Professional Documents
Culture Documents
Evaluation Data Center
Evaluation Data Center
net/publication/330741232
CITATIONS READS
0 915
3 authors:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Manal A. Abdel-Fattah on 30 January 2019.
Abstract—Data center is a repository that houses computing facilities like servers, routers, switches and firewalls, as
well as supporting components like backup equipment, fire suppression facilities and air conditioning. As data
center is a key parameter for business value. So data centers are needed for any financial organization and
educational institutions for its effective and efficient business processes. Therefore data center requires
proper and easy maintenance, cooling systems, electrical system, security systems and proper placement of
equipment. This paper represents the way for how to evaluate the performance of data centers using some
related international standards for evaluating performance of data center and also a proposed framework is
provided that will help in evaluating performance of the data center.
Keywords-Data center; cooling and electrical requirements; Security; Tiers levels; server
I. INTRODUCTION:
Data centers are amongst the most complex and energy demanding building indoor environments that aimed to host
the computational equipment, data storage and telecommunication equipment, as a result of high internal loads, low
indoor temperature and humidity settings, and continuous (uninterrupted) operation. The facilities are characterized
by very high concentration of information technology (IT) equipment, peripherals (e.g. servers, computers, data
storage media, network devices,..) and facility equipment, for example, power distribution equipment, generators,
uninterruptible power supplies (UPS), cooling systems (chillers, fans, pumps etc.), computer room air conditioner
(CRAC) units ,air-handling units, and security systems.[1][2]
In this chapter we are going to introduce a proposed framework for evaluation of the Performance of data centers.
As Performance Evaluation are a problem-defining method that results in an accurate identification of the actual and
desired organizational, process, and individual performance levels (Swanson 1994). The performance evaluation
process will help in framing the situation to determine the causes of perceived performance problems. [3]
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 16, No. 11, November 2018
As After data has been collected and analyzed through an interview evaluation model done with IT staff of the
data center .There is many issues that has found in the Helwan University data center that face in power, cooling,
security, servers.
III. METHODOLOGY:
This study was based on a multiple case study that is used for evaluation of the performance of the data center.
A sample of three (3) universities in Egypt was taken. The Egyptian universities data centers that is investigated
are Supreme council of universities, Ain shams University and Helwan university. The data was obtained
through an interview model .After that data was analyzed in order to prioritize issue .Then a user interface was
developed that helped in improving efficiency of the data centers.
Memory Utilization
To evaluate building requirements of the data center, there should present the following key parameters
that we should follow according to TIA 942 standards:
1) Location:
We should avoid location that restrict expansion as the data center should be designed with plenty of white
space or empty space that can accommodate future racks or cabinets.[9]
Avoid setting up computer center in a place subject to disasters or failures.
It is recommended to allocate the Entrance room outside of computer room for better security.[9]
2) Size(no magic formula):
The data center room should be sized to meet the known requirement of specific equipment.
3) Raised floor:
It is preferred that data center should be designed on a raised floor as :
It improves operational efficiency and allows greater flexibility in the arrangement of equipment .[11]
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 16, No. 11, November 2018
It permits the space between the two floors to be used to supply cooling air to the equipment or
area.[11]
It allows future layout change with minimum reconstruction cost.[11]
It protects the interconnecting cables and power receptacles.[11]
It is better to align racks and cabinets on a raised floor to enable easy lifting of tiles.[4][9]
4) Ceiling Height:
Minimum ceiling height is 2.6 m (8.5 ft) from finished floor to any obstruction (sprinklers, lighting
fixtures or cameras).[10]
Cooling architecture may require higher ceiling.
5) Labeling:
TIA-942 standards also extends to TIA 606 A administration Standards to data centers, which specifies
that there should be a labelling schema for racks,cabinets,patch panels,patch cords and cables. [4][9]
6) Doors:
Redundant access to facility.
Doors should be fireproof.
There should only be two doors in each computer room.
It is not preferred to have windows in the doors for security risk.[10]
7) Windows:
The Computer room should not have any exterior windows for security risk. Such windows could
provide access to confidential information via Van Eck Radiation and also windows can increase
heat to a computer room which unnecessarily affects servers [10]
If there are windows in a proposed computer room space, they should be covered for security
reasons and to minimize any solar heat gain.[10]
8) Equipment Arrangement:
TIA Standard recommends specific functional areas which will help in the placement of equipment
based on the standard hierarchical star topology design for regular commercial spaces as this will help
in creating an environment where servers and applications can be added and upgraded with minimal
downtime and disruption. [9]
Adequate space must be provided within and between racks where the standard requires 3 feet in rows(4
feet reccommended and also adequate space must be provided between cabinets, in pathways for better
cable management and access.[9]
9) Monitoring:
There should be a communication system:
Communications system (bus) allows the system to connect to external devices such as a PC or
alarm/monitoring system.
The communications bus can allow the control system to be used for data acquisition and for
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 16, No. 11, November 2018
creating a graphical user interface for monitoring system status, trending, alarms, and operator
adjustments.[5]
There should be a data center environmental control in data center for maintaining temperature, humidity,
and other physical qualities of air within a specific range in order to allow the equipment housed in a data
center to perform optimally throughout its lifespan as there are types of controls illustrated below:
Stand alone electromechanical environmental controls:
such as thermostats, humidistat, relays, timers, and switches (no digital communications are
available with this type of control).[5]
electronic set point controllers:
It combines a sensor or other device with an electronic device that reads the sensor input and
electronically performs a control action (some models offer basic digital communications in addition
to their control functions).[5]
Direct Digital Controllers(DDC):
DDC combine a series of input and output signals with a microprocessor and memory to run a user-
programmable control strategy. [5]
TABLE I Represent the building requirements for the data center according to TIA 942 standard:
Raised Floor 12 to 18 inch raised floor 13 to 18 inch raised floor 24 to 36 inch raised floor 25 to 36 inch raised floor
Text only alarm and event Text only alarm and event Graphic alarm and event Graphic alarm and event
Monitoring - Not App. logging and system logging and system logging and system logging and system
monitoring monitoring monitoring monitoring
Stand alone Stand alone
Stand alone electromechanical electromechanical
DDC environmental
Monitoring electromechanical environmental controls or environmental controls or
controls and trend logging
environmental controls DDC environmental DDC environmental
controls controls
14 ft. ceiling or higher/
Ceiling Ceiling 8 to 10 ft. ceiling 10 ft. ceiling 12 ft. ceiling or higher
Vented Grills
TABLE II summarizes phase 1
1)Location:
Is the data center located in a place that cannot restrict expansion in the future? Yes No
2) Size:
Do you have extra equipment in Computer room/data center? Yes No
3)Raised floor:
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 16, No. 11, November 2018
In which level is height of the raised floor of data center? Level 1 Level 2 Level 3 Level 4
4)Ceiling Height:
In which level is the height of the ceiling of data center? Level 1 Level 2 Level 3 Level 4
5) Labeling:
Are all the racks, patch panels, patch cords, cabinets, cables labeled according to a
Yes No
labeling schema?
6) Doors:
Does the data center have another door for access in case of any emergency? Yes No
7)Windows:
8)Equipment Arrangement:
Is there is an adequate space left between racks (3or 4 feet in row)? Yes No
9)Monitoring:
In which level is data center monitored-not application? Level 1 Level 2 Level 3 Level 4
Power installation process start with the electrical equipment (or standby generator) that is fed to UPS
systems which provide power conditioning which is typically supplied via a distribution transformer,
switchgear, suitable bus bar and cabling systems which after that are handled by power distribution units which
after that supply the rack distribution units and finally the IT equipments s as shown in “Fig. 2”. [1]
UPS in the recent years are playing significant role in achieving protection against power interruptions
and in improving efficiency and cost effectiveness and providing high secured data. [12]
As racks and cooling infrastructure typically represents the largest loads on power delivery system so
redundant UPS systems is needed in order to provide conditioned electrical power to this equipment .
[14]
The UPS should be sized to energize all computer equipment, HVAC systems and other electrical
devices (such as emergency lighting and security devices) for 100 percent of the power demand
for no less than 15 to 20 minutes after a power interruption.[32]
The UPS should be sized for "peak" load or fault overload conditions.[32]
Also UPS’s provide both active power conditioning to control voltage sags and spikes, and emergency
power in the event of a loss of utility power. [14]
The UPS should be continuously operational to filter and condition the power.[32]
2) Backup Generator:
Data center should be Provided with generator as generator provide power to the Data Center in the
event of power failure.[15]
To ensure that the generator is always ready for immediate service, a preset test-firing sequence should
be executed once each calendar month.[16][32]
The generator should be checked on a regular basis to make sure that fuel is at an acceptable level for
extended run time if needed.[16]
The data center should be provided with a diesel supply to re-fuel the generator[15]
3) Power Usage Effectiveness (PUE):
Power Usage Effectiveness (PUE) is the recommended metric for characterizing and reporting overall data
center infrastructure efficiency.
This metrics is represented by Organizations including the 7x24 Exchange, ASHRAE, The Green Grid, Silicon
Valley Leadership Group, U.S. Department of Energy Save Energy Now and Federal Energy Management
Programs, U.S. Environmental Protection Agency’s ENERGY STAR Program, U.S. Green Building Council, and
Uptime Institute represented metrics that will help in improving data center efficiencies and reducing energy
consumption using certain guiding principles which are:
Power Usage Effectiveness (PUE) which is a measurement of the total energy of the data center divided
by the IT energy consumption.
When calculating PUE, IT energy consumption should be at a minimum, where the output of the
uninterruptible power supply (UPS) will be measured. However, the industry should progressively
improve measurement capabilities over time so that measurement of IT energy consumption
directly at the IT load (i.e. servers) becomes the common practice.
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 16, No. 11, November 2018
For a dedicated data center, the total energy in the PUE equation will include all energy sources at the point
of utility handoff to the data center owner or operator. For a data center in a mixed-use building, the total
energy will be all energy required to operate the data center, similar to a dedicated data center, and should
include cooling, lighting, and support infrastructure for the data center operations.
The Green Grid site presented Power Usage Effectiveness (PUE) and its reciprocal Data Center infrastructure
Efficiency (DCIE) which is widely accepted benchmarking standards that can help IT Professionals to determine
how energy efficient data centers are.[33]
TABLE III below will be a guide in knowing the level of efficiency based on PUE and DCIE calculated: [33]
PUE DCIE Level of Efficiency
TABLEIV Represent the electrical requirements for the data center according to TIA 942 standard:
How many UPS do you have in your data center? 1UPS More than 1 UPS
Are redundancies built into the facility's electrical switches that power the floor? Yes No
Do you have dual UPS units for all network equipment that has dual power supplies? Yes No
Is UPS monitoring application set to notify you when the load has exceeded 80% of
Yes No
the UPS system's maximum capacity?
In which level UPS of data center is in? Level 1 Level 2 Level 3 Level 4
2) Generator:
To ensure that the generator is always ready for immediate service, Is your generator
Yes No
tested on a regular basis?
To ensure that the generator is always ready for immediate service, is a preset test-
Yes No
firing sequence executed once each calendar month?
In which level do you think your generator is in? Level 1 Level 2 Level 3 Level 4
Determine the level of efficiency of data center after calculating PUE? Very Inefficient Average Efficient Very
Inefficient Inefficient
The cooling is one of the three main infrastructures of a data center as it maintains IT equipment working in a
safe and reliable manner and it can account for up to 40% of the total energy consumption in a data center. The
complicated connection of chillers, compressors and air handlers create the best possible computing
environment which ensures the long life of the servers and the strength of the organization they support.[17][18]
Cooling system has to be able to achieve a full environmental control, including air temperature, humidity and
pollution concentration. Hence Air-cooled systems represent the backbone of data center cooling systems so
cooling systems should be designed to cover the worst case scenario although most servers generally work at
much lower capacity than 100%, and also can cope with the advance in IT equipment. The control and
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 16, No. 11, November 2018
prediction of temperature rising during a utility power outage is an important aspect for cooling system design.
[18]
1) Room based Cooling:
a) Computer Room Air Conditioning units (CRACs):
CRAC devices should work full time all over the year by operation of different devices to remove the
heat added to the system.[19]
To overcome heating problem it is better to add more cooling equipment instead of improving cooling
operation.[19]
There should be air management of the server room to make sure that the cool air that is provided by
the CRAC is transferred to IT servers and the hot air returned to the CRAC after neutralizing the heat
production.[19]
Take precautions for preventing leakage from air conditioning facilities.[13]
Regular maintenance of the cooling equipment is very essential in the data center and there should be a
report monthly about the condition of the cooling equipment.
Server rooms should have individual air conditioning units
b) Hot-Aisle and Cold-Aisle:
The racks should be arranged into rows of hot and cold aisles in order to minimize the mixing of air in
the data center. If warm air is allowed to mix with the server inlet air, the air supplied by the air
conditioning system must be at an even colder temperature to compensate as shown in” Fig. 4” .[19]
The use of hot and cold aisles Configurations can help in doubling the computer server capacity of the
data center and help in air management.[20]
The recommended operating temperature range for IT equipment, according to the American Society of
Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE), is 64.4- 80.6°F (18-27°C) and also
the recommended humidity range for IT equipment according to the American Society of Heating,
Refrigeration, and Air Conditioning Engineers (ASHRAE), is41.9-50°F (5.5-15°C) which is provided in
TABLE VI .
To be able to maintain safe temperature there should be a regular maintenance for the mechanical
systems as it requires regular inspection of normal and abnormal bearing wear and the periodic
replacement of oils and lubricants.[22]
Upper limit humidity 60% relative humidity and 50°F (15°C) dew point
TABLE VII Represent the electrical requirements for the data center according to TIA 942 standard:
Do you have Fans to Put in Computer room in case of Air conditioning fails? Yes No
Do you have an Individual Air conditioning Unit for server room? Yes No
b) Hot-Aisle and Cold-Aisle:
Any redundant Air Handling units that control temperature and humidity? Yes No
d) Recommended temperature and humidity:
The climate within a storage vault should be maintained between 60 and 70 degrees to
prevent tape damage, Did you find it within these degrees? Yes No
Humidity must be regulated with levels varying between 40% and 50% to prevent harmful
condensation; Did you find it within these levels? Yes No
We have to evaluate various hardware resources (e.g., processors, disks, local area net-works, and wide area
networks) that is used to support a C/S system. [25]
Centralized tool such as BMC TrueSight program will help us in evaluating server performance as it will provide
dashboards for the health of the server and memory usage and if the CPU usage is high it will send alarms to the IT
staff.
The server performance is being evaluated according to:
1) CPU utilization:
As response times grow exponentially for high CPU usage, CPU utilization must not be exceeded than 65% as
an average.
1) Memory usage:
When the computer is idle, it would use the amount of RAM required by system processes. So that depends on your
operating system. For example it should be around 15-20% of your total memory for windows 10. Most Linux
distributions use less than what windows would use, so that would be around 10% of your total memory.
2) Disk usage:
The most important thing that slows down system is the hard disk usage, if the hard disk usage is 90%, the
system will slow down. Larger size hard disks have thousands of files which should be properly indexed .
TABLEIX summarizes phase 4
1) CPU Utilization:
Is your memory usage between 15-20% if you are using windows or less than 10% if you
are using Linux? Yes No
3) Disk Usage:
Every day, we use a wide variety of network services and applications, which produces a huge amount of network
data.
So in order to be able to evaluate network security we have to collect data about network which will help in
detecting network attacks and assist network administration. Through real-time monitoring, testing, configuring,
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 16, No. 11, November 2018
controlling and evaluating based on network data, network administrators are able to obtain network system
performance, evaluate Quality of Service (QoS) and find out network fault points. [26]
There are certain network security guards that we should have in order to protect network security of data
centers which are:
a) Access control:
Not every user should have access to your network. To keep out potential attackers, you need to
recognize each user and each device. Then you can enforce your security policies. You can block
noncompliant endpoint devices or give them
only limited access. This process is network access control.[27]
b) Antivirus and antimalware software:
"Malware," short for "malicious software," includes viruses, worms, Trojans, ransom ware, and spyware.
Best antimalware programs should be installed in order to scan for malware upon entry and also to track
files continuously afterward to find anomalies, remove malware, and fix damage.[27]
c) Application security:
Software usually needs protection, whether it is internally built or purchased. Unfortunately, any
application may contain imperfections, or vulnerabilities that attackers can use to penetrate the network.
Application security includes the hardware, software, and processes that is used to eliminate those
imperfections.[27]
d) Data loss prevention:
Organizations must make sure that their staff does not send sensitive information outside the network.
Data loss prevention (DLP) technologies can stop people from uploading, forwarding, or even printing
critical information in an unsafe manner.[27]
e) Email security:
There should be an email security application which will help in preventing incoming attacks and
controls outbound messages.
And also an email security application will help in preventing the loss of sensitive data especially from
attackers who use personal information and social engineering tactics to build sophisticated phishing
campaigns to deceive recipients and send them to sites serving up malware. [27]
f) Firewalls:
Firewalls will help in putting up a barrier between trusted internal network and un-trusted outside
networks, such as the Internet. They use a set of defined rules to allow or block traffic. A firewall can be
hardware, software, or both. [27]
g) Intrusion prevention systems:
There should be an intrusion prevention system (IPS) which scans network traffic to actively block attacks.
[27]
2) Data Security:
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 16, No. 11, November 2018
Data to be more secure it should start with a secure and reliable storage mechanism:
-The system should ensure there are at least two copies of any data on the system in order to reduce the risk of
data loss. One of the two copies should reside in a backup data center
at a separate location in case a disaster impacts the main data center. The system should ensure that the two
copies are permanently synchronized.[29]
-Database is stored on RAID-10(Redundant Array of Independent Disks, originally Redundant Array of
Inexpensive Disks) (1+0) disk system. RAID-10 provides high availability and performance when there is a
need to reconstruct data in the case of disk failure.[29]
-Data is stored on RAID-6. While this type of RAID is slower to reconstruct in case of disk failure, it offers
excellent reliability with a higher ratio of usable storage to physical storage.[29]
It is not enough to maintain two copies of data, we must also ensure that each copy of the data
maintains its integrity and that any damaged files can be quickly detected and reconstructed from a RAID copy
and this is done through a validation process.[29]
3) Physical Security:
a) Alarms:
Temperature and Humidity Alarm: There should be an alarm system for high temperature and high
humidity with automatic telephone dial-up or SMS text warnings to key personnel.[28]
b) Fire protection:
Very Early Smoke Detection Avoidance (VESDA) system:
The room should have a smoke detection system to protect equipment from external heavy pollution
such as fire.[29]
The data center should have a fire suppression system especially for the server rooms itself. As a fire
suppression system will automatically extinguish a fire without the need of human intervention.
A wet pipe sprinkler system is the most basic sprinkler system option. This system, however, is always
water-filled and is therefore usually not a preferred approach in data centers. These pipes have the
potential for false discharge and water leaks or pipe failure, which could damage equipment and
disrupt service.
Single interlock systems rely on a separate event such as a smoke detector to activate before water is
released into the system. In this case, if an individual sprinkler were to fail or break due to mechanical
damage without a detector in alarm, the system will not release water into the pipes. After water fills
the pipes, the system acts as a traditional wet pipe system and will not discharge water until
temperatures in the room are high enough to activate a sprinkler.
A dual-interlock pre-action system provides additional redundancy before water is released into pipes.
Both a detector actuation, typically a smoke detector, and a sprinkler actuation must occur
simultaneously before water will enter pipes.[30]
All entrances and exits should have CCTV cameras (closed circuit television camera) to ensure each person
entering the facility is identified.
d) Security Card Access:
All doors on the outside of the building should have some automatic authentication method such as a card
access with monthly report.
TABLE X Represent the Security requirements for the data center :
Physical Security
Level 1 Level 2 Level 3 Level 4
Requirements
Water detection
Water detection around
Alarm – Water No water detection No water detection throughout raised floor
possible sources
area
High temp. and humidity High temp. and humidity Full building monitoring
Alarm - High Temp High temp. alarm
alarm alarm of spaces
No Very Early Smoke Very Early Smoke Very Early Smoke Very Early Smoke
Fire Protection Detection Avoidance Detection Avoidance Detection Avoidance Detection Avoidance
(VESDA) system (VESDA) system (VESDA) system (VESDA) system
Gaseous fire suppression Gaseous fire suppression
No gaseous fire Gaseous fire suppression
Fire Protection system above and below system above and below
suppression system system below floor only
raised floor raised floor
Wet pipe fire Single interlock pre- Dual interlock pre-action Dual interlock pre-action
Fire Protection
protection action fire protection fire protection fire protection
Physical building
Complete secure
No physical building No physical building entrances and exits
Security Physical perimeter limited site
segregation segregation controlled by data center
access
space
Card access in only with Card access in/out with Card access in/out with
Security Card Access Card access
reporting monthly reporting monthly reporting monthly
Site, building, entrance
CCTV on entrances and CCTV on all entrances
Security CCTV No CCTV and data center space
exits to data center space and exists
CCTV
TABLEXI summarizes phase 5
1) Network Security:
How many network disruptions have occurred in the past 5 years? Network disruptions
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 16, No. 11, November 2018
Access control
Application security
What are the current Safeguards to ensure continuous connectivity? Data loss prevention
Email security
Firewalls.
Intrusion prevention systems
a) Access control:
Is Network servers, which contain sensitive or critical applications, are protected from
unauthorized physical access? Yes No
Do all of the systems on the network have anti-virus software installed and configured to
detect and remove viruses? Yes No
c) Application security:
Do you have an application security that can prevent attackers from penetration of network
Yes No
server?
d) Data loss prevention:
Does Network server security software prevent unauthorized personnel from uploading,
forwarding, or even printing critical information in an unsafe manner? Yes No
e) Email security:
Are periodic test conducted for firewall technology to ensure compliance with security No
Yes
policies?
Does firewall technology have security logging turned on? Yes No
g) Intrusion prevention systems:
Hourly
Weekly
Are backups taken offsite? Yes No
Are Backup tapes Stored in Computer room? Yes No
And probably the worst cause of failure in a recovery: have the backup tapes been tested? Yes No
3) Physical Security:
a)Alarms:
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 16, No. 11, November 2018
Which method of water fire protection system do you have? Single interlock pre-action
Dual interlock pre-action
Now you are able to classify which tier you data center is in as there are 4 tiers.
Achieving a Tier rating signals to investors, customers, and the marketplace, that your facility meets the highest
standards for infrastructure (Topology) functionality and capacity as demonstrated on the design documents. It
validates that the facility and system design is consistent with your uptime objectives. Tier Certification helps align
the infrastructure design with the business mission, ensuring that your organization’s significant capital investment
yields the desired result.
Tier classification is described more in details below according to Uptime Institute tier standard, American
standard TIA 942 and BICSI best practices and recommendations as well as references to external organizations'
standards and also illustrated using( fig4) and TABLEXII.[2][31]
Tier classification which is illustrated using( fig4) and TABLE XII and described more in details below is
described in few documents as Uptime Institute tier standard, American standard TIA 942 and BICSI best practices
and recommendations as well as references to external organizations' standards.[2][31]
TABLE XII Data center Tier Ratings according to Uptime Institute tier standard: [31]
Which Tier your data center is in according to Uptime Institute Standards? Tier 1 Tier 2 Tier 3 Tier 4
v. Case Study:
Case study represents a sample of interview model which is applied in Helwan University data center to
evaluate its performance:
1)Location:
Is the data center located in a place that cannot restrict expansion in the future? Yes No
2) Size:
Do you have extra equipment in Computer room/data center? Yes No
3)Raised floor:
Is the data center built on a raised floor? Yes No
In which level is height of the raised floor of data center? Level 1 Level 2 Level 3 Level 4
4)Ceiling Height:
In which level is the height of the ceiling of data center? Level 1 Level 2 Level 3 Level 4
5) Labeling:
Are all the racks, patch panels, patch cords, cabinets, cables labeled according to a labeling
Yes No
schema?
6) Doors:
Does the data center have another door for access in case of any emergency? Yes No
7)Windows:
Does data center have windows in any of the doors? Yes No
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 16, No. 11, November 2018
8)Equipment Arrangement:
Is there is an adequate space left between racks (3or 4 feet in row)? Yes No
9)Monitoring:
In which level is data center monitored-not application? Level 1 Level 2 Level 3 Level 4
How many UPS do you have in your data center? 1UPS More than 1 UPS
Are redundancies built into the facility's electrical switches that power the floor? Yes No
Do you have dual UPS units for all network equipment that has dual power supplies? Yes No
Is UPS monitoring application set to notify you when the load has exceeded 80% of the
Yes No
UPS system's maximum capacity?
In which level UPS of data center is in? Level 1 Level 2 Level 3 Level 4
2) Generator:
To ensure that the generator is always ready for immediate service, Is your generator No
Yes
tested on a regular basis?
To ensure that the generator is always ready for immediate service, is a preset test-firing
sequence executed once each calendar month?
Yes No
In which level do you think your generator is in? Level 1 Level 2 Level 3 Level 4
3)Power Usage Effectiveness (PUE):
Very Inefficient Average Efficient
Determine the level of efficiency of data center after calculating PUE? Inefficient
Phase 3: Cooling Requirements:
Do you have Fans to Put in Computer room in case of Air conditioning fails? Yes No
Do you have an Individual Air conditioning Unit for server room? Yes No
b) Hot-Aisle and Cold-Aisle:
Any redundant Air Handling units that control temperature and humidity? Yes No
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 16, No. 11, November 2018
The climate within a storage vault should be maintained between 60 and 70 degrees to
prevent tape damage, Did you find it within these degrees? Yes No
Humidity must be regulated with levels varying between 40% and 50% to prevent harmful
condensation; Did you find it within these levels? Yes No
1) CPU Utilization:
Is your memory usage between 15-20% if you are using windows or less than 10% if you
are using Linux? Yes No
3) Disk Usage:
1) Network Security:
How many network disruptions have occurred in the past 5 years? Network disruptions 6
How long (were) the disruption(s)? 10 minutes
What are the current Safeguards to ensure continuous connectivity?
Access control
Application security
Email security
Firewalls.
Is Network servers, which contain sensitive or critical applications, are protected from
unauthorized physical access? Yes No
Is access to operating system and application software limited to authorized personnel? Yes No
Can IT staff access network equipment remotely? Yes No
b) Antivirus and antimalware software:
Do all of the systems on the network have anti-virus software installed and configured to
detect and remove viruses? Yes No
c) Application security:
Do you have an application security that can prevent attackers from penetration of network
server? Yes No
Does Network server security software prevent unauthorized personnel from uploading,
forwarding, or even printing critical information in an unsafe manner? Yes No
e) Email security:
Are periodic test conducted for firewall technology to ensure compliance with security
Yes No
policies?
Does firewall technology have security logging turned on? Yes No
g) Intrusion prevention systems:
2) Data Security:
Daily
Weekly
Are backups taken offsite? Yes No
Are Backup tapes Stored in Computer room? Yes No
And probably the worst cause of failure in a recovery: have the backup tapes been tested? Yes No
3) Physical Security:
a)Alarms:
Do you have a Very Early Smoke Detection system in the Data Center for early warnings
Yes No
of fire?
Do you have a Gaseous Fire Suppression system in the data center?
Yes No
Which method of water fire protection system do you have? Wet pipe fire protection
It was observed that a few of data center wasn’t build on a raised floor, all the doors are designed
with windows.
Few of the data centers doesn’t have backup generator.
The security for the data centers isn’t powerful as there is no card access, CCTV cameras. no sensor
for temperature and humidity.
References
[1] Balaras, C. A., Lelekis, J., Dascalaki, E. G., & Atsidaftis, D. (2017). High Performance Data Centers and
Energy Efficiency Potential in Greece. Procedia environmental sciences, 38, 107-114.
[2] Dumsky, D. V., & Isaev, E. A. (2015). Data centers for physical research. Physics Procedia, 71, 298-302.
[3] Posey, O. G. (2000). Client/server systems performance evaluation measures use and importance: A multi-
site case study of traditional performance measures applied to the client/server environment.
[4] DiMinico, C., & Jew, J. (2006). Telecommunications infrastructure standard for data centers ANSI/TIA-
942.
[5] https://electroiq.com/2007/02/environmental-control-systems-and-their-use-in-cleanroom-applications/
(accessed: 8/10/2018)
[6] Lucchese, R., Olsson, J., Ljung, A. L., Garcia-Gabin, W., & Varagnolo, D. (2017). Energy savings in data
centers: A framework for modelling and control of servers’ cooling. IFAC-PapersOnLine, 50(1), 9050-
9057.
[7] Capozzoli, A., & Primiceri, G. (2015). Cooling systems in data centers: state of art and emerging
technologies. Energy Procedia, 83, 484-493.
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 16, No. 11, November 2018
[8] Norouzi-Khangah, B., Mohammadsadeghi-Azad, M. B., Hoseyni, S. M., & Hoseyni, S. M. (2016).
Performance assessment of cooling systems in data centers; Methodology and application of a new thermal
metric. Case Studies in Thermal Engineering, 8, 152-163
[9] Telecommunication Industry Association. (2006). Tia-942 data center standards overview. White Paper.
[10] Telecommunication Industry Association. Standards, & Technology Dept. (2005). Telecommunications
Infrastructure Standard for Data Centers. Telecommunication Industry Association.
[11] https://www.ibm.com/support/knowledgecenter/P8DEA/p8ebe/p8ebe_raisedfloors.htm
(accessed 10/10/2018)
[12] Kumar, N., & Kumar, A. (2018). Experimental assessment of UPS battery load model considering
harmonics and its investigation in the distribution systems. Materials Today: Proceedings, 5(1), 709-715.
[13]https://d0.awsstatic.com/whitepapers/jp/security/FISC_Document_20120824.pdf (accessed: 1/10/2018)
[14] Wendy Torell and Patrick Donovan, Determining the Power, Cooling,
and Space Capacities when Consolidating Data Centers, White Paper 177,
http://www.caddealer.com/greenit/newsletter/WP1.pdf , (accessed: 06/09/2018)
[15] https://www.accu-tech.com/hs-fs/hub/54495/file-17649947-pdf/docs/dcd_overview_11-9-12.pdf
,(accessed: 05/09/2018)
[16]https://www.datacenterknowledge.com/archives/2014/12/10/10-things-to-do-before-storm-to-ensure-data-
center-uptime (accessed: 1/10/2018)
[17] Norouzi-Khangah, B., Mohammadsadeghi-Azad, M. B., Hoseyni, S. M., & Hoseyni, S. M. (2016).
Performance assessment of cooling systems in data centers; Methodology and application of a new thermal
metric. Case Studies in Thermal Engineering, 8, 152-163.
[18] J. Cho, B. S. Kim. Evaluation of air management system's thermal performance for superior cooling
efficiency in high density data centers. Energy Build, 43 (2011), 2145--55.
[19]https://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/unified-
computing/white_paper_c11-680202.pdf ,(accessed: 06/09/2018)
[20] LBNL 2006. https://datacenters.lbl.gov/sites/default/files/DCdesignPGE2006.pdf
“High-Performancen Data Centers”. Berkeley, Calif.: Lawrence Berkeley National Laboratory.
[21] Song, Z., Zhang, X., & Eriksson, C. (2015). Data center energy and cost saving evaluation. Energy
Procedia, 75, 1255-1260
[22]https://electroiq.com/2007/02/environmental-control-systems-and-their-use-in-cleanroom-applications/
(accessed: 8/10/2018)
[23]https://static1.squarespace.com/static/53e6c526e4b0f490b8ffc465/t/580ceabdc534a57edb709d16/14772415
36892/HPC+Data+Center+Cooling+Design+Considerations.pdf (accessed: 2/10/2018)
[24]https://www.vertivco.com/globalassets/shared/energy-efficiency-ebook-vsd-and-ec-fans_00.pdf
(accessed: 2/10/2018)
[25] Menascé, D. A., & Almeida, V. A. (2000). Performance of Client/Server Systems. In Performance
Evaluation: Origins and Directions (pp. 201-218). Springer, Berlin, Heidelberg.
[26] Zhou, D., Yan, Z., Fu, Y., & Yao, Z. (2018). A survey on network data collection. Journal of Network and
Computer Applications, 116, 9-23.
[27]https://www.cisco.com/c/en/us/products/security/what-is-network-security.html (accessed: 26/09/2018)
[28]http://www.who.int/biologicals/expert_committee/Supplement-6-TS-temp-monitoring-ECSPP-ECBS.pdf
(accessed: 10/10/2018)
[29] https://www.carestream.com/clinical-collaboration/sites/default/files/WhitePaper_Cloud-Security-2016.pdf
(accessed: 07/09/2018)
[30]https://www.facilitiesnet.com/datacenters/article/Data-Center-Fire-Suppression-Systems-What-
Facility-Managers-Should-Consider--14595 (accessed: 10/10/2018)
[31] https://uptimeinstitute.com/tier-certification/design (accessed: 07/09/2018)
[32] Bell, M. A. (2005). Use best practices to design data center facilities. Gartner Research, ID,
(G00127434).
[33] https://www.42u.com/measurement/pue-dcie.htm (accessed 01/10/2018)