SlideShare une entreprise Scribd logo
1  sur  22
Chapter 11:
Data Centre Administration
Objectives
Data Centre Structure
 Data Centre Administration
 Data Centre Monitoring
 Virtualization
 Benefits of Virtual Infrastructure


1
Data Centre Structure

2
Major Data Centre Tasks


Infrastructure




Administration




Maintenance of services

Training






Continue expansion

Training the trainers
Staff training
Student training

External cooperation
3
Data Centre Infrastructure




Data Center for Administration, Management, and Technical support.
Backbone Networks (Access Network) In Main Campus.
Remote Network to connect campuses.

Network

Service
•
•

Provide service environment for O&M on Network and IT resources.
Provide technical support to users from different campuses.

•
•

Education Center : Provide education & training facilities for Users
Provide the communication network and Telecommunication System

•

Connection of Remote Node (campus) with necessary core Optic
fiber cables
install LAN to utilize applications at the Organization level.

•

Remote
Network

•

•

Backbone
Network
(OSP)

Data Center : Accommodate server farm & Application Hosting
Area.

•

IT Center

Provide central network services for all user of the network.

Central Node at the main Office (Campus)

•

Access/Remote Node (Campus) : District Office, Police Office, Real
Estate Registration Office, Vehicle Registration Office, Motorcycle
Registration office

•

Other Organization : Royal Palace, National Assembly,
International Airport, etc.

4
Data Centre Administration





Develop Applications by Upgrading & Customizing Applications
Software Distribution System (Virtualization)
Provide services
Maintenance and technical support
Item

Applications
Development
Hardware &
Software

Description
•

Upgrade and Customize existing applications

•

Interconnect several Applications

•

Develop integrated Web applications

•

Virtualization, and operating systems installations

•

Install Server, PC, Printer, and other peripheral devices

•

Provide
services

•

Install DBMS, Office Package, and other Application Program
Web services and

•

Develop Data Entry Program

Maintenance
and support

•

Upgrade PC and Server DBMS

•

Maintain and technical support for Application Program
5
Training programs
Program
User training

Advanced training

Content
• Introduction to PC’s
• Web and E-mail usage.
• Information sharing and
usage of IT recourses.
• Web authoring and
development
• System administration
• Database development
• Computer networking and
management

Target
Staff and students

Technical staff,
trainers and
administrative staff.

6
User - Application Monitoring

7
Network - Location Monitoring

8
Web Services Monitoring

9
Automated Share Administration

10
Virtualization

11
Virtualization


Virtualization is a proven software technology that is
rapidly transforming the IT landscape and
fundamentally changing the way that people compute.



Today’s powerful x86 computer hardware was originally
designed to run only a single operating system and a
single application, but virtualization breaks that bond,
making it possible to run multiple operating systems
and multiple applications on the same computer at the
same time, increasing the utilization and flexibility
of hardware.
12
How Virtualization works?


Virtualization lets you transform hardware into
software. Use software such as VMware to
transform or “virtualize” the hardware resources
of an x86-based computer—including the CPU,
RAM, hard disk and network controller—to create
a fully functional virtual machine that can run its
own operating system and applications just like a
“real” computer.
13
How Virtualization works?


Multiple virtual
machines share hardware
resources without
interfering with each other
so that you can safely run
several operating systems
and applications at the
same time on a single
computer.
14
What is a Virtual Machine?






A virtual machine is a tightly isolated
software container that can run its own
operating systems and applications as if it
were a physical computer. A virtual machine
behaves exactly like a physical computer and
contains it own virtual (ie, software-based)
CPU, RAM hard disk and network interface
card (NIC).
An operating system or applications can’t
tell the difference between a virtual machine
and a physical machine. Even the virtual
machine thinks it is a “real” computer.
Nevertheless, a virtual machine is composed
entirely of software and contains no
hardware components whatsoever.
15
VMware approach


The VMware approach to virtualization inserts a
thin layer of software directly on the computer
hardware or on a host operating system. This
software layer creates virtual machines and
contains a virtual machine monitor or
“hypervisor” that allocates hardware resources
dynamically and transparently so that multiple
operating systems can run concurrently on a single
physical computer without even knowing it.
16
Benefits Virtualization (1)






Virtualization essentially lets one computer do the job
of multiple computers, by sharing the resources of a
single computer across multiple environments.
Virtual servers and virtual desktops let you host
multiple operating systems and multiple applications
locally and in remote locations, freeing you from
physical and geographical limitations.
In addition to energy savings and lower capital expenses
due to more efficient use of your hardware resources,
you get high availability of resources, better desktop
management, increased security, and improved disaster
recovery processes when you build a virtual
infrastructure.
17
Benefits Virtualization (2)








Compatibility: Virtual machines are compatible with all
standard x86 computers
Isolation: Virtual machines are isolated from each other
as if physically separated
Encapsulation: Virtual machines encapsulate a
complete computing environment
Hardware independence: Virtual machines run
independently of underlying hardware

18
Virtual Infrastructure


a virtual infrastructure is a dynamic mapping of physical
resources to business needs. While a virtual machine represents
the physical resources of a single computer, a virtual
infrastructure represents the physical resources of the entire IT
environment, aggregating x86 computers and their attached
network and storage into a unified pool of IT resources.

19
Benefits of Virtual Infrastructure


By decoupling the entire
software environment
from its underlying
hardware infrastructure,
virtualization enables the
aggregation of multiple
servers, storage
infrastructure and
networks into shared pools
of resources that can be
delivered dynamically,
securely and reliably to
applications as needed.
20
Benefits of Virtual Infrastructure


This approach enables organizations to build a computing
infrastructure or Data Centre with high levels of
utilization, availability, automation and flexibility using
building blocks of inexpensive industry-standard servers.

http://www.vmware.com/support/pubs/
21
AppLogic Example: A Virtual Data Centre




AppLogic is a grid operating system which enables utility computing for running
and scaling web applications.
AppLogic captures and operates on the logical structure of the application.
This makes it very easy to assemble, deploy, monitor, control applications visually
in a browser.

http://www.3tera.com/AppLogic/

22

Contenu connexe

Tendances

Data Center Infrastructure Management Powerpoint Presentation Slides
Data Center Infrastructure Management Powerpoint Presentation SlidesData Center Infrastructure Management Powerpoint Presentation Slides
Data Center Infrastructure Management Powerpoint Presentation SlidesSlideTeam
 
Importance of data centers
Importance of data centersImportance of data centers
Importance of data centersTyrone Systems
 
Hierarchical Storage Management
Hierarchical Storage ManagementHierarchical Storage Management
Hierarchical Storage ManagementJaydeep Patel
 
Datwyler data center presentation info tech middle east
Datwyler data center presentation info tech middle eastDatwyler data center presentation info tech middle east
Datwyler data center presentation info tech middle eastAli Shoaee
 
Storage Area Networks Unit 1 Notes
Storage Area Networks Unit 1 NotesStorage Area Networks Unit 1 Notes
Storage Area Networks Unit 1 NotesSudarshan Dhondaley
 
Data centre requirements
Data centre requirementsData centre requirements
Data centre requirementsarjun thakur
 
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...Cloud Computing Wire
 
Datacenter best practices design and implementation
Datacenter best practices design and implementationDatacenter best practices design and implementation
Datacenter best practices design and implementationAnton An
 
COMMON PROBLEMS AND CHALLENGES IN DATA CENTRES
COMMON PROBLEMS AND CHALLENGES IN DATA CENTRESCOMMON PROBLEMS AND CHALLENGES IN DATA CENTRES
COMMON PROBLEMS AND CHALLENGES IN DATA CENTRESKamran Hassan
 
Multi tiered hybrid data center design
Multi tiered hybrid data center designMulti tiered hybrid data center design
Multi tiered hybrid data center designMehmet Cetin
 
Data Center Network Topologies
Data Center Network TopologiesData Center Network Topologies
Data Center Network Topologiesrjain51
 
Data Center Infrastructure Management(DCIM)
Data Center Infrastructure Management(DCIM)Data Center Infrastructure Management(DCIM)
Data Center Infrastructure Management(DCIM)MD. IFTEKARUL ALAM
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recoveryhunny garg
 
Data centers
Data centersData centers
Data centerstejaswi25
 
IBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object StorageIBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object StorageTony Pearson
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMvwchu
 

Tendances (20)

Data Center Infrastructure Management Powerpoint Presentation Slides
Data Center Infrastructure Management Powerpoint Presentation SlidesData Center Infrastructure Management Powerpoint Presentation Slides
Data Center Infrastructure Management Powerpoint Presentation Slides
 
DATA CENTER
DATA CENTER DATA CENTER
DATA CENTER
 
Importance of data centers
Importance of data centersImportance of data centers
Importance of data centers
 
Hierarchical Storage Management
Hierarchical Storage ManagementHierarchical Storage Management
Hierarchical Storage Management
 
Datwyler data center presentation info tech middle east
Datwyler data center presentation info tech middle eastDatwyler data center presentation info tech middle east
Datwyler data center presentation info tech middle east
 
07. datacenters
07. datacenters07. datacenters
07. datacenters
 
Storage Area Networks Unit 1 Notes
Storage Area Networks Unit 1 NotesStorage Area Networks Unit 1 Notes
Storage Area Networks Unit 1 Notes
 
Data centre requirements
Data centre requirementsData centre requirements
Data centre requirements
 
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
 
Data center
Data centerData center
Data center
 
Datacenter best practices design and implementation
Datacenter best practices design and implementationDatacenter best practices design and implementation
Datacenter best practices design and implementation
 
COMMON PROBLEMS AND CHALLENGES IN DATA CENTRES
COMMON PROBLEMS AND CHALLENGES IN DATA CENTRESCOMMON PROBLEMS AND CHALLENGES IN DATA CENTRES
COMMON PROBLEMS AND CHALLENGES IN DATA CENTRES
 
Data centerefficiency
Data centerefficiencyData centerefficiency
Data centerefficiency
 
Multi tiered hybrid data center design
Multi tiered hybrid data center designMulti tiered hybrid data center design
Multi tiered hybrid data center design
 
Data Center Network Topologies
Data Center Network TopologiesData Center Network Topologies
Data Center Network Topologies
 
Data Center Infrastructure Management(DCIM)
Data Center Infrastructure Management(DCIM)Data Center Infrastructure Management(DCIM)
Data Center Infrastructure Management(DCIM)
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
 
Data centers
Data centersData centers
Data centers
 
IBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object StorageIBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object Storage
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 

Similaire à Data centre administration

Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 
Platform virtualization.raj
Platform virtualization.rajPlatform virtualization.raj
Platform virtualization.rajNRajaMohanReddy
 
Cloud white paper v3.0
Cloud white paper v3.0Cloud white paper v3.0
Cloud white paper v3.0CK Toh
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingBhuvanesh Hingal
 
Cloud computing
Cloud computingCloud computing
Cloud computingsandita12
 
virtualization-190329110832.pdf
virtualization-190329110832.pdfvirtualization-190329110832.pdf
virtualization-190329110832.pdfAkshithaReddy42848
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET Journal
 
Advantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationAdvantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationElizabeth Anderson
 
Presentation on Openstack in null Bhopal Chapter
Presentation on Openstack in null Bhopal ChapterPresentation on Openstack in null Bhopal Chapter
Presentation on Openstack in null Bhopal ChapterHemraj Singh Chouhan
 
Server Virtualization Architecture and Implementation
Server Virtualization Architecture and ImplementationServer Virtualization Architecture and Implementation
Server Virtualization Architecture and ImplementationLockheed Martin
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computingMehul Patel
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation OverviewLogicalis
 
00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdfaminnezarat
 

Similaire à Data centre administration (20)

Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Platform virtualization.raj
Platform virtualization.rajPlatform virtualization.raj
Platform virtualization.raj
 
Cloud white paper v3.0
Cloud white paper v3.0Cloud white paper v3.0
Cloud white paper v3.0
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Ijetcas14 440
Ijetcas14 440Ijetcas14 440
Ijetcas14 440
 
virtualization-190329110832.pdf
virtualization-190329110832.pdfvirtualization-190329110832.pdf
virtualization-190329110832.pdf
 
Virtualization
VirtualizationVirtualization
Virtualization
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
lect 1TO 5.pptx
lect 1TO 5.pptxlect 1TO 5.pptx
lect 1TO 5.pptx
 
Advantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of VirtualizationAdvantages And Disadvantages Of Virtualization
Advantages And Disadvantages Of Virtualization
 
Presentation on Openstack in null Bhopal Chapter
Presentation on Openstack in null Bhopal ChapterPresentation on Openstack in null Bhopal Chapter
Presentation on Openstack in null Bhopal Chapter
 
Server Virtualization Architecture and Implementation
Server Virtualization Architecture and ImplementationServer Virtualization Architecture and Implementation
Server Virtualization Architecture and Implementation
 
2_Virtualization.pptx
2_Virtualization.pptx2_Virtualization.pptx
2_Virtualization.pptx
 
Vitualisation
VitualisationVitualisation
Vitualisation
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Virtualizaiton-3.pptx
Virtualizaiton-3.pptxVirtualizaiton-3.pptx
Virtualizaiton-3.pptx
 
Logicalis - Virtualisation overview
Logicalis - Virtualisation overviewLogicalis - Virtualisation overview
Logicalis - Virtualisation overview
 
Virtualisation Overview
Virtualisation OverviewVirtualisation Overview
Virtualisation Overview
 
00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf
 

Plus de Ujjwal 'Shanu' (20)

Risk return trade off
Risk return trade offRisk return trade off
Risk return trade off
 
Risk perceprtion of ads of infosys
Risk perceprtion of ads of infosysRisk perceprtion of ads of infosys
Risk perceprtion of ads of infosys
 
Mutual funds
Mutual fundsMutual funds
Mutual funds
 
Corporate governance
Corporate governanceCorporate governance
Corporate governance
 
Whistle blower final
Whistle blower finalWhistle blower final
Whistle blower final
 
M&a
M&aM&a
M&a
 
T test
T testT test
T test
 
Research design
Research designResearch design
Research design
 
Business research
Business researchBusiness research
Business research
 
Measurement and scaling techniques
Measurement  and  scaling  techniquesMeasurement  and  scaling  techniques
Measurement and scaling techniques
 
Taxation
TaxationTaxation
Taxation
 
Shri palaniappan chidambram
Shri palaniappan chidambramShri palaniappan chidambram
Shri palaniappan chidambram
 
Planning
PlanningPlanning
Planning
 
Merger & acquisition
Merger & acquisitionMerger & acquisition
Merger & acquisition
 
Gaar ppt
Gaar pptGaar ppt
Gaar ppt
 
Rbi
RbiRbi
Rbi
 
Production theory
Production theoryProduction theory
Production theory
 
Perfect competition
Perfect competitionPerfect competition
Perfect competition
 
Oligopoly
OligopolyOligopoly
Oligopoly
 
National income
National incomeNational income
National income
 

Dernier

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Data centre administration

  • 1. Chapter 11: Data Centre Administration Objectives Data Centre Structure  Data Centre Administration  Data Centre Monitoring  Virtualization  Benefits of Virtual Infrastructure  1
  • 3. Major Data Centre Tasks  Infrastructure   Administration   Maintenance of services Training     Continue expansion Training the trainers Staff training Student training External cooperation 3
  • 4. Data Centre Infrastructure    Data Center for Administration, Management, and Technical support. Backbone Networks (Access Network) In Main Campus. Remote Network to connect campuses. Network Service • • Provide service environment for O&M on Network and IT resources. Provide technical support to users from different campuses. • • Education Center : Provide education & training facilities for Users Provide the communication network and Telecommunication System • Connection of Remote Node (campus) with necessary core Optic fiber cables install LAN to utilize applications at the Organization level. • Remote Network • • Backbone Network (OSP) Data Center : Accommodate server farm & Application Hosting Area. • IT Center Provide central network services for all user of the network. Central Node at the main Office (Campus) • Access/Remote Node (Campus) : District Office, Police Office, Real Estate Registration Office, Vehicle Registration Office, Motorcycle Registration office • Other Organization : Royal Palace, National Assembly, International Airport, etc. 4
  • 5. Data Centre Administration     Develop Applications by Upgrading & Customizing Applications Software Distribution System (Virtualization) Provide services Maintenance and technical support Item Applications Development Hardware & Software Description • Upgrade and Customize existing applications • Interconnect several Applications • Develop integrated Web applications • Virtualization, and operating systems installations • Install Server, PC, Printer, and other peripheral devices • Provide services • Install DBMS, Office Package, and other Application Program Web services and • Develop Data Entry Program Maintenance and support • Upgrade PC and Server DBMS • Maintain and technical support for Application Program 5
  • 6. Training programs Program User training Advanced training Content • Introduction to PC’s • Web and E-mail usage. • Information sharing and usage of IT recourses. • Web authoring and development • System administration • Database development • Computer networking and management Target Staff and students Technical staff, trainers and administrative staff. 6
  • 7. User - Application Monitoring 7
  • 8. Network - Location Monitoring 8
  • 12. Virtualization  Virtualization is a proven software technology that is rapidly transforming the IT landscape and fundamentally changing the way that people compute.  Today’s powerful x86 computer hardware was originally designed to run only a single operating system and a single application, but virtualization breaks that bond, making it possible to run multiple operating systems and multiple applications on the same computer at the same time, increasing the utilization and flexibility of hardware. 12
  • 13. How Virtualization works?  Virtualization lets you transform hardware into software. Use software such as VMware to transform or “virtualize” the hardware resources of an x86-based computer—including the CPU, RAM, hard disk and network controller—to create a fully functional virtual machine that can run its own operating system and applications just like a “real” computer. 13
  • 14. How Virtualization works?  Multiple virtual machines share hardware resources without interfering with each other so that you can safely run several operating systems and applications at the same time on a single computer. 14
  • 15. What is a Virtual Machine?    A virtual machine is a tightly isolated software container that can run its own operating systems and applications as if it were a physical computer. A virtual machine behaves exactly like a physical computer and contains it own virtual (ie, software-based) CPU, RAM hard disk and network interface card (NIC). An operating system or applications can’t tell the difference between a virtual machine and a physical machine. Even the virtual machine thinks it is a “real” computer. Nevertheless, a virtual machine is composed entirely of software and contains no hardware components whatsoever. 15
  • 16. VMware approach  The VMware approach to virtualization inserts a thin layer of software directly on the computer hardware or on a host operating system. This software layer creates virtual machines and contains a virtual machine monitor or “hypervisor” that allocates hardware resources dynamically and transparently so that multiple operating systems can run concurrently on a single physical computer without even knowing it. 16
  • 17. Benefits Virtualization (1)    Virtualization essentially lets one computer do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Virtual servers and virtual desktops let you host multiple operating systems and multiple applications locally and in remote locations, freeing you from physical and geographical limitations. In addition to energy savings and lower capital expenses due to more efficient use of your hardware resources, you get high availability of resources, better desktop management, increased security, and improved disaster recovery processes when you build a virtual infrastructure. 17
  • 18. Benefits Virtualization (2)     Compatibility: Virtual machines are compatible with all standard x86 computers Isolation: Virtual machines are isolated from each other as if physically separated Encapsulation: Virtual machines encapsulate a complete computing environment Hardware independence: Virtual machines run independently of underlying hardware 18
  • 19. Virtual Infrastructure  a virtual infrastructure is a dynamic mapping of physical resources to business needs. While a virtual machine represents the physical resources of a single computer, a virtual infrastructure represents the physical resources of the entire IT environment, aggregating x86 computers and their attached network and storage into a unified pool of IT resources. 19
  • 20. Benefits of Virtual Infrastructure  By decoupling the entire software environment from its underlying hardware infrastructure, virtualization enables the aggregation of multiple servers, storage infrastructure and networks into shared pools of resources that can be delivered dynamically, securely and reliably to applications as needed. 20
  • 21. Benefits of Virtual Infrastructure  This approach enables organizations to build a computing infrastructure or Data Centre with high levels of utilization, availability, automation and flexibility using building blocks of inexpensive industry-standard servers. http://www.vmware.com/support/pubs/ 21
  • 22. AppLogic Example: A Virtual Data Centre    AppLogic is a grid operating system which enables utility computing for running and scaling web applications. AppLogic captures and operates on the logical structure of the application. This makes it very easy to assemble, deploy, monitor, control applications visually in a browser. http://www.3tera.com/AppLogic/ 22