Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Clustering Concepts and General Overview
Figure 1-1: Beowulf logical view
Figure 1-2: Logical functions of a physical node
Chapter 2: New Linux Cluster Offering From IBM: Cluster 1350
Figure 2-1: IBM eServer Cluster 1350
Figure 2-2: Model 345 for cluster (storage or management) nodes
Figure 2-3: Model 335 for cluster (compute) nodes
Figure 2-4: Model 360 for cluster (storage) nodes
Figure 2-5: Model HS20 for cluster (compute) nodes
Figure 2-6: Management processor network
Chapter 3: Introducing Cluster Systems Management for Linux
Figure 3-1: CSM architecture
Chapter 4: Introducing General Parallel File System for Linux
Figure 4-1: GPFS components
Figure 4-2: Direct attached disks
Figure 4-3: Primary and secondary servers
Figure 4-4: Example - Scenario and operation
Chapter 5: Cluster Installation and Configuration with CSM
Figure 5-1: Lab cluster configuration
Figure 5-2: CSM planning worksheets
Figure 5-3: ESP installation (1 of 3)
Figure 5-4: ESP configuration (2 of 3)
Figure 5-5: ESP Configuration (3 of 3)
Figure 5-6: IBM Remote Supervisor Utility - Ethernet settings
Chapter 6: Cluster Management with CSM
Figure 6-1: DCEM - xosview from all nodes
Chapter 7: GPFS Installation and Configuration
Figure 7-1: FAStT logical disk configuration
Appendix A: SRC and RSCT
Figure A-1: SRC and RSCT architecture
< Day Day Up >
Previous page
Table of content
Next page
Linux Clustering With Csm and Gpfs
ISBN: 073849870X
EAN: 2147483647
Year: 2003
Pages: 123
Authors:
IBM Redbooks
BUY ON AMAZON
101 Microsoft Visual Basic .NET Applications
Building Windows Forms User Interfaces
Working with the .NET Framework
GDI+
COM Interop/PInvoke
Coding Conventions
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 5. The Road Less Traveled by in MapQuest
Hack 6. Make Route Maps Easier to Read
Hacks 14-21
Hack 38. Add Location to Weblogs and RSS Feeds
Hack 47. Get Maps on Your Mobile Phone
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco Firewall Products
Defining an Authentication Server
Authenticating Firewall Sessions (Cut-Through Proxy Feature)
Configuration of Transparent Firewall
Enrolling the Cisco ASA to a CA Using SCEP
802.11 Wireless Networks: The Definitive Guide, Second Edition
Management Operations
Using 802.11 on Windows
1X on the AirPort
Selecting Access Points
Topology Examples
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Special Excel Issues
Programming InfoPath
Creating a Data-Bound Customized Word Document with VSTO
Local Machine Deployment Without a Deployment Manifest
Implementing IDTExtensibility2
Digital Character Animation 3 (No. 3)
Chapter One. Basics of Character Design
Chapter Three. Rigging Characters
Creating Appealing Poses
The Mechanics of Walking
Chapter Eight. Animal Motion
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies