Browse Definitions :
Definition

ambient air cooling

Contributor(s): Ivy Wigmore

Ambient air cooling is the use of naturally cool air surrounding a building, such as a data center, to reduce heat inside the facility. The use of ambient air and/or nearby water sources to maintain appropriate ambient temperatures in a data center is sometimes referred to as free cooling because they take advantage of naturally occurring phenomena rather than more heavily technological solutions.

One of the first things to consider for ambient air cooling is location. The prevailing air at many latitudes and elevations can be considerably cooler during certain seasons and times of day than the air that is warmed by data center equipment. By filtering, humidifying and introducing cooler prevailing air directly into the data center, it is possible to reduce or eliminate the use of industrial-grade CRAC systems. Cooling systems that use this approach are sometimes called air-side economizers.

There are two types of ambient air cooling: In air-side free cooling, outside air is brought into the data center directly through filters or indirectly through heat exchangers. In adiabatic free cooling, the air is brought into some sort of chamber and used along with water evaporation to cool the air.

Although ambient air cooling is not actually free of cost because of the technologies involved, savings can be substantial. Other reasons to consider ambient air or water cooling for a data center include the pursuit of a Leadership in Energy and Environmental Design (LEED) certification, the desire for energy savings and an environmentally-aware corporate philosophy.

This was last updated in May 2013

Continue Reading About ambient air cooling

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close