CN100423500C - Network interactive teaching experimental method based on attcking/defending and video pack playing tech - Google Patents

Network interactive teaching experimental method based on attcking/defending and video pack playing tech Download PDF

Info

Publication number
CN100423500C
CN100423500C CNB2004100170210A CN200410017021A CN100423500C CN 100423500 C CN100423500 C CN 100423500C CN B2004100170210 A CNB2004100170210 A CN B2004100170210A CN 200410017021 A CN200410017021 A CN 200410017021A CN 100423500 C CN100423500 C CN 100423500C
Authority
CN
China
Prior art keywords
dll
hook
network
student
defending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100170210A
Other languages
Chinese (zh)
Other versions
CN1564536A (en
Inventor
杨树堂
李建华
陆松年
朱靖宇
李锋
陈俊文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CNB2004100170210A priority Critical patent/CN100423500C/en
Publication of CN1564536A publication Critical patent/CN1564536A/en
Application granted granted Critical
Publication of CN100423500C publication Critical patent/CN100423500C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Electrically Operated Instructional Devices (AREA)

Abstract

The present invention relates to a network interactive teaching experiment method based on attacking/defending and video multicast technology, which is used in the field of network information technology. A foundation framework is built through a TCP/IP network communication protocol, and a teacher computer and student computers in a network are connected by a TCP/IP protocol group to form a communication framework for mutually transmitting data. On the framework, a hidden process in network attack/defence is used for maintaining the normal teaching environment of the student computers. The broadcasting quality and the velocity are improved by using a screen to encoding images in real time. Files on the student computers are actively obtained through file compression. A Socket 5 protocol agent is used for ensuring the stability of transmitting data. The operational conditions of the student computers are monitored through memory mapping, and remote commands are used for controlling the student computers. The present invention effectively uses the prior art and hardware/software environment, combines a traditional teaching means with the advantage of a computer network, develops large-scale teaching experiment activities and evaluates results. The present invention emphasizes students' participation.

Description

Network interactive formula teaching and experiment method based on attacking and defending and video multicast technology
Technical field
The present invention relates to a kind of method that realizes education experiment, specifically is a kind of network interactive formula teaching and experiment method based on attacking and defending and video multicast technology.Be used for network information technology field.
Background technology
Along with popularizing of computer network, existing multimedia electronic teaching method can not satisfy the requirement of modern teaching, and the teaching method of networking more and more is subjected to numerous teachers and students' favor.Current, the problem that the multi-media network teaching method need solve mainly is how the content of courses to be become more vivid, and provides the student to carry out the environment of practical operation personally.
Find that by retrieval denomination of invention is: multimedia net work teaching system, Chinese patent application number are 96113421.6, and the Chinese patent publication number is 1177144A.This patent has proposed a kind of multimedia net work teaching method, does not need the webserver or network operating system.This multimedia net work teaching method comprises the teaching job station prison person of leading, some student work stations, a socket and multimedia interface in order to transmission audio frequency and video information in order to transmission command as this system.Above-mentioned each work station comprises a PC, a multimedia transmission device, a network interface card and a control panel.The software of this tutoring system can be divided into teacher part and student's part, and this two parts software must be carried out in above-mentioned teaching job station, but the student work station only need be carried out student's part software and got final product.This method can realize the multimedia net work teaching of audio frequency, video broadcasting fully, and advantage is to have saved the webserver, network operating system.Shortcoming is, owing to only used an IPX and package to drive standard in this method, transmits the order message between teacher computer and student's machine.IPX is the agreement group that NOVELL is used for the NETWARE client/server, and it has avoided NETBEUI in the shortcoming that lacks on route and the network layer addressing function, but it also has the shortcoming of self.The extensibility of IPX is subjected to the restriction of its high-rise broadcast communication and high expense.Service access point (SAP) is restricted to several thousand with the main frame number in the route network.Although the limitation of SAP is overcome by intelligent router and server configuration, large-scale ip X Network Management is still very difficult.In addition, above method does not also consider how to take certain measure to keep a good teaching environment at student's machine, and therefore, the student can break away from teacher's management very like a cork by the method for end process, thereby destroys the teaching environment of student's machine.
Summary of the invention
The present invention is directed to the deficiencies in the prior art and defective, a kind of network interactive formula teaching and experiment method based on attacking and defending and video multicast technology is provided, make it can more effectively utilize prior art and hardware environment, advantage in conjunction with Traditional teaching means and computer network, carry out large-scale education experiment activity, and the result is assessed.Special attention will be given to student's of the present invention property of participation realizes the extendible education experiment of network interactive formula.
The present invention is achieved by the following technical solutions, the present invention builds a basic framework by the TCP/IP network communication protocol, promptly the teacher computer in the network and student's machine are coupled together, form one and can transmit the framework that data communicate mutually with TCP/IP protocol suite.If loss of data, transmission distortion take place, then TCP can require data to transmit again automatically in transmission, and the network of setting up with TCP/IP can guarantee the data integrity transmission, on this framework,
(1) use the process hiding in the network attacking and defending to keep normal student's machine teaching environment;
(2) use screen realtime graphic coding to realize the quality of broadcasting and the raising of speed;
(3) use the next file that initiatively obtains on student's machine of File Compress;
(4) use the Socks5 agency by agreement to guarantee the transmission data stability;
(5) operational circumstances of use monitored by memory mapping student machine;
(6) use remote command to control student's machine.
The present invention can realize: distance teaching, phonetic teaching, speech talkback, student's demonstration, monitoring relay, screen recording and playback, remote command, file distributing, video relay, blank screen solemn silence, class's model, long-range setting, experimental result check that experiment is marked and generated the school report form.
Compare with the IPX that mentions in the background technology, the TCP/IP network communication protocol that the present invention adopts allows to be connected completely with Internet.TCP/IP can satisfy the demand of extensibility and reliability.
Below the present invention is further illustrated, particular content is as follows:
1. process hiding:
The present invention has adopted hook (Hook) technology to make student's machine can not destroy teaching experiment environment at the process hiding technical elements.
Each process all has the privately owned memory headroom of oneself in the Windows system, and any common process can not be operated other process.But utilize window hook and long-range insertion threading just can enter and operate the privately owned internal memory of other process.So just can be implanted to student's machine program in the system process, necessary when system process is the operation of windows system, thus implementation process is hidden.
It is a variety of that Windows allows the Hook Function of user installation to have, as message hook, mouse hook, keyboard hook etc.Hook Function is by Set Window Hook function (perhaps its enhancing version SetWindowHook
Ex) install, the Hook Function that is mounted all belongs to a DLL.The characteristic of Hook Function is: if the hook call back function is provided by a DLL, and the process of being hooked does not load this DLL, and system can load this hook DLL for automatically this process so.Like this, as long as use SetWindowsHook a Hook Function that belongs to certain DLL to be installed, just can force target process to load this DLL as target process.
The function prototype of SetWindowsHookEx is:
HHOOK SetWindowsHookEx (int idHook, // hook type HOOKPROC lpfn, // Hook Function HINSTANCE hMod, //DLL handle DWORD dwThreadId // Thread Id);
Wherein, first parameter int idHook is the hook type.Select message hook here for use, i.e. WH_GETMESSAGE.
Second Parameter H OOKPROC lpfn is used for specifying the hook call back function, this function will be called when the hook incident takes place, because this function is (promptly to be used for the close dll file of getting of the information of carrying out by dll file, abbreviate Our DLL below as) provided, so can be loaded the DLL module automatically by the hook process;
The 3rd Parameter H INSTANCE hMod is the handle that comprises the Our DLL of Hook Function;
The 4th parameter DWORD dwThreadId is the Thread Id that is associated with Hook Function, if this parameter is made as 0, Hook Function will be related with all threads on this desktop so.
The handle of supposing hook DLL is g_hinstDll, the Thread Id that need hook is dwThread, the hook call back function is GetMsgProc (), so by following code, just can load a MESSAGE hook for target process, that is to say, embedded the DLL that comprises Hook Function to target process:
SetWindowsHookEx(WH_GETMESSAGE, GetMsgProc, g_hinstDll, dwThreadId);
By above-mentioned code, just the DLL that comprises the GetMsgProc function can be embedded any target process (as long as authority allow), if but the hook erection schedule withdraw from, system also can unload all hook DLL automatically so, because no longer needed Hook Function.At this problem, a simple solution is exactly the dll files that use more, between the Our of hook erection schedule DLL, increase a hook DLL, the hook erection schedule loads hook DLL, the close DLL that gets of load information from hook DLL again, hook DLL can withdraw from thereupon when the hook erection schedule withdrawed from, but the close DLL of getting of information can't withdraw from, and had so just realized residing of the close DLL of getting of in-process information.Suppose that the hook erection schedule is Internat32.exe, hook DLL is HookDll.dll, and Our DLL is our.dll, and target process is Explorer.exe, and the close process of getting the resident target process of DLL of information is as follows so:
(1) along with os starting, the necessary program Internat32.exe of system brings into operation;
(2) Internat32.exe loads HookDll.dll, the implanted program Explorer.exe of HookDll.dll;
(3) HookDll.dll loads our.dll, the implanted Explorer.exe of our.dll;
(4) os starting finishes, and Internat32.exe withdraws from;
(5) Explorer.exe withdraws from, and HookDll.dll is unloaded simultaneously;
(6) our.dll continues to reside in the system.
By this technology, just can will finish the close DLL function of getting function of information and successfully be inserted in any one target process and go, the data transfer mode in conjunction with rebound ports just can realize having hidden the function of fire compartment wall again.
2. the screen realtime graphic is encoded
The screen realtime graphic coding techniques that the present invention is used---the compression algorithm of LZW, advantage is can select different color depths when transmission, and has good disguise.
According to demand of the present invention, need to realize that teacher computer sends the function that long-range student's machine current window or whole screen still image are obtained in instruction.Consider in the actual transmissions bandwidth for Effect on Performance, when transmission, can select the corresponding different big or small data volumes of different color depth (comprise 1,4,8,16 with 32 etc.).
Obtain window handle intercepting bitmap during screen capture earlier, convert device independent bit (DIB) form then to and deposit one section memory headroom in, at last the data of this section memory headroom are compressed.Obtain bitmap, basic operations such as format transformation all usefulness be the api function of windows, whole intercepting is divided into three modules: obtain information module, format transformation module and compression and stored information module.
For the high efficiency and the confidentiality that guarantee data compression, the present invention adopts the compression algorithm of LZW.This algorithm is very high for the repeating data compression ratio of continuous appearance, and is therefore very remarkable for the identical Image Data Compression effect of large tracts of land content, and the reduction back does not have very big loss to data.Test result shows that the image of a width of cloth full screen has only about 10K in minimum after the compression, and also very clear after the reduction.
The LZW coding is to finish around the conversion table that is called dictionary.This conversion table is used for depositing the character string that is called prefix (Prefix), and for each list item distributes a code word (Code word), perhaps is called sequence number.This conversion table is actually 8 bit ASCII character set is expanded, and the symbol of increase is used for being illustrated in the variable-length ascii string that occurs in text or the image.Code after the expansion can be represented with 9,10,11,12 even more.LZW encoder (software encoder or hardware coder) is exactly by managing the conversion of this dictionary between finishing input and exporting.The input of LZW encoder is character stream (Charstream), character stream can be the character string of forming with 8 bit ASCII characters, and output is the streams of code words (Codestream) with n position (for example 12) expression, the character string that on behalf of single character or a plurality of character, code word form.The LZW encoder uses greedy parser, in greedy parser, analyze the character string that all will check serially from character stream each time, therefrom decomposite the longest character string of having discerned, the longest prefix Prefix that just in dictionary, has occurred.With known prefix Prefix add next input character C just current character form new escape character (ESC) string as the escape character (ESC) of this prefix---sew-Fu goes here and there String:Prefix.C.This is new sews-and whether Fu string String will be added in the dictionary, will see that also whether having sew identical with it-Fu in the dictionary goes here and there String.If have, so this sew-Fu string String just becomes prefix Prefix, continue the new character of input, otherwise just this sewed-Fu string String writes and generate a new prefix Prefix in the dictionary, and give a code.
3. File Compress
The present invention has used the self adaptation slip window compression algorithm based on the LZ77 algorithm, can initiatively obtain file on student's machine by teacher computer, and whole process is concealed and safe.This algorithm as the term dictionary, if the character string that will compress occurs in this window, is then exported a window virtual, that can follow the compression procedure slip it and position and length are occurred.Using fixed size window to carry out the term coupling, rather than mate in the information encoded at all, is that the size that must limit dictionary could guarantee the efficient of algorithm because the time loss of matching algorithm is often a lot; Process slip dictionary window along with compression makes wherein always to comprise nearest information of encoding, and the character string that encode can find the coupling string in nearest context.
The realization flow of this algorithm is, the size of setting window is 10 characters, and 10 characters of just having encoded are: abcdbbccaa, the character that is about to coding is: abaeaaabaee.At first find, can with the longest string of wanting the code character coupling be ab (off=0, len=2), the character late of ab is a, exports tlv triple: (0,2, a).Window slides backward 3 characters now, and the content in the window is: dbbccaaaba.Character late e does not mate in window, the output tlv triple: (0,0, e).Window slides backward 1 character, and wherein content becomes: bbccaaabae.Find at once, the aaabae that encode in window, exist (off=4, len=6), character thereafter is e, can export: (4,6, e).Like this, can all become the pointer that points in the window by the characters matched string, and finish compression thus above-mentioned data.
The process that decompresses: as long as when compression, safeguard the window of slip like that, continuous input along with tlv triple, in window, find corresponding coupling string, sew subsequent character c output (, then only exporting subsequent character c) and can restore initial data if off and len are 0.
In the specific implementation of compression function module, use model to coupling string and the output of single character classification, during output coupling string, off adopts block code, and len adopts the γ coding.Index structure adopts the index of 2 byte long character strings, uses the static storage of array index point of 256*256 size, and each index point points to a position chained list.Chained list node has been considered the optimization to the repeated strings of aaaaa... and so on.
The present invention has used the regular length window of 64k size, and window is not done slip (therefore do not need the annular offset system, saved the time of deletion index point yet).Compression function is each only to be compressed the long data of maximum 64k, and principal function is compressed storage one by one with the piece that original document is divided into the 64k size.Make the probability that can increase coupling in this way, character string can be sought maximum coupling string arbitrarily in the 64k space, improve compression efficiency with this; The data of the method piecemeal compression are easy to begin to decompress from any one middle position of original document.
4.Socks5 agency by agreement
Socks5 agency's exploitation is divided into two parts, the remote controlled end parts sends connection request to the Socks5 server and submits authentication information to, if checking was by just sending connection request to local control end after acting server received connection request, when just transmitting message between these two connections with setting up the back being connected of remote controlled end, remote controlled end at this moment and local control end mode of operation when directly being connected is just the same.The stability requirement acting server of considering transmission will keep not being higher than 5% packet loss for the information forwarding that continues.
The Socks5 agency who adopts is based among the RFC1928 that description about Socks5 under the Transmission Control Protocol realizes.When a client based on Transmission Control Protocol wishes to set up with being connected of other machines by Socks5 agency, must at first set up one and be connected with the TCP of socks port on the Socks5 server.Usually this tcp port is 1080.After connecting foundation, client enters " (negotiation) shakes hands " process of agreement: the selection of authentication mode, authenticate according to the mode of choosing, and send the requirement of transmitting then.The Socks5 server is checked this requirement, according to the result or set up suitable connection or refusal.
After client was linked the Socks server, version and authentication method were consulted in the request of transmission.
In the Socks agreement of this version, the VER field is configured to X05.The NMETHODS field has comprised the number (is unit with the byte) of the method sign that occurs in the METHODS field.Server is selected one and send the message that a method chooses and return client from these given methods.
If the message of choosing is XFF, this represents that the neither one method is selected in the listed method list of client, and client must be closed connection.
Client and server enter the sub-negotiations process (sub-negotiation) that is determined by selected authentication method then.In case after sub-negotiations process finished, client just sent detailed solicited message.If having with integrity checking and/or fail safe in the negotiation method is the encapsulation of purpose, these requests must encapsulate according to the defined mode of this method.
The socks acting server can come analysis request according to source address and destination address, returns one or more replying according to request type then.If having with integrity checking and/or fail safe in the method for choosing is the encapsulation of purpose, these are replied and must encapsulate according to the defined mode of this method.Receive reply after, the remote controlled end just can transmit data.
5. memory-mapped
The present invention adopts the memory-mapped technology to realize record complete monitoring for keyboard and mouse, cooperates other technology to realize active upload and various configuration.This technology is obtained the monitoring of hardware to read fully to break away from recorded information soft and is come, and to obtain, write down, transmit the three independent fully thereby make, and reaches complete monitoring, the function of obtaining at any time or even obtaining automatically.Realizing effect preferably aspect the automation of integrality that guarantees record and work.
Memory Mapping File and its is a kind of file buffering algorithm, and is the same with virtual memory, and Memory Mapping File and its can be used for keeping the zone of an address space, and physical storage is submitted to this zone.Use Memory Mapping File and its, make a plurality of processes of moving on same computer shared data each other.Memory Mapping File and its is the effective method that a plurality of processes on the single computer communicate mutually.
By Memory Mapping File and its, can be a view certain position with the whole and part mapping of file on the disk to the process virtual address space.In case finished map view, to the visit of file content just as directly simple in this address area to the pointer value.Like this, in file, write data and just can directly carry out assignment pointer.A large amount of file I/Os improves the overall performance of system by buffered simultaneously.Certainly, also can force to carry out immediately disk transaction by invoke memory mapped file function F lush View Of File handles with heavily loaded sort buffer processing mode.
6. remote command
Remote command is a big class, all is to give operating system in instruction of long-range execution.Under this big function of remote command this group of remote command is arranged again, this group mainly is send to carry out, open the function of certain program, do not comprise long-rangely restart, order such as remote power-off.
This function can connect and realizes by set up TCP/IP with Socket.Specifically: connect earlier, send control data by teacher computer to student's machine then, after student's machine receives data, judge whether to be effective order earlier, carry out corresponding program again with the Socket TCP/IP that connects.Remote opening and long-rangely restart, bigger difference arranged on the remote power-off principle.
During remote opening, the operating system of machine also not to start, thus not by sending instructions to operating system, but call the instruction on the network interface card.This is to need mainboard and network interface card support, and the BIOS in the mainboard will choose corresponding option.Network interface card and mainboard have an independent wiring, and network interface card can be passed to mainboard after receiving enabled instruction like this.And in background technology, do not have remote opening and long-rangely restart this two functions.
Because the process hiding technology that the present invention uses has and the operating system binding, begin and the advantage that begins with system process, thus be irresistible to student's machine, so teacher computer can be kept teaching experiment environment; Use screen realtime graphic coding techniques to realize student's machine screen recording, have the little advantage of transmitted data amount, can reach the effect of in the education experiment process, monitoring student's machine screen and its on-screen data of transmission in real time; Use the File Compress technology, can obtain file from student's machine at hidden; Use the memory-mapped technology to monitor, make and to destroy teaching with the method for the process of end at the whole teaching process of student's machine to whole operations of student's machine.
Description of drawings
Hierarchical relationship figure between the every technology of Fig. 1 the present invention, function
Embodiment
As shown in Figure 1, the basic technology of the inventive method is network service, network attacking and defending, audio frequency and video processing, what specifically use is TCP/IP, the UDP/IP protocol technology of being expanded out by basic technology, the SOCKET5 communication technology, process hiding, port concealing technology, information is obtained, data intercepting and capturing technology, screen realtime graphic coding techniques, the File Compress technology, audio, video data compression, transmission, synchronously, decompress(ion), play-back technology, memory-mapped technology and remote command technology.Use the process hiding in the network attacking and defending to keep normal student's machine teaching environment; Use screen realtime graphic coding to realize the quality of broadcasting and the raising of speed; Use the next file that initiatively obtains on student's machine of File Compress; Use the Socks5 agency by agreement to guarantee the transmission data stability; Use the operational circumstances of monitored by memory mapping student machine; Use remote command to control student's machine.So just can realize network interactive formula teaching and experiment method.The present invention is after enforcement, have " experiment navigation ", " experiment content introduction ", " the experiment material is shared ", " experimental tool ", " experimental result is checked ", " experiment scoring ", " generating the achievement list ", " file distributing ", " network movie theatre ", " blank screen solemn silence ", " distance teaching ", " phonetic teaching ", " student's demonstration ", " monitoring is relayed ", " screen recording ", " screen playback ", " remote command " option on the interface of man-machine interaction, select for student and teacher.
The present invention has provided this network interactive formula teaching and experiment method based on attacking and defending and video multicast technology.And in this teaching and experiment method, the present invention provides learning materials, operation experiments, the investigation test of many relevant above these concrete technology again to the student.
Carry out concrete experimental implementation below in conjunction with middle school student of the present invention the specific embodiment of the present invention be described:
1) teacher computer is opened student's machine by the remote opening function in the remote command;
2) student understands earlier the particular content of this experiment in " experiment content introduction " lining, operating procedure, and points for attention, teacher computer is by being connected and realizing by set up TCP/IP with Socket with student's machine here.Specifically: connect earlier with the Socket TCP/IP that connects, teacher computer is confirmed that student's machine is required and is appreciated which experiment, send file data by teacher computer to student's machine then, after student's machine receives data, directly on screen, learn by the mode of web page browsing;
3) student then can be in " experiment material share " and " experimental tool " this experiment of careful study do the knowledge point that should understand, the instrument that should grasp may also have the current experiments process can be for reference, this also is with 2) in method realize;
4) student selects the student to demonstrate to watch the current experiments process to do reference, teacher computer is by 2) in the network set up connect receive request after, just can call local corresponding video file, on local area network (LAN), send multimedia programming in the mode that meets the UDP/IP agreement: at first to this student's machine, the sector strucre that reads in the video file is encapsulated into each sectors of data in the independent UDP message, and utilizes port address to identify the passage of transmission.Then the UDP message fragment that comprises video data is encapsulated in the IP message.Consigning to drive software at last sends message from Ethernet card.Here adopt the form of clean culture to send to the transmission of video information.The teacher holds the video file of transmission to adopt common file format (MPEG-1, MPEG-4 standard), and advantage is that the program source is abundant, cost is low.For example: the video file of storing in the VCD CD is that the file of DAT is preserved usually with the suffix, and its form is to arrange according to the logic sector storage format of CD.Because DAT file itself is handled with regard to requiring that according to the MPEG video storage MPEG-1 data have been carried out two-layer packing, and wrap a mpeg data and be encapsulated in the middle of the CD logic sector, each sector all carries the synchronous code of 12Byte and the check code of 4Byte.Utilize the sector synchronous code can realize the synchronous of video code flow rapidly;
5) student at this time just can specifically test, and after selecting concrete experiment to operate, can write out a laboratory report in this locality, and by 2) middle connection of setting up, notice teacher computer oneself has been finished experiment, the request scoring;
6) after teacher computer is received request,, use based on the self adaptation slip window compression algorithm of LZ77 and obtain laboratory report, mark from student's machine by the contrary operation of file distributing;
7) teacher can keep order in education with blank screen solemn silence function in the scoring process, is by 2 here) connection of setting up transmits an order and gives student's machine, makes it show complete black picture, and this is the part of Long-distance Control;
8) with the distribution of document function result and annotations and comments are provided to the student after scoring finishes;
9) do the student that the teacher can pass through the screen recording function in the process of experiment, grasp student's experimentation, save as video file, and can carry out online broadcast; Perhaps grasp important picture, pass to other students with file distribution function, at this moment will carry out data compression, teacher computer compresses the on-screen data of intercepting and capturing according to certain compression algorithm.So just can guarantee that transmitted data amount is little on the net, transmission speed is fast.Data send.According to the network technology that meets the UDP/IP agreement, carry out online transfer of data.Comprise compensation of network error correction, network loss data or the like.The memory-mapped technology of can also using teacher computer writes down mouse, the keyboard operation of student's machine, more complete record student's experimentation;
10) after experiment finished, the teacher can close student's machine by the remote power-off order.
Below this form be the major function that realizes of present embodiment and the corresponding relation of every technology:
Class's management ICP/IP protocol, SOCKET communication, process hiding, port is hidden
Distance teaching The UDP/IP agreement, SOCKET communication, process hiding, data acquisition, compression, transmission, synchronously, decompress(ion), broadcast
Phonetic teaching The UDP/IP agreement, SOCKET communication, process hiding, data acquisition, compression, transmission, synchronously, decompress(ion), broadcast
Speech talkback The UDP/IP agreement, SOCKET communication, process hiding, data acquisition, transmission, synchronous, broadcast
Student's demonstration UDP/IP agreement SOCKET communication, process hiding, port is hidden, data acquisition, compression, transmission, memory-mapped
Monitoring is relayed Process hiding, port is hidden, data acquisition, compression, transmission, decompress(ion), broadcast, screen picture compression, memory-mapped
Screen recording Process hiding, port is hidden, and data are intercepted and captured, data acquisition, compression, transmission, screen picture compression, memory-mapped
The screen playback The UDP/IP agreement, SOCKET communication, process hiding, port is hidden, data acquisition, compression, transmission, decompress(ion), broadcast
Remote command ICP/IP protocol, SOCKET communication, process hiding, port is hidden, locking keyboard, lock-screen
File distributing ICP/IP protocol, SOCKET communication, the UDP/IP agreement, process hiding, port is hidden
Video is relayed ICP/IP protocol, the UDP/IP agreement, process hiding, port is hidden, and data compression, transmission, decompress(ion) are play
Blank screen solemn silence ICP/IP protocol, SOCKET communication, process hiding, port is hidden, locking keyboard, lock-screen
Long-range setting ICP/IP protocol, SOCKET communication, process hiding, port is hidden
So the student is in whole experiment, undertaken by network from preparing to finish to the end all, the student can initiatively select own interested experiment therebetween, if the discrepant words of the level of student own can also select the experiment of varying level to operate according to s own situation, when the study related data, the student also can selectively carry out, and this has just realized interactivity Web-based instruction experiment.The teacher can observe each step that the student experimentizes, and helps timely, detailed grasp student's experiment situation, and whole process is had absolute control.And the enforcement of entire method is not subjected to spatial limitation.
Because the basic technology of this method is network service, network attacking and defending, audio frequency and video treatment technology, and experiment all is the hands-on or the design experiment of relevant these several aspects, and the student can have more deep impression in operating process.

Claims (10)

1. network interactive formula teaching and experiment method based on attacking and defending and video multicast technology, it is characterized in that, build a basic framework by the TCP/IP network communication protocol, promptly the teacher computer in the network and student's machine are coupled together with TCP/IP protocol suite, form one and can transmit the framework that data communicate mutually, if loss of data, transmission distortion take place, then TCP can require data to transmit again automatically in transmission, on this framework
(1) use the Hook Technique of process hiding aspect in the network attacking and defending to keep normal student's machine teaching environment;
(2) use screen realtime graphic coding to realize the quality of broadcasting and the raising of speed;
(3) use is carried out the next file that initiatively obtains on student's machine of File Compress based on the self adaptation slip window compression algorithm of LZ77 algorithm;
(4) use the Socks5 agency by agreement to guarantee the transmission data stability;
(5) operational circumstances of use monitored by memory mapping student machine;
(6) use remote command to control student's machine.
2. the network interactive formula teaching and experiment method based on attacking and defending and video multicast technology according to claim 1 is characterized in that, described process hiding is specific as follows:
Hook Function is to install by Set Window Hook function or its enhancing version SetWindowHookEx, the Hook Function that is mounted all belongs to a DLL, as long as for target process a Hook Function that belongs to certain DLL is installed, just can be forced target process to load this DLL; Simultaneously, because in case the hook erection schedule withdraws from, system also can unload all hook DLL automatically, therefore must use a dll file more, increase a hook DLL between the Our of hook erection schedule DLL, the hook erection schedule loads hook DLL, the close DLL that gets of load information from hook DLL again, hook DLL can withdraw from thereupon when the hook erection schedule withdrawed from, but the close DLL of getting of information also continues operation, and the close DLL of getting of the information that realized resides target process.
3. the network interactive formula teaching and experiment method based on attacking and defending and video multicast technology according to claim 2, it is characterized in that, suppose that the hook erection schedule is Internat32.exe, hook DLL is HookDll.dll, Our DLL is our.dll, target process is Explorer.exe, and information is close, and to get the process of the resident target process of DLL as follows:
(1) along with os starting, the necessary program Internat32.exe of system brings into operation;
(2) Internat32.exe loads HookDll.dll, the implanted program Explorer.exe of HookDll.dll;
(3) HookDll.dll loads our.dll, the implanted Explorer.exe of our.dll;
(4) os starting finishes, and Internat32.exe withdraws from;
(5) Explorer.exe withdraws from, and HookDll.dll is unloaded simultaneously;
(6) our.dll continues to reside in the system.
4. the network interactive formula teaching and experiment method based on attacking and defending and video multicast technology according to claim 1 is characterized in that, described screen realtime graphic coding is specific as follows:
When being coded in transmission, the screen realtime graphic can select color depth, obtain window handle intercepting bitmap during screen capture earlier, convert the device independent bit form then to and deposit one section memory headroom in, at last the data of this section memory headroom are compressed, obtain bitmap, format transformation and all use the api function of windows, whole intercepting is divided into three modules: obtain information module, format transformation module and compression and stored information module.
5. the network interactive formula teaching and experiment method based on attacking and defending and video multicast technology according to claim 4, it is characterized in that, the high efficiency and the confidentiality of the compression algorithm assurance data compression of LZW have been adopted, the LZW coding is to finish around the conversion table that is called dictionary, the LZW encoder is by managing the conversion of this dictionary between finishing input and exporting, the input of LZW encoder is a character stream, output is to use streams of code words, the character string that on behalf of single character or a plurality of character, code word form, the LZW encoder uses greedy parser.
6. the network interactive formula teaching and experiment method based on attacking and defending and video multicast technology according to claim 1 is characterized in that, described File Compress is specific as follows:
Based on the self adaptation slip window compression algorithm of LZ77 algorithm with one virtual, can follow window that compression procedure slides as the term dictionary, if the character string of compressing occurs in this window, then export it and position and length occur, use fixed size window to carry out the term coupling, replaced the method for having mated in the coded message at all, process slip dictionary window along with compression, make wherein always to comprise nearest information of encoding, the character string that encode can find the coupling string in nearest context.
7. the network interactive formula teaching and experiment method based on attacking and defending and video multicast technology according to claim 6, it is characterized in that, use the regular length window of 64k size, window fixed, compression function is each only to be compressed the long data of maximum 64k, and principal function is compressed storage one by one with the piece that original document is divided into 64k.
8. the network interactive formula teaching and experiment method based on attacking and defending and video multicast technology according to claim 1 is characterized in that, described memory-mapped is specific as follows:
Realize that by memory-mapped record keyboard, mouse action and file obtain, Memory Mapping File and its is a kind of file buffering algorithm, the same with virtual memory, Memory Mapping File and its can be used for keeping the zone of an address space, and physical storage submitted to this zone, use Memory Mapping File and its, make a plurality of processes of moving on same computer shared data each other.
9. the network interactive formula teaching and experiment method based on attacking and defending and video multicast technology according to claim 1, it is characterized in that, described Socks5 agency by agreement, be based among the RFC1928 that description about Socks5 under the Transmission Control Protocol realizes, when a client based on Transmission Control Protocol wishes to set up with being connected of other machines by Socks5 agency, must at first set up one is connected with the TCP of socks port on the Socks5 server, after connecting foundation, client enters the agreement process of " shaking hands ", authenticate according to the mode of choosing, send the requirement of transmitting then, the Socks5 server is checked this requirement, according to the result or set up suitable connection or refusal.
10. the network interactive formula teaching and experiment method based on attacking and defending and video multicast technology according to claim 1, it is characterized in that, described remote command, be to connect and realize that during remote opening, student's machine also is in closed condition by set up TCP/IP with Socket, it is the instruction of calling on the network interface card, BIOS in the mainboard will choose corresponding option, and network interface card and mainboard have an independent wiring, and network interface card can be passed to mainboard after receiving enabled instruction like this.
CNB2004100170210A 2004-03-18 2004-03-18 Network interactive teaching experimental method based on attcking/defending and video pack playing tech Expired - Fee Related CN100423500C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100170210A CN100423500C (en) 2004-03-18 2004-03-18 Network interactive teaching experimental method based on attcking/defending and video pack playing tech

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100170210A CN100423500C (en) 2004-03-18 2004-03-18 Network interactive teaching experimental method based on attcking/defending and video pack playing tech

Publications (2)

Publication Number Publication Date
CN1564536A CN1564536A (en) 2005-01-12
CN100423500C true CN100423500C (en) 2008-10-01

Family

ID=34478727

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100170210A Expired - Fee Related CN100423500C (en) 2004-03-18 2004-03-18 Network interactive teaching experimental method based on attcking/defending and video pack playing tech

Country Status (1)

Country Link
CN (1) CN100423500C (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100362796C (en) * 2005-11-18 2008-01-16 宁波大学 Interactive network voice broadcasting system
CN100492439C (en) * 2006-01-19 2009-05-27 山东大学 TV experimental remote teaching system based on wideband interconnection network
CN101841424B (en) * 2009-03-18 2012-07-04 中兴通讯股份有限公司 EMS network management system and method based on SOCKS proxy connection
CN102724596B (en) * 2011-03-31 2015-02-18 新奥特(北京)视频技术有限公司 Remote broadcast control method and system thereof
CN104426833A (en) * 2013-08-19 2015-03-18 北大方正集团有限公司 Method and system for realizing teaching communication based on UDP
CN103701810A (en) * 2013-12-26 2014-04-02 蓝盾信息安全技术股份有限公司 Automatic marking system of network attack and defense experiment
CN105554047A (en) * 2014-10-31 2016-05-04 北大方正集团有限公司 Method for monitoring mobile equipment applied to teaching, control equipment, and mobile equipment
CN105811994B (en) * 2016-03-03 2019-12-13 云南大学 Computer data compression processing system
CN107770138B (en) * 2016-08-22 2020-12-25 阿里巴巴集团控股有限公司 Method for specifying IP address, proxy server and client
CN110286835B (en) * 2019-06-21 2022-06-17 济南大学 Interactive intelligent container with intention understanding function
CN111310201B (en) * 2020-01-20 2022-06-07 罗可熙 Digital experiment system and management control method and device thereof

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1400541A (en) * 2002-08-20 2003-03-05 西安交通大学 Multimedia real-time lessons-giving system based on IP web
CN1455372A (en) * 2003-05-29 2003-11-12 上海交通大学 Screen sharing and synchronous recording method based on IP network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1400541A (en) * 2002-08-20 2003-03-05 西安交通大学 Multimedia real-time lessons-giving system based on IP web
CN1455372A (en) * 2003-05-29 2003-11-12 上海交通大学 Screen sharing and synchronous recording method based on IP network

Also Published As

Publication number Publication date
CN1564536A (en) 2005-01-12

Similar Documents

Publication Publication Date Title
CN105681920B (en) A kind of Network teaching method and system with speech identifying function
CN102713848B (en) For using lightweight client to calculate, with virtualization, the method that service is docked by network
CN100423500C (en) Network interactive teaching experimental method based on attcking/defending and video pack playing tech
CN101848214B (en) Random positioning playback method and system based on RDP (remote desktop protocol) audit data
CN1856819B (en) System and method for network transmission of graphical data through a distributed application
CN105405325A (en) Network teaching method and system
CN101980143B (en) Method for simultaneously displaying multiple computer desktops on single physical projector
Stonebraker An overview of the Sequoia 2000 project
US20030184590A1 (en) Client server approach for interactive updates of graphical user interfaces on intranets
CN100452775C (en) Method and system of sharing application programs in instant communication system
CN102741830A (en) Systems and methods for a client-side remote presentation of a multimedia stream
KR20040104515A (en) Method and apparatus for generating graphical and media displays at a client
CN105306861A (en) Online teaching recording and playing method and system
CN105578115A (en) Network teaching method and system with voice assessment function
CN102707994A (en) Method for controlling computer by handheld mobile equipment in local area network
CN101155089A (en) Wireless multimedia real-time learning system and method
CN102223368B (en) System and method capable of realizing operation identification during monitoring of remote desktop protocol (RDP)
CN101827082B (en) Method and device for recording and playing back desktop operating information of user
CN104268739A (en) Method and system for quickly converting enterprise information system into mobile application
CN103188341B (en) Remote management system, remote management device, and remote management method
US20030191860A1 (en) Accelerated collaboration of high frame rate applications
CN114721905A (en) Operation and maintenance data processing method, device, equipment, storage medium and program product
CN106874585A (en) A kind of Power Plant Simulation method for realizing and other effects high-performance B/S issues
CN101834876A (en) Distributed semi-physics simulation system based on Bluetooth, database and UDP protocol and data summarization and distribution method thereof
CN101877707B (en) Xwindow agent and independent window auditing system and method based on XDMCP (X display control protocol)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20081001

Termination date: 20170318

CF01 Termination of patent right due to non-payment of annual fee