Font Size: a A A

Research On System Integration Technology To Intelligent Transport Systems

Posted on:2009-09-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhuFull Text:PDF
GTID:2178360272976631Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Intelligent transport systems are integrated by advanced information technology and systematic engineering technology. Intelligent transport systems , which is omnibearing,real-time,veracious and high performance, makes existing traffic basic facilities exert out their maximal efficiency and improve their service.It discusses the way to structure network and the way to avoid a new investment by estimating the bandwidth to certain the value in use of existing network in this report. And analyses the merit and shortcoming of GPRS network and CDMA network in the engineering application under the situation that wired network can't be realized.It discusses several familiar circumstances when an adoption of transmitting stream medium to save main bandwidth and alleviate the replication pressure of the coding node data in this report. And it presents the applicative condition of commission cascade technology.The kernel of multicasting technology in application layer is to establish the nodes that are capable of multicasting, so it needs to administrate the lifecycle of multicasting nodes from network angle and simultaneously it needs to solve the problems of network addressing and content replicating from the aspect of load equalization.P2P network can realize polygene data replication, makes all the nodes be in the same level and conform to power rules. It can also realize load equalization. The report presents the way to realize how data get through the commission of SOCKS, which technically supports inner-network and outer-network isolate from each other while maintain data channels synchronously.It researches the technology of constructing a system from the angle of data organization. And discusses all manner of possible problems and their reply measure,gives some suggestion, the indispensable logical design of pre-database creation, mode deposit etc. When comes to the list creation , we ought to consider standardization and equilibrium of system efficiency as well as proper redundancy, adopt technology such as necessary version management to ensure diversity of system designing and make the canal of false correction clear.The establishment of the database should be developed well before the naming convention, planning a system of data requirements, to do a good job logic design and development team gradually precipitated out of the library models. Table set up rules should consider the standardization and efficiency of the system of balance, appropriate redundancy can be used to reduce the complexity of the design, but the need to consider the data synchronization rollback tag, the management version of the technology on the one hand, the system can be designed to ensure diversity. At the same time, but also provides a user error amendment channels. Database triggers the system is not conducive to transplantation. From the time of the distribution point of view should be to ensure the integrity of the data, can be bound by such methods as well as the mandatory instructions view to hide the physical logic provides technical support, stored procedures can process data, should be used as much as possible.The way that realize the type of drive of intersystem interface and the occasion of triggering interface as well as the disposal after transmission failing is presented.The system should have a good interface and other systems together to complete the organic combination of the interface to achieve the main interface, including the definition as well as the driver interface. Interface definition into the way the initiative completely, totally passive, as well as comprehensive of the three drive interface, including ways to promote and drive can be used to trigger the timing of real-time, as well as the conditions and so on a regular basis warning to the establishment of a mechanism to ensure that after the failure of the transmission interface to deal with. Construction of the interface to be considered when the future expansion of the system. The design proposal of data backup and comeback of mass data storage is given.That discusses how to utilize partition serve and divide QoS scale to remit system bandwidth's pressure, utilize concurrence administration of application layer to depress database's read-write pressure, in turn raises researches the data synchronous action of database log analytical technique at distributed system. And it gives several illustrations to unfurl two aspect of system multiplexing technology: On the one hand it can ensure system's immediate revision, on the other hand it can maintain system's being strong.Adopt commission technology and address conversion technology to realize the problem that inner-network's address mainframe can also visit outer-network. The virtual LAN technology shields network's physics bifurcation and guarantees multicast field's normal function.Network isolation is the first choice of network secure. Inbreak-detection instrument needs to go after isolation. When isolation fails, it can alarm and then dispose the problems. Enterprise ought to establish rational safe rules and exert man's subjectivity activity.When it comes to system safety,data source's security is the most important secondly users can visit these data at the surveillance of authorization system,lastly it ought to guarantee security at the case of data transfer. Systemic authority can be divided into function authority,column authority and data authority. Utilize role we can lot authorization and realize authority replication between users. Authority set has both static state and dynamic character.Data Source security framework developed by the Internet and information services together, can verify the condition of anonymity, also can use the database to preserve the user's credentials to be verified, the user's password credentials are reflected in the database for its hash value and generate rules to avoid password save.Data security is divided into two parts, the first client to the server's security using SSL technology to guarantee, and the other is the application server to the database server's security, partly because of the internal corporate network, the database can be used to verify the identity of the way However, to prevent SQL injection attacks.
Keywords/Search Tags:Network Architecture, Streaming Media, Data Interface, System Reuse, System Security
PDF Full Text Request
Related items