Choosing your cabinet

April 2018 Infrastructure, Products & Solutions

When it comes to selecting cabinets and racks for your IT equipment, there are many standard solutions to choose from, as well as the option to design something for your specific environment and requirements. In this article, BT-SA’s Stephan van Aswegen provides some insight into the BT-SA’s methodology of building cabinets for various scenarios.

van Aswegen explains that the company categorises cabinets into three primary application areas: server rooms and datacentres, patch rooms and cabinets for retail environments or small offices. However, van Aswegen notes that the final decision always depends on the particular requirements and the environment of the end user.

Most of us consider cabinets to be simply devices that are only there to hold a bunch of electronic equipment, but the selection of these cabinets is more complex. When choosing cabinet options, users should consider the space available as well as the weight and dimensions of their equipment, as well as allow for future expansion.

van Aswegen adds that you need to determine ahead of purchase how the cabinets will be accessed – front vs. rear – as well as the airflow and ventilation as electronic equipment gets hot when in operation. In addition, power distribution needs to be considered and the installation team will need to know which power strips to install and how many are required.

And finally, the security of the cabinets and how the company will control access to them is critical if you want to ensure that only authorised people can open the doors and access the electronics.

Cabinet options

Server rooms and data centres: In these environments, van Aswegen recommends 42U or 43U cabinets with perforated doors to ensure ventilation for the internal components (one rack unit (U) is 1.75 inches, almost 4.5 centimetres).

Patch rooms: In this scenario, she says 32U, 25U, 18U and 15U cabinets are mostly used. The size chosen depends on how many users need to be served with the computing equipment. Here, again, perforated doors are good to assist in ventilation, although some customers may choose the option of glass doors.

Retail and small offices: These environments have less computing requirements than those above and the size of the cabinets ranges from 15U down to 4U, and they usually accommodate primarily switches and user points. A normal swing door is acceptable here, although the client can again opt for perforated or glass doors.

van Aswegen adds that these are just the basic options. Additional considerations include:

• Ventilation / cooling systems,

• Power source and management,

• Environmental control management,

• Mounting options,

• Anti-tip feet, casters and levellers,

• Different shelving options,

• Cable management options, and

• Even what colour you prefer.

For more information contact BT-SA, 0860 105 183, [email protected], www.bt-sa.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
Workforce management automation for Transguard
IoT & Automation Products & Solutions
Invixium and RTLS-connected worker solutions have been selected to supply 400 rugged biometric solution, IXM TITAN, for time tracking at work sites for Transguard Group, a subsidiary of Emirates Group.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
Smarter ways to secure your space
Elvey Security Technologies Access Control & Identity Management Products & Solutions
Ensuring the safety of people and assets has become more crucial than ever, and access control systems provide essential tools to regulate and monitor who can enter specific areas or access sensitive resources.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Guarding data privacy
Suprema Access Control & Identity Management Products & Solutions
Suprema’s BioEntry W3 is designed with data privacy as a top priority, addressing concerns through its display-free design and highly secure ‘Template on Mobile’ (ToM) authentication, making data privacy a top priority.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...