Beruflich Dokumente
Kultur Dokumente
Format For Instruction Plan [for Courses with Lectures and Labs
Course No CSE537
Text Book:
1 Andrew S. Tanenbaum, Maarten van Steen, Distributed Systems, Pearson Education.Second Edition
2 Pardeep K. Sinha, Distributed Operating System: Concept & Design, ISBN No. 0-7803-1119-1 3 Randy Chow, Theodore Johnson, Distributed Operating System and Algorithms, Addison Wesley 4 Paulo Verssimo, Lus Rodrigues, Distributed Systems for System Architects. 5 Jean DollimoreTim KindbergGeorge, Distributed Systems: Concepts and Design 6 Galli, Doreen L., Distributed Operating System: Concepts & Practice, Prentice Hall
Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) 7 http://www.digitaljournal.com/article 8 www.learn.colostate.edu/courses/CS/CS551.dot 9 http://www.computer.org/portal/site/cscps/index.jsp 10 http://www.navigators.di.fc.ul.pt/dssa/ Relevant Websites Sr. No. (Web adress) (only if relevant to the courses) Salient Features
Part 1
Week 1 Lecture 1 Lecture 2 Introduction:1 Def. of distributed systems, its goals, H/W & S/W concepts, client server model ->Reference :1,->>Reference 1ch1 (1.2) ->Reference :1,>Reference 1->>Reference 1ch2 (2.12.2)
Lecture 3
Lower-level protocol, transport protocol, higher-level ->Reference :1,protocols >Reference 1->>Reference 4ch2 (4.1) Basic RPC Operation & parameter passing Extended RPC models & examples of RPC, Remote Object Invocation Static & Dynamic RMI ->Reference :1,ch 4 (4.2) ->Reference :1,ch 4 (4.2) ->Reference :1,ch 10 (10.3.2) ->Reference :1,ch 10 (10.3.2)
Lecture 4 Week 2 Lecture 5 Lecture 6 Lecture 7 Lecture 8 Week 3 Lecture 9 Lecture 10 Lecture 11 Lecture 12 Week 4 Lecture 13
Parameter passing & examples of Remote object & ->Reference :1,ch 10 RMI (10.3.3) Message Oriented Transient & persistent Communication & its example. Stream Oriented Communication Concept of Process & threads,Threads in Distributed Systems ->Reference :1,ch 4 (4.3) ->Reference :1,ch 4 (4.4) ->Reference :1,ch 3 (3.1)
Client Issues user interfaces & client side S/W for ->Reference :1,ch 3 distribution transparency (3.3) Server Design Issues & Object Servers,
Part 2
Week 4 2 Lecture 14 Code Migration Approaches,Migration & Local resources ->Reference :1,ch 3 (3.4) Approved for Autumn Session 2011-12
Week 4
Lecture 15 Lecture 16
migration in heterogeneous systems, Software Agents Names, Identifiers & addresses, Name resolution Implementation of Name space Case study - Example of Naming (DNS, X.500), Naming for mobile entities & few methods to implement the same Removing Unreferenced Entities , Problems of unreferenced objects
->Reference :1,ch 3 (3.5) ->Reference :1,ch 5 (5.1) ->Reference :1,ch 5 (5.3.3) ->Reference :1,ch 5 (5.3.4) ->Reference :1,>Reference 1ch 5 (5.2) ->Reference :1,ch 5
Week 5
Week 6
reference counting & listing, identifying unreachable ->Reference :1,ch 5 entities Physical clocks, clock synchronization algorithms ->Reference :1,ch 6 (6.1)
use of synchronized clocks, concept of logical clocks ->Reference :1,ch 6 (6.2) Global State, Election Algorithm Algorithms for mutual exclusion , Centralized, distributed & token ring distributed transaction & concurrency control Reasons for replication, object replication Reasons for replication, object replication ->Reference :1,ch 6 (6.4-6.5) ->Reference :1,ch 6 (6.3) ->Reference :1,ch 6 (6.3) ->Reference :1,ch 7 (7.1) ->Reference :1,ch 7 (7.1)
Week 7
MID-TERM Part 3
Week 8 Lecture 29 Lecture 30 Lecture 31 Lecture 32 Week 9 3 Lecture 33 Various Data Centric & client centric consistency models Distribution protocols , Replica placement update propagation,Primary based, replicated write cache coherence protocols Basic concept, failure models, failure masking by redundancy ->Reference :1,ch 7 (7.2-7.3) ->Reference :1,ch 7 (7.4) ->Reference :1,ch 7 (7.5) ->Reference :1,ch 7 (7.5) ->Reference :1,ch 8 (8.1) Approved for Autumn Session 2011-12
Week 9
Reliability issues in client server & group communication Atomic multicast problem
Distribute commit problem and ways to handle such ->Reference :1,ch 8 problems (8.5) concept of Recovery in distributed systems,check pointing & message logging ->Reference :1,ch 8 (8.6)
Week 10
Lecture 37
Part 4
Week 10 Lecture 38 Lecture 39 Lecture 40 Week 11 Lecture 41 Lecture 42 Lecture 43 Lecture 44 Week 12 Lecture 45 Lecture 46 Lecture 47 Security threats, policies & mechanisms design issues & overview of cryptography Authentication & ways to implement it Message Integrity & confidentiality,Message Integrity & confidentiality Secure group communication Access control general Issues, firewalls, secure mobile codes Security Management, key management,secure group management, authorization mgt ->Reference :1,ch 9 (9.1) ->Reference :1,ch 9 (9.1) ->Reference :1,ch 9 (9.2) ->Reference :1,ch 9 (9.2) ->Reference :1,ch 9 (9.2) ->Reference :1,ch 9 (9.3) ->Reference :1,ch 9 (9.4)
Case study on Security (KERBEROSE or Electronic ->Reference :1,ch 9 Payment System or SESAME) (9.2.4) Overview of any distributed object based system (CORBA or DCOM or Globe or any other) Overview of any distributed file system(SUN N/W file system or CODA file system or XFS or any other) Overview of any distributed Document Based System (WWW or Lotus Notes). ->Reference :1,ch 10 (10.3.5) ->Reference :1,ch 11
Lecture 48
->Reference :1,ch 11
Spill Over
Week 13 Lecture 49 Lecture 50 GLOBUS Grid ->Reference :1,book1 ->Reference :1,book1
Test 1 Test 2
* In ENG courses wherever the total exceeds 100, consider x best out of y components of CA, as explained in teacher's guide available on the UMS List of suggested topics for term paper[at least 15] (Student to spend about 15 hrs on any one specified term paper) Sr. No. Topic 1 1 Intervention Schedules for Real-Time Programming 2 P2P and the Promise of Internet Equality 3 The Performance of Spin Lock Alternatives for Shared-Money Multiprocessors 4 Hard Real-Time Scheduling: The Deadline Monotonic Approach 5 Locking in the Multithreaded FreeBSD Kernel 6 A Fast Mach Network IPC Implementation 7 Comparison of Next-Fit, First-Fit and Best-Fit 8 Time-Stamp- Based Algorithms for Concurrency Control in Distributed Database Systems 9 Extensibility, Safety and Performance in the SPIN Operating System 10 Scheduling Support for Concurrency and Parallelism in the Mach Operating System 11 Consistency and Recovery Control for Replicated Files 12 Security and Privacy Issues of Handheld and Wearable Wireless Devices 13 Threads in Distributed Systems, Client Issues user interfaces & client side S/W for distribution