Skip to main content

刀片服务器(Blade Server)

刀片服务器Blade Server),一种单板型态的服务器,于2001年由RLX公司提出。
传统直立式服务器,体积大且又占空间,当企业使用多台服务器时,主机存放空间更是可观。因此有机架式(Rack Mount)的服务器主机出现,将数台1U高度的主机放置机柜统一管理。1个全高的机柜约42U的空间,内部容积高度约1867mm。
而刀片服务器则是机架式主机仿效网络及电信设备的卡板式设计再进化。更合乎商业经济运用而设计,比机架式主机更省空间。刀片服务器有一个完整的机 座,统一集中的方式,提供电源、风扇散热、网络通信等功能。而基座上可插置多张单板电脑,因状似刀片(Blade),因此称之为刀片服务器,而基座则称之 为刀片基座。
IBM HS20 blade server
由于刀片服务器上,密集的单板电脑组装特性,导致它对于电源的供应与散热的需求比一般的服务器来得高。在一个散热不佳的机房中,刀片服务器比一般的服务器更容易导致过热死机。而且就以带宽计费的主机代管机房而言,主要的费用是以其租用的带宽计费,而非承租的机柜空间的单位数计费,故较无采用刀片服务器的需求。但以承租的机柜空间单位数计费的机房及簇运算则会使用刀片服务器以在有限的空间容纳更多的电脑。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...