• 分布式系统原理与范型
  • 分布式系统原理与范型
  • 分布式系统原理与范型
21年品牌 40万+商家 超1.5亿件商品

分布式系统原理与范型

21 3.0折 69 八五品

仅1件

辽宁大连
认证卖家担保交易快速发货售后保障

作者[美]特尼博姆 著

出版社清华大学出版社

出版时间2008-05

版次1

装帧平装

货号-16

上书时间2024-04-18

一起去看图书屋

已实名 已认证 进店 收藏店铺

   商品详情   

品相描述:八五品
图书标准信息
  • 作者 [美]特尼博姆 著
  • 出版社 清华大学出版社
  • 出版时间 2008-05
  • 版次 1
  • ISBN 9787302172772
  • 定价 69.00元
  • 装帧 平装
  • 开本 16开
  • 纸张 胶版纸
  • 页数 686页
  • 正文语种 英语
【内容简介】
  《大学计算机教育国外著名教材系列:分布式系统原理与范型(第2版)(影印版)》是著名作者Tanenbaum关于分布式系统的最新力作,是分布式系统的权威教材。本书分成了两大部分。第2~9章讨论的是分布式系统的的原理、概念和技术,包括通信、进程、命名、同步化、一致性和复制、容错性以及安全性等,而分布式应用的开发方法(即范型)在第10~13章中进行了讨论。但是,与前一版不同的是,本书没有在讨论范型的章节中完整地介绍每个案例研究,而是通过一个有代表性的案例来解释原理。这种介绍方法不仅精简了素材,而且可以使得读者在阅读和学习时更愉快些。全书结构清晰,内容全面经典,系统性与先进性并茂。

  《大学计算机教育国外著名教材系列:分布式系统原理与范型(第2版)(影印版)》适用对象广泛,不仅可以作为学习分布式计算机的本科生和研究生的教材,对于从事分布式计算研究和工程应用的科技人员和工程技术人员来说,本书也是一本优秀的读物。
【目录】
1INTRODUCTION1

I.IDEFINITIONOFADISTRIBUTEDSYSTEM2

1.2GOALS3

]ZIMaingResourcesAccessible3

].22DistributionTransparency4

12.3Openness7

l.2.4Scalability9

]2.5FItfaIIS16

I.3TYPESOFDISTRIBUTEDSYSTEMS17

1,3.1DistributedCompuhngSystems17

l.3.2DistributedinformationSystems20

l.3.3DistubutedPervasiveSystems24

I.4SUMMARY30

2ARCHITECTURES33

ZIARCHITECTURALSTYLES34

2.2SYSTEMARC~CTURES36

22.1CentralizedAIchitectures36

22.2DecentralizedArcLitectures43

2.2.3HybndArchitectures52

2.3ARCHITECTURESVERSUSMIDDLEWARE54

2.3.1Interceptors55

2.3.2GeneralAPPToachestoAdaptiveSoftware57

2.3.3Discussion58

tvCOMENTS

2.4SELf-MANAGEMENTINDISTRIBUTEDSYSTEMS59

241ThereedbaskC()lltr(>1Mode]6(j

2.4.2ExampleSystemsMonitoringwithAstr,labe61

2.43ExampleDifferentiatingRepllcatiollStrilteglesinGlobule63

2.44ExampleAuionlahcComponentRepairMallagenlelltinJade65

25SUMMARY66

3PROCESSES69

3.1THREADS70

3.I.IIntroductiontoThieaus70

31.2ThreadsinDistributedSystems75

3.2VIRTUAL~ION79

3.2.1TheRoleofVirtualizationinDlstrihutcdSyslems79

3.22ArchitecturesofV]rtualMachlucsSO

3.3CLIENTS82

3.31NetwOIkedUserinterfaces82

3.32Client-SideSoftwareforDistribuu(inTTansparency87

34SERVERS88

3.4.1DeneraIDesignISSues88

3.4.2ServerClusters92

3.4.3ManagingServerClusters98

35COIJEMIGRAIION103

35,1Approachesti)C()dcMigration]03

3.5.2MzgrahonandLocalResollrces107

3.5.3MlgrahoninHeterogelleousSystems]10

3.6SUMMARY112

4COMMUNICATION115

41FLINDAMENTALS]16

4.1.1LayeredPn)tocols116

4.I.2TypesofCommllnicahon124

4.2REMOTEPROCEDURECALL125

42.1BasicRadoperation]26

42.2ParameterPassing130

CONTENTSl

4.2.3ASynchroIIOus~]34

4,24EXamplefDCERPC135

4.3MESSAGEORIENTEDCOMMUNICATION140

4.3.1MessageOrientedTrallsientCommunication141

4.3.2MessageOrientedPeISistentCommunication]45

4.3.3ExampleIBMsWehSphereMessage-QueuingSystem152

44STREAM-ORIENTEDCOMMUNICATION157

4.41SuPPorttorContinuousMedia158

4.4.2SmiarnsandQualityofService160

443SforalnSynchr(>n],aiion163

4.5MULTICASTCOMMUNICATION]66

45.1Application-Leve]Mlllticasting]66

4.5.2GossipBasedDaalDissemination]70

46SIJMMARY175

5NAMING179

5.1NAMES.IDENTIFIERS.ANDADDRESSES180

5.2fIATNAMJNG182

5.2.]SIInpIeSOIut.ions183

5.2.2HomeBasedApproaches186

5.23DistritiutedHashTabICS188

5.2.4HieTarchicalApproaches191

5.3STRUCTUREDNAMING]95

5.3.1NameSpaces195

5.3.2NameResolution198

5.3.3TheInplementationofaNameSpace202

5.3.4ExamplefTheDomainNameSyrialy209

5.4ATTRIBUTeBASSONAMING217

5.4.1DirectoryServices217

5.42HieraIChicaI11npIemcntat]0IISfIDAP218

5.4.3Dcccntrali7edInlplelnentations222

5.5SUMmalY

yiCONmeNTS

6SYNCHRONIZATION231

6.1CLOCkSYNCHRONIZATION232

6.I.IPhysicalClOCks233

6,l,2GlobalPositioningSystem236

61,3ClockSynchronizationAlgorithms238

62LOGICALCLOCKS244

621LamportsLogicalClocks244

622VectorClocks248

6.3MUTUALEXCLUSION252

6.3.1Overmew252

6.3.2ACenlralizedAlg(lrithm253

6.3.3ADecentralizedAlgoflthm254

6.3.4ADistributedAlgonthm255

6.3.5ATokenbangAlgontdri258

6.3.6AComparisonoftheFourAlgonthms259

6.4GLOBALPOSITIONINGOFNODES260

65ELECTIONALGORIThmS263

65.1TladitionalElectionAlgonthins264

6.5.2ElectionsinWirelessEnvil+onments267

6.53ElectionsinLarge-ScaleSystems269

6.6SUMMARY270

7CONSISTENCYANDREPLICATION273

7.1INTRODUCTION274

71,ItreasonsforReplication274

71,2ffepIicationasSCalingtechnique275

72DATA~CENTRJCCONSISTENCYMODELS276

7.2.1ContmuousCollsistency277

7.2.2ConsistentOrderingofoperahons281

7.3CLIENT-CENTRICCONSISTENCYMODELS288

7.3.1EVentualCOnsistency289

7.3.2MonotomcReads291

7.3.3MOnotonicWrites292

7.3.4ReadYokeWntes294

7,3,5WritesFollowReads295

COmENTSVii

7.4REPLICAMANAGemENT296

7.4.1Replica-ServerPlaccnlent2t)6

7.4.2O)ntentReP]]cationandllacemcnt298

74.3ContentDistTibution302

75CONSISTENCYPROTOCOLS306

7.5.1ContinuousConsistency306

7.5.2PrimaryBasedProll)cols308

7.5.3ReplicatedWriteProtocols311

75.4CacheCoherencePlotocols313

7.>.5]nlplelnelltingClientCentricConsisiellcy315

7.6SUMMARY317

8FAULTTOLERANCE321

8.1INTRODUCTJONTOFAULTTOIaXANCF322

8.1,IBasicCOIICepIS322

8.12foiIureMOdelS324

8.]3FailureM3skIngbyRCdundancy326

8.2PROCESSRESILIENCE328

8.2.1Desig17ISSues328

8.2.2FailureMaskingaIIdReplication330

8.2.3AgreelncntinFaultySystems331

8.2.4FailureDetecu(}n335

8.3RELIABLECLJENT~SERVERCOMMUNICAIION336

8.31Pointto-PointCommunication337

8.3.2RPCSelllantlcsinthePresenceofFailllres337

8.4RruIA-BLEGROUPCOMMUMCATION343

8.4.]BasicReIiatrIeMuIticasiingSCnenICS343

8.42SCaIaIIIIItyinReliableMuIhcasting343

843AtomICMIIItICast348

8.5DISTRIBUTEDCOMMIT355

8.5.1Two-PhaseComlmt355

8.52ThTecPhaseCI)mntit360

8.6kECOVERY363

8,6.1Intra)ductio~363

8.6.2Checkpointing366

VinCONTFNTS

8.6.3massageLOgging369

8.6.4Recovery-OnentedCompuhng372

8.7SUMMARY373

9SECURITY377

9.]INTRODUCTIONTOSECURITY378

91,1SecurityThreats.Policies.andMechanisms378

9.l.2DesignIssues384

9.].3Cryptogranh}=389

92SECURECHANNELS396

9.2.]Authentication397

9.2.2MessageintegntyandConfidentiality405

92.3SecureGroupCornmunlcatlon408

92.4ExamplefKerbcros4if

9.3ACCESSCONTROL413

9.3.1GeneralIssuesinAccessControl414

9.3.2Firewalls418

9.3.3SecureMobileCode420

9.3.4DenialofService427

9.4SECURITYMANAGEMENT428

94.1KeyManagement428

9.4.2SecureGToupManagement433

9.4.3AllthorizationManagement434

9.5SUMMARY439

10DISTRIBUTEDOBJECT-BASEDSYSTEMS443

10.1ARCHITECTUre443

10.I.IDistrIbutedOtijccts4M

10.1.2ExamplefEntmpriseJavaBeaus446

10.].3EXampleGIOtreDistributedSharedOtijects448

10.2PROCESSES451

10.2.1ObjectServers451

10.2,2EXampleTheICedowntimeSystem454

CONmeNTSiX

10.3COMMUNICATION456

10.3.1BindingaClienttoanObject456

10.3.2StaticvcrsusDynamicRemoteMethodinvocations458

]0.33ParameterPassing460

10.3.4EXaInpIeJavaRMJ46]

1035OhIect-BasedMessaging464

10.4NAMING466

10.4.1CORBAOtijectRe,erences467

10.4.2GlObeOtrjectReferences469

10.5SYNCHRONIZATION470

106CONSISTENCYANDREPLICATION472

IO.6.1entryCOnsistency472

10.6.2Replicatedinvocations475

10.7FAULTTOLERANCE477

ID.7,IExampleFaultTolerantCORBA477

10.7.2ExampleFault-TolerantJava480

10,8SECURITY48]

10.8.1Example:G]obe482

10.8.2Securityfi)rRemoteObjects486

10.9SUMMARY487

11DISTRIBUTEDFILESYSTEMS491

II.]ARCHITECTURE491

l111Client-ServerArchitectures491

l112ClusteT-BasedDistributedFileSystems496

l113SylmnetncArchitectures499

1]2PROCESSES501

1].3COMMUNICATION502

I]31RadsinNFS502

1]32TheRPCZSubsysteIV503

1]33FIle-OTientedC(Immunicationinalan9505

114NabING506

114,INaminginNFS506

ll.4.2ConstructingaGlobalaamsSpace512

11.5SYNCHRONIZATION513

]1.5.]Semallticsl)fF]]eSharing513

II.5.2FiICLOCkIng516

11.5.3SharingFilesinCOda518

11.6CONSISTENCYANDREPLICATION519

11.6.]C]ientSideCaching520

ll.6.2Server-SideReplication524

ll.6.3ReplicahoninPeertoPcerFileSystems526

ll.6.4FileReplicationinGbedSystems528

11.7FAULTTOLERANCE529

l1.7.]IJandlingByzantineFailures529

l].7.2HighAvailabilityinPeer-to-PeerSystems53]

I].8SECURITY532

11slSecuntyinNFS533

l].82DecentralizedAuthentication536

l].83SecurePeer-to-PeerFile-ShanngSystems539

1]9SUMMARY541

12DISTRIBUTEDWEB-BASEDSYSTEMS545

12.1ARCHITECTURE546

12ifTraditionalWebBasedSystems546

1212WebSeTVices551

12.2PROCESSES554

12.2.1ClIents554

12.2.2TheApachcWebServero56

12.2.3WCbSeTVerClusters558

12.3COMMUNICATION560

12.3.1HypcrtcxtTrilnsfelProtocol560

123.2SimpleObjectACCessriotocoI566

12.4NAMING567

12.5SYNCHRONIZATION569

126CONSISTENCYANDREPLICAnON570

126.1WebProxyCaching571

12.6.2ReplicationforWebHostingSystems573

12.6.3ReplicationofWebAnviicaiions579

CONmeNTsXi

12.7FAULTTOLERANCE582

12.8SECURITY584

12.9SUMMARY585

13DISTRIBUTEDCOORDINATION-BASED589

SYSTEMS

13.]INTRODUCTIONTOCOORDINATIONMODELS589

13.2ARCHitECTURES59]

13.2.]OverilllApproach592

132.2Tradlll(malArchitestores593

132.3PeeTtoPeerArchitectures596

132,4MObiIit}=andC(]I)ruination599

13.3PROCESSES601

134COMMUNICATION60]

13.4.]COntent-BasedROasting601

13.4.2SllpportingCompositeSubscriptions603

13.5NAMJNG604

13.5.]DescribingCompositeEvellts604

13.5.2MatchingEventsandSubscriptiolls606

13.6SYNC[JRONIZATION607

13.7CONSISTENCYANDREPLICATION607

]3.7.1StaticApnroachcs608

13.7.2DynuncReplicanon611

13.8rAt1TTOLERANCE6]3

13.8.1ReliablepobIishSubscribeCOmmunicaiioIa613

13.8.2FaultToleranceinSharedDataspaces616

13.9SECURITY617

13.9.1COnfidentia]IIy618

13.9.2SecureSharedDataspaces620

13.10SUMMARY62]

XuCONTENTS

14SUGGESTIONSFORFURTHERREADING623

ANDBIBLIOGRAPHY

]4.1SUGGESTIONSFORFURTHERREADING623

14.ifintroductionandGenelalWorks623

1412Architectures624

14.I.3PIOCesses625

14.l.4Commumcatloll626

14.l.5Naming626

14.I.6Synchronization627

14.I.7COnsistencyandffepIication628

14.1.8FaultTolerance629

14.l.9Secllnty630

14.I.IODIStributedOnjectBasedSysteIIIS631

141.11DistxlblltedFileSystems632

14112]distributedWeb-BasedSysten3s632

14l.13DistributedCoordinationBasedSystems633

14.2ALPHABETICALBIBLIOGRAPHY634

INDEX669
点击展开 点击收起

—  没有更多了  —

以下为对购买帮助不大的评价

此功能需要访问孔网APP才能使用
暂时不用
打开孔网APP