|
1 Periodisation of Network Service Development |
|
|
1 | (12) |
|
|
10 | (3) |
|
2 Architectural Transformations in Distributed Systems |
|
|
13 | (32) |
|
2.1 Software Architectures and Communication Patterns |
|
|
13 | (4) |
|
2.2 Distributed Service Systems: Clustering, Grids and Clouds |
|
|
17 | (2) |
|
2.3 Architectures: Peer-to-Peer |
|
|
19 | (4) |
|
2.4 Performance Optimisation |
|
|
23 | (3) |
|
2.5 Distributed Transactions |
|
|
26 | (4) |
|
2.6 Distributed Databases |
|
|
30 | (8) |
|
2.7 System Examples: Google Spanner, a Global DDB |
|
|
38 | (5) |
|
|
43 | (2) |
|
|
44 | (1) |
|
3 Evolution of Clustering and Parallel Computing |
|
|
45 | (32) |
|
3.1 Clustering and Grids: Performance Parameters and Basic Models |
|
|
48 | (14) |
|
3.2 Performance-Energy-Price Trade-Offs in Clusters and Grids |
|
|
62 | (2) |
|
3.3 Resource Management in Clusters |
|
|
64 | (1) |
|
3.4 Application Management in Clusters |
|
|
65 | (1) |
|
3.5 Application Management in Grids |
|
|
66 | (5) |
|
3.6 Distributed Applications |
|
|
71 | (3) |
|
|
74 | (3) |
|
|
75 | (2) |
|
4 Cloud Computing, Virtualisation, Storage and Networking |
|
|
77 | (58) |
|
4.1 Clouds: Technology Stack, Basic Models and Services |
|
|
78 | (14) |
|
4.2 Virtualisation of Services and Resources |
|
|
92 | (13) |
|
4.3 SDN --- Software-Defined Networking |
|
|
105 | (5) |
|
4.4 Backup Services within Clouds, as Advanced Cloud Backup Technology |
|
|
110 | (15) |
|
4.4.1 Backup as Important Component of Informational Safety |
|
|
111 | (6) |
|
4.4.2 RAIC: Storage Service Integration |
|
|
117 | (8) |
|
4.5 RAIC Integration for Network Storages on Mobile Devices |
|
|
125 | (6) |
|
4.5.1 Efficient Access to Storage Services from Mobile Devices |
|
|
126 | (2) |
|
4.5.2 A New Must-Have App: RAIC Integrator for Smartphones |
|
|
128 | (3) |
|
|
131 | (4) |
|
|
131 | (4) |
|
5 Smart Grid, Internet of Things and Fog Computing |
|
|
135 | (76) |
|
5.1 Smart Grid as Integration Technology for the Networks of Energy Supply and Telecommunication |
|
|
136 | (48) |
|
5.1.1 Services Architectures and Multi-level Models |
|
|
144 | (14) |
|
5.1.2 Smart Grid: Enabling Network Technologies |
|
|
158 | (19) |
|
5.1.3 Case Study: A CAD Toolset for the Design of Energy-Efficient Combined Networks |
|
|
177 | (7) |
|
5.2 From Internet of Services to Internet of Things: Fog Computing |
|
|
184 | (22) |
|
5.2.1 Enabling Technologies for IoT |
|
|
188 | (6) |
|
5.2.2 Case Studies on IoT with On-Board Micro-controller Raspberry Pi |
|
|
194 | (9) |
|
5.2.3 The Future Industry 4.0 Vision |
|
|
203 | (1) |
|
|
204 | (2) |
|
|
206 | (5) |
|
|
209 | (2) |
|
6 Future Mobile Communication: From 4G To 5G, 5G Enabling Techniques |
|
|
211 | (36) |
|
6.1 Conventional Techniques |
|
|
211 | (11) |
|
|
213 | (2) |
|
6.1.2 Satellite-Based Radio Systems |
|
|
215 | (7) |
|
6.2 A New Generation of Mobile Communication |
|
|
222 | (22) |
|
6.2.1 Visions and Requirements |
|
|
224 | (9) |
|
6.2.2 5G Inter-Operability |
|
|
233 | (2) |
|
6.2.3 Future Standard IMT 2020. Deployment Scenarios |
|
|
235 | (6) |
|
6.2.4 Resource Allocation Method for Future WLAN |
|
|
241 | (3) |
|
|
244 | (3) |
|
|
244 | (3) |
|
7 Security in Distributed Systems |
|
|
247 | (62) |
|
7.1 Security and Protection Goals |
|
|
248 | (5) |
|
7.2 Protection Techniques |
|
|
253 | (6) |
|
7.2.1 Checksum and Digest |
|
|
254 | (1) |
|
|
255 | (3) |
|
|
258 | (1) |
|
7.2.4 Orchestration, Parallelisation and Multiplexing |
|
|
258 | (1) |
|
|
258 | (1) |
|
7.2.6 Trusted Computing and Physical Protection |
|
|
259 | (1) |
|
|
259 | (2) |
|
7.3.1 Network Encryption: IPsec |
|
|
259 | (1) |
|
7.3.2 Transport Encryption: TLS |
|
|
260 | (1) |
|
7.3.3 Content Encryption: S/MIME and PGP |
|
|
260 | (1) |
|
7.3.4 Authorisation: Kerberos and OAuth2 |
|
|
261 | (1) |
|
7.3.5 Further Secure Services: DNS-SEC, VPNs and Proxies |
|
|
261 | (1) |
|
7.4 Security Protocols and Network Concepts |
|
|
261 | (7) |
|
|
268 | (11) |
|
7.6 Security in Web Applications: Legal and Technological Aspects |
|
|
279 | (9) |
|
7.6.1 Technological Aspects of Data Security Guaranteeing Web Systems |
|
|
281 | (2) |
|
7.6.2 Legal Aspects of Data Security Guaranteeing Web Systems |
|
|
283 | (5) |
|
7.7 Steganography in Distributed Systems |
|
|
288 | (13) |
|
7.7.1 Steganography in Development |
|
|
290 | (4) |
|
7.7.2 Steganography: Main Concepts |
|
|
294 | (4) |
|
7.7.3 Watermarks and Steganography |
|
|
298 | (3) |
|
7.8 Anonymity and MIX Networks |
|
|
301 | (5) |
|
|
306 | (3) |
|
|
307 | (2) |
|
Appendix A Selected Originators and Designers of Distributed Systems |
|
|
309 | (8) |
|
A.1 Edgar Frank "Ted" Codd |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
311 | (1) |
|
A.5 Sir Timothy John Berners-Lee |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
A.10 Remembering the Pioneers |
|
|
314 | (3) |
|
Appendix B Research Focus |
|
|
317 | (6) |
|
B.1 CANDY: Network Planning |
|
|
317 | (2) |
|
B.2 FlexCloud: Flexible Architectures for Cloud Computing |
|
|
319 | (1) |
|
B.3 DaaMob Service Platform: Data Service Management |
|
|
319 | (4) |
|
Appendix C Acronyms for Mobile and Wireless |
|
|
323 | (4) |
|
Appendix D Repetition and Control of Learning Progress |
|
|
327 | (10) |
|
D.1 New Generation (Mobile) Networks |
|
|
327 | (1) |
|
D.2 Periodisation of Computer Networks: Phases I to IV, Smart Grid, IoT and Fog Computing |
|
|
328 | (1) |
|
D.3 Architectural Transformation in Distributed Systems |
|
|
328 | (1) |
|
|
329 | (1) |
|
D.5 Virtualisation Concepts |
|
|
330 | (1) |
|
D.6 Performance Characteristics of Digital Computers, Performance Optimisation in Distributed Systems |
|
|
331 | (1) |
|
D.7 Distributed Computing, Parallel Computing and Acceleration Models |
|
|
331 | (1) |
|
|
332 | (1) |
|
D.9 Security Aspects in NGN |
|
|
332 | (2) |
|
D.10 PGP and Steganography |
|
|
334 | (3) |
|
Appendix E Example of a Written Exam to the Discussed Subjects |
|
|
337 | (6) |
Index |
|
343 | |