Application of ActiveX Technique in Disaster Tolerant System

Article Preview

Abstract:

The paper introduces a disaster tolerant system based on B/S mode and proposes a safe and effective communication protocol that combines with communicational needs. The protocol has been realized in this paper. This system has adopted remote management based on Web so that its construction is reasonable and operation is convenient. Through test,the system which is excellent in performance and stable in working is considered to be valuable for application and promotion.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

276-281

Citation:

Online since:

December 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Li tao, introduction to network security [M]. Beijing. Electronic industry press, 2004: 1.

Google Scholar

[2] Suzuki J, Suda T. Middleware Support for Disaster Response Infrastructure[c]. proceedings of the First IEEE Workshop on Disaster Recovery Networks, (2002).

Google Scholar

[3] Lloyd Scott J, et al. ROBIB: An Economic and Efficien Solution for Real-time Online Remote Information Backup. Journal of Database Management[J], 2003, 14(3): 56-73.

DOI: 10.4018/jdm.2003070104

Google Scholar

[4] shun jie , xiao-jie liu, li tao, etc. Based on the Internet different disaster recover system design and implementation of the [J]. Application research of Computers. 2007. 24(7): 171-172.

Google Scholar

[5] Jin-chuan sha, xiao-jie liu, li tao, etc. Based on safety control of different ground disaster preparedness system design and implementation [J]. Application research of Computers. 2007. 24(8): 152-154.

Google Scholar

[6] WANG Kun, ZHOU Lihua, CAI Zhen, et al A disaster recovery system model in an e-government system: proc of the 6th International Conference Parallel and Distributed Computing. Applications and Technologies[C], 2005: 247-250.

DOI: 10.1109/pdcat.2005.6

Google Scholar

[7] SOURCE A. SANs sharing storage to infinity and beyond[J]. Electronic Design, 2004. 52(9): 50-59.

Google Scholar

[8] LIU Lanjuan, SCM security solution based on SSL protocol, Service Operations and Logistics, and Informatics[C], 2006. SOLI '06. IEEE International Conference, 2006: 814-817.

DOI: 10.1109/soli.2006.235714

Google Scholar

[9] Michener J. R, Acar T. Managing system and active-content integrity[J] Computer, 2000. 33(7): 108-110.

DOI: 10.1109/2.869389

Google Scholar