Custom Search

Sunday, April 26, 2009

Intel Xeon 5500: The IT Manager's ATM?

You’ve no doubt heard that Intel’s new Xeon 5500 series processors can deliver a return on investment in as little as 8 months when you replace an older, single-core Xeon server. You may even have heard Pat Gelsinger refer to the new servers as becoming ‘cash machines’ after eight months. It’s certainly a bold statement, and we understand if you’re a skeptic. However Intel is now offering a tool that supports this statement and helps IT departments assess the value of replacing their aging x86 hardware with new Intel servers. The Intel® Xeon® processor-based Server Refresh Savings Estimator lets you enter data about your existing server environment and evaluate whether replacing older server technology with the latest generation of Xeon-based servers is worth the investment. Here’s how it works:

• You can run a simple or customized analysis based on 11 potential models of cost and savings categories that Intel developed with the help of industry leading ROI and TCO consultant Alinean. These models include cost avoidance of new construction, OS license expenses, server maintenance, server migration expenses and server disposal costs.

• The tool also gives users a choice of two scenarios: server consolidation with or without virtualization software.

• There are two types of analysis - simple or custom. Simple takes as little as five minutes to complete and examines a few key variables. A custom analysis runs more detailed scenarios and allows users to change cost, system details, performance and environmental assumptions to match their situation.

• You can print out a report featuring summaries based on the different assumptions and calculations you entered into the estimator. This report can also be shared via email with your colleagues.

For example, one scenario might involve consolidating from 100 Intel-based servers to 10 new Xeon® 5500 series-based servers. After entering the data, several figures, including hardware and software maintenance, and network and utility expenses are significantly lower. The result is a more than 450% return on investment which translates into payback within nine months. The details of this scenario underscores the impact of an investment in Xeon servers and can be seen in this how-to-use guide which includes step-by-step directions on how to use the Server Refresh Savings Estimator.

Please give the Server Refresh Savings Estimator a try and don’t hesitate to provide us with feedback in the Intel Server Room. We’re positive you’ll find this to be a valuable resource as you consider your IT investments.

New Intel instructions + algorithms = https://everywhere

At Fall IDF 2008, Intel presented solutions toward realizing a vision that can accelerate secure Internet transactions by orders of magnitude. Our vision was of a world where the internet is entirely secure and attackers have no place to hide. A major step toward realizing this vision of world-wide security is making sure that all the traffic exchanged between servers and clients is encrypted. This is very difficult technical challenge since networking speeds are excessively high (10-100 Gbps), whereas cryptographic algorithms consume millions of processor cycles to execute. Since IDF, we have also worked on designing new cryptographic algorithms that can potentially offer new security/performance tradeoffs and be essential components of future computing platforms and networks. In this blog we summarize our past as well as recent accomplishments.

https://everywhere! Encrypting the Internet white paper View .pdf

First, the latest Intel® Core™ micro-architecture (Nehalem) re-introduces the feature of Simultaneous Multi-threading Technology, SMT into the CPU. SMT is ideal for hiding the cycles of compute-intensive public key encryption software under the stall times of network application memory lookups. Following Nehalem, Westmere adds new instructions for potentially speeding up symmetric encryption by a factor of 3-4X. These instructions not only provide better performance but also protect applications against an importance type of threats known as side channel attacks. Third, Intel® has developed superior Integer arithmetic software that can speed key exchange and establishment procedures by a factor of 2X.

Last, we have developed a new cryptographic hash function called Vortex that can be implemented using our new processor instructions. Vortex is one of the fastest collision resistant hashes known to us when implemented on Intel processors. A main strength of the Vortex design is that this hash function can achieve a potential performance of much less than 7 cycles per byte using the AES round and carry-less multiply instructions announced for future Intel processors. The Vortex family produces message digests of 224, 256, 384 and 512 bits. The main idea behind Vortex is to use well known algorithms with very fast diffusion in a small number of steps. These algorithms also balance the cryptographic strength that comes from iterating block cipher rounds with S-box substitution and diffusion against the need to have a lightweight implementation with as small a number of rounds as possible.

Intel© vPro™: O que o torna tão especial?

Você já imaginou um mundo onde o administrador de uma rede corporativa possa instalar o sistema operacional de um desktop ou notebook remotamente, sem nenhuma intervenção do usuário mesmo que este se encontre desligado e sem nenhum sistema operacional instalado em seu disco rígido? Você já imaginou poder ligar/desligar/reiniciar a máquina remotamente, mesmo através de redes roteadas em localidades longínquas? Diagnosticar problemas de hardware, ligar o computador acompanhando a tela de inicialização (POST) e ainda manipular a BIOS de um computador remoto sem precisar sair da sua mesa (figura 1)? Essas são algumas características que um computador Intel© vPro™ disponibiliza. Quando você pega essas funcionalidades e as mistura com as funcionalidades de um software de gerencia, os benefícios são imediatos: imagina a distribuição de pacotes de correção de software podendo ser realizados a noite ou nos finais de semana sem se preocupar se máquina está ou não ligada, inventariar a máquina sem precisar que ela esteja com o sistema operacional rodando, em casos de proliferação de malware na rede, poder isolar uma máquina contaminada e ainda assim ter acesso a ela para aplicar vacinas e correções, entre muitas outras possibilidades… parece até mágica, mas é o que acontece quando se coloca inteligência no hardware, e esse hardware ou melhor, plataforma, inteligente se chama Intel© vPro™.

Friday, April 3, 2009

Intel Xeon

Intel Xeon microprocessors are heavy-duty microprocessors. These microprocessors powers servers and workstations on a network. The Xeon microprocessor supports two microprocessors on the same system.

Processor Clock Manufacturing Number of Cache Bus Speed Process Transistors Speed (GHz) (Micron) (million) (MHz)

Intel Xeon Processor 3 0.13 169 4 MB Integrated
MP L3 Cache 400

Intel Xeon Processor 2.80, 2.70, 0.13 169 2 MB Integrated 400
MP 2.20 L3 Cache

Intel Xeon Processor 2, 1.90, 1.50 0.13 108 2 MB, 1 MB 400
MP Integrated L3 Cache

Intel Xeon Processor 1.60, 1.50, 0.18 108 256 KB Adv. 400
MP 1.40 Transfer L2 Cache, 8 KB Execution Trace L1 Cache

Intel Xeon Processor 3.20 0.13 108 1 MB L3 Cache 533

Intel Xeon Processor 3.06 0.13 108 1 MB L3 Cache 533

Intel Xeon Processor 3.06 0.13 108 512 KB L2 533 Cache

Intel Xeon Processor 2.80, 2.60, 0.13 108 512 KB L2 533 2.40, 2 Cache

Intel Itanium

Intel Itanium microprocessor powers network servers and workstations. For example, dedicated servers that handle database requests and email servers use the Intel Itanium processors. It is a powerful microprocessor and can execute three instructions at a time. It is a Reduced Instruction Set Computing (RISC) microprocessor and has limited instructions built into the microprocessor.

Processor Clock Manufacturing Number of Cache Speed Process Transistors (Micron) (million)

Intel Itanium 2 Processor 1.60 GHz - 0.13 410 3 MB L3 Cache
1.40 GHz

Intel Itanium 2 Processor 1.40 GHz 0.13 410 1.5 MB L3 Cache
(for dual processor systems)

Intel Itanium 2 Processor 1.50 GHz 0.13 410 6 MB L3 Cache

Intel Itanium 2 Processor 1 GHz, 0.18 220 3 MB and
900 MHz 1.5 MB L3 Cache

Intel Itanium Processor 800 MHz - 0.18 25 2 MB and
733 MHz 4 MB L3 Cache

Intel Pentium 4 Processor

The Intel Pentium 4 processor was released in the year 2000. This processor enables us to work with applications such as digital photography that require a lot of processing. The Pentium 4 has a 20-stage pipeline for executing instructions. The Pentium 4 microprocessor comes in two sizes. The first microprocessors were large in size with 423 pins. These processors only supported RDRAM. Intel later decreased the size of the Pentium 4 microprocessor and increased the number of pins to 478. The microprocessor now supported SDRAM. The RDRAM and SDRAM are different types of memory. The Pentium 4 microprocessor is also available in the Hyper-Threading (HT) edition and the HT Extreme edition. The HT technology enables the microprocessor to process two parts of the program simultaneously. This ensures that the program executes faster. The Pentium 4 HT edition is targeted for gamers because 3D games such as Counter Attack and FIFA Football 2004 are complexprograms and require a lot of processing.The Pentium 4 HT Extreme edition is similar to the Pentium 4 HT edition. The only difference is that this edition has an additional 2 MB of L3 cache built into the microprocessor.


Processor Clock Manufacturing Number of Cache Bus Speed Speed Process Transistors (MHz) (GHz) (million)

Intel Pentium 4 3.40, 3.20 0.13-micron 178 2 MB L3 cache, 800 Processor
512 KB L2 Extreme Edition cache (HT Technology)

Intel Pentium 4 3.60, 3.4, 90 nano- 125 1 MB L2 800 processor
3.2, 3, 2.80 micron cache supporting HT Technology 560,550, 540, 530,520

Intel Pentium 4 3.40, 3.20, 90 nano- 125 1 MB L2 800Processor 3,
2.80 micron cache (HT Technology)

Intel Pentium 4 3.40, 3.20, 0.13-micron 55 512 KB 800 Processor
2.80, 2.60, Advanced (HT Technology) 2.40 Transfer L2 cache

Intel Pentium 4 3 0.13-micron 55 512 KB 800 Processor Advanced
(HT Technology) Transfer L2 cache

Intel Pentium 4 3.06 0.13-micron 55 512 KB 533 Processor
Advanced (HT Technology) Transfer L2 cache

Intel Pentium 4 2.80, 2.66, 0.13-micron 55 512 KB
533 Processor 2.53, 2.40, Advanced 2.26 Transfer L2 cache

Intel Pentium 4 2.60, 2.50, 0.13-micron 55 512 KB
400 Processor 2.40, 2.20, Advanced 2 Transfer L2 cache

Intel Pentium 4 2, 1.90, 1.80, 0.18-micron 42 256 KB
400 Processor 1.70, 1.60, Advanced 1.50, 1.40 Transfer L2 cache


Wednesday, April 1, 2009

Installing the Microprocessor

The microprocessor and the motherboard are dependent on each other. Before, we install the microprocessor, we must check that the motherboard and the microprocessor voltage are compatible with each other.


Hands on exercise

The Zero Insertion Force (ZIF) socket uses a lever that makes it simpler and safer to install the microprocessor on the motherboard. This socket also makes it easy to remove the microprocessor 40 from the motherboard without damaging the pins located on the underside of the microprocessor or the microprocessor itself.

To install the processor in the ZIF socket :

1. Check the voltage requirements from the motherboard and the microprocessor documentation.

2. Wear an anti-static wristband.

3. Place the motherboard on the work desk.

4. Take the microprocessor out from the anti-static bag by holding the microprocessor at the edges.

5. Check that all the pins on the underside of the microprocessor are straight.

6. Locate the socket where the microprocessor must be installed

Location to Install the Microprocessor

7. Find the lever located besides the socket for the microprocessor.

Viewing the Lever

8. Raise the lever so that it is at the right angle with the motherboard.

9. Align the notch on the microprocessor with the alignment notch on the motherboard.

Aligning the Microprocessor

10. Gently, place the microprocessor in the socket.

11. Press the microprocessor firmly in the socket keeping in mind that no damage is caused to the pins.

12. Push the lever back down such that it is parallel to the motherboard and locked in place, taking care not to break the lever while lowering it .

Locking the Lever to Install the Microprocessor

Hands on exercise

The Low Insertion Force (LIF) socket does not have a lever to install the microprocessor. We must force the microprocessor into the motherboard socket to install it.

To install the processor in the LIF socket:

1. Check the voltage requirements from the motherboard and the microprocessor documentation.

2. Wear an anti-static wristband.

3. Place the motherboard on the work desk.

4. Take the microprocessor out from the anti-static bag by holding the microprocessor at the edges.

5. Check that all the pins on the underside of the microprocessor are straight.

6. Locate the socket where the microprocessor must be installed.

7. Align the notch on the microprocessor with the alignment notch on the motherboard.

8. Gently place the microprocessor in the socket.

9. Use force to press the microprocessor firmly in the socket keeping in mind that no damage is caused to the pins. The microprocessors for Pentium II, Pentium III, and Celeron are available a card with the microprocessor installed on it. To install these microprocessors, we must fix the card holding the microprocessor in the slot on the motherboard.

The microprocessors for Pentium II, Pentium III, and Celeron are available a card with the microprocessor installed on it. To install these microprocessors, we must fix the card holding the microprocessor in the slot on the motherboard.

Hands on exercise

To install the processor in the slot:

1. Check the voltage requirements from the motherboard and the microprocessor documentation.

2. Wear an anti-static wristband.

3. Place the motherboard on the work desk.

4. Locate the slot where the microprocessor must be installed

5. Affix the plastic retention brackets on the motherboard, if not already installed.

6. Take the microprocessor out of the anti-static bag.

7. Hold the microprocessor perpendicular to the motherboard over the slot.

8. Align the microprocessor with the plastic retention brackets.

9. Slide the processor carefully in the motherboard slot

10. Pull the lever on the microprocessor outward, if required, to lock the microprocessor to the plastic retention brackets

Configuring the Microprocessor


The motherboard usually auto-detects the microprocessor. We can also configure the microprocessor by adjusting the jumper settings. Microprocessors can also be configured using the settings from the system Basic Input Output System (BIOS). The BIOS stores the system information.

Speed of the Microprocessor
The microprocessor is built and set to perform at the recommended speed. The recommended speed of the microprocessor is set below the maximum speed of the microprocessor. To modify the speed of the microprocessor using the system BIOS:

1. Start the system.

2. Press the Delete key on the keyboard to enter the BIOS setup.

3. Select CPU PnP from the displayed menu using the navigations keys specified besides the menu.

4. Press Enter to display CPU PnP setup screen that enables to modify the settings for the microprocessor.

5. Use the Page Up or Page Down key on the keyboard to select the required CPU Ratio. The CPU ratio is a multiplier that sets the microprocessor clock speed.

6. Press Esc to return to the BIOS main menu.

7. Press F10 to save and exit.

Overclocking

Overclocking the microprocessor increases the speed of the processor. You can overclock the microprocessor by changing the jumper settings on the motherboard. You can also overclock the microprocessor by increasing the CPU Ratio from the CPU PnP Setup Page from the BIOS settings. Additional cooling devices such as CPU fans must be installed to cool down the processor because overclocking makes the microprocessor heat up very fast. The extreme heat level can reduce the life of the processor and can also damage the processor. Overclocking must be implemented with care by increasing the clock speed little by little. You must also check the documentation of the microprocessor and the motherboard before overclocking. Overclocking a processor beyond its maximum capacity can permanently damage the microprocessor.

Upgrading and Troubleshooting Microprocessors

The speed and the performance of microprocessors increase with the release of new processor. Besides this, every microprocessor has its own limitation. To keep the system up-to-date and to remove the limitations of the microprocessor, we must upgrade the microprocessor. To upgrade a microprocessor, we replace the microprocessor in the system with a new compatible microprocessor.

Troubleshooting microprocessor techniques solve the problems that arise due to the improper functioning of the microprocessor. The general problems that arises from the microprocessor are overheating and slow processing.

Overheating

A microprocessor produces heat while processing the data. The microprocessor also overheats when it is performing beyond the recommended speed. Overheating can cause permanent damage to the microprocessor. Adequate cooling devices, such as a processor fan must be installed to cool down the microprocessor.To solve the problem of overheating :

1. Check that the processor fan is installed and functioning properly.

2. Check the jumper settings on the motherboard and the BIOS settings to see that the microprocessor is not overclocked.

3. Check that the voltage supplied by the motherboard is compatible with the microprocessor.

4. Check the motherboard manual to see that the motherboard supports the microprocessor.

Slow Processing

The microprocessor generally runs slow if there is some fault within it. A microprocessor can also run slow if the speed settings are not correct or due to some other fault in the system. To solve the problem of slow processing :

1. Check if the vendor has supplied the correct microprocessor.

2. Check if the microprocessor supports the applications that are running.

3. Scan the computer for viruses.

4. Check the jumper settings on the motherboard and the BIOS settings of the microprocessor.

5. Troubleshoot the RAM.

Followers