Intel Xeon E5-2669 v3基本资料
类别:CPU |
制造商:Intel |
家族:Xeon |
产品:Xeon E5-2600 v3 |
类型 |
CPU / Microprocessor |
细分市场 |
Server |
系列 |
Intel Xeon E5-2600 v3 |
型号 |
E5-2669 v3 |
CPU 编号 |
- CM8064401545710 is an OEM/tray microprocessor
|
频率 |
2300 MHz |
总线速度 |
5 GT/s DMI |
时钟倍频器 |
23 |
封装 |
2011-land Flip-Chip Land Grid Array |
接口 |
接口 2011-3 / R3 / LGA2011-3 |
S规格号 |
|
ES/QS处理器 |
部件号 |
QGP4 |
CM8064401545710 |
+ | |
架构 / 微体系结构 |
微体系结构 |
Haswell |
Platform |
Grantley-EP |
处理器内核 |
Haswell-EP |
Core stepping |
M1 (QGP4) |
制造工艺 |
0.022 micron |
数据位宽 |
64 bit |
CPU核心数 |
12 [1] |
线程数 |
24 [1] |
浮点单元 |
Integrated |
1级缓存大小 |
12 x 32 KB 8-way set associative instruction caches 12 x 32 KB 8-way set associative data caches |
2级缓存大小 |
12 x 256 KB 8-way set associative caches |
Level 3 cache size |
30 MB shared cache [1] |
多重处理 |
Up to 2 processors |
特征 |
- MMX instructions
- SSE / Streaming SIMD Extensions
- SSE2 / Streaming SIMD Extensions 2
- SSE3 / Streaming SIMD Extensions 3
- SSSE3 / Supplemental Streaming SIMD Extensions 3
- SSE4 / SSE4.1 + SSE4.2 / Streaming SIMD Extensions 4
- AES / Advanced Encryption Standard instructions
- AVX / Advanced Vector Extensions
- AVX2 / Advanced Vector Extensions 2.0
- BMI / BMI1 + BMI2 / Bit Manipulation instructions
- F16C / 16-bit Floating-Point conversion instructions
- FMA3 / 3-operand Fused Multiply-Add instructions
- EM64T / Extended Memory 64 technology / Intel 64
- NX / XD / Execute disable bit
- HT / Hyper-Threading technology [1]
- TBT 2.0 / Turbo Boost technology 2.0 [1]
- VT-x / Virtualization technology
|
低功耗特性 |
Enhanced SpeedStep technology |
集成外设/组件 |
集成显卡 |
None |
Memory controller |
The number of controllers: 1 Memory channels: 4 Supported memory: DDR3-1333, DDR3-1600, DDR3-1866, DDR4 |
Other peripherals |
- Direct Media Interface 2.0
- Quick Path Interconnect v1.1 (2 links)
- PCI Express 3.0 interface (40 lanes)
|
电/热参数 |
热设计功耗 |
120 Watt [1] |
Notes on Intel Xeon E5-2669 v3 |
- The processor has the following security, data protection and/or software features: Secure Key and OS Guard.
[1] - Information is not confirmed |