图书介绍
分布式操作系统 概念与实践 英文版【2025|PDF下载-Epub版本|mobi电子书|kindle百度云盘下载】

- (美)Doreen L.Galli著 著
- 出版社: 北京:人民邮电出版社
- ISBN:7115103453
- 出版时间:2002
- 标注页数:464页
- 文件大小:34MB
- 文件页数:486页
- 主题词:分布式操作系统(学科: 高等学校) 分布式操作系统
PDF下载
下载说明
分布式操作系统 概念与实践 英文版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
1.1 What is an Operating System?1
1.Introduction to Distributed Systems1
1.2 What is a Distributed System?2
1.2.1 Popular Network Topologies and Features4
1.2.2 ISO/OSI Reference Model8
1.2.3 Distributed Computing Models12
1.2.4 Distributed versus Centralized Solutions14
1.2.5 Network vs. Distributed Operating Systems15
1.3 What is a Real-time System?16
1.3.1 Real-time Event Characteristics17
1.3.2 Network Characteristics Affecting Distributed Real-Time Applications17
1.4 What is a Parallel System?19
1.4.1 Parallel Architectures19
1.4.2 Parallel Software Paradigms23
1.5 Sample Distributed Application25
1.7 References for Further Study27
1.6 Summary27
Exercises28
2.The Kernel31
2.1 Kernel Types31
2.2 Processes and Threads33
2.2.1 Introduction to Multi-threaded Processes33
2.2.2 Multi-threaded Process Paradigms34
2.2.3 Multi-threaded support37
2.3 Process Management38
2.3.1 Types of Processes40
2.3.2 Load Distribution & Process Migration41
2.4 Process Scheduling45
2.4.1 Identifying Processes for Scheduling45
2.4.2 Scheduler Organization45
2.5 Summary46
Exercises49
2.6 References for Further Study49
3.Interprocess Communication53
3.1 Selection Factors54
3.2 Message Passing54
3.2.1 Blocking Primitives55
3.2.2 Non-blocking Primitives58
3.2.3 Process Address59
3.3.1 Unnamed Pipes61
3.3 Pipes61
3.3.2 Named Pipes63
3.4 Sockets63
3.4.1 UNIX Sockets65
3.4.2 JAVA Support for Sockets69
3.5 Remote Procedure Calls72
3.5.1 Parameter Type72
3.5.2 Data Type Support72
3.5.4 RPC Binding73
3.5.3 Parameter Marshalling73
3.5.5 RPC Authentication74
3.5.6 RPC Call Semantics75
3.5.7 SUN's ONC RPC76
3.6 Summary76
3.7 References for Further Study77
Exercises77
4.Memory Management81
4.1 Review of Centralized Memory Management82
4.1.1 Virtual Memory82
4.1.2 Pages and Segments82
4.1.3 Page Replacement Algorithms84
4.2 Simple Memory Model85
4.3 Shared Memory Model86
4.3.1 Shared Memory Performance87
4.3.2 Cache Consistency88
4.4 Distributed Shared Memory89
4.3.1 Methods for Distributing Shared Data90
4.3.2 DSM Performance Issues93
4.5 Memory Migration98
4.6 Summary100
4.7 References for Further Study101
Exercises102
5.Concurrency Control105
5.1 Mutual Exclusion & Critical Regions105
5.2 Semaphores107
5.2.1 Semaphore Weakness108
5.2.2 Semaphore Evaluation108
5.3 Monitors108
5.3.1 Condition Variables110
5.3.2 Monitor Evaluation111
5.4 Locks111
5.4.2 Atomic Operations and Hardware Support113
5.4.1 Taking Turns113
5.5 Software Lock Control115
5.5.1 Centralized Lock Manager115
5.5.2 Distributed Lock Manager116
5.6 Token-Passing Mutual Exclusion118
5.7 Deadlocks119
5.7.1 Prevent Deadlocks121
5.7.2 Avoid Deadlocks122
5.7.3 Ignore Deadlocks122
5.7.4 Detect Deadlocks122
5.8 Summary124
5.9 References for Further Study125
Exercises125
6.Object-Based Operating Systems127
6.1 Introduction to Objects128
6.1.1 Object Definitions.128
6.1.2 Evaluation of Objects129
6.2 The Clouds Object Approach131
6.2.1 Clouds'Objects131
6.2.2 Clouds Threads132
6.2.3 Clouds’Memory Storage132
6.3 Chorus V3 and COOL v2132
6.3.1 The Base Layer:COOL Memory Management134
6.3.2 The Generic Runtime System Layer:COOL Objects134
6.3.3 The Language-Specific Runtime System Layer135
6.4 Amoeba135
6.4.1 Identification and Protection of Amoeba Objects137
6.4.2 Amoeba Object Communication137
6.5 Distributed Component Object Model(DCOM)138
6.5.1 Monikers140
6.5.2 Remote Method Calls140
6.5.4 Thread Models Supported in DCOM141
6.5.3 Garbage Collection141
6.5.5 DCOM Security Policies142
6.6 CORBATM Overview143
6.6.1 CORBA’s ORB144
6.6.2 CORBA Object Adapters145
6.6.3 CORBA Messaging147
6.6.4 CORBA Compliance147
6.7 Summary148
6.6.5 CORBA to COM Mapping148
6.7 References for Further Study149
Exercises149
7.Distributed Process Management151
7.1 Distributed Scheduling Algorithm Choices152
7.1.1 Level of Scheduling152
7.1.2 Load Distribution Goals153
7.1.3 Scheduling Efficiency Goals153
7.1.4 Processor Binding Time155
7.2 Scheduling Algorithm Approaches157
7.2.1 Usage Points158
7.2.2 Graph Theory160
7.2.3 Probes162
7.2.4 Scheduling Queues163
7.2.5 Stochastic Learning166
7.3 Coordinator Elections167
7.4 Orphan Processes168
7.4.1 Orphan Clean Up170
7.4.2 Child Process Allowance172
7.4.3 Process Version Numbers173
7.5 Summary173
7.6 References for Further Study175
Exercises176
8.Distributed File Systems179
8.1 Distributed Name Service179
8.1.1 File Types180
8.1.2 Location Transparency181
8.1.3 Global Naming & Name Transparency181
8.2 Distributed File Service187
8.2.1 File Variations187
8.2.2 File Modification Notification190
8.2.3 File Service Implementations191
8.2.4 File Replication192
8.3 Distributed Directory Service195
8.3.1 Directory Structures195
8.3.2 Directory Management195
8.3.3 Directory Operations196
8.4 NFSTM197
8.4.1 NFS File Service197
8.4.2 NFS Directory Service198
8.4.3 NFS Name Service199
8.5 X.500200
8.5.1 X.500 File and Name Service:The Information Model201
8.5.2 X.500's Directory Service:The Directory Model202
8.6 Summary202
8.7 References for Further Study203
Exercises204
9.Transaction Management & Consistency Models207
9.1 Transaction Management Motivation208
9.1.1 The Lost Update208
9.1.2 Retrieval Disparity209
9.2 ACID Properties of a Transaction213
9.3 Consistency Models216
9.3.1 Strict Consistency Model216
9.3.2 Sequential Consistency Model216
9.3.3 Casual Consistency Model217
9.3.4 PRAM Consistency Model218
9.3.5 Processor Consistency Model219
9.3.6 Weak Consistency Model220
9.3.7 Release Consistency Model222
9.3.8 Lazy Release Consistency224
9.3.9 Entry Consistency Model224
9.4 Two-Phase Commit Protocol224
9.4.1 Prepare to Commit Phase225
9.4.2 Commit Phase227
9.5 Nested Transactions228
9.6 Implementation Issues for Transactions230
9.6.1 Premature Reads & Writes231
9.6.2 The Domino Effect of aborts231
9.6.3 Ensuring Recoverability231
9.7 Summary231
9.7 References for Further Study233
Exercises233
10.Distributed Synchronization235
10.1 Introduction to Global Time235
10.2.1 Obtaining an Accurate Physical Time236
10.2 Physical Clocks236
10.2.2 Synchronizing Physical Time237
10.2.3 Centralized Physical Time Services239
10.2.4 Distributed Physical Time Services242
10.3 Network Time Protocol(NTP)243
10.3.1 NTP Architecture244
10.3.2 NTP Design Goals244
10.3.3 NTP Synchronization Modes247
10.3.4 Simple Network Time Protocol(SNTP)247
10.4 Logical Clocks250
10.4.1 Happen-Before Relationship251
10.4.2 Logical Ordering251
10.4.3 Total Ordering with Logical Clocks254
10.5 Summary254
10.6 References for Further Study255
Exercises255
11.Distributed Security259
11.1 Cryptography & Digital Signatures260
11.1.1 Symmetric Encryption261
11.1.2 Asymmetric Encryption265
11.2.1 Certificate Lists265
11.2 Authentication270
11.2.2 Centralized Certificate Distribution Center271
11.3 Access Control(Firewalls)279
11.3.1 Packet Filtering Gateways280
11.3.2 Proxy Services281
11.3.3 Firewall Architectures282
11.4 Summary284
11.5 References for Further Study285
Exercises285
12.CASE STUDY:Windows 2000TM289
12.1 Overview:Windows 2000 Design291
12.2 Kernel Mode Overview293
12.2.1 Kernel Objects295
12.2.2 Hardware Abstraction Layer(HAL)297
12.2.3 Device Drivers297
12.2.4 The Executive297
12.3 Plug and Play299
12.4 NT Files System in Windows 2000(NTFS)303
12.4.1 Access Control Lists(ACLs)304
12.4.2 Reparse Points305
12.4.3 Storage Management306
12.5 Active Directory307
12.5.1 NameSpace310
12.5.2 Change Journal for Replication and Scalability312
12.5.3 Microsoft Index Server and HTTP Support314
12.6 Microsoft Management Console(MMC)317
12.7 Cluster Service318
12.7.1 Cluster Service Overview319
12.7.2 Cluster Abstractions320
12.7.3 Cluster Service Architectures320
12.7.4 Cluster Service Deployment to Applications320
12.8 Windows2000 Security321
12.8.1 Security Configuration Editor323
12.8.2 Encrypting File System325
12.8.3 Microsoft Security Support Provider Interface327
12.9 HYDRA-A Thin Client327
12.10 Summary327
12.11 References for Further Study328
Exercises328
Appendix A.Surgical Scheduling Program331
List of Acronyms413
Glossary of Terms419
Bibliography437
Index455
热门推荐
- 838075.html
- 115401.html
- 234529.html
- 3565249.html
- 317723.html
- 3133797.html
- 3812741.html
- 2213949.html
- 1409272.html
- 3142760.html
- http://www.ickdjs.cc/book_588718.html
- http://www.ickdjs.cc/book_3040003.html
- http://www.ickdjs.cc/book_2427305.html
- http://www.ickdjs.cc/book_2377096.html
- http://www.ickdjs.cc/book_1493750.html
- http://www.ickdjs.cc/book_3763877.html
- http://www.ickdjs.cc/book_826396.html
- http://www.ickdjs.cc/book_671393.html
- http://www.ickdjs.cc/book_2518911.html
- http://www.ickdjs.cc/book_1846460.html