whatsapp

Need Assignment Help - Blog

Thanks for your submission. We'll be in touch soon.
Explained: Centralized Computing

Do you want to know about centralized computing but unable to find suitable information anywhere. Then your search is completed here at Need Assignment Help. We have collected information about centralized computing which can be beneficial for you.

Today, computers have become much more popular in business due to a reduction in their size and their cost. People started purchasing computers for departmental use which led to their expansion across their business.

The Growth of Centralized Computing

Initially, there were some geographically dispersed systems that were used as independent computers. Those computers could not interact or communicate with each other. Thus, they were also called “Decentralized systems”. The management and control of any system purchased was the responsibility of the Department itself.

Through the years, in order to communicate and interact with each other, these independent computer systems were connected using networking technology. Today, we see this type of geographically dispersed configuration which is also known as “Centralized computing”. For instance, since there is a similarity between independent computers communicating, sometimes, the independent programs running on the same server communicate with each other which is characterized as the centralized computing.

Moreover, centralized computing can also be defined as several independent computers in multiple locations whose programs can communicate with each other, over a network using text or other forms of interaction.

What is Centralized Computing?

“Centralized Computing” refers to a model of computing or a little quantity of prevailing servers present at a common position that fulfills the requirements of computing of a huge amount of end-users. Earlier, the centralized computing was the only computing system since typically there was only one computer in business. In order to get their work done, all the users had to come to the one and the only central system.

Ultimately, terminals with no local processing capability were directly connected to the computers to allow users to connect with the central computer without materially going to the machine for service.

Generally, a single computer system is required for a centralized system, and interaction with other computer systems is unavailable.

  • Computer Systems for General Purposes: Ranging from a single to a couple of CPUs make up the core of this system. Attached through a common bus are a number of device controllers. These provide access to shared memory.
  • Single-user system: It usually has a single CPU unit with one and sometimes two hard disks with the OS Supporting a single user.
  • Multi-User Computing System: It has multiple CPUs which facilitates concurrency control and crash recovery.

Characteristics Features of The Centralized Computing System

A centralized computing system is one where numerous dispersed sites have a sluggish connection available to a corporate data center. Individual domain controllers, global catalog servers, and exchange servers are included in different branches. When the networks are unable to handle traffic to the data center for services, then the centralized computing system is adopted. Therefore, the operating system and messaging servers will be placed locally.

In case if the user’s availability and experience requirement cannot be effectively completed through a data center connection or corporate hub, then you may have no alternative except placing servers in the remote sites.

The Characteristics of The Exchange Computing Office Deployment Include:

  • The centralized system consists of a large number of the locations, each comprising of a domain controller, an exchange server, and any global catalog server.
  • Either they work or not, there is a single point of failure and control too.
  • The computing system office locations generally contain a less or varying number of users.
  • The connectivity is generally structured as a data center or central hub.
  • The new connections between the computing system’s office locations and the data center are normally of low capacity, short delay, or uncertainty.
  • The components are shared by all users at all times.
  • All means and resources and are obtainable.
  • The same programming language and compiler are used for all parts of the construction.

Advantages and Disadvantages of Centralized Computing

Centralized computing is the processing in which the centrally located computer system processes the data. In order to gain fast access to this process, a powerful system is required. All the data gets stored in the centralized data storage. The protection and authorized access is the responsibility of an administrator.

Benefits of The Centralized Computing Processing:

  • Centralized computing processing reduces the expenditure as it does not point up on additional machines and hardware.
  • Effective data security can be obtained through centralized computing processing.
  • The data available on the individual information system is dependent on added information systems.

Drawbacks of Centralized Computing Processing:

  • Central information system demands large data storage.
  • Local accountability will get reduced by centralized computing processing.
  • Ability to response is reduced to the information request timely.
  • Requires a high cost in transmitting transactions.

Examples for Centralized Computing System

  • Telephony – Microsoft’s Skype
  • Content distribution – Akmai NetSession
  • Content distribution – Bit Torrent
  • Key-value store – Amazon Dynamo
  • Volunteer computing – SETI@home/BONIC

Furthermore, the world is yet to see the national and international company fully running its operations on a much better qualified decentralized ledger technology.

At this phase, modern centralized systems incorporated by all existing organizations have strengths because hackers had time to understand how centralized systems work and hack. However, it does not means that vulnerability to attacks is an inherent weakness of any centralized computing system.

Read also: What is Manufacturing Engineering and What Do Manufacturing Engineers Do?

Posted on July 9, 2018 by NAH
  • Social Sharing :