Professional Documents
Culture Documents
Research Proposal ServerTemp
Research Proposal ServerTemp
Research Proposal ServerTemp
GENISIS ALONSABE
MITCHIE CABUROG
GERALYN RAFOLS
CHAPTER 1
computer servers. An entire building or station devoted to this purpose is a data center.
set their default temperature to be lower than 20ºC for a reason to prevent servers from
over-heating the highest load time. In other words, air-conditioner systems cannot
detect ‘real’ temperature at a server; therefore, setting very low temperature may
guarantee that every server is cold enough since it is air conditioned. However, the
2009).
The DHT11 is a tool use in detecting and measuring temperature and humidity. It
detects water vapor by measuring the electrical resistance between two electrodes. The
the surface. When water vapor is absorbed by the substrate, ions are released by the
substrate which increases the conductivity between the electrodes. The change in
resistance between the two electrodes is proportional to the relative humidity. Higher
relative humidity decreases the resistance between the electrodes, while lower relative
humidity increases the resistance between the electrodes. The DHT11 measures
temperature with a surface mounted NTC temperature sensor (thermistor) built into the
unit. (www.circuitbasics.com/how-to-set-up-the-dht11-humidity-sensor-on-an-arduino/).
In the case of URC’s ISD, they are required by ISO (International Organization
for Standardization) to have their own server room temperature monitor in order to
qualify on the standards required by the said organization. ISO 9000 advocates that
product quality stems from controlling process deviations. Companies must document
their critical processes and implement continuous monitoring that reports when an
outcome slightly deviates from the norm. When a variation surfaces, actions include
Methodology).
accreditation company that sends auditors, who observe the applicant's compliance
from the leadership team and follow employees to measure how well they refer and
comply with the process documents. The auditors' report lists major and minor gaps.
Engineering Conference of 2010. The study was called SENVM which is used to
monitor and control air temperature in a server room to be in appropriate condition, not
too cold, where very unnecessary cooling leads to unnecessary extra electricity
expenses, and also inefficient in energy utilization. With implementing on an emerging
technology, Wireless Sensor Network (WSN), Green Data Center is feasible to every
small data center with no wiring installation, easy deployment, and low maintenance
fee. In addition, the prototype of the system has been tested, and the first phase of the
(https://pdfs.semanticscholar.org/f080/f2c2f9aad919e0f71c34b0b3f996a55d8029
.pdf)
Due to lack of server room temperature monitoring system, they used a hardware
temperature monitoring software in order to reinforce the lacking requirement and pass
the ISO accreditation process. This kind of software only read temperature coming from
the PC of the IT specialist. Technically, they are still using the manual way of monitoring
In line with this problem, this study aims to provide a solution towards the
automation of their server room temperature monitor. We will aim to develop a system
which can automatically read the temperature and humidity of the server room with a
system to record the temperature level of the server room from time to time. We also
think of adding a feature in which the temperature monitoring device will send a
message to the personnel in charge of monitoring the temperature of the server room
This study seeks to reinforce the problems identified by URC regarding the
1. What is the current status of URC in monitoring their server room temperature?
1.3Automated
2. What are the system requirements needed in the development of server room
3. What are the problems encountered by the URC employees in monitoring the
1.1 Identifying the temperature of the server; 1.2 Adjusting the temperature?
temperature of the server room of URC and to reinforce its manual way of monitoring
sends temperature data on the system log and warns the personnel in charge of
monitoring the temperature of the server room whenever it exceeds the standard
temperature. The result of the study was deemed useful to the following:
To the URC IT Department They are the main benefactor of this study. The
study will ensure the accuracy, efficiency and usability level of the system.
To the University, the study will be beneficial because it is under the name of
the school. Just like all the studies, any awards and accomplishments of the study will
be credited to the school and also in CAS especially the Thesis advisers. Also, the
Automatically it can warn the users if ever the temperature of the server room
increases. This will be applicable to personal users since it is easy to install and
To CSIT students, the study will give them future ideas that they can build and
Scope
It can send SMS notification whenever the system exceeds the standard
temperature.
It logs the temperature of the server room on a system from time to time.
server room.
Limitations
It is operated offline.
It can only send SMS notification when the SIM card of the device has a load.
The adjustments in the temperature of the air conditioner will be done manually.
Definition of terms
Data Center. A data center or data centre is a building, dedicated space within a
capacitive humidity sensor and a thermistor to measure the surrounding air and spits
out a digital signal on the data pin (no analog input pins needed). It’s fairly simple to use
all the requirements for standardization and quality assurance. ISO (International
organization that develops standards to ensure the quality, safety, and efficiency of
The study was anchored on Waterfall Model By Winston W. Royce which was
developed in 1970.
Implementation Software
Verification
Maintenance
Phase 1. The requirements phase is the very first phase in the waterfall model. We start
with gathering the requirements which can check whether the project is feasible with the
present technologies or not. The summary purpose of the phrase is to develop all the
then proper documentation will be prepared with help further in the development
process. Requirements are a set of function and constraints that the end- user expects
from the system. The requirements will be gathered from the users and will be analyzed
for their validity and the possibility of incorporating them. Finally, a requirement
specification document will be created which servers as a guideline for the next raceof
the model. In this study, the researchers will conduct a detailed research about the
server room of URC, analyzing the problem if there is in fact a need of solving it, and
Phase 2. The design is highly essential t understand the requirements on the end-user
and also have the idea of how the end-user product should look like. The requirements
specification from the first phase will be studied here, and system design contains
details and specification of the whole system and explains how each component, and
the system design specification serves as an input for the nest phase of the model. In
this study, the researchers assured that the system can provide convenience and ease
of use for the users, without ambiguity, so the design will be concise and clear. The
scope of work was specified, including the features of the system, and its workflows
represented by flowcharts.
Phase 3. The next phase is the implementation phase which is the actual assembly and
coding of the system. This phase belongs to the programmer in the waterfall method, as
they take the project requirements and specifications and the code applications. (Royce
1970) On receiving system design documents, the work is divided into modules/units,
and actual coding starts. The system is first elaborated into small programs called units,
which are integrated into the next phase. Each unit testing mainly verifies if the
layout, installing equipment and bringing the said system into completion. Activities in
this phase include the testing and final installment of the software.
Phase 4. This phase is the verification and validation which process fir checking that a
software solution meets the original requirements and specifications and that t
accomplishes its intended purpose. In fact, verification is the process of evaluating the
software to determine whether the products of a given development phase satisfy the
conditions imposed at the start of the phase; while validation is the process of
whether it satisfies specified requirements. Moreover, the verification phase is the outlet
to perform debugging in which bugs and system glitches are found, corrected and
customer (Royce 1970). In the verification phase, the Technology Acceptance Model
(TAM) will be used in determining the level of acceptance of the developed system.
The Technology Acceptance Model (TAM) must design specially to explain usage
behavior. It is the adaption of fish bin and Azjen’s(1975) Theory of Reason Action
(TRA), which has been successfully in predicting and explaining the behavior in
general(Mlahotra&Galletta, 1999; Yi & Hwang, 2003). Here are two central determinants
of TAM; perceived usefulness is defined as the degree to which a person believes that
using a system will enhance his/ her job performance. This follows from the definition of
the word useful; capable of being used advantageously; and perceived ease of use, on
contrast refers to the degree to which a person believes that using a particular system
would be free to effort. This follows from the definition of ease; freedom form difficulty or
great effort (Davis 1889). In this study, after the device will be deployed it will undergo
a series of tests to analyze and fix the problems of the system in terms of hardware and
software credibility. This was intended to test the device if ever the device needs
updates.
Phase 5. The final phase of the waterfall method is the maintenance. During the
maintenance phase, the customer is using the developed system. It is the process of
modifying a software solution after delivery and deployment to refine output, correct
errors and improve performance and quality. Additional maintenance activities can be
new user requirements and increasing software reliability. In this study, the system will
be installed at the server room of the IT department of URC. We will orient the user in
how to use the system. Maintenance takes place in this phase and is carried routinely
For the development of a server room temperature monitoring system, the researchers
followed the phases of the following Conceptual Model to ensure success in the process
of software development.
The first phase of conceptual framework is the input phase. The input phase shows the
namely: Arduino Uno, Temperature and Humidity Sensor (DHT11), Universal Bread
Next to the input is the process phase. This focuses on the theoretical framework
used in this study, the Waterfall Model by Davis (1889). The different phases of the
and Operation and Maintenance which were followed by the researchers to come up
with a system. Thereafter, is the implementation of SRTMS at the IT Department of
URC? The researchers will observe the device’s performance in terms of of the
accuracy of its temperature meter, the accuracy of its temperature log and the number
The last phase of the conceptual model is the output phase. After the requirements
gathering and system development, the researchers came up with the output entitled
temperature of 72°F – 80°F be used in a data center environment, claiming that a 4-5%
saving in energy costs results from every 1° of temperature increase. A further study in
Conditioning Engineers) dictated that the highest temperature a data center facility
could go is 89.6°F. So there is no hard and fast rule, but it can be safely said that most
data centers employ the tactic of overcooling, with no detailed level of monitoring or
control over the environment. This results in a very in-efficient data center with high
PUE numbers, high energy costs and a large carbon footprint. In this present study,
the temperature required by the respondents matched the required temperature limit of
ASHRAE. But, instead of Fahrenheit they told us to use Celsius as the temperature unit
A study from, Meijer, Smart Sensor Systems, John Wiley & Sons, Ltd. U.K
such as heat, light, sound, or motion into electrical or other signals by detecting and
identifying the surroundings environment (physical property); the objects within that
environment (to a certain degree of accuracy) and communicate that information with
other systems which can manipulate the information differently. There are many
different types of sensors such as optical (radiant) sensors, magnetic sensors, thermal
because it measures the temperature and humidity from the server room.
A study from Baird, E., Mohseni, K., (2008), The use of sensors and SBIS in data
centers can be classified into built-in sensors (e.g., sensors that are embedded in
hardware, such as CPU sensors,) and, facility management sensors (e.g., stand-alone
(e.g., sensors that are placed on racks, CRAC units).. The built-in sensors are
study, the sensor we will be using is DHT11 which is a Digital Humidity and
A study from Greenberg, S., Mill, E.,(2008), & Alaraifi, A., Molla, A., (2012),
monitor and control the temperature and humidity of a facility, to control lighting, and to
support the security and safety of an entire data centre facility [13]. Equipment-based
sensors are an advanced method of utilizing sensors by placing them in the most critical
areas that need better monitoring or efficiency. In this present study, the most critical
area of our target environment is their server room which don’t have a temperature
monitor yet, in this case, they are required by ISO (International Organization for
distributed tiny wireless sensing devices with some computational, storage and
communicate with each other to monitor and gather physical data from their
this present study, the wireless sensor which we will use measures temperature and
humidity. We will develop a temperature and humidity sensor for the server room of our
target environment which will send an SMS notification whenever the temperature of the
A studyfrom,
Research Methodology
This section is about how the system was planned and designed. It also includes the
Research Design
to apply the output (which is an interactive system) to address specific issues and
problems thereby making a positive change in the lives of people. Based on the type of
data, this study is quantitative which requires numerical data; survey is the method used
Research Environment
This study will be conducted in the IT Department of URC where the server is located.
Whenever the temperature of the server increases and exceeds the normal temperature
limit, the employees of the IT department of URC adjust the air conditioner’s
Below is the map showing the location of the IT department of URC where the
MAP
Research Respondents
The researchers will write a letter regarding the proposed development of Server Room
performance at the URC IT department. After gaining the approval from the office head,
the researchers directly set the schedule for actual observation. The researchers
observed the device if it accurately measures the temperature of he server room and
sends an SMS notification whenever the room exceeds the maximum limit of
temperature. The estimated time of observation should be at least 2 weeks after the
implementation date.