SlideShare a Scribd company logo
REMOTE DESKTOP CONTROL
BY SHUBHAM PATEL
B.Tech –CSE (7th Semester)
Batch-2013-2017
ALIGARH COLLEGE OF ENGINEERING AND TECHNOLOGY, ALIGARH
(Approved by AICTE, New Delhi & Affiliated to Dr. A.P.J. Abdul Kalam Technical University,Lucknow)
 Remote Desktop Controller is a client/server
software package allowing remote network
access to graphical desktop.
 This software enables you to get a view of the
remote machine desktop and thus control it
with your local mouse and keyboard.
 It can be used to perform remote system
control and administration tasks in Unix,
Windows and other assorted network
environments.
 Remote control software provides businesses
the ability to login and access computers
remotely. Utilizing remote control software
enables personnel to transfer files or folders
quickly and easily, and communicate by
instant message, text chat, or voice intercom
from any PC
Processor Intel Pentium compatible or above
RAM 4MB free space
VDU VGA/SVGA
Hard Disk 50 MB free space
Operating System Windows 8 and above/ Linux
Programming language Java2 ( JDK 1.2)
 Remote Desktop Controller is a client -server
software used for remote desktop access and
controlling purposes. This software mainly
runs as two parts, the one at the client side
using which the user views the desktop of the
system at the remote side acting as the server
and controls it and the server side which
allows it to be accessed and controlled by the
client user. This software is basically divided
into two module based on this purpose.
 The Server module –
 running on the remote system acting as the
server system which allows itself to be
accessed by the client user.
 The Client module –
 running on the client system through which
the user accesses and controls the remote
server system
 EXISTING SYSTEM
 The current existing system are potentially good systems, which
do allow us to remotely connect to the remote machine and
access their respective desktops. But most of the existing system
are quite difficult to use and implemented for layman.
 LIMITATION OF THE EXISTING SYSTEMS
 The existing systems have the following limitation-
 Remote desktop protocol (RDP) is a multi-channel protocol that
allows a user to connect to a computer running Microsoft
terminal sevice.
 In most of the existing remote desktop controlling applications,
the user working on the remote machine is aware with the fact
that someone else is viewing his/her desktop remotely.
 PROPOSED SYSTEM
The New System Will Overcome All The Anomalies And limitation
of existing system
 It enables us to access computer anywhere within
our network, it saves time It does cover more
distance than Bluetooth. Conventional VNC System
comprises accessing of remotely located computer
desktop via internet by another computer or
Smartphones. In proposed system we provide
access to those smart phones which are in our own
network.
 Still today there are few remote desktop server applications
available for handheld devices. This represents an opportunity
for developing client/server applications for such devices.
Future work should mainly focus on
improving performance, modifying existing remote desktop
server applications or creating new ones.
Providing discovery and multicasting for our devices would
enable users to quickly set up & automatically configuration a
wide range of devices.
 Remote desktop applications offer a reliable
solution for internetworking devices through the
Internet and especially via WLANs, even though
other physical channels, such as Bluetooth might
also be used. Remote desktop applications offer
the user the ability to control a very large number
of different applications. The most important
uses of this technology are troubleshooting,
showing presentations, and as presented
in this thesis - device aggregation.

More Related Content

Similar to remote desktop_control-by_shubhham_patel

HMI Mobility : An InduSoft Whitepaper
HMI Mobility : An InduSoft WhitepaperHMI Mobility : An InduSoft Whitepaper
HMI Mobility : An InduSoft Whitepaper
AVEVA
 
Fm3610071011
Fm3610071011Fm3610071011
Fm3610071011
IJERA Editor
 
Remote administration
Remote administrationRemote administration
Remote administration
Suja Ritha
 
The operating
The operatingThe operating
The operating
11jonesjordan
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoring
IAEME Publication
 
Pocket pc
Pocket pcPocket pc
Pocket pc
Aswanth x
 
Virtual network computing
Virtual network computingVirtual network computing
Virtual network computing
3608106
 
Virtual network computing
Virtual network computingVirtual network computing
Virtual network computing
3608106
 
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Tal Lavian Ph.D.
 
Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609
sidramuoio
 
Zenon The integrated solution
Zenon The integrated solutionZenon The integrated solution
Zenon The integrated solution
Copa-Data UK
 
Fingkey
FingkeyFingkey
Chapter3
Chapter3Chapter3
Chapter3
suks_87
 
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
elisasson
 
Fg b
Fg bFg b
Fg b
Taha Khan
 
Openscape Web Collaboration
Openscape Web CollaborationOpenscape Web Collaboration
Openscape Web Collaboration
Richard Common
 
The operating system
The operating systemThe operating system
The operating system
11jonesjordan
 
The operating system
The operating systemThe operating system
The operating system
11jonesjordan
 
The operating system
The operating systemThe operating system
The operating system
11jonesjordan
 
What is over-the-air programming
What is over-the-air programmingWhat is over-the-air programming
What is over-the-air programming
Sayed Abulhasan Quadri
 

Similar to remote desktop_control-by_shubhham_patel (20)

HMI Mobility : An InduSoft Whitepaper
HMI Mobility : An InduSoft WhitepaperHMI Mobility : An InduSoft Whitepaper
HMI Mobility : An InduSoft Whitepaper
 
Fm3610071011
Fm3610071011Fm3610071011
Fm3610071011
 
Remote administration
Remote administrationRemote administration
Remote administration
 
The operating
The operatingThe operating
The operating
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoring
 
Pocket pc
Pocket pcPocket pc
Pocket pc
 
Virtual network computing
Virtual network computingVirtual network computing
Virtual network computing
 
Virtual network computing
Virtual network computingVirtual network computing
Virtual network computing
 
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
 
Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609Presentation Hospital Kvm Solution 021609
Presentation Hospital Kvm Solution 021609
 
Zenon The integrated solution
Zenon The integrated solutionZenon The integrated solution
Zenon The integrated solution
 
Fingkey
FingkeyFingkey
Fingkey
 
Chapter3
Chapter3Chapter3
Chapter3
 
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
 
Fg b
Fg bFg b
Fg b
 
Openscape Web Collaboration
Openscape Web CollaborationOpenscape Web Collaboration
Openscape Web Collaboration
 
The operating system
The operating systemThe operating system
The operating system
 
The operating system
The operating systemThe operating system
The operating system
 
The operating system
The operating systemThe operating system
The operating system
 
What is over-the-air programming
What is over-the-air programmingWhat is over-the-air programming
What is over-the-air programming
 

Recently uploaded

Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
shivani5543
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 

Recently uploaded (20)

Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 

remote desktop_control-by_shubhham_patel

  • 1. REMOTE DESKTOP CONTROL BY SHUBHAM PATEL B.Tech –CSE (7th Semester) Batch-2013-2017 ALIGARH COLLEGE OF ENGINEERING AND TECHNOLOGY, ALIGARH (Approved by AICTE, New Delhi & Affiliated to Dr. A.P.J. Abdul Kalam Technical University,Lucknow)
  • 2.  Remote Desktop Controller is a client/server software package allowing remote network access to graphical desktop.  This software enables you to get a view of the remote machine desktop and thus control it with your local mouse and keyboard.  It can be used to perform remote system control and administration tasks in Unix, Windows and other assorted network environments.
  • 3.  Remote control software provides businesses the ability to login and access computers remotely. Utilizing remote control software enables personnel to transfer files or folders quickly and easily, and communicate by instant message, text chat, or voice intercom from any PC
  • 4. Processor Intel Pentium compatible or above RAM 4MB free space VDU VGA/SVGA Hard Disk 50 MB free space
  • 5. Operating System Windows 8 and above/ Linux Programming language Java2 ( JDK 1.2)
  • 6.  Remote Desktop Controller is a client -server software used for remote desktop access and controlling purposes. This software mainly runs as two parts, the one at the client side using which the user views the desktop of the system at the remote side acting as the server and controls it and the server side which allows it to be accessed and controlled by the client user. This software is basically divided into two module based on this purpose.
  • 7.  The Server module –  running on the remote system acting as the server system which allows itself to be accessed by the client user.  The Client module –  running on the client system through which the user accesses and controls the remote server system
  • 8.  EXISTING SYSTEM  The current existing system are potentially good systems, which do allow us to remotely connect to the remote machine and access their respective desktops. But most of the existing system are quite difficult to use and implemented for layman.  LIMITATION OF THE EXISTING SYSTEMS  The existing systems have the following limitation-  Remote desktop protocol (RDP) is a multi-channel protocol that allows a user to connect to a computer running Microsoft terminal sevice.  In most of the existing remote desktop controlling applications, the user working on the remote machine is aware with the fact that someone else is viewing his/her desktop remotely.  PROPOSED SYSTEM The New System Will Overcome All The Anomalies And limitation of existing system
  • 9.  It enables us to access computer anywhere within our network, it saves time It does cover more distance than Bluetooth. Conventional VNC System comprises accessing of remotely located computer desktop via internet by another computer or Smartphones. In proposed system we provide access to those smart phones which are in our own network.
  • 10.  Still today there are few remote desktop server applications available for handheld devices. This represents an opportunity for developing client/server applications for such devices. Future work should mainly focus on improving performance, modifying existing remote desktop server applications or creating new ones. Providing discovery and multicasting for our devices would enable users to quickly set up & automatically configuration a wide range of devices.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.  Remote desktop applications offer a reliable solution for internetworking devices through the Internet and especially via WLANs, even though other physical channels, such as Bluetooth might also be used. Remote desktop applications offer the user the ability to control a very large number of different applications. The most important uses of this technology are troubleshooting, showing presentations, and as presented in this thesis - device aggregation.