SlideShare una empresa de Scribd logo
1 de 20
Presented by-
Mr.jayant N. Rajurkar
M.Tech (CSE)
Table of content
1. Introduction
2. Literature Review
3. Operation
4. Security
5. Advantages
6. Limitations
7. Conclusion
8. References
Introduction
•The ability to access and operate one computer from another
computer remotely in today’s world is an essential and can be
achieved by the help of Network Computing Technology
(VNC).
•VNC enables the desktop display of one computer to be
remotely viewed and controlled over a network connection
•To use VNC, need a network TCP/IP connection, a
VNCserver and a VNCviewer to connect to the machine
running the VNCserver
 Giving users access to resources located anywhere in
network.
 Allows a single desktop to be accessed from several
places.
 VNC also have application in Mobile computing
 implement a prototype system for mobile VNC,
and several works are done for improving screen
update rate.
Literature Review
Sr
No
.
Paper Title Author Transaction Remark
1. Comprehensive review
and Selection criteria
for Virtual Network
Computing
Technology
Marzieh
Yazdanipour,
Davood
Mahmoudi
IEEE,2013 In this paper VNC
technology is defined
and Cross platform
desktop sharing is
explained with an
example
2. Implementation and
Evaluation
of Fast Mobile VNC
Systems
Ha-Young
Ko, Jae-
Hyeok Lee,
Jong-Ok
Kim,
IEEE,2012 In this paper, they
implemented a prototype
system for mobile VNC,
and reported practical
performance evaluations.
3. Virtual Screen for
Cloud Thin Clients
Shruti
Kanetkar,
Hamid
Shahnasser
IEEE,2012 The concept of virtual
screen is definitely
useful as the user is able
to access a Cross-
platform terminal
Literature Review(Contd…)
Sr
No
Paper Title Author Transaction Remark
4. Virtual
Educational
System and
Communication
Zona O.
Kostic,
Aleksandar
D.
Jevremovic
IEEE,2011 Virtual Educational System
has been developed as a
distance education system
which enables fully
integrated real and virtual
communication
5. Extending VNC
for Effective
Collaboration
Tae-Ho
Lee, Hong-
Chang Lee
IEEE,2011 presents an extension of
VNC for synchronous
collaboration with various
access policies. provide
three kinds of access
authorities: administrator,
worker, and spectator
6. Improving the
Performance of
VNC for High-
Resolution
Display Walls
Yong Liu,
Otto J.
Anshus
IEEE,2010 Paper desribes the transfer
of pixels at high
bandwidth because of not
enough network bandwidth
of VNC in network
Operation
 need is a network TCP/IP connection, a
VNC server, and VNC viewer for
connecting to the computer that is running
the server
 The VNC protocol remote frame buffer
(RFB) protocol is used to remotely control
another computer
 VNC protocol allows the client and server to
negotiate which encoding will be used
Operation
 Simplest encoding - Raw Encoding
 Encoding works :
 Pixel data is sent in left-to-right scan line order
 Only transfer rectangles that change
 Supported by all clients and servers
Operation
 Default uses TCP ports 5900 through 5906
Each port to a separate screen (:0 to :6)
Other ports can be used
 Both client and server configured accordingly
Some O.S only support a single VNC session
at a time
 E.g. Windows XP
Operation
 Server does not necessarily have a physical
display (Unix/ VNC server)
- Xvnc , based on a standard X server
- Two servers in one
applications an X server
to remote VNC users as VNC server
 Unix/Linux X11 Multiple VNC sessions
Operation
 VNC is a cross-platform remote desktop
system
- Apple Remote Desktop for Mac OS X
 From Linux, TightVNC will connect to an OS X
session
 VNC is a platform independent system
Security
 By default, VNC is not a secure protocol.
- Passwords are not sent in plain-text (as in
telnet)
 It is recommended that a password of at least 8
characters be used.
- There is also an 8-character limit on some
versions of VNC;
 If a password is sent exceeding 8 characters
Excess characters are removed
Truncated string is compared to the
password.
Security
 VNC may be tunneled over an SSH or VPN
connection
 Adds an extra security layer with stronger
encryption
 SSH clients are available for all major platforms
 SSH tunnels can be created from
 UNIX clients
 Microsoft Windows clients
 Macintosh clients many others
Security
 UltraVNC supports the use of an open-source
encryption plugin
◦ Encrypts the entire VNC session
◦ Including password authentication and data transfer
 Allows authentication to be performed based on
Active Directory user accounts
 RealVNC offers high-strength encryption
Advantages
 Less Costly
 Greater efficiency & time saving
 Efficient use of network
 Platform Independent
Limitations
 The remote machine needs to have VNC server
activated. Otherwise desktop share is not
possible.
 VNC is not encrypted. So, we need to add SSH
for ensuring secure connection.
 Compression is not efficient. Hence, it affects
the working capability of remote user.
Conclusion
 The accelerating diffusion of digital
media and wireless network,together
with the increased naturalization of
computer mediated communication.
 Virtual Educational System has been
developed as a distance education
system which enables fully integrated
real and virtual Learning.
References
 Marzieh Yazdanipour, Afsaneh Yazdanipour, Amin Mehdipour,” Comprehensive review
and Selection criteria for Virtual Network Computing Technology”,IEEE,2013.
 Ha-Young Ko, Jae-Hyeok Lee, Jong-Ok Kim,” Implementation and Evaluation of Fast
Mobile VNC Systems”,IEEE,1211-18,2012
 T. Richardson, “The RFB Protocol,” Tech. rep., RealVNC Ltd, published, 2012.
 “The RFB Protocol”, Tristan Richardson RealVNC Ltd, (formerly of Olivetti Research
Ltd / AT&T Labs Cambridge), Version 3.8, Last updated 26 November 2011
 K. Kaplinsky, “VNC tight encoder-data compression for VNC,” The 7th International
Scientific and Practical conference of Students, Post- graduates and Young
Scientists, pp. 155–157,2011
 Zona O. Kostic, Aleksandar D. Jevremovic1 Dragan S. Markovic, Ranko M. Popovic,”
Virtual Educational System and Communication” 373-76 , Serbia, Nis, October 5 -
8, 2011.
Thank You…

Más contenido relacionado

La actualidad más candente

Virtual Machine Introspection in a Hyberid Honeypot Architecture
Virtual Machine Introspection in a Hyberid Honeypot ArchitectureVirtual Machine Introspection in a Hyberid Honeypot Architecture
Virtual Machine Introspection in a Hyberid Honeypot ArchitectureTamas K Lengyel
 
Vulnerabilities assessment of windows hyper
Vulnerabilities assessment of windows hyperVulnerabilities assessment of windows hyper
Vulnerabilities assessment of windows hyperBank Alfalah Limited
 
A Short Report on MQTT protocol for Internet of Things(IoT)
A Short Report on MQTT protocol for Internet of Things(IoT)A Short Report on MQTT protocol for Internet of Things(IoT)
A Short Report on MQTT protocol for Internet of Things(IoT)sonycse
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Murniana Shazwen
 
Troopers15 Lightning talk: VMI & DRAKVUF
Troopers15 Lightning talk: VMI & DRAKVUFTroopers15 Lightning talk: VMI & DRAKVUF
Troopers15 Lightning talk: VMI & DRAKVUFTamas K Lengyel
 
Introduction to EMQ X Enterprise
Introduction to EMQ X EnterpriseIntroduction to EMQ X Enterprise
Introduction to EMQ X EnterpriseEMQ
 
Cloud Security with LibVMI
Cloud Security with LibVMICloud Security with LibVMI
Cloud Security with LibVMITamas K Lengyel
 
MQTT - The Internet of Things Protocol
MQTT - The Internet of Things ProtocolMQTT - The Internet of Things Protocol
MQTT - The Internet of Things ProtocolBen Hardill
 
Hacktivity2014: Virtual Machine Introspection to Detect and Protect
Hacktivity2014: Virtual Machine Introspection to Detect and ProtectHacktivity2014: Virtual Machine Introspection to Detect and Protect
Hacktivity2014: Virtual Machine Introspection to Detect and ProtectTamas K Lengyel
 
Introduction to MQTT
Introduction to MQTTIntroduction to MQTT
Introduction to MQTTEMQ
 

La actualidad más candente (12)

Virtual Machine Introspection in a Hyberid Honeypot Architecture
Virtual Machine Introspection in a Hyberid Honeypot ArchitectureVirtual Machine Introspection in a Hyberid Honeypot Architecture
Virtual Machine Introspection in a Hyberid Honeypot Architecture
 
Vulnerabilities assessment of windows hyper
Vulnerabilities assessment of windows hyperVulnerabilities assessment of windows hyper
Vulnerabilities assessment of windows hyper
 
MQTT Overview
MQTT OverviewMQTT Overview
MQTT Overview
 
A Short Report on MQTT protocol for Internet of Things(IoT)
A Short Report on MQTT protocol for Internet of Things(IoT)A Short Report on MQTT protocol for Internet of Things(IoT)
A Short Report on MQTT protocol for Internet of Things(IoT)
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)
 
Troopers15 Lightning talk: VMI & DRAKVUF
Troopers15 Lightning talk: VMI & DRAKVUFTroopers15 Lightning talk: VMI & DRAKVUF
Troopers15 Lightning talk: VMI & DRAKVUF
 
Introduction to EMQ X Enterprise
Introduction to EMQ X EnterpriseIntroduction to EMQ X Enterprise
Introduction to EMQ X Enterprise
 
Cloud Security with LibVMI
Cloud Security with LibVMICloud Security with LibVMI
Cloud Security with LibVMI
 
MQTT - The Internet of Things Protocol
MQTT - The Internet of Things ProtocolMQTT - The Internet of Things Protocol
MQTT - The Internet of Things Protocol
 
Hacktivity2014: Virtual Machine Introspection to Detect and Protect
Hacktivity2014: Virtual Machine Introspection to Detect and ProtectHacktivity2014: Virtual Machine Introspection to Detect and Protect
Hacktivity2014: Virtual Machine Introspection to Detect and Protect
 
Introduction to MQTT
Introduction to MQTTIntroduction to MQTT
Introduction to MQTT
 
Mqtt
MqttMqtt
Mqtt
 

Similar a Network based virtual drawing & secured data sharing using vnc protocol

Virtual network computing
Virtual network computingVirtual network computing
Virtual network computing3608106
 
Understanding network and service virtualization
Understanding network and service virtualizationUnderstanding network and service virtualization
Understanding network and service virtualizationSDN Hub
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualizationAyaz Shahid
 
VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization VMworld
 
SDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologySDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologyIRJET Journal
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerAnanth Padmanabhan
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerSatya Sanjibani Routray
 
Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609sidramuoio
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerRahul Krishna Upadhyaya
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALLMoin Islam
 
High performance and flexible networking
High performance and flexible networkingHigh performance and flexible networking
High performance and flexible networkingJohn Berkmans
 
Controlling remote pc using mobile
Controlling remote pc using mobileControlling remote pc using mobile
Controlling remote pc using mobileArchana Maharjan
 
Summit 16: ARM Mini-Summit - NXP QorIQ NFV Solutions - NXP Semiconductors
Summit 16: ARM Mini-Summit - NXP QorIQ NFV Solutions - NXP SemiconductorsSummit 16: ARM Mini-Summit - NXP QorIQ NFV Solutions - NXP Semiconductors
Summit 16: ARM Mini-Summit - NXP QorIQ NFV Solutions - NXP SemiconductorsOPNFV
 
Cloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
Cloudify: Open vCPE Design Concepts and Multi-Cloud OrchestrationCloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
Cloudify: Open vCPE Design Concepts and Multi-Cloud OrchestrationCloudify Community
 

Similar a Network based virtual drawing & secured data sharing using vnc protocol (20)

Virtual network computing
Virtual network computingVirtual network computing
Virtual network computing
 
J365963
J365963J365963
J365963
 
Fm3610071011
Fm3610071011Fm3610071011
Fm3610071011
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Understanding network and service virtualization
Understanding network and service virtualizationUnderstanding network and service virtualization
Understanding network and service virtualization
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
 
82 87
82 8782 87
82 87
 
VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization
 
SDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologySDN: A New Approach to Networking Technology
SDN: A New Approach to Networking Technology
 
BuildingSDNmanageableswitch.pdf
BuildingSDNmanageableswitch.pdfBuildingSDNmanageableswitch.pdf
BuildingSDNmanageableswitch.pdf
 
V P N
V P NV P N
V P N
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using docker
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using docker
 
Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using docker
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
High performance and flexible networking
High performance and flexible networkingHigh performance and flexible networking
High performance and flexible networking
 
Controlling remote pc using mobile
Controlling remote pc using mobileControlling remote pc using mobile
Controlling remote pc using mobile
 
Summit 16: ARM Mini-Summit - NXP QorIQ NFV Solutions - NXP Semiconductors
Summit 16: ARM Mini-Summit - NXP QorIQ NFV Solutions - NXP SemiconductorsSummit 16: ARM Mini-Summit - NXP QorIQ NFV Solutions - NXP Semiconductors
Summit 16: ARM Mini-Summit - NXP QorIQ NFV Solutions - NXP Semiconductors
 
Cloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
Cloudify: Open vCPE Design Concepts and Multi-Cloud OrchestrationCloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
Cloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
 

Último

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Network based virtual drawing & secured data sharing using vnc protocol

  • 1. Presented by- Mr.jayant N. Rajurkar M.Tech (CSE)
  • 2. Table of content 1. Introduction 2. Literature Review 3. Operation 4. Security 5. Advantages 6. Limitations 7. Conclusion 8. References
  • 3. Introduction •The ability to access and operate one computer from another computer remotely in today’s world is an essential and can be achieved by the help of Network Computing Technology (VNC). •VNC enables the desktop display of one computer to be remotely viewed and controlled over a network connection •To use VNC, need a network TCP/IP connection, a VNCserver and a VNCviewer to connect to the machine running the VNCserver
  • 4.  Giving users access to resources located anywhere in network.  Allows a single desktop to be accessed from several places.  VNC also have application in Mobile computing  implement a prototype system for mobile VNC, and several works are done for improving screen update rate.
  • 5. Literature Review Sr No . Paper Title Author Transaction Remark 1. Comprehensive review and Selection criteria for Virtual Network Computing Technology Marzieh Yazdanipour, Davood Mahmoudi IEEE,2013 In this paper VNC technology is defined and Cross platform desktop sharing is explained with an example 2. Implementation and Evaluation of Fast Mobile VNC Systems Ha-Young Ko, Jae- Hyeok Lee, Jong-Ok Kim, IEEE,2012 In this paper, they implemented a prototype system for mobile VNC, and reported practical performance evaluations. 3. Virtual Screen for Cloud Thin Clients Shruti Kanetkar, Hamid Shahnasser IEEE,2012 The concept of virtual screen is definitely useful as the user is able to access a Cross- platform terminal
  • 6. Literature Review(Contd…) Sr No Paper Title Author Transaction Remark 4. Virtual Educational System and Communication Zona O. Kostic, Aleksandar D. Jevremovic IEEE,2011 Virtual Educational System has been developed as a distance education system which enables fully integrated real and virtual communication 5. Extending VNC for Effective Collaboration Tae-Ho Lee, Hong- Chang Lee IEEE,2011 presents an extension of VNC for synchronous collaboration with various access policies. provide three kinds of access authorities: administrator, worker, and spectator 6. Improving the Performance of VNC for High- Resolution Display Walls Yong Liu, Otto J. Anshus IEEE,2010 Paper desribes the transfer of pixels at high bandwidth because of not enough network bandwidth of VNC in network
  • 7. Operation  need is a network TCP/IP connection, a VNC server, and VNC viewer for connecting to the computer that is running the server  The VNC protocol remote frame buffer (RFB) protocol is used to remotely control another computer  VNC protocol allows the client and server to negotiate which encoding will be used
  • 8.
  • 9. Operation  Simplest encoding - Raw Encoding  Encoding works :  Pixel data is sent in left-to-right scan line order  Only transfer rectangles that change  Supported by all clients and servers
  • 10. Operation  Default uses TCP ports 5900 through 5906 Each port to a separate screen (:0 to :6) Other ports can be used  Both client and server configured accordingly Some O.S only support a single VNC session at a time  E.g. Windows XP
  • 11. Operation  Server does not necessarily have a physical display (Unix/ VNC server) - Xvnc , based on a standard X server - Two servers in one applications an X server to remote VNC users as VNC server  Unix/Linux X11 Multiple VNC sessions
  • 12. Operation  VNC is a cross-platform remote desktop system - Apple Remote Desktop for Mac OS X  From Linux, TightVNC will connect to an OS X session  VNC is a platform independent system
  • 13. Security  By default, VNC is not a secure protocol. - Passwords are not sent in plain-text (as in telnet)  It is recommended that a password of at least 8 characters be used. - There is also an 8-character limit on some versions of VNC;  If a password is sent exceeding 8 characters Excess characters are removed Truncated string is compared to the password.
  • 14. Security  VNC may be tunneled over an SSH or VPN connection  Adds an extra security layer with stronger encryption  SSH clients are available for all major platforms  SSH tunnels can be created from  UNIX clients  Microsoft Windows clients  Macintosh clients many others
  • 15. Security  UltraVNC supports the use of an open-source encryption plugin ◦ Encrypts the entire VNC session ◦ Including password authentication and data transfer  Allows authentication to be performed based on Active Directory user accounts  RealVNC offers high-strength encryption
  • 16. Advantages  Less Costly  Greater efficiency & time saving  Efficient use of network  Platform Independent
  • 17. Limitations  The remote machine needs to have VNC server activated. Otherwise desktop share is not possible.  VNC is not encrypted. So, we need to add SSH for ensuring secure connection.  Compression is not efficient. Hence, it affects the working capability of remote user.
  • 18. Conclusion  The accelerating diffusion of digital media and wireless network,together with the increased naturalization of computer mediated communication.  Virtual Educational System has been developed as a distance education system which enables fully integrated real and virtual Learning.
  • 19. References  Marzieh Yazdanipour, Afsaneh Yazdanipour, Amin Mehdipour,” Comprehensive review and Selection criteria for Virtual Network Computing Technology”,IEEE,2013.  Ha-Young Ko, Jae-Hyeok Lee, Jong-Ok Kim,” Implementation and Evaluation of Fast Mobile VNC Systems”,IEEE,1211-18,2012  T. Richardson, “The RFB Protocol,” Tech. rep., RealVNC Ltd, published, 2012.  “The RFB Protocol”, Tristan Richardson RealVNC Ltd, (formerly of Olivetti Research Ltd / AT&T Labs Cambridge), Version 3.8, Last updated 26 November 2011  K. Kaplinsky, “VNC tight encoder-data compression for VNC,” The 7th International Scientific and Practical conference of Students, Post- graduates and Young Scientists, pp. 155–157,2011  Zona O. Kostic, Aleksandar D. Jevremovic1 Dragan S. Markovic, Ranko M. Popovic,” Virtual Educational System and Communication” 373-76 , Serbia, Nis, October 5 - 8, 2011.