Font Size: a A A

Design And Implement Of Monitor And Management System In KTDSSS

Posted on:2010-07-01Degree:MasterType:Thesis
Country:ChinaCandidate:X F ZhouFull Text:PDF
GTID:2178360278957201Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Distributed encryption Technique, integrating encryption, decryption and distributed storage technique, gains great advantage over security, fault tolerance and magnanimity storage aspect, and is now the new research direction and hotspot in information security field. Kylin Tianji Distributed Security Storage System (KTDSSS) meets the extended need by integrating Security Storage System for single server. The idea of file servers'dispersive distribution is adopted in the design of KTDSSS which improve the scalability and agility of the system. But this also results in the problem of server monitor and management. The objective of this paper is to design and implement the monitor and management subsystem according to the requirement of resource monitor and unified management of the system in KTDSSS.In this paper, the character of KTDSSS is first analysed, then the design scheme based on the architecture of monitor and management subsystem with three layers of client/root server/file server is put forward. The subsystem is composed of client, monitor and executer. The monitoring data and operation interface of file server is provided by the client through GUI. The monitor, core of the system, which is running on the root server, is designed to transmit instruction and policy information from the client to the executer, collect and audit the result from the executer, and save to the database. The task of executer is to collect the state data of file server and accomplish the remote control operation, send the results to monitor, monitor and manage the system according to the monitor policy and the security policy.The monitor and management to the file server are done according to the policy customized by the user. Different value is set to different server according to the monitor policy with the purpose of improving system utilization rate. The security policy restricts user behavior, configure the servers in a unified way, record relative operations and give warnings to violations. The procedure of monitor and management is described in detail in the end of the paper; the monitor and management client is also designed and implemented.
Keywords/Search Tags:Server monitor, KTDSSS, Monitor and management, Scalable framework
PDF Full Text Request
Related items