Protecting Your Server Room from Environmental Threats



Similar documents
White Paper: Server Room Environmental Monitoring

Sensor Monitoring and Remote Technologies 9 Voyager St, Linbro Park, Johannesburg Tel: ;

Access Control and Operating Conditions Monitoring System for Telecommunication and Server Racks

DCIM Data Center Infrastructure Monitoring

Choosing Close-Coupled IT Cooling Solutions

BNA FEDERAL CREDIT UNION DISASTER RECOVERY PLAN

User Manual. RK-2d / RK-2t. dedicated KVM switch and rackmount screen technology. Designed and manufactured by Austin Hughes

The Buhl Electric Secure Home. Brought to you by Buhl Electric. Security Packages and Options

StorTrends 3400 Hardware Guide for Onsite Support

ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems

Application Guide Guardian Over the NET Server Room Solution

MCR1900 Media Converter 19-Slot Chassis

Portable Air Conditioner. OWNER S MANUAL Read these instructions before use. Model: MN12CES / MN10CESWW

Advanced Fencing and Security Technologies Ltd

Monitoring the Computer Room s Physical Environment A white paper from Sensaphone, Inc.

Zertico Rack Monitoring Unit

Portable Air Conditioner. OWNER S MANUAL Read these instructions before use. Model: MM14CCS. Voltage rating: 115V~60Hz Power rating : 1400W

Ultrasonic support removal tank

ALARM SYSTEM INSTALLATION GUIDE

Major Risks and Recommended Solutions

User s Guide. Security Systems D220

Air Conditioner Water Heater - A Product of HotSpot Energy LLC

Keys to understanding your alarm system

Application Briefs: Remote Office Environment

Vertical Display and Storage B SKOPE Gen2: Three Door Chiller

ISO IEC ( ) INFORMATION SECURITY AUDIT TOOL

SWIMMING POOL HEAT PUMP

securıty HOME home protection 101

SMART SENSOR COLLECTION

Ammonia Detection System Codes and Design Specifications

Introducing Tripp Lite s PowerAlert Network Management Software

CenterMind G+ Smart and Proactive Environment Monitoring

Portable Air Conditioner

Rogers Smart Home Monitoring QUICK START GUIDE ROG_6093_QST_GDE_EN.indd 1 9/22/12 8:29 AM

Wireless Alarm System. Window/Door Sensor. User s Manual. Choice ALERT. Control all Sensors & accessories from one location

Water Management & Damage Prevention:

Introduction, Overview & Justification

APC APPLICATION NOTE #112

Portable Air Conditioner. OWNER S MANUAL Read these instructions before use. Model: MF08CESWW. Voltage rating: 115V~60Hz Power rating : 800W

CARING FOR YOUR WATER HEATER

U.S. Department of Housing and Urban Development Office of Public and Indian Housing. A Good Place to Live!

Best Practices for Wire-free Environmental Monitoring in the Data Center

dedicated KVM switch and rackmount screen technology User Manual IP-S101 Combo KVM Extender Designed and manufactured by Austin Hughes

RVH/BCH Data Centres Proposals for Surge Protection and Ventilation

2» 10» 18» 26» PD »

Data Center and Computer Room Services Specialty Services Data Center and Computer Room Products Sub-Floor Cleaning

How To Run A Data Center Efficiently

Dehumidifier Users manual. For Models: DH45S DH65S

FLOOD SENSOR. perfection in every detail. Home intelligence. Patent Pending

SoftRAID 5 QUICK START GUIDE. for OWC ThunderBay

Understanding Alarm Systems

Important Safeguards

How To Use A Sata Dsa Hard Disk Storage System

ReadyNAS OS 6 Desktop Storage Systems

LET S GO. Get your Ultra Broadband ready Business gateway up and running

GNOME PELLET E.I. Pellet Heater Owner's Manual Installation and Operating Instructions. Please read this entire manual before installation.

Server Room, Data Centre Management and Monitoring Solutions

LYNX Touch Small Business Solutions DYNAMIC, FULL COLOR SELF-CONTAINED BUSINESS CONTROL SYSTEM. Your Connected Business

Considerations for a Highly Available Intelligent Rack Power Distribution Unit. A White Paper on Availability

PROAIR Water-Cooled Air Conditioner. CR43WC Model INSTRUCTION MANUAL. Rev. E 2013 Pentair Technical Products P/N

Portable Air Conditioner. OWNER S MANUAL Read these instructions before use. Model: MM14CHCSCS

Cooling Small Server Rooms Can Be. - Jim Magallanes Computer Room Uptime: Uptime Racks:

14. Troubleshooting Guide

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

Why is my air conditioner dripping on my customers?

Daker DK 1, 2, 3 kva. Manuel d installation Installation manual. Part. LE05334AC-07/13-01 GF

SERVICE INSTRUCTION R410A. WALL MOUNTEDtype INVERTER SPLIT TYPE ROOM AIR CONDITIONER. Models Indoor unit Outdoor unit

securıty HOME home protection 101

PTAC Preventive Maintenance Guide. Step-by-step instructions and information to keep your units operating in peak condition

Tk20 Network Infrastructure

5 Reasons. Environment Sensors are used in all Modern Data Centers

Section 7. Evaporator thermistor. Under-and-over pressure safety switches. Connections to the ECU

How to Save a Wet Cell Phone

Thank you for your support and welcome to Maxis! Yours sincerely, Maxis

How To Improve Energy Efficiency In A Data Center

USER INSTRUCTIONS FOR GET PORTABLE 12k BTU AIR CONDITIONER MODEL No. GPACU12HR

Industrial-Grade UPS System Heavy-duty power protection for harsh industrial environments

How to Prevent Liquid Damage Property Losses

SC100 Series Seismic Vibration Sensors. The Best Way to Protect High-Risk Commercial Assets

Using Portable Spot Air Conditioners in Industrial Applications

False Alarm/Unwanted Fire Signals Reduction Guidance

Split Type Room Air Conditioner. KSWM units

Enterprise Remote Monitoring

Service & Maintenance:

Energy Saving Tips. They can have a dramatic impact on your bill. The cheapest energy is the energy you don t use.

FT-100 Fire Training Fog Machine User Manual English

Home inspectors are not mold inspectors, however they do inspect for defects that

Mobile Data Power Model: MDP-25

PowerPanel Business Edition USER MANUAL

Heat Trace Fundamentals. Monte Vander Velde, P.E. President, Interstates Instrumentation

SOLAR PV SYSTEM MAINTENANCE GUIDE

Data Center Infrastructure & Managed Services Outline

How To Use A Power Supply Unit (Upu)

Microwave Oven. Warning: a) This oven is not for commercial use. b) Don't open the cover of the machine except professional person.

GET THE ALARM.COM ADVANTAGE.

Transcription:

Protecting Your Server Room from Environmental Threats

TABLE OF CONTENTS Eecutive Summary... 3 Environmental Threats and Their Costs... 4 Temperature...4 Humidity...5 Water Leaks...5 Human Error...6 Intrusion...6 Vibration...6 Power Outage...6 Weaknesses of Current Monitoring Practices... 7 ENVIROMUX Server Environment Monitoring Solutions... 8 ENVIROMUX-SEMS-16...9 ENVIROMUX-MINI...10 Trademark... 12 Copyright... 12 ILLUSTRATIONS Figure 1-Eample of Alarm Notifications for the ENVIROMUX-SEMS-16...8 Figure 2-Eample Configuration of ENVIROMUX-SEMS-16...9 Figure 3-Eample Configuration of ENVIROMUX-MINI...10 TABLES Table 1- Sensor Comparison...11 2

Eecutive Summary While focused on protecting networks from security attacks and connectivity failures, administrators often inadvertently miss the subtle, ever-present danger of environmental threats. These threats include temperature, humidity, water leaks, intrusion, human error, vibration, and power outages. According to the Uptime Institute, 25% of all information downtime results from the interaction of computer hardware with its physical environment. The environment can damage equipment, slow performance, and force hardware to shutdown. The costs of environmental threats are Replacement of damaged items Lower worker productivity due to downtime Lost revenues from unavailable server-based applications, such as e-commerce sites or customer service centers Additional administrative time and money to investigate and fi problems The most common environment monitoring practice today is to have administrators, security officers, and facilities personnel observe areas and report any problems. This practice has several weaknesses, such as: Not recognizing all threats Constantly changing environmental conditions Gaps in monitoring and responsibility Inability to track environmental changes Focusing on catastrophes, not daily threats that will eventually damage equipment A server environment monitoring system helps prevent the damages caused by environmental threats by monitoring critical conditions (such as temperature, humidity, and water leakage) that could destroy network components in a server room. It uses sensors to track environmental conditions around servers, workstations or data centers. When the system detects an abnormality, such as a temperature increase over the recommended limit, it sends an alert. Alerts can be flashing lights, buzzers, and messages via SNMP traps, email, and the system's Web-based administrative interface. After IT administrators receive the alert, they can investigate and resolve the issue. Many systems log environmental data, which administrators can use to investigate problems. The remainder of this paper discusses the following topics: Common server room environmental threats and the damage they cause Weaknesses of the current practice of using personnel to monitor the environment The benefits and features of two systems from Network Technologies Inc (NTI), ENVIROMUX-SEMS-16 and ENVIROMUX-MINI 3

Environmental Threats and Their Costs The most common environmental threats to server rooms are temperature, humidity, water leaks, human error, intrusion, vibration, and power outage. Many of these threats, such as temperature and humidity, are related, which complicates environment monitoring and heightens the need for an automated, sophisticated system. Temperature Temperature is the main environmental threat to computer hardware. The generally accepted, ideal temperature is between 68 and 74 degrees Fahrenheit (20 to 24 degrees Celsius). Ecessive heat degrades network performance and causes downtime. As the temperature increases, a heat sinks fan works harder to cool the central processing unit (CPU). Continuous overworking causes the fan to fail, leading to a machine overheating. A machine shuts down when it reaches an unsafe temperature in order to prevent permanent damage. An administrator must then be located, day or night, go to the machine, and reboot it after it has cooled. Consequently, services hosted by a down machine are unavailable until it is restarted, which can take minutes or hours. If the server hosts critical services (e.g., e-commerce, user validation, email) that are not distributed to backup servers, revenues can be lost, users cannot login, and communications are interrupted. If the shut down is not done properly, data can be lost. Ecessive heat and rapid temperature changes also damage equipment. Rapid temperature increases can increase humidity, while rapid drops can cause water in humid air to condense on equipment. Together, heat and moisture accelerate the break down of materials used in microchips, motherboards, and hard drives, which is called premature aging. In worst cases, a machine won't shut down when the temperature eceeds safe levels, and circuits are damaged. Ultimately, heat-damaged equipment must be replaced, increasing the cost of network maintenance. Controlling temperature is becoming more important and more difficult because of changes in equipment design and greater use of network services. New equipment runs hotter because it runs faster and does more work. Also, more circuits are placed closer and closer together, trapping heat in a smaller space. Smaller equipment also means that more equipment can be placed in the same space, usually packed tighter together. The increase in density of equipment causes a rise in the amount of heat dissipating in a rack cabinet. Increased network usage also increases heat, so as usage levels change during the day, so does the temperature and the need for cooling. For networks that operate near capacity 24 hours a day, every day of the year, there is little, if any, time for machines to cool down. 4

Humidity When the temperature is between 68 and 74 degrees Fahrenheit (20 to 24 degrees Celsius), the relative humidity (i.e., the amount of water in the air) should be between 40% and 50%. A high humidity level can produce the following problems in the server room: Condensation -- Condensation occurs when humidity levels are too high or when there is a rapid temperature drop. Water that condensates inside equipment causes rust, short circuits, or deposits of dirt and minerals that corrode equipment. Moisture absorbing circuit boards epand and contract with changes in relative humidity levels. Epansion and contraction of these boards can break microelectronic circuits and edge connectors. Finally, condensation increases heat levels. Deposits of dirt and minerals act like insulation that traps heat in equipment and prevents it from diffusing into the air. Fungus -- Persistent humidity levels above 60% and elevated temperatures promote the growth of fungi. These contaminate the air with dirt and spores, which clog a machine's airflow and promote heat retention and condensation. They also retain moisture and promote corrosion, which damage circuits and motherboards. Some fungi "eat" tetile plastics (e.g., polyester) and PVCs, a phenomenon in which fungi breakdown the material used in these items. Most electronic equipment has some PVC materials, such as the PVC insulation used in cabling. A persistent low humidity level can produce the following problems: ESD -- Electrostatic discharge (ESD) occurs in dry environments because there is not enough water to neutralize the charge buildup. ESD intermittently interferes with hardware and can cause system damage or temporary malfunctions. Plastic Breakdown -- Some plastics breakdown in low humidity environments, which is another form of premature aging. Water Leaks Proper planning moves equipment away from water pipes that might burst, basements that might flood, or roofs that might leak. However, there are other water leaks that are more difficult to recognize and detect. Blocked ventilation systems can cause condensation if warm, moist air is not removed quickly. If vents are located above or behind machines, condensation can form small puddles that no one sees. Standalone air conditioners are especially vulnerable to water leaks if condensation is not properly removed. Even small amounts of water near air intakes raise humidity levels and fill servers with moisture. In addition, water from small pipe leaks can travel for long distances behind walls and continue for a long time before anyone notices it. Server rooms with raised floors are particularly vulnerable. All of the cables and wires for an entire network are concealed beneath floor panels. While this approach keeps cords safe from being accidentally unplugged, it makes monitoring their physical status difficult. Cables may be soaking in water for a long period before anyone notices. This situation breaks down insulation, and the loss of insulation causes signal leakage and performance degradation. 5

Human Error Administrators/personnel can unknowingly create environment problems in server rooms by: Adjusting the heat or air conditioning while working in the server room and forgetting to reset it when they leave Placing boes in front of vents "temporarily" and forgetting to move them, which blocks airflow Moving equipment, which changes the room's airflow and causes hotspots Bumping equipment, which changes the direction of vent baffles and causes the ehaust of one machine to blow at the intake of another machine Installing new equipment, unaware that it creates more heat than the old equipment Failing to put blank panels behind empty rack shelves, which inhibits air from flowing up. Similarly, cleaning crews sometimes close doors that should be left open for ventilation, thus increasing the temperature and reducing airflow. Intrusion Intruders, such as disgruntled employees and industrial spies, often strike at the most critical yet vulnerable points: the physical devices that store and control access to data. The small and delicate nature of modern computing equipment makes it easy to damage or steal; hard drives are compact enough to carry out in a briefcase, backpack, coat pocket, or purse. Less sinister, but just as potentially harmful, are animal intrusions. Rodents, insects, birds and even larger animals have found their way into highly sensitive areas to wreak havoc upon equipment. Tiny contaminants, such as fur, dust, and dander, can cause component failure. Mice and rats chew through cable. Vibration Too much movement loosens connections within the server housing unseating boards and chips. Vibration can also damage the hard drive disk, which rotates at etremely high speeds. Being bumped or moved can cause the platter, where the information is stored, and the head, which reads the information, to physically connect, causing scratches that permanently harm the disk drive. Generally, vibration comes from mundane sources: being too close to halls or walkways, or being moved or bumped. Good space planning can keep shocks to a minimum, but IT staff should still monitor the situation. Some vibrations, such as those generated by a failing air conditioner, actually serve as warnings. Most machines vibrate more as performance worsens, so tracking fluctuations in equipment vibration becomes an important means to predicting failures. Power Outage Power outages, brown outs, and voltage dips and spikes represent big problems for computing equipment. A simple hiccup in power levels, let alone a lightning strike, can cause servers to fail. In best-case scenarios, this costs precious time before rebooting. In worst-case scenarios, circuitry is irreparably damaged and must be replaced. 6

Weaknesses of Current Monitoring Practices In a typical business, three groups monitor the environment: network administrators, security personnel, and facility maintenance employees. Network administrators often rely on a single thermometer and subjective notions about "comfort" to control the temperature of server rooms and data centers. In addition, security personnel and facility maintenance departments monitor areas outside of the server rooms. These three groups usually attempt to coordinate their efforts, but they maintain separate systems and practices. Ultimately, network administrators are primarily responsible for protecting hardware. This approach has the following weaknesses: Not recognizing all threats - Damage caused by the environment can be subtle, unseen, or attributed to other causes. Accelerated equipment aging due to heat or condensation occurs over years and is often written off as a natural process (i.e., "equipment just wears out"). Condensation, rust, and heat damage is usually hidden inside machines, out of administrators' sight. Inconsistency - Administrators check room thermometers only when the environment feels hot or cold to them. Unfortunately, the sense of a "comfortable" temperature and humidity level varies from person to person, so problems are not always recognized. Gaps in monitoring - Environment threats occur 24 hours a day, seven days a week. But administrators are not always in the equipment room, especially on nights and weekends. Depending on staffing levels and schedules, server room environments can be unmonitored up to seventy percent of the time during an average week. Responsibility gaps - Another gap occurs because of shared responsibility. Water leaks and intrusion are monitored by maintenance personnel, security officers, and network administration. Frequently, one group will not monitor an area because it thinks another group already controls that area. Or one group will detect an incident but fail to inform all of the other groups. Consequently, vulnerabilities develop and potential problems are never investigated until it is too late. Inability to track environmental changes - Temperature and humidity levels constantly increase and decrease. Without a log of conditions, administrators cannot identify problems caused by these changes. Often, these problems continue for days or months, while time and money is wasted investigating false causes and solutions. Focus on catastrophes, not daily problems - Current practices avoid catastrophes, such as broken water pipes or power outages that shut down air conditioning systems. But they do little to protect from threats that slowly damage hardware or promote preventative maintenance, such as detecting gradual temperature increases that indicate a need to clean fans or air filters. An effective server environment monitoring system addresses the weaknesses in the current practice of having personnel monitor the environment. 7

ENVIROMUX Server Environment Monitoring Solutions NTI offers two server environment monitoring solutions, the ENVIROMUX-SEMS-16 and ENVIROMUX-MINI. Both units monitor critical environmental conditions (such as temperature, humidity, and water leakage) that could destroy network components in a server room. When a sensor eceeds a configurable threshold, the system will notify the selected administrators/staff via email, SNMP traps, Web-page alerts and a visual indicator (LED). The systems connect to your IP network, so they can be configured and monitored from any workstation with a Web browser. Figure 1-Eample of Alarm Notifications for the ENVIROMUX-SEMS-16 Both systems provide the following benefits: Control costs - In a stable environment, equipment lasts longer, and less equipment is damaged and needs replaced. Typically, the savings from not having to replace equipment can pay for the cost of the monitoring system. Increase lead-time to fi a problem - The earlier the warning alarm sounds, the sooner personnel can solve the problem before it becomes a disaster. For eample, a leak, if caught early, will not turn into a flood. Reduce downtime - Hardware housed at the recommended environmental conditions operates more efficiently, while also shutting down less frequently. Consequently, employees stay productive, and e-commerce sites continue to generate revenue. Log environmental data for greater insight - In order to maintain stable conditions in the server room, administrators must have accurate records of what has happened. Logging is also critical for investigating problems. 8

ENVIROMUX-SEMS-16 The ENVIROMUX-SEMS-16 supports the following sensors/devices: 3 internal sensors: temperature, humidity and power 16 eternal configurable sensors (such as temperature, humidity, temperature/humidity, liquid detection, smoke detection, glass break, vibration and motion sensors) via RJ45 connectors. 8 dry contact input devices, such as door contact sensors, via terminal pair connectors 4 dry contact output devices, such as fans or door locks, via terminal pair connectors The ENVIROMUX-SEMS-16 supports the following alerts: Network messages via SNMP Email via SMTP Messages to the Web interface A flashing LED SMS messages via eternal GSM modem Figure 2-Eample Configuration of ENVIROMUX-SEMS-16 9

ENVIROMUX-MINI The ENVIROMUX-MINI accommodates the following sensors/devices: 2 temperature, humidity or combination sensors via RJ45 connectors. The sensors use fleible super-flat CAT5e cable, which conserves space and makes them easy to position between servers and in other tight areas. 1 liquid detection sensor via a terminal pair connector. 4 dry contact input devices, such as door contact sensors, via terminal pair connectors. The ENVIROMUX-MINI supports the following alerts: Network messages via SNMP Email via SMTP Messages to the Web interface A red LED indicator Figure 3-Eample Configuration of ENVIROMUX-MINI 10

Table 1- Sensor Comparison Sensor Type ENVIROMUX-SEMS-16 ENVIROMUX-MINI Temperature Humidity Temperature / Humidity Combination Liquid Detection Door Contact Emergency/Panic Button Tamper Switch Infrared Motion Detector Vibration/Shock Sensor Glass Break Detection Smoke Detection Access Control Key Station Access Control Digital Keypad Electric Strike (Fail-safe and Fail-secure) Alarm Beacon Siren 11

Trademark ENVIROMUX is a registered trademark of Network Technologies Inc. All rights reserved. Copyright Copyright 2006, Network Technologies Incorporated. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of Network Technologies Inc, 1275 Danner Drive, Aurora, Ohio 44202. For more information, please contact Network Technologies Inc at (800) 742-8324 or (330) 562-7070. 1.800.RGB.TECH (800.742.8324) Toll Free: US & Canada 330.562.7070 International calls 330.562.1999 Worldwide fa sales@ntigo.com www.networktechinc.com 2006, NTI. All rights reserved.