Font Size: a A A

Research On Remote Large-Scale Multi-User Concurrent Control And User Management Technique

Posted on:2008-12-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhaoFull Text:PDF
GTID:2178360212976185Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of computer application and network popularization, the number of netizens grows, e-policy, e-trade, posting in BBS, sending and receiving Email, all trigger strong desire for information security. You see, if our computers are filled with virus, Trojan, etc, our account were stolen, network service is stopped, what a terrible thing it is! Therefore, training for the information security has gradually become various kinds of people's urgent need.In order to cooperate with the national 863 project on integrated information security experiment platform construction, associated with Shanghai public service on information security, we have widely-ranged research on the teaching, experiment, method of information security. And this article takes a great emphasis on distant-user large scale concurrent control experiment of information security with related user management techniques.This thesis mainly focuses:First, we talk about distant user agent machine and virtual agent machine management program. And the main tasks, service method, resource cost of the local virtual agent, main purpose of the agent management program are all studied. Among those, how to realize the optimization of the virtual agent machine to better the single machine is the most important.Second will be the expansion and management of the server clusters. Since the virtual agent machine should start the virtual machine, virtual net card, cpu, memory of the related machine, the total cost is huge. Although we have optimized the single machine in some degree, but the expansion to server clusters'need is still under great demand. According to the assessment of the machine's resource cost, we can dynamically start or...
Keywords/Search Tags:Multi-user, Concurrent control, Virtual Agent, Server Clusters, Performance monitoring, Load equilibrium, User management, Security
PDF Full Text Request
Related items