Difference between revisions of "Remote Observing Manual"
Line 1: | Line 1: | ||
This manual documents the remote observing operations of Shared Skies. It covers the basic elements of all of the [[Telescopes |telescopes]] available remotely, and provides links to information about robotic observing and data archives. Other shorter pages are available as well. Please check the [[Special:AllPages|index]] for those. | This manual documents the remote observing operations of Shared Skies. It covers the basic elements of all of the [[Telescopes |telescopes]] available remotely, and provides links to information about robotic observing and data archives. Other shorter pages are available as well. Please check the [[Special:AllPages|index]] for those. | ||
== Overview == | |||
'''System Architecture''' | |||
Each telescope, its instruments, and its enclosure are controlled by a single computer system connected to the hardware. For different instruments there are other networked components for power control and live video. The telescope operator and the observers do not have to be on site because these components are accessible remotely, either through the Internet by secure login and encrypted transmission, or through servers that limit functionality while insuring safe reliable, largely robotic, operation. |
Revision as of 05:45, 5 June 2010
This manual documents the remote observing operations of Shared Skies. It covers the basic elements of all of the telescopes available remotely, and provides links to information about robotic observing and data archives. Other shorter pages are available as well. Please check the index for those.
Overview
System Architecture
Each telescope, its instruments, and its enclosure are controlled by a single computer system connected to the hardware. For different instruments there are other networked components for power control and live video. The telescope operator and the observers do not have to be on site because these components are accessible remotely, either through the Internet by secure login and encrypted transmission, or through servers that limit functionality while insuring safe reliable, largely robotic, operation.