• <Home

Cloud Stories: Cloud Services Infrastructure

Expedient builds next-generation clouds with Intel® Xeon® processor E5 family–based servers

By Alex Rodriguez, vice president, Systems Engineering and Product Development, Expedient Communications

 

My company, Expedient Communications, provides cloud computing, managed services, and network connectivity. This means my team spends most of its time working to provide or extend the technical foundation for many of our customers. The lessons we’re learning might help your team as you build private clouds and evaluate external cloud services.

Because of our close working relationship with Intel, we had the opportunity to evaluate the new Intel® Xeon® processor E5 family of products prior to launch. Based on our evaluation experience—during which we’ve had the chance to test-drive the new processor’s features—we plan to use Intel Xeon processor E5-based servers as the core of our next-generation cloud infrastructure. 

Of interest to us was the processor’s significant increase in performance, built-in security at the hardware level, and integrated support for unified networking via 10 gigabit Ethernet (GbE). These capabilities will help us achieve three important things:

  • First, we can deliver greater security with our services without significant performance impacts from encryption and protect the platform by building trust between servers and environments. 
  • Second, we can increase bandwidth for faster network throughput to support expanding data-access needs.
  • Third, we can lower power consumption in the data center to reduce energy costs.

Accelerated encryption and decryption performance is provided through Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI), which is built into the Intel Xeon processor E5 family of products. We used to deploy hardware-based encryption accelerators, and now, with Intel AES-NI, we can provide better encryption at a far lower cost.1

One of our big lessons is that security concerns must be addressed throughout the solution stack. For this reason, we are evaluating another technology that is built into the Intel Xeon processor E5 family of products, called Intel® Trusted Execution Technology, or Intel® TXT.2 Intel TXT is a hardware-based security solution that can help us extend a “chain of trust” between our environment and our customers’ environment.

Using 10 GbE is enabling us to increase network throughput, which is becoming more and more important as data sets get bigger and bigger. We believe 10 GbE is the most efficient technology for our cloud-based platforms, and Intel Xeon processor E5-based servers are the first to support integrated 10 GbE for mainstream servers. We’ll use Intel® Ethernet 10GBASE-T as the backbone of our next-generation cloud infrastructure.

Finally, we believe that Intel Xeon processor E5-based servers will help us better manage power usage in the data center. The processor has built-in power technology and sensors that will help us reduce power usage across our cloud infrastructure.

We plan to use Intel Xeon processor E5-based servers as the building blocks of our next cloud “PODs.” POD is the term we give to self-contained computing units that let us build our cloud infrastructure in a very modular, redundant, and secure way. These self-contained PODs include compute, storage, and I/O. We then replicate these PODs across the organization to provide a solid base for high availability. Starting with a modular architecture is one of the most important lessons we’ve learned in our experience of building cloud infrastructure.

Read about Expedient’s transparent cloud >

Read how Expedient Secured their Network with Intel® Ethernet Controller X540 >

Read more cloud stories >

Alex Rodriguez

 

"Based on our evaluation experience—during which we’ve had the chance to test drive the new processor’s features—we plan to use Intel® Xeon® processor E5-based servers as the core of our next-generation cloud infrastructure."

 

Join the Experts. Join Your Peers. Join the Intel IT Center.

  • Get Real-World Content

    Use information from Intel and industry experts to plan and implement your big projects.

  • Learn from Peers

    Benefit from the experience and advice of your IT colleagues

  • Interact with Intel

    Take advantage of many opportunities to have Intel experts answer your questions.

  • Register now

Videos relacionados

Ver más videos

Product and Performance Information

open

1. ¹ Intel® AES-NI requiere un sistema informático con un procesador habilitado para las nuevas instrucciones de AES Intel® (Intel® AES-NI), y también que el software que no sea de Intel ejecute las instrucciones en la secuencia correcta. Con respecto a la disponibilidad, consulte a su revendedor o al fabricante del sistema. Para ver más información, visite software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/.

2. Ningún sistema informático puede proporcionar una seguridad absoluta en todas las condiciones. La tecnología Intel® Trusted Execution (Intel TXT) necesita un sistema informático con tecnología de virtualización Intel®, un procesador, un chipset, un BIOS y módulos de código autenticado habilitados para la tecnología Intel TXT, así como un entorno iniciado medido (MLE) compatible con esta tecnología. El MLE puede consistir en un monitor de máquina virtual, un sistema operativo o una aplicación. Además, la tecnología Intel TXT necesita que el sistema contenga TPM v1.2, definido por Trusted Computing Group, y software específico para algunos usos. Para ver más información, visite www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html.