CO2 emission testing of ICT equipment may need a rethink
- 10 January, 2013 16:14
The traditional method of measuring the energy consumption and CO2 emissions of ICT equipment for carbon reduction purposes may not necessarily be the best, according to researchers from University of Melbourne’s partner Centre for Energy Efficient Telecommunications, and Bell Labs.
In an effort to help organisations become more energy efficient, the researchers released a study that tested various models for measuring energy consumption and CO2 emissions of ICT equipment.
The ICT industry is guilty of producing more than 830 million tonnes of carbon dioxide (CO2) annually, which is about 2 per cent of global CO2 emissions, and is expected to double by 2020, according to the researchers.
They compared four models: ‘top down’, ‘bottom up’, ‘coarse grained’ and ‘fine grained’. The traditional top-down model measures energy consumption and service traffic from an entire network of services. The bottom-up model is more accurate because it measures individual equipment units.
The coarse-grained and fine-grained models measure the equipment class and can be used where there is a great complexity of services and where the bottom-up model might not be feasible.
Using a simulated network and a deployed network, the California Research and Education Network, the researchers tested the models and found the top-down model to be the least accurate in estimating energy consumption and service traffic compared to the others.
“The fine-grained model has significantly greater accuracy under conditions in which the network service traffic is concentrated in a small number of nodes,” the report reads.
“The coarse-grained model, provided that the distribution of the service traffic weighting at each node is not highly skewed… can exhibit an accuracy similar to that of the fine-grained model and may be preferable because of its reduced complexity in obtaining network measurements.
“The top-down model is accurate only under the network conditions in which the network service traffic weighting is similar among all the nodes in the network because it has a large MEE [Model Estimation Error] in other cases."
Follow Rebecca Merrett on Twitter: @Rebecca_Merrett
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Deploying Flash in the Enterprise
Flash is quickly emerging as the preferred way to overcome the nagging performance limitations of hard disk drives. However, because flash comes at a significant price premium, outright replacement of HDDs with flash only makes sense in situations in which capacity requirements are relatively small and performance requirements are high. Learn how deployment approaches-including hybrid storage arrays, server flash, and all-flash arrays-that combine the performance of flash with the capacity of HDDs can be cost effective for a broad range of performance requirements.
Advanced Targeted Attacks
The new threat landscape has changed. Cybercriminals are aggressively pursuing valuable data assets, such as financial transaction information, product design blueprints, user credentials to sensitive systems, and other intellectual property. Simply put, the cyber offense has outpaced the defensive technologies used by most companies today. Find out more on how to protect against the next generation of cyber-attacks.
Advanced Malware Exposed
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. This ebook will provide readers with a new understanding of the rapidly developing cyber threat landscape and practical insights into how they can protect their data and computing infrastructures. Download now.