Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Clustering Concepts and General Overview
Figure 1-1: Beowulf logical view
Figure 1-2: Logical functions of a physical node
Chapter 2: New Linux Cluster Offering From IBM: Cluster 1350
Figure 2-1: IBM eServer Cluster 1350
Figure 2-2: Model 345 for cluster (storage or management) nodes
Figure 2-3: Model 335 for cluster (compute) nodes
Figure 2-4: Model 360 for cluster (storage) nodes
Figure 2-5: Model HS20 for cluster (compute) nodes
Figure 2-6: Management processor network
Chapter 3: Introducing Cluster Systems Management for Linux
Figure 3-1: CSM architecture
Chapter 4: Introducing General Parallel File System for Linux
Figure 4-1: GPFS components
Figure 4-2: Direct attached disks
Figure 4-3: Primary and secondary servers
Figure 4-4: Example - Scenario and operation
Chapter 5: Cluster Installation and Configuration with CSM
Figure 5-1: Lab cluster configuration
Figure 5-2: CSM planning worksheets
Figure 5-3: ESP installation (1 of 3)
Figure 5-4: ESP configuration (2 of 3)
Figure 5-5: ESP Configuration (3 of 3)
Figure 5-6: IBM Remote Supervisor Utility - Ethernet settings
Chapter 6: Cluster Management with CSM
Figure 6-1: DCEM - xosview from all nodes
Chapter 7: GPFS Installation and Configuration
Figure 7-1: FAStT logical disk configuration
Appendix A: SRC and RSCT
Figure A-1: SRC and RSCT architecture
< Day Day Up >
Previous page
Table of content
Next page
Linux Clustering With Csm and Gpfs
ISBN: 073849870X
EAN: 2147483647
Year: 2003
Pages: 123
Authors:
IBM Redbooks
BUY ON AMAZON
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
An Emerging Strategy for E-Business IT Governance
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governance in IT Outsourcing Partnerships
The Evolution of IT Governance at NB Power
Managing Enterprise Systems with the Windows Script Host
Introduction
Registry Operations
Regular Expressions
Application Automation
Security
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 42. Secure Your Linux Network with WPA
Hack 67. Upgrade Your Wireless Router
Hacks 8393: Introduction
Hack 85. Pringles Can Waveguide
Section A.3. 802.11b: The De Facto Standard
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Photoshop Layers and After Effects
3-D Layers from Photoshop Layers
Cause and Effect
Making Movies from Stills
Custom Scene Transitions
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Risk-Adjusted Financial Management
Expense Accounting and Earned Value
Quantitative Time Management
Special Topics in Quantitative Management
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the Authentication Process
Defeating Virtual Private Databases
Attacking Oracle PL/SQL Web Applications
Running Operating System Commands
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies