文档详情

分布式计算6.ppt

发布:2017-06-10约1.94千字共73页下载文档
文本预览下载声明
Jing Liu liujing@ss.pku.edu.cn ;Cluster Computing(3);Dependable Clustered Computing;Introduction;Failover;Two Worlds Converge;Dependable Parallel Computing (I);Dependable Parallel Computing (II);Mission/Business Critical Computing (I);Mission/Business Critical Computing (II);Dependability Concepts (I);Dependability Concepts (II);Dependability Concepts (III);Cluster Architectures (I);Shared-nothing Clusters;Cluster Architectures (II);Active/Standby Clusters;N-Way Clusters;Cluster Architectures (III);Cluster Interconnects;Cluster Architectures (IV);Cluster Architectures (V);Detecting and Masking Faults (I);Detecting and Masking Faults (II);Detecting and Masking Faults (III);Detecting and Masking Faults (IV);Detecting and Masking Faults (V);Recovering from Faults (I);Recovering from Faults (II);Recovering from Faults (III);The Practice of Dependable Clustered Computing (I);The Practice of Dependable Clustered Computing (II);The Practice of Dependable Clustered Computing (III);Cluster Computing(4);Deploying a High Throughput Computing Cluster;Introduction (1);Introduction (2);Introduction (3);Introduction (4);Condor Overview;Condor Resource Management Architecture;Condor overview (Cont’d);Software Development;Layered Software Architecture (1);Layered Software Architecture (2);Layered Software Architecture (3);Layered Software Architecture (4);Layered Software Architecture (5);Layered Resource Management Architecture (1);Layered Resource Management Architecture (2);Protocol Flexibility;Example of Protocol Data Format;Remote File Access (1);Remote File Access (2);Remote File Access (3);System Call Interposition;Checkpointing;System Administration;Access Policies;Examples;Reliability (1);Reliability (2);Problem Diagnosis via System Logs;HTC Environment Logs;Monitoring and Accounting;Monitoring Resource Usage;Monitoring HTC Applications;Security (1);Security (2);Security (3);Security (4);Remote Customers (1);Remote Customers (2)
显示全部
相似文档