图书介绍

分布式系统 原理与范型PDF|Epub|txt|kindle电子书版本网盘下载

分布式系统 原理与范型
  • (美)特尼博姆( Tanenbaum,A.S.)等著 著
  • 出版社: 北京:清华大学出版社
  • ISBN:7302172773
  • 出版时间:2008
  • 标注页数:686页
  • 文件大小:92MB
  • 文件页数:708页
  • 主题词:分布式操作系统-高等学校-教材-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

分布式系统 原理与范型PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

1 INTRODUCTION1

1.1 DEFINITION OF A DISTRIBUTED SYSTEM2

1.2 GOALS3

1.2.1 Making Resources Accessible3

1.2.2 Distribution Transparency4

1.2.3 Openness7

1.2.4 Scalability9

1.2.5 Pitfalls16

1.3 TYPES OF DISTRIBUTED SYSTEMS17

1.3.1 Distributed Computing Systems17

1.3.2 Distributed Information Systems20

1.3.3 Distributed Pervasive Systems24

1.4 SUMMARY30

2 ARCHITECTURES33

2.1 ARCHITECTURAL STYLES34

2.2 SYSTEM ARCHITECTURES36

2.2.1 Centralized Architectures36

2.2.2 Decentralized Architectures43

2.2.3 Hybrid Architectures52

2.3 ARCHITECTURES VERSUS MIDDLEWARE54

2.3.1 Interceptors55

2.3.2 General Approaches to Adaptive Software57

2.3.3 Discussion58

2.4 SELF-MANAGEMENT IN DISTRIBUTED SYSTEMS59

2.4.1 The Feedback Control Model60

2.4.2 Example:Systems Monitoring with Astrolabe61

2.4.3 Example:Differentiating Replication Strategies in Globule63

2 4.4 Example:Automatic Component Repair Management in Jade65

2.5 SUMMARY66

3 PROCESSES69

3.1 THREADS70

3.1.1 Introduction to Threads70

3.1.2 Threads in Distributed Systems75

3.2 VIRTUALIZATION79

3.2.1 The Role of Virtualization in Distributed Systems79

3.2.2 Architectures of Virtual Machines80

3.3 CLIENTS82

3.3.1 Networked User Interfaces82

3.3.2 Client-Side Software for Distribution Transparency87

3.4 SERVERS88

3.4.1 General Design Issues88

3.4.2 Server Clusters92

3.4.3 Managing Server Clusters98

3.5 CODE MIGRATION103

3.5.1 Approaches to Code Migration103

3.5.2 Migration and Local Resources107

3.5.3 Migration in Heterogeneous Systems110

3.6 SUMMARY112

4 COMMUNICATION115

4.1 FUNDAMENTALS116

4.1.1 Layered Protocols116

4.1.2 Types of Communication124

4.2 REMOTE PROCEDURE CALL125

4.2.1 Basic RPC Operation126

4.2.2 Parameter Passing130

4.2.3 Asynchronous RPC134

4.2.4 Example:DCE RPC135

4.3 MESSAGE-ORIENTED COMMUNICATION140

4.3.1 Message-Oriented Transient Communication141

4.3.2 Message-Oriented Persistent Communication145

4.3.3 Example:IBM's WebSphere Message-Queuing System152

4.4 STREAM-ORIENTED COMMUNICATION157

4.4.1 Support for Continuous Media158

4.4.2 Streams and Quality of Service160

4.4.3 Stream Synchronization163

4.5 MULTICAST COMMUNICATION166

4.5.1 Application-Level Multicasting166

4.5.2 Gossip-Based Data Dissemination170

4.6 SUMMARY175

5 NAMING179

5.1 NAMES,IDENTIFIERS,AND ADDRESSES180

5.2 FLAT NAMING182

5.2.1 Simple Solutions183

5.2.2 Home-Based Approaches186

5.2.3 Distributed Hash Tables188

5.2.4 Hierarchical Approaches191

5.3 STRUCTURED NAMING195

5.3.1 Name Spaces195

5.3.2 Name Resolution198

5.3.3 The Implementation of a Name Space202

5.3.4 Example:The Domain Name System209

5.4 ATTRIBUTE-BASED NAMING217

5.4.1 Directory Services217

5.4.2 Hierarchical Implementations:LDAP218

5.4.3 Decentralized Implementations222

5.5 SUMMARY231

6 SYNCHRONIZATION231

6.1 CLOCK SYNCHRONIZATION232

6.1.1 Physical Clocks233

6.1.2 Global Positioning System236

6.1.3 Clock Synchronization Algorithms238

6.2 LOGICAL CLOCKS244

6.2.1 Lamport's Logical Clocks244

6.2.2 Vector Clocks248

6.3 MUTUAL EXCLUSION252

6.3.1 Overview252

6.3.2 A Centralized Algorithm253

6.3.3 A Decentralized Algorithm254

6.3.4 A Distributed Algorithm255

6.3.5 A Token Ring Algorithm258

6.3.6 A Comparison of the Four Algorithms259

6.4 GLOBAL POSITIONING OF NODES260

6.5 ELECTION ALGORITHMS263

6.5.1 Traditional Election Algorithms264

6.5.2 Elections in Wireless Environments267

6.5.3 Elections in Large-Scale Systems269

6.6 SUMMARY270

7 CONSISTENCY AND REPLICATION273

7.1 INTRODUCTION274

7.1.1 Reasons for Replication274

7.1.2 Replication as Scaling Technique275

7.2 DATA-CENTRIC CONSISTENCY MODELS276

7.2.1 Continuous Consistency277

7.2.2 Consistent Ordering of Operations281

7.3 CLIENT-CENTRIC CONSISTENCY MODELS288

7.3.1 Eventual Consistency289

7.3.2 Monotonic Reads291

7.3.3 Monotonic Writes292

7.3.4 Read Your Writes294

7.3.5 Writes Follow Reads295

7.4 REPLICA MANAGEMENT296

7.4.1 Replica-Server Placement296

7.4.2 Content Replication and Placement298

7.4.3 Content Distribution302

7.5 CONSISTENCY PROTOCOLS306

7.5.1 Continuous Consistency306

7.5.2 Primary-Based Protocols308

7.5.3 Replicated-Write Protocols311

7.5.4 Cache-Coherence Protocols313

7.5.5 Implementing Client-Centric Consistency315

7.6 SUMMARY317

8 FAULT TOLERANCE321

8.1 INTRODUCTION TO FAULT TOLERANCE322

8.1.1 Basic Concepts322

8.1.2 Failure Models324

8.1.3 Failure Masking by Redundancy326

8.2 PROCESS RESILIENCE328

8.2.1 Design Issues328

8.2.2 Failure Masking and Replication330

8.2.3 Agreement in Faulty Systems331

8.2.4 Failure Detection335

8.3 RELIABLE CLIENT-SERVER COMMUNICATION336

8.3.1 Point-to-Point Communication337

8.3.2 RPC Semantics in the Presence of Failures337

8.4 RELIABLE GROUP COMMUNICATION343

8.4.1 Basic Reliable-Multicasting Schemes343

8.4.2 Scalability in Reliable Multicasting345

8.4.3 Atomic Multicast348

8.5 DISTRIBUTED COMMIT355

8.5.1 Two-Phase Commit355

8.5.2 Three-Phase Commit360

8.6 RECOVERY363

8.6.I Introduction363

8.6.2 Checkpointing366

8.6.3 Message Logging369

8.6.4 Recovery-Oriented Computing372

8.7 SUMMARY373

9 SECURITY377

9.1 INTRODUCTION TO SECURITY378

9.1.1 Security Threats,Policies,and Mechanisms378

9.1.2 Design Issues384

9.1.3 Cryptography389

9.2 SECURE CHANNELS396

9.2.1 Authentication397

9.2.2 Message Integrity and Confidentiality405

9.2.3 Secure Group Communication408

9.2.4 Example:Kerberos411

9.3 ACCESS CONTROL413

9.3.1 General Issues in Access Control414

9.3.2 Firewalls418

9.3.3 Secure Mobile Code420

9.3.4 Denial of Service427

9.4 SECURITY MANAGEMENT428

9.4.1 Key Management428

9.4.2 Secure Group Management433

9.4.3 Authorization Management434

9.5 SUMMARY439

10 DISTRIBUTED OBJECT-BASED SYSTEMS443

10.1 ARCHITECTURE443

10.1.1 Distributed Objects444

10.1.2 Example:Enterprise Java Beans446

10.1.3 Example:Globe Distributed Shared Objects448

10.2 PROCESSES451

10.2.1 Object Servers451

10.2.2 Example:The Ice Runtime System454

10.3 COMMUNICATION456

10.3.1 Binding a Client to an Object456

10.3.2 Static versus Dynamic Remote Method Invocations458

10.3.3 Parameter Passing460

10.3.4 Example:Java RMI461

10.3.5 Object-Based Messaging464

10.4 NAMING466

10.4.1 CORBA Object References467

10.4.2 Globe Object References469

10.5 SYNCHRONIZATION470

10.6 CONSISTENCY AND REPLICATION472

10.6.1 Entry Consistency472

10.6.2 Replicated Invocations475

10.7 FAULT TOLERANCE477

10.7.1 Example:Fault-Tolerant CORBA477

10.7.2 Example:Fault-Tolerant Java480

10.8 SECURITY481

10.8.1 Example:Globe482

10.8.2 Security for Remote Objects486

10.9 SUMMARY487

11 DISTRIBUTED FILE SYSTEMS491

11.1 ARCHITECTURE491

11.1.1 Client-Server Architectures491

11.1.2 Cluster-Based Distributed File Systems496

11.1.3 Symmetric Architectures499

11.2 PROCESSES501

11.3 COMMUNICATION502

11.3.1 RPCs in NFS502

11.3.2 The RPC2 Subsystem503

11.3.3 File-Oriented Communication in Plan 9505

11.4 NAMING506

11.4.1 Naming in NFS506

11.4.2 Constructing a Giobal Name Space512

11.5 SYNCHRONIZATION513

11.5.1 Semantics of File Sharing513

11.5.2 File Locking516

11.5.3 Sharing Files in Coda518

11.6 CONSISTENCY AND REPLICATION519

11.6.1 Client-Side Caching520

11.6.2 Server-Side Replication524

11.6.3 Replication in Peer-to-Peer File Systems526

11.6.4 File Replication in Grid Systems528

11.7 FAULT TOLERANCE529

11.7.1 Handling Byzantine Failures529

11.7.2 High Availability in Peer-to-Peer Systems531

11.8 SECURITY532

11.8.1 Security in NFS533

11.8.2 Decentralized Authentication536

11.8.3 Secure Peer-to-Peer File-Sharing Systems539

11.9 SUMMARY541

12 DISTRIBUTED WEB-BASED SYSTEMS545

12.1 ARCHITECTURE546

12.1.1 Traditional Web-Based Systems546

12.1.2 Web Services551

12.2 PROCESSES554

12.2.1 Clients554

12.2.2 The Apache Web Server556

12.2.3 Web Server Clusters558

12.3 COMMUNICATION560

12.3.1 Hypertext Transfer Protocol560

12.3.2 Simple Object Access Protocol566

12.4 NAMING567

12.5 SYNCHRONIZATION569

12.6 CONSISTENCY AND REPLICATION570

12.6.1 Web Proxy Caching571

12.6.2 Replication for Web Hosting Systems573

12.6.3 Replication of Web Applications579

12.7 FAULT TOLERANCE582

12.8 SECURITY584

12.9 SUMMARY585

13 DISTRIBUTED COORDINATION-BASED SYSTEMS589

13.1 INTRODUCTION TO COORDINATION MODELS589

13.2 ARCHITECTURES591

13.2.1 Overall Approach592

13.2.2 Traditional Architectures593

13.2.3 Peer-to-Peer Architectures596

13.2.4 Mobility and Coordination599

13.3 PROCESSES601

13.4 COMMUNICATION601

13.4.1 Content-Based Routing601

13.4.2 Supporting Composite Subscriptions603

13.5 NAMING604

13.5.1 Describing Composite Events604

13.5.2 Matching Events and Subscriptions606

13.6 SYNCHRONIZATION607

13.7 CONSISTENCY AND REPLICATION607

13.7.1 Static Approaches608

13.7.2 Dynamic Replication611

13.8 FAULT TOLERANCE613

13.8.1 Reliable Publish-Subscribe Communication613

13.8.2 Fault Tolerance in Shared Dataspaces616

13.9 SECURITY617

13.9.1 Confidentiality618

13.9.2 Secure Shared Dataspaces620

13.10 SUMMARY621

14 SUGGESTIONS FOR FURTHER READING AND BIBUOGRAPHY623

14.1 SUGGESTIONS FOR FURTHER READING623

14.1.1 Introduction and General Works623

14.1.2 Architectures624

14.1.3 Processes625

14.1.4 Communication626

14.1.5 Naming626

14.1.6 Synchronization627

14.1.7 Consistency and Replication628

14.1.8 Fault Tolerance629

14.1.9 Security630

14.1.10 Distributed Object-Based Systems631

14.1.11 Distributed File Systems632

14.1.12 Distributed Web-Based Systems632

14.1.13 Distributed Coordination-Based Systems633

14.2 ALPHABETICAL BIBLIOGRAPHY634

INDEX669

热门推荐