رفتن به مطلب

ارسال های توصیه شده

h6ivhis48gmb77nht0.jpg

 

 

برای مشاهده این محتوا لطفاً ثبت نام کنید یا وارد شوید.

نویسنده: Morgan Kaufmann

 

تعداد صفحات: 416

حجم فایل: 13MB

 

 

برای مشاهده این محتوا لطفاً ثبت نام کنید یا وارد شوید.

 

Cloud Computing: Theory and Practice provides students and IT professionals with an in-depth analysis of the cloud from the ground up. Beginning with a discussion of parallel computing and architectures and distributed systems, the book turns to contemporary cloud infrastructures, how they are being deployed at leading companies such as Amazon, Google and Apple, and how they can be applied in fields such as healthcare, banking and science. The volume also examines how to successfully deploy a cloud application across the enterprise using virtualization, resource management and the right amount of networking support, including content delivery networks and storage area networks. Developers will find a complete introduction to application development provided on a variety of platforms.

Learn about recent trends in cloud computing in critical areas such as: resource management, security, energy consumption, ethics, and complex systems Get a detailed hands-on set of practical recipes that help simplify the deployment of a cloud based system for practical use of computing clouds along with an in-depth discussion of several projectsUnderstand the evolution of cloud computing and why the cloud computing paradigm has a better chance to succeed than previous efforts in large-scale distributed computing

 

Table of contents :

Front Cover......Page 0

Half Title......Page 2

Title Page......Page 4

Copyright......Page 5

Dedication......Page 6

Contents......Page 8

Preface......Page 14

Foreword......Page 18

1 Introduction......Page 20

1.1 Network-Centric Computing and Network-Centric Content......Page 22

1.2 Peer-to-Peer Systems......Page 26

1.3 Cloud Computing: An Old Idea Whose Time Has Come......Page 28

1.4 Cloud Computing Delivery Models and Services......Page 30

1.5 Ethical Issues in Cloud Computing......Page 33

1.6 Cloud Vulnerabilities......Page 34

1.7 Major Challenges Faced by Cloud Computing......Page 35

1.8 Further Reading......Page 36

1.10 Exercises and Problems......Page 37

2.1 Parallel Computing......Page 40

2.2 Parallel Computer Architecture......Page 44

2.3 Distributed Systems......Page 46

2.4 Global State of a Process Group......Page 47

2.5 Communication Protocols and Process Coordination......Page 51

2.6 Logical Clocks......Page 53

2.7 Message Delivery Rules; Causal Delivery......Page 54

2.8 Runs and Cuts; Causal History......Page 57

2.9 Concurrency......Page 60

2.10 Atomic Actions......Page 63

2.11 Consensus Protocols......Page 67

2.12 Modeling Concurrency with Petri Nets......Page 70

2.13 Enforced Modularity: The Client-Server Paradigm......Page 76

2.15 History Notes......Page 81

2.16 Exercises and Problems......Page 83

3.1 Cloud Computing at Amazon......Page 86

3.2 Cloud Computing: The Google Perspective......Page 96

3.3 Microsoft Windows Azure and Online Services......Page 98

3.4 Open-Source Software Platforms for Private Clouds......Page 99

3.5 Cloud Storage Diversity and Vendor Lock-in......Page 103

3.6 Cloud Computing Interoperability: The Intercloud......Page 105

3.7 Energy Use and Ecological Impact of Large-Scale Data Centers......Page 107

3.8 Service- and Compliance-Level Agreements......Page 110

3.9 Responsibility Sharing Between User and Cloud Service Provider......Page 111

3.10 User Experience......Page 112

3.11 Software Licensing......Page 114

3.12 Further Reading......Page 115

3.14 Exercises and Problems......Page 116

4 Cloud Computing: Applications and Paradigms......Page 118

4.1 Challenges for Cloud Computing......Page 119

4.2 Existing Cloud Applications and New Application Opportunities......Page 120

4.3 Architectural Styles for Cloud Applications......Page 121

4.4 Workflows: Coordination of Multiple Activities......Page 123

4.5 Coordination Based on a State Machine Model: The ZooKeeper......Page 131

4.6 The MapReduce Programming Model......Page 134

4.7 A Case Study: The GrepTheWeb Application......Page 137

4.8 Clouds for Science and Engineering......Page 139

4.9 High-Performance Computing on a Cloud......Page 140

4.10 Cloud Computing for Biology Research......Page 144

4.11 Social Computing, Digital Content, and Cloud Computing......Page 147

4.13 Exercises and Problems......Page 149

5 Cloud Resource Virtualization......Page 150

5.1 Virtualization......Page 151

5.2 Layering and Virtualization......Page 152

5.4 Virtual Machines......Page 155

5.5 Performance and Security Isolation......Page 158

5.6 Full Virtualization and Paravirtualization......Page 159

5.7 Hardware Support for Virtualization......Page 161

5.8 Case Study: Xen, a VMM Based on Paravirtualization......Page 163

5.9 Optimization of Network Virtualization in Xen 2.0......Page 168

5.10 vBlades: Paravirtualization Targeting an x86-64 Itanium Processor......Page 171

5.11 A Performance Comparison of Virtual Machines......Page 173

5.12 The Darker Side of Virtualization......Page 175

5.13 Software Fault Isolation......Page 177

5.15 History Notes......Page 178

5.16 Exercises and Problems......Page 179

6 Cloud Resource Management and Scheduling......Page 182

6.1 Policies and Mechanisms for Resource Management......Page 183

6.2 Applications of Control Theory to Task Scheduling on a Cloud......Page 185

6.3 Stability of a Two-Level Resource Allocation Architecture......Page 188

6.4 Feedback Control Based on Dynamic Thresholds......Page 190

6.5 Coordination of Specialized Autonomic Performance Managers......Page 191

6.6 A Utility-Based Model for Cloud-Based Web Services......Page 193

6.7 Resource Bundling: Combinatorial Auctions for Cloud Resources......Page 197

6.8 Scheduling Algorithms for Computing Clouds......Page 201

6.9 Fair Queuing......Page 203

6.10 Start-Time Fair Queuing......Page 204

6.11 Borrowed Virtual Time......Page 209

6.12 Cloud Scheduling Subject to Deadlines......Page 213

6.13 Scheduling MapReduce Applications Subject to Deadlines......Page 218

6.14 Resource Management and Dynamic Application Scaling......Page 220

6.15 Further Reading......Page 221

6.16 Exercises and Problems......Page 222

7.1 Packet-Switched Networks......Page 224

7.2 The Internet......Page 226

7.3 Internet Migration to IPv6......Page 229

7.4 The Transformation of the Internet......Page 230

7.5 Web Access and the TCP Congestion Control Window......Page 233

7.6 Network Resource Management......Page 236

7.7 Interconnection Networks for Computer Clouds......Page 238

7.8 Storage Area Networks......Page 241

7.9 Content-Delivery Networks......Page 245

7.10 Overlay Networks and Small-World Networks......Page 247

7.11 Scale-Free Networks......Page 249

7.12 Epidemic Algorithms......Page 255

7.12.3 Susceptible-Infective-Susceptible (SIS)......Page 256

7.14 History Notes......Page 257

7.15 Exercises and Problems......Page 258

8 Storage Systems......Page 260

8.1 The Evolution of Storage Technology......Page 261

8.2 Storage Models, File Systems, and Databases......Page 262

8.3 Distributed File Systems: The Precursors......Page 265

8.4 General Parallel File System......Page 271

8.5 Google File System......Page 274

8.6 Apache Hadoop......Page 277

8.7 Locks and Chubby: A Locking Service......Page 279

8.8 Transaction Processing and NoSQL Databases......Page 283

8.9 BigTable......Page 285

8.10 Megastore......Page 287

8.11 History Notes......Page 288

8.12 Further Reading......Page 289

8.13 Exercises and Problems......Page 290

9 Cloud Security......Page 292

9.1 Cloud Security Risks......Page 293

9.2 Security: The Top Concern for Cloud Users......Page 296

9.3 Privacy and Privacy Impact Assessment......Page 298

9.4 Trust......Page 300

9.5 Operating System Security......Page 302

9.6 Virtual Machine Security......Page 303

9.7 Security of Virtualization......Page 305

9.8 Security Risks Posed by Shared Images......Page 308

9.9 Security Risks Posed by a Management OS......Page 311

9.10 Xoar: Breaking the Monolithic Design of the TCB......Page 314

9.11 A Trusted Virtual Machine Monitor......Page 317

9.13 Exercises and Problems......Page 318

10.1 Complex Systems......Page 320

10.2 Abstraction and Physical Reality......Page 322

10.3 Quantifying Complexity......Page 323

10.4 Emergence and Self-Organization......Page 325

10.5 Composability Bounds and Scalability......Page 327

10.6 Modularity, Layering, and Hierarchy......Page 329

10.7 More on the Complexity of Computing and Communication Systems......Page 331

10.8 Systems of Systems: Challenges and Solutions......Page 333

10.10 Exercises and Problems......Page 334

11 Cloud Application Development......Page 336

11.1 Amazon Web Services: EC2 Instances......Page 337

11.2 Connecting Clients to Cloud Instances Through Firewalls......Page 338

11.3 Security Rules for Application and Transport Layer Protocols in EC2......Page 343

11.4 How to Launch an EC2 Linux Instance and Connect to It......Page 346

11.5 How to Use S3 in Java......Page 347

11.6 How to Manage SQS Services in C#......Page 350

11.7 How to Install the Simple Notification Service on Ubuntu 10.04......Page 351

11.8 How to Create an EC2 Placement Group and Use MPI......Page 353

11.9 How to Install Hadoop on Eclipse on a Windows System......Page 355

11.10 Cloud-Based Simulation of a Distributed Trust Algorithm......Page 358

11.11 A Trust Management Service......Page 363

11.12 A Cloud Service for Adaptive Data Streaming......Page 371

11.13 Cloud-Based Optimal FPGA Synthesis......Page 375

11.14 Exercises and Problems......Page 376

Literature......Page 380

Glossary......Page 398

A......Page 404

C......Page 405

D......Page 407

F......Page 408

I......Page 409

M......Page 410

P......Page 411

R......Page 412

S......Page 413

U......Page 414

Z......Page 415

 

 

لینک به دیدگاه

به گفتگو بپیوندید

هم اکنون می توانید مطلب خود را ارسال نمایید و بعداً ثبت نام کنید. اگر حساب کاربری دارید، برای ارسال با حساب کاربری خود اکنون وارد شوید .

مهمان
ارسال پاسخ به این موضوع ...

×   شما در حال چسباندن محتوایی با قالب بندی هستید.   حذف قالب بندی

  تنها استفاده از 75 اموجی مجاز می باشد.

×   لینک شما به صورت اتوماتیک جای گذاری شد.   نمایش به صورت لینک

×   محتوای قبلی شما بازگردانی شد.   پاک کردن محتوای ویرایشگر

×   شما مستقیما نمی توانید تصویر خود را قرار دهید. یا آن را اینجا بارگذاری کنید یا از یک URL قرار دهید.

×
×
  • اضافه کردن...