CONCEPT FOR ONLINE WEB MACHINE TOOL CONTROL BASED ON OPEN SOURCE

Size: px
Start display at page:

Download "CONCEPT FOR ONLINE WEB MACHINE TOOL CONTROL BASED ON OPEN SOURCE"

Transcription

1 8th International DAAAM Baltic Conference "INDUSTRIAL ENGINEERING April 2012, Tallinn, Estonia CONCEPT FOR ONLINE WEB MACHINE TOOL CONTROL BASED ON OPEN SOURCE Radelja, H., Hasković, D., Šikulec, L., Plančak, M., Kršulja, M. & Car, Z. Abstract: The direction for the future development of the production process is complete autonomy, artificial intelligence, ability to diagnose errors, self-repair and, most importantly, to minimize impact of human factors. Although technology is not yet mature enough for a complete exclusion of worker from the machining process remote control could enable unmanned operation. The concept offered in this study consists of building a custom WEB application for machine tool control that provides flexibility, operation from any remote location, ensures platform independence and low cost due to use of Open Source Architecture. Key words: remote control, WEB control, CNC machine tool, WEB-based manufacturing, Open Source 1. INTRODUCTION There have been a number of key changes through the development of machine tools, which have, each for themselves, improved and simplified their use. In particular, one can emphasize the development of the CNC control that proved to be more productive, easier to use, enabled production of more complicated workpieces and made the technology accessible to a wider number of users. Any improvement also means higher productivity, accuracy, efficiency and ultimately, higher profits in manufacturing. One of the prospects of development that are discussed today is the remote control. This type of control is particularly interesting because, thanks to automated systems that regulate all the parameters of processing, the operator no longer has to be close to the machine tool while operating. From the viewpoint of production economy, if the employee does not have to be by the machine, but instead it can monitor it while on another job, this presents a benefit because worker can perform several tasks at the same time, he can do some other work or monitor several machines simultaneously. Remote control enables not only monitoring but to completely control the process - in case of error, processing can be stopped, check what caused the error, possibly change the parameter and continue processing. A number of researches are conducted on remotely controlling the machine tools, with different approaches and solutions for different aspects of the problem [ 1 ]. In most cases, it was just a simulation and monitoring processing without the possibility of operating in real time. One part of the research is focused on supporting the design and planning process over the Web, such as CyberCut [ 2 ], Internet Manufacturing [ 3 ], which offer solutions for overcoming the problem of physical distance from the R&D teams and technology planning process and offer practical platform for concurrent engineering. One popular approach to implement remote control is to establish a client - server communication, either by developing their own applications or by using commercial software [4] such as VNC or pcanywhere, which allows taking control over the system that controls the machine tools

2 from a remote location. The advantages of this solution are ease of implementation, the use of existing infrastructure, but there are major drawbacks in terms of flexibility, providing real-time control and safety in case of a disconnection. The solution offered in this study consists of building a custom Web application for machine tool control that provides flexibility, scalability, operation from any remote location, and ensures platform independence and low cost due to use of Open Source Architecture. 2. TELECONTROL Telecontrol is defined as a continuous and direct control of the remote machine [5]. Advantages of telecontrol are already identified and widely present in everyday life, mostly for the purpose of improving the quality of human life. Whether it is the TV remote control device, smart house, a remote support for a service or a product, control of the plant or the remote control of robots that perform hazardous tasks. The application of telecontrol for the machine tools operation opens up new possibilities to extend the usability and commercialization of a machine. It enables virtual business between geographically distant subjects [ 6 ] through the formation of partnerships and utilization of external resources without the necessity of purchasing the equipment. Allows manufacturers to locate production facilities closer to the customer or the less costly location while highly skilled workers who operate the equipment can be located closer to the R & D department and the administration for better communication and centralization of human resources. It also enables cost reduction because it opens up the possibility of working from home, the parallel execution of some other work or operating multiple machines simultaneously. Therefore, it is not surprising that one of the better-known manufacturers of machining equipment, OKUMA, for a series of products THINC -OSP Constant Care [ 7 ] offers, free of charge, support that includes remote monitoring and control of devices for diagnostic and service. There are many web-based collaboration systems [ 8 ], mainly for: simultaneous design, Web-based RP, project management, Conflict Resolution during collaboration. Rare for: Monitoring workshop machining - Job Shop, remote-controlled CNC machining, advanced automation facilities, which are typically limited in functionality, used for monitoring or offline simulation. That the machine manufacturers noted the need to develop telecontrol is indicated by the fact that most modern equipment has the ability to connect to the Internet, while only ten years before that option had only about 10 % of CNC machines [ 9 ]. 2.1 Control method selection One of the most important criteria when choosing a method of control is of a financial nature. The goal is to develop a system based on open source, free programs and infrastructure that is flexible, cost-effective but with relatively limited capabilities, or a system with far more advanced functions and capabilities, ready to use "out of the box", for which however, is necessary to provide significant financial resources. The choice will depend on the characteristics of the problem to be solved and of the assessment which method is the most affordable, most reliable, most widespread and most cost-effective. This concept is based on open source infrastructure, with the intention of researching its capabilities, bearing in mind the comparative advantages of flexibility and platform independence. There is a large choice of means of communication, the use of the GSM mobile network, local wired and wireless

3 networks, Bluetooth technology, infrared, radio frequency and others. For the purposes of remote control internet imposes as the most suitable, since it is most widespread and enables global connectivity. The Enhanced Machine Controller (EMC2) is selected for the control unit of the machine tool, the Open Source CNC controller, based on the RS-274 standard programming language. Its functions are available externally and can be easily implemented in a web application. The control unit was developed as part of the Ubuntu linux distribution, so it is convenient to choose that operating system for machine tool control. Exclusively free open source applications were used. Apache server and SQL database, and for programming the Web application HTML, Java, PHP, and socket programming. 2.2 The security and robustness issues The first aspect of network security is data loss and the delivery order of the information packages, which is solved using the TCP protocol. When working with data exchange and remote control there is always the possibility of compromised security, meaning unauthorized access to the data or changing the control instructions causing damage to the computer and equipment. This can be extremely dangerous, because if the system is compromised not only that the machining process can cause material damage, but since it handles sharp tools and fast moving parts it may cause serious injury. Intrusions can be deliberate, but also they can be accidental connections to an unsecured network. Therefore, it is of utmost importance to adequately protect used network. For wireless networks protection various systems of data encryption are implemented. In addition, there is a risk of malicious software such as worms, viruses, trojans or spyware. Various antivirus programs are designed to help prevent system infection and suppress possible damage caused by malicious software. 3. REMOTE CONTROL CONCEPT Today the most popular and most common way of communicating is the internet. It allows users to search, browse, retrieve, disseminate and share information remotely. It truly provides global connectivity and the ability to easily remotely control from any point on Earth [ 10 ]. The foundation of the concept of Web telecontrol is based on simplicity and low cost of development and deployment. Fig. 1 shows a diagram of the developed concept of web control [ 11 ]. The concept consists of the developed Web application that is accessed from the computer that is connected to the internet via a TCP/IP protocol. Real time communication with the server is provided using socket programming. Server forwards requests to the EMC2 control unit [ 12 ] that is physically connected to the machine tool. The application of open source provides the flexibility. Since the control unit s functions are available externally for implementation in a Web application, it is possible to directly control the control unit instead of taking the control over the computer on which the control unit is installed.

4 Fig. 1. Schematic representation of WEB control of machine tool 3.1 EMC2 control unit EMC2 is a CNC control unit. It is a free programming solution, which is based on free source code. It is suitable to operate machine tools, machine tools, robots and other automated devices. It can control servo or stepper motors, relays and other devices related to machine tools. The system of stepper engine controlled from Linux PC, which is connected to them through the parallel port, is shown in Fig. 2. These signals are sent to the actuators that drive the engines. It is also possible to control servomotors via interface card or using parallel connectors that are associated with external control units. Script sets the server on port 10000, and after that communication with server is possible. In this way, the Linux computer is configured to expect external commands, but still remains to define how to establish a link between the website and server set. 3.2 Linking web pages to the server To make a web page able to communicate with the server over the Internet, it must be written in a special programming language; in this case, PHP language was selected. This enables it to send commands in the form of packets of information across an imaginary'' pipeline'' to server which forwards them to the EMC2 program, and it manages machine. This method of programming data exchange is called socket programming and provides realtime communication between clients and servers. Secured communications, it is necessary to define the function and appearance of Web applications for machine tool control. Fig. 2. Scheme of EMC2 control of the 3-axis stepper drive system [ 12 ]

5 Fig. 3. Web application for machine tool control To enable the automatic update of web pages Java Script or JavaScript Timing Events function have been used. With this function, it is possible to perform a set of instructions in the specified time interval. In this case, command is sent, which gives feedback about position. Update interval is one second. Due to the physical distance of the user from the machine tool, it is necessary to provide some form of monitoring of machining processes. The best feedback is visual information. For this reason, a web site is capturing live images from Web cameras located near the machine tool pointing towards the workpiece. With the change of certain parameters, it is possible to change the resolution and image size, number of frames per second and the IP address of the computer on which webcam server is mounted. The video image is not possible because relationship with a webcam server should be re-established for every update. For that reason, part of page should be separated from static part in separate frame, which allows viewing HTML document inside another HTML document or Web pages within a frame containing another website. In this case, the static part of the site refers to frames for video display and control buttons, while the coordinates are display is in a separate frame that allows updates. 4. CONCLUSION The concept of Open Source remote control has been successfully implemented in the example of educational 3-axis milling machine located at the Faculty of Engineering Rijeka, and which can be controlled via the Internet. For demonstration purposes, only basic functions are programmed. On / off machine switch, starting, pausing and stopping the loaded program. This Web application can be easily extended to perform all the functions of the control

6 unit. Remote control of the machine tool through the web is opening the possibility for online collaboration and renting a machine, therefore one of the directions in which to carry out further research system management tasks and coordination of multiple users, and, ideally, to ensure 24 hour availability of the machine, automatic supply of raw materials and removal of workpieces. For the purposes of online production, it is necessary to develop a virtual model of the machine tool, with the ability to simulate the production process using a remote control. This way user would be able to detect possible faults in selected strategies, cutting data values [ 13 ] and to train users, to avoid possible errors that could result in damage to the workpiece or machine. 5. ACKNOWLEDGEMENTS The authors would like to acknowledge the support provided by the National CEEPUS Office of Croatia and National CEEPUS Office Serbia, which helped the research through mobility in the frame of the CEEPUS II HR 0108 project. 6. REFERENCES 1. Lala, S. P., Onwubolu, G.C.: Three tiered web-based manufacturing system Part 1: System development, Robotics and Comp.-Integrated Man. 23 (2007) Ahn, S. H., Sundararajan, V., Smith, Charles, et. al.: CyberCut: An Internetbased CAD/CAM System ASME Jour. of Comp. and Inf. Sci. in Eng., Vol.1, 1, Tay, F. E. H., Khanal, Y.P., et.al: Distributed rapid prototyping a framework for Internet prototyping and manufacturing. Integrated Manuf Syst 2001;12 (6): Lee, R.S., Tsai, J. P., Lee, J. N., et.al: Collaborative virtual cutting verification and remote robot machining through the Internet. Proc Inst Mech Eng 2000; 214B: Angheluta, L., Moldovan, A., Radvan, R.: The Teleoperation of a Lif Scanning Device U. P. B. Sci. Bull., Series A, Vol. 73, Issue. 4, Lan, H., Ding, Y., Hong, J., et.al: A webbased manufacturing service system for rapid product development Computers in Industry 54 (2004) Felix, C.; Advantages of Remote Troubleshooting Production Machining Magazine, Gardner Publications, Ohio Wang, L., Orban, P., Cunningham, A., Lang, S.: Remote real-time CNC machining for web-based manufacturing Robotics and Computer-Integrated Manufacturing 20 (2004) Waurzyniak, P.: Electronic Intelligence in Manufacturing, Manufacturing Engineering, Vol. (3), 2001, pp He, H., Wu, Y.: Web-based virtual operating of CNC milling machine tools Computers in Industry 60 (2009) Hasković, D.; B. Sc. Thesis, University of Rijeka, Faculty of Engineering, The EMC Team : EMC Handbook, LinuxCNC.org, Accessed on: Car, Z., Barišić, B., Ikonić, M.: GA Based CNC Turning Center Exploitation Process Parameters Optimization Metalurgija. 48 (2009), 1; ADDITIONAL DATA ABOUT AUTHORS Assistant Hrvoje Radelja, PhD student, Damir Hasković, MSc, Assistant Leon Šikulec, PhD student, Assistant Marko Kršulja PhD student and Prof. Car Zlatan,PhD, Vice Dean for business affairs. Faculty of Engineering, Vukovarska 58, Rijeka Croatia [email protected] Prof. Miroslav Plančak, PhD, Faculty of Technical Sciences, Trg Dositeja Obradovića 6, Novi Sad, Serbia. [email protected]

THEME Competence Matrix - Electrical Engineering/Electronics with Partial competences/ Learning outcomes

THEME Competence Matrix - Electrical Engineering/Electronics with Partial competences/ Learning outcomes COMPETENCE AREAS STEPS OF COMPETENCE DEVELOPMENT 1. Preparing, planning, mounting and installing electrical for buildings and industrial applications He/She is able to prepare and carry out simple electrical

More information

Network Based Intrusion Detection Using Honey pot Deception

Network Based Intrusion Detection Using Honey pot Deception Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.

More information

Deploying VSaaS and Hosted Solutions Using CompleteView

Deploying VSaaS and Hosted Solutions Using CompleteView SALIENT SYSTEMS WHITE PAPER Deploying VSaaS and Hosted Solutions Using CompleteView Understanding the benefits of CompleteView for hosted solutions and successful deployment architecture Salient Systems

More information

Fast remote data access for control of TCP/IP network using android Mobile device

Fast remote data access for control of TCP/IP network using android Mobile device RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi

More information

E-mail:[email protected] Web site: www.tst-software.com

E-mail:sales@tst-software.com Web site: www.tst-software.com E-mail:[email protected] Web site: www.tst-software.com Solutions That Make Sense for Windows 7/XP/2008 and 2003 Server/2000 Multi-DNC v8.0 for Windows 7/XP/2008 and 2003 Server/2000 communications

More information

Wireless Remote Video Monitoring

Wireless Remote Video Monitoring October 2014 Page 1 An Emerson Smart Solution brings visual information into your control room. Increase plant safety Comply with regulations Scalable Reduced cost Secure and reliable communications Full

More information

Intelligent Home Automation and Security System

Intelligent Home Automation and Security System Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology

More information

PacketTrap One Resource for Managed Services

PacketTrap One Resource for Managed Services Remote Monitoring Software for Managed Services Providers PacketTrap RMM provides a cost-effective way for you to offer enterprise-class server, application, and network management to your customers. It

More information

Wireless Remote Video Monitoring

Wireless Remote Video Monitoring February 2010 Page 1 An Emerson Smart Solution brings visual information into your control room. Increase Plant Safety Comply with Regulations Scalable Reduced Cost Secure and Reliable Communications Full

More information

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK Prepared By: Raghda Zahran, Msc. NYIT-Jordan campus. Supervised By: Dr. Lo ai Tawalbeh. November 2006 Page 1 of 8 THE WAR AGAINST BEING AN INTERMEDIARY

More information

Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition

Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition Remote Access Technologies: A Comparison of Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition Contents: Executive Summary...1 Remote Access Overview...2 Intended Application... 2 Revolutionary

More information

CMR Journal of Engineering and Technology Vol.1 Issue.1 January 2016

CMR Journal of Engineering and Technology Vol.1 Issue.1 January 2016 VEHICLE TRACKING SYSTEM WITH ANDROID APP SUPPORT ABSTRACT M. Sudhakar Professor Dept of ECE CMR College of Engineering & Technology Kandlakoya, Medchal Rd, Hyderabad e-mail: [email protected] K.Kalyani PG

More information

What you don t know about industrial GSM/GPRS modem communications

What you don t know about industrial GSM/GPRS modem communications What you don t know about industrial GSM/GPRS modem communications A White Paper presented by: Ira Sharp Product Marketing Lead Specialist Phoenix Contact P.O. Box 4100 Harrisburg, PA 17111-0100 Phone:

More information

Overcoming IP Address Issues with GPRS Remote Monitoring and Alarm Systems

Overcoming IP Address Issues with GPRS Remote Monitoring and Alarm Systems Overcoming IP Address Issues with Remote Monitoring and Alarm Systems Released on April 14, 2009 Stanley Liu, Product Manager [email protected] is a communication technology that allows data acquisition

More information

HMS Industrial Networks. Putting industrial applications on the cloud

HMS Industrial Networks. Putting industrial applications on the cloud HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks Inc 35 E Wacker Drive,

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is

More information

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide p 1/6 White Paper A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide Francis Vander Ghinst Head of Sales & Marketing

More information

REMOTE CONTROL AND MONITORING OF AN INDUCTION MOTOR

REMOTE CONTROL AND MONITORING OF AN INDUCTION MOTOR Proceedings of COMADEM 2007 The 20 th International Congress on Condition Monitoring and Diagnostic Engineering Management Faro, Portugal, June 13-15, 2007 REMOTE CONTROL AND MONITORING OF AN INDUCTION

More information

Building Web-based Infrastructures for Smart Meters

Building Web-based Infrastructures for Smart Meters Building Web-based Infrastructures for Smart Meters Andreas Kamilaris 1, Vlad Trifa 2, and Dominique Guinard 2 1 University of Cyprus, Nicosia, Cyprus 2 ETH Zurich and SAP Research, Switzerland Abstract.

More information

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System , pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

B&B ELECTRONICS WHITE PAPER. Managed Ethernet Switches - Key Features for a Powerful Industrial Network

B&B ELECTRONICS WHITE PAPER. Managed Ethernet Switches - Key Features for a Powerful Industrial Network Determinism is the assurance that control/communication will occur in a set period of time. Ethernet was nondeterministic at first, and not widely used for industrial purposes. Ethernet switches designed

More information

Wireless Field Data Backhaul

Wireless Field Data Backhaul October 2014 Page 1 Smart Wireless Gateway 1552WU An Emerson Smart Solution integrates WirelessHART data from remote areas of your plant. Scalable Reduced cost Safer deployment Secure and reliable communications

More information

IC 1101 Basic Electronic Practice for Electronics and Information Engineering

IC 1101 Basic Electronic Practice for Electronics and Information Engineering 7. INDUSTRIAL CENTRE TRAINING In the summer between Year 1 and Year 2, students will undergo Industrial Centre Training I in the Industrial Centre (IC). In the summer between Year 2 and Year 3, they will

More information

HMS Industrial Networks

HMS Industrial Networks HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks AB Stationsgatan 37 30245

More information

DeltaV Web Server. DeltaV Web Server. Introduction. DeltaV Product Data Sheet. Gives you a secure view of your process from your desktop PC

DeltaV Web Server. DeltaV Web Server. Introduction. DeltaV Product Data Sheet. Gives you a secure view of your process from your desktop PC January 2013 Page 1 DeltaV Web Server Use the to view your process anywhere on the planet. Gives you a secure view of your process from your desktop PC Offers more information and scalable architecture

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

Document management and exchange system supporting education process

Document management and exchange system supporting education process Document management and exchange system supporting education process Emil Egredzija, Bozidar Kovacic Information system development department, Information Technology Institute City of Rijeka Korzo 16,

More information

Fromdistance MDM. Setting the standard in device management

Fromdistance MDM. Setting the standard in device management Fromdistance MDM Setting the standard in device management GOAL to make mobile devices part of Enterprise Information System MAIN PRODUCT Fromdistance MDM (Mobile Device Manager) Mobile device management

More information

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion

More information

An Electronic Journal Management System

An Electronic Journal Management System An Electronic Journal Management System Hrvoje Bogunović, Edgar Pek, Sven Lončarić and Vedran Mornar Faculty of Electrical Engineering and Computing, University of Zagreb Unska 3, 0000 Zagreb, Croatia

More information

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution

More information

Autonomous Advertising Mobile Robot for Exhibitions, Developed at BMF

Autonomous Advertising Mobile Robot for Exhibitions, Developed at BMF Autonomous Advertising Mobile Robot for Exhibitions, Developed at BMF Kucsera Péter ([email protected]) Abstract In this article an autonomous advertising mobile robot that has been realized in

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

The Cisco ASA 5500 as a Superior Firewall Solution

The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls

More information

Remote Monitoring and Controlling System Based on ZigBee Networks

Remote Monitoring and Controlling System Based on ZigBee Networks Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr

More information

Station Automation Series COM600 Protection and control from ABB Future-proof Concept: Extensive Substation System Integration and Interoperability The Station Automation Series COM600 is a dedicated system

More information

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.

More information

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system

More information

A Novel Solution for Remote Monitoring of Electrical and Electronic Gadgets

A Novel Solution for Remote Monitoring of Electrical and Electronic Gadgets A Novel Solution for Remote Monitoring of Electrical and Electronic Gadgets Pradipta Biswas University of Kalyani, India 1 Introduction Remote control of electrical and electronic gadgets in domestic and

More information

Network setup and troubleshooting

Network setup and troubleshooting ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Network Model: All Firmware: All Software: NVR Author: Jane.Chen Published: 2009/12/21 Reviewed: 2010/10/11 Network setup and troubleshooting

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

Mobile Device Management A Functional Overview

Mobile Device Management A Functional Overview Mobile Device Management A Functional Overview Gopal Tatte #1, Dr. G. R. Bamnote #2 1# ME 1 st Yr. Department of Computer Science and Engineering, Sant Gadge Baba Amravati University Prof Ram Meghe Institute

More information

GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop

GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Contents: Executive Summary... 1

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

Mobile Devices and Malicious Code Attack Prevention

Mobile Devices and Malicious Code Attack Prevention Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored

More information

Multi-DNC. by Spectrum CNC Technologies

Multi-DNC. by Spectrum CNC Technologies Multi-DNC by Spectrum CNC Technologies Multi-DNC v8.1 for Windows 7/XP/2003 and 2008 Server communications and file management system for simultaneous uploads and downloads to multiple CNC controls using

More information

AIMMS The Network License Server

AIMMS The Network License Server AIMMS The Network License Server AIMMS AIMMS 4.0 July 1, 2014 Contents Contents ii 1 The Aimms Network License Server 1 1.1 Software requirements........................ 1 1.2 Installing and deploying

More information

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network

More information

Huawei Network Edge Security Solution

Huawei Network Edge Security Solution Huawei Network Edge Security Huawei Network Edge Security Solution Enterprise Campus Network HUAWEI TECHNOLOGIES CO., LTD. Huawei Network Edge Security Solution Huawei Network Edge Security 1 Overview

More information

REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES

REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES 1 Abinath.T.R, 2 Sudhakar.V, 3 Sasikala.S 1,2 UG Scholar, Department of Electrical and Electronics Engineering, Info Institute of Engineering,

More information

Sensor network infrastructure for intelligent building monitoring and management system

Sensor network infrastructure for intelligent building monitoring and management system Sensor network infrastructure for intelligent building monitoring and management system 1 R.VENKATESH, 2 K.RADHA, 3 M.GANTHIMATHI 1.B.E-CSE, Muthayammal Engineering College, Rasipuram. 2. Assistant Professor

More information

Crow Limited Warranty. Print Version 017

Crow Limited Warranty. Print Version 017 Crow Limited Warranty (Crow) warrants this product to be free from defects in materials and workmanship under normal use and service for a period of one year from the last day of the week and year whose

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL

More information

Host/Platform Security. Module 11

Host/Platform Security. Module 11 Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic

More information

Technology Spotlight on Cellular Data Networking for SCADA system networks. Presented by Teamwork Solutions, Inc.

Technology Spotlight on Cellular Data Networking for SCADA system networks. Presented by Teamwork Solutions, Inc. on Cellular Data Networking for SCADA system networks Presented by Teamwork Solutions, Inc. Wireless (Cellular) Data Networking Internet SCADA Server How Wireless (Cellular) Data Networking Works Dynamic

More information

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial

More information

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency

More information

Instructions for transferring the SINUMERIK HMI to an external screen

Instructions for transferring the SINUMERIK HMI to an external screen Instructions for transferring the SINUMERIK HMI to an external screen SINUMERIK 828D with UltraVNC-Viewer and Notebook In many cases it may be useful to transfer the SINUMERIK HMI on an external monitor,

More information

Android Application for Accessing KNX Devices via IP Connection

Android Application for Accessing KNX Devices via IP Connection Android Application for Accessing KNX Devices via IP Connection J. A. Nazabal, J. Gómez, F. Falcone, C. Fernández-Valdivielso, P. E. Branchi and I. R. Matías Electrical and Electronic Engineering Department,

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003 Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while

More information

A Design and Implementation of Network Traffic Monitoring System for PC-room Management

A Design and Implementation of Network Traffic Monitoring System for PC-room Management A Design and Implementation of Network Traffic Monitoring System for PC-room Management Yonghak Ahn, Oksam Chae Dept. of Computer Engineering, Kyunghee University, Sochen-ri, Giheung-eup, Yongin-si, Gyeonggi-do

More information

Motorola RF Management Suite

Motorola RF Management Suite Motorola RF Management Suite The Wireless LAN (WLAN) management challenge A successful wireless LAN deployment is measured by how well the network meets the performance and capacity requirements of your

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

Implementation of Wi-Ap; An IEEE 802.11b/g Based Electrical Switch Module With Web Enabled Interface for Electrical Appliances Control

Implementation of Wi-Ap; An IEEE 802.11b/g Based Electrical Switch Module With Web Enabled Interface for Electrical Appliances Control Research Journal of Applied Sciences, Engineering and Technology 3(12): 1335-1341, 2011 ISSN:2040-7467 Maxwell Scientific Organization, 2011 Submitted: February 20, 2011 Accepted: March 26, 2011 Published:

More information

Remote Access Platform. Architecture and Security Overview

Remote Access Platform. Architecture and Security Overview Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards

More information

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000 Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business

More information

8000 Intelligent Network Manager

8000 Intelligent Network Manager DATASHEET 8000 Intelligent Network Manager A powerful Element, Network and Service Management System The 8000 Intelligent Network Manager is a powerful element, network and service management system supporting

More information

Virtualized Open-Source Network Security Appliance

Virtualized Open-Source Network Security Appliance Virtualized Open-Source Network Security Appliance By Daniel Secrist Submitted to the Faculty of the Information Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor

More information

The Key to Secure Online Financial Transactions

The Key to Secure Online Financial Transactions Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on

More information

How To Create An Intelligent Infrastructure Solution

How To Create An Intelligent Infrastructure Solution SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure

More information

OPCNet Broker TM for Industrial Network Security and Connectivity

OPCNet Broker TM for Industrial Network Security and Connectivity OPCNet Broker TM for Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity from Integration Objects Compatible for DA, HDA

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

CAREER OPPORTUNITIES

CAREER OPPORTUNITIES CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

FACILITY MONITORING SYSTEM DESIGN RECOMMENDATIONS

FACILITY MONITORING SYSTEM DESIGN RECOMMENDATIONS FACILITY MONITORING SYSTEM DESIGN RECOMMENDATIONS APPLICATION NOTE A monitoring system is referred to by a number of different names, a Facility Monitoring System (FMS), a Continuous Monitoring System,

More information

Chapter 2 Introduction

Chapter 2 Introduction Chapter 2 Introduction This chapter describes the features of the NETGEAR 54 Mbps Wireless ADSL Modem Router Model DG834G. The Wireless ADSL Modem Router is a combination of a built-in ADSL modem, ADSL

More information

DESIGN OF SMART HOME SECURITY SURVEILLANCE SYSTEM USING GSM

DESIGN OF SMART HOME SECURITY SURVEILLANCE SYSTEM USING GSM DESIGN OF SMART HOME SECURITY SURVEILLANCE SYSTEM USING GSM Shweta 1, Nayana P Shetty 2 M.Tech student, Department of Electrical and Electronics Engineering, NMAMIT, Nitte, India 1 Associate Professor,

More information

Real Time Remote Monitoring over Cellular Networks. Wayne Chen Marketing Specialist

Real Time Remote Monitoring over Cellular Networks. Wayne Chen Marketing Specialist Real Time Remote Monitoring over Cellular Networks Wayne Chen Marketing Specialist Introduction For distribution infrastructures located in remote, isolated areas, unmanned monitoring systems have long

More information

Data Backup Options for SME s

Data Backup Options for SME s Data Backup Options for SME s As an IT Solutions company, Alchemy are often asked what is the best backup solution? The answer has changed over the years and depends a lot on your situation. We recognize

More information

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle

Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle C Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle Hou-Tsan Lee, Wei-Chuan Lin, Jing-Siang Huang Department of Information Technology, TakMing University of Science and Technology

More information

White Paper. Solutions to VoIP (Voice over IP) Recording Deployment

White Paper. Solutions to VoIP (Voice over IP) Recording Deployment White Paper Solutions to VoIP (Voice over IP) Recording Deployment Revision 2.1 September 2008 Author: Robert Wright ([email protected]), BSc (Hons) Ultra Electronics AudioSoft, October

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

Testing a Wireless LAN

Testing a Wireless LAN Chapter 17 Testing a Wireless LAN This chapter will introduce you to: Wireless LAN Testing Considerations Signal Coverage Testing Performance Testing In-Motion Testing Security Vulnerability Testing Acceptance/Verification

More information

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat. Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the

More information