beyond desktop computing

44
Beyond Desktop Computing

Upload: marnie

Post on 08-Feb-2016

56 views

Category:

Documents


0 download

DESCRIPTION

Beyond Desktop Computing. Chapter Contents. Section A: Large-Scale Computing Section B: Components of Large-Scale Computing Systems Section C: Enterprise and High-Performance Architecture Section D: Quality of Service. Section A: Large-Scale Computing. Enterprise Computing - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Beyond Desktop Computing

Beyond Desktop Computing

Page 2: Beyond Desktop Computing

04/22/23 2

Chapter Contents

• Section A: Large-Scale Computing• Section B:

Components of Large-Scale Computing Systems

• Section C: Enterprise and High-Performance Architecture

• Section D: Quality of Service

Page 3: Beyond Desktop Computing

04/22/23 3

Section A: Large-Scale Computing

• Enterprise Computing• High-performance Computing

Page 4: Beyond Desktop Computing

04/22/23 4

Enterprise Computing

• One or more information systems that share data and supply many users in different locations

Information from a waybill can be accessed by customers and employees in many departments,making an enterprisesystem an important tool forUPS operations.

CLICK TO START

Page 5: Beyond Desktop Computing

04/22/23 5

Enterprise Computing

• Enterprise computing systems can contain thousands of users

• Scalability refers to the ability of a computer system to shrink or grow– Scaling up– Scaling out

Page 6: Beyond Desktop Computing

04/22/23 6

Enterprise Computing

• Enterprise system integration is the process of connecting two or more information systems in a way that allows scalability and data sharing

• Enterprise hardware integration refers to the process of connecting different types of hardware

• Enterprise application integration is the process of configuring software applications to exchange data

Page 7: Beyond Desktop Computing

04/22/23 7

High-Performance Computing

• A branch of computer science that focuses on ways to optimize computer processing capabilities– Suited for cutting-edge research

• Performance is measured in FLOPS or MIPS• A compute-intensive problem is one that

requires massive amounts of data to be processed using complex mathematical calculations

Page 8: Beyond Desktop Computing

04/22/23 8

High-Performance Computing

Page 9: Beyond Desktop Computing

04/22/23 9

Section B: Components of Large-Scale Computing Systems

• Enterprise Hardware• HPC Hardware• Enterprise Software• HPC Software

Page 10: Beyond Desktop Computing

04/22/23 10

Enterprise Hardware

Page 11: Beyond Desktop Computing

04/22/23 11

Enterprise Hardware

• A legacy system is a computer system that has become outdated– Some remain in

operation

Page 12: Beyond Desktop Computing

04/22/23 12

Enterprise Hardware

• A Blade server is a modular electronic circuit board containing one or more processors, and possibly some storage

• Performs a single dedicated task

Page 13: Beyond Desktop Computing

04/22/23 13

Enterprise Hardware

• The larger a computer system becomes, the more data it must store– RAID– Storage area network (SAN)– Mirroring– Network attached storage

Page 14: Beyond Desktop Computing

04/22/23 14

Enterprise Hardware

Page 15: Beyond Desktop Computing

04/22/23 15

Enterprise Hardware

Page 16: Beyond Desktop Computing

04/22/23 16

Enterprise Hardware

• Input devices– MICR– OCR

• Output devices– Line printer– Printer server

Page 17: Beyond Desktop Computing

04/22/23 17

HPC Hardware

• Some HPC applications require a supercomputer

• Alternatives to supercomputers include computers that utilize multiprocessor architecture– Parallel processing– Symmetric multiprocessing– Massively parallel processing

Page 18: Beyond Desktop Computing

04/22/23 18

HPC Hardware

For symmetric multiprocessing,a computer’s operating system controls multiple processors that share a common bus andmemory.

CLICK TO START

Page 19: Beyond Desktop Computing

04/22/23 19

HPC Hardware

CLICK TO START

Page 20: Beyond Desktop Computing

04/22/23 20

Enterprise Software

Page 21: Beyond Desktop Computing

04/22/23 21

Enterprise Software

• Enterprise software applications include at least some of these features:– Multiplatform availability– Scalability– Redundancy

• Middleware acts as an intermediary between two other software packages– TimeLife photos

Page 22: Beyond Desktop Computing

04/22/23 22

Enterprise Software

• SOAP allows programs running on different operating systems to communicate with each other

Page 23: Beyond Desktop Computing

04/22/23 23

HPC Software

• HPC systems mostly run custom software– Speed– Specialized

applications

Page 24: Beyond Desktop Computing

04/22/23 24

Section C: Enterprise and High-Performance Architecture

• Centralized Architecture• Distributed Architecture• Tiered Architecture• Grid Architecture• Clustering

Page 25: Beyond Desktop Computing

04/22/23 25

Centralized Architecture

• One central computer surrounded by terminals– Easy administration– All processing takes place on the host

computer– Terminal emulation software

Page 26: Beyond Desktop Computing

04/22/23 26

Centralized Architecture

Page 27: Beyond Desktop Computing

04/22/23 27

Distributed Architecture

• Collection of connected computers in which processing, data, and application software are dispersed

Page 28: Beyond Desktop Computing

04/22/23 28

Distributed Architecture

Page 29: Beyond Desktop Computing

04/22/23 29

Tiered Architecture

Page 30: Beyond Desktop Computing

04/22/23 30

Grid Architecture

• Network of diverse computers– Grid management software– Grid client

software

Page 31: Beyond Desktop Computing

04/22/23 31

Grid Architecture

• Best for solving problems that can be divided into smaller problems

Page 32: Beyond Desktop Computing

04/22/23 32

Clustering

• Group of two or more devices connected together to distribute tasks

A cluster is a group of computersthat performs the functions of a single server on a network.

CLICK TO START

Page 33: Beyond Desktop Computing

04/22/23 33

Clustering

• Fault tolerance refers to a computer system’s ability to react gracefully to failures– Cluster failover

Page 34: Beyond Desktop Computing

04/22/23 34

Clustering

• Load balancing refers to the practice of distributing processing and storage tasks

• Active-active cluster vs. active-passive cluster

• A Beowulf cluster is a collection of off-the-shelf computers interconnected and configured as a cluster

Page 35: Beyond Desktop Computing

04/22/23 35

Section D: Quality of Service

• Reliability, Availability, and Serviceability• Risk Management• Data Centers• Disaster Recovery Plans

Page 36: Beyond Desktop Computing

04/22/23 36

Reliability, Availability, and Serviceability

• Quality of service (QoS) refers to the level of performance a computer system provides– Usually monitored by the IS department– Quality-of-service metrics

Page 37: Beyond Desktop Computing

04/22/23 37

Reliability, Availability, and Serviceability

Page 38: Beyond Desktop Computing

04/22/23 38

Risk Management

• The process of:– Identifying potential threats to computer

equipment and data– Implementing plans to avoid as many threats

as possible– Developing steps to recover from unavoidable

disasters

Page 39: Beyond Desktop Computing

04/22/23 39

Risk Management

• Common threats include:– Natural disasters– Power outages– Hardware breakdowns

• MTBF

– Human errors– System failures– Security breaches– Acts of war– Viruses

Page 40: Beyond Desktop Computing

04/22/23 40

Risk Management

• Common protection from threats:– Deterrents– Preventative

countermeasures– Corrective procedures– Detection activities

Page 41: Beyond Desktop Computing

04/22/23 41

Data Centers• Specialized facilities

designed to house and protect computer systems and data– Special security

features– Work proactively to

reduce the risk of data loss

– Equipment to keep computers functioning

– Closely monitored

Page 42: Beyond Desktop Computing

04/22/23 42

Data Centers

Page 43: Beyond Desktop Computing

04/22/23 43

Disaster Recovery Plans

• Step-by-step plan that:– Describes the methods used to secure data

against disaster– Explains how an organization

will recover lost data if and when a disaster occurs

Page 44: Beyond Desktop Computing

04/22/23 44

Disaster Recovery Plans

• Disaster recovery plans should:– Ensure the safety of people on the premises at the time

of a disaster– Continue critical business operations– Minimize the duration of a serious disruption to

operations– Minimize immediate damage and prevent additional

losses– Establish management succession and emergency

powers– Facilitate effective coordination of recovery tasks