Professional Documents
Culture Documents
The benefits of a Centralized model are lower capital and operational cost (minimal hardware at
each site), security (all data stored in a secured datacenter), less administrative overhead (fewer
resources needed since all equipment is in one location), less backup complexity, and greater
control over potential risk areas such as Internet access.
The disadvantage of this system is that this system of computing relies totally on
the central computer, should the central computer crash, the entire system will be
unavailable (go down). Accessing network may also be slow.
Distributed computing:
Distributed computing is a computing concept that, in its most general sense, refers to multiple
computer systems working on a single problem. In distributed computing, a single problem is
divided into many parts, and each part is solved by different computers. As long as the computers
are networked, they can communicate with each other to solve the problem. If done properly, the
computers perform like a single entity.
The ultimate goal of distributed computing is to maximize performance by connecting users and
IT resources in a cost-effective, transparent and reliable manner. It also ensures fault tolerance
and enables resource accessibility in the event that one of the components fails.
Advantages
Share ability
Expandability
Local autonomy
Improved performance
Improved reliability and
availability
Disadvantages
Network reliance
Complexities
Security
Multiple point of failure
Parallel computing:
Parallel computing is the use of two or more processors (cores, computers) in
combination to solve a single problem.
1. Types of Parallelism
There are various forms of parallel processing:
- Bit Level Parallelism, each bit of a word is processed at the same time
- Instruction Level Parallelism, execute multiple instructions simultaneously
- Data Parallelism, (a.k.a. loop level parallelism) focuses on distributing the data across
different parallel processing units
- Task Parallelism, (a.k.a. functional parallelism) focuses on distributing execution
task(code + data) across different parallel processing units
In this kind of computer, each node has its own private memory address space and can't access
other node's memory directly. Usually, processing nodes are connected using some kind of
interconnection network.
Distributed memory computer can scale to very large since no bus contention occurs. But it's
more complicated to write program on this kind of computers.
Advantage:
Disadvantage:
Cluster computing
Types of Cluster
DISADVANTAGES:-
Grid computing
Grid Computing is a type of parallel and distributed system that enables the sharing, selection,
and aggregation of geographically distributed "autonomous" resources dynamically at runtime
depending on their availability, capability, performance, cost, and users' quality-of-service
requirements
TYPES OF GRID
Computational Grid
-computing power
Scavenging Grid
-desktop machines
Data Grid
-data access across multiple organizations
Resource
Management
Data Management
Information
Services
Fault Detection
Portability
Green computing
To reduce the use of Hazardous materials, maximize energy efficiency during products
lifetime.
Manufacturing of PCs
Lead: used in soldering of printed circuit boards lead can cause damage to the central
and peripheral nervous system , blood systems and kidneys.
Mercury: used in batteries, switches. Mercury spreads out in water transforming into
methylated mercury that can cause chronic brain damage.
Cadmium: used in resistors for chips and in semiconductors. Cadmium is classified as
toxic, these compounds accumulate in the human body, particularly the kidneys.
Green manufacturing
Bamboo: is becoming increasingly popular for making casings for computers and
peripherals.
Recyclable plastics: computers are constructed from non-recyclable plastics i.e.
recyclable polycarbonate resin.
Eco-friendly flame retardant: there are flame retardant silicone compounds available
that are flame retardant and completely non-toxic.
Inventory management: reducing the quantity of both hazardous materials used in the
process and the amount of excess raw materials.
Volume reduction: removes hazardous portion of waste from nonhazardous portion.
Energy use of PC
CPU uses 120 Watts
CRT uses 150 Watts
Sleep mode:
Sleep or standby mode conserves energy by cutting off power to your display, hard drives
and peripherals.
After a pre-set period of inactivity, your computer switches to a low power state.
Hibernate mode:
Saves energy and protects your work by copying system data to a reserved area on your
hard drive and then completely turning off your computer.
Reduces wear and tear on your components.
Green Disposal
Reuse: donate your computer components
quality computers.
Recycle: One of the major challenges is recycling the printed circuit boards from the
electronic wastes. The circuit boards contain such precious metals as gold, silver,
platinum, etc. and such base metals as copper, iron, aluminum.
Ubiquitous computing
Ubiquitous computing (ubicomp) is a post-desktop model of human-computer
interaction in which information processing has been thoroughly integrated into everyday
objects and activities.
The idea that almost any device, from clothing to tools to appliances to cars to homes to
the human body to your coffee mug, can be imbedded with chips to connect the device to
an infinite network of other devices.
Refers to the use of computers in everyday life,
also called pervasive computing
User View
Invisible implicit interaction with your environment.
Augmenting human abilities in context of tasks
Challenges of ubicomp
UC Hardware Demands
Biological computing
Biological computation asks how and why living systems can be viewed as
fundamentally computational in nature.
Advantages
Performs millions of operations at same time
Good for parallel computing
Ability to use large amounts of working memory
14
1 gram of DNA can hold 1 x 10 MB of data
Or 145 trillion CDs
1 CD is 800 MB
Cheaper
Lightweight
1 lb of DNA has more computing power than all computers ever made
Low power used to keep in original state
Has ability to solve hardest problems in a matter of weeks
Environmentally friendly
Clean, readily available materials
Disadvantages
Cloud computing
Cloud computing is distributed computing on internet or delivery of computing service
over the internet.
Cloud Components
It has three components
1. Client computers
2. Distributed Servers
3. Datacenters
Types of cloud
Public cloud
Private cloud
Community cloud
Hybrid cloud
Benefits of cloud
Reduce spending on technology
Globalize your work force on the
cheap
Reduce capital cost
Improve accessibility
Improve flexibility
Less personal training is needed
Monitor project more effectively
Achieve economic of scale
Requires
a
constant
Internet
connection
Does not work well with low-speed
connections
Loss of control
Multi-tenancy
Self-managed clouds still have security issues, but not related to above
User access control rules, security policies and enforcement are managed by the
cloud provider
Resource availability
Currently consumers cannot dictate their requirements to the provider (SLAs are
one-sided)
Need a validation tool to check that the policy created in the standard language
correctly reflects the policy creators intentions (i.e. that the policy language is
semantically equivalent to the users intentions).
Risk assessment
Monitoring
When underlying components fail, what is the effect of the failure to the mission
logic
The cloud consumer and cloud provider have different views of the system
Enable both the provider and tenants to monitor the the components in the cloud
that are under their control
Provide mechanisms that enable the provider to act on attacks he can handle.
Repairs
Provide mechanisms that enable the consumer to act on attacks that he can handle
(application-level monitoring).
Consumer may use services from different clouds through an intra-cloud or multicloud architecture
E.g. access to the cloud, access to servers, access to services, access to databases
(direct and queries via web services), access to VMs, and access to objects within
a VM
Depending on the deployment model used, some of these will be controlled by the
provider and others by the consumer
Regardless of deployment model, provider needs to manage the user authentication and
access control procedures (to the cloud)
Federated Identity Management: access control management burden still lies with
the provider
Requires user to place a large amount of trust on the provider in terms of security,
management, and maintenance of access control policies. This can be burdensome
when numerous users from different organizations with different access control
policies, are involved
Requires the client and provider to have a pre-existing trust relationship, as well
as a pre-negotiated standard way of describing resources, users, and access
decisions between the cloud provider and consumer. It also needs to be able to
guarantee that the provider will uphold the consumer-sides access decisions.
Facebook and Google Apps do this to some degree, but not enough control
Policy specification
Whos the insider, wheres the security boundary? Who can I trust?
Big data is a collection of data sets so large and complex that it becomes difficult to
process using on-hand database management tools.
NoSQL (Not Only SQL): Databases that move beyond relational data models (i.e., no
tables, limited or no use of SQL)
Focus on retrieval of data and appending new data (not necessarily tables)
Focus on key-value data stores that can be used to locate data objects
Focus on supporting storage of large quantities of unstructured data
SQL is not used for storage or retrieval of data
No ACID (atomicity, consistency, isolation, durability)
Joins
Group by
But PNUTS provides interesting materialized view approach to joins/aggregation.
ACID transactions
SQL
Integration with applications that are based on SQL