Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Clustering Concepts and General Overview
Figure 1-1: Beowulf logical view
Figure 1-2: Logical functions of a physical node
Chapter 2: New Linux Cluster Offering From IBM: Cluster 1350
Figure 2-1: IBM eServer Cluster 1350
Figure 2-2: Model 345 for cluster (storage or management) nodes
Figure 2-3: Model 335 for cluster (compute) nodes
Figure 2-4: Model 360 for cluster (storage) nodes
Figure 2-5: Model HS20 for cluster (compute) nodes
Figure 2-6: Management processor network
Chapter 3: Introducing Cluster Systems Management for Linux
Figure 3-1: CSM architecture
Chapter 4: Introducing General Parallel File System for Linux
Figure 4-1: GPFS components
Figure 4-2: Direct attached disks
Figure 4-3: Primary and secondary servers
Figure 4-4: Example - Scenario and operation
Chapter 5: Cluster Installation and Configuration with CSM
Figure 5-1: Lab cluster configuration
Figure 5-2: CSM planning worksheets
Figure 5-3: ESP installation (1 of 3)
Figure 5-4: ESP configuration (2 of 3)
Figure 5-5: ESP Configuration (3 of 3)
Figure 5-6: IBM Remote Supervisor Utility - Ethernet settings
Chapter 6: Cluster Management with CSM
Figure 6-1: DCEM - xosview from all nodes
Chapter 7: GPFS Installation and Configuration
Figure 7-1: FAStT logical disk configuration
Appendix A: SRC and RSCT
Figure A-1: SRC and RSCT architecture
< Day Day Up >
Previous page
Table of content
Next page
Linux Clustering With Csm and Gpfs
ISBN: 073849870X
EAN: 2147483647
Year: 2003
Pages: 123
Authors:
IBM Redbooks
BUY ON AMAZON
C & Data Structures (Charles River Media Computer Engineering)
Preprocessing
Function
Storage of Variables
Problems in Arrays, Searching, Sorting, Hashing
Problems in Trees
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Crash Course in the Internet Protocol Suite
IDS and IPS Architecture
Internet Security Systems RealSecure
NFR Security
Policy and Procedures
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 30. Monitor Wireless Links in Linux with Wavemon
Hack 45. Forward Ports over SSH
Hack 71. Wall Off Your Wireless
Hacks 8393: Introduction
Section A.3. 802.11b: The De Facto Standard
PMP Practice Questions Exam Cram 2
Project Initiation
Answers and Explanations
Project Execution
Project Control
Answers and Explanations
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
The ROI of Lean Six Sigma for Services
Getting Faster to Get Better Why You Need Both Lean and Six Sigma
Success Story #1 Lockheed Martin Creating a New Legacy
Success Story #3 Fort Wayne, Indiana From 0 to 60 in nothing flat
Service Process Challenges
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Twisted-Pair
Next-Generation Networks
DSL Technology
Fiber Solutions
Wireless Broadband
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies