<span>This book introduces the reader to the fundamentals of contemporary, emerging and future technologies and services in Internet computing. It covers essential concepts such as distributed systems architectures and web technologies, contemporary paradigms such as cloud computing and the Internet
Internet Computing Principles of Distributed Systems and Emerging Internet-Based Technologies, Second Edition
â Scribed by Ali Sunyaev
- Publisher
- Springer
- Year
- 2024
- Tongue
- English
- Leaves
- 405
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
The 2nd edition of this well-established textbook introduces the reader to the fundamentals of contemporary and emerging technologies and services in Internet computing. It covers essential concepts such as distributed systems architecture and web technologies, contemporary paradigms such as cloud, fog, and edge computing, the Internet of things, and emerging technologies like distributed ledger technologies and the InterPlanetary File System. The book also highlights the interconnection and recombination of these Internet-based technologies, which together form a critical information infrastructure with major impacts on individuals, organizations, governments, economies, and society as a whole.
Intended as a textbook for upper undergraduate and graduate classes, it features a wealth of examples, learning goals and summaries for every chapter, numerous recommendations for further reading, and questions for checking studentsâ comprehension. A dedicated author website offers additional teaching material and more elaborate examples. Accordingly, the book enables students and young professionals in IT-related fields to familiarize themselves with the Internetâs basic mechanisms, and with the most promising Internet-based technologies of our time.
⌠Table of Contents
Preface
Contents
About the Author
List of Abbreviations
Chapter 1: Introduction to Internet Computing
1.1 A Brief History of the Internet
1.1.1 Phase I: Development of Technological Fundamentals
1.1.2 Phase II: Growth and Internationalization
1.1.3 Phase III: Commercialization and the World Wide Web
1.2 Defining Internet Computing
1.2.1 Applications
1.2.2 Architectures
1.2.3 Technologies
1.2.4 Systemic Matters
1.3 Distributed Information Systems for Internet Computing
1.3.1 Distributed Systems
1.3.2 Information Systems
1.4 Information Infrastructures
1.5 Application Examples of Internet Computing
1.6 Summary
1.7 Questions
References
Further Reading
Chapter 2: Information Systems Architecture
2.1 Defining Information Systems Architecture
2.2 The Principles of Information System Architecture
2.2.1 Principle 1: Architecture Models Information System Boundaries, Inputs, and Outputs
2.2.2 Principle 2: An Information System Can Be Broken Down into a Set of Smaller Subsystems
2.2.3 Principle 3: An Information System Can Be Considered in Interaction with Other Systems
2.2.4 Principle 4: An Information System Can Be Considered Through Its Entire Lifecycle
2.2.5 Principle 5: An Information System Can Be Linked to Another Information System via an Interface
2.2.6 Principle 6: An Information System Can Be Modeled at Various Abstraction Levels
2.2.7 Principle 7: An Information System Can Be Viewed Along Several Layers
2.2.8 Principle 8: An Information System Can Be Described Through Interrelated Models with Given Semantics
2.2.9 Principle 9: An Information System Can Be Described Through Different Perspectives
2.3 Architectural Views
2.4 Architectural Patterns
2.4.1 Client-Server Architectures
2.4.2 Tier Architectures
2.4.3 Peer-to-Peer Architectures
2.4.4 Model View Controller Architectures
2.4.5 Service-Oriented Architecture
2.5 Summary
2.6 Questions
References
Further Reading
Chapter 3: Design of Good Information Systems Architectures
3.1 Architecture Design
3.2 The Information Systems Architecture Design Process
3.2.1 Basic Process Activities
3.2.2 Example Method for Designing Architectures: Attribute-Driven Design (ADD) Method
3.2.3 Success of Architecture Design Processes: The Iron Triangle
3.3 Information Systems Architecturesâ Quality
3.3.1 Functional and Nonfunctional Requirements
3.3.2 Quality Attributes
3.4 Summary
3.5 Questions
References
Further Reading
Chapter 4: Internet Architectures
4.1 History of the Internet
4.2 Todayâs Internet Network Infrastructure
4.3 The Internet Protocol
4.3.1 Internet Protocol Suite
4.3.2 IP Addresses
4.3.3 Domain Name System
4.3.4 IP-Routing and Packet Forwarding
4.4 Content Delivery Networks
4.5 Emerging Internet Network Architecture
4.5.1 Software-Defined Networking
4.5.2 Network Functions Virtualization
4.5.3 Overlay Networks
4.5.4 Information-Centric Networking
4.6 Summary
4.7 Questions
References
Further Reading
Chapter 5: Applications and Systems Integration
5.1 Introduction
5.2 Middleware
5.2.1 Message-Oriented Middleware
5.2.2 Transaction-Oriented Middleware
5.2.3 Object-Oriented Middleware
5.2.4 Middleware in Practice: Zuul (Netflix)
5.3 Service-Oriented Architecture
5.4 Web Services
5.4.1 Internal and External Web Service Architecture Perspectives
5.4.2 SOAP Web Services
5.4.3 RESTful Web Services
5.4.4 GraphQL
5.5 Summary
5.6 Questions
References
Further Reading
Chapter 6: Cloud Computing
6.1 An Introduction to Cloud Computing
6.1.1 The Emergence of Cloud Computing
6.1.2 Definition of Cloud Computing and Its Essential Characteristics
6.1.3 The Cloud Service Market
6.1.4 Cloud Computing Service Models
6.1.5 Cloud Computing Deployment Models
6.1.6 Differences Between Related Concepts
6.2 Essentials to the Provision of Cloud Services
6.2.1 Essential Cloud Technologies
6.2.2 Cloud Service Stack
6.3 Chances and Challenges of Cloud Computing
6.3.1 Reasons to Move into the Cloud: Benefits and Opportunities for Organizations
6.3.2 Cloud Computingâs Transformative Mechanisms
6.3.3 The Downside of Cloud Computing: New Risks and Challenges
6.4 Security and Data Protection in Cloud Environments
6.4.1 Security and Privacy Challenges due to Essential Cloud Service Characteristics
6.4.2 Continuous Service Certification as Innovative Means to Ensure Security and Data Protection
6.5 Looking Ahead: Current Hot Topics on Cloud Computing
6.5.1 Artificial Intelligence as a Service
6.5.2 Blockchain as a Service
6.5.3 Data Protection Certification of Cloud Services
6.6 Summary
6.7 Questions
References
Further Reading
Chapter 7: Fog and Edge Computing
7.1 Fog and Edge Computing Fundamentals
7.1.1 Definition and Characteristics of Fog Computing
7.1.2 Fog Computing Service Models
7.1.3 Fog Computing Deployment Models
7.1.4 Definition and Characteristics of Edge Computing
7.1.5 Mist Computing
7.1.6 Differences to Cloud Computing
7.2 Challenges and Opportunities of Fog and Edge Computing
7.2.1 Challenges of Fog and Edge Computing
7.2.2 Opportunities
7.3 Fog and Edge Computing in Practice
7.3.1 OpenFog Reference Architecture for Fog Computing
7.3.2 Vehicular Fog Computing
7.3.3 Augmented Reality Glasses
7.4 Summary
7.5 Questions
References
Further Reading
Chapter 8: Distributed Ledger Technology
8.1 Background of Distributed Ledger Technology
8.1.1 Distributed Ledger Technology as a Game Changer
8.1.2 History of Distributed Ledger Technology
8.1.3 Terminology in Distributed Ledger Technology
8.2 Technical Foundations
8.2.1 Hash Functions
8.2.2 Merkle Tree
8.2.3 Public Key Infrastructure
8.2.4 Consensus Mechanisms in Distributed Ledger Technology
8.3 The Bitcoin Blockchain
8.4 Smart Contracts
8.5 Applications of Distributed Ledger Technology
8.5.1 Financial Technology
8.5.2 Healthcare
8.5.3 Supply Chain Management
8.6 Summary
8.7 Questions
References
Further Reading
Chapter 9: Peer-to-Peer Data Networks and the InterPlanetary File System
9.1 Making Use of Distributed Data on the Internet
9.2 Predecessors of Peer-to-Peer Data Networks
9.2.1 P2P File-Sharing Systems
9.2.2 BitTorrent Block Exchange
9.2.3 Kademlia Distributed Hash Tables
9.2.4 Information-Centric Networking (ICN)
9.2.5 Distributed Ledger Technology
9.3 The InterPlanetary File System (IPFS)
9.3.1 Requirements and Design Choices
9.3.2 Fundamental IPFS Mechanisms
9.3.3 Incentivization with Filecoin
9.3.4 Application Areas and Use Cases
9.4 Other Peer-to-Peer Data Networks
9.4.1 Generic Building Blocks
9.4.2 Selected Approaches
9.4.3 Open Issues and Future Developments
9.5 Summary
9.6 Questions
References
Further Reading
Chapter 10: The Internet of Things
10.1 Introduction of the Internet of Things
10.1.1 Definition and Characteristics
10.1.2 A Brief History of the Internet of Things
10.2 The Internet of Things: Technologies and Architectures
10.2.1 Enabling Technologies
10.2.2 Core Concepts
10.2.3 Architecture Models
10.3 Internet of Things Applications
10.3.1 Smart Homes
10.3.2 Smart Cities
10.3.3 The Industrial Internet of Things
10.3.4 The Internet of Things in the Energy and Health Care Sectors
10.4 Challenges and the Future of the Internet of Things
10.4.1 Challenges
10.4.2 Outlook: The Future of the Internet of Things
10.5 Summary
10.6 Questions
References
Further Reading
Chapter 11: Critical Information Infrastructures
11.1 Foundations of Critical Information Infrastructures
11.1.1 The Emergence of Critical Information Infrastructures
11.1.2 Sociotechnical Systems
11.1.3 Conceptualization of Critical Information Infrastructures
11.1.4 Differences Between Critical Infrastructures and Critical Information Infrastructures
11.2 Properties of Critical Information Infrastructures
11.3 Functions of Critical Information Infrastructures
11.3.1 Communication
11.3.2 Governance
11.3.3 Knowledge Management
11.3.4 Information Collection
11.4 Operation of Critical Information Infrastructures
11.5 Summary
11.6 Questions
References
Further Reading
Glossary
đ SIMILAR VOLUMES
<p>This book constitutes the proceedings of the 10th International Conference on Internet and Distributed Computing Systems, IDCS 2017, held in Mana Island, Fiji, in December 2017.<br>The 16 full papers presented were carefully reviewed and selected from 40 submissions. The papers focus on emerging
The author of this book has identified the seven key emerging Internet-related technologies: Internet of things, smart everything, big data, cloud computing, cybersecurity, software-defined networking, and online education. Together these technologies are transformational and disruptive. This book p
You just know that an improvement of the user interface will reap rewards, but how do you justify the expense and the labor and the time-guarantee a robust ROI!-ahead of time? How do you decide how much of an investment should be funded? And what is the best way to sell usability to others? In this
Presenting the Proceedings of the 2005 Human-Computer Interaction Conference:<br><br>Available on CD<br><br>HUMAN COMPUTER INTERNATIONAL 2005, U.S. CD<br><br>Edited by<br>Gavriel Salvendy<br><br>A Volume in the Human Factors/Ergonomics Series<br>Series Editor: Gavriel Salvendy<br><br>0-8058-5807-5 [