pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Technical guide to the Intel Penryn Core 2 Processor

The Penryn CPU is another in Intel’s line of Core 2 processors and the first fabricated using its 45nm die technology. The processors replace the ‘Merom’ range of processors, the and dual- and quad-core versions catering for the differing requirements of consumer machines.

The Penryn is based on the same core architecture as the current Core 2 implementations but fabricated on a smaller 45nm die using Intel’s innovative ‘high-k’ gate dielectrics and metal gate electrodes, meaning increased transistor density, increased transistor switching speed, and reduced power.

Smaller transistor sizes have many benefits, not least of which is they can squeeze more chips out of a single silicon wafer (and more chips = more profit). The main technological benefit here is that more transistors can be squeezed onto the same size chip with the corollary of this being that more processor work can be done in one unit time.

This technology advanced Intel’s manufacturing processes significantly ahead of those used in fabrication of the original Core 2 processors. It provided potential to once again start scaling manufacturing sizes down and, most importantly, it represented a massive leap ahead of Intel’s competitors.

As an indication of the increased density available to designers, consider this: the Intel Core Quad processors harboured 582 million transistors while Penryn quad-core implementations have 820 million on smaller die. This (massively) increased transistor count is partially explained by the 6MB of level 2 cache per core, 150% of that offered by the original Core 2.

Other advances

The Penryn utilizes a new, faster divider which processes four bits per clock cycle rather than the two processed by Conroe chips. This offers divide operations twice the speed while the speed of square root operations increase four-fold. Such advances, though producing marked overall performance increases, may be limited to very specific applications.

Furthering its bid to reduce the power output of its processors, the Penryn uses a new power-saving mode called Deep Power Down. When the processor enters Deep Power Down it really does go to sleep. Deep sleep. Clock signals are disabled completely, memory caches are turned off, and the voltage is taken down to its absolute minimum.

Another way in which the chip can make the most of the power it is using is in its use of Dynamic clock speeds. In certain sequential processes only one core can be used. In light processes only one is needed. Traditionally both (or all) cores need to be running in order for just the one to continue processing. Predictably this isn’t good for power consumption. Intel’s Core 2 Duo range introduced the novel concept of sleep states that were core independent, so while one processor was working at 100% effort the other could have a well deserved rest. With the Penryn Intel have gone one step further: if the cores are experiencing differing workloads the underused core will sacrifice its voltage and clock frequency in favour of the one working at full capacity. This means an increase in voltage and clock frequency where it really matters, but without a corresponding increase in power consumption and heat output.

It is not just the hardware changed with this processor, as the Penryn Instructions set SSE4 debuted on this processor. SSE4 adds considerable multimedia power, affording an increase in processing speed of 40% for software utilising the instruction set.

  • Intel CoreDuo
  • Intel CoreSolo
  • Intel Core2
  • Guide to the Intel Core 2 Quad and Extreme processors
  • Technical guide to the Intel Penryn Core 2 Processor
  • SSE4 – Intel’s enhanced multimedia focussed CPU instruction set

Filed Under: Intel Core CPUs Tagged With: Core 2, CPU, Intel, Penryn, processor

Latest Articles

Graphic Card HDMI Ports

HDMI (High-Definition Multimedia Interface) is the first industry-supported, uncompressed, all-digital audio/video interface. While it carries the same video signal as DVI, the big difference with its predecessor is that instead of using the remaining pins for an optional video signal, HDMI uses … [Read More...]

How to Remove Unlimited Defender

THREAT OVERVIEW: Unlimited Defender is a fake security application that has been designed by cyber criminals with the objective of stealing money from unsuspecting users. This is not a real security client reason why once detected it is recommended to conduct all the necessary steps to … [Read More...]

FusionPlayer

The whole premise of FusionPlayer is that it will let you create media play lists using videos on the computer and videos from the Internet. That is its hook and the incentive to install the program. The truth is, however, this is a PUP (potentially unwanted program)that is nothing more than a … [Read More...]

How to Start a Business in Computer Engineering

Did you know that there are 66,200 computer engineers in the United States? This can be a very lucrative career path. However, you may have an easier … [Read More...]

Best Techniques for Defragmenting a Hard Drive

We recently published a post on the importance of defragmenting a hard drive. We wanted to cover the actual process in more depth. The first thing … [Read More...]

Why You Need to Regularly Defragment Your Hard Drive

Your computer's hard disk of is one of the most vital parts of your machine. It needs to operate reliably and quickly for your computer to function … [Read More...]

Container vs VM: What Is the Difference and Which One to Pick?

VMs and containers are two implementations of virtualization technology. This means that both VMs and  containers help to optimize how resources … [Read More...]

Privacy Considerations with Photos and Videos on Your Smartphone

New technology makes it easier than ever to capture images and videos. This technology is getting smaller and easier to use. As a result, the quality … [Read More...]

Tips on How to Land a Remote Job in Cyber Security

The demand for skilled cyber security professionals is growing as well as a number of threats and risks. Any company needs an expert or team to … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Creative Commons Images for Your Web Projects

Do you know which images from the Internet you can reuse and which you can't? Do you know Creative Commons? There is a misconception that all the … [Read More...]

Advanced System Protector Virus Removal

Advanced System Protector is a malware virus. This is a direct clone of several other viruses out there. The purpose of this malware virus is to trick … [Read More...]

How to Effectively Use the Hash Tag

The big players in social media are Facebook, Instagram, Google, Pinterest and Twitter. They have been the cornerstones of social media for some time … [Read More...]

[footer_backtotop]

Copyright © 2022 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors