RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

download RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

of 16

Transcript of RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    1/16

    Mirtin rm UNIX/RISC nMinrm t Int-s SutinsA Practical Migration Guide

    introductionMany Fortune 500 corporations have successfully migrated legacy SPARC/

    Solaris and Power/AIX infrastructure to Intel Xeon processor-based servers

    running Linux.* Most have achieved signicant business and IT benets, including

    better performance and reliability, lower capital and operating costs, and better

    exibility and agility for future growth. They have also reduced the load on their

    data center infrastructure. As youll see in the case studies referenced in this

    paper, the benets can be substantial, even transformative.

    Tis wit r is sin t tcnic cisin mkrs

    unrstn t rquirmnts succssu mirtin. It ris

    i-, st--st uiins s n mt tt s

    n us succssu r mn rs n crss mn irnt

    mirtin scnris.

    Reading this guide from beginning to end will provide you with an overview

    of migration requirements for various types of applications and workloads.

    If you want to identify requirements for a specic migration:

    1. Find your migration type in Table 1.

    2. Read a brief summary of migration requirements for that particular type

    of migration in the section entitled, The Migration Spectrumfrom Simple

    to Complex.

    3. Read the detailed description for each step in the sections that follow.

    4. For additional tips, see the section: Using Tools to Simplify and

    Accelerate Migration.

    Was Peea

    Senior Solutions Architect

    Ga Hwa

    Senior Solutions Architect

    Sa Kha

    Global Mission Critical Initiatives

    To learn more about

    modernizing your mission

    critical environment, go to

    www.intel.com/servermigration

    WHitE PAPEr

    riSc Mga

    Mission-Critical Solutions

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    2/16

    Wh Mgae

    There are a number of reasons why

    organizations choose to migrate away

    from legacy UNIX/RISC infrastructure.

    Many nd their existing hardware and

    software environment is too costly to

    maintain and support. The high costs

    are often compounded by the lack of

    exibility and agility, which can result

    in additional costs due to lost business

    opportunity and an inability to respond

    to changing needs. Many of these organiza-

    tions would like to move to a more exible

    and affordable computing platform, but

    are concerned about the cost and risk

    of migration.

    Although careful assessment is always

    important to conrm viability, migration to

    Intel architecture is most often a worth-

    while process and tends to cost less than

    upgrading existing UNIX/RISC environments.

    Best practices have been rened over more

    than a decade, services and support are

    widely available, and most obstacles thatare likely to arise can be overcome by a

    skilled team of business and IT specialists

    working together.

    Ongoing technical advances in industry-

    standard servers and solutions have made

    migration even more attractive in recent

    years. Scalable servers based on the Intel

    Xeon processor E7 family provide robust

    support for mission-critical applications.

    Eight-socket servers with up to 80 cores,

    160 threads, and 4 terabytes of memory

    are currently available and are well suited

    to large, enterprise workloads. Even larger

    systems are offered by select vendors.

    This class of Intel Xeon processor-based

    server also includes advanced reliabil-

    ity, availability, and serviceability (RAS)

    features integrated at the silicon and

    system level to provide the data integrity

    and system resilience needed in mission-

    critical environments.1 Support for key

    RAS features has been integrated into

    many mission-critical solution components,

    including the Linux operating system (OS)

    and major databases.

    The benets of migration can be compelling.

    As evidenced by the case studies cited in

    this paper, companies have saved millions

    of dollars by migrating mission-critical

    applications to Intel Xeon processor-based

    servers running Linux. They have also

    improved performance and availability and

    eased the load on their existing data center

    facilities. In some cases, space, power, and

    cooling requirements have been reduced by

    as much as 90 percent.2

    Migration also improves the exibility of

    IT environments. Intel Xeon processor-

    based servers running Linux are supported

    by one of the worlds largest vendor com-

    munities. Businesses have more hardware,

    software, and service options, and they

    benet from faster innovation and more

    competitive pricing models.

    tabe ces

    i 1

    Wh Mgae 2

    ce Mga isses 3

    Code and Data Conversion. . . . . . . . . . 3

    Limiting Outage during

    the Switchover . . . . . . . . . . . . . . . . . . . .3

    the Mga Spem

    m Smpe cmpe 4

    Infrastructure Applications . . . . . . . . .4

    Remote Ofce/Retail

    Computing Applications . . . . . . . . . . . .4

    Mission-Critical Common-

    Off-the-Shelf (COTS) Applications. . . 4

    Mission-Critical

    Custom Applications . . . . . . . . . . . . . . .5

    Mga Mehg 6

    Project Planning . . . . . . . . . . . . . . . . . . . 6

    Code Conversion . . . . . . . . . . . . . . . . . . .8

    Proof of Concept (PoC) . . . . . . . . . . . 10

    Solution Architecture . . . . . . . . . . . . .12

    Pilot Migration . . . . . . . . . . . . . . . . . . . .13

    Rehearsal Migration . . . . . . . . . . . . . . 14

    Production Migration . . . . . . . . . . . . . 14

    usg ts Smp

    a Aeeae Mgas 14

    cs 15

    EnvironMEnt

    MEtHodoloGy StEPS

    1 ProjEct

    PlAnninG

    2 codE

    convErSion

    3 Proof of

    concEPt

    4 Solution

    ArcHitEcturE

    5 Pilot

    MiGrAtion

    6 rEHEArSAl

    MiGrAtion

    7 Production

    MiGrAtion

    iase

    Remote Ofce/Retail

    cmpg

    Mss-ca cotS

    Appas

    Mss-ca csm

    Appas

    tabe 1 Identifying the Appropriate Steps for Your Migration.

    2

    Mgag m unix/RISC to Linux* on Intel Architecture

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    3/16

    Many companies have taken advantage

    of virtualization during or followingtheir migration, not only to simplify and

    consolidate their infrastructure, but also

    to improve scalability, availability, and

    control. IT organizations are increasingly

    comfortable virtualizing mission-critical

    environments. It lets them utilize physical

    resources more efciently and add virtual

    resources during workload spikes to

    maintain service levels. Virtualization

    can be used to complement other high

    availability technologies to enable more

    comprehensive high availability anddisaster recovery solutions. It also lays

    a foundation for layering on advanced

    cloud functionality, so businesses are

    better positioned to take advantage of

    next-generation computing models if

    and when they choose.

    ce Mga isses

    Careful planning is essential to identify

    and mitigate the risks that exist in

    any migration project, and to ensure

    that business and IT goals are met.

    For businesses undertaking their rst

    migration, it is generally best to include

    experienced consultants as part of the

    team, preferably from a vendor that has

    conducted similar migrations. Consultants

    will understand common challenges and

    solutions, which can simplify planning

    and reduce risk. Active participation by

    internal business and IT personnel is also

    crucial, since they will understand the

    companys unique challenges and require-

    ments, such as success factors, service

    level agreements (SLAs), enterpriseprocedures, and political issues.

    Although migration is a detailed process

    with many issues to consider, two coreissues arise in most migrations. The rst

    is code and data conversion. The second is

    limiting the application outage during the

    switch-over to the new solution.

    ce a daa ces

    In very simple migrations, there

    may be no need for code conversion.

    However, whenever custom applications,

    shell scripts, or data are migrated,

    varying degrees of code conversion

    will be required.

    Linux is quite similar to UNIX, but there

    are syntax and directory differences that

    must be addressed. Tools exist that can

    automate much of the process, but the

    results need to be tested and optimized

    as the code is reiteratively compiled to

    ensure SLAs are met. If the code is modern,

    well written, and well documented, conver-

    sion should be straightforward and time

    and effort will be roughly proportional to

    the size and complexity of the code base.

    If the code is old and poorly documented,conversion may be more challenging. A

    careful assessment should be conducted

    prior to migration, so time and resources

    can be allocated accordingly.

    One signicant code difference between

    RISC and Intel architectures is referred

    to as endianess. RISC and mainframe

    architectures (Sun SPARC,* IBM PowerPC,*

    IBM z-series,* etc.) are big endian, which

    means the most signicant bits of a multi-

    byte number are stored in the memory

    location with the lowest address. Intelarchitecture is little endian, so the most

    signicant bits are stored in the memory

    location with the highest address. Sincethis is a consistent difference between

    the two architectures, it is straightfor-

    ward to convert data when it is trans-

    ferred across the network between

    one platform and the other.

    lmg oage dg he Swhe

    In an ideal migration, it would be possible

    to have the new solution up and running

    before the old one is turned off. However,

    most applications take in data continuously

    and all data must be present in the new

    solution at the instant it goes live. This

    typically requires shutting down the

    old application, transferring data, then

    turning on the new application. Minimizing

    downtime and risk for this switchover is a

    primary focus of most migrations.

    The majority of database migration tools

    address this issue, and, with proper plan-

    ning, the shutdown can typically be limited

    to seconds or minutes. For applications

    with extreme uptime requirements, it may

    even be possible to eliminate downtimealtogether, but this requires specialized

    tools and expertise. As one example,

    Oracle GoldenGate* (discussed later

    in this paper) enables data migration

    without downtime for many Oracle

    Database solutions.

    3

    Mgratg from Unix/RiSC to Lu* o itel Archtecture

    3

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    4/16

    the Mga Spem

    fm Smpe cmpeMigrations from UNIX/RISC architectures

    vary in complexity and entail varying

    degrees of cost and risk. The following

    categories are arranged from the simplest

    to the more complex and account for the

    majority of data center migration types.

    iase Appas

    Examples: DNS, LDAP, web servers, rewalls,

    backup and restore, le and print.

    Migrating infrastructure applications can

    be simple, even trivial. In most cases, the

    application will be available in versions

    that run natively on both architectures

    and little or no code conversion will be

    required. Switchover to the new solution

    also tends to be relatively easy, sincedowntime windows are not a signicant

    concern. Once the initial migration is per-

    formed, it can be replicated across other

    instances of the application throughout

    the enterprise, resulting in exceptionally

    high value with low cost and risk.

    Remote Office/Retail

    cmpg AppasExamples: Business applications running at

    multiple locations, such as remote ofces,

    bank branches, retail stores, etc.

    One of the primary challenges of applica-

    tion migration is that every migration

    tends to be different, requiring business

    and IT personnel to reexamine goals,

    requirements, and processes.

    However, when a business runs the same

    application in multiple locations, such

    as remote ofces and retail outlets, the

    cost and risk of migration are defrayed

    across all application instances. As with

    infrastructure applications, the team can

    perform one pilot migration, optimize the

    implementation process, and then repli-

    cate the migration across all locations.

    Cost and risk will be variable for

    the pilot migration depending on

    the complexity of the solution stack.

    However, as long as the same software

    stack is used across locations, all remaining

    migrations should be simple and relatively

    risk-free, which greatly increases the total

    value of migration.

    Mss-ca cmmea-

    o-he-She (cotS) AppasExamples: Re-hosting core businessapplications, such as SAP, Oracle eBusiness

    Suite,* and associated databases

    In addition to hardware and OS migrations,

    mission-critical COTS applications can be

    migrated at the database layer, the appli-

    cation layer, or the web services layer. In

    some scenarios, all three layers are hosted

    in partitions on a large UNIX/RISC server.

    In many others, the Web or application

    layers are already hosted on Intel Xeon

    processor-based servers. If more than one

    layer is being migrated, it is generally bestto perform the migration in stages. This

    reduces risk by decreasing the number

    of simultaneous variables, making it easier

    to identify and resolve any issues that

    arise during migration.

    Migrating mission-critical applications also

    introduces the two core issues discussed

    earlier: converting code and minimizing

    application downtime during the migra-

    tion. If the application runs natively on

    Intel architecture, the challenges of code

    conversion are greatly reduced. However,it may still be necessary to convert shell

    scripts and other custom-coded elements.

    Project Planning

    Pilot Migration

    Production Migration

    1

    2

    3

    rEquirEd StEPS

    rEquirEd StEPS

    Project Planning

    Code Conversion

    Solution Architecture

    Pilot Migration

    Rehearsal Migration

    Production Migration

    1

    2

    3

    4

    5

    6

    2

    3

    rEquirEd StEPS rEquirEd StEPS

    Project Planning

    Code Conversion

    Solution Architecture

    Pilot Migration

    Rehearsal Migration

    Production Migration

    1

    2

    3

    4

    5

    6

    2

    3

    rEquirEd StEPS

    4

    Mgratg from Unix/RiSC to Lu* o itel Archtecture

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    5/16

    In general, the workow for a mission-

    critical migration involves performing adetailed assessment, followed by any

    required code conversion and a proof-of-

    concept (PoC) to demonstrate the feasibility

    of migration. Assuming a successful PoC,

    the migration team will then architect the

    solution for scalability and high availability,

    size the new solution for production work-

    loads and perform one or more migration

    rehearsals to optimize migration processes.

    The rehearsals are essential to ensure

    the switchover in the nal production

    migration can be performed quicklyand with minimal risk.

    The same basic methodology applies

    to multiple scenarios of varying

    complexity, including:

    re-hsg a appa sak wh

    swae hages Migration should

    be relatively simple and straightforward,

    since only data unique to the enterprise

    must be transferred.

    re-hsg a appa sak wh

    swae es hages (e.g., Oracle9i* to Oracle 11g*). Version changes add

    complexity, since additional variables

    come into play. For example, migration

    tools on the newer version may not

    be available on the older version. It

    might also be necessary to convert

    application code to run successfully

    in the new application version.

    Engaging with the software vendor

    or an experienced migration consultant is

    recommended to ensure that application

    changes and dependencies are

    well understood.

    re-hsg appa saks

    ha ee sga pgaes(e.g., changing the software application

    or the underlying database). Software

    stack upgrades introduce multiple simul-

    taneous changes that can make it hard

    to identify the source of any issues that

    arise. The migration should be broken

    into discrete steps if possible. For exam-

    ple, first migrate the existing application

    tier and then migrate the database.

    Mss-ca csm Appas

    Examples: An application written to support

    unique processes for a single business (often

    in C++, C, or Java)

    Migrating custom applications introduces

    the additional challenge of large-scale

    code conversion. Initial assessments

    should take into account the availability

    of source code, porting tools, libraries,

    documentation, and knowledgeable

    developers, since all these factors can

    have a signicant impact on cost, risk,

    and timelines.

    The time and effort required for code

    conversion will be roughly proportional tothe size of the code base. Major OEMs and

    Linux vendors have mature tools that can

    be used to automate much of the process,

    especially for porting code from UNIX/

    RISC environments. The tools read the

    source code and identify required library

    and syntax changes. Some manual coding

    will also be required, followed by careful

    testing and optimization to ensure func-

    tionality, stability, and performance. Oncecode conversion is complete, the migration

    team can follow the processes outlined

    for mission-critical vendor applications.

    Migrating mainframe applications tends

    to be more complex, but not always. For

    example, migrating a vendor application,

    such as SAP, or a vendor database, such

    as Oracle Database or IBM DB2, can be

    relatively simple. Migrating custom appli-

    cations tends to be more challenging, but

    can be straightforward if the code is mod-

    ern, well written, and well documented.Migrating older custom applications can be

    quite challenging. A 30-year-old main-

    frame application may have been modied

    and patched many times, and the code is

    likely to be monolithic, brittle, and poorly

    documented. The original developers may

    be long retired, and it may be hard to nd

    new developers that understand the lan-

    guage, whether its COBOL, PL/1, another

    mainframe language, or JCL. The applica-

    tions running on a mainframe may also

    be interdependent, making it necessaryto migrate multiple applications and data

    sets at the same time.

    These issues are beyond the scope of

    this paper. However, companies have

    been migrating mainframe applications

    to Intel architecture for many years, and

    experienced vendors are available with

    expertise and toolsets that can reduce

    cost, effort, and risk. For a detailed exam-

    ple of mainframe migration methodology,

    see Re-Hosting Mainframe Applications

    on Intel Xeon Processor-based Servers at:wwweaaeemgam

    rEquirEd StEPS

    Project Planning

    Code Conversion

    Proof of Concept

    Solution Architecture

    Rehearsal Migration

    Production Migration

    1

    2

    3

    4

    5

    6

    2

    3

    rEquirEd StEPS

    5

    Mgratg from Unix/RiSC to Lu* o itel Archtecture

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    6/16

    Mga Mehg

    Every migration is different. The follow-

    ing methodology provides a good starting

    point for most migrations, but will need

    to be adapted to address specic require -

    ments. The methodology is broken into

    discrete steps and not every step will be

    necessary in every migration (see

    Table 1, at the beginning of this paper,

    for recommendations).

    Pe Pag

    Careful planning lays the foundation for a

    successful migration. The following stepsare recommended.

    1 uesa gas There are

    many reasons for migrating a large,

    legacy RISC server to Intel architec-

    ture, including strategic or tactical

    business needs, the need to refresh

    aging infrastructure, cost reduction,

    performance, energy efficiency, reli-

    ability, space reduction, and the desire

    to standardize or virtualize infrastruc-

    ture. Understanding and documenting

    the relative importance of these andother goals provides a framework for

    decision making throughout the

    planning process.

    2 dee he spe Identify the applica-

    tions, servers, storage, data centers, and

    other components that will be included

    in your migration. Keep it as simple as

    possible, since the broader the scope,

    the greater the complexity.

    3 dee sess ea To the

    extent possible, your criteria should

    be quantitative, such as reducing total

    cost of ownership (TCO) by a particular

    percentage or handling a certain num-

    ber of transactions per second within a

    specified average time. Include all key

    criteria that are important to success.

    4 Smae tco a re

    iesme (roi) Applications areavailable to automate this function,

    either off the shelf or from many ser-

    vice providers. In conjunction with your

    documented goals, scope, and success

    criteria, these assessments provide

    you with the information you need to

    gain buy-in from project stakeholders,

    which can be critical in any major

    migration project.

    5 Assess y Esg Eme

    In this step, you perform a detailed as-

    sessment of your existing environmentto determine migration requirements

    and identify potential risks. Take a

    balanced approach. It is important to

    analyze your situation carefully to

    ensure no major requirements or risks

    are overlooked. However, over-analysis

    is a risk factor that can drive up costs

    and create inertia. The following pro-

    vides a recommended approach for a

    balanced assessment.

    Review and explore your existing

    solution documentation, application

    options, and hardware options from

    your preferred vendor (see the side-

    bar on page 11, Choosing the Right

    Intel Xeon Processor-Based Servers).

    Is your application available in a native

    version for Intel architecture? Is it the

    same version level as your existing ap-

    plication? If not, what impact will these

    differences have on your solution,

    your users, and your migration?

    MIgRaTIoN IN The Real WoRld:

    ely lIlly

    repamg he

    Eepse Bakbe

    The worlds 10th largest pharmaceutical

    company has completed about 70

    percent of an enterprise-wide transfor-

    mation aimed at replacing all UNIX/RISC

    platforms with Linux* running on Intel

    architecture. The ultimate test came

    with the migration of a global SAPdeployment supporting 50,000 users.

    The project was a success, resulting in:

    Multi-million-dollar savings with

    expected payback in two years

    A 90 percent reduction in the data

    center footprint with 80 percent

    lower power consumption

    An average performance improvement

    of 11 percent, even though much

    of the code was optimized for the

    previous infrastructure

    Read the full case study at:

    http://support.intel.co.jp/content/

    dam/doc/case-study/mission-critical-

    mpg-e-7500-5600-e--

    ase-sp

    6

    Mgratg from Unix/RiSC to Lu* o itel Archtecture

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    7/16

    Compile an equipment and application

    inventory of your existing environ-ment. If no credible inventory exists,

    you can perform this manually or

    you can license software that auto-

    matically discovers assets. Discovery

    software tends to be faster and can

    assist with documenting application

    dependencies, but is rarely perfect.

    Some degree of manual discovery will

    be required. There may be existing

    hardware and software components

    you wish to continue using in your

    new environment. You will need todetermine whether they are com-

    patible, and, if not, whether suitable

    alternatives are available.

    Create a profi le of the application

    you wish to migrate. You will need

    to understand what the application

    is being used for, how it operates,

    and who uses it. You will also need

    to understand data sources and data

    flow, and identify all application de-

    pendencies and external linkages.

    Dependencies can be as simple as ahard-coded host name or as complex

    as inter-process communications. One

    example of a common dependency is a

    limitation on the supporting operating

    system versions. If you are migrat-

    ing a custom application, evaluate the

    size and complexity of the code. Do

    you have access to the source code,

    documentation, vendor libraries, and

    developer resources?

    Evaluate the data that will need to be

    migrated. Will you be using the same

    or a new database application? Is the

    data in binary format?

    Document critical solution require-

    ments for storage, servers (CPU,memory, and I/O), the network, and

    SLAs. Consider backup and disas-

    ter recovery solutions, as well as the

    production environment. Assessing

    CPU requirements can be tricky when

    moving to a new architecture. For

    guidance, see step 8, Preliminary

    Server Sizing.

    Assess the security environment

    of the existing solution. The goal

    here is to understand how security is

    implemented so you can re-implementa similar solution or architect a new

    one. In general, it is also advisable

    to review any documented information

    security policy updates for the appli-

    cation or for the company as a whole.

    You dont want to re-implement an

    existing security solution only to

    find out it is no longer adequate to

    address requirements.

    Assess infrastructure and operations

    for the existing solution, including

    people, processes, and tools. If yournew solution will be designed to

    fit into the existing environment,

    what changes might be required?

    Alternatively, does the migration

    provide an opportunity to improve

    infrastructure and operations to

    provide a more efficient IT framework

    for the new computing platform?

    6 deeme easb a e

    sks Based on all the informationyou have collected, assess the fea-

    sibility of your migration and identify

    potential risks. Is it feasible from a

    technical standpoint? Can you meet

    requirements for performance, scal-

    ability, availability, security, and data

    integrity? Do you have the necessary

    experience, skills and resources avail-

    able to conduct the migration or will

    you need assistance or guidance from

    outside vendors? Can you integrate

    the new solution efficiently into youroperational environment? Can you

    be sure of stakeholder support and

    the funding you need to complete

    the project?

    7 dee whehe pee

    Revisit your TCO and ROI analyses to

    be sure they remain on track. Weigh

    the expected gains against the risks

    associated with the project to de-

    termine whether it makes sense to

    proceed with the particular migration.

    7

    Mgratg from Unix/RiSC to Lu* o itel Archtecture

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    8/16

    8 Pema See Szg If you

    decide to proceed, you will need toassess the load on your current server

    in detail, so you can determine an

    appropriate configuration for proof-

    of-concept (PoC)3 testing. A common

    mistake in many migrations is to invest

    a lot of effort to determine a precise

    configuration for the production hard-

    ware before the application has been

    tested on the new system architec-

    ture. Application performance can

    differ dramatically in going from one

    architecture to another, and only per-formance testing on similar platforms

    can provide accurate performance esti-

    mates. At this stage, you only need a

    reasonable preliminary estimate to

    support your test requirements. Your

    pilot migration or PoC will ultimately

    provide the detailed information you

    need to size your production server.

    Determining memory and disk space

    for your test server is fairly straight-

    forward, since the requirements will be

    very similar to your legacy infrastruc-ture. Determining CPU requirements,

    however, is not so simple. There are

    both architectural and generational

    differences to consider, including the

    numbers of cores, threads, cache, in-

    structions per clock cycle, and many

    other factors. One way to approach

    this task is to use performance moni-

    toring tools that are available in most

    UNIX operating systems. If not, you

    can add the Sysstat4 package of tools

    to measure key performance statistics

    and identify bottlenecks.

    vmstat collects statistics pertaining to

    operating system memory, processes,

    interrupts, paging, and block I/O.

    iostat collects operating system

    storage input and output statistics.

    netstat displays network connections,

    routing tables, and a number of net-work interface statistics.

    mpstat collects processor related

    statistics to monitor CPU usage.

    System Activity Reporter (sar)

    normally collects performance data

    every 20 seconds, but can be config-

    ured to monitor performance metrics

    over longer intervals.

    Use these tools to collect data through

    a normal business cycle. This is typi-

    cally a month, but can be as long as aquarter. Identify peak requirements and

    combine this performance information

    with benchmark data (from TPC.org or

    SPEC.org) for your legacy platform and

    your target Intel Xeon processor-based

    server. With this information, you can

    roughly estimate CPU requirements for

    your PoC tests.

    Alternatively, you can use a sizing tool

    to assist with your estimations. You

    will need to purchase an appropriate

    sizing tool, some of which require theinstallation of performance measuring

    agents in your legacy server. After col-

    lecting data for your specified period,

    the sizing tool will analyze the data

    and recommend an appropriate Intel

    Xeon processor-based server.

    ce ces

    Code conversion is necessary whenever

    the application is not available in a version

    that runs natively on Intel processors.

    It is also required for shell scripts and

    other custom code components. Code

    conversion can be relatively simple or

    very complex, depending on the quality

    and availability of source code, documen-

    tation, porting tools, and developers with

    appropriate skills and experience. For

    large and complex custom applications,

    consider writing a new application from

    scratch or moving to an appropriatevendor or open source application.

    The emergence and adoption of standards

    such as POSIX.1, UNIX 95, and UNIX 98 has

    signicantly reduced the complexity of

    code conversion by fueling a convergence

    in application programming interfaces

    (APIs). However, even in standards-based

    code, some discrepancies are likely to be

    found due to ambiguities in the standard

    or issues that are covered imprecisely by

    a conformance suite and are implemented

    in different ways on the two platforms.These kinds of issues create complexi-

    ties that must be dealt with in most code

    conversion efforts.

    In general, the more compliant the applica-

    tion source code is with language, coding,

    and run-time standards, the easier it will

    be to port to the new computing plat-

    form. Source code that conforms to the

    standards listed above and to the relevant

    ANSI/ISO standard will be easy to port, as

    will source code that is already portable to

    multiple platforms. Source code changes

    will be required if the source code:

    Includes assembly source modules or

    inline assembler statements.

    Exploits specific knowledge of the

    UNIX/RISC platform you are replacing

    (for example, hard-coded assumptions

    about page size or knowledge of the

    OS, such as file system layout).

    Depends on endian-specific data.

    Calls proprietary APIs or exploits

    undocumented features of the OS.

    Is linked and runs in kernel mode.

    This includes kernel modules and

    device drivers.

    8

    Mgratg from Unix/RiSC to Lu* o itel Archtecture

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    9/16

    In general, the recommended process

    for code conversion is as follows.5

    1. Gather source code and

    conversion tools.

    2. Plan source code conversion tasks.

    If the project seems out of scope

    based on in-house expertise and

    available resources, consider

    outsourcing the conversion.

    3. Determine if your hardware or

    software vendor provides tools to

    assist in code conversion. Several key

    original equipment manufacturers(OEMs) provide mapping papers

    or tools to help determine the obvious

    changes, such as directory structures

    for the include files and recommended

    syntax changes for shell scripts and

    other control programs.

    4. Identify your applications development

    environment dependencies, includ-

    ing the tools used for source code

    management, the build environment,

    installation, application management,

    development, profiling and performance

    measurement, testing, and documenta-

    tion. Include third-party products, such

    as libraries, applications servers, and

    application completers.

    5. Identify and assess the likely impact

    of differences in the operating sys-

    tems, cluster features, run-time

    libraries, and third-party product

    versions that might affect your

    code conversion project.

    6. Identify and plan for any end-userimpact that might result from deliver-

    ing your application on the new target

    system. This can include the need for

    data conversion, uptime support during

    the transition period, product installa-

    tion changes, product administration

    changes, and training.

    7. Identify and address the application

    porting teams need for documentation

    and training.

    8. Port your application development

    environment and adapt your develop-ment procedures as needed.

    9. Clean up the application source code,

    identifying and removing architectural

    dependencies and nonstandard prac-

    tices where possible.

    10. Extend the application source code

    to support the new target platform.

    This can include the addition of con-

    ditional modules and conditional code

    (both high-level and assembler code).

    Generalize implementations to avoidarchitectural dependencies if possible.

    11. Compile the source code, preferably

    using ANSI or more strict error

    checking switches to flag potential

    issues. Fix any problems found at

    compile time.

    12. Run the application with a broad set

    of test cases, debug any problems,

    and correct any run-time problems

    that are detected.

    13. Repeat steps 11 and 12 as necessary.

    When planning your code conversion

    project, it is important to evaluate cus-

    tomer support requirements for the new

    application, which may increase during the

    transition period. For example, if you add

    or modify customer-initiated procedures

    or change remote diagnostics tools and

    techniques, documentation and training

    may be required for customers and support

    staff. Other issues to consider during plan-

    ning include acceptance testing, the need

    for additional system backups during thetransition, and the impact of the application

    changes on any archives that are required

    for business or legal reasons. For applica-

    tions that are particularly critical to the

    business, you may also want to consider

    the need for parallel operation of both

    application versions during the transition.

    MIgRaTIoN IN The Real WoRld:CalIfoRNIa depaRTMeNT of

    WaTeR ReSoURCeS (CdWR)

    Bg a f Eme

    With a heterogeneous and aging IT

    infrastructure, CDWR was hard

    pressed to avoid outages and con-

    tain rising costs. By virtualizing and

    consolidating the entire infrastructure,

    including mission-critical enterprise

    applications, on Intel Xeon processor-based servers, CDWR achieved:

    Up to 4x better ERP performance

    4x higher capacity, while reducing

    the server footprint by 65 percent,

    power consumption by 40 percent,

    and cooling by 50 percent

    A 25 percent reduction in operating

    expenses, including USD 2.2 million

    savings in maintenance costs

    70 percent faster IT provisioning to

    support growth and change

    Read full case study at:

    http://www.intel.com/content/

    www/us/en/virtualization/

    aza-e-5600-aa-

    epame--wae-eses-

    shm

    9

    Mgratg from Unix/RiSC to Lu* o itel Archtecture

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    10/16

    P cep (Pc)

    All complex or mission-critical migrationsshould include a PoC to:

    Verify the application can run in

    the new environment

    Determine how it performs

    Optimize configurations to

    maximize performance

    Determine preliminary processes

    for the production migration

    Recommended steps for a PoC

    are as follows.

    1. Size and acquire an appropriate server

    for the PoC. (See Project Planning,

    step 8, earlier in this paper.) Sizing

    need only be approximate at this time.

    Performance measurements during

    the PoC will be used to determine a

    best-fit production configuration.

    2. Size and acquire an appropriate storage

    solution for the application. For smaller

    applications, this can be high capac-

    ity, solid state drives in a PCIe slot. For

    larger applications, it can be hard disksor solid state drives in a storage area

    network (SAN) or network attached

    storage (NAS) array.

    3. Determine an appropriate OS

    configuration for the PoC, including

    release levels and patch levels.

    4. Determine the application

    software configuration.

    5. Identify your user acceptance testing

    (UAT) processes and resources. This

    can be a regression test harness ora group of users to bang on the sys-

    tem. If you use a test harness, be sure

    you have access to ancillary hardware

    to simulate users.

    6. Make sure you have appropriate

    staffing for the PoC. You shouldhave full-time access to at least one

    employee who is familiar with the

    application and operating system

    configurations and at least one

    employee who is familiar with quality

    assurance (QA) and UAT procedures.

    This is important to avoid delays

    during your PoC.

    7. Configure your server for the PoC

    and tune the OS for the application.

    8. Document all current and requiredconfigurations, including versions

    and patch levels, source code and

    documentation, library issues,

    application tuning parameters,

    network links, and storage

    configurations (paths and links).

    9. Backup the application server before

    you begin testing. It will be easier to

    restore the initial configuration after

    each test than to re-install and recon-

    figure the application.

    10. Connect the server to your dev-test

    or lab subnet.

    11. Use your test harness to measure

    performance and identify bottlenecks.

    Be aware that performance may be poor

    initially and the bottlenecks you find

    may be very different than those you

    observed on the legacy platform. This

    is to be expected since the source and

    target architectures are quite different.

    MIgRaTIoN IN The Real WoRld:

    NCh CoRpoRaTIoN

    Aeeag ErP

    NCH needed to refresh the aging

    infrastructure supporting its Oracle

    enterprise resource planning (ERP)

    environment. By replacing a large

    number of RISC-based servers with

    Intel Xeon processor-based system,

    the company achieved:

    Technology refresh savings of USD

    5.5 million

    More than 300 percent faster perfor-

    mance for Oracle transactions

    Improved productivity, reducing the

    time for a currency rebalance from

    four and a half hours to one hour and

    ten minutes

    Read the full case study at: http://

    www.intel.com/content/www/us/

    en/processors/xeon/risc-migration-e-7540-h-pa-s-

    sags-shm

    10

    Mgratg from Unix/RiSC to Lu* o itel Archtecture

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    11/16

    Optimizing performance is a standard

    part of the PoC and can entail a sig-nificant amount of time so build this

    into your schedule. Reiterative adjust-

    ments of the application environment

    might even include re-architecting the

    platform for the PoC. This is where the

    correct configuration (memory, CPU,

    storage, etc.) for the production envi-

    ronment will be determined.

    The test harness can be a commercially

    available performance testing tool,

    such as Load Runner (www8.hp.com/

    us/en/software/software-product.html?compURI=tcm:245-935779).

    Such tools usually require an

    elaborate configuration of hardware

    that simulates the actual application

    architecture. Alternatively, you might

    hook this PoC test bed into the

    regression testing harness used for

    application development life cycle

    testing. You could also use the more

    mature Quality Assurance (QA) testing

    platform or the User Acceptance

    Testing (UAT) platform.12. Evaluate the cause of any

    performance issues.

    Monitor performance using tools

    residing in the Linux OS, such as

    vmstat, iostat, netstat, mpstat, or

    SAR (described earlier in this paper).

    Look for waits in the database,

    such as delays in writing to log files or

    anything affecting logging processes.

    Look closely at memory size and

    speed, the number of CPUs, networklinks, and the storage configuration.

    When migrating mission-critical enterprise workloads, such as large databases, core

    transactional applications, and business intelligence solutions, consider servers based

    on the Intel Xeon processor E7 family. These servers provide a particularly

    scalable and robust foundation for demanding applications. Each processor provides

    up to 10 cores, 20 threads, and 30 MB of last level cache. An eight-socket server can

    be congured with up to four terabytes of memory.

    The Intel Xeon processor E7 product family includes advanced RAS features to

    improve data integrity and system resilience. A key example is Machine Check

    Architecture-Recovery, which enables automated system recovery from many

    uncorrectable errors. Most server vendors offer a range of system-level RAS features,

    such as redundant and hot plug components and built-in management modules.

    Intel Xeon processors also include built-in Intel security technologies that provide

    enhanced protection for systems, application, and data.

    Intel Advanced Encryption Standards-New Instructions (Intel AES-NI)

    accelerates encryption for any application that employs AES, a widely supported

    encryption specication. By providing hardware support for encryption, it allows

    IT organizations to implement stronger data protection without slowing downapplication performance or overloading servers.

    Intel Trusted Execution Technology (Intel TXT) enables IT organizations to

    establish pools of trusted infrastructure, by ensuring that servers and virtual

    machines launch only into known good states. Instead of trying to counter

    constantly changing attacks one by one, Intel TXT ensures that rmware and

    software have not been tampered with prior to or during launch.

    ChooSINg The RIghT INTel XeoN pRoCeSSoR-baSed SeRveRS

    Intel Xeon processor-based servers are widely available in two-, four-, andeight-socket congurations that will meet the vast majority of requirements.

    Larger systems are available from select vendors.

    11

    Mgratg from Unix/RiSC to Lu* o itel Archtecture

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    12/16

    Analyze the data to determine the

    source of the bottlenecks. Is thehardware inadequate? Does the OS

    or underlying software need tuning?

    If the application is custom-coded,

    does the application architecture or

    code need adjusting?

    Make adjustments to optimize

    performance, then retest and

    re-optimize as needed.

    13. Use your test data to determine the

    proper configuration for the produc-

    tion solution, then reevaluate your

    ROI estimates accordingly.

    14. Carefully document processes,

    configurations, and results.

    Note that some steps, such as porting

    data, will need to be repeated during

    subsequent phases of the migration.

    Those processes should be

    fully documented.

    Others steps, such as rewriting shell

    scripts or editing C++ code, will not

    need to be repeated. Detailed, step-

    by-step documentation for those

    processes may not be necessary.

    Still other steps, such as setting

    environmental parameters for the ap-

    plication, lie somewhere in between.

    The processes for setting those pa-

    rameters will have to be repeated. The

    processes for determining the correct

    settings will not. Adjust your documen-

    tation accordingly.

    15. Review the PoC and documentation

    with the PoC team.

    S Ahee

    Once you have nished your PoC, youneed to step back and consider broader

    issues, the most important of which are

    ensuring the scalability and availability

    of the solution. You have already deter-

    mined that the application runs on the

    hardware and are condent that SLAs

    can be met, but there are several addi -

    tional issues to consider.

    rbs hawae With most migrations,

    you automatically gain performance, scal-

    ability, and RAS when you replace older

    equipment with more robust, newer hard-

    ware. You can add to these advantages by

    configuring new systems with redundant

    components, such as power supplies, disk

    drives and fans. Be aware that the Intel

    Xeon processor E7 family is designed spe-

    cifically for mission-critical environments

    and provides advanced support for data

    integrity and system resilience at the sili-

    con level. Servers based on this processor

    family tend to provide more robust support

    for mission-critical environments.

    cseg You can also reduce the

    effects of failure on your migrated

    environment by using high availability

    clustering software, which is available

    as an option in leading Linux distribu-

    tions. A redundant server is deployed

    to take over the duties of the main

    server in the event of a failure. While

    failover is not instantaneous, it is

    automatic. Clustering software limits

    the effects of failure on overall

    system availability.

    Hza sag In a horizontally

    scaled architecture, increasing workloads

    are handled by adding additional servers,

    rather than increasing the size of indi-

    vidual servers. This can be an excellent

    approach for presentation layer services,

    which tend to scale well across multiple

    servers through workload balancing. If

    MIgRaTIoN IN The Real WoRld:

    UNIveRSITy of ColoRado

    lage Sae daa

    cee csa

    To address rising costs, the University

    of Colorado migrated its mission-

    critical IT environment from RISC-

    based servers to Intel Xeon

    processor-based systems. The

    results were transformative.

    The data center footprint wasreduced by 95 percent and power

    consumption by 90 percent

    USD 600,000 was saved from the

    total IT budget in just the first year

    after migration

    Performance for the Oracle ERP

    application was improved by

    400 to 600 percent

    Read the full case study at:

    http://www.cisco.com/en/US/

    solutions/collateral/ns340/ns517/ns224/U_of_Colorado_casestudy

    _nal.pdf

    12

    Mgratg from Unix/RiSC to Lu* o itel Archtecture

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    13/16

    a server fails, its workload automati-

    cally fails over to the remaining servers,providing high availability as well as scal-

    ability. Two-socket servers based on the

    Intel Xeon processor E7 family support

    larger memory footprints and include

    robust support for high availability and

    data integrity. Automated provisioning

    and maintenance tools are recommended

    to keep management overhead low as

    the solution expands.

    vea Sag In a vertically scaled

    architecture, the application resides on a

    single server. As workloads grow, perfor-mance is scaled by adding resources to

    the server or upgrading to a larger sys-

    tem. Applications that are appropriate

    for vertical scaling tend to be mature or

    single-purpose applications that exhibit

    a high degree of scalability, such as data-

    bases and transactional applications.

    Here again, servers based on the Intel

    Xeon processor E7 family tend to be

    the best choice. They provide the higher

    levels of reliability and availability needed

    in a vertically scaled solution. They alsoprovide more CPU resources (cores,

    cache, and bandwidth), and come in

    larger server configurations to support

    heavier workloads.

    P Mga

    A pilot migration is appropriate whenever

    an application will be deployed across

    multiple locations. For an application to

    be a good candidate for a pilot migration

    (rather than a more extensive PoC):

    The application must be available in anoff-the-shelf version that runs natively

    on Intel architecture.

    Application functionality and interfaces

    must be standard across instances.

    A reasonable amount of application

    downtime must be acceptable, soextensive testing and rehearsals

    are not required to optimize the

    switchover process.

    The following steps are appropriate

    for most pilot migrations:

    1. Acquire and configure the Intel Xeon

    processor-based platform for the pilot.

    (See Preliminary Server Sizing earlier

    in this paper for details.)

    2. Install the application.

    3. Use a test harness to validate function-

    ality and performance in a simulated

    production environment.

    4. Make changes as needed to ensure

    the new solution will meet SLAs.

    5. Based on the results, determine a

    best-fit server configuration for the

    production environment and verify

    that the new solution will meet return

    on investment (ROI) criteria.

    6. Acquire the new server, load theapplication, run your test, and deploy

    the new server into production.

    7. Document the solution configuration

    and setup procedures.

    8. Replicate the solution across the

    infrastructure. This step is frequently

    executed by a team from a system

    integrator with a national or even

    international reach. It can also be

    executed by an internal team tasked

    with traveling to each site that

    requires the upgrade.

    MIgRaTIoN IN The Real WoRld:hSbC

    re-Hsg Me

    Maame Appas

    HSBC encountered performance

    and reliability issues for a key main-

    frame after deploying a new suite

    of loan applications. Migrating

    the applications to Intel Xeon

    processor-based servers delivered:

    A better experience for customersand branch office personnel due

    to improved performance and

    higher uptime

    Lower costs and greater headroom

    with 70 percent lower monthly

    service charges and a 2,000 MIPS

    reduction in mainframe workloads

    Improved business flexibility with an

    infrastructure that is easier to scale

    and adapt

    Read the full case study for more infor-mation about the HSBC methodology

    and migration experience.

    wwweaaeemgam

    13

    Mgratg from Unix/RiSC to Lu* o itel Archtecture

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    14/16

    reheasa Mga

    Ensuring a successful switchover to thenew solution requires careful preparation.

    Your PoC migration steps were not opti-

    mized for simplicity, speed, or efciency.

    Tasks were accomplished iteratively

    (testing, optimizing, and retesting)

    and not in a straightforward sequence

    appropriate for the production migration.

    A rehearsal is needed to optimize and

    validate the migration process.

    Your documentation from the PoC

    provides a recipe for the rehearsal. The

    goal is to rene the steps of the PoC to

    streamline the production migration and

    ensure a seamless transition that mini-

    mizes any downtime. The following steps

    can be used to prepare and conduct your

    rehearsal migration.

    1. Streamline your documented PoC

    migration process by determining

    which steps are necessary and reor-

    dering them as appropriate to optimize

    efficiency. Note which steps can be

    performed in parallel and which can be

    performed before shutting down the

    production system for the switchover.

    Your goal is to accomplish as much as

    possible before switching off the pro-

    duction system in order to minimize

    downtime during the migration.

    2. Once you have determined the steps

    of your production migration, develop

    scripts to automate every process that

    can be automated.

    3. Perform the rehearsal starting with a

    clean slate. Recreate the pre-migrationsteps, then execute all data migration

    steps as rapidly as possible, since they

    represent the key cause of downtime

    during the transition.

    4. Document all your steps, including

    any additional refinements and thetime required to perform each step.

    5. Test the solution for QA

    and acceptance.

    6. Repeat the rehearsal migration as

    needed until you are confident you

    can perform the production migration

    quickly and without incident.

    P Mga

    By the time you reach this point, you

    should have full condence in your new

    solution and your migration process.

    1. Use your documentation from the

    rehearsal to develop a tight project

    plan for the migration.

    2. Schedule an optimal maintenance

    window and notify all affected

    business units.

    3. Rebuild the target server and finalize

    all pre-migration steps.

    4. Execute the production migration

    as rehearsed.

    5. Run the system through your QA and

    acceptance procedures.

    6. Cut over or run in parallel depending

    on requirements.

    7. Document everything that was done.

    usg ts Smp

    a Aeeae MgasA broad range of tools are available

    to help with migrations, including capac-

    ity planning tools for server sizing, code

    conversion tools, and database migration

    tools. If this is your rst migration from

    a UNIX/RISC platform to Linux on Intel

    architecture it is probably best to work

    with an experienced vendor to determine

    best-t tools and processes for your spe-

    cic migration. Many server, OS, and appli-

    cation vendors have extensive experience

    helping customers with migration projects.There are also many service providers

    who specialize in code conversion and

    platform migration.

    The right tools can provide signicant

    advantages. In a database migration, for

    example, the choice of data migration

    tools can make a difference between

    several hours of downtime and no

    downtime at all. Organizations must

    also consider the cost and complexity of

    using particular tools and processes. The

    following example describes three differ-ent tools that can be used to migrate an

    Oracle database to Intel Xeon processor-

    based servers. Multiple options are avail-

    able for other leading databases, as well.

    These and other tools should be evaluated

    carefully prior to use to ensure alignment

    with specic goals and requirements.

    14

    Mgratg from Unix/RiSC to Lu* o itel Archtecture

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    15/16

    Option 1: Oracle export/import utility.

    This is the simplest method for migratingan Oracle database from a legacy platform

    to an Intel Xeon processor-based server.

    It uses tools that are familiar to database

    administrators and are resident in Oracle

    Database. The process is straightforward.

    1. Configure the new Intel Xeon proces-

    sor-based server.

    2. Run a script to set up your database

    structures (tables and packages).

    3. Move any static (read-only) data

    before application shutdown.

    4. Shutdown the production application

    and use the export/import utility to

    transfer your data.

    5. Move active data in parallel export/

    import streams.

    6. Create indexes using parallel processing.

    7. Run referential integrity constraints

    after the data is imported.

    8. Restart the production database on

    the new server and run your tests.

    9. Release the new solution to production.

    op 2: oae Seams

    This process is more complex, but the

    production application can remain running

    through most of the migration. Oracle

    Streams is available as a utility of the

    Enterprise Edition of Oracle Database.

    1. Configure the Intel Xeon processor-

    based target server and a thirdintermediate database server with

    operating systems, then install the

    Oracle database. The architecture of

    the third server should be the same

    as the production server (i.e., another

    RISC server). However, it could be a

    virtual server and does not have to be

    as robust as the production system,

    since it will only be used for shipping

    the redo logs.

    2. Backup the production database and

    Convert DB using Oracle RMAN.

    3. Restore the production environment

    on the target server.

    4. Ship the transaction logs to the third

    intermediate database up to SCN.

    5. Shut down the production database

    and apply the last database changes

    to the target server.

    6. Clean up.

    7. Shut down the production database.

    8. Restart production on the new

    database server and run your tests.

    9. Release the new solution to production.

    Option 3: Oracle GoldenGate.*

    This option requires little or no application

    outage. GoldenGate is sold separately

    from Oracle Enterprise Edition database,

    and there may be limits and restrictions.

    It is important to consult with Oracle

    to understand migration steps, limits,

    and restrictions.

    cs

    Intel Xeon processor-based servers

    running Linux have proven their ability

    to handle the mission-critical workloads

    that used to be the purview of UNIX/

    RISC and mainframe architectures.

    Migration can help IT organizations

    reduce costs, improve service levels,

    and provide a better foundation for

    growth and innovation. It can also help

    them establish an open, standards-based

    foundation for moving progressively

    toward 100 percent virtualization and,

    ultimately, cloud computing.

    A successful migration requires a careful,

    methodical approach based on best

    practices, as described in this paper. Many

    additional resources are available from

    Intel, from leading server, OS, and applica-

    tion vendors, from the open source Linux

    community, and from service providers

    around the world. Successful migrations

    have been performed for several decades

    now, and vendors with extensive migration

    experience are widely available.

    15

    Mgratg from Unix/RiSC to Lu* o itel Archtecture

  • 7/27/2019 RISC_vs_CISC_Migration_from_UNIX_RISC_to_Intel_based_Solutions.pdf

    16/16

    For more information and resources, visithttp://www.intel.com/content/www/us/en/mission-critical/mission-critical-meeting-todays-it-challenges.html

    For more resources and tools visit our web site devoted to this topic atwwweaaeemgam

    Mgratg from Unix/RiSC to Lu* o itel Archtecture

    1 For detailed descriptions of the RAS features provided in the Intel Xeon processor 7500 ser ies, see the Ideas International white paper, Red Hat Enterprise Linux Progresses to Next Level of RAS, December 2010.The more recent Intel Xeon processor E7 family includes additional RAS features, such as Double Device Data C orrection and Partial Memor y Mirroring.

    2Source:UniversitySeesMajorSavingswithDataCenterConsolidation,aCiscocustomersuccessstory.http://www.cisco.com/en/US/solutions/collateral/ns340/ns517/ns224/U_of_Colorado_casestudy_nal.pdf.

    3 The enterprise capacity planning team should have this historical data available already; its always a good idea to involve them early in the process.

    4 For more information about the Sysstat package of tools, visit: http://w ww.go2linux.org/sysstat-linux-performance-monitor-toolkit.

    5ThisportingmethodologyisbasedontheSolaristoLinuxPortingGuide,publishedbyHPinSeptember,2009.http://h21007.www2.hp.com/portal/download/les/unprot/ linux/sol_to_linux_port ing_guide.pdf.

    INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRA NTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTELS TERMS AND CONDITIONS OF SALE FOR SUC HPRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTELPRODUCTS INCLUDING LIABILITY O R WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT,

    COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NO RINTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR D EATH MAY OCCUR.

    Intelmaymakechangestospecicationsandproductdescriptionsatanytime,withoutnotice.Designersmustnotrelyontheabsenceorcharacteristicsofanyfeaturesorinstructionsmarkedreservedorundened.Intelreservestheseforfuturedenitionandshallhavenoresponsibilitywhatsoeverforconictsorincompatibilitiesarisingfromfuturechangestothem.Theinformationhereissubjecttochangewithoutnotice.Donotnalizeadesignwiththisinformation.

    Theproductsdescribedinthisdocumentmaycontaindesigndefectsorerrorsknownaserratawhichmaycausetheproducttodeviatefrompublishedspecications.Currentcharacterizederrataareavailableonrequest.ContactyourlocalIntelsalesofceoryourdistributortoobtainthelatestspecicationsandbeforeplacingyourproductorder.Copiesof documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling 1-800 -548- 4725, or by visiting Intels Web siteat www.intel.com.

    Copyright 2012 Intel Corporation. All rights reserved. Intel, the I ntel logo, and Xeon are trademarks of Intel Corporation in the U.S. and other c ountries.

    *Other names and brands may be claimed as the property of others. Printed in USA 0112/JRR/HBD/PDF Please Recycle 326480-001US