分布式系统原理与范型

分布式系统原理与范型
分享
扫描下方二维码分享到微信
打开微信,点击右上角”+“,
使用”扫一扫“即可将网页分享到朋友圈。
作者: [美]
2008-05
版次: 1
ISBN: 9787302172772
定价: 69.00
装帧: 平装
开本: 16开
纸张: 胶版纸
页数: 686页
正文语种: 英语
51人买过
  •   《大学计算机教育国外著名教材系列:分布式系统原理与范型(第2版)(影印版)》是著名作者Tanenbaum关于分布式系统的最新力作,是分布式系统的权威教材。本书分成了两大部分。第2~9章讨论的是分布式系统的的原理、概念和技术,包括通信、进程、命名、同步化、一致性和复制、容错性以及安全性等,而分布式应用的开发方法(即范型)在第10~13章中进行了讨论。但是,与前一版不同的是,本书没有在讨论范型的章节中完整地介绍每个案例研究,而是通过一个有代表性的案例来解释原理。这种介绍方法不仅精简了素材,而且可以使得读者在阅读和学习时更愉快些。全书结构清晰,内容全面经典,系统性与先进性并茂。

      《大学计算机教育国外著名教材系列:分布式系统原理与范型(第2版)(影印版)》适用对象广泛,不仅可以作为学习分布式计算机的本科生和研究生的教材,对于从事分布式计算研究和工程应用的科技人员和工程技术人员来说,本书也是一本优秀的读物。 1INTRODUCTION1

    I.IDEFINITIONOFADISTRIBUTEDSYSTEM2

    1.2GOALS3

    ]ZIMaingResourcesAccessible3

    ].22DistributionTransparency4

    12.3Openness7

    l.2.4Scalability9

    ]2.5FItfaIIS16

    I.3TYPESOFDISTRIBUTEDSYSTEMS17

    1,3.1DistributedCompuhngSystems17

    l.3.2DistributedinformationSystems20

    l.3.3DistubutedPervasiveSystems24

    I.4SUMMARY30

    2ARCHITECTURES33

    ZIARCHITECTURALSTYLES34

    2.2SYSTEMARC~CTURES36

    22.1CentralizedAIchitectures36

    22.2DecentralizedArcLitectures43

    2.2.3HybndArchitectures52

    2.3ARCHITECTURESVERSUSMIDDLEWARE54

    2.3.1Interceptors55

    2.3.2GeneralAPPToachestoAdaptiveSoftware57

    2.3.3Discussion58



    tvCOMENTS

    2.4SELf-MANAGEMENTINDISTRIBUTEDSYSTEMS59

    241ThereedbaskC()lltr(>1Mode]6(j

    2.4.2ExampleSystemsMonitoringwithAstr,labe61

    2.43ExampleDifferentiatingRepllcatiollStrilteglesinGlobule63

    2.44ExampleAuionlahcComponentRepairMallagenlelltinJade65

    25SUMMARY66

    3PROCESSES69

    3.1THREADS70

    3.I.IIntroductiontoThieaus70

    31.2ThreadsinDistributedSystems75

    3.2VIRTUAL~ION79

    3.2.1TheRoleofVirtualizationinDlstrihutcdSyslems79

    3.22ArchitecturesofV]rtualMachlucsSO

    3.3CLIENTS82

    3.31NetwOIkedUserinterfaces82

    3.32Client-SideSoftwareforDistribuu(inTTansparency87

    34SERVERS88

    3.4.1DeneraIDesignISSues88

    3.4.2ServerClusters92

    3.4.3ManagingServerClusters98

    35COIJEMIGRAIION103

    35,1Approachesti)C()dcMigration]03

    3.5.2MzgrahonandLocalResollrces107

    3.5.3MlgrahoninHeterogelleousSystems]10

    3.6SUMMARY112

    4COMMUNICATION115

    41FLINDAMENTALS]16

    4.1.1LayeredPn)tocols116

    4.I.2TypesofCommllnicahon124

    4.2REMOTEPROCEDURECALL125

    42.1BasicRadoperation]26

    42.2ParameterPassing130



    CONTENTSl

    4.2.3ASynchroIIOus~]34

    4,24EXamplefDCERPC135

    4.3MESSAGEORIENTEDCOMMUNICATION140

    4.3.1MessageOrientedTrallsientCommunication141

    4.3.2MessageOrientedPeISistentCommunication]45

    4.3.3ExampleIBMsWehSphereMessage-QueuingSystem152

    44STREAM-ORIENTEDCOMMUNICATION157

    4.41SuPPorttorContinuousMedia158

    4.4.2SmiarnsandQualityofService160

    443SforalnSynchr(>n],aiion163

    4.5MULTICASTCOMMUNICATION]66

    45.1Application-Leve]Mlllticasting]66

    4.5.2GossipBasedDaalDissemination]70

    46SIJMMARY175

    5NAMING179

    5.1NAMES.IDENTIFIERS.ANDADDRESSES180

    5.2fIATNAMJNG182

    5.2.]SIInpIeSOIut.ions183

    5.2.2HomeBasedApproaches186

    5.23DistritiutedHashTabICS188

    5.2.4HieTarchicalApproaches191

    5.3STRUCTUREDNAMING]95

    5.3.1NameSpaces195

    5.3.2NameResolution198

    5.3.3TheInplementationofaNameSpace202

    5.3.4ExamplefTheDomainNameSyrialy209

    5.4ATTRIBUTeBASSONAMING217

    5.4.1DirectoryServices217

    5.42HieraIChicaI11npIemcntat]0IISfIDAP218

    5.4.3Dcccntrali7edInlplelnentations222

    5.5SUMmalY



    yiCONmeNTS

    6SYNCHRONIZATION231

    6.1CLOCkSYNCHRONIZATION232

    6.I.IPhysicalClOCks233

    6,l,2GlobalPositioningSystem236

    61,3ClockSynchronizationAlgorithms238

    62LOGICALCLOCKS244

    621LamportsLogicalClocks244

    622VectorClocks248

    6.3MUTUALEXCLUSION252

    6.3.1Overmew252

    6.3.2ACenlralizedAlg(lrithm253

    6.3.3ADecentralizedAlgoflthm254

    6.3.4ADistributedAlgonthm255

    6.3.5ATokenbangAlgontdri258

    6.3.6AComparisonoftheFourAlgonthms259

    6.4GLOBALPOSITIONINGOFNODES260

    65ELECTIONALGORIThmS263

    65.1TladitionalElectionAlgonthins264

    6.5.2ElectionsinWirelessEnvil+onments267

    6.53ElectionsinLarge-ScaleSystems269

    6.6SUMMARY270

    7CONSISTENCYANDREPLICATION273

    7.1INTRODUCTION274

    71,ItreasonsforReplication274

    71,2ffepIicationasSCalingtechnique275

    72DATA~CENTRJCCONSISTENCYMODELS276

    7.2.1ContmuousCollsistency277

    7.2.2ConsistentOrderingofoperahons281

    7.3CLIENT-CENTRICCONSISTENCYMODELS288

    7.3.1EVentualCOnsistency289

    7.3.2MonotomcReads291

    7.3.3MOnotonicWrites292

    7.3.4ReadYokeWntes294

    7,3,5WritesFollowReads295



    COmENTSVii

    7.4REPLICAMANAGemENT296

    7.4.1Replica-ServerPlaccnlent2t)6

    7.4.2O)ntentReP]]cationandllacemcnt298

    74.3ContentDistTibution302

    75CONSISTENCYPROTOCOLS306

    7.5.1ContinuousConsistency306

    7.5.2PrimaryBasedProll)cols308

    7.5.3ReplicatedWriteProtocols311

    75.4CacheCoherencePlotocols313

    7.>.5]nlplelnelltingClientCentricConsisiellcy315

    7.6SUMMARY317

    8FAULTTOLERANCE321

    8.1INTRODUCTJONTOFAULTTOIaXANCF322

    8.1,IBasicCOIICepIS322

    8.12foiIureMOdelS324

    8.]3FailureM3skIngbyRCdundancy326

    8.2PROCESSRESILIENCE328

    8.2.1Desig17ISSues328

    8.2.2FailureMaskingaIIdReplication330

    8.2.3AgreelncntinFaultySystems331

    8.2.4FailureDetecu(}n335

    8.3RELIABLECLJENT~SERVERCOMMUNICAIION336

    8.31Pointto-PointCommunication337

    8.3.2RPCSelllantlcsinthePresenceofFailllres337

    8.4RruIA-BLEGROUPCOMMUMCATION343

    8.4.]BasicReIiatrIeMuIticasiingSCnenICS343

    8.42SCaIaIIIIItyinReliableMuIhcasting343

    843AtomICMIIItICast348

    8.5DISTRIBUTEDCOMMIT355

    8.5.1Two-PhaseComlmt355

    8.52ThTecPhaseCI)mntit360

    8.6kECOVERY363

    8,6.1Intra)ductio~363

    8.6.2Checkpointing366





    VinCONTFNTS

    8.6.3massageLOgging369

    8.6.4Recovery-OnentedCompuhng372

    8.7SUMMARY373

    9SECURITY377

    9.]INTRODUCTIONTOSECURITY378

    91,1SecurityThreats.Policies.andMechanisms378

    9.l.2DesignIssues384

    9.].3Cryptogranh}=389

    92SECURECHANNELS396

    9.2.]Authentication397

    9.2.2MessageintegntyandConfidentiality405

    92.3SecureGroupCornmunlcatlon408

    92.4ExamplefKerbcros4if

    9.3ACCESSCONTROL413

    9.3.1GeneralIssuesinAccessControl414

    9.3.2Firewalls418

    9.3.3SecureMobileCode420

    9.3.4DenialofService427

    9.4SECURITYMANAGEMENT428

    94.1KeyManagement428

    9.4.2SecureGToupManagement433

    9.4.3AllthorizationManagement434

    9.5SUMMARY439

    10DISTRIBUTEDOBJECT-BASEDSYSTEMS443

    10.1ARCHITECTUre443

    10.I.IDistrIbutedOtijccts4M

    10.1.2ExamplefEntmpriseJavaBeaus446

    10.].3EXampleGIOtreDistributedSharedOtijects448

    10.2PROCESSES451

    10.2.1ObjectServers451

    10.2,2EXampleTheICedowntimeSystem454



    CONmeNTSiX

    10.3COMMUNICATION456

    10.3.1BindingaClienttoanObject456

    10.3.2StaticvcrsusDynamicRemoteMethodinvocations458

    ]0.33ParameterPassing460

    10.3.4EXaInpIeJavaRMJ46]

    1035OhIect-BasedMessaging464

    10.4NAMING466

    10.4.1CORBAOtijectRe,erences467

    10.4.2GlObeOtrjectReferences469

    10.5SYNCHRONIZATION470

    106CONSISTENCYANDREPLICATION472

    IO.6.1entryCOnsistency472

    10.6.2Replicatedinvocations475

    10.7FAULTTOLERANCE477

    ID.7,IExampleFaultTolerantCORBA477

    10.7.2ExampleFault-TolerantJava480

    10,8SECURITY48]

    10.8.1Example:G]obe482

    10.8.2Securityfi)rRemoteObjects486

    10.9SUMMARY487

    11DISTRIBUTEDFILESYSTEMS491

    II.]ARCHITECTURE491

    l111Client-ServerArchitectures491

    l112ClusteT-BasedDistributedFileSystems496

    l113SylmnetncArchitectures499

    1]2PROCESSES501

    1].3COMMUNICATION502

    I]31RadsinNFS502

    1]32TheRPCZSubsysteIV503

    1]33FIle-OTientedC(Immunicationinalan9505

    114NabING506

    114,INaminginNFS506

    ll.4.2ConstructingaGlobalaamsSpace512



    11.5SYNCHRONIZATION513

    ]1.5.]Semallticsl)fF]]eSharing513

    II.5.2FiICLOCkIng516

    11.5.3SharingFilesinCOda518

    11.6CONSISTENCYANDREPLICATION519

    11.6.]C]ientSideCaching520

    ll.6.2Server-SideReplication524

    ll.6.3ReplicahoninPeertoPcerFileSystems526

    ll.6.4FileReplicationinGbedSystems528

    11.7FAULTTOLERANCE529

    l1.7.]IJandlingByzantineFailures529

    l].7.2HighAvailabilityinPeer-to-PeerSystems53]

    I].8SECURITY532

    11slSecuntyinNFS533

    l].82DecentralizedAuthentication536

    l].83SecurePeer-to-PeerFile-ShanngSystems539

    1]9SUMMARY541

    12DISTRIBUTEDWEB-BASEDSYSTEMS545

    12.1ARCHITECTURE546

    12ifTraditionalWebBasedSystems546

    1212WebSeTVices551

    12.2PROCESSES554

    12.2.1ClIents554

    12.2.2TheApachcWebServero56

    12.2.3WCbSeTVerClusters558

    12.3COMMUNICATION560

    12.3.1HypcrtcxtTrilnsfelProtocol560

    123.2SimpleObjectACCessriotocoI566

    12.4NAMING567

    12.5SYNCHRONIZATION569

    126CONSISTENCYANDREPLICAnON570

    126.1WebProxyCaching571

    12.6.2ReplicationforWebHostingSystems573

    12.6.3ReplicationofWebAnviicaiions579



    CONmeNTsXi

    12.7FAULTTOLERANCE582

    12.8SECURITY584

    12.9SUMMARY585

    13DISTRIBUTEDCOORDINATION-BASED589

    SYSTEMS

    13.]INTRODUCTIONTOCOORDINATIONMODELS589

    13.2ARCHitECTURES59]

    13.2.]OverilllApproach592

    132.2Tradlll(malArchitestores593

    132.3PeeTtoPeerArchitectures596

    132,4MObiIit}=andC(]I)ruination599

    13.3PROCESSES601

    134COMMUNICATION60]

    13.4.]COntent-BasedROasting601

    13.4.2SllpportingCompositeSubscriptions603

    13.5NAMJNG604

    13.5.]DescribingCompositeEvellts604

    13.5.2MatchingEventsandSubscriptiolls606

    13.6SYNC[JRONIZATION607

    13.7CONSISTENCYANDREPLICATION607

    ]3.7.1StaticApnroachcs608

    13.7.2DynuncReplicanon611

    13.8rAt1TTOLERANCE6]3

    13.8.1ReliablepobIishSubscribeCOmmunicaiioIa613

    13.8.2FaultToleranceinSharedDataspaces616

    13.9SECURITY617

    13.9.1COnfidentia]IIy618

    13.9.2SecureSharedDataspaces620

    13.10SUMMARY62]



    XuCONTENTS

    14SUGGESTIONSFORFURTHERREADING623

    ANDBIBLIOGRAPHY

    ]4.1SUGGESTIONSFORFURTHERREADING623

    14.ifintroductionandGenelalWorks623

    1412Architectures624

    14.I.3PIOCesses625

    14.l.4Commumcatloll626

    14.l.5Naming626

    14.I.6Synchronization627

    14.I.7COnsistencyandffepIication628

    14.1.8FaultTolerance629

    14.l.9Secllnty630

    14.I.IODIStributedOnjectBasedSysteIIIS631

    141.11DistxlblltedFileSystems632

    14112]distributedWeb-BasedSysten3s632

    14l.13DistributedCoordinationBasedSystems633

    14.2ALPHABETICALBIBLIOGRAPHY634

    INDEX669
  • 内容简介:
      《大学计算机教育国外著名教材系列:分布式系统原理与范型(第2版)(影印版)》是著名作者Tanenbaum关于分布式系统的最新力作,是分布式系统的权威教材。本书分成了两大部分。第2~9章讨论的是分布式系统的的原理、概念和技术,包括通信、进程、命名、同步化、一致性和复制、容错性以及安全性等,而分布式应用的开发方法(即范型)在第10~13章中进行了讨论。但是,与前一版不同的是,本书没有在讨论范型的章节中完整地介绍每个案例研究,而是通过一个有代表性的案例来解释原理。这种介绍方法不仅精简了素材,而且可以使得读者在阅读和学习时更愉快些。全书结构清晰,内容全面经典,系统性与先进性并茂。

      《大学计算机教育国外著名教材系列:分布式系统原理与范型(第2版)(影印版)》适用对象广泛,不仅可以作为学习分布式计算机的本科生和研究生的教材,对于从事分布式计算研究和工程应用的科技人员和工程技术人员来说,本书也是一本优秀的读物。
  • 目录:
    1INTRODUCTION1

    I.IDEFINITIONOFADISTRIBUTEDSYSTEM2

    1.2GOALS3

    ]ZIMaingResourcesAccessible3

    ].22DistributionTransparency4

    12.3Openness7

    l.2.4Scalability9

    ]2.5FItfaIIS16

    I.3TYPESOFDISTRIBUTEDSYSTEMS17

    1,3.1DistributedCompuhngSystems17

    l.3.2DistributedinformationSystems20

    l.3.3DistubutedPervasiveSystems24

    I.4SUMMARY30

    2ARCHITECTURES33

    ZIARCHITECTURALSTYLES34

    2.2SYSTEMARC~CTURES36

    22.1CentralizedAIchitectures36

    22.2DecentralizedArcLitectures43

    2.2.3HybndArchitectures52

    2.3ARCHITECTURESVERSUSMIDDLEWARE54

    2.3.1Interceptors55

    2.3.2GeneralAPPToachestoAdaptiveSoftware57

    2.3.3Discussion58



    tvCOMENTS

    2.4SELf-MANAGEMENTINDISTRIBUTEDSYSTEMS59

    241ThereedbaskC()lltr(>1Mode]6(j

    2.4.2ExampleSystemsMonitoringwithAstr,labe61

    2.43ExampleDifferentiatingRepllcatiollStrilteglesinGlobule63

    2.44ExampleAuionlahcComponentRepairMallagenlelltinJade65

    25SUMMARY66

    3PROCESSES69

    3.1THREADS70

    3.I.IIntroductiontoThieaus70

    31.2ThreadsinDistributedSystems75

    3.2VIRTUAL~ION79

    3.2.1TheRoleofVirtualizationinDlstrihutcdSyslems79

    3.22ArchitecturesofV]rtualMachlucsSO

    3.3CLIENTS82

    3.31NetwOIkedUserinterfaces82

    3.32Client-SideSoftwareforDistribuu(inTTansparency87

    34SERVERS88

    3.4.1DeneraIDesignISSues88

    3.4.2ServerClusters92

    3.4.3ManagingServerClusters98

    35COIJEMIGRAIION103

    35,1Approachesti)C()dcMigration]03

    3.5.2MzgrahonandLocalResollrces107

    3.5.3MlgrahoninHeterogelleousSystems]10

    3.6SUMMARY112

    4COMMUNICATION115

    41FLINDAMENTALS]16

    4.1.1LayeredPn)tocols116

    4.I.2TypesofCommllnicahon124

    4.2REMOTEPROCEDURECALL125

    42.1BasicRadoperation]26

    42.2ParameterPassing130



    CONTENTSl

    4.2.3ASynchroIIOus~]34

    4,24EXamplefDCERPC135

    4.3MESSAGEORIENTEDCOMMUNICATION140

    4.3.1MessageOrientedTrallsientCommunication141

    4.3.2MessageOrientedPeISistentCommunication]45

    4.3.3ExampleIBMsWehSphereMessage-QueuingSystem152

    44STREAM-ORIENTEDCOMMUNICATION157

    4.41SuPPorttorContinuousMedia158

    4.4.2SmiarnsandQualityofService160

    443SforalnSynchr(>n],aiion163

    4.5MULTICASTCOMMUNICATION]66

    45.1Application-Leve]Mlllticasting]66

    4.5.2GossipBasedDaalDissemination]70

    46SIJMMARY175

    5NAMING179

    5.1NAMES.IDENTIFIERS.ANDADDRESSES180

    5.2fIATNAMJNG182

    5.2.]SIInpIeSOIut.ions183

    5.2.2HomeBasedApproaches186

    5.23DistritiutedHashTabICS188

    5.2.4HieTarchicalApproaches191

    5.3STRUCTUREDNAMING]95

    5.3.1NameSpaces195

    5.3.2NameResolution198

    5.3.3TheInplementationofaNameSpace202

    5.3.4ExamplefTheDomainNameSyrialy209

    5.4ATTRIBUTeBASSONAMING217

    5.4.1DirectoryServices217

    5.42HieraIChicaI11npIemcntat]0IISfIDAP218

    5.4.3Dcccntrali7edInlplelnentations222

    5.5SUMmalY



    yiCONmeNTS

    6SYNCHRONIZATION231

    6.1CLOCkSYNCHRONIZATION232

    6.I.IPhysicalClOCks233

    6,l,2GlobalPositioningSystem236

    61,3ClockSynchronizationAlgorithms238

    62LOGICALCLOCKS244

    621LamportsLogicalClocks244

    622VectorClocks248

    6.3MUTUALEXCLUSION252

    6.3.1Overmew252

    6.3.2ACenlralizedAlg(lrithm253

    6.3.3ADecentralizedAlgoflthm254

    6.3.4ADistributedAlgonthm255

    6.3.5ATokenbangAlgontdri258

    6.3.6AComparisonoftheFourAlgonthms259

    6.4GLOBALPOSITIONINGOFNODES260

    65ELECTIONALGORIThmS263

    65.1TladitionalElectionAlgonthins264

    6.5.2ElectionsinWirelessEnvil+onments267

    6.53ElectionsinLarge-ScaleSystems269

    6.6SUMMARY270

    7CONSISTENCYANDREPLICATION273

    7.1INTRODUCTION274

    71,ItreasonsforReplication274

    71,2ffepIicationasSCalingtechnique275

    72DATA~CENTRJCCONSISTENCYMODELS276

    7.2.1ContmuousCollsistency277

    7.2.2ConsistentOrderingofoperahons281

    7.3CLIENT-CENTRICCONSISTENCYMODELS288

    7.3.1EVentualCOnsistency289

    7.3.2MonotomcReads291

    7.3.3MOnotonicWrites292

    7.3.4ReadYokeWntes294

    7,3,5WritesFollowReads295



    COmENTSVii

    7.4REPLICAMANAGemENT296

    7.4.1Replica-ServerPlaccnlent2t)6

    7.4.2O)ntentReP]]cationandllacemcnt298

    74.3ContentDistTibution302

    75CONSISTENCYPROTOCOLS306

    7.5.1ContinuousConsistency306

    7.5.2PrimaryBasedProll)cols308

    7.5.3ReplicatedWriteProtocols311

    75.4CacheCoherencePlotocols313

    7.>.5]nlplelnelltingClientCentricConsisiellcy315

    7.6SUMMARY317

    8FAULTTOLERANCE321

    8.1INTRODUCTJONTOFAULTTOIaXANCF322

    8.1,IBasicCOIICepIS322

    8.12foiIureMOdelS324

    8.]3FailureM3skIngbyRCdundancy326

    8.2PROCESSRESILIENCE328

    8.2.1Desig17ISSues328

    8.2.2FailureMaskingaIIdReplication330

    8.2.3AgreelncntinFaultySystems331

    8.2.4FailureDetecu(}n335

    8.3RELIABLECLJENT~SERVERCOMMUNICAIION336

    8.31Pointto-PointCommunication337

    8.3.2RPCSelllantlcsinthePresenceofFailllres337

    8.4RruIA-BLEGROUPCOMMUMCATION343

    8.4.]BasicReIiatrIeMuIticasiingSCnenICS343

    8.42SCaIaIIIIItyinReliableMuIhcasting343

    843AtomICMIIItICast348

    8.5DISTRIBUTEDCOMMIT355

    8.5.1Two-PhaseComlmt355

    8.52ThTecPhaseCI)mntit360

    8.6kECOVERY363

    8,6.1Intra)ductio~363

    8.6.2Checkpointing366





    VinCONTFNTS

    8.6.3massageLOgging369

    8.6.4Recovery-OnentedCompuhng372

    8.7SUMMARY373

    9SECURITY377

    9.]INTRODUCTIONTOSECURITY378

    91,1SecurityThreats.Policies.andMechanisms378

    9.l.2DesignIssues384

    9.].3Cryptogranh}=389

    92SECURECHANNELS396

    9.2.]Authentication397

    9.2.2MessageintegntyandConfidentiality405

    92.3SecureGroupCornmunlcatlon408

    92.4ExamplefKerbcros4if

    9.3ACCESSCONTROL413

    9.3.1GeneralIssuesinAccessControl414

    9.3.2Firewalls418

    9.3.3SecureMobileCode420

    9.3.4DenialofService427

    9.4SECURITYMANAGEMENT428

    94.1KeyManagement428

    9.4.2SecureGToupManagement433

    9.4.3AllthorizationManagement434

    9.5SUMMARY439

    10DISTRIBUTEDOBJECT-BASEDSYSTEMS443

    10.1ARCHITECTUre443

    10.I.IDistrIbutedOtijccts4M

    10.1.2ExamplefEntmpriseJavaBeaus446

    10.].3EXampleGIOtreDistributedSharedOtijects448

    10.2PROCESSES451

    10.2.1ObjectServers451

    10.2,2EXampleTheICedowntimeSystem454



    CONmeNTSiX

    10.3COMMUNICATION456

    10.3.1BindingaClienttoanObject456

    10.3.2StaticvcrsusDynamicRemoteMethodinvocations458

    ]0.33ParameterPassing460

    10.3.4EXaInpIeJavaRMJ46]

    1035OhIect-BasedMessaging464

    10.4NAMING466

    10.4.1CORBAOtijectRe,erences467

    10.4.2GlObeOtrjectReferences469

    10.5SYNCHRONIZATION470

    106CONSISTENCYANDREPLICATION472

    IO.6.1entryCOnsistency472

    10.6.2Replicatedinvocations475

    10.7FAULTTOLERANCE477

    ID.7,IExampleFaultTolerantCORBA477

    10.7.2ExampleFault-TolerantJava480

    10,8SECURITY48]

    10.8.1Example:G]obe482

    10.8.2Securityfi)rRemoteObjects486

    10.9SUMMARY487

    11DISTRIBUTEDFILESYSTEMS491

    II.]ARCHITECTURE491

    l111Client-ServerArchitectures491

    l112ClusteT-BasedDistributedFileSystems496

    l113SylmnetncArchitectures499

    1]2PROCESSES501

    1].3COMMUNICATION502

    I]31RadsinNFS502

    1]32TheRPCZSubsysteIV503

    1]33FIle-OTientedC(Immunicationinalan9505

    114NabING506

    114,INaminginNFS506

    ll.4.2ConstructingaGlobalaamsSpace512



    11.5SYNCHRONIZATION513

    ]1.5.]Semallticsl)fF]]eSharing513

    II.5.2FiICLOCkIng516

    11.5.3SharingFilesinCOda518

    11.6CONSISTENCYANDREPLICATION519

    11.6.]C]ientSideCaching520

    ll.6.2Server-SideReplication524

    ll.6.3ReplicahoninPeertoPcerFileSystems526

    ll.6.4FileReplicationinGbedSystems528

    11.7FAULTTOLERANCE529

    l1.7.]IJandlingByzantineFailures529

    l].7.2HighAvailabilityinPeer-to-PeerSystems53]

    I].8SECURITY532

    11slSecuntyinNFS533

    l].82DecentralizedAuthentication536

    l].83SecurePeer-to-PeerFile-ShanngSystems539

    1]9SUMMARY541

    12DISTRIBUTEDWEB-BASEDSYSTEMS545

    12.1ARCHITECTURE546

    12ifTraditionalWebBasedSystems546

    1212WebSeTVices551

    12.2PROCESSES554

    12.2.1ClIents554

    12.2.2TheApachcWebServero56

    12.2.3WCbSeTVerClusters558

    12.3COMMUNICATION560

    12.3.1HypcrtcxtTrilnsfelProtocol560

    123.2SimpleObjectACCessriotocoI566

    12.4NAMING567

    12.5SYNCHRONIZATION569

    126CONSISTENCYANDREPLICAnON570

    126.1WebProxyCaching571

    12.6.2ReplicationforWebHostingSystems573

    12.6.3ReplicationofWebAnviicaiions579



    CONmeNTsXi

    12.7FAULTTOLERANCE582

    12.8SECURITY584

    12.9SUMMARY585

    13DISTRIBUTEDCOORDINATION-BASED589

    SYSTEMS

    13.]INTRODUCTIONTOCOORDINATIONMODELS589

    13.2ARCHitECTURES59]

    13.2.]OverilllApproach592

    132.2Tradlll(malArchitestores593

    132.3PeeTtoPeerArchitectures596

    132,4MObiIit}=andC(]I)ruination599

    13.3PROCESSES601

    134COMMUNICATION60]

    13.4.]COntent-BasedROasting601

    13.4.2SllpportingCompositeSubscriptions603

    13.5NAMJNG604

    13.5.]DescribingCompositeEvellts604

    13.5.2MatchingEventsandSubscriptiolls606

    13.6SYNC[JRONIZATION607

    13.7CONSISTENCYANDREPLICATION607

    ]3.7.1StaticApnroachcs608

    13.7.2DynuncReplicanon611

    13.8rAt1TTOLERANCE6]3

    13.8.1ReliablepobIishSubscribeCOmmunicaiioIa613

    13.8.2FaultToleranceinSharedDataspaces616

    13.9SECURITY617

    13.9.1COnfidentia]IIy618

    13.9.2SecureSharedDataspaces620

    13.10SUMMARY62]



    XuCONTENTS

    14SUGGESTIONSFORFURTHERREADING623

    ANDBIBLIOGRAPHY

    ]4.1SUGGESTIONSFORFURTHERREADING623

    14.ifintroductionandGenelalWorks623

    1412Architectures624

    14.I.3PIOCesses625

    14.l.4Commumcatloll626

    14.l.5Naming626

    14.I.6Synchronization627

    14.I.7COnsistencyandffepIication628

    14.1.8FaultTolerance629

    14.l.9Secllnty630

    14.I.IODIStributedOnjectBasedSysteIIIS631

    141.11DistxlblltedFileSystems632

    14112]distributedWeb-BasedSysten3s632

    14l.13DistributedCoordinationBasedSystems633

    14.2ALPHABETICALBIBLIOGRAPHY634

    INDEX669
查看详情
其他版本 / 全部 (2)
相关图书 / 更多
分布式系统原理与范型
分布式光伏电站项目开发实用手册
姚杰
分布式系统原理与范型
分布式数据库系统原理(第4版)
帕特里克·瓦尔杜里兹(Patrick Valduriez) 著;范举 译;[德]塔姆尔·厄兹叙(M. Tamer ·zsu)
分布式系统原理与范型
分布式机器学习——系统、工程与实战
柳浩
分布式系统原理与范型
分布式环境下可信服务计算优化方法研究
张佩云
分布式系统原理与范型
分布式系统架构:架构策略与难题求解
[美]尼尔·福特(Neal Ford);[美]马克·理查兹(Mark Richards);[美]普拉莫德·萨达拉奇(Pramod Sadalage);[澳]扎马克·德加尼(Zhamak Dehghan
分布式系统原理与范型
分布式统一大数据虚拟文件系统——Alluxio原理、技术与实践
顾荣 刘嘉承 毛宝龙 著
分布式系统原理与范型
分布式协同制造系统及关键技术
朱海华
分布式系统原理与范型
分布式冷热电联供系统协同集成与主动调控方法研究
冯乐军
分布式系统原理与范型
分布式光储微电网系统设计、施工与维护
刘继茂;郭军
分布式系统原理与范型
分布式数据库架构设计与实践(5G与AI技术大系)
亚信科技有限公司(中国) 著
分布式系统原理与范型
分布式商业生态战略——数字商业新逻辑与企业数字化转型新策略
思二勋
分布式系统原理与范型
分布式形态学理论研究
安丰存;赵磊
您可能感兴趣 / 更多
分布式系统原理与范型
孩子,把你的手给我1:怎么说孩子才爱听,怎么教孩子才肯学?帮助每一位3-12岁孩子的父母结束与孩子的所有冲突!
[美]海姆·G.吉诺特
分布式系统原理与范型
怎样做成大事
[美]丹·加德纳(Dan Gardner) 著;贾拥民 译;湛庐文化 出品;[丹麦]傅以斌(Bent Flyvbjerg)
分布式系统原理与范型
1200年希腊罗马神话
[美]伊迪丝·汉密尔顿
分布式系统原理与范型
爱情心理学(新编本)
[美]罗伯特·J. 斯腾伯格 (美)凯琳·斯腾伯格 倪爱萍 译
分布式系统原理与范型
黄金圈法则
[美]西蒙·斯涅克 著;磨铁文化 出品
分布式系统原理与范型
汤姆·索亚历险记 彩图注音版 一二三四年级5-6-7-8-9岁小学生课外阅读经典 儿童文学无障碍有声伴读世界名著童话故事
[美]马克 吐温
分布式系统原理与范型
富兰克林自传 名家全译本 改变无数人命运的励志传奇 埃隆马斯克反复推荐 赠富兰克林签名照及精美插图
[美]本杰明·富兰克林 著;李自修 译
分布式系统原理与范型
意大利文艺复兴新艺术史
[美]迈克尔·韦恩·科尔 著;[美]斯蒂芬·J·坎贝尔;邵亦杨
分布式系统原理与范型
汤姆素亚历险记:中小学生课外阅读快乐读书吧 儿童文学无障碍有声伴读世界名著童话故事
[美]马克·吐温
分布式系统原理与范型
老人与海 彩图注音版 一二三四年级5-6-7-8-9岁小学生课外阅读经典 儿童文学无障碍有声伴读世界名著童话故事
[美]海明威
分布式系统原理与范型
养育的觉醒:全面激发孩子自驱力,教你如何心平气和做妈妈
[美]凯文·莱曼 著;唐晓璐 译;斯坦威 出品
分布式系统原理与范型
国际大奖图画书系列 共11册(小老鼠的恐惧的大书,大灰狼,红豆与菲比,别烦我,下雪了 ,穿靴子的猫 ,先有蛋,绿 ,特别快递,如果你想看鲸鱼 ,一个部落的孩子 ) 麦克米伦世纪
[美]莱恩·史密斯 (英)埃米莉·格雷维特 (美)劳拉·瓦卡罗·等/文 (英)埃米莉·格雷维特 等/图 彭懿 杨玲玲 阿甲 孙慧阳 白薇 译