Birman / Van Renesse | Reliable Distributed Computing with the Isis Toolkit | Buch | 978-0-8186-5342-1 | www2.sack.de

Buch, Englisch, 416 Seiten, Format (B × H): 163 mm x 244 mm, Gewicht: 771 g

Birman / Van Renesse

Reliable Distributed Computing with the Isis Toolkit


1. Auflage 1994
ISBN: 978-0-8186-5342-1
Verlag: Wiley

Buch, Englisch, 416 Seiten, Format (B × H): 163 mm x 244 mm, Gewicht: 771 g

ISBN: 978-0-8186-5342-1
Verlag: Wiley


Reliable Distributed Computing with the Isis Toolkit presents technical results documenting various internal aspects of Isis along with less technical results illustrating how systems are used to develop closely coupled and fault-tolerant application environments. The text consists of 20 papers that document Isis and describe its important applications. The first section deals with the underlying ideas of the Isis system. The second section describes design alternatives, the Horus system, integrating security in a group-oriented distributed system, and high availability in a real-time system. The third section examines the protocols used in Isis and Horus. The last section contains user-contributed papers on Isis applications and tools.

Birman / Van Renesse Reliable Distributed Computing with the Isis Toolkit jetzt bestellen!

Weitere Infos & Material


1. Introduction (Kenneth P. Birman and Robbert van Renesse).

I: FUNDAMENTALS.

2. The Process Group Approach to Reliable Distributed Computing (Kenneth P. Birman).

3. Causal Controversy at Le Mont St.-Michel (Robbert van Renesse).

4. RPC Considered Inadequate (Kenneth P. Birman and Robbert van Renesse).

5. Exploiting Virtual Synchrony in Distributed Systems (Kenneth P. Birman and Thomas Joseph).

6. Virtual Synchrony Model (Kenneth P. Birman).

II: REDESIGN.

7. Design Alternatives for Process Group Membership and Multicast (Kenneth P. Birman, Robert Cooper, Barry Gleeson).

8. The Horus System (Robbert van Renesse, Kenneth P. Birman, Robert Cooper, Brad Glade, and Patrick Stephenson).

9. Integrating Security in a Group-Oriented Distributed System (Michael Reiter, Kenneth P. Birman, Na Li Gong).

10. High Availability in a Real-Time System (Carlos Almeida, Brad Glade, Keith Marzullo, and Robbert van Renesse).

III: PROTOCOLS.

11. Reliable Communication in the Presence of Failures (Kenneth P. Birman and Thomas Joseph).

12. Lightweight Causal and Atomic Group Multicast (Kenneth P. Birman, Andre Schiper, and Pat Stephenson).

13. Consistent Process Membership in Asynchronous Environments (Aleta Ricciardi and Kenneth P. Birman).

14. Efficient Broadcast Primitives in Asynchronous Distributed Systems (Frank Schmuck).

15. Light-Weight Process Groups in the Isis System (Bradford B. Glade, Kenneth P. Birman, Robert C.B. Cooper, and Robbert van Renesse).

IV: TOOLS AND APPLICATIONS.

16. Using the Isis Resource Manager for Distributed, Fault-Tolerant Computing (Timothy A. Clark and Kenneth P. Birman).

17. The Design and Implementation of Meta (Mark Wood and Keith Marzullo).

18. Paratex: An Environment for Parallel Programming in Distributed Systems (Ozalp Babaogul, Lorenzo Alvisi, Alessandro Amoroso, Renzo Davoli, and Luigi Alberto Giachini).

19. IMIS: A Distributed Query and Report Formatting System (T. Anthony Allen, William Sheppard, and Steve Condon).

20. Distributed Programming with Asynchronous Ordered Channels in Distributed ML (Robert Cooper and Clifford Krumvieda).

21. The Isis Project: Real experience with a fault tolerant programming system (Kenneth P. Birman and Robert Cooper).

Bibliography.

Index.


Ken Birman is a professor in the Department of Computer Science at Cornell University. Robbert Van Renesse is the author of Reliable Distributed Computing with the Isis Toolkit, published by Wiley.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.