Solved

100Mhz Bus Speed--which CPU?

Posted on 1998-08-04
3
264 Views
Last Modified: 2010-04-12
Here's just silly question--I understand the new Pentium II CPUs with, say, the Asus P2B Motherboard coupled with PC100 SdRam are capable of 100 Mhz Bus Speeds, but which CPUs do that? I heard a PII 300 was bare minimum. Is this true?
0
Comment
Question by:Challin
3 Comments
 
LVL 7

Accepted Solution

by:
dankh earned 20 total points
ID: 1122268
hi,

The Codename 'Deschutes' is standing for several different Pentium II CPUs and doesn't really say more than that it is a Pentium II CPU that runs at a higher clock speed than 300 MHz, using the .25 micron technolgy. There will be a 'normal' Deschutes for the now well known Slot 1, in other words nothing but a faster version of the Pentium II as we already know it, but also there'll be a Deschutes for the upcoming Slot 2, which is supposed to not suffer from the 512MB cacheable RAM area limit anymore, it will be able to run in a multi CPU environment of more than only dual, as valid for the current Pentium II and is hence targeted to the server market, replacing the Pentium Pro. The Slot 2 will have more connectors which will be arranged in 3 instead of the current 2 lines on top of each other. Both Deschutes versions will reach the 100 MHz bus speed next year, the Slot 1 Deschutes running on the 440BX chipset at 100 MHz, the Slot 2 Deschutes running on the 450NX chipset. Note that both CPUs use the same codename.


0
 

Expert Comment

by:kirill
ID: 1122269
If you are not fan of Intel you can also take a look at AMD K6-2 3D NOW. This proccessor offers superior 3D speed for a quite low price. You can work with 300MHz version of this processor at bus speed of 100MHz if you have a mainboard based on VIA MVP3 chip set.
You can visit AMD site (www.amd.com)  to get more information.
0
 

Author Comment

by:Challin
ID: 1122270
Thanks to all for the input!
Michael
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to become an Authorized HP service center 2 69
moving files on usb stick 3 71
OLD CPUs 12 80
Drivers  Repository for Win 7 13 58
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question