000 | 04849cam a2200181 a 4500 | ||
---|---|---|---|
020 | _a9788131718407 (pb) | ||
040 | _cCUS | ||
082 | 0 | 0 |
_a005.43 _bCOU/D |
245 | 0 | 0 |
_aDistributed systems: concepts and design / _cGeorge Coulouris ... [et al.]. |
250 | _a4th ed. | ||
260 |
_aNew Delhi : _bPearson , _cc2009 |
||
300 |
_axiv, 849 p. _bill. ; _c24 cm. |
||
500 | _aRev. ed. of: Distributed systems : concepts and design / George Coulouris. 4th ed. 2005. | ||
504 | _aIncludes bibliographical references (p. 967-1023) and index. | ||
505 | _aPREFACE 1 CHARACTERIZATION OF DISTRIBUTED SYSTEMS 1.1 Introduction 1.2 Examples of distributed systems 1.3 Resource sharing and ttie Web 1.4 Chalienges 1.5 Summary 2 SYSTEM MODELS 2.1 Introduction 2.2 Architectural models 2.3 Fundamental models 2.4 Summary 3 NETWORKING AND INTERNETWORKING 3.1 Introduction 3.2 Types of network 3.3 Network principles 3.4 Internet protocols 3.5 Case studies: Ethernet, WiPi, Bluetooth and ATM 3.6 Summary 4 INTERPROCESS COMMUNICATION 4.1 Introduction 4.2 The API for the Internet protocols 4.3 External data representation and marshalling 4.4 Client-server communication 4.5 Group communication 4.6 Case study; interprocess communication in UNIX 4.7 Summary 5 DISTRIBUTED OBJECTS AND REMOTE INVOCATION 5.1 Introduction 5.2 Communication between distributed objects 5.3 Remote procedure call 5.4 Events and notifications 5.5 Case study: Java RMI 5.6 Summary 6 OPERATING SYSTEM SUPPORT 6.1 Introduction 6.2 The operating system layer 6.3 Protection 6.4 Processes and threads 6.5 Communication and invocation 6.6 Operating system architecture 6.7 Summary 7 SECURITY 7.1 Introduction 7.2 Overview of security techniques 7.3 Cryptographic algorithms 7.4 Digital signatures 7.5 Cryptography pragmatics 7.6 Case studies: Needham-Schroeder, Kerberos, TLS, 802.11 WiFi 7.7 Summary 8 DISTRIBUTED FILE SYSTEMS 8.1 Introduction 8.2 File service architecture 8.3 Case study: Sun Network Fife System 8.4 Case study: The Andrew File System 8.5 Enhancements and further developments 8.6 Summary 9 NAME SERVICES 9.1 Introduction 9.2 Name services and the Domain Name System 9.3 Directory services 9.4 Case study of the Global Name Service 9.5 Case study of the X.500 Directory Service 9.6 Summary 10 PEER-TO-PEER SYSTEMS 10.1 introduction 10.2 Napster and its legacy 10.3 Peer-to-peer middleware 10.4 Routing overlays 10.5 Overlay case studies: Pastry, Tapestry 10.6 Application case studies: Squirrel, OceanStore, Ivy 10.7 Summary 11 TIME AND GLOBAL STATES 11.1 Introduction 11.2 Clocks, events and process states 11.3 Synchronizing physical clocks 11.4 Logical time and logical clocks 11.5 Global states 11.6 Distributed debugging 11.7 Summary 12 COORDINATION AND AGREEMENT 12.1 Introduction 12.2 Distributed mutual exclusion 12.3 Elections 12.4 Multicast communication 12.5 Consensus and reiated problems 12.6 Summary 13 TRANSACTIONS AND CONCURRENCY CONTROL 13.1 Introduction 13.2 Transactions 13.3 Nested transactions 13.4 Locks 13.5 Optimistic concurrency control 13.6 Timestamp ordering 13.7 Comparison of methods for concurrency control 13.8 Summary 14 DISTRIBUTED TRANSACTIONS 14.1 Introduction 14.2 Flat and nested distributed transactions 14.3 Atomic commit protocols 14.4 Concurrency control in distributed transactions 14.5 Distributed deadlocks 14.6 Transaction recovery 14.7 Summary 15 REPLICATION 15.1 Introduction 15.2 System model and group communication 15.3 Fault-tolerant services 15.4 Case studies of highly available services: the gossip architecture, Bayou and Coda 15.5 Transactions with replicated data 15.6 Summary .16 MOBILE AND UBIQUITOUS COMPUTING 16.1 Introduction 16.2 Association 16.3 Interoperation 16.4 Sensing and context-awareness 16.5 Security and privacy . 16.6 Adaptation 16.7 Case study of Cooltown 16.8 Summary 17 DISTRIBUTED MULTIMEDIA SYSTEMS 17.1 Introduction 17.2 Characteristics of multimedia data 17.3 Quality of service management 17.4 Resource management 17.5 Stream adaptation 17.6 Case study: the Tiger video file server 17.7 Summary 18 DISTRIBUTED SHARED MEMORY 18.1 introduction 18.2 Design and implementation issues 18.3 Sequential consistency and ivy case study 18.4 Release consistency and Munin case study 18.5 Other consistency models 18.6 Summary 19 WEB SERVICES 19.1 introduction 19.2 Web services 19.3 Service descriptions and IDL for web services 19.4 A directory service for use with web services 19.5 XML security 19.6 Coordination of web services 19.7 Case study: the Grid 19.8 Summary 20 CORBA CASE STUDY 20.1 introduction 20.2 CORBA RMi 20.3 CORBA services 20.4 Summary | ||
650 | 0 |
_aElectronic Data Processing _xDistributed Processing. _920833 |
|
942 | _cWB16 | ||
999 |
_c3028 _d3028 |