|Air Cooling the Perfect Computer

This blog post is part of a series on my experience building the perfect computer, where I discuss the various decisions that I made on the most efficient, reliable way to cool my computer's components.

Air cooling was only part of my solution. For more, see Water-Cooling Part 1 and Part 2.

To decide which fans to choose, you need to consider the following:


Air Flow

Cubic Feet per Minute (CFM)

This tells you the volume of air pushed by a fan, given no resistance. Higher airflow is better; however, high airflow fans can sometimes have lower static pressure, which may be a defect if you are trying to cool a radiator. I equate this to horsepower in a car. Fans with higher airflow are best suited for pushing/pulling air through your case when a radiator does not obstruct them.

Static Pressure

mmH20

The amount of force behind airflow, which is like the amount of torque in a car. Fans with higher static pressure are best suited for pushing/pulling air through a radiator. For fans that use a radiator, you should look for static pressure of at least 2-3 mmH20.


Noise Level

Decibels (dBA)

In general, you will want to choose fans with the lowest noise possible that still gives you the performance you need. Luckily, most manufacturers are conscious of noise concerns. You should look for fans with a dBA of less than 30 or less than 20 if you want it to be very quiet.


PWM  

There are two basic types of fan connectors.

Lighting

RPM In my opinion, this is the least essential metric to care about.   

Aside: If you have a choice, make sure to choose fans with a relatively

high static pressure for pushing/pulling air past your radiator.

In my first build, I used Silent Wings. I was very impressed by their performance and build quality – if you are creating a build and don't care about going down RGB's route, I would highly recommend these.


Ultimately as I started to build out my iCue RGB system, I went for the Corsair QL120's. While the build quality and performance are not quite as good as the Silent Wings, the RGB features are immense.

Comments

To add a comment, please login or register.

Related

C-Level Security: Bank security and the egg timer (how good management trumps technology)
The development of technology for securing information has been advancing at a pace that is truly astounding. In 20 years the security industry has evolved from Sun Micro Systems' Sunscreen and the Cisco PIX (yes I know there were a few others) to over a thousand security products of which nearly 700 are currently VC funded. All are trying to generate business from within this ever advancing market currently called Cyber Security. There are few tech markets growing at the rate of Cyber Security and as a result we are seeing investors, in a near desperate attempt to gather slivers of this market, throwing money at companies with Rube-Goldberg-inspired technology. We now have a flood of technology solutions that no one person can understand and the customers that consume this technology struggle daily with supporting and operating these systems. Many of the C-Level executives reading this may want to consider a management solution for the next expensive problem your engineering team presents to you.
What to Say to the C-Level, get your security project funded today!
In near every business adding costs to Information Systems will be seen, by the people running the business, as a cost first, benefit second. Remarkably this still holds true despite a constant pulse of security events hitting the C-Level desks. So let's, as security professionals, develop an understanding of the C-Suite and the C-Levels as to their priorities.
C-Level: Fan Boy, XEB
In 1999 I was extremely busy. I had just started a company, my second, in the Network Security field which was new and unknown. Sales were slow, hacking was deep, deep inside campuses like Stanford and MIT and was considered sport. I was getting traction with banks and was in SF for a meeting. I remember walking down Mission past a guitar shop and hearing this song, guitar was hitting the tonic breaking into cool background riffs, a little vocal falsetto opening then breaking into verse…..broken and then back…..WTF. Reminiscent of a Cello piece I know……..inspired….. I stopped dead in my tracks - stunned. Who are these guys!?!
C-Level Security: When your team uses military analogies, are they using the wrong narrative?
For years, I have bristled when people would use medieval military descriptions in an attempt to convey concepts within the Network Security business. Bastions, Firewalls, Moats, Drawbridges, Countermeasures; all of these descriptions give way to a more accurate and detailed explanation of what was really taking place.