王朝网络
分享
 
 
 

分布式系统原理与范型(第2版)(影印版)(大学计算机教育国外著名教材系列)(Distributed Systems Principles and Paradigms)

王朝导购·作者佚名
 
分布式系统原理与范型(第2版)(影印版)(大学计算机教育国外著名教材系列)(Distributed Systems Principles and Paradigms)  点此进入淘宝搜索页搜索
  特别声明:本站仅为商品信息简介,并不出售商品,您可点击文中链接进入淘宝网搜索页搜索该商品,有任何问题请与具体淘宝商家联系。
  参考价格: 点此进入淘宝搜索页搜索
  分类: 图书,教材教辅与参考书,大学,计算机专业,
  品牌: 特尼博姆

基本信息·出版社:清华大学出版社

·页码:685 页

·出版日期:2009年

·ISBN:9787302172772

·包装版本:1(影印版)

·装帧:其他

·开本:16

·正文语种:中文

·读者对象:相关专业人员参阅

·丛书名:大学计算机教育国外著名教材系列

·外文书名:Distributed Systems Principles and Paradigms

产品信息有问题吗?请帮我们更新产品信息。

内容简介《分布式系统原理与范型》(第2版)(影印版)是著名作者Tanenbaum关于分布式系统的最新力作,是分布式系统的权威教材。《分布式系统原理与范型》(第2版)(影印版)分成了两大部分。第2-9章讨论的是分布式系统的的原理、概念和技术,包括通信、进程、命名、同步化、一致性和复制、容错性以及安全性等,而分布式应用的开发方法(即范型)在第10-13章中进行了讨论。但是,与前一版不同的是,《分布式系统原理与范型》(第2版)(影印版)没有在讨论范型的章节中完整地介绍每个案例研究,而是通过一个有代表性的案例来解释原理。这种介绍方法不仅精简了素材,而且可以使得读者在阅读和学习时更愉快些。全书结构清晰,内容全面经典,系统性与先进性并茂。

编辑推荐《分布式系统原理与范型》(第2版)(影印版)适用对象广泛,不仅可以作为学习分布式计算机的本科生和研究生的教材,对于从事分布式计算研究和工程应用的科技人员和工程技术人员来说,《分布式系统原理与范型》(第2版)(影印版)也是一本优秀的读物。

目录

1 INTRODUCTION 1

I.I DEFINITION OF A DISTRIBUTED SYSTEM 2

1.2 GOALS 3

] ZI Maing Resources Accessible 3

].22 Distribution Transparency 4

12.3 Openness 7

l.2.4 Scalability 9

]2.5 FItfaIIS 16

I.3 TYPES OF DISTRIBUTED SYSTEMS 17

1,3.1 Distributed Compuhng Systems 17

l.3.2 Distributed information Systems 20

l.3.3 Distubuted Pervasive Systems 24

I.4 SUMMARY 30

2 ARCHITECTURES 33

ZI ARCHITECTURAL STYLES 34

2.2 SYSTEM ARC~CTURES 36

22.1 Centralized AIchitectures 36

22.2 Decentralized ArcLitectures 43

2.2.3 Hybnd Architectures 52

2.3 ARCHITECTURES VERSUS MIDDLEWARE 54

2.3.1 Interceptors 55

2.3.2 General APPToaches to Adaptive Software 57

2.3.3 Discussion 58

tv COMENTS

2.4 SELf'-MANAGEMENT IN DISTRIBUTED SYSTEMS 59

241 The reedbask C()lltr(1 Mode] 6(j

2.4.2 Example Systems Monitoring with Astr',labe 61

2.43 Example Differentiating Repllcatioll Striltegles in Globule 63

2.44 Example Auionlahc Component Repair Mallagenlellt in Jade 65

25 SUMMARY 66

3 PROCESSES 69

3.1 THREADS 70

3.I.I Introduction to Thieaus 70

31.2 Threads in Distributed Systems 75

3.2 VIRTUAL~ION 79

3.2.1 The Role of Virtualization in Dlstrihutcd Syslems 79

3.22 Architectures of V]rtual Machlucs SO

3.3 CLIENTS 82

3.31 NetwOIked User interfaces 82

3.32 Client-Side Software forDistribuu(in TTansparency 87

34 SERVERS 88

3.4.1 DeneraI Design ISSues 88

3.4.2 Server Clusters 92

3.4.3 Managing Server Clusters 98

35 COIJE MIGRAIION 103

35, 1 Approaches ti) C()dc Migration ]03

3.5.2 Mzgrahon and Local Resollrces 107

3.5.3 Mlgrahon in Heterogelleous Systems ] 10

3.6 SUMMARY 112

4 COMMUNICATION 115

41 FLINDAMENTALS ] 16

4. 1 .1 Layered Pn)tocols 116

4. I .2 Types of' Commllnicahon 124

4.2 REMOTE PROCEDURE CALL 125

42.1 Basic Rad operation ]26

42.2 Parameter Passing 130

CONTENTS 'l

4.2.3 ASynchroIIOus ~ ]34

4,24 EXample f DCE RPC 135

4.3 MESSAGE ORIENTED COMMUNICATION 140

4.3.1 Message Oriented Trallsient Communication 141

4.3.2 Message Oriented PeISistent Communication ]45

4.3.3 Example' IBM's WehSphere Message-Queuing System 152

44 STREAM-ORIENTED COMMUNICATION 157

4.41 SuPPort t'or Continuous Media 158

4.4.2 Smiarns and Quality of Service 160

443 Sforaln Synchr(n],aiion 163

4.5 MULTICAST COMMUNICATION ]66

45.1 Application-Leve] Mlllticasting ]66

4.5.2 Gossip Based Daal Dissemination ]70

46 SIJMMARY 175

5 NAMING 179

5.1 NAMES. IDENTIFIERS. AND ADDRESSES 180

5.2 fIAT NAMJNG 182

5.2.] SIInpIe SOIut.ions 183

5.2.2 Home Based Approaches 186

5.23 Distritiuted Hash TabICS 188

5.2.4 HieTarchical Approaches 191

5.3 STRUCTURED NAMING ]95

5.3.1 Name Spaces 195

5.3.2 Name Resolution 198

5.3.3 The In'plementation of a Name Space 202

5.3.4 Example f The Domain Name Syrialy 209

5.4 ATTRIBUTe BASSO NAMING 217

5.4.1 Directory Services 217

5.42 HieraIChicaI 11npIemcntat]0IISf IDAP 218

5.4.3 Dcccntrali7ed Inlplelnentations 222

5.5 SUMmalY

yi CONmeNTS

6 SYNCHRONIZATION 231

6.1 CLOCk SYNCHRONIZATION 232

6.I.I Physical ClOCks 233

6,l,2 Global Positioning System 236

61,3 Clock Synchronization Algorithms 238

62 LOGICAL CLOCKS 244

62 1 Lamport's Logical Clocks 244

622 Vector Clocks 248

6.3 MUTUAL EXCLUSION 252

6.3.1 Overmew 252

6.3.2 A Cenlralized Alg(lrithm 253

6.3.3 A Decentralized Algoflthm 254

6.3.4 A Distributed Algonthm 255

6.3.5 A Token bang Algontdri 258

6.3.6 A Comparison of the Four Algonthms 259

6.4 GLOBAL POSITIONING OF NODES 260

65 ELECTION ALGORIThmS 263

65.1 Tladitional Election Algonthins 264

6.5.2 Elections in Wireless Envil+onments 267

6.53 Elections in Large-Scale Systems 269

6.6 SUMMARY 270

7 CONSISTENCY AND REPLICATION 273

7.1 INTRODUCTION 274

71,I treasons for Replication 274

71,2 ffepIication as SCaling technique 275

72 DATA~CENTRJC CONSISTENCY MODELS 276

7.2.1 Contmuou s C ollsistenc y 27 7

7.2.2 Consistent Ordering ofoperahons 281

7.3 CLIENT-CENTRIC CONSISTENCY MODELS 288

7.3.1 EVentual COnsistency 289

7.3.2 Monotomc Reads 291

7.3.3 MOnotonic Writes 292

7.3.4 Read Yoke Wntes 294

7,3,5 Writes Follow Reads 295

COmENTS Vii

7.4 REPLICA MANAGemENT 296

7.4.1 Replica-Server Placcnlent 2t)6

7.4.2 O)ntent ReP]]cation and l'lacemcnt 298

74.3 Content DistTibution 302

75 CONSISTENCY PROTOCOLS 306

7.5.1 Continuous Consistency 306

7.5.2 Primary Based Proll)cols 308

7.5.3 Replicated Write Protocols 311

75.4 Cache Coherence Plotocols 313

7..5 ]nlplelnellting Client Centric Consisiellcy 315

7.6 SUMMARY 317

8 FAULT TOLERANCE 321

8.1 INTRODUCTJON TO FAULT TOIaXANCF 322

8.1,I Basic COIICepIS 322

8.1 2 foiIure MOdelS 324

8.]3 Failure M3skIng by RCdundancy 326

8.2 PROCESS RESILIENCE 328

8.2.1 Desig17 ISSues 328

8.2.2 Failure Masking aIId Replication 330

8.2.3 Agreelncnt in Faulty Systems 331

8.2.4 Failure Detecu(}n 335

8.3 RELIABLE CLJENT~SERVER COMMUNICAI'ION 336

8.31 Point to-Point Communication 337

8.3.2 RPC Selllantlcs in the Presence of Failllres 337

8.4 RruIA-BLE GROUP COMMUMCATION 343

8.4.] Basic ReIiatrIe MuIticasiing SCnenICS 343

8.42 SCaIaIIIIIty in Reliable MuIhcasting 343

843 AtomIC MIIItICast 348

8.5 DISTRIBUTED COMMIT 355

8.5.1 Two-Phase Comlmt 355

8.52 ThTec Phase CI)mntit 360

8.6 kECOVERY 363

8,6.1 Intra)ductio~ 363

8.6.2 Checkpointing 366

Vin CONTFNTS

8.6.3 massage LOgging 369

8.6.4 Recovery-Onented Compuhng 372

8.7 SUMMARY 373

9 SECURITY 377

9.] INTRODUCTION TO SECURITY 378

9 1,1 Security Threats. Policies. and Mechanisms 378

9.l.2 Design Issues 384

9.].3 Cryptogranh}= 389

92 SECURE CHANNELS 396

9.2.] Authentication 397

9.2.2 Message integnty and Confidentiality 405

92.3 Secure Group Cornmunlcatlon 408

92.4 Example f Kerbcros 4if

9.3 ACCESS CONTROL 413

9.3.1 General Issues in Access Control 414

9.3.2 Firewalls 418

9.3.3 Secure Mobile Code 420

9.3.4 Denial of Service 427

9.4 SECURITY MANAGEMENT 428

94.1 Key Management 428

9.4.2 Secure GToup Management 433

9.4.3 Allthorization Management 434

9.5 SUMMARY 439

10 DISTRIBUTED OBJECT-BASED SYSTEMS 443

10.1 ARCHITECTUre 443

10.I.I DistrIbuted Otijccts 4M

10.1.2 Example f Entmprise Java Beaus 446

10.] .3 EXample' GIOtre Distributed Shared Otijects 448

10.2 PROCESSES 451

10.2.1 Object Servers 451

10.2,2 EXample The ICe downtime System 454

CONmeNTS iX

10.3 COMMUNICATION 456

10.3.1 Binding a Client to an Object 456

10.3.2 Static vcrsus Dynamic Remote Method invocations 458

]0.33 Parameter Passing 460

10.3.4 EXaInpIe Java RMJ 46]

1035 OhIect-Based Messaging 464

10.4 NAMING 466

10.4.1 CORBA Otiject Re,erences 467

10.4.2 GlObe Otrject References 469

10.5 SYNCHRONIZATION 470

106 CONSISTENCY AND REPLICATION 472

IO.6.1 entry COnsistency 472

10.6.2 Replicated invocations 475

10.7 FAULT TOLERANCE 477

ID.7, I Example' Fault Tolerant CORBA 477

10.7.2 Example Fault-Tolerant Java 480

10,8 SECURITY 48]

10.8.1 Example: G]obe 482

10.8.2 Security fi)r Remote Objects 486

10.9 SUMMARY 487

11 DISTRIBUTED FILE SYSTEMS 491

I I .] ARCHITECTURE 491

l 111 Client-Server Architectures 491

l 112 ClusteT-Based Distributed File Systems 496

l 113 Sylmnetnc Architectures 499

1 ]2 PROCESSES 501

1 ].3 COMMUNICATION 502

I ]31 Rads in NFS 502

1 ]32 The RPCZ SubsysteIV 503

1 ] 33 FIle-OTiented C(Immunication in alan 9 505

1 14 NabING 506

1 14,I Naming in NFS 506

l l.4.2 Constructing a Global aams Space 512

11.5 SYNCHRONIZATION 513

] 1 .5.] Semalltics l)f F]]e Sharing 513

I I .5.2 FiIC LOCkIng 5 1 6

11.5.3 Sharing Files in COda 518

11.6 CONSISTENCY AND REPLICATION 519

11 .6.] C]ient Side Caching 520

l l.6.2 Server-Side Replication 524

l l.6.3 Replicahon in Peer to Pcer File Systems 526

l l.6.4 File Replication in Gbed Systems 528

11.7 FAULT TOLERANCE 529

l 1 .7.] IJandling Byzantine Failures 529

l ] .7.2 High Availability in Peer-to-Peer Systems 53]

I ].8 SECURITY 532

1 1 sl Secunty in NFS 533

l ] .82 Decentralized Authentication 536

l ] .83 Secure Peer-to-Peer File-Shanng Systems 539

1 ]9 SUMMARY 541

12 DISTRIBUTED WEB-BASED SYSTEMS 545

12.1 ARCHITECTURE 546

12if Traditional Web Based Systems 546

1212 Web SeTVices 551

12.2 PROCESSES 554

12.2.1 ClIents 554

12.2.2 The Apachc Web Server o56

12.2.3 WCb SeTVer Clusters 558

12.3 COMMUNICATION 560

12.3.1 Hypcrtcxt Trilnsfel Protocol 560

123.2 Simple Object ACCess riotocoI 566

12.4 NAMING 567

12.5 SYNCHRONIZATION 569

126 CONSISTENCY AND REPLICAnON 570

1 26.1 Web Proxy Caching 571

1 2.6.2 Replication for Web Hosting Systems 573

12.6.3 Replication of Web Anviicaiions 579

CONmeNTs Xi

12.7 FAULT TOLERANCE 582

12.8 SECURITY 584

12.9 SUMMARY 585

13 DISTRIBUTED COORDINATION-BASED 589

SYSTEMS

13.] INTRODUCTION TO COORDINATION MODELS 589

13.2 ARCHitECTURES 59]

13.2.] Overilll Approach 592

132.2 Tradlll(mal Architestores 593

132.3 PeeT to Peer Architectures 596

132,4 MObiIit}= and C(]I)ruination 599

13.3 PROCESSES 601

134 COMMUNICATION 60]

13.4.] COntent-Based ROasting 601

13.4.2 Sllpporting Composite Subscriptions 603

13.5 NAMJNG 604

13.5.] Describing Composite Evellts 604

13.5.2 Matching Events and Subscriptiolls 606

13.6 SYNC[JRONIZATION 607

13.7 CONSISTENCY AND REPLICATION 607

]3.7.1 Static Apnroachcs 608

13.7.2 Dynunc Replicanon 611

13.8 rAt1T TOLERANCE 6] 3

13.8.1 Reliable pobIish Subscribe COmmunicaiioIa 613

13.8.2 Fault Tolerance in Shared Dataspaces 616

13.9 SECURITY 617

13.9.1 COnfidentia]IIy 618

13.9.2 Secure Shared Dataspaces 620

13.10 SUMMARY 62]

Xu CONTENTS

14 SUGGESTIONS FOR FURTHER READING 623

AND BIBLIOGRAPHY

]4. 1 SUGGESTIONS FOR FURTHER READING 623

14.if introduction and Genelal Works 623

14 1 2 Architectures 624

14.I.3 PIOCesses 625

14.l.4 Commumcatloll 626

14.l.5 Naming 626

14.I.6 Synchronization 627

14.I.7 COnsistency and ffepIication 628

14.1 .8 Fault Tolerance 629

14.l.9 Secllnty 630

14.I.IO DIStributed OnjectBased SysteIIIS 631

141.1 1 Distxlbllted File Systems 632

14 1 12 ]distributed Web-Based Systen3s 632

14 l.13 Distributed Coordination Based Systems 633

14.2 ALPHABETICAL BIBLIOGRAPHY 634

INDEX 669

……[看更多目录]

 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
>>返回首页<<
推荐阅读
 
 
频道精选
 
更多商品
百年书业
中国流氓史
全世界孩子都爱玩的700个思维游戏(全本珍藏)
ONE第4辑:酸酸的草莓印
小学语文提高班(6上最新修订版)(我的第二课堂)
供应链管理战略规划与运作(第3版)(清华管理学系列英文版教材)(Supply Chain Management)
时光的叙事诗
二年级数学(上国标北师版)(单元双测同步达标活页试卷)
九年级语文(上语文版升级版)/三点一测拓成才之路(三点一测拓成才之路)
坐在大树上听童话(珍藏的儿童时代)
 
静静地坐在废墟上,四周的荒凉一望无际,忽然觉得,凄凉也很美
© 2005- 王朝网络 版权所有