- 1、本文档共66页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
P2P Apps (II).ppt
P2P Apps (II) CS 598 IG 23rd February, 2006 Mehedi Bakht END-TO-END ARGUMENTS IN SYSTEM DESIGN J. H. Saltzer, D.P. Reed and D. D. Clark M.I.T Laboratory for Computer Science About the paper One of the most widely cited/read papers in systems No number, graphcis,etc ! The reasoning in this paper is behind many of the design decisions in today’s network The Argument Define when it is applicable: “The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the endpoints of the communication system…” Regardless of what happens in the communication systems, correct operation can only be verified by endpoints. The Argument Define when it is applicable: “The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the endpoints of the communication system…” Is it possible to completely ensure integrity due to probabilistic nature of integrity checks? The Argument Define the consequence: “… Therefore, providing that questioned function as a feature of the communication system itself is not possible…” If you can’t do it properly, don’t do it at all. The Argument Define the exception: “… (Sometimes an incomplete version of the function provided by the communication system may be useful as a performance enhancement.)” Its not a hard and fast rule, there are special cases where the benefit outweighs the cost. Careful File Transfer Copy/Move file from HD on Computer A to HD on Computer B Careful File Transfer Possible threats to an accurate transfer: Disk error Software error (OS, File transfer program, Network driver) Hardware error Communication system System crash Careful File Transfer Solution 1: Point-to-Point Reinforce each step of process (timeout, retry, etc.) Goal: Reduce probability of each threat to an acceptably small value Could be hard to do, each step must be full-proof Could be inefficient, extra checking Solution
您可能关注的文档
- Association Rules.ppt
- By Andrea Kohlhase, The Course Capsules Project (CCaps),.ppt
- Counting what will countDoes your dashboard predict.ppt
- Daniel Vitek MBA, PMP - Consultant to CDC NCPHI-2009 .ppt
- Data ManagementNeeds Assessment.ppt
- Development and Implementation of a Demonstration Model .ppt
- Distribution Channel Decisions.ppt
- Donald Weinbaum, MBA, LCADC, CCJPExecutive .ppt
- EMBA 225 Week 1The Individual Attitudes, Values and Mot.ppt
- Establishing and Implementing a Quality Management Plan.ppt
文档评论(0)