1. Introduction

Despite the winning trend of moving IT hardware to a distant location like datacenter or cloud , there still are cases when stack of servers and active network devices should be installed within easy reach of the local business (Armbrust et al . 2010, 54 - 58) . Install ing a larg e server configuration within working office space is not the best solution for this need. Doing so, one will ea sily exceed the acceptable level of noise and thermal load on the surrounding office . Moreover , access to the server s will be allowed to all people can walk into the office. The better way to address these issues is organizing a Server R oom dedicated to ru nning IT installations (Marks 2000, 99 . ) With dedicated room noise can be reduced at the perimeter of the facility, air conditioned within the room and i mplementing a ccess control and keeping the accurate log of visitors are straightforward task ( AllBusiness).

Regardless of a size of facility you are building, major data centre or small server room, result should correspond to the business criticality of the information held within the facility (Memon et al. 2009, 351). It is essential that the cho sen design is right for particular requirements of I C T . S erver room is the heart of IT operations, and therefore it must be well - thought - out before built.

In our research we provide a dynamic model of a Secure Server Room as a result of collecting and crit ically analyzing existing recommendations coming from small datacenter facilities providers , IT industry standards and ICT practitioner s . From this critical analysis we create recommendations for the person having IT Server Room building project at hands. While creating recommendation we also largely used our own 15 years experience as IT Infrastructure solutions practitioner and consultant.

We provide a template (Appendix B ) wit h guidance for making advanced Work O rder to a Construction Company which is c hosen to build the facility . This template can be also used as a check list for a complete Server Room building project. At the end we share some thoughts about validity of research deliverables basing on used research method and knowledge sources . We also ponder , what approach is recommended to practitioner while implementing results to the specific situation, where our model is used.

There are several books (e.g. Snevely 2002), web - pages and industry standards (e.g. ANSI/BICSI 002 2011) describing challenges and provide solutions to them regarding building secure facility for IT hardware like 7 Lately companies began building server rooms with multi - zone approach setting different power density levels (zones) within the single server room . This approach may help cutting down capital expense. The basic idea is that different use of ICT require s different levels of processing power from servers and space for growth. Theref ore designing floor - space with different density support makes sense. (Cappuccio 2009.) We outline multi - zone data centers out of this research interest and concentrate on generic “single zone” server room. In this research we concentrate on Data Center of Tier 1 and Tier 2 basing on typology above, and call it “ server ro om”. Reason for choosing such scope is practical. As many other globally operating companies, the Enterprise where author is working in at the time of doing this research, have a policy of moving IT data operations to big redundant data centers, which can be described as Tier 4 basing on TIA - 942 typology. This business decision reduces significantly efforts in design and maintenance of data centers by eliminating from company’s assets local server rooms. At least in theory. In practice the need for locally maintained server rooms have not disappear by decision of concentrating compu ting capacity in data centers. Large v ariety of Business demands in IT area just does not support 100% clear so lutions fit for everyone. For instance, R&D teams use locally hardware they need an instant physical access to. Other case is , when Enterprise’s operational area expands to places in the world , where neither a Tier 4 data centers nor stable data connection s are available. In such countries and regions secure place for IT hardware (e.g. File and Print Server) withi n the office space should be provided during the Office building project . Ad hoc server room specifications increase a risk of IT security b reach for a single office, and also for the entire Enterprise IT because the IT Security is as strong as its weakest link. I was involved in building several server rooms in several companies; some of the companies were globally working enterprises. Scope of ser ver rooms’ types I needed to deliver was from “WLAN router in the metal box on the wall” solution to a Global Network Operations Center server room facility. One shared attribute in all these project s was that very little and fragmented instruction for th e project manager was provided. This research aims to help people who got tasks of designing and building server room to their responsibility in companies where building and maintaining datacenters is typically outsourced to the suppliers, and where knowled ge management system does not contain up to date instructions for local standalone server room facility building. Use of this research empower IT Infrastructure Project Manager to be able presenting advanced design for 10 position of the server room you must pay attention to aspects related to equipment transport paths , security, noise level , high power electrical fields, fire resistance , heating and cooling implementation related constrains , conduit paths, floor load tolerance and general building structures ’ position . Whilst designing server room it is important for t he IT project manager to actively provide her input to a higher level decision making teams regarding all factors affecting future performance of the server room facility . (Nygaard 2010, 4.) Too much flexibility in one or many of the factors will for sure reduce the productivity of ICT in the future , and may turn your life as a facility user a personal nightmare . For example, not having space for fire resistant safe cabinet in combination with SOX rules (see for example DataBank 2009) may force you saving backup cartridges at your home. Small favor to other stakeholders like allowing a w ater pipe crossing the server room is a ticking time bomb, which will turn in full scale disaster not “if” but “when” , and being sewage pipe adds an unforgettable flavor to it . 1.1 Location Server room construction planning begins from choosing the proper location which suits installation and functionality constrains of ICT infrastructure elements. Some of the most important decisions here are made before the first ser ver rack is ordered and the first piece of network ca ble is laid. Your first task in finding the best spot for the server room inside e xisting building is to determine your server room size. These requirements should be based on existing and expected futur e needs. (SearchStorage Server room should be designed with enough option s for a growth during its life time . Free or easy to obtain space should be left in the server room or adjacent areas . As spoken earlier, stakeholders of the building p roject should collectively agree and approve space needs of every business area including needs for the future expansion of ICT. The allocated space should be located in a suitable, easily accessible and secure part of the building. (Releford, 2000.) Nygaard introduces that server room and its conduit paths sh ould be in place for the whole lifetime of a building complex. T he company will have to live with design approved by stakeholders of a building project for a long time . He claims that g eneric cabl ing systems will have a lifetime o ver 10 years before getting technologically outdated . (Nygaard 2010, 6.) We do not agree that in all cases such a long use time should be considered. Indeed, l ife time of a building complex could be as long as 100 and mor e years! We believe that this is clearly not a place for IT department’s decision making. IT should present

twitter share


All the information(s) in this website are intended as a personal reference or notes only. This website shall not be responsible for any loss, damage or injury that may be suffered by anyone in connection with the use of any of the data and/or information found this website.

© 2021   |  Joomla Templates by
Back to Top