User Tools

Site Tools


device_controll

This is an old revision of the document!


Device controll

To controll most of our devices we use a LabVIEW script, written by V. Gkougkousis, which is run on the server. For the devices which don't have the possibility to be remote controlled, we use a Power Device Unit (netio Power PDU 4PS), it's basically a remote controlled pluglist and allows to tunr off and on single outlets. This works as a controll unit for the vacuum pump, cryocooler, solenoid valve and emergency shut off for the server.

Network configuration

The computer is configured to act as a router and a gateway between the internal network connecting all devices of the experimental setup and the rest of the UZH infrastructure. Effectively, devices on the internal network are hidden from the outside, while they can still access the internet.

SELinux is not installed while AppArmor, a security policy software does not interfere with normal operations and thus must be left active. To allow remote connection ssh has to be installed:

  sudo apt install openssh-server
  sudo nano /etc/ssh/sshd_config
  uncomment the follogwing lines:
      Port 22
      PermitRootLogin yes
      PasswordAuthentication yes

To allow for replies to ping requests, the system fierwall has to bedisabled:

  sudo systemctl stop firewalld
  sudo systemctl disable firewalld
  sudo systemctl status firewalld   

The following rules have to also be configured in the iptables service:

  sudo iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
  sudo iptables -A OUTPUT -p icmp --icmp-type echo-reply -j ACCEPT
  sudo iptables -A INPUT -p icmp --icmp-type echo-reply -j ACCEPT
  sudo iptables -A OUTPUT -p icmp --icmp-type echo-request -j ACCEPT

After these modifications, one must save the settings and restart the network manager:

  sudo iptables-save
  sudo systemctl restart NetworkManager

To ensure that ICMP is allowed and replies to pings are issued, the following must also be set:

  sudo sysctl -w net.ipv4.icmp_echo_ignore_all=0
  sudo sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=0

If additional debugging is needed, tcpdump is a great utility to monitor traffic on the tcp protocol of all network ports. If not pre-installed, it can be downloaded using apt:

  sudo apt update
  sudo apt install tcpdump

Once tcpdump is present, once can continuously monitor traffic by issuing:

  sudo tcpdump -i any icmp

Using local web interace (Firefox) to display instrument information

  1. er
device_controll.1778322823.txt.gz · Last modified: by ari