用户名: 密码: 验证码:
基于UML的活动目录研究与设计
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着网络技术的飞速发展,分布式资源的应用与管理对网络性能提出更高的要求。在此背景下,微软在windows server 2000中引入活动目录技术,之后又在windows 2003中改进了活动目录技术,活动目录技术的应用更好地适应了网络的发展需求。然而规划和设计一个结构合理的活动目录对于提升网络性能、充分利用分布式资源会产生积极的作用。
     目前,关于活动目录规划与设计的研究处于起步阶段,绝大多数的设计资料、设计工具和设计方法来自微软,而且设计资料贫乏、设计工具单一、后期维护比较困难,这在很大程度上制约了活动目录技术的应用。本文从系统工程的角度出发,利用UML的工具Rose 2003探讨了活动目录的设计,在吸收已有成果和经验的基础上,提出许多自己的见解,比如活动目录设计需求、分析用例。
     与之同时,为降低维护成本、保持设计与维护的连续性,利用VC++6.0开发工具设计和实现了一个活动目录设计的信息管理系统。在系统中,利用VC++6.0树型控件的层次化特点实现了活动目录逻辑设计的表示,同时利用VC++6.0的多文档/视模式实现了活动目录物理设计的表示。
     本文最后就系统的其他功能提出设想,作为下一步研究的工作重点,主要有网络平台上的设计、数据的安全性、数据的移植性等。
With the rapid development of network technology, the application and management of distributed resource performance higher requirements to the network. In the situation, Microsoft introduced Active Directory technology in windows server 2000, and then improved the technology in windows 2003, which meets the development of network much better. However, to plan and design a more rational structure of the Active Directory will have a positive effect to enhance network performance and make full use of distributed resources.
     At present, the study on planning and design of Active Directory is at the initial stage, the majority of the design information, tools and methods are from Microsoft, and because of its poor design information and tools, difficult latter part maintaining, the application of Active Directory technology is constrained largely. From the perspective of the project, this paper discusses active directory design with a UML tool rose 2003 and introduces many views such as requirement case and analysis case on the basis of absorbing a lot of results and experiences.
     In order to reduce maintenance costs and keep the continuity of the design and maintenance, an information management systems based on the Active Directory is designed with VC++6.0 tool. In the system, it realizes the Active Directory logical structure denotation by VC++6.0 tree control, and achieves the Active Directory physical structure denotation by VC++6.0 multi-document/view.
     In the end, this paper envisages the other functions of the system as the next step of research focusing mainly on the network platform design, data security, data migration and so on.
引文
[1]周靖,尤晓东等译.Windows Server 2003 深层解决方案[M].北京:中国水利水电出版社,2005.7.
    [2]刘晓辉.Windows server 2003 服务器搭建、配置与管理[M].北京:中国水利水电出版社,2004.9.P2,3,51。
    [3]颜逸品.Windows 2000 server 企业网络建构实务--Active Directory篇[M].北京:中国铁道出版社,2001.2.
    [4]王磊,王毳.Windows 2000 active directory 程序设计[M].北京:机械工业出版社,2002.1,p17-20.
    [5]商宏图.Windows server 2003活动目录[M].北京:机械工业出版社,2005.8.
    [6]李莉.基于LDAP的活动目录在网络管理中的应用研究[D].新疆大学.
    [7]梁晋,施仁等.Windows 2000 活动目录技术[J].计算机应用研究,2000,第5期.
    [8]郭健.活动目录技术在电子邮件管理系统中的应用研究[D].沈阳工业大学,2002.3.
    [9]唐瑞春,毛健等.基于活动目录的通用授权管理平台的设计与实现[J].中国海洋大学学报,2006.11,P1013-1018.
    [10]王晓亮,陶红.使用ADSI和Exchange CDO管理活动目录[J].计算机应用,2002.7.
    [11]尚志明,于隆,高海峰.基于ADSI和目录服务的网络管理模型[J].计算机应用,2003.3.
    [12]于剑,张辉,赵红梅.LDAP目录服务在Web开发中的应用[J].计算机应用,2003.10.
    [13]W.David Iseminger,曾国平,赵胜龙等译.Windows2000活动目录ADSI程序员指南[M].北京:机械工业出版社,2001.2.
    [14]Gil Kirkpatrick,谭郁松,张明杰等译.Active Directory 编程指南[M].北京:清华大学出版社,2001.5,P5-7.
    [15]Simhem Amer_yahia.Distributed evaluation of network directory queries.2004IEEE,p476.
    [16]Apura kumar.Efficient filter based replication for LDAP directorys.2007IEEE,p1374.
    [17]Windows Server 2003 Deployment Kit.Designing and Deploying Directory and Security Services[EB/OL].http://www.microsoft.com/downloads/details.aspx?familyid=6cde6ee7-5dfl-4394-92ed-2147c3a9ebbe&displaylang=en.
    [18]孙东礼.基于角色控制和活动目录的OA系统安全策略[J].计算机应用,2003.6,P275-277.
    [19]袁崇义.Petri网原理与应用[M].北京:电子工业出版社,2005.3,P98
    [20]王少锋.面向对象技术MUL教程[M].北京:清华大学出版社,2004.2.
    [21]王养廷,李磊,宋汉珍.UML基础与应用[M].北京:清华大学出版社,2006.6
    [22]张龙祥.UML与系统分析统计[M].北京:人民邮电出版社,2001.8.
    [23]张国宁.基于UML的软件体系结构六视图描述研究[D].合肥工业大学,2004.6.
    [24]夏云庆.Visual C++6.0数据库高级编程[M].北京:北京希望电子出版社,2002(174,176).
    [25]王骏.轻松实现类VC界面[EB/OL].http://blog.sina.com.cn/s/blog_56e56dee010008na.ht ml.
    [26]Riri fitri sari.Intergrating web server application with LDAP authentication:case study on human resources information system of UI.2006IEEE,p307.
    [27]Edgard jamhour.Distributed security management using LDAP Directory.
    [28]Jong Hyuk Choi,Sang Seok Lim,Kurt D Zeilenga.A New On-line Certificate Validation Method using LDAP Component Matching Technology[J].2005 IEEE.
    [29]David w Chadwick.Authorisation using attributes from multiple authorities.computer society,2006 IEEE.
    [30]Vinith Bindiganavale,Jinsong Ouyang.Role Based Access Control in Enterprise Application Security Administration and User Management[J].2006 IEEE.
    [31]A.Tchekmarev,D.Vishniakov.Windows2000 Domains and ActiveDirectory,Charles River Media,March 2000.
    [32]Teld Brown,Chris Millerr.Windows2000 Server Unleashed,P244,P245Sam Publishing,May 2000.
    [33]Alstair G.Loue-Norris.Windows2000 Active Directory,O'Reily&Associate,Inc,2000.
    [34]Microsoft Consulting Services.Building Enterprise Active DirectoryServices Notes from the Field.Microsoft Press,March 2000.
    [35]Charles Oppermann.Microsoft Windows2000 Active Directory Programming,Microsoft Press,June 2001.
    [36]John Paul Mueller,Windows2000 Programming Bible,P609S,P610,IDG Books Worldwide.INC,April 2000
    [37]I-Iahn,Stenen.ADSI ASP Programmer Reference.Worx Press Ltd,1998.
    [38]Adam Wood.Windows2000 Active Directory Black Book.Coriolis,November 2000.
    [39]David Iseminger,Active Directory Service Interface Programmer Guide,Voll,Microsoft Press,2000.
    [40]J.Peter Bruzzese,Windows2000 Directory Services Design,MicrosoftPress,March 2001.
    [41]Dino Esposito,Windows 2000 Web Developer,Microsoft InternetDeveloper,Vo13,1999.
    [42]William R.Stanek,Windows2000 Scripting Bible,IDG Books,World-wide.INC,October 2000.
    [43]William Wong, Windows2000 DNS Server, McGraw-Hill Companies.INC, February 2001
    
    [44]Thomaz Rizzo,Programming Microsoft Exchange, Microsoft Corporation,November 2000.
    
    [45]Neall Alcott.Understanding and Designing Your Active Directorylnfrastructure, Sams,December 2001.
    
    [46]Glenn pittaway,Microsoft Ltd.Distributed Security Services in Microsoft Windows NT 5.0-Kerberos and the Active Directory.Information Security Technical Report, 1998.3.
    
    [47]Gary L.Olsen.Windows2000 Active Directory Design&Deployment.New Riders,Seritemher 2000
    
    [48]Microsoft Corporation.Designing a Microsoft Windows2000 DirectoryServices Infrastructure. Microsoft Press, May 2001.
    
    [49]Sean Fullerton,James Hudson.Special Edition Using Microsoft ActiveDirectory.Que, March 2001.
    
    [50]Generating Active Directory Diagrams with Visio 2003 and Visual Studio .NET 2003. http://msdn2.microsoft.com/en-us/library/bb226689(office.11).aspx
    
    [51]Wiley.The Art of Software Architecture. Design Methods and Techniques[J]. 2003.
    
    [52]Amal Barman.LDAP Application Development using J2EE and .NET[J]. 2004 IEEE.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700