A CROSS PLATFORM REMOTE DESKTOP CONNECTION SUITE A.V.D.S.S.BHADRI RAJU D.RAMESH BABU U.JAYASREE G.NANIBABU.

Slides:



Advertisements
Similar presentations
--- IT Acumens. COMIT Acumens. COM SNMP Project. AIM The aim of our project is to monitor and manage the performance of a network. The aim of our project.
Advertisements

Enabling Secure Internet Access with ISA Server
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
X Window JianJing Cao (ID #98284). Content Introduction X Window System Function Window Principle How X Window Works Security.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Ferry Astika Saputra Workshop Administrasi Jaringan TELNET & SSH.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Remote Access Network Management Kelly Given Allison Traina.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Remote Login: TELNET and
Middleware Technologies compiled by: Thomas M. Cosley.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Authentication Center for SDP Federation
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
WNT Client/Server SDK Tony Vaccaro CS699 Project Presentation.
Distributed Systems: Client/Server Computing
Remote Networking Architectures
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
S6C12 - AAA AAA Facts. AAA Defined Authentication, Authorization, and Accounting Central Management of AAA –Information in a single, centralized, secure.
1 Enabling Secure Internet Access with ISA Server.
Client – Server Architecture A Basic Introduction Kathleen R. Murray, Ph.D. May 2002.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
VNC VNC demo Windows  TightVNC  ajklinux1.uncc.edu Ubuntu  Gtk VNC Viewer.
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
1IETF 63, Remote UI BoF WiDeX Problem Statement Dean Willis Vlad Stirbu RUI BoF, IETF 63, Paris August 2 nd, 2005.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
COT 4600 Operating Systems Fall 2009 Dan C. Marinescu Office: HEC 439 B Office hours: Tu-Th 3:00-4:00 PM.
Point-to-Point Tunneling Protocol [PPTP] Team: Invincibles Deepak Tripathi Habibeh Deyhim Karthikeyan Gopal Satish Madiraju Tusshar RakeshNLN.
BASS Application Sharing System Omer Boyaci September 10,
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
VNC
A Study of Wireless Virtual Network Computing Kiran Erra.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
SEMINOR. INTRODUCTION 1. Middleware is connectivity software that provides a mechanism for processes to interact with other processes running on multiple.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
X-WindowsP.K.K.Thambi The X Window System Module 5.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
TELNET 1.TELNET 2.SSH. TELNET  TELNET is an abbreviation for TErminaL NETwork.  It is the standard TCP/IP protocol for virtual terminal service as proposed.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
Client – Server Architecture A Basic Introduction 1.
Ch26 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
IT Automation: The Technology Behind Managed Services Wes Powell, Information Technology Consultant.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
COSC 432 Shi Li 12/8/2008. File Transfer Protocol (FTP) Used to transfer files and data between computers via internet Defined as RFC959 Developed in.
Port Based Network Access Control
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
Application and Desktop Sharing
Virtual Network Computing
A Study of Wireless Virtual Network Computing
PPP – Point to Point Protocol
FTP - File Transfer Protocol
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 3: Windows7 Part 4.
Working at a Small-to-Medium Business or ISP – Chapter 7
Remote Login: Telnet Objectives Chapter 18
Working at a Small-to-Medium Business or ISP – Chapter 7
Level 3 Extended Diploma Unit 13 Computer Systems Architecture
Presentation transcript:

A CROSS PLATFORM REMOTE DESKTOP CONNECTION SUITE A.V.D.S.S.BHADRI RAJU D.RAMESH BABU U.JAYASREE G.NANIBABU

Connectiva :: An Introduction  Aimed at providing complete digital control over a remote computer.  Cross-platform in nature, allowing connection between Linux and Windows workstations of the same kind.  The remote machine can be accessed and worked on just like any other local machine.  Based on Client-Server Architecture.  Employs the thin-client concept, decreasing the load on the Client machine.  Inspired from Remote Desktop Connection for Windows and VNC for Linux.

Connectiva :: Objectives and Specifications  Cross-platform functionality  Proper and secure authentication mechanism  Connectiva Communication Protocol (CCP)  Capturing and emulation of Keyboard and Mouse Events  Efficient transfer and update of desktop information

Connectiva :: Modular Design and Control Flow

Connectiva :: The CCP Protocol  CCP = Connectiva Communication Protocol  describes the formats of messages used for communication between the Connectiva servers and clients.  General message structure:  A set of ten messages used for initiation of connection, authentication, transfer of Keyboard and Mouse events, and for request for and update of desktop information.

Connectiva :: Major Issues and Resolving them  Authentication: The Client is required to authenticate itself by providing the encrypted username and returning the hash of the challenge string using the DES encrypted password as the key. Inspired from the Three-way handshake protocol.  Optimization Issues: Connectiva uses JPEG encryption to reduce the size of the update image. In addition, algorithms based on partial updates and Bounding Box strategy are employed to reduce the network traffic.

Connectiva :: A Comparative Analysis FeaturesVNCtelnetPuttyWindows RD Connectiva Cross Platform×√√×√ Optimization levels ××××√ Graphical interface √××√√ Mouse enabled control √××√√ Disabling remote KB and mouse √××√×

Connectiva :: Possible Future Additions  Disabling remote keyboard and mouse.  Implement proper character conversion before transferring messages so as to enable Cross-OS connection.  Additional ways can be explored and implemented for better network optimization and speed of updation.

THANK YOU