• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Solving Your Data Center’s Cable Addiction

Which of these best describes your data center:

A) Rows of neatly bundled cables all running in an ordered direction

Cable Image A
Credit: Cisco

B) A hodgepodge of wires and cables going every which way


Credit: TechEBlog

Getting to option “A” would be great, but it can take time and also carry a heavy price tag. However, there is a choice “C.”

C) An agile and powerful data center with three-quarters fewer cables and reduced infrastructure costs

Cable Image C
Credit: Cisco

That’s the advantage of Unified Computing System (UCS) from Cisco. Consider a typical data center set up. Each server you add can require:

  • Two 10G Links for data
  • Two 8G HBAs for storage
  • A Management link
  • A KVM link
  • KVM port
  • Managed PDU Port
  • Two 10 Ethernet ports
  • Two 1 G Ethernet ports
  • Two 8G FC storage ports

You may also have to add a server to a Managed PDU so you can power it on and off. You’ll also need some way of tracking what port the server is on or else you run the risk of accidentally powering off the wrong server. If you want to manage the server remotely, you’ll need to add it to a KVM and once again be sure you’re keeping track of the port.

That’s a lot of cables. If the cabling is anything less than a sight to behold, then it only adds to the already complex work of managing and configuring your data center.

In a UCS-powered data center, the Fabric Interconnect (FI) is wired once and then each chassis gets between four to eight cables to the FI. Each rack mount server runs only two cables to the FI. Configuration, monitoring, KVM and power are all controlled by the UCS Manager which lives on the FI and is backed by Cisco High Availability technology, so you’ll have uninterrupted access to your apps, data, and more from anywhere. And the price tag is comparable to a traditional set up.

Let’s take a closer look at some of the other savings:

  • an 86% reduction in provisioning time
  • a 74% reduction of ongoing management costs
  • a 53% reduction of power and cooling costs

To learn more about this and other cutting edge solutions for your data center, be sure to register for the 2015 Arraya Tech Summit. This free event will be held on June 4th, 2015 at the Sheraton Valley Forge in King of Prussia. It features courses geared specifically toward a tech-savvy audience, presented by Arraya’s renowned team of engineers. Attendees will have the opportunity to participate in deep-level technical discussions that focus on the issues and tools that matter most to today’s IT professionals. The lessons and skills you and your team will walk away with can propel IT to a whole new level, enabling the rest of the business to follow suit.

Or for more information now, reach out to your Arraya Account Executive or visit us at www.ArrayaSolutions.com. You can also stay in touch with us by following Arraya on Twitter @ArrayaSolutions.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}