You are on page 1of 14

4/29/2016

Modern Data
Center Design
Week 15

Daniel Howell
[COMPANY NAME]

Table of Contents
Section 1: Introduction .................................................................................................................................. 3
Section 2: Data Center Design ...................................................................................................................... 3
2.1: Location ............................................................................................................................................. 3
2.2: Size .................................................................................................................................................... 5
2.3: Construction ....................................................................................................................................... 5
2.4: Power ................................................................................................................................................. 5
2.5: Floor layout ........................................................................................................................................ 5
2.6: Server Arrangement........................................................................................................................... 6
2.6: Climate Control................................................................................................................................. 6
Section 3: Hardware ...................................................................................................................................... 7
3.1: Servers ............................................................................................................................................... 7
3.2: Workstation........................................................................................................................................ 7
3.3: Other Devices ..................................................................................................................................... 7
Section 4: Software ....................................................................................................................................... 7
4.1: Operating Systems ............................................................................................................................. 7
4.2: Other Software ................................................................................................................................... 7
Section 5: Business Continuity and Disaster Recovery ................................................................................ 7
5.1: Disaster Recovery Plan ...................................................................................................................... 7
5.2: Fire Suppression ................................................................................................................................ 7
5.3: Backup Systems ................................................................................................................................. 7
5.3.1: Hot Site........................................................................................................................................ 7
5.3.2: Cold Site ...................................................................................................................................... 8
5.3.3: Data Backup ................................................................................................................................ 8
5.3.4: Backup Power ............................................................................................................................. 8
Section 6: Security ........................................................................................................................................ 8
6.1: Physical .............................................................................................................................................. 8
6.1.1: Man Traps ................................................................................................................................... 8
6.1.2: Locks............................................................................................................................................ 9
6.1.3: Guards ......................................................................................................................................... 9
6.1.4: Camera and Sensors.................................................................................................................... 9
6.1.5: Nature Security ........................................................................................................................... 9
6.2: Logical ............................................................................................................................................... 9

6.2.1: Firewalls ...................................................................................................................................... 9


6.2.2: Monitory ................................................................................................................................... 10
Section 7: Cost ............................................................................................................................................ 10
Appendix A ................................................................................................................................................. 10
Appendix B .................................................................................................................................................. 11
Appendix C .................................................................................................................................................. 12
Appendix D .................................................................................................................................................. 12
Reference .................................................................................................................................................... 12

Section 1: Introduction
This document gives a detailed write on the data center that was designed by Gunner Howell.
This document covers the data center design aspects, hardware usage, software usages, business
continuity, security, and expense. Each of these topics has a number of subtopics that cover all
aspects of the data center.
The data cent is located in an abandoned mining facility in Wyoming. The facility has a small
complex on the surface and a massive network of underground tunnels. The tunnels well be used
to house the data center. The facility well only require miner renovations to make it possible. It is
all structurally sound and has power systems in place that just need to be modified to
accommodate the new systems being installed.
As far as hardware the of the data center is concerned the data center is home to 1,500 servers
and various devices. It also is capable of holding 1,500 terabytes of stored data. The data center
also has a hot and cold site it operates with the same type of equipment.
The facility has backup systems for everything as that could happen from data loss to power
outages. There are also a number of systems that have been installed in order to protect the
facility and keep it running. There is nothing that can bring this system down.
The facility also has high quality security to insure the protection of the clients data. Thanks to a
combination of physical and logical security measures we can guarantee security for the clients
who are using our data center. The physical security measures include man traps, locks, guards,
cameras/sensors, and nature itself. Nothing gets in or out without use knowing about it.
Finally, we cover what it would cost to create this data center. The final price is just an estimate
and cannot be guaranteed to be the exact amount. The appendix at the end is shows the rough
layout and planning of the data center.
Section 2: Data Center Design
The Gunner Data Center design is to provide high levels support and reliability for its users. In
order to achieve and maintain this standard we have created a data center that is the pinnacle of
efficiency. Section 2.1 outlines details about the location. It also includes the reasons why this
location was chosen over other possible location. Section 2.2 outlines the overall size of the
facility showing that there is plenty of room for growth. Section 2.3 outlines the construction of
the facility. It also include the renovation that well need to be made to the existing structures on
site. Section 2.4 outlines the power needs of the facility and the different methods of maintaining
power at all times. Section 2.5 outlines the floor lay out of the different levels in the data center.
This also included the office space required for the staff. Section 2.6 outlines the climate control
systems required for the facility. All figures include in the section are associated with a Visio
diagram included with this document.
2.1: Location
In the mountains of Wyoming just outside of Evanston there is an abandoned mining facility.
Figure 1 shows an aerial view of the facility. The area is mostly empty open space. The facility
currently has three usable building but more can be built with easy. The climate of the area is

usually cool. Even in the summer the outside temperature rarely gets above 95 degrees
Fahrenheit. The true value of this facility lies not in the open space on top rather the tunnel that
run underground.
Figure 1: Current Location

Figure 2 shows a diagram of the facility. The underground facility is comprised of a series of
tunnels and side rooms. The facility is large enough to house the data center and account for
expansion for the foreseeable future. The tunnel system is structurally sound and already built.
Many other amazing features are include with the tunnels. The cost saving of this feature is
addressed in section 7 of the document. The specific details of the facilities size is covered in the
next section, section 2.2.
Figure 2: Underground facility

2.2: Size
Figure 2 shows a diagram of the massive tunnels that run deep under the facility. Miles of tunnel
that are twenty feet high and thirty feet wide. There are side areas along the tunnels that are twice
as big as the tunnels themselves. The underground facility is made up of four level. Each level of
the facility is roughly the same size. The levels are around 300 yards long and 200 yards wide at
some points. The tunnel systems are 100 yard underground at their deepest point. The current
configuration of the data center is well not take up that much of the space that is provided. The
extra space is to account for future expansion.
2.3: Construction
The construction requirements for this data center are remarkably low. The buildings that are on
site are not that old and still up to the states build standards. The tunnels are all structurally
sound. Miner renovations are required in order to make accommodation for the cables that need
to be run. The tunnels are large enough that overhead racks for the cable can be installed easily.
Electrical wiring is already running through the tunnel making accommodation for powering the
servers and lights simple. The cost of the renovations is covered in section 7 of this document.
2.4: Power
The data center is connected to the main power line from a power nearby power plant but it does
have a number of onsite systems to provide power. Do to the large amount of open land around
the top of the data center solar panels and wind turbines have been installed to help supplement
the power being received by the power plant. Included in the power systems is a series of
electrical generators. There are six Cummins QSK 95 diesel generator that are used to power the
facility. Referrer to section 5.3 for backup power details.
2.5: Floor layout
Each level of the facility is dedicated to a specific aspects. The following is a list of the level and
the aspects that are assigned to them. Each level also has its own dedicated hardware to address
issues that may arise. For details on the specific arrangement of the servers see section 2.6.
Appendix A shows the level one systems.
The first level of the facility is the monitoring center for the whole facility. It also serves as an
operations center for the facility. It houses the backup systems for the facility. The backup
systems are covered in section 5.3 of this document.
The second level of the facility houses the first level of servers. The servers on this level are
dedicated to data storage. This floor store the data from the center monitoring programs as well
as all company information. This floor also store data from the clients on multiple racks of high
density servers. Details on the servers are covered in section 3.1.
The third level of the facility houses the second level of servers. These servers are dedicated to
data processing. We allow our client to use our systems to process data and host virtualized
systems. The servers are arranged in multiple high density racks.
The fourth level of the facility is mostly empty at this time. This level is going to be used as an
expansion level for the facility. Until it is needed this level is closed off and restricted.

2.6: Server Arrangement


The servers are arranged in side rooms that are isolated from the rested of the open environment.
The server systems are made up of racks of high density blade servers. For hardware details on
the servers see section 3. For software details on the servers see section 4. The servers are in
cages to restrict access to the serves. The rooms that contain the servers are sealed environments.
The servers are arranged the same on every level to insure easy remembering. Each server room
has a mix of 2U and 1U servers to cover the needed requirement of that level of the facility. For
details on the operations of each level of the facility see section 2.5.
The first level of the facility has twenty five 2U servers and twenty five 1U servers to meet their
requirements. They are also given fifty terabytes of upper tier storage.
The second level of the facility has 361 2U serves along with 361 1U servers and 300 terabytes
of upper and lower tier storage.
The third level of the facility has 361 2U serves along with 361 1U servers and 300 terabytes of
upper and lower tier storage.
The fourth level has nothing in it at this time.

Figure 3: Server Arrangements

2.6: Climate Control


This data center has a number of climate control measures in place to insure a constantly cool
temperature. A combination of natural occurring cooling, mineral oil systems, and air
conditioning systems.
Underground the temperature drops to a constant 75 degree. This provides a natural cooling
effect for the system allowing the coolers to operate at a lower capacity.
The servers that specialize in data processing are equip with a liquid cooling system. We use
mineral oil in the system to prevent a short if the hose leaks. The cooling system cycles the oil
through the machines and back into the rooms with the cooling systems in order to cool it back
down.

As seen in figure 3 the server room are set up in isolate rooms with vents pulling out warm air
and pumping in cool air from cooling rooms in between the server rooms. The warm air is
pumped into the exhausts systems while air coolers pump cool the air and pump it into the room
from the floor.
Section 3: Hardware
This section outlines the different types of hardware that were used in the data center.
3.1: Servers

3.2: Workstation

3.3: Other Devices


Section 4: Software
4.1: Operating Systems
4.2: Other Software
Section 5: Business Continuity and Disaster Recovery
5.1: Disaster Recovery Plan
5.2: Fire Suppression
The FM-200 gas powered fire suppression system is used in this underground facility. Water
systems run the risk of damaging everything on the floor below as well as on the floor itself.
While we do not need to worry about the facility burning down a fire would still be a risk. Since
the facility is almost completely sealed a fire puts everyone inside the facility at risk because of
the smoke. We have a specially modified FM-200 fire suppression system that runs throughout
the facility. Sensor around each of the server rooms can detect a fire and seal the room. Once
sealed only the areas that were on fire are hit with the gas. Once the flame is out assessment
teams can assess the damages.
5.3: Backup Systems
One of the main concerns of the data center is redundancy. We have backup plans in place that
well allow the data center to run with no down time in any event. The following section outline
the different back systems that are in the data center.
5.3.1: Hot Site
The region has many abandoned mining facilities that can be used. We have remodeled a small
facility that can be used as a hot site in the event of a disaster. The facility is not as big as the

primary site but it is big enough for a small set of servers and back up devices. The site can be
kept operational year round and it is close enough to the main facility it would only take 10
minutes to get there.
5.3.2: Cold Site
The cold site if mostly for the office worker on the top. It has copies of important documents as
well as a detailed outline of the disaster recovery plan. The cold site is located in the same place
as the hot site. It is close by and ready to be used if needed.
5.3.3: Data Backup
The facility has a total storage capacity of about 1,500 terabytes of data. While that much data is
not being used all the time it is important to have backup systems. All data is backed up on to XIO storage technology. The stored data transferred to tapped and transported to a storage facility.
5.3.4: Backup Power
We use backup generators and batteries to compensate the electrical system in the event of a
power outage.
Section 6: Security
We use combination of physical and logical security to protect our clients information. High
quality security is all part of offering high quality services.
6.1: Physical
The physical security of the network is broken up into five areas of coverage. Man trap, locks,
guards, camera/sensors, and natural security.
6.1.1: Man Traps
There is a man trap at the entrance of each level in the facility. The man trap is a turnstile that
well only move if an individual has the approved smart card. There is also guards at each
entrance to insure no one cheats the systems. Figure shows the man trap that is at each entrance.

Figure : Man Trap

6.1.2: Locks
We used a combination of biometric and smart card locks that are supplied by Smart Card
Alliance. One would need to have the correct biometric signature and approved smart card in
order to gain access to a restricted area.
6.1.3: Guards
There is a team of guards on duty at the facility at all times. The Guards are there to prevent
anyone from trying to fool the technology in the other security measures.
6.1.4: Camera and Sensors
Camera and sensors are scattered around the facility both above and below ground. There a
cameras in plain site as well as hidden cameras watching the blind spots of the seen cameras. All
the cameras are monitored by a security team and a monitoring program. For more details on the
monitoring programs see section 6.2.2.
6.1.5: Nature Security
With the main facility of the data center being deep underground there are only a few points of
entry. Five feet solid stone makes for a great wall, roof, and floor.
6.2: Logical
We employee multiple forms of logical security measures. These measures include physical
firewall devices and virtual firewall. We also use monitoring programs to track all the traffic of
the network but internal and external.
6.2.1: Firewalls
We use an Apolo Alto firewall which allows us to monitor the traffic as well as set rules and
restrictions to prevent the unauthorized access. Figure shows our fire wall and monitoring system
that is tracking all traffic in and out of the data center. We also use a checkpoint system to insure
that our firewalls area always up and logging traffic.

Figure : Firewall

6.2.2: Monitory
Section 7: Cost
Appendix A
Page 1 of Visio diagram

Appendix B
Page 2 of Visio diagram

Appendix C
Page 3 of Visio diagram

Appendix D
Page 4 of Visio diagram
Level four is empty at this time.
Reference
http://www.techrepublic.com/pictures/the-10-most-unique-data-centers-in-the-world/
http://www.zdnet.com/article/the-abandoned-mine-thats-being-transformed-into-a-datacenter/
http://www.techrepublic.com/article/what-to-look-for-in-a-data-center-backup-generator/

http://xiostorage.com/
http://www.smartcardalliance.org/publications-smart-cards-and-biometrics/

You might also like