Solved

NUMA CPU set up - clarification

Posted on 2014-10-24
2
239 Views
Last Modified: 2014-11-07
IBM 3850 M2/x3950 M2 (x64)
Four of E7450 @ 2.4GHz, 6 Core, 6 Logical.

Is this considered
"symmetric multiprocessing computer"
"non-uniform memory access (NUMA) computer"
"hyperthreading-enabled processors"

1)If NUMA configured, what is the number of CPUs assigned for each NUMA node. How can be find this in the system?
2)What is the number of physical processors in the above setup?  
3)What is the number of physical processors per NUMA node in the above setup?
0
Comment
Question by:25112
  • 2
2 Comments
 
LVL 32

Accepted Solution

by:
_ earned 500 total points
ID: 40402962
I need to do some more digging, or somebody else can fill in the blanks (and correct my boo-boos), but so far...

>> "symmetric multiprocessing computer"

not sure, but I'm going with yes.

>> "non-uniform memory access (NUMA) computer"

not sure, but I'm going with yes.

>> "hyperthreading-enabled processors"

definitely not.

>> 1) If NUMA configured, what is the number of CPUs assigned for each NUMA node. How can  be find this in the system?

Not a "hard" number, as far as I know.  Usually a variable that you can set. In the BIOS?

>> 2) What is the number of physical processors in the above setup?  

Depends on your definition of physical processors.  4 physical cpus, with 6 cores each, for a total of 24 discrete processors.

>> 3) What is the number of physical processors per NUMA node in the above setup?

see #1

Here's a .PDF spec sheet on the 3850 (might be a little "dated", as it doesn't mention the E7450 cpu as being supported).

http://www-07.ibm.com/systems/includes/content/x/hardware/enterprise/x3850m2/pdf/xso03033usen.pdf
0
 
LVL 32

Expert Comment

by:_
ID: 40429325
Thank you much.    : )
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now