分布式系统原理与范型
¥
67.3
9.8折
¥
69
九品
仅1件
作者[美]特尼博姆 著
出版社清华大学出版社
出版时间2008-05
版次1
装帧平装
货号A5
上书时间2024-11-28
商品详情
- 品相描述:九品
图书标准信息
-
作者
[美]特尼博姆 著
-
出版社
清华大学出版社
-
出版时间
2008-05
-
版次
1
-
ISBN
9787302172772
-
定价
69.00元
-
装帧
平装
-
开本
16开
-
纸张
胶版纸
-
页数
686页
-
正文语种
英语
- 【内容简介】
-
《大学计算机教育国外著名教材系列:分布式系统原理与范型(第2版)(影印版)》是著名作者Tanenbaum关于分布式系统的最新力作,是分布式系统的权威教材。本书分成了两大部分。第2~9章讨论的是分布式系统的的原理、概念和技术,包括通信、进程、命名、同步化、一致性和复制、容错性以及安全性等,而分布式应用的开发方法(即范型)在第10~13章中进行了讨论。但是,与前一版不同的是,本书没有在讨论范型的章节中完整地介绍每个案例研究,而是通过一个有代表性的案例来解释原理。这种介绍方法不仅精简了素材,而且可以使得读者在阅读和学习时更愉快些。全书结构清晰,内容全面经典,系统性与先进性并茂。
《大学计算机教育国外著名教材系列:分布式系统原理与范型(第2版)(影印版)》适用对象广泛,不仅可以作为学习分布式计算机的本科生和研究生的教材,对于从事分布式计算研究和工程应用的科技人员和工程技术人员来说,本书也是一本优秀的读物。
- 【目录】
-
1INTRODUCTION1
I.IDEFINITIONOFADISTRIBUTEDSYSTEM2
1.2GOALS3
]ZIMaingResourcesAccessible3
].22DistributionTransparency4
12.3Openness7
l.2.4Scalability9
]2.5FItfaIIS16
I.3TYPESOFDISTRIBUTEDSYSTEMS17
1,3.1DistributedCompuhngSystems17
l.3.2DistributedinformationSystems20
l.3.3DistubutedPervasiveSystems24
I.4SUMMARY30
2ARCHITECTURES33
ZIARCHITECTURALSTYLES34
2.2SYSTEMARC~CTURES36
22.1CentralizedAIchitectures36
22.2DecentralizedArcLitectures43
2.2.3HybndArchitectures52
2.3ARCHITECTURESVERSUSMIDDLEWARE54
2.3.1Interceptors55
2.3.2GeneralAPPToachestoAdaptiveSoftware57
2.3.3Discussion58
tvCOMENTS
2.4SELf-MANAGEMENTINDISTRIBUTEDSYSTEMS59
241ThereedbaskC()lltr(>1Mode]6(j
2.4.2ExampleSystemsMonitoringwithAstr,labe61
2.43ExampleDifferentiatingRepllcatiollStrilteglesinGlobule63
2.44ExampleAuionlahcComponentRepairMallagenlelltinJade65
25SUMMARY66
3PROCESSES69
3.1THREADS70
3.I.IIntroductiontoThieaus70
31.2ThreadsinDistributedSystems75
3.2VIRTUAL~ION79
3.2.1TheRoleofVirtualizationinDlstrihutcdSyslems79
3.22ArchitecturesofV]rtualMachlucsSO
3.3CLIENTS82
3.31NetwOIkedUserinterfaces82
3.32Client-SideSoftwareforDistribuu(inTTansparency87
34SERVERS88
3.4.1DeneraIDesignISSues88
3.4.2ServerClusters92
3.4.3ManagingServerClusters98
35COIJEMIGRAIION103
35,1Approachesti)C()dcMigration]03
3.5.2MzgrahonandLocalResollrces107
3.5.3MlgrahoninHeterogelleousSystems]10
3.6SUMMARY112
4COMMUNICATION115
41FLINDAMENTALS]16
4.1.1LayeredPn)tocols116
4.I.2TypesofCommllnicahon124
4.2REMOTEPROCEDURECALL125
42.1BasicRadoperation]26
42.2ParameterPassing130
CONTENTSl
4.2.3ASynchroIIOus~]34
4,24EXamplefDCERPC135
4.3MESSAGEORIENTEDCOMMUNICATION140
4.3.1MessageOrientedTrallsientCommunication141
4.3.2MessageOrientedPeISistentCommunication]45
4.3.3ExampleIBMsWehSphereMessage-QueuingSystem152
44STREAM-ORIENTEDCOMMUNICATION157
4.41SuPPorttorContinuousMedia158
4.4.2SmiarnsandQualityofService160
443SforalnSynchr(>n],aiion163
4.5MULTICASTCOMMUNICATION]66
45.1Application-Leve]Mlllticasting]66
4.5.2GossipBasedDaalDissemination]70
46SIJMMARY175
5NAMING179
5.1NAMES.IDENTIFIERS.ANDADDRESSES180
5.2fIATNAMJNG182
5.2.]SIInpIeSOIut.ions183
5.2.2HomeBasedApproaches186
5.23DistritiutedHashTabICS188
5.2.4HieTarchicalApproaches191
5.3STRUCTUREDNAMING]95
5.3.1NameSpaces195
5.3.2NameResolution198
5.3.3TheInplementationofaNameSpace202
5.3.4ExamplefTheDomainNameSyrialy209
5.4ATTRIBUTeBASSONAMING217
5.4.1DirectoryServices217
5.42HieraIChicaI11npIemcntat]0IISfIDAP218
5.4.3Dcccntrali7edInlplelnentations222
5.5SUMmalY
yiCONmeNTS
6SYNCHRONIZATION231
6.1CLOCkSYNCHRONIZATION232
6.I.IPhysicalClOCks233
6,l,2GlobalPositioningSystem236
61,3ClockSynchronizationAlgorithms238
62LOGICALCLOCKS244
621LamportsLogicalClocks244
622VectorClocks248
6.3MUTUALEXCLUSION252
6.3.1Overmew252
6.3.2ACenlralizedAlg(lrithm253
6.3.3ADecentralizedAlgoflthm254
6.3.4ADistributedAlgonthm255
6.3.5ATokenbangAlgontdri258
6.3.6AComparisonoftheFourAlgonthms259
6.4GLOBALPOSITIONINGOFNODES260
65ELECTIONALGORIThmS263
65.1TladitionalElectionAlgonthins264
6.5.2ElectionsinWirelessEnvil+onments267
6.53ElectionsinLarge-ScaleSystems269
6.6SUMMARY270
7CONSISTENCYANDREPLICATION273
7.1INTRODUCTION274
71,ItreasonsforReplication274
71,2ffepIicationasSCalingtechnique275
72DATA~CENTRJCCONSISTENCYMODELS276
7.2.1ContmuousCollsistency277
7.2.2ConsistentOrderingofoperahons281
7.3CLIENT-CENTRICCONSISTENCYMODELS288
7.3.1EVentualCOnsistency289
7.3.2MonotomcReads291
7.3.3MOnotonicWrites292
7.3.4ReadYokeWntes294
7,3,5WritesFollowReads295
COmENTSVii
7.4REPLICAMANAGemENT296
7.4.1Replica-ServerPlaccnlent2t)6
7.4.2O)ntentReP]]cationandllacemcnt298
74.3ContentDistTibution302
75CONSISTENCYPROTOCOLS306
7.5.1ContinuousConsistency306
7.5.2PrimaryBasedProll)cols308
7.5.3ReplicatedWriteProtocols311
75.4CacheCoherencePlotocols313
7.>.5]nlplelnelltingClientCentricConsisiellcy315
7.6SUMMARY317
8FAULTTOLERANCE321
8.1INTRODUCTJONTOFAULTTOIaXANCF322
8.1,IBasicCOIICepIS322
8.12foiIureMOdelS324
8.]3FailureM3skIngbyRCdundancy326
8.2PROCESSRESILIENCE328
8.2.1Desig17ISSues328
8.2.2FailureMaskingaIIdReplication330
8.2.3AgreelncntinFaultySystems331
8.2.4FailureDetecu(}n335
8.3RELIABLECLJENT~SERVERCOMMUNICAIION336
8.31Pointto-PointCommunication337
8.3.2RPCSelllantlcsinthePresenceofFailllres337
8.4RruIA-BLEGROUPCOMMUMCATION343
8.4.]BasicReIiatrIeMuIticasiingSCnenICS343
8.42SCaIaIIIIItyinReliableMuIhcasting343
843AtomICMIIItICast348
8.5DISTRIBUTEDCOMMIT355
8.5.1Two-PhaseComlmt355
8.52ThTecPhaseCI)mntit360
8.6kECOVERY363
8,6.1Intra)ductio~363
8.6.2Checkpointing366
VinCONTFNTS
8.6.3massageLOgging369
8.6.4Recovery-OnentedCompuhng372
8.7SUMMARY373
9SECURITY377
9.]INTRODUCTIONTOSECURITY378
91,1SecurityThreats.Policies.andMechanisms378
9.l.2DesignIssues384
9.].3Cryptogranh}=389
92SECURECHANNELS396
9.2.]Authentication397
9.2.2MessageintegntyandConfidentiality405
92.3SecureGroupCornmunlcatlon408
92.4ExamplefKerbcros4if
9.3ACCESSCONTROL413
9.3.1GeneralIssuesinAccessControl414
9.3.2Firewalls418
9.3.3SecureMobileCode420
9.3.4DenialofService427
9.4SECURITYMANAGEMENT428
94.1KeyManagement428
9.4.2SecureGToupManagement433
9.4.3AllthorizationManagement434
9.5SUMMARY439
10DISTRIBUTEDOBJECT-BASEDSYSTEMS443
10.1ARCHITECTUre443
10.I.IDistrIbutedOtijccts4M
10.1.2ExamplefEntmpriseJavaBeaus446
10.].3EXampleGIOtreDistributedSharedOtijects448
10.2PROCESSES451
10.2.1ObjectServers451
10.2,2EXampleTheICedowntimeSystem454
CONmeNTSiX
10.3COMMUNICATION456
10.3.1BindingaClienttoanObject456
10.3.2StaticvcrsusDynamicRemoteMethodinvocations458
]0.33ParameterPassing460
10.3.4EXaInpIeJavaRMJ46]
1035OhIect-BasedMessaging464
10.4NAMING466
10.4.1CORBAOtijectRe,erences467
10.4.2GlObeOtrjectReferences469
10.5SYNCHRONIZATION470
106CONSISTENCYANDREPLICATION472
IO.6.1entryCOnsistency472
10.6.2Replicatedinvocations475
10.7FAULTTOLERANCE477
ID.7,IExampleFaultTolerantCORBA477
10.7.2ExampleFault-TolerantJava480
10,8SECURITY48]
10.8.1Example:G]obe482
10.8.2Securityfi)rRemoteObjects486
10.9SUMMARY487
11DISTRIBUTEDFILESYSTEMS491
II.]ARCHITECTURE491
l111Client-ServerArchitectures491
l112ClusteT-BasedDistributedFileSystems496
l113SylmnetncArchitectures499
1]2PROCESSES501
1].3COMMUNICATION502
I]31RadsinNFS502
1]32TheRPCZSubsysteIV503
1]33FIle-OTientedC(Immunicationinalan9505
114NabING506
114,INaminginNFS506
ll.4.2ConstructingaGlobalaamsSpace512
11.5SYNCHRONIZATION513
]1.5.]Semallticsl)fF]]eSharing513
II.5.2FiICLOCkIng516
11.5.3SharingFilesinCOda518
11.6CONSISTENCYANDREPLICATION519
11.6.]C]ientSideCaching520
ll.6.2Server-SideReplication524
ll.6.3ReplicahoninPeertoPcerFileSystems526
ll.6.4FileReplicationinGbedSystems528
11.7FAULTTOLERANCE529
l1.7.]IJandlingByzantineFailures529
l].7.2HighAvailabilityinPeer-to-PeerSystems53]
I].8SECURITY532
11slSecuntyinNFS533
l].82DecentralizedAuthentication536
l].83SecurePeer-to-PeerFile-ShanngSystems539
1]9SUMMARY541
12DISTRIBUTEDWEB-BASEDSYSTEMS545
12.1ARCHITECTURE546
12ifTraditionalWebBasedSystems546
1212WebSeTVices551
12.2PROCESSES554
12.2.1ClIents554
12.2.2TheApachcWebServero56
12.2.3WCbSeTVerClusters558
12.3COMMUNICATION560
12.3.1HypcrtcxtTrilnsfelProtocol560
123.2SimpleObjectACCessriotocoI566
12.4NAMING567
12.5SYNCHRONIZATION569
126CONSISTENCYANDREPLICAnON570
126.1WebProxyCaching571
12.6.2ReplicationforWebHostingSystems573
12.6.3ReplicationofWebAnviicaiions579
CONmeNTsXi
12.7FAULTTOLERANCE582
12.8SECURITY584
12.9SUMMARY585
13DISTRIBUTEDCOORDINATION-BASED589
SYSTEMS
13.]INTRODUCTIONTOCOORDINATIONMODELS589
13.2ARCHitECTURES59]
13.2.]OverilllApproach592
132.2Tradlll(malArchitestores593
132.3PeeTtoPeerArchitectures596
132,4MObiIit}=andC(]I)ruination599
13.3PROCESSES601
134COMMUNICATION60]
13.4.]COntent-BasedROasting601
13.4.2SllpportingCompositeSubscriptions603
13.5NAMJNG604
13.5.]DescribingCompositeEvellts604
13.5.2MatchingEventsandSubscriptiolls606
13.6SYNC[JRONIZATION607
13.7CONSISTENCYANDREPLICATION607
]3.7.1StaticApnroachcs608
13.7.2DynuncReplicanon611
13.8rAt1TTOLERANCE6]3
13.8.1ReliablepobIishSubscribeCOmmunicaiioIa613
13.8.2FaultToleranceinSharedDataspaces616
13.9SECURITY617
13.9.1COnfidentia]IIy618
13.9.2SecureSharedDataspaces620
13.10SUMMARY62]
XuCONTENTS
14SUGGESTIONSFORFURTHERREADING623
ANDBIBLIOGRAPHY
]4.1SUGGESTIONSFORFURTHERREADING623
14.ifintroductionandGenelalWorks623
1412Architectures624
14.I.3PIOCesses625
14.l.4Commumcatloll626
14.l.5Naming626
14.I.6Synchronization627
14.I.7COnsistencyandffepIication628
14.1.8FaultTolerance629
14.l.9Secllnty630
14.I.IODIStributedOnjectBasedSysteIIIS631
141.11DistxlblltedFileSystems632
14112]distributedWeb-BasedSysten3s632
14l.13DistributedCoordinationBasedSystems633
14.2ALPHABETICALBIBLIOGRAPHY634
INDEX669
点击展开
点击收起
— 没有更多了 —
以下为对购买帮助不大的评价