Search icone
Search and publish your papers

Security and advantages of cluster computing over distributed systems

Or download with : a doc exchange

About the author

Level
Expert

About the document

Published date
Language
documents in English
Format
Word
Type
term papers
Pages
7 pages
Level
Expert
Accessed
0 times
Validated by
Committee Oboolo.com
0 Comment
Rate this document
  1. Introduction
  2. Overview of 'cluster architecture'
  3. Role of application servers and multi-tier architecture
  4. Meaning of gateway security
  5. Conclusion
  6. References

A cluster is a parallel or distributed system consisting of independent computers that cooperate as a single system. In the case Server, Cluster consists of two types of participant's dispatchers and servers. The goal of a cluster is to allow distributing of the computing load over the several machines participating in it. These machines communicate with the dispatchers and with each other in order to provide better, faster and more reliable service to the client. The idea of clusters is that the machines in it represent one unit and clients perceive the cluster as a single entity, not as a group, for clients the IP address of the dispatcher is the IP address of the whole cluster. When connected in a cluster, servers are still physically separated as different machines. The participants in the cluster share disk access and resources that manage data, but they do not share memory or processors.

[...] IT managers need to have a complete antivirus security solution, but with the numerous virus outbreaks that have occurred recently, it is clear that they must implement security systems that give them the control and the ability to respond in a major disaster situation. The gateway has become the most valibel point for Internet based threats. But the gateway serves mission critical business functions. So IT managers have several key concerns about implementing such a gateway solution. Stability: Is the antivirus solution going to work smoothly with the other hardware, software, firewall and network systems? [...]


[...] Usually requests do not pass through all of these steps but skip some of the steps and go directly to a next step. b. The picture shows only one server besides the dispatcher. The reason is to simplify the presentation of processing request in the system, no matter on which of the many servers in the cluster. c. The path for delivering the results of processing is along the same route but in reverse order, i.e. step etc. and because of that it is not presented separately. [...]


[...] This means that the entire cluster is seen, regardless of the number of nodes, as a powerful single-ID machine that is always up and available. The load-balancing agent (filter) resides on each node (server) of the cluster right next to network adapters and before the TCP stack. The incoming traffic is delivered to all nodes by using a multicast subnet. Only one server will process a packet while the load-balancing filter tells the other nodes to simply ignore it. Security Cluster Environment Total Transparency: Scaling up from a single content security server to a cluster solution, whether as a standalone gateway or in conjunction with firewalls, will occur without being noticed by users. [...]

Similar documents you may be interested in reading.

Performance appraisal system of eMorphosys

 Business & market   |  Marketing   |  Indian project   |  04/19/2009   |   .doc   |   36 pages

Credit appraisal system at Standard Chartered Bank and the SME credit department

 Economics & finance   |  Finance   |  Thesis   |  04/19/2009   |   .doc   |   68 pages

Recent documents in computer science category

Net neutrality in United States

 Science & technology   |  Computer science   |  Presentation   |  10/02/2018   |   .doc   |   3 pages

Reconstructing householder vectors from tall-skinny QR

 Science & technology   |  Computer science   |  Presentation   |  04/21/2017   |   .doc   |   4 pages