120 likes | 232 Vues
Delve into the realms of networking, security techniques, and middleware in distributed information systems through this comprehensive guide. Learn about various protocols, application and transport layers, network security basics, and operating system components. Get insights on distributed systems' design issues, remote object invocation, and distributed file systems with real-world case studies. Enhance your understanding of Internet protocols, encryption, routing algorithms, and operational security practices.
E N D
Distributed Information System 2010SUMMARY Edith Ngai Uppsala University
Chapter 1: Introduction • Internet overview • what’s a protocol? • network edge, core, access network • packet-switching versus circuit-switching • Internet/ISP structure • Internet protocol stack You have a “big picture”: • context, overview, “feel” of networking Introduction
Chapter 2: Application Layer • specific protocols: • HTTP • FTP • SMTP, POP, IMAP • DNS • P2P: BitTorrent, Skype • application architectures • client-server • P2P • hybrid • application service requirements: • reliability, bandwidth, delay • Internet transport service model • connection-oriented, reliable: TCP • unreliable, datagrams: UDP 2: Application Layer
Chapter 3: Transport Layer • principles behind transport layer services: • multiplexing, demultiplexing • reliable data transfer • flow control • congestion control • instantiation and implementation in the Internet • UDP • TCP Next: • leaving the network “edge” (application, transport layers) • into the network “core” Transport Layer
Chapter 4: Network Layer • 4. 1 Introduction • 4.2 Virtual circuit and datagram networks • 4.3 What’s inside a router • 4.4 IP: Internet Protocol • Datagram format • IPv4 addressing • IPv6 • 4.5 Routing algorithms • Link state • Distance Vector • Hierarchical routing • 4.6 Routing in the Internet • RIP • OSPF • BGP • 4.7 Broadcast and multicast routing Network Layer
Chapter 8: Network Security Basic techniques…... • cryptography (symmetric and public) • message integrity • digital signature …. used in many different security scenarios • secure email Operational Security: firewalls and IDS 8: Network Security
DS: Distributed Systems • Definitions of distributed systems and comparisons to centralized systems. • The characteristics of distributed systems. • The basic design issues. • Read Chapter 1 and Chapter 2 of the DS textbook. [Coulouris et al.]
Middlewares • The basic conceptual framework for remote object invocation in distributed systems. • Definition of RPC and how it works. • CORBA object model and IDL. • CORBA remote procedure definition and remote object invocation. • Read DS Textbook Chapters 5 and 20.
Operating System • Brief introduction to operation system • Major operating systems components • Basic computer system organization • Computer and network architecture • Read Chapter 6 in the DS textbook to understand OS and how middleware is supported by the OS at the nodes of a distributed system
Distributed File System • Introduction to file system • Characteristics of distributed file system • Case study: Sun Network File System • Case study: The Andrew File system • Read DS textbook chapter 8 after the lecture…