SlideShare una empresa de Scribd logo
1 de 29
 Introduction
 Specifications
 Memory Handling
 Processor registers
 Core i5 Cache Memory
 AdvancedTechnologies
 Conclusion
 Core i5 is using the Ivy Bridge microarchitecture.
 Ivy Bridge is the codename for an Intel microprocessor
using the Sandy Bridge microarchitecture.
 Ivy Bridge uses a 22 nanometer process.The Ivy
Bridge die shrink, known in the IntelTick-Tock model
as the "tick", is based on 3D tri-gate transistors. Intel
demonstrated Ivy Bridge processors in 2011.
Status Launched
Launch Date Q2'12
Processor Number i5-3550S
# of Cores 4
# ofThreads 4
Clock Speed 3 GHz
MaxTurbo Frequency 3.7 GHz
Intel® Smart Cache 6 MB
Bus/Core Ratio 30
DMI 5 GT/s
Instruction Set 64-bit
Instruction Set Extensions SSE4.1/4.2,AVX
EmbeddedOptionsAvailable Yes
Lithography 22 nm
Memory Specifications
Max Memory Size (dependent on
memory type)
32 GB
MemoryTypes DDR3-1333/1600
# of Memory Channels 2
Max Memory Bandwidth 25.6 GB/s
ECC Memory Supported No
Graphics Specifications
ProcessorGraphics Intel® HD Graphics 2500
Graphics Base Frequency 650 MHz
Graphics Max Dynamic Frequency 1.15 GHz
Intel®Quick SyncVideo Yes
Intel® InTru™ 3DTechnology Yes
Intel® Insider™ Yes
Intel®Wireless Display Yes
Intel® Flexible Display Interface (Intel®
FDI)
Yes
Intel®ClearVideo HDTechnology Yes
# of Displays Supported 3
AdvancedTechnologies
Intel®Turbo BoostTechnology 2.0
Intel® vProTechnology Yes
Intel® Hyper-ThreadingTechnology No
Intel®VirtualizationTechnology (VT-x) Yes
Intel®VirtualizationTechnology for
Directed I/O (VT-d)
Yes
Intel®Trusted ExecutionTechnology Yes
AES New Instructions Yes
Intel® 64 Yes
Intel®Anti-TheftTechnology Yes
Idle States Yes
Enhanced Intel SpeedStep®Technology Yes
Thermal MonitoringTechnologies Yes
Execute Disable Bit Yes
Intel®VT-x with Extended PageTables
(EPT)
Yes
 PEG port upper pre-fetchable base/limit
registers.This allows the PEG unit to claim
I/O accesses above 32 bit.
 Addressing of greater than 4 GB is allowed on
either the DMI Interface or PCI Express*
(PCIe*) interface.
 The processor supports a maximum of 32 GB
of DRAM. No DRAM memory will be
accessible above 32 GB.
 Processor contains more than 430 registers.
 PCI Device 0 Function 0 Configuration Space Registers.
 PCI Device 1 Function 0–2 Configuration Space Registers.
 PCI Device 1 Function 0–2 Extended Configuration Registers.
 PCI Device 2 Configuration Space Registers.
 Device 2 IO Registers.
 PCI Device 6 Registers.
 PCI Device 6 Extended Configuration Registers.
 Direct Media Interface Base Address Registers (DMIBAR).
 MCHBAR Registers in Memory Controller Channel 0 Registers.
 MCHBAR Registers in Memory Controller Channel 1.
 MCHBAR Registers in Memory Controller Integrated Memory Peripheral Hub (IMPH).
 MCHBAR Registers in Memory Controller Common.
 Memory Controller MMIO Registers Broadcast Group Registers.
 Integrated GraphicsVTd Remapping Engine Registers.
 PCU MCHBAR Registers.
 PXPEPBAR Registers.
 Default PEG/DMIVTd Remapping Engine Registers.
 A 32-KB instruction and 32-KB data first-level
cache (L1) for each core
 A 256-KB shared instruction / data second-
level cache (L2) for each core
 Up to 8-MB shared instruction / data third-
level cache (L3), shared among all cores.
 The ring design is
quite simple and has
many advantages:
shortest path, easily
scalable to include
more cores if
required.
Advanced
Technologies
 Makes a single system appear as multiple
independent systems to software.
 This allows multiple, independent
operating systems to run simultaneously
on a single system.
 IntelVirtualizationTechnology for
Directed I/O (IntelVT-d) adds chipset
hardware implementation to support and
improve I/O virtualization performance
and robustness.
Intel®Virtualization
Technology (VT-x)
Intel®Virtualization
Technology for Directed
I/O (VT-d)
Advanced
Technologies
 Defines platform-level enhancements that
provide the building blocks for creating
trusted platforms.
 provide the authenticity of the controlling
environment such that those wishing to rely on
the platform can make an appropriate trust
decision.
 determines the identity of the controlling
environment by accurately measuring and
verifying the controlling software.
Intel®Trusted Execution
Technology
Advanced
Technologies
Intel®Trusted Execution
Technology
Advanced
Technologies
 Allows an execution core to function as
two logical processors.
 While some execution resources such as
caches, execution units, and buses are
shared, each logical processor has its own
architectural state with its own set of
general-purpose registers and control
registers.
 This feature must be enabled using the
BIOS and requires operating system
support.
Intel® Hyper-Threading
Technology*
Advanced
Technologies
 Allows the processor core to
opportunistically and automatically run
faster than its rated operating
frequency/render clock if it is operating
below power, temperature, and current
limits.
 The IntelTurbo BoostTechnology feature
is designed to increase performance of
both multi-threaded and single-threaded
workloads.
Intel®Turbo Boost
Technology
Advanced
Technologies
 is a set of security and manageability
capabilities built into the processor aimed
at addressing four critical areas of IT
security
 Threat management, including protection from
rootkits, viruses, and malware.
 Identity and web site access point protection .
 Confidential personal and business data
protection.
 Remote and local monitoring, remediation, and
repair of PCs and workstations.
Intel® vProTechnology
Advanced
Technologies
 Intel® 64 architecture delivers 64-bit
computing on server, workstation,
desktop and mobile platforms when
combined with supporting software.
 Intel 64 architecture improves
performance by allowing systems to
address more than 4 GB of both virtual
and physical memory.
Intel® 64
Advanced
Technologies
 Intel® Anti-TheftTechnology (Intel® AT)
helps keep your laptop safe and secure in
the event that it’s ever lost or stolen.
Intel® AT requires a service subscription
from an Intel® AT–enabled service
provider.
 Detects device theft
 Locks down lost device
 Restores operation easily
Intel®Anti-Theft
Technology
Advanced
Technologies
 The latest expansion of the Intel
instruction set.
 It extends the Intel Streaming SIMD
Extensions (Intel SSE) from 128-bit
vectors to 256-bit vectors.
 Intel AVX addresses the continued need
for vector floating-point performance in
mainstream scientific and engineering
numerical applications, visual
processing, recognition, data-
mining/synthesis, gaming, physics, crypto
graphy and other application areas.
Intel®AdvancedVector
Extensions
Intel®Advanced
Vector Extensions
Intel AVX introduces
support for 256-bit wide
SIMD registers (YMM0-
YMM7 in operating modes
that are 32-bit or
less,YMM0-YMM15 in 64-
bit mode).The lower 128-
bits of theYMM registers
are aliased to the
respective 128-bit
XMM registers.
Advanced
Technologies
 A set of Single Instruction Multiple Data
(SIMD) instructions that enable fast and
secure data encryption and decryption based
on the Advanced Encryption Standard (AES).
 IntelAES-NI are valuable for a wide range of
cryptographic applications, for example:
applications that perform bulk
encryption/decryption, authentication,
random number generation, and
authenticated encryption.
 AES is broadly accepted as the standard for
both government and industry applications,
and is widely deployed in various protocols.
Intel®Advanced
Encryption Standard
New Instructions
(Intel®AES-NI)
Advanced
Technologies
 AES-NI consists of six Intel SSE
instructions. Four instructions, namely
AESENC, AESENCLAST, AESDEC, and
AESDELAST facilitate high performance
AES encryption and decryption.
 AESIMC and AESKEYGENASSIST, support
the AES key expansion procedure.
Intel®Advanced
Encryption Standard
New Instructions
(Intel®AES-NI)
Advanced
Technologies
 Allows memory to be marked as executable or non-
executable, when combined with a supporting operating
system. If code attempts to run in non-executable
memory the processor raises an error to the operating
system.This feature can prevent some classes of viruses
or worms that exploit buffer overrun vulnerabilities and
can thus help improve the overall security of the system.
Execute Disable Bit
 Core i5-3550S is built over Ivy bridge
microarchitecture.
 Processor supporting L3 cache memory.
 Most of Intel latest technologies are
supported like Anti-Seft,Vpro and
Virtualizations.
 http://en.wikipedia.org/wiki/Intel_Core#Core_i5
 http://en.wikipedia.org/wiki/Ivy_Bridge_%28mic
roarchitecture%29
 http://ark.intel.com/products/65518/Intel-Core-
i5-3550S-Processor-6M-Cache-up-to-3_70-GHz
 http://en.wikipedia.org/wiki/Microarchitecture
 http://www.behardware.com/articles/863-1/ivy-
bridge-22nm-review-intel-core-i7-3770k-and-i5-
3570k.html
Core i5-3550S Specs and Technologies

Más contenido relacionado

La actualidad más candente

Intel Processors
Intel ProcessorsIntel Processors
Intel Processorshome
 
Final draft intel core i5 processors architecture
Final draft intel core i5 processors architectureFinal draft intel core i5 processors architecture
Final draft intel core i5 processors architectureJawid Ahmad Baktash
 
Intel I3,I5,I7 Processor
Intel I3,I5,I7 ProcessorIntel I3,I5,I7 Processor
Intel I3,I5,I7 Processorsagar solanky
 
Intel core i7 processors
Intel core i7 processorsIntel core i7 processors
Intel core i7 processorsSelf employed
 
Case study on Intel core i3 processor.
Case study on Intel core i3 processor. Case study on Intel core i3 processor.
Case study on Intel core i3 processor. Mauryasuraj98
 
Presentation on - Processors
Presentation on - Processors Presentation on - Processors
Presentation on - Processors The Avi Sharma
 
Intel core-i3-processors
Intel core-i3-processorsIntel core-i3-processors
Intel core-i3-processorshmnasim15
 
Comparision between Core i3,i5,i7,i9
Comparision between Core i3,i5,i7,i9 Comparision between Core i3,i5,i7,i9
Comparision between Core i3,i5,i7,i9 ShriyaGautam3
 
Intel Core i7
Intel Core i7Intel Core i7
Intel Core i7Md Ajmat
 
Intel core i7 processor
Intel core i7 processorIntel core i7 processor
Intel core i7 processorGautam Kumar
 
Core i 7 processor
Core i 7 processorCore i 7 processor
Core i 7 processorSumit Biswas
 
Core 2 Duo Processor
Core 2 Duo ProcessorCore 2 Duo Processor
Core 2 Duo ProcessorKashif Latif
 
Evolution Of Microprocessor
Evolution Of MicroprocessorEvolution Of Microprocessor
Evolution Of Microprocessorguest3870d0
 

La actualidad más candente (20)

Intel Processors
Intel ProcessorsIntel Processors
Intel Processors
 
Final draft intel core i5 processors architecture
Final draft intel core i5 processors architectureFinal draft intel core i5 processors architecture
Final draft intel core i5 processors architecture
 
Intel I3,I5,I7 Processor
Intel I3,I5,I7 ProcessorIntel I3,I5,I7 Processor
Intel I3,I5,I7 Processor
 
Intel core i7 processors
Intel core i7 processorsIntel core i7 processors
Intel core i7 processors
 
Case study on Intel core i3 processor.
Case study on Intel core i3 processor. Case study on Intel core i3 processor.
Case study on Intel core i3 processor.
 
Presentation on - Processors
Presentation on - Processors Presentation on - Processors
Presentation on - Processors
 
Intel core i7 processor
Intel core i7 processorIntel core i7 processor
Intel core i7 processor
 
intel core i7
intel core i7intel core i7
intel core i7
 
I3,i5,i7 ppt
I3,i5,i7 pptI3,i5,i7 ppt
I3,i5,i7 ppt
 
Intel core-i3-processors
Intel core-i3-processorsIntel core-i3-processors
Intel core-i3-processors
 
Comparision between Core i3,i5,i7,i9
Comparision between Core i3,i5,i7,i9 Comparision between Core i3,i5,i7,i9
Comparision between Core i3,i5,i7,i9
 
Intel Core i7
Intel Core i7Intel Core i7
Intel Core i7
 
Intel core i7 processor
Intel core i7 processorIntel core i7 processor
Intel core i7 processor
 
intel core i7
intel core i7 intel core i7
intel core i7
 
8086microprocessor and core i3
8086microprocessor and core i38086microprocessor and core i3
8086microprocessor and core i3
 
Intel i3 processor
 Intel i3 processor Intel i3 processor
Intel i3 processor
 
Core i 7 processor
Core i 7 processorCore i 7 processor
Core i 7 processor
 
Core 2 Duo Processor
Core 2 Duo ProcessorCore 2 Duo Processor
Core 2 Duo Processor
 
Evolution Of Microprocessor
Evolution Of MicroprocessorEvolution Of Microprocessor
Evolution Of Microprocessor
 
Intel Processor core i7
Intel Processor core i7Intel Processor core i7
Intel Processor core i7
 

Similar a Core i5-3550S Specs and Technologies

Rico board
Rico boardRico board
Rico boardmyirtech
 
Blue Line Supermicro Embedded
Blue Line Supermicro EmbeddedBlue Line Supermicro Embedded
Blue Line Supermicro EmbeddedBlue Line
 
Overview of ST7 8-bit Microcontrollers
Overview of ST7 8-bit MicrocontrollersOverview of ST7 8-bit Microcontrollers
Overview of ST7 8-bit MicrocontrollersPremier Farnell
 
Dell precision-t3400-workstation-en
Dell precision-t3400-workstation-enDell precision-t3400-workstation-en
Dell precision-t3400-workstation-enEwerton gon?lves
 
SoM with Zynq UltraScale device
SoM with Zynq UltraScale deviceSoM with Zynq UltraScale device
SoM with Zynq UltraScale devicenie, jack
 
Yashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italiaYashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italiaYashi Italia
 
MYS-8MMX Single Board Computer
MYS-8MMX Single Board ComputerMYS-8MMX Single Board Computer
MYS-8MMX Single Board ComputerLinda Zhang
 
Brochure (2016-01-30)
Brochure (2016-01-30)Brochure (2016-01-30)
Brochure (2016-01-30)Jonah McLeod
 
Embedded Systems Introdution
Embedded Systems IntrodutionEmbedded Systems Introdution
Embedded Systems IntrodutionSheikh Ismail
 
Serie dei nuovi processori Xeon Scalabili - Yashi Italia
Serie dei nuovi processori Xeon Scalabili - Yashi ItaliaSerie dei nuovi processori Xeon Scalabili - Yashi Italia
Serie dei nuovi processori Xeon Scalabili - Yashi ItaliaYashi Italia
 
Richard_Baker-Intel_I-32_Processor_Architecture_Overview
Richard_Baker-Intel_I-32_Processor_Architecture_OverviewRichard_Baker-Intel_I-32_Processor_Architecture_Overview
Richard_Baker-Intel_I-32_Processor_Architecture_OverviewRichard Baker
 
Hpe Proliant DL20 Gen10 Server Datasheet
Hpe Proliant DL20 Gen10 Server DatasheetHpe Proliant DL20 Gen10 Server Datasheet
Hpe Proliant DL20 Gen10 Server Datasheet美兰 曾
 
Intel new processors
Intel new processorsIntel new processors
Intel new processorszaid_b
 

Similar a Core i5-3550S Specs and Technologies (20)

IBM Flex System x440 Compute Node
IBM Flex System x440 Compute NodeIBM Flex System x440 Compute Node
IBM Flex System x440 Compute Node
 
Rico board
Rico boardRico board
Rico board
 
Blue Line Supermicro Embedded
Blue Line Supermicro EmbeddedBlue Line Supermicro Embedded
Blue Line Supermicro Embedded
 
Overview of ST7 8-bit Microcontrollers
Overview of ST7 8-bit MicrocontrollersOverview of ST7 8-bit Microcontrollers
Overview of ST7 8-bit Microcontrollers
 
Dell precision-t3400-workstation-en
Dell precision-t3400-workstation-enDell precision-t3400-workstation-en
Dell precision-t3400-workstation-en
 
M&i(lec#01)
M&i(lec#01)M&i(lec#01)
M&i(lec#01)
 
SoM with Zynq UltraScale device
SoM with Zynq UltraScale deviceSoM with Zynq UltraScale device
SoM with Zynq UltraScale device
 
Yashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italiaYashi dealer meeting settembre 2016 tecnologie xeon intel italia
Yashi dealer meeting settembre 2016 tecnologie xeon intel italia
 
MYS-8MMX Single Board Computer
MYS-8MMX Single Board ComputerMYS-8MMX Single Board Computer
MYS-8MMX Single Board Computer
 
Brochure (2016-01-30)
Brochure (2016-01-30)Brochure (2016-01-30)
Brochure (2016-01-30)
 
I7 processor
I7 processorI7 processor
I7 processor
 
Embedded Systems Introdution
Embedded Systems IntrodutionEmbedded Systems Introdution
Embedded Systems Introdution
 
Smart logic
Smart logicSmart logic
Smart logic
 
IBM System x3500 M4
IBM System x3500 M4IBM System x3500 M4
IBM System x3500 M4
 
Serie dei nuovi processori Xeon Scalabili - Yashi Italia
Serie dei nuovi processori Xeon Scalabili - Yashi ItaliaSerie dei nuovi processori Xeon Scalabili - Yashi Italia
Serie dei nuovi processori Xeon Scalabili - Yashi Italia
 
Richard_Baker-Intel_I-32_Processor_Architecture_Overview
Richard_Baker-Intel_I-32_Processor_Architecture_OverviewRichard_Baker-Intel_I-32_Processor_Architecture_Overview
Richard_Baker-Intel_I-32_Processor_Architecture_Overview
 
Hpe Proliant DL20 Gen10 Server Datasheet
Hpe Proliant DL20 Gen10 Server DatasheetHpe Proliant DL20 Gen10 Server Datasheet
Hpe Proliant DL20 Gen10 Server Datasheet
 
No[1][1]
No[1][1]No[1][1]
No[1][1]
 
IBM Redbooks Product Guide: IBM System x3750 M4
IBM Redbooks Product Guide: IBM System x3750 M4IBM Redbooks Product Guide: IBM System x3750 M4
IBM Redbooks Product Guide: IBM System x3750 M4
 
Intel new processors
Intel new processorsIntel new processors
Intel new processors
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Core i5-3550S Specs and Technologies

  • 1.
  • 2.  Introduction  Specifications  Memory Handling  Processor registers  Core i5 Cache Memory  AdvancedTechnologies  Conclusion
  • 3.  Core i5 is using the Ivy Bridge microarchitecture.  Ivy Bridge is the codename for an Intel microprocessor using the Sandy Bridge microarchitecture.  Ivy Bridge uses a 22 nanometer process.The Ivy Bridge die shrink, known in the IntelTick-Tock model as the "tick", is based on 3D tri-gate transistors. Intel demonstrated Ivy Bridge processors in 2011.
  • 4.
  • 5. Status Launched Launch Date Q2'12 Processor Number i5-3550S # of Cores 4 # ofThreads 4 Clock Speed 3 GHz MaxTurbo Frequency 3.7 GHz Intel® Smart Cache 6 MB Bus/Core Ratio 30 DMI 5 GT/s Instruction Set 64-bit Instruction Set Extensions SSE4.1/4.2,AVX EmbeddedOptionsAvailable Yes Lithography 22 nm
  • 6. Memory Specifications Max Memory Size (dependent on memory type) 32 GB MemoryTypes DDR3-1333/1600 # of Memory Channels 2 Max Memory Bandwidth 25.6 GB/s ECC Memory Supported No
  • 7. Graphics Specifications ProcessorGraphics Intel® HD Graphics 2500 Graphics Base Frequency 650 MHz Graphics Max Dynamic Frequency 1.15 GHz Intel®Quick SyncVideo Yes Intel® InTru™ 3DTechnology Yes Intel® Insider™ Yes Intel®Wireless Display Yes Intel® Flexible Display Interface (Intel® FDI) Yes Intel®ClearVideo HDTechnology Yes # of Displays Supported 3
  • 8. AdvancedTechnologies Intel®Turbo BoostTechnology 2.0 Intel® vProTechnology Yes Intel® Hyper-ThreadingTechnology No Intel®VirtualizationTechnology (VT-x) Yes Intel®VirtualizationTechnology for Directed I/O (VT-d) Yes Intel®Trusted ExecutionTechnology Yes AES New Instructions Yes Intel® 64 Yes Intel®Anti-TheftTechnology Yes Idle States Yes Enhanced Intel SpeedStep®Technology Yes Thermal MonitoringTechnologies Yes Execute Disable Bit Yes Intel®VT-x with Extended PageTables (EPT) Yes
  • 9.
  • 10.  PEG port upper pre-fetchable base/limit registers.This allows the PEG unit to claim I/O accesses above 32 bit.  Addressing of greater than 4 GB is allowed on either the DMI Interface or PCI Express* (PCIe*) interface.  The processor supports a maximum of 32 GB of DRAM. No DRAM memory will be accessible above 32 GB.
  • 11.  Processor contains more than 430 registers.  PCI Device 0 Function 0 Configuration Space Registers.  PCI Device 1 Function 0–2 Configuration Space Registers.  PCI Device 1 Function 0–2 Extended Configuration Registers.  PCI Device 2 Configuration Space Registers.  Device 2 IO Registers.  PCI Device 6 Registers.  PCI Device 6 Extended Configuration Registers.  Direct Media Interface Base Address Registers (DMIBAR).  MCHBAR Registers in Memory Controller Channel 0 Registers.  MCHBAR Registers in Memory Controller Channel 1.  MCHBAR Registers in Memory Controller Integrated Memory Peripheral Hub (IMPH).  MCHBAR Registers in Memory Controller Common.  Memory Controller MMIO Registers Broadcast Group Registers.  Integrated GraphicsVTd Remapping Engine Registers.  PCU MCHBAR Registers.  PXPEPBAR Registers.  Default PEG/DMIVTd Remapping Engine Registers.
  • 12.  A 32-KB instruction and 32-KB data first-level cache (L1) for each core  A 256-KB shared instruction / data second- level cache (L2) for each core  Up to 8-MB shared instruction / data third- level cache (L3), shared among all cores.
  • 13.  The ring design is quite simple and has many advantages: shortest path, easily scalable to include more cores if required.
  • 14. Advanced Technologies  Makes a single system appear as multiple independent systems to software.  This allows multiple, independent operating systems to run simultaneously on a single system.  IntelVirtualizationTechnology for Directed I/O (IntelVT-d) adds chipset hardware implementation to support and improve I/O virtualization performance and robustness. Intel®Virtualization Technology (VT-x) Intel®Virtualization Technology for Directed I/O (VT-d)
  • 15. Advanced Technologies  Defines platform-level enhancements that provide the building blocks for creating trusted platforms.  provide the authenticity of the controlling environment such that those wishing to rely on the platform can make an appropriate trust decision.  determines the identity of the controlling environment by accurately measuring and verifying the controlling software. Intel®Trusted Execution Technology
  • 17. Advanced Technologies  Allows an execution core to function as two logical processors.  While some execution resources such as caches, execution units, and buses are shared, each logical processor has its own architectural state with its own set of general-purpose registers and control registers.  This feature must be enabled using the BIOS and requires operating system support. Intel® Hyper-Threading Technology*
  • 18. Advanced Technologies  Allows the processor core to opportunistically and automatically run faster than its rated operating frequency/render clock if it is operating below power, temperature, and current limits.  The IntelTurbo BoostTechnology feature is designed to increase performance of both multi-threaded and single-threaded workloads. Intel®Turbo Boost Technology
  • 19. Advanced Technologies  is a set of security and manageability capabilities built into the processor aimed at addressing four critical areas of IT security  Threat management, including protection from rootkits, viruses, and malware.  Identity and web site access point protection .  Confidential personal and business data protection.  Remote and local monitoring, remediation, and repair of PCs and workstations. Intel® vProTechnology
  • 20. Advanced Technologies  Intel® 64 architecture delivers 64-bit computing on server, workstation, desktop and mobile platforms when combined with supporting software.  Intel 64 architecture improves performance by allowing systems to address more than 4 GB of both virtual and physical memory. Intel® 64
  • 21. Advanced Technologies  Intel® Anti-TheftTechnology (Intel® AT) helps keep your laptop safe and secure in the event that it’s ever lost or stolen. Intel® AT requires a service subscription from an Intel® AT–enabled service provider.  Detects device theft  Locks down lost device  Restores operation easily Intel®Anti-Theft Technology
  • 22. Advanced Technologies  The latest expansion of the Intel instruction set.  It extends the Intel Streaming SIMD Extensions (Intel SSE) from 128-bit vectors to 256-bit vectors.  Intel AVX addresses the continued need for vector floating-point performance in mainstream scientific and engineering numerical applications, visual processing, recognition, data- mining/synthesis, gaming, physics, crypto graphy and other application areas. Intel®AdvancedVector Extensions
  • 23. Intel®Advanced Vector Extensions Intel AVX introduces support for 256-bit wide SIMD registers (YMM0- YMM7 in operating modes that are 32-bit or less,YMM0-YMM15 in 64- bit mode).The lower 128- bits of theYMM registers are aliased to the respective 128-bit XMM registers.
  • 24. Advanced Technologies  A set of Single Instruction Multiple Data (SIMD) instructions that enable fast and secure data encryption and decryption based on the Advanced Encryption Standard (AES).  IntelAES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.  AES is broadly accepted as the standard for both government and industry applications, and is widely deployed in various protocols. Intel®Advanced Encryption Standard New Instructions (Intel®AES-NI)
  • 25. Advanced Technologies  AES-NI consists of six Intel SSE instructions. Four instructions, namely AESENC, AESENCLAST, AESDEC, and AESDELAST facilitate high performance AES encryption and decryption.  AESIMC and AESKEYGENASSIST, support the AES key expansion procedure. Intel®Advanced Encryption Standard New Instructions (Intel®AES-NI)
  • 26. Advanced Technologies  Allows memory to be marked as executable or non- executable, when combined with a supporting operating system. If code attempts to run in non-executable memory the processor raises an error to the operating system.This feature can prevent some classes of viruses or worms that exploit buffer overrun vulnerabilities and can thus help improve the overall security of the system. Execute Disable Bit
  • 27.  Core i5-3550S is built over Ivy bridge microarchitecture.  Processor supporting L3 cache memory.  Most of Intel latest technologies are supported like Anti-Seft,Vpro and Virtualizations.
  • 28.  http://en.wikipedia.org/wiki/Intel_Core#Core_i5  http://en.wikipedia.org/wiki/Ivy_Bridge_%28mic roarchitecture%29  http://ark.intel.com/products/65518/Intel-Core- i5-3550S-Processor-6M-Cache-up-to-3_70-GHz  http://en.wikipedia.org/wiki/Microarchitecture  http://www.behardware.com/articles/863-1/ivy- bridge-22nm-review-intel-core-i7-3770k-and-i5- 3570k.html

Notas del editor

  1. K – Unlocked (adjustable CPU ratio up to 57 bins)P – Versions clocked slightly higher than similar models, but with onboard-graphics deactivated.S – Performance-optimized lifestyle (low power with 65W TDP)T – Power-optimized lifestyle (ultra low power with 35-45W TDP)X – Extreme performance (adjustable CPU ratio with no ratio limit)M – Mobile processorsXM – UnlockedQM – Quad-coreE – Embedded mobile processorsQE – Quad-coreLE – Performance-optimizedUE – Power-optimized
  2. Sandy Bridge is the codename for a microarchitecture developed by Intel beginning in 2005 for central processing units in computers to replace the Nehalem microarchitecture.Complementary metal–oxide–semiconductor (CMOS) is a technology for constructing integrated circuits. CMOS technology is used in microprocessors, microcontrollers, static RAM, and other digital logic circuits.“Tick-Tock" is a model adopted by chip manufacturer Intel Corporation since 2007 to follow every microarchitectural change with a die shrink of the process technology. Every "tick" is a shrinking of process technology of the previous microarchitecture and every "tock" is a new microarchitecture. Every year, there is expected to be one tick or tock.http://en.wikipedia.org/wiki/Multigate_device#Tri-gate_transistors
  3. With 22nm process we can pack 1.4 billion transistor.
  4. Intel Management Engine (ME)Platform Environment Control Interface (PECI)
  5. Intel recommends enabling Intel® HT Technology with Microsoft Windows 7*, Microsoft Windows Vista*, Microsoft Windows* XP Professional/Windows* XP Home* Not supported in 3550S
  6. Maximum frequency is dependent on the SKU and number of active cores.
  7. Hardware-level technology disables your device even if the hard drive is removed, replaced, or reformattedIntel® AT detects suspicious behavior. For example, your laptop will automatically lock down if it fails to check-in over the Internet at a pre-set time with your service provider.When your device is recovered, it can be quickly restored with your one-time password—without damage to your personal data.
  8. AES Inverse Mix Columns