beyond desktop computing

Post on 08-Feb-2016

54 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Beyond Desktop Computing. Chapter Contents. Section A: Large-Scale Computing Section B: Components of Large-Scale Computing Systems Section C: Enterprise and High-Performance Architecture Section D: Quality of Service. Section A: Large-Scale Computing. Enterprise Computing - PowerPoint PPT Presentation

TRANSCRIPT

Beyond Desktop Computing

04/22/23 2

Chapter Contents

• Section A: Large-Scale Computing• Section B:

Components of Large-Scale Computing Systems

• Section C: Enterprise and High-Performance Architecture

• Section D: Quality of Service

04/22/23 3

Section A: Large-Scale Computing

• Enterprise Computing• High-performance Computing

04/22/23 4

Enterprise Computing

• One or more information systems that share data and supply many users in different locations

Information from a waybill can be accessed by customers and employees in many departments,making an enterprisesystem an important tool forUPS operations.

CLICK TO START

04/22/23 5

Enterprise Computing

• Enterprise computing systems can contain thousands of users

• Scalability refers to the ability of a computer system to shrink or grow– Scaling up– Scaling out

04/22/23 6

Enterprise Computing

• Enterprise system integration is the process of connecting two or more information systems in a way that allows scalability and data sharing

• Enterprise hardware integration refers to the process of connecting different types of hardware

• Enterprise application integration is the process of configuring software applications to exchange data

04/22/23 7

High-Performance Computing

• A branch of computer science that focuses on ways to optimize computer processing capabilities– Suited for cutting-edge research

• Performance is measured in FLOPS or MIPS• A compute-intensive problem is one that

requires massive amounts of data to be processed using complex mathematical calculations

04/22/23 8

High-Performance Computing

04/22/23 9

Section B: Components of Large-Scale Computing Systems

• Enterprise Hardware• HPC Hardware• Enterprise Software• HPC Software

04/22/23 10

Enterprise Hardware

04/22/23 11

Enterprise Hardware

• A legacy system is a computer system that has become outdated– Some remain in

operation

04/22/23 12

Enterprise Hardware

• A Blade server is a modular electronic circuit board containing one or more processors, and possibly some storage

• Performs a single dedicated task

04/22/23 13

Enterprise Hardware

• The larger a computer system becomes, the more data it must store– RAID– Storage area network (SAN)– Mirroring– Network attached storage

04/22/23 14

Enterprise Hardware

04/22/23 15

Enterprise Hardware

04/22/23 16

Enterprise Hardware

• Input devices– MICR– OCR

• Output devices– Line printer– Printer server

04/22/23 17

HPC Hardware

• Some HPC applications require a supercomputer

• Alternatives to supercomputers include computers that utilize multiprocessor architecture– Parallel processing– Symmetric multiprocessing– Massively parallel processing

04/22/23 18

HPC Hardware

For symmetric multiprocessing,a computer’s operating system controls multiple processors that share a common bus andmemory.

CLICK TO START

04/22/23 19

HPC Hardware

CLICK TO START

04/22/23 20

Enterprise Software

04/22/23 21

Enterprise Software

• Enterprise software applications include at least some of these features:– Multiplatform availability– Scalability– Redundancy

• Middleware acts as an intermediary between two other software packages– TimeLife photos

04/22/23 22

Enterprise Software

• SOAP allows programs running on different operating systems to communicate with each other

04/22/23 23

HPC Software

• HPC systems mostly run custom software– Speed– Specialized

applications

04/22/23 24

Section C: Enterprise and High-Performance Architecture

• Centralized Architecture• Distributed Architecture• Tiered Architecture• Grid Architecture• Clustering

04/22/23 25

Centralized Architecture

• One central computer surrounded by terminals– Easy administration– All processing takes place on the host

computer– Terminal emulation software

04/22/23 26

Centralized Architecture

04/22/23 27

Distributed Architecture

• Collection of connected computers in which processing, data, and application software are dispersed

04/22/23 28

Distributed Architecture

04/22/23 29

Tiered Architecture

04/22/23 30

Grid Architecture

• Network of diverse computers– Grid management software– Grid client

software

04/22/23 31

Grid Architecture

• Best for solving problems that can be divided into smaller problems

04/22/23 32

Clustering

• Group of two or more devices connected together to distribute tasks

A cluster is a group of computersthat performs the functions of a single server on a network.

CLICK TO START

04/22/23 33

Clustering

• Fault tolerance refers to a computer system’s ability to react gracefully to failures– Cluster failover

04/22/23 34

Clustering

• Load balancing refers to the practice of distributing processing and storage tasks

• Active-active cluster vs. active-passive cluster

• A Beowulf cluster is a collection of off-the-shelf computers interconnected and configured as a cluster

04/22/23 35

Section D: Quality of Service

• Reliability, Availability, and Serviceability• Risk Management• Data Centers• Disaster Recovery Plans

04/22/23 36

Reliability, Availability, and Serviceability

• Quality of service (QoS) refers to the level of performance a computer system provides– Usually monitored by the IS department– Quality-of-service metrics

04/22/23 37

Reliability, Availability, and Serviceability

04/22/23 38

Risk Management

• The process of:– Identifying potential threats to computer

equipment and data– Implementing plans to avoid as many threats

as possible– Developing steps to recover from unavoidable

disasters

04/22/23 39

Risk Management

• Common threats include:– Natural disasters– Power outages– Hardware breakdowns

• MTBF

– Human errors– System failures– Security breaches– Acts of war– Viruses

04/22/23 40

Risk Management

• Common protection from threats:– Deterrents– Preventative

countermeasures– Corrective procedures– Detection activities

04/22/23 41

Data Centers• Specialized facilities

designed to house and protect computer systems and data– Special security

features– Work proactively to

reduce the risk of data loss

– Equipment to keep computers functioning

– Closely monitored

04/22/23 42

Data Centers

04/22/23 43

Disaster Recovery Plans

• Step-by-step plan that:– Describes the methods used to secure data

against disaster– Explains how an organization

will recover lost data if and when a disaster occurs

04/22/23 44

Disaster Recovery Plans

• Disaster recovery plans should:– Ensure the safety of people on the premises at the time

of a disaster– Continue critical business operations– Minimize the duration of a serious disruption to

operations– Minimize immediate damage and prevent additional

losses– Establish management succession and emergency

powers– Facilitate effective coordination of recovery tasks

top related