virtual network computing full report
#4

Presented By:
Praveenkumar

[attachment=11435]
SEMINAR ON VIRTUAL NETWORK COMPUTING
Includes
Virtual Network Computing
Remote Desktop Protocol
Synergy Software
Virtual Private Network
Virtual Network Computing
History
VNC was created at the Oracle Research Lab.
Name originated from ATM network Computer called video tile.
Operation
The VNC server is a program on machine that shares its screen.
The VNC client is a program that watches and interacts with server.
The VNC protocol is very simple, based on one graphic primitive.
Security
By default not a secure protocol
Brute force cracking used
Tunneling adds extra security with encryption
Open source encryption- encrypts VNC including password & authentication
Comparison of VNC s/w
Remote Desktop Protocol
Multichannel protocol allowing user to connect to different computer
RDP version 4 introduced in windows NT server and terminal server edition
Version 5.0 introduced in windows server 2000 to improve network bandwidth usage
Latest version 6 introduced with “longhorn” able
to remotely access single application instead of entire desktop and support 32 bit color.
Features
24-bit color support,124 bit encryption
Transport layer security support
Audio allows users to run an audio program on the remote desktop and have the sound redirected to their local computer
The clipboard can be shared between the remote computer and the local computer.
Advantages :-
Clients compatible with the Remote Desktop Protocol run on a number of different operating systems
Users do not, however, need a broadband connection to access their desktop, as even a 56K modem provides enough speed to provide 5-6 screen refreshes per second.
Synergy software
Synergy is a open source computer program for sharing a keyboard and mouse between multiple computers. It is used in situations where you have several PCs, with a monitor connected to each, but only want to have one keyboard and mouse on the desk
Once the program is installed, users can move the mouse "off" the side of their desktop on one computer, and the mouse-pointer will appear on the desktop of another computer.
Virtual private network VPN
Private network to communicate confidentially over a public network
Can send data, video or combination of both of these medias across secured and encrypted and private channels between these two points
Characteristics
Improve security where data lines have not been ciphered
Reduce operational costs versus traditional WAN
Provide global networking opportunities
Show good economy of scale
Reduce transit time and transportation costs for the remote users
Provide broadband networking compatibility
Tunneling
Tunneling is the transmission of data through a public network in such a way that routing nodes in the public network are unaware that the transmission is part of a private network.
Authentication (access control) - Authentication is the process of ensuring that a user or system is who the user claims to be.
Conclusion
VNC is a free networking application offering remote control or viewing of applications running on remote computers
Ability to run your office PC from your home computer over a dialup connection to any ISP
It is definitely worth a look for people who cannot finish their computer-based work within the eight-hour day.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: full information about virtual network computing in pdf, virtual network computing full report, vnc virtual network computing for mobiles, virtual network computing seminar report, win32 fakeyak, att 4g, mpp viewer,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: virtual network computing full report - by seminar class - 31-03-2011, 03:51 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network attached storage computer science crazy 3 12,908 20-02-2019, 01:16 PM
Last Post:
  network security seminars report computer science technology 14 21,067 24-11-2018, 01:19 AM
Last Post:
  computer networks full report seminar topics 8 43,988 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,848 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 26,009 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,722 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,112 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,342 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,526 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,665 11-02-2016, 02:02 PM
Last Post: seminar report asees

Forum Jump: