08-25-2012
I/O bound computing clusters
I want to build a computing cluster and have been looking into grid solutions. My understanding from grid solutions is that participating nodes have to actually sign up to participate in a computation and that an isolated piece of work is sent to the node through a request from that node (pull). Along that reasoning, would a solution whereby a controlling machine sends work to whichever node is available not be a grid solution (push)?
The problem we will be solving is data-intensive, so we will be looking at an I/O bound problem. What methodology is used whereby the data sits on one machine and the nodes use that data? Could a partitioning of the database work, whereby a node only works on the data in the partition and no other?
9 More Discussions You Might Find Interesting
1. High Performance Computing
hello all...first off let me say hi and im really glad to be apart of this community....tried to join awhile back but i couldnt for some reason
im a highschool student and im eager to learn and what im trying to learn now is clusters
i have 3 computers in my room all connected on a simple hub
... (1 Reply)
Discussion started by: hexadecimal0011
1 Replies
2. Virtualization and Cloud Computing
Tim Bass
Thu, 15 Nov 2007 23:55:07 +0000
*I predict we may experience less*debates*on the use of the term “event cloud”*related to*CEP in the future, now that both IBM and Google* have made announcements about “cloud computing” and “computing cloud”, IBM Turning Data Centers Into ‘Computing... (0 Replies)
Discussion started by: Linux Bot
0 Replies
3. Solaris
How to get the list of zones which are bound to a pool say appPool. Rather then logging in each zone and then check from pool stat command. (3 Replies)
Discussion started by: fugitive
3 Replies
4. Programming
I was trying to test dump data on bedework jxi console however I got the error below.I'm using debian as my OS and installed quickstart bedework on it. Pls advise what am I missing. thanks
Caused by: javax.naming.NameNotFoundException: env not bound
at... (1 Reply)
Discussion started by: lhareigh890
1 Replies
5. Solaris
:)Hi,
can someone please explain VCS clustering and where do we need VCS clusters ..?
:o:)Thanks in advance :o:) (1 Reply)
Discussion started by: amitbisht9
1 Replies
6. Linux
Hi all,
Am getting the below error for a job that is run in our system.
error code: 114, pc=0, call=1, seg=0
114 Attempt to access item beyond bounds of memory (Signal 11)
This job uses a cobol program and as far as I know, the problem is related to this cobol program.
What does this... (1 Reply)
Discussion started by: das.somik
1 Replies
7. Solaris
Hi Guys,
I am studying netstat and I am getting confused a lot. I will be glad if someone will be kind enough to explain to me :
1) bound port
2) unbound port
3) idle
4 listening
I will very much appreciate it. Thanks guys
We have a special forum with special rules for homework (3 Replies)
Discussion started by: cjashu
3 Replies
8. Emergency UNIX and Linux Support
Hi All,
Can you please answer my question.
i see lot of CPU utilization on AIX LPARs. i am able to find the cause of the probelm. But i do not know how to mitigate or fix the problem.
for instance,
i found the process which is consuming most of CPU. i informed the responsible team.
how... (7 Replies)
Discussion started by: System Admin 77
7 Replies
9. Shell Programming and Scripting
Hi all,
I've data as:
22 51018157 51018157 exonic CHKB nonsynonymous SNV
22 51018204 51018204 exonic CHKB nonsynonymous SNV
22 51018428 51018428 exonic CHKB nonsynonymous SNV
22 51018814 51018814 ... (4 Replies)
Discussion started by: genome
4 Replies
LEARN ABOUT ULTRIX
trigger
trigger(8) System Manager's Manual trigger(8)
Name
trigger - trigger a target node to request a down-line load
Syntax
/etc/trigger node [ options ]
Description
The command triggers the bootstrap mechanism of a target node, causing the target to request a down-line load. Once a target node is trig-
gered, it loads itself in whatever manner its primary loader is programmed to operate. The target node could request a down-line load from
the host that just triggered it or from another adjacent node, or the target node could load itself from its own mass storage device.
The node argument is the name or address of the target node. A node name consists of from one to six alphanumeric characters. For single
networks, a node address consists of a decimal integer (1-1023). For multiple networks, a node address consist of two decimal integers
(n.n), where the first indicates the network number (1-63), and the second indicates the node address (1-1023).
The command requires the identification of the service circuit over which the load is performed, the Ethernet hardware address of the tar-
get node, and the service password needed to gain access to the target. This information is included in the nodes database entry for the
target node. A node entry is defined with the command. For further information, see Alternatively, you can choose not to include a target
node's service password in the nodes database for security reasons. You must therefore specify this value in the command line by using the
-p option.
Options
-p Uses the specified service and password (next arguments) in accessing the target node.
Examples
This command triggers node Bangor to issue a down-line load request:
# /etc/trigger bangor <RET>
See Also
mop_mom(8), addnode(8), load(8), remnode(8), getnode(8), ccr(8)
Guide to Local Area Transport Servers
trigger(8)