Utility Computing vs Grid Computing: Sorting The Differences

Utility Computing 

The Pacific Ocean is a water body, but not all water bodies are Pacific Oceans. This may be oversimplifying the situation but you do get the drift. Grid computing and utility computing, though sharing several attributes with cloud computing, are merely subsets of the latter. They may also be considered as implementations of cloud computing, rather than being different names for the same technology.

Before analyzing this further, it is necessary to define grid computing and utility computing. It is noteworthy that the nomenclature of both grid and utility computing is derived from the electricity system. The first term originated from Ian Foster’s and Carl Kesselman’s seminal work, “The Grid: Blueprint for a new computing infrastructure” (2004), as a metaphor for making computer power as easy to access as an electric power grid. “Utility computing” originates from the process of making IT infrastructure and resources available as a metered service similar to a traditional public utility like electricity.

Grid computing

Can be defined as the use of computer resources from multiple administrative domains to reach a common goal. It can be considered as a distributed system with non-interactive workloads involving a large number of files, yet more loosely coupled, heterogeneous, and geographically dispersed as compared to cluster computing. In its simplest form, grid computing may be represented as a “super virtual computer” composed of many networked loosely coupled computers acting together to perform humongous tasks.

Utility computing

Utility computing involves the renting of computing resources such as hardware, software and network bandwidth on an as-required, on-demand basis. In other words, what were earlier considered products, are treated as services in utility computing. The idea was first propounded by American computer scientist John McCarthy of MIT as early as 1961, when he had said, “If computers of the kind I have advocated become the computers of the future, then computing may someday be organized as a public utility just as the telephone system is a public utility… The computer utility could become the basis of a new and important industry.”

Utility computing vs Grid Computing

Although both grid computing and utility computing were precursors to cloud computing, nowadays they can be considered as implementations of the latter (but not always, as I’ve explained later). For cloud computing does everything grid computing and utility computing do, and much more. For example, cloud computing is not restricted to specific networks, but is accessible through the biggest network of them all – the Internet. Also, virtualization of resources and its consequent advantages of scalability and reliability are much more pronounced in cloud computing.

Note that utility computing can be implemented without cloud computing. Consider a supercomputer that rents out processing time to multiple clients. This is an example of utility computing as users pay for resources used. However, with only one location and no virtualization of resources, it cannot be called cloud computing. At the same time, grid computing may always be considered a weaker form of cloud computing as there’s always some virtualization involved. However, chances of a grid failing due to failure of a single location that may be considered more important than the others is a distinct possibility, unlike cloud computing where redundancy makes such situations manageable.

At the end of the day, we can say that grid computing is a weaker form of cloud computing, bereft of many of the benefits that the latter can provide. As for utility computing, it may be considered more of a business model than a specific technology. Although cloud computing supports utility computing, not all utility computing is based on the cloud.

By Sourya Biswas

Kokumai

Identity Assurance – Sufficient and Necessary Conditions

Identity Assurance It is not easy to define the 'sufficient condition' for describing a set of processes used to establish that a natural person is real, unique, and identifiable; criminals keep coming up with hitherto ...
Efficient Dispatch Operations with Spare Location Intelligence for DSPs

Efficient Dispatch Operations with Spare Location Intelligence for DSPs

Digitally transform operations of field technicians, design & planning team to reduce overall MTTR by 45% Most of the Digital Service Providers (DSPs) are struggling with the rising cost of repeat-dispatch and a higher Mean ...
Gary Bernstein

5 Notable Proxy Servers Adding That Extra Layer Of Privacy

What’s A Proxy Server? A proxy server is a gateway between the user and the internet. This is an intermediary server that separates end users from the websites they browse. It’s completely legal to use ...
Data Web Accessibility

Protecting Yourself from the Rise in Ransomware this Holiday Season

Rise in Ransomware The Baltimore Public Schools system was already dealing with pandemic learning conditions when it was hit by a ransomware attack the day before Thanksgiving. School officials were calling it a "catastrophic attack ...
Gary Bernstein

Exposed Data From 21 Million VPN Mobile Users

Exposed Data From 21 Million VPN Mobile Users The data and credentials from 21 million mobile VPN users were found for sale last week in an internet forum. A cyber thief posted the credentials for ...
Scott Leatherman

Beware the Perils of Blind Cloud Provisioning

The COVID-19 Rush to the Cloud Results in Steep Costs and Chaos For many companies, their data center capacity was not built for the instant tsunami-sized jolt of increased load caused by the global pandemic ...