Download Designing and Realization of Management System for University Computer Lab

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Hacker wikipedia , lookup

Transcript
EASTERN ACADEMIC FORUM
Designing and Realization of Management System for University
Computer Lab
ZHOU Xiangfeng
Computer Basic Teaching Department of Shandong Institute of Business and Technology, Yantai City,
Shandong Province, P.R.China, 264000
[email protected]
Abstract: The system of university’s computer labs is with many means of structures, but many
universities prefer to take a simple local area network (namely, LAN), which is hard to satisfy both the
lab managers and the students. This paper is to take the topology to structure the basic facilities in
computer labs, and it is to take hard disc reduction card and BIOS set to strengthen the security of
laboratory system, to take different means to protect the hard disks.
Keywords: Computer, Lab, Management, System
1 Introduction
The system of university’s computer labs is with many means of structures, but many universities prefer
to take a simple local area network (namely, LAN), which is hard to satisfy both the lab managers and
the students. This paper is to take the topology to structure the basic facilities in computer labs, and it is
to take hard disc reduction card and BIOS set to strengthen the security of laboratory system, to take
different means to protect the hard disks.
In setting teaching application software, it is to take the best partial system installment means to enhance
the efficiency in operating the system, which could help develop the standardized management means in
lab management system.
2 Net Structure of Computer Lab System
University computer lab system is composed with a physical network structure, which is presented as
the topological structure. Topological structure refers to the computers compose the net and the nodes
and lines between facilities and transporting media. There are many kinds of topology, such as the star
topology, bus topology, tree topology and the net hybrid topology.
2.1 Star topology structure
Star topology structure takes the central node as the main node, on which many connectors and other
nodes are based and thus forms the network. The central node can be used to combine facilities, and it
can also make use of the file servers. The common central node is usually the switch or the router.
It is easy to control, diagnose and segregate the star topology, and the central node could help provide
service for the individual nodes easily. But it consumes great quantity of electricity; both the installment
and preservation take great efforts. When the central node goes wrong, all the net will be affected, so the
individual node is with low ability of handling problems.
2.2 Bus topology structure
The bus topology structure is a closed channel ring, consists of many nodes and the channel lines. It
combines the public transporting cables to form the circular connection, in which the data could be
spread to all the individual nodes by following one direction. Information is spread from one node to
another, and then to the next. This means of networks costs little and spread information quickly, but it
is very difficult to preserve the system. Whichever node goes wrong, all the system doesn’t work; and it
is difficult to check the very node that goes wrong.
109
EASTERN ACADEMIC FORUM
2.3 Tree topology structure
It is the degraded central controlling network. Compared with the star topology structure, it is with short
length of communication line, low cost, convenient and controllable nodes, and convenient routes. But
besides the central node and its related lines, if any node and the related lines go wrong, all the system
will be harmed. It is easy to be enlarged and composed. When any node goes wrong, stopping this part
couldn’t affect all the other part. So it is easy to be segregated from the whole system. But all the nodes
depend on the central node too much to go on working when the central node goes wrong.
2.4 Net hybrid topology structure
Net hybrid topology structure combines all the channels among every computer, so it is not economical.
Only when every node needs to send information, should we apply this topological structure. It is also
very expensive to install such structure, but this system is with high reliability and great fault-tolerant
ability, so sometimes, it is also named as distributed structure.
When one link goes wrong, information could be spread through another line. Net hybrid topological
structure could be composed as all forms for every node to share information, it improves the
information flow distribution within the link and chooses the best line to spread information, which
quickens the spreading pace. But the line costs highly, so it is not convenient to enlarge it.
2.5 Mixed pattern topology structure
In practical network formation, many means of topological structures are always combined, which
produces the mixed pattern topological structure. This is good to draw the strong points of others to
offset one's own weakness among all the means of topological structures so as to make the structured
network more realistic and controllable. So it is more convenient for people to use the network.
University computer labs usually take the extended star topological structure, namely, they take several
exchange computers as the central combing equipment to combine many terminal computers.
3 Hardware Establishment of Computer Lab System
The hardware in computer lab system is the terminal computer.
3.1 BIOS
BIOS is the computer’s configurator in both its input and output systems, it is an introductive firmware,
which is generally the sequence fixed in unwritable ROM and should be updated by special tools and
certain preconditions. On the whole, BIOS in computer is a kind of tool sequence, while CMOS is used
to record its result. CMOS is usually a unique disk or silicon chip. Recently, the ROM silicon chip us
usually fixed in BIOS silicon chip, so we usually name CMOS as BIOS.
3.2 Upload and download of blue light hardware protection card
Turning on the computer, after BIOS testing screen appears, the blue light card hardware edition
information would appear on the computer screen. To press “Ctrl+H” helps enter hardware settled
screen. First, we should input the hardware settled passwords and then press ENTER. The available
working mode has to be chosen, such as Mode 1, Mode 2, Mode 3, Mode 4, etc. …To set and store the
information according to the hints on the screen and then restart the computer. Please do check if the
hardware information is in accord with the CMOS, if they are not suitable, please restart the computer
and enter BIOS set to check the pattern and capacity of hardware; if they are suitable, please insert blue
light card to the driving box and then dial ENTER. Then there will be the further installing pattern on
the screen.
110
EASTERN ACADEMIC FORUM
4 Designing of Computer Lab’s Management Software
When the operating system in computer labs has been installed, the necessary software has to be
installed, which include both the common and the special application software installment. For the
special application software, it mainly refers to using special computer lab management system software
in the network management software in online operating system.
4.1 Upload and designing of operating system
After installing blue light protection card on the computer PCI slot, the computer lab system could be
started. To make sure of the number of operating system and each individual operating system need the
hardware space. So this process includes two aspects: first, to make sue of the operating system software,
such as Windows 2007, Windows XP, etc; second, it is about some commonly used software, such as
some OFFICE software, and the necessary blue light hardware protection driving sequence (this helps to
make full use of computer resource, and it could make every operation process the best. So it brings
conveniences for teaching and online surfing, and it segregated both teaching and students’ online
surging safely).
The computer-operating management software has to go through the process: external items→
equipment and receipts→physical distribution and information flow→data storage→file→terminal
computer.
4.2 Upload and use of management software system
The client terminal sequence has to be installed in Windows XP operation system after designing the
operating management system for computer labs. After installment, the teacher’s service and
management sequences have to be first operated, and then it is the students’ individual client terminal.
The charge starts from the certain time that the student starts to be connected with the computer. As for
the individual installment, the second step is to realize more machines transport by being assisted by the
blue light hardware protection card, this can copy the system quickly and make all the computer lab with
complete functionality and integrity.
5 Multi-computer Transport—The Key Technique in Computer Lab System
After all the operations and preparations mentioned above, the key part of establishing computer lab
system has to be dealt with, namely, how to manage and preserve the whole computer lab system highly
efficiently. This part is to study how to realize multi-computer data transportation being protected by the
blue light hardware to realize the key technique, which is also the complete construction of the whole
computer lab.
5.1 Preparations of Net transport
Before realizing multi-computer transport, the preparatory work on the computer lab’s Net has to be
checked. This has to be done in three steps.
First, it is to check and adjust the hardware of the network, which includes to connect the connection
between net line interfaces and the switch computer and to make sure every computer’s net line has been
connected with the PCI net card interface with the blue light hardware protection card.
Second, it is to start all the computers in the lab to make the interface remained on choosing operation
system with blue light hardware protection card so as to make sure all the computers, planned to receive
data, are to be connected. The computer labs with the advanced electricity management system could
also turn on computers, planned to receive data, by using wake up on line function.
Third, it is to install all the servers transporting data for all the systematic computers so as to guide the
multi-computer data transport. After turning on the computer, the ballot screen will appear which is
fixed by the set of blue light hardware protection card. Then press the “F10” button and the manager
111
EASTERN ACADEMIC FORUM
screen will be presented. Then to press the “TOOL” button.
This screen is with four choices, namely, the analysis and storage of CMOS on computer’s BIOS set
storage, the hardware duplication for each individual computer to be with two hardware, the net
duplication tool, and the set of manager’s mode which is seldom used. The net duplication tool, dealing
with multi-computer data transport, is the key part of this study.
To choose the third item of the net duplication tool, and then to press the ENTER button, we could enter
the window of net duplication tool, which also covers another three items. These are all the preparatory
work to deal with net duplication transport.
According to the connection set, the IP address auto-distribution, and the net group presented on the
window screen. To enter the net duplication tool item and we could transport data by different time and
means.
5.2 Net transport data
Entered the net duplication interface, we should choose the “sending disk” item in the main service
computer, so as to enter the facilitated computer disk distribution to transport data. We could also set the
whole disk to have different individual disk distribution to transport data. The choice is usually decided
to meet different kinds of demand. For this study, it is the first time to transport data, so to choose the
former is the wise choice.
The disks are with different capacity so after deciding to choose data transport, the process is generally
completed within a half day. We can set the IP address auto-distribution; this means that we do not have
to set each individual computer’s IP address after finishing data transport. Nowadays, the IP address
auto-distribution mostly adopted. The process of data transport, the data receiving conditions of each
individual computer can be checked at any time; after the transport, the wholeness of the data transport
has to be checked. Turning on all the computers, each operating system is to take the software testing;
once any mistake is discovered, the computer has to be data re-transported.
5.3 Test running
Having finished all the system transport and having tested to work smoothly, the study system of this
paper is completed. The design of this paper could finally achieve the installment of computer lab’s
computer system and software. This makes all the computers in the computer lab a complete lab system,
which could satisfy both the teaching activity and the students’ Internet using activity demands. So far,
the design and realization of university computer lab system has been accomplished.
6 Conclusion
This paper describes the university computer lab system structure and the operation system, and takes
the construction of computer lab’s hardware, namely, the blue light hardware protection card and BIOS,
as the study emphasis. As for the students’ computer operation software system, it has made detailed
illustrations and put forward the corresponding solutions, which have achieved the necessity and
applicatoin of this software system. As for the solutions of distribution installment of teaching software
and hardware conflict, the IP auto-distribution, the design of hardware protection card, they are all put
forward on the basis of preservation experience in computer labs. This is suitable to the teaching
necessity and of great value in constructing computer lab practice. This paper’s solutions are applicable
and of great practice value. They can meet the demand from both teaching and entertainment. And they
could also be referred when establishing other similar labs.
Author in Brief:
Zhou Xiangfeng, femal, lecturer of Shandong Institute of Business and Technology.
Phone number: 13953548361
E-mail: [email protected]
112
EASTERN ACADEMIC FORUM
References
[1]. Deng Rong. Designing and Realizing the University Computer Lab Comprehensive Information
Management System [J]. Value Engineering. 2010, 4 (in Chinese)
[2]. Peng Dong. A Designing Plan for University Net Central Equipment Room Construction [J].
Computer Knowledge and Tech. 2011, 4 (in Chinese)
[3]. Yang Bishi. Designing the Open Lab Network Management System [J]. Computer and Information.
2008, 6 (in Chinese)
[4]. Zhang Wei. Experience of University Computer Lab Management [J]. Computer Knowledge and
Tech. 2007, 6 (in Chinese)
[5]. Zhao Bin. Designing University Computer Lab Monitoring System [J]. Scientific and
Technological Information. 2008, 2 (in Chinese)
113