Intel T Technology
Intel T Technology
Intel T Technology
(*T’s)
INTRODUCTION
Intel’s Advanced Technologies
contd…
Greater resource utilization equals greater performance and
responsiveness.
HT Technology enabled
• A processor
• chipset
• system BIOS
• operating system
Platforms supporting HT Technology
HT Technology is available on laptop, desktop, server, and
workstation systems.
For Desktops:
• HT Technology helps desktop users to get more performance out of
existing software in multitasking environments.
• Business users can run demanding desktop applications
simultaneously while maintaining system responsiveness.
For Servers:
• With HT Technology, multithreaded server software applications
can execute threads in parallel within each processor in a server
platform.
• Intel Xeon processor family use HT Technology to increase compute
power and throughput for today's Web-based and enterprise server
applications.
Extended Memory 64-bit
Technology (EM64T)
What is EM64T?
64-bit pointers
CPUs with EM64T technology have a new operating mode, called IA32E.
Scalability
Performance
Compatibility
Flexibility
Multiprocessing Performance
Application Performance
Requirements
• a processor,
• chipset,
• BIOS,
• operating system,
• device drivers and
• Applications
For Desktops:
• Intel EM64T provides flexibility for 32-bit now and future software
that supports 64-bit computing.
SuSE: SuSE 8.2 (and greater), SLES 8.0 and SLES 9.0 x64 Edition.
contd…
Fully isolated from the production OS, resistant to tampering.
Offers more secure,stable environment for critical services.
Single CPU acts as if, there were several CPUs running in parallel,
allowing the system to run several operating systems at the same
time.
Allows to run, multiple operating systems and applications in
independent partitions.
Improves performance and robustness of software-only virtual
machine solutions.
One computer system can function as multiple “virtual” systems.
In multitasking, there is a single
operating system and several
programs running in parallel.
HyperThreading simulates
two CPUs where there is just
one physical CPU for
balancing performance using
SMP.
In virtualization, several operating systems running in parallel,
each one with several programs running. Each operating system
runs on a “virtual CPU” or “virtual machine”.
How Does Intel VT Works?
Both tasks must be performed with high levels of reliability and low
performance overhead.
contd…
Hardware that does not support hardware-based virtualization
makes it difficult for VMMs to meet these goals, because
traditional processors were designed primarily to run a single
instance of a single operating system.
Privilege Levels:
All modern processors and operating systems implement the
concept of privilege levels, which define what actions can be
performed by specific processes.
contd…
Intel architecture provides four levels of privilege, called rings, that
are numbered 0-3.
- The highest level, 0, is used by the operating system.
- The lowest level, 3, is employed by applications.
- For various reasons, levels 1 and 2 are rarely, if ever, used.
contd…
Only operating systems running in ring 0 have unrestricted access to
the hardware.
By limiting this ring to use by a single OS, the processor enables the
OS to have complete knowledge of the state of the hardware.
• It needs to run at ring 0 and create the illusion to the guest OS that the
guest OS is running in ring 0.
• However, since the VMM is itself running in ring 0, no guest OS can run
at this privilege level.
contd…
In fact, today they typically run at ring 1 or 3—a technique known
as “ring deprivileging” , a technique that runs all guest software at
a privilege level greater than 0.
contd…
This practice creates enormous difficulties for the VMM, which
must constantly monitor the activities of the VMs to trap hardware
accesses and certain system calls, executing them itself and
emulating the results.
contd…
Intel Virtualization Technology solves this problem by creating
two classes of rings:
• Privileged “root” ring—referred to as ring 0P—
for use by the VMM,
• Deprivileged “non-root” ring—ring 0D—for the operating
systems.
contd…
VMM can function as the fundamental layer and all OS can run
above it with the necessary benefits of ring 0.
• a processor,
• chipset,
• BIOS,
• virtual machine monitor (VMM) and
• software
Hardware availability of Intel VT
• Pentium 4 6x2,
• Pentium D 9xx,
• Xeon 7xxx,
• Core Duo,
• Microsoft Virtual PC
• Microsoft Virtual Server — a future version which will
support Intel VT.
• Parallels Workstation — lightweight hypervisor with Intel
VT-x support
• TRANGO real-time embedded hypervisor
• VMware — on Intel processors, VMware Workstation 5.5
requires Intel VT to execute 64-bit guests.
• Xen — Xen 3.0 uses Intel VT to execute unmodified guest
operating systems.
Platform supporting VT
Intel VT is available on:
Partitioning:
• Multiple applications and operating systems can be supported
within a single physical system.
• Computing resources are treated as a uniform pool to be
allocated to virtual machines in a controlled manner.
Isolation:
• Virtual machines are completely isolated from the host machine
and other virtual machines. If a virtual machine crashes, all
others are unaffected.
• Data does not leak across virtual machines and applications, as
communication is over configured network connections.
Encapsulation:
• Complete virtual machine environment is saved as a single file;
easy to back up, move and copy.
Platform Specific Technologies
The OOB method does not need local software agents running on
the target machine making operations independent of the
operating systems involved or the state of the machine.
What Intel AMT does?
It allows IT to better
• Discover
• Heal
• Protect
Nonvolatile memory:
• Protected,persistent space where critical system information can be
secured and stored out of reach of users,intruders,virus worms.
• Data can be accessed as long as PC is connected to power source and
plugged into the network.
Isolation hardware:
• Disconnects the PCs network data path where an inbound or
outbound threat is recognized.
Requirements
Intel AMT-enabled
• chipset,
• network hardware and
• software.
contd…
ISV Application
Altiris Notification Server
BMC Software Marimba
Cisco Systems Cisco Network Admission Control
CA Unicenter NSM
Check Point Software Integrity
LANDesk Software LANDesk Mgmt Suite
LANDesk System Mgr
Novell ZENworks
StarSoftComm StarCenter
StarNet
Trend Micro OfficeScan
Symantec LiveUpdate
Applications
Features Benefits
Remote HW and SW asset tracking Increase speed and accuracy over manual
inventory tracking, reducing asset
accounting costs
Increased speed and accuracy over manual
Third party nonvolatile storage inventory tracking, reducing asset accounting
costs
Intel I/O Acceleration
Technology(I/OAT)
What is Intel I/OAT ?
Performance:
• Intel I/OAT has ability to reduces CPU overhead, freeing resources
for more critical tasks.
• Minimizes performance-limiting bottlenecks by using server’s
processors more efficiently by leveraging architectural
improvements within the CPU, chipset, network controller, and
firmware.
• Accelerates TCP/IP processing, delivers data-movement
efficiencies across the entire server platform.
• Intel I/OAT accelerates TCP/IP processing, delivers data-
movement efficiencies across the entire server platform, and
minimizes system overhead.
contd…
Scalability:
• Provides network acceleration that scales seamlessly across multiple
Ethernet ports.
Reliability:
• Preserves critical network configurations such as teaming and fail over,
by maintaining control of the network stack processing within the
CPU—where it belongs.
• Avoids support risks associated with third-party hardware vendors for
network stack updates.
• Reduces support risks.
Features and Benefits
Performance
Enhanced DMA Engine Faster data movement: up to 2x better
maximum data throughput
Up to 40% less CPU overhead to boost
Optimized TCP Stack
application response
contd…
Reliability
Uses the trusted Windows and Less risk for IT
Linux TCP/IP stacks
Value
Sealed storage shields encryption keys and other data from attack while
in use or stored.
Contd…
Measured launch capability to help:
– Reduce IT support costs with improved services
– Enable decentralized or remote computing
– Verify platform configuration with a higher level of assurance
Three use models can help to illustrate the flexibility and benefits of
Trusted Execution Technology. The use models are as follows:
Local verification
• Local verification uses the measurement capability of Trusted Execution
Technology to give the local user confidence that the platform is executing
in a known state and that the state is not changing over time.
Multi-level Operation
• Multi-level operation takes advantage of the memory protections provided
by Trusted Execution Technology to run two or more applications or
operating systems that require strict separation and managed
communication between the entities.
Thank You