* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Distributed Information System 2010 SUMMARY
Survey
Document related concepts
Net neutrality law wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Computer security wikipedia , lookup
Network tap wikipedia , lookup
Computer network wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Deep packet inspection wikipedia , lookup
Airborne Networking wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Distributed operating system wikipedia , lookup
Distributed firewall wikipedia , lookup
Internet protocol suite wikipedia , lookup
Peer-to-peer wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Transcript
DISTRIBUTED INFORMATION SYSTEM 2010 SUMMARY Edith Ngai Uppsala University CHAPTER 1: INTRODUCTION You have a “big picture”: context, overview, “feel” of networking Introduction Internet overview what’s a protocol? network edge, core, access network packet-switching versus circuit-switching Internet/ISP structure Internet protocol stack 1 CHAPTER 2: APPLICATION LAYER application architectures application service requirements: client-server P2P hybrid HTTP FTP SMTP, POP, IMAP DNS P2P: BitTorrent, Skype 2: Application Layer specific protocols: reliability, bandwidth, delay Internet transport service model connection-oriented, reliable: TCP unreliable, datagrams: UDP 2 CHAPTER 3: TRANSPORT LAYER principles behind transport layer services: multiplexing, demultiplexing reliable data transfer flow control congestion control instantiation and implementation in the Internet UDP TCP Transport Layer Next: leaving the network “edge” (application, transport layers) into the network “core” 3 CHAPTER 4: NETWORK LAYER 4.5 Routing algorithms 4.6 Routing in the Internet Datagram format IPv4 addressing IPv6 Link state Distance Vector Hierarchical routing Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol RIP OSPF BGP 4.7 Broadcast and multicast routing 4 CHAPTER 8: NETWORK SECURITY Basic techniques…... cryptography (symmetric and public) message integrity digital signature 8: Network Security …. used in many different security scenarios secure email Operational Security: firewalls and IDS 5 DS: DISTRIBUTED SYSTEMS Definitions of distributed systems and comparisons to centralized systems. The characteristics of distributed systems. The basic design issues. Read Chapter 1 and Chapter 2 of the DS textbook. [Coulouris et al.] 6 MIDDLEWARES The basic conceptual framework for remote object invocation in distributed systems. Definition of RPC and how it works. CORBA object model and IDL. CORBA remote procedure definition and remote object invocation. Read DS Textbook Chapters 5 and 20. 7 OPERATING SYSTEM Brief introduction to operation system Major operating systems components Basic computer system organization Computer and network architecture Read Chapter 6 in the DS textbook to understand OS and how middleware is supported by the OS at the nodes of a distributed system 8 DISTRIBUTED FILE SYSTEM Introduction to file system Characteristics of distributed file system Case study: Sun Network File System Case study: The Andrew File system Read DS textbook chapter 8 after the lecture… 9 QUESTIONS? LYCKA TILL!