Details

Distibuted Systems


Distibuted Systems

Design and Algorithms
1. Aufl.

von: Serge Haddad, Fabrice Kordon, Laurent Pautet, Laure Petrucci

144,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 09.01.2013
ISBN/EAN: 9781118601396
Sprache: englisch
Anzahl Seiten: 336

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

In today’s digital environment, distributed systems are increasingly present in a wide variety of environments, ranging from public software applications to critical systems.<br /> Distributed Systems introduces the underlying concepts, the associated design techniques and the related security issues.<br /> Distributed Systems: Design and Algorithms, is dedicated to engineers, students, and anyone familiar with algorithms and programming, who want to know more about distributed systems.<br /> These systems are characterized by: several components with one or more threads, possibly running on different processors; asynchronous communications with possible additional assumptions (reliability, order preserving, etc.); local views for every component and no shared data between components. This title presents distributed systems from a point of view dedicated to their design and their main principles: the main algorithms are described and placed in their application context, i.e. consistency management and the way they are used in distributed file-systems.
<p>Foreword 9</p> <p><b>Chapter 1. Introduction 13</b><br /> Serge HADDAD, Fabrice KORDON, Laurent PAUTET and Laure PETRUCCI</p> <p><b>FIRST PART. LARGE SCALE PEER-TO-PEER DISTRIBUTED SYSTEMS 19</b></p> <p><b>Chapter 2. Introduction to Large-Scale Peer-to-Peer Distributed Systems 21</b><br /> Fabrice KORDON</p> <p>2.1. “Large-Scale” distributed systems? 21</p> <p>2.2. Consequences of “large-scale” 22</p> <p>2.3. Some large-scale distributed systems 23</p> <p>2.4. Architectures of large scale distributed systems 26</p> <p>2.5. Objective of Part 1 30</p> <p>2.6. Bibliography 31</p> <p><b>Chapter 3. Design Principles of Large-Scale Distributed System 33</b><br /> Xavier BONNAIRE and Pierre SENS</p> <p>3.1. Introduction to peer-to-peer systems 33</p> <p>3.2. The peer-to-peer paradigms 34</p> <p>3.3. Services on structured overlays 41</p> <p>3.4. Building trust in P2Psystems 43</p> <p>3.5. Conclusion 52</p> <p>3.6. Bibliography 53</p> <p><b>Chapter 4. Peer-to-Peer Storage 59</b><br /> Olivier MARIN, Sébastien MONNET and Gaël THOMAS</p> <p>4.1. Introduction 59</p> <p>4.2. BitTorrent 60</p> <p>4.3. Gnutella 66</p> <p>4.4. Conclusion 79</p> <p>4.5. Bibliography 79</p> <p><b>Chapter 5. Large-Scale Peer-to-Peer Game Applications 81</b><br /> Sébastien MONNET and Gaël THOMAS</p> <p>5.1. Introduction 81</p> <p>5.2. Large-scale game applications: model and specific requirements 83</p> <p>5.3. Overview of peer-to-peer overlays for large-scale game applications 90</p> <p>5.4. Overlays for FPS games 93</p> <p>5.5. Overlays for online life-simulation games 95</p> <p>5.6. Conclusion 100</p> <p>5.7. Bibliography 101</p> <p><b>SECOND PART. DISTRIBUTED, EMBEDDED AND REAL-TIME SYSTEMS 105</b></p> <p><b>Chapter 6. Introduction to Distributed Embedded and Real-time Systems 107</b><br /> Laurent PAUTET</p> <p>6.1. Distributed real-time embedded systems 108</p> <p>6.2. Safety critical systems as examples of DRE systems 109</p> <p>6.3. Design process of DRE systems 112</p> <p>6.4. Objectives of Part 2 114</p> <p>6.5. Bibliography 115</p> <p><b>Chapter 7. Scheduling in Distributed Real-Time Systems 117</b><br /> Emmanuel GROLLEAU, Michaël RICHARD, and Pascal RICHARD</p> <p>7.1. Introduction 117</p> <p>7.2. Generalities about real-time systems 118</p> <p>7.3. Temporal correctness 122</p> <p>7.4. WCRT of the tasks 126</p> <p>7.5. WCRT of the messages 142</p> <p>7.6. Case study 149</p> <p>7.7. Conclusion 154</p> <p>7.8. Bibliography 155</p> <p><b>Chapter 8. Software Engineering for Adaptative Embedded Systems 159</b><br /> Etienne BORDE</p> <p>8.1. Introduction 159</p> <p>8.2. Adaptation, an additional complexity factor 160</p> <p>8.3. Theoretical aspects of adaptation management 163</p> <p>8.4. Technical solutions for the design of adaptative embedded systems 171</p> <p>8.5. An example of adaptative system from the robotic domain 176</p> <p>8.6. Applying MDE techniques to the design of the robotic use-case 177</p> <p>8.7. Exploitation of the models 184</p> <p>8.8. Conclusion 188</p> <p>8.9. Bibliography 189</p> <p><b>Chapter 9. The Design of Aerospace Systems 191</b><br /> Maxime PERROTIN, Julien DELANGE, and Jérôme HUGUES</p> <p>9.1. Introduction 191</p> <p>9.2. Flight software typical architecture 193</p> <p>9.3. Traditional development methods and their limits 195</p> <p>9.4. Modeling a software system using TASTE: philosophy 197</p> <p>9.5. Common solutions 199</p> <p>9.6. What TASTE specifically proposes 200</p> <p>9.7. Modeling process and tools 201</p> <p>9.8. Technology 208</p> <p>9.9. Model transformations 209</p> <p>9.10. The TASTE run-time 213</p> <p>9.11. Illustrating our process by designing heterogeneous systems 215</p> <p>9.12. First user feedback and TASTE future 224</p> <p>9.13. Conclusion 225</p> <p>9.14. Bibliography 226</p> <p><b>THIRD PART. SECURITY IN DISTRIBUTED SYSTEMS 229</b></p> <p><b>Chapter 10. Introduction to Security Issues in Distributed Systems 231</b><br /> Laure PETRUCCI</p> <p>10.1. Problem 231</p> <p>10.2. Secure data exchange 233</p> <p>10.3. Security in specific distributed systems 234</p> <p>10.4. Outline of art III 234</p> <p>10.5. Bibliography 235</p> <p><b>Chapter 11. Practical Security in Distributed Systems 237</b><br /> Benoît BERTHOLON, Christophe CÉRIN, Camille COTI, and Sébastien VARRETTE, Jean-Christophe DUBACQ</p> <p>11.1. Introduction 237</p> <p>11.2. Confidentiality 249</p> <p>11.3. Authentication 252</p> <p>11.4. Availability and fault tolerance 261</p> <p>11.5. Ensuring resource security 278</p> <p>11.6. Result checking in distributed computations 283</p> <p>11.7. Conclusion 291</p> <p>11.8. Bibliography 292</p> <p><b>Chapter 12. Enforcing Security with Cryptography 301</b><br /> Sami HARARI and Laurent POINSOT</p> <p>12.1. Introduction 301</p> <p>12.2. Cryptography: from a general perspective 303</p> <p>12.3. Symmetric encryption schemes 308</p> <p>12.4. Prime numbers and public key cryptography 324</p> <p>12.5. Conclusion 328</p> <p>12.6. Bibliography 329</p> <p>Index 333</p>
<p><strong>Fabrice Kordon</strong> is a full-time professor at Université P. & M. Curie (UPMC). <p><strong>Serge Haddad</strong> is a full-time professor at école Normale Supérieure de Cachan, a member of the CNRS laboratory LSV, and a member of the INRIA team MExICo. <p><strong>Laurent Pautet</strong> is a full-time professor at Télécom ParisTech and a member of the CNRS laboratory LTCI. <p><strong>Laure Petrucci</strong> is a full-time professor at University Paris 13 in France and a member of the CNRS laboratory LIPN.

Diese Produkte könnten Sie auch interessieren:

Symbian OS Explained
Symbian OS Explained
von: Jo Stichbury
PDF ebook
32,99 €
Symbian OS Internals
Symbian OS Internals
von: Jane Sales
PDF ebook
56,99 €
Parallel Combinatorial Optimization
Parallel Combinatorial Optimization
von: El-Ghazali Talbi
PDF ebook
120,99 €