VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.

Slides:



Advertisements
Similar presentations
--- IT Acumens. COMIT Acumens. COM SNMP Project. AIM The aim of our project is to monitor and manage the performance of a network. The aim of our project.
Advertisements

Transmitting & Receiving Contents  Hardware for Transmitting & Receiving:By Ryan Caulfield  Software for Transmitting & Receiving: By Todd John  Non-Computer.
Chapter 1 Introduction to Computer Operating System.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
1 Pertemuan 13 Servers for E-Business Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Design of Web-based Systems IS Development: lecture 10.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
Remote Desktop Connection Techniques Wireless Communication Networks.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Portable Image File Viewer ENEE 408G: Multimedia Signal Processing Seun Fabayo John Glancy Gordon Krauthamer.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Computer Skills Preparatory Year Presented by: L.Obead Alhadreti.
Terminal Services Terminal Services is the modern equivalent of mainframe computing, in which servers perform most of the processing and clients are relatively.
Installing software on personal computer
Remote Networking Architectures
Application Layer. Applications A program or group of programs designed for end users. A program or group of programs designed for end users. Software.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
Chapter 26 Client Server Interaction Communication across a computer network requires a pair of application programs to cooperate. One application on one.
Telnet/SSH: Connecting to Hosts Internet Technology1.
System Architecture & Hardware Configurations Dr. D. Bilal IS 592 Spring 2005.
Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices Section.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Operating Systems Operating System
VNC VNC demo Windows  TightVNC  ajklinux1.uncc.edu Ubuntu  Gtk VNC Viewer.
Chapter 7: Using Windows Servers to Share Information.
Customized cloud platform for computing on your terms !
Ruslan Masinjila Aida Militaru.  Nature of the Problem  Our Solution: The Roaming Security Robot  Functionalities  General System View  System Design.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
University of Management & Technology 1 Operating Systems & Utility Programs.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Operating Systems JEOPARDY Computer Repair NetworkOS OS Tasks ConceptsComponentsMisc
Chapter 8: Operating Systems and Utility Programs Catherine Gifford Dan Falgares.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Computer Emergency Notification System (CENS)
VNC
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
---- IT Acumens. COM IT Acumens. COMIT Acumens. COM.
Remote Controller & Presenter Make education more efficiently
Networking Relationships What is a computer network?
Remote Monitoring Pratheeba Murugesan Tejo Harisha Brundavana.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
Foundation year Lec.3: Computer SoftwareLec.3: Computer Software Lecturer: Dalia Mirghani Year: 2014/2015.
X-WindowsP.K.K.Thambi The X Window System Module 5.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
1 Client-Server Interaction. 2 Functionality Transport layer and layers below –Basic communication –Reliability Application layer –Abstractions Files.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Using the Weizmann Cluster Nov Overview Weizmann Cluster Connection Basics Getting a Desktop View Working on cluster machines GPU For many more.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Web Technologies Lecture 6 State preservation. Motivation How to keep user data while navigating on a website? – Authenticate only once – Store wish list.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 6A Operating System Basics PART I.
System Design for Home Automaton. Design Goals Performance Criteria – Server prioritizes client requests to provide quick response time to critical requests.
Ch26 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
System Architecture & Hardware Configurations Dr. D. Bilal IS 582 Spring 2008.
A CROSS PLATFORM REMOTE DESKTOP CONNECTION SUITE A.V.D.S.S.BHADRI RAJU D.RAMESH BABU U.JAYASREE G.NANIBABU.
Chapter 7: Using Windows Servers
VNC
System Architecture & Hardware Configurations
Virtual Network Computing
System Architecture & Hardware Configurations
Networking for Home and Small Businesses – Chapter 2
Outline Overview Development Tools
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Level 3 Extended Diploma Unit 13 Computer Systems Architecture
Networking for Home and Small Businesses – Chapter 2
Remote Computing Services Cloud connection Distributed system
Introduction to Networking & TCP/IP
February 16th, 2004 Class Meeting 5
Presentation transcript:

VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain

WHAT IS VNC In computing, Virtual Network Computing (VNC) is a graphical desktop sharing system to remotely control another computer. It transmits the keyboard and mouse events from one computer to another, relaying the graphical screen updates back in the other direction, over a network.

Continued… VNC is platform-independent – a VNC viewer on one operating system may connect to a VNC server on the same or any other operating system. There are clients and servers for many GUI-based operating systems and for Java. Multiple clients may connect to a VNC server at the same time. Popular uses for this technology include remote technical support and accessing files on one's work computer from one's home computer, or vice versa

A VNC system consists of a client, a server, and a communication protocol. The VNC server is the program on the machine that shares its screen. The server passively allows the client to take control of it The VNC client (or viewer) is the program that watches, controls, and interacts with the server. The client controls the server.

OBJECTIVE It is a graphical desktop sharing system. It allows user to simultaneously use two terminals It is very useful in all places where people working at different terminals need to access other terminals for various purposes.

EXAMPLE For example, the team members of a software development team can access to each other work on their desktop if connected over a network even they are not present physically with each other.

WORKING The project contains two modules. The Client side and Sever side. The Client side from where user can operate sever/remote machine. The server is considered as remote machine.

The sever start execution and waits for connection with some client. When the client start it requires the IP address of Server/ Remote machine. After getting IP address the connection between and remote machine is established. First the server captures the desktop and send to client with some processing.

The client receives image and display it because of that the user can see remote machine desktop. Now when user does some operation events are created which then transferred to the server side. The server receive event and fires it on its desktop or machine so whatever user does at the client side is reflected at the sever side as appropriated action performed on the sever side. The server send back the new desktop with to some changes to client side.

DIAGRAMS

DATA FLOW DIAGRAM:-

USE CASE DIAGRAM:-

SEQUENCE DIAGRAM

SERVER STARTED This is the page when server is being run on the server machine.

CLIENT STARTED This is the page when client get started on its machine.

SERVER NAME This is the page which is basically opened on the client machine when it request for the server’s IP address.

REMOTE CAPTURING Server Desktop Visible on Client Machine

REMOTE CAPTURING These are the pages when desktop sharing is successfully done.

FUTURE ENHANCEMENT The project can be enhanced to run the applications on the client/Server machine. Currently the project is restricted to only one client machine. The project can be enhanced to contain screens of more than one client/Server.

This project can be enhanced to send an acknowledgement to the server machine to let the server know the whether the image was successfully received by the client.

HARDWARE and SOFTWARE REQUIREMENTS  Hardware Requirements: Intel Processor Hard Disk Drives 16MB Ram  Software Requirements: Operating System(windows 9x) JVM(JDK1.4.1)

CONCLUSION The VNC protocol provides an excellent, lightweight means of remotely controlling GUI COMPONENTS. It is available on multiple platforms. It has a number of performance features, including enable detection of line speed and selection of compression appropriate to the connection. Some implementations offer integration into the host operating system for user authentication purposes. However, VNC is not a secure protocol, and care must be taken to avoid compromise of a machine running VNC, and possibly the entire network once a single machine is compromised.