How does mineral oil cooling work? What is the overall process?
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
In the simplest form, an electronic system such as a server can simply be submerged in an open bath of suitable liquid like mineral oil or Novec -- 3M's proprietary liquid coolant. One example is the 250 gallon rack immersion system from Green Revolution Cooling. The electronic system is powered and operated normally. Since the cooling liquid is inert and nonconductive, the power and electronic signals are unaffected. During normal operation, liquid absorbs the heat produced by the electronic devices like processors and memory.
The second and more complicated issue for mineral oil cooling is dealing with the heat absorbed into the liquid, and the solution depends on how warm the liquid becomes. For a single server in a simple open mineral oil bath, a basic pump may be enough to just circulate the fluid through some heat sink piping to dissipate any heat to the open air. Other systems may circulate the heated cooling fluid to some other form of heat exchanger system.
Companies like Iceotope, however, use a water-based heat exchanger system to pull heat from a blade server encased in a quantity of Novec. Water at about 45 degrees Celsius is introduced at the bottom of the blade and passed through a series of pipes within the passive Novec bath (the actual cooling fluid is not actively pumped or circulated). The water absorbs some heat from the Novec fluid and leaves the blade at a slightly higher temperature; usually less than 50 degrees C.
Dig Deeper on Data center design and facilities
Related Q&A from Stephen J. Bigelow
Our enterprise wants to limit the time it spends generating Identity and Access Management policies. What tools are available to automate this task?continue reading
Multifactor authentication helps organizations verify account and user identities in the public cloud. But what do I do when my MFA devices fall out ...continue reading
We have restrictions imposed on in-house IT staff with AWS Identity and Access Management. How do IAM roles protect access to services, applications ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.