Home
        INSULATED GATE BIPOLAR TRANSISTORS BASED REVERSIBLE
         Contents
1.    3    a               cs          selmp ort  Call  Access  Instantiate gt  gt  sree ort  Call Instantiate gt  gt   gt  A  gt  a  z   E 7 mie age a    z  A       eT mport  Call Instantiate gt  gt    7  E dsn manager net   E dsn client N    m MA M M             3 B   dsn client qui    l                _ _        _         _     u           lt  lt Import  Call Access  Instantiate  lmplement gt  gt           Fig  1     The package dependency diagram     The manager server client communication roles are  Fig  2         DSNManager acts as a server for the DSNServer and for the  DSNClient        DSNServer acts as a server for the DSNClient and as a client for the  DSNManager        DSNClient acts as a client for the DSNManager and for the  DSNServer     manager       Fig  2     The manager server client communication     The communication is based on the  request response  principle in all  three communication situations  manager server  manager client and server   client  Firstly  a connection is created  then the client makes a request and the  server responds and closes the connection    The advantage of this approach is that  if a client is behind a firewall  as  long as he can connect to a server  he may use all the features of the application   The drawback is the inability of the manager to initiate a connection with a  client in order to send information  but this problem is solved with a request    66 Adrian Alexandrescu and Mihai Horia Zaharia    initiated by the client 
2.    The application uses a specific protocol for communication between the  three components        The server list and the file tree are transferred  between the manager  and the client         The manager is notified of the changes in the file structure  between  the manager and server         The file tree and the execution commands are transmitted to the  servers  between the server and the client     The manager keeps track of the servers and of the file tree  The tree  contains information about the files and directories from all the servers  The  manager waits on a specific port for incoming connections from servers  When  a server connects  it sends the port number and the list with the changes in the  file tree  If the server is already in the list of servers  it is identified  1f not  a unique  id is assigned to the server while its hostname and port are added to the list    On another port  the manager waits for connections from clients  When  a client connects  depending on the received request  the manager sends the list  of servers or the file tree    The server has two roles  On the one hand  the server keeps track of the  changes to the file structure within a directory in which the shared data is  stored  The server sends the list with these changes to the manager  On the other  hand  the server responds to requests initiated by clients  For each list of  changes sent  a TCP connection is created  Immediately afterwards  once the list  is received  the connect
3.  certificates and the private key are stored in a keystore which is  identified by an alias        The certificates are extracted from the generated keystores and then  are saved        The extracted certificates or rings of certificates are imported into a  truststore    For example  if the server authentication to the client is needed then  follow the next steps  8         Generate a keystore on the server which contains the certificate   containing the public key  and the private key  The keystore may be password  encrypted        Extract the certificate from the keystore        Insert the certificate in a new keystore  called truststore        Keep the keystore on the server and the truststore at the client    Thus  when the client requires server authentication  the client sends a  request for the server s certificate  The certificate 1s compared with the list of  certificates from the client   s truststore  If the certificate from the server is found  then a secure communication can be used  whereas  if it cannot be found  the  communication fails     4  Case of Study    Let us consider a distributed system of Web servers controlled by a  manager of servers  If the hosting of a website with dynamic pages on this  system and all the servers to handle the workload is needed  a very good  solution would be to use a    single point of entry in the system     preferably  different from the manager  In other words all initial requests must reach a  specific server that makes 
4.  each server and  is able to make the redirection     5  Conclusions    The Distributed File Management System 1s an application that makes it  easy to work with files and directories in a distributed system  Each server has a  directory that is being monitored  and when a change in the structure of files  and directories appears  a notification is sent to the manager that refreshes the  list of servers and the file tree    The communication is done using TCP  and the security 1s provided by  the cryptographic protocol SSL TLS  In this system only the client can initialize  a connection to the manager or the server  This approach has the advantage that  a client can use it without restriction even if the application is in a local subnet    The client has the possibility to change the file and directory structure  on the servers  to copy information from multiple servers simultaneously and   using multiple threads  to launch the various applications both locally and on  the servers using the program   s command line    Using the client application  the Distributed File Management System  offers the possibility to copy and send requests and to startup various  applications on servers directly from the user interface  Therefore  the  application can be deployed on multiple workstations in a fast and secure way    The application can be optimized in regards to protocol  by using a byte  to specify the type of application  by compressing the file names and directories  and by repl
5.  the file directory name followed by the value  1  if the resource  isn   t found on the server     file dir name    Name tente   Name   0   Other files dirs   Name  atena nasi    Fig  6     The client server communication protocol  Copying from the server              When file or directory from the server is moved we have a case that is  similar to the above  If the requested resource is valid  the file 1s deleted on the  server  Fig  7      Bul  Inst  Polit  Iasi  t  LVI  LX   f  2  2010 69    Ed file dir name       Fig  7     The client server communication protocol  Moving from the server   When a file or directory from the server is deleted if the resource is valid  then    the file directory on the server is deleted and the result of the operation is  returned  whether completed successfully or not   as it is presented in Fig  8     F file  dir name    Fig  8     The client server communication protocol  Deleting from the server           When a file or directory from the server is renamed the case following  the first character    r     the client sends the name of the resource to be renamed   one byte with the value 0 and the new name of the resource  Fig  9      Fig  9     The client server communication protocol  Renaming from the server     file dir name new file dir name       When copying a file or directory on the server the client sends a file to  be saved on the server  While copying  the file on the server is locked  therefore  no other processes or threads 
6. BULETINUL INSTITUTULUI POLITEHNIC DIN IASI  Publicat de  Universitatea Tehnic      Gheorghe Asachi    din Iasi  Tomul LVI  LX   Fasc  2  2010  Sec  ia  AUTOMATIC     i CALCULATOARE    A JAVA BASED LIGTH DISTRIBUTED FILE SYSTEM  BY    ADRIAN ALEXANDRESCU and MIHAI HORIA ZAHARIA    Abstract  In this paper a light distributed file system implemented from scratch is  presented  The system has all base characteristics that are typical for this kind of systems   The Java technology was elected because nowadays the mobility and platform  independence is a common requirement for most of the application  As result this system  can be used in any kind of cluster either static or dynamic no matter of the geographic  distribution scale     Key words  distributed computing  SSL  DFS   2000 Mathematics Subject Classification  68P25  68N19     1  Introduction    DFS  Distributed File System  is a distributed file system  1   which  allows the user to access files on other computers within a network  Users do  not have direct access to the storage resources  but the data access is  accomplished by communicating over the network using a custom protocol  An  DFS must have some minimal base characteristics as follows        Transparent access   from the client that is using it point of view  there is no diference between a centralised and a distributed system  Of course  some suplementary latencies can not be fully avoided        Common Data   this refers to the manner that data coherency and  
7. acing the transmitted objects with byte arrays  thus eliminating the  extra code introduced when serializing the data     Received  March 30  2010    Gheorghe Asachi    Technical University of Iasi   Department of Computer Science  and Engineering  e mails  mike cs tuiasi ro  avalexandrescu gmail com    REFERENCES    l     Distributed computing     Wikipedia  the free encyclopedia  2010  available at  http   en wikipedia org wiki Distributed_ computing    74 Adrian Alexandrescu and Mihai Horia Zaharia    2  Mih  escu C   Scortan S   O analiz   comparativ   a solu  iilor de securitate la nivel de  aplica  ie oferite de Sun   i Microsoft  Craiova  2002   3      RFC 4346     The T  ransport Layer Security  TLS  Protocol Version 1 1  2006   available at http   xww faqs org rfes rfc4346 html  4     Transmission Control Protocol     Wikipedia  the free encyclopedia  2009   available at http   en wikipedia org wiki Transmission_ Control Protocol    Java TM Cryptography Architecture Standard Algorithm Name Documentation for  JavaTM Platform Standard Edition 6  2009  available at  http   java sun com   javase 6 docs technotes guides security StandardNames html  6  JavaTM Secure Socket Extension  JSSE   Reference Guide for JavaTM Platform  Standard Edition 6  2009  available at http   java sun com javase 6 docs   technotes guides security jsse JSSERefGuide html  7  Java SSL   Keystores     Objectware Community Wiki  2009  available at  http   wiki community objectware no display securi
8. can modify the file unless the copying is  completed  see Fig  10      i ere ra Len file  8bytes     Fig  10     The client server communication protocol  Copying on the server           When we test the response time of the server the client sends the  number of bytes to the server  on 4 bytes   nol   as well as a set of    1   s   followed by a byte with a value of 0  The server responds with the required  number of bytes of 1 and a 0 byte  Fig  11      70 Adrian Alexandrescu and Mihai Horia Zaharia    De IL    1 1  0     Fig  11     The client server communication protocol  Testing the response  time on the server     In the situation of copying a chunk of a file from the server the client  sends a request to the server for a given number of bytes  It sends the name of  the file in question  the position at which to begin copying  8 bytes  and the  number of bytes to be copied  8 bytes   see Fig  12      DA   filename   start   Ten    Fig  12     The client server communication protocol  Copying a file  chunk from the server        When running a process on the server  in fact refers the launching of a  command on the server  the client sends the location from which to launch the  process  followed by a byte with a value of 0 and the command  as it is  presented in Fig  13     Fig  13     The client server communication protocol  Launching a  command on the server        3  Security    A great way to ensure the security and the integrity of data  communications over the ne
9. consistency is automatically handled by the system without no intervention  from the user        Location transparency     the real location of user data must be hiden  from him  That is this location can be authomatically changed by the system in    64 Adrian Alexandrescu and Mihai Horia Zaharia    order to satissfy his internal optimisation constraints  The only think that is  constant regarding user data refers to the applied security level        Distributed control     as 1s espected the control can be distributed   anyhow the level of distribution not reach in any situation the borders of the DFS        Security     because of the inherent data distribution and the need for  confidencility the highest possible security approach must be used  Of course  there is an equilibrium given by the performance constraints    The Distributed File Management System  DFMS  is an application  written in Java language which consists of three components  the manager  the  server and the client  In the implemented distributed system there may be a  single manager  multiple servers and multiple clients    DFMS has a security module to protect the data transmitted over the  network  The security module uses for communication the SSL TLS Protocol   which is mapped over the TCP layer  The protocol supports the newest and  most secure cryptographic algorithms available  Using a script it can generate  authentication certificates both for the client and server     2  General Structure    The 
10. e Management System are  configurable by using the arguments given at the command line  These  arguments allow you to change the address in order to connect to the servers  to  use the application in a secure mode or not  and to specify the security  parameters    The server connects to the manager in order to send the list of changes  in the structure of directories monitored by the server  The server port through  which the server connects to the manager and the IP address are used to  uniquely identify a server  Thus  you can have multiple servers running on the  same computer  IP   but on different ports  The classes involved in this  communication are  Fig  3         dsn server Server     on the server side        dsn manager net ServerManager     on the manager side     Fig  3     The server manager communication protocol         manager       The client connects to the manager to get the tree with the list of files  and directories from each server in the system  FilelnfoTree   and the list of  servers with their identification numbers  serverld   The classes involved in this  communication are  Fig  4         dsn client ServerManagerConnection     on the client side        dsn manager net ClientHandler     on the manager side     manager    object FilelnfoTree       Fig  4     The client manager communication protocol  the file and directory tree        servermap     client    object Map lt Serverlnfo  Integer gt        Fig  5     The client manager communication prot
11. following external libraries were used in developing the  application        Apache log4j     allows a more efficient control over debugging the  application  log4j 1 2 15 jar         Liquid L amp F     o modern look and feel  liguidinf jar          Common     a proprietary library which contains various reusable  classes  common jar      The application is structured in five source folders as follows     a  data     contains the classes used by the manager  server and client  components  dsn data package     b  client     contains the classes exclusively used by the client   e dsn client package   e dsn client gui package     the client   s GUI component   c  manager     contains the classes exclusively used by the manager   e dsn manager package   e dsn manager net package     the manager   s communication component   d  server     contains the classes exclusively used by the server   dsn server package   e  resources     contains various resources like  images  UML diagrams  and the user   s manual     Bul  Inst  Polit  Iasi  t  LVI  LX   f  2  2010 65    In Fig  1 the package dependency of the implementation is presented         ah bli    a Selmpart  Send  Call Access  Instantiate gt  gt       3 dsn manager   H dsn data i m i Se eae H dsn server    Ti  gt     pr    Li    zi cela ort  Send  Call Instantiate gt  gt    id   i Si    ci H i E A        lt Imp asi  Call  Access  Instantiate gt  gt        a       S a si  LE a ai   a  Pr Eg a   EV EN      y  a 2     ne wie he gee 
12. ion is closed  A method which involves scanning the  directory every 10 sec is chosen and  if there are changes  they will be sent to the  manager  The request initiated by the client falls into one of the following cases        copying  moving  renaming  or deleting a file or directory on the server        creating a directory on the server        copying a file or directory from the server        testing the response time        copying a portion of a file on the server or        starting a process on the server    The client connects to the manager to get the list of supported servers   as well as the file and directory tree  The client is able to copy and move files  and directories on off servers  it can rename  delete or create new directories  In  addition  a testing of the servers    response and a method of copying a file  simultaneously on multiple servers using multiple threads is implemented    A special case of copying a file is the Multi Threaded Copy  MTC    Depending on the selected parameters  the copying is done in parallel from  multiple servers and multiple threads  The MTC process goes through the  following steps        calculate the number of threads used to copy the file        calculate the number of segments in which the file is divided     Bul  Inst  Polit  Iasi  t  LVI  LX   f  2  2010 67        for each thread create a connection to the appropriate servers        one segment is copied from each server    All three components of the Distributed Fil
13. ocol  the server list   The client connects to the server in the following situations     68 Adrian Alexandrescu and Mihai Horia Zaharia        To make a request for a file or directory from the server        To make a request to move a file or directory from the server       To make a request to delete a file or directory from the server       To make a request to rename a file or directory from the server       To make a request to create a directory on the server        To send a file or directory to be copied on the server        To test the response time of the server        To make a request to copy a portion of a file        To start a process on the server    The classes involved in this communication are        dsn client ClientConnection     on the client side        dsn server FileTransferClientHandler     on the server side     The client sends to the server strings finished with   n   lines of text    sometimes  depending on the protocol  The communication ends when the line  read is empty  that is  when only the character   n  is sent  Depending on the first  character received  the appropriate operation is chosen  Every communication  between the client and the server ends by sending the value 0 on 4 bytes   followed by either a value of 1  if the operation has been completed  successfully  or 0 otherwise     When copying a file or directory from the server the three server  response instances are  Fig  6          send a file       send a directory         send
14. the redirection to other servers  thus creating a tunnel  between the client and the server that will send the requested information    Taking into account the HTTP protocol and the fact that html pages are  dynamic  e g  JSP pages   you can make your next optimization  using a  pseudo random manner  for each image a server is chosen  and in the returned  html page the image s URL will point to the chosen server address    When accessing a page in a Web browser  first a request for the HTML  page is made  and then a request for each required resource is initiated  Thus   using the mentioned optimization  it will result in a shorter loading time   because the page is taken from the main server  and the resources are taken from  the other servers  depending on the load  There are two disadvantages to this  tweaking  servers must have real IP addresses and the use of different addresses  for resources may have a negative effect in terms of SEO  Search Engine  Optimization     To implement this concept a way to deploy the site on all stations    Bul  Inst  Polit  Iasi  t  LVI  LX   f  2  2010 73    involved is required  This can be done very easily and quickly with the File  Management Distributed System  When changes in the structure of the site are  needed  the manager side can be used to copy the appropriate files in parallel on  the servers  Also  the main Web server has access  through the manager  to the  list of available servers and to the list of files and directories on
15. to protect the private key    The above method belongs to the class dsn data SecurityFactory which  contains methods to create SSLServerSocket and SSLSocketFactory objects    In Fig  14  the class diagram for the security module is presented        SecurityFactory    aay getSecuresocketFactory keyFileMame  trustFilehame  storePassvword  keyPassword  trustPassword  SocketFactory  c   createSSLContext keyFileMame  truztFilellame  storePassvord  kePazzweord  trustPassword   SSLContext  ae getSecureserverSocket port  keyFileName  trustFileName  storePassyord  keyPassvord  trustPassyword  cipherSutes   ServerSocket    Call       SecurityS ocketCreator  a sf    Send  Import    o SecuritysoacketCreator keyFileName  trustFileMame  storePassyyord  keyPassyvord  trustPaseyvord     2 createSecuresocket host  porti  Socket      Send  Instantiate  Import         9 SecurityException    a SecurtyException    S SecurityException messade    d SecurtyException  cauze    Ci SecurityExceptionimessage  Cauze     Fig  14     The class diagram for the security module     In order to generate the keys and certificates a script is used  The script  to generate keys and certificates follows these steps        For each communication  manager server  manager client  server   client  it generates key pairs  public key   private key   The public key is placed  in an X 509 v3 auto signed certificate  which is stored in a ring of certificates     72 Adrian Alexandrescu and Mihai Horia Zaharia    The ring of
16. twork is to use the TLS  Transport Layer Security    2    3   This cryptographic protocol allows one to encrypt the connection  segments at the transport layer without affecting the communication protocol   TLS is an enhanced version of the SSL  Secure Sockets Layer  protocol  SSL  v2 is no longer used by the main Internet browsers    The initial state of a TLS connection during handshake  uses the cipher  suite TLS NULL WITH NULL NULL  No useful data is transmitted before  finishing the handshake protocol  Each application that uses TLS must    Bul  Inst  Polit  Iasi  t  LVI  LX   f  2  2010 71    implement at least the TLS RSA WITH 3DES EDE CBC SHA cipher suit    If a secure client server communication over TCP  Transmission Control  Protocol   4  is needed the TLS protocol  which is able to encrypt all messages  sent through a secure connection  can be used  One of the most secure cipher  suites that can be used by TLS is TLS RSA WITH AES 128 CBC SHA  the  TLS standard uses the key exchange algorithm RSA with an AES cipher with a  key size of 128 bits  using CBC and the SHA hash function    To use the TLS protocol we have chosen a more advanced approach  employing SSLContext objects in order to enhance the level of security  5       7    Thus we have implemented a static method to create SSLContext objects which  receive as arguments the name of the keystore and truststore files  the  passwords to protect the keystore and truststore integrity  storepass  and the  password 
17. ty Java SSL   Keystores  keytool     Key and Certificate Management Tool  2009  available at  http   java sun com javase 6 docs technotes tools windows keytool html    N    a    SISTEM DISTRIBUIT DE FI  IERE IMPLEMENTAT FOLOSIND  TEHNOLOGIA JAVA     Rezumat       n aceast   lucrare este prezentat   proiectarea   i implementarea independent   de  ma  in   a unui sistem minimal distribuit de fi  iere  Stocarea distribuit    uzual sub form    de fi  iere  a devenit rapid important   o dat   cu succesul arhitecturilor de tip re  ea   i  sta  ii de lucru  In acest model   n afar   de resursele de calcul existente pe o ma  in    central   accesate de terminale  multe sta  ii de lucru au   nlocuit terminalele  O sta  ie de  lucru coopereaz   cu altele comunicarea f  c  ndu se pe un anumit tip de re  ea  cum ar fi  Ethernetul de exemplu   Un DFS este un sistem de servicii de fi  iere a caror clien  i   servere   i dispozitive de stocare sunt dispersate   n loca  iile unui sistem distribuit  Este  opusul abordarii tip warehause  Replicarea fi  ierelor pe ma  ini diferite este o  definitorii pentru un astfel de sistem  Tehnologia Java a fost aleas   deoarece la ora  actual   mobilitatea   i independen  a de platform   a aplica  iilor este critic    Ca rezultat  aceast   aplica  ie poate fi folosit     n orice tip de sistem distribuit     
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
MSD Servo Drive User Manual  取扱説明書(pdfファイル 約2.7MB)  PDF-Datei -> 1.88MB  Promise Technology VessRAID 1840s  Optique - LD Didactic  JVC HA-FX67-B-E headphone  [PDF:3.6MB]  Installation Manual  XtremeMac InCharge Traveler For iPod EU  Bibliothèque globale "Sample Library for Instructions"    Copyright © All rights reserved. 
   Failed to retrieve file