Distibuted Systems – Design and Algorithms

Design and Algorithms

Specificaties
Gebonden, 334 blz. | Engels
John Wiley & Sons | e druk, 2011
ISBN13: 9781848212503
Rubricering
Juridisch :
John Wiley & Sons e druk, 2011 9781848212503
Onderdeel van serie ISTE
Verwachte levertijd ongeveer 16 werkdagen

Samenvatting

In today s digital environment, distributed systems are increasingly present in a wide variety of environments, ranging from public software applications to critical systems.

Distributed Systems introduces the underlying concepts, the associated design techniques and the related security issues.

Distributed Systems: Design and Algorithms, is dedicated to engineers, students, and anyone familiar with algorithms and programming, who want to know more about distributed systems.

These systems are characterized by: several components with one or more threads, possibly running on different processors; asynchronous communications with possible additional assumptions (reliability, order preserving, etc.); local views for every component and no shared data between components. This title presents distributed systems from a point of view dedicated to their design and their main principles: the main algorithms are described and placed in their application context, i.e. consistency management and the way they are used in distributed file–systems.

Specificaties

ISBN13:9781848212503
Taal:Engels
Bindwijze:gebonden
Aantal pagina's:334
Serie:ISTE

Inhoudsopgave

<p>Foreword 9</p>
<p>Chapter 1. Introduction 13<br /> Serge HADDAD, Fabrice KORDON, Laurent PAUTET and Laure PETRUCCI</p>
<p>FIRST PART. LARGE SCALE PEER–TO–PEER DISTRIBUTED SYSTEMS 19</p>
<p>Chapter 2. Introduction to Large–Scale Peer–to–Peer Distributed Systems 21<br /> Fabrice KORDON</p>
<p>2.1. Large–Scale distributed systems? 21</p>
<p>2.2. Consequences of large–scale 22</p>
<p>2.3. Some large–scale distributed systems 23</p>
<p>2.4. Architectures of large scale distributed systems 26</p>
<p>2.5. Objective of Part 1 30</p>
<p>2.6. Bibliography 31</p>
<p>Chapter 3. Design Principles of Large–Scale Distributed System 33<br /> Xavier BONNAIRE and Pierre SENS</p>
<p>3.1. Introduction to peer–to–peer systems 33</p>
<p>3.2. The peer–to–peer paradigms 34</p>
<p>3.3. Services on structured overlays 41</p>
<p>3.4. Building trust in P2Psystems 43</p>
<p>3.5. Conclusion 52</p>
<p>3.6. Bibliography 53</p>
<p>Chapter 4. Peer–to–Peer Storage 59<br /> Olivier MARIN, S&eacute;bastien MONNET and Ga&euml;l THOMAS</p>
<p>4.1. Introduction 59</p>
<p>4.2. BitTorrent 60</p>
<p>4.3. Gnutella 66</p>
<p>4.4. Conclusion 79</p>
<p>4.5. Bibliography 79</p>
<p>Chapter 5. Large–Scale Peer–to–Peer Game Applications 81<br /> S&eacute;bastien MONNET and Ga&euml;l THOMAS</p>
<p>5.1. Introduction 81</p>
<p>5.2. Large–scale game applications: model and specific requirements 83</p>
<p>5.3. Overview of peer–to–peer overlays for large–scale game applications 90</p>
<p>5.4. Overlays for FPS games 93</p>
<p>5.5. Overlays for online life–simulation games 95</p>
<p>5.6. Conclusion 100</p>
<p>5.7. Bibliography 101</p>
<p>SECOND PART. DISTRIBUTED, EMBEDDED AND REAL–TIME SYSTEMS 105</p>
<p>Chapter 6. Introduction to Distributed Embedded and Real–time Systems 107<br /> Laurent PAUTET</p>
<p>6.1. Distributed real–time embedded systems 108</p>
<p>6.2. Safety critical systems as examples of DRE systems 109</p>
<p>6.3. Design process of DRE systems 112</p>
<p>6.4. Objectives of Part 2 114</p>
<p>6.5. Bibliography 115</p>
<p>Chapter 7. Scheduling in Distributed Real–Time Systems 117<br /> Emmanuel GROLLEAU, Micha&euml;l RICHARD, and Pascal RICHARD</p>
<p>7.1. Introduction 117</p>
<p>7.2. Generalities about real–time systems 118</p>
<p>7.3. Temporal correctness 122</p>
<p>7.4. WCRT of the tasks 126</p>
<p>7.5. WCRT of the messages 142</p>
<p>7.6. Case study 149</p>
<p>7.7. Conclusion 154</p>
<p>7.8. Bibliography 155</p>
<p>Chapter 8. Software Engineering for Adaptative Embedded Systems 159<br /> Etienne BORDE</p>
<p>8.1. Introduction 159</p>
<p>8.2. Adaptation, an additional complexity factor 160</p>
<p>8.3. Theoretical aspects of adaptation management 163</p>
<p>8.4. Technical solutions for the design of adaptative embedded systems 171</p>
<p>8.5. An example of adaptative system from the robotic domain 176</p>
<p>8.6. Applying MDE techniques to the design of the robotic use–case 177</p>
<p>8.7. Exploitation of the models 184</p>
<p>8.8. Conclusion 188</p>
<p>8.9. Bibliography 189</p>
<p>Chapter 9. The Design of Aerospace Systems 191<br /> Maxime PERROTIN, Julien DELANGE, and J&eacute;r&ocirc;me HUGUES</p>
<p>9.1. Introduction 191</p>
<p>9.2. Flight software typical architecture 193</p>
<p>9.3. Traditional development methods and their limits 195</p>
<p>9.4. Modeling a software system using TASTE: philosophy 197</p>
<p>9.5. Common solutions 199</p>
<p>9.6. What TASTE specifically proposes 200</p>
<p>9.7. Modeling process and tools 201</p>
<p>9.8. Technology 208</p>
<p>9.9. Model transformations 209</p>
<p>9.10. The TASTE run–time 213</p>
<p>9.11. Illustrating our process by designing heterogeneous systems 215</p>
<p>9.12. First user feedback and TASTE future 224</p>
<p>9.13. Conclusion 225</p>
<p>9.14. Bibliography 226</p>
<p>THIRD PART. SECURITY IN DISTRIBUTED SYSTEMS 229</p>
<p>Chapter 10. Introduction to Security Issues in Distributed Systems 231<br /> Laure PETRUCCI</p>
<p>10.1. Problem 231</p>
<p>10.2. Secure data exchange 233</p>
<p>10.3. Security in specific distributed systems 234</p>
<p>10.4. Outline of art III 234</p>
<p>10.5. Bibliography 235</p>
<p>Chapter 11. Practical Security in Distributed Systems 237<br /> Beno&icirc;t BERTHOLON, Christophe C&Eacute;RIN, Camille COTI, and S&eacute;bastien VARRETTE, Jean–Christophe DUBACQ</p>
<p>11.1. Introduction 237</p>
<p>11.2. Confidentiality 249</p>
<p>11.3. Authentication 252</p>
<p>11.4. Availability and fault tolerance 261</p>
<p>11.5. Ensuring resource security 278</p>
<p>11.6. Result checking in distributed computations 283</p>
<p>11.7. Conclusion 291</p>
<p>11.8. Bibliography 292</p>
<p>Chapter 12. Enforcing Security with Cryptography 301<br /> Sami HARARI and Laurent POINSOT</p>
<p>12.1. Introduction 301</p>
<p>12.2. Cryptography: from a general perspective 303</p>
<p>12.3. Symmetric encryption schemes 308</p>
<p>12.4. Prime numbers and public key cryptography 324</p>
<p>12.5. Conclusion 328</p>
<p>12.6. Bibliography 329</p>
<p>Index 333</p>

Net verschenen

Rubrieken

    Personen

      Trefwoorden

        Distibuted Systems – Design and Algorithms