Vous êtes sur la page 1sur 2

Synopsis

* Title : Clusters Deployment , Network Study and Security Audit.


* Aim : - To deploy the clusters , by grouping together computers so that work l
oad is balanced and people will get faster access , according to their needs bec
ause congestion will be avoided by assigning different tasks to different machin
es.
* Introduction:-
What Is Clustering :-
A computer cluster is a group of linked computers, worki
ng together closely so that in many respects they form a single computer. The co
mponents of a cluster are commonly, but not always, connected to each other thro
ugh fast local area networks. Clusters are usually deployed to improve performan
ce and/or availability over that of a single computer, while typically being muc
h more cost-effective than single computers of comparable speed or availability
Cluster allows you to connect a group of computers (called nodes or members) to
work together as a cluster. It provides a wide variety of ways to configure hard
ware and software to suit your clustering needs (for example, a cluster for shar
ing files on a GFS file system or a cluster with high-availability service fail-
over).
Network File System (NFS) : -
NFS allows a system to share directories and fil
es with others over a network. By using NFS, users and programs can access files
on remote systems almost as if they were local files. Network File System (NFS)
is a network file system protocol originally developed by Sun Microsystems in 1
984. The Network File System is an open standard defined in RFCs, allowing anyon
e to implement the protocol.
Some of the most notable benefits that NFS can provide are:
Local workstations use less disk space because commonly used data can be stored
on a single machine and still remain accessible to others over the network.
There is no need for users to have separate home directories on every network ma
chine. Home directories could be set up on the NFS server and made available thr
oughout the network.
Storage devices such as floppy disks, CDROM drives, and USB Thumb drives can be
used by other machines on the network. This may reduce the number of removable m
edia drives throughout the network.

Web Based Application:


We will Develop a web based application for MPSTME, which contains the following
features :-
- Login form for Students, Faculties, and Administrator.
- Students will create an account and fill all his/her information.
- Faculties will Do Attendance posting, internals and term work information for
each student. Faculties can further add, delete or modify these info.
- Students can view their attendance,term-work and internals.
- Faculties will post any news or announcement.

* Technical Details :-
To Configure Clusters We need Operating Systems. We have Chosen “Red Hat Enterpris
e Linux 5 Sever” as an O.S
To set up a cluster, you must connect the nodes to certain cluster hardware and
configure the
nodes into the cluster environment.
Hardware Requirement :-
Setting up hardware consists of connecting cluster nodes to other hardware requi
red to run a Red
Hat Cluster. The amount and type of hardware varies according to the purpose an
d availability
requirements of the cluster. Typically, an enterprise-level cluster requires th
e following type of
Hardware :-
• Cluster nodes — Computers that are capable of running Red Hat Enterprise Linux 5 s
oftware, with
at least 1GB of RAM. The maximum number of nodes supported in a Red Hat Cluste
r is 16.
But we will use accprding 2 our requirement.
• Ethernet switch or hub for public network — This is required for client access to
the cluster.
• Ethernet switch or hub for private network — This is required for communication am
ong the cluster
nodes.
• Storage — Some type of storage is required for a cluster.
Cluster Suite Overview

* Why Red Hat Linux ??????


- Since it is an open source O.S ,so it's cost-effective.
-More Secure as compared to other O.S.
-Easy to configure and maintain.

* Innovation/Usefulness :-
We will Deploy Clustering at our college MPSTME, Shirpur , where students/facult
ies can store their Data which will be shared by all. Every one can get access t
o data, remove the data , modify the data.
Data will be stored in Clusters Machine.
We will deploy squid server , so that we can filters websites ( no need for Fort
iguard firewall, when work can be done for free :) ).

Vous aimerez peut-être aussi