The document discusses the specifications and technologies of the Intel Core i5-3550S processor. It uses the Ivy Bridge microarchitecture with a 22nm process. It has 4 cores with 4 threads each, supports up to 32GB of RAM, and has cache memory including a shared 8MB L3 cache. It supports many Intel technologies like Turbo Boost, Hyper-Threading, Virtualization, and AES-NI.
3. Core i5 is using the Ivy Bridge microarchitecture.
Ivy Bridge is the codename for an Intel microprocessor
using the Sandy Bridge microarchitecture.
Ivy Bridge uses a 22 nanometer process.The Ivy
Bridge die shrink, known in the IntelTick-Tock model
as the "tick", is based on 3D tri-gate transistors. Intel
demonstrated Ivy Bridge processors in 2011.
4.
5. Status Launched
Launch Date Q2'12
Processor Number i5-3550S
# of Cores 4
# ofThreads 4
Clock Speed 3 GHz
MaxTurbo Frequency 3.7 GHz
Intel® Smart Cache 6 MB
Bus/Core Ratio 30
DMI 5 GT/s
Instruction Set 64-bit
Instruction Set Extensions SSE4.1/4.2,AVX
EmbeddedOptionsAvailable Yes
Lithography 22 nm
6. Memory Specifications
Max Memory Size (dependent on
memory type)
32 GB
MemoryTypes DDR3-1333/1600
# of Memory Channels 2
Max Memory Bandwidth 25.6 GB/s
ECC Memory Supported No
7. Graphics Specifications
ProcessorGraphics Intel® HD Graphics 2500
Graphics Base Frequency 650 MHz
Graphics Max Dynamic Frequency 1.15 GHz
Intel®Quick SyncVideo Yes
Intel® InTru™ 3DTechnology Yes
Intel® Insider™ Yes
Intel®Wireless Display Yes
Intel® Flexible Display Interface (Intel®
FDI)
Yes
Intel®ClearVideo HDTechnology Yes
# of Displays Supported 3
8. AdvancedTechnologies
Intel®Turbo BoostTechnology 2.0
Intel® vProTechnology Yes
Intel® Hyper-ThreadingTechnology No
Intel®VirtualizationTechnology (VT-x) Yes
Intel®VirtualizationTechnology for
Directed I/O (VT-d)
Yes
Intel®Trusted ExecutionTechnology Yes
AES New Instructions Yes
Intel® 64 Yes
Intel®Anti-TheftTechnology Yes
Idle States Yes
Enhanced Intel SpeedStep®Technology Yes
Thermal MonitoringTechnologies Yes
Execute Disable Bit Yes
Intel®VT-x with Extended PageTables
(EPT)
Yes
9.
10. PEG port upper pre-fetchable base/limit
registers.This allows the PEG unit to claim
I/O accesses above 32 bit.
Addressing of greater than 4 GB is allowed on
either the DMI Interface or PCI Express*
(PCIe*) interface.
The processor supports a maximum of 32 GB
of DRAM. No DRAM memory will be
accessible above 32 GB.
11. Processor contains more than 430 registers.
PCI Device 0 Function 0 Configuration Space Registers.
PCI Device 1 Function 0–2 Configuration Space Registers.
PCI Device 1 Function 0–2 Extended Configuration Registers.
PCI Device 2 Configuration Space Registers.
Device 2 IO Registers.
PCI Device 6 Registers.
PCI Device 6 Extended Configuration Registers.
Direct Media Interface Base Address Registers (DMIBAR).
MCHBAR Registers in Memory Controller Channel 0 Registers.
MCHBAR Registers in Memory Controller Channel 1.
MCHBAR Registers in Memory Controller Integrated Memory Peripheral Hub (IMPH).
MCHBAR Registers in Memory Controller Common.
Memory Controller MMIO Registers Broadcast Group Registers.
Integrated GraphicsVTd Remapping Engine Registers.
PCU MCHBAR Registers.
PXPEPBAR Registers.
Default PEG/DMIVTd Remapping Engine Registers.
12. A 32-KB instruction and 32-KB data first-level
cache (L1) for each core
A 256-KB shared instruction / data second-
level cache (L2) for each core
Up to 8-MB shared instruction / data third-
level cache (L3), shared among all cores.
13. The ring design is
quite simple and has
many advantages:
shortest path, easily
scalable to include
more cores if
required.
14. Advanced
Technologies
Makes a single system appear as multiple
independent systems to software.
This allows multiple, independent
operating systems to run simultaneously
on a single system.
IntelVirtualizationTechnology for
Directed I/O (IntelVT-d) adds chipset
hardware implementation to support and
improve I/O virtualization performance
and robustness.
Intel®Virtualization
Technology (VT-x)
Intel®Virtualization
Technology for Directed
I/O (VT-d)
15. Advanced
Technologies
Defines platform-level enhancements that
provide the building blocks for creating
trusted platforms.
provide the authenticity of the controlling
environment such that those wishing to rely on
the platform can make an appropriate trust
decision.
determines the identity of the controlling
environment by accurately measuring and
verifying the controlling software.
Intel®Trusted Execution
Technology
17. Advanced
Technologies
Allows an execution core to function as
two logical processors.
While some execution resources such as
caches, execution units, and buses are
shared, each logical processor has its own
architectural state with its own set of
general-purpose registers and control
registers.
This feature must be enabled using the
BIOS and requires operating system
support.
Intel® Hyper-Threading
Technology*
18. Advanced
Technologies
Allows the processor core to
opportunistically and automatically run
faster than its rated operating
frequency/render clock if it is operating
below power, temperature, and current
limits.
The IntelTurbo BoostTechnology feature
is designed to increase performance of
both multi-threaded and single-threaded
workloads.
Intel®Turbo Boost
Technology
19. Advanced
Technologies
is a set of security and manageability
capabilities built into the processor aimed
at addressing four critical areas of IT
security
Threat management, including protection from
rootkits, viruses, and malware.
Identity and web site access point protection .
Confidential personal and business data
protection.
Remote and local monitoring, remediation, and
repair of PCs and workstations.
Intel® vProTechnology
20. Advanced
Technologies
Intel® 64 architecture delivers 64-bit
computing on server, workstation,
desktop and mobile platforms when
combined with supporting software.
Intel 64 architecture improves
performance by allowing systems to
address more than 4 GB of both virtual
and physical memory.
Intel® 64
21. Advanced
Technologies
Intel® Anti-TheftTechnology (Intel® AT)
helps keep your laptop safe and secure in
the event that it’s ever lost or stolen.
Intel® AT requires a service subscription
from an Intel® AT–enabled service
provider.
Detects device theft
Locks down lost device
Restores operation easily
Intel®Anti-Theft
Technology
22. Advanced
Technologies
The latest expansion of the Intel
instruction set.
It extends the Intel Streaming SIMD
Extensions (Intel SSE) from 128-bit
vectors to 256-bit vectors.
Intel AVX addresses the continued need
for vector floating-point performance in
mainstream scientific and engineering
numerical applications, visual
processing, recognition, data-
mining/synthesis, gaming, physics, crypto
graphy and other application areas.
Intel®AdvancedVector
Extensions
23. Intel®Advanced
Vector Extensions
Intel AVX introduces
support for 256-bit wide
SIMD registers (YMM0-
YMM7 in operating modes
that are 32-bit or
less,YMM0-YMM15 in 64-
bit mode).The lower 128-
bits of theYMM registers
are aliased to the
respective 128-bit
XMM registers.
24. Advanced
Technologies
A set of Single Instruction Multiple Data
(SIMD) instructions that enable fast and
secure data encryption and decryption based
on the Advanced Encryption Standard (AES).
IntelAES-NI are valuable for a wide range of
cryptographic applications, for example:
applications that perform bulk
encryption/decryption, authentication,
random number generation, and
authenticated encryption.
AES is broadly accepted as the standard for
both government and industry applications,
and is widely deployed in various protocols.
Intel®Advanced
Encryption Standard
New Instructions
(Intel®AES-NI)
25. Advanced
Technologies
AES-NI consists of six Intel SSE
instructions. Four instructions, namely
AESENC, AESENCLAST, AESDEC, and
AESDELAST facilitate high performance
AES encryption and decryption.
AESIMC and AESKEYGENASSIST, support
the AES key expansion procedure.
Intel®Advanced
Encryption Standard
New Instructions
(Intel®AES-NI)
26. Advanced
Technologies
Allows memory to be marked as executable or non-
executable, when combined with a supporting operating
system. If code attempts to run in non-executable
memory the processor raises an error to the operating
system.This feature can prevent some classes of viruses
or worms that exploit buffer overrun vulnerabilities and
can thus help improve the overall security of the system.
Execute Disable Bit
27. Core i5-3550S is built over Ivy bridge
microarchitecture.
Processor supporting L3 cache memory.
Most of Intel latest technologies are
supported like Anti-Seft,Vpro and
Virtualizations.
K – Unlocked (adjustable CPU ratio up to 57 bins)P – Versions clocked slightly higher than similar models, but with onboard-graphics deactivated.S – Performance-optimized lifestyle (low power with 65W TDP)T – Power-optimized lifestyle (ultra low power with 35-45W TDP)X – Extreme performance (adjustable CPU ratio with no ratio limit)M – Mobile processorsXM – UnlockedQM – Quad-coreE – Embedded mobile processorsQE – Quad-coreLE – Performance-optimizedUE – Power-optimized
Sandy Bridge is the codename for a microarchitecture developed by Intel beginning in 2005 for central processing units in computers to replace the Nehalem microarchitecture.Complementary metal–oxide–semiconductor (CMOS) is a technology for constructing integrated circuits. CMOS technology is used in microprocessors, microcontrollers, static RAM, and other digital logic circuits.“Tick-Tock" is a model adopted by chip manufacturer Intel Corporation since 2007 to follow every microarchitectural change with a die shrink of the process technology. Every "tick" is a shrinking of process technology of the previous microarchitecture and every "tock" is a new microarchitecture. Every year, there is expected to be one tick or tock.http://en.wikipedia.org/wiki/Multigate_device#Tri-gate_transistors
With 22nm process we can pack 1.4 billion transistor.
Intel Management Engine (ME)Platform Environment Control Interface (PECI)
Intel recommends enabling Intel® HT Technology with Microsoft Windows 7*, Microsoft Windows Vista*, Microsoft Windows* XP Professional/Windows* XP Home* Not supported in 3550S
Maximum frequency is dependent on the SKU and number of active cores.
Hardware-level technology disables your device even if the hard drive is removed, replaced, or reformattedIntel® AT detects suspicious behavior. For example, your laptop will automatically lock down if it fails to check-in over the Internet at a pre-set time with your service provider.When your device is recovered, it can be quickly restored with your one-time password—without damage to your personal data.