PowerPoint 프레젠테이션
Download
Report
Transcript PowerPoint 프레젠테이션
1.3 System Models for Distributed and Cloud Computing
Classification of Massive systems (Table 1.2)
1.3.1 Clusters of Cooperative Computers
Cluster Architecture
The architecture of a typical server cluster built around a low-latency, highbandwidth interconnection network. (Fig. 1.15)
Single-System Image
An ideal cluster should merge multiple system images into a single-system
image (SSI).
cluster operating system
some middleware to support SSI at various levels.
An SSI is an illusion created by software or hardware that presents a collection of
resources as one integrated, powerful resource.
Critical Cluster Design Issues and Feasible Implementations (Table 1.3)
1.3.2 Grid Computing Infrastructure
Computational Grids
Computational grid and data grid providing computing utility, data, and
information services through resource sharing and cooperation among
participating organizations. (Fig. 1.16)
Ch. 1-2
1
Grid Families
Grid systems are classified in essentially two categories: computational or data
grids and P2P grids. (Table 1.4)
1.3.3 Peer-to-Peer Network Families
P2P Systems
In a P2P system, every node acts as both a client and a server, providing part
of the system resources.
The physical network is simply an ad hoc network formed at various Internet
domains randomly using the TCP/IP and NAI (Network Access Identifier)
protocols.
Ch. 1-2
2
Overlay Networks
The overlay is a virtual network formed by mapping each physical
machine with its ID, logically, through a virtual mapping as shown in Fig.
1.17.
There are two types of overlay networks: unstructured and structured.
P2P Application Families
Major Categories of P2P Network Families. (Table 1.5)
P2P Computing Challenges
P2P computing faces three types of heterogeneity problem in hardware,
software, and network requirements.
P2P performance is affected by routing efficiency and self-organization
by participating peers.
Fault tolerance, failure management, and load balancing are other
important issues in using overlay networks.
Security, privacy, and copyright violations are major worries by those in
the industry in terms of applying P2P technology in business application.
Ch. 1-2
3
1.3.4 Cloud Computing Over the Internet
Internet Clouds
Cloud computing applies a virtualized platform with elastic resources on
demand by provisioning hardware, software, and data set dynamically. (Fig.
1. 18)
The Cloud Landscape
Three cloud service models in a cloud landscape of major providers. (Fig.
1.19)
Ch. 1-2
4
1.4 Software Environments for Distributed Systems and Clouds
1.4.1 Service-Oriented Architecture (SOA)
대규모 컴퓨터 시스템을 구축할 때의 개념으로 업무상에 일 처리에 해당하는
소프트웨어 기능을 서비스로 판단하여 그 서비스를 네트워크상에 연동하여
시스템 전체를 구축해 나가는 방법론.
Ch. 1-2
5
The Evolution of SOA
SOA applies to building grids, clouds, grid of clouds, clouds of grids, clouds
of clouds, and systems of system in general.
The evolution of SOA: grids of clouds and grids. (Fig. 1.21)
SOA aims to search for, or sort out, the useful data from the massive amount
of raw data items.
Grids versus Clouds
In general, a grid system applies static resources, while a cloud emphasizes
elastic resources.
The difference between grids and clouds are limited only in dynamic resource
allocation based on virtualization and autonomic computing.
Trends toward Distributed Operating Systems
DOS achieves higher use or system transparency.
A transparent computing environment that separates the user data, OS, and
hardware in time and space – an ideal model for cloud computing. (Fig. 1.22)
Ch. 1-2
6
1.5 Performance, Security and Energy Efficient
Performance Metrics and Scalability Analysis
Performance Metrics
MIPS
Mbps
Tflops (tera floating-point operations per second)
TPS (transactions per second)
job response time
network latency
Dimensions of Scalability
Size scalability
Software scalability
Application scalability
Technology scalability
Ch. 1-2
7
Fault Tolerance and System Availability
System Availability
A system is highly available if it has long mean time to failure (MTTF) and a short
mean time to repair (MTTR).
System Availability=MTTF/(MTTF+MTTR)
MTTF는 주어진 시간에서 고장 발생시 까지 시간으로 고장 수리 후 다음 고장까지의
시간을 의미함
Any failure that will be pull down the operation of the entire system is called a
single of failure. The rule of thumb is to design a dependable computting system
with no single point of failure.
Network Threats and Data Integrity
Threats to Systems and Networks
Fig. 1.25 summaries various attack types and their potential damages
to users.
Security Responsibilities
Three security requirements are often considered: confidentiality,
integrity, and availability for most Internet service providers and cloud
users.
Ch. 1-2
8
Energy Efficiency in Distributed Computing
Parallel and distributed computing systems recently encountered
new challenging issues including energy efficiency, and workload
and resource outsourcing.
클라우드 컴퓨팅은 IT자원을 외부에 아웃소싱을 함으로 인하여 가장 먼저 대두 되
는 것이 ‘보안’에 관련된 문제이다.
Ch. 1-2
9