homeland defense journal conference
TRANSCRIPT
Role of the Carrier Hotel in Data Center and
Networking Strategies John R SavageauManaging DirectorCRG West
Carrier Hotels & Data Centers
• Intro to CRG West and Carrier Hotels• One Wilshire Case Study• Topics in Outsourcing
USAUSA
ChileChile
GermanyGermany
CanadaCanada
MexicoMexico
AustraliaAustralia
KoreaKorea
IndiaIndia
ChinaChina
Who… is CRG West?• Wholly-owned subsidiary of the Carlyle Group• One Wilshire Building in Los Angeles• Eight US data centers and carrier hotels• Any2 Exchange• Focus on real estate
– Colocation– Interconnection– Power– Cooling– Services
ISP
ISP
ISP
ISPISP
ISPVoIP
VoIP
VoIP
VoIPVoIP
VoIP
CSP
CSP
CSP
CSP
Gaming
Gaming
Gaming
Gaming
ISP
ISP ISP
Any2 Wilshire
Any2 MPT
Any2 Wilshire Annex
Any2 Exchange Connected Communities
Carrier Hotel Theory
• Definition• Background• Location• Cable distribution• Interconnection• IP Exchange
Role of the Carrier Hotel
The Carrier Hotel provides an essential point for The Carrier Hotel provides an essential point for carriers to interconnect their networks, without a carriers to interconnect their networks, without a
need for lengthy backhaul of their network to cable need for lengthy backhaul of their network to cable heads, metro, or long distance fiber terminals.heads, metro, or long distance fiber terminals.
The Carrier Hotel is rapidly evolving to include The Carrier Hotel is rapidly evolving to include support for packet networks and other virtual support for packet networks and other virtual
network providers. network providers.
Born of Competition
• One Wilshire is a product of deregulation• PacBell refused MCI access to their rooftop for
microwave antennas• One Wilshire opened the building to MCI, Sprint,
PacWest, and other emerging CLECs • End-to-End ownership of submarine capacity
allowed foreign carrier presence in the United States – eliminating ½ circuits
NTTNTTPOPPOP NTTNTT
POPPOP
North American &North American &Global Carrier InterconnectionGlobal Carrier Interconnection
NTT ManagedNTT ManagedCapacityCapacity
The Times Do Change…
Why Carrier Neutral?• Benefit to Tier 2 and Tier 3 networks• Allows competitive pricing in one location
– Reduced transit costs– Alternate routing
• Multiple connections to multiple carriers• Non-paid peering • Open marketplace to sell services• Landlord does not make money on
telecommunications services – just real estate
Benefits of a Carrier Hotel• Eliminates backhaul• Promotes Tier 1 carrier bypass• Reduces interconnect provisioning time• Provides a “DMZ” for competitors
– Tier 1 carrier interconnect– Disaster recovery
• Internet Exchanges– MAE West– Any2– Big APE– PAIX– LINX
Intro to One Wilshire• 30 floors• 650,000sqft• 24 floors dedicated to telecom & technology• 260 direct telecom-related tenants• >400 tenants including sub-tenants• >150 street level building conduit penetrations• CRG West manages building for owner• Fully virtualized with Market Post Tower and Wilshire Annex
(900 N Alameda)• World’s most connected meet-me room
The Meet-Me-Room
Getting to the Carrier Hotel
Carrier Hotel Building(Street Level)
POE
POE
POE
Grand Ave
Wes
t 6th W
est 7th
Wils
hire
Blv
d
Manhole
Manhole
Manhole
Car
rier F
iber
Car
rier F
iber
Car
rier F
iber
• High density cable routesHigh density cable routes• Diverse carriersDiverse carriers• Access to manholesAccess to manholes• Access to cable headsAccess to cable heads
Vertical Distribution
Meet-Me-Room
POE
POE
Main Distribution Frame
Tenant A
Tenant B
Tenant C
Tenant D
Tenant E
Tenant F
Tenant G
Tenant H
Tenant I
Tenant
Tenant
Tenant
TenantH
Tenant
Tenant
Tenant
TenantG
Tenant
Tenant
TenantC
TenantE
TenantF
TenantD
Tenant
Tenant
Tenant A
Tenant
Tenant
TenantB
Tenant
Tenant
Tenant
Con
duits
and
Ris
ers
Con
duits
and
Ris
ers
• Some carriers have switching in buildingSome carriers have switching in building• Some carriers have only fiber terminalsSome carriers have only fiber terminals• Many tenants are virtual operatorsMany tenants are virtual operators• The MMR is a hub for the vertical dimensionThe MMR is a hub for the vertical dimension
Horizontal Distribution
VerticalDist
A B
MMR Tenant
MMR Tenant
MMR TenantMMR TenantMMR TenantMMR Tenant
MMR Tenant MMR TenantMMR Tenant
MMR TenantMMR Tenant
MMR TenantMMR Tenant
MMR TenantMMR TenantMMR TenantMMR TenantMMR Tenant
Main DistributionFrame andMUX Room
Interconnections in Action
Any2 Exchange
What… is Data Center Outsourcing?
• Its all about infrastructure– Concrete– Power– Air Conditioning– InterConnections– Security
Is this your organization’s core competency?Is this your organization’s core competency?
When… should you consider Data Center Outsourcing?
• Recognize the “trigger points” within an existing facility– Sizing and growth– Cost of infrastructure– Cost of labor
• Disaster recovery/business continuity requirements• Regulatory requirements• Business relocation – build or buy?• Resource consolidation • Competitive advantage CRG West Data Center CRG West Data Center
Construction Target:Construction Target:
$<= 400/sqft$<= 400/sqft
Evaluating a Potential Data Center• Structural, mechanical, and electrical architectures• Operations Processes
– M&E maintenance and operations– Order entry and service management– Escalation path– Access to site and equipment
• Key performance indicators• Clear account management• Loading dock & deliveries
Structural Considerations
• Floor loading• Earthquake rating• Slab to slab (floor to ceiling) space
– VCT Flooring?– Raised flooring?
• Flood zone• Environmental
Electrical Systems• Minimum 1+1 utility/generatorMinimum 1+1 utility/generator• AC/DC, 208Y, flexible amperageAC/DC, 208Y, flexible amperage• Systems scalingSystems scaling• Preventive maintenancePreventive maintenance• Routine testing (load bank, etc)Routine testing (load bank, etc)
When Disaster Strikes…
…Will Your Systems Perform?
Correct Planning Assumptions
• 4000 amp 480Y buss duct4000 amp 480Y buss duct• Megger tested at 200 voltsMegger tested at 200 volts• Did not plan for Florida climateDid not plan for Florida climate
Physical Security Systems
• Anything is possible – for a cost• Determine your risk threshold• Actual security events are rare
RiskRisk
CostCost