This subject matter is generally related to power management.
Conventional power management techniques used by computing devices often operate in an autonomous fashion. For example, a given device can automatically enter a power-saving mode based on a level of activity associated with the device. In a networked environment, however, a computing device can have multiple users. In an office or business environment, both a user of the device as well as a person in charge of maintenance of the device may use the device at different times. Typically, the person in charge of the maintenance is a remote user. In a home environment, multiple users may access information and/or run an application on the same device. In this case, only one of the users is co-located with the device.
Conventional autonomous power management techniques take into account current activity levels in computing devices, not activities being initiated or soon to be initiated by one or more remote users. Hence, conventional autonomous power management techniques may not be effective in a networked environment in a home or office.
A network-centric, power management system and method is disclosed for monitoring and controlling device nodes attached to a network. The monitoring and controlling includes collecting and processing information available on the network about the device nodes and using the collected information to manage power on the device nodes.
The power management system and method improves power management of enterprise office computing and communication device nodes (e.g., desktop computers, phones, printers, scanners, access points, switches, etc.) in small, medium, or large enterprises, including corporations, organizations, government, etc. It also improves power management of enterprise office or building automation device nodes (e.g., sensors, actuators, cameras, alarms, etc.) that are supported by a networking and computing infrastructure. The system and method improves power management for networked device nodes used in home computing, and entertainment, as well as home automation. Power management of enterprise and home computing and building automation can yield substantial power and cost savings using the system and method.
A typical office and home has multiple devices that consume power. For example, many homes and offices are equipped with at least a computer and a printer. Because the user can use only one device at a time, the usage of each device can be low on average. Despite this low average usage, many users keep their devices on at all times resulting in a high power cost. Generally speaking, the reason to keep all devices on is that: (1) there is uncertainty as to which device the user will use next and when, and (2) the user is sensitive to waiting for a device to power up. Hence, the high power cost is traded for potential latency cost.
The system 100 can improve the power-latency tradeoff by reducing the uncertainty concerning which device (e.g., when and where) the user will use next. To reduce this uncertainty, the power management system 100 can (1) increase the volume and improve the quality of data collected about the user, (2) fuse and correlate the data for decision making, and (3) use more intelligent decision making processes for powering up/down devices in anticipation of user request for usage and input. To address the aforementioned issues, among others, the system 100 can track the user through a network and monitors the user's interactions with the network and with devices connected thereto.
The system 100 is network-centric in that it manages a network periphery of connected device nodes from the vantage point of the network, where information from various device nodes can be collected, integrated and acted upon. This approach is in contrast to conventional power management techniques that are device-centric, trying to optimize power usage on each individual device node in isolation. Therefore, conventional power management techniques miss the benefits of capturing and correlating network-wide data about the location and operational context of the user to tightly anticipate device node usage request and get user input. For example, when the power management system 100 is installed in an enterprise network detects that a user's laptop (or other mobile device) is connected to an enterprise WiFi access point that is remote from the user's office, the system 100 can determine that the user is away from the office and that the user's computer can be shutdown.
The system 100 can be non-invasive to the user's enterprise and home network architecture and operations. For example, in some implementations the system 100 may not require installing any software client on the managed device nodes (clientless). The system 100 may even be implemented in a box or appliance that can be coupled into a network and be given “read permissions” to enterprise server log files.
The system 100 can be scalable to large numbers of device nodes and robust enough to avoid disruption of enterprise or home operations due to inadvertent instability or planned attack. The system 100 can avoid “a single point of failure” by being deployed in a distributed implementation combined with managed redundancy.
Communication node 102 can have at least information communication capabilities and optionally information processing capabilities. The communication node 102 allows unidirectional and/or bidirectional transfer of communication messages from at least one communication port or interface to another communication port or interface. Some examples of the communication node 102 include one or more of: a wireline packet switch, a telephone switch, a wireless access point, etc.
Communication links 106 can be, for example, bidirectional or unidirectional, digital or analog, wireline (e.g., electrical, optical, Ethernet, ATM) or wireless (e.g., radio, WiFi, WiMax, GSM, satellite, optical infrared), or any combination of the above. Indeed, communication links 106 can be supported by any known communication medium and any communication technology.
Control nodes 104 can have information communication and/or processing capabilities. The control nodes 104 can have at least one communication port or interface to which at least one communication link 106 is coupled and allows information communication between the control nodes 104 and other elements of the system 100, including one or more communication nodes 102, device nodes 108, other control nodes 104, etc. For example, the control node 104a can comprise one or more processors, processing cores or microcontrollers, residing on a computer host, a computer server, or specialized electronic equipment, etc. The control node 104a can be implemented in hardware or software or a combination of both, and/or implemented as a software process or processor embedded in a larger system.
The device nodes 108 can have information communication capability and/or one or more other capabilities, including but not limited to: computing, processing, command, control, sensing, actuating, or any combination of those. The device nodes 108 can have at least one information communication port and/or interface to which a communication link 106 is coupled and allows information communication between a given device node 108 and other elements of the system 100, including one or more communication nodes 102, control nodes 104, other device nodes 108, etc. For example, a device node 108a can be one of the following devices (or a group of them) with a communication interface, which devices include but are not limited to: computers (e.g., desktop, laptop, etc.), personal digital assistants (PDAs), wireless phones, printers, scanners, home “network attached storage” devices, light switches, electrical outlets, home entertainment units (video recorders, etc.), surveillance cameras, set-top boxes, media players, etc.
In some implementations, the device nodes 108a can be power managed by at least one control node 104a, which can include a controller. For example, in
For example, consider a desktop computer (device 108a) which is connected through an Ethernet port to a switch (communication node 102). Connected to the computer 108a through a port (e.g., a USB port) is a printer (device 108b), which is not connected to any other device 108 but only to the computer 108a. The computer 108a is power managed by the control node 104a which is connected to the switch 102 through the Ethernet. The printer 108b is power managed by control node 104b which is also coupled to the switch 102. Note that in the previous configuration the computer 108a is the device node 108a that is power managed by the control node 104a through the switch 102. The printer is device node 108b which is power managed by the control node 104b through the switch 102 and the computer 108a. Thus the computer 108a can be both a device node 108 power managed by the control node 104a and a communication node 102 mediating power management of the printer 108b by the control node 104b.
The device node 108 can include a revive engine 404 that can switch the device node 108 to a previous, higher operational mode that uses higher or equal power than the previous operational mode and has a different combination of active services and/or functionalities. Note that the device node 108 can also switch to a special operational mode where the device node 108 is fully off, such as being powered down, except for a minimal communication capability to respond to controller commands and fully on (e.g., fully powered up).
The device node 108 can have software and/or hardware components supporting functionalities of the device node 108, including electronic circuitry for running software (e.g., special digital circuitry, embedded processor, microprocessor).
Referring now to
To illustrate by example, consider a case of a device node 108 that is a laser printer. The laser printer can have several power consumption units 504. For example, the motor that drives the motion and flow of paper sheets can be a power consumption unit 504a, the heating elements supporting the printing process can be a power consumption unit 504b, the motor that runs the cooling fan can be a power consumption unit 504c, etc. At least one of the power consumption units 504 can be set to various power consumption modes. For example, the paper moving motor may be set to faster or slower modes, depending on how fast or slow the printer is printing, where the faster the motor runs the more power is consumed by the laser printer. Also, the cooling fan motor may be set to faster or slower modes, depending on the temperature of the printer case and/or printer operating environment, where the faster the motor runs the more power is consumed. Similarly, at least one power consumption unit 504 in at least one power managed device node 108 can be set at a point in time to one of a plurality of power consumption modes.
In some implementations, a device node 108 and a corresponding control node 104 monitor, collect and process operational and/or power usage data of the device node 108. Operational data can reflect the activities the device node 108 is undertaking. For example, data backups or virus scans for a personal computer, printing or idling for a printer, recording or idling for a camera with a motion sensor, etc. Power usage data can refer to how much power and for what purpose the device node 108 is consuming (perhaps, broken down per activity). For example, in a personal computer the operating system (e.g., Windows, Linux, Mac OS) can collect power usage data and send the data to a corresponding control node 102 in response to trigger events or on a scheduled basis (e.g., periodically). In another example, the corresponding control node 104 can install a software client on the device node 108 power managed by the control node 104 to collect operational and power usage data and upload the data to the control node 104.
In some implementations, to leverage the power management functionalities of device nodes 108 and control nodes 104, the system 100 monitors and displays power usage profiles of one or more device nodes 108 coupled to or integrated with the communication network 606. The power usage profiles can be displayed in an suitable form for network operators and/or power managers. Device nodes 108 that couple to the network 606 components (e.g., switches, hubs, routers) which have power monitoring and management capabilities can be viewed as device nodes 108 and selected by the network operator and/or power manager for monitoring and display. The power usage profiles of device nodes 108 can include instantaneous power consumption, as well as a cumulative power consumption over time, and other statistics, averages, variances, etc. This data extracted from monitored device nodes 108 can be collected and deposited in a power consumption data repository (e.g., a database) at a processing facility (e.g., a server at a data center) and used to extract and build power usage profiles of monitored device nodes 108, which can be selected by a network operator and/or power manager. The power usage data and corresponding profiles can be processed and presented in appropriate graphic formats on a display facility (e.g., monitor, video wall, projection screen) for the network operator and/or power manager to view.
Therefore, the network operator and/or power manager can: 1) select one or more device nodes 108 coupled to the network 606 or integrated with the network 606 (e.g., switches, links), and 2) collect power usage data from these device nodes 108, and 3) view the profiles on a monitor. Hence, the network operator and/or power manager can then evaluate the power usage on the network and take appropriate measures and responses, for example, set alarms to sound when power usage exceeds certain thresholds, etc.
In some implementations, a system for managing power consumption of a device node attached to a communication node of a communication network includes an interface configurable for coupling to the communication node; and a controller coupled to the interface and operable for monitoring activity at the device node, and, responsive to detected activity at the device node, operable to send a command to the device node for setting the device node into an operational mode associated with power consumption. The operational mode can include turning the device node on or off.
The monitoring activity can include learning an activity pattern associated with the device node. The monitoring activity can include learning a usage pattern associated with the device node and a user. The monitoring activity can include learning a user location pattern associated with the device node and a user. The monitoring activity can include monitoring one or more of: user calendar information residing at the device node, user location relative to the device node, user login history associated with the device node, user usage history associated with the device node and user input entered at the device node.
The detected activity can be a sensed user activity in a device node environment (e.g., user motion detected by a motion sensor in the environment of the device node). The controller can be responsive to information other than detected activity (e.g., control rules). For example, the control can be responsive to a user response to a system request or communication. For example, the system 100 can display a pop up menu or other notification to the user at the device requesting input, then waiting for the input to determine if the user is currently present at the device node. If the device node has telephony capability (e.g., a mobile phone), then the system 100 can ring the device node and see if the user answers the ring. Similarly, the system 100 can send an email, Instant Message or other communication to the device node and wait for the user to answer. When the user responds, the user can provide identifying information to the system 100, so that activity, usage and/or location patterns associated with the user can be updated.
In some implementations, the controller can estimate a probability of a user being proximate to the device node (e.g., in the same location as the device node).
Referring to
This section describes how to estimate a location and likely future activity of a user. This section also describes how to use this estimation to select one or more actions to minimize energy consumption of a device node while limiting inconvenience to users. The goal of the device control is to derive estimators that require a limited amount of state information.
In some implementations, rules for determining actions can be described using conditional statements. For the rule descriptions that follow, T designates time until a device node is again active, where time can be measured in minutes or any other desired unit, S designates an event that some application should keep running in background at slow speed, F designates an event that an application must run in background at full speed, and P(A) is a marginal probability that the user is active during the next x minutes (e.g., 20 minutes).
The values in the rules described above can be adjusted. Moreover, the values may depend on a category of users. An estimator can use the activity traces 700, 702 to calculate relevant probabilities.
The marginal probability, P(A), that a user is active can be estimated from collected data. For example, time can be divided into x-minute time epochs (e.g., 20 minute) for one or more days of the week. For each such epoch, P(t) is the probability that the user is actively using the device during that time epoch. One possible update of an estimate of P(t) can be
P(t):=(1−α)P(t)+α1{user actively using device at t}. [1]
When a new time epoch t occurs (e.g., after one week), the system 100 can update the estimate of the probability, P(t), according to a first order linear filter. In this expression, α is a real number between 0 and 1 that characterizes the ability of the estimator to adapt to changes in operating conditions. If α is close to one, then the estimator has a short memory and adapts fast to recent conditions; however, the estimator also tends to be less reliable. A suitable value of a can be determined by experiments. Using this estimate, one then calculates
P(A)=max{P(t),P(t+1)}, [2]
where t is the time epoch of a current activity A.
One can use a different definition of epoch. For instance, one might use different durations and a different classification of days. For example, one might wish to have longer time epochs during the night and shorter time epochs at the beginning and end of the day and possibly around Noon. Also, neighboring epochs can be used to estimate the probability of activity A in a given time epoch t. For example, P(T<20), P(T<60), P(T<120) is the probability of time until a device node becomes active again.
For every time epoch t, if the user becomes inactive during the time epoch t, the system 100 can keep track of the time T(t) until the user becomes active on the device node again. The system 100 then updates estimates P(t; 20) of P(T<20) and corresponding estimates P(t; 60) and P(t; 120) as follows:
P(t; 20):=(1−α)P(t; 20)+α1{T(t)<20}, [3]
and similarly for the other estimates.
Assume that the user is inactive at some time t and the system 100 wants to determine the user's most likely location. One approach is to compare the values of
b(i)=P(t−2)+P(t−1)+P(t)+P(t+1)+P(t+2), [4]
for different device nodes i. In [4], b(i) is an indication of the likelihood that the user is active around time t. The sum in [4] takes into account the uncertainty about the precise arrival time at a given location.
A more complex procedure can be used to bias the location estimate using a last active device node and a time since the last detected activity at the device node. For example, if the user was last seen active at device node i and then he stopped being active s time units before time t. One could use a location estimate given by
q(j)=1{j=i}exp{−Ks}+(1−exp{−Ks})b(j)/[b(1)+ . . . +b(N)]. [5]
The justification for this estimator is that when s is small, the user is likely to be close to the device i the user last used and when s is large, the user is more likely to have moved to the device node used by the user most often around that time.
A marginal probability, P(A), that a user is in an (A)ctive state during the next x minutes (or any desired unit of time) can be updated based on the collected data (804). For example, based on the collected data the following statistics can be updated:
Next, control rules can be adjusted based on the updated probabilities (806). A goal of this step is to tune the control rules to make sure that targets defined by a device node profile are met. These targets concern the probability that the user finds the device node in a Sleep or Off state when the user wants to use the device node.
If P(O) exceeds the target, then the system 100 should wake up more aggressively or turn off less frequently. This can be accomplished by replacing the 5% in the first part of Rule 1 by 4%, replacing 4% by 3%, and so on. If P(O) is smaller than the target, then one replaces 5% by 6%, etc. P(S) can be adjusted in a manner similar to adjusting P(O).
Power-saving actions can be selected based on the adjusted control rules (808). Power-saving actions can include but are not limited to placing the device node in a new state (e.g., Off, On, Slow, Fast).
As previously noted, a device node 108 may have multiple users such as a local user at the device node itself and another user such as a remote user acting as a system administrator responsible for maintenance. As also previously described, the value P(A) is a marginal probability that a user is active on a device node during a next designated time period. Thus, each user of a device node will have a marginal probability P(A) value that can be used, among other things, to implement the previously described control rules for determining action, e.g., Rule 1, Rule 2 and Rule 3. Appropriate power savings actions can then be selected based upon the combination of the control rules.
This application is a continuation of, and claims priority to, U.S. application Ser. No. 12/114,721, entitled “Power Management of Networked Devices,” filed on May 2, 2008, the entire contents of which are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5949974 | Ewing | Sep 1999 | A |
6144992 | Turpin et al. | Nov 2000 | A |
6449462 | Gunnarsson et al. | Sep 2002 | B1 |
RE39284 | Marisetty | Sep 2006 | E |
7117495 | Blaser et al. | Oct 2006 | B2 |
7174471 | Komarla et al. | Feb 2007 | B2 |
7260728 | Chang et al. | Aug 2007 | B2 |
RE39837 | Marisetty | Sep 2007 | E |
8549333 | Jackson | Oct 2013 | B2 |
20020010808 | Wiggins et al. | Jan 2002 | A1 |
20020072868 | Bartone et al. | Jun 2002 | A1 |
20020144162 | Tada | Oct 2002 | A1 |
20020188877 | Buch | Dec 2002 | A1 |
20030005341 | Terunuma | Jan 2003 | A1 |
20030009705 | Thelander et al. | Jan 2003 | A1 |
20030018921 | Garcia et al. | Jan 2003 | A1 |
20030055969 | Begun et al. | Mar 2003 | A1 |
20030084358 | Bresniker et al. | May 2003 | A1 |
20040039630 | Begole et al. | Feb 2004 | A1 |
20040078153 | Bartone et al. | Apr 2004 | A1 |
20040119608 | Rao et al. | Jun 2004 | A1 |
20040162642 | Gasper et al. | Aug 2004 | A1 |
20040163000 | Kuhlmann et al. | Aug 2004 | A1 |
20040198302 | Hutchison et al. | Oct 2004 | A1 |
20050032536 | Wei et al. | Feb 2005 | A1 |
20050049760 | Narayanaswami et al. | Mar 2005 | A1 |
20050125519 | Yang et al. | Jun 2005 | A1 |
20050165853 | Turpin et al. | Jul 2005 | A1 |
20050215274 | Matson et al. | Sep 2005 | A1 |
20050268121 | Rothman et al. | Dec 2005 | A1 |
20050280576 | Shemesh | Dec 2005 | A1 |
20060031454 | Ewing et al. | Feb 2006 | A1 |
20060136562 | Tung | Jun 2006 | A1 |
20060159090 | Chang et al. | Jul 2006 | A1 |
20060206738 | Jeddeloh et al. | Sep 2006 | A1 |
20060218178 | Cannon et al. | Sep 2006 | A1 |
20060250301 | Yamakoshi et al. | Nov 2006 | A1 |
20060259201 | Brown | Nov 2006 | A1 |
20070005995 | Kardach et al. | Jan 2007 | A1 |
20070037609 | Zhang et al. | Feb 2007 | A1 |
20070050654 | Switzer et al. | Mar 2007 | A1 |
20070079154 | Diefenbaugh et al. | Apr 2007 | A1 |
20070143640 | Simeral et al. | Jun 2007 | A1 |
20070168683 | Guo et al. | Jul 2007 | A1 |
20070195723 | Attar et al. | Aug 2007 | A1 |
20070220294 | Lippett | Sep 2007 | A1 |
20070250731 | Romero et al. | Oct 2007 | A1 |
20080002603 | Hutsell et al. | Jan 2008 | A1 |
20080028242 | Cepulis | Jan 2008 | A1 |
20080150680 | Casey et al. | Jun 2008 | A1 |
20090106571 | Low et al. | Apr 2009 | A1 |
20090150695 | Song et al. | Jun 2009 | A1 |
20090157702 | Harris | Jun 2009 | A1 |
20090319810 | Aoyama | Dec 2009 | A1 |
20140058218 | Randlov et al. | Feb 2014 | A1 |
Number | Date | Country |
---|---|---|
H11-178247 | Jul 1999 | JP |
2000-152522 | May 2000 | JP |
2002-050489 | Feb 2002 | JP |
2004-222375 | Aug 2004 | JP |
2005-295714 | Oct 2005 | JP |
2003-333768 | Nov 2005 | JP |
2007-259647 | Oct 2007 | JP |
0207365 | Jan 2002 | WO |
03007135 | Jan 2003 | WO |
2008003009 | Jan 2008 | WO |
Entry |
---|
Examination Report dated Jul. 23, 2013 from Japanese Application No. 2011-507616, 4 pages. |
Dhiman, et al., “Dynamic Power Management Using Machine Learning”, ICCAD, Nov. 2006, San Jose, CA, ACM, 8 pages. |
Dhiman, et al., “Dynamic Voltage Frequency (sic) Scaling for Multi-tasking Systems Using Online Learning”, ISLPED, Aug. 2007, Portland, OR, 6 pages. |
Simunic, et al., “Event-Driven Power Management”, IEEE Transactions on Computer Aided Design of Integrated Circuits and Systems, vol. 20, No. 7 (Jul. 2001), pp. 841-857. |
International Search Report and Written Opinion for Application No. PCT/US2009/042120, dated Dec. 22, 2009, 13 pages. |
Allman, et al., “Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems”, Nov. 2007, Florida, 7 pages. |
Dua, et al., “Distributed Backlog-Driven Power Control in Wireless Networking”, 2007, Stanford, 6 pages. |
Dua, et al., “Power Managed Packet Switching”, 2007, Stanford, 6 pages. |
Gitzenis, et al., “Joint Transmitter Power Control and Mobile Cache Management in Wireless Computing”, 2008, 15 pages. |
Markopoulou, et al., “Energy-Efficient Communication in Battery-Constrained Portable Devices”, 2005, Stanford, 10 pages. |
Mastroleon, et al., “Autonomic Power Management Schemes for Internet Servers and Data Centers”, 2005, Stanford, 5 pages. |
Mastroleon, et al., “Power Aware Management of Packet Switches”, 2007, Stanford, 7 pages. |
Supplemental European Search Report dated Jan. 12, 2015 from European Application No. EP 09739696, 4 pages. |
EPO Communication pursuant to Article 94(3) EPC, dated Jan. 26, 2015, from European Application No. EP 09739696, 6 pages. |
EPO Communication pursuant to Article 94(3) EPC, dated Jun. 8, 2015, from European Application No. EP 09739696, 4 pages. |
Yolken, et al., “Power Management of Packet Switches via Differentiated Delay Targets”, Stanford, published in Communications, 2008. ICC '08. IEEE International Conference on, May 19-23, 2008, 6 pages. |
Number | Date | Country | |
---|---|---|---|
20140025977 A1 | Jan 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12114721 | May 2008 | US |
Child | 13942586 | US |