………………………………………………………………….15
Chapter-3 …………………………………………………………………………………………………………….19 Data Center Security………………………………………………………………………………………………19
3.1 Security Measures ………………………………………………………………………………………………..19
3.2 Data Center Security Standards……………………………………………………………………………….22
Chapter-4 …………………………………………………………………………………………………………….24 Data Center Expansion……………………………………………………………………………………………24
4.1 Why scale? ………………………………………………………………………………………………………….24
4.2 How does it work?………………………………………………………………………………………………..24
4.3 Benefits of Expansion ……………………………………………………………………………………………25
Conclusion …………………………………………………………………………………………………………… 27 References……………………………………………………………………………………………………………28 Acronyms …………………………………………………………………………………………………………….29
Page | 3
Table of Figures
1.1 Enterprise Data Center Network with Internet and Intranet Server Farms 6 1.2 Core, Aggregation, Access 7 1.3 Top-of-Rack 8 1.4 End-of-Row 9 1.5 Hierarchical Network Design 10 1.6 Core Aggregation Connection 11
Page | 4
Introduction
This paper discusses a crucial part of the cloud computing and data centers that are used to store and process data. The various topics covered in this paper are arranged in the following way.
Chapter 1: It describes the different topologies of the data centers.
• Section 1.1 gives an overview of the different types of data centers.
• Section 1.2 data center network is shown.
• Section 1.3 describes types of switch location.
• Section 1.4 contains information about hierarchical network design.
• Section 1.5 details of core, aggregation and connection are given.
• Section 1.6 Data center networking issue are described, and the last topic of this
chapter is about basic data center networking requirements.
Chapter 2: This chapter describes resiliency of the data center.
• Section 2.1 the definition of resiliency is discussed.
• Section 2.2 shows how to achieve resiliency in the data center.
Chapter 3: This chapter is about security of the data center.
• Section 3.1 Some security measures are discussed.
• Section 3.2 Describes the data center security standards.
Chapter 4: It is about the expansion of data center.
• Section 4.1 gives the introduction about scaling.
• Section 4.2 shows how does expansion work in data center.
• Section 4.3 benefits of expansion are listed.
Page | 5
Chapter-1
Data Center Topology
1.1 Overview
Due to various responsibilities and key function a typical large enterprise network often consists of more than one data center. Generally, these data centers can be classified into three types:
o Internet
The Internet data center is used by external clients connecting from the Internet. It supports the servers and devices required for business-to-consumer (B2C) transaction-based web portals.
o Extranet
The extranet server farm offers help and administrations for outer, business-to-business (B2B) accomplice exchanges. These administrations are frequently gotten to over secure VPN associations or private WAN connections between the accomplice organize and the endeavor extranet.
o Intranet
The intranet server farm houses applications and administrations got to by customers with availability to the inward endeavor organize. The applications and administrations housed in the intranet server farm frequently bolster capacities for assembling, promoting, HR, innovative work, finance, and other center business administrations.
Page | 6
Figure 1.1 shows a common design for enterprise data centers. As illustrated, business transactions from the service providers (ISP1 and ISP2) enter the intranet server farm through a set of firewalls. These transactions might require load balancing to the DMZ servers to the presentation tier of the business-to-consumer (B2C) applications. The DMZ servers also include DNS servers and SMTP servers and they can equally benefit from the network load balancing.
Figure 1.1: Enterprise Data Center Network with Internet and Intranet Server Farms
The B2C servers can be double homed utilizing two NICs, with people in general NIC utilized for exchange trade and the private NIC used to speak with the application as well as the database servers. Figure 1.1 does not delineate the application and database servers. The figure indicates just that the back-end NIC gives the intranet servers network to the server
Page | 7
farm center through a couple of firewalls. Figure 1.1 demonstrates the intermediary servers, which furnish grounds organize clients with network to the Internet. In the outline, the intranet server farm interfaces with the server farm center through repetitive Layer 3 joins. The server farm center rearranges network among the different server farm situations, for example, B2C, business-to-business (B2B), intranet server ranches, et cetera.
A few server farm executions totally confine the Internet servers from whatever remains of the system at the physical level. This implies a different arrangement of non-routable connections associate these servers straightforwardly to the intranet server farm with no physical way accessible to some other piece of the system.
1.2 Data Center Networks
Figure 1.2: Core, Aggregation, Access
Page | 8
In data center network, there are 20-24 servers for every rack. Every server is associated with 2 get to switches with 1 Gbps (10 Gbps getting to be noticeably normal). Access changes are associated with 2 collection switches. Conglomeration changes are associated with 2 center switches. Center switches are associated with edge switches. Collection layer is the progress point between L2-exchanged access layer and 13 steered center layers. Center switches oversee movement between total switches and in/out of server farm. All switches underneath each match of total switches frame a solitary layer-2 area. Each layer-2 space commonly restricted to a couple of hundred server to confine communicate. Most activity is inner to the server farm. Here system is the bottleneck. When all is said in done uplink usage