3 Person Teamwork

Post on 13-Apr-2017

70 views 0 download

transcript

How is Life, with the CloudPresented by : “Sky” Gagndeep, Danny Dupont, and Lee Thomas

Data Centers(Availability)• Data Center in Vaughn, Toronto Ontario,

Canada• Information Storage facility• Server Farms

Cost(Savings)• Cost saving in IT• People/Software/Hardware

Demand• Information & Data• Taxing current ways of Storage

Management of personnel / Security /Development• Ability for management to fully

control company• Development control• Security – employees• Unified decisions – communicating

together

Scale• Growing company – cost• Storage, networking• Bottomline

How the Cloud Benefits Gaming

In todays world the Gaming industry is part of many peoples lives

Whether its PC gaming, Console gaming or gaming on a mobile device, its all around us.

But even though its everywhere, most people (even the people who play games everyday) don’t understand it.

Data Centers• Data centers are these huge rooms solely made up of networked

servers for the specific reasons of remote storage, processing, or distributing large amounts of data.

• The purpose of these data centers is to increase overall gaming performance by providing the storage and dedicated server demand games need to function properly.

Dedicated Servers

Every time someone logs into a game they are immediately given a dedicated server.

This increases the speed and performance of the game, giving the gamer a real-time sense that optimizes the games performance and enhances the gaming experience.

Server Power In order for these Data centers that are full

of servers constantly under such high demand to function as intended they need to be powerful.

These servers hold some of the most advanced technology to date such as very high performance CPU’s and RAM. Otherwise they would not meet the demand that the world puts on them.

Lag Switching

While most people play games on cloud servers for fun there are always a few that would rather cheat instead of following the rules.

Having a dedicated server prevents people from lag switching which essentially modifies the game experience to give one player an advantage over others.

Host Servers In order for a game to be played there must be a host server for all the

dedicated servers to connect to.

The host server is accessed through the internet and provides an isolated environment for the game to be played on. Which creates a faster more enjoyable gaming experience.

Information Architectures

Servers that are associated with cloud gaming must have a strong, well thought out information architecture.

So that the information being sent and received in the game is handled properly and sent back to the right designated server.

Without this architecture the game is liable to be sending someone’s data to a different person and that can cause serious problems.

Maximizing the Game

Before there were designated servers or data centers, companies had to reserve a certain amount of server space for their games.

With that process there’s no room for expansion.

In todays gaming world there is no limit to how big a game can expand because of the massive data centers all over the world that are for rent.

Server Pooling Because of a cloud type network,

multiple server farms are able to connect to each other all at once.

This allows virtually unlimited server space for any gaming company to rent.

Server pooling allows for the gamer to have a great experience online without even knowing why.

Cloud for Consumer

Availability

• Cloud have service level agreement that guarantees at least 99.99% availability.

• So it is available almost all time to use with an internet connection.

·If the network service is suffering from slow speed or frequent outages cloud computing may be not suitable.

·Maintaining an adequate network connectivity particularly in rural area remains a significant concern.

·there are too many cloud based apps make it difficult to get consumer services.

Network connection concerns -

Security –

·Like any information system cloud system are vulnerable to hackers, encryption failure, computer viruses and end-user abuse of privileges