当前位置:主页 > 科技论文 > 计算机论文 >

实验室计算机自动管理与维护系统的设计与实现

发布时间:2018-09-03 12:16
【摘要】:目前,大多数计算机实验室都通过加装网络版HPS(HDD Protection System即硬盘保护系统)来对批量计算机设备进行日常的管理与维护工作。但由于这些HPS过于依赖自身的硬件条件,因此其集中管理功能存在一定局限,如无法对操作系统操作、应用程序、使用者行为、系统实时安全检测等进行集中管理。这些局限性使得HPS在实际应用当中不能很好地保证计算机稳定、安全地运行,也无法满足高效、高质量管理计算机设备的要求。 为弥补HPS的不足,本论文以计算机实验室原有的HPS为基础,从软件层面上研究计算机实验室自动管理与维护系统。本论文研究的主要内容为: 1.硬件与网络参数的管理。主要研究自动收集硬件与网络参数;自动分配计算机名、IP地址、子网掩码、网关、DNS等参数;IP地址与MAC地址的绑定,防止非法修改网络参数;异常计算机的快速定位等。 2.注册表与进程管理。主要研究注册表备份、还原与监控;自动收集进程;管理进程,如自动识别合法进程,结束非法进程,手工添加合法进程等,以达维护实验室纪律的目的。 3.应用程序自动部署管理。主要研究集中自动部署应用程序,包括自动安装与注册;自动添加为合法进程等。 4.实时安全预警与维护管理。主要研究在实验室原有单机版杀毒软件的基础上实现病毒木马的实时预警;非法修改计算机配置参数或网络参数的实时预警;部份硬件故障的预警;异常自动处理功能或提供处理参考方案。 5.硬件防盗和异常管理。主要研究通过远程唤醒功能,在使用者使用前收集与记录硬件信息,使用者使用后再次收集与记录硬件信息,以两次记录进行比对,不相同则有异常,并进行异常报警。 6.使用者权限管理。主要研究使用者信息管理;使用者设备使用权限;使用者使用记录。 系统通过充分利用计算机实验室原有的硬软件资源,达到更好的管理与维护效果,,避免软件资源重复投入,减少了实验室的管理与维护成本。
[Abstract]:At present, most computer laboratories carry out daily management and maintenance of batch computer equipment by installing network version of HPS (HDD Protection System (hard disk protection system). However, because these HPS are too dependent on their own hardware conditions, there are some limitations in their centralized management functions, such as operating system operation, application program, user behavior, system real-time security detection and so on. These limitations make HPS can not guarantee the stability and safety of computer in practical application, nor can it meet the requirements of high efficiency and high quality management computer equipment. In order to make up for the deficiency of HPS, this paper studies the automatic management and maintenance system of computer laboratory from the software level based on the original HPS of computer laboratory. The main contents of this thesis are as follows: 1. Management of hardware and network parameters. This paper mainly studies the automatic collection of hardware and network parameters, the automatic assignment of computer name / IP address, subnet mask, gateway MAC and other parameters to prevent the illegal modification of network parameters. Abnormal computer fast positioning, etc. 2. Registry and process management. Main research registry backup, restore and monitor; automatic collection process; management process, such as automatic identification of legitimate processes, end illegal processes, manual addition of legitimate processes, etc. For the purpose of maintaining discipline in the laboratory. 3. Application automatic deployment management. The main research focus on automatic deployment of applications, including automatic installation and registration; automatically added as a legitimate process. 4. Real-time security warning and maintenance management. This paper mainly studies the realization of real-time early warning of virus Trojan horse on the basis of the original anti-virus software of single machine in laboratory, the real-time warning of illegally modifying computer configuration parameters or network parameters, the warning of some hardware failures, and the realization of real-time warning of virus Trojan horse. Exception automatic handling function or provide processing reference. 5. Hardware anti-theft and exception management. Through the function of remote wake-up, the hardware information is collected and recorded before the user uses it, and the hardware information is collected and recorded again after the user uses it. And abnormal alarm. 6. User rights management. Main research user information management; user equipment use rights; user use record. By making full use of the original hardware and software resources of the computer laboratory, the system can achieve better management and maintenance effect, avoid repeated input of software resources, and reduce the cost of management and maintenance of the laboratory.
【学位授予单位】:电子科技大学
【学位级别】:硕士
【学位授予年份】:2013
【分类号】:TP311.52;TP307

【参考文献】

相关期刊论文 前10条

1 石磊,吴海燕,李安宁;P2P技术及对互联网的影响[J];电脑知识与技术;2005年24期

2 胡春奎;李倩;高红;沈雷;;高校计算机实验中心局域网的管理与应用[J];华中农业大学学报(社会科学版);2009年01期

3 兰高志;网卡中硬盘保护功能的增设[J];计算机工程;2004年06期

4 何志;范明钰;罗彬杰;;基于远程线程注入的进程隐藏技术研究[J];计算机应用;2008年S1期

5 李恩;吴敏;熊永华;;一种基于双混沌映射的加密算法设计与应用[J];计算机应用研究;2009年04期

6 黄小龙;;基于混沌序列动态加密的网络密码安全模型[J];计算机应用与软件;2013年07期

7 孟祥铭,吴昌e

本文编号:2219956


资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/jisuanjikexuelunwen/2219956.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户07b0d***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com