Module 1 - Cloud Computing
Module 1 - Cloud Computing
As a result, supercomputer sites and large data centers must provide high-
performance computing services to huge numbers of Internet users
concurrently.
We have to upgrade data centers using fast servers, storage systems, and
high-bandwidth networks. The purpose is to advance network-based
computing and web services with the emerging new technologies.
******************************************************************
cluster: Cluster is often a collection of homogeneous
collection compute nodes that are physically connected in
close range to one another.
The speed of HPC systems has increased from Gflops in the early 1990s to now
Pflops in 2010.
This improvement was driven mainly by the demands from scientific, engineering,
and manufacturing communities.
FOR EXAMPLE:
The Top 500 most powerful computer systems in the world are measured by
floating-point speed in Linpack benchmark results. However, the number of
supercomputer users is limited to less than 10% of all computer users. Today, the
majority of computer users are using desktop computers or large servers when they
conduct Internet searches and market-driven computing tasks.
******************************************************************
• The LINPACK Benchmarks are a measure of a
system's floating pointcomputing power. Introduced
by Jack Dongarra, they measure how fast a computer
Page 6 of 48
• *
* kiloFLOPS kFLOPS 103
*
yottaFLOPS YFLOPS 1024
*
**********************************
Page 7 of 48
****************************************************
****
• A nautical mile is a unit of measurement used in both air
and marine navigation,[2] and for the definition of territorial
waters.[3] Historically, it was defined as one minute (1/60 of
a degree) of latitude. Today the international nautical mile
is defined as exactly 1852 metres. This converts to about
1.15 imperial/US miles. The derived unit of speed is
the knot, one nautical mile per hour 1 nautical mile = 1.852
KM .
************************************************
*******
• Radio-frequency identification (RFID)
uses electromagnetic fields to automatically identify and
Page 9 of 48
IOT
• The Internet of things (IoT) is the extension
of Internet connectivity into physical devices and everyday
objects. Embedded with electronics, Internet connectivity,
and other forms of hardware (such as sensors), these
devices can communicate and interact with others over the
Internet, and they can be remotely monitored and
controlled .
Page 13 of 48
A bit (short for binary digit) is the smallest unit of data in a computer. A
bit has a single binary value, either 0 or 1. Although computers usually
Page 17 of 48
provide instructions that can test and manipulate bits, they generally are
designed to store data and execute instructions in bit multiples
called bytes. In most computer systems, there are eight bits in a byte
****************************************************
************************************
Genomic analysis is the identification, measurement or comparison of genomic features such as DNA sequence,
structural variation, gene expression, or regulatory and functional element annotation at a genomic scale.
************************************
Page 19 of 48
Viz.
1. Technology trigger.
2. Peak of inflated expectations.
3. Trough of disillusionment
4. Slope of enlightenment
5.Plateau of productivity
• Fig 1.3
Page 21 of 48
---------------------------------------------------------------------------------------------------------------------------------------------------------
Computational Grids:
Definition: A computational grid offers an infrastructure that
couples computers, software/middleware, special instruments
and people and sensors together.
Construction/ Architecture:
• The grid is often constructed across LAN, WAN, or
Internet backbone networks at a regional, national, or
global scale.
• The computers used in a grid are primarily workstations,
servers, clusters, and supercomputers .
Page 30 of 48
Overlay Network
Page 35 of 48
Meaning/Definition:
• P2P overlay network that characteristics the logical
connectivity among the peers.
• Data items/files are distributed in the participating peers.
• Based on communication or file sharing needs, the peer
IDS( Definition of: IDS. IDS. (Intrusion Detection System) Software
that detects an attack on a network or computer system.) form an
overlay network at the logical level.
• This overlay is a virtual network formed by mapping each
physical machine with its ID, logically through a virtual
mapping as shown in fig 1.17.
Page 36 of 48
/////
Page 37 of 48
-----------------------------------------------------------------------------
Cloud platforms:
Infrastructure as a Service (IaaS).
Platform as a Service (PaaS).
Software as a Service (SaaS).
The user can deploy and run on multiple VMs running guest OSes on
specific applications.
The user does not manage or control the underlying cloud infrastructure,
but can specify when to request and release the needed resources.
The provider supplies the API and software tools (e.g., Java, Python, Web
2.0, .NET).
The SaaS model applies to business processes, industry applications, consumer relationship
management (CRM), enterprise resources planning (ERP), human resources (HR), and
collaborative applications.
End of module:
Brief Review:
Page 46 of 48
Page 47 of 48
Page 48 of 48