Table of Contents....5
About the Authors....13
Introduction....15
How Did It All Begin?....15
Today’s IT Infrastructures....17
Chapter 1: The Architecture of IT Cloud Services....19
1.1 Cloud Services....22
1.2 IT Services Provided by CSP....23
1.2.1. Data as a Service (DaaS)....24
1.2.2. Communications as a Service (CaaS)....25
1.2.3. Infrastructure as a Service (IaaS)....25
1.2.4. Platform as a Service (PaaS)....26
1.2.5. Software as a Service (SaaS)....26
1.2.6. Business Process as a Service (BaaS)....27
1.2.7. X as a Service (XaaS)....27
1.3 Deployment Models of Cloud Services....28
1.3.1. Deployment Models....29
1.3.2. Public Model....29
1.3.3. Private Model....29
1.3.4. Community Model....30
1.3.5. Hybrid Model....30
1.4 Summary....31
Chapter 2: Data Center Facilities....33
2.1 Data Center Facility Design....35
2.2 Established Standards for Data Centers....36
Uptime Institute Tier Standard....36
EN 50600 Series....38
ASHRAE....38
Other Examples....38
2.3 Space....39
Physical Space....39
Lighting....40
Noise....40
Weight....40
2.4 Facility Management....40
2.5 Infrastructure....41
Racks....41
2.6 Cooling....42
Temperature....42
Cooling....42
2.7 Power....44
Power Demands of DC....44
Uninterruptible Power Supply (UPS)....45
2.8 Security....48
Access Control....48
2.9 Summary....49
Chapter 3: Compute and Virtualization....50
3.1 Hardware....51
3.2 Software....52
3.3 Types of Computer Systems....53
3.4 Purpose of Computer Systems....55
General-Purpose Computer....55
Specialized Computer Systems....57
3.5 Data Centers....58
3.6 Compute Resources....60
Compute Building Blocks....60
Rackmount Server....60
Benefits of a Rack Server....61
Blade Server....63
Benefits of a Blade Server....64
High-Performance Computer or Supercomputer....65
3.7 Computer Operating Systems....69
Key Functions of an Operating System....69
History of Operating Systems....70
Operating System Functions....73
Operating System Types....78
Embedded Operating Systems....78
Real-Time Operating Systems....79
Server Operating Systems....81
Distributed Operating Systems....82
Cloud Operating Systems....85
Operating Systems for Client Systems....87
3.8 Compute Virtualization....87
Hardware Virtualization....87
Types of Hardware Virtualization....88
Autonomic Computing....89
Container....91
Benefits of Containers....92
Kubernetes....93
Control Plane....94
Key Value Store....94
Nodes....95
Pods....95
API Server....96
Kubernetes Scheduler....96
Kubernetes Controller Manager....97
Types of Kubernetes Controllers....97
Cloud Controller Manager....98
Controllers with Cloud Provider Dependencies....98
Kubernetes Node Components....98
3.9 Edge Computing....100
3.10 Compute Resiliency....104
Definition....104
Fault-Tolerant Computing....104
Resilient Computing....106
Federated Architecture....108
3.11 Provisioning and Administration of Compute Resources....109
Computer Workload....109
Types of Computer Workloads....109
Workload Deployment....112
Benefits and Challenges of Private and Public Clouds....113
CSP....113
Benefits....113
Risks....114
Private Clouds....115
Benefits....115
Challenges....116
Kubernetes Workload Management....116
3.12 Charging for Compute Resources....119
Terminology....119
Pricing Variables....120
Dashboards....121
Charging Structure....121
3.13 Summary....122
Chapter 4: Storage and Virtualization....123
4.1 Storage Resources....125
Primary Storage....125
Secondary Storage....127
HDD....128
SSD....129
Tertiary Storage....130
Offline Storage....130
4.2 External Storage Systems....132
Direct Attached Storage (DAS)....133
Network-Attached Storage (NAS)....134
Storage Area Network (SAN)....135
4.3 External Disk Configurations....137
JBOD....137
Disk Arrays....138
RAID....139
RAID Levels....140
RAID 0....140
RAID 1....141
RAID 2....142
RAID 3....143
RAID 4....143
RAID 5....143
RAID 6....145
Nested RAID Levels....145
RAID 01....145
RAID 10....146
RAID 50....147
4.4 Storage Virtualization....148
Access Modes for Virtualized Storage....149
Types of Storage Virtualization....150
Symmetric and Asymmetric Virtualization....151
Virtualization Methods....152
Storage Virtualization Benefits....154
4.5 Storage Security and Resilience....155
Data Resiliency....156
Key Methods to Ensure Storage Data Security....157
Data Protection....158
Data Security....158
Threats to Data Security....159
External....159
Internal....159
Areas of Vulnerabilities of Storage System....160
Cloud Storage....160
Physical Security....160
Data Encryption....160
Deletion of Data....161
Data Storage Security Principles....161
Availability....161
Integrity....161
Confidentiality....161
Best Practices for Data Resiliency....162
Storage Security Implementation....165
4.6 Storage Provisioning and Administration....166
Classic SAN Provisioning....166
Storage Provisioning in Modern DCs....167
Thick Provisioning....167
Thin Provisioning....168
Storage Pools....168
Storage Allocation Tiering....171
Comparison of Public and Private Storage Infrastructure....171
4.7 Charging for Storage Resources....172
Cost-Saving Options for Cloud Storage....174
4.8 Summary....175
Chapter 5: Network....177
5.1 DC Network Components....178
Cables....178
Cables for Power Distribution....179
Cables for Data Connection....179
Structured Cabling....180
Switches and Router....181
DC Switches....183
Functions....183
Capacities....183
Connection Speed....183
Ports....184
Network Management....184
Router....184
DC Gateway....185
5.2 DC Network Topology....186
Centralized Topology....186
Zoned Network Topology....187
Top-of-Rack Topology....188
Mesh Network Topology....188
Multi-tier Network Topology....189
Software-Defined Networks....191
SDN Architecture....192
SDN Application....193
SDN Control Plane....193
SDN Data Plane....193
5.3 Network Resiliency....194
Network Fault Management....194
5.4 Network Provisioning and Administration....195
Network Provisioning....195
Network Administration....196
Monitoring....197
Network Administration Areas....199
Security Management....199
Account Management....199
Fault Management....199
Configuration Management....200
Performance Management....200
5.5 Resilient Network for IT Data Center....200
Security Threats....201
Physical Network Security....201
Technical Network Security....201
Administrative Network Security....201
5.6 Resilient Network Architecture for IT Data Centers....202
5.7 Summary....204
Chapter 6: Backup....206
6.1 Evolution of Backup Systems....206
6.2 Today’s Backup Systems....209
Backup in Private Data Centers or Private Clouds....209
Cloud-Based Backup Systems....209
6.3 Types of Backup Methods....210
6.4 Disaster Recovery Planning....212
Understanding Disaster Recovery....213
The Disaster Recovery Process....213
Key Considerations in Disaster Recovery Planning....214
The Role of Technology in Disaster Recovery....216
6.5 Summary....216
Chapter 7: Data Center Security and Resiliency....218
7.1 Vulnerabilities of Computer Systems....219
Denial-of-Service Attack....219
Phishing....220
Spoofing Attack....220
Eavesdropping....221
Backdoor....222
Direct-Access Attacks....222
Privilege Escalation....223
Reverse Engineering....223
Multivector and Polymorphic Attacks....223
Social Engineering....223
Malware....224
7.2 Motivations and Impact of Attacks....225
Impact of Security Breaches....225
Attacker Motivation....225
7.3 Security by Design....227
Security Architecture....229
Security Infrastructure....229
Vulnerability Assessment and Management....230
Reducing Vulnerabilities....232
Hardware Protection....233
Access Control Lists....236
Security Tools....237
Security Training....238
Cyber Hygiene....238
Incident Response....239
Cybersecurity Planning....241
7.4 DC Resilience....242
DC Security....242
Critical Services....245
Achieving Data Center Resiliency....245
Improving Resilience....246
7.5 Summary....247
Chapter 8: IT Support Services....250
8.1 IT Help Desk....251
Options to Contact a Help Desk....252
Call the Help Desk....252
IVR Systems....252
Several Functions Offered by IVR Systems....253
Benefits of Using an IVR System for a Call Center....253
Drawbacks of the IVR System....254
Help Desk....255
Pros....256
Cons....256
Email....256
Pros....257
Cons....257
Online Chat....257
Pros....258
Cons....258
Chatbots....258
Benefits of Chatbots....259
Summary – Options to Communicate with a Help Desk....260
Trouble Ticketing Systems....260
Trouble Ticketing Dashboard....261
8.2 IT Service Desk....264
8.3 Remote DC and Edge Computing Support....267
Remote DC Support....267
Edge Computing Support....267
8.4 Summary....270
Chapter 9: Summary....271
9.1 Resilient IT Infrastructure....272
9.2 IT Services Provided by Cloud Service Providers....272
9.3 Data Center....273
9.4 Compute....274
9.5 Storage....276
9.6 Network....278
9.7 Backup....280
Backup System....280
9.8 Resiliency....281
9.9 IT Services....283
Help Desk....283
Service Desk....284
References....285
Index....297
Embark on a comprehensive journey into the intricate world of IT infrastructure, with an in-depth look into the transformational role of secure, private data centers in today's digital era. This exploration uncovers the multi-faceted domains of IaaS, PaaS, and SaaS, examining the primary components of modern IT infrastructure—compute, storage, backup, and beyond. As technology continues to surge forward, cyber threats evolve in tandem, prompting a dire need for reinforced data center security and resilience.
This book provides readers with a holistic, layered understanding of IT operations in our interconnected age. You will dive deep into the heart of technological advancements, appreciating the symbiotic relationship between evolving hardware capabilities and the progressive nature of cloud services.You will understand the intricacies of data center design, management, and the strategic role they play amid the growing reliance on both private and public clouds. Asindustries pivot towards a more digital-first approach, this book serves as a guiding star, illuminating the pathways, challenges, and opportunities of the vast IT infrastructure landscape.
IT professionals: from system administrators and network architects to IT managers and data center overseers, plus students and tech enthusiasts seeking deep insights into IT infrastructure