Data security system based on different operating systems

Data security system based on different operating systems

With the rapid development of science and technology, the processing of large amounts of data requires higher and higher performance of computers. It is difficult for ordinary computers to meet the requirements for rapid data processing. At the same time, the ravages of computer viruses pose a serious threat to data security. This paper designs a networked processing system based on different operating systems to solve these problems.

With the rapid development of science and technology, the processing of large amounts of data requires higher and higher performance of computers. It is difficult for ordinary computers to meet the requirements for rapid data processing. At the same time, the ravages of computer viruses pose a serious threat to data security. This paper designs a networked processing system based on different operating systems to solve these problems.

1. System overview

The system is a heterogeneous system containing computers and operating systems of different architectures. In the system, the database server, storage server and data processing server are servers running Linux operating system, the control server is a server running Windows Server 2003, and the terminal computer is a workstation running Windows XP operating system. From the perspective of system workflow, the realization of a workflow often requires the participation of multiple servers. It can be seen that the system itself is a distributed system. There is often a mutual calling relationship between software and software in the system. Part of the calling relationship is completed through task scheduling of the sub-system, and the other part is completed through direct calls between software modules and software modules. The server-side software and the client-side software communicate via Gigabit Ethernet, using the TCP/IP protocol, and the messages passed between each other are described in XML (Extensible Markup Language) format.

2. System design and working principle

In the design of the system, the mechanism of operation control, data processing and system monitoring are relatively independent of each other. The human-computer interaction of the system is designed with the principle of “distributed deployment and centralized operation”. In the actual operation of the processing system, most product production processes are completed by service programs running in the background. The user monitors the service programs running on other servers through the terminal computer, and performs manual intervention if necessary. This process is realized through remote calls. Under normal circumstances, users do not need to log in to each server to perform monitoring and management operations separately, and can complete the monitoring and management of the entire processing system only through a terminal workstation. The overall structure design of the system is shown in Figure 1. The main description of its design function is shown in Table 1.

Data security system based on different operating systems

PNode (data processing server) is connected to CNode (control server) and DNode (database server) through a Gigabit Ethernet network, and connected to SNode (storage server) through an optical fiber network. Various data processing software runs on each processing server in the form of services, corresponding to each type of data processing task. There is a corresponding message queue on the control server, and various data processing software monitors the corresponding message queue at all times. , When a task comes, the corresponding processing software will take the task to the local computer for processing. In the process of processing this task, the processing software accesses the DNode through Gigabit Ethernet to obtain metadata information (such as storage address, processing status, etc.), and obtains and processes the original data from the SNode through the optical fiber network. After the processing is completed, the processing software stores the newly generated metadata information in the database on the DNode through the Gigabit Ethernet, and stores the product data in the storage system on the SNode through the optical fiber network.

3. The realization of communication between systems

The communication between different operating systems is the key link of this system. Here, a message queue is used to realize it through message transmission middleware. Message queues provide a loosely coupled method for constructing distributed applications implemented in a synchronous or asynchronous manner. The API calls of message queues are embedded in new or existing applications, and messages are sent to or read from memory or disk-based queues to provide information exchange. Message queues can be used in applications to perform a variety of functions, such as requesting services, exchanging information, or asynchronous processing.

Message transmission middleware Message middleware (MOM) is an independent system software or service program. Distributed application systems use this software to share resources between different technologies, manage computing resources and network communications. It is a key software in the computer system, which can realize the interconnection and interoperability of applications, and ensure the safe, reliable and efficient operation of the system. MOM is located between user applications and operating systems and network software. It provides a common means of communication for applications and is independent of the network and operating system. Middleware simplifies the transmission of data between applications, shields the underlying heterogeneous operating systems and network platforms, and provides developers with consistent communication standards and application program interfaces. When the application program embeds its function calls, it can use its running The functions of a specific operating system and network environment perform communication functions for applications. There are many kinds of message middleware. Among them, IBM Message Middleware MQ has become the leader of message middleware products with its unique security mechanism, scalability and cross-platform, as well as strong transaction processing capabilities and message communication capabilities.

The basic principle of MQ (a kind of message middleware, developed by IBM) is shown in Figure 2.

Data security system based on different operating systems

First look at the local communication situation. Application A and Application B are running on the same system A, and they can communicate with each other by means of message queue technology: Application A sends a message to queue 1, and when application B needs The information can be obtained at the time.

The second is the case of remote communication. If the destination of information transmission is changed to application C on system B, this change will not affect application A. Application A sends a message to queue 2, and the MQ of system A finds The destination queue pointed to by message queue 2 is actually located in system B, and it puts the information in a special local queue—Transmission Queue. Establish a message channel from system A to system B, the message channel agent will read the message from the transmission queue, and pass this information to system B, and then wait for confirmation. Only after MQ receives the confirmation that the system B has successfully received the message, it actually deletes the message from the transmission queue. If the communication line is unavailable, or system B is not running, the information will remain in the transmission queue until it is successfully transmitted to the destination. This is the most basic and important technology of MQ, which can ensure the transmission of information and is once and only once (once and only once) transmission. The communication between servers can be realized through the message transmission middleware MQ.

4. Conclusion

Through this design, it can be ensured that various servers equipped with different operating systems can work normally in this system. At the same time, the use of message queues to achieve communication between system modules facilitates the expansion of the processing capacity of the system and greatly improves the data processing speed. The most important thing is that the design of the heterogeneous system makes it difficult for the various types of workstations based on the Windows XP operating system to function on the server of the Linux processing system, ensuring the security of the data, so it has a higher level of security.

The Links:   CM600HU-24H DMF660N

micohuang