An Architecture of Open and Security Internet Information System Yong CAO Caoy100@yahoo.com Computer Network Lab., Department of Computer and System Science, Nankai University, 300071 Gong-yi WU wugy@sun.nankai.edu.cn Graduate Institute of Nankai University, 300071 Abstract As WWW is growing rapidly, it becomes a popular issue in computer world. Especially because of its open architecture, WWW is a best platform for establishing computer application system of wide rang. Today, so many application systems, such as electronic business systems, have been built on WWW environments successfully. The merging of Client/Server database management system (DBMS) and Web information system attracts people to work on it. Many products for DBMS and WWW interconnection are available on the market, but we have to encounter new problems, such as security, certification, performance and generality. So most of present products are not the perfect solutions. In this circumstance, after analyzed and researched these problems deeply, we raise a new four-tire Open & Security Internet Information System (OSIIS) architecture. We defined the functions and processing procedure of every tire in OSIIS. Besides academic research, we designed and implemented a simple Database Information Real-time Publishing System (NK_DIRPS) on Intranet. This simple system is able to transport data between web browsers and back-end database server dynamically. Not only the browser but also the database server can send data to the other side on its own initiative. We believe that the new OSIIS architecture will propel the WWW application and e-business development in the shortly future. Key words: Internet information system, Client/Server DBMS and WWW interconnection, Open Security Internet Information System 1. Overview Since Tim Berners-Lee and his colleges constructed World Wide Web (WWW) in CERN[1], Web technology and its application provide many opportunities to us on Internet field. And millions of Web sites have been established all over the world[2], they bring a new excellent world to us. Today, no one can suspect that WWW is changing our thought and our future. The WWW technology propels our society into a completely span-new world. Actually, WWW architecture comes from the merging of Internet technology and Client/Server method. WWW system includes two parts: information server (Web server) and client system (browser). The client system can execute on most software and hardware platforms, such as PC/Windows, Workstation/Unix, Macintosh/Mac, etc. The browser processes multimedia data and represents them to users. On the server side, a demon, named httpd, is responsible for processing requests that come from client system. At the same time, the Client/Server Database Management System (DBMS) becomes much mature and more perfect. Now, there is a large and powerful technical colony to support the research and development on this field. And plentiful development tools are available on the market. Client/Server DBMS is one of major motivates that embed the data and information into our daily life. In computer developing history, there is an interesting rule that the new concept, new ideas or technical innovation always be started with amalgamation of new technique and elder mature one. This rule preserves the elder achievement and good market, in the mean while it gives powerful energy and strong support to the new developing technology. There are many successful examples about this rule, such as computer generated from computer technique (new) and communication technique (mature) in 1960s. Today, a new innovation and development, which is the WWW-based DBMS on Internet, comes into being. It requires mergence of WWW system, which is springing up energetically now, and Client/Server DBMS. The powerful Client/Server DBMS is able to construct a safe and reliable environment for Internet information applications. Now, many researchers and developers have paid more attention to WWW+DBMS area. There are thousands of solutions and products on Web and Client/Server DBMS interconnection. All these achievements make the market full of vigor and vitality. However, we have to acknowledge that most of popular solutions on Web and DBMS interconnection are compromises. They simply mixed two systems, WWW information system and Client/Server DBMS, into an environment. The architecture is an extension of hybrid systems and it is not a full-scale scheme. Therefore, the performance of this type system is limited and it raises a few new problems, such as data security, operation certification and so on. The new problems will hinder the development of Web-based information system and may freeze the enthusiasm of users. Moreover, most of present solutions and products are designed for special purposes. They need different platforms and special system environments. So under this circumstance, it is very difficult to connect and cooperate with different types of DBMS on WWW. This situation is away from our original goal that we want to establish an open, au pair information environment and different type systems are able to execute harmonically and efficiently. For above reasons, it is necessary to analyze and re-design the present architecture of Internet Information System (IIS). We need create a new architecture for IIS and make it suit to the requests of Web system and DBMS interconnection simultaneously. The new architecture should also consider the intending technical development. By hard working on this field, we raise a new architecture, which is Open and Security Internet Information System (OSIIS) architecture, to resolve interconnection of Web system and Client/Server DBMS. Furthermore, the OSIIS architecture can be used to develop electronic commercial applications on Internet, as we make it a little extension. 2. Traditional Architecture of Internet and Client/Server DBMS Before discuss the OSIIS, let us review the architectures of traditional Internet information system and Client/Server DBMS briefly. Then we will summarize the main characters of them. 2.1. Traditional Internet Information System Architecture Internet was generated 30 years ago, but its actual popularity is just happened in 1990's. And the developing WWW technology is to satisfy the multimedia demands of users. WWW adopts Client/Server architecture, which is Browser/Server mode, as shown in figure 1. Figure 1. The architecture of WWW Two parts compose the whole Web system: client space and server space. On the client space, browser is responsible for managing user's input/output and communicating with Web server through Internet. Browser receives HTML-pages from Web servers and displays them onto user's computer. On the server space, information is stored as static HTML pages on Web server. One process, httpd, is executed to monitor requests from clients and to retrieve data from native web system or from WWW space (external web system). Finally, httpd sends results of retrieving to client system by HTML format. Server side and client side use http protocol to communicate. On the other hand, the Web server has two ways to contact with external system. One is hyperlink, which connects different WWW sites into a vast net; another is the pre-reserved interface such as CGI, which implements web server and non-web system connection. Evidently, the foundation of Browser/Server architecture is static HTML pages. This means that a server response to a client request has no relations with history of previous request and response data[3]. Then when we establish a complicated application on WWW, especially the session-oriented database application, many inconvenient problems will be appeared. The major problems of Web-based DBMS are: ● As the format of data is stored on Web server as static HTML-pages, the updating rate of server information can not be very fast. This specialty is unsuitable to interactive and real-time application. ● Between browser and server, the information is transported as HTML-pages, which is plan ASCII format. So it makes the system lack of security. ● The performance of data management on Web server still remains on file-driven level. It is just similar as early database management level in 1970s. ● Because pays more attention to open feature, the Web system does not provide advanced secure and reliable characters. ● The WWW architecture does not offer credit mechanism, which is very important to electronic business applications on Internet. Therefore, in order to extend new applications on Internet, we have to find proper ways to resolve these problems. 2.2. Traditional Architecture of Client/Server DBMS Database technology emerged in 60s, but it matured in 80s. At the end of 80s, people introduced Client/Server concepts and technique into database field. This made DBMS market more prosperous than before. Because the major platform of traditional Client/Server DBMS is Local Area Network (LAN), so the features and architectures of Client/Server DBMS are all designed to fit LAN environment. As shown in figure 2. Figure 2 Architecture of traditional Client/Server DBMS In traditional Client/Server DBMS architecture, client system initiates transaction requests. The requests are transported to server by special or universal interface, such as CT-lib or ODBC. On the server side, server should first check user's authority and justifies the request's security level; second, it executes relevant operations according with user's demands; finally, server delivers results to client. In this transaction cycle, the data, whatever stores and operates on server or transports between client and server, are all binary formats. For this reason, it guarantees the performances of DBMS, such as management, maintenance and security. On the other hand, we have an optional choice between client and server interface, specialty or generality. This feature gives us a useful measure to make a balance for the generality and efficiency on DBMS. However, as more WWW-based DBMS applications require WAN environment recently, the inborn shortages of traditional Client/Server DBMS become more obviously. There are: ● Fewer flexible features. Most of Client/Server DBMS are designed for special application requirements. In general, different kinds of system have distinct data formats and unlike realized methods. It is a very difficult problem for system administrator to exchange and to move data among different systems. ● First investment is high. The developers have not only to design or to implement server applications, but also to consider client system either. Moreover, the administrators may be dog-tired to rush around client and server sides in order to install or to debug the systems. ● The cost of Upgrade and maintenance are also very high. Although we can upgrade and maintain client system and server system individually, the facts of real applications are not the same. We have to consider the limits and relations between the two parts. So it causes the final work more difficulty than our resume and more expensive than our budget. ● No unified user interface. In order to satisfy the particular requirements, different application systems have different user interfaces. The end users, especially the non-professional users, can hardly learn or be familiar with every kind of system operations. This feature impedes the developing and updating of DBMS. ● Unsuitable to WAN environment. Traditional Client/Server DBMS is usually developed for LAN application, therefore its architecture and design all consider less about WAN and mobile condition. The weakness of this system feature becomes very obviously, when Client/Server DBMS emigrates onto Internet platform directly. The problems concentrate on long delay, unreliable data transport and mobile users, etc. 2.3. The Common Architecture of Internet and Client/Server DBMS Interconnection In order to resolve the shortages of Internet information system, which brought from traditional WWW system and Client/Server DBMS, people have to find a compromise solution to implement world wide information communication and reserve data management. Now, the popular architecture of WWW+DBMS is a three-tire Client/Server mode, shown as figure 3. Figure 3 Architecture of three-tire Client/Server system Actually, this three-tire architecture is extended from traditional Client/Server system. The whole system separates into three parts: presentation tire, function tire and data tire. (1)Presentation Tire (PT) Presentation Tire is the user interface of the whole information system. It is responsible for data exchanging between user and system. The major functions of Presentation Tire are checking the validity of user input and displaying the results that get from backend server. In WWW+DBMS architecture, the Presentation Tire includes two parts, which are browser on fore side and Web server on backside. Browser and Web server use http protocol to communicate. HTML is a data descriptive language that tells browser how to arrange display. In addition, JavaScript, VBScript and CGI program can help Presentation Tire complete advanced functions on Client site. (2)Function Tire (FT) This tire is the core part of the application system. It includes all programs for processing transaction. In other words, except for input/output functions, all other functions belong to this tire. In general, Function Tire is called Application server or middleware. Actually, Function Tire comes from the client part of traditional Client/Server DBMS except for display functions. Through Web gateway, such as CGI, Function Tire connects with Web Server. On the other side, Function Tire connects with Data Tire by special or universal interface. From this interface, Function Tire can access the backend database. Structured Query Language (SQL) is common in use for Function Tire to access database on Data Tire. (3)Data Tire (DT) Data Tire is just the implementation of server part of traditional Client/Server DBMS. It is in charge of data access and database management, especially database security and performance. The main module of Data Tire is one or more database server, such as Sybase® System 11, Oracle® 8i and Microsoft® SQL Server 7.0, etc. We have to accept that this three-tire architecture is a better solution to constitute a hybrid system that mixed WWW information system and Client/Server DBMS together. Three-tire Internet information system succeed in preserving and inheriting achievement from present technology. It let us emigrate Client/Server DBMS onto Internet more quickly and easily. But we have to point out that the three-tire architecture is only a compromise solution. It does not resolve the problems that inherited from WWW system and Client/Server DBMS, especially in performance, certification & security and generality. ● Performance. As shown in figure 3, user's request arrives at Web server in first step. Then through Web gateway, it delivers to Application server or middleware. Finally, it reaches database server. And the operating results will come back to the client system by the opposite direction. Therefore, a successful data operation should pass through so many sub-systems and interfaces. Any delay on any parts of system will effect the whole system performance. In addition, the foundation of Web protocol is stateless, so each request of data access will be looked upon as individual event. Every event needs complete three steps to complete data transport independently. The three steps are creating connection, transferring data, destroying connection. This stateless feature limits the system speed and makes the database access less flexibility. ● Certification & Security. Today, millions of people use Internet to assist their daily lives and thousands of companies plan to do business on Internet. This tide of electronic business makes a great challenge not only to technical experts, but also to every user. Now, when you do business on Internet, you are in the face of a computer, is a machine, but not an active human being. So how we change the traditional credit standard mechanism, which based on face to face mode, into a new one, which based on human to machine mode, it is a very difficult but important problem in front of us. From figure 3, we know that most data exchanging happens among Web server, Application server and database server. But due to WWW system built on an open environment, so the security of this three-tire system is suspicious. Although we can setup a firewall system between Web server and database server to protect the backend data, the firewall system may weaken the system flexibility. In addition, the whole information system is a tight union; every part of system damaging will be a tragedy to the whole system. For an instance, if a "hacker" tampers the homepage of a WWW system, how the whole Internet information system can be executed continuously. Anyway, this headache situation is very harmful to user's economy and his confidence. ● Generality. The Application server or middleware of three-tire Client/Server system is a bridge between Web server and database server, so its character is very important to the whole system performance. In actual application, this part is often implemented by special technique for performance sake. But this performance enhancement is gained by abandoning system generality, which is one of the main purposes of WWW information system From above discussion, we can draw a conclusion that the three-tire Client/Server architecture is just a compromise. It is not perfectly suitable to construct an advanced Internet information system. We have to find another new solution to resolve the present problems and also to leave some leeway for the future developing. Under this circumstance, we raise a new four-tire architecture, which is an Open Security Internet Information System (OSIIS). In this new architecture, our major goal is to resolve security, reliability, generality and performance problems. We confirm that this four-tire system is a better solution for WWW+DBMS. 3. Open Security Internet Information System Architecture As we all know, system security is becoming an essential problem of Internet information system. If we can not resolve it perfectly, it will block the developing step of commercial Internet applications without questions. From last section discussion, the main reliable feature of Internet information system comes from the unfitness of traditional WWW architecture. Between browser and Web server as well as between Web server and DBMS, there are no special safe measures and mechanism to guarantee system security. Furthermore, there are more and more business and service relay on Internet, it need establish a credit mechanism between end-users and service providers so that the commercial process can be monitored and carried out under legal and just condition. Our OSIIS architecture focuses security and certification characteristics as a major goal, so we promote the three-tire Client/Server architecture and introduce a new security & certification tire into it. 3.1. Open Security Internet Information System Overview As bring up a mechanism for security and certification, the whole Internet information system includes for tires, which are Presentation Tire, Function Tire, Security & Certification Tire and Data Manipulate Tire. Shown in figure 4. Figure 4 Architecture of Open Security Internet Information System (1) Presentation Tire The duties of this tire are: ● To present information on client system ● To guarantee the data security between browser and Web server Besides common HTML files transport, we add a security channel between browser and Web server to strengthen the security performance. The data that transported in security channel will be enciphered, and be deciphered at the destination sides of the channel. The security channel is not designed to take effect on all data that transport between browser and Web server, but it only manages and deals with special data appointed by server. On the server side, when it is necessary, the server will generate encryption algorithm for security channel randomly. Then downloads a copy of this algorithm to browser. This algorithm is running as a process on server and as an applet on browser. Between this process and applet, it constructs a security channel. The important data are enciphered/deciphered at both sides. This mechanism of security channel offers a safe communication environment between browser and Web server. It is an extension of HTML and SSL standards. On the other hand, owing to generate and maintain security algorithms on server randomly, the browser side need not involve in complex management procedure, so it makes the browser separate from special servers and particular applications. People can use universal browser to cooperate with any Internet information system. Another advantage of this mechanism is that the security algorithm will be generated on Web server dynamically, so any tracing of encryption will be very hard. Then the Web server becomes safer than before. In addition, the common data will still use HTML format and transport in normal way. Therefore, the performance of browser and Web server will not be effect so much after we apply security channel. (2) Function Tire As the three-tire system, Function Tire is responsible for most application processes. But we redesign it more suitable to secure and universal purposes. Figure 5 shows that this tire has three types of interface. Figure 5 Function Tire Architecture ● ● ● User side interface (USI). It takes charge of receiving user requests and replying the results. This interface can be implement by CGI or Java techniques. Security & Certification Interface (SCI). This interface connects Function Tire and Security & Certification Center (SCC). Universal Data Interface (UDI). It is a universal interface to manage data access of database. The core part of Function Tire is function scheduler. It receives requests from Presentation Tire through CGI or Java program. Then decides which function module of Function Tire will be executed. Before access database server, it will communicate with Security & Certification Center to get encipher/decipher algorithms and to register the data access. After receives the confirmation from SCC, the proper function module will be executed and access data from database server through UDI. Because maturity and compatible reasons, we design UDI by using existing database interface technique, just like JDBC, ODBC and so on. The database-manipulating standard still adopts SQL. (3) Security & Certification Tire This tire is an important role among all transactions of Internet information system. The structure of Security & Certification Tire is shown in figure 6. Figure 6 Security & Certification Tire Architecture From figure 6, we know that SCC connects with Function Tire and Data Manipulate Tire by Security & Certification Interface (SCI). For the safe reason, this interface can be implement by special technique, such as Java program, C++ program, etc. The main elements of SCC are request processing module (RPM), encryption generation module (EGM) and certification module (CM). ● Request Processing Module (RPM) When receives requests from Function Tire or Data Manipulate Tire, it checks their authorities. If they validate, RPM will start Encryption Generation Module or/and Certification Module according with demands. ● Encryption Generation Module (EGM) According to authority of request, EGM will launch different encryption producer and generate distinct level algorithm dynamically. Then transports the algorithm to the requester. ● Certification Module (CM) This module is responsible for certifying and recording the process of transaction. It will record: Transaction date and time, Host name and host ID of attendee, Transaction description and so on. The recorded data are stored in SCC database, and then people can retrieve them when necessary. Before CM starts certification process, it will notice Function Tire and Data Manipulate Tire, first. After both side acknowledge it, then CM registers this transaction and records the data into its database. Certainly, EGM and CM can execute individually. In other word, user can only ask for certification or security service separately. SCC can be implemented by the owner of Internet information system or be provided by third-party organization that has more credit among business. For the performance sake, not every transaction need security & certification services. The Function Tire and Data Manipulate Tire can decide the one who needs it. This strategy gives Internet information system more flexibility and more possible extending room. (4) Date Manipulate Tire The Date Manipulate Tire is evolved from the server side of traditional Client/Server DBMS. From functional aspects, it inherits most advantage features of Client/Server DBMS and gets rich development supports. There are a great number of tools and software available in this field. We just enhance the secure and universal feature of this tire. ● Security We add a new security & certification module (SCM) to deal with the requests of this phase. The module runs on database server as a process. SCM communicates with DBMS by SQL API and exchanges data with SCC through SCI. ● Generality On DBMS, we implement a universal data interface (UDI) to interact with Function Tire using SQL. The standard SQL command is received from UDI and translates into corresponding primitive command to manipulate relevant database server. On the other hand, the operating results will be translated into standard format and delivered to Function Tire through UDI. 3.2. A Typical Transaction Processing on OSIIS After discuss the architecture of four-tire OSIIS, we will illustrate the procedure of a secure transaction on this kind system. As signs in figure 4,(1)-(10)present the sequence of procedures of one total transaction. (1) User obtains HTML pages from Web server and raises a request of data access from browser and then transfers this request to Web server by http protocol. (2) Web server receives the request and checks user authority. If passed, it will classify the level of user's operation. When it is necessary, Web server will generate encryption algorithm according to user's security level. Then downloads the algorithm to browser and executes it on both side. (3) Web server will deliver user's demand to application server. The schedule program will select proper function codes and executes it on application server. (4) The function codes complete appointed operation and judges whether to access database or not. If need access database, it notices scheduler and activates data exchanging module. (5) Before actual data transport, application server will apply for proper services through SCI. (6) After received request, SCC checks the validity of it. Then executes suitable service programs. (7) SCC informs DBMS that a requirement for database access is coming. If DBMS accepts this requirement, then goes to step (8), otherwise SCC will tell application server that this access request is rejected. (8) SCC delivers encryption algorithm and certification status to application server and database server, waits for both side agreements again. After they all accept it, SCC will record this transaction into its database. (9) Application server and database server uses UDI to exchange data. And they use the algorithm, which got from SCC, encipher important data before sending. The application server deciphers the data that obtained from DBMS and delivers them to Web server. (10) Web server uses the algorithm, which generated in step(2), to encipher the data again. Then sends these encrypted data to browser through security channel. The deciphering applet of browser will translate the data and present them on user's screen. On Internet platform, step(1)-(10)build up a secure transaction processing between browser and database server. During one transaction, browser can propose several requests of database access. It need not establish multiple connections for each access. After the transaction ended, the Browser, Web server, Application server and Database server will all abandon the relevant encryption algorithms, which they used in this transaction. 4. Implementation of A Simple Web Database Information Publish System Based on our research work, we developed an interactive database information publish system on WWW. In this system, we adopt parts of the architecture that we discussed above. We used oriented object technique and modularization skill to develop the system. And selected Java to write the core module of system. 4.1. System Elements The whole system is divided into three modules, they are database server extension module, client extension module and real-time information publisher module. (1) Database Server Extension Module In the system, we designed a push-like function that can dynamically push the changed data from database server to client side. In order to implement this feature, we add an extension module on database side. This module is responsible for capturing the data refreshing actions and sending the changed data to publish agent module (D_Server). We use trigger and extend store procedure techniques to complete this duty. (2) Client Extension Module (D_Watcher) Accompany with common HTML files, D_Watcher will be downloaded to browser and execute on it. The duties of D_Watcher are: ● Receive user input ● Deliver user data to D_Server ● Use socket to communicate with D_Server ● Receive real-time data from D_Server (3) Real-time Information Publisher Module (D_Server) D_server is the core element. On database side, it communicates with database extension module, gains the changed data on time. On the client side, D_Server receives the request from D_Watcher, maintains the simultaneous connections of client. After D_Server received data from DBMS, it will distribute them among multiple connections according to user's demands. 4.2. Development and Execution Environments When selected the developing environment, we consider more about the irrelevant feature. And for the execution platform, we pay more attention on universal and mainstream characteristics. For performance reasons, we use a few special-programming tools, which releases with DBMS, to develop the real system. The major configurations of developing environment are: ● Database Extension Module, developed by extended store procedure of Microsoft® SQL Server. Use Microsoft® VC++ 4.2 and BackOffice® SDK (Open Data Service) to write the program. ● D_Server and D_Watcher, developed by Java technique. D_Server user Java application mode, and D_Watcher adopt Java applet mode. The main execution environment is: ● Server O.S.: Windows® NT 4.0 ● DBMS: Microsoft® SQL Server ● Web server: Microsoft® Internet Information Server3.0 ● Web browser: Any Internet browser that supports Java is available, such as Microsoft® IE 4.0 and Netscape® Communicator 4.04. By using this simple system, we implement a stock publishing application on WWW, shown as figure 7. Figure 7 the Running D_Watcher 5. Conclusion Based on traditional Client/Server DBMS and WWW architecture, we raised a complete new four-tire OSIIS architecture. In this system, we absorb advantages from traditional structures and add a new security solution as an individual tire into it. This OSIIS architecture will provide a foundation for electronic business on Internet in the future. But we have to accept that our work is just beginning. There are so many problems need be solved in this field, such as: ● Specific standards and protocols for OSIIS in details ● ● ● ● How to enhance the system performance Development method and implementation tools for OSIIS How to classify the encryption algorithm and generate them dynamically Research on laws and rules that related with transaction certification Anyway, the OSIIS provides a good solution for establishing a free, safe, efficient, open and regular network environment. We may find more opportunities and more challenges from it. Reference: 1. Berners-Lee T., Cailliau R., Luotonen A., Frystyk Nielsen H. And Secret A., “The World-wide Web”, Communications of the ACM, Vol. 37 No.8, August 1994 2. Tim Bray, "Measuring the Web", http://www5conf.inria.fr/fich_html/papers/P9/Overview.html 3. Nick N. Duan, “Distributed Database Access in a Corporate Environment Using Java”, http://www5conf.inria.fr/fich_html/papers/P23/Overview.html 4. Stephen E. Dossick and Gail E. Kaiser, “WWW Access to Legacy Client/Server Applications”, http://www5conf.inria.fr/fich_html/papers/P4/Overview.html 5. Stathes P., Drakoulis I., “A Generic Framework for the deployment of structured databases on the World Wide Web”, http://www5conf.inria.fr/fich_html/papers/P22/Overview.html 6. Jose M. Martinez, Francisco Moran, “Catalog: a WWW Gateway for DBMSs”, NETLIB97 7. Richard., Johann., “Relational Databases and the World Wide Web: Automatic Generation of Hypertext based on Reverse-engineered Meta Information”, NETLIB97 8. Robert., Albert., Daniel., “Comprehensive System to Develop Secure Web Accessible Databases”, http://aace.virginia.edu/aace/conf/webnet/html/352.htm Vitae: ● Yong CAO, got master degree of engineering from Depart. of Computer and System Sciences (CSS) of Nankai University in 1995. Major in computer network and information system. Now, he is working at Computer Network Laboratory of CSS in Nankai University. His most interesting research fields are: Internet/Intranet information system, WWW technology and multimedia network, electronic business, computer network management, intelligent LAN, computer security, etc. Address: Computer Network Lab., Department of Computer and System Sciences, Nankai University, Tianjin, P.R. China, 300071. Telephone: 86-022-23508917. Email: caoy100@yahoo.com ● Gong-yi Wu, is vice-dean of Graduate Institute of Nankai University and a professor of Dept. of Computer and System Sciences in the same university. His most interesting research fields are: computer network and information system, computer communication, Internet/Intranet firewall, computer network management, intelligent LAN, network education and remote training. Address: Graduate Institute of Nankai University, 300071. Telephone: 86-022-23506051. Email: wugy@sun.nankai.edu.cn.