Grid computing. It is the technology that allows devices to link through a network to share computing power or the ability to store data and appear, operating as a single powerful computer . By combining their resources, linked machines in a grid computing system can perform computations that are impossible to execute on a single computer.
[ hide ]
- 1 Grid computing
- 2 Basic features
- 1 Share global resources
- 2 Security
- 3 Load balance
- 4 Neutrality of distances
- 3 Sources
Grid computing as a notion has been around for decades, with the first conception in the early 60’s, designating it as timeshare computers, in the last five years than in the advances in processing in computers, memory and networks , They have come to perceive the benefits of this technology.
With the spread of the Internet , broadband networks, and the advent of cheap, high-performance computers using open standards, the concept of grid computing has now gained wide acceptance.
This computing cooperation allows ordinary users to do great work, such as modeling the global financial system or predicting climate change . A machine interconnected to such a system is also capable of accessing information that is too voluminous for it to store alone. A grid computing system can be organized to function as a public service, whereby computing resources are available with just a keystroke.
- Share global resources.
- Load balance.
- Neutrality of distances
- Open standards.
Share global resources
Computers in a grid computer network share computing and storage resources through geographically distributed organizations that have different administrative domains. Individual computers in a network notify when they have computing capacity or data storage available and then usable by devices that need these resources.
Security includes four interrelated aspects: knowing, access, authorization, authentication and accounting. For access, participants specify which resources ( software, computer or data) can be used, by whom, at what time and what can be done with it. The authorization mechanism is in charge of checking to see if a job being applied for complies with the established co-participation relationships. In the authentication process, the identity of a participant (resource provider or user) is verified. Finally, accounting includes billing for use; This aspect will gain more and more importance as the grid from the experimental phase in academic and scientific research centers becomes more widely used by society in general. To the extent that technologists and policy makers try to address these security concerns, advances in digital identity management and computer certification must be seen as solutions.
This refers to the need for a grid to allocate sufficient resources, instead of humans trying to optimize resources, myriads of intermediate programs would allow machines to negotiate with each other, with some acting as agents (reporting on users, data and resources ) and others as intermediaries (achieving access and payment for these services) in the computing and storage resources market.
Neutrality of distances
Distance neutrality refers to the ability to share grid resources from diverse and remote locations with optimal efficiency and without delay in job processing.