SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Rack and power
management.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– Rack management.
– Power management.
Page 4
Rack and power management.
Page 5
Rack systems are specially
designed racks used to hold
networking and computing
equipment. Sometimes they
are referred to as server racks.
These rack systems follow one of several different designs
(e.g., they may be bolted to the floor or they may be
freestanding); however, they all follow the same height
specification.
The specification is the standard unit (U) and it involves the
amount of vertical space that can be used to hold equipment.
A U is equal to 1.75 inches. (e.g., a 15U rack has 26.25
inches of vertical storage space). Most rack servers and
enterprise level networking equipment are designed to fit
within rack systems.
Rack and power management.
Page 6
Rack and power management.
– Types of racks.
» Racks are normally two-post or four-post racks.
» Server rail racks have slide mounts to make it easy to pull out
servers to perform necessary maintenance.
– Device placement.
» Devices that generate the most amount of heat, or are not heat
sensitive, should be placed toward the top of the rack.
» Devices that generate the least amount of heat, or are heat
sensitive, should be placed toward the bottom of the rack.
» All equipment cold air intakes should face the same direction;
all equipment exhaust outlets should, therefore, face the same
direction (i.e., hot aisle/cold aisle).
– Airflow.
» When mounting equipment in racks, vertical space should be
left between the equipment to promote adequate airflow.
» When multiple rows of racks are implemented, a hot aisle/cold
aisle approach should be used to promote proper airflow and
cooling.
Page 7
Rack and power management.
– Rack monitoring.
» Racks should be monitored for environmental factors to help
ensure the health of the servers and other equipment.
• Monitors should be in place for: temperature, humidity,
vibration, water leaks, smoke, and intrusion.
– Rack security.
» Most rack systems do not come with rack security in mind, but
it can be easily added after rack installation.
• Rack doors can be added that have either keyed or electronic
locks.
» If the equipment is not secured, it can be easily stolen.
Page 8
Rack and power management.
Page 9
Power is often overlooked
when designing a network;
however, without power
management, the network
may never work properly.
Most people assume that when they plug a piece of
equipment into a wall socket, that that piece of equipment is
going to power up just fine. In most cases, this is true.
However, if the circuit cannot provide enough amps to the
equipment, damage may occur.
It is important to know the power requirements and loads for
all of the equipment that will be in place. This helps to ensure
that the proper electrical circuits are installed, so that
sufficient power is delivered where it is needed.
Rack and power management.
Page 10
Rack and power management.
– Power converters.
» Convert electrical energy from one form to another (e.g., from
AC to DC or from one voltage level to another).
• Power inverters: a type of power converter that specifically
converts voltages DC to AC.
– UPS (uninterruptable power supply).
» Uses power converters to receive electrical current from an AC
electrical source and pass it to a battery (or batteries) for
storage.
» Uses a power inverter to receive DC current and pass it to
another device as conditioned (well regulated) AC flow.
» Used to provide a steady stream of conditioned electrical power
to components.
• Helps to protect sensitive electrical components from power
anomalies (e.g., power spikes or power sags).
– Power redundancy.
» Critical components should include redundant power supplies.
• If one of the power supplies fails, the other one takes over
immediately.
Page 11
Rack and power management.
Rack systems are specifically developed to hold computing and networking
equipment. Height is measured by the number of standard units that are
available. Several different styles of racks are available, including
freestanding. There several considerations when placing equipment in
racks, including airflow. Racks should be monitored for environmental
factors and rack security should be implemented.
Topic
Rack management.
Summary
Power management is often overlooked when designing network systems.
One consideration is that the electrical circuit can supply enough amps for
the equipment that is going to use it. Power converters are used to change
one or more characteristic of electricity. A UPS can be used to supply a
steady flow of conditioned power, helping to protect computing equipment.
Redundant power supplies should be used with critical components.
Power management.
Page 12
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

Weitere ähnliche Inhalte

Was ist angesagt?

3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisationsmrmwood
 
Lesson 3
Lesson 3Lesson 3
Lesson 3MrsNunn
 
Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)Ian Sommerville
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and proceduresStevenSegaert
 
Success with Electrical Testing
Success with Electrical TestingSuccess with Electrical Testing
Success with Electrical TestingJrock8020
 
Top Three Root Causes of Data Center Outages
Top Three Root Causes of Data Center OutagesTop Three Root Causes of Data Center Outages
Top Three Root Causes of Data Center OutagesRahi Systems
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policiesmrmwood
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015Paul F. Roberts
 

Was ist angesagt? (20)

Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 
PACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting MethodologyPACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting Methodology
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
 
Pace IT - Environmental Impact and Control
Pace IT - Environmental Impact and ControlPace IT - Environmental Impact and Control
Pace IT - Environmental Impact and Control
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Critical systems intro
Critical systems introCritical systems intro
Critical systems intro
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and procedures
 
Success with Electrical Testing
Success with Electrical TestingSuccess with Electrical Testing
Success with Electrical Testing
 
KA Resume
KA ResumeKA Resume
KA Resume
 
BA 257 C1.C2
BA 257 C1.C2BA 257 C1.C2
BA 257 C1.C2
 
Top Three Root Causes of Data Center Outages
Top Three Root Causes of Data Center OutagesTop Three Root Causes of Data Center Outages
Top Three Root Causes of Data Center Outages
 
PRIMAL
PRIMALPRIMAL
PRIMAL
 
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
 
Pace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best PracticesPace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best Practices
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
 

Ähnlich wie PACE-IT: Rack and Power Management

Industry tech overview by golden coffee business & investment consulting
Industry tech overview by golden coffee business & investment consultingIndustry tech overview by golden coffee business & investment consulting
Industry tech overview by golden coffee business & investment consultingSamuel Dawit
 
Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...
Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...
Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...Classic Controls, Inc.
 
Contigency analysis and security system taking different cases
Contigency analysis  and security system taking different casesContigency analysis  and security system taking different cases
Contigency analysis and security system taking different casesfekadewalle
 
It technician
It technicianIt technician
It technicianEdz Gapuz
 
UPS Electrical Design and Installation
UPS Electrical Design and InstallationUPS Electrical Design and Installation
UPS Electrical Design and InstallationJason Koffler
 
Schneider Electric
Schneider ElectricSchneider Electric
Schneider ElectricFMA Summits
 
Proactively Managing Your Data Center Infrastructure
Proactively Managing Your Data Center InfrastructureProactively Managing Your Data Center Infrastructure
Proactively Managing Your Data Center Infrastructurekimotte
 
Wp 75-comparing-ups-system-design-configurations
Wp 75-comparing-ups-system-design-configurationsWp 75-comparing-ups-system-design-configurations
Wp 75-comparing-ups-system-design-configurationsLuisMaio8
 
Data center power infrastructure
Data center power infrastructureData center power infrastructure
Data center power infrastructureLivin Jose
 
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'University of Southern California
 
1.9 protection of power system
1.9 protection of power system1.9 protection of power system
1.9 protection of power systemW3Edify
 
Application of scada for system automation on smart grid rev2
Application of scada for system automation on smart grid rev2Application of scada for system automation on smart grid rev2
Application of scada for system automation on smart grid rev2Ezechukwu Ukiwe
 
Southern Textile Association Terawatt iDR presentation - Terawatt iDR Technology
Southern Textile Association Terawatt iDR presentation - Terawatt iDR TechnologySouthern Textile Association Terawatt iDR presentation - Terawatt iDR Technology
Southern Textile Association Terawatt iDR presentation - Terawatt iDR TechnologyEdmundo Duarte
 
Redundant power supply architecture for self healing substation using ultraca...
Redundant power supply architecture for self healing substation using ultraca...Redundant power supply architecture for self healing substation using ultraca...
Redundant power supply architecture for self healing substation using ultraca...eSAT Publishing House
 

Ähnlich wie PACE-IT: Rack and Power Management (20)

Pace IT - Power Supplies
Pace IT - Power SuppliesPace IT - Power Supplies
Pace IT - Power Supplies
 
Industry tech overview by golden coffee business & investment consulting
Industry tech overview by golden coffee business & investment consultingIndustry tech overview by golden coffee business & investment consulting
Industry tech overview by golden coffee business & investment consulting
 
Smart grid Technology
Smart grid TechnologySmart grid Technology
Smart grid Technology
 
Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...
Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...
Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...
 
Contigency analysis and security system taking different cases
Contigency analysis  and security system taking different casesContigency analysis  and security system taking different cases
Contigency analysis and security system taking different cases
 
It technician
It technicianIt technician
It technician
 
Brochure es 2018
Brochure es 2018Brochure es 2018
Brochure es 2018
 
UPS Electrical Design and Installation
UPS Electrical Design and InstallationUPS Electrical Design and Installation
UPS Electrical Design and Installation
 
Schneider Electric
Schneider ElectricSchneider Electric
Schneider Electric
 
Proactively Managing Your Data Center Infrastructure
Proactively Managing Your Data Center InfrastructureProactively Managing Your Data Center Infrastructure
Proactively Managing Your Data Center Infrastructure
 
Wp 75-comparing-ups-system-design-configurations
Wp 75-comparing-ups-system-design-configurationsWp 75-comparing-ups-system-design-configurations
Wp 75-comparing-ups-system-design-configurations
 
Data center power infrastructure
Data center power infrastructureData center power infrastructure
Data center power infrastructure
 
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
 
1.9 protection of power system
1.9 protection of power system1.9 protection of power system
1.9 protection of power system
 
Green power for the futuree
Green power for the futureeGreen power for the futuree
Green power for the futuree
 
CV ENGLISH Feb2016 - Copy
CV ENGLISH Feb2016 - CopyCV ENGLISH Feb2016 - Copy
CV ENGLISH Feb2016 - Copy
 
Application of scada for system automation on smart grid rev2
Application of scada for system automation on smart grid rev2Application of scada for system automation on smart grid rev2
Application of scada for system automation on smart grid rev2
 
Southern Textile Association Terawatt iDR presentation - Terawatt iDR Technology
Southern Textile Association Terawatt iDR presentation - Terawatt iDR TechnologySouthern Textile Association Terawatt iDR presentation - Terawatt iDR Technology
Southern Textile Association Terawatt iDR presentation - Terawatt iDR Technology
 
Redundant power supply architecture for self healing substation using ultraca...
Redundant power supply architecture for self healing substation using ultraca...Redundant power supply architecture for self healing substation using ultraca...
Redundant power supply architecture for self healing substation using ultraca...
 
Types of Electrical Meters in Data Centers
Types of Electrical Meters in Data CentersTypes of Electrical Meters in Data Centers
Types of Electrical Meters in Data Centers
 

Mehr von Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

Mehr von Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Kürzlich hochgeladen

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Kürzlich hochgeladen (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

PACE-IT: Rack and Power Management

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – Rack management. – Power management.
  • 4. Page 4 Rack and power management.
  • 5. Page 5 Rack systems are specially designed racks used to hold networking and computing equipment. Sometimes they are referred to as server racks. These rack systems follow one of several different designs (e.g., they may be bolted to the floor or they may be freestanding); however, they all follow the same height specification. The specification is the standard unit (U) and it involves the amount of vertical space that can be used to hold equipment. A U is equal to 1.75 inches. (e.g., a 15U rack has 26.25 inches of vertical storage space). Most rack servers and enterprise level networking equipment are designed to fit within rack systems. Rack and power management.
  • 6. Page 6 Rack and power management. – Types of racks. » Racks are normally two-post or four-post racks. » Server rail racks have slide mounts to make it easy to pull out servers to perform necessary maintenance. – Device placement. » Devices that generate the most amount of heat, or are not heat sensitive, should be placed toward the top of the rack. » Devices that generate the least amount of heat, or are heat sensitive, should be placed toward the bottom of the rack. » All equipment cold air intakes should face the same direction; all equipment exhaust outlets should, therefore, face the same direction (i.e., hot aisle/cold aisle). – Airflow. » When mounting equipment in racks, vertical space should be left between the equipment to promote adequate airflow. » When multiple rows of racks are implemented, a hot aisle/cold aisle approach should be used to promote proper airflow and cooling.
  • 7. Page 7 Rack and power management. – Rack monitoring. » Racks should be monitored for environmental factors to help ensure the health of the servers and other equipment. • Monitors should be in place for: temperature, humidity, vibration, water leaks, smoke, and intrusion. – Rack security. » Most rack systems do not come with rack security in mind, but it can be easily added after rack installation. • Rack doors can be added that have either keyed or electronic locks. » If the equipment is not secured, it can be easily stolen.
  • 8. Page 8 Rack and power management.
  • 9. Page 9 Power is often overlooked when designing a network; however, without power management, the network may never work properly. Most people assume that when they plug a piece of equipment into a wall socket, that that piece of equipment is going to power up just fine. In most cases, this is true. However, if the circuit cannot provide enough amps to the equipment, damage may occur. It is important to know the power requirements and loads for all of the equipment that will be in place. This helps to ensure that the proper electrical circuits are installed, so that sufficient power is delivered where it is needed. Rack and power management.
  • 10. Page 10 Rack and power management. – Power converters. » Convert electrical energy from one form to another (e.g., from AC to DC or from one voltage level to another). • Power inverters: a type of power converter that specifically converts voltages DC to AC. – UPS (uninterruptable power supply). » Uses power converters to receive electrical current from an AC electrical source and pass it to a battery (or batteries) for storage. » Uses a power inverter to receive DC current and pass it to another device as conditioned (well regulated) AC flow. » Used to provide a steady stream of conditioned electrical power to components. • Helps to protect sensitive electrical components from power anomalies (e.g., power spikes or power sags). – Power redundancy. » Critical components should include redundant power supplies. • If one of the power supplies fails, the other one takes over immediately.
  • 11. Page 11 Rack and power management. Rack systems are specifically developed to hold computing and networking equipment. Height is measured by the number of standard units that are available. Several different styles of racks are available, including freestanding. There several considerations when placing equipment in racks, including airflow. Racks should be monitored for environmental factors and rack security should be implemented. Topic Rack management. Summary Power management is often overlooked when designing network systems. One consideration is that the electrical circuit can supply enough amps for the equipment that is going to use it. Power converters are used to change one or more characteristic of electricity. A UPS can be used to supply a steady flow of conditioned power, helping to protect computing equipment. Redundant power supplies should be used with critical components. Power management.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.