计算机类留学生论文范文:在计算机网络中的服务理念The concept of service in computer networks
时间:2013-09-20 11:31:38 来源:www.ukthesis.org 作者:英国论文网 点击:133次
Managed by the system administrator structured computer environment and only one or a few isolated computer components computer environment The main difference is the service. This only a few isolated computer environment for families and those typical small non-technical office , and typical computer environment is structured by the technical personnel to operate a large number of computers to facilitate communication by sharing , optimize resources and other services to interconnected together. When a home computer through the Internet or through an ISP to connect to the Internet , he is using an ISP or services provided by others before entering the network .
Provide a service more than just a simple accumulation of the hardware and software together, it includes service reliability , service standardization , as well as service monitoring, maintenance , technical support and so on. Only in these areas are in line with the requirements of service is the real service .
A service of the basic problems . Services should be based on server-class machine and the machine should be placed in a suitable environment , as the server machine should have an appropriate reliability. Services and services that depend on the machine should be monitored in the event of failure or malfunction on the alert list of records . As part of the service should rely on those machines and software built on the same or higher standards and software on the host , a service reliability and service it depends on the weakest link in the chain is quite reliable . A service should not be a reason to rely on those who are not part of the service host. Once the service built and completed a test , it is necessary gradually to the user's point of view to further testing and debugging.
1.1 user requirements.
1.2 operational requirements. From the user's desired level of reliability and system administrators required reliability of the system in the future expectations, system administrators can create a list of features that users expect , which includes a cluster , the slave device , the backup server or high availability hardware and operating systems.
1.3 open architecture .
A good solution is to choose based on open standard protocols , so that both sides can choose their own software . This brings the choice of the client application server platform selection process with the separation of the user freedom of choice that best suits their needs , preferences and even the platform software , the system administrator can also independently chosen based on their reliability , scale configurability and manageability required server solutions . System administrators can in some competing server products to choose from , rather than being confined to those suitable for some client server software applications and platforms .
We call the user to select and server selection separation capability. Open protocol provides a fair competition venues, and provoke competition between vendors , which will ultimately benefit us . In addition to requiring a reliable service can be monitored , easy maintenance support, and we want to meet all the basic requirements and the requirements of users , but also take into account some special things. If possible , it should be allowed to use each service dedicated machine , so as make it easier for services can be supported and maintained , but also can reduce forget some small server machine services. In some large companies, the use of specialized machines are a fundamental principle , while in small companies , due to cost issues , generally meet this requirement . Another idea is to create a service to allow the service to be fully redundant as the goal. Some important services regardless of how much companies are required to fully redundant . As the size of the company will continue to grow , all you have to let all the services are fully redundant as the goal.
2.1 the use of specialized machines.
2.2 sufficient redundancy. You choose this type of redundancy is dependent on the service . Some services such as web servers and computing area, you can make yourself a good run on the cloning of a good machine . Other services such as large databases will not work, they require a stronger connection crash recovery system . You are using the software may be used to provide the service will tell you that redundancy is an effective , passive form from the server , only the primary server fails and sends a request , the redundant system will response . Whatever the case , the redundant data synchronization mechanism must ensure and maintain data integrity. If redundant servers and the primary server synchronization continuous running, redundant servers can be used to share the load of running normally and can improve performance. If you use this method , we must be careful not to load beyond the critical point of unacceptable performance , in order to prevent a server malfunction. Before reaching the critical point for the existing system to add more parallel servers . Another advantage is redundant easy to upgrade . Rolling upgrade can be performed . Each time a host is disconnected , upgrading, testing and start services. Single host failure will not stop the entire service , although it may affect performance. If you really messed up an upgrade then wait for you to calm down and turn off the power to go fix it . (责任编辑:www.ukthesis.com) |