Font Size: a A A

Remote Operation System Intelligence Computing Communication Method Technic And Security Authentication Transmission Technic Implementation

Posted on:2009-05-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y T QianFull Text:PDF
GTID:2178330338985587Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of the network, the remote operation system is deeping into our lives. But the traditional remote operation system always choise some special computing communication method for the transimission of the control interface pictures, which can't be adaptive to the variante network-width and the servers'resource in practice. It can make the control viewer unsteadily, even lost the viewer frame. Othewise, besides authorized the user in the beginning, the traditional remote operation system have no other security guard, so the control data has some security problems because of the open network during transmission.Based on the heterogeneity of the computer nodes and remote operation software, this paper brings forward a novel Intelligence Computing Communication Methed (ICCM) by thinking of the above items synthetically. In this paper, we compute the system remote operation resource consumption value dynamicly according as the network width, the system computing power and the size of nodes'memory. Then, the value is used to adjust the handling method and transmission mode of the commands and pictures of clients and servers, which always allows the users remote operating and monitoring the system stably and smoothly. The experiment data in this paper has proved that the above method can use the resource more efficiently and gain more stable performance and users'view.There is another important problem which is the system security. The network opening products the security problems in the remote operation system. Usually, there is some sense data involved during the monitoring and controlling of system. And there is not protected for the data which is transmitted and handled in the system. The attacker can gain these data even the server's masterdom, which does large damage for the system users. So, we construct a novel secure authentication and transimission system based on the OpenSSL by entending the VNC protocol. The security system gets higher security level for the authentication and trasimission of the whole system. This system implements the ID dual-authentication for clients and server, encrypts the transimitting data and ensures the system security while we simplify some of the encryption steps to maintain the system performance, however there is no distinct diteriorition for the system smooth and stability.
Keywords/Search Tags:Remote Operation System, Heterogeneity, Intelligence Computing Communication Method, Security System, OPENSSL, Smooth Operation, Contribution Coefficient
PDF Full Text Request
Related items