Cloud Stories: Cloud Services Infrastructure

Expedient builds next-generation clouds with Intel® Xeon® processor E5 family–based servers

By Alex Rodriguez, vice president, Systems Engineering and Product Development, Expedient Communications

 

My company, Expedient Communications, provides cloud computing, managed services, and network connectivity. This means my team spends most of its time working to provide or extend the technical foundation for many of our customers. The lessons we’re learning might help your team as you build private clouds and evaluate external cloud services.

Because of our close working relationship with Intel, we had the opportunity to evaluate the new Intel® Xeon® processor E5 family of products prior to launch. Based on our evaluation experience—during which we’ve had the chance to test-drive the new processor’s features—we plan to use Intel Xeon processor E5-based servers as the core of our next-generation cloud infrastructure. 

Of interest to us was the processor’s significant increase in performance, built-in security at the hardware level, and integrated support for unified networking via 10 gigabit Ethernet (GbE). These capabilities will help us achieve three important things:

  • First, we can deliver greater security with our services without significant performance impacts from encryption and protect the platform by building trust between servers and environments. 
  • Second, we can increase bandwidth for faster network throughput to support expanding data-access needs.
  • Third, we can lower power consumption in the data center to reduce energy costs.

Accelerated encryption and decryption performance is provided through Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI), which is built into the Intel Xeon processor E5 family of products. We used to deploy hardware-based encryption accelerators, and now, with Intel AES-NI, we can provide better encryption at a far lower cost.1

One of our big lessons is that security concerns must be addressed throughout the solution stack. For this reason, we are evaluating another technology that is built into the Intel Xeon processor E5 family of products, called Intel® Trusted Execution Technology, or Intel® TXT.2 Intel TXT is a hardware-based security solution that can help us extend a “chain of trust” between our environment and our customers’ environment.

Using 10 GbE is enabling us to increase network throughput, which is becoming more and more important as data sets get bigger and bigger. We believe 10 GbE is the most efficient technology for our cloud-based platforms, and Intel Xeon processor E5-based servers are the first to support integrated 10 GbE for mainstream servers. We’ll use Intel® Ethernet 10GBASE-T as the backbone of our next-generation cloud infrastructure.

Finally, we believe that Intel Xeon processor E5-based servers will help us better manage power usage in the data center. The processor has built-in power technology and sensors that will help us reduce power usage across our cloud infrastructure.

We plan to use Intel Xeon processor E5-based servers as the building blocks of our next cloud “PODs.” POD is the term we give to self-contained computing units that let us build our cloud infrastructure in a very modular, redundant, and secure way. These self-contained PODs include compute, storage, and I/O. We then replicate these PODs across the organization to provide a solid base for high availability. Starting with a modular architecture is one of the most important lessons we’ve learned in our experience of building cloud infrastructure.

Read about Expedient’s transparent cloud >

Read how Expedient Secured their Network with Intel® Ethernet Controller X540 >

Read more cloud stories >

Alex Rodriguez

 

"Based on our evaluation experience—during which we’ve had the chance to test drive the new processor’s features—we plan to use Intel® Xeon® processor E5-based servers as the core of our next-generation cloud infrastructure."

 

Join the Experts. Join Your Peers. Join the Intel IT Center.

  • Get Real-World Content

    Use information from Intel and industry experts to plan and implement your big projects.

  • Learn from Peers

    Benefit from the experience and advice of your IT colleagues

  • Interact with Intel

    Take advantage of many opportunities to have Intel experts answer your questions.

  • Register now

Product and Performance Information

open

1. تتطلب توسعة تعليمات إنتل الخاصة بالتشفيرIntel® AES New Instructions (Intel® AES-NI) نظاماً حاسوبياً يدعم هذه التقنية على مستوى المعالج بالإضافة إلى برامج من شركات أخرى غير إنتل لتنفيذ التعليمات بالتعاقب الصحيح. للتحقق من التوافر، راجع بائع التحزئة لديك أو الشركة المصنعة. لمزيد من المعلومات، يمكن زيارة الصفحة: software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/.

2. لا يستطيع أي نظام كمبيوتر توفير الأمان المطلق في كافة الظروف. تتطلب تقنية التنفيذ الموثوق Intel® TXT نظاماً حاسوبياً يدعم هذه التقنية على مستوى كل من المعالج وطقم الرقاقات ونظام BIOS ويتضمن تقنية التمثيل الافتراضي Intel® Virtualization Technology، بالإضافة إلى وحدات البرمجة الموثقة Authenticated Code Modules وبيئة MLE متوفقة مع تقنية Intel TXT. يمكن أن تتألف بيئة MLE من أداة مراقبة للآلات الافتراضية سواء كانت نظام تشغيل أو تطبيق. كما تتطلب تقنية Intel TXT أيضاً أن يتضمن النظام وحدة المنصة الموثوقة TPM v.1.2 كما هو محدد من قبل مجموعة الحوسبة الموثوقة Trusted Computing Group، وقد تحتاج برامج إضافية معينة لبعض الاستخدامات الخاصة. لمزيد من المعلومات، انظر www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html.