Protecting Data-Processing Facilities

Prior to the implementation of the Montreal Protocol, Halon was the fire-suppression system of choice for computer and data-processing facilities throughout the United States.


Prior to the implementation of the Montreal Protocol, Halon was the fire-suppression system of choice for computer and data-processing facilities throughout the United States. With the cessation of Halon production, computer and data-processing facilities are now being protected by a variety of fire-extinguishing systems, including the available Halon alternative agents, and preaction sprinkler systems.

The Halon alternative agents are typically used in total-flooding applications, either total flooding of the computer room, underfloor spaces or equipment spaces or a combination of the above. These gaseous agents include halocarbon products and inert gas mixtures. The total-flooding agents, like the Halon systems they are replacing, are discharged into the protected space upon activation of fire-detection systems.

Preaction automatic fire-sprinkler systems are also being used for the protection of computer and data-processing facilities. Preaction sprinkler systems incorporate a preaction valve assembly that holds water back from the sprinkler system piping in the protected space until a detection system senses a fire condition and initiates the opening of the preaction valve. Water can flow into the system piping, but only discharges after the sprinkler head actuates due to the presence of heat at the individual sprinkler. Additional protection from inadvertent water damage can be provided with a double-interlocked preaction system, which holds water back from the piping until air pressure in the piping is relieved by the actuation of a sprinkler head.

In many computer applications, preaction systems can allow for power to be immediately disconnected from the computer equipment prior to filling the piping with water and discharging water into the room through actuated sprinklers. This power disconnect recognizes the fact that live computer equipment is more susceptible to water damage than equipment that is powered down prior to getting wet.

Whatever the extinguishing medium, computer and data-processing facilities can now also take advantage of new fire-detection technologies, which provide for earlier warning of equipment malfunction and incipient fire conditions.

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Learn how to create value with re-use; gain productivity with lean automation and connectivity, and optimize panel design and construction.
Machine design tips: Pneumatic or electric; Software upgrades; Ethernet advantages; Additive manufacturing; Engineering Leaders; Product exclusives: PLC, HMI, IO
Industrial wireless cyber security: More complex than black and white; IIoT at the I/O level; Process modeling; Cyber security research
Robotic advances: Software, form factors; System-based ROI; Embedded control; MES and information integration; SCADA and cyber security; Position sensor; Controller, I/O module
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again
Pipeline vulnerabilities? Securing hydrocarbon transit; Predictive analytics hit the mainstream; Dirty pipelines decrease flow, production—pig your line; Ensuring pipeline physical and cyber security
Cyber security attack: The threat is real; Hacking O&G control systems: Understanding the cyber risk; The active cyber defense cycle