Full text: XVth ISPRS Congress (Part A2)

ST 
p= 
ns 
  
  
169 
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
HOST 
COMPUTER PERIPHERALS 
rt Mm T eee e ERE i 
!livcT-100 | PRISM-80| ! !{ IDS IMACE TV-H HICH ! ISN IMACE TDS TAPE 
| OPERATOR| OPERATOR] ! : DISPLAY RESOLUTION i STORACE NODE DRIVE 
[MONITOR | CONSOLE : | SUBSYSTEM COLOUR MONIT. | | SUBSYSTEM 
' OPERATOR TERMINAL ' ! IMACE DISPLAY SUBSYSTEM (IDS) _ ! 
FIGURE 3.  ARIES-II CONFIGURATION: . MULTI-PROCESSOR SYSTEM 
(PERIPHERAL WORKSTATION) 
Optional peripherals can also be attached to the Host Compu- 
ter bus. Any Image Analysis Workstation may use these peripherals 
as required, by raising a request to the Host Computer to move data 
between the chosen peripheral and the Image Storage Node associated 
with that Image Analysis Workstation. 
Network Workstation Configuration A functional block diagram of a typical 
Network Workstation ARIES-II Configuration is shown in Figure 4. The diagram 
shows an Image Analysis Workstation consisting of a Camputer Subsystem, Image 
Storage Node, Peripherals, and an Image Display Subsystem. The workstation is 
linked via the second port of the Image Storage Node to an interface which con- 
nects to a network node. Each Image Analysis Workstation (and there can be more 
than one) is equivalent to a single-processor ARIES-II configuration, capable of 
stand-alone operation in its own right. The host computer in this configuration 
is usually a larger computer, 'such as a VAX. 
Optional peripherals can also be attached to the Host Compu- 
ter bus. Any Image Analysis Workstation may use these peripherals 
as required, by raising a request to the Host Computer to move data 
between the chosen peripheral and the Image Storage Node associated 
with that Image Analysis Workstation. 
Multi-processor systems, both Peripheral Workstation and 
Network Workstation configurations, are truly multi-user. They can 
support up to 16 Image Analysis Workstations, each dedicated to an 
independent user. Each user is fully protected from the others or, 
for that matter in the case of the Network Workstation Configura- 
tion, from failures of the Host Computer itself. 
Network vs. Peripheral Workstations Network and peripheral 
workstations are designed to be used in different circumstances. A 
few examples provide some illumination. 
  
 
	        
Waiting...

Note to user

Dear user,

In response to current developments in the web technology used by the Goobi viewer, the software no longer supports your browser.

Please use one of the following browsers to display this page correctly.

Thank you.