Remote Access of Computer Controlled Experiments
|
|
|
- Jessie Hopkins
- 9 years ago
- Views:
Transcription
1 Remote Access of Computer Controlled Experiments K. Nilsson, J. Zackrisson and M.I. Pettersson Blekinge Institute of Technology/ School of Engineering, Ronneby, Sweden Abstract in this paper, we present a way for students to access and operate laboratory equipment, controlled by a laboratory computer via a remote access program. In this way, the solution is not dependent on the specific laboratory equipment, as long as the equipment can be remotely controlled. The system can easily be altered to be used in another laboratory setup. Students are able to make reservations of experiment sessions through a web interface, which is administrated by the system administrator. The solution proposed in this paper is one way to speed up the development of remote accessible laboratories. Most of the proposed solution is based on open source software and the hardware is built on ordinary consumer parts, which makes the proposed remote laboratory architecture cost effective. Index Terms Remote handling, Student experiments, Training, e-learning I. INTRODUCTION The purpose of this work at Blekinge Institute of Technology (BTH) is to provide an effective and efficient environment for experiments. This paper is focusing on antenna equipment and how to remotely control this hardware. The design allows students to perform experiments around the clock, every day. The strength of the system is the access to expensive equipment without the need of a supervisor, continuously monitoring the experiment. This helps meet the demands of more students without increase in staff and funding resources. According to [1] the number of students is increasing compared to the funding dedicated for hands-on experiments. In engineering education, a key-activity to improve the learning process is hands-on experience, gained from laboratory experiments [2]. Students want extended accessibility and free access to learning resources, this demands more flexible laboratories that not only are physical accessibility around the clock. They must also be accessible without the geographical limitation. Today there are many academic institutions offering web-based experiments, so called remote laboratories, which are supporting remote access of physical hardware [3, 4]. The architecture presented in this paper is describing a general solution for how a computer-controlled experiment can be made remote accessible, without the need for special hardware or customized software. The presented architecture is built on simple and robust hardware running standard software. II. GENERAL STRUCTURE The laboratory system is divided in three major parts, Figure 1. The first part is the Web server. The second part is the controller. The last part is the computer the students will remote control to perform experiments. Through the laboratory s web interface, students can allocate resources and mange their experiments. To get access to the laboratory students must first authenticate themselves. This is done through a login webpage where the student enters his/her address and password. The first time a student want to use the system, the account has to be activated. This activation is generating a password and which is sent to the users address. When a student is logged-in, he/she can make a reservation. The student can choose which system installation to use. A system installation is a snapshot of hard drive content, also called clone, and consists of an Operating system and all the tools needed for the experiment. The controller is handling and distributing these clones of different operating systems and software. A Power Distribution Unit (PDU) is handling the power distribution to all of the computers. For the cloning system to be able to install a new operating system the remote controlled computer (RCC) have to be rebooted. A PDU that switch the power off and on are the most reliable solution of ensuring that the computer is rebooted. Figure1. General view of the core parts in the system. Control mechanisms make sure that it is safe to give full access of the remote controlled machine to the student. That means that they do not require supervision during their experiment. Users are given full access to the laboratory computer and have the freedom to alter the entire operating system. This is made possible due to the 1
2 cloning system. When a laboratory session is over, the cloning system will wipe the RCC s hard disk content and install a new clone for the next experiment. To prevent abuse of the system the only accepted data communication is from the student that booked the laboratory session this security measure is preventing the system from being used for adverse activities. Both the web server and the controller are running on FreeBSD [5], an open source operating system. A. Web Server The web server is handling the web interface, where users can make experiment reservations. In the antenna laboratory this computer are also acting as a firewall and a DNS server. The Web Server is providing the following services: Firewall (PF) DNS DHCP Web server (Apache) o Web application Remote access is vital to the laboratory. At the same time, security measures must be taken to guarantee that the system is not used in adverse ways. A way to provide remote access is to let a firewall give certain IP-addresses access to the laboratory. When a student chooses to begin a laboratory session in the web interface, the address is saved. The IP-address is then used to generate firewalls rules that only allowing data traffic between the user s computer and the RCC in the laboratory. After the laboratory session is over, access to the laboratory is disabled. This solution requires that the student have the same IP-address for the whole laboratory session. Depending on the demands of the experiments, a system administrator can make exceptions and e.g. grant access from the RCC to different web sites. B. Controller The system used for creating clones is the EXP experiment system [6]. It is provided by EXP innovation and is used under a restricted BTH license. The experiment system EXP is handling all of the clones that can be installed on the RCC. Clone images are raw copies of the content off a hard drive. All of the hardware is built on standard PC parts with this specially built EXP software, which runs on the controller. The controller is acting as a server to all of the RCCs in the network. The cloning system is providing the following functions: Booting a system on the RCC Creating of system clones Installing of system clones Cleaning hard disks The system administrator creates clones by installing all of the necessary software on the RCC and by using the cloning software to make a complete clone image of its hard drive. The cloning process is providing the necessary tools for experiments without the need of further installations during the laboratory sessions. Because most experiments don t need to use the whole hard drive a Microsoft Windows XP operating system image can be installed on a 10GB partition and the clone tool can be set to only clone this 10GB area. To compress the size of the clone even more the run length encoding (RLE) compression can be used. All of the software, except the cloning system, is released as open source software and can downloaded from C. Remote Controlled Computer The RCC are a built on hardware that are suited for the type of operating system that are demanded by the experimental hardware. In this case are the RCC built on ordinary PC parts. This computer is the only part of the system that is accessed by the student; the controller is transparent for the end user and the web server are only access by the web interface. D. Power Distribution Unit The PDU are distributing power to the computers in the laboratory. The PDU can be controlled via SNMP. When a RCC is cleaned, cloned or reinstalled with a new clone, a reboot of the computer is needed. There are different software solutions for rebooting the computer, but only ways to make sure that the computer is rebooted is to turn the power off and on again. This approach demands that the hardware is supporting power up after power failure. The benefits of a PDU compared to other solutions are that it is independent of hardware manufacturers and are not demanding operating system integration. Unfortunately, it put some extra strain on the RCCs hardware as the power is cut without notification. Older hard drives had problems with start-stop (CSS) cycles, which happens when there is a power failure or in our case cut the power to the hard drive without notification. Modern hard drives have different ways to handle power failure. One solution is CSS landing zones, which are specially prepared regions on the platter to where the read head automatically returns in case of a power failure. One other solution is moving the read head away from the platter [11] in case of a power failure. Most of the new hard drives on the market are guaranteeing a start-stop cycle count of [12, 13] or nearly 3 years (1000 days) of operating at 50 cycles per day. III. SYSTEM MANAGEMENT The solutions presented so far focuses on the general structure of a remote laboratory that can be used with various types of hardware and or software. One of the laboratories adapting this general structure is the antenna laboratory [9]. The antenna laboratory is managed from a web application running in a web browser, where the user can make experiment reservations, deciding when, and what type of experimental environment to use. The administrator can create course occasions for different courses, and the system resources can be distributed among these occasions and shared among different courses. Course occasions are limited in time and the 2
3 number of users it can handle. This is an estimation of how many reservations that can be expected. For an occasion there can be several teachers assigned and it is up to them to do further management of the occasion. To give access to the system an administrator or teacher has to register the address for the users. The first time a user wants to access the system, the account has to be activated. This makes the system send an automatically generated password to the users address. There are three different levels of access to the system, administrator, teacher, and student. Depending on the role, they will be presented with different options. A. Administrator The administrator is responsible for the general management of the system; he/she is creating courses and deciding the limitations of recourses for this course. It is the administrator that is creating the different clones that later on can be used in the courses. The system are built in a hierarchy, the administrator are overruling both the teacher and the students settings. B. Teacher The top part of the teacher interface in Figure 2 is showing information about the course occasion. Teachers can make pre-reservation, e.g. for teacher-lead experiments. This type of reservation is given priority over ordinary reservations and do not have the time restrictions ordinary reservations have. The bottom part of the teachers interface Figure 2 is for managing users in the courses occasion. All of the users registered to this occasion are presented with their address and user type. In the bottommost area address of new users can be added, this field is accepting multiple inputs as long that there is a new line between every address. The teacher can perform the following actions: Figure 2. Teacher interface. Define the number of computers a student can reserve. Make a pre-reservation. Add and remove users from the course. C. Student Students are able to make reservations of laboratory session. It is up to the administrator to decide the maximum duration of one laboratory session and decide which clones that are allowed for the session. Figure 3 shows an overview of the reservation system. The information given is the number of RCC that are available every hour. In the antenna laboratory, there is only one computer and therefore the maximum numbers of accessible RCCs shown in Figure 3 is one. Figure 3. Overview of the reservation page. The reservations are made simply by clicking on an available RCC. After a reservation is made, the cloning system needs time to transfer the clone from the controller to the RCC. Depending on size of the clone, variations in cloning time is hard to approximate and therefore a one-hour preparation period is added to the reservation system to guarantee that the system have finished. Five minutes before the experiment begins, an is sent to the student an as reminder. This massage contains all the information needed for the experiment, such as user name, password, and IP-address. IV. ANTENNA LABORATORY In the antenna laboratory, the main part of the software used in web server and controller was developed for the security laboratory at BTH [11]. The security laboratory is focusing on security and the possibility to experiment with dangerous software in a controlled environment. In the antenna laboratory, the focus is to give students remote access to expensive equipment. Figure 4 is illustrating the structure of the antenna laboratory. The antenna laboratory is expanding the general configuration, shown in Figure 1, with one web camera, one camera accessed over the USB and the antenna equipment. 3
4 Figure 4. Antenna laboratory. A. Antenna Equipment The equipment used in the laboratory is provided by Lucas-Nuelle Lehr- und Messgeraete GmbH [7]. The company has a wide range of products for antenna laboratories. The one used in this work is the TAT Antenna Techniques [8]. This equipment makes it possibly to do experiments in antenna technology fundamentals and is recommended for basic courses in antenna theory. The laboratory equipment is communicating by USB. Without the protocol specification for the USB controlled device, it is almost impossible for third party software to access the hardware. This means we have to depend on the provided software, and that is the reason behind this remote control solution. B. Cameras In the antenna laboratory, there are two cameras. One is used for monitoring and to give visitors of the laboratory home page an overview. This camera is continuously taking pictures of the laboratory equipment and they are shown at the home page [9]. The second camera is used during the experiments in the laboratory. This camera is covering two important areas; one is to provide a feeling of working with real equipment and the other are to give necessary information for the laboratory assignment. The camera that is used by the student is remotely adjustable in vertical and the horizontal level. Depending on the bandwidth of the students Internet connection, the image quality can be adjusted, to allow everyone the same opportunity to perform experiments. C. Preforming a Experiment To remote control the antenna experiment, Microsoft Remote Desktop is used, which is part of the Windows operating system. When the student confirms that he/she is ready to start the experiment session, the firewall settings are updated automatically to allow connections to the RCC. The firewall will then be accepting incoming and outgoing traffic to and from the users IP-address. The student is then allowed to connect to the remote controlled computer. Figure 5 shows the system running a laboratory session. Figure 5. Running laboratory session, to the right is the software program for the tat antenna techniques and to the left is the remote controlled camera. During the session, students can perform all of the tasks that an ordinary laboratory can offer. In the Figure 5 to the right is the software program for the TAT Antenna Techniques [8] and to the left is the remote controlled camera. V. ADAPTING THE SYSTEM TO NEW APPLICATIONS The system can be adapted to handle different types of laboratory software or hardware, as long as it is controlled by a computer that allows remote control. The requirements (of the laboratory equipment) are that a computer controls it and that the operating system is supporting remote access. The system can for example be used for remote accessing: Expensive or fragile hardware Sensitive or expensive software Sensitive or dangerous hardware One of the advantages of the system is the freedom for the user; one user can control all of the hardware and software resources without worry about the next user. Regardless of what type of changes that has been made in the software, the system always restores the software between every laboratory sessions. The flexibility allows the system to be adapted in various ways. A. Scaling Depending on the needs and demands of the system, more RCC with homogenous hardware can be added. One important thing to consider when expanding the laboratory with more RCC is the cloning time, depending on the LAN configuration and the number of simultaneous cloned computers the cloning time can increase. The system used today is supporting feedback from the RCC when a successful clone is ready but the software handling this feedback is still under construction. That means, a fixed preparation and cleaning time must be used, which have to be estimated by hand. Figure 6 is illustrating a scaled version of the antenna laboratory. B. Adapting to a Specific Problem On BTH the EXP system are been used to supply on campus laboratories with on demand reinstallation of the 4
5 Experimentation and Tutoring resources, the International Conference on Engineering Education, Manchester, UK, August 18 21, 2002 [3] Nedic, Z and Machotka, J, Remote Laboratory Net-Lab for Effective Teaching of 1st Year Engineering Students, Proceedings of the REV 2007 Conference, Porto, Portugal. June 25 27, 2007 [4] Scapolla, A, Bagnasco, A, Ponta, D, and Parodi, G, A Modular and Extensible Remote Electronic Laboratory, International Journal of Online Engineering, Vol. 1, No. 1, 2005 [5] [6] Mellstrand, P, Informed System Protection, Dissertation, 2007, pp Figure 6. Expanded system with more homogenous RCC. entire operating system. Different laboratory sessions demand different software and sometimes even different operating systems. Instead of having multiple operating systems installed on the local computer, the teacher can prepare a clone in advance. This clone is then installed on the local computers. By using this solution the teacher only needs to maintain one copy of the software and students don t have to worry about system configuration, all of the computers are having the same configuration when the laboratory session are starting. VI. CONCLUSION AND FURTHER WORK In this paper, a general computer based structure is presented that can be applied to various computer based experiments. The proposed solution has the potential to be adapted to a wide range of laboratory experiments The laboratory could also be used to give students access to expensive and licensed software (if the end user license agreement allows it), without need to install it on their home computers. The solution of the antenna laboratory is focusing on the access of the computer through for example remote desktop rather than focusing on the interface controlling the hardware. This approach makes detailed knowledge of the communication between hardware and the computer unnecessary. The solution is a fast and simple way of constructing a remote accessed laboratory. The goal is to offer access to experimental equipment around the clock and the experience of a genuine laboratory. Adapting this architecture will help the universities to increase remote experiment possibilities, without increasing running cost per student. BTH has developed software for online laboratory that uses the same equipment as a traditional laboratory. In the antenna laboratory the difference between a traditional laboratory and the online laboratory are the ability to change antennas in the laboratory equipment, this limitation are going to be further investigated. REFERENCES [1] Magin, D, and Kanapathipillai, S, Engineering Students Understanding of the Role of Experimentation, European Journal of Engineering Education, Vol. 25, no. 4, 2000, pp [7] [8] ation_technology/tan.htm [9] [10] Zackrisson, J and Svahnberg,C, OpenLabs Security Laboratory - The Online Security Experiment Platform International Journal of Online Engineering, Vol. 4, 2008 [11] Patricia Kim and Mike Suk, Ramp Load/Unload Technology in Hard Disk Drives whitepaper, [12] Maxtor Corporation, Maxtor DiamondMax 10 specification, [13] Hitachi Global Storage Technologies, Hitachi Deskstar 7K1000 specification, AUTHORS K. Nilsson is with Blekinge Institute of Technology, Ronneby, Sweden ( kristian.nilsson@ bth.se). J. Zackrisson is with Blekinge Institute of Technology, Ronneby, Sweden ( johan.zackrisson@ bth.se). M.I. Pettersson is with Blekinge Institute of Technology, Ronneby, Sweden ( mats.pettersson@ bth.se). Manuscript received 24 October The VISIR project is supported by VINNOVA (Swedish Governmental Agency for Innovation Systems) [2] Ursulet, S and Gillet,D, Introducing Flexibility in Traditional Engineering Education by Providing Dedicated On-line 5
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
Deploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
Using Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013
LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...
TENVIS Technology Co., Ltd. User Manual. For H.264 Cameras. Version 2.0.0
TENVIS Technology Co., Ltd User Manual For H.264 Cameras Version 2.0.0 Catalogue Basic Operation... 3 Hardware Installation... 3 Search Camera... 3 Get live video... 5 Camera Settings... 8 System... 8
OS Installation Guide Red Hat Linux 9.0
OS Installation Guide Red Hat Linux 9.0 C o n t e n t s Contents 3 About This Guide 5 1 Planning Your Installation 7 Requirements 7 2 Installing Red Hat 9.0 Error! Bookmark not defined. What s Next? 19
It is recommended that you use a clean installation of Lion client before upgrading to Lion Server.
Wazza s Lion Server QuickStart 1. Installing Lion Server About this Document This document is the first in a series of documents describing the process of installing and configuring a Mac OS X 10.7 Server
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Allworx Installation Course
VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The
Acronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
Windows Server 2008 R2 Initial Configuration Tasks
Windows Server 2008 R2 Initial Configuration Tasks I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support for the
1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
Windows Embedded Standard 7 (WES7) Administration Guide
Windows Embedded Standard 7 (WES7) Administration Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates
Campus VPN. Version 1.0 September 22, 2008
Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Using Remote Desktop with No-IP
Page 1 of 6 Lost Password? Sign-up Now!. com Support : Guides and Tips : Remote Access : Using Remote Desktop with No-IP Overview The use of Microsoft's Remote Desktop Connection to access another computer
ViPNet ThinClient 3.3. Quick Start
ViPNet ThinClient 3.3 Quick Start 1991 2014 Infotecs Americas. All rights reserved. Version: 00060-07 34 02 ENU This document is included in the software distribution kit and is subject to the same terms
Installation Overview
Contents Installation Overview... 2 How to Install Ad-Aware Management Server... 3 How to Deploy the Ad-Aware Security Solutions... 5 General Deployment Conditions... 5 Deploying Ad-Aware Management Agent...
RAPID BROADBAND INSTALLATION RAPID BROADBAND SUPPORT CONTACT DETAILS. [email protected] AND TROUBLESHOOTING GUIDE. Email: Tel: 076 6708787
RAPID BROADBAND INSTALLATION AND TROUBLESHOOTING GUIDE RAPID BROADBAND SUPPORT CONTACT DETAILS Email: [email protected] Tel: 076 6708787 January 2008 1 INTERNET CONNECTION TROUBLESHOOTING GUIDE
Also you need the C-MOR ISO file. This file you will find following this link: http://www.cmor.com/video-surveillance/download-vm.
This Guide will show you the installation of C-MOR Video Surveillance on a Microsoft Hyper- V server. You are able to download the Microsoft Hyper-v 2012 server on http://www.microsoft.com/en-us/server-cloud/hyper-v-server/.
Deploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved.
Kerio Control VMware Virtual Appliance Quick Setup Guide 2011 Kerio Technologies s.r.o. All rights reserved. This document provides detailed description on installation and basic configuration of the Kerio
Leostream Corporation leostream.com [email protected] Share this Whitepaper!
Introduction... 3 Advantages of Providing Remote Access to Personal PC... 4 Disadvantages of Typical Remote Access Solutions in a Corporate Environment... 5 Why Use Leostream for Remote Access... 5 Using
How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On
Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
Using iscsi with BackupAssist. User Guide
User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...
What Is Ad-Aware Update Server?
Contents What Is Ad-Aware Update Server?...2 Installation and Removal...3 System Requirements...3 Obtaining the Installation File...3 Installing Ad-Aware Update Server...3 Upgrade...4 Repairing, Modifying
Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation
User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
How to Test Out Backup & Replication 6.5 for Hyper-V
How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication
Connecting to the Remote Desktop Service
Connecting to the Remote Desktop Service What is the Remote Desktop Service? Connecting to a University of Greenwich Remote Desktop allows you to work securely on documents and files held on the University's
DeployStudio Server Quick Install
DeployStudio Server Quick Install v1.7.0 The DeployStudio Team [email protected] Requirements OS X 10.7.5 to 10.11.1 DeployStudioServer_v1.7.x.pkg and later NetBoot based deployment 100 Mb/s switched
Driver Updater Manual
Driver Updater Manual Keep your drivers up-to-date! Improve your system performance and stability by keeping your drivers updated. Automatically find, update and fix the drivers on your computer and turn
Weston Public Schools Virtual Desktop Access Instructions
Instructions for connecting to the Weston Schools Virtual Desktop Environment Notes: You will have to have administrator permission on your computer in order to install a VMWare Client application which
Student Halls Network. Connection Guide
Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to
How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
3.5 EXTERNAL NETWORK HDD. User s Manual
3.5 EXTERNAL NETWORK HDD User s Manual Table of Content Before You Use Key Features H/W Installation Illustration of Product LED Definition NETWORK HDD Assembly Setup the Network HDD Home Disk Utility
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
Cloning Utility for Rockwell Automation Industrial Computers
Technical Data Cloning Utility for Rockwell Automation Industrial Computers Topic Page About the Cloning Utility 2 Recovery Partition Considerations 2 Prepare to Boot from the Accessories CD 3 Start the
8/16-Port IP KVM Switch IKVM-8010 / IKVM-16010. Quick Installation Guide
8/16-Port IP KVM Switch IKVM-8010 / IKVM-16010 Quick Installation Guide Table Of Contents Chapter 1 Introduction... 3 1.1 Features... 3 1.2 Package Contents... 4 1.3 Technical Specifications... 4 Chapter
Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
ServerPronto Cloud User Guide
ServerPronto Cloud User Guide Virtual machines Virtual machines are based on templates and are deployed on hypervisors. Hypervisors give them access to CPU, disk and network resources. The ServerPronto
Acronis Backup & Recovery 10 Workstation. Installation Guide
Acronis Backup & Recovery 10 Workstation Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent for Windows...
HP MediaSmart Server Software Upgrade from v.1 to v.3
HP MediaSmart Server Software Upgrade from v.1 to v.3 Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New... 3 Features That Will Change... 4 Prepare
ISL AlwaysOn 1.0 Manual
Contents 2 Table of Contents Foreword 0 Part I Introduction 3 Part II Security Statement 4 Part III System requirements 6 Part IV Setting up ISL AlwaysOn on a computer 7... 1 Register ISL Online account
FAQ. F-Secure Online Backup
F-Secure Online Backup Before installation... 3 Does the F Secure Online Backup program work if there are other online backup programs installed on my computer?... 4 Are two online backup programs better
TE100-P21/TEW-P21G Windows 7 Installation Instruction
Hardware Installation TE100-P21/TEW-P21G Windows 7 Installation Instruction 1. Go to http://www.trendnet.com/downloads/ to download the Windows 7 Utility. Save the file to your desktop. 2. Right click
Contents. VPN Instructions. VPN Instructions... 1
VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit
Installation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
This document is intended to make you familiar with the ServersCheck Monitoring Appliance
ServersCheck Monitoring Appliance Quick Overview This document is intended to make you familiar with the ServersCheck Monitoring Appliance Although it is possible, we highly recommend not to install other
Quick Start Guide. Version R91. English
Using StorageCraft Recovery Environment Quick Start Guide Version R91 English May 20, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s
Wazza s QuickStart 15. Leopard Server - Disaster Backup
Wazza s QuickStart 15. Leopard Server - Disaster Backup About the Document This document is the 15th in a series of documents describing the process of installing and configuring a Mac OS X 10.5 Server
Installing Windows XP Professional
CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows
Amahi Instruction Manual
History of Amahi Chapter 1 Installing fedora 12 and Amahi Home Digital Assistant (HDA) Chapter 2 Your DHCP/DNS options Chapter 3 Network Troubleshooting Chapter 4 Getting Started Appendix: Advanced Hard
Table of Contents. FleetSoft Installation Guide
FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating
How To Set Up A Thermal Cycler With Veritilink Remote Management Software
Installation Guide VeritiLink Remote Management Software Version 1.0 Installation Guide Getting Started VeritiLink Remote Management Software Version 1.0 Setting Up the Veriti Thermal Cyclers Setting
RemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...
Operating System Installation Guide
Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating
Guide to Setting up Internet Connection Sharing for Windows
Guide to Setting up Internet Connection Sharing for Windows Document Date: December 20, 2005 Document Version: Version: 1.0 Disclaimer: Please note that this document is provided on an as is where is basis
Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server
Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server DCOM Configuration Introduction This document is intended to provide a check-list of
How to Install Windows 7 software
Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly
Network device management solution
iw Management Console Network device management solution iw MANAGEMENT CONSOLE Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
PLEASE NOTE: The client data used in these manuals is purely fictional.
Welcome! CAREWare Quick Start guides will walk you through the basics of setting up, managing and using the main CAREWare functions. It is intended for non-technical users who just need to get basic information
Virtual Lab : Bring the Hands-on Activity to Online Courses
Virtual Lab : Bring the Hands-on Activity to Online Courses Biwu Yang East Carolina University Session 3220 Abstract A Virtual Lab has been implemented for several online courses with subject around Computer
LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011
LOCKSS on LINUX Installation Manual and the OpenBSD Transition 02/17/2011 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 7 BIOS Settings... 10 Installation... 11 Firewall
Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
Using NetBooting on the Mac OS X Server for delivery of mass client deployment
23.07 Netbooting 6/2/07 1:30 PM Page 2 Using NetBooting on the Mac OS X Server for delivery of mass client deployment by Criss Myers Preface In this modern era of high technical and support costs, it is
Managing Remote Access
VMWARE TECHNICAL NOTE VMware ACE Managing Remote Access This technical note explains how to use VMware ACE to manage remote access through VPN to a corporate network. This document contains the following
Comodo LoginPro Software Version 1.5
Comodo LoginPro Software Version 1.5 User Guide Guide Version 1.5.030513 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System
FOG Guide. IPBRICK International. July 17, 2013
FOG Guide IPBRICK International July 17, 2013 1 Copyright c IPBRICK International All rights reserved. The information in this manual is subject to change without prior notice. The presented explanations,
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
Media Server Installation & Administration Guide
Media Server Installation & Administration Guide Smarter Surveillance for a Safer World On-Net Surveillance Systems, Inc. One Blue Hill Plaza, 7 th Floor, PO Box 1555 Pearl River, NY 10965 Phone: (845)
Installation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment Browser
Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
System Recovery in Next to No Time by Jürgen Heyer
Product Test : Storagecraft ShadowProtect Server Edition 3.3 System Recovery in Next to No Time by Jürgen Heyer The advantages of an image-based backup system become obvious when a server fails to start
Xopero Backup Build your private cloud backup environment. Getting started
Xopero Backup Build your private cloud backup environment Getting started 07.05.2015 List of contents Introduction... 2 Get Management Center... 2 Setup Xopero to work... 3 Change the admin password...
WatchGuard Mobile User VPN Guide
WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).
Simple. Control Panel. for your Linux Server. Getting Started Guide. Simple Control Panel // Linux Server
Getting Started Guide Simple Control Panel for your Linux Server Getting Started Guide Page 1 Getting Started Guide: Simple Control Panel, Linux Server Version 2.1 (02.01.10) Copyright 2010. All rights
Virtual Server in SP883
Virtual Server in SP883 1 Introduction: 1.1 Micronet SP883 is a hard QoS broadband router, means its guaranteed service can provide absolute reservation of resource (bandwidth) for specific traffic;not
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Number: 1Y0-A14 Passing Score: 800 Time Limit: 90 min File Version: 42.2 http://www.gratisexam.com/ CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Exam Name: Implementing
QNAP SYSTEMS INC. QNAP Digital Signage Player Web Console Manual
QNAP SYSTEMS INC. QNAP Digital Signage Player Web Console Manual Table of Content 1 Introduction... 3 1.1 Purpose... 3 1.2 Support Browser... 3 2 System Administration... 3 2.1 Login Page... 3 2.2 Overview
PARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
Guide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
StruxureWare Data Center Expert 7.2.4 Release Notes
StruxureWare Data Center Expert 7.2.4 Release Notes Table of Contents Page # Part Numbers Affected...... 1 Minimum System Requirements... 1 New Features........ 1 Issues Fixed....3 Known Issues...3 Upgrade
GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop
Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Contents: Executive Summary... 1
Installing and Configuring Windows Server 2008. Module Overview 14/05/2013. Lesson 1: Planning Windows Server 2008 Installation.
Installing and Configuring Windows Server 2008 Tom Brett Module Overview Planning Windows Server 2008 Installations Performing a Windows Server 2008 Installation Configuring Windows Server 2008 Following
DPMS2 McAfee Endpoint Encryption New Installation
DPMS2 McAfee Endpoint Encryption New Installation Contents DPMS2 McAfee Endpoint Encryption New Installation... 1 1. Registering for the Application... 2 2. Downloading the Application... 6 3. Important
Accessing your Staff (N and O drive) files from off campus
Accessing your Staff (N and O drive) files from off campus It is possible to access your N and O drive files while you are off campus, for example whilst working from home or travelling. This document
Parallels Plesk Panel 11 for your Linux server
Getting Started Guide Parallels Plesk Panel 11 for your Linux server Getting Started Guide Page 1 Getting Started Guide: Parallels Plesk Panel 11, Linux Server Version 1.1 (11.1.2012) Copyright 2012. All
How To Backup An Exchange Server With 25Gb And More On A Microsoft Smartfiler With A Backup From A Backup To A Backup Point Set On A Flash Drive On A Pc Or Macbook Or Ipad On A Cheap Computer (For A
Using SmartFiler for Microsoft Exchange Server Backup Introduction The SmartFiler Backup Appliance Exchange Server backup solution is integrated with the Symantec Backup Exec System Recovery 2010. Using
NOC PS manual. Copyright Maxnet 2009 2015 All rights reserved. Page 1/45 NOC-PS Manuel EN version 1.3
NOC PS manual Copyright Maxnet 2009 2015 All rights reserved Page 1/45 Table of contents Installation...3 System requirements...3 Network setup...5 Installation under Vmware Vsphere...8 Installation under
Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions
Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions Disclaimer: As with any software upgrade or new release, it is strongly encouraged to fully test the new build within your environment prior
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 16. AKIPS Pty Ltd
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 16 AKIPS Pty Ltd July 5, 2016 1 Copyright Copyright 2015 AKIPS Holdings Pty Ltd. All rights reserved worldwide. No part of this
StruxureWare Data Center Expert 7.2.1 Release Notes
StruxureWare Data Center Expert 7.2.1 Release Notes Table of Contents Page # Part Numbers Affected...... 1 Minimum System Requirements... 1 New Features........ 1 Issues Fixed....2 Known Issues...2 Upgrade
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
