PREFACE
1CHARACTERIZATIONOFDISTRIBUTEDSYSTEMS
1.1Introduction
1.2Examplesofdistributedsystems
1.3ResourcesharingandtheWeb
1.4Challenges
1.5Summary
2SYSTEMMODELS
2.1Introduction
2.2Architecturalmodels
2.3Fundamentalmodels
2.4Summary
3NETWORKINGANDINTERNETWORKING
3.1Introduction
3.2Typesofnetwork
3.3Networkprinciples
3.4internetprotocols
3.5Casestudies:Ethernet,WiFi,BluetoothandATM
3.6Summary
INTERPROCESSCOMMUNICATION
4.1Introduction
4.2TheAPlfortheInternetprotocols
4.3Externaldatarepresentationandmarshalling
4.4Client-servercommunication
4.5Groupcommunication
4.6Casestudy:interprocesscommunicationinUNIX
4.7Summary
5DISTRIBUTEDOBJECTSANDREMOTEINVOCATION
5.1Introduction
5.2Communicationbetweendistributedobjects
5.3Remoteprocedurecall
5.4Eventsandnotifications
5.5Casestudy:JavaRMI
5.6Summary
6OPERATINGSYSTEMSUPPORT
6.1Introduction
6.2Theoperatingsystemlayer
6.3Protection
6.4Processesandthreads
6,5Communicationandinvocation
6.6Operatingsystemarchitecture
6.7Summary
SECURITY
7.1Introduction
7.2Overviewofsecuritytechniques
7.3Cryptographicalgorithms
7.4Digitalsignatures
7,5Cryptographypragmatics
7.6Casestudies:Needham-Schroeder,Kerberos,TLS,802.11WiFi
7,7Summary
DISTRIBUTEDFILESYSTEMS
8.1Introduction
8.2Fileservicearchitecture
8.3Casestudy:SunNetworkFileSystem
8.4Casestudy:TheAndrewFileSystem
8.5Enhancementsandfurtherdevelopments
8.6Summary
NAMESERVICES
9.1Introduction
9.2NameservicesandtheDomainNameSystem
9.3Directoryservices
9.4CasestudyoftheGlobalNameService
9.5CasestudyoftheX.500DirectoryService
9.6Summary
10PEER-TO-PEERSYSTEMS
10.1Introduction
10.2Napsteranditslegacy
10.3Peer-to-peermiddleware
10.4Routingoverlays
10.5Overlaycasestudies:Pastry,Tapestry
10.6Applicationcasestudies:Squirrel,OceanStore,Ivy
10.7Summary
11TIMEANDGLOBALSTATES
11.1Introduction
11.2Clocks,eventsandprocessstates
11.3Synchronizingphysicalclocks
11.4Logicaltimeandlogicalclocks
11.5Globalstates
11.6Distributeddebugging
11.7Summary
12COORDINATIONANDAGREEMENT
12.1Introduction
12.2Distributedmutualexclusion
12.3Elections
12.4Multicastcommunication
12.5Consensusandrelatedproblems
12.6Summary
13TRANSACTIONSANDCONCURRENCYCONTROL
13.1Introduction
13.2Transactions
13.3Nestedtransactions
13.4Locks
13.5Optimisticconcurrencycontrol
13.6Timestampordering
13.7Comparisonofmethodsforconcurrencycontrol
13.8Summary
14DISTRIBUTEDTRANSACTIONS
14.1Introduction
14.2Flatandnesteddistributedtransactions
14.3Atomiccommitprotocols
14.4Concurrencycontrolindistributedtransactions
14.5Distributeddeadlocks
14.6Transactionrecovery
14.7Summary
15REPLICATION
15.1introduction
152Systemmodelandgroupcommunication
15.3Fault-tolerantservices
15.4Casestudiesofhighlyavailableservices:
thegossiparchitecture,BayouandCoda
15.5Transactionswithreplicateddata
15.6Summary
MOBILEANDUBIQUITOUSCOMPLITINO
16.1Introduction
16.2Association
16.3Interoperation
16.4Sensingandcontext-awareness
16.5Securityandprivacy
16.6Adaptation
16.7CasestudyofCooltown
16.8Summary
17DISTRIBUTEDMULTIMEDIASYSTEMS
17.1Introduction
17.2Characteristicsofmultimediadata
17.3Qualityofservicemanagement
17.4Resourcemanagement
17.5Streamadaptation
17.6Casestudy:theTigervideofileserver
17.7Summary
18DISTRIBUTEDSHAREDMEMORY
18.1Introduction
18.2Designandimplementationissues
18.3SequentialconsistencyandIvycasestudy
18.4ReleaseconsistencyandMunincasestudy
18.5Otherconsistencymodels
18.6Summary
19WEBSERVICES
19.1Introduction
19.2Webservices
19.3ServicedescriptionsandIDLforwebservices
19.4Adirectoryserviceforusewithwebservices
19.5XMLsecurity
19.6Coordinationofwebservices
19.7Casestudy:theGrid
19.8Summary
20CORBACASESTUDY
20.1Introduction
20.2CORBARMI
20.3CORBAservices
20.4Summary
REFERENCES
INDEX