1 / 44

Beyond Desktop Computing

Beyond Desktop Computing. Chapter Contents. Section A: Large-Scale Computing Section B: Components of Large-Scale Computing Systems Section C: Enterprise and High-Performance Architecture Section D: Quality of Service. Section A: Large-Scale Computing. Enterprise Computing

marnie
Download Presentation

Beyond Desktop Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Beyond Desktop Computing

  2. Chapter Contents • Section A: Large-Scale Computing • Section B: Components of Large-Scale Computing Systems • Section C: Enterprise and High-Performance Architecture • Section D: Quality of Service

  3. Section A: Large-Scale Computing • Enterprise Computing • High-performance Computing

  4. Enterprise Computing • One or more information systems that share data and supply many users in different locations Information from a waybill can be accessed by customers and employees in many departments, making an enterprise system an important tool for UPS operations. CLICK TO START

  5. Enterprise Computing • Enterprise computing systems can contain thousands of users • Scalability refers to the ability of a computer system to shrink or grow • Scaling up • Scaling out

  6. Enterprise Computing • Enterprise system integration is the process of connecting two or more information systems in a way that allows scalability and data sharing • Enterprise hardware integration refers to the process of connecting different types of hardware • Enterprise application integration is the process of configuring software applications to exchange data

  7. High-Performance Computing • A branch of computer science that focuses on ways to optimize computer processing capabilities • Suited for cutting-edge research • Performance is measured in FLOPS or MIPS • A compute-intensive problem is one that requires massive amounts of data to be processed using complex mathematical calculations

  8. High-Performance Computing

  9. Section B: Components of Large-Scale Computing Systems • Enterprise Hardware • HPC Hardware • Enterprise Software • HPC Software

  10. Enterprise Hardware

  11. Enterprise Hardware • A legacy system is a computer system that has become outdated • Some remain in operation

  12. Enterprise Hardware • A Blade server is a modular electronic circuit board containing one or more processors, and possibly some storage • Performs a single dedicated task

  13. Enterprise Hardware • The larger a computer system becomes, the more data it must store • RAID • Storage area network (SAN) • Mirroring • Network attached storage

  14. Enterprise Hardware

  15. Enterprise Hardware

  16. Enterprise Hardware • Input devices • MICR • OCR • Output devices • Line printer • Printer server

  17. HPC Hardware • Some HPC applications require a supercomputer • Alternatives to supercomputers include computers that utilize multiprocessor architecture • Parallel processing • Symmetric multiprocessing • Massively parallel processing

  18. HPC Hardware For symmetric multiprocessing, a computer’s operating system controls multiple processors that share a common bus and memory. CLICK TO START

  19. HPC Hardware CLICK TO START

  20. Enterprise Software

  21. Enterprise Software • Enterprise software applications include at least some of these features: • Multiplatform availability • Scalability • Redundancy • Middleware acts as an intermediary between two other software packages • TimeLife photos

  22. Enterprise Software • SOAP allows programs running on different operating systems to communicate with each other

  23. HPC Software • HPC systems mostly run custom software • Speed • Specialized applications

  24. Section C: Enterprise and High-Performance Architecture • Centralized Architecture • Distributed Architecture • Tiered Architecture • Grid Architecture • Clustering

  25. Centralized Architecture • One central computer surrounded by terminals • Easy administration • All processing takes place on the host computer • Terminal emulation software

  26. Centralized Architecture

  27. Distributed Architecture • Collection of connected computers in which processing, data, and application software are dispersed

  28. Distributed Architecture

  29. Tiered Architecture

  30. Grid Architecture • Network of diverse computers • Grid management software • Grid client software

  31. Grid Architecture • Best for solving problems that can be divided into smaller problems

  32. Clustering • Group of two or more devices connected together to distribute tasks A cluster is a group of computers that performs the functions of a single server on a network. CLICK TO START

  33. Clustering • Fault tolerance refers to a computer system’s ability to react gracefully to failures • Cluster failover

  34. Clustering • Load balancing refers to the practice of distributing processing and storage tasks • Active-active cluster vs. active-passive cluster • A Beowulf cluster is a collection of off-the-shelf computers interconnected and configured as a cluster

  35. Section D: Quality of Service • Reliability, Availability, and Serviceability • Risk Management • Data Centers • Disaster Recovery Plans

  36. Reliability, Availability, and Serviceability • Quality of service (QoS) refers to the level of performance a computer system provides • Usually monitored by the IS department • Quality-of-service metrics

  37. Reliability, Availability, and Serviceability

  38. Risk Management • The process of: • Identifying potential threats to computer equipment and data • Implementing plans to avoid as many threats as possible • Developing steps to recover from unavoidable disasters

  39. Risk Management • Common threats include: • Natural disasters • Power outages • Hardware breakdowns • MTBF • Human errors • System failures • Security breaches • Acts of war • Viruses

  40. Risk Management • Common protection from threats: • Deterrents • Preventative countermeasures • Corrective procedures • Detection activities

  41. Data Centers • Specialized facilities designed to house and protect computer systems and data • Special security features • Work proactively to reduce the risk of data loss • Equipment to keep computers functioning • Closely monitored

  42. Data Centers

  43. Disaster Recovery Plans • Step-by-step plan that: • Describes the methods used to secure data against disaster • Explains how an organizationwill recover lost data if and when a disaster occurs

  44. Disaster Recovery Plans • Disaster recovery plans should: • Ensure the safety of people on the premises at the time of a disaster • Continue critical business operations • Minimize the duration of a serious disruption to operations • Minimize immediate damage and prevent additional losses • Establish management succession and emergency powers • Facilitate effective coordination of recovery tasks

More Related