CN101610190A - Data network and system - Google Patents
Data network and system Download PDFInfo
- Publication number
- CN101610190A CN101610190A CNA2009101122221A CN200910112222A CN101610190A CN 101610190 A CN101610190 A CN 101610190A CN A2009101122221 A CNA2009101122221 A CN A2009101122221A CN 200910112222 A CN200910112222 A CN 200910112222A CN 101610190 A CN101610190 A CN 101610190A
- Authority
- CN
- China
- Prior art keywords
- database
- network
- data
- intranet
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Computer And Data Communications (AREA)
Abstract
With an excellent machine, some computers, database and other computer equipment etc., adopt local area network technology, the local area network (LAN) by network interface unit and communication media directly are formed by connecting is database local net.Common each local area network (LAN) of forming such as other service-specific computers of the network data base of same unit or group of unit and this unit and computer equipment, respectively by distinguishing that machine is connected with the internet with router, mutual group is built up the data wide area network of interoperability safely, is called data bank network.The general headquarters of unit and its are distributed in the excellent machine of trans-regional each data bank networks such as several branches of diverse geographic location and specific function dedicated network etc., by distinguishing machine and Internet connection, make up safe and reliable unit data storehouse Intranet respectively.Specific function dedicated network difference just forms various database Intranet system: Web database Intranet, object-oriented database Intranet and multimedia database Intranet etc.
Description
Technical field
The present invention relates to network interconnection technology, network operation technology, computer technology, database technology, automatic control technology, the communication technology, microelectric technique, sensing technology, information technology and Display Technique etc.
Background technology
The material of energy transmission signals is called transmission medium.It comprises cable, optical fiber, wireless medium, microwave and laser etc.
Can with computer, resource apparatus (being computer equipment) or Database Systems by transmission medium interconnective and have in the transmission of signal and receiving course can processing information flow, the integrated circuit (IC) chip of bag (packet) or frame functions such as (frame), be called interface circuit.
All-purpose computer (universal computer) has operating system software, generally also comprises the interface circuit that it is connected with corresponding network.
Between can not one group of heterogeneous network only according to transmission medium communication, provide can direct communication interface function, be called gateway (gateway).
Have between the computer and computer equipment of mutual communication and shared resource function,, be called network (network) by interface circuit and the interconnective physical system of transmission medium.
Interconnected homogeneous network or the system by interconnected heterogeneous network such as gateway are called internet (internetwork).
The internet both can comprise several physical networks; Also can comprise up to ten thousand physical networks.The number of computers that is connected to each network in the same internet also is variable.Some network does not have computer to connect; Other networks have then connected thousands of computers.
The agreement of formulating for the realization of network function and the set of a whole set of protocol stack (Protocol Stack) thereof are called network architecture.
(Advanced Reserved Projects Agency, internet ARPA) is called the Internet (Internet) to come from ARPA.
Entity (Entity) is objective reality and the object that can distinguish mutually.
Attribute (attribute) is the abstract of the character of entity and relationship characteristic thereof.
Describe the minimum data unit of attributes of entities, be called data item (data item).
Data element (data element) is that a kind of plurality of data item by the data category unique name of entity attribute, that defined information is formed.
Be independent of retrieving, revise, insert, delete or the set of the sharable data element of data manipulation such as remote access of certain data structure form of having of application program or relationship type, be called database (Data Base, DB).
In Database Systems, main data model has: hierarchical model, network model and relational model.
Database Systems available three-level schema, secondary on architecture shine upon carry out abstract.Wherein three-level schema is: external schema (ExternalSchema), pattern (Schema) and internal schema (Internal Schema).
Relational database is the database based on relational model.It utilizes relation to describe real world.Its standard language is SQL.
Data base management system is to utilize computer to organize effectively, obtain and management data, is the foundation of database, the data management software that operation and maintenance is disposed.
The user uses the focus point of database for transaction analysis and decision-making, is called theme.A theme is relevant with a plurality of manipulation type information systems usually.
Stable (Non-Volatile) database can not be revised and upgrade.It only supports two kinds of data manipulations: data load and data access.
(Subject Oriented) the database unit of making of subject-oriented or tissue to the comprehensive analysis of sorting out back information and rule abstract become may with efficiently.
Integrated (Integrate) database makes name custom, measurement characteristics, precision and the identifying property of typical zolymerization of information.
Data in (Time Variant) database that constantly changes are times to time change in time; But it is loaded constantly is accurate; In a single day it be written into the memory cell of database, just can not upgrade or revise.
The data of descriptive data base are called metadata.Its data by being understood and accept by people is represented the data message in certain database.
Unit or be organized as inquiry and analysis business or affairs and gather and separating controlling combinative stability, subject-oriented, integrated, that constantly change in time and the database of isolating management and the set of metadata thereof, be called data warehouse (Data Warehouse, DW).
Data warehouse is the expansion of database.It has three types: virtual data warehouse, center type data warehouse and distributed data warehouse.
The data warehouse unit of complying with occurs an urgent demand of information for supporting some decision.It has comprised the content of three aspects: data warehouse (DataWarehouse, DW) technology, on-line analytical processing (On-line Analytical Processing, OLAP) technology and data mining (DataMining, DM) technology.
Data warehouse is an Analysis of Policy Making processing that is used for support unit better or tissue and subject-oriented, integrated, stable and set time dependent database.Its main application form has the information system of person in charge, on-line analytical processing, extemporaneous inquiry, form and data mining flexibly.It is provided for the current and historical data that Analysis of Policy Making is handled.
A series of databases of directly visiting customizing messages in certain unit business rule of reflection of setting up or function for the user are called Data Mart.
Data Mart is the reflection of customizing messages in all business rules of unit, rather than the reflection of all business rules of unit.Therefore the information that reflects of Data Mart must meet the unit rule, but they can be modified usually, to adapt to by the represented unique business function of this Data Mart.
Data Mart is a data warehouse less, that content is more concentrated.But it obtains its data from metastable, pure with integrated source (unit data warehouse).It can be according to known defining relation image data.
Present existing database and data warehouse are the cores of data volume architecture, and it controls the realization of various data architecture functions with hardware and software.(Personal Computer PC) is most widely used general, the most basic computer to personal computer.Its maximum characteristic is to have improved the man-machine interface interface.It not only has advantages such as stable performance, fast operation, but also has high reliability, characteristics that environmental suitability is strong.
Existing database technology has become one of most important technology in the computer realm.Development along with technology, it is towards distributed data base system (Distributed Database System, DDBS), (Data Warehouse, DW) directions such as system, multimedia database, object-oriented database and private database system develop for World Wide Web (WWW) (Web) database, data warehouse.
(International Standard Organization, (StructuredQuery Language SQL) is the standard language of relational database to the SQL of ISO) issuing in International Standards Organization.Although existing relational database has each species diversity, still can operate database by the standard SQL statement.
Below alleged database, if not dated especially, generally also comprise data warehouse.
Existing each database structure establishes one's own system, and can not pass through the internet, makes their safety and accurate intercommunications each other.
In the existing database technology, certain unit is scattered in the database of various places, must be by renting expensive special line or adopting Virtual Private Network (Virtual Private Network, VPN) technology is set up this unit distributed data base system, centralized data base system and private database system etc.
Rent expensive special line for many small-sized or medium-sized enterprises, even large enterprise, all be a kind of white elephant.
Virtual private network technology since application processor and VLAN (Virtual Local Area Network VLAN) after the technology, in fact changes point-to-point communication into.There are two kinds of network topologies at present: center radiation layout and whole network layout.The center radiation layout is linked to each other with many remote sites by a central site.The Customer Edge router that is positioned at the central site position is very expensive, and its price is relevant with the number of the remote site that links to each other.Packet time of delay when simultaneously, substantially exceeding direct communication between two websites its time of delay.The tunnel that the whole network layout need be supported (Tunnel) quantity increases along with the number of website is geometric progression.It is unpractical that the unit that website is many a little adopts it.
Fail safe is another significant problem of VPN.Each is connected to the Customer Edge router of internet, all must take such as the such safety measure of fire compartment wall, so that guarantee the safety of each website.But each fire compartment wall must (Internet Service Provider, ISP) open, so that the visit relevant devices, this be a potential safety hazard to Internet service provider.When network size was big, managing firewall was also very difficult.
(Secure Socket Layer, SSL) VPN only is fit to the connection of website to network to security socket layer, can't realize the safe interoperability between a plurality of networks.Existing fire compartment wall can't be resisted the infringement of computer virus.
Existing Database Systems just utilize computer to carry out the application system of the database that information organization forms, and are to use the most a kind of computer application system.Wherein the major function of data base management system is: database definition function, data base manipulation function, database protection and controlled function, database maintenance function etc.
Summary of the invention
Task of the present invention is to adopt network interconnection technology, network operation technology and database technology, each local area network (LAN) that contains database, dedicated network or their various integrated networks with unit or tissue, pass through common network, particularly the Internet (Internet), in each network of realizing these isomeries or isomorphism, can be safely between the database server and interconnected (Interconnection), intercommunication (Intercommunication) and interoperability (Interoperability) accurately, set up various Database Systems of this unit or tissue.This each database server with diverse geographic location carries out the safety and the system of interoperability accurately by Internet, is called data bank network.
Data bank network can be set up distributed data base system (DDBS), World Wide Web (WWW) (Web) Database Systems, data warehouse (DW) system, multimedia database system, OODBS and private database system etc.
Have the function or the specified server class computer of computer and computer equipment operation in the control proprietary network, be called the advantage function computer, be called for short excellent machine.This proprietary net is called excellent machine network.It can be local area network (LAN), metropolitan area network or wide area network.
Excellent machine have on its original operating system the network operating system that increases function (Network Operating Systems, NOS).
Unit is according to the excellent machine in each proprietary network of network topology structure connection computer composition, and the interface by the I/O function is isolated is connected with the machine of distinguishing respectively; Each distinguishes another network interface of machine, is connected with same common network; Make up the proprietary network system of the safe and reliable and information interoperability of unit, be called unit proprietary network (Private Network) (Fig. 1).
This network interconnection technology makes the machine of distinguishing be in excellent machine network and distinguish on unique passage of machine network.The machine of distinguishing passes through the computer interface and the network interface of its isolation features, realizes coupled excellent machine network and distinguishes logic isolation between the machine network; Computer interface and network interface by its linkage function again realized this proprietary network and distinguished physical connection between the computer among the machine network, and carries out safety and information interoperability accurately.
Interconnected and control these two network securitys and the all-purpose computer of interoperability accurately with excellent machine network (or with excellent machine) and another common network (comprising the internet) respectively, be called the all-purpose computer of identification identity in the network, abbreviate the machine of distinguishing as.It is by between transmission medium control common network and the protected network, can be safely and accurately carry out the all-purpose computer of interoperability
Another network (not comprising the machine of distinguishing) by distinguishing that machine is connected with excellent machine network is called and distinguishes the machine network.
The standardization program of distinguishing machine is:
" program of audit program " function: after the machine of distinguishing of source end or Su Duan receives cleartext information, information is checked, find after the random procedure wherein, they are arranged in together, and temporarily be stored in the external memory, simultaneously the first road program be presented on the display screen of designated computer.If some program is the legal procedure that allows its visit; Then the user selects " allowing later on " final election item when prompting occurring for the first time, distinguishes and can not inquire once more when machine is met these programs later on, and allow its visit.When the user does not answer within a certain period of time or selects " not allowing " final election item, the machine of distinguishing just abandons this program.The source end distinguishes that machine and Su Duan distinguish that machine moves this program; Can prevent that virus attack from distinguishing the network that organizational security protects.
" source end encipheror " function: the source end is distinguished machine sends desire by common network cleartext information back, adds the secret key of symmetric cryptography; With this data splitting input one-way hash function (Message Digest), draw hash (Hash) value (being called source end hashed value); Then source end hashed value is added in cleartext information (not comprising key) back, encrypt, become ciphertext with key; The Su Duan that at last this ciphertext seen off distinguishes machine.
" place end decrypted program " function: Su Duan distinguishes that machine with the cipher key shared that unit or unit arrange in advance, becomes the decrypt ciphertext that receives expressly, obtains cleartext information and source end hashed value; Key is added in cleartext information (not comprising hashed value) back; With this data splitting, input is the one-way hash function of agreement in advance, obtains hashed value (being called place end hashed value); This place end hashed value is compared with the source end hashed value that receives; If these two hashed values are identical; Confirm that then this information distinguishes that from legal source end machine sends, accept this information; Otherwise abandon this information.
Distinguish that facility have computer in protected local area network (LAN) of unit, be sent to the information of (perhaps receiving) another local area network (LAN) computer of this unit, after the encryption (or deciphering), be transmitted to the standardization program of internet (perhaps this local area network (LAN)) etc.; It contains the program of processing information flow etc.
In two protected networks between two computers, it is as follows with communicate by letter accurately (figure) to carry out safety by Internet:
The source end that is connected with protected network is distinguished machine; " program of audit program ", " source end encipheror " and " place end decrypted program " etc. are housed, can encrypt various information, and only allow the information of the computer in this source end protected network; after encrypting, enter the Internet.
The Su Duan that is connected with protected network distinguishes machine; " program of audit program ", " source end encipheror " and " place end decrypted program " etc. are housed; can decipher the various information of coming in from the Internet; and only allow the computerized information in the source-end networks of other source end protected networks of this unit or tissue or affiliate's appointment; after deciphering, enter into the receiving computer of place end protected network.
The machine of distinguishing can also have an other cover standardization program to be:
The simple approach of authentication (Authentication) is to set up a username and password database in distinguishing machine.
The machine of distinguishing passes through Access Control List (ACL), and (Access Control List ACL) carries out authentication.This username and password Database Lists is discerned dissimilar source end protected network (distinguishing that with it machine IP address is representative) identity simply.
Authorize (Authorization) to stipulate then what the user after obtaining this network qualification of visit, can do.
Authentication and mandate new method are to set up a user or unit name, IP address, password and authorization privilege database.
The machine of the distinguishing Access Control List (ACL) of unit is used for carrying out user's (referring to other unit, affiliate unit or remote client or tissue) authentication.This tabulation distinguishes that to dissimilar source ends (user name) machine IP address and user's password carries out identification.The password that has only user name, IP address and user with in this Access Control List (ACL) when identical, could guarantee to come into force based on the authentication of address.
" to user's authentication encryption and authoring program " function: user's (referring to other unit, affiliate unit or remote client), encrypts with private key for user at the password that certain unit stays it; Ciphertext is as user's digital signature; With the unit PKI to digital signature and symmetric key encryption, as confidential paper; With cleartext information, user name and client public key symmetric key encryption; The source end distinguishes that machine is with this ciphertext, confidential paper; By the Internet, the Su Duan of the unit's of passing to proprietary network distinguishes machine; The Yong Si Keying of unit is decrypted confidential paper; Then with symmetric key with this decrypt ciphertext, obtain cleartext information, user name, client public key and number signature that the user sends; Yong Hu Gong Keying is with the deciphering of number signature; This Su Duan distinguishes that machine contrasts the relevant information in user name, IP address and user cipher and the unit data storehouse.If entirely true, unit confirms that this information is that the user sends; This distinguishes that machine is by visiting its control tabulation; Determine user right; By the excellent machine of place end, be given to the receiving computer of corresponding authority again.
" to unit authentication encryption and authoring program " function: the password encryption that unit stays in this unit user's (referring to other unit, affiliate unit or remote client) with its private key, ciphertext is as the units word signature; User's PKI to units word signature and symmetric key encryption, as confidential paper; With cleartext information, unit name and unit PKI, use symmetric key encryption; The source end distinguishes that machine is with this ciphertext, confidential paper; By the Internet, the place end client computer or the other unit Su Duan that pass to the user distinguish machine; The user uses its private key, and confidential paper is decrypted; With symmetric key with this decrypt ciphertext, cleartext information, unit name and unit PKI that the unit of obtaining sends; With the Gong Keying of unit the units word signature is deciphered; Obtain the password that the user stays in unit; Place end subscriber or other unit are distinguished the password contrast of machine with password unit of being reserved in it then.If entirely true, the user confirms that then this information is that unit sends.
The PKI of this method employing unit and user's PKI needn't disclosed methods.
The machine of distinguishing also has the means of the single file security of the most flexible processing.For example, a unit can implement to encrypt or digital signature to indivedual paragraphs of its file that sends.Having only application layer is unique level that this security service can be provided.It can distinguish the different security requirement of a concrete file.
The machine of distinguishing can have the standardization program of the 3rd cover.If part paragraph safe class among the file is improved one-level, then adopt this standardization program:
" source end encrypt classification procedure ": the higher leveled paragraph of safe class in the cleartext information, at first use another shared symmetric encipherment algorithm key, this segment section is dropped into row encrypt methods such as (also) available asymmetric cryptographies; In the plaintext back that this part paragraph is encrypted, add the ordered series of numbers or the symbol of the indicating positions of encrypting paragraph, add key again, obtain hashed value (source end); Aft section is with " source end encipheror " function program.
" place end deciphering classification procedure ": previous section is with " place end decrypted program " function program; Then with the plaintext back of part paragraph encryption, the ordered series of numbers or the symbol of the indicating positions of the encryption paragraph of interpolation add another key again, obtain hashed value (Su Duan).This place end hashed value is compared with the source end hashed value that receives; If these two hashed values are identical; Confirm that then this information distinguishes that from legal source end machine sends, accept this information; Otherwise abandon this information.If accept this information; With another symmetric key of sharing of arranging in advance,, just draw whole plaintext respectively to the decrypt ciphertext of relevant position.
Virtual private network utilizes the safety function that agreement provided of lower level in the existing Internet protocol, generally can not know the paragraph structure of any file; Thereby which there is no telling tackled and partly carried out graded encryption.
More than three covers distinguish that the standardization programs of machine can be according to concrete application, select a cover wherein or select two covers simultaneously for use or select three covers for use.
Data security (data security) is meant the Data Protection in the database, to prevent undelegated leakage, modification or destruction.
1, the excellent machine of Jiang Yitai, some computers (comprising database server), database and other computer equipment etc., adopt local area network technology, by the local area network (LAN) that network interface unit and communication media directly are formed by connecting, be called database local net (Fig. 1).
Excellent machine and server class computer have microprocessor CPU chip, data storage (EEPROM), working storage (RAM) and program storage (EPROM), and input button, display etc. are housed.
The hard disk of database is the equipment and the place of storage and backup in the database local net.Enough big hard drive space is the prerequisite of fulfillment database function; Higher I/O (I/O) disposal ability is the necessary condition that guarantees database efficiency.Because the memory size of database server and the performance of microprocessor are also influential to the efficient of database.Therefore, selected data storehouse server performance must be complementary with the application scale.
Database must select a suitable data base management system (Data Base Management System, DBMS).If application programming also should be chosen high-level language and the application development tool thereof coordinated with DBMS.
Database server can be the destination of data in the database local net, also can be data source.Excellent machine sends to the data of user side or message on the transmission medium of this net, and data or the message that receives is submitted to the terminal use.
The network operating system NOS of database local net increases the needed function of network on the original operating system of server class computer.The operation of NOS Control Network, and shared by the computer user of networking.
Database local netting gear has interoperability (interoperability), portable (portability), extensibility (expandability) but putting property of Shrink (scalability) and plug and play (plug; Play) feature.It generally is with the distributed principle that is controlled to be, the control structure of employing system, subsystem and module stagewise; Its structure is transplantable and transparent.
Each excellent machine all has the input and output interface circuit.The server class computer of excellent machine network or computer equipment also can directly communicate with business information each other and exchange.
Database local net provides a kind of neutral machine-processed platform that does not rely on concrete database structure, is a kind of brand-new make.Have the unit data storehouse local area network (LAN) of network function, can fully realize intramural resource and Information Sharing Mode.Database local net as the case may be, can adopt client/server (Client/Service, C/S) or browser/server (Brower/Server, B/S) pattern.
Utilize database local net to the reconfigurability of the business of unit and the compatibility of data communication, can be the bulk traffic image data.
According to the local area network (LAN) principle, any station server in the same database local net can be operated professional and database.
Database local net is a rounded system structure.It comprises chief components such as data source, data pick-up and crossover tool, data modeling tool, data of database memory bank, database management tools, data access and analysis tool.Each part depends on each other for existence, and forms an organic system.According to the application of local area network (LAN), determine correlation module and interface, reach the efficient utilization of data, for data are analysed in depth and decision-making provides the most reliable support.
2, several database local area network (LAN)s of certain unit or an excellent machine in the data dedicated network all pass through input/output interface separately, are connected with an output/input interface of distinguishing machine respectively; Each distinguishes that machine all is connected with the internet by router, just sets up into the proprietary database wide area network of this unit, is called the database wide area network, is called for short network data base (Fig. 2).
Network data base is a kind of data acquisition, operation, processing and memory module; Wherein comprise (Fig. 2) such as browser, server, client computer and database servers in the database local net.
Each database local net (perhaps excellent machine) is all by distinguishing the machine processing capacity, with the mutual logic isolation in internet in the network data base; By distinguishing the controlled function of machine, make between the computer in each database local net and utilize the internet intercommunication again.All database local nets can both guarantee that data are in the fail safe of circulating on the internet, authenticity, reliability and confidentiality; Fundamentally stop some people by network implementation malice or destroy unintentionally etc.
The machine of distinguishing has solved information fail safe, authenticity, anonymity and four critical technical problems of separability in the proprietary wide area network of unit that utilizes the internet to set up.It can be a server class computer, also can be the client class computer.
For mininet, the software module of excellent machine can directly be inserted on the expanded function groove of the machine of distinguishing.The machine of distinguishing directly is connected with protected network.
Network data base satisfies interactive application and stability requirement; Has interoperability; Can distinguish the different security requirements of each several part of a concrete data file; The foundation structure that can use public-key authenticates and encryption key distribution.
In the network data base, between two computers, as follows with communicate by letter accurately (Fig. 2) in the disparate databases local area network (LAN) by the safety of internet:
The information that source client database server from database local net or server class computer send; Through the excellent machine of source end, the source end that arrives being equipped with of source end " program of audit program " and " source end encipheror " etc. is distinguished machine; Through elimination virus with after encrypting; Pass through the internet; Distinguish machine to the Su Duan that " place end decrypted program " and " program of audit program " etc. are housed; After deciphering and checking virus; Forward the excellent machine of place end to; Arrive place client database server or server class computer at last.Distinguish the information monitoring of machine to turnover database local net, and the illegal visit to the database local area network (LAN) of refusal.
The system backup automation solution (Fig. 3) of network data base can be made up of backup client, active and standby part of server, media server, redundant memory cell and backup management software etc.Backup client typically refers to application program, database server; Expression can and be sent to data the software portfolio of backup server from reading of data in the online storage; Active and standby part server is used for arranging backup and resuming work, and service data deposit medium; Media server is that the instruction according to active and standby part server copies data on the backup medium.Redundant memory cell is data tape, disk or CD etc.
The existing network of each Database Systems at a distance that is distributed in, the dedicated network of interconnected composition must adopt expensive special circuit.
Existing fire compartment wall (comprising hardware device, relevant software code and security strategy) or VPN(Virtual Private Network) technology, adopted " anti-port " technology to capture by hacker (HACK) easily, intruding into the computer or the data equipment of the unit network of fire compartment wall back, is one of its major defect.Fire compartment wall can't defending computer virus attack, also be one of its major defect.
3, other service-specific computers of the network data base of same unit or group of unit and this unit and computer equipment etc. are common forms after each local area network (LAN), each local area network (LAN) (perhaps wherein excellent machine) is respectively by distinguishing that machine is connected with the internet with router, mutual group build up this unit proprietary, the data wide area network of interoperability safely, be called data bank network (Fig. 4).
In the data bank network, between two main frames of LAN, pass through the internet; Carry out safety and accurately communicate by letter (Fig. 4):
The information that the service server class computer of the source end unit from local area network (LAN) or database server send; Through the excellent machine of source end, " program of audit program " is housed in arrival and source ends such as " source end encipherors " is distinguished machine; Through elimination virus with after encrypting; Pass through the internet; Distinguish machine to the Su Duan that " place end decrypted program " and " program of audit program " etc. are housed; After deciphering and checking virus; Forward the excellent machine of place end to; Arrive the server class computer or the database server of the business of place end unit at last.Like this, distinguish that machine all can monitor the information that passes in and out this network data base or dedicated network for every, and refusal is illegally to the visit of this data bank network.
Data bank network meets modern unit management mode.For trans-regional or global unit, enterprise group and industry, though each department disperses, to get in touch between them closely, the Decentralization of the existing part of way to manage has the coordination control of the overall situation again.Data bank network has satisfied the database application system of this needs Local treatment and the collaborative work of overall situation processing energy.
Data bank network can improve the ratio of performance to price.Along with the expansion of unit business, data volume is explosive growth.If mass data is concentrated access, will be more and more higher to the requirement of host performance, even original main frame can't meet the demands and has to be abandoned.Utilize data bank network can make numerous existing devices and environment associated working, can obtain the higher ratio of performance to price.
Data in the data bank network are on physical distribution each local area network (LAN) therein.Each local area network (LAN) all is centralized (perhaps distributing) Database Systems; Have the autonomous ability of handling, can finish the service application of this local area network (LAN).And each local area network (LAN) is not incoherent mutually; They constitute a logic integral body, are unified in the management of excellent machine network system software down, and fellowship is also finished the service application of proprietary wide area network.
The logical collection of database on each website, form by two parts: the one, about using the set of needed data, be called physical database, be the main body of database Intranet; Another part is the definition about data structure, and the description of the burst of global data, issue, is called data dictionary or data directory.
By the type of control mode, data bank network can be divided into 3 classes: concentrated, decentralized and changeable type.
Existing database is owing to be subjected to hardware-software and network technology and environmental limit, and technology realizes that (DistributedDatabase System, problem DDBS) is still the major obstacle that stops distributed data base system to be used to distributed data base system.
Existing Database Systems can't be carried out safety and accurate interoperability by the internet.It is not suitable for carrying out virus and detects; Can't take precautions against the data driven type virus attack; Can't defend various virus attack behaviors; It all is one of its major defect.
Data bank network has following characteristics:
1) data are not to be stored in the website, but disperse to be stored on a plurality of websites that connected by the internet.
2) data are disperseed physically, and they are a logic integral body, global transaction is handled on unified logical framework carried out.
3) data of each website have ability by oneself by the server admin of this locality, finish the application of this website.
On data bank network, the information flow by Internet transmission also can be through the integrality encryption; Can the guarantee information confidentiality, integrality and authenticity.It can also have the function of authentication.Because the limitation of centralized data base system is more and more obvious, press for a kind of Local treatment and the overall situation is handled, database application system that can collaborative work; Data bank network is the embodiment of this demand just.
4, the general headquarters of unit and its are distributed in the excellent machine of trans-regional each data bank networks such as several branches of diverse geographic location and specific function dedicated network etc., respectively by distinguishing machine and Internet connection, the common network of forming (comprising the internet), make up the proprietary multi-functional data of a safe and reliable internal institution storehouse wide area network, be called database Intranet (Fig. 5); Be called for short the database Intranet.Specific function dedicated network difference just forms various database Intranet system: Web database Intranet, object-oriented database Intranet and multimedia database Intranet etc.
Between two main frames, as follows with communicate by letter accurately (Fig. 5) in the heterogeneous networks of database Intranet by the safety of internet:
The information that source end computer from excellent machine network or specific function dedicated network sends; Through excellent machine of source end or specific function dedicated network, " program of audit program " is housed in arrival and source ends such as " source end encipherors " is distinguished machine; Through elimination virus with after encrypting; Pass through the Internet; Distinguish machine to the Su Duan that " place end decrypted program " and " program of audit program " etc. are housed; After deciphering; Forward excellent machine of place end or specific function dedicated network to; Arrive place end purpose computer at last.
In the database Intranet, each of unit distinguishes that machine is equipped with identical " program of audit program ", " source end encipheror " and " place end decrypted program " standardization program.Like this, distinguish that machine monitors the information that passes in and out excellent machine network or specific function dedicated network for every, and refusal is illegally to the internal institution access to netwoks.
In the database Intranet, each of unit distinguishes that machine also can be equipped with identical standardization programs such as " to unit authentication and authoring programs ", and these distinguish the Access Control List (ACL) that each Hostname (perhaps address) in each IP address table of distinguishing machine and each excellent machine network or the specific function dedicated network is all arranged in the machine.Like this, distinguish that machine all can monitor the excellent machine network of turnover database Intranet or the information of specific function dedicated network for every, and refusal is illegally to the visit of internal institution network.
Database in the database Intranet is that physical distribution is on each the excellent machine website that couples together with the internet.Each website can be a centralized or distributed data base system, and autonomous disposal ability is all arranged, and finishes the topical application of this website.And each website is not incoherent mutually, and they constitute a logic integral body, is unified in the distributed data base management system (DDBMS) management down, and fellowship is also finished global application.
In data bank network, database is that physics is dispersed on each node of computer network; And logical centralization is in same system.Physics disperses to refer to that each website (Site) or each node (Node) are dispersed in different places; Be a logic integral body between each website of logical set middle finger, belong to a unified data base management system.
The specific function dedicated network as the case may be, can adopt client/server (Client/Service, C/S) or browser/server (Brower/Server, B/S) pattern.
The dedicated network of specific function can be gathered related data for bulk traffic to the reconfigurability of unit business and the compatibility of data communication.
The a large amount of unstructured data types (as image, audio frequency, video) that occur along with the internet, existing database diverse network can't or be difficult to describe these data types.
For the operation conditions of certain equipment in the monitor network in computer or on other equipment, can on every equipment, camera be installed.Adopt multimedia technology, can realize the real-time video issue in the local area network (LAN).
Existing firewall technology is adopted " anti-port " technology to capture by the hacker easily, intrudes into the computer or the data equipment of fire compartment wall back, is one of its major defect.Fire compartment wall can't defending computer virus attack, also be one of its major defect.
4.1, when the specific function dedicated network is the Web Database Systems, this database Intranet is called Web database Intranet (Fig. 6).
A kind of new database application pattern can appear in the B/S pattern: procurement database service (Outsourcing).It can provide the access service of Web server and database to the user; After user's registration, can obtain a user name, password, domain name and certain disk and database space.The user can login this database with browser; Develop the application program of oneself; Also can be after our unit's exploitation be finished, in the assigned catalogue of uploading onto the server again.Like this, as long as the user concentrates on the development of application program, and needn't consider the work such as management, maintenance and data backup of server.It in improving, the computer application level of subsection provides good platform.
Network technology in the Web database combines the advantage of relational database technology, has merged the achievement of technique of internet, memory technology and retrieval technique, adapts to application based on the internet with brand-new functional structure.
Visit database by the Web technology, do not need to develop special client-side program, the database application of use can realize that the user is the visit data library information easily by browser; The organizational form of Web information is a html language, and the Web server of use and browser are all followed this standard; All having ready-made browser available on the various operating systems, is a html document that Web server is write, and can be browsed by the browser of all platforms, can realize real cross-platform operation like this.
Existing relational database system model is simple, is unfavorable for expressing complex data structures.It can't contain the more data type except structurized numeral or character.
Existing relational model of database is too simple, is unfavorable for expressing complex data structures,
4.2, when the specific function dedicated network be that (Object Oriented Database System, OODBS) during system, this database Intranet is called object-oriented database Intranet (Fig. 7) to object-oriented database.
The object-oriented database Intranet is the product that OO method and technology combine with database technology.It adopts Object-Oriented Programming method, is basic element with a kind of stable objective reality entity object in the objective world, and with " class " ' and " succession " expression things between the general character that has and the internal relation that exists between them.
The object-oriented database Intranet satisfies two standards simultaneously: at first it is Database Systems, possesses the basic function of Database Systems; Secondly it is an object-oriented system, fully supports indignant thought of complete object-oriented and mechanism.Promptly object-oriented database network is the storage and the manager of lasting, a sharable library of object.
The object-oriented database Intranet with data as the object storage that can obtain again and share automatically, be included in the object is to finish the instruction of each association database transaction, these objects may comprise data of different types, existing data and processing procedure had both been comprised, also comprise sound, figure and vision signal, object can be shared and reuse.These characteristics of object-oriented database Intranet can become easily software development by reusing and set up new multimedia application ability, and these application can combine data of different types.
Existing OODBS can not with the relational database compatibility, " passage " or " bridge " that relational database and object-oriented database are transformed mutually is not provided so that the user as required, bring into play two kinds of databases advantage separately.It does not support SQL simultaneously, need the routine interface different with SQL.The advantage that this just loses the versatility aspect is very limited its application.
4.3 when the specific function dedicated network is that (Multimedia Database System, in the time of MDS), this database Intranet is called multimedia database Intranet (Fig. 8) to multimedia database system.
The object of multimedia database Intranet develops into various types of information medium such as comprising figure, image, sound and character from the information medium of traditional single character types.Its comprehensive multimedia technology and database technology; Be one by set that some multimedia objects constituted.Wherein data object is organized in together by certain mode, can be other application and shares.
Multimedia database Intranet principal character is:
1) can represent and handle multiple media data.The method for expressing of multi-medium data in computer be decided by various media datas intrinsic characteristic with related.Formatted data to routine uses conventional data item to represent; To nonformatted data,, will decide method for expressing according to the characteristics of these medium as figure, image, sound and video etc.Medium of the same race also have different storage formats simultaneously.
2) can reflect and manage the characteristic of various media datas, or the association of space between the various media data or time.In the objective world, various media informations have itself characteristic or various media information between exist certain related naturally.These associations comprise sequential relationship (as temporal synchronizing characteristics) and space structure (being integrated in as relevant information in the expression of space of a rational deployment).
3) function of search that can provide the suitable nonformatted data stronger to inquire about than traditional data base management system.It allows to search for simultaneously the data in a plurality of databases, allows to wait index to come search data by the analysis of nonformatted data being set up diagram, allows to search for various media datas etc. by the determined value and the fuzzy value of scope, knowledge and other descriptors.Can cross-call and fusion visit between these data.
4) can real-time, interactive.Do not have the interactivity between multi-medium data and the user, just can't utilize multi-medium data.
5) can provide transaction and version management function.
Existing most of multimedia database management system is only limited in specific multimedia application field.A lot of multimedia applications also only relate to the processing to multimedia file, seldom utilize multimedia database as data source.
4.4 when the specific function dedicated network was knowledge data base (Knowledge Database) system, this database Intranet was called knowledge data base Intranet (Fig. 9).
The knowledge data base Intranet can manage the knowledge store of being made up of a large amount of facts, rule, notion, and provide convenience to the user retrieve fast, means such as inquiry.It is the needs of finding the solution at a certain (or some) field question, the knowledge collection that interknits that adopts certain (or some) knowledge representation mode to store in computer storage, organize, manage and use.These knowledge comprise the knowwhy relevant with the field, factual data, heuristic knowledge that is obtained by expertise etc.
The knowledge data base Intranet has intelligent, and its characteristics are:
1) application feature, background characteristics, use characteristic and the attributive character etc. according to knowledge are configured the organizational form of being convenient to utilize, structure is arranged.Knowledge data base generally is modular.
2) knowledge in the knowledge data base generally is stratified.Lowermost layer is a fact knowledge, and the intermediate layer is to be used for controlling true knowledge, and highest level is a strategy, and it is a controlling object with intermediate layer knowledge.Strategy is considered to the rule of rule.
3) a kind of knowledge-confidence level that not only belongs to the special shape of a certain level (level perhaps in office all exists) is arranged in the knowledge data base.To a certain problem, relevant facts, rule and strategy all can be marked with confidence level.Because all belong to definite type in the processing of database; So there is not uncertainty measure.
4) there is a special part that is commonly called the typical method storehouse in the knowledge data base.If the solution route for some problem is to affirm with inevitable, just can directly be stored in it in typical method storehouse as the quite sure problem solution route of a part.The storage of this macroscopic view will constitute another part of knowledge data base.When using this part, machine inference will be only limited to certain one deck body portion of selecting for use in the typical method storehouse.
Existing knowledge data base system possesses the method for expressing to knowledge; Organization and administration to knowledge systematize; The operation of knowledge data base, inquiry and retrieval; The obtaining and learning of knowledge; The editor of knowledge; Functions such as the management in storehouse.
4.5 when the specific function dedicated network was fuzzy database system, this database Intranet was called fuzzy database Intranet (Figure 10).
Fuzzy database is the combination of database technology and fuzzy theory.Ambiguity is an important attribute of objective world.The fuzzy database Intranet is the Database Systems of storage, tissue, management and operation fuzzy data.Computing on the contact of the data structure of fuzzy data and data, the data and operation, the constraint (comprising integrality and fail safe) of data, database window User, the consistency of data and the definition of nonredundancy etc. that the user uses are all blured.Precise information is the special case of fuzzy data.
Existing fuzzy database system possesses the method for expressing to fuzzy data; Organization and administration to fuzzy systemization; The operation of fuzzy database, inquiry and retrieval; The obtaining and storing of fuzzy data; The editor of fuzzy data; Functions such as the management of fuzzy database.
When specific function dedicated network technology was applied to specific field, several data storehouse Intranets such as engineering data base (Engineering Database), geographical data bank, staqtistical data base (Statistical Database), scientific library, spatial database (Spatial Database) and bibliographic data base can appear.
The development of existing database technology presents the trend that combines with multiple subject knowledge, and every field that has data (broad sense) to produce just may need the support of database technology.After they combined, a kind of new database member will appear.
5, the data bank network of certain unit or database Intranet system, can and the affiliate of unit internal network between, carry out information interchange and safeguard protection be provided, prevent unauthorized access to data bank network or database Intranet system.In order to reach this target, can allow affiliate's the excellent machine of one or several internal networks, by being housed, this unit distinguishes the machine of distinguishing of the standardization program of machine, authentication and authoring program respectively, be connected with the internet.One or several internal networks of the data bank network of this unit or database Intranet system and this affiliate, by distinguishing that separately machine links to each other with the internet, make up the proprietary network of a safe and reliable and information mutual communication, be called the database extranet (Figure 11) of unit.
Between two main frames of disparate databases Intranet and affiliate's internal network, pass through the internet; Safety is as follows with accurately communicate by letter (Figure 11):
The information that the server class computer of the source end computer from database Intranet or affiliate's internal network or the business of unit sends; Through the excellent machine of source end, arrive the source end " program of audit program " is housed and source ends such as " source end encipherors " is distinguished machine; Through elimination virus with after encrypting; Pass through the internet; Distinguish machine to the Su Duan that " place end decrypted program " and " program of audit program " etc. are housed; After deciphering and checking virus; Forward the excellent machine of place end to; Arrive the server class computer of the business of place end computer or unit at last.Like this, distinguish that machine all can monitor the information that passes in and out this database Intranet or affiliate's internal network for every, and refusal is illegally to the visit of this database extranet.
It can pass through tracing system, the feedback of product quality is dissolved in each link of research and development and production, obtains better product by improving.
The existing virtual network technology that outreaches is carried out illegal internal institution resource access and deception for the address that outreaches network or dedicated network by camouflage, and is powerless; Also can't avoid the hacker to get around authentication and authentication scheme, the camouflage identity is destroyed existing inner computer and is connected.
6, the remote client of unit after the internet is connected, can be logined unit data storehouse extranet or database Intranet, realizes safe and reliable information interoperability between these networks.The common system that forms in these client computer, database extranet or database Intranet and internet is called remote access internet, unit data storehouse, is called for short database access net (Figure 12).It is by the unit remote client that " program of audit program ", " source end encipheror " and " place end decrypted program " etc. are housed, be connected to after the internet, with database extranet or the common system that forms of database Intranet, be used to provide safety and the precise information visit of long-range mobile subscriber to unit data storehouse extranet or database Intranet.
Remote client is equipped with " to the authentication and the authoring program of unit " function etc., can discern the various information of coming in from the Internet.It only allows the information of the computer in the excellent machine network of source end of this unit, after deciphering, enters into remote client.
Pass through the internet between two main frames of disparate databases Intranet, affiliate's network or remote client; (Fig. 9) is as follows in secure communication:
The information that source end computer from database Intranet, affiliate's network or remote client sends; Through the excellent machine of source end, arrive the source end " program of audit program " is housed and source ends such as " source end encipherors " is distinguished machine; Through elimination virus with after encrypting; Pass through the internet; Distinguish machine to the Su Duan that " place end decrypted program " and " program of audit program " etc. are housed; After deciphering and checking virus; Forward the excellent machine of place end to; Arrive place end computer or remote client at last.Distinguish that machine all can monitor the information that passes in and out this database Intranet, affiliate's network or remote client for every, and refusal is illegally to the visit of this database access network.
The method of the granted access that the remote client authentication will realize: the visit information on the internet, pass through authentication and the mandate of the machine of distinguishing of visit net to this client computer.
Existing remote access vpn technology can't be carried out corresponding safety encipher according to the different safe class of part paragraph in the file; For many address spoofings that carry out illegal internal resource visit by camouflage remote access address, powerless.
Chuan Shu database access net information flow is through encryption, end-to-end and authentication on the internet; Guarantee information confidentiality, integrality and authenticity; Ability with opposing assault network.
Description of drawings
Fig. 1 database local web frame figure.It is server class computer, specific function dedicated network and other the database facility of the business of the excellent machine of Jiang Yitai, some units, the local area network (LAN) that directly is formed by connecting by network interface unit and telecommunication cable.But database local netting gear has interoperability, portability, putting property of extensibility Shrink and plug and play feature.It generally is with the distributed principle that is controlled to be, the control structure of employing system, subsystem and module stagewise; Its structure is transplantable and transparent.
Fig. 2 network data base structure chart.Excellent machine in several local area network (LAN)s all passes through input/output interface separately, distinguishes that with one the machine output/input interface is connected respectively; Each distinguishes that machine all is connected with the internet by router; Set up into the database wide area network.It can either inherit the precious resources of existing database structure, guarantees the utilization of existing resource and the normal operation of existing internal proprietary network; Simultaneously can formulate unified standard again, guarantee the standardization of software, hardware, communication, for unit expansion is in the future allowed some leeway.
Fig. 3 network data library structure backup automation scheme figure.The system backup automation solution of network data base can be made up of backup client, active and standby part of server, media server, redundant memory cell and backup management software etc.Backup client typically refers to application program, database or file server; Expression can and be sent to data the component software of backup server from reading of data in the online storage; Active and standby part server is used for arranging backup and resuming work, and service data deposit medium; Media server is that the instruction according to active and standby part server copies data on the backup medium.Redundant memory cell is tape, disk or CD.
Fig. 4 data bank network structure chart.Data bank network is a network that the network data base of same unit or group is connected with service-specific network or other dedicated networks etc. and energy interoperability between them.In the data bank network, between two main frames of heterogeneous networks database and various private network, can pass through the internet; Carry out safety and communicate by letter accurately.
Fig. 5 database Intranet structure chart.The general headquarters of unit and its are distributed in the excellent machine of trans-regional each internal networks such as several branches of diverse geographic location, respectively by distinguishing machine, get up with Internet connection, are configured to data network.The private database network and the data network of unit, the common network of forming is the database Intranet.Can safety between data network and the data bank network and accurately interconnected, intercommunication, interoperability.
When Fig. 6 was the Web Database Systems when the specific function dedicated network, this database Intranet was called Web database Intranet.
When Fig. 7 was OODBS when the specific function dedicated network, this database Intranet was called the object-oriented database Intranet.
When Fig. 8 was multimedia database system when the specific function dedicated network, this database Intranet was called the multimedia database Intranet.
When Fig. 9 was the knowledge data base system when the specific function dedicated network, this database Intranet was called the knowledge data base Intranet.
When Figure 10 was fuzzy database system when the specific function dedicated network, this database Intranet was called the fuzzy database Intranet.
Figure 11 database extranet structure chart.The excellent machine of one or several internal networks of the affiliate of certain unit is distinguished the machine of distinguishing of the standardization program of machine, authentication and authoring program by this unit is housed respectively, is connected with the internet.One or several internal networks of the intranets systems of this unit and this affiliate by distinguishing machine software and internet, make up a safe and reliable and information mutual communication proprietary network.
Figure 12 database access anastomose composition.The remote client of unit after the internet is connected, can be logined unit data storehouse extranet or database Intranet, safe and reliable interoperability between realization and these networks.The common system that forms in these client computer, database extranet or database Intranet and internet; Be used to provide safety and the precise information visit of long-range mobile subscriber to unit data storehouse extranet or database Intranet.
Embodiment
Free, open Computer Database network and various combination thereof can move integrating on the various computer platforms, can with the network interoperability of other system, and can provide a kind of interactive mode of unifying style to the user.
1 database local net (Fig. 1) is the product that the service technique of local area network technology and unit combines, and depends on the topological structure of shared network.Excellent facility have microprocessor and memory, and input button, display etc. are housed.Its memory integrated circuit has the circuit of data storage (EEPROM), working storage (RAM) and program storage (EPROM).Excellent machine deposit network operating system (Network OperatingSystem, NOS).The resource of its control area net, the operation of operation local area network (LAN); And business that can a plurality of units of concurrent running.
Excellent machine generally adopts more than the CPU32 position; More than the main frame frequency 20MHz; Internal memory 8MB is above and be furnished with the harddisk memory of enough capacity.It is excellent machine server, and the operational network operating system software manages the communication between the business of each unit, and the resource of the business of management unit and user are to the use of these resources.Excellent machine generally adopts wavelength-division, time-division or control in real time; Have disposal ability multi-functional, multitask, support the data format of production task, can in time transmit and handle specific tasks, and the enforcement of the automated production of the business of driving unit.
The server class computer of the business of each unit couples together by the communication transmission cable of network interface unit and database local net, makes can both to intercom mutually between any station server class computer and can share excellent machine Internet resources (Fig. 1).
NetWare386 has made full use of the microprocessor performance of Intel microcomputer series, is the industrial standard of local area network (LAN).It is a multitask, multiple-user network operating system; Be installed on the excellent machine.The shell of the professional internal memory NetWare of unit (NetWare Sell), user's service request of the business of intercepting unit, and judged.If, just the server class computer of the business of the request unit of giving is handled to the visit of the business of this unit; If, then request is delivered to excellent machine to the request of excellent machine, handle by excellent machine, again the result is sent back to the user.
Each server class computer of excellent machine network or Database Systems also can directly communicate with business information by transmission medium and exchange.It can also to the transmission various information implement security hierarchical managements: for some the part paragraph in the information, can also carry out corresponding safety encipher according to its different safe class.
Excellent facility have read, the business of the unit of translating and all logic functions of server class computer, the various functions of business that can identification unit.
Excellent machine has various standard interface circuit, also has some special interface circuits, so that interconnect with the interface circuit of the business of special unit etc.
Excellent machine also includes excellent machine network is managed, and guarantees its safe and reliable supervisor.It sends the document except the business that can give unit in the excellent machine network, can also be according to the needs of the concrete request of the business of unit, do some other thing (as the data of input, write database or to its data inquire about, add, processing such as modification and deletion, and the business of the result unit of sending to that needs etc.).
Browser provides the device of the microprocessor that browser software is housed that uses to the user and display etc. among Fig. 1.The program (comprise a plurality of application programs, and utilize the determined program of object name to solve this object) of access and display message wherein is housed.
The specific function dedicated network of database local net stores the production of this unit or the data of task among Fig. 1.It in time closes this library file to after the data library file operation, in order to avoid artificial misoperation or other faults take place, and cause the damage of Current Library file.After the list structure definition of database, can make amendment as required.
(Network File System NFS) allows application program to open a telefile to the NFS of database local net, moves to an assigned address hereof, and begins to read and write data in this position.
Server can adopt the operating system software of DOS, UNIX/Linux or Windows etc.The general Linux that adopts.
The operating system of server generally adopts the Linux kernel software.Linux has inherited the design philosophy of UNIX core; Therefore highly effective and safe is latent fixed.Linux server continuous operating time generally be with year as unit.Linux supports the multiple hardwares platform.It can be at PC, work station, even moves on the large-scale computer, and can move on the architecture of main flows such as x86/MIPS/PowerPC.Linux is a kind of and the operating system UNIX compatibility.It both can be applied to PC, can be applied to the webserver again.
Linux kernel adopts modular structure, and its main modular comprises: the guiding of storage administration, CPU and management of process, file system management, equipment control and driving, network service and system, system call etc.Linux allows the kernel of user according to the actual disposition customization Linux of the business of own unit, thereby simplifies linux kernel effectively, improves system start-up speed, and discharges more memory source.
The software platform of the business of unit has determined the result of its working method, operating efficiency and production thereof to a great extent.
The linux system structure is divided into two attitudes: user's attitude and kernel mode.
In kernel mode, operating system and CPU are without any restriction.Program can be carried out all level of privilege instructions, and code can be visited all Installed System Memories.The privilege level of operating system software is higher than application software.By this mechanism, the improper activity of application program can not destroy the stability of system on the whole.
The graphic user interface that Linux provides (GUI) scheme is industrial standard X-Window System.Its similar Windows graphical interfaces.The user can use the mouse convenience, intuitively and quickly operate.Linux is being better than other operating system aspect communication and the network function; Be multitask, multi-user's operating system, can support a plurality of users to use simultaneously and system resources such as the disk of shared system, external equipment.
One of X-Window System most important character be it with device-independent structure.Any hardware needs only and the X protocol-compliant, just can carry out the X program and show a series of windows that comprise picture and text, and not need to recompilate and link.
X-Window System is based on the foundation of Client/Server structure, has the transparency of network operation.The window of application program may be displayed on the screen of computer own, also can be presented on the screen of other computers by network.
X-Window System can use various window managers, obtains the operation interface of many different-styles.
X-Window System is not the essential component part of operating system.For operating system, X-Window System is an optional application component.
X-Window System is the project of increasing income, and can obtain source code by network or other approach.
The appearance of X-Window System graphic user interface makes that the operation of Linux is more simple and convenient on the one hand, also provides running environment for many application programs (as PaintShop) on the other hand, enriches the function of Linux.
(SuSE) Linux OS itself and X-Window System separate.Operating system code operates in kernel state and has the right access system data and hardware.X-Window System operates in user's attitude, and the interface that can use and the authority of access system data are restricted.When X-WindowSystem call operation system program, processor is caught this and is called, and then the thread that calls is switched to kernel mode.After the operating system service was finished, it switched reuse family attitude with thread context, allowed caller to continue operation, and just as an Interrupt Process process, only the Interrupt Process operating system that become kernel state is called.Therefore in the X-Window System graphic user interface during working procedure if fault generally can normally withdraw from, can not influence the program of moving other textual interfaces under, do not need to restart computer yet.
Linux utilizes Shell order and relative program and file just can realize basic functions such as system management, network service under textual interface.Shell is the interface between user's attitude and the operating system nucleus, plays the consistency of coordinates user and system and carries out mutual between user and system.
Server class computer software is the special-purpose software of working out for the professional every function that realizes unit, is also referred to as Control Software.It leaves among the EPROM of server class computer.The function setting and the controlling schemes of the business of various units have nothing in common with each other, and mainly determine according to concrete requirement.
The basic function of the database of unit is made up of a plurality of functional modules; Different software configurations is also different with way to manage to the arrangement of these functional modules.Its feature is multitask and real-time, and the corresponding software technology that can adopt is that multitask is handled and multiple Real-time Interrupt Processing simultaneously.It is to make server class computer finish the identical or different work of two or more character at synchronization or in the same time interval that multitask is handled simultaneously.In the multiple Real-time Interrupt Processing system, interrupt management is mainly finished by hardware, and the software configuration of the database of unit then depends on the interrupt structure of system.The every real-time task of the database of unit is arranged to other interrupt service routine of different priorities or height order execution according to priority in same interrupt routine.
The interrupt-type infrastructure software is arranged in the various functional modules of the database of unit respectively in the interrupt service routine of different stage except initialize routine.The management and dispatching of the business of unit mainly solves by the intercommunication mutually between each interrupt routine.。
The input data processor function of server class computer: the program that receives or work out the manufacturing or production task, with the production instruction and data that database program is represented with standard code decipher, data processing, and assembler and data form in accordance with regulations deposited.Wherein input program mainly contains two tasks, and one is from optical mark reader or keyboard input production task, programs and it is left in the task program memory; Another is from the task program memory production routine section to be accessed piecemeal outward, sends into buffering area, so that decoding is used.
Application software is manufactured for operation or software, automatic programming software and the assistant software thereof of task, for example CAD/CAM software etc.It need pass through the systems soft ware of the business of unit, could be related with computer hardware.
In automatic programming software, press the input mode of programming information, can be divided into: batch processing mode automated programming and human-computer dialogue formula automated programming.
The business of unit can at one time or be finished the identical or different work of two or more character in the same time interval.This need realize the multi-task parallel processing to each functional module of server class computer software.For this reason, can in the server class computer software design, adopt the resource timesharing to share parallel processing and the overlapping flowing water parallel processing technique of resource.
The resource timesharing is shared parallel processing and is applicable to single processor system, and main the employing shared the parallel processing that solves multitask to the timesharing of CPU.The overlapping flowing water parallel processing of resource is applicable to multicomputer system, is two or more tasks of handling in the same period time interval.Because the technical finesse mode difference of two kinds of work, the business software of corresponding unit also can be designed to different version.Different software configurations, to the arrangement difference of each task, way to manage is also different.Bench-type software configuration and interrupt-type software configuration before and after wherein having.
The business of enterprise is the diversification of database structure, is applicable to industry-by-industry in the industrial circle.It by RS-232 and RS-422 serial line interface closely, forms various types of production line series with the computer equipment of one group of difference in functionality; Carry out the several data exchange with server class computer.
The business of enterprise is used extensive and very lagre scale integrated circuit (VLSIC), can reduce the failure rate of the business of unit significantly.It also has the fault diagnosis system of artificial intelligence (AI) function simultaneously, promptly various failure causes and the method for disposal thereof that brainstrust is grasped is stored in the database as knowledge base, with the knowledge base is according to developing software, analyze and search failure cause, proposing the method for fixing a breakdown.
2, an excellent machine in several data lans of certain unit all passes through input/output interface separately, distinguishes that with one the machine output/input interface is connected respectively; Each distinguishes that machine all is connected with the internet by router.This just sets up into the proprietary data wide area network of this unit, is also referred to as network data base (Fig. 2).The machine of distinguishing generally adopts more than the CPU32 position; More than the main frame frequency 20MHz; More than the internal memory 4MB.
For the mininet database, the program module of excellent machine can directly be inserted on the expanded function groove of the machine of distinguishing.It is excellent machine and distinguish that machine directly merges.
Network data base satisfies interactive application and stability requirement; Has interoperability; Can distinguish the different security requirements of each several part of a concrete file; The foundation structure that can use public-key authenticates and encryption key distribution.
Just in case network data base suffers virus attack on the internet, also only distinguish the machine paralysis, can't having influence on wherein, data lan normally moves.
The machine of distinguishing also can all external references of detail record; Prevent the unauthorized access of external information on the internet simultaneously.It makes the visit of the business of extraneous excellent machine or unit for database local net, can only concentrate on the machine of distinguishing earlier.This just guarantees the reliable and safety of the business of all excellent machines that the database local is online or unit.The machine of distinguishing also allows coupled excellent machine, by the internet, transmits and receive the enciphered message of other database local nets of native system.
In the network data base, the machine of distinguishing of database local net not only contains the program of work station, (messageauthentication code, MAC) technology is encoded to the transmission data, guarantees to be subjected to the information integrity of malicious attack but also can adopt message authentication codes.Its typical encoding mechanism is cryptographic hash (cryptographic hashing) mechanism.
Backup software provides complete data protection (Fig. 3).For example Veritas NetBackup software adopts the level Four hierarchical structure, and centralized management adapts to multiple application structure.Its technical characterstic is that flexible setting, disaster recovery, parallel processing, data are reliable, easy to use, monitoring capacity and system data recovery etc.
For the database local net among the network data base, the miscellaneous service that may handle is placed in online storage (OnStore) equipment at present, guarantees to read at any time these information.For taking precautions against contingent data disaster, use offline storage (OffStore) equipment that these professional data are carried out back-up storage.
Fault can utilize DB Backup (Backup) that database is reduced (Restore) after taking place, and utilizes journal file (Log) that database is recovered on the basis of reduction then, rebulids a complete database.The basis of recovering is Database Backup and journal file.Have only complete DB Backup and journal file, just complete recovery can be arranged.
Use virtual memory (Storage Virtualization) backup management software, a transparent storage system can be provided.According to the instruction of database local net, automatically the inactive data automatic archiving under the archival back-up catalogue is backuped in nearline storage (NearStore) equipment, the historical data automatic archiving is backuped in the offline storage equipment.
3, in data bank network (Fig. 4), each distinguishes that machine is equipped with identical " program of audit program ", " source end encipheror " and " place end decrypted program " standardization program.Like this, distinguish that machine all can monitor the information that passes in and out excellent machine network for every, and refusal is illegally to the visit of unit data storehouse network.
For the internal network that has numerous data bank networks, satisfy the requirement of interactive application and stability; Has interoperability; Can distinguish the different security requirements of a concrete file; The foundation structure that can use public-key authenticates and encryption key distribution.
The machine of distinguishing generally adopts more than the CPU32 position; More than the main frame frequency 20MHz; More than the internal memory 8MB.
In data bank network, each distinguishes that machine also can be equipped with identical " to unit authentication and authoring program " standardization program, and these distinguish the Access Control List (ACL) that each Hostname (perhaps address) in each IP address table of distinguishing machine and each excellent machine network is all arranged in the machine.Like this, distinguish that machine all can monitor the information of excellent machine network of turnover data bank network for every, and refusal is illegally to the visit of internal institution network.
Data bank network must be considered following pith.
1) hardware
Hardware resource is the material base of supporting database system.Hard disk is the equipment and the place of stored data base and backup thereof.Enough big hard drive space is the prerequisite of fulfillment database system; Higher I/O disposal ability is the necessary condition that guarantees Database Systems efficient.Excellent machine, server and distinguish the memory size of machine and the CPU processing speed also influential to system effectiveness.As internal memory very little, make spatial cache limited, the access speed of data can descend.Therefore, selected host performance must be complementary with the application scale.
2) software
Except network operating system, data bank network must select a suitable DBMS for application programming, also should choose high-level language and the application development tool thereof coordinated with DBMS.
For trans-regional or global enterprises, group and industry, though department disperses contact closely, the Decentralization of the existing part of way to manage has overall Collaborative Control again.Data bank network is a kind of database application system that adapts to Local treatment and the collaborative work of overall situation processing energy.
The main distinction of data bank network and existing distributing Database Systems is whether support global application.So-called global application is meant the database that relates to two or more nodes in the application.
Existing distributing Database Systems are simple networkings of some centralized data bases.It can only carry out the application of this node database of access and the application of another node of access (remote node) database, does not support global application.In the data bank network, the user can also carry out global application by client computer except carrying out the topical application the database in the home server by client computer.
The main distinction of data bank network and existing multiple processor system is whether support topical application.
Though existing multiple processor system also is dispersed in data among the different DB, but do not contact directly with application system, all handle by front-end processor, each background server can not be carried out the topical application of oneself by itself, the physical distribution of data is not the distribution for application, still is centralized DBS.Data bank network not only requires the physical distribution of data, and to require this distribution be application oriented.
4, in the database Intranet (Fig. 5), each of unit distinguishes that machine is equipped with identical " program of audit program ", " source end encipheror " and " place end decrypted program " standardization program.Distinguish that machine all can monitor the information that passes in and out excellent machine network or dedicated network for every, and refusal is illegally to the visit of internal institution network.
In the database Intranet, each of unit distinguishes that machine also can be equipped with identical " to unit authentication and authoring program " standardization program, and these distinguish the Access Control List (ACL) that each Hostname (perhaps address) in each IP address table of distinguishing machine and each excellent machine network is all arranged in the machine.Distinguish that machine all can monitor the information of excellent machine network of turnover internet for every, and refusal is illegally to the visit of internal institution network.
Be based upon a database application of client/server, what finish at server end is management, tissue and the processing of data, and data, services promptly is provided; In transmission over networks is the request of client computer and result or the information that server returns; What finish at client-side is Business Processing and User Interface.Therefore client computer, server and middleware constitute the foundation structure of Client.
Server can provide at a high speed, jumbo memory function, powerful data processing and management function, and the function of a plurality of processes of concurrent running.It also provides functions such as communication and transaction; Generally be divided into file server, database server, task server and other servers etc.
Client computer is made up of GUI and application code, and application program proposes the request of data library inquiry, and such request is sent to server.It is mainly finished the interface and represents and some logic of business functions.The interface presentation logic reflects the business processing logic of application program on the one hand, and end user's use interface is provided on the other hand.The user visits various servers by client interface, is served accordingly, comprises mutual with all peripheral hardwares (terminal) and other I/O equipment.Client queries generally is to propose with SQL, MIRS and QBIC (Query By Image Content) etc.Database server acceptance and SQL, the MIRS or the QBIC that carry out from a plurality of client computer inquire about.Database server only selects to satisfy the data of SQL, MIRS or QBIC querying condition when carrying out SQL, MIRS or QBIC request, then the data of selecting are handled as requested, passes the client computer of the request of sending after finishing back.
Middleware (Middleware) is the collection of software engineering, and the coupling part between the general reference client-server is also referred to as interface software.It can be divided into universal middleware and special-purpose middleware.Universal middleware is diverse network operating system and diverse network host-host protocol.Special-purpose middleware is database middleware (based on the isomeric data repository interoperation of SQL, MIRS or QBIC), transaction middleware (based on RPC etc., share the different server resource), assembly middleware (Email and Lotus Notes etc.), object middleware (client computer can be called the object that resides on the remote server) and DDSM middleware (manager with act on behalf of and can engage in the dialogue) etc.
In order to construct the various databases of realistic application, must solve from architecture to a series of problems such as internet connections.Hierarchy of memory can be an independently system, or a node in the network, but at this moment caches only offers the memory of intra-node.In such system, the data of optical disk storehouse that has CD drive directly links to each other with system or links to each other by LAN.System is characteristics to have large high-speed disk (hard disk) also.
Database server is the high-grade PC that is equivalent to file server or multiprocessor, has a PC independent and that be equipped with CD server to link to each other as the CD object server with the machine of distinguishing among the wide area network WAN usually.The caches server can be placed on some different places.Other method is to use the database server that links to each other with the machine of distinguishing or another independent PC that the has large-scale hard disk caches server as the database of going up on the stage.And the high also buffer storage of network is all to be shared in this case by the user on all or the most wide area network at the object that all is stored in network cache memories to realize.
The function that is actually the database server that directly links to each other with the internet with the function of distinguishing the database server that machine links to each other is identical.Be transferred to the information of this server from the internet,, directly be given to this server by the machine of distinguishing without deciphering.The information of this server also directly forwards the internet to by the machine of distinguishing, does not need through distinguishing the encryption of machine.When this database server or dedicated network are the Database Systems of difference in functionality, just form following various database Intranet.
4.1, Web database Intranet (Fig. 6) mainly adopts C/S and two kinds of patterns of B/S.
Along with technique of internet and application and development, WWW becomes one of kernel service.The user can not only carry out the browse queries of hypertext, and can also send and receive e-mail by uniform resource locator URL on the browser, carries out work such as file transmits up and down.The B/S pattern is to be a kind of application at center with the Web technology.Need only on the browser a very little support storehouse is installed, as the dynamic link library of Java or VB.Adopt Web server in the intermediate layer.This server is accepted the request of browser, and is converted into SQL statement, passes to database server by open database interface standard ODBC or other means, and the result that database server returns is returned to browser with the html file form.Browser is actual to be exactly one standard language is converted into the resolver at interface, and application program is installed on the Web server.
In the B/S pattern, user capture application server resource is carried out with the dynamic interaction or the mode of working in coordination, and its mainstream speech is Java, HTML and XML etc.Its topmost characteristic is the independences with the hardware and software platform.The function of browser can be a multimedia browser or Java Virtual Machine.In C/S model, different OS and NOS corresponding different language and developing instruments.
Web database technology main feature is to adopt network technology and database technologys such as the processing of word table multidimensional, elongated storage and object-oriented, makes database application transfer comprehensive application based on the internet to.It adopts word table multidimensional processing mode to support non-structured multi-medium data, and various types of data can be stored in the same database, the short time of carrying out complex process of Da Da Shrink; On the other hand, it supports new programming tools such as ActiveX, can develop the transacter program that becomes increasingly complex, greatly simplified system exploitation and the difficulty of managing.
4.2, object-oriented database Intranet (Fig. 7) ability that relational database management system processing transactions ability and OODBS can be handled complex relationship and new types of data combines.
Object oriented data model is semantic abundant, and descriptive power is strong, and extendible, can allow user definition new data type and operation thereof easily.Encapsulation property and extendibility are the marrow of Object-oriented Technique.
The object-oriented database Intranet is a based on network distributed data base system.It is managed by more than one node, makes that the physical layout of database is transparent to the user.Data sharing can shared and realization on both meanings is shared in serial with parallel on the object rank.
Object-oriented database Intranet storage organization can be divided into two big classes: a class is based on the method for relation; Another kind of is the storage organization that meets object.
Each object class of relational approach leaves in the relation, and any object one enters system, and DBMS distributes to its system identifier that full storehouse is unique automatically.This identifier can not can not be changed by the user by system in the life cycle of object.Contact between object is to embody by leaving the system identifier that increases another object in the object tuple in.System sets up index to the related object class, and when customer requirements was inquired about by " polymerization " or " indignant drawing together " contact, system just can use the connection index to satisfy its all search requests.
The storage organization method that meets object, the simplest is that it is deposited by the topological order that defines in the logical model.It is fit to the characteristics of multi-medium data.The storage organization of relatively more suitable multi-medium data characteristics and B+ tree index structure or R+ that access method has EXODUS set index structure etc.
4.3 any computer on the multimedia database Intranet (Fig. 8) can carry out safety and accurate transfer of data with another computer.Its multimedia index and searching system MIRS are meant the technology of using DBMS, information retrieval IR and content-based retrieval etc. to combine, and a fundamental system of multimedia information retrieval is provided.
Web frame is flexibly with expansion in the multimedia database, can support various application, query type and content (feature).MIRS comprises a large amount of functional modules or manager.It can increase new manager so that the function of expansion MIRS.New manager can be deleted or substitute former manager, so that function is upgraded.
The multimedia database Intranet another be characterized as distributedly, comprises a large amount of servers and client computer.Its storage medium: removable hard disk, tape backup medium and CD archives medium.
The multimedia database Intranet satisfies outside physical data independence and the logical data independece, also satisfies media data independence.
The data operation system of multimedia database Intranet, except can finish with the conventional database systems identical operations, many new functions also are provided.The multimedia database Intranet has open function, and the application programming interfaces API of MDB is provided, and the interface that is independent of peripheral hardware and form is provided.
The multimedia data model that the multimedia database Intranet comprises conceptual modeling and expresses simulation.
4.4 knowledge data base Intranet (Fig. 9) is an artificial intelligence technology and the combining of database technology.
The knowledge data base Intranet can be applied to a class data network that produces in the data processing field of science and technology to data base method.The information of wherein depositing is the data that scientific and technical personnel produce and accumulate in Activities such as research, scientific experiment and exploitation.
The knowledge data base Intranet has the method for expressing to knowledge; Organization and administration to knowledge systematize; The operation of knowledge data base, inquiry and retrieval; The obtaining and learning of knowledge; The editor of knowledge; Functions such as the management in storehouse.
4.5 fuzzy database Intranet (Figure 10) is the combination of data network technology and fuzzy theory.
Fuzzy relational database is well used in fields such as pattern recognition, process control, merit detection, medical diagnosis, engineering design, nutrition consultation, public service and expert systems.
5, in the database extranet (Figure 11) of unit, the excellent machine of one or several internal networks of the affiliate of unit by distinguishing machine, is connected with the Internet respectively.One or several internal networks of the data bank network of unit or database Intranet and the affiliate of this unit so, separately the machine of distinguishing and the Internet just make up a safe and reliable database extranet (Figure 11).The machine of distinguishing of the data bank network system of affiliate's the machine of distinguishing of identical " program of audit program ", " source end encipheror " and " place end decrypted program " standardization program and unit or tissue wherein is housed, the capital is monitored the information that passes in and out excellent machine network, and the illegal visit to data bank network or database Intranet of refusal.
In the database extranet, each distinguishes the machine of distinguishing that machine is connected with the network of affiliate's appointment, identical " to unit authentication and authoring program " standardization program also can be housed, and these distinguish the Access Control List (ACL) of each Hostname (perhaps address) in the network that each IP address table of distinguishing machine and excellent machine network and affiliate's appointment are all arranged in the machine.Like this, distinguish that machine all can monitor the information of the excellent machine network of turnover database extranet for every, and refusal is illegally to the visit of internal institution network and affiliate's network.
With the unit or the machine of distinguishing of organizing excellent machine network to be connected, " program of audit program ", " source end encipheror " and " place end decrypted program " etc. are housed, can decipher the various information of coming in from the Internet, and only allow the information of the computer in the source-end networks of the excellent machine network of other source ends of this unit or tissue or affiliate's appointment, after deciphering, enter into the receiving computer of the excellent machine network of this place end.
The machine of distinguishing that is connected with the network of affiliate's appointment, " program of audit program ", " source end encipheror " and " place end decrypted program " function etc. are housed, can decipher the various information of coming in from the Internet, and the computerized information in the excellent machine network of the source end that only allows this unit or tissue, after deciphering, enter into affiliate's the excellent machine of place end, be transmitted to receiving computer again.
In data bank network, each of unit or tissue distinguished the machine of distinguishing that machine is connected with the network of affiliate's appointment, identical " to unit or organize authentication and authoring program " standardization program also can be housed, and these distinguish the Access Control List (ACL) of each Hostname (perhaps address) in the network that each IP address table of distinguishing machine and excellent machine network and affiliate's appointment are all arranged in the machine.Distinguish that machine all can monitor the information of the excellent machine network of turnover database outer network for every, and refusal is illegally to the visit of unit or organization internal network and affiliate's network.
6, the common system that forms in remote client, data bank network and the Internet of " program of audit program " of the unit of being equipped with, " source end encipheror " and standardization programs such as " place end decrypted programs " is database access net (Figure 12).Remote client is with after the Internet is connected, data bank network that can the unit of login.The machine of the distinguishing function of user's remote client and unit data storehouse network sends the user or the information that receives is transmitted guarantee information transmission safety reliability on the internet by ciphertext.
Between remote client and unit data storehouse Intranet or extranet, carry out interoperability by the Internet, also can adopt high data encryption of Cipher Strength and identity identifying method.General public key algorithm (the Public-Key Crypto-graphic Algorithms) technology that adopts is carried out authentication and cipher key change; Adopt the symmetric cryptography decryption technology to carry out the encryption and decryption of information.
Remote client is equipped with " to unit authentication and authoring program " function; The machine of distinguishing of unit data storehouse network is equipped with after " to user's authentication and authoring program " function, and each of remote client and unit distinguished the Access Control List (ACL) of each Hostname (perhaps address) in IP address table that these remote clients is all arranged in the machine and distinguish machine and the excellent machine network that is allowed to visit.User's remote client and unit data storehouse network are distinguished the function of machine, the user are sent or the information that receives is transmitted by ciphertext on the internet, and guarantee information transmission safety reliability prevents that significant data is stolen on the internet.
Be equipped with " to user's authentication and the authoring program " that be connected with the excellent machine network of unit data storehouse Intranet among Figure 12 distinguishes machine, " to the authentication and the authoring program of unit " remote client perhaps is housed, can encrypt various information, and the information of excellent machine network of the source end that only allows this unit and remote client, after encrypting, enter into the Internet.
The machine of distinguishing that is connected with unit excellent machine network, " to user's authentication and authoring program " function etc. is housed, can discerns the various information of coming in, and only allow the information of remote client from the Internet, after deciphering, enter into the receiving computer of the excellent machine network of this place end.
Remote client is equipped with " to the authentication and the authoring program of unit " function etc., can discern the various information of coming in from the Internet.It only allows the information of the computer in the excellent machine network of source end of this unit, after deciphering, enters into remote client.
Main frame in (outward) networking in the remote client of database access net and the database is by carrying out safety and communicate by letter accurately in the Internet.The database access net is used to provide the secure access of long-range mobile subscriber to unit data storehouse Intranet, is the private network of non-fixed line; For multi-form access technique,, just can realize this technology as long as upgrade the access strategy of dedicated network.
7, the various data networks of this paper can also by different simplification or combination, form new other different data network systems according to actual needs.
Claims (10)
1, several database local area network (LAN)s of certain unit or an excellent machine in the data dedicated network all pass through input/output interface separately, are connected with an output/input interface of distinguishing machine respectively; Each distinguishes that machine all is connected with the internet by router, just sets up into the proprietary database wide area network of this unit, is network data base.
Network data base is a kind of data acquisition, operation, processing and memory module; Wherein comprise browser, server, client computer and database server etc. in the database local net.
2, other service-specific computers of the network data base of same unit or group of unit and this unit and computer equipment etc. are common forms after each local area network (LAN), each local area network (LAN) (perhaps wherein excellent machine) is respectively by distinguishing that machine is connected with the internet with router, mutual group build up this unit proprietary, the data wide area network of interoperability safely, be data bank network.In the data bank network, between two main frames of LAN, pass through the internet; Can carry out safety and accurately communicate by letter.
3, the general headquarters of unit and its are distributed in the excellent machine of trans-regional each data bank networks such as several branches of diverse geographic location and specific function dedicated network etc., respectively by distinguishing machine and Internet connection, the common network of forming (comprising the internet), make up the proprietary multi-functional data of a safe and reliable internal institution storehouse wide area network, be the database Intranet.Between two main frames,, can carry out safety and communicate by letter accurately in the LAN of database Intranet by the internet.
4, when the specific function dedicated network of database Intranet is the Web Database Systems, this database Intranet is a Web database Intranet.
A kind of new database application pattern can appear in the B/S pattern: procurement database service (Outsourcing).It can provide the access service of Web server and database to the user; After user's registration, can obtain a user name, password, domain name and certain disk and database space.The user can login this database with browser; Develop the application program of oneself; Also can be after our unit's exploitation be finished, in the assigned catalogue of uploading onto the server again.Like this, as long as the user concentrates on the development of application program, and needn't consider the work such as management, maintenance and data backup of server.It in improving, the computer application level of subsection provides good platform.
5, when the specific function dedicated network of database Intranet is OODBS, this database Intranet is the object-oriented database Intranet.
The object-oriented database Intranet satisfies two standards simultaneously: at first it is Database Systems, possesses the basic function of Database Systems; Secondly it is an object-oriented system, fully supports indignant thought of complete object-oriented and mechanism.Promptly object-oriented database network is the storage and the manager of lasting, a sharable library of object.
6, when the specific function dedicated network of database Intranet is multimedia database system, this database Intranet is the multimedia database Intranet.
Multimedia object develops into various types of information medium such as comprising figure, image, sound and character from the information medium of traditional single character types.Its comprehensive multimedia technology and database technology; Be one by set that some multimedia objects constituted.Wherein data object is organized in together by certain mode, can be other application and shares.
7, when the specific function dedicated network of database Intranet is the knowledge data base system, this database Intranet is the knowledge data base Intranet.The knowledge data base Intranet can manage the knowledge store of being made up of a large amount of facts, rule, notion, and provide convenience to the user retrieve fast, means such as inquiry.It is the needs of finding the solution at a certain (or some) field question, the knowledge collection that interknits that adopts certain (or some) knowledge representation mode to store in computer storage, organize, manage and use.These knowledge comprise the knowwhy relevant with the field, factual data, heuristic knowledge that is obtained by expertise etc.
8, when the specific function dedicated network of database Intranet is fuzzy database system, this database Intranet is the fuzzy database Intranet.Computing on the contact of the data structure of fuzzy data and data, the data and operation, the constraint (comprising integrality and fail safe) of data, database window User, the consistency of data and the definition of nonredundancy etc. that the user uses are all blured.Precise information is the special case of fuzzy data.
9, the data bank network of certain unit or database Intranet system, can and the affiliate of unit internal network between, carry out information interchange and safeguard protection be provided, prevent unauthorized access to data bank network or database Intranet system.In order to reach this target, can allow affiliate's the excellent machine of one or several internal networks, by being housed, this unit distinguishes the machine of distinguishing of the standardization program of machine, authentication and authoring program respectively, be connected with the internet.One or several internal networks of the data bank network of this unit or database Intranet system and this affiliate link to each other with the internet by distinguishing machine separately, make up the proprietary network of safe and reliable and an information mutual communication, are the database extranet of unit
10, the remote client of unit after the internet is connected, can be logined unit data storehouse extranet or database Intranet, realizes safe and reliable information interoperability between these networks.The common system that forms in these client computer, database extranet or database Intranet and internet is the database access net.It is by the unit remote client that " program of audit program ", " source end encipheror " and " place end decrypted program " etc. are housed, be connected to after the internet, with database extranet or the common system that forms of database Intranet, be used to provide safety and the precise information visit of long-range mobile subscriber to unit data storehouse extranet or database Intranet.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2009101122221A CN101610190A (en) | 2009-07-22 | 2009-07-22 | Data network and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2009101122221A CN101610190A (en) | 2009-07-22 | 2009-07-22 | Data network and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101610190A true CN101610190A (en) | 2009-12-23 |
Family
ID=41483788
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2009101122221A Pending CN101610190A (en) | 2009-07-22 | 2009-07-22 | Data network and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101610190A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102013996A (en) * | 2010-11-23 | 2011-04-13 | 中兴通讯股份有限公司 | Data acquisition management method and system and telecommunication network management system |
WO2011137559A1 (en) * | 2010-05-04 | 2011-11-10 | Liu Wenxiang | Network charging system |
WO2011147048A1 (en) * | 2010-05-25 | 2011-12-01 | Liu Wenxiang | Network numerical control |
WO2011147046A1 (en) * | 2010-05-25 | 2011-12-01 | Liu Wenxiang | Network resource |
CN102546717A (en) * | 2010-12-30 | 2012-07-04 | 上海遥薇(集团)有限公司 | Network system for dangerous source monitoring information management |
CN103081411A (en) * | 2010-01-13 | 2013-05-01 | 刘文祥 | Network service |
CN103414631A (en) * | 2013-07-16 | 2013-11-27 | 国家电网公司 | Openflow controller channel encryption optimization method suitable for electric power applications |
CN103597808A (en) * | 2011-06-10 | 2014-02-19 | 微软公司 | Directing messages based on domain names |
CN104778214A (en) * | 2015-03-20 | 2015-07-15 | 四川长虹电器股份有限公司 | Distributed file system on basis of jump of resource locator and data synchronization method thereof |
CN105760452A (en) * | 2016-02-04 | 2016-07-13 | 深圳市嘉力达实业有限公司 | Method and system for collection, processing and storage of high-concurrency mass data |
CN107957717A (en) * | 2016-10-17 | 2018-04-24 | 费希尔-罗斯蒙特系统公司 | For making remote equipment subscribe to the method and system of control data |
CN107995062A (en) * | 2017-12-05 | 2018-05-04 | 公安部交通管理科学研究所 | Traffic control comprehensive platform cross regional business real-time processing method and system based on RPC |
CN108763296A (en) * | 2018-04-18 | 2018-11-06 | 链家网(北京)科技有限公司 | A kind of online database structure generation method checked and edited and device |
CN109992639A (en) * | 2019-04-03 | 2019-07-09 | 海南省林业科学研究所 | A kind of construction method of Digital Forestry big data system |
CN110297869A (en) * | 2019-05-30 | 2019-10-01 | 北京百度网讯科技有限公司 | A kind of AI Data Warehouse Platform and operating method |
CN110309218A (en) * | 2018-02-09 | 2019-10-08 | 杭州数梦工场科技有限公司 | A kind of data exchange system and method for writing data |
CN113094192A (en) * | 2021-04-23 | 2021-07-09 | 杭州网易云音乐科技有限公司 | Data processing method, device, medium and equipment |
-
2009
- 2009-07-22 CN CNA2009101122221A patent/CN101610190A/en active Pending
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103081411A (en) * | 2010-01-13 | 2013-05-01 | 刘文祥 | Network service |
WO2011137559A1 (en) * | 2010-05-04 | 2011-11-10 | Liu Wenxiang | Network charging system |
WO2011147048A1 (en) * | 2010-05-25 | 2011-12-01 | Liu Wenxiang | Network numerical control |
WO2011147046A1 (en) * | 2010-05-25 | 2011-12-01 | Liu Wenxiang | Network resource |
CN102013996A (en) * | 2010-11-23 | 2011-04-13 | 中兴通讯股份有限公司 | Data acquisition management method and system and telecommunication network management system |
CN102013996B (en) * | 2010-11-23 | 2015-06-24 | 中兴通讯股份有限公司 | Data acquisition management method and system and telecommunication network management system |
CN102546717A (en) * | 2010-12-30 | 2012-07-04 | 上海遥薇(集团)有限公司 | Network system for dangerous source monitoring information management |
CN103597808B (en) * | 2011-06-10 | 2015-07-22 | 微软技术许可有限责任公司 | Directing messages based on domain names |
CN103597808A (en) * | 2011-06-10 | 2014-02-19 | 微软公司 | Directing messages based on domain names |
CN103414631A (en) * | 2013-07-16 | 2013-11-27 | 国家电网公司 | Openflow controller channel encryption optimization method suitable for electric power applications |
CN103414631B (en) * | 2013-07-16 | 2016-09-28 | 国家电网公司 | A kind of Openflow controller channel encryption optimization method being applicable to electric power application |
CN104778214A (en) * | 2015-03-20 | 2015-07-15 | 四川长虹电器股份有限公司 | Distributed file system on basis of jump of resource locator and data synchronization method thereof |
CN104778214B (en) * | 2015-03-20 | 2018-02-06 | 四川长虹电器股份有限公司 | The distributed file system and its method of data synchronization redirected based on resource localizer |
CN105760452A (en) * | 2016-02-04 | 2016-07-13 | 深圳市嘉力达实业有限公司 | Method and system for collection, processing and storage of high-concurrency mass data |
CN105760452B (en) * | 2016-02-04 | 2020-03-10 | 深圳市嘉力达实业有限公司 | Method and system for acquiring, processing and storing high-concurrency mass data |
CN107957717A (en) * | 2016-10-17 | 2018-04-24 | 费希尔-罗斯蒙特系统公司 | For making remote equipment subscribe to the method and system of control data |
US12078981B2 (en) | 2016-10-17 | 2024-09-03 | Fisher-Rosemount Systems, Inc. | Systems and apparatus for distribution of process control data to remote |
US11543805B2 (en) | 2016-10-17 | 2023-01-03 | Fisher-Rosemount Systems, Inc. | Systems and apparatus for distribution of process control data to remote devices |
US11353854B2 (en) | 2016-10-17 | 2022-06-07 | Fisher-Rosemount Systems, Inc. | Methods and apparatus for configuring remote access of process control data |
CN107995062B (en) * | 2017-12-05 | 2021-03-23 | 公安部交通管理科学研究所 | RPC-based traffic management integrated platform remote service real-time processing method and system |
CN107995062A (en) * | 2017-12-05 | 2018-05-04 | 公安部交通管理科学研究所 | Traffic control comprehensive platform cross regional business real-time processing method and system based on RPC |
CN110309218A (en) * | 2018-02-09 | 2019-10-08 | 杭州数梦工场科技有限公司 | A kind of data exchange system and method for writing data |
CN110309218B (en) * | 2018-02-09 | 2021-07-30 | 杭州数梦工场科技有限公司 | Data exchange system and data writing method |
CN108763296B (en) * | 2018-04-18 | 2021-06-18 | 贝壳找房(北京)科技有限公司 | Database structure generation method and device for online checking and editing |
CN108763296A (en) * | 2018-04-18 | 2018-11-06 | 链家网(北京)科技有限公司 | A kind of online database structure generation method checked and edited and device |
CN109992639A (en) * | 2019-04-03 | 2019-07-09 | 海南省林业科学研究所 | A kind of construction method of Digital Forestry big data system |
CN110297869B (en) * | 2019-05-30 | 2022-11-25 | 北京百度网讯科技有限公司 | AI data warehouse platform and operation method |
CN110297869A (en) * | 2019-05-30 | 2019-10-01 | 北京百度网讯科技有限公司 | A kind of AI Data Warehouse Platform and operating method |
CN113094192A (en) * | 2021-04-23 | 2021-07-09 | 杭州网易云音乐科技有限公司 | Data processing method, device, medium and equipment |
CN113094192B (en) * | 2021-04-23 | 2024-05-28 | 杭州网易云音乐科技有限公司 | Data processing method, device, medium and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101610190A (en) | Data network and system | |
CN112765245A (en) | Electronic government affair big data processing platform | |
Siddiqa et al. | A survey of big data management: Taxonomy and state-of-the-art | |
CN102307185B (en) | Data isolation method used in storage cloud | |
US11461785B2 (en) | System and method to identify, classify and monetize information as an intangible asset and a production model based thereon | |
CN110543464A (en) | Big data platform applied to smart park and operation method | |
CN107819824A (en) | A kind of Urban Data opens and information service system and method for servicing | |
Liang et al. | Search engine for the internet of things: Lessons from web search, vision, and opportunities | |
CN112732811A (en) | Data open platform | |
CN109791594A (en) | Data are segmented in order to persistently be stored in multiple immutable data structures | |
CN106170772A (en) | Network safety system | |
CN101453398A (en) | Novel distributed grid super computer system and method | |
JP2013242886A (en) | Application data relating to logical and physical securities | |
CN104376237A (en) | Safety control method and safety control system for information in production procedures | |
CN116168820A (en) | Medical data interoperation method based on virtual integration and blockchain fusion | |
CN112527873B (en) | Big data management application system based on chain number cube | |
CN116415203A (en) | Government information intelligent fusion system and method based on big data | |
CN112837194A (en) | Intelligent system | |
CN112100663B (en) | Archive management system for hospital archive office | |
Quasim | Security issues in distributed database system model | |
Singh et al. | Privacy-preserving multi-keyword hybrid search over encrypted data in cloud | |
JP2003050806A (en) | System and method for knowledge management | |
CN101383030A (en) | Problem tracking system and method in process of project progressing | |
US12041062B2 (en) | Systems for securely tracking incident data and automatically generating data incident reports using collaboration rooms with dynamic tenancy | |
Ceruti | Data management challenges and development for military information systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20091223 |