图书介绍
分布式系统 原理与范型PDF|Epub|txt|kindle电子书版本网盘下载
![分布式系统 原理与范型](https://www.shukui.net/cover/1/33434090.jpg)
- (美)特尼博姆( Tanenbaum,A.S.)等著 著
- 出版社: 北京:清华大学出版社
- ISBN:7302172773
- 出版时间:2008
- 标注页数:686页
- 文件大小:92MB
- 文件页数:708页
- 主题词:分布式操作系统-高等学校-教材-英文
PDF下载
下载说明
分布式系统 原理与范型PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
1 INTRODUCTION1
1.1 DEFINITION OF A DISTRIBUTED SYSTEM2
1.2 GOALS3
1.2.1 Making Resources Accessible3
1.2.2 Distribution Transparency4
1.2.3 Openness7
1.2.4 Scalability9
1.2.5 Pitfalls16
1.3 TYPES OF DISTRIBUTED SYSTEMS17
1.3.1 Distributed Computing Systems17
1.3.2 Distributed Information Systems20
1.3.3 Distributed Pervasive Systems24
1.4 SUMMARY30
2 ARCHITECTURES33
2.1 ARCHITECTURAL STYLES34
2.2 SYSTEM ARCHITECTURES36
2.2.1 Centralized Architectures36
2.2.2 Decentralized Architectures43
2.2.3 Hybrid Architectures52
2.3 ARCHITECTURES VERSUS MIDDLEWARE54
2.3.1 Interceptors55
2.3.2 General Approaches to Adaptive Software57
2.3.3 Discussion58
2.4 SELF-MANAGEMENT IN DISTRIBUTED SYSTEMS59
2.4.1 The Feedback Control Model60
2.4.2 Example:Systems Monitoring with Astrolabe61
2.4.3 Example:Differentiating Replication Strategies in Globule63
2 4.4 Example:Automatic Component Repair Management in Jade65
2.5 SUMMARY66
3 PROCESSES69
3.1 THREADS70
3.1.1 Introduction to Threads70
3.1.2 Threads in Distributed Systems75
3.2 VIRTUALIZATION79
3.2.1 The Role of Virtualization in Distributed Systems79
3.2.2 Architectures of Virtual Machines80
3.3 CLIENTS82
3.3.1 Networked User Interfaces82
3.3.2 Client-Side Software for Distribution Transparency87
3.4 SERVERS88
3.4.1 General Design Issues88
3.4.2 Server Clusters92
3.4.3 Managing Server Clusters98
3.5 CODE MIGRATION103
3.5.1 Approaches to Code Migration103
3.5.2 Migration and Local Resources107
3.5.3 Migration in Heterogeneous Systems110
3.6 SUMMARY112
4 COMMUNICATION115
4.1 FUNDAMENTALS116
4.1.1 Layered Protocols116
4.1.2 Types of Communication124
4.2 REMOTE PROCEDURE CALL125
4.2.1 Basic RPC Operation126
4.2.2 Parameter Passing130
4.2.3 Asynchronous RPC134
4.2.4 Example:DCE RPC135
4.3 MESSAGE-ORIENTED COMMUNICATION140
4.3.1 Message-Oriented Transient Communication141
4.3.2 Message-Oriented Persistent Communication145
4.3.3 Example:IBM's WebSphere Message-Queuing System152
4.4 STREAM-ORIENTED COMMUNICATION157
4.4.1 Support for Continuous Media158
4.4.2 Streams and Quality of Service160
4.4.3 Stream Synchronization163
4.5 MULTICAST COMMUNICATION166
4.5.1 Application-Level Multicasting166
4.5.2 Gossip-Based Data Dissemination170
4.6 SUMMARY175
5 NAMING179
5.1 NAMES,IDENTIFIERS,AND ADDRESSES180
5.2 FLAT NAMING182
5.2.1 Simple Solutions183
5.2.2 Home-Based Approaches186
5.2.3 Distributed Hash Tables188
5.2.4 Hierarchical Approaches191
5.3 STRUCTURED NAMING195
5.3.1 Name Spaces195
5.3.2 Name Resolution198
5.3.3 The Implementation of a Name Space202
5.3.4 Example:The Domain Name System209
5.4 ATTRIBUTE-BASED NAMING217
5.4.1 Directory Services217
5.4.2 Hierarchical Implementations:LDAP218
5.4.3 Decentralized Implementations222
5.5 SUMMARY231
6 SYNCHRONIZATION231
6.1 CLOCK SYNCHRONIZATION232
6.1.1 Physical Clocks233
6.1.2 Global Positioning System236
6.1.3 Clock Synchronization Algorithms238
6.2 LOGICAL CLOCKS244
6.2.1 Lamport's Logical Clocks244
6.2.2 Vector Clocks248
6.3 MUTUAL EXCLUSION252
6.3.1 Overview252
6.3.2 A Centralized Algorithm253
6.3.3 A Decentralized Algorithm254
6.3.4 A Distributed Algorithm255
6.3.5 A Token Ring Algorithm258
6.3.6 A Comparison of the Four Algorithms259
6.4 GLOBAL POSITIONING OF NODES260
6.5 ELECTION ALGORITHMS263
6.5.1 Traditional Election Algorithms264
6.5.2 Elections in Wireless Environments267
6.5.3 Elections in Large-Scale Systems269
6.6 SUMMARY270
7 CONSISTENCY AND REPLICATION273
7.1 INTRODUCTION274
7.1.1 Reasons for Replication274
7.1.2 Replication as Scaling Technique275
7.2 DATA-CENTRIC CONSISTENCY MODELS276
7.2.1 Continuous Consistency277
7.2.2 Consistent Ordering of Operations281
7.3 CLIENT-CENTRIC CONSISTENCY MODELS288
7.3.1 Eventual Consistency289
7.3.2 Monotonic Reads291
7.3.3 Monotonic Writes292
7.3.4 Read Your Writes294
7.3.5 Writes Follow Reads295
7.4 REPLICA MANAGEMENT296
7.4.1 Replica-Server Placement296
7.4.2 Content Replication and Placement298
7.4.3 Content Distribution302
7.5 CONSISTENCY PROTOCOLS306
7.5.1 Continuous Consistency306
7.5.2 Primary-Based Protocols308
7.5.3 Replicated-Write Protocols311
7.5.4 Cache-Coherence Protocols313
7.5.5 Implementing Client-Centric Consistency315
7.6 SUMMARY317
8 FAULT TOLERANCE321
8.1 INTRODUCTION TO FAULT TOLERANCE322
8.1.1 Basic Concepts322
8.1.2 Failure Models324
8.1.3 Failure Masking by Redundancy326
8.2 PROCESS RESILIENCE328
8.2.1 Design Issues328
8.2.2 Failure Masking and Replication330
8.2.3 Agreement in Faulty Systems331
8.2.4 Failure Detection335
8.3 RELIABLE CLIENT-SERVER COMMUNICATION336
8.3.1 Point-to-Point Communication337
8.3.2 RPC Semantics in the Presence of Failures337
8.4 RELIABLE GROUP COMMUNICATION343
8.4.1 Basic Reliable-Multicasting Schemes343
8.4.2 Scalability in Reliable Multicasting345
8.4.3 Atomic Multicast348
8.5 DISTRIBUTED COMMIT355
8.5.1 Two-Phase Commit355
8.5.2 Three-Phase Commit360
8.6 RECOVERY363
8.6.I Introduction363
8.6.2 Checkpointing366
8.6.3 Message Logging369
8.6.4 Recovery-Oriented Computing372
8.7 SUMMARY373
9 SECURITY377
9.1 INTRODUCTION TO SECURITY378
9.1.1 Security Threats,Policies,and Mechanisms378
9.1.2 Design Issues384
9.1.3 Cryptography389
9.2 SECURE CHANNELS396
9.2.1 Authentication397
9.2.2 Message Integrity and Confidentiality405
9.2.3 Secure Group Communication408
9.2.4 Example:Kerberos411
9.3 ACCESS CONTROL413
9.3.1 General Issues in Access Control414
9.3.2 Firewalls418
9.3.3 Secure Mobile Code420
9.3.4 Denial of Service427
9.4 SECURITY MANAGEMENT428
9.4.1 Key Management428
9.4.2 Secure Group Management433
9.4.3 Authorization Management434
9.5 SUMMARY439
10 DISTRIBUTED OBJECT-BASED SYSTEMS443
10.1 ARCHITECTURE443
10.1.1 Distributed Objects444
10.1.2 Example:Enterprise Java Beans446
10.1.3 Example:Globe Distributed Shared Objects448
10.2 PROCESSES451
10.2.1 Object Servers451
10.2.2 Example:The Ice Runtime System454
10.3 COMMUNICATION456
10.3.1 Binding a Client to an Object456
10.3.2 Static versus Dynamic Remote Method Invocations458
10.3.3 Parameter Passing460
10.3.4 Example:Java RMI461
10.3.5 Object-Based Messaging464
10.4 NAMING466
10.4.1 CORBA Object References467
10.4.2 Globe Object References469
10.5 SYNCHRONIZATION470
10.6 CONSISTENCY AND REPLICATION472
10.6.1 Entry Consistency472
10.6.2 Replicated Invocations475
10.7 FAULT TOLERANCE477
10.7.1 Example:Fault-Tolerant CORBA477
10.7.2 Example:Fault-Tolerant Java480
10.8 SECURITY481
10.8.1 Example:Globe482
10.8.2 Security for Remote Objects486
10.9 SUMMARY487
11 DISTRIBUTED FILE SYSTEMS491
11.1 ARCHITECTURE491
11.1.1 Client-Server Architectures491
11.1.2 Cluster-Based Distributed File Systems496
11.1.3 Symmetric Architectures499
11.2 PROCESSES501
11.3 COMMUNICATION502
11.3.1 RPCs in NFS502
11.3.2 The RPC2 Subsystem503
11.3.3 File-Oriented Communication in Plan 9505
11.4 NAMING506
11.4.1 Naming in NFS506
11.4.2 Constructing a Giobal Name Space512
11.5 SYNCHRONIZATION513
11.5.1 Semantics of File Sharing513
11.5.2 File Locking516
11.5.3 Sharing Files in Coda518
11.6 CONSISTENCY AND REPLICATION519
11.6.1 Client-Side Caching520
11.6.2 Server-Side Replication524
11.6.3 Replication in Peer-to-Peer File Systems526
11.6.4 File Replication in Grid Systems528
11.7 FAULT TOLERANCE529
11.7.1 Handling Byzantine Failures529
11.7.2 High Availability in Peer-to-Peer Systems531
11.8 SECURITY532
11.8.1 Security in NFS533
11.8.2 Decentralized Authentication536
11.8.3 Secure Peer-to-Peer File-Sharing Systems539
11.9 SUMMARY541
12 DISTRIBUTED WEB-BASED SYSTEMS545
12.1 ARCHITECTURE546
12.1.1 Traditional Web-Based Systems546
12.1.2 Web Services551
12.2 PROCESSES554
12.2.1 Clients554
12.2.2 The Apache Web Server556
12.2.3 Web Server Clusters558
12.3 COMMUNICATION560
12.3.1 Hypertext Transfer Protocol560
12.3.2 Simple Object Access Protocol566
12.4 NAMING567
12.5 SYNCHRONIZATION569
12.6 CONSISTENCY AND REPLICATION570
12.6.1 Web Proxy Caching571
12.6.2 Replication for Web Hosting Systems573
12.6.3 Replication of Web Applications579
12.7 FAULT TOLERANCE582
12.8 SECURITY584
12.9 SUMMARY585
13 DISTRIBUTED COORDINATION-BASED SYSTEMS589
13.1 INTRODUCTION TO COORDINATION MODELS589
13.2 ARCHITECTURES591
13.2.1 Overall Approach592
13.2.2 Traditional Architectures593
13.2.3 Peer-to-Peer Architectures596
13.2.4 Mobility and Coordination599
13.3 PROCESSES601
13.4 COMMUNICATION601
13.4.1 Content-Based Routing601
13.4.2 Supporting Composite Subscriptions603
13.5 NAMING604
13.5.1 Describing Composite Events604
13.5.2 Matching Events and Subscriptions606
13.6 SYNCHRONIZATION607
13.7 CONSISTENCY AND REPLICATION607
13.7.1 Static Approaches608
13.7.2 Dynamic Replication611
13.8 FAULT TOLERANCE613
13.8.1 Reliable Publish-Subscribe Communication613
13.8.2 Fault Tolerance in Shared Dataspaces616
13.9 SECURITY617
13.9.1 Confidentiality618
13.9.2 Secure Shared Dataspaces620
13.10 SUMMARY621
14 SUGGESTIONS FOR FURTHER READING AND BIBUOGRAPHY623
14.1 SUGGESTIONS FOR FURTHER READING623
14.1.1 Introduction and General Works623
14.1.2 Architectures624
14.1.3 Processes625
14.1.4 Communication626
14.1.5 Naming626
14.1.6 Synchronization627
14.1.7 Consistency and Replication628
14.1.8 Fault Tolerance629
14.1.9 Security630
14.1.10 Distributed Object-Based Systems631
14.1.11 Distributed File Systems632
14.1.12 Distributed Web-Based Systems632
14.1.13 Distributed Coordination-Based Systems633
14.2 ALPHABETICAL BIBLIOGRAPHY634
INDEX669