Compared with other HPC clusters, Elastic High Performance Computing (E-HPC) clusters provide deployment flexibility, resource elasticity, data security, availability, and visualization.
Benefits of E-HPC clusters
You can create E-HPC clusters in the E-HPC console in a few steps. You can deploy a high-performance computing environment and application software in a few clicks. This E-HPC cluster provides high processing power for difficult scenarios. After you create an E-HPC cluster, you can submit jobs to the cluster for computing.
E-HPC monitors the load of nodes in each E-HPC cluster based on the usage of the job queue. It can then be used to dynamically adjust the computing resources. If the job queue is empty, the E-HPC cluster scales down to the specified minimum number of nodes. When one or more jobs are submitted to the job queue, a suitable number of nodes are created to make full use of the computing resources.
High data security
E-HPC clusters are isolated from each other by using VPCs. Security groups are used to implement triple access control among the nodes of the E-HPC clusters in a VPC. This feature ensures the network security for E-HPC clusters.
The data of E-HPC clusters is stored in Apsara File Storage NAS. The transmission encryption and storage encryption features of NAS can protect the data from theft or tampering. The data is replicated into multiple copies and stored at the backend of NAS. This feature can be used to significantly increase data security.
E-HPC cluster nodes are deployed based on Elastic Compute Service (ECS), Super Computing Cluster (SCC), and Elastic GPU Service resources. This significantly improves the availability of the E-HPC clusters.
E-HPC provides the Virtual Network Computing (VNC) service, which allows you to visualize computing results as graphics. For example, you can view the rendered effects of animations or the cinemagraphs of weather changes.
Benefits of E-HPC over traditional computing clusters
Traditional computing cluster
Data is stored in the cloud to ensure high reliability.
Data is stored on clients. Data security is compromised because access to the data is not controlled.