Networked applications: a guide to the new computing infrastructure
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
San Francisco
Morgan Kaufmann Publ.
1999
|
Schriftenreihe: | The Morgan Kaufmann series in networking
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XX, 396 S.: Ill., graph. Darst. |
ISBN: | 1558605363 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV013804359 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 010704s1999 |||| 00||| eng d | ||
020 | |a 1558605363 |9 1-55860-536-3 | ||
035 | |a (OCoLC)441870031 | ||
035 | |a (DE-599)BVBBV013804359 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-19 |a DE-11 | ||
080 | |a 681.3 | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a Messerschmitt, David G. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Networked applications |b a guide to the new computing infrastructure |c David G. Messerschmitt |
264 | 1 | |a San Francisco |b Morgan Kaufmann Publ. |c 1999 | |
300 | |a XX, 396 S.: Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a The Morgan Kaufmann series in networking | |
650 | 4 | |a računalništvo - računalniške mreže - aplikacije - Internet programiranje - upravljanje informacij - izobraževanje - arhitektura programske opreme - standardizacija programske opreme - industrija - vlada - varnost komunikacij - kakovost - omrežja - priročniki | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009437240&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-009437240 |
Datensatz im Suchindex
_version_ | 1804128627817709568 |
---|---|
adam_text | Preface xv
Chapter 1 Introduction 1
1.1 A Historical Perspective 2
1.1.1 Technology View 3
1.1.2 User and Organization View 3
1.1.3 Unrelenting Change 6
1.2 Computing in the Future 7
Electrification: Lessons from an Earlier Technological
Advance 8
1.3 Bits: The Atoms of the Information Economy 9
1.4 Road Map to the Book 10
Any Information Can Be Represented by Bits 10
Further Reading 12
Chapter 2 The Applications 13
2.1 Users, Organizations, and Applications 13
2.1.1 Before Networking 14
2.1.2 After Networking 15
2.2 Application Building Blocks 16
2.3 Social Applications 19
2.3.1 Characteristics of User Groups 19
2.3.2 Styles of Social Applications 22
2.3.3 Remote Conferencing with Shared Workspace 27
2.3.4 Groupware 28
Collaborative Authoring 28
2.3.5 Discussion Forums 32
Calendar and Scheduling 32
Newsgroups 34
2.3.6 Cyberspace Applications 35
World Wide Web 37
2.3.7 Back to the Big Picture 38
2.4 Information Management 38
2.4.1 Finding Useful Information 40
2.4.2 Autonomous Information Sources 47
2.5 Education and Training 51
Role of Push and Pull in Work Groups 51
viii Contents
2.6 Business Applications 52
2.6.1 Departmental Applications 53
2.6.2 Enterprise Applications 56
SAP: Largest ERP Vendor 60
Data Warehouses and Data Mining 62
2.6.3 Cross Enterprise Applications: Electronic
Commerce 64
Legacy Applications and the Year 2000 Problem 66
Dell Computer and Mass Customization 68
2.6.4 Consumer Applications 69
2.7 Similarity of Social Systems and Networked Computing 70
amazon.com: On Line Merchant 70
2.8 Open Issues 71
2.8.1 The Productivity Quandary 71
2.8.2 How Are New Business Applications Invented and
Developed? 72
2.8.3 The Glut of Information and Communications 72
2.8.4 Accommodating Change 73
Further Reading 73
Chapter 3 Computers, Networks, and
Organizations 75
3.1 Computing Systems 77
3.1.1 The System Architecture 78
3.1.2 Decomposition of Systems 79
3.1.3 Hosts and the Network 81
3.2 Client/Server Computing 90
3.2.1 Two Tier Client/Server 90
3.2.2 Three Tier Client/Server 92
3.2.3 Thin and Ultrathin Clients 96
3.2.4 The Future of Client/Server 97
Data Warehouses and OLAP 97
An Ultrathin Client: The Network Computer (NC) 98
3.3 Internet, Intranet, Extranet 99
3.3.1 Intranets 99
3.3.2 Extranets 100
3.3.3 Internet Applications 103
3.4 Networked Computing and the Organization 103
3.4.1 Rationale for Networked Computing 104
3.4.2 The Application Life Cycle 106
3.5 Open Issue: What Lies beyond Client/Server
Computing? 111
Further Reading 111
Contents ix
Chapter 4 Software Architecture and
Standardization 113
4.1 What Makes a Good Architecture 113
4.1.1 Decomposition and Modularity 114
4.1.2 Granularity and Hierarchy 117
4.1.3 Interfaces: The Module s Face to the World 118
4.1.4 Abstraction 119
Example of Abstraction: The Flora 120
4.1.5 Encapsulation 121
4.1.6 Modularity and Interfaces in Computing 121
4.2 Architecture of the Software Infrastructure 123
4.2.1 Goals of the Infrastructure 123
4.2.2 Layering 124
A Layered View of the Life and Social Sciences 128
4.3 Standardization 132
4.3.1 Reference Models and Interfaces 134
Standardization within Applications 134
4.3.2 Organization of the Standardization Process 135
International Organization for Standards (ISO) 135
4.3.3 Control and Enforcement of Standards 136
Internet Engineering Task Force (IETF) 136
Further Reading 137
Object Management Group 137
Chapter 5 Industry and Government 139
5.1 Participants, Products, and Services 139
5.1.1 Types of Suppliers 140
5.1.2 Types of Consumers 140
5.1.3 Types of Information Goods 142
5.1.4 Types of Software Goods 142
5.1.5 Equipment: The Component Model 144
5.2 Changes in Industry Structure 144
5.2.1 From Stovepipe to Layering 144
5.2.2 Less Vertical Integration and More Diversification 145
Dell as a Subsystem Integrator 145
Information Appliances 147
5.2.3 Venture Capital and Start up Companies 148
5.2.4 Computing/Communications Convergence 149
5.3 Obstacles to Change 150
5.3.1 The Network Effect 150
5.3.2 Lock In 154
The Success of the Web 154
The Value of Consumer Lock In to a Supplier 155
Contents
5.3.3 Path Dependent Effects 156
Microsoft vs. Everybody Else 156
5.4 Challenges for Suppliers 157
5.4.1 Properties of Information 157
5.4.2 How Software Differs from Information 159
5.4.3 Protecting Investments with Intellectual Property 160
5.4.4 Selling Content and Software 160
Are Shrink Wrapped Applications Poor Quality and
Overfeatured? 162
5.5 Government Roles 165
5.5.1 Protecting Intellectual Property 165
Intellectual Property as a Strategic Tool 168
5.5.2 Government Policies and Laws 169
Patents and Standardization 170
5.6 Open Issues 173
5.6.1 How Is the Industry Organized? 173
5.6.2 Sovereignty and the Global Internet 174
5.6.3 The Language of the Internet 175
5.6.4 Archiving Digital Information 175
5.6.5 A New Partnership 175
Further Reading 176
Chapter 6 Application Software 177
6.1 Some Overriding Issues 177
6.1.1 Software Complexity 178
6.1.2 Acquiring an Application 179
6.1.3 Development Methodology: Decomposition vs.
Assembly 181
6.1.4 Software Reuse 185
Component Standards 185
6.1.5 Location of Data and Computation 187
6.2 Tightly Coupled Data and Processing 189
6.2.1 Object Oriented Programming 190
Modeling and Representation 191
6.2.2 Software Components and Frameworks 198
Components, Frameworks, and the Industrial
Revolution 200
6.3 Loosely Coupled Data and Processing 205
6.3.1 Database Management 207
Extending Databases to Objects: ORDBMS and
ODBMS 208
Contents xi
6.3.2 Document Management: XML 211
extensible Markup Language (XML) 212
Further Reading 213
Chapter 7 Communications Support for
Applications 215
7.1 Algorithms, Protocols, and Policies 216
7.2 Abstract Communication Services 219
7.2.1 Message Service 220
The Hypertext Transfer Protocol (HTTP) 220
Is a Message Delivered for Sure? 222
7.2.2 Message with Reply Service 224
7.2.3 Timing and Concurrency 226
7.2.4 The Session 227
7.2.5 The Broadcast 232
7.3 Internet Communication Services 233
7.3.1 Internet Protocol (IP) 234
7.3.2 User Datagram Protocol (UDP) 234
7.3.3 Transmission Control Protocol (TCP) 235
RMI Is Layered on Messages 235
7.3.4 Internet Inter ORB Protocol (HOP) 236
7.3.5 Multimedia Sessions 236
Internet Streaming Multimedia Protocols 236
Further Reading 237
Chapter 8 Trustworthiness: Reliability and
Security 239
8.1 Facets of Trustworthiness 239
8.1.1 Program and System Correctness 239
Diversity, Reliability, and Security 242
8.1.2 Security: Countering External Threats 243
Uses of Data Replication 244
Availability, Security, and the Market 245
Computer Viruses 248
8.2 Computer and Network Security Measures 249
8.2.1 Encryption Ensures Confidentiality 249
8.2.2 Authentication 256
Certificates and a National Identity Card 259
8.2.3 Message Integrity and Nonrepudiation 260
8.2.4 Combining Techniques 262
Contents
8.2.5 Security Policies 263
Legal Sanctions 264
8.3 Electronic Payments 265
8.3.1 On Line Credit Card Systems 267
Questions about Digital Cash 268
8.4 Open Issues 269
Privacy and Anonymous Digital Cash 269
8.4.1 How Do We Deal with Increasing Vulnerability? 270
8.4.2 National Security and Law Enforcement Needs 270
8.4.3 Individual Privacy 271
8.4.4 Theft and Piracy of Software and Information 272
Further Reading 272
Chapter 9 Middleware 273
9.1 Message Oriented Middleware as an Aid to Workflow 275
9.2 Transaction Processing 276
9.2.1 Example of the Challenges: Travel Reservations 276
9.2.2 What Is a Transaction? 278
9.2.3 Transaction Processing Architecture 279
The ACID Properties of Transactions 279
Open Transaction Processing Standards 281
9.3 Mobile Code and Mobile Agents 282
9.3.1 Interactivity and Scalability 282
Mobile Code, Agents, and Objects 283
9.3.2 Interoperability 284
Mobile Code and Network Effects 284
9.3.3 Mobile Agents 285
9.3.4 Mobile Code and Agent Middleware 285
Java and Information Appliances 286
9.4 Distributed Object Management 287
Java as a De Facto Standard 287
9.4.1 One DOM Standard: CORBA 289
Java and Security 289
9.4.2 Services Offered by DOM 291
Competing Distributed Object Visions: DCOM and
CORBA 291
9.4.3 Interoperability among ORBs: HOP 292
9.5 Open Issue: Are Middleware Service Providers
Needed? 292
The OMG Process 292
Further Reading 293
Portability vs. Interoperability 293
Contents xiii
Chapter 10 Performance and Quality 295
10.1 Performance and Quality Metrics 295
10.1.1 Performance 296
10.1.2 Quality 298
10.1.3 Factors in Performance and Quality 299
10.2 The Role of Concurrency 299
10.2.1 Concurrency with Multiple Hosts 301
10.2.2 Concurrency in a Single Host 302
Different Forms of Multitasking 303
10.2.3 Resource Conflicts and Transactions 304
Why Networks Use Packets 304
10.3 Scalability 306
Scalability in Production 307
10.3.1 Blocking 308
10.3.2 Duplicated Work 308
10.3.3 Faulty Load Balancing 309
10.3.4 Congestion 309
10.3.5 The Role of Application Architecture in Scalability 312
10.3.6 Mobile Code and Scalability 314
Today s Operating Systems 314
10.4 Operating Systems 315
Operating Systems and Winner Take All Effects 315
Further Reading 316
Chapter 11 Networks 317
11.1 Functions of a Network 317
11.1.1 Sharing: Statistical Multiplexing 318
Origins of the Internet 318
11.1.2 Packet Forwarding and Routing 321
11.1.3 Name Services 323
Simulcast and Multicast 324
11.1.4 Flow Control 325
11.1.5 Congestion Control 326
The Value of a Name 326
11.2 Quality of Service (QoS) 330
Congestion and Network Externalities 330
11.2.1 The Internet Transport Protocols and QoS 331
Cost of a Congestion Control Infrastructure 331
11.2.2 Integrated Services 332
11.2.3 Pricing Network Services 333
The Evolution of the Internet 334
11.3 Network Security 335
11.3.1 Secure and Insecure Authentication 336
11.3.2 Security Flaws in Public Servers 336
11.3.3 Firewalls and Packet Filtering 336
civ
Today s Internet Pricing 336
Firewalls Limit Innovation 337
11.3.4 Where to Use Encryption and Authentication 338
11.4 Open Issues 339
11.4.1 The Future of the Internet 339
11.4.2 Making Money on the Internet 339
Further Reading 340
Chapter 12 Communications 341
12.1 Communications Service Providers 341
12.1.1 Communications Regulation 344
12.2 Current Developments in Data Communications 346
12.2.1 Broadband Network Access for Residences 346
12.2.2 Nomadic and Untethered Internet Access 348
Internet Roaming 348
12.2.3 IP Telephony 350
Wireless Access Protocol (WAP) 350
12.2.4 Integrated IP Networks 352
12.3 Impact of a Communication Link 352
12.3.1 Impact on Message Latency 354
Fiber Optics and Optical Networking 354
12.3.2 Mitigating Communications Bottlenecks 355
Caching and Copyright Law 357
12.4 Open Issues 358
12.4.1 Is Communications Regulation Needed? 358
12.4.2 Regulation of the Internet 358
Further Reading 358
JPEG and MPEG 358
Glossary 359
References 375
Index 383
|
any_adam_object | 1 |
author | Messerschmitt, David G. |
author_facet | Messerschmitt, David G. |
author_role | aut |
author_sort | Messerschmitt, David G. |
author_variant | d g m dg dgm |
building | Verbundindex |
bvnumber | BV013804359 |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)441870031 (DE-599)BVBBV013804359 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01434nam a2200313 c 4500</leader><controlfield tag="001">BV013804359</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">010704s1999 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1558605363</subfield><subfield code="9">1-55860-536-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)441870031</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013804359</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="080" ind1=" " ind2=" "><subfield code="a">681.3</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Messerschmitt, David G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Networked applications</subfield><subfield code="b">a guide to the new computing infrastructure</subfield><subfield code="c">David G. Messerschmitt</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco</subfield><subfield code="b">Morgan Kaufmann Publ.</subfield><subfield code="c">1999</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 396 S.: Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Morgan Kaufmann series in networking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">računalništvo - računalniške mreže - aplikacije - Internet programiranje - upravljanje informacij - izobraževanje - arhitektura programske opreme - standardizacija programske opreme - industrija - vlada - varnost komunikacij - kakovost - omrežja - priročniki</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009437240&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009437240</subfield></datafield></record></collection> |
id | DE-604.BV013804359 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T18:52:15Z |
institution | BVB |
isbn | 1558605363 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009437240 |
oclc_num | 441870031 |
open_access_boolean | |
owner | DE-19 DE-BY-UBM DE-11 |
owner_facet | DE-19 DE-BY-UBM DE-11 |
physical | XX, 396 S.: Ill., graph. Darst. |
publishDate | 1999 |
publishDateSearch | 1999 |
publishDateSort | 1999 |
publisher | Morgan Kaufmann Publ. |
record_format | marc |
series2 | The Morgan Kaufmann series in networking |
spelling | Messerschmitt, David G. Verfasser aut Networked applications a guide to the new computing infrastructure David G. Messerschmitt San Francisco Morgan Kaufmann Publ. 1999 XX, 396 S.: Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier The Morgan Kaufmann series in networking računalništvo - računalniške mreže - aplikacije - Internet programiranje - upravljanje informacij - izobraževanje - arhitektura programske opreme - standardizacija programske opreme - industrija - vlada - varnost komunikacij - kakovost - omrežja - priročniki HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009437240&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Messerschmitt, David G. Networked applications a guide to the new computing infrastructure računalništvo - računalniške mreže - aplikacije - Internet programiranje - upravljanje informacij - izobraževanje - arhitektura programske opreme - standardizacija programske opreme - industrija - vlada - varnost komunikacij - kakovost - omrežja - priročniki |
title | Networked applications a guide to the new computing infrastructure |
title_auth | Networked applications a guide to the new computing infrastructure |
title_exact_search | Networked applications a guide to the new computing infrastructure |
title_full | Networked applications a guide to the new computing infrastructure David G. Messerschmitt |
title_fullStr | Networked applications a guide to the new computing infrastructure David G. Messerschmitt |
title_full_unstemmed | Networked applications a guide to the new computing infrastructure David G. Messerschmitt |
title_short | Networked applications |
title_sort | networked applications a guide to the new computing infrastructure |
title_sub | a guide to the new computing infrastructure |
topic | računalništvo - računalniške mreže - aplikacije - Internet programiranje - upravljanje informacij - izobraževanje - arhitektura programske opreme - standardizacija programske opreme - industrija - vlada - varnost komunikacij - kakovost - omrežja - priročniki |
topic_facet | računalništvo - računalniške mreže - aplikacije - Internet programiranje - upravljanje informacij - izobraževanje - arhitektura programske opreme - standardizacija programske opreme - industrija - vlada - varnost komunikacij - kakovost - omrežja - priročniki |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009437240&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT messerschmittdavidg networkedapplicationsaguidetothenewcomputinginfrastructure |