SlideShare une entreprise Scribd logo
1  sur  18
Session 7 Clustering Servers
Review  ,[object Object],[object Object],[object Object]
Review Contd…  ,[object Object],[object Object],[object Object]
Objectives ,[object Object],[object Object],[object Object],[object Object]
Clustering  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Cluster ,[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Cluster Contd… ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Types of Cluster Contd…
Designing a Cluster ,[object Object],[object Object],[object Object],[object Object],[object Object]
Designing a Cluster  Contd… ,[object Object],[object Object],[object Object]
Designing a NLB Cluster ,[object Object],[object Object],[object Object],[object Object]
Designing a NLB Cluster  Contd… ,[object Object],[object Object]
Designing Server Cluster  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Designing Server Cluster  Contd… ,[object Object],[object Object],[object Object]
Quorum Model ,[object Object],[object Object],[object Object],[object Object]
Quorum Model  Contd… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Summary  Contd… ,[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
Reza Gh
 
3. distributed file system requirements
3. distributed file system requirements3. distributed file system requirements
3. distributed file system requirements
AbDul ThaYyal
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
Ashish Kumar
 

Tendances (20)

Distributed file system
Distributed file systemDistributed file system
Distributed file system
 
Coda file system tahir
Coda file system   tahirCoda file system   tahir
Coda file system tahir
 
Coda file system
Coda file systemCoda file system
Coda file system
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
 
Application layer
Application layerApplication layer
Application layer
 
3. distributed file system requirements
3. distributed file system requirements3. distributed file system requirements
3. distributed file system requirements
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
File replication
File replicationFile replication
File replication
 
Rhel cluster basics 2
Rhel cluster basics   2Rhel cluster basics   2
Rhel cluster basics 2
 
Operating System : Ch17 distributed file systems
Operating System : Ch17 distributed file systemsOperating System : Ch17 distributed file systems
Operating System : Ch17 distributed file systems
 
Distributed File Systems: An Overview
Distributed File Systems: An OverviewDistributed File Systems: An Overview
Distributed File Systems: An Overview
 
mmWeb
mmWebmmWeb
mmWeb
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
 
11. dfs
11. dfs11. dfs
11. dfs
 
Advanced Storage Area Network
Advanced Storage Area NetworkAdvanced Storage Area Network
Advanced Storage Area Network
 
Distributed OS - An Introduction
Distributed OS - An IntroductionDistributed OS - An Introduction
Distributed OS - An Introduction
 
Distributed File Systems
Distributed File Systems Distributed File Systems
Distributed File Systems
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 
Distributed Operating System_4
Distributed Operating System_4Distributed Operating System_4
Distributed Operating System_4
 

En vedette (7)

VP Marketing - Paul June
VP Marketing - Paul JuneVP Marketing - Paul June
VP Marketing - Paul June
 
Session 5 Tp 5
Session 5 Tp 5Session 5 Tp 5
Session 5 Tp 5
 
Ession 5 Tp 5
Ession 5 Tp 5Ession 5 Tp 5
Ession 5 Tp 5
 
Ession 5 Tp 5
Ession 5 Tp 5Ession 5 Tp 5
Ession 5 Tp 5
 
Session 12 Tp 12
Session 12 Tp 12Session 12 Tp 12
Session 12 Tp 12
 
Session 1 Tp 1
Session 1 Tp 1Session 1 Tp 1
Session 1 Tp 1
 
Session 6 Tp 6
Session 6 Tp 6Session 6 Tp 6
Session 6 Tp 6
 

Similaire à Session 7 Tp 7

lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
ImXaib
 
Part 1 network computing
Part 1 network computingPart 1 network computing
Part 1 network computing
Linh Nguyen
 
Session 8 Tp 8
Session 8 Tp 8Session 8 Tp 8
Session 8 Tp 8
githe26200
 

Similaire à Session 7 Tp 7 (20)

Clustering of Exchnage server
Clustering of Exchnage serverClustering of Exchnage server
Clustering of Exchnage server
 
Microsoft Clustering
Microsoft ClusteringMicrosoft Clustering
Microsoft Clustering
 
cluster computing
cluster computingcluster computing
cluster computing
 
Cluster computings
Cluster computingsCluster computings
Cluster computings
 
Clustering and High Availability
Clustering and High Availability Clustering and High Availability
Clustering and High Availability
 
Cluster quorums
Cluster quorumsCluster quorums
Cluster quorums
 
RAC - The Savior of DBA
RAC - The Savior of DBARAC - The Savior of DBA
RAC - The Savior of DBA
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
 
Part 1 network computing
Part 1 network computingPart 1 network computing
Part 1 network computing
 
Failover cluster
Failover clusterFailover cluster
Failover cluster
 
Session 8 Tp 8
Session 8 Tp 8Session 8 Tp 8
Session 8 Tp 8
 
Future prediction-ds
Future prediction-dsFuture prediction-ds
Future prediction-ds
 
IBM Websphere concepts
IBM Websphere conceptsIBM Websphere concepts
IBM Websphere concepts
 
Client server technology main
Client server technology mainClient server technology main
Client server technology main
 
Introduction to Windows Azure
Introduction to Windows AzureIntroduction to Windows Azure
Introduction to Windows Azure
 
Introducción a CloudStack
Introducción a CloudStackIntroducción a CloudStack
Introducción a CloudStack
 
Clustering overview2
Clustering overview2Clustering overview2
Clustering overview2
 
CSS12 LESSON 02.pptx
CSS12 LESSON 02.pptxCSS12 LESSON 02.pptx
CSS12 LESSON 02.pptx
 
Ms Tech Ed Best Practices For Exchange Server Cluster Deployments June 2003
Ms Tech Ed   Best Practices For Exchange Server Cluster Deployments June 2003Ms Tech Ed   Best Practices For Exchange Server Cluster Deployments June 2003
Ms Tech Ed Best Practices For Exchange Server Cluster Deployments June 2003
 
Rha cluster suite wppdf
Rha cluster suite wppdfRha cluster suite wppdf
Rha cluster suite wppdf
 

Plus de githe26200

Session 11 Tp 11
Session 11 Tp 11Session 11 Tp 11
Session 11 Tp 11
githe26200
 
Session 10 Tp 10
Session 10 Tp 10Session 10 Tp 10
Session 10 Tp 10
githe26200
 
Session 9 Tp 9
Session 9 Tp 9Session 9 Tp 9
Session 9 Tp 9
githe26200
 
Session 4 Tp 4
Session 4 Tp 4Session 4 Tp 4
Session 4 Tp 4
githe26200
 
Session 3 Tp 3
Session 3 Tp 3Session 3 Tp 3
Session 3 Tp 3
githe26200
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
githe26200
 

Plus de githe26200 (6)

Session 11 Tp 11
Session 11 Tp 11Session 11 Tp 11
Session 11 Tp 11
 
Session 10 Tp 10
Session 10 Tp 10Session 10 Tp 10
Session 10 Tp 10
 
Session 9 Tp 9
Session 9 Tp 9Session 9 Tp 9
Session 9 Tp 9
 
Session 4 Tp 4
Session 4 Tp 4Session 4 Tp 4
Session 4 Tp 4
 
Session 3 Tp 3
Session 3 Tp 3Session 3 Tp 3
Session 3 Tp 3
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Session 7 Tp 7