图书介绍

分布式操作系统 概念与实践 英文版2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

分布式操作系统 概念与实践 英文版
  • (美)Doreen L.Galli著 著
  • 出版社: 北京:人民邮电出版社
  • ISBN:7115103453
  • 出版时间:2002
  • 标注页数:464页
  • 文件大小:34MB
  • 文件页数:486页
  • 主题词:分布式操作系统(学科: 高等学校) 分布式操作系统

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

分布式操作系统 概念与实践 英文版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

1.1 What is an Operating System?1

1.Introduction to Distributed Systems1

1.2 What is a Distributed System?2

1.2.1 Popular Network Topologies and Features4

1.2.2 ISO/OSI Reference Model8

1.2.3 Distributed Computing Models12

1.2.4 Distributed versus Centralized Solutions14

1.2.5 Network vs. Distributed Operating Systems15

1.3 What is a Real-time System?16

1.3.1 Real-time Event Characteristics17

1.3.2 Network Characteristics Affecting Distributed Real-Time Applications17

1.4 What is a Parallel System?19

1.4.1 Parallel Architectures19

1.4.2 Parallel Software Paradigms23

1.5 Sample Distributed Application25

1.7 References for Further Study27

1.6 Summary27

Exercises28

2.The Kernel31

2.1 Kernel Types31

2.2 Processes and Threads33

2.2.1 Introduction to Multi-threaded Processes33

2.2.2 Multi-threaded Process Paradigms34

2.2.3 Multi-threaded support37

2.3 Process Management38

2.3.1 Types of Processes40

2.3.2 Load Distribution & Process Migration41

2.4 Process Scheduling45

2.4.1 Identifying Processes for Scheduling45

2.4.2 Scheduler Organization45

2.5 Summary46

Exercises49

2.6 References for Further Study49

3.Interprocess Communication53

3.1 Selection Factors54

3.2 Message Passing54

3.2.1 Blocking Primitives55

3.2.2 Non-blocking Primitives58

3.2.3 Process Address59

3.3.1 Unnamed Pipes61

3.3 Pipes61

3.3.2 Named Pipes63

3.4 Sockets63

3.4.1 UNIX Sockets65

3.4.2 JAVA Support for Sockets69

3.5 Remote Procedure Calls72

3.5.1 Parameter Type72

3.5.2 Data Type Support72

3.5.4 RPC Binding73

3.5.3 Parameter Marshalling73

3.5.5 RPC Authentication74

3.5.6 RPC Call Semantics75

3.5.7 SUN's ONC RPC76

3.6 Summary76

3.7 References for Further Study77

Exercises77

4.Memory Management81

4.1 Review of Centralized Memory Management82

4.1.1 Virtual Memory82

4.1.2 Pages and Segments82

4.1.3 Page Replacement Algorithms84

4.2 Simple Memory Model85

4.3 Shared Memory Model86

4.3.1 Shared Memory Performance87

4.3.2 Cache Consistency88

4.4 Distributed Shared Memory89

4.3.1 Methods for Distributing Shared Data90

4.3.2 DSM Performance Issues93

4.5 Memory Migration98

4.6 Summary100

4.7 References for Further Study101

Exercises102

5.Concurrency Control105

5.1 Mutual Exclusion & Critical Regions105

5.2 Semaphores107

5.2.1 Semaphore Weakness108

5.2.2 Semaphore Evaluation108

5.3 Monitors108

5.3.1 Condition Variables110

5.3.2 Monitor Evaluation111

5.4 Locks111

5.4.2 Atomic Operations and Hardware Support113

5.4.1 Taking Turns113

5.5 Software Lock Control115

5.5.1 Centralized Lock Manager115

5.5.2 Distributed Lock Manager116

5.6 Token-Passing Mutual Exclusion118

5.7 Deadlocks119

5.7.1 Prevent Deadlocks121

5.7.2 Avoid Deadlocks122

5.7.3 Ignore Deadlocks122

5.7.4 Detect Deadlocks122

5.8 Summary124

5.9 References for Further Study125

Exercises125

6.Object-Based Operating Systems127

6.1 Introduction to Objects128

6.1.1 Object Definitions.128

6.1.2 Evaluation of Objects129

6.2 The Clouds Object Approach131

6.2.1 Clouds'Objects131

6.2.2 Clouds Threads132

6.2.3 Clouds’Memory Storage132

6.3 Chorus V3 and COOL v2132

6.3.1 The Base Layer:COOL Memory Management134

6.3.2 The Generic Runtime System Layer:COOL Objects134

6.3.3 The Language-Specific Runtime System Layer135

6.4 Amoeba135

6.4.1 Identification and Protection of Amoeba Objects137

6.4.2 Amoeba Object Communication137

6.5 Distributed Component Object Model(DCOM)138

6.5.1 Monikers140

6.5.2 Remote Method Calls140

6.5.4 Thread Models Supported in DCOM141

6.5.3 Garbage Collection141

6.5.5 DCOM Security Policies142

6.6 CORBATM Overview143

6.6.1 CORBA’s ORB144

6.6.2 CORBA Object Adapters145

6.6.3 CORBA Messaging147

6.6.4 CORBA Compliance147

6.7 Summary148

6.6.5 CORBA to COM Mapping148

6.7 References for Further Study149

Exercises149

7.Distributed Process Management151

7.1 Distributed Scheduling Algorithm Choices152

7.1.1 Level of Scheduling152

7.1.2 Load Distribution Goals153

7.1.3 Scheduling Efficiency Goals153

7.1.4 Processor Binding Time155

7.2 Scheduling Algorithm Approaches157

7.2.1 Usage Points158

7.2.2 Graph Theory160

7.2.3 Probes162

7.2.4 Scheduling Queues163

7.2.5 Stochastic Learning166

7.3 Coordinator Elections167

7.4 Orphan Processes168

7.4.1 Orphan Clean Up170

7.4.2 Child Process Allowance172

7.4.3 Process Version Numbers173

7.5 Summary173

7.6 References for Further Study175

Exercises176

8.Distributed File Systems179

8.1 Distributed Name Service179

8.1.1 File Types180

8.1.2 Location Transparency181

8.1.3 Global Naming & Name Transparency181

8.2 Distributed File Service187

8.2.1 File Variations187

8.2.2 File Modification Notification190

8.2.3 File Service Implementations191

8.2.4 File Replication192

8.3 Distributed Directory Service195

8.3.1 Directory Structures195

8.3.2 Directory Management195

8.3.3 Directory Operations196

8.4 NFSTM197

8.4.1 NFS File Service197

8.4.2 NFS Directory Service198

8.4.3 NFS Name Service199

8.5 X.500200

8.5.1 X.500 File and Name Service:The Information Model201

8.5.2 X.500's Directory Service:The Directory Model202

8.6 Summary202

8.7 References for Further Study203

Exercises204

9.Transaction Management & Consistency Models207

9.1 Transaction Management Motivation208

9.1.1 The Lost Update208

9.1.2 Retrieval Disparity209

9.2 ACID Properties of a Transaction213

9.3 Consistency Models216

9.3.1 Strict Consistency Model216

9.3.2 Sequential Consistency Model216

9.3.3 Casual Consistency Model217

9.3.4 PRAM Consistency Model218

9.3.5 Processor Consistency Model219

9.3.6 Weak Consistency Model220

9.3.7 Release Consistency Model222

9.3.8 Lazy Release Consistency224

9.3.9 Entry Consistency Model224

9.4 Two-Phase Commit Protocol224

9.4.1 Prepare to Commit Phase225

9.4.2 Commit Phase227

9.5 Nested Transactions228

9.6 Implementation Issues for Transactions230

9.6.1 Premature Reads & Writes231

9.6.2 The Domino Effect of aborts231

9.6.3 Ensuring Recoverability231

9.7 Summary231

9.7 References for Further Study233

Exercises233

10.Distributed Synchronization235

10.1 Introduction to Global Time235

10.2.1 Obtaining an Accurate Physical Time236

10.2 Physical Clocks236

10.2.2 Synchronizing Physical Time237

10.2.3 Centralized Physical Time Services239

10.2.4 Distributed Physical Time Services242

10.3 Network Time Protocol(NTP)243

10.3.1 NTP Architecture244

10.3.2 NTP Design Goals244

10.3.3 NTP Synchronization Modes247

10.3.4 Simple Network Time Protocol(SNTP)247

10.4 Logical Clocks250

10.4.1 Happen-Before Relationship251

10.4.2 Logical Ordering251

10.4.3 Total Ordering with Logical Clocks254

10.5 Summary254

10.6 References for Further Study255

Exercises255

11.Distributed Security259

11.1 Cryptography & Digital Signatures260

11.1.1 Symmetric Encryption261

11.1.2 Asymmetric Encryption265

11.2.1 Certificate Lists265

11.2 Authentication270

11.2.2 Centralized Certificate Distribution Center271

11.3 Access Control(Firewalls)279

11.3.1 Packet Filtering Gateways280

11.3.2 Proxy Services281

11.3.3 Firewall Architectures282

11.4 Summary284

11.5 References for Further Study285

Exercises285

12.CASE STUDY:Windows 2000TM289

12.1 Overview:Windows 2000 Design291

12.2 Kernel Mode Overview293

12.2.1 Kernel Objects295

12.2.2 Hardware Abstraction Layer(HAL)297

12.2.3 Device Drivers297

12.2.4 The Executive297

12.3 Plug and Play299

12.4 NT Files System in Windows 2000(NTFS)303

12.4.1 Access Control Lists(ACLs)304

12.4.2 Reparse Points305

12.4.3 Storage Management306

12.5 Active Directory307

12.5.1 NameSpace310

12.5.2 Change Journal for Replication and Scalability312

12.5.3 Microsoft Index Server and HTTP Support314

12.6 Microsoft Management Console(MMC)317

12.7 Cluster Service318

12.7.1 Cluster Service Overview319

12.7.2 Cluster Abstractions320

12.7.3 Cluster Service Architectures320

12.7.4 Cluster Service Deployment to Applications320

12.8 Windows2000 Security321

12.8.1 Security Configuration Editor323

12.8.2 Encrypting File System325

12.8.3 Microsoft Security Support Provider Interface327

12.9 HYDRA-A Thin Client327

12.10 Summary327

12.11 References for Further Study328

Exercises328

Appendix A.Surgical Scheduling Program331

List of Acronyms413

Glossary of Terms419

Bibliography437

Index455

热门推荐