The CAN-8 system is designed to operate in a client-server environment.
The server software typically runs on Windows XP (32 and 64 bit), Windows 2003 server, Windows 2008 server, Vista (32 and 64 bit), Windows7 (32 and 64 bit) using the Intel based platform.
The client software may run on Windows 2000, Windows XP (32 and 64 bit), Vista (32 and 64 bit), or Windows7 (32 and 64 bit).
In order to operate, both the client and server machines must have TCP/IP loaded and properly configured.
The server system may be placed behind a firewall if UDP ports 17180-17190 are left open to access the server or if the firewall is configured to redirect these packets from it's outside IP address to the CAN-8 server (NAT).
The CAN-8 server process provides end-to-end security between client stations and the server. This includes login authentication, user management and enforcement of single logins. There is no need to have open file shares on the machine acting as a server to allow the CAN-8 client to store student work. Likewise it is not necessary to run web-server software as the CAN-8 server software is entirely self-contained and communicates with the CAN-8 client stations using its own protocol.
The CAN-8 server process may run either as a service process or an application on the server. The program does not display a window so there is no information to observe on the server itself. All information regarding users and operation of the system is accessed via the client station.
It is not recommended that the CAN-8 server run alongside other applications on the server machine in order to maintain good realtime response to client requests. Likewise running in a virtualized environment is strongly discouraged as the performance penalty incurred due to frequent switching between hosted operating systems can degrade the response time of CAN-8 significantly.
The server hardware should have at least 4GBytes of physical RAM as the CAN-8 server software will attempt to use the bulk of it for its internal cache as needed to maintain a high performance. Virtualized or paged storage is not adequate since it will actually reduce the performance of the system as compared to not having the physical resource itself.
This section is intended for any person responsible of maintaining the system hardware and installation.
The CAN-8 system communicates with the server using the IP protocol. This is the native protocol of the Internet. In the simplest case of a network, the system requires one computer that is designated as the server and another that is designated as the client. Each computer must have a unique IP address. The IP address or host name of the server must be static. After the initial login from the client station, a registry key pointing to the server's IP address or DNS name will be automatically created.
The server and client communicate using UDP (User Datagram Protocol) packets. This connectionless protocol is a subset of IP allowing the server and client to perform their own error handling. In order to communicate, the following ports must be available on the server for the client to attach to:
UDP Ports 17180 to 17190
In situations where the network contains firewalls, or other security measures, the firewall settings must allow passing of packets on these ports. This includes workstations, network devices and servers which must have their local firewall configured to allow traffic on these ports.
The system will work with most network address translation (NAT) schemes and has been tested with them. In most cases, proxy (true proxy) servers will not work unless they simulate NAT in their operation.
In order to run in a satisfactory manner, a minimum required bandwidth must be available between the server and client.
This averages at 40 kbits/sec and is at its highest 88 kbits/sec .
If there are more stations than one, then the total maximum required bandwidth would be 88 kbits/sec times the number of stations:
1 station = between 40 and 88 kbits/sec
4 stations = between 160 and 352 kbits/sec
30 stations = between 1200 and 2640 kbits/sec
= between 150 and 330 KBytes/sec.
This section is intended for any person responsible of maintaining the Server's hardware and installation. It describes various tasks that should periodically be done to ensure smooth operation of the system.
The CAN-8 system consists of regular files that are typically stored under the \SVSYS\... directory on one of the server disk drives. While the server program is running, various files throughout this directory will be open for writing and reading. For backup purposes, the files may be read at any time as database and student tracking files are typically appended to and not modified in place.
The backup procedure used must be capable of reading files that are currently open for writing by another process. Also, the backup program must not ever open any file with write access as it will potentially prevent the server program from being able to write to the same file at the same time.
It is recommended that a full system backup be used rather than an incremental backup due to the large number of files that are modified during the operation of the system. Each incremental backup may be as large as the full system backup in this case.
As a resource, the disk space on the server will be consumed by the system over a period of time. The exact amount consumed will depend on the number of students performing recordings, the length of the recordings and the amount of static course material that has been recorded on the server. In most cases the student recordings will far exceed the space used by the course material, as well, the amount of course material does not increase constantly, where as the student recordings may do so.
The approximate disk space used by students for recordings may be calculated as follows for the purposes of example:
Average minutes spent per student recording per session
Number of students using system per day
Total minutes of recording time per day
If you take this total and divide by 60 minutes to the hour and then multiply the number of hours by 15 MBytes you will have the daily total storage requirements for the system.
(30 minutes per session recorded) * (150 students per day) = 450 minutes per day
450 minutes per day / 60 minutes per hour = 7 hrs per day
7 hrs per day * 15 MBytes per hour = 105 MBytes per day
Assuming classes 5 days a week = 525 MBytes per week
Per month = 2.1 GBytes per month
Per 4 month term = 8.4 GBytes
As you can see, the amount of disk storage for students climbs rapidly.
In order to combat the eventual filling of the entire server disk, the instructors should be advised to remove students from the lesson tracker screens as soon as possible after they are finished scoring the work or have gone over it in class.
When the instructor deletes items from the tracker, the data is placed in a temporary recovery area where it may be archived or deleted by the system administrator. This area is to be found on the server in the directory \SVSYS\DELETED assuming the file directory layout of a standard installation.
After instructors have deleted the data from the Tracker screens, this directory may be deleted by the administrator to free up the disk space used by the student responses. This directory may be removed while the server is running.
The functions available to refresh the system are accessed from the client software, for users with SYSTEM SUPERVISOR's privileges.
At the end of each term or year, it is sometimes desirable to remove all the users and their recordings from the system.
There are two tools available for that end. Both methods rely on using the REFRESH option via an Import Registration File. The two types have different effects:
This option removes all students and their recorded data from the system but leaves instructors, and classes intact. This option is useful between terms for when it is not desired to re-create instructors or classes.
Step by step instructions on how to use the REFRESH STUDENTS function can be found in the System Tools section of this manual.
This option removes all students, classes, assignments, and instructors and all users' recorded data. The MASTER user is remove and re-created with the default password of PWORD. This option is useful at year-ends when instructors and class assignments will change. This option also has the side benefit cleaning up the users database file and re-compacting it.
Step by step instructions on how to use the REFRESH ALL function can be found in the System Tools section of this manual.
In both of the above cases, the \SVSYS\DELETED directory should be removed to free the disk space that is used by student responses. The system will automatically re-create a DELETED directory on its own, and when necessary.
Do not attempt to clean up the system or recover disk space by deleting files or folders from the CAN-8 server directory (except the DELETED directory mentioned above). This would result in a corrupted file system and impact the software's behaviour.
The CAN-8 server process may run as an application or as a service on the machine that is being used as the server.
In this case it is generally automatically started when the server is started or when the administrator user signs on. In some cases, it may be required to stop the server process and then re-start it.
These cases are:
In order to shut the server process down if it is running as a service (does not show in taskbar), the following steps are required:
For information on how to install CAN-8 as a service, please contact your CAN-8 support team.
If the server process is running as an application (does appear on the taskbar), then use the following steps:
You may want to make sure there is no instance of the CAN-8 server running on that machine, in which case you can open the task manager and check in the process list that there is no ntserve.exe process listed.
Once stopped the system may safely be modified. Modifying the system files with the server process running may result in damaged files.
To restart the server process if it is a service, these steps should be followed:
In the case that the server application is started on the login of the administrator user, it may be simply re-started by double clicking on the CAN-8 icon on the desktop.
While operating the system tracks various internal parameters in a file called SERVER.LOG that is created in the same directory as the NTSERVE.EXE program. This file can be examined to monitor the system operation. This file must not be opened for write access while the NTSERVE program is running as it will cause the NTSERVE program to wait until exclusive write access is available.
This file is updated approximately every 10 minutes when the system is idle and more often during periods of heavy use.
It is not advisable to delete this file indiscriminately as it is often needed after a problem has been encountered and if it has been recently deleted it will not contain the information required to diagnose the problem. If problems are encountered with the operation of the CAN-8 server this file may be compressed using WinZIP or other programs and sent to Sounds Virtual for analysis.
Both .avi and .mpg video files may be imported into lessons authored in EAASy II. Only .avi files display the sound file at the bottom of the student screen. The other choices, .mpg, and .mpeg, do not appear on the selection box but may be accessed by typing the file name and extension into the file selection box directly.
In general, when video is digitized into .avi or .mpg formats, the video clip is compressed by a particular video compression codec that may be associated with the video driver of the video card in the computer. To play that video clip on a client workstation, the appropriate codec must reside on the client computer.
The easiest way to ensure compatibility is to digitize or recompress files using a codec that resides on the client computers.
To confirm which codecs reside on a computer, look under Settings/Multimedia/Devices/Video Compression Codecs. A list will appear including items such as "Indeo video R.32 by Intel". We cannot recommend particular codecs, although using ones produced by large companies such as Intel is probably safest.
The next step is to digitize or recompress the video clips to use a codec you have found to be available on all of the client machines. Each video digitizing software program is slightly different, so it is not possible to provide detailed instructions about how to digitize or recompress video clips. Consult the documentation for your digitizing software and determine how to set the format to match the codec which you know exists on client machines.
In CAN-8, sound, text and image files are part of the lessons in which they appear. The author simply imports these elements into the lesson while creating the lesson. These components of the lesson are then available to anyone accessing the lesson.
This is not the case for video. Video clips are only linked into lessons and not directly imported.
It is therefore important that the link to the video be true on all the client workstations that will try to access it.
There are 3 options to store videos:
Video compressed using MPEG 1 or 2 may have its compression rate adjusted such that the quality of the video is sacrificed to reduce the bandwidth required to transfer it. What follows is an analysis of bandwidth required based on our own experience with compressed video.
MPEG-1 was designed to use a standard frame size of 352x240 (SIF dimension) and in most cases delivers good quality video (and audio) at a rate of 64 KBytes/sec.
MPEG-1 may use other frame sizes, the data rate will vary when the frame size and also the frame rate is changed. The maximum "nominal" data rate for MPEG-1 is 115 KBytes/sec, this may be used to calculate maximum bandwidth requirements.
|30 Stations * 115 KBytes/sec(peak) = 3.4 MBytes/sec (peak)|
|For average video:|
|30 Stations * 64 KBytes/sec = 1.9 MBytes/sec|
This data rate is well within the limits of a network running at 100 Mbits/sec (10 MBytes/sec).
The MPEG-2 standard is in many ways similar to MPEG-1.
The primary motivation behind MPEG-2 was to have a standard that is more practical to edit in such systems as non-linear video editing. MPEG-2 also increases the quality of the video slightly by allowing a greater number of bits of quantization for DC components along with more flexibility in the encoding scheme.
This said, the data rates for MPEG-2 tend to be higher for similar frame sizes and rates than for MPEG-1. The benefit in the lab situation is a slight increase in the quality of the video.
Some sample data rates for MPEG-2 are calculated below using a frame size of 352 X 480 (Half Horizontal CCIR 601 displays as 352 X 240) and frame rate of 24 fps.
The difference in video quality at the stations may not be noticed by most viewers, especially if the source material is a VHS tape.
|30 Stations * 200 KBytes/sec(peak) = 6 MBytes/sec (peak)|
|Average rate using 352 x 240 frame size:|
|30 Stations * 80 KBytes/sec = 2.4 MBytes/sec|
The average data rate is within the limits for 100 bits/sec ethernet but the peak rate may exceed it. Typical limits for ethernet are at approximately 30-40% of the bit rate (ie: 3-4 MBytes/sec).
In comparison, the data rates for the audio used by the CAN-8 system are very small. Our system uses our own format of compression that is done in real-time at the station when audio is recorded and is also decompressed when played back. The audio data transferred by the CAN-8 system is always in compressed form on the network.
The average data rate for the audio in compressed form is 6 KBytes/sec.
|30 Stations * 6 KBytes/sec = 240 KBytes/sec|
Since each station may play and record at the same time, the peak rate would be double this number of 480 KBytes/sec. In most cases the students are not playing and recording at the same time.
This description will assume that the system has been installed in the standard way and the drive and directory that contains the entire server based system is C:\SVSYS\ with the client side executables elsewhere.
There are two basic components to the directory structure of the system:
Each will be described separately.
All system files are in Binary format and no attempt should be made to edit these files with any text based editor as it will corrupt them beyond repair.
Any of the files described could be in use by the server at any time. If files are being copied or moved around, it is required that the NTSERVE program be stopped before doing so.
The following files are in the root of the system install directory. These files will be present on all systems.
|File or Directory name||Function|
|C:\SVSYS||Base System Directory|
|C:\SVSYS\NTSVTASK.EXE||Server Service Task (creates reports, etc)|
|C:\SVSYS\NTCHECK.EXE||Installation test file.|
|C:\SVSYS\SERVER.LOG||Server log (created by server, may not exist)|
|C:\SVSYS\ID\||Contains information about menu/registration|
|C:\SVSYS\SVI\||Default directory for creation of lessons|
|C:\SVSYS\DELETED\||Contains deleted data|
The following is the contents of the ID subdirectory.
The files in the ID subdirectory contain all user registration information, the menu, classes, assignments, global keyboards, attributes, and temporary files used for reports.
This section is for information purpose only. These files should never be altered, edited or deleted, unless instructed to do so by Sounds Virtual technicians.
|File or Directory name||Function|
|USERS.DAT||System user database. Contains information about all users of the system.|
|MAIN.DAT||Menu file. Contains entire menu structure as seen by all users.|
|Backup copy of MAIN.DAT as a result of editing the menus.
There may be a total of 5 backups each in numeric order with the highest numbered one being the oldest one.These files may not all exist at any given time.
|ATTRIB.DAT||System attributes. Maps attribute letters to names.|
|LOG.DAT||User activity log. All user activity regarding selections made from menus and the time spent are recorded in this file.|
|LICENSE.DAT||Connection License Information- Unique to your site|
|CHECK.DAT|| May not be present in your system. Used to manage encrypted courseware or temporary licenses.
This file should never be restored to an earlier date or to its original state, moved, edited in any way. This file should not be included in the system backup.
|DELSNLOG.DAT||Record of users deleted from lesson trackers and placed in the ..\DELETED directory.|
|COURSES\||Location to store course authorization files provided by courseware vendors.|
|CLASS\||Directory of information about classes.|
|Each class created gets a file numbered from 1 to 1023. There may be any number of files in this directory. Files in the CLASS directory should not be modified or removed as they have linkages to the USERS.DAT file, and assignments.|
|ASSIGN\||Directory of assignments.|
|ASSIGN\S2.DAT||Assignment for Student number 2|
|ASSIGN\C5.DAT||Assignment for Class number 5
There may be as many files as there are assignments in this directory.
|TMP\||Directory contains temporary files.
This directory does not have to be backed up
|TMP\S00001.DAT||Temp file for user number 1|
|TMP\S03423.DAT||Temp file for user number 3423
There may be any number of files in this directory.
|GLOBAL\||Directory contains default system keyboards for planner.|
|GLOBAL\KBD001.DAT||Default keyboard 1|
|GLOBAL\KBD002.DAT||Default keyboard 2|
|images/||Directory of background images used for the menu|
|images/V001.DAT||Images are stored in CAN-8 lesson format.|
Unless specified by the MASTER when creating menus, the lesson directories are created by default in the SVI\ directory. Each lesson gets its own directory (including Babilon) and the following files are then created by either course authors or students using the lesson.
|File or Directory name||Function|
|PLAN.DAT||The lesson plan, created by the planner.|
|LOG.DAT||Lesson user log, created by the planner, appended by the tracker and users.|
|V001.DAT||Recorded lesson item from planner. Each Vxxx.DAT file contains the contents of one lesson item from the planner. These files do NOT map to the numbers of the planner cells. The files may be numbered from V001.DAT to V255.DAT.|
|KBD001.DAT||Planner defined keyboard map.|
|PLAN.001||Backup PLAN.DAT file. Created when planner is edited.|
|USERS\||Directory for users responses.|
|USERS\S02345\||Directory containing responses for user number 2345. Each user that makes responses in the lesson gets a directory created. There may be any number of these directories.|
|USERS\S02345\R001.DAT|| Response file number 1 for student 2345.
There may be any number of response files.
|USERS\S02345\I001.DAT|| Instruction (message) file number 1 for student 2345.
There may be any number of instruction files.
|USERS\S02345\FILL.DAT||File containing information about fill in the blank questions. This file may be 0 byte in length.|
The deleted directory contains a series of subdirectories that contain responses that were recorded for students that have been deleted from the tracker screens or from the system in general.
These files may be backed up for archival purposes if desired.
To free up disk space on the server, these files may be deleted at any time. The server does not have to be stopped to delete these files.
If tracker data is deleted by accident, user data may be recovered if the corresponding files are still present in the DELETED folder. The Deleted Data Recovery process requires a utility provided upon request by Sounds Virtual.
To provide control over where licensed connections to CAN-8 servers originate from, an access control system has been implemented.
The access controls allow the server administrator to allocate a specific number of licenses to a range of IP addresses. In this way, the server administrator may reserve a number of licenses for use in a classroom thus preventing others from outside the classroom from using them.
To setup the access controls, the server administrator must create a text file called ACCESS.CFG in the SVSYS\ID directory on the server. The contents of this file are as follows.
The form is as follows:
[starting IP address][whitespace][ending IP address][whitespace][number]
The fields are as follows:
|whitespace||One or more space characters|
|starting IP address||First IP address (inclusive) of the range|
|ending IP address||Last IP address (inclusive) of the range|
|number||Number of licenses to allocate to the range|
A typical line would look like this:
|10.0.0.1 10.0.0.250 10|
10.0.0.1 10.0.0.250 10
In this case, the server is capable of 40 licensed connections. Ten of
those addresses are reserved for the range of IP address 10.0.0.1 to
10.0.0.250. You will note that there are a possible 250 IP addresses
that may use up to 10 connections. This does not mean that only 10
users may sign on from those addresses, but that a MINIMUM of 10 users
may ALWAYS sign on from those addresses. If users attempt to sign on
from a reserved range that has exceeded its allocation of addresses,
then remaining licenses are allocated from the unreserved pool (in this
case 40 - 10 = 30 licenses). Thus users are not prevented from signing
on in the reserved range, only that a minimum are guaranteed to sign on.
Lets consider a more realistic and complex example:
10.0.0.1 10.0.0.250 10
10.0.1.0 10.0.1.250 10
172.16.32.1 172.16.32.250 10
In this case, three ranges are reserved, each having ten licenses allocated to them. So this means that a minimum of 10 users may sign on to the server from each of the ranges. The remaining number of licenses from the total is five. These five may be used from any IP address including addresses within the range of allocated addresses.
form adds time and day restrictions so that the
CAN-8 server may automatically create reservations depending on
the day and during a defined time interval.
The form is as follows:
[first IP][WS][last IP][WS][# res][WS][day][WS][start time][WS][end time]
|[WS]||- One or more space characters|
|[first IP]||- First IP address in range|
|[last IP]||- Last IP address in range|
|[# res]||- Number of licenses reserved for this range|
|[day]|| - Day of week for this reservation where
|[start time]||- Time (24 hr format) for this reservation to come into effect|
|[end time]||- Time (24 hr format) at which this reservation no longer applies|
10.0.0.10 10.0.0.50 10 0 1800 2400
10.0.0.10 10.0.0.50 10 1 0001 0900
In the above example, 10 licenses are reserved for the specified IP range from sunday 6PM to monday 9AM
Lines with errors will be ignored by the server and a record of the error will be placed in the SERVER.LOG file at start up.
The file is only read once during server startup, so in order to have changes to the ACCESS.CFG file take effect, the NTSERVE program must be stopped and then re-started.
CAN-8 can be installed and run locally on the workstations, or installed and run from a network share.
The SVSETUP.EXE file delivered is meant for a generic installation of the CAN-8 32 bit client software. Default values are used and cannot be changed during the installation.
To create a pre-configured customized self-install file for your site, see the section create a customized installation file.
Running the SVETUP.EXE file will uninstall all previous CAN-8 versions on that machine.
Your site may need to distribute the CAN-8 client to remote users, or may want to set the server information (locked or hidden), without having to edit the registry manually.
The same SVSETUP.EXE file can be run with the /CUSTOM parameter to create a new customized self-install file, which can then be distributed or installed locally.
When customizing the svsetup, you only change the registry keys created during the installation from their default value to the one you specified.
The Document Docpath value does not change the installation path of the manual. Instead, it creates a registry key that indicates to the CAN-8 client that the online manual should be accessed not from its default path but from the specified one. The manual is always installed in the same folder as the software.
If you change the default documentation path, you will have to manually place a copy of the manual in the path you specified in the Docpath Documentation field.
You may need to create several customized self-install files (to distribute on your LAN or remotely for example). Before creating a second Custom file, rename the first one or move it to a different directory to prevent it from being replaced by the newer one, then start the above procedure again.
You CANNOT create a self-install file from a SVSETUP-CUSTOM.EXE. You must use the original SVSETUP.EXE provided.
The SVSETUP-CUSTOM.EXE file cannot be edited. If the information included has changed, you must create a new /CUSTOM file.
To perform a silent install:
To uninstall the client software
This process will uninstall the software, the desktop icon and the registry keys created during the installation.
The first time the client is run on a workstation, a registry key structure that includes several subkeys is created.
These keys and subkeys dictate the behaviour of the system and should never be edited nor deleted, (unless advised by a Sounds Virtual technician) as doing so will result in software misbehaviour.
Windows group policy settings may prevent regular users from writing to the registry. Therefore it is necessary that the software be initially run by a user with the appropriate rights on the machine for the Registry key structure to be created.
However, signing in as administrator is not sufficient. The software also has to be run as administrator at installation time. (right click on the icon, and then select run as administrator. This will create the appropriate key in HKEY_LOCAL_MACHINE. If the software in run by someone with administrative rights but is not run as administrator, the key will instead be created in HKEY_CURRENT_USER and will therefore not be accessible to other users.
If the lab stations are being imaged, the software will have to be run once with full Write privileges on the original disk before the image is created.
If the lab stations are not being imaged, the software will have to be run once with with full Write privileges (administrator or other) on each workstation.
This also applies after an update to a more recent version.
The structure of the CAN-8 registry keys is as follows:
|All windows 32 bit Operating Systems :||
|All Windows 64 bit Operating Systems:||
Where [date] is the version date of the client installed. A new [date] key is automatically created every time a more recent version is run.
Several registry values can be added to this [date] key to modify the system's default behaviour.
These values should be entered in the folder with the most recent date. (or currently installed version). When a newer version is installed, the system will automatically copy the registry values from the previous version's [date] key. It will not copy any value from any other key than the LAST [date].
Extreme care should be taken when editing the System Registry
The values below are the same for 32 bit and 64 bit OS.
|Value name||Value type||Value data||Description|
|KeepAlive||REG_DWORD||Number between 4 and 45|| Represents the time interval in seconds in which the CAN-8 client sends Keepalive packets to the CAN-8 server to keep firewall ports opened.
Firewalls settings can close the UDP ports if it detects inactivity on the UDP ports for a set number of seconds (i.e.: 30s), thus disconnecting the client station from the server. Setting this value to a lesser number than the firewall timeout settings will keep the ports open
|ServerDefault||REG_SZ||Server's IP address or DNS name||Sets the default server name that will always appear in the server field of the login screen when the CAN-8 program is started. If this value is not set, the server field will by default show the name or IP of the last server accessed. This value still allows the user to change the server's info in the login screen.|
|ServerLock||REG_DWORD||0, 1 or 2||
NOTE: The ServerDefault Value must be created before this value otherwise the following message will appear when signing on:
|Admin||REG_DWORD||1||allows the use of ADMIN in place of MASTER to login.|
|MediaPlayer||REG_SZ||File path of executable to use as the media player.||If not set, the system default media player is used to render any media files accessed by the CAN-8 menu.|
|Browser||REG_SZ||File path of executable to use as the browser.||If not set, the system default browser is used.|
To help manage the licenses used and avoid wasting some in workstations left unattended, an Inactivity Timeout period can be set in the user profile. This will automatically free the license after a period ranging from 15 mn to 3hours and 45 mn:
Licenses liberated via Inactivity Timeout are placed back in the license pool they belong to.
Back to top of page