CONCEPT FOR ONLINE WEB MACHINE TOOL CONTROL BASED ON OPEN SOURCE
|
|
|
- Darlene Ferguson
- 10 years ago
- Views:
Transcription
1 8th International DAAAM Baltic Conference "INDUSTRIAL ENGINEERING April 2012, Tallinn, Estonia CONCEPT FOR ONLINE WEB MACHINE TOOL CONTROL BASED ON OPEN SOURCE Radelja, H., Hasković, D., Šikulec, L., Plančak, M., Kršulja, M. & Car, Z. Abstract: The direction for the future development of the production process is complete autonomy, artificial intelligence, ability to diagnose errors, self-repair and, most importantly, to minimize impact of human factors. Although technology is not yet mature enough for a complete exclusion of worker from the machining process remote control could enable unmanned operation. The concept offered in this study consists of building a custom WEB application for machine tool control that provides flexibility, operation from any remote location, ensures platform independence and low cost due to use of Open Source Architecture. Key words: remote control, WEB control, CNC machine tool, WEB-based manufacturing, Open Source 1. INTRODUCTION There have been a number of key changes through the development of machine tools, which have, each for themselves, improved and simplified their use. In particular, one can emphasize the development of the CNC control that proved to be more productive, easier to use, enabled production of more complicated workpieces and made the technology accessible to a wider number of users. Any improvement also means higher productivity, accuracy, efficiency and ultimately, higher profits in manufacturing. One of the prospects of development that are discussed today is the remote control. This type of control is particularly interesting because, thanks to automated systems that regulate all the parameters of processing, the operator no longer has to be close to the machine tool while operating. From the viewpoint of production economy, if the employee does not have to be by the machine, but instead it can monitor it while on another job, this presents a benefit because worker can perform several tasks at the same time, he can do some other work or monitor several machines simultaneously. Remote control enables not only monitoring but to completely control the process - in case of error, processing can be stopped, check what caused the error, possibly change the parameter and continue processing. A number of researches are conducted on remotely controlling the machine tools, with different approaches and solutions for different aspects of the problem [ 1 ]. In most cases, it was just a simulation and monitoring processing without the possibility of operating in real time. One part of the research is focused on supporting the design and planning process over the Web, such as CyberCut [ 2 ], Internet Manufacturing [ 3 ], which offer solutions for overcoming the problem of physical distance from the R&D teams and technology planning process and offer practical platform for concurrent engineering. One popular approach to implement remote control is to establish a client - server communication, either by developing their own applications or by using commercial software [4] such as VNC or pcanywhere, which allows taking control over the system that controls the machine tools
2 from a remote location. The advantages of this solution are ease of implementation, the use of existing infrastructure, but there are major drawbacks in terms of flexibility, providing real-time control and safety in case of a disconnection. The solution offered in this study consists of building a custom Web application for machine tool control that provides flexibility, scalability, operation from any remote location, and ensures platform independence and low cost due to use of Open Source Architecture. 2. TELECONTROL Telecontrol is defined as a continuous and direct control of the remote machine [5]. Advantages of telecontrol are already identified and widely present in everyday life, mostly for the purpose of improving the quality of human life. Whether it is the TV remote control device, smart house, a remote support for a service or a product, control of the plant or the remote control of robots that perform hazardous tasks. The application of telecontrol for the machine tools operation opens up new possibilities to extend the usability and commercialization of a machine. It enables virtual business between geographically distant subjects [ 6 ] through the formation of partnerships and utilization of external resources without the necessity of purchasing the equipment. Allows manufacturers to locate production facilities closer to the customer or the less costly location while highly skilled workers who operate the equipment can be located closer to the R & D department and the administration for better communication and centralization of human resources. It also enables cost reduction because it opens up the possibility of working from home, the parallel execution of some other work or operating multiple machines simultaneously. Therefore, it is not surprising that one of the better-known manufacturers of machining equipment, OKUMA, for a series of products THINC -OSP Constant Care [ 7 ] offers, free of charge, support that includes remote monitoring and control of devices for diagnostic and service. There are many web-based collaboration systems [ 8 ], mainly for: simultaneous design, Web-based RP, project management, Conflict Resolution during collaboration. Rare for: Monitoring workshop machining - Job Shop, remote-controlled CNC machining, advanced automation facilities, which are typically limited in functionality, used for monitoring or offline simulation. That the machine manufacturers noted the need to develop telecontrol is indicated by the fact that most modern equipment has the ability to connect to the Internet, while only ten years before that option had only about 10 % of CNC machines [ 9 ]. 2.1 Control method selection One of the most important criteria when choosing a method of control is of a financial nature. The goal is to develop a system based on open source, free programs and infrastructure that is flexible, cost-effective but with relatively limited capabilities, or a system with far more advanced functions and capabilities, ready to use "out of the box", for which however, is necessary to provide significant financial resources. The choice will depend on the characteristics of the problem to be solved and of the assessment which method is the most affordable, most reliable, most widespread and most cost-effective. This concept is based on open source infrastructure, with the intention of researching its capabilities, bearing in mind the comparative advantages of flexibility and platform independence. There is a large choice of means of communication, the use of the GSM mobile network, local wired and wireless
3 networks, Bluetooth technology, infrared, radio frequency and others. For the purposes of remote control internet imposes as the most suitable, since it is most widespread and enables global connectivity. The Enhanced Machine Controller (EMC2) is selected for the control unit of the machine tool, the Open Source CNC controller, based on the RS-274 standard programming language. Its functions are available externally and can be easily implemented in a web application. The control unit was developed as part of the Ubuntu linux distribution, so it is convenient to choose that operating system for machine tool control. Exclusively free open source applications were used. Apache server and SQL database, and for programming the Web application HTML, Java, PHP, and socket programming. 2.2 The security and robustness issues The first aspect of network security is data loss and the delivery order of the information packages, which is solved using the TCP protocol. When working with data exchange and remote control there is always the possibility of compromised security, meaning unauthorized access to the data or changing the control instructions causing damage to the computer and equipment. This can be extremely dangerous, because if the system is compromised not only that the machining process can cause material damage, but since it handles sharp tools and fast moving parts it may cause serious injury. Intrusions can be deliberate, but also they can be accidental connections to an unsecured network. Therefore, it is of utmost importance to adequately protect used network. For wireless networks protection various systems of data encryption are implemented. In addition, there is a risk of malicious software such as worms, viruses, trojans or spyware. Various antivirus programs are designed to help prevent system infection and suppress possible damage caused by malicious software. 3. REMOTE CONTROL CONCEPT Today the most popular and most common way of communicating is the internet. It allows users to search, browse, retrieve, disseminate and share information remotely. It truly provides global connectivity and the ability to easily remotely control from any point on Earth [ 10 ]. The foundation of the concept of Web telecontrol is based on simplicity and low cost of development and deployment. Fig. 1 shows a diagram of the developed concept of web control [ 11 ]. The concept consists of the developed Web application that is accessed from the computer that is connected to the internet via a TCP/IP protocol. Real time communication with the server is provided using socket programming. Server forwards requests to the EMC2 control unit [ 12 ] that is physically connected to the machine tool. The application of open source provides the flexibility. Since the control unit s functions are available externally for implementation in a Web application, it is possible to directly control the control unit instead of taking the control over the computer on which the control unit is installed.
4 Fig. 1. Schematic representation of WEB control of machine tool 3.1 EMC2 control unit EMC2 is a CNC control unit. It is a free programming solution, which is based on free source code. It is suitable to operate machine tools, machine tools, robots and other automated devices. It can control servo or stepper motors, relays and other devices related to machine tools. The system of stepper engine controlled from Linux PC, which is connected to them through the parallel port, is shown in Fig. 2. These signals are sent to the actuators that drive the engines. It is also possible to control servomotors via interface card or using parallel connectors that are associated with external control units. Script sets the server on port 10000, and after that communication with server is possible. In this way, the Linux computer is configured to expect external commands, but still remains to define how to establish a link between the website and server set. 3.2 Linking web pages to the server To make a web page able to communicate with the server over the Internet, it must be written in a special programming language; in this case, PHP language was selected. This enables it to send commands in the form of packets of information across an imaginary'' pipeline'' to server which forwards them to the EMC2 program, and it manages machine. This method of programming data exchange is called socket programming and provides realtime communication between clients and servers. Secured communications, it is necessary to define the function and appearance of Web applications for machine tool control. Fig. 2. Scheme of EMC2 control of the 3-axis stepper drive system [ 12 ]
5 Fig. 3. Web application for machine tool control To enable the automatic update of web pages Java Script or JavaScript Timing Events function have been used. With this function, it is possible to perform a set of instructions in the specified time interval. In this case, command is sent, which gives feedback about position. Update interval is one second. Due to the physical distance of the user from the machine tool, it is necessary to provide some form of monitoring of machining processes. The best feedback is visual information. For this reason, a web site is capturing live images from Web cameras located near the machine tool pointing towards the workpiece. With the change of certain parameters, it is possible to change the resolution and image size, number of frames per second and the IP address of the computer on which webcam server is mounted. The video image is not possible because relationship with a webcam server should be re-established for every update. For that reason, part of page should be separated from static part in separate frame, which allows viewing HTML document inside another HTML document or Web pages within a frame containing another website. In this case, the static part of the site refers to frames for video display and control buttons, while the coordinates are display is in a separate frame that allows updates. 4. CONCLUSION The concept of Open Source remote control has been successfully implemented in the example of educational 3-axis milling machine located at the Faculty of Engineering Rijeka, and which can be controlled via the Internet. For demonstration purposes, only basic functions are programmed. On / off machine switch, starting, pausing and stopping the loaded program. This Web application can be easily extended to perform all the functions of the control
6 unit. Remote control of the machine tool through the web is opening the possibility for online collaboration and renting a machine, therefore one of the directions in which to carry out further research system management tasks and coordination of multiple users, and, ideally, to ensure 24 hour availability of the machine, automatic supply of raw materials and removal of workpieces. For the purposes of online production, it is necessary to develop a virtual model of the machine tool, with the ability to simulate the production process using a remote control. This way user would be able to detect possible faults in selected strategies, cutting data values [ 13 ] and to train users, to avoid possible errors that could result in damage to the workpiece or machine. 5. ACKNOWLEDGEMENTS The authors would like to acknowledge the support provided by the National CEEPUS Office of Croatia and National CEEPUS Office Serbia, which helped the research through mobility in the frame of the CEEPUS II HR 0108 project. 6. REFERENCES 1. Lala, S. P., Onwubolu, G.C.: Three tiered web-based manufacturing system Part 1: System development, Robotics and Comp.-Integrated Man. 23 (2007) Ahn, S. H., Sundararajan, V., Smith, Charles, et. al.: CyberCut: An Internetbased CAD/CAM System ASME Jour. of Comp. and Inf. Sci. in Eng., Vol.1, 1, Tay, F. E. H., Khanal, Y.P., et.al: Distributed rapid prototyping a framework for Internet prototyping and manufacturing. Integrated Manuf Syst 2001;12 (6): Lee, R.S., Tsai, J. P., Lee, J. N., et.al: Collaborative virtual cutting verification and remote robot machining through the Internet. Proc Inst Mech Eng 2000; 214B: Angheluta, L., Moldovan, A., Radvan, R.: The Teleoperation of a Lif Scanning Device U. P. B. Sci. Bull., Series A, Vol. 73, Issue. 4, Lan, H., Ding, Y., Hong, J., et.al: A webbased manufacturing service system for rapid product development Computers in Industry 54 (2004) Felix, C.; Advantages of Remote Troubleshooting Production Machining Magazine, Gardner Publications, Ohio Wang, L., Orban, P., Cunningham, A., Lang, S.: Remote real-time CNC machining for web-based manufacturing Robotics and Computer-Integrated Manufacturing 20 (2004) Waurzyniak, P.: Electronic Intelligence in Manufacturing, Manufacturing Engineering, Vol. (3), 2001, pp He, H., Wu, Y.: Web-based virtual operating of CNC milling machine tools Computers in Industry 60 (2009) Hasković, D.; B. Sc. Thesis, University of Rijeka, Faculty of Engineering, The EMC Team : EMC Handbook, LinuxCNC.org, Accessed on: Car, Z., Barišić, B., Ikonić, M.: GA Based CNC Turning Center Exploitation Process Parameters Optimization Metalurgija. 48 (2009), 1; ADDITIONAL DATA ABOUT AUTHORS Assistant Hrvoje Radelja, PhD student, Damir Hasković, MSc, Assistant Leon Šikulec, PhD student, Assistant Marko Kršulja PhD student and Prof. Car Zlatan,PhD, Vice Dean for business affairs. Faculty of Engineering, Vukovarska 58, Rijeka Croatia [email protected] Prof. Miroslav Plančak, PhD, Faculty of Technical Sciences, Trg Dositeja Obradovića 6, Novi Sad, Serbia. [email protected]
THEME Competence Matrix - Electrical Engineering/Electronics with Partial competences/ Learning outcomes
COMPETENCE AREAS STEPS OF COMPETENCE DEVELOPMENT 1. Preparing, planning, mounting and installing electrical for buildings and industrial applications He/She is able to prepare and carry out simple electrical
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Deploying VSaaS and Hosted Solutions Using CompleteView
SALIENT SYSTEMS WHITE PAPER Deploying VSaaS and Hosted Solutions Using CompleteView Understanding the benefits of CompleteView for hosted solutions and successful deployment architecture Salient Systems
Fast remote data access for control of TCP/IP network using android Mobile device
RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi
E-mail:[email protected] Web site: www.tst-software.com
E-mail:[email protected] Web site: www.tst-software.com Solutions That Make Sense for Windows 7/XP/2008 and 2003 Server/2000 Multi-DNC v8.0 for Windows 7/XP/2008 and 2003 Server/2000 communications
Wireless Remote Video Monitoring
October 2014 Page 1 An Emerson Smart Solution brings visual information into your control room. Increase plant safety Comply with regulations Scalable Reduced cost Secure and reliable communications Full
Intelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
PacketTrap One Resource for Managed Services
Remote Monitoring Software for Managed Services Providers PacketTrap RMM provides a cost-effective way for you to offer enterprise-class server, application, and network management to your customers. It
Wireless Remote Video Monitoring
February 2010 Page 1 An Emerson Smart Solution brings visual information into your control room. Increase Plant Safety Comply with Regulations Scalable Reduced Cost Secure and Reliable Communications Full
HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK
HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK Prepared By: Raghda Zahran, Msc. NYIT-Jordan campus. Supervised By: Dr. Lo ai Tawalbeh. November 2006 Page 1 of 8 THE WAR AGAINST BEING AN INTERMEDIARY
Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition
Remote Access Technologies: A Comparison of Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition Contents: Executive Summary...1 Remote Access Overview...2 Intended Application... 2 Revolutionary
CMR Journal of Engineering and Technology Vol.1 Issue.1 January 2016
VEHICLE TRACKING SYSTEM WITH ANDROID APP SUPPORT ABSTRACT M. Sudhakar Professor Dept of ECE CMR College of Engineering & Technology Kandlakoya, Medchal Rd, Hyderabad e-mail: [email protected] K.Kalyani PG
What you don t know about industrial GSM/GPRS modem communications
What you don t know about industrial GSM/GPRS modem communications A White Paper presented by: Ira Sharp Product Marketing Lead Specialist Phoenix Contact P.O. Box 4100 Harrisburg, PA 17111-0100 Phone:
Overcoming IP Address Issues with GPRS Remote Monitoring and Alarm Systems
Overcoming IP Address Issues with Remote Monitoring and Alarm Systems Released on April 14, 2009 Stanley Liu, Product Manager [email protected] is a communication technology that allows data acquisition
HMS Industrial Networks. Putting industrial applications on the cloud
HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks Inc 35 E Wacker Drive,
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune
VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is
A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide
p 1/6 White Paper A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide Francis Vander Ghinst Head of Sales & Marketing
REMOTE CONTROL AND MONITORING OF AN INDUCTION MOTOR
Proceedings of COMADEM 2007 The 20 th International Congress on Condition Monitoring and Diagnostic Engineering Management Faro, Portugal, June 13-15, 2007 REMOTE CONTROL AND MONITORING OF AN INDUCTION
Building Web-based Infrastructures for Smart Meters
Building Web-based Infrastructures for Smart Meters Andreas Kamilaris 1, Vlad Trifa 2, and Dominique Guinard 2 1 University of Cyprus, Nicosia, Cyprus 2 ETH Zurich and SAP Research, Switzerland Abstract.
Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System
, pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
B&B ELECTRONICS WHITE PAPER. Managed Ethernet Switches - Key Features for a Powerful Industrial Network
Determinism is the assurance that control/communication will occur in a set period of time. Ethernet was nondeterministic at first, and not widely used for industrial purposes. Ethernet switches designed
Wireless Field Data Backhaul
October 2014 Page 1 Smart Wireless Gateway 1552WU An Emerson Smart Solution integrates WirelessHART data from remote areas of your plant. Scalable Reduced cost Safer deployment Secure and reliable communications
IC 1101 Basic Electronic Practice for Electronics and Information Engineering
7. INDUSTRIAL CENTRE TRAINING In the summer between Year 1 and Year 2, students will undergo Industrial Centre Training I in the Industrial Centre (IC). In the summer between Year 2 and Year 3, they will
HMS Industrial Networks
HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks AB Stationsgatan 37 30245
DeltaV Web Server. DeltaV Web Server. Introduction. DeltaV Product Data Sheet. Gives you a secure view of your process from your desktop PC
January 2013 Page 1 DeltaV Web Server Use the to view your process anywhere on the planet. Gives you a secure view of your process from your desktop PC Offers more information and scalable architecture
The evolution of data connectivity
Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity
Document management and exchange system supporting education process
Document management and exchange system supporting education process Emil Egredzija, Bozidar Kovacic Information system development department, Information Technology Institute City of Rijeka Korzo 16,
Fromdistance MDM. Setting the standard in device management
Fromdistance MDM Setting the standard in device management GOAL to make mobile devices part of Enterprise Information System MAIN PRODUCT Fromdistance MDM (Mobile Device Manager) Mobile device management
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
An Electronic Journal Management System
An Electronic Journal Management System Hrvoje Bogunović, Edgar Pek, Sven Lončarić and Vedran Mornar Faculty of Electrical Engineering and Computing, University of Zagreb Unska 3, 0000 Zagreb, Croatia
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution
Autonomous Advertising Mobile Robot for Exhibitions, Developed at BMF
Autonomous Advertising Mobile Robot for Exhibitions, Developed at BMF Kucsera Péter ([email protected]) Abstract In this article an autonomous advertising mobile robot that has been realized in
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
Remote Monitoring and Controlling System Based on ZigBee Networks
Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr
Station Automation Series COM600 Protection and control from ABB Future-proof Concept: Extensive Substation System Integration and Interoperability The Station Automation Series COM600 is a dedicated system
COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)
COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.
Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System
Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
A Novel Solution for Remote Monitoring of Electrical and Electronic Gadgets
A Novel Solution for Remote Monitoring of Electrical and Electronic Gadgets Pradipta Biswas University of Kalyani, India 1 Introduction Remote control of electrical and electronic gadgets in domestic and
Network setup and troubleshooting
ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Network Model: All Firmware: All Software: NVR Author: Jane.Chen Published: 2009/12/21 Reviewed: 2010/10/11 Network setup and troubleshooting
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
Mobile Device Management A Functional Overview
Mobile Device Management A Functional Overview Gopal Tatte #1, Dr. G. R. Bamnote #2 1# ME 1 st Yr. Department of Computer Science and Engineering, Sant Gadge Baba Amravati University Prof Ram Meghe Institute
GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop
Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Contents: Executive Summary... 1
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
Computer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
Mobile Devices and Malicious Code Attack Prevention
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored
Multi-DNC. by Spectrum CNC Technologies
Multi-DNC by Spectrum CNC Technologies Multi-DNC v8.1 for Windows 7/XP/2003 and 2008 Server communications and file management system for simultaneous uploads and downloads to multiple CNC controls using
AIMMS The Network License Server
AIMMS The Network License Server AIMMS AIMMS 4.0 July 1, 2014 Contents Contents ii 1 The Aimms Network License Server 1 1.1 Software requirements........................ 1 1.2 Installing and deploying
NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
Huawei Network Edge Security Solution
Huawei Network Edge Security Huawei Network Edge Security Solution Enterprise Campus Network HUAWEI TECHNOLOGIES CO., LTD. Huawei Network Edge Security Solution Huawei Network Edge Security 1 Overview
REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES
REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES 1 Abinath.T.R, 2 Sudhakar.V, 3 Sasikala.S 1,2 UG Scholar, Department of Electrical and Electronics Engineering, Info Institute of Engineering,
Sensor network infrastructure for intelligent building monitoring and management system
Sensor network infrastructure for intelligent building monitoring and management system 1 R.VENKATESH, 2 K.RADHA, 3 M.GANTHIMATHI 1.B.E-CSE, Muthayammal Engineering College, Rasipuram. 2. Assistant Professor
Crow Limited Warranty. Print Version 017
Crow Limited Warranty (Crow) warrants this product to be free from defects in materials and workmanship under normal use and service for a period of one year from the last day of the week and year whose
Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL
Host/Platform Security. Module 11
Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic
Technology Spotlight on Cellular Data Networking for SCADA system networks. Presented by Teamwork Solutions, Inc.
on Cellular Data Networking for SCADA system networks Presented by Teamwork Solutions, Inc. Wireless (Cellular) Data Networking Internet SCADA Server How Wireless (Cellular) Data Networking Works Dynamic
Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity
Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial
COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES
COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency
Instructions for transferring the SINUMERIK HMI to an external screen
Instructions for transferring the SINUMERIK HMI to an external screen SINUMERIK 828D with UltraVNC-Viewer and Notebook In many cases it may be useful to transfer the SINUMERIK HMI on an external monitor,
Android Application for Accessing KNX Devices via IP Connection
Android Application for Accessing KNX Devices via IP Connection J. A. Nazabal, J. Gómez, F. Falcone, C. Fernández-Valdivielso, P. E. Branchi and I. R. Matías Electrical and Electronic Engineering Department,
Installing Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
A Design and Implementation of Network Traffic Monitoring System for PC-room Management
A Design and Implementation of Network Traffic Monitoring System for PC-room Management Yonghak Ahn, Oksam Chae Dept. of Computer Engineering, Kyunghee University, Sochen-ri, Giheung-eup, Yongin-si, Gyeonggi-do
Motorola RF Management Suite
Motorola RF Management Suite The Wireless LAN (WLAN) management challenge A successful wireless LAN deployment is measured by how well the network meets the performance and capacity requirements of your
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Implementation of Wi-Ap; An IEEE 802.11b/g Based Electrical Switch Module With Web Enabled Interface for Electrical Appliances Control
Research Journal of Applied Sciences, Engineering and Technology 3(12): 1335-1341, 2011 ISSN:2040-7467 Maxwell Scientific Organization, 2011 Submitted: February 20, 2011 Accepted: March 26, 2011 Published:
Remote Access Platform. Architecture and Security Overview
Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
8000 Intelligent Network Manager
DATASHEET 8000 Intelligent Network Manager A powerful Element, Network and Service Management System The 8000 Intelligent Network Manager is a powerful element, network and service management system supporting
Virtualized Open-Source Network Security Appliance
Virtualized Open-Source Network Security Appliance By Daniel Secrist Submitted to the Faculty of the Information Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
How To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
OPCNet Broker TM for Industrial Network Security and Connectivity
OPCNet Broker TM for Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity from Integration Objects Compatible for DA, HDA
Wireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
CAREER OPPORTUNITIES
CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
FACILITY MONITORING SYSTEM DESIGN RECOMMENDATIONS
FACILITY MONITORING SYSTEM DESIGN RECOMMENDATIONS APPLICATION NOTE A monitoring system is referred to by a number of different names, a Facility Monitoring System (FMS), a Continuous Monitoring System,
Chapter 2 Introduction
Chapter 2 Introduction This chapter describes the features of the NETGEAR 54 Mbps Wireless ADSL Modem Router Model DG834G. The Wireless ADSL Modem Router is a combination of a built-in ADSL modem, ADSL
DESIGN OF SMART HOME SECURITY SURVEILLANCE SYSTEM USING GSM
DESIGN OF SMART HOME SECURITY SURVEILLANCE SYSTEM USING GSM Shweta 1, Nayana P Shetty 2 M.Tech student, Department of Electrical and Electronics Engineering, NMAMIT, Nitte, India 1 Associate Professor,
Real Time Remote Monitoring over Cellular Networks. Wayne Chen Marketing Specialist
Real Time Remote Monitoring over Cellular Networks Wayne Chen Marketing Specialist Introduction For distribution infrastructures located in remote, isolated areas, unmanned monitoring systems have long
Data Backup Options for SME s
Data Backup Options for SME s As an IT Solutions company, Alchemy are often asked what is the best backup solution? The answer has changed over the years and depends a lot on your situation. We recognize
Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing
www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology
Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle
C Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle Hou-Tsan Lee, Wei-Chuan Lin, Jing-Siang Huang Department of Information Technology, TakMing University of Science and Technology
White Paper. Solutions to VoIP (Voice over IP) Recording Deployment
White Paper Solutions to VoIP (Voice over IP) Recording Deployment Revision 2.1 September 2008 Author: Robert Wright ([email protected]), BSc (Hons) Ultra Electronics AudioSoft, October
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Testing a Wireless LAN
Chapter 17 Testing a Wireless LAN This chapter will introduce you to: Wireless LAN Testing Considerations Signal Coverage Testing Performance Testing In-Motion Testing Security Vulnerability Testing Acceptance/Verification
The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark
The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
