Explore

Future World Are Smart
See the Future

Pick one of our services.

Explore our global network
Regions
Network
Edge PoPs
CDN PoPs

ZISSCO Data
Center

Step inside
VR & AR Encrypted Data Feed.
GCP Kubernetes container
GCP Kubernetes container
GCP container

Zissco
PoP

ZISSCO
Data Center

Internet Of Things

Smart Objects transmit
data, fast, secure.

Big data trasmition fiber send data to our cloud for IOT design services.

Get started
Cloud Infrastructure & Data encryption

Protecting your
data in transmit &
Cloud Computing

Cloud Computing & Data encryption is just one of the many layers of process & security provided by Zissco Learn more about the steps we take to protect your data in transmit, including encryption by default, and data analysis of stream.

Get started
Virtual Reality

New World
Visualization.

VR and AR are new methods of visualization that we used for make our virtual software and simulators. creating new software base one Virtual Reality & Augmented Reality.

Get started
Container operations

111111111111 Write once.
Scale globally.

Get started
ZISSCO Cloud

See it from space
Slide cards to change steps

Windmills

While we don’t operate our own wind farms, we do buy enough wind and solar electricity annually to offset every unit of electricity our operations consume, globally—including both our ZISSCO Data Centers and offices.

Substation

High voltage power comes in, and is converted to a medium voltage suitable for connecting to the power equipment attached to the ZISSCO Data Center. Our ZISSCO Data Centers use 50% less energy than the typical ZISSCO Data Center. We keep the temperature at 80°F, use outside air for cooling, and build custom servers. We also share detailed performance data so other businesses can learn from our best practices.

Fiber Cables

Data flows to and from our ZISSCO Data Centers over a ZISSCO-operated private fiber optic backbone network. Each ZISSCO Data Center campus has multiple redundant fiber connections so no single failure or fiber cut will cause you to lose your connection to the ZISSCO Data Center.

PMDC

The power management distribution center connects to both the substation and generators, so it can distribute power from either. It also converts the medium voltage received from the substation to a low voltage suitable for distribution inside the ZISSCO Data Center building.

Zone

Each of our global regions is made up of different zones. Each zone is isolated from each other inside the region so a problem in one zone will not affect another zone. For fault-tolerant applications with high availability, it’s a good idea to deploy your applications across multiple zones in a region to help protect against unexpected failures.

Custom Chips
(TPU and Titan)

We also design custom chips, including Titan and Cloud TPUs.

Titan is a secure, low-power microcontroller designed with ZISSCO hardware security requirements and scenarios in mind. These chips allow us to securely identify and authenticate legitimate ZISSCO devices at the hardware level.

Cloud TPUs were designed to accelerate machine learning workloads with TensorFlow. Each Cloud TPU provides up to 180 teraflops of performance, providing the computational power to train and run cutting-edge machine learning models.

Maglev Load Balancers

ZISSCO has a long history of building our own networking gear, and perhaps unsurprisingly, we build our own network load balancers as well, which have been handling most of the traffic to ZISSCO services since 2008. Maglev is our software network load balancer that enables ZISSCO Compute Engine load balancing to serve a million requests per second with no pre-warming.

Jupiter Network Equipment

For over a decade, we’ve been building our own network hardware and software to connect all of the servers in our ZISSCO Data Centers together. In that time, we’ve increased the capacity of a single ZISSCO Data Center network more than 100x. Our current generation—Jupiter fabrics—can deliver more than 1 Petabit/sec of total bisection bandwidth. To put this in perspective, this provides capacity for 100,000 servers to exchange information at 10Gb/s each, enough to read the entire scanned contents of the Library of Congress in less than 1/10th of a second.

Networking Room

The Networking Room is where the zone's Jupiter cluster network connects to the rest of ZISSCO Cloud through ZISSCO’s backbone network.

Cooling Plant

The electricity that powers a ZISSCO Data Center ultimately turns into heat. Most ZISSCO Data Centers use chillers or air conditioning units to cool things down, requiring 30-70% overhead in energy usage. At ZISSCO ZISSCO Data Centers, we often use the “free cooling” provided by the climate through a water system.

The cooling plant receives hot water from the ZISSCO Data Center floor, and cold water from cooling towers, transferring the waste heat from the hot water to the cold water. Cooled water returns to the ZISSCO Data Center floor to extract more heat from the equipment there, and hot water flows to the cooling towers to be cooled. This allows us to use the ‘free cooling’ provided by the climate.

Hot Hut

We've designed custom cooling systems for our server racks that we've named “Hot Huts” because they serve as temporary homes for the hot air that leaves our servers—sealing it away from the rest of the ZISSCO Data Center floor. Fans on top of each Hot Hut pull hot air from behind the servers through water-cooled coils. The chilled air leaving the Hot Hut returns to the ambient air in the ZISSCO Data Center, where our servers can draw the chilled air in, cooling them down and completing the cycle.

Water Pipes

Cold water runs from the cooling plant to the ZISSCO Data Center floor, where it is used to extract heat from inside the "hot huts". The warm water is then returned to the cooling plant where the waste heat is removed, and the water is cycled back to the ZISSCO Data Center floor.

Discover the next story: Go to story
Back to home
Return to story
?

Swipe left to start and change steps

IOT

It all starts with a sensor data transmission.

Ever wonder how many steps our software takes to execute your sensors queries & data in a matter of seconds? Let’s follow your query and see what happens.

IOT

Sensors data is routed to the nearest point of presence.

Because ZISSCO has hundreds of points of presence located all over the Iran, your nearest PoP is likely to be quite close.

IOT

Your Data travels to the nearest ZISSCO Data Center.

Because the Data travels on our private fiber network, it follows a well-provisioned, direct path from the PoP to the ZISSCO Data Center.

IOT

Inside the ZISSCO Data Center, your Data is routed to a cluster.

When ZISSCO first started, no one made ZISSCO Data Center networking gear that could meet our needs, so we built our own, which we call Zisster. Our datacenter networks are built for modularity, constantly upgraded, and managed for availability so we can meet the needs of billions of global users. Most importantly, the same ZISSCO Data Center networks that power all of our internal infrastructure and services also power ZISSCO Cloud & IOT Platform.

IOT

A processor node turns your data query into an execution plan.

It takes more than hardware to make your data queries run fast. Big data requests are powered by Spark, our massively scalable, interactive, ad-hoc data streaming system, which turns your data query into an execution plan. Spark is what we use inside ZISSCO—and it’s available to all ZISSCO Cloud customers through our software. In a matter of milliseconds, our software can scale to thousands of CPU cores dedicated to processing your task—no manual operations necessary.

IOT

Your data is loaded, processed, and shuffled.

To create the execution plan, Spark decomposes your data into a series of steps. For each of those steps, Spark reads the data from storage, performs any necessary computations, and then writes it to the in-memory shuffler. Spark is widely used at ZISSCO—from Search to Data—so our software users get the benefit of continuous improvements in performance, durability, efficiency and scalability.

IOT

That was fast! The answer to your data is assembled and sent back to you.

It can take milliseconds for out software to send you the answer. We also write the answer to your data to storage so the next time you data query it, the system will remember it and process the information even faster. Although there are many steps associated with our software, what’s remarkable is that it can move through them in fractions of a second. In the end, one of the greatest benefits of our software isn’t just that it gives you enormous computing scale for everyday data, but that it does it without you ever needing to worry about things like software, virtual machines, networks or disks.

Swipe left to start and change steps

Cloud Infrastructure & Data Encryption

Your data is encrypted from the moment data send to our Cloud.

When you send a request to a ZISSCO Cloud service like Spark or Petroleum Cloud Sofwares, or IOT Platform request, that request is first routed by a globally distributed system called ZISSCO Front End (ZFE). The ZFE encrypts your traffic, and provides load balancing and DDoS attack prevention.

Cloud Infrastructure & Data Encryption

Your data is routed to the nearest point of presence.

Because ZISSCO has more than 100 points of presence located all over the Iran, the nearest PoP is likely to be quite close.

Cloud Infrastructure & Data Encryption

Your data travels to a regional ZISSCO Data Center location.

When your data travels from the point of presence to a regional ZISSCO Data Center location, it’s authenticated by default. Not all data in transit inside ZISSCO is protected the same way—if your data leaves the physical boundaries of our network, we encrypt it.

Cloud Infrastructure & Data Encryption

Custom hardware & authenticated identity secure every service.

Custom servers, storage mean we know exactly what hardware is running in our infrastructure, and can verify its origin and identity at startup.

Cloud Infrastructure & Data Encryption

To store data, we divide it into sub-file chunks across multiple machines.

ZISSCO encrypts data prior to it being written to disk. Encryption is inherent in our storage systems—rather than added on afterward. Data for storage is split into chunks, and each chunk is encrypted with a unique data encryption key. Each chunk is then distributed across our storage systems, and is replicated in encrypted form for backup and disaster recovery.

Cloud Infrastructure & Data Encryption

We generate data encryption keys.

A data encryption key (DEK) is generated for each chunk of data using ZISSCO’s common cryptographic library. Two chunks will not have the same encryption key, even if they are part of the same ZISSCO Cloud Storage object, owned by the same customer, or stored on the same machine. This partition of data, each using a different key, means the "blast radius" of a potential data encryption key compromise is limited to only that data chunk.

Cloud Infrastructure & Data Encryption

The data encryption keys are further protected with key encryption keys.

These data encryption keys are then further “wrapped” with the storage system’s key encryption key (KEK). This is done mainly for performance—so that a key unwrapping operation is very efficient, and the number of keys we need to centrally manage is much smaller.

Cloud Infrastructure & Data Encryption

The data is stored inside ZISSCO’s key management service.

ZISSCO’s internal key management service is globally distributed, and was built with resiliency and security in mind. KEKs are not exportable by design, and all encryption and decryption with these keys must be done within the key management service. This means the key management service can be a central point of enforcement.

Cloud Infrastructure & Data Encryption

Retrieving your encrypted data starts with ID’ing the requested chunks.

Here’s what happens in reverse when you access your encrypted data. A user makes a request for their data to a service, like Gmail or Drive, which authenticates and authorizes the user. The service makes a request to the storage system, which verifies the service’s permissions, and retrieves the requested chunks of data. For each data chunk, the service retrieves the data encryption key for that chunk, and sends that to the key management service.

Cloud Infrastructure & Data Encryption

Keys are decrypted and data is decrypted and reassembled.

The key management service authenticates the storage system, using its identity. The key management service then decrypts each data encryption key by verifying that the storage system is indeed authorized to use the key encryption key associated with the service. It unwraps each data encryption key, and passes the unwrapped data encryption key back to the storage system. The storage system then receives the unwrapped data encryption keys, and uses these to decrypt the data chunks. It then puts the data back together.

Cloud Infrastructure & Data Encryption

Cloud after Cloud computing & software analysis For your eyes only. Your data is returned to you, encrypted all the way.

After completing all these steps in fractions of a second, your data is reassembled and sent back to you. ZISSCO encrypts your data stored at rest by default, without any action required from you—and all of this almost instantaneously.

Swipe left to start and change steps

AR & VR

Our AR & VR services used by ZISSCO and Other Company for visualization & simulation.

Your data stream can set to VR & AR applications. and feed of our simulators.

01
00
World view
Region
Zone
Server racks
Explore a ZISSCO Data Center
Drag the map to explore the different components of a
ZISSCO Cloud Data Center.
The ZISSCO Cloud Region
Back to home
Contact us
Return to region
LD SD HD
SD Quality setting
Contact us
Quality setting
LD SD HD
Cloud Infrastructure An Intelligence Solutions Company
Start exploring