Need Assignment Help - Blog

Thanks for your submission. We'll be in touch soon.
Explained: Centralized Computing

Do you want to know about centralized computing but unable to find suitable information anywhere. Then your search is completed here at NeedAssignmentHelp. We have collected the information about centralized computing which can be beneficial for you.

Today, the computers have become much more popular in business due to a reduction in their size and its cost. People started purchasing computers for departmental use which led to their expansion across their business.

The growth of Centralized Computing

Initially, there were some geographically dispersed systems which were used as independent computers. Those computers could not interact or communicate with each other. Thus, they were also called “Decentralized systems”. The management and control of any system purchased was the responsibility of the Department itself.

Through the years, in order to communicate and interact with each other, these independent computer systems were connected using networking technology. Today, we see this type of geographically dispersed configuration which is also known as “Centralized computing”. For instance, since there is a similarity between independent computers communicating, sometimes, the independent programs running on the same server communicate with each other which is characterized as the centralized computing.

Moreover, the centralized computing can also be defined as several independent computers in multiple locations whose programs can communicate with each other, over a network using text or other forms of interaction.

What is Centralized Computing?

Centralized Computing” refers to a model of computing or a little quantity of prevailing servers present at a common position which fulfills the requirements of computing of a huge amount of end users. Earlier, the centralized computing was the only computing system since typically there was only one computer in a business. In order to get their work done, all the users had to come to the one and only central system.

Ultimately, terminals with no local processing capability were directly connected to the computers to allow users to connect with the central computer without materially going to the machine for service.

Generally, a single computer system is required for a centralized system and interaction with other computer systems is unavailable.

  • Computer Systems for General Purposes: Ranging from a single to couple of CPU’s make up the core of this system. Attached through a common bus are a number of device controllers. These provide access to shared memory.
  • Single-user system: It usually has a single CPU unit with one and sometimes two hard disks with the OS Supporting a single user.
  • Multi User Computing System: It has multiple CPUs which facilitates concurrency control and crash recovery.

Characteristics Features of The Centralized Computing System

A centralized computing system is one where numerous dispersed sites have a sluggish connection available to a corporate data center. Individual domain controller, global catalog servers, and exchange servers are included in different branches. When the networks are unable to handle traffic to the data center for services, then the centralized computing system is adopted. Therefore, the operating system and messaging servers will be placed locally.

In case if the user’s availability and experience requirement cannot be effectively completed through data center connection or corporate hub, then you may have no alternative except placing servers in the remote sites.

The Characteristics of The Exchange Computing Office Deployment Include:

  • The centralized system consists of a large number of the locations, each comprising of a domain controller, an exchange server and any global catalog server.
  • Either they work or not, there is a single point of failure and control too.
  • The computing system office locations generally contain a less or varying number of users.
  • The connectivity is generally structured as a data center or central hub.
  • The new connections between the computing system’s office locations and the data center are normally of low capacity, short delay or uncertain.
  • The components are shared by all users at all times.
  • All means and resources and are obtainable.
  • Same programming language and compiler is used for all parts of construction.

Advantages and Disadvantages of Centralized Computing

Centralized computing is the processing in which the centrally located computer system processes the data. In order to gain fast access for this process, a powerful system is required. All the data gets stored into the centralized data storage. The protection and authorized access is the responsibility of an administrator.

Benefits of The Centralized Computing Processing:

  • Centralized computing processing reduces the expenditure as it does not point up on additional machines and hardware.
  • Effective data security can be obtained through centralized computing processing.
  • The data available on individual information system is dependent on added information systems.

Drawbacks of Centralized Computing Processing:

  • Central information system demands large data storage.
  • Local accountability will get reduced by centralized computing processing.
  • Ability to response is reduced to the information request timely.
  • Requires a high cost in transmitting transactions.

Examples for Centralized Computing System

  • Telephony- Microsoft’s Skype
  • Content distribution-Akmai NetSession
  • Content distribution-Bit Torrent
  • Key value store-Amazon Dynamo
  • Volunteer computing- SETI@home/BONIC

Furthermore, the world is yet to see national and international company fully running its operations on a much better qualified decentralized ledger technology.

At this phase, modern centralized systems incorporated by all existing organizations have strengths because hackers had time to understand how centralized systems work and hack. However, it does not means that vulnerability to attacks is an inherent weakness of any centralized computing system.

Posted on July 9, 2018 by NAH
  • Social Sharing :