Feeds

CERN BOFH needs a bigger storage array

Networking the secrets of the universe

Build a business case: developing custom apps

The data from the LHC experiments will be distributed around the world. A primary backup will be recorded on tape at CERN. After initial processing, this data will be distributed to 11 Tier-1 centres, large computer centres with sufficient storage capacity. Smaller (Tier-2) centres will handle the analysis of specific tasks.

Processing this data requires the power of around 100,000 desktop CPUs, a figure that's stayed the same at CERN for around seven years. Processor speed increases have kept track with the growth in data that colliders generate. Advances in communication technology have allowed CERN to bring in partner organisations in its research.

David Foster, head of communications systems at CERN, runs the team behind this behemoth network. He's also responsible for a campus network that supports 2,500 staff at CERN and thousands of visiting scientists, as well as mobile and Wi-Fi infrastructures for the lab, and hundreds of kilometers of cables in the underground installations at CERN.

"Changes in networking have enabled a rethink of our whole business model. We can have a global research network - rather than one that is centrally located thanks to advances in communications technology," he said.

Moving data onto storage and then off to be processed is a major headache, Foster explained. Tape is still the most effective way to store data, but it brings its own problems. "Tape is slow and not progressing particularly quickly. Solid state memory and solid state storage are important things to look at," Foster told delegates at the NetEvents conference in Malta last week. "Fast networks alone are not enough."

He said the LHC would seek to answer questions such as "where do particles get mass", and other fundamental questions of physics. The project is costing a cool $5bn but it's money well spent, Foster argues.

"Quite apart from the possible spin-off if we fail to look into the fundamentals of the universe we lose so much. It's in human nature to be curious," Foster told El Reg. ®

The essential guide to IT transformation

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
Banking apps: Handy, can grab all your money... and RIDDLED with coding flaws
Yep, that one place you'd hoped you wouldn't find 'em
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Ballmer leaves Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Primetime precrime? Minority Report TV series 'being developed'
I have to know. I have to find out what happened to my life
Broadband slow and expensive? Blame Telstra says CloudFlare
Won't peer, will gouge for Internet transit
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.