Font Size: a A A

Research And Implementation Of Digital Library Architecture And Access Control

Posted on:2007-05-30Degree:MasterType:Thesis
Country:ChinaCandidate:W GuanFull Text:PDF
GTID:2208360182993717Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The digital library always preserves and transmits the human intelligence as a digital treasure house. Nowadays, with the rapid development of the information and computer technology, the gradual popularity of computer network, the amount of information to be saved and disseminated increases in an unprecedented way. Also, the type and form of these digital resources are more and more rich. In this situation, the potential of digital library can be fairly observed. CADAL works as a part of Public Service System. With the processing, passing, delivering, managing behaviors, CADAL can realize high sharing of entire social public knowledge, manage all fields of knowledge, provide an environment for learning and innovation.The work of this thesis is to explore the optimal scheme of hardware architecture from the design principal and target of CADAL. Besides, access control of resources should be implemented effectively.In the first chapter, we review the background of construction in CADAL , analyze the requirement and model of service, also give a brief description of this work.In the second chapter, we illustrate the technology characteristic of digital resource, portal service and individual serving. Then according to the primary target of CADAL, we consider the design principal of hardware architecture and the requirement of access control particularly.In the third and fourth chapter, based on the configuration and design of CADAL system, we make a general survey on clustering, LVS (Linux Virtual Server), authentication and authorization, CAS(Central Authentication Service).In the fifth chapter, we propose the general hardware architecture of CADAL, including a trade-off among all kinds of serving strategies.In addition, CAS is employed into the system.In the sixth chapter, we discover the performance criterion and related influencing factors. After the concurrent ability test, we carry out the careful analysis to the experimental result. Moreover, we carry on the functionality test to confirm the expandability of cluster and the authentication and authorization of CAS.In the seventh chapter, we conclude the experience and discuss future work.
Keywords/Search Tags:Digital Library, CADAL, Load Balance, High Availability, High Scalability, Cluster, Server, LVS, Authentication, Authorization, SSO, CAS
PDF Full Text Request
Related items