Font Size: a A A

Design And Implementation Of The Security Architecture And Performance Montioring Mechanism In IC Design Environment

Posted on:2011-07-08Degree:MasterType:Thesis
Country:ChinaCandidate:H L LiFull Text:PDF
GTID:2178330335959935Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the semiconductor industry in last years, rapid development in China, local IC design industry has been paid more attentions. IC design is a key part of semiconductor industry in our country, as well as the importance power of era of information technology to enhance national competition.In the early days of Small and medium sized IC design companies, generally have only 5,6 computers, installed Linux or Unix operating systems. Every computer has to run multi-EDA software, and store mass design data. The network structure is very simple; each computer is an almighty IC design system. At beginning, no dedicated personnel to take care of EDA software and hardware, only someone basically familiar with the EAD keep an eye on them. There are no global planning and administrator, resulting in various violations, the two most important questions:IC design network environment is no security, data is not protected; server utilization is low, severely affect the efficiency. This paper is to address the problems of IC design enterprises:the network environment security, large amounts of data quickly backup, server status monitoring and reporting, and several other areas. Author have worked in the Haier IC for many years, problems befall at any moment. It through over the experiences, lessons learned, summarized a set of innovative IC design management methods for small and medium IT company, to solve planning, development, and stable of operation. Although there is a large gap compared to large commercial software corp., but the method for small or medium IT and IC design enterprises, can help them to solve main problem, with on-hand available resources to get more outputs by fewer inputs, and gradually improve its performance.This paper work on:1. Design of network topology for IC design environment safety.Analyze the characteristics of IC design enterprises network in detail, according to security need, physical network environment have been divided into two parts. According to the different functions the network has been divided into three segments. Multiple network adapters installed on the server, to implement the routing function for different segments. And provide a solid foundation for the future of the security settings of the network.2. with IPtables firewall protection rules to set up the network security configuration.In the above network topology, with IPtables firewall from Linux operating system, based on the default data access rules of our IC design environment, configured the firewall rules.3. Designing and coding to verify the authenticity of the terminal.In the IC design environment, the biggest threat to data security is the user terminal, in order to ensure the authenticity of the terminal, using SSH protocol public/private key system implemented verification the authenticity of the terminal by editing script.4. Analysis and coding of the large amount of data backup solution in IC design environment.In IC design process, large amount of data, dispersed in the all network, file-sharing approach is its storage features. This paper report a solution, using rsync command, which only take up a small network bandwidth, and can quickly backup and resume. It can work online or offline.5. Design and coding on the server performance condition monitoring.I edit some scripts to use Linux shell command to collect idle CPU and free memory data, record them to the database every defined interval. And provide an easy command for users to view currently resources available on the network at any time, for quick selection.
Keywords/Search Tags:IC design, performance monitoring, network security, rsync, ssh, iptables
PDF Full Text Request
Related items