Data Master make much share with mass data, task automation that transmission, storage, management and retrieval are relevant and obtain simplification.Data can be radiographic image, business data, digital voice data, digital of digital video data and a lot of multidata more, are not limited to these forms.This system can utilize all types of datamations.This system realizes this point in the following way:
Thin client, it resides on terminal user's PC, kneetop computer or the mobile device;
User's group: middleware server and database;
Group of server: terminal server and database;
Automatic serving device data backup filing system;
Automatic serving device and database are removed;
The automatic data management (ADM) system;
Automated Data Retrieval System;
UserView (user side) system management;
ServerView (server end) system management.
Many covers or multilayer middleware server can be arranged, but have only a locking terminal server and a database.Terminal server and database are the destinations of all data.The management system based on web by UserView by name and ServerView realizes system management.UserView is a critical piece, and by much constituting than widgets and sharing some assemblies that other critical pieces use, it is managed and configure user group server and database component.ServerView is similar to UserView; But, its management and configuration is group of server server and database.
Usage
DataMaster can be used for from small-sized to medium-sized all enterprises to global large enterprises.It is easy to convergent-divergent and management; The most important thing is that it can utilize the datamation of all kinds.This system is a plug and play system, need not to worry current network system architecture and current safety and network system are made an amendment, and enterprise can easily dispose this system.
The another kind of data storage that is used for meeting includes, but are not limited to notes, the talk of record, meeting video, follow-up report, the E-mail communication of everyone record.By Data Master, only click just can be managed several times, share, transmits and retrieve all these.The meeting of holding in Hong Kong can be stored in Britain at an easy rate, and is retrieved by U.S. somewhere.Can also put teeth in the multilayer access rights.
By the DVD of the Internet and next online transaction of big data transfer components that music is sold directly to households or lease also can be used Data Master.These are different with traditional online shopping; The DVD and the postal delivery of encapsulation need direct marketing and lease.The DVD file is very big, can't pass through Internet transmission.Utilize the N^N Data Master system that strengthens, can pass through Internet transmission DVD.The online DVD leasing company of Netflix type can cut down huge rate usefulness, has eliminated the damage that may cause DVD.Can use the data detection of hereinafter mentioning to send to duplicate disabling component and implement these rules with data.Whole processes at direct marketing DVD on the Internet can implemented on the Internet.To cross over the Internet by DataMaster and send data.This has eliminated mailing, DVD, manufacturing cost, printing material etc.In addition, to duplicate the disabling component version slightly different with data because data detection sends, and therefore only data can be fired once or once also not allow on DVD.Same situation is applicable to that also music is sold directly to households and lease.
Large-scale global financial institution has thousands of branch officeses all over the world.In order to safeguard efficiently and fully soon and shared data that in worldwide their existing systems are out-of-date.DataMaster can efficiently safeguard and shared data in the world in real time.The subclass of Data Master can be installed in each local branch offices, and it is made of thin client and middleware server and database.Can another layer middleware server and database be installed regional level (for example each state, as California and Arizona).Can dispose another layer middleware server and database in major region level (for example West Coast) more.Each layer middleware server all serving as the exchanges data point.Can this mode be continued, up to the N-1 layer always.Last one deck is the N layer, just terminal server and database.This layer is made of all data.
Except exchanges data, also back up efficiently and managing mass data.Data Master prevents the peculiar methods of loss of data in addition.Many grade backups drop to floor level with the chance of loss of data.Can also realize the N+1 layer by increasing extra backup layer to the terminal server layer.Can also realize N+2, N+3.....N+N layer subclass as N^N Data Master system.Therefore the N+1/n layer is represented whole data are assigned in N the chunk (chunk), and allows Backup Data on N server and database.Need not to be subjected to geographic restrictions via N^N Data Master system and can realize all these.A accident if branch offices meets accident, the middleware layer of direct neighbor can restore the data of losing.For example, the N-4 layer can restore the data on the N-3 layer, and N+i or N+1/N or 1 to N-1 layer can restore the data on the N layer.
This system allows the user via environment storage and managing mass data based on web Services XML assembly.This application is very flexible, and is fit to any server and network environment easily.It can utilize all types of network platform work.Dispose and saved the time easily and eliminated internal network and application conflicts.
This system is made of numerous different assemblies.Each assembly can independent operating or is worked together to form critical piece.The critical piece of picture UserView, Serverview, middleware server assembly and terminal server assembly is shared some identical system components.Basic module is called as system component, and they will increase, to generate new critical piece.
The example how system works
With the financial institution is example; The statistician group at rear is implementing the financial modeling project based on the data of this California branch office of mechanism.
In the past, the statistician must will wait for that data center sends data to them.All data at first must be gathered from branch office by data center.When the statistician can use data, data may have some months outmoded.If you are statisticians of the sector, you will can hear " still waiting pending data " the words always.If DataMaster is arranged, this situation has not just been had again.
If DataMaster has been installed, so in branch office, every employee just uses Data Master to back up and the transmission data to data center from his/her this diji.The statistician can by the sky, monthly or the self-defining time period retrieve the copying data of whole California branch office.Can retrieve and use real time data immediately via DataMaster.
DataMaster can:
1. utilize up-to-date and accurate data to improve the accuracy of financial modeling.
2. reduce statistician's stand-by period; Make the throughput rate maximization of group.Statistics expert group can make quick response to the demand of mechanism.
3. this mechanism can tackle market rapidly and accurately make a policy.
4. statistician there and sender eliminate the cost of magnetic tape station or hardware there again.
5. save in data center's one side data acquisition to together and place the time used on tape, CD or the DVD.
6. save the time of retrieval of statistician's one side or loading data.
7. if transportation data is saved trucking costs.
8. know in the electronics mode and retrieve and store data, rather than transport by carrier.
Technical progress and advantage
1. safe and reliable
2. flexible and scalable
3. true-time operation
4. to data volume/form without limits
5. guarantee the quality of data and integrality
6. be easy to use and manage
7. minimizing hardware costs
Safety and reliable
1. data can be divided into the N piece, stride a plurality of servers and/or database storing then.Invade this system and will only can retrieve one or some blocks of data, do not have constructive method, the piece number is limited, data can not be put together.
2. can on all levels, encrypt during the data transmission.During data transmission, can utilize different encryption keys that above-mentioned every blocks of data is encrypted.
Above above piecemeal and storage means, essential will the encryption every blocks of data by different way, the hacker just can't retrieve any significant data like this.
3.Data Master prevents the peculiar methods of loss of data in addition.Many grade backups drop to floor level with the chance of loss of data.Can be on a plurality of servers Backup Data.Can also realize the N+1 layer by increasing extra backup layer to the terminal server layer.Can also realize N+2, N+3.....N+N layer subclass as N^N Data Master system.Therefore the N+1/n layer is represented whole data are assigned in N the chunk, and allows Backup Data on N server and database.Need not to be subjected to geographic restrictions via N^N Data Master system and can realize all these.A accident if branch offices meets accident, the middleware layer of direct neighbor can be recovered the data of losing again.For example, the N-4 layer can recover the data on the N-3 layer, and N+1 or N+1/N or 1 to N-1 layer can recover the data on the N layer.
4. carry out reliable transmission through the Internet.Data Master has thin client and uses SOAP and Web service communicates and data access and transmission.It uses direct http/https two-way communication and real-time processing data transmission.
5. this system can be used for all types of safety approachs, for example SSL and VPN.Any existing internal data safety approach can be used with Data Master.
6. unwanted database will be eliminated based on predefined condition by this system; This condition only can be changed by the power user.Only can eliminate data by user with privilege.
7. the MSMQ technology based on transaction also implemented is with the data integrity of guaranteeing banking and the transaction security of other types.
Flexible and scalable
This system allows the user via environment storage and managing mass data based on web Services XML assembly.This application is very flexible, and is fit to client's current server and network environment easily.It can utilize the work of client's existing network platform.Dispose and saved the time easily and reduced internal network and application conflicts.
This system is made of numerous different assemblies.Each assembly can independent operating or is worked together to form critical piece.The critical piece of picture UserView, Serverview, middleware server assembly and terminal server assembly is shared some identical system components.Basic module is called as system component, and they are bases of critical piece.This is applied as real SOA.
1.Data the assembly among the Master is to utilize such as the state-of-the-art technology of Web Services, SOAP and XML to develop.We make the dirigibility of this system reach highest level based on framework, design and the realization of N^N layered component.
2. this system allows big data storage.Can come convergent-divergent storage space easily by increasing extra disk space, hardware even magnetic tape station storage system.
3. assembly is arranged along operation.Each assembly may operate on the different machine at different locations.There is not the restriction of geographical aspect.Allow the sharing of hardware, repeated use and optimum performance.
4. scalable and flexible.N^N layered component Web business structure allows user's panntographic system easily.The deployment of user's group is disposed the same simple with user's group and group of server.In addition, can carry out multilayer based on the scale of unit and dispose, and can reduce based on the demand of unit or the deployment of expansion multilayer.Referring to N^N layering deployment diagram.
5. locomotive function has been enabled by this system.Allow mobile device to be connected to server, share and Backup Data by http/https the thin client on subscriber set.
6. this system can be used for all types of safety approachs, for example SSL and VPN.
Any existing internal data safety approach can be used with Data Master.
True-time operation
Large-scale global financial institution has thousands of branch officeses all over the world.In order to safeguard efficiently and fully soon and shared data that in worldwide their existing systems are out-of-date.Data Master can efficiently safeguard and shared data in the world in real time.The subclass of Data Master can be installed in each local branch offices, and it is made of thin client and middleware server and database.Can another layer middleware server and database be installed regional level (for example each state, as California and Arizona).Can dispose another layer middleware server and database in major region level (for example West Coast) more.Each layer middleware server all serving as the exchanges data point.Can this mode be continued, up to the N-1 layer always.Last one deck is the N layer, just terminal server and database.This layer is made of all data.
To data volume/form without limits
1.Data Master can be used for all industries.
2. this system can utilize the datamation of any kind.To the data of what type without limits.
3.Data Master allows the transmission large data sets.Can easily large data sets be transferred to server and retrieve by simple drag-and-drop operation by client site.Current, measure big data and be difficult to transmission or send, so company uses ftp or data are placed on tape, DVD or the CD, then it is sent by post far or branch offices.The take over party must want loading data, this very consuming time and inefficiency.Utilize Data Master, can transmit in real time, storage, management and retrieval large data sets.It is more safe and reliable than current ftp.Reduced at branch offices reads or management data is required big cost hardware or magnetic tape station.In addition, delivery overnight or other postal delivery running costs have also been reduced.
Guarantee the quality of data and integrality
1.Data Master accepts all types of data.It is a kind of true lossless storage application.
2. guarantee the integrality and the backup of data.Database is a real-time update, can backrush, and during file transfer, there is different schemes to come the block data visit or upgrade, and keeps transmission to keep data integrity.
3. also implemented data integrity and the transaction security type of MSMQ technology to guarantee banking based on transaction.
4. nomenclature scheme has solved real-time conflict of the same name.
5. implement Priority Queues to keep data integrity and to judge that those data have highest priority until lowest priority.
Be easy to use and manage
1. share.Allow by the Internet shared data, the different user in perhaps can being organized by same user is the retrieval network filing data easily, can be by the different user real-time retrieval to many parts of copies.
2. dispose easily.Data Master is applicable to current existing network and security architecture.It is the external annex of current environment, does not need current network is done any change.Can thin client easily be installed by web.
3. manageable.Can be by based on the ServerView of web and UserView server admin instrument and remote service and scheduling tool management server easily.
4. locomotive function has been enabled by this system.Allow mobile device to be connected to server, share and Backup Data by http/https the thin client on subscriber set.
5. use easily.If you need storage, transmission and retrieve data, only need to carry out single operation, for example click and drag and drop.
6. find data easily, terminal client can check and search metadata that thin client resides on terminal user's the machine, for example on PC, kneetop computer and the mobile device by thin client.The user can use them that the limited understanding utilization of data is clicked search and retrieve data.
7. management automatically.When data entered system, system can or extract in the metadata arrangement information associated with the data rather than True Data collection.This system uses and compiling of metadata manages True Data then.In case data are dragged and dropped in the thin client, and the meta-data extraction assembly will extract the metadata of True Data and carry out data management and retrieval with it.User or keeper do not need to come by hand management data.
8. automatic data backup.In case the user is dragged and dropped into Backup Data in the thin client, user's work has just been finished.To automatically data be backuped to down one deck user based on predetermined set by system and organize server and database or group of server server and database, this setting is provided with by the keeper.
9. automatic serving device and database are removed.System will be according to the predefined stale data of eliminating on the different layers storer that is provided with, and this setting is provided with by the keeper.
10. Automated Data Retrieval System.The single click will make system find data and retrieve data by copying data is beamed back this diji.Not needing the people loads tape, searches True Data and then it is beamed back the user.
Reduce hardware costs
1. utilize Data Master, backup and storage is True Data but not the backup of DISK to Image driver during the backup of the company data of routine.Do like this and will eliminate the demand of server one end Internet resources and big storage space.
2. can use server or of equal value and conventional machine based on low-cost PC.This has reduced hardware costs.
3. hardware is reused.Can reuse indivedual or a plurality of Data Master assemblies that old hardware device moves diverse location.For example, to may operate in RAM be that 512MB, hardware space are on the Pentium II or equivalent device of 6G to the journal file assembly.Can also be used for DB Backup by the machine that some are old.Reuse hardware and can reduce the hardware spending of enterprise.
Other assemblies
Data Master has other inventions that much are associated with this system.
Cache module, it has used some existing system assemblies.Design is to allow shared data between one group of contiguous colleague.Co-workers group often will be used the similar data collection, is identical data sometimes.With no matter when need data all from next-door neighbour's middleware server different with the database retrieval data be, can be from having the adjacent machines retrieve data of copying data.This will significantly reduce network traffics and server bottleneck.For realizing this purpose, need place the pocket server of high-speed cache in the position of thin client.
Segmentation module makes system data can be divided into N fritter, and when bandwidth constraints is arranged data transmission is arrived client or server.The recipient can be reassembled into data its original form.
Encrypting module is used in the password protection district among the Data Master at present, also can work and it is expanded to another level with segmentation.It can be encrypted the data of transmitting in our exclusive mode.It can also rearrange each section by different order, and allows they to be re-assemblied at recipient's one end based on the demoder and the order of definition.
The background synchronization module can be carried out synchronously utilizing traditional backup scenario backed up data, and the current data of needs backups or hard disk drive and previous DISK to Image driver backed up data are carried out synchronously.Carry out simultaneously with backup synchronously, rather than at first backup is synchronous then.Necessary data that this module does not only have on the transmission server or the data of upgrading version.This module can be saved taking of huge disk space on the server and bandwidth.
The backstage add-on module is the expansion of background synchronization module.It carries out the data that are used for traditional backup scenario and DataMaster standby system synchronously.If do not back up some data in Data Master, this system will search these data and determine what this does so.The backstage add-on module will all be created the link of leading to the data physical location in the N^N storage system on user's machine and conventional store disk.If these data are judged as Data Master Backup Data, will send email need to determine whether Backup Data to the person in charge.
Data detection sends assembly and will be structured on the current system component.The time period that its data that allow to retrieve are survived on retrieval person's hard disk drive and set.In case surpass this time period, data can autocide.
Data are duplicated disabling component also will use a lot of current system components.It does not allow to carry out data and duplicates.The combination that this technology is based on encryption, digital ID and public/private key scheme realizes.In order to open data, demoder, suitable key and correct digital ID will be needed.Different machines or different environment will have different demoders, key and digital ID.It can keep the integrality of data, eliminates data and duplicates and revise.
Data detection can be sent and duplicate disabling component with data and be widely used for a lot of industries, especially credit inquiry institute and large-scale financing corporation.Per minute is all in the transmission of carrying out large data sets.Complete tape, DVD or CD are issued by the mode of payment overnight.Some be for project based on the basis of debt-credit, yet under most of situation, after debt-credit expiration, data will keep unknown period at this place.Under many circumstances, transmission be misdata, need on tape, DVD or CD, regenerate new data set and subsequently it is delivered to this place.Expense is very high.On the contrary, if by Data Master storage or management data, can utilize simple several times this task of accurately cost efficiency is arranged finishing of clicking so.In addition, remote site can be saved thousands of dollars that spend on the expensive tape that is used to read data on the tape and the magnetic tape station.Sometimes can change hands some big data sets in order to gain.Utilize data detection to send and duplicate disabling component, with data management with control to best practice with data.
Automated back-up, data transmission and removing.Automaticdata transmission is based on that being provided with of defining among the UserVi ew carry out.In case finish transmission, will descend Backup Data on one deck middleware server and database or group of server server and the database.In case backed up data safely, will on sender's server and database, remove automatically.If arrived the term of validity of data, will clear data, otherwise data may continue to be deposited on server and the database.Finish after the everything feelings, will show and confirm report.
Can change the data dictionary assembly a little, DataMaster is applied to all industries.It can be used for the data of any kind and be suitable for the deployment of any kind.
Version
In order to be easy to adopt, same application has six different editions.It is identical that central principle keeps, but regulate demand, budget and environment to adapt to different clients by different way.
1) not at the scene, allow the server farm of client by being connected to us via storing and manage the radiography image based on the security context of web.At small-to-medium business or there is not internal technology expert's company that this is regulated.
2) scene allows the client to buy whole Data Master, in the operation of client's place.The client will trust all data securities.This provides comfortable environment more for the height confidential data.We will adjust demand and the current environment of Data Master to adapt to the client.We also will provide support and customize for produced on-site.
3) mix the place, allow the client to use our place to come management data, but True Data is stored on their central server.System only comprises the information of metadata or relevant these data by certain mode, and True Data still is positioned at client's place.The client will trust all data securities.This provides comfortable environment more for the height confidential data.We will provide data base administration and other versions with same user interface.On client's place, store data by the XML mapping framework.
4) OEM allows technology company to utilize available Data Master assembly or interface to carry out the OEM of product.Core component will remain unchanged, but user interface meeting change, with product or the system that is applicable to the OEM affiliate.
5) accessing wirelessly can allow the client through wireless device management data or related data.Allow the keeper to manage bill, report, emails and other utility routines via wireless device.
6) single copy uses for the individual.Visit by virtual drive.A one-step process.Access rights do not need extra login process, because will be judged based on the windows the user name and password by system.Can be via Windows Directory UI management data.
Dispose
Total system can run on the server and client on the machine, also can be deployed to N user on the N platform machine by variety of way and organize database, a N user and organize on server, a N group of server database, a N group of server server and N the client.
Pocket configuration is to move 5 layers on two machines with N client in all places, 2 servers and 2 database servers.
No matter company or organize current physical location where and branch offices where, their current network architecture, hardware resource and technical specialist and technician's position is how, can easily dispose Data Master.Yet we need know above all factors, so that dispose and install correct assembly in correct place.In case we have known the fact, we just can determine go which platform machine where those operations and assembly to be installed.We can according to layer, according to assembly or according to assembly and the layer combination it is set.We can allow server and database server only handle login process, allow central Journaling File System handle journal file, and utilize a plurality of layers that it is carried out convergent-divergent; Perhaps we can be on its oneself layer every layer of operation.Every kind of situation all is unique but similar.
The Technical Architecture general introduction
The pocket version that has shown Data Master on following one page.The basic framework synoptic chart shows this system and how comprises what critical piece in communication and every layer between all component.It has schematically illustrated high-level framework what has looked like.(referring to the basic framework general survey of Fig. 1.)
There is shown Data Master integral body in the N^N deployment.(dispose referring to Fig. 2 N^N.)
Also Data Master can be divided into user's group and group of server, to provide clearer and more definite illustration.(referring to Fig. 3, single N layering user organizes definition to please refer to user's group.) and the server picture group show (referring to Fig. 4, single N hierarchical service device group definition).
N layering user organizes high-grade design and (organizes definition referring to the single N layering of Fig. 3 user.)
This system self comprises following critical piece:
The ClientView interface; User's group, middleware storer, semipermanent memory; The user organizes server (middleware server); Data access layer; Database server; ClientView is to the Https/http communication of middleware server; Middleware server is to the Https/http communication of middleware server; User's group system assembly; The ClientView inquiry proxy; UserView web administration system; The data transmission reporting interface; The system optimization module; User's group scheduling automated back-up and data transmission; The user organizes automatic removing; Daily record and activation record database; The log interface layer
The high-grade design of N hierarchical service device group (defines referring to the single N hierarchical service of Fig. 4 device group.)
This system self comprises following critical piece:
Group of server server (terminal server); The group of server database server; The group of server server is to N+1 ..., the Https/http communication of N+N or 1/N group of server server; Middleware server is to the Https/http communication of terminal server; The group of server system component; The group of server inquiry proxy; The group of server data access layer; ServerView web administration system; The system optimization module; Group of server scheduling automated back-up and data transmission; Group of server is removed automatically; Automatically Email notifies; Daily record and activation record database; The log interface layer; Terminal server storer, permanent memory; Optional magnetic tape station automated back-up scheme N layering user group is enabled
For each following critical piece, enable them by the practical object in the source code.These objects have also been listed below.
The ClientView interface:
Keeper's login, user's login, the assembly of checking with User Status, assembly is checked in tabulation with admin state, search component with User Status, search component with admin state, view data with docking window is checked assembly, view data with dynamic array view is checked assembly, view data with tree-like view is checked assembly, view data with admin state is checked assembly, view data with User Status is checked assembly, view data with increase is checked assembly, have the updated images data and check assembly, view data with deletion is checked assembly, allowing for every kind of pattern uses different color schemes to filter every kind of pattern with button, the password encryption scheme, the password decrypt scheme, the view that refreshes with User Status, the view that refreshes with admin state, the filing image that request is selected, selected own, cancellation is selected owns, the deletion selected item, add screen, drag and drop, menu is checked and is refreshed, menu is checked thumbnail, size, menu is checked requested image, menu is checked selected digital image, menu image upgrades, the menu image deletion, menu image adds, menu label is checked, menu label adds, menu access is nullified.
User's group, middleware storer, semipermanent memory:
Tbl management, tbl dictionary, tbl view data, tbl image, tbl daily record, tbl user
The user organizes server (middleware server):
File upload service, Web service test suite,
The centralized server web service that client one side has IIS is provided with data access layer:
Cdata object, DataAccessWs, Web service MDAC database server:
The middleware database script
ClientView communicates by letter to the Https/http of middleware server:
Web service XML SOAP assembly, Web service file transmitting assembly
Middleware server is communicated by letter to the Https/http of middleware server:
Web service XML SOAP assembly, Web service downloaded assembly
User's group system assembly:
Library component, Cencrypt object, Cdecrypt object
The ClientView inquiry proxy:
Cadministration object, access layer object, Cdictionary object, CimageData object, Cimages object, ClistView object, ClistViewSet object, Cusers object, Cvalidation object, ClientView object, ImageDataLayer object, ImageDataUI object
UserView web administration system:
Admin_Archive module, Admin_Management module, filing module, deletion filing module, deletion administration module, UserView primary module, login module, cancellation module, administration module
The system optimization module:
XRY2DIB object, classification ordering, bitmap object, SearchUI object
User's group scheduling automated back-up and data transmission:
File transfer object, CfileTransfer object, FileTransferSetup
The user organizes automatic removing: remove object automatically
Data transmission report interface: the report user interface after the automatic data backup
Daily record and activation record database: tblLog
Log interface layer: Clog
N hierarchical service device group is enabled
For each following critical piece, enable them by the realistic objective in the source code.These objects have also been listed below.Therefore some assemblies may be had a large amount of assemblies of sharing by user's assembly crossover between group.Some assemblies are for can not be slightly different on the same group.
Group of server server (terminal server):
File upload service, file download service, Web service test suite, has the Web service setting of IIS
Group of server database server: terminal database script
The group of server server is to N+1 ..., the Https/http communication of N+N or 1/N group of server server:
Web service XML SOAP assembly, file upload service, Web service file transmitting assembly
Web service file download component, Web service downloaded assembly
Middleware server is communicated by letter to the Https/http of terminal server:
Web service XML SOAP assembly, file upload service, Web service file transmitting assembly
Web service file download component, Web service downloaded assembly
The group of server system component:
Library component, Cencrypt object, Cdecrypt object
The group of server data access layer
Cdata object, DataAccessWs, Web service MDAC
ServerView web administration system
Admin filing module, Admin record keeping module, Admin administration module, filing module, record keeping module, deletion filing module, deletion administration module, ServerView primary module, login module, cancellation module, administration module
The group of server inquiry proxy:
Cadministrat ion object, Carchive object, Cusers object, Cmanagement object
System optimization module: cut apart, automaticdata removes
Group of server scheduling automated back-up and data transmission:
File transfer object, CfileTransfer object, FileTransferSetup
Group of server is removed automatically: remove object automatically
Automatically Email notifies: Web service Email assembly
Daily record and activation record database: tblLog
Log interface layer: Clog
Terminal server storer, permanent storage, tblManagement, tblArchive, tblUsers
Optional magnetic tape station automated back-up scheme:
Enable assembly and allow magnetic tape station and this system's plug and play
Data Master systematic technical indicator
Data backup and storage via ClientView
According in the white paper in the step of below the operation steps of user perspective, listing, obtain new data via ClientView.
During the process of adding new data or data set, extract metadata.For every kind of new data generates data-base recording.
User the next-door neighbour organizes storing data information on the server.True Data is stored on the independent machine or the user organizes on the server.Preferably, be stored in and organize database server and user with the user and organize server independently on the machine.This is the consideration for safety and performance.
Database server keeps all metadata and the data that are associated with True Data.
Middleware server handles system management, data access layer, with the communicating by letter and safety problem of other servers or database server.
True Data will be stored on the independent machine, and it can be on the client place, at our server farm place, in New York or Little Rock even in India.
In UserView web administration system, after default (can dispose) term of validity, stamp timestamp to data-base recording and go forward side by side row labels for filing by the user.Listed detailed step in white paper, these are the operation stepss from user Group administrators angle.
Organize in the database server in case data are added to next-door neighbour's user, data just are under " activity " pattern now, and this state is represented by the green highlighted background of last this line data of ClientView.
ClientView is the thin client on desktop computer, mobile device or the laptop computer that is in the terminal user.Data retrieval at project partly designs, and allows the user to search for by any field of using in the data dictionary, to find data list (or data set) and to select data to check.If on the group of server server, data are filed, will give information to the user as mentioned above so, this object will ask to obtain data from the group of server server.
Search, the keeper can search for database with regard to metadata, and for example, whether data filing, site number, data number etc.The user can utilize the data that are associated with True Data based on current data available search data available.All search can be adopted and/or concern.In case finish search, all return results will be display update the left side of ClientView window.
Can expand this interface, to have the ability of searching for fully to any field.
Automaticdata transmission and backup
Automaticdata transmission is based on that being provided with of defining in the administrative section of UserView carry out.Date of filling and timing definition will when transmit data.
The user organizes that server will be got in touch down one deck user group or the group of server server transmits with log-on data.
In case finish transmission, will descend Backup Data on one deck middleware server and database or group of server server and the database.
When the transmission data, ClientView will change into red " transmission " state to the color background of data line.
In case transmitted data fully, ClientView will change into the data line color background " filing " state of black.
Finish after the transmission, sender and recipient's database is all upgraded, to reflect the variation of data message.
During each the processing, all can generate log record.
Confirm screen, it contains a column information relevant with being transmitted data.Each bar in this tabulation is all represented the data transmission of whether succeeding, if success then represent failure cause.
Automatically remove
In case backed up data safely, will on sender's server and database, remove automatically.If arrived the term of validity of data, will clear data, otherwise data may continue to be deposited on server and the database.
As long as meet the date and time of setting, dispatcher software will move.This circulation will return repetition himself, remove the non-administrator by in the UserView system management, redefining filing data and the time changes routine.
The failure period of data is meant should be from the date that middleware server clears data.It also is based on following formula calculating:
The failure period=" first data transmission being organized the date and time of server and database to the user "+" grace period ".
When first data transmission being obtained first to the moment that the user organizes server and database.
Via UserView be set by the user Group administrators grace period.
During each the processing, all can generate log record.
Confirm screen, it contains data list, and which data and whether success and failure cause are removed in expression.
Fault processing
If the user attempts the retrieve data via ClientView in the positive transmission data, so can be at show tags below the state part, inform these data of user just in transmit stage, the suggestion user is not that " in the transmission " and field background are no longer tried again in red in pattern.
Communication
The default communication port-for-port 80 of user's group and group of server.But, the keeper can be provided with the communication port within user's group and the group of server.They need not to be identical port, as long as sender and recipient have accurate setting on port numbers.
User's group and server group communication are all undertaken by web business, soap and XML.
The requestor sends request.Send request via the Internet by http and https.The web serviced component that is positioned at the reception server on the web server will only be handled request when needed.
Http and https are bidirectional communication protocol; Reception server allows the requestor know what has been lost.Event schema and callback feature permission system set up two-way communication.
Data access layer
At every turn when database request is obtained data,, open database once more after the authentication of requestor's log-on data storehouse and authentication meet the requirement of database server.
The inquiry proxy object will obtain data by the Query Database request.
Data retrieval
When the user wished to retrieve a application program, the user at first must select one or more project on ClientView, clicked " the selected project of request " button then, to obtain the copy of these data from user's group or group of server request.
Send request command to server, server will be located these data and copy download is arrived the requestor there.
If the data of not finding will send email message to the keeper, allow it search data by hand, also can send email message to the requestor, allow the requestor go and find out what's going on.This can occur in usually since hard drive space limited with data when database or server are transferred to position such as tape or CD.
Each processing all can be recorded in the log sheet.
Exchanges data
If group or the user within user's group do not wish to check or visit data, the user Group administrators must allow this group or user accesses data by UserView for user's group is provided with user ID and password.If user or group are current via ClientView calling party group, then must on strong ClientView, patch be installed.
Can be by the UserView administrative section the enforcement access privileges is set.Referring to white paper, from user Group administrators's operation steps part.
Keep accounts
ServerView has accounting feature, allows the group of server system to keep accounts for user's group system.
Accounting system is chosen wantonly, with such as not at the scene with mix the live version no-float, details are referring to white paper version part.
System is from management and log sheet retrieval charging information.Can keep accounts based on group of server keeper's requirement.
Daily record
Log store can be installed in it within any position or user group or the group of server in the log sheet of tblLog by name.They can also all share a center daily record.
Clog is the layer of handling all inquiries and the authentication of database.It is also communicated by letter with web service data access layer.
Database design
The user organizes database
Relevant database comprises following leading schedule:
The dictionary form has the principle of DICOM data dictionary.
The mark of 8 unitss will be represented field name and size etc.This label information is stored in the form and uses when searching in database.
This form is used for determining should be with other form data presented types, its length and field name in report.
SiteNo is and the relation of management table SiteNo field, represents that this data markers should be explained in the mode of this record description SiteNo field data.
Field |
Type |
Length |
Mark |
Numeral-unique primary key (not automatic numbering) |
|
SiteNo |
Relation |
|
RefName |
Text |
50 |
Display Name |
Text |
50 |
Data type |
Numeral |
|
Data length |
Numeral |
|
Usage flag |
Logic |
|
User's table storage and user-dependent all data.It is used to make user ID and password to come into force so that login.
Recording mechanism is a primary key.
The password field of encrypting is preserved the encryption version of user password.
Action field shows whether the user is movable.
It is domestic consumer, custodian, only contact person or keeper that rank field is followed the tracks of the user.
Field |
Type |
Length |
RecordNo |
Automatic numbering-unique primary key |
|
SiteNo |
Relation with management table SiteNo field |
|
Employee-number |
Text |
50 |
Employee-name |
Text |
50 |
Login name |
Text |
25 |
Encrypted ones |
Text |
50 |
Movable |
Logic |
|
Grade |
Only contact person domestic consumer handles the keeper | |
Email |
Text |
|
100 |
Image table storage True Data.
Pathname storing path information.
In case successfully image is transferred to group of server, just filing field mark for true.
User field comprises the user who creates these data.
Field |
Type |
Length |
ImageNo |
Automatic numbering (unique primary key) |
|
SiteNo |
Relation with management table SiteNo field |
|
Acquisition time |
Time on date |
|
Pattern |
Search |
|
The path |
Text |
255 |
Expiration Date |
Time on date |
|
File |
Logic |
|
Date of filling |
Time on date |
|
The user |
Numeral |
|
The data that the ImageData table storage is relevant with True Data.It is the form relevant with True Data.Data itself are write as with the received text form.Data dictionary provides explains that reading of data how and this item field show the means of length.
Field |
Type |
Length |
RecNo |
Automatic numbering |
|
SiteNo |
Relation |
|
ImageNo |
Relation |
|
Marker number |
Relation |
|
Data |
Text |
255 |
The user |
Relation |
|
Management table is preserved data filing and is retrieved and used be connected and identify necessary data.The user name of website should be unique for all clients and website.
The encrypted ones field is the encrypted fields that sends by the Internet.
If the UseEncryption mark is set to very, then the SSL data encryption must to be used.
Whether UseCompression label table registration is according to compressing.
Filing day field determines which day of a week be this system should begin to send data.
Time of filing is the time that begins to handle, and should be expressed as 24 hours military time.
Grace period is that the fate-acquiescence of preserving data in next-door neighbour's middleware server should be 7 days.
Field |
Type |
Length |
SiteNo |
Unique primary key |
|
Site name |
Text |
50 |
Encrypted ones |
Text |
50 |
The site contact |
Text |
50 |
The site affiliation phone |
Text |
16 |
The IP address |
Text (but being the tcp/ip address format) |
11 |
Port |
Numeral |
|
AETitle |
Text |
50 |
The archive file folder |
Text |
255 |
The retrieving files folder |
Text |
255 |
Server ip |
Text (but being the tcp/ip address format) |
11 |
Service-Port |
Numeral |
|
User encryption |
Logic |
|
Use compression |
Logic |
|
Filing day |
Numeral |
|
Time of filing |
Time |
|
Grace period |
Numeral (fate of retention data before the deletion) |
|
The daily record charting is to the activity of data and the data that are associated with True Data.All processing of this charting.The daily record form can independently be installed, and perhaps group can share one, or even all groups can share one.
Field |
Type |
Length |
LogNo |
Unique primary key |
|
SiteNo |
Relation with management table SiteNo field |
|
Login time |
Time on date |
|
ImageNo |
Relation-image form ImageNo field |
|
ImageDataNo |
Relation-view data form RecNo field (, also can be sky) if it is only specific to image |
|
Action |
Numeral |
|
The user |
Numeral |
|
The group of server database
The group of server database can comprise user's form, is used for the purpose of verification and authentication.Each group of server will have user's form, and perhaps according to client's environment, they all share one.
Management table is preserved the data of relevant user's group or indivedual record keeping and contact details.
Field |
Type |
Length |
ClientNo |
Automatic numbering-unique main field |
|
Client name |
Text |
50 |
Main address | Text | |
100 |
Main address 2 |
Text |
50 |
The city |
Text |
50 |
The state |
Text |
50 |
Postcode |
Text |
15 |
Country |
Text |
50 |
Administrative contact person |
Text |
50 |
AdminPhone |
Text |
16 |
When and where filing form tracking data is placed in the group of server database.
Purge date is the date of permanent elimination data.If this field is empty, eliminate data so never.
The physical location field is used to be kept at the description that where can find data.
Notes are the memo fields that are used to write down about any notes of this record.
The type of data type field data of description, for example bmp and wav.
File type data of description filing medium thereon.
The filename of file data file by name does not comprise the path.
File name is call number or filing media name.
Field |
Type |
Length |
ArchiveNo |
Automatic numbering (unique primary key) |
|
ImageNo |
Relation-image form mageNo field |
|
Date of filling |
Time on date |
|
File name | Text | |
100 |
Filename |
Text |
255 |
File type |
Text |
50 |
Data type |
Text |
20 |
Purge date |
Date |
|
Remove |
Logic (being defaulted as vacation) |
|
Physical location |
Text |
255 |
Notes |
Memo field |
|