SlideShare ist ein Scribd-Unternehmen logo
1 von 30
E-Com merce
1
 A computer cluster is group of loosely coupled
computers that work together closely so that in many res
pects it can be viewed as through it as a single computer.
 Clusters are commonly connected through fast
local area networks.
 Clusters have evolved to improve speed and also to
support applications ranging from ecommerce, to high p
erformance database applications.
2
 The first commodity clustering product was ARCnet,
developed by Datapoint in 1977.
 The next product was VAXcluster, released by DEC in
1980’s.
 Microsoft, Sun Microsystems, and other leading hardware
and software companies offer clustering packages.
3
 Price/Performance :-
The reason for the growth in use of clusters is that
they have significantly reduced the cost of processing
power.
 Availability:-
Single points of failure can be eliminated, if any one
system component goes down, the system as a whole
stay highly available.
4
 scalability :-
HPC clusters can grow in overall
capacity because processors and nodes
can be added as demand increases.
5
 In cluster computing , each node within the cluster
is an independent system.
 With its own operating system , private memory
and in some cases own file system.
 Because the processors on one node can not
Directly access the memory on the other nodes
programs or software run on clusters usually employ
A procedure called “message passing” to get data and
execution code from one node to another.
6
7
 High Availability or Failover Clusters
 Load Balancing Clusters
Parallel / Distributed Processing Clusters
8
 These clusters are designed to provide
uninterrupted availability of data or services
(typically web services) to the end-users
community.
If node fails, the service can be restored wit
hout affecting the availability of the services
provided by the clusters.
9
 While the application will still be
available ,there will be a performance
drop due to the missing node.
 The purpose of these clusters is to ensure that a
single instance of an application is only ever running
on one cluster member at a time but if and when
that cluster member is no longer available , the
application will failover to another cluster member.
10
11
High-availability clusters implementations are best
for mission-critical applications or databases, mail,
file and print, web, or application servers.
12
This type of cluster distributes incoming request
s for resources or content among multiple nodes
running the same programs or having the same
content.
Both the high availability and load-balancing
cluster technologies can be combined to
increase the reliability, availability, and scalabilit
y of application and data resources that are widely
deployed for web, mail, news, or FTP services.
13
 Every node in the cluster is able to h
andle requests for the same content or
application.
 This type of distribution is typically
seen in a web-hosting environment.
14
15
16
 parallel processing was performed by multiple
processors in a specially designed parallel compu
ter. These are systems in which multiple process
ors
share a single memory and bus interface within a
single computer.
These types of cluster increase availability, perf
ormance, and scalability for applications, particu
larly computationally or data intensive tasks.
17
The basic building blocks of clusters are
broken down into multiple categories:
1. Cluster Nodes
2. Cluster Network
3. Network Characterization
18
There are three primary categories of
applications that use parallel clusters:
 Compute Intensive Application.
 Data or I/O Intensive Applications.
 Transaction Intensive Applications.
19
 A user submits a job to the head node.
 The job identifies the application to run on the
cluster.
 The job scheduler on the head node assigns each
task defined by the job to a node and then starts e
ach application instance on the assigned node.
 Results from each of the application instances are
returned to the client via files or databases.
20
21
 The main benefits of clusters are:
1. Availability
2. Performance
3. Scalability
 These benefits map to needs of today's enterprise
business, education, military and scientific commun
ity infrastructures.
22
 Cluster Networking
 Cluster Software
 Programming
 Timing
 Network Selection
 Speed Selection
23
Cluster networking
If you are mixing hardware that has
different networking technologies, there will
be large differences in the speed with which
data will be accessed and how individual
nodes can communicate. If it is in your budge
t make sure that all of the machines you want
to include in your cluster have similar ne
tworking capabilities, and if at all possible, ha
ve network adapters from the same man
ufacturer.
24
Cluster Software
You will have to build versions of
clustering software for each kind of system
you include in your cluster.
25
Programming
Our code will have to be written t
o support the lowest common denominator
for data types supported by the least powe
rful node in our cluster. With mixed machi
nes, the more powerful machines will have
attributes that cannot be attained in the
powerful machine.
26
Timing
This is the most problematic aspec
t of cluster. Since these machines have diffe
rent performance profile our code will exe
cute at different rates on the different kinds
of nodes. This can cause serious bottlen
ecks if a process on one node is waiting for
results of a calculation on a slower node..
27
Network Selection
There are a number of different ki
nds of network topologies, including buses,
cubes of various degrees, and grids/meshes.
These network topologies will be
implemented by use of one or more network
interface cards, or NICs, installed into the
head-node and compute nodes of our cluster.
28
Speed Selection
No matter what topology you choose f
or your cluster, you will want to get fastest net
work that your budget allows. Fortunately,
the availability of high speed computers has al
so forced the development of high speed
networking systems.
Examples are :
10Mbit Ethernet, 100Mbit Ethernet, gigabit
networking, channel bonding etc.
29
30

Weitere ähnliche Inhalte

Was ist angesagt? (18)

Cluster computing
Cluster computingCluster computing
Cluster computing
 
Cluster computing report
Cluster computing reportCluster computing report
Cluster computing report
 
Cluster Tutorial
Cluster TutorialCluster Tutorial
Cluster Tutorial
 
Beowulf cluster
Beowulf clusterBeowulf cluster
Beowulf cluster
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
CLUSTER COMPUTING
CLUSTER COMPUTINGCLUSTER COMPUTING
CLUSTER COMPUTING
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
cluster computing
cluster computingcluster computing
cluster computing
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
Cluster Computers
Cluster ComputersCluster Computers
Cluster Computers
 
Cluster Computing Seminar.
Cluster Computing Seminar.Cluster Computing Seminar.
Cluster Computing Seminar.
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
WAN & LAN Cluster with Diagrams and OSI explanation
WAN & LAN Cluster with Diagrams and OSI explanationWAN & LAN Cluster with Diagrams and OSI explanation
WAN & LAN Cluster with Diagrams and OSI explanation
 
Clusetrreport
ClusetrreportClusetrreport
Clusetrreport
 
cluster computing
cluster computingcluster computing
cluster computing
 
Cluster computing2
Cluster computing2Cluster computing2
Cluster computing2
 
Cluster computing pptl (2)
Cluster computing pptl (2)Cluster computing pptl (2)
Cluster computing pptl (2)
 

Andere mochten auch

VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentationwayn
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentationguest664c3f
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth TechnologyManish Sharma
 
Forest fire management using gis
Forest fire management using gisForest fire management using gis
Forest fire management using gisKajal Thakkar
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentationKrishna Kumari
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkPeter R. Egli
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksSiya Agarwal
 

Andere mochten auch (15)

Soft computing
Soft computingSoft computing
Soft computing
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Vpn
VpnVpn
Vpn
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Forest fire management using gis
Forest fire management using gisForest fire management using gis
Forest fire management using gis
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
 

Ähnlich wie Cluster cmputing

Clustercomputingpptl2 120204125126-phpapp01
Clustercomputingpptl2 120204125126-phpapp01Clustercomputingpptl2 120204125126-phpapp01
Clustercomputingpptl2 120204125126-phpapp01Ankit Soni
 
Clustering by AKASHMSHAH
Clustering by AKASHMSHAHClustering by AKASHMSHAH
Clustering by AKASHMSHAHAkash M Shah
 
Computer_Clustering_Technologies
Computer_Clustering_TechnologiesComputer_Clustering_Technologies
Computer_Clustering_TechnologiesManish Chopra
 
Rha cluster suite wppdf
Rha cluster suite wppdfRha cluster suite wppdf
Rha cluster suite wppdfprojectmgmt456
 
Cluster Computing
Cluster Computing Cluster Computing
Cluster Computing Shobha Rani
 
Inroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar vermaInroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar vermagargishankar1981
 
Cluster computings
Cluster computingsCluster computings
Cluster computingsRagu1033
 
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridadMarketing Donalba
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
ITC4344_3_Cloud Computing Technologies.pptx
ITC4344_3_Cloud Computing Technologies.pptxITC4344_3_Cloud Computing Technologies.pptx
ITC4344_3_Cloud Computing Technologies.pptxZaharaddeenAbubuakar
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computingijccsa
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computingneirew J
 
introduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfintroduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfsnehan789
 
paradigms cloud.pptx
paradigms cloud.pptxparadigms cloud.pptx
paradigms cloud.pptxgunvinit931
 

Ähnlich wie Cluster cmputing (20)

Clustercomputingpptl2 120204125126-phpapp01
Clustercomputingpptl2 120204125126-phpapp01Clustercomputingpptl2 120204125126-phpapp01
Clustercomputingpptl2 120204125126-phpapp01
 
Clustering by AKASHMSHAH
Clustering by AKASHMSHAHClustering by AKASHMSHAH
Clustering by AKASHMSHAH
 
Computer_Clustering_Technologies
Computer_Clustering_TechnologiesComputer_Clustering_Technologies
Computer_Clustering_Technologies
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
Rha cluster suite wppdf
Rha cluster suite wppdfRha cluster suite wppdf
Rha cluster suite wppdf
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
Cluster Computing
Cluster Computing Cluster Computing
Cluster Computing
 
Inroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar vermaInroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar verma
 
Cluster computings
Cluster computingsCluster computings
Cluster computings
 
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
CCUnit1.pdf
CCUnit1.pdfCCUnit1.pdf
CCUnit1.pdf
 
Distributed system.pptx
Distributed system.pptxDistributed system.pptx
Distributed system.pptx
 
Grid Presentation
Grid PresentationGrid Presentation
Grid Presentation
 
ITC4344_3_Cloud Computing Technologies.pptx
ITC4344_3_Cloud Computing Technologies.pptxITC4344_3_Cloud Computing Technologies.pptx
ITC4344_3_Cloud Computing Technologies.pptx
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
introduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfintroduction to cloud computing for college.pdf
introduction to cloud computing for college.pdf
 
paradigms cloud.pptx
paradigms cloud.pptxparadigms cloud.pptx
paradigms cloud.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Kürzlich hochgeladen

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Cluster cmputing

  • 2.  A computer cluster is group of loosely coupled computers that work together closely so that in many res pects it can be viewed as through it as a single computer.  Clusters are commonly connected through fast local area networks.  Clusters have evolved to improve speed and also to support applications ranging from ecommerce, to high p erformance database applications. 2
  • 3.  The first commodity clustering product was ARCnet, developed by Datapoint in 1977.  The next product was VAXcluster, released by DEC in 1980’s.  Microsoft, Sun Microsystems, and other leading hardware and software companies offer clustering packages. 3
  • 4.  Price/Performance :- The reason for the growth in use of clusters is that they have significantly reduced the cost of processing power.  Availability:- Single points of failure can be eliminated, if any one system component goes down, the system as a whole stay highly available. 4
  • 5.  scalability :- HPC clusters can grow in overall capacity because processors and nodes can be added as demand increases. 5
  • 6.  In cluster computing , each node within the cluster is an independent system.  With its own operating system , private memory and in some cases own file system.  Because the processors on one node can not Directly access the memory on the other nodes programs or software run on clusters usually employ A procedure called “message passing” to get data and execution code from one node to another. 6
  • 7. 7
  • 8.  High Availability or Failover Clusters  Load Balancing Clusters Parallel / Distributed Processing Clusters 8
  • 9.  These clusters are designed to provide uninterrupted availability of data or services (typically web services) to the end-users community. If node fails, the service can be restored wit hout affecting the availability of the services provided by the clusters. 9
  • 10.  While the application will still be available ,there will be a performance drop due to the missing node.  The purpose of these clusters is to ensure that a single instance of an application is only ever running on one cluster member at a time but if and when that cluster member is no longer available , the application will failover to another cluster member. 10
  • 11. 11
  • 12. High-availability clusters implementations are best for mission-critical applications or databases, mail, file and print, web, or application servers. 12
  • 13. This type of cluster distributes incoming request s for resources or content among multiple nodes running the same programs or having the same content. Both the high availability and load-balancing cluster technologies can be combined to increase the reliability, availability, and scalabilit y of application and data resources that are widely deployed for web, mail, news, or FTP services. 13
  • 14.  Every node in the cluster is able to h andle requests for the same content or application.  This type of distribution is typically seen in a web-hosting environment. 14
  • 15. 15
  • 16. 16
  • 17.  parallel processing was performed by multiple processors in a specially designed parallel compu ter. These are systems in which multiple process ors share a single memory and bus interface within a single computer. These types of cluster increase availability, perf ormance, and scalability for applications, particu larly computationally or data intensive tasks. 17
  • 18. The basic building blocks of clusters are broken down into multiple categories: 1. Cluster Nodes 2. Cluster Network 3. Network Characterization 18
  • 19. There are three primary categories of applications that use parallel clusters:  Compute Intensive Application.  Data or I/O Intensive Applications.  Transaction Intensive Applications. 19
  • 20.  A user submits a job to the head node.  The job identifies the application to run on the cluster.  The job scheduler on the head node assigns each task defined by the job to a node and then starts e ach application instance on the assigned node.  Results from each of the application instances are returned to the client via files or databases. 20
  • 21. 21
  • 22.  The main benefits of clusters are: 1. Availability 2. Performance 3. Scalability  These benefits map to needs of today's enterprise business, education, military and scientific commun ity infrastructures. 22
  • 23.  Cluster Networking  Cluster Software  Programming  Timing  Network Selection  Speed Selection 23
  • 24. Cluster networking If you are mixing hardware that has different networking technologies, there will be large differences in the speed with which data will be accessed and how individual nodes can communicate. If it is in your budge t make sure that all of the machines you want to include in your cluster have similar ne tworking capabilities, and if at all possible, ha ve network adapters from the same man ufacturer. 24
  • 25. Cluster Software You will have to build versions of clustering software for each kind of system you include in your cluster. 25
  • 26. Programming Our code will have to be written t o support the lowest common denominator for data types supported by the least powe rful node in our cluster. With mixed machi nes, the more powerful machines will have attributes that cannot be attained in the powerful machine. 26
  • 27. Timing This is the most problematic aspec t of cluster. Since these machines have diffe rent performance profile our code will exe cute at different rates on the different kinds of nodes. This can cause serious bottlen ecks if a process on one node is waiting for results of a calculation on a slower node.. 27
  • 28. Network Selection There are a number of different ki nds of network topologies, including buses, cubes of various degrees, and grids/meshes. These network topologies will be implemented by use of one or more network interface cards, or NICs, installed into the head-node and compute nodes of our cluster. 28
  • 29. Speed Selection No matter what topology you choose f or your cluster, you will want to get fastest net work that your budget allows. Fortunately, the availability of high speed computers has al so forced the development of high speed networking systems. Examples are : 10Mbit Ethernet, 100Mbit Ethernet, gigabit networking, channel bonding etc. 29
  • 30. 30

Hinweis der Redaktion

  1. Clusters are usually deployed to improve speed and/or reliability over that provided by a single computer, while typically being much more cost effective than single computer the of comparable speed or reliability .
  2. In cluster computing each node within a cluster is an independent system, with its own operating system, private memory, and, in some cases, its own file system. Because the processors on one node cannot directly access the memory on the other nodes, programs or software run on clusters usually employ a procedure called "message passing" to get data and execution code from one node to another.
  3. High Availability or Failover Clusters Load Balancing Cluster Parallel/Distributed Processing Clusters
  4. These clusters are designed to provide uninterrupted availability of data or services (typically web services) to the end-user community. if a node fails, the service can be restored without affecting the availability of the services provided by the cluster.
  5. While the application will still be available, there will be a performance drop due to the missing node. The purpose of these clusters is to ensure that a single instance of an application is only ever running on one cluster member at a time but if and when that cluster member is no longer available, the application will failover to another cluster member.