With the rapid development and popularization of information technology, the number of computer systems and communication equipment has rapidly increased, and the number of computer centers, equipment rooms, distribution rooms, and base stations in the data center has increased) it has become a core platform for business management of various enterprises and institutions. data centers with network equipment, computer servers, and other communication equipment have become an important place for data exchange and storage, and special measures are needed to protect them. At present, the management of many data centers has to use a 24-hour dedicated person on duty to regularly inspect the equipment in the data center. This not only increases the burden on management personnel, but also often fails to eliminate faults in a timely manner. The IDC room environmental monitoring system enables the IDC room monitoring information to be effectively collected and processed in a larger area in a more efficient manner, and fault Alarms can be resolved at any time, records and comprehensively analyzes security risks to find solutions.
According to the survey, the computer room temperature is too high will cause the main components of the computer system and the integrated circuit failure. Statistics show that the computer reliability is reduced by 25% every time the temperature increases by 10 ℃, and disk tapes may cause record errors due to the thermal expansion effect. The clock speed of a computer decreases when the temperature is too high or too low.
The IDC environment monitoring system is mainly used to monitor the temperature, humidity, smoke, noise, air cleanliness, power supply voltage, and other parameters of the communication room. The system provides strict monitoring and management of the room temperature, transmits data to the PC for data storage and analysis, and outputs the print curve, in the case of equipment exceptions, the corresponding personnel are also notified through various forms of alarms, so that the data center can be monitored to ensure the efficient management and safe operation of the data center.
The system combines SMS and GSM text message technologies to use global Internet resources to create a low-cost, function-rich unattended data center solution. When an exception occurs in the data center, send a short message alarm. You can set up a group of Short Messages to notify different personnel on duty at different times. The system can send short messages and e-mail messages about the running status of devices in the current data center by means of mobile phone or telephone ringing and email, enabling unattended remote monitoring.
System Functions
1. Real-time recording function: continuously and truthfully collects and records the temperature, humidity, smoke, noise, air cleanliness, power supply voltage, and other parameters in the data center, displays and records monitoring information in real time in numbers and graphs;
2. Over-limit alarm function: the system can connect a large number of alarm devices, such as door magnetism, infrared, smoke, glass breaker, etc. Once an exception signal is captured, the system can automatically trigger alarm sound, call alarm, send email alarm, and send Short Message alarm. You can set a group of Short Messages), upload alarm information, and perform local and remote monitoring, the system can notify different persons on duty at different times;
3. Remote networking: through broadband access such as ADSL, CableModem, and Ethernet access, the monitored data center can automatically send the environmental parameters of the data center to the monitored host, the monitoring staff can know the situation of the monitored data center at any time and use special programs for development to ensure the security and stability of the system. This method is simple, reliable, and cost-effective. Only a static public IP address is required for the central server;
4. Intranet monitoring: after authorization, office users in the LAN can read real-time data on the host for remote monitoring. The system not only monitors in duty rooms, but also monitors leaders conveniently in their own offices. At the same time, other authorized users on the internet can obtain and understand real-time information in the computer room;
5. Mobile phone remote monitoring: the system can send short messages about the temperature of the current data center and the running status of devices by means of mobile phone or telephone ringing. To filter the call numbers, only the specified number can prompt the system to send short messages of running status, improving the security of the system. Note: This function requires the SIM card to enable incoming call display );
6. Data Statistics and Analysis: real-time display or historical display of the changes in each parameter curve of the room can display the environment parameter curves of multiple different rooms at the same time, making it easier to compare and analyze. The parameter list, real-time graph corresponding to specific values, and any adjustment of coordinates can be displayed), real-time data, converted data, accumulated data, history, alarm screen, reports, and other display and statistical functions are closer to user needs;
7. Data Storage: all data is collected and recorded on the host computer. data can be automatically stored, backed up, printed, and archived as required by the user;
8. Print/report function: You can select to print images, curves, parameters, and reports on a row-by-line or page-by-page basis. You can also manually print images, curves, parameters, and reports based on the specific requirements of the users, outputs Reports in different formats, such as PDF, WORD, EXCEL, TXT, and HTML;
9. hierarchical user management: when multiple data centers need to be centrally monitored, the strict password authorization system and user classification system provide users with a general monitoring and management platform, to ensure that only authorized staff can perform corresponding management and operations. You can add comments to log events as required by administrators.