Documente Academic
Documente Profesional
Documente Cultură
INTRODUCTION
This software has been developed for colleges, institute, offices and some
organization in an effort to make it as attractive as well as dynamic as possible.
Firstly the login form contains the details of login for the RRCU.
After successfully login the welcome form i.e. welcome module is display
it contains the some flowers, progressbar, etc.
The third module is the main module of the project in that all the locking
facilities provided to the server system.
Hence the server can access the client system.
1
This module provide facility to perform windows services via server like restart client pc via
server or shutdown client pc via server or logoff client pc via server etc.
To implement this module we use WMI(Windows Management Instrumentation) in
vb.net.
2
2. SYSTEM SURVEY
The all forms and modules are designed using the VB.NET. Also we use the
various types of operating system.
When the software is installed on the Windows7 /XP then the RRCU will run OR
executing the all operations.
So we use the operating system for designing and developing the project. When we
check the all operating system to execute this project then the windows operating
system is very easy to handling. So the Windows 7 OR Windows XP is required to
perform the execution of this RRCU project.
Language package are used for designing the specific contents (forms) and
their layout in the project.
3
3. Requirement Analysis
3.2 Overview
The basic requirement for such a tool is some method of sharing a desktop session
between multiple users. The system admin sees what the user sees and the user sees what the
system admin sees. However, the technology behind this is obviously useful in other ways.
This project, therefore, also encompasses the use case of a simple form of collaboration by
sharing access to a desktop session. There are various existing technologies in this area which
all work in very similar ways. This project will follow those same basic architectural
principals. The core part of such a system is a protocol by which information about what is
happening on the screen of the "host" machine (in this case, the user's machine) is sent to the
"client" machine (the system admin' s machine). The client also needs to be able to relay back
key presses and pointer manipulation information to the host.
primitives are proxied via the protocol to the client machine as well as a
the windowing system. Also needed is an authentication mechanism by which access to the
host system can be restricted.
4
On the client machine an application which allows the user to connect to the host
machine, authenticate, display the contents of the host display and forward input events to the
host is required.
Users need access from devices when client software cant be installed. RDP
(Remote Desktop Protocol) introduced a significant improvement by enabling basic
access to files, email and Web resources hosted on the
Users should have a good experience even over a poor Internet connection.
How responsive is your solution when users have a low-bandwidth, high-latency
network connection? Do you need to support users in remote, satellite offices? If so,
your solution should optimize the traffic to ensure the best experience.
5
All client connections should be secured with a protocol accepted anywhere.
IPSec provides a strong level of security but is often blocked by firewalls and Internet
Service Providers. RDP and VPN protocols are widely used on the Internet to secure
website access; support for these protocols is built into all
modern Web browsers. Most firewalls and ISPs permit these protocols by default,
resulting in fewer rejected connections and less user dissappointmentation.
Strict control of action rights should exist. Controlling the actions a user can
take with resources allows organizations to properly balance security requirements
with the access needs of their users. With action rights control, an administrator can
define policies that grant full download permissions to a document when the user is
accessing it from a desktop within a remote office, or from a trusted corporate laptop.
When the user moves to a shared or untrusted device, the policies can automatically
adapt to give limited access with a virtual session delivered from the datacenter.
Inside this virtual session, policies can control the functionality of the application to
ensure files cant be saved to the client device, and that local printers cant be
accessed.
An RDP, VPN with endpoint analysis capabilities deployed at the edge of the
datacenter provides an alternative to NAC. This approach doesnt have to be
limited to remote access. Certain vendors provide high-performance RDP,
VPNs that can scale to support all users in an organization, allowing IT to
control access for all devices on the organizations proprietary network.
7
4. REQUIREMENT
8
5. DATA FLOW DIAGRAM
True
Login Form
Welcome
Form
Welcome
Remote Resource
Form
Control Utility Main Server
Main Server Form
Form
9
Data Flow Diagram :
ADMIN
Login
LOGIN
Exit
DATABASE
Access
Remote Resource
Control Utility
Result
Perform
Action
Client
10
6. ADVANTAGES
1. Strong Security
2. Centralized Management
3. User Friendly
11
7. BIBLIOGRAPHY
8.1 Books:
1. Steven Holzner, Visual Basic .NET Black Book, Paraglyph Press Publication
United States of America
2. Jeffrey R. Shapiro, Visual Basic .NET The Complete Reference McGraw Hill
Publication, Berkeley, California U.S.A.
8.2 Resources:
http://www.msdn.microsoft.com/
http://www.codeproject.com/
5. A website referenced for some frequently asked questions about the browsers,
http://www.ask.com/
12
8. CONCLUSION
By using this application whole the application on client machine will be displayed and controlled by
well privileged person who handles the server. So security of institute or cafe is increased.
13