ENERGY STAR* System Implementation Published by Intel with Technical Collaboration from the U.S

Total Page:16

File Type:pdf, Size:1020Kb

ENERGY STAR* System Implementation Published by Intel with Technical Collaboration from the U.S ENERGY STAR* System Implementation Published by Intel with technical collaboration from the U.S. Environmental Protection Agency Whitepaper February 2007 Revision -001 Document Number: 316478-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Intel and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other names and brands may be claimed as the property of others. Copyright © 2007, Intel Corporation. All rights reserved. 2 Contents 1 Preface............................................................................................................6 2 Introduction .....................................................................................................7 2.1 ENERGY STAR Version 4.0 .......................................................................8 2.2 Taking Advantage of Power Management Settings.......................................8 2.3 Terminology ..........................................................................................9 2.4 ENERGY STAR and Computer Platforms ...................................................11 2.5 ENERGY STAR Common Platform Requirements ........................................13 2.6 Reference Documents ...........................................................................13 3 Notebooks and ENERGY STAR Requirements .......................................................14 3.1 Notebooks, Battery Life and AC Energy....................................................14 3.2 ENERGY STAR Basics for Notebooks ........................................................14 3.3 The Notebook Platform..........................................................................16 3.4 Power Delivery: A System’s Power Amplifier.............................................18 3.5 ENERGY STAR Requirements for the AC Brick ...........................................20 3.6 Power Breakdown of the Notebook..........................................................22 3.7 Power sensitivity to Power Delivery Efficiencies.........................................23 3.8 Optimizing a Notebook for ENERGY STAR.................................................26 3.9 Summary............................................................................................29 4 Desktop Computers and ENERGY STAR Requirements ..........................................30 4.1.1 Category Definitions ................................................................30 4.2 Power Supply Considerations .................................................................31 4.2.1 ENERGY STAR Requirements.....................................................31 4.2.2 Overall Efficiency Measurements................................................31 4.2.3 Power Supply Sizing ................................................................32 4.2.4 5 V Standby (5 VSB) Efficiency..................................................35 4.2.5 External Power Supplies for Desktop Systems..............................36 4.3 Operational Modes................................................................................36 4.3.1 Idle Mode...............................................................................38 4.3.2 Sleep Mode ............................................................................40 4.3.3 Off Mode (Standby) .................................................................41 4.4 Summary............................................................................................42 5 Workstations and Desktop-derived Servers .........................................................43 5.1 ENERGY STAR Workstation and Desktop Derived Server Specification Scope .43 5.2 Desktop Derived Servers and Specification Application...............................44 5.3 Workstation Category and Definition .......................................................45 5.4 Workstation Scalable Specification ..........................................................46 5.5 Measurements .....................................................................................49 5.5.1 Max_Power.............................................................................49 5.5.2 Typical Electricity Consumption .................................................50 5.5.3 Tools and Calibration ...............................................................51 3 5.5.4 Power Management and Settings ...............................................51 6 Future Specification Considerations ...................................................................52 7 Summary ......................................................................................................53 Appendix A Creating a Disk Image .....................................................................................54 A.1 Modifications to the Default User/policy in Rollout Image (i.e.; “Ghosting”) .............54 A.2 Microsoft Windows* XP ....................................................................................55 A.3 Microsoft Windows Vista*.................................................................................57 About the Authors ..............................................................................................................59 Figures Figure 1: Microsoft Windows* XP Computer and Monitor Sleep Settings ....................9 Figure 2. Typical Type A Notebook System (integrated graphics, UMA Memory) .......17 Figure 3. Typical Type B Notebook (discrete graphics) ..........................................18 Figure 4. Notebook Power Delivery System .........................................................18 Figure 5. Example AC Brick Efficiency over Different Loads....................................21 Figure 6. Typical Notebook Idle Power Breakdown ...............................................22 Figure 7. Typical Notebook Sleep Power Breakdown .............................................23 Figure 8. Idle Power distribution across efficiencies ..............................................24 Figure 9. Sleep Power distribution across efficiencies............................................24 Figure 10. Idle Effects of Low Power States.........................................................26 Figure 11. Percent Spundown Time Operating on Battery......................................28 Figure 12. PSU Efficiency as Percentage of Output ...............................................33 Figure 13. PSU Efficiency per Power for 450 W PSU..............................................34 Figure 14. PSU Efficiency per Power for 250 W PSU..............................................35 Figure 15. Idle Mode System Power State Example ..............................................37 Figure 16. Sleep (S3) Mode System Power State Example.....................................37 Figure 17. Standby (S5) Mode System Power State Example .................................38 Figure 18. System Idle Power Factors ................................................................40 Figure 19. Scaleable Typical Electricity Consumption ............................................47 Tables Table 1. ENERGY STAR Requirements for Notebooks ............................................15 Table 2. Active Mode Requirements for Average Efficiency ....................................20 Table 3. No Load Requirements.........................................................................20 Table 4: ENERGY STAR Category Wall Power Requirements...................................31 Table 5. Power Supply Sizes for Desktop System Categories .................................35 4 Revision History Revision Description Revision Date Number 001 Initial release. February 2007 § 5 Preface 1 Preface In July of 2007 a new version of the ENERGY STAR* specification for computers will take effect. This new version specifies many new system level requirements that must be met in order to carry the ENERGY STAR logo on computers. As such, Intel and the EPA have collaborated on creating this document that can provide system providers, from the largest to smallest, with key understandings on how to specify and test system configurations that can best meet the required power levels of the new specification. 6 Introduction 2 Introduction Over the last twenty-five years, computers have become pervasively used tools that have enhanced the productivity in the office and enhanced the entertainment and utility
Recommended publications
  • ZD421 and ZD621 Users Guide (En)
    ZD421 and ZD621 Series Link-OS® Printers User Guide P1123730-01EN ZEBRA and the stylized Zebra head are trademarks of Zebra Technologies Corporation, registered in many jurisdictions worldwide. All other trademarks are the property of their respective owners. © 2021 Zebra Technologies Corporation and/or its affiliates. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of those agreements. For further information regarding legal and proprietary statements, please go to: SOFTWARE: zebra.com/linkoslegal COPYRIGHTS: zebra.com/copyright WARRANTY: zebra.com/warranty END USER LICENSE AGREEMENT: zebra.com/eula Terms of Use Proprietary Statement This manual contains proprietary information of Zebra Technologies Corporation and its subsidiaries (“Zebra Technologies”). It is intended solely for the information and use of parties operating and maintaining the equipment described herein. Such proprietary information may not be used, reproduced, or disclosed to any other parties for any other purpose without the express, written permission of Zebra Technologies. Product Improvements Continuous improvement of products is a policy of Zebra Technologies. All specifications and designs are subject to change without notice. Liability Disclaimer Zebra Technologies takes steps to ensure that its published Engineering specifications and manuals are
    [Show full text]
  • Shell Scripting with Bash
    Introduction to Shell Scripting with Bash Charles Jahnke Research Computing Services Information Services & Technology Topics for Today ● Introductions ● Basic Terminology ● How to get help ● Command-line vs. Scripting ● Variables ● Handling Arguments ● Standard I/O, Pipes, and Redirection ● Control Structures (loops and If statements) ● SCC Job Submission Example Research Computing Services Research Computing Services (RCS) A group within Information Services & Technology at Boston University provides computing, storage, and visualization resources and services to support research that has specialized or highly intensive computation, storage, bandwidth, or graphics requirements. Three Primary Services: ● Research Computation ● Research Visualization ● Research Consulting and Training Breadth of Research on the Shared Computing Cluster (SCC) Me ● Research Facilitator and Administrator ● Background in biomedical engineering, bioinformatics, and IT systems ● Offices on both CRC and BUMC ○ Most of our staff on the Charles River Campus, some dedicated to BUMC ● Contact: [email protected] You ● Who has experience programming? ● Using Linux? ● Using the Shared Computing Cluster (SCC)? Basic Terminology The Command-line The line on which commands are typed and passed to the shell. Username Hostname Current Directory [username@scc1 ~]$ Prompt Command Line (input) The Shell ● The interface between the user and the operating system ● Program that interprets and executes input ● Provides: ○ Built-in commands ○ Programming control structures ○ Environment
    [Show full text]
  • User's Manual 2
    USER'S MANUAL 2 - © 2018. All Rights Reserved. Nitro 5 Covers: AN515-42 / AN515-52 This revision: March 2018 Important This manual contains proprietary information that is protected by copyright laws. The information contained in this manual is subject to change without notice. Some features described in this manual may not be supported depending on the Operating System version. Images provided herein are for reference only and may contain information or features that do not apply to your computer. Acer Group shall not be liable for technical or editorial errors or omissions contained in this manual. Register your Acer product 1. Ensure you are connected to the Internet. 2. Open the Acer Product Registration app. 3. Install any required updates. 4. Sign up for an Acer ID or sign in if you already have an Acer ID, it will automatically register your product. After we receive your product registration, you will be sent a confirmation email with important data. Model number: _________________________________ Serial number: _________________________________ Date of purchase: ______________________________ Place of purchase: ______________________________ Table of contents - 3 TABLE OF CONTENTS First things first 6 BIOS utility 39 Your guides ............................................. 6 Boot sequence....................................... 39 Basic care and tips for using your Setting passwords ................................. 39 computer.................................................. 6 Power management 40 Turning your computer off..........................
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Fifth Internet Edition William Shotts A LinuxCommand.org Book Copyright ©2008-2019, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042. A version of this book is also available in printed form, published by No Starch Press. Copies may be purchased wherever fine books are sold. No Starch Press also offers elec- tronic formats for popular e-readers. They can be reached at: https://www.nostarch.com. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. Release History Version Date Description 19.01A January 28, 2019 Fifth Internet Edition (Corrected TOC) 19.01 January 17, 2019 Fifth Internet Edition. 17.10 October 19, 2017 Fourth Internet Edition. 16.07 July 28, 2016 Third Internet Edition. 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. Table of Contents Introduction....................................................................................................xvi Why Use the Command Line?......................................................................................xvi
    [Show full text]
  • Shell Variables
    Shell Using the command line Orna Agmon ladypine at vipe.technion.ac.il Haifux Shell – p. 1/55 TOC Various shells Customizing the shell getting help and information Combining simple and useful commands output redirection lists of commands job control environment variables Remote shell textual editors textual clients references Shell – p. 2/55 What is the shell? The shell is the wrapper around the system: a communication means between the user and the system The shell is the manner in which the user can interact with the system through the terminal. The shell is also a script interpreter. The simplest script is a bunch of shell commands. Shell scripts are used in order to boot the system. The user can also write and execute shell scripts. Shell – p. 3/55 Shell - which shell? There are several kinds of shells. For example, bash (Bourne Again Shell), csh, tcsh, zsh, ksh (Korn Shell). The most important shell is bash, since it is available on almost every free Unix system. The Linux system scripts use bash. The default shell for the user is set in the /etc/passwd file. Here is a line out of this file for example: dana:x:500:500:Dana,,,:/home/dana:/bin/bash This line means that user dana uses bash (located on the system at /bin/bash) as her default shell. Shell – p. 4/55 Starting to work in another shell If Dana wishes to temporarily use another shell, she can simply call this shell from the command line: [dana@granada ˜]$ bash dana@granada:˜$ #In bash now dana@granada:˜$ exit [dana@granada ˜]$ bash dana@granada:˜$ #In bash now, going to hit ctrl D dana@granada:˜$ exit [dana@granada ˜]$ #In original shell now Shell – p.
    [Show full text]
  • Getting Started with Symantec Endpoint Encryption for Bitlocker
    Getting Started with Symantec Endpoint Encryption for BitLocker Version 11.3.0 Getting Started with Symantec Endpoint Encryption for BitLocker Legal Notice Copyright © 2019 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo and are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION.
    [Show full text]
  • Why Can't I Wake My Jetdrive 850 up from Hibernation Mode? Why Can't I
    Why can't I wake my JetDrive 850 up from Hibernation Mode? If you encounter this problem while the JetDrive 850 is running on battery power, please note that this issue will happen with all NVMe SSDs, including Apple's native NVMe SSD. Our current assumption is that the NVMe driver of the Mac OS is causing it. Please run Terminal on your Mac and enter "sudo pmset -a hibernatemode 3" to reset the mode to its default value: 3. You can also check if the hibernatemode has been successfully altered by entering the command "pmset -g". Why can't I boot from my JetDrive SSD after system migration? If, after installation, your system won't recognize the JetDrive SSD as the default boot drive, and shows you an icon same as the one in the pic below, it could be because the MacOS has upgraded its security level for drives. This is more likely to occur in the 10.14 (Mojave) version. How to solve this: 1. If you have an enclosure for the JetDrive SSD, please place Apple's native SSD in it, and connect the enclosure to your Mac. If you don't have an enclosure, please use an external HDD or SSD with the MacOS installed. 2. Start your Mac, and press the "Option" key. 3. Click on any drive to enter MacOS. 4. Go to System Preferences. Go to "Startup Disk". 5. Select the installed JetDrive SSD as the default boot disk. How to clean install MacOS on the JerDrive 855/850 It is entirely normal to encounter problems attempting to clean install OS to your JetDrive 855/850, as the internet recovery will reinstall to your JetDrive the original operating system that came the same year with the Mac, and since the JetDrive 855/850 only works with High Sierra or later versions (10.13 or later), a clean install of an earlier MacOS is out of the question.
    [Show full text]
  • Sleep 2.1 Manual
    Sleep 2.1 Manual "If you put a million monkeys at a million keyboards, one of them will eventually write a Java program. The rest of them will write Perl programs." -- Anonymous Raphael Mudge Sleep 2.1 Manual Revision: 06.02.08 Released under a Creative Commons Attribution-ShareAlike 3.0 License (see http://creativecommons.org/licenses/by-sa/3.0/us/) You are free: • to Share -- to copy, distribute, display, and perform the work • to Remix -- to make derivative works Under the following conditions: Attribution. You must attribute this work to Raphael Mudge with a link to http://sleep.dashnine.org/ Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under the same, similar or a compatible license. • For any reuse or distribution, you must make clear to others the license terms of this work. The best way to do this is with a link to the license. • Any of the above conditions can be waived if you get permission from the copyright holder. • Apart from the remix rights granted under this license, nothing in this license impairs or restricts the author's moral rights. Your fair use and other rights are in no way affected by the above. Table of Contents Introduction................................................................................................. 1 I. What is Sleep?...................................................................................................1 II. Manual Conventions......................................................................................2 III.
    [Show full text]
  • Netstat Statistics Comparison with Perl by Noah Davids
    Netstat Statistics Comparison with Perl By Noah Davids Comparing sets of numeric output can be tiresome. Using the output from the netstat command helps diagnose problems. Over time, the changes in the statistics reported can be very informative.This article explains how this network specialist and Perl novice decided to write a program to do the comparison for him. INTRODUCTION THE SCRIPT Comparing sets of numeric output can be tedious, especially when The script expects as input a file with the following format: the numbers are large and there are a lot of them. Unfortunately it is Some number of random lines something I have to do fairly often. As a network support specialist, I Line with unique string indicating start of data set 1 often use the output from the netstat command to help diagnose Some fixed number of lines with the format: problems. Changes in the statistics reported over time can be very enlightening. In addition, as part of the support process, I have to LABEL NUMBER LABEL NUMBER LABEL include those differences in my written analysis. Punching the long numbers into a calculator and copying the answer back out is a drag. Some number of random lines Using cut and paste helps only marginally. Line with the same unique string indicating start of data 2 To make my life simpler, I decided to write a program to do the Some fixed number of lines with the format: comparison for me. However, I support four different operating sys- tems, and while each has a netstat command, the format and content LABEL NUMBER LABEL NUMBER LABEL of the output varies with each OS.
    [Show full text]
  • ANSWERS ΤΟ EVEN-Numbered
    8 Answers to Even-numbered Exercises 2.1. WhatExplain the following unexpected are result: two ways you can execute a shell script when you do not have execute permission for the file containing the script? Can you execute a shell script if you do not have read permission for the file containing the script? You can give the name of the file containing the script as an argument to the shell (for example, bash scriptfile or tcsh scriptfile, where scriptfile is the name of the file containing the script). Under bash you can give the following command: $ . scriptfile Under both bash and tcsh you can use this command: $ source scriptfile Because the shell must read the commands from the file containing a shell script before it can execute the commands, you must have read permission for the file to execute a shell script. 4.3. AssumeWhat is the purpose ble? you have made the following assignment: $ person=zach Give the output of each of the following commands. a. echo $person zach b. echo '$person' $person c. echo "$person" zach 1 2 6.5. Assumengs. the /home/zach/grants/biblios and /home/zach/biblios directories exist. Specify Zach’s working directory after he executes each sequence of commands. Explain what happens in each case. a. $ pwd /home/zach/grants $ CDPATH=$(pwd) $ cd $ cd biblios After executing the preceding commands, Zach’s working directory is /home/zach/grants/biblios. When CDPATH is set and the working directory is not specified in CDPATH, cd searches the working directory only after it searches the directories specified by CDPATH.
    [Show full text]
  • Green Computing Tips.Pmd
    Green Computing Guide For further assistance, additional green computing tips, or more copies of this brouchure, contact: IUE Teaching & Learning Center (765) 973-8561 [email protected] www.iue.edu/tlc Reduce Your Impact on the Acknowledgement Much of the text for this document was Environment adapted from the “University of Buffalo Green Computing Guide” written by Walter Simpson, University of Buffalo Energy Officer. in Two Simple Steps! To manually put the computer and monitor to FAQS How to Reduce Energy sleep: 1. Click on the Apple (OSX) Won’t turning equipment on and off In 2 Simple Steps or go to “Special” on the menu bar at top of your shorten its life? screen (OS9). 2. Select “Sleep.” No. You are far more likely to replace your equipment due to obsolescence! Heat and 1 RIGHT NOW: Waking Up from Sleep Mode time are the primary wear factors. Hard drives Just hit a key to quickly wake up your system. are designed to handle many thousands of on/ Enable Your Power Management Feature off cycles. Most computers and monitors can be TIP: Do you have a flat panel display? Turning programmed to automatically power down to a 2 ONGOING: it off when not in use not only saves energy, low power state (also called “sleep” or Turn It Off Whenever Possible but will conserve the backlight and extend the “standby”) when they are not being used. The life of your monitor. EPA has estimated that enabling sleep mode • When not in use for an extended period of time, reduces a computer’s energy use by 60 to 70 turn off your computer and/or peripherals I thought my computer used about the same percent! (monitor, printer, etc.) wattage as a light bulb.
    [Show full text]
  • System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1
    SUSE Linux Enterprise Server 15 SP1 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1 An administrator's guide for problem detection, resolution and optimization. Find how to inspect and optimize your system by means of monitoring tools and how to eciently manage resources. Also contains an overview of common problems and solutions and of additional help and documentation resources. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xii 1 Available Documentation xiii
    [Show full text]