Fact-checked by Grok 2 weeks ago
References
-
[1]
[PDF] A Survey of Distributed File SystemsThis property, called network transparency, implies that any operation that can be performed on a local file may also be performed on a remote file. The extent ...
-
[2]
[PDF] From Coulouris, Dollimore, Kindberg and Blair - Distributed Systems... Distributed Systems: Concepts and Design Edn. 5. © Pearson Education ... Network transparency: access transparency + location transparency (most important).
-
[3]
Network Transparency Definition - The Linux Information ProjectDec 23, 2005 · Network transparency is the situation in which an operating system or other service allows a user to access a resource (such as an application ...Missing: science | Show results with:science
-
[4]
[PDF] Transparency in Distributed Systems - CSE SERVICESTransparency in distributed systems means users should not worry about the system's details, making the aspects of distribution invisible, and the system ...
-
[5]
TransparenciesA transparency is provided by including some set of mechanisms in the distributed system at a layer below the interface where the transparency is required.
-
[6]
[PDF] Distributed Systems: Concepts and Design - FenixDesigning Distributed Systems: Devoted to a major new case study on the Google infrastructure. Topics added to other chapters: Cloud computing, network ...
-
[7]
[PDF] Transparency in Distributed File Systems - DTICnetwork transparency. This includes, as described in section 2.2.6, access ... R., "Identifiers (Naming) in Distributed Systems." in Distributed ...
- [8]
-
[9]
X.903 : Information technology - Open Distributed Processing - Reference model: Architecture### Extracted Definitions from ITU-T X.903
-
[10]
Failure transparency - Semantic ScholarIn a distributed system, failure transparency refers to the extent to which errors and subsequent recoveries of hosts and services within the system.Missing: seminal | Show results with:seminal
- [11]
-
[12]
[PDF] Dynamo: Amazon's Highly Available Key-value StoreDynamo provides eventual consistency, which allows for updates to be propagated to all replicas asynchronously. A put() call may return to its caller before ...
-
[13]
[PDF] A brief introduction to distributed systems - Computer ScienceJun 8, 2016 · This so-called distribution transparency is an important design goal of distributed systems. In a sense, it is akin to the approach taken in ...
-
[14]
History of Distributed Computing Projects - CS StanfordThe first distributed computing programs were a pair of programs called Creeper and Reaper which made their way through the nodes of the ARPANET in the 1970s, ...
-
[15]
A Brief History of the Internet & Related NetworksThe objective was to develop communication protocols which would allow networked computers to communicate transparently across multiple, linked packet networks.
-
[16]
A Universal Modular ACTOR Formalism for Artificial IntelligenceA modular ACTOR architecture and definitional method for artificial intelligence that is conceptually based on a single kind of object: actors, ...
-
[17]
Experiences with the Amoeba distributed operating systemThe chief goal of this work is to build a distributed system that is transparent to the users. This concept can best be illustrated by contrasting it with a ...
-
[18]
[PDF] The Sun Network Filesystem: Design, Implementation and ExperienceIntroduction. The Sun Network Filesystem (NFS ) provides transparent, remote access to filesystems. Unlike many other remote filesystem implementations ...
-
[19]
[PDF] The Common Object Request Broker: Architecture and SpecificationSunSoft, Inc. The Common ORB Architecture and Specification defines a framework for different ORB implementations to provide common ORB services and interfaces ...
-
[20]
Developer Resources – Amazon Simple Storage Service (S3) – AWSAmazon S3 was launched 15 years ago on Pi Day, March 14, 2006, and created the first generally available AWS service. Over that time, data storage and usage has ...Missing: launch | Show results with:launch
-
[21]
Amazon S3 ReplicationAmazon Simple Storage Service (S3) Replication is an elastic, fully managed, low cost feature that replicates objects between buckets.Overview · When To Use S3 Replication · More Info
-
[22]
The inevitable Kubernetes - 10 years, still a lot to do | CNCFJul 26, 2024 · Kubernetes launched in June 2014 – since then, it has played a huge part in popularizing cloud-native application designs and supporting more microservices ...
-
[23]
KubernetesKubernetes restarts containers that crash, replaces entire Pods where needed, reattaches storage in response to wider failures, and can integrate with node ...Overview · Learn Kubernetes Basics · Kubernetes Documentation · KubernetesMissing: 2014 migration transparency
-
[24]
[PDF] Section F.1.1 Display Management: The X Window System - MITOct 29, 1986 · An application can utilize windows on any display in a network in a device-independent, network-transparent fashion. Interposing a network ...
-
[25]
The X window system | ACM Transactions on GraphicsA hierarchy of resizable, overlapping windows allows a wide variety of application and user interfaces to be built easily. Network-transparent access to the ...
-
[26]
RFC 1013: X Window System Protocol, version 11RFC 1013 defines the X Window System Protocol, version 11, a widely reviewed and tested system, distributed for information only.
-
[27]
ssh(1) - Linux manual page - man7.orgX11 connections, arbitrary TCP ports and Unix-domain sockets can also be forwarded over the secure channel. ssh connects and logs into the specified destination ...
-
[28]
Chapter 12. OpenSSH | Red Hat Enterprise Linux | 7Using a technique called X11 forwarding, the client can forward X11 (X Window System) applications from the server. It provides a way to secure otherwise ...
-
[29]
[PDF] Spanner: Google's Globally-Distributed DatabaseSpanner is Google's scalable, multi-version, globally- distributed, and synchronously-replicated database. It is the first system to distribute data at ...
-
[30]
[PDF] Two-phase commit optimizations and tradeoffs in the commercial ...Section 2 introduces a 2PC protocol that is used as a baseline for comparing the 2PC variations introduced in the rest of the paper. Section 3 presents the ...
-
[31]
[PDF] Real Application Clusters Administration and Deployment GuideIf you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other ...
-
[32]
[PDF] Design and Implementation of the Sun Network FilesystemMar 28, 2000 · Introduction. The Sun Network Filesystem (NFS) provides transparent, remote access to filesystems. Unlike many other remote filesystem ...
-
[33]
What is Network File System (NFS)? - TechTargetApr 14, 2022 · Sun Microsystems published the first implementation of its network file system in March 1984. ... transparent, remote access to file systems ...
-
[34]
IETF RFC 1813 – NFS Version 3 Protocol SpecificationThe Lock Manager provides support for file locking when used in the NFS environment. The Network Lock Manager (NLM) protocol isolates the inherently stateful ...
-
[35]
[PDF] Coda: A Highly Available File System for a Distributed Workstation ...Disconnected operation is transparent to a user unless a cache miss occurs. Return to normal operation is also transparent, unless a conflict is detected. A ...
-
[36]
Disconnected operation in the Coda file system - ACM Digital LibraryDisconnected operation is a mode of operation that enables a client to continue accessing critical data during temporary failures of a shared data repository. ...
-
[37]
[PDF] Ceph: A Scalable, High-Performance Distributed File SystemAbstract. We have developed Ceph, a distributed file system that provides excellent performance, reliability, and scala- bility.Missing: 2007 | Show results with:2007
-
[38]
[PDF] Distributed Systems: Concepts and Design - FenixTransparency is defined as the concealment from the user and the application programmer of the separation of components in a distributed system, so that the ...
- [39]
-
[40]
RFC 4924: Reflections on Internet Transparency... issues. Far from having lessened in relevance, technical implications of intentionally or inadvertently impeding network transparency play a critical role ...Missing: challenges | Show results with:challenges
-
[41]
Outer Header Translator - IETFNetwork address translation technology has a convenient aspect, however, it has the side effect of breaking end-to-end transparency.Missing: impact | Show results with:impact
-
[42]
SP 800-77 Rev. 1, Guide to IPsec VPNs | CSRCJun 30, 2020 · This publication provides practical guidance to organizations on implementing security services based on IPsec so that they can mitigate the risks.
-
[43]
[PDF] IPsec NAT Transparency - CiscoThe IPsec NAT Transparency feature introduces support for IP Security (IPsec) traffic to travel through Network Address Translation (NAT) or Port Address ...
-
[44]
RFC 2775: Internet TransparencyFor example, network address translation is an artefact, but Intranets are not. Thus the way forward must recognise the fundamental changes in the usage of ...
-
[45]
What Is a Stateful Packet Inspection Firewall? - Check Point SoftwareSPI firewalls should have the resources required to analyze and secure corporate network traffic at scale while minimizing latency and performance impacts.
-
[46]
Stateful vs. Stateless Inspection: Use Cases and LimitationsUltra-High-Speed Networks: In environments where processing speed is critical, the added latency from stateful inspection might be a concern.
-
[47]
[PDF] Consistency-Based Service Level Agreements for Cloud StorageMany provide a relaxed form of consistency, eventual consistency, in order to achieve elastic scalability and good performance while some strive for strong.
-
[48]
[PDF] Perspectives on the CAP Theorem - ResearchIn this paper, we review the CAP Theorem and situate it within the broader context of distributed computing theory. We then discuss the practical implications ...
-
[49]
[PDF] Modular fault tolerance in a network-transparent languagePartial failure clearly breaks network transparency because it cannot be hidden in general (given our fault model, this is a consequence of the CAP theorem [3]) ...
-
[50]
[PDF] Toward Global Latency TransparencyWe show that path-aware networks solve current network problems but also highlight novel challenges encountered in such networks and how to overcome them.Missing: limitations | Show results with:limitations
-
[51]
Challenges in Integration of Heterogeneous Internet of ThingsDue to the heterogeneity of IoT, devices on the market nowadays have diversity in communication protocols, methods of network connectivity, and resulting models ...
-
[52]
AI-Enabled 6G Networks and Applications | Wiley... AI algorithms for 6G networks, with focus on network transparency, interpretability and simulatability for vehicular networks, space systems, surveillance ...