Font Size: a A A

Research On The Data Permission And Transport Security Scheme Of The Train Diagram System Based On The Networks

Posted on:2003-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:X B CuiFull Text:PDF
GTID:2132360062480848Subject:Transportation planning and management
Abstract/Summary:PDF Full Text Request
It is significant to fulfill the making of the whole railway train diagram based on corruter networks for the improving of the adaptability and flexility. It is also the foundation for the railway to compete in the transportation market and the certain direction to accommodate the innovation in future.This paper focuses on the main limitation - unable to share the data surely and effectively - of the existing systems. On the basis of the Computer Making Train Diagram System Ver2.0, brings fonvard the new style system of making diagram with computer based on the B/S architecture. In the paper, the author makes studies on the data permission security and transport security problems of the Train Diagram System that is based on computer networks and distributed system.The main research contents are as follovvs:After the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the B/S architecture, 3-tier operation distributed and 2-tier data distributed to separate the data from operation and simplify the development and maintenance;The E-R data model that is accord with the 3NF criterion is designed after analyzing the data structure of the Train Diagram System. Emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security;On the basis of B/S solution architecture, after comparing the existing transportation technologies, B-ISDN and ADSL is selected as the major solution architecture based on the package-svvitched networks. Furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety.
Keywords/Search Tags:Train Diagram, B/S Architecture, Data Permission, Transport Security
PDF Full Text Request
Related items