In der Vorlesung liegt der Fokus auf der Vermittlung grundlegender Wirkmechanismen in Middleware-basierenden verteilten Systemen. Ausgehend von der Darstellung grundlegender Ansätze (z.B. Arten der Interprozesskommunikation) sollen die Gemeinsamkeiten moderner verteilter Infrastrukturen praktisch verdeutlicht werden. Studenten sollen in die Lage versetzt werden, mit dem Wissen aus der Vorlesung eigene komplexe verteilte Anwendungen, oder auch eigene Middleware-Komponenten optimal entwerfen und entwickeln zu können.
System Models | 01:22:56 | |
---|---|---|
Variation: Thin Clients | 00:17:11 | |
Fundamental Models | 00:31:33 | |
Logical Time | 00:47:32 | |
Failure Model | 00:59:32 | |
Security Model | 01:12:17 | |
Network Programming Models | 01:22:56 |
Messaging and Remote Procedures (2) | 01:32:16 | |
---|---|---|
Type Definitions | 00:16:36 | |
Unions | 00:16:51 | |
Arrays | 00:13:01 | |
Interfaces | 00:15:04 | |
Attributes | 00:15:37 | |
Interoperable Object References | 00:16:08 |
RPC Protokolls | 01:24:13 | |
---|---|---|
Questions | 00:17:26 | |
GIOP Messages | 00:08:09 | |
Request | 00:08:19 | |
Notation | 00:09:28 | |
Universal Tags | 00:08:47 | |
Basic Encoding Rules | 00:10:32 | |
Service Context | 00:22:53 |
Messaging and Remote Procedures | 01:31:16 | |
---|---|---|
Review | 00:13:56 | |
Objective of Programming Models: Transparancies | 00:29:07 | |
Marshalling and MDE | 00:53:14 | |
XDR | 01:01:30 | |
RPC Message Protocol | 01:15:01 | |
IDL Translation | 01:31:16 |
Java Messaging Service | 01:28:54 | |
---|---|---|
Java Messaging Service | 00:23:26 | |
JMS Relationships | 00:08:18 | |
JMS-Messages | 00:14:10 | |
JMS Messaging Types | 00:11:20 | |
XML Protools | 00:32:40 |
SOAP | 01:32:17 | |
---|---|---|
Exercises | 00:19:37 | |
Architecture | 00:26:53 | |
SOAP | 00:18:06 | |
SOAP Messages | 00:16:05 | |
Document Style SOAP | 00:12:34 |
Naming and Directories | 01:23:22 | |
---|---|---|
Web Service Specification Landscape | 00:09:27 | |
SOAP Notify Example | 00:12:31 | |
WS-1 Details | 00:23:31 | |
Naming | 00:13:52 | |
DNS Zones | 00:16:44 | |
DNS Zones Example | 00:07:14 |
Naming and Directories (2) | 01:26:49 | |
---|---|---|
DNS Zones | 00:15:41 | |
Other DNS Related Issues | 00:15:43 | |
X.500 | 00:11:31 | |
DIT | 00:14:34 | |
Aliases | 00:11:51 | |
Attribute Syntax | 00:17:37 |
Naming and Directories (3) | 01:11:49 | |
---|---|---|
Remarks On the Last Excercise | 00:14:38 | |
About TCP | 00:15:08 | |
Attribute Syntax | 00:06:55 | |
RFCs | 00:19:56 | |
Discussion: Design of a TWP Naming Service | 00:15:12 |
Design of a TWP Naming Service | 01:17:48 | |
---|---|---|
CORBA Naming Service | 00:10:02 | |
Naming Service Design Principles | 00:19:24 | |
Federation | 00:10:52 | |
UDDI Interaction | 00:13:40 | |
Public UDDI Registries | 00:05:05 | |
Business Entity | 00:19:45 |
Patterns | 01:29:09 | |
---|---|---|
Broker | 00:19:11 | |
ORB Connection Management | 00:08:12 | |
Connection Shutdown | 00:06:02 | |
Proxy | 00:22:13 | |
Adapter | 00:14:36 | |
Portable Object Adapter | 00:09:54 | |
POA Features | 00:09:01 |
Patterns (2) | 01:28:09 | |
---|---|---|
Excercise Discussion | 00:19:29 | |
Portable Object Adapter | 00:12:04 | |
Functions of the POA Manager | 00:15:09 | |
Initializing the Server-Side ORB Runtime | 00:12:51 | |
Implicit Activation | 00:11:47 | |
Servant Managers | 00:16:51 |
Patterns (3) | 01:29:33 | |
---|---|---|
POA Interface: Exceptions | 00:12:36 | |
Factory | 00:17:28 | |
CosNaming::NamingContext | 00:17:09 | |
Time in Distributed Systems | 00:14:15 | |
Clock Correctness | 00:14:26 | |
Global Time | 00:13:27 |
Message-Oriented Middleware | 01:29:15 | |
---|---|---|
Review | 00:19:26 | |
Message-Oriented Middleware | 00:21:39 | |
Push / Pull Model | 00:07:47 | |
Messaging Models | 00:05:34 | |
Persistent Message Queues | 00:13:55 | |
CORBA Event Service | 00:14:12 | |
CORBA Event Channel Usage | 00:08:03 |
Cryptography | 01:28:48 | |
---|---|---|
Cryptography | 00:08:37 | |
Threats and Attacks | 00:08:11 | |
Design Process for Secure Systems | 00:15:50 | |
Secrecy and Integrity | 00:04:48 | |
Authentification | 00:19:25 | |
Digital Signatures | 00:14:59 | |
Digital Certificates and Signatures | 00:16:58 |
Cryptographic Algorithms | 01:31:11 | |
---|---|---|
Capabilities | 00:10:47 | |
Cryptographic Algorithms | 00:14:08 | |
Cryptographic Algorithms 2 | 00:17:42 | |
TEA | 00:22:25 | |
AES | 00:11:48 | |
RSA | 00:14:21 |
Cryptographic Algorithms 2 | 01:31:07 | |
---|---|---|
TEA: Encryption | 00:15:21 | |
Remainder Classes M 15 | 00:15:35 | |
RSA | 00:15:48 | |
AKS Primality Test | 00:12:21 | |
Secure Hashing | 00:16:07 | |
MD-5 | 00:15:55 |
Certificates | 01:27:55 | |
---|---|---|
PKI | 00:15:46 | |
PKI 2 | 00:16:37 | |
Algorithms | 00:14:24 | |
Key Usage Extension | 00:13:37 | |
Transport Layer Security | 00:13:53 | |
Kerberos Example | 00:13:38 |
Time and Security | 01:28:44 | |
---|---|---|
Organisational Things | 00:02:25 | |
Global Time | 00:15:37 | |
UTC | 00:13:43 | |
Task: Server Time Synchronization | 00:15:04 | |
Network Time Protocol (Mills 95) | 00:15:25 | |
Network Time Protocol | 00:16:16 | |
Security | 00:10:14 |
CORBA | 01:22:37 | |
---|---|---|
RMS - Scheduling Example | 00:13:55 | |
Real-time ORB and POA | 00:17:59 | |
CORBA and Threads | 00:12:59 | |
Threadpools and Threadpoollanes | 00:20:14 | |
Leader-Followers Pattern | 00:17:30 |
Security and Real-Time Middleware | 01:28:34 | |
---|---|---|
Kerberos: Tickets | 00:18:19 | |
Application Programming Interfaces | 00:20:03 | |
Real-Time Middleware | 00:11:37 | |
Structure of a real-time system | 00:12:11 | |
Static Scheduling and Schedulability | 00:13:25 | |
Priority Inversion | 00:12:59 |
RT-Middleware and P2P Systems | 01:29:58 | |
---|---|---|
RT-CORBA v2.0 Dynamic Scheduling | 00:08:59 | |
Real-Time Specification for Java | 00:15:07 | |
Time -Triggered Message-Triggered Object | 00:07:29 | |
Peer-to-Peer Systems | 00:13:18 | |
Routing Overlays | 00:20:02 | |
BitTorrent Protocol | 00:13:20 | |
BitTorrent Peer Protocol | 00:11:43 |
Middleware Fault Tolerance | 01:23:34 | |
---|---|---|
Availability | 00:11:31 | |
Examples | 00:14:09 | |
Server vs. Client | 00:17:57 | |
Distributed Transactions | 00:20:05 | |
Failures | 00:19:52 |
P2P Systems and Fault Tolerance | 01:26:22 | |
---|---|---|
Structured P2P Overlay | 00:14:58 | |
Pastry | 00:14:49 | |
Routing Algorithm in Pastry | 00:07:51 | |
Fault Tolerance | 00:13:10 | |
Fault Types | 00:11:00 | |
Dependability | 00:14:17 | |
Error Recovery | 00:10:17 |
Introduction and System Models | 01:32:08 | |
---|---|---|
Start | 00:18:58 | |
Distributed Systems | 00:31:51 | |
Taxonomy | 00:46:56 | |
Our View of Distributed Systems | 01:00:10 | |
Topics not discussed | 01:13:31 | |
Client - Server Model | 01:32:08 |