Sunteți pe pagina 1din 13

1.

INTRODUCTION

1.1 About the topic:-

A Remote Resource Control Utility is the software which is developed to the


controlling of client system from the server system. Remote Resource means it is the
provider certain operation to the client system from the server system. Control is the
managing the devices which is provided by the RRCU.

1.2 About the project:-

This software has been developed for colleges, institute, offices and some
organization in an effort to make it as attractive as well as dynamic as possible.

1.3 The working of project is as follows:-

Firstly the login form contains the details of login for the RRCU.
After successfully login the welcome form i.e. welcome module is display
it contains the some flowers, progressbar, etc.
The third module is the main module of the project in that all the locking
facilities provided to the server system.
Hence the server can access the client system.

1.4 RRCU contains 3 main modules:-

1.4.1 Remote Desktop Connection


1.4.2 Chat Room
1.4.3 Remote Control Zone.

1.4.1 Remote Desktop Connection:


This module perform remote desktop connection to access client pc remotely & perform
required task.
To get remote control on client pc we have to specify client IP address to application.
To implement this module we use RDP(Remote Desktop Protocol) control in vb.net.

1.4.2 Chat Room:


This module provides chatting facility by which server & client can chat with each other
easily.
This module also provide file transfer facility, so we can easily send any type of file from one
pc to another.
To implement this module we use TCP, TcpClient classes in vb.net.
In this module we use ping method of System.Network namespace in vb.net.

1.4.3 Remote Control Zone:

1
This module provide facility to perform windows services via server like restart client pc via
server or shutdown client pc via server or logoff client pc via server etc.
To implement this module we use WMI(Windows Management Instrumentation) in
vb.net.

2
2. SYSTEM SURVEY

The all forms and modules are designed using the VB.NET. Also we use the
various types of operating system.

When the software is installed on the Windows7 /XP then the RRCU will run OR
executing the all operations.

So we use the operating system for designing and developing the project. When we
check the all operating system to execute this project then the windows operating
system is very easy to handling. So the Windows 7 OR Windows XP is required to
perform the execution of this RRCU project.

2.1 Microsoft Visual Studio 2008

Language package are used for designing the specific contents (forms) and
their layout in the project.

3
3. Requirement Analysis

3.1 Problem Description

In enterprise installations system administrators typically have to deal with a


large number of basic problems on users' machines. Remotely taking control of a user's
desktop to fix the problem while at the same time training the user as to how to resolve the
problem for themselves is an effective and simple way to handle these types of support
scenarios.

3.2 Overview

The basic requirement for such a tool is some method of sharing a desktop session
between multiple users. The system admin sees what the user sees and the user sees what the
system admin sees. However, the technology behind this is obviously useful in other ways.
This project, therefore, also encompasses the use case of a simple form of collaboration by
sharing access to a desktop session. There are various existing technologies in this area which
all work in very similar ways. This project will follow those same basic architectural
principals. The core part of such a system is a protocol by which information about what is
happening on the screen of the "host" machine (in this case, the user's machine) is sent to the
"client" machine (the system admin' s machine). The client also needs to be able to relay back
key presses and pointer manipulation information to the host.

On the host machine a mechanism is needed by which all drawing

primitives are proxied via the protocol to the client machine as well as a

mechanism by which key/pointer events from the client are passed to

the windowing system. Also needed is an authentication mechanism by which access to the
host system can be restricted.

4
On the client machine an application which allows the user to connect to the host
machine, authenticate, display the contents of the host display and forward input events to the
host is required.

3.3 Various Requirements:

Users need access from devices when client software cant be installed. RDP
(Remote Desktop Protocol) introduced a significant improvement by enabling basic
access to files, email and Web resources hosted on the

organizations network from any client device with a Web browser.

Users should have a good experience even over a poor Internet connection.
How responsive is your solution when users have a low-bandwidth, high-latency
network connection? Do you need to support users in remote, satellite offices? If so,
your solution should optimize the traffic to ensure the best experience.

Administrators need granular control over the information that can be


accessed. Early RDPs either lacked access controls or only provided control at the
network level. The result was that organizations granted users too much access
because application-level permissions couldnt be enforced on specific websites and
file servers. Some RDPs now allow permissions to be defined down to the resource
due to an awareness of application protocols.

5
All client connections should be secured with a protocol accepted anywhere.
IPSec provides a strong level of security but is often blocked by firewalls and Internet
Service Providers. RDP and VPN protocols are widely used on the Internet to secure
website access; support for these protocols is built into all

modern Web browsers. Most firewalls and ISPs permit these protocols by default,
resulting in fewer rejected connections and less user dissappointmentation.

Client configuration should be checked before allowing access. Checks


can be performed to verify basic security configurations by ensuring up-to-date anti-
virus and personal firewall software is active on the client. Clients should also have
the latest version of the operating system and browser. By running an endpoint
analysis scan at the beginning of any remote access session, you can detect an
improper configuration that may prevent users from authenticating, or limit the
permission of the user during the session.

Strict control of action rights should exist. Controlling the actions a user can
take with resources allows organizations to properly balance security requirements
with the access needs of their users. With action rights control, an administrator can
define policies that grant full download permissions to a document when the user is
accessing it from a desktop within a remote office, or from a trusted corporate laptop.
When the user moves to a shared or untrusted device, the policies can automatically
adapt to give limited access with a virtual session delivered from the datacenter.
Inside this virtual session, policies can control the functionality of the application to
ensure files cant be saved to the client device, and that local printers cant be
accessed.

Find a solution that overcomes the limitations of network access control.

Network access control (NAC) solutions have emerged as a solution to help


support the security of an organizations network by limiting access when a
6
client does meet the minimum configuration defined by the security policy.
NAC approaches are still emerging and enforcement approaches continue to
be problematic or expensive. Some require the replacement of existing
network infrastructure such as switches and routers, and others that control
the distribution of IP addresses can be easily bypassed by configuring clients
with static IP addresses.

An RDP, VPN with endpoint analysis capabilities deployed at the edge of the
datacenter provides an alternative to NAC. This approach doesnt have to be
limited to remote access. Certain vendors provide high-performance RDP,
VPNs that can scale to support all users in an organization, allowing IT to
control access for all devices on the organizations proprietary network.

7
4. REQUIREMENT

4.1 Software Requirement:-

1. Microsoft Visual Studio 2005 OR 2008

2. Operating System :- Windows XP / Windows 7(32 bit)

3. Microsoft Access Database

4.2 Hardware Requirement:-

1. RAM :- 1GB / 2GB

2. Hard Disk :- 180 GB OR Above

3. Processor :- Dual Core

8
5. DATA FLOW DIAGRAM

True
Login Form
Welcome
Form
Welcome
Remote Resource
Form
Control Utility Main Server
Main Server Form
Form

Level 0 DFD Model

9
Data Flow Diagram :

ADMIN
Login

LOGIN
Exit

Checking uname & pw


EXIT

DATABASE
Access

Remote Resource
Control Utility
Result
Perform
Action

Client
10
6. ADVANTAGES

1. Strong Security

2. Centralized Management

3. User Friendly

4. Easily solve the problems of client through server.

11
7. BIBLIOGRAPHY

8.1 Books:

1. Steven Holzner, Visual Basic .NET Black Book, Paraglyph Press Publication
United States of America
2. Jeffrey R. Shapiro, Visual Basic .NET The Complete Reference McGraw Hill
Publication, Berkeley, California U.S.A.

8.2 Resources:

1. The Official site of Microsoft,

http://www.msdn.microsoft.com/

2. Visual Basic.NET Code reference site

http://www.codeproject.com/

5. A website referenced for some frequently asked questions about the browsers,

http://www.ask.com/

12
8. CONCLUSION

This project is very useful in colleges, offices, organization, etc


By using this project the server can control on the client machine.

By using this application whole the application on client machine will be displayed and controlled by
well privileged person who handles the server. So security of institute or cafe is increased.

13

S-ar putea să vă placă și