SlideShare a Scribd company logo
Rack and power
management.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– Rack management.
– Power management.
Page 4
Rack and power management.
Page 5
Rack systems are specially
designed racks used to hold
networking and computing
equipment. Sometimes they
are referred to as server racks.
These rack systems follow one of several different designs
(e.g., they may be bolted to the floor or they may be
freestanding); however, they all follow the same height
specification.
The specification is the standard unit (U) and it involves the
amount of vertical space that can be used to hold equipment.
A U is equal to 1.75 inches. (e.g., a 15U rack has 26.25
inches of vertical storage space). Most rack servers and
enterprise level networking equipment are designed to fit
within rack systems.
Rack and power management.
Page 6
Rack and power management.
– Types of racks.
» Racks are normally two-post or four-post racks.
» Server rail racks have slide mounts to make it easy to pull out
servers to perform necessary maintenance.
– Device placement.
» Devices that generate the most amount of heat, or are not heat
sensitive, should be placed toward the top of the rack.
» Devices that generate the least amount of heat, or are heat
sensitive, should be placed toward the bottom of the rack.
» All equipment cold air intakes should face the same direction;
all equipment exhaust outlets should, therefore, face the same
direction (i.e., hot aisle/cold aisle).
– Airflow.
» When mounting equipment in racks, vertical space should be
left between the equipment to promote adequate airflow.
» When multiple rows of racks are implemented, a hot aisle/cold
aisle approach should be used to promote proper airflow and
cooling.
Page 7
Rack and power management.
– Rack monitoring.
» Racks should be monitored for environmental factors to help
ensure the health of the servers and other equipment.
• Monitors should be in place for: temperature, humidity,
vibration, water leaks, smoke, and intrusion.
– Rack security.
» Most rack systems do not come with rack security in mind, but
it can be easily added after rack installation.
• Rack doors can be added that have either keyed or electronic
locks.
» If the equipment is not secured, it can be easily stolen.
Page 8
Rack and power management.
Page 9
Power is often overlooked
when designing a network;
however, without power
management, the network
may never work properly.
Most people assume that when they plug a piece of
equipment into a wall socket, that that piece of equipment is
going to power up just fine. In most cases, this is true.
However, if the circuit cannot provide enough amps to the
equipment, damage may occur.
It is important to know the power requirements and loads for
all of the equipment that will be in place. This helps to ensure
that the proper electrical circuits are installed, so that
sufficient power is delivered where it is needed.
Rack and power management.
Page 10
Rack and power management.
– Power converters.
» Convert electrical energy from one form to another (e.g., from
AC to DC or from one voltage level to another).
• Power inverters: a type of power converter that specifically
converts voltages DC to AC.
– UPS (uninterruptable power supply).
» Uses power converters to receive electrical current from an AC
electrical source and pass it to a battery (or batteries) for
storage.
» Uses a power inverter to receive DC current and pass it to
another device as conditioned (well regulated) AC flow.
» Used to provide a steady stream of conditioned electrical power
to components.
• Helps to protect sensitive electrical components from power
anomalies (e.g., power spikes or power sags).
– Power redundancy.
» Critical components should include redundant power supplies.
• If one of the power supplies fails, the other one takes over
immediately.
Page 11
Rack and power management.
Rack systems are specifically developed to hold computing and networking
equipment. Height is measured by the number of standard units that are
available. Several different styles of racks are available, including
freestanding. There several considerations when placing equipment in
racks, including airflow. Racks should be monitored for environmental
factors and rack security should be implemented.
Topic
Rack management.
Summary
Power management is often overlooked when designing network systems.
One consideration is that the electrical circuit can supply enough amps for
the equipment that is going to use it. Power converters are used to change
one or more characteristic of electricity. A UPS can be used to supply a
steady flow of conditioned power, helping to protect computing equipment.
Redundant power supplies should be used with critical components.
Power management.
Page 12
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
sommerville-videos
 
PACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting MethodologyPACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting Methodology
Pace IT at Edmonds Community College
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
sommerville-videos
 
Pace IT - Environmental Impact and Control
Pace IT - Environmental Impact and ControlPace IT - Environmental Impact and Control
Pace IT - Environmental Impact and Control
Pace IT at Edmonds Community College
 
Lesson 2
Lesson 2Lesson 2
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
mrmwood
 
System success and failure
System success and failureSystem success and failure
System success and failure
sommerville-videos
 
Critical systems intro
Critical systems introCritical systems intro
Critical systems intro
sommerville-videos
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
MrsNunn
 
Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)
Ian Sommerville
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and procedures
StevenSegaert
 
Success with Electrical Testing
Success with Electrical TestingSuccess with Electrical Testing
Success with Electrical Testing
Jrock8020
 
KA Resume
KA ResumeKA Resume
KA Resume
Keith Anderson
 
BA 257 C1.C2
BA 257 C1.C2BA 257 C1.C2
BA 257 C1.C2
mattheweric
 
Top Three Root Causes of Data Center Outages
Top Three Root Causes of Data Center OutagesTop Three Root Causes of Data Center Outages
Top Three Root Causes of Data Center Outages
Rahi Systems
 
PRIMAL
PRIMALPRIMAL
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
sommerville-videos
 
Pace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best PracticesPace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best Practices
Pace IT at Edmonds Community College
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
mrmwood
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
Paul F. Roberts
 

What's hot (20)

Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 
PACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting MethodologyPACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting Methodology
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
 
Pace IT - Environmental Impact and Control
Pace IT - Environmental Impact and ControlPace IT - Environmental Impact and Control
Pace IT - Environmental Impact and Control
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Critical systems intro
Critical systems introCritical systems intro
Critical systems intro
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and procedures
 
Success with Electrical Testing
Success with Electrical TestingSuccess with Electrical Testing
Success with Electrical Testing
 
KA Resume
KA ResumeKA Resume
KA Resume
 
BA 257 C1.C2
BA 257 C1.C2BA 257 C1.C2
BA 257 C1.C2
 
Top Three Root Causes of Data Center Outages
Top Three Root Causes of Data Center OutagesTop Three Root Causes of Data Center Outages
Top Three Root Causes of Data Center Outages
 
PRIMAL
PRIMALPRIMAL
PRIMAL
 
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
 
Pace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best PracticesPace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best Practices
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
 

Similar to PACE-IT: Rack and Power Management

Pace IT - Power Supplies
Pace IT - Power SuppliesPace IT - Power Supplies
Pace IT - Power Supplies
Pace IT at Edmonds Community College
 
Industry tech overview by golden coffee business & investment consulting
Industry tech overview by golden coffee business & investment consultingIndustry tech overview by golden coffee business & investment consulting
Industry tech overview by golden coffee business & investment consulting
Samuel Dawit
 
Smart grid Technology
Smart grid TechnologySmart grid Technology
Smart grid Technology
Eklavya Sharma
 
Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...
Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...
Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...
Classic Controls, Inc.
 
Contigency analysis and security system taking different cases
Contigency analysis  and security system taking different casesContigency analysis  and security system taking different cases
Contigency analysis and security system taking different cases
fekadewalle
 
It technician
It technicianIt technician
It technician
Edz Gapuz
 
Brochure es 2018
Brochure es 2018Brochure es 2018
Brochure es 2018
PabloRifrani
 
UPS Electrical Design and Installation
UPS Electrical Design and InstallationUPS Electrical Design and Installation
UPS Electrical Design and Installation
Jason Koffler
 
Schneider Electric
Schneider ElectricSchneider Electric
Schneider Electric
FMA Summits
 
Proactively Managing Your Data Center Infrastructure
Proactively Managing Your Data Center InfrastructureProactively Managing Your Data Center Infrastructure
Proactively Managing Your Data Center Infrastructure
kimotte
 
Wp 75-comparing-ups-system-design-configurations
Wp 75-comparing-ups-system-design-configurationsWp 75-comparing-ups-system-design-configurations
Wp 75-comparing-ups-system-design-configurations
LuisMaio8
 
Data center power infrastructure
Data center power infrastructureData center power infrastructure
Data center power infrastructure
Livin Jose
 
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
University of Southern California
 
1.9 protection of power system
1.9 protection of power system1.9 protection of power system
1.9 protection of power system
W3Edify
 
Green power for the futuree
Green power for the futureeGreen power for the futuree
Green power for the futuree
Madhu Selvarangam
 
CV ENGLISH Feb2016 - Copy
CV ENGLISH Feb2016 - CopyCV ENGLISH Feb2016 - Copy
CV ENGLISH Feb2016 - Copy
shraf eldin sati
 
Application of scada for system automation on smart grid rev2
Application of scada for system automation on smart grid rev2Application of scada for system automation on smart grid rev2
Application of scada for system automation on smart grid rev2
Ezechukwu Ukiwe
 
Southern Textile Association Terawatt iDR presentation - Terawatt iDR Technology
Southern Textile Association Terawatt iDR presentation - Terawatt iDR TechnologySouthern Textile Association Terawatt iDR presentation - Terawatt iDR Technology
Southern Textile Association Terawatt iDR presentation - Terawatt iDR Technology
Edmundo Duarte
 
Redundant power supply architecture for self healing substation using ultraca...
Redundant power supply architecture for self healing substation using ultraca...Redundant power supply architecture for self healing substation using ultraca...
Redundant power supply architecture for self healing substation using ultraca...
eSAT Publishing House
 
Types of Electrical Meters in Data Centers
Types of Electrical Meters in Data CentersTypes of Electrical Meters in Data Centers
Types of Electrical Meters in Data Centers
Divyang Patel - Electrical Engineer
 

Similar to PACE-IT: Rack and Power Management (20)

Pace IT - Power Supplies
Pace IT - Power SuppliesPace IT - Power Supplies
Pace IT - Power Supplies
 
Industry tech overview by golden coffee business & investment consulting
Industry tech overview by golden coffee business & investment consultingIndustry tech overview by golden coffee business & investment consulting
Industry tech overview by golden coffee business & investment consulting
 
Smart grid Technology
Smart grid TechnologySmart grid Technology
Smart grid Technology
 
Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...
Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...
Scenarios for Specifying an Uninterruptible Power Supply for Industrial Appli...
 
Contigency analysis and security system taking different cases
Contigency analysis  and security system taking different casesContigency analysis  and security system taking different cases
Contigency analysis and security system taking different cases
 
It technician
It technicianIt technician
It technician
 
Brochure es 2018
Brochure es 2018Brochure es 2018
Brochure es 2018
 
UPS Electrical Design and Installation
UPS Electrical Design and InstallationUPS Electrical Design and Installation
UPS Electrical Design and Installation
 
Schneider Electric
Schneider ElectricSchneider Electric
Schneider Electric
 
Proactively Managing Your Data Center Infrastructure
Proactively Managing Your Data Center InfrastructureProactively Managing Your Data Center Infrastructure
Proactively Managing Your Data Center Infrastructure
 
Wp 75-comparing-ups-system-design-configurations
Wp 75-comparing-ups-system-design-configurationsWp 75-comparing-ups-system-design-configurations
Wp 75-comparing-ups-system-design-configurations
 
Data center power infrastructure
Data center power infrastructureData center power infrastructure
Data center power infrastructure
 
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'IT and the smart grid, Peter Will,Information Sciences Institute, USC'
IT and the smart grid, Peter Will,Information Sciences Institute, USC'
 
1.9 protection of power system
1.9 protection of power system1.9 protection of power system
1.9 protection of power system
 
Green power for the futuree
Green power for the futureeGreen power for the futuree
Green power for the futuree
 
CV ENGLISH Feb2016 - Copy
CV ENGLISH Feb2016 - CopyCV ENGLISH Feb2016 - Copy
CV ENGLISH Feb2016 - Copy
 
Application of scada for system automation on smart grid rev2
Application of scada for system automation on smart grid rev2Application of scada for system automation on smart grid rev2
Application of scada for system automation on smart grid rev2
 
Southern Textile Association Terawatt iDR presentation - Terawatt iDR Technology
Southern Textile Association Terawatt iDR presentation - Terawatt iDR TechnologySouthern Textile Association Terawatt iDR presentation - Terawatt iDR Technology
Southern Textile Association Terawatt iDR presentation - Terawatt iDR Technology
 
Redundant power supply architecture for self healing substation using ultraca...
Redundant power supply architecture for self healing substation using ultraca...Redundant power supply architecture for self healing substation using ultraca...
Redundant power supply architecture for self healing substation using ultraca...
 
Types of Electrical Meters in Data Centers
Types of Electrical Meters in Data CentersTypes of Electrical Meters in Data Centers
Types of Electrical Meters in Data Centers
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 

Recently uploaded (20)

The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 

PACE-IT: Rack and Power Management

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – Rack management. – Power management.
  • 4. Page 4 Rack and power management.
  • 5. Page 5 Rack systems are specially designed racks used to hold networking and computing equipment. Sometimes they are referred to as server racks. These rack systems follow one of several different designs (e.g., they may be bolted to the floor or they may be freestanding); however, they all follow the same height specification. The specification is the standard unit (U) and it involves the amount of vertical space that can be used to hold equipment. A U is equal to 1.75 inches. (e.g., a 15U rack has 26.25 inches of vertical storage space). Most rack servers and enterprise level networking equipment are designed to fit within rack systems. Rack and power management.
  • 6. Page 6 Rack and power management. – Types of racks. » Racks are normally two-post or four-post racks. » Server rail racks have slide mounts to make it easy to pull out servers to perform necessary maintenance. – Device placement. » Devices that generate the most amount of heat, or are not heat sensitive, should be placed toward the top of the rack. » Devices that generate the least amount of heat, or are heat sensitive, should be placed toward the bottom of the rack. » All equipment cold air intakes should face the same direction; all equipment exhaust outlets should, therefore, face the same direction (i.e., hot aisle/cold aisle). – Airflow. » When mounting equipment in racks, vertical space should be left between the equipment to promote adequate airflow. » When multiple rows of racks are implemented, a hot aisle/cold aisle approach should be used to promote proper airflow and cooling.
  • 7. Page 7 Rack and power management. – Rack monitoring. » Racks should be monitored for environmental factors to help ensure the health of the servers and other equipment. • Monitors should be in place for: temperature, humidity, vibration, water leaks, smoke, and intrusion. – Rack security. » Most rack systems do not come with rack security in mind, but it can be easily added after rack installation. • Rack doors can be added that have either keyed or electronic locks. » If the equipment is not secured, it can be easily stolen.
  • 8. Page 8 Rack and power management.
  • 9. Page 9 Power is often overlooked when designing a network; however, without power management, the network may never work properly. Most people assume that when they plug a piece of equipment into a wall socket, that that piece of equipment is going to power up just fine. In most cases, this is true. However, if the circuit cannot provide enough amps to the equipment, damage may occur. It is important to know the power requirements and loads for all of the equipment that will be in place. This helps to ensure that the proper electrical circuits are installed, so that sufficient power is delivered where it is needed. Rack and power management.
  • 10. Page 10 Rack and power management. – Power converters. » Convert electrical energy from one form to another (e.g., from AC to DC or from one voltage level to another). • Power inverters: a type of power converter that specifically converts voltages DC to AC. – UPS (uninterruptable power supply). » Uses power converters to receive electrical current from an AC electrical source and pass it to a battery (or batteries) for storage. » Uses a power inverter to receive DC current and pass it to another device as conditioned (well regulated) AC flow. » Used to provide a steady stream of conditioned electrical power to components. • Helps to protect sensitive electrical components from power anomalies (e.g., power spikes or power sags). – Power redundancy. » Critical components should include redundant power supplies. • If one of the power supplies fails, the other one takes over immediately.
  • 11. Page 11 Rack and power management. Rack systems are specifically developed to hold computing and networking equipment. Height is measured by the number of standard units that are available. Several different styles of racks are available, including freestanding. There several considerations when placing equipment in racks, including airflow. Racks should be monitored for environmental factors and rack security should be implemented. Topic Rack management. Summary Power management is often overlooked when designing network systems. One consideration is that the electrical circuit can supply enough amps for the equipment that is going to use it. Power converters are used to change one or more characteristic of electricity. A UPS can be used to supply a steady flow of conditioned power, helping to protect computing equipment. Redundant power supplies should be used with critical components. Power management.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.