Professional Documents
Culture Documents
بس
• Co-Location/Hosting (Public):
Owned and operated by Telco’s or service providers.
Center interconnectivity.
• Notice that all the segments supporting the server farm connect
to access layer switches, which in a multitier architecture are
different access switches supporting the various server
functions.
• The server farm services and their users rely on the use of web
interfaces and web browsers, which makes them pervasive on
Internet environments.
• The Data Center that supports this type of server farm is often
referred to as an Internet Data Center (IDC).
• Layer 2 features support the Layer 2 adjacency between the server farms
and the service devices virtual local area network (VLANs),Media Access
Control (MAC), Spanning Tree Protocol (STP).
OSI Model
VLAN
• A VLAN is a group of devices on one or more LANs that are configured
to communicate as if they were attached to the same wire, when in fact
they are located on a number of different LAN segments.
Spanning Tree Protocol (STP)
• Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on
bridges and switches.
• The main purpose of STP is to ensure that you do not create loops
when you have redundant paths in your network.
Intrusion Detection
System
Security Services
• Access control lists
An access control list (ACL), with respect to a computer file system, is a list
of permissions attached to an object. An ACL specifies which users or
system processes are granted access to objects , as well as what
operations are allowed on given objects.
ACLs filter packets. Packet filtering through ACLs can prevent unwanted
access to network infrastructure devices.
• Firewalls
A firewall is a system designed to prevent unauthorized access to or from a
private network. Firewalls can be implemented in both hardware and
software, or a combination of both.
Security Services
• Secure management
– Simple Network Management Protocol (SNMP)
it is a standard way of monitoring hardware and software
• Provide Read/Write abilities configure IP addresses
• Collect information on how much bandwidth is being used
• devices can send alerts to a monitoring station on error conditions
– Secure shall (SSH)
sometimes known as Secure Socket Shell, is a UNIX-based command
interface and protocol for securely getting access to a remote
computer. It is widely used by network administrators to control Web
and other kinds of servers remotely.
– authentication authorization and accounting (AAA)
The transactions of all authorized and authenticated users are
logged for accounting purposes, for billing, or for postmortem analysis
Storage Services
• Storage
– storage is the place where data is held in an electromagnetic or optical
form for access by a computer processor
• Storage services include the capability of consolidating direct attached
disks by using disk arrays that are connected to the network.
• SAN(storage area network) is a high-speed network of storage devices
that also connects those storage devices with servers. It provides block-
level storage that can be accessed by the applications running on any
networked servers.
• Types of managed storage
• locally managed storage
Advantages of this type of storage include a high-speed access to data and greater
control over data availability. A disadvantage is that additional space is required at local
site
to store the data
• remotely managed storage
Advantages of this type of storageare that it may be used an off site backup, it offers global
access (depending upon configuration) and adding storage will not require
additionalspace
at the local site. However, if the network providing connectivity to the remote data is
interrupted, there will be data availability issues, unless distributed file systems are in
use.
Cost:
.
Description Material cost Labor cost Total cost
Total 45,50,000/-
Thank you for giving your precious time.