skip to content
Distributed systems : principles and paradigms Preview this item
ClosePreview this item
Checking...

Distributed systems : principles and paradigms

Author: Andrew Tanenbaum; Maarten van Steen
Publisher: Upper Saddle River : Pearson Prentice Hall, cop. 2007.
Edition/Format:   Print book : English : 2nd editionView all editions and formats
Database:WorldCat
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: [manuel]
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Andrew Tanenbaum; Maarten van Steen
ISBN: 0136135536 9780136135531 0132392275 9780132392273
OCLC Number: 493974325
Description: 1 vol. (XVIII-686 p.) : ill., couv. ill. en coul. ; 24 cm
Contents: <B><P>CONTENTS</P><P>??</P><P>1 INTRODUCTION</P></B><P>1.1 DEFINITION OF A DISTRIBUTED SYSTEM </P><P>1.2 GOALS </P><P>1.2.1 Making Resources Accessible </P><P>1.2.2 Distribution Transparency </P><P>1.2.3 Openness </P><P>1.2.4 Scalability </P><P>1.2.5 Pitfalls</P><P>1.3 TYPES OF DISTRIBUTED SYSTEMS </P><P>1.3.1 Distributed Computing Systems </P><P>1.3.2 Distributed Information Systems </P><P>1.3.3 Distributed Pervasive Systems </P><P>1.4 SUMMARY </P><B><P>??</P><P>2 ARCHITECTURES </P></B><P>2.1 ARCHITECTURAL STYLES </P><P>2.2 SYSTEM ARCHITECTURES </P><P>2.2.1 Centralized Architectures </P><P>2.2.2 Decentralized Architectures </P><P>2.2.3 Hybrid Architectures </P><P>2.3 ARCHITECTURES VERSUS MIDDLEWARE </P><P>2.3.1 Interceptors </P><P>2.3.2 General Approaches to Adaptive Software </P><P>2.3.3 Discussion </P><P>2.4 SELF-MANAGEMENT IN DISTRIBUTED SYSTEMS </P><P>2.4.1 The Feedback Control Model </P><P>2.4.2 Example: Systems Monitoring with Astrolabe </P><P>2.4.3 Example: Differentiating Replication Strategies in Globule </P><P>2.4.4 Example: Automatic Component Repair Management in Jade </P><P>2.5 SUMMARY </P><B><P>??</P><P>3 PROCESSES </P></B><P>3.1 THREADS </P><P>3.1.1 Introduction to Threads </P><P>3.1.2 Threads in Distributed Systems </P><P>3.2 VIRTUALIZATION </P><P>3.2.1 The Role of Virtualization in Distributed Systems </P><P>3.2.2 Architectures of Virtual Machines </P><P>3.3 CLIENTS </P><P>3.3.1 Networked User Interfaces </P><P>3.3.2 Client-Side Software for Distribution Transparency </P><P>3.4 SERVERS </P><P>3.4.1 General Design Issues </P><P>3.4.2 Server Clusters </P><P>3.4.3 Managing Server Clusters </P><P>3.5 CODE MIGRATION </P><P>3.5.1 Approaches to Code Migration </P><P>3.5.2 Migration and Local Resources </P><P>3.5.3 Migration in Heterogeneous Systems </P><P>3.6 SUMMARY </P><B><P>??</P><P>4 COMMUNICATION </P></B><P>4.1 FUNDAMENTALS </P><P>4.1.1 Layered Protocols </P><P>4.1.2 Types of Communication </P><P>4.2 REMOTE PROCEDURE CALL </P><P>4.2.1 Basic RPC Operation </P><P>4.2.2 Parameter Passing </P><P>4.2.3 Asynchronous RPC </P><P>4.2.4 Example: DCE RPC </P><P>4.3 MESSAGE-ORIENTED COMMUNICATION </P><P>4.3.1 Message-Oriented Transient Communication </P><P>4.3.2 Message-Oriented Persistent Communication </P><P>4.3.3 Example: IBM?? s WebSphere Message-Queuing System </P><P>4.4 STREAM-ORIENTED COMMUNICATION </P><P>4.4.1 Support for Continuous Media </P><P>4.4.2 Streams and Quality of Service </P><P>4.4.3 Stream Synchronization </P><P>4.5 MULTICAST COMMUNICATION </P><P>4.5.1 Application-Level Multicasting </P><P>4.5.2 Gossip-Based Data Dissemination </P><P>4.6 SUMMARY </P><B><P>??</P><P>5 NAMING </P></B><P>5.1 NAMES, IDENTIFIERS, AND ADDRESSES </P><P>5.2 FLAT NAMING </P><P>5.2.1 Simple Solutions </P><P>5.2.2 Home-Based Approaches </P><P>5.2.3 Distributed Hash Tables </P><P>5.2.4 Hierarchical Approaches </P><P>5.3 STRUCTURED NAMING </P><P>5.3.1 Name Spaces </P><P>5.3.2 Name Resolution </P><P>5.3.3 The Implementation of a Name Space </P><P>5.3.4 Example: The Domain Name System </P><P>5.4 ATTRIBUTE-BASED NAMING </P><P>5.4.1 Directory Services </P><P>5.4.2 Hierarchical Implementations: LDAP </P><P>5.4.3 Decentralized Implementations </P><P>5.5 SUMMARY</P><B><P style="MARGIN: 0px" align=left text-align="left"></B><P style="MARGIN: 0px" align=left text-align="left">??</P><B><P style="MARGIN: 0px" align=left text-align="left">6 SYNCHRONIZATION </P></B><P style="MARGIN: 0px" align=left text-align="left">6.1 CLOCK SYNCHRONIZATION </P><P style="MARGIN: 0px" align=left text-align="left">6.1.1 Physical Clocks </P><P style="MARGIN: 0px" align=left text-align="left">6.1.2 Global Positioning System </P><P style="MARGIN: 0px" align=left text-align="left">6.1.3 Clock Synchronization Algorithms </P><P style="MARGIN: 0px" align=left text-align="left">6.2 LOGICAL CLOCKS </P><P style="MARGIN: 0px" align=left text-align="left">6.2.1 Lamport?? s Logical Clocks </P><P style="MARGIN: 0px" align=left text-align="left">6.2.2 Vector Clocks </P><P style="MARGIN: 0px" align=left text-align="left">6.3 MUTUAL EXCLUSION </P><P style="MARGIN: 0px" align=left text-align="left">6.3.1 Overview </P><P style="MARGIN: 0px" align=left text-align="left">6.3.2 A Centralized Algorithm </P><P style="MARGIN: 0px" align=left text-align="left">6.3.3 A Decentralized Algorithm </P><P style="MARGIN: 0px" align=left text-align="left">6.3.4 A Distributed Algorithm </P><P style="MARGIN: 0px" align=left text-align="left">6.3.5 A Token Ring Algorithm </P><P style="MARGIN: 0px" align=left text-align="left">6.3.6 A Comparison of the Four Algorithms </P><P style="MARGIN: 0px" align=left text-align="left">6.4 GLOBAL POSITIONING OF NODES </P><P style="MARGIN: 0px" align=left text-align="left">6.5 ELECTION ALGORITHMS </P><P style="MARGIN: 0px" align=left text-align="left">6.5.1 Traditional Election Algorithms </P><P style="MARGIN: 0px" align=left text-align="left">6.5.2 Elections in Wireless Environments </P><P style="MARGIN: 0px" align=left text-align="left">6.5.3 Elections in Large-Scale Systems </P><P style="MARGIN: 0px" align=left text-align="left">6.6 SUMMARY </P><B><P style="MARGIN: 0px" align=left text-align="left">??</P><P style="MARGIN: 0px" align=left text-align="left">7 CONSISTENCY AND REPLICATION </P></B><P style="MARGIN: 0px" align=left text-align="left">7.1 INTRODUCTION </P><P style="MARGIN: 0px" align=left text-align="left">7.1.1 Reasons for Replication </P><P style="MARGIN: 0px" align=left text-align="left">7.1.2 Replication as Scaling Technique </P><P style="MARGIN: 0px" align=left text-align="left">7.2 DATA-CENTRIC CONSISTENCY MODELS </P><P style="MARGIN: 0px" align=left text-align="left">7.2.1 Continuous Consistency </P><P style="MARGIN: 0px" align=left text-align="left">7.2.2 Consistent Ordering of Operations </P><P style="MARGIN: 0px" align=left text-align="left">7.3 CLIENT-CENTRIC CONSISTENCY MODELS </P><P style="MARGIN: 0px" align=left text-align="left">7.3.1 Eventual Consistency </P><P style="MARGIN: 0px" align=left text-align="left">7.3.2 Monotonic Reads </P><P style="MARGIN: 0px" align=left text-align="left">7.3.3 Monotonic Writes </P><P style="MARGIN: 0px" align=left text-align="left">7.3.4 Read Your Writes </P><P style="MARGIN: 0px" align=left text-align="left">7.3.5 Writes Follow Reads </P><P style="MARGIN: 0px" align=left text-align="left">7.4 REPLICA MANAGEMENT </P><P style="MARGIN: 0px" align=left text-align="left">7.4.1 Replica-Server Placement </P><P style="MARGIN: 0px" align=left text-align="left">7.4.2 Content Replication and Placement </P><P style="MARGIN: 0px" align=left text-align="left">7.4.3 Content Distribution</P><P style="MARGIN: 0px" align=left text-align="left">7.5 CONSISTENCY PROTOCOLS </P><P style="MARGIN: 0px" align=left text-align="left">7.5.1 Continuous Consistency </P><P style="MARGIN: 0px" align=left text-align="left">7.5.2 Primary-Based Protocols </P><P style="MARGIN: 0px" align=left text-align="left">7.5.3 Replicated-Write Protocols </P><P style="MARGIN: 0px" align=left text-align="left">7.5.4 Cache-Coherence Protocols </P><P style="MARGIN: 0px" align=left text-align="left">7.5.5 Implementing Client-Centric Consistency </P><P style="MARGIN: 0px" align=left text-align="left">7.6 SUMMARY </P><P style="MARGIN: 0px" align=left text-align="left">??</P><P style="MARGIN: 0px" align=left text-align="left"><B>8 FAULT TOLERANCE </P></B><P style="MARGIN: 0px" align=left text-align="left">8.1 INTRODUCTION TO FAULT TOLERANCE </P><P style="MARGIN: 0px" align=left text-align="left">8.1.1 Basic Concepts </P><P style="MARGIN: 0px" align=left text-align="left">8.1.2 Failure Models </P><P style="MARGIN: 0px" align=left text-align="left">8.1.3 Failure Masking by Redundancy </P><P style="MARGIN: 0px" align=left text-align="left">8.2 PROCESS RESILIENCE </P><P style="MARGIN: 0px" align=left text-align="left">8.2.1 Design Issues </P><P style="MARGIN: 0px" align=left text-align="left">8.2.2 Failure Masking and Replication </P><P style="MARGIN: 0px" align=left text-align="left">8.2.3 Agreement in Faulty Systems </P><P style="MARGIN: 0px" align=left text-align="left">8.2.4 Failure Detection </P><P style="MARGIN: 0px" align=left text-align="left">8.3 RELIABLE CLIENT-SERVER COMMUNICATION </P><P style="MARGIN: 0px" align=left text-align="left">8.3.1 Point-to-Point Communication </P><P style="MARGIN: 0px" align=left text-align="left">8.3.2 RPC Semantics in the Presence of Failures </P><P style="MARGIN: 0px" align=left text-align="left">8.4 RELIABLE GROUP COMMUNICATION </P><P style="MARGIN: 0px" align=left text-align="left">8.4.1 Basic Reliable-Multicasting Schemes </P><P style="MARGIN: 0px" align=left text-align="left">8.4.2 Scalability in Reliable Multicasting </P><P style="MARGIN: 0px" align=left text-align="left">8.4.3 Atomic Multicast </P><P style="MARGIN: 0px" align=left text-align="left">8.5 DISTRIBUTED COMMIT </P><P style="MARGIN: 0px" align=left text-align="left">8.5.1 Two-Phase Commit </P><P style="MARGIN: 0px" align=left text-align="left">8.5.2 Three-Phase Commit </P><P style="MARGIN: 0px" align=left text-align="left">8.6 RECOVERY </P><P style="MARGIN: 0px" align=left text-align="left">8.6.1 Introduction </P><P style="MARGIN: 0px" align=left text-align="left">8.6.2 Checkpointing </P><P style="MARGIN: 0px" align=left text-align="left">8.6.3 Message Logging </P><P style="MARGIN: 0px" align=left text-align="left">8.6.4 Recovery-Oriented Computing </P><P style="MARGIN: 0px" align=left text-align="left">8.7 SUMMARY </P><B><P style="MARGIN: 0px" align=left text-align="left">??</P><P style="MARGIN: 0px" align=left text-align="left">9 SECURITY</P></B><P style="MARGIN: 0px" align=left text-align="left">9.1 INTRODUCTION TO SECURITY </P><P style="MARGIN: 0px" align=left text-align="left">9.1.1 Security Threats, Policies, and Mechanisms </P><P style="MARGIN: 0px" align=left text-align="left">9.1.2 Design Issues </P><P style="MARGIN: 0px" align=left text-align="left">9.1.3 Cryptography </P><P style="MARGIN: 0px" align=left text-align="left">9.2 SECURE CHANNELS </P><P style="MARGIN: 0px" align=left text-align="left">9.2.1 Authentication </P><P style="MARGIN: 0px" align=left text-align="left">9.2.2 Message Integrity and Confidentiality </P><P style="MARGIN: 0px" align=left text-align="left">9.2.3 Secure Group Communication </P><P style="MARGIN: 0px" align=left text-align="left">9.2.4 Example: Kerberos </P><P style="MARGIN: 0px" align=left text-align="left">9.3 ACCESS CONTROL </P><P style="MARGIN: 0px" align=left text-align="left">9.3.1 General Issues in Access Control </P><P style="MARGIN: 0px" align=left text-align="left">9.3.2 Firewalls </P><P style="MARGIN: 0px" align=left text-align="left">9.3.3 Secure Mobile Code </P><P style="MARGIN: 0px" align=left text-align="left">9.3.4 Denial of Service </P><P style="MARGIN: 0px" align=left text-align="left">9.4 SECURITY MANAGEMENT </P><P style="MARGIN: 0px" align=left text-align="left">9.4.1 Key Management </P><P style="MARGIN: 0px" align=left text-align="left">9.4.2 Secure Group Management </P><P style="MARGIN: 0px" align=left text-align="left">9.4.3 Authorization Management </P><P style="MARGIN: 0px" align=left text-align="left">9.5 SUMMARY </P><B><P style="MARGIN: 0px" align=left text-align="left">??</P><P style="MARGIN: 0px" align=left text-align="left">10 DISTRIBUTED OBJECT-BASED SYSTEMS </P></B><P style="MARGIN: 0px" align=left text-align="left">10.1 ARCHITECTURE </P><P style="MARGIN: 0px" align=left text-align="left">10.1.1 Distributed Objects</P><P style="MARGIN: 0px" align=left text-align="left">10.1.2 Example: Enterprise Java Beans </P><P style="MARGIN: 0px" align=left text-align="left">10.1.3 Example: Globe Distributed Shared Objects </P><P style="MARGIN: 0px" align=left text-align="left">10.2 PROCESSES </P><P style="MARGIN: 0px" align=left text-align="left">10.2.1 Object Servers </P><P style="MARGIN: 0px" align=left text-align="left">10.2.2 Example: The Ice Runtime System </P><P style="MARGIN: 0px">10.3 COMMUNICATION </P><P style="MARGIN: 0px" align=left text-align="left">10.3.1 Binding a Client to an Object </P><P style="MARGIN: 0px" align=left text-align="left">10.3.2 Static versus Dynamic Remote Method Invocations </P><P style="MARGIN: 0px" align=left text-align="left">10.3.3 Parameter Passing </P><P style="MARGIN: 0px" align=left text-align="left">10.3.4 Example: Java RMI </P><P style="MARGIN: 0px" align=left text-align="left">10.3.5 Object-Based Messaging </P><P style="MARGIN: 0px" align=left text-align="left">10.4 NAMING </P><P style="MARGIN: 0px" align=left text-align="left">10.4.1 CORBA Object References </P><P style="MARGIN: 0px" align=left text-align="left">10.4.2 Globe Object References </P><P style="MARGIN: 0px" align=left text-align="left">10.5 SYNCHRONIZATION </P><P style="MARGIN: 0px" align=left text-align="left">10.6 CONSISTENCY AND REPLICATION </P><P style="MARGIN: 0px" align=left text-align="left">10.6.1 Entry Consistency </P><P style="MARGIN: 0px" align=left text-align="left">10.6.2 Replicated Invocations </P><P style="MARGIN: 0px" align=left text-align="left">10.7 FAULT TOLERANCE </P><P style="MARGIN: 0px" align=left text-align="left">10.7.1 Example: Fault-Tolerant CORBA </P><P style="MARGIN: 0px" align=left text-align="left">10.7.2 Example: Fault-Tolerant Java </P><P style="MARGIN: 0px" align=left text-align="left">10.8 SECURITY </P><P style="MARGIN: 0px" align=left text-align="left">10.8.1 Example: Globe </P><P style="MARGIN: 0px" align=left text-align="left">10.8.2 Security for Remote Objects </P><P style="MARGIN: 0px" align=left text-align="left">10.9 SUMMARY </P><B><P style="MARGIN: 0px" align=left text-align="left">??</P><P style="MARGIN: 0px" align=left text-align="left">11 DISTRIBUTED FILE SYSTEMS </P></B><P style="MARGIN: 0px" align=left text-align="left">11.1 ARCHITECTURE </P><P style="MARGIN: 0px" align=left text-align="left">11.1.1 Client-Server Architectures </P><P style="MARGIN: 0px" align=left text-align="left">11.1.2 Cluster-Based Distributed File Systems </P><P style="MARGIN: 0px" align=left text-align="left">11.1.3 Symmetric Architectures </P><P style="MARGIN: 0px" align=left text-align="left">11.2 PROCESSES </P><P style="MARGIN: 0px" align=left text-align="left">11.3 COMMUNICATION </P><P style="MARGIN: 0px" align=left text-align="left">11.3.1 RPCs in NFS </P><P style="MARGIN: 0px" align=left text-align="left">11.3.2 The RPC2 Subsystem </P><P style="MARGIN: 0px" align=left text-align="left">11.3.3 File-Oriented Communication in Plan 9 </P><P style="MARGIN: 0px" align=left text-align="left">11.4 NAMING </P><P style="MARGIN: 0px" align=left text-align="left">11.4.1 Naming in NFS </P><P style="MARGIN: 0px" align=left text-align="left">11.4.2 Constructing a Global Name Space </P><P style="MARGIN: 0px" align=left text-align="left">11.5 SYNCHRONIZATION </P><P style="MARGIN: 0px" align=left text-align="left">11.5.1 Semantics of File Sharing </P><P style="MARGIN: 0px" align=left text-align="left">11.5.2 File Locking </P><P style="MARGIN: 0px" align=left text-align="left">11.5.3 Sharing Files in Coda </P><P style="MARGIN: 0px" align=left text-align="left">11.6 CONSISTENCY AND REPLICATION </P><P style="MARGIN: 0px" align=left text-align="left">11.6.1 Client-Side Caching </P><P style="MARGIN: 0px" align=left text-align="left">11.6.2 Server-Side Replication </P><P style="MARGIN: 0px" align=left text-align="left">11.6.3 Replication in Peer-to-Peer File Systems </P><P style="MARGIN: 0px" align=left text-align="left">11.6.4 File Replication in Grid Systems </P><P style="MARGIN: 0px" align=left text-align="left">11.7 FAULT TOLERANCE </P><P style="MARGIN: 0px" align=left text-align="left">11.7.1 Handling Byzantine Failures </P><P style="MARGIN: 0px" align=left text-align="left">11.7.2 High Availability in Peer-to-Peer Systems </P><P style="MARGIN: 0px" align=left text-align="left">11.8 SECURITY </P><P style="MARGIN: 0px" align=left text-align="left">11.8.1 Security in NFS </P><P style="MARGIN: 0px" align=left text-align="left">11.8.2 Decentralized Authentication </P><P style="MARGIN: 0px" align=left text-align="left">11.8.3 Secure Peer-to-Peer File-Sharing Systems </P><P style="MARGIN: 0px" align=left text-align="left">11.9 SUMMARY </P><B><P style="MARGIN: 0px" align=left text-align="left">??</P><P style="MARGIN: 0px" align=left text-align="left">12 DISTRIBUTED WEB-BASED SYSTEMS </P></B><P style="MARGIN: 0px" align=left text-align="left">12.1 ARCHITECTURE </P><P style="MARGIN: 0px" align=left text-align="left">12.1.1 Traditional Web-Based Systems </P><P style="MARGIN: 0px" align=left text-align="left">12.1.2 Web Services </P><P style="MARGIN: 0px" align=left text-align="left">12.2 PROCESSES </P><P style="MARGIN: 0px" align=left text-align="left">12.2.1 Clients </P><P style="MARGIN: 0px" align=left text-align="left">12.2.2 The Apache Web Server </P><P style="MARGIN: 0px" align=left text-align="left">12.2.3 Web Server Clusters </P><P style="MARGIN: 0px" align=left text-align="left">12.3 COMMUNICATION </P><P style="MARGIN: 0px" align=left text-align="left">12.3.1 Hypertext Transfer Protocol </P><P style="MARGIN: 0px" align=left text-align="left">12.3.2 Simple Object Access Protocol </P><P style="MARGIN: 0px" align=left text-align="left">12.4 NAMING </P><P style="MARGIN: 0px" align=left text-align="left">12.5 SYNCHRONIZATION </P><P style="MARGIN: 0px" align=left text-align="left">12.6 CONSISTENCY AND REPLICATION </P><P style="MARGIN: 0px" align=left text-align="left">12.6.1 Web Proxy Caching </P><P style="MARGIN: 0px" align=left text-align="left">12.6.2 Replication for Web Hosting Systems </P><P style="MARGIN: 0px" align=left text-align="left">12.6.3 Replication of Web Applications </P><P style="MARGIN: 0px">12.7 FAULT TOLERANCE </P><P style="MARGIN: 0px" align=left text-align="left">12.8 SECURITY </P><P style="MARGIN: 0px" align=left text-align="left">12.9 SUMMARY </P><B><P style="MARGIN: 0px" align=left text-align="left">??</P><P style="MARGIN: 0px" align=left text-align="left">13 DISTRIBUTED COORDINATION-BASED </P><P style="MARGIN: 0px" align=left text-align="left">SYSTEMS</P></B><P style="MARGIN: 0px" align=left text-align="left">13.1 INTRODUCTION TO COORDINATION MODELS </P><P style="MARGIN: 0px" align=left text-align="left">13.2 ARCHITECTURES </P><P style="MARGIN: 0px" align=left text-align="left">13.2.1 Overall Approach </P><P style="MARGIN: 0px" align=left text-align="left">13.2.2 Traditional Architectures </P><P style="MARGIN: 0px" align=left text-align="left">13.2.3 Peer-to-Peer Architectures </P><P style="MARGIN: 0px" align=left text-align="left">13.2.4 Mobility and Coordination </P><P style="MARGIN: 0px" align=left text-align="left">13.3 PROCESSES </P><P style="MARGIN: 0px" align=left text-align="left">13.4 COMMUNICATION </P><P style="MARGIN: 0px" align=left text-align="left">13.4.1 Content-Based Routing </P><P style="MARGIN: 0px" align=left text-align="left">13.4.2 Supporting Composite Subscriptions </P><P style="MARGIN: 0px" align=left text-align="left">13.5 NAMING </P><P style="MARGIN: 0px" align=left text-align="left">13.5.1 Describing Composite Events </P><P style="MARGIN: 0px" align=left text-align="left">13.5.2 Matching Events and Subscriptions </P><P style="MARGIN: 0px" align=left text-align="left">13.6 SYNCHRONIZATION </P><P style="MARGIN: 0px" align=left text-align="left">13.7 CONSISTENCY AND REPLICATION </P><P style="MARGIN: 0px" align=left text-align="left">13.7.1 Static Approaches </P><P style="MARGIN: 0px" align=left text-align="left">13.7.2 Dynamic Replication </P><P style="MARGIN: 0px" align=left text-align="left">13.8 FAULT TOLERANCE </P><P style="MARGIN: 0px" align=left text-align="left">13.8.1 Reliable Publish-Subscribe Communication </P><P style="MARGIN: 0px" align=left text-align="left">13.8.2 Fault Tolerance in Shared Dataspaces </P><P style="MARGIN: 0px" align=left text-align="left">13.9 SECURITY </P><P style="MARGIN: 0px" align=left text-align="left">13.9.1 Confidentiality </P><P style="MARGIN: 0px" align=left text-align="left">13.9.2 Secure Shared Dataspaces </P><P style="MARGIN: 0px" align=left text-align="left">13.10 SUMMARY </P><B><P style="MARGIN: 0px" align=left text-align="left"></B>??</P><B><P style="MARGIN: 0px" align=left text-align="left">14 SUGGESTIONS FOR FURTHER READING </P><P style="MARGIN: 0px" align=left text-align="left">AND BIBLIOGRAPHY</P></B><P style="MARGIN: 0px" align=left text-align="left">14.1 SUGGESTIONS FOR FURTHER READING </P><P style="MARGIN: 0px" align=left text-align="left">14.1.1 Introduction and General Works </P><P style="MARGIN: 0px" align=left text-align="left">14.1.2 Architectures </P><P style="MARGIN: 0px" align=left text-align="left">14.1.3 Processes </P><P style="MARGIN: 0px" align=left text-align="left">14.1.4 Communication </P><P style="MARGIN: 0px" align=left text-align="left">14.1.5 Naming </P><P style="MARGIN: 0px" align=left text-align="left">14.1.6 Synchronization </P><P style="MARGIN: 0px" align=left text-align="left">14.1.7 Consistency and Replication </P><P style="MARGIN: 0px" align=left text-align="left">14.1.8 Fault Tolerance </P><P style="MARGIN: 0px" align=left text-align="left">14.1.9 Security </P><P style="MARGIN: 0px" align=left text-align="left">14.1.10 Distributed Object-Based Systems </P><P style="MARGIN: 0px" align=left text-align="left">14.1.11 Distributed File Systems </P><P style="MARGIN: 0px" align=left text-align="left">14.1.12 Distributed Web-Based Systems </P><P style="MARGIN: 0px" align=left text-align="left">14.1.13 Distributed Coordination-Based Systems </P><P style="MARGIN: 0px" align=left text-align="left">14,2 ALPHABETICAL BIBLIOGRAPHY </P><B><P style="MARGIN: 0px" align=left text-align="left">INDEX </P></B>
Responsibility: Andrew S. Tanenbaum, Maarten Van Steen.
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/493974325> # Distributed systems principles and paradigms
    a schema:Book, schema:CreativeWork ;
    library:oclcnum "493974325" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/xxu> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/2909545267#Place/upper_saddle_river> ; # Upper Saddle River
    schema:about <http://experiment.worldcat.org/entity/work/data/2909545267#Topic/informatique_repartie> ; # Informatique répartie
    schema:about <http://experiment.worldcat.org/entity/work/data/2909545267#Topic/distributed_operating_systems_computers> ; # Distributed operating systems (Computers)
    schema:about <http://experiment.worldcat.org/entity/work/data/2909545267#Topic/traitement_reparti> ; # Traitement réparti
    schema:about <http://experiment.worldcat.org/entity/work/data/2909545267#Topic/systemes_d_exploitation_repartis> ; # Systèmes d'exploitation répartis
    schema:about <http://experiment.worldcat.org/entity/work/data/2909545267#Topic/informatique_distribuee> ; # informatique distribuée
    schema:about <http://experiment.worldcat.org/entity/work/data/2909545267#Topic/electronic_data_processing_distributed_processing> ; # Electronic data processing--Distributed processing
    schema:about <http://dewey.info/class/005.4476/e22/> ;
    schema:about <http://id.loc.gov/authorities/subjects/sh85042293> ; # Electronic data processing--Distributed processing
    schema:about <http://experiment.worldcat.org/entity/work/data/2909545267#Topic/systeme_d_exploitation_reparti> ; # Système d'exploitation réparti
    schema:bookEdition "2nd edition." ;
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/2909545267#Person/steen_maarten_van> ; # Maarten van Steen
    schema:copyrightYear "op." ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/2909545267#Person/tanenbaum_andrew_1944> ; # Andrew Tanenbaum
    schema:datePublished "2007" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/2909545267> ;
    schema:inLanguage "en" ;
    schema:name "Distributed systems principles and paradigms" ;
    schema:productID "493974325" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/493974325#PublicationEvent/upper_saddle_river_pearson_prentice_hall_cop_2007> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/2909545267#Agent/pearson_prentice_hall> ; # Pearson Prentice Hall
    schema:url <http://catdir.loc.gov/catdir/toc/ecip0617/2006024063.html> ;
    schema:workExample <http://worldcat.org/isbn/9780132392273> ;
    schema:workExample <http://worldcat.org/isbn/9780136135531> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/493974325> ;
    .


Related Entities

<http://catdir.loc.gov/catdir/toc/ecip0617/2006024063.html>
    rdfs:comment "Table of contents only" ;
    .

<http://experiment.worldcat.org/entity/work/data/2909545267#Agent/pearson_prentice_hall> # Pearson Prentice Hall
    a bgn:Agent ;
    schema:name "Pearson Prentice Hall" ;
    .

<http://experiment.worldcat.org/entity/work/data/2909545267#Person/steen_maarten_van> # Maarten van Steen
    a schema:Person ;
    schema:familyName "Steen" ;
    schema:givenName "Maarten van" ;
    schema:name "Maarten van Steen" ;
    .

<http://experiment.worldcat.org/entity/work/data/2909545267#Person/tanenbaum_andrew_1944> # Andrew Tanenbaum
    a schema:Person ;
    schema:birthDate "1944" ;
    schema:deathDate "," ;
    schema:familyName "Tanenbaum" ;
    schema:givenName "Andrew" ;
    schema:name "Andrew Tanenbaum" ;
    .

<http://experiment.worldcat.org/entity/work/data/2909545267#Place/upper_saddle_river> # Upper Saddle River
    a schema:Place ;
    schema:name "Upper Saddle River" ;
    .

<http://experiment.worldcat.org/entity/work/data/2909545267#Topic/distributed_operating_systems_computers> # Distributed operating systems (Computers)
    a schema:Intangible ;
    schema:name "Distributed operating systems (Computers)" ;
    .

<http://experiment.worldcat.org/entity/work/data/2909545267#Topic/electronic_data_processing_distributed_processing> # Electronic data processing--Distributed processing
    a schema:Intangible ;
    schema:name "Electronic data processing--Distributed processing" ;
    .

<http://experiment.worldcat.org/entity/work/data/2909545267#Topic/informatique_distribuee> # informatique distribuée
    a schema:Intangible ;
    schema:name "informatique distribuée" ;
    .

<http://experiment.worldcat.org/entity/work/data/2909545267#Topic/informatique_repartie> # Informatique répartie
    a schema:Intangible ;
    schema:name "Informatique répartie" ;
    .

<http://experiment.worldcat.org/entity/work/data/2909545267#Topic/systeme_d_exploitation_reparti> # Système d'exploitation réparti
    a schema:Intangible ;
    schema:name "Système d'exploitation réparti" ;
    .

<http://experiment.worldcat.org/entity/work/data/2909545267#Topic/systemes_d_exploitation_repartis> # Systèmes d'exploitation répartis
    a schema:Intangible ;
    schema:name "Systèmes d'exploitation répartis" ;
    schema:name "Systèmes d'exploitation répartis"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/2909545267#Topic/traitement_reparti> # Traitement réparti
    a schema:Intangible ;
    schema:name "Traitement réparti" ;
    schema:name "Traitement réparti"@fr ;
    .

<http://id.loc.gov/authorities/subjects/sh85042293> # Electronic data processing--Distributed processing
    a schema:Intangible ;
    schema:name "Electronic data processing--Distributed processing" ;
    .

<http://worldcat.org/isbn/9780132392273>
    a schema:ProductModel ;
    schema:isbn "0132392275" ;
    schema:isbn "9780132392273" ;
    .

<http://worldcat.org/isbn/9780136135531>
    a schema:ProductModel ;
    schema:isbn "0136135536" ;
    schema:isbn "9780136135531" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.