Grid computing how does it work




















Before going too much further, let's take a quick look at a computer's resources:. Normally, a computer can only operate within the limitations of its own resources. There's an upper limit to how fast it can complete an operation or how much information it can store. Most computers are upgradeable, which means it's possible to add more power or capacity to a single computer, but that's still just an incremental increase in performance. Grid computing systems link computer resources together in a way that lets someone use one computer to access and leverage the collected power of all the computers in the system.

To the individual user, it's as if the user's computer has transformed into a supercomputer. If you read a report about grid computing, you come across a lot of unusual terms and jargon. What does it all mean? Keep reading to find out. Grid computing is still a developing field and is related to several other innovative computing systems, some of which are subcategories of grid computing.

Shared computing usually refers to a collection of computers that share processing power in order to complete a specific task. Then there's a software-as-a-service SaaS system known as utility computing , in which a company offers specific services such as data storage or increased processor power for a metered cost.

Cloud computing is a system in which applications and storage "live" on the Web rather than on a user's computer. Reading about grid computing can get very confusing if you don't know the lingo. Here's a quick rundown on some of the terms you might encounter when discussing grid computing:. So how exactly does a grid computing system link computer resources together? Find out in the next section. Several companies and organizations are working together to create a standardized set of rules called protocols to make it easier to set up grid computing environments.

It's possible to create a grid computing system right now and several already exist. But what's missing is an agreed-upon approach. That means that two different grid computing systems may not be compatible with one another, because each is working with a unique set of protocols and tools.

If middleware is the workhorse of the grid computing system, the control node is the dispatcher. The control node must prioritize and schedule tasks across the network. It's the control node's job to determine what resources each task will be able to access. The control node must also monitor the system to make sure that it doesn't become overloaded. It's also important that each user connected to the network doesn't experience a drop in his or her computer's performance.

A grid computing system should tap into unused computer resources without impacting everything else. The potential for grid computing applications is limitless, providing everyone agrees on standardized protocols and tools.

That's because without a standard format, third-party developers -- independent programmers who want to create applications on the grid computing platform -- often lack the ability to create applications that work on different systems. While it's possible to make different versions of the same application for different systems, it's time consuming and many developers don't want to do the same work twice.

A standardized set of protocols means that developers could concentrate on one format while creating applications. What are some of the criticisms and concerns people have about grid computing? Whenever you link two or more computers together, you have to prepare yourself for certain questions. How do you keep personal information private? How do you protect the system from malicious hackers? How do you control who can access the system and use its resources? How do you make sure the user doesn't tie up all the system's resources?

The short answer to this question is middleware. There's nothing inherent in a grid computing system that can answer these questions. The emerging protocols for grid computing systems are designed to make it easier for developers to create applications and to facilitate communication between computers. The most prevalent technique computer engineers use to protect data is encryption. To encrypt data is to encode it so that only someone possessing the appropriate key can decode the data and access it.

Ironically, a hacker could conceivably create a grid computing system for the purpose of cracking encrypted information. Because encryption techniques use complicated to encode data, it would take a normal computer several years to crack a code which usually involves finding the two largest prime divisors of an incredibly large number.

With a powerful enough grid computing system, a hacker might find a way to reduce the time it takes to decipher encrypted data. It's hard to protect a system from hackers, particularly if the system relies on open standards. Every computer in a grid computing system has to have specific software to be able to connect and interact with the system as a whole -- computers don't know how to do it on their own.

If the computer system's software is proprietary, it might be harder but not impossible for a hacker to access the system. In most grid computing systems, only certain users are authorized to access the full capabilities of the network. Otherwise, the control node would be flooded with processing requests and nothing would happen a situation called deadlock in the IT business. It's also important to limit access for security purposes.

For that reason, most systems have authorization and authentication protocols. Based on the functional role they play, grid computing organizations have the following functions to play:. These can be described in terms of various layers that perform a common function. These layers are:. Grid computing plays a very important role when a task requires more than one expert to complete the job. After working individually on their area of expertise, the experts can collect the data, note down their findings, and gather them to take out the final results.

Here are a few grid computing examples where grid computing is used:. Grid computing is a procedure that has proved to be a boon for various sectors in the industry. It makes the work easier and gets it completed faster and ensures that work can be done by different individuals, even from remote locations. This has even led to an increase in the quality of contents and data.

The joint-certification course is 6 months long and is conducted online and will help you become a complete Cloud Professional. Ajay Sarangam 19 Jan Introduction Grid computing definition is a group of computers that work in a single network to perform larger tasks that are not possible using single computers. Let us take a look at them in brief: Computational grid: This is a type of grid that acts as a mediator of many computers in a given network to solve one single problem at a time.

It can also be seen as a form of Parallel Computing where instead of many CPU cores on a single machine, it contains multiple cores spread across various locations. Attention reader! Working: A Grid computing network mainly consists of these three types of machines. Skip to content. Change Language. Related Articles. A scheduler is required to position the computers on where the application is available and assigned with required jobs.

Job queue priority helps in considering the alternative available resources and makes it a simple task. The scheduler has other important tasks, including maintaining the workload, finding uncompleted tasks, unveiling the resources reserved, and monitoring the entire system.

So the consistent data management services take in charge of moving the data to suitable places across different machines managing various protocols. The concept of grid computing is explored end to end from academics to research communities. The scope and deployment of grid computing became essential and mandatory in the market as similar to the internet.

But the business has begun to stick on to the advantages of grid computing by enabling new types of business and financial models. In the industry and financial services, grid computing can be implemented to speed up the transaction of trade and shrunk any high volume of data.

In the field of IT, Grid computing enables the possibility to carry over any critical missions and circumstances that might not permit any downtime at all. The government agencies use grid computing to secure, segregate and pool up the higher dimensional stockpiles of information.

An organization like military and civilian agencies might require data integrity capabilities and a faster rate of information access involving collaboration with millions of cross-agent data repositories.

There are many organizations involved in analyzing, such as genome resources and development in the pharmaceutical field, which relies on grid computing to clean, process, compare and cross-tabulate the enormous amount of data. The faster processing of data is a remarking edge in the deciding factor. Biometric verification systems and biometric information security areas also make use of Grid computing as a large-scale enterprise.

The BIS is considered a central workflow engine that became the mandatory process rather than traditional grid systems.



0コメント

  • 1000 / 1000