SlideShare uma empresa Scribd logo
1 de 4
Centralized vs. Distributed Messaging Systems

       If your company is composed of offices all connected by high-bandwidth,
reliable network connections, regardless of the distance between offices, you can
implement a centralized messaging system. A centralized messaging system means
that all of your Exchange servers are located and managed in a central data center
and that you have a single routing group. When planning your messaging system, it
is best to start with this model in mind because it is the most cost-effective and
easily managed.

       If your company contains remote offices with low-bandwidth, high-latency,
unreliable       network connections, you can introduce routing groups to control how
messaging        traffic is routed from one location to another. However, remote
locations and multiple routing groups do not prevent you from centralizing your
administrative    model.   In   addition,   with   the   features   in   Microsoft    Windows
Server™ 2003, Exchange 2003, and               Microsoft Office Outlook® 2003, you also
have the opportunity to consolidate your server hardware by removing Exchange
servers from remote sites. With these          changes, users can log on remotely to
Microsoft Windows® services and Exchange 2003 and experience fewer problems
related to performance degradation or connectivity.

       This topic     discusses the characteristics       of centralized and distributed
messaging        systems and gives you some guidelines for planning each model.

Centralized computing is computing done at a central location, using terminals
that are attached to a central computer. The computer itself may control all the
peripherals directly (if they are physically connected to the central computer), or
they may be attached via a terminal server. Alternatively, if the terminals have the
capability, they may be able to connect to the central computer over the network.
The terminals may be text terminals or thin clients, for example.
It offers greater security over decentralized systems because all of the processing is
controlled in a central location. In addition, if one terminal breaks down, the user can
simply go to another terminal and log in again, and all of their files will still be
accessible. Depending on the system, they may even be able to resume their session
from the point they were at before, as if nothing had happened.
This type of arrangement does have some disadvantages. The central computer
performs the computing functions and controls the remote terminals. This type of
system relies totally on the central computer. Should the central computer crash, the
entire system will go down.



                 Characteristics of a Centralized Messaging System
       A centralized messaging system consists of a large data center that hosts all
server resources, including the Active Directory® directory service global catalog
servers, domain controllers, and Exchange servers. The data center supports all
messaging system users, whether they connect locally or remotely. The following are
characteristics of a centralized messaging system:


   •   Data is hosted and managed in a centralized location regardless of whether
       the users are connected remotely. This contrasts with the distributed model,
       where users have local access to mailboxes but server administration is more
       complex.
   •   Software upgrades can be rolled out from a centralized location.
   •   The   data     center    incorporates   power-insulating     devices    such    as   an
       uninterruptible power supply (UPS) and "hot site" or "cold site" contingencies.
       A hot site is a full-service commercial site that provides all of the equipment



                                                                                             1
needed for a company to continue operations in the event of a disaster. A
       cold site is a service that provides space but that the company must furnish
       and set up. A hot site gets the company up and running faster, but a cold site
       is a less expensive option.


       Business    requirements      associated     with    reducing       cost   and   security
requirements are      usually the driving forces behind centralizing systems. The
requirements revolve around location centralization (reducing the number of sites
that provide server resources), physical consolidation (replacing smaller servers with
high-end servers),    administrative      consolidation,       and     data       consolidation
(centralizing storage solutions        that    provide     backup    and    disaster    recovery
capabilities).

       Important Considerations
       Consider a centralized design only if prerequisites in the following areas are
already met or are included in the project plan:


   •   Data center hardware costs             Weigh the cost of installing high-end servers
       and clusters in the data center against the administrative cost savings of
       centralizing the servers. It is recommended that you cluster the back-end
       servers to build high availability and redundancy into the system, but this
       involves greater costs up front. However, these costs may be more than
       offset by reductions in operational costs, infrastructure costs, reduced
       downtime, and greater scalability.
   •   Contingency planning       When you centralize your server and data resources
       across the organization, you increase the possible single points of failure. You
       must formulate contingency plans in the event your data center is subjected
       to a catastrophic event.
   •   Operational and administrative cost reductions                      Centralizing server
       resources reduce operational costs because service capacity and growth are
       achieved with better use of resources. It also reduces infrastructure costs
       associated with storage and backup requirements.
   •   Data storage     With larger centralized data volumes, you must use more
       reliable storage systems to improve the integrity of your data. In addition, by
       reducing the complexity of your server infrastructure, you can more readily
       restore services and data when a failure occurs.
   •   Security    A centralized model gives you easier security management, thus, a
       greater degree of control. This control makes it easier for security staff to
       maintain up-to-date virus signatures and take timely action in response to
       security incidents. Another advantage of a centralized design is that it locates
       your servers in a data center that you can physically secure.




Decentralized computing is a trend in modern day business environments. This is the
opposite of centralized computing, which was prevalent during the early days of
computers. Decentralized computing is the allocation of resources, both hardware and
software, to each individual workstation, or office location. In contrast, centralized
computing exists when the majority of functions are carried out, or obtained from a
remote centralized location.
A decentralized computer system has many benefits over a conventional centralized
network. Desktop computers have advanced so rapidly, that their potential performance
far exceeds the requirements of most business applications. This results in most desktop


                                                                                              2
computers remaining idle (in relation to their full potential). A decentralized system can
utilize the potential of these systems to maximize efficiency. However, it is debatable
whether these networks increase overall effectiveness.
All computers have to be updated individually with new software, unlike a centralized
computer system. Decentralized systems still enable file sharing and all computers can
share peripherals such as printers and scanners as well as modems, allowing all the
computers in the network to connect to the internet.
A collection of decentralized computers systems are components of a larger computer
network, held together by local stations of equal importance and capability. These
systems are capable of running independently of each other.




                   Characteristics of a Distributed Messaging System


          A branch office or distributed messaging deployment is one where numerous
branch             offices or smaller distributed sites have slow connections to a
corporate hub or data center. The branches contain their own Exchange servers,
domain controllers, and global catalog servers. A distributed messaging system is
usually adopted when the network cannot handle traffic to a central hub for services,
so    the   operating     system   and   messaging    servers   are   placed   locally.   User
requirements may be another factor. If the requirements for user experience and
availability cannot be met by connecting to a data center, you may have no choice
but to place servers in the remote sites.

          An Exchange branch office deployment has the following characteristics:


      •   The messaging system consists of a large number of locations (branches),
          each containing an Exchange server, domain controllers, and at least one
          global catalog server.
      •   The branch office locations usually contain a small or varying number of
          users.
      •   The network is usually structured as a hub-and-spoke topology.
      •   The network connections between the branch office locations and the central
          hub or data center are typically low-bandwidth, high-latency, or unreliable.


          The main reasons behind deploying a distributed messaging system include
the       following:


      •   The company's users are dispersed across sites.
      •   The company's network infrastructure cannot handle traffic to a central hub
          for services.
      •   The user requirements dictate that a server be placed locally to provide
          optimal user experience and availability.


                                    Important Considerations



      •   Operational and administrative costs           Distributed messaging systems
          require more servers and result in higher operational and administrative
          costs.




                                                                                            3
•   Data storage      With distributed servers, the service infrastructure is more
    complex, which makes it more difficult to restore services and data when a
    failure occurs.
•   Network connections        For remote offices, it is recommended that the
    network connection to the hub site or data center be no less than 56 Kbps
    between servers. Between a hub and an office, however, a higher connection
    speed is recommended.
•   Security   The physical security of servers in branch offices is a major
    consideration. In a branch office design, you must take precautions to ensure
    that servers are not located in open areas and that they are physically
    secured.




                                                                                4

Mais conteúdo relacionado

Mais procurados

Introduction to parallel_computing
Introduction to parallel_computingIntroduction to parallel_computing
Introduction to parallel_computingMehul Patel
 
Distributed computing
Distributed computingDistributed computing
Distributed computingshivli0769
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine TechnologySamip jain
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud ComputingNephoScale
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applicationsBurhan Ahmed
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)Krishna Kahar
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud ComputingRishikese MR
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its TypesHTS Hosting
 
Deployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptxDeployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptxJaya Silwal
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualizationDr.Neeraj Kumar Pandey
 
Data center virtualization
Data center virtualizationData center virtualization
Data center virtualizationmazin Salih
 
LAN , MAN , WAN introduction
LAN , MAN , WAN introductionLAN , MAN , WAN introduction
LAN , MAN , WAN introductionbhavna sahajwani
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating systemudaya khanal
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloudsagaroceanic11
 

Mais procurados (20)

Introduction to parallel_computing
Introduction to parallel_computingIntroduction to parallel_computing
Introduction to parallel_computing
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud Computing
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
 
Block Level and File Level
Block Level and File LevelBlock Level and File Level
Block Level and File Level
 
3.1.2 classification of network
3.1.2 classification of network3.1.2 classification of network
3.1.2 classification of network
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
 
Deployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptxDeployment Models of Cloud Computing.pptx
Deployment Models of Cloud Computing.pptx
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
04 Client Server Technology
04 Client Server Technology04 Client Server Technology
04 Client Server Technology
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Data center virtualization
Data center virtualizationData center virtualization
Data center virtualization
 
LAN , MAN , WAN introduction
LAN , MAN , WAN introductionLAN , MAN , WAN introduction
LAN , MAN , WAN introduction
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
 

Semelhante a Centralized vs distrbution system

Traditioanal vs-cloud based Data Centers
Traditioanal vs-cloud based Data CentersTraditioanal vs-cloud based Data Centers
Traditioanal vs-cloud based Data CentersShreya Srivastava
 
Research Paper  Find a peer reviewed article in the following d.docx
Research Paper  Find a peer reviewed article in the following d.docxResearch Paper  Find a peer reviewed article in the following d.docx
Research Paper  Find a peer reviewed article in the following d.docxeleanorg1
 
Distributed Processing
Distributed ProcessingDistributed Processing
Distributed ProcessingImtiaz Hussain
 
Data Center Solutions: Radical Shift toward Design-Driven Innovation
Data Center Solutions: Radical Shift toward Design-Driven InnovationData Center Solutions: Radical Shift toward Design-Driven Innovation
Data Center Solutions: Radical Shift toward Design-Driven InnovationNetmagic Solutions Pvt. Ltd.
 
Unit 2 part 1.pptx
Unit 2 part 1.pptxUnit 2 part 1.pptx
Unit 2 part 1.pptxSargamKuntal
 
Research Paper  Find a peer reviewed article in the following dat.docx
Research Paper  Find a peer reviewed article in the following dat.docxResearch Paper  Find a peer reviewed article in the following dat.docx
Research Paper  Find a peer reviewed article in the following dat.docxaudeleypearl
 
Cloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptxCloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptxDeepikaPardeshi1
 
Data Centre Overview
Data Centre OverviewData Centre Overview
Data Centre OverviewLogicalis
 
Logicalis - Data Centre Overview
Logicalis - Data Centre OverviewLogicalis - Data Centre Overview
Logicalis - Data Centre OverviewLogicalis
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready referenceHelly Patel
 
distributed computing: Unleashing collaborative computing power.ppt
distributed computing: Unleashing collaborative computing power.pptdistributed computing: Unleashing collaborative computing power.ppt
distributed computing: Unleashing collaborative computing power.pptrutvik64
 
L4Network Architecture.pptx
L4Network Architecture.pptxL4Network Architecture.pptx
L4Network Architecture.pptxGarimaJain745610
 
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...IOSR Journals
 
Lec 6 (distributed processing )
Lec 6 (distributed processing )Lec 6 (distributed processing )
Lec 6 (distributed processing )Sudarshan Mondal
 

Semelhante a Centralized vs distrbution system (20)

SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
 
Distributed dbms (ddbms)
Distributed dbms (ddbms)Distributed dbms (ddbms)
Distributed dbms (ddbms)
 
Traditioanal vs-cloud based Data Centers
Traditioanal vs-cloud based Data CentersTraditioanal vs-cloud based Data Centers
Traditioanal vs-cloud based Data Centers
 
Research Paper  Find a peer reviewed article in the following d.docx
Research Paper  Find a peer reviewed article in the following d.docxResearch Paper  Find a peer reviewed article in the following d.docx
Research Paper  Find a peer reviewed article in the following d.docx
 
Distributed Processing
Distributed ProcessingDistributed Processing
Distributed Processing
 
Coolie @ call
Coolie @ callCoolie @ call
Coolie @ call
 
Data Center Solutions: Radical Shift toward Design-Driven Innovation
Data Center Solutions: Radical Shift toward Design-Driven InnovationData Center Solutions: Radical Shift toward Design-Driven Innovation
Data Center Solutions: Radical Shift toward Design-Driven Innovation
 
Unit 2 part 1.pptx
Unit 2 part 1.pptxUnit 2 part 1.pptx
Unit 2 part 1.pptx
 
Research Paper  Find a peer reviewed article in the following dat.docx
Research Paper  Find a peer reviewed article in the following dat.docxResearch Paper  Find a peer reviewed article in the following dat.docx
Research Paper  Find a peer reviewed article in the following dat.docx
 
Cloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptxCloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptx
 
Data Centre Overview
Data Centre OverviewData Centre Overview
Data Centre Overview
 
Logicalis - Data Centre Overview
Logicalis - Data Centre OverviewLogicalis - Data Centre Overview
Logicalis - Data Centre Overview
 
work example
work examplework example
work example
 
Cloud ready reference
Cloud ready referenceCloud ready reference
Cloud ready reference
 
Unit-II-part 3.pdf
Unit-II-part 3.pdfUnit-II-part 3.pdf
Unit-II-part 3.pdf
 
distributed computing: Unleashing collaborative computing power.ppt
distributed computing: Unleashing collaborative computing power.pptdistributed computing: Unleashing collaborative computing power.ppt
distributed computing: Unleashing collaborative computing power.ppt
 
L4Network Architecture.pptx
L4Network Architecture.pptxL4Network Architecture.pptx
L4Network Architecture.pptx
 
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
 
Lec 6 (distributed processing )
Lec 6 (distributed processing )Lec 6 (distributed processing )
Lec 6 (distributed processing )
 

Mais de zirram

Youth saving account (PPT)
Youth saving account (PPT)Youth saving account (PPT)
Youth saving account (PPT)zirram
 
Youth saving accout standard chartered bank
Youth saving accout standard chartered bankYouth saving accout standard chartered bank
Youth saving accout standard chartered bankzirram
 
PIA Internship Report
PIA Internship ReportPIA Internship Report
PIA Internship Reportzirram
 
Observation
ObservationObservation
Observationzirram
 
Agricultural sector in pakistan
Agricultural sector in pakistanAgricultural sector in pakistan
Agricultural sector in pakistanzirram
 
Network topologies
Network topologiesNetwork topologies
Network topologieszirram
 
Market
MarketMarket
Marketzirram
 
Report on pepsi
Report on pepsiReport on pepsi
Report on pepsizirram
 
Enviromental pollution
Enviromental pollutionEnviromental pollution
Enviromental pollutionzirram
 
Creativity & business idea
Creativity & business ideaCreativity & business idea
Creativity & business ideazirram
 
Changing retailing in pakistan
Changing retailing in pakistanChanging retailing in pakistan
Changing retailing in pakistanzirram
 
Observation
ObservationObservation
Observationzirram
 
Report format
Report formatReport format
Report formatzirram
 
Consumer learning
Consumer learningConsumer learning
Consumer learningzirram
 
Marketing Concept
Marketing ConceptMarketing Concept
Marketing Conceptzirram
 
Marketing Enviroment
Marketing EnviromentMarketing Enviroment
Marketing Enviromentzirram
 
Marketing Segmentation
Marketing SegmentationMarketing Segmentation
Marketing Segmentationzirram
 
Brand Positioning
Brand PositioningBrand Positioning
Brand Positioningzirram
 
Brand Segmentation
Brand SegmentationBrand Segmentation
Brand Segmentationzirram
 
Hypothesis
HypothesisHypothesis
Hypothesiszirram
 

Mais de zirram (20)

Youth saving account (PPT)
Youth saving account (PPT)Youth saving account (PPT)
Youth saving account (PPT)
 
Youth saving accout standard chartered bank
Youth saving accout standard chartered bankYouth saving accout standard chartered bank
Youth saving accout standard chartered bank
 
PIA Internship Report
PIA Internship ReportPIA Internship Report
PIA Internship Report
 
Observation
ObservationObservation
Observation
 
Agricultural sector in pakistan
Agricultural sector in pakistanAgricultural sector in pakistan
Agricultural sector in pakistan
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Market
MarketMarket
Market
 
Report on pepsi
Report on pepsiReport on pepsi
Report on pepsi
 
Enviromental pollution
Enviromental pollutionEnviromental pollution
Enviromental pollution
 
Creativity & business idea
Creativity & business ideaCreativity & business idea
Creativity & business idea
 
Changing retailing in pakistan
Changing retailing in pakistanChanging retailing in pakistan
Changing retailing in pakistan
 
Observation
ObservationObservation
Observation
 
Report format
Report formatReport format
Report format
 
Consumer learning
Consumer learningConsumer learning
Consumer learning
 
Marketing Concept
Marketing ConceptMarketing Concept
Marketing Concept
 
Marketing Enviroment
Marketing EnviromentMarketing Enviroment
Marketing Enviroment
 
Marketing Segmentation
Marketing SegmentationMarketing Segmentation
Marketing Segmentation
 
Brand Positioning
Brand PositioningBrand Positioning
Brand Positioning
 
Brand Segmentation
Brand SegmentationBrand Segmentation
Brand Segmentation
 
Hypothesis
HypothesisHypothesis
Hypothesis
 

Último

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Último (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Centralized vs distrbution system

  • 1. Centralized vs. Distributed Messaging Systems If your company is composed of offices all connected by high-bandwidth, reliable network connections, regardless of the distance between offices, you can implement a centralized messaging system. A centralized messaging system means that all of your Exchange servers are located and managed in a central data center and that you have a single routing group. When planning your messaging system, it is best to start with this model in mind because it is the most cost-effective and easily managed. If your company contains remote offices with low-bandwidth, high-latency, unreliable network connections, you can introduce routing groups to control how messaging traffic is routed from one location to another. However, remote locations and multiple routing groups do not prevent you from centralizing your administrative model. In addition, with the features in Microsoft Windows Server™ 2003, Exchange 2003, and Microsoft Office Outlook® 2003, you also have the opportunity to consolidate your server hardware by removing Exchange servers from remote sites. With these changes, users can log on remotely to Microsoft Windows® services and Exchange 2003 and experience fewer problems related to performance degradation or connectivity. This topic discusses the characteristics of centralized and distributed messaging systems and gives you some guidelines for planning each model. Centralized computing is computing done at a central location, using terminals that are attached to a central computer. The computer itself may control all the peripherals directly (if they are physically connected to the central computer), or they may be attached via a terminal server. Alternatively, if the terminals have the capability, they may be able to connect to the central computer over the network. The terminals may be text terminals or thin clients, for example. It offers greater security over decentralized systems because all of the processing is controlled in a central location. In addition, if one terminal breaks down, the user can simply go to another terminal and log in again, and all of their files will still be accessible. Depending on the system, they may even be able to resume their session from the point they were at before, as if nothing had happened. This type of arrangement does have some disadvantages. The central computer performs the computing functions and controls the remote terminals. This type of system relies totally on the central computer. Should the central computer crash, the entire system will go down. Characteristics of a Centralized Messaging System A centralized messaging system consists of a large data center that hosts all server resources, including the Active Directory® directory service global catalog servers, domain controllers, and Exchange servers. The data center supports all messaging system users, whether they connect locally or remotely. The following are characteristics of a centralized messaging system: • Data is hosted and managed in a centralized location regardless of whether the users are connected remotely. This contrasts with the distributed model, where users have local access to mailboxes but server administration is more complex. • Software upgrades can be rolled out from a centralized location. • The data center incorporates power-insulating devices such as an uninterruptible power supply (UPS) and "hot site" or "cold site" contingencies. A hot site is a full-service commercial site that provides all of the equipment 1
  • 2. needed for a company to continue operations in the event of a disaster. A cold site is a service that provides space but that the company must furnish and set up. A hot site gets the company up and running faster, but a cold site is a less expensive option. Business requirements associated with reducing cost and security requirements are usually the driving forces behind centralizing systems. The requirements revolve around location centralization (reducing the number of sites that provide server resources), physical consolidation (replacing smaller servers with high-end servers), administrative consolidation, and data consolidation (centralizing storage solutions that provide backup and disaster recovery capabilities). Important Considerations Consider a centralized design only if prerequisites in the following areas are already met or are included in the project plan: • Data center hardware costs Weigh the cost of installing high-end servers and clusters in the data center against the administrative cost savings of centralizing the servers. It is recommended that you cluster the back-end servers to build high availability and redundancy into the system, but this involves greater costs up front. However, these costs may be more than offset by reductions in operational costs, infrastructure costs, reduced downtime, and greater scalability. • Contingency planning When you centralize your server and data resources across the organization, you increase the possible single points of failure. You must formulate contingency plans in the event your data center is subjected to a catastrophic event. • Operational and administrative cost reductions Centralizing server resources reduce operational costs because service capacity and growth are achieved with better use of resources. It also reduces infrastructure costs associated with storage and backup requirements. • Data storage With larger centralized data volumes, you must use more reliable storage systems to improve the integrity of your data. In addition, by reducing the complexity of your server infrastructure, you can more readily restore services and data when a failure occurs. • Security A centralized model gives you easier security management, thus, a greater degree of control. This control makes it easier for security staff to maintain up-to-date virus signatures and take timely action in response to security incidents. Another advantage of a centralized design is that it locates your servers in a data center that you can physically secure. Decentralized computing is a trend in modern day business environments. This is the opposite of centralized computing, which was prevalent during the early days of computers. Decentralized computing is the allocation of resources, both hardware and software, to each individual workstation, or office location. In contrast, centralized computing exists when the majority of functions are carried out, or obtained from a remote centralized location. A decentralized computer system has many benefits over a conventional centralized network. Desktop computers have advanced so rapidly, that their potential performance far exceeds the requirements of most business applications. This results in most desktop 2
  • 3. computers remaining idle (in relation to their full potential). A decentralized system can utilize the potential of these systems to maximize efficiency. However, it is debatable whether these networks increase overall effectiveness. All computers have to be updated individually with new software, unlike a centralized computer system. Decentralized systems still enable file sharing and all computers can share peripherals such as printers and scanners as well as modems, allowing all the computers in the network to connect to the internet. A collection of decentralized computers systems are components of a larger computer network, held together by local stations of equal importance and capability. These systems are capable of running independently of each other. Characteristics of a Distributed Messaging System A branch office or distributed messaging deployment is one where numerous branch offices or smaller distributed sites have slow connections to a corporate hub or data center. The branches contain their own Exchange servers, domain controllers, and global catalog servers. A distributed messaging system is usually adopted when the network cannot handle traffic to a central hub for services, so the operating system and messaging servers are placed locally. User requirements may be another factor. If the requirements for user experience and availability cannot be met by connecting to a data center, you may have no choice but to place servers in the remote sites. An Exchange branch office deployment has the following characteristics: • The messaging system consists of a large number of locations (branches), each containing an Exchange server, domain controllers, and at least one global catalog server. • The branch office locations usually contain a small or varying number of users. • The network is usually structured as a hub-and-spoke topology. • The network connections between the branch office locations and the central hub or data center are typically low-bandwidth, high-latency, or unreliable. The main reasons behind deploying a distributed messaging system include the following: • The company's users are dispersed across sites. • The company's network infrastructure cannot handle traffic to a central hub for services. • The user requirements dictate that a server be placed locally to provide optimal user experience and availability. Important Considerations • Operational and administrative costs Distributed messaging systems require more servers and result in higher operational and administrative costs. 3
  • 4. Data storage With distributed servers, the service infrastructure is more complex, which makes it more difficult to restore services and data when a failure occurs. • Network connections For remote offices, it is recommended that the network connection to the hub site or data center be no less than 56 Kbps between servers. Between a hub and an office, however, a higher connection speed is recommended. • Security The physical security of servers in branch offices is a major consideration. In a branch office design, you must take precautions to ensure that servers are not located in open areas and that they are physically secured. 4