Creating a Web-based Virtual Laboratory Chen Shihong Feb 27, 1999.

Slides:



Advertisements
Similar presentations
PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
Advertisements

A DATA GRID ARCHITECTURE FOR REAL-TIME ELECTRON MICROSCOPY APPLICATIONS F. Mighela 1, C. Perra 2 1 Telemicroscopy Laboratory, 2 DIEE.
Remote - DSP Lab for Distance Education
VOYAGER: Yet Another Secure Web Browser to Demonstrate Secure Socket Layer Working and Implementation By : Shrinivas G. Deshpande Advisor: Dr. Chung E.
Internet Security Protocols
SECAM Systems Product Presentation SECAM Systems © 2010.
DESIGN AND IMPLEMENTATION OF SOFTWARE COMPONENTS FOR A REMOTE LABORATORY J. Fernandez, J. Crespo, R. Barber, J. Carretero University Carlos III of Madrid.
A LabVIEW-based soundcard interface for e-laboratory Ţepelea Laviniu 1, Gavriluţ Ioan 1, Neamţu Ovidiu 1, Gergely Eugen 1, Gacsádi Alexandru 1 1 University.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
Web-based Distributed Flexible Manufacturing System (FMS) Monitoring and Control Student: Wei Liu Instructor: Dr. Chang Apr. 23, 2003.
1 Owais Mohammad Haq Department of Computer Science Eastern Michigan University April, 2005 Java Script.
Design of Web-based Systems IS Development: lecture 10.
Mi-Joung choi, Hong-Taek Ju, Hyun-Jun Cha, Sook-Hyang Kim and J
Master’s course Bioinformatics Data Analysis and Tools Lecture 6: Internet Basics Centre for Integrative Bioinformatics.
Liang, Introduction to Java Programming, Sixth Edition, (c) 2007 Pearson Education, Inc. All rights reserved L22 (Chapter 25) Networking.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 8: Autonomic computing.
Introduction to Servlet & JSP
Chapter 5 Database Application Security Models
2° cycle degree programme (lm) in Telecommunications Engineering Principles Models and Applications for Distributed Systems Prof. Maurelio Boari
Home and Learn How Setup a Wireless Internet Connection.
Remote Networking Architectures
Internet Information Server Team Members: Hung Duong Hak Gauv Eric Luc David Nguyen Larry Tan.
1 Enabling Secure Internet Access with ISA Server.
© 2010 UEI, Inc. All Rights Reserved UEIPAC HMI.
Part IV Web Server Hardware and Software
Module 1: Installing Internet Information Services 5.0.
OPeNDAP Hyrax Back-End Server (BES) Authentication and Authorization Patrick West
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
INE1020 Introduction to Internet Engineering Tutorial 8 All about Lab 6.
What makes web pages look like web pages LS 560 Spring 2012, section 901.
Electronic Devices Laboratory CE/EE 3110 Introduction to LabView.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 10 Developing a Web-Based Online Shopping Application (I)
Computer Graphics Communication “Digital Documentation using 3D- CAD data and Web-3D” Tatsuya Mochizuki Shizuoka University of Art and Culture, Hamamatsu,
Tells - a facility for web-based, remote real time laboratory experiments University of Limerick Ireland.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
Module 5 A system where in its parts perform a unified job of receiving inputs, processes the information and transforms the information into a new kind.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Web Controlled of Robot Georgi Chakarov Ivelin Stoyanov.
Section 3 Database Security. 3-2 CA306 Introduction Section Content 3.1 Security Overview 3.2 Security Controls 3.3 Views 3.4 Security in Oracle 3.5 Web.
Web Operated Robot Arm Matanya Elchanani and Tarek Sobh University of Bridgeport Department of Computer Science and Engineering Robotics, Intelligent.
Implementation a Web-Based Remote Control System for Moving Led Dot- Matrix Display Presented by: BUI, Phuong Nhung, 裴芳绒.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
Overview Web Session 3 Matakuliah: Web Database Tahun: 2008.
The Web and Web Services Jim Graham NR 621 Spring 2009.
Johnson Lab Database Senior Design Project Management II Spring 06 Mark Nelson.
INTRODUCTION TO WEB APPLICATION Chapter 1. In this chapter, you will learn about:  The evolution of the Internet  The beginning of the World Wide Web,
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Stephanie Mercury.  A firewall allows or blocks traffic into and out of a private network or the user's computer.
Java for networking Module Introduction Data Communications Communication architecture Application.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
Networking with LabVIEW. Introduction To put it in simple terms, networking focuses on how to make computers “talk” to each other.
JavaScript and Ajax (Internet Background) Week 1 Web site:
ITIS 1210 Introduction to Web-Based Information Systems Chapter 3. How TCP/IP Works.
Web Based Flow Visualization Facility Group Members: Justin Scott Sydni Credle Karen Davis Mentor: Dr. Shih.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Web Server Architecture/Hosting Capstone Project2 Name-ASFAQUE KHAN Regno
CIS 1203 Web Technologies Introduction to the Internet and the WWW.
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
BUILDING AND IMPLEMENT A EMBEDDED WEB SERVER BASE ON TCP/IP STACK WITH A SoC PLATFORM Professor : CHI-JO WANG Name : Bui Quang Hoa (M982b211)
Department of Computer Science
AN ENVIRONMENT FOR REMOTE CONTROL
How to open a local electronics laboratory for remote access Part 4
Introduction to Networking Security
Presentation transcript:

Creating a Web-based Virtual Laboratory Chen Shihong Feb 27, 1999

Content Introduction User authentication Remote access control Conclusion Future work

Introduction How to create a Virtual Laboratory implementation of local instrument control using LabVIEW implementation of remote instrument control through Internet

Hardware Structure

Introduction The problems we met during developing this project 1) User Authentication 2) Remote Access Control

User Authentication Protect web pages Allow authorised user to conduct the remote experiments Reject unauthorised requests

User Authentication Two methods for implementation of Remote Instrument Control though Internet - Single client/server structure using CGI - Double client/server structure using CGI and TCP/IP socket

User Authentication Our method A double Client/Server structure Using CGI method to generate dynamic HTML

A double client-server structure

User authentication model

Remote Access Control What is access conflict ? Our approach to solve access conflict

Remote Access Control Model

Conclusion Two steps to create a Virtual lab We have developed one remote laboratory experiment (Oscilloscope Experiment)

Future work Image compression and transmission through Internet Encryption of transmission Integration with Computer Supported Cooperative Work