10.07.2015 Views

Chapter 5 Naming - docencia de la ETSIT-URJC

Chapter 5 Naming - docencia de la ETSIT-URJC

Chapter 5 Naming - docencia de la ETSIT-URJC

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DISTRIBUTED SYSTEMSPrinciples and ParadigmsSecond EditionANDREW S. TANENBAUMMAARTEN VAN STEEN<strong>Chapter</strong> 5<strong>Naming</strong>


Names, I<strong>de</strong>ntifiers, And AddressesProperties of a true i<strong>de</strong>ntifier:• An i<strong>de</strong>ntifier refers to at most one entity.• Each entity is referred to by at most onei<strong>de</strong>ntifier.• An i<strong>de</strong>ntifier always refers to the sameentity


Forwarding Pointers (1)Figure 5-1. The principle of forwarding pointersusing (client stub, server stub) pairs.


Forwarding Pointers (2)Figure 5-2. Redirecting a forwarding pointer bystoring a shortcut in a client stub.


Forwarding Pointers (3)Figure 5-2. Redirecting a forwarding pointer bystoring a shortcut in a client stub.


Home-Based ApproachesFigure 5-3. The principle of Mobile IP.


Figure 5-4.Resolving key26 from no<strong>de</strong> 1and key 12 fromno<strong>de</strong> 28 in aChord system.Distributed Hash TablesGeneral Mechanism


Hierarchical Approaches (1)Figure 5-5. Hierarchical organization of a location service intodomains, each having an associated directory no<strong>de</strong>.


Hierarchical Approaches (2)Figure 5-6. An example of storing information of an entityhaving two addresses in different leaf domains.


Hierarchical Approaches (3)Figure 5-7. Looking up a location in a hierarchicallyorganized location service.


Hierarchical Approaches (4)Figure 5-8. (a) An insert request is forwar<strong>de</strong>d to thefirst no<strong>de</strong> that knows about entity E.


Hierarchical Approaches (5)Figure 5-8. (b) A chain of forwarding pointersto the leaf no<strong>de</strong> is created.


Name Spaces (1)Figure 5-9. A general naming graph with a single root no<strong>de</strong>.


Name Spaces (2)Figure 5-10. The general organization of the UNIX file systemimplementation on a logical disk of contiguous disk blocks.


Linking and Mounting (1)Figure 5-11. The concept of a symbolic linkexp<strong>la</strong>ined in a naming graph.


Linking and Mounting (2)Information required to mount a foreignname space in a distributed system• The name of an access protocol.• The name of the server.• The name of the mounting point in theforeign name space.


Linking and Mounting (3)Figure 5-12. Mounting remote name spacesthrough a specific access protocol.


Name Space Distribution (1)Figure 5-13. An example partitioning of the DNS name space,including Internet-accessible files, into three <strong>la</strong>yers.


Name Space Distribution (2)Figure 5-14. A comparison between name servers for implementing no<strong>de</strong>s from a <strong>la</strong>rgescalename space partitioned into a global <strong>la</strong>yer, an administrational<strong>la</strong>yer, and a managerial <strong>la</strong>yer.


Implementation of Name Resolution (1)Figure 5-15. The principle of iterative name resolution.


Implementation of Name Resolution (2)Figure 5-16. The principle of recursive name resolution.


Implementation of Name Resolution (3)Figure 5-17. Recursive name resolution of . Nameservers cache intermediate results for subsequent lookups.


Example: The Domain Name SystemFigure 5-18. The comparison between recursive and iterativename resolution with respect to communication costs.


The DNS Name SpaceFigure 5-19. The most important types of resource recordsforming the contents of no<strong>de</strong>s in the DNS name space.


DNS Implementation (1)Figure 5-20. An excerpt from the DNSdatabase for the zone cs.vu.nl.


DNS Implementation (2)Figure 5-20. An excerpt from the DNSdatabase for the zone cs.vu.nl.


DNS Implementation (3)Figure 5-21. Part of the <strong>de</strong>scription for the vu.nldomain which contains the cs.vu.nl domain.


Hierarchical Implementations: LDAP (1)Figure 5-22. A simple example of an LDAPdirectory entry using LDAP naming conventions.


Hierarchical Implementations: LDAP (2)Figure 5-23. (a) Part of a directory information tree.


Hierarchical Implementations: LDAP (3)Figure 5-23. (b) Two directory entrieshaving Host_Name as RDN.


Mapping to Distributed Hash Tables (1)Figure 5-24. (a) A general <strong>de</strong>scription of a resource.(b) Its representation as an AVTree.


Mapping to Distributed Hash Tables (2)Figure 5-25. (a) The resource <strong>de</strong>scription of a query.(b) Its representation as an AVTree.


Semantic Over<strong>la</strong>y NetworksFigure 5-26. Maintaining a semantic over<strong>la</strong>y through gossiping.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!