13.07.2015 Views

Solution Architecture Report - IRDA

Solution Architecture Report - IRDA

Solution Architecture Report - IRDA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Solution</strong> <strong>Architecture</strong> Document - <strong>IRDA</strong> Business Analytics ProjectTermsRole based accessRouterDescriptionRole-based access control is an approach to restricting system access toauthorized usersA router is a device that interconnects two or more computernetworks, and selectively interchanges packets of data between them.SOA A Service-Oriented <strong>Architecture</strong> (SOA) is a flexible setof design principles used during the phases of developmentand integration. A deployed SOA-based architecture will provide aloosely-integrated suite of services that can be used within multiplebusiness domains.SSL encryptionStorage Area NetworkSystem IntegrityTokenUniversal Serial BusVirtual TokenWeb GardeningAn SSL encryption establishes a private communication channelenabling encryption of the data during transmission. Encryptionscrambles the data, essentially creating an envelope for messageprivacy.A storage area network (SAN) is an architecture to attach remotecomputer storage devices (such as disk arrays, tape libraries,and optical jukeboxes) to servers in such a way that the devices appearas locally attached to the operating system.The state that exists when there is complete assurance that under allconditions an IT system is based on the logical correctness andreliability of the operating system, the logical completeness ofthe hardware and software that implement the protectionmechanisms.A security token is a physical device that an authorized user ofcomputer services is given to ease authentication.Universal Serial Bus (USB) is a specification to establish communicationbetween devices and a host controller (usually personal computers).Virtual tokens are a new concept in multi-factor authentication whichreduce the costs normally associated with implementation andmaintenance of multi-factor solutions by utilizing the user's existinginternet device as the "something the user has" factor.The scalability on multiprocessor machines can be enhanced by loadbalancing, each with processor affinity set to its CPU. The technique iscalled Web gardening, and can dramatically improve the performanceBusiness Analytics Project Page 12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!