Download Distributed Information System 2010 SUMMARY

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Net neutrality law wikipedia , lookup

Peering wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer security wikipedia , lookup

Network tap wikipedia , lookup

Net bias wikipedia , lookup

Computer network wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Deep packet inspection wikipedia , lookup

Airborne Networking wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Distributed operating system wikipedia , lookup

Distributed firewall wikipedia , lookup

Internet protocol suite wikipedia , lookup

Peer-to-peer wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Transcript
DISTRIBUTED INFORMATION SYSTEM
2010
SUMMARY
Edith Ngai
Uppsala University
CHAPTER 1: INTRODUCTION

You have a “big picture”:
 context, overview, “feel”
of networking
Introduction
Internet overview
 what’s a protocol?
 network edge, core, access
network

packet-switching versus
circuit-switching
Internet/ISP structure
 Internet protocol stack

1
CHAPTER 2: APPLICATION LAYER

application architectures

application service
requirements:


client-server
P2P
hybrid





HTTP
FTP
SMTP, POP, IMAP
DNS
P2P: BitTorrent, Skype
2: Application Layer



 specific protocols:
reliability, bandwidth, delay
Internet transport service
model
connection-oriented, reliable:
TCP
 unreliable, datagrams: UDP

2
CHAPTER 3: TRANSPORT LAYER

principles behind transport
layer services:
multiplexing, demultiplexing
 reliable data transfer
 flow control
 congestion control

instantiation and
implementation in the
Internet
UDP
 TCP

Transport Layer

Next:
 leaving the network
“edge” (application,
transport layers)
 into the network
“core”
3
CHAPTER 4: NETWORK LAYER




4.5 Routing
algorithms




4.6 Routing in the
Internet

Datagram format
IPv4 addressing
IPv6



Link state
Distance Vector
Hierarchical routing
Network Layer
4. 1 Introduction
 4.2 Virtual circuit and
datagram networks
 4.3 What’s inside a
router
 4.4 IP: Internet
Protocol

RIP
OSPF
BGP
4.7 Broadcast and
multicast routing
4
CHAPTER 8: NETWORK SECURITY
Basic techniques…...
cryptography (symmetric and public)
 message integrity
 digital signature

8: Network Security
…. used in many different security scenarios

secure email
Operational Security: firewalls and IDS
5
DS: DISTRIBUTED SYSTEMS
Definitions of distributed systems and comparisons to
centralized systems.
 The characteristics of distributed systems.
 The basic design issues.
 Read Chapter 1 and Chapter 2 of the DS textbook.
[Coulouris et al.]

6
MIDDLEWARES
The basic conceptual framework for remote object
invocation in distributed systems.
 Definition of RPC and how it works.
 CORBA object model and IDL.
 CORBA remote procedure definition and remote
object invocation.
 Read DS Textbook Chapters 5 and 20.

7
OPERATING SYSTEM

Brief introduction to operation system
Major operating systems components
 Basic computer system organization
 Computer and network architecture


Read Chapter 6 in the DS textbook to understand
OS and how middleware is supported by the OS
at the nodes of a distributed system
8
DISTRIBUTED FILE SYSTEM
Introduction to file system
 Characteristics of distributed file system
 Case study: Sun Network File System
 Case study: The Andrew File system


Read DS textbook chapter 8 after the lecture…
9
QUESTIONS?
LYCKA TILL!