search for books and compare prices
Tables of Contents for Networked Applications
Chapter/Section Title
Page #
Page Count
Preface
xv
 
Chapter 1 Introduction
1
12
1.1 A Historical Perspective
2
5
1.1.1 Technology View
3
1
1.1.2 User and Organization View
3
3
1.1.3 Unrelenting Change
6
1
1.2 Computing in the Future
7
2
Electrification: Lessons from an Earlier Technological Advance
8
1
1.3 Bits: The Atoms of the Information Economy
9
1
1.4 Road Map to the Book
10
2
Any Information Can Be Represented by Bits
10
2
Further Reading
12
1
Chapter 2 The Applications
13
62
2.1 Users, Organizations, and Applications
13
3
2.1.1 Before Networking
14
1
2.1.2 After Networking
15
1
2.2 Application Building Blocks
16
3
2.3 Social Applications
19
19
2.3.1 Characteristics of User Groups
19
3
2.3.2 Styles of Social Applications
22
5
2.3.3 Remote Conferencing with Shared Workspace
27
1
2.3.4 Groupware
28
1
Collaborative Authoring
28
4
2.3.5 Discussion Forums
32
1
Calendar and Scheduling
32
2
Newsgroups
34
1
2.3.6 Cyberspace Applications
35
2
World Wide Web
37
1
2.3.7 Back to the Big Picture
38
1
2.4 Information Management
38
13
2.4.1 Finding Useful Information
40
7
2.4.2 Autonomous Information Sources
47
4
2.5 Education and Training
51
1
Role of Push and Pull in Work Groups
51
1
2.6 Business Applications
52
18
2.6.1 Departmental Applications
53
3
2.6.2 Enterprise Applications
56
4
SAP: Largest ERP Vendor
60
2
Data Warehouses and Data Mining
62
2
2.6.3 Cross-Enterprise Applications: Electronic Commerce
64
2
Legacy Applications and the Year 2000 Problem
66
2
Dell Computer and Mass Customization
68
1
2.6.4 Consumer Applications
69
1
2.7 Similarity of Social Systems and Networked Computing
70
1
amazon.com: On-Line Merchant
70
1
2.8 Open Issues
71
2
2.8.1 The Productivity Quandary
71
1
2.8.2 How Are New Business Applications Invented and Developed?
72
1
2.8.3 The Glut of Information and Communications
72
1
2.8.4 Accommodating Change
73
1
Further Reading
73
2
Chapter 3 Computers, Networks, and Organizations
75
38
3.1 Computing Systems
77
13
3.1.1 The System Architecture
78
1
3.1.2 Decomposition of Systems
79
2
3.1.3 Hosts and the Network
81
9
3.2 Client/Server Computing
90
9
3.2.1 Two-Tier Client/Server
90
2
3.2.2 Three-Tier Client/Server
92
4
3.2.3 Thin and Ultrathin Clients
96
1
3.2.4 The Future of Client/Server
97
1
Data Warehouses and OLAP
97
1
An Ultrathin Client: The Network Computer (NC)
98
1
3.3 Internet, Intranet, Extranet
99
4
3.3.1 Intranets
99
1
3.3.2 Extranets
100
3
3.3.3 Internet Applications
103
1
3.4 Networked Computing and the Organization
103
8
3.4.1 Rationale for Networked Computing
104
2
3.4.2 The Application Life Cycle
106
5
3.5 Open Issue: What Lies beyond Client/Server Computing?
111
1
Further Reading
111
2
Chapter 4 Software Architecture and Standardization
113
26
4.1 What Makes a Good Architecture
113
10
4.1.1 Decomposition and Modularity
114
3
4.1.2 Granularity and Hierarchy
117
1
4.1.3 Interfaces: The Module's Face to the World
118
1
4.1.4 Abstraction
119
1
Example of Abstraction: The Flora
120
1
4.1.5 Encapsulation
121
1
4.1.6 Modularity and Interfaces in Computing
121
2
4.2 Architecture of the Software Infrastructure
123
9
4.2.1 Goals of the Infrastructure
123
1
4.2.2 Layering
124
4
A Layered View of the Life and Social Sciences
128
4
4.3 Standardization
132
5
4.3.1 Reference Models and Interfaces
134
1
Standardization within Applications
134
1
4.3.2 Organization of the Standardization Process
135
1
International Organization for Standards (ISO)
135
1
4.3.3 Control and Enforcement of Standards
136
1
Internet Engineering Task Force (IETF)
136
1
Further Reading
137
2
Object Management Group
137
2
Chapter 5 Industry and Government
139
38
5.1 Participants, Products, and Services
139
5
5.1.1 Types of Suppliers
140
1
5.1.2 Types of Consumers
140
2
5.1.3 Types of Information Goods
142
1
5.1.4 Types of Software Goods
142
2
5.1.5 Equipment: The Component Model
144
1
5.2 Changes in Industry Structure
144
6
5.2.1 From Stovepipe to Layering
144
1
5.2.2 Less Vertical Integration and More Diversification
145
1
Dell as a Subsystem Integrator
145
2
Information Appliances
147
1
5.2.3 Venture Capital and Start-up Companies
148
1
5.2.4 Computing/Communications Convergence
149
1
5.3 Obstacles to Change
150
7
5.3.1 The Network Effect
150
4
5.3.2 Lock-In
154
1
The Success of the Web
154
1
The Value of Consumer Lock-In to a Supplier
155
1
5.3.3 Path-Dependent Effects
156
1
Microsoft vs. Everybody Else
156
1
5.4 Challenges for Suppliers
157
8
5.4.1 Properties of Information
157
2
5.4.2 How Software Differs from Information
159
1
5.4.3 Protecting Investments with Intellectual Property
160
1
5.4.4 Selling Content and Software
160
2
Are Shrink-Wrapped Applications Poor Quality and Overfeatured?
162
3
5.5 Government Roles
165
8
5.5.1 Protecting Intellectual Property
165
3
Intellectual Property as a Strategic Tool
168
1
5.5.2 Government Policies and Laws
169
1
Patents and Standardization
170
3
5.6 Open Issues
173
3
5.6.1 How Is the Industry Organized?
173
1
5.6.2 Sovereignty and the Global Internet
174
1
5.6.3 The Language of the Internet
175
1
5.6.4 Archiving Digital Information
175
1
5.6.5 A New Partnership
175
1
Further Reading
176
1
Chapter 6 Application Software
177
38
6.1 Some Overriding Issues
177
12
6.1.1 Software Complexity
178
1
6.1.2 Acquiring an Application
179
2
6.1.3 Development Methodology: Decomposition vs. Assembly
181
4
6.1.4 Software Reuse
185
1
Component Standards
185
2
6.1.5 Location of Data and Computation
187
2
6.2 Tightly Coupled Data and Processing
189
16
6.2.1 Object-Oriented Programming
190
1
Modeling and Representation
191
7
6.2.2 Software Components and Frameworks
198
2
Components, Frameworks, and the Industrial Revolution
200
5
6.3 Loosely Coupled Data and Processing
205
8
6.3.1 Database Management
207
1
Extending Databases to Objects: ORDBMS and ODBMS
208
3
6.3.2 Document Management: XML
211
1
eXtensible Markup Language (XML)
212
1
Further Reading
213
2
Chapter 7 Communications Support for Applications
215
24
7.1 Algorithms, Protocols, and Policies
216
3
7.2 Abstract Communication Services
219
14
7.2.1 Message Service
220
1
The Hypertext Transfer Protocol (HTTP)
220
2
Is a Message Delivered for Sure?
222
2
7.2.2 Message with Reply Service
224
2
7.2.3 Timing and Concurrency
226
1
7.2.4 The Session
227
5
7.2.5 The Broadcast
232
1
7.3 Internet Communication Services
233
4
7.3.1 Internet Protocol (IP)
234
1
7.3.2 User Datagram Protocol (UDP)
234
1
7.3.3 Transmission Control Protocol (TCP)
235
1
RMI Is Layered on Messages
235
1
7.3.4 Internet Inter-ORB Protocol (IIOP)
236
1
7.3.5 Multimedia Sessions
236
1
Internet Streaming Multimedia Protocols
236
1
Further Reading
237
2
Chapter 8 Trustworthiness: Reliability and Security
239
34
8.1 Facets of Trustworthiness
239
10
8.1.1 Program and System Correctness
239
3
Diversity, Reliability, and Security
242
1
8.1.2 Security: Countering External Threats
243
1
Uses of Data Replication
244
1
Availability, Security, and the Market
245
3
Computer Viruses
248
1
8.2 Computer and Network Security Measures
249
16
8.2.1 Encryption Ensures Confidentiality
249
7
8.2.2 Authentication
256
3
Certificates and a National Identity Card
259
1
8.2.3 Message Integrity and Nonrepudiation
260
2
8.2.4 Combining Techniques
262
1
8.2.5 Security Policies
263
1
Legal Sanctions
264
1
8.3 Electronic Payments
265
4
8.3.1 On-Line Credit Card Systems
267
1
Questions about Digital Cash
268
1
8.4 Open Issues
269
3
Privacy and Anonymous Digital Cash
269
1
8.4.1 How Do We Deal with Increasing Vulnerability?
270
1
8.4.2 National Security and Law Enforcement Needs
270
1
8.4.3 Individual Privacy
271
1
8.4.4 Theft and Piracy of Software and Information
272
1
Further Reading
272
1
Chapter 9 Middleware
273
22
9.1 Message-Oriented Middleware as an Aid to Workflow
275
1
9.2 Transaction Processing
276
6
9.2.1 Example of the Challenges: Travel Reservations
276
2
9.2.2 What Is a Transaction?
278
1
9.2.3 Transaction Processing Architecture
279
1
The ACID Properties of Transactions
279
2
Open Transaction Processing Standards
281
1
9.3 Mobile Code and Mobile Agents
282
5
9.3.1 Interactivity and Scalability
282
1
Mobile Code, Agents, and Objects
283
1
9.3.2 Interoperability
284
1
Mobile Code and Network Effects
284
1
9.3.3 Mobile Agents
285
1
9.3.4 Mobile Code and Agent Middleware
285
1
Java and Information Appliances
286
1
9.4 Distributed Object Management
287
5
Java as a De Facto Standard
287
2
9.4.1 One DOM Standard: CORBA
289
1
Java and Security
289
2
9.4.2 Services Offered by DOM
291
1
Competing Distributed Object Visions: DCOM and CORBA
291
1
9.4.3 Interoperability among ORBs: IIOP
292
1
9.5 Open Issue: Are Middleware Service Providers Needed?
292
1
The OMG Process
292
1
Further Reading
293
2
Portability vs. Interoperability
293
2
Chapter 10 Performance and Quality
295
22
10.1 Performance and Quality Metrics
295
4
10.1.1 Performance
296
2
10.1.2 Quality
298
1
10.1.3 Factors in Performance and Quality
299
1
10.2 The Role of Concurrency
299
7
10.2.1 Concurrency with Multiple Hosts
301
1
10.2.2 Concurrency in a Single Host
302
1
Different Forms of Multitasking
303
1
10.2.3 Resource Conflicts and Transactions
304
1
Why Networks Use Packets
304
2
10.3 Scalability
306
9
Scalability in Production
307
1
10.3.1 Blocking
308
1
10.3.2 Duplicated Work
308
1
10.3.3 Faulty Load Balancing
309
1
10.3.4 Congestion
309
3
10.3.5 The Role of Application Architecture in Scalability
312
2
10.3.6 Mobile Code and Scalability
314
1
Today's Operating Systems
314
1
10.4 Operating Systems
315
1
Operating Systems and Winner-Take-All Effects
315
1
Further Reading
316
1
Chapter 11 Networks
317
24
11.1 Functions of a Network
317
13
11.1.1 Sharing: Statistical Multiplexing
318
1
Origins of the Internet
318
3
11.1.2 Packet Forwarding and Routing
321
2
11.1.3 Name Services
323
1
Simulcast and Multicast
324
1
11.1.4 Flow Control
325
1
11.1.5 Congestion Control
326
1
The Value of a Name
326
4
11.2 Quality of Service (QoS)
330
5
Congestion and Network Externalities
330
1
11.2.1 The Internet Transport Protocols and QoS
331
1
Cost of a Congestion Control Infrastructure
331
1
11.2.2 Integrated Services
332
1
11.2.3 Pricing Network Services
333
1
The Evolution of the Internet
334
1
11.3 Network Security
335
4
11.3.1 Secure and Insecure Authentication
336
1
11.3.2 Security Flaws in Public Servers
336
1
11.3.3 Firewalls and Packet Filtering
336
1
Today's Internet Pricing
336
1
Firewalls Limit Innovation
337
1
11.3.4 Where to Use Encryption and Authentication
338
1
11.4 Open Issues
339
1
11.4.1 The Future of the Internet
339
1
11.4.2 Making Money on the Internet
339
1
Further Reading
340
1
Chapter 12 Communications
341
18
12.1 Communications Service Providers
341
5
12.1.1 Communications Regulation
344
2
12.2 Current Developments in Data Communications
346
6
12.2.1 Broadband Network Access for Residences
346
2
12.2.2 Nomadic and Untethered Internet Access
348
1
Internet Roaming
348
2
12.2.3 IP Telephony
350
1
Wireless Access Protocol (WAP)
350
2
12.2.4 Integrated IP Networks
352
1
12.3 Impact of a Communication Link
352
6
12.3.1 Impact on Message Latency
354
1
Fiber Optics and Optical Networking
354
1
12.3.2 Mitigating Communications Bottlenecks
355
2
Caching and Copyright Law
357
1
12.4 Open Issues
358
1
12.4.1 Is Communications Regulation Needed?
358
1
12.4.2 Regulation of the Internet
358
1
Further Reading
358
1
JPEG and MPEG
358
1
Glossary
359
16
References
375
8
Index
383