General use of cluster computing, Computer Engineering

Assignment Help:

Q. General use of cluster computing?

A general use of cluster computing is to balance traffic load on high-traffic web sites. In web operation a web page request is transmitted to a manager server that then decides which of the various identical or very similar web servers to forward request to for handling. The exploit of cluster computing makes this web traffic uniform. 

Clustering has been available ever since 1980s when it was used in DEC's VMS systems. IBM's SYSLEX is cluster approach for mainframe system. Sun Microsystems, Microsoft and other leading hardware and software companies provide clustering packages for scalability as well as availability. As traffic or availability assurance raises all or a number of parts of cluster can be raised in number or size. Cluster computing can be used as a relatively low-cost form of parallel processing for scientific and other applications too which lend themselves to parallel operations An early and in addition well-known illustration was project in which some off-the-shelf PCs were used to form a cluster for scientific applications.


Related Discussions:- General use of cluster computing

What are the event key words in interactive reporting, What are the event k...

What are the event key words in interactive reporting? Event Keyword                                                 Event AT LINE-SELECTION         Moment at which the u

Maximum number of nodes in a binary tree, The maximum number of nodes in a ...

The maximum number of nodes in a binary tree of depth 5 is 31 is the maximum number of nodes in a binary tree

How to load dos from floppy disk, Q. How to load DOS from Floppy Disk? ...

Q. How to load DOS from Floppy Disk? If DOS is not setup on the Hard Disk of your PC, or you want to load DOS from the Floppy disk drive due to any reason, follow these steps:

Explain the significance of binary data, Explain the Significance of Binary...

Explain the Significance of Binary Data Controlled devices generally contain registers that are made up of binary digits (bits). The following illustration shows how these regi

Loop statement in both the pbo and pai events, Why do we need to code a LOO...

Why do we need to code a LOOP statement in both the PBO and PAI events for each table in the screen? We require coding a LOOP statement in both PBO and PAI events for every ta

Explain non-adapting routing, Explain non-adapting routing. Systems whi...

Explain non-adapting routing. Systems which do not implement adaptive routing are explained as using non-adapting or static routing, which routes by a network are explained by

Syntax of $display and $strobe, Syntax of $display and $strobe -  $disp...

Syntax of $display and $strobe -  $display ("format_string", par_1, par_2, ... ); -  $strobe ("format_string", par_1, par_2, ... ); -  $monitor ("format_string", par_1, p

How does the dialog handle user requests, How does the Dialog handle user r...

How does the Dialog handle user requests? when an action is performed ,the system triggers the PROCESS AFTER INPUT event. The data passed contains field screen data data enter

What all 1's represents in 32bit ip addressing scheme, In 32bit IP Addressi...

In 32bit IP Addressing scheme all 1's represent? All 1's represent limited broadcast in 32 bit IP Addressing scheme.

Explain digital signatures, Digital Signatures. A digital signature is ...

Digital Signatures. A digital signature is an electronic rather than a written signature that can be used by someone to validate the uniqueness of the sender of a message or of

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd