SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Presented by-
Mr.jayant N. Rajurkar
M.Tech (CSE)
Table of content
1. Introduction
2. Literature Review
3. Operation
4. Security
5. Advantages
6. Limitations
7. Conclusion
8. References
Introduction
•The ability to access and operate one computer from another
computer remotely in today’s world is an essential and can be
achieved by the help of Network Computing Technology
(VNC).
•VNC enables the desktop display of one computer to be
remotely viewed and controlled over a network connection
•To use VNC, need a network TCP/IP connection, a
VNCserver and a VNCviewer to connect to the machine
running the VNCserver
 Giving users access to resources located anywhere in
network.
 Allows a single desktop to be accessed from several
places.
 VNC also have application in Mobile computing
 implement a prototype system for mobile VNC,
and several works are done for improving screen
update rate.
Literature Review
Sr
No
.
Paper Title Author Transaction Remark
1. Comprehensive review
and Selection criteria
for Virtual Network
Computing
Technology
Marzieh
Yazdanipour,
Davood
Mahmoudi
IEEE,2013 In this paper VNC
technology is defined
and Cross platform
desktop sharing is
explained with an
example
2. Implementation and
Evaluation
of Fast Mobile VNC
Systems
Ha-Young
Ko, Jae-
Hyeok Lee,
Jong-Ok
Kim,
IEEE,2012 In this paper, they
implemented a prototype
system for mobile VNC,
and reported practical
performance evaluations.
3. Virtual Screen for
Cloud Thin Clients
Shruti
Kanetkar,
Hamid
Shahnasser
IEEE,2012 The concept of virtual
screen is definitely
useful as the user is able
to access a Cross-
platform terminal
Literature Review(Contd…)
Sr
No
Paper Title Author Transaction Remark
4. Virtual
Educational
System and
Communication
Zona O.
Kostic,
Aleksandar
D.
Jevremovic
IEEE,2011 Virtual Educational System
has been developed as a
distance education system
which enables fully
integrated real and virtual
communication
5. Extending VNC
for Effective
Collaboration
Tae-Ho
Lee, Hong-
Chang Lee
IEEE,2011 presents an extension of
VNC for synchronous
collaboration with various
access policies. provide
three kinds of access
authorities: administrator,
worker, and spectator
6. Improving the
Performance of
VNC for High-
Resolution
Display Walls
Yong Liu,
Otto J.
Anshus
IEEE,2010 Paper desribes the transfer
of pixels at high
bandwidth because of not
enough network bandwidth
of VNC in network
Operation
 need is a network TCP/IP connection, a
VNC server, and VNC viewer for
connecting to the computer that is running
the server
 The VNC protocol remote frame buffer
(RFB) protocol is used to remotely control
another computer
 VNC protocol allows the client and server to
negotiate which encoding will be used
Operation
 Simplest encoding - Raw Encoding
 Encoding works :
 Pixel data is sent in left-to-right scan line order
 Only transfer rectangles that change
 Supported by all clients and servers
Operation
 Default uses TCP ports 5900 through 5906
Each port to a separate screen (:0 to :6)
Other ports can be used
 Both client and server configured accordingly
Some O.S only support a single VNC session
at a time
 E.g. Windows XP
Operation
 Server does not necessarily have a physical
display (Unix/ VNC server)
- Xvnc , based on a standard X server
- Two servers in one
applications an X server
to remote VNC users as VNC server
 Unix/Linux X11 Multiple VNC sessions
Operation
 VNC is a cross-platform remote desktop
system
- Apple Remote Desktop for Mac OS X
 From Linux, TightVNC will connect to an OS X
session
 VNC is a platform independent system
Security
 By default, VNC is not a secure protocol.
- Passwords are not sent in plain-text (as in
telnet)
 It is recommended that a password of at least 8
characters be used.
- There is also an 8-character limit on some
versions of VNC;
 If a password is sent exceeding 8 characters
Excess characters are removed
Truncated string is compared to the
password.
Security
 VNC may be tunneled over an SSH or VPN
connection
 Adds an extra security layer with stronger
encryption
 SSH clients are available for all major platforms
 SSH tunnels can be created from
 UNIX clients
 Microsoft Windows clients
 Macintosh clients many others
Security
 UltraVNC supports the use of an open-source
encryption plugin
◦ Encrypts the entire VNC session
◦ Including password authentication and data transfer
 Allows authentication to be performed based on
Active Directory user accounts
 RealVNC offers high-strength encryption
Advantages
 Less Costly
 Greater efficiency & time saving
 Efficient use of network
 Platform Independent
Limitations
 The remote machine needs to have VNC server
activated. Otherwise desktop share is not
possible.
 VNC is not encrypted. So, we need to add SSH
for ensuring secure connection.
 Compression is not efficient. Hence, it affects
the working capability of remote user.
Conclusion
 The accelerating diffusion of digital
media and wireless network,together
with the increased naturalization of
computer mediated communication.
 Virtual Educational System has been
developed as a distance education
system which enables fully integrated
real and virtual Learning.
References
 Marzieh Yazdanipour, Afsaneh Yazdanipour, Amin Mehdipour,” Comprehensive review
and Selection criteria for Virtual Network Computing Technology”,IEEE,2013.
 Ha-Young Ko, Jae-Hyeok Lee, Jong-Ok Kim,” Implementation and Evaluation of Fast
Mobile VNC Systems”,IEEE,1211-18,2012
 T. Richardson, “The RFB Protocol,” Tech. rep., RealVNC Ltd, published, 2012.
 “The RFB Protocol”, Tristan Richardson RealVNC Ltd, (formerly of Olivetti Research
Ltd / AT&T Labs Cambridge), Version 3.8, Last updated 26 November 2011
 K. Kaplinsky, “VNC tight encoder-data compression for VNC,” The 7th International
Scientific and Practical conference of Students, Post- graduates and Young
Scientists, pp. 155–157,2011
 Zona O. Kostic, Aleksandar D. Jevremovic1 Dragan S. Markovic, Ranko M. Popovic,”
Virtual Educational System and Communication” 373-76 , Serbia, Nis, October 5 -
8, 2011.
Thank You…

Weitere ähnliche Inhalte

Was ist angesagt?

Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)
Murniana Shazwen
 

Was ist angesagt? (12)

Virtual Machine Introspection in a Hyberid Honeypot Architecture
Virtual Machine Introspection in a Hyberid Honeypot ArchitectureVirtual Machine Introspection in a Hyberid Honeypot Architecture
Virtual Machine Introspection in a Hyberid Honeypot Architecture
 
Vulnerabilities assessment of windows hyper
Vulnerabilities assessment of windows hyperVulnerabilities assessment of windows hyper
Vulnerabilities assessment of windows hyper
 
MQTT Overview
MQTT OverviewMQTT Overview
MQTT Overview
 
A Short Report on MQTT protocol for Internet of Things(IoT)
A Short Report on MQTT protocol for Internet of Things(IoT)A Short Report on MQTT protocol for Internet of Things(IoT)
A Short Report on MQTT protocol for Internet of Things(IoT)
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)
 
Troopers15 Lightning talk: VMI & DRAKVUF
Troopers15 Lightning talk: VMI & DRAKVUFTroopers15 Lightning talk: VMI & DRAKVUF
Troopers15 Lightning talk: VMI & DRAKVUF
 
Introduction to EMQ X Enterprise
Introduction to EMQ X EnterpriseIntroduction to EMQ X Enterprise
Introduction to EMQ X Enterprise
 
Cloud Security with LibVMI
Cloud Security with LibVMICloud Security with LibVMI
Cloud Security with LibVMI
 
MQTT - The Internet of Things Protocol
MQTT - The Internet of Things ProtocolMQTT - The Internet of Things Protocol
MQTT - The Internet of Things Protocol
 
Hacktivity2014: Virtual Machine Introspection to Detect and Protect
Hacktivity2014: Virtual Machine Introspection to Detect and ProtectHacktivity2014: Virtual Machine Introspection to Detect and Protect
Hacktivity2014: Virtual Machine Introspection to Detect and Protect
 
Introduction to MQTT
Introduction to MQTTIntroduction to MQTT
Introduction to MQTT
 
Mqtt
MqttMqtt
Mqtt
 

Ähnlich wie Network based virtual drawing & secured data sharing using vnc protocol

Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
Ayaz Shahid
 
High performance and flexible networking
High performance and flexible networkingHigh performance and flexible networking
High performance and flexible networking
John Berkmans
 

Ähnlich wie Network based virtual drawing & secured data sharing using vnc protocol (20)

Virtual network computing
Virtual network computingVirtual network computing
Virtual network computing
 
J365963
J365963J365963
J365963
 
Fm3610071011
Fm3610071011Fm3610071011
Fm3610071011
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Understanding network and service virtualization
Understanding network and service virtualizationUnderstanding network and service virtualization
Understanding network and service virtualization
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
 
82 87
82 8782 87
82 87
 
VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization
 
SDN: A New Approach to Networking Technology
SDN: A New Approach to Networking TechnologySDN: A New Approach to Networking Technology
SDN: A New Approach to Networking Technology
 
BuildingSDNmanageableswitch.pdf
BuildingSDNmanageableswitch.pdfBuildingSDNmanageableswitch.pdf
BuildingSDNmanageableswitch.pdf
 
V P N
V P NV P N
V P N
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using docker
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using docker
 
Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609
 
Optimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using dockerOptimising nfv service chains on open stack using docker
Optimising nfv service chains on open stack using docker
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
High performance and flexible networking
High performance and flexible networkingHigh performance and flexible networking
High performance and flexible networking
 
Controlling remote pc using mobile
Controlling remote pc using mobileControlling remote pc using mobile
Controlling remote pc using mobile
 
Summit 16: ARM Mini-Summit - NXP QorIQ NFV Solutions - NXP Semiconductors
Summit 16: ARM Mini-Summit - NXP QorIQ NFV Solutions - NXP SemiconductorsSummit 16: ARM Mini-Summit - NXP QorIQ NFV Solutions - NXP Semiconductors
Summit 16: ARM Mini-Summit - NXP QorIQ NFV Solutions - NXP Semiconductors
 
Cloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
Cloudify: Open vCPE Design Concepts and Multi-Cloud OrchestrationCloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
Cloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Network based virtual drawing & secured data sharing using vnc protocol

  • 1. Presented by- Mr.jayant N. Rajurkar M.Tech (CSE)
  • 2. Table of content 1. Introduction 2. Literature Review 3. Operation 4. Security 5. Advantages 6. Limitations 7. Conclusion 8. References
  • 3. Introduction •The ability to access and operate one computer from another computer remotely in today’s world is an essential and can be achieved by the help of Network Computing Technology (VNC). •VNC enables the desktop display of one computer to be remotely viewed and controlled over a network connection •To use VNC, need a network TCP/IP connection, a VNCserver and a VNCviewer to connect to the machine running the VNCserver
  • 4.  Giving users access to resources located anywhere in network.  Allows a single desktop to be accessed from several places.  VNC also have application in Mobile computing  implement a prototype system for mobile VNC, and several works are done for improving screen update rate.
  • 5. Literature Review Sr No . Paper Title Author Transaction Remark 1. Comprehensive review and Selection criteria for Virtual Network Computing Technology Marzieh Yazdanipour, Davood Mahmoudi IEEE,2013 In this paper VNC technology is defined and Cross platform desktop sharing is explained with an example 2. Implementation and Evaluation of Fast Mobile VNC Systems Ha-Young Ko, Jae- Hyeok Lee, Jong-Ok Kim, IEEE,2012 In this paper, they implemented a prototype system for mobile VNC, and reported practical performance evaluations. 3. Virtual Screen for Cloud Thin Clients Shruti Kanetkar, Hamid Shahnasser IEEE,2012 The concept of virtual screen is definitely useful as the user is able to access a Cross- platform terminal
  • 6. Literature Review(Contd…) Sr No Paper Title Author Transaction Remark 4. Virtual Educational System and Communication Zona O. Kostic, Aleksandar D. Jevremovic IEEE,2011 Virtual Educational System has been developed as a distance education system which enables fully integrated real and virtual communication 5. Extending VNC for Effective Collaboration Tae-Ho Lee, Hong- Chang Lee IEEE,2011 presents an extension of VNC for synchronous collaboration with various access policies. provide three kinds of access authorities: administrator, worker, and spectator 6. Improving the Performance of VNC for High- Resolution Display Walls Yong Liu, Otto J. Anshus IEEE,2010 Paper desribes the transfer of pixels at high bandwidth because of not enough network bandwidth of VNC in network
  • 7. Operation  need is a network TCP/IP connection, a VNC server, and VNC viewer for connecting to the computer that is running the server  The VNC protocol remote frame buffer (RFB) protocol is used to remotely control another computer  VNC protocol allows the client and server to negotiate which encoding will be used
  • 8.
  • 9. Operation  Simplest encoding - Raw Encoding  Encoding works :  Pixel data is sent in left-to-right scan line order  Only transfer rectangles that change  Supported by all clients and servers
  • 10. Operation  Default uses TCP ports 5900 through 5906 Each port to a separate screen (:0 to :6) Other ports can be used  Both client and server configured accordingly Some O.S only support a single VNC session at a time  E.g. Windows XP
  • 11. Operation  Server does not necessarily have a physical display (Unix/ VNC server) - Xvnc , based on a standard X server - Two servers in one applications an X server to remote VNC users as VNC server  Unix/Linux X11 Multiple VNC sessions
  • 12. Operation  VNC is a cross-platform remote desktop system - Apple Remote Desktop for Mac OS X  From Linux, TightVNC will connect to an OS X session  VNC is a platform independent system
  • 13. Security  By default, VNC is not a secure protocol. - Passwords are not sent in plain-text (as in telnet)  It is recommended that a password of at least 8 characters be used. - There is also an 8-character limit on some versions of VNC;  If a password is sent exceeding 8 characters Excess characters are removed Truncated string is compared to the password.
  • 14. Security  VNC may be tunneled over an SSH or VPN connection  Adds an extra security layer with stronger encryption  SSH clients are available for all major platforms  SSH tunnels can be created from  UNIX clients  Microsoft Windows clients  Macintosh clients many others
  • 15. Security  UltraVNC supports the use of an open-source encryption plugin ◦ Encrypts the entire VNC session ◦ Including password authentication and data transfer  Allows authentication to be performed based on Active Directory user accounts  RealVNC offers high-strength encryption
  • 16. Advantages  Less Costly  Greater efficiency & time saving  Efficient use of network  Platform Independent
  • 17. Limitations  The remote machine needs to have VNC server activated. Otherwise desktop share is not possible.  VNC is not encrypted. So, we need to add SSH for ensuring secure connection.  Compression is not efficient. Hence, it affects the working capability of remote user.
  • 18. Conclusion  The accelerating diffusion of digital media and wireless network,together with the increased naturalization of computer mediated communication.  Virtual Educational System has been developed as a distance education system which enables fully integrated real and virtual Learning.
  • 19. References  Marzieh Yazdanipour, Afsaneh Yazdanipour, Amin Mehdipour,” Comprehensive review and Selection criteria for Virtual Network Computing Technology”,IEEE,2013.  Ha-Young Ko, Jae-Hyeok Lee, Jong-Ok Kim,” Implementation and Evaluation of Fast Mobile VNC Systems”,IEEE,1211-18,2012  T. Richardson, “The RFB Protocol,” Tech. rep., RealVNC Ltd, published, 2012.  “The RFB Protocol”, Tristan Richardson RealVNC Ltd, (formerly of Olivetti Research Ltd / AT&T Labs Cambridge), Version 3.8, Last updated 26 November 2011  K. Kaplinsky, “VNC tight encoder-data compression for VNC,” The 7th International Scientific and Practical conference of Students, Post- graduates and Young Scientists, pp. 155–157,2011  Zona O. Kostic, Aleksandar D. Jevremovic1 Dragan S. Markovic, Ranko M. Popovic,” Virtual Educational System and Communication” 373-76 , Serbia, Nis, October 5 - 8, 2011.