SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Sejal Patel et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.141-144

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Remote Control of Android Phones Using VNC
Sejal Patel*, Priyadarshani Raskar*, Pragati Badhe*, Prof. Archana Lomte**
*(JSPM’s BSIOTR (W), Department of Computer Engineering, Pune University, India
** (JSPM’s BSIOTR (W), Department of Computer Engineering, Pune University, India

ABSTRACT
Virtual Network Computing (VNC) is a graphical desktop sharing system to remotely control another computer.
It makes use of Remote Frame Buffer protocol which is a simple protocol for remote access to Graphical User
Interface. VNC allows users to access graphical displays quickly and easily. This paper proposes a new
architecture for remote control of android mobile devices which allows sharing of displays between android
mobile phone and PCs. This process must be carried out within Wi-Fi range irrespective of various platforms
like Windows, Mac or Linux. The image of the desktop should be compressed before transmission. A modified
region algorithm is used to reduce the encoding time of screen image and increase the screen update rate. A
number of video encoders are integrated into a prototype system.
Keywords – Android, Mobile Device, Remote Control, Virtual Network Computing, Wi-Fi.

I.

INTRODUCTION

Phones used to be all about making calls,
but introduction of smart phones has the capability of
performing much more functionalities. The range of
new touch screen smart phones allows user to access
the internet, use social media, get live news updates,
play music and video, and much more. These features
are same as the one which were previously provided
by computer system architecture. This system will be
implemented on android software system. VNC [1-4]
is platform independent. It consists of VNC client
and server for many GUI based operating system. It
is based on thin client architecture.VNC server can
handle multiple client at the same time.

file transfer between client and server. It can also
contribute to customer care services and any software
company. Some features of this application are
downloading and uploading files, installing
applications and starting applications etc.
Proposed architecture is provided in section
2. Section 3 describes about design of proposed
system. In section 4 different encoding techniques are
described. Section 5 focuses on system
implementation which gives information about RFB
protocol and region detection algorithm. Various
applications are given in section 6. Finally, section 7
concludes the paper.

II.

Fig. 1 Mobile VNC system
It uses Remote Frame Buffer (RFB) [6]
protocol for sharing a screen between distinct devices
as shown in Fig. 1. This should be done within Wi-Fi
network.
There are many applications available for
sharing the desktop between two or more PCs. This
paper focuses on accessing mobile device on remote
PC and control of android platform. It can be used for
www.ijera.com

PROPOSED ARCHITECTURE

With the development of android phones,
there is drastic improvement in the functionalities of
mobile phones. Many applications like Java games,
browsing web pages, read and write emails etc. can
now be easily performed on mobile phones. This
functionality has made us to propose the use of
mobile phones to remotely control computers.
Virtual Network Computing is a graphical
desktop sharing system that uses RFB protocol to
remotely control the display of another device. This
can be done via network. It is used to capture a
mouse and keyword events [5] of the remote device
for controlling functionality. It relays the graphical
screen updates back to the connected device. A VNC
system consists of a client, a server and a
communication protocol. The mobile device is used
as server that accepts the connections from different
clients. The client layer is used to interact between
the controlling equipment and monitored device.

141 | P a g e
Sejal Patel et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.141-144
III.

DESIGN OF PROPOSED SYSTEM

3.1 Remote visualization service
VNC server is responsible to share the
graphic information with the client layer. The VNC
service should be configured to make use of Tight
encoding. Because of this, the display will be smooth
even if the network is slow. The client makes request
to the server with connection parameters and
establishes a connection. The client layer requests the
server to show the device’s display. If the server does
not support the VNC system, a raw display can be
used as alternative.
3.2 Application management service
Application Management service is used for
centralized management of applications. The client
layer can access the information regarding the
applications and also modify it. This would make it
possible to perform software updates on all
monitored devices. For Example, the client can make
request to the server to install an application and the
server is responsible to install the application sent by
the client.
3.3 Service and process management service
At any instance of time the device may have
set of processes running. This task could make a bad
use of resources to complete its task. The server is
used to give information about these processes and
services. The client layer is responsible to manage
these processes and services.
3.4 File system management service
In computing, a file system is used to store
and retrieve the information. Most of the devices
require the exchange of files between different
systems. File system management service provides a
central location for sharing files between both
systems. Further the client can add files into the
device, for example to make some data available to
users or update the files. The server will allow the
client to update, add, perform any operations on file
or remove file.
3.5 Device status service
Device status service is used to check the status of a
device by providing the general information of the
device to the clients. This would help the control user
to determine the device that requires immediate
attention. For example, server could notify a client
about a problem.

IV.

ENCODING STUDY

RFB is a simple protocol for remote access
to Graphical User Interface. It is applicable to all
windowing systems and applications as it works at
frame buffer level. The RFB protocol can operate
www.ijera.com

www.ijera.com

over any reliable transport, either byte stream or
message based. The RFB protocol works by
responding to the request from client about specific
onscreen rectangle and then server responds in the
form of the update consisting of an encoding or the
difference between the moment of the request and the
last time the client requested data about this rectangle
[7]. There is high consumption of bandwidth and
consequent delay in the process for sending
information. In order to overcome this problem,
different encoding techniques have been developed.
The data will be sent in the form of rectangle of
pixels. Every rectangle of pixel data is prefixed by a
header which provides the position of rectangle on
the screen, the width and height of the rectangle and
type of encoding used. This encoding type gives
detail about the encoding of pixel data. The data then
follows using specified encoding. These encoding
techniques specify the way to transfer the graphical
information. When the client wants to communicate
with server, both sides must agree upon the encoding
type to be used. If the client requires an encoding
which is non-existent, the server will appropriate the
next encoding available.
There are five basic types of VNC encoding
techniques used such as RAW, RRE, Hextile, Zlib
and Tight.
4.1 RAW
The simplest encoding type is RAW
encoding. In this encoding, the data consist of width
and height pixel value. The server sends all graphical
pixel to the client in the form of width*height pixel
values (where width and height are the width and
height of rectangle). The values represent each pixel
in left-to-right scan line order. All RFB clients must
support this encoding method. The process time used
is minimal and the performance is very high when the
server and the client are on the same machine. The
performance is reduced if the client is hosted in a
remote device due to the transfer of large amount of
data.
4.2 RRE
RRE stands for Rise and Run-length
encoding. It consists of grouping consecutive
identical pixel in order to send only the information
of one pixel and the number of replications of that
pixel. RRE encoded rectangles arrive at client in a
form which can be rendered immediately and
effectively by the simplest of graphics engine. The
main idea behind RRE is the partitioning of rectangle
of pixel data into rectangular sub-regions each of
which consists of pixel of single value and the union
of which compromises the original rectangular
region. It is used when large blocks of same color
exists.
142 | P a g e
Sejal Patel et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.141-144
4.3 Hextile
Hextile is a variation of RRE. Hextile
divides the rectangle into 16*16 tiles. It allows the
dimensions of the sub-rectangles to be specified in 4
bits each, 16 bits in total. The rectangle is split into
tiles starting at the top left going in left to right, top to
bottom order. The width of last tile in each row will
be correspondingly smaller if the width of the whole
rectangle is not an exact multiple of 16. Similarly, if
the height of the whole rectangle is not an exact
multiple of 16 then the height of each tile in the final
row will also be smaller.
4.4 Zlib
Zlib is an encoding technique which is used
to compress the information in order to reduce the
size of the package as much as possible. The main
disadvantage of this is that it requires more amount of
CPU processing. This method is used when the VNC
server does not work with the Tight encoding.
4.5 Tight
Tight encoding is a combination of the
JPEG and Zlib compression mechanisms. It
preprocesses the data to maximize the compression
ratio and minimize CPU consumption. This method
is also effective for slow network.

V.

SYSTEM IMPLEMENTATION

The prototype system is built on mobile
operating system platform. This has been popularly
used for mobile devices like smart phones, tablet
PC’s. It consist of VNC server and VNC clients. The
server and client are connected using TCP/IP
connection over Wi-Fi network.
5.1 RFB Protocol Procedure

www.ijera.com

by exchanging security message. The next phase is
initialization phase. When server receives the
clientInit message from client it sends the serverInit
message. This message informs the client about the
width and height of the server’s frame buffer. It also
gives information about its pixel format and device
name. The last phase is normal protocol interaction.
The client sends the server messages such as
SetPixelFormat and SetEncoding messages. Various
encoding methods are used which comprise of RAW,
RRE, Hextile, Zlib, and Tight. After agreeing upon
encoding
methods
the
client
sends
FramebufferUpdateRequset message to the server.
The server sends its screen to the client only when it
receives update message from the client.
5.2 Region detection algorithm
To detect the modified regions the precise prediction
of modified pixel location is very important in order
to reduce the time. For this, we hierarchically
determine the pixel location for comparison. This can
be achieved using the algorithm as described below
5.2.1 Hierarchical region detection algorithm
In this algorithm, the unit rectangle is downsampled by a factor of 4 in both horizontal and
vertical direction. Then pixel comparison is done in a
raster scan order. If a modified pixel is detected then
the corresponding unit block is a code block,
otherwise the unit rectangle is down-sampled by a
factor of 2 and again the pixels are compared. If a
modified pixel is detected then the unit rectangle is a
code block. Otherwise the remaining pixels are
compared in the same way as mentioned above. If no
modified pixel is determined, the corresponding unit
rectangle is determined as a skip block.
VI.
APPLICATIONS
VNC is reliable software for remote
assistance, administration, remote desktop sharing
and IT help desk. It can also be used in distance
education from any place in the world. VNC
connected users can chat with other users connected
at the same time, or with a host computer user. It also
enables connected users to transfer files in either
direction or also share with other users connected at
the same time. VNC also finds its applications in
customer care service.

Fig. 2 The RFB protocol procedures of VNC system
RFB [6] is used to remotely access graphical
user interface. The RFB protocol is divided into 3
phases as illustrated in Fig. 2. When the server and
client establish the connection, the server sends the
protocol version message to the client. This is called
handshaking phase. They agree upon security types
www.ijera.com

VII.
CONCLUSION
This application is developed to perform
remote control of android device. It is used to
enhance remote desktop in terms of screen sharing
and file transfer. This is done using RFB protocol.
The region detection algorithm is used to
consequently increase screen updates at client. With

143 | P a g e
Sejal Patel et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.141-144

www.ijera.com

the increase in the use of android, this system will be
developed for tablets and other handheld devices.

REFERENCES
[1]

[2]

[3]

[4]

[5]

[6]
[7]

T. Richardson, Q. Stafford-Fraser, K. Wood,
and
A. Hopper, “Virtual network
computing”, IEEE Internet Computing, vol.
2, no. 1, pp. 33-38, Jan./Feb.1998.
P. M. Corocoran, F. Papal, and A. Zoldi,
“User interface technologies for home
appliances and networks”, IEEE Trans.
Consumer Electron, vol. 44, no. 3, pp. 679685, Aug 1998.
K. Tsunashima, T. Shida, H. Kawano, T.
Sato,
and
H.
Kosaka,
“Compact
programmable network display system for
portable projectors” IEEE Trans. Consumer
Electron, vol. 55, no. 2,pp. 312-315, May
2009.
D. Thommes, Q. Wang, A. Gerlicher, and C.
Grecos, “Remote UI: A high performance
remote user interface system for mobile
consumer electronics devices” Proc. Of
IEEE
International
Conference
on
Consumer Electronics (ICCE 2012), pp.
670-671, Jan 2012.
Adam, Skurski, Bartlomiej Swiercz, “VNCbased Remote Control for Symbian OS
smartphones”, MIXDES (Mixed Design of
Integrated Circuits and Systems) 2009, June
25-27, 2009.
T. Richardson, “The RFB Protocol”, Tech.
rep., Real VNC Ltd, 2007.
Cynthia
Taylor,
Joseph
Pasquale,
“Improving Video Performance In VNC
Under
High
Latency
Conditions”,
Collaborative
Technologies
and
Systems(CTS),
2010
International
Symposium on, 17-21 May 2010, pp.26-35.

www.ijera.com

144 | P a g e

Mais conteúdo relacionado

Mais procurados

Practical DNP3, 60870.5 & Modern SCADA Communication Systems
Practical DNP3, 60870.5 & Modern SCADA Communication SystemsPractical DNP3, 60870.5 & Modern SCADA Communication Systems
Practical DNP3, 60870.5 & Modern SCADA Communication Systems
Living Online
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
Anitha Selvan
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
ijwmn
 
Distributed Computing Report
Distributed Computing ReportDistributed Computing Report
Distributed Computing Report
IIT Kharagpur
 

Mais procurados (19)

Practical DNP3, 60870.5 & Modern SCADA Communication Systems
Practical DNP3, 60870.5 & Modern SCADA Communication SystemsPractical DNP3, 60870.5 & Modern SCADA Communication Systems
Practical DNP3, 60870.5 & Modern SCADA Communication Systems
 
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformEnergy Meters using Internet of Things Platform
Energy Meters using Internet of Things Platform
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Data diode
Data diode Data diode
Data diode
 
J010216776
J010216776J010216776
J010216776
 
Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...
 
02 network models
02  network models02  network models
02 network models
 
Network assignment on project design
Network assignment on project designNetwork assignment on project design
Network assignment on project design
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
 
Domain 4 - Communications and Network Security
Domain 4  - Communications and Network SecurityDomain 4  - Communications and Network Security
Domain 4 - Communications and Network Security
 
Security Threats at OSI layers
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layers
 
Computer network physical layer
Computer network  physical layerComputer network  physical layer
Computer network physical layer
 
Mcq for final
Mcq for finalMcq for final
Mcq for final
 
Introduction to distributed system
Introduction to distributed systemIntroduction to distributed system
Introduction to distributed system
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
 
Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...
 
lecture 2.pptx
lecture 2.pptxlecture 2.pptx
lecture 2.pptx
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
Distributed Computing Report
Distributed Computing ReportDistributed Computing Report
Distributed Computing Report
 

Semelhante a X4103141144

Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
Editor IJARCET
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
Editor IJARCET
 
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
Editor IJCATR
 
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
Editor IJCATR
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
IJARIIT
 

Semelhante a X4103141144 (20)

J365963
J365963J365963
J365963
 
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
 
Fm3610071011
Fm3610071011Fm3610071011
Fm3610071011
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control System
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control System
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
 
I44084954
I44084954I44084954
I44084954
 
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
 
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
 
Ak4103212215
Ak4103212215Ak4103212215
Ak4103212215
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
mumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphonesmumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphones
 
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
 
An approach of software engineering through middleware
An approach of software engineering through middlewareAn approach of software engineering through middleware
An approach of software engineering through middleware
 
L010527175
L010527175L010527175
L010527175
 
Ku3419461949
Ku3419461949Ku3419461949
Ku3419461949
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

X4103141144

  • 1. Sejal Patel et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.141-144 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Remote Control of Android Phones Using VNC Sejal Patel*, Priyadarshani Raskar*, Pragati Badhe*, Prof. Archana Lomte** *(JSPM’s BSIOTR (W), Department of Computer Engineering, Pune University, India ** (JSPM’s BSIOTR (W), Department of Computer Engineering, Pune University, India ABSTRACT Virtual Network Computing (VNC) is a graphical desktop sharing system to remotely control another computer. It makes use of Remote Frame Buffer protocol which is a simple protocol for remote access to Graphical User Interface. VNC allows users to access graphical displays quickly and easily. This paper proposes a new architecture for remote control of android mobile devices which allows sharing of displays between android mobile phone and PCs. This process must be carried out within Wi-Fi range irrespective of various platforms like Windows, Mac or Linux. The image of the desktop should be compressed before transmission. A modified region algorithm is used to reduce the encoding time of screen image and increase the screen update rate. A number of video encoders are integrated into a prototype system. Keywords – Android, Mobile Device, Remote Control, Virtual Network Computing, Wi-Fi. I. INTRODUCTION Phones used to be all about making calls, but introduction of smart phones has the capability of performing much more functionalities. The range of new touch screen smart phones allows user to access the internet, use social media, get live news updates, play music and video, and much more. These features are same as the one which were previously provided by computer system architecture. This system will be implemented on android software system. VNC [1-4] is platform independent. It consists of VNC client and server for many GUI based operating system. It is based on thin client architecture.VNC server can handle multiple client at the same time. file transfer between client and server. It can also contribute to customer care services and any software company. Some features of this application are downloading and uploading files, installing applications and starting applications etc. Proposed architecture is provided in section 2. Section 3 describes about design of proposed system. In section 4 different encoding techniques are described. Section 5 focuses on system implementation which gives information about RFB protocol and region detection algorithm. Various applications are given in section 6. Finally, section 7 concludes the paper. II. Fig. 1 Mobile VNC system It uses Remote Frame Buffer (RFB) [6] protocol for sharing a screen between distinct devices as shown in Fig. 1. This should be done within Wi-Fi network. There are many applications available for sharing the desktop between two or more PCs. This paper focuses on accessing mobile device on remote PC and control of android platform. It can be used for www.ijera.com PROPOSED ARCHITECTURE With the development of android phones, there is drastic improvement in the functionalities of mobile phones. Many applications like Java games, browsing web pages, read and write emails etc. can now be easily performed on mobile phones. This functionality has made us to propose the use of mobile phones to remotely control computers. Virtual Network Computing is a graphical desktop sharing system that uses RFB protocol to remotely control the display of another device. This can be done via network. It is used to capture a mouse and keyword events [5] of the remote device for controlling functionality. It relays the graphical screen updates back to the connected device. A VNC system consists of a client, a server and a communication protocol. The mobile device is used as server that accepts the connections from different clients. The client layer is used to interact between the controlling equipment and monitored device. 141 | P a g e
  • 2. Sejal Patel et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.141-144 III. DESIGN OF PROPOSED SYSTEM 3.1 Remote visualization service VNC server is responsible to share the graphic information with the client layer. The VNC service should be configured to make use of Tight encoding. Because of this, the display will be smooth even if the network is slow. The client makes request to the server with connection parameters and establishes a connection. The client layer requests the server to show the device’s display. If the server does not support the VNC system, a raw display can be used as alternative. 3.2 Application management service Application Management service is used for centralized management of applications. The client layer can access the information regarding the applications and also modify it. This would make it possible to perform software updates on all monitored devices. For Example, the client can make request to the server to install an application and the server is responsible to install the application sent by the client. 3.3 Service and process management service At any instance of time the device may have set of processes running. This task could make a bad use of resources to complete its task. The server is used to give information about these processes and services. The client layer is responsible to manage these processes and services. 3.4 File system management service In computing, a file system is used to store and retrieve the information. Most of the devices require the exchange of files between different systems. File system management service provides a central location for sharing files between both systems. Further the client can add files into the device, for example to make some data available to users or update the files. The server will allow the client to update, add, perform any operations on file or remove file. 3.5 Device status service Device status service is used to check the status of a device by providing the general information of the device to the clients. This would help the control user to determine the device that requires immediate attention. For example, server could notify a client about a problem. IV. ENCODING STUDY RFB is a simple protocol for remote access to Graphical User Interface. It is applicable to all windowing systems and applications as it works at frame buffer level. The RFB protocol can operate www.ijera.com www.ijera.com over any reliable transport, either byte stream or message based. The RFB protocol works by responding to the request from client about specific onscreen rectangle and then server responds in the form of the update consisting of an encoding or the difference between the moment of the request and the last time the client requested data about this rectangle [7]. There is high consumption of bandwidth and consequent delay in the process for sending information. In order to overcome this problem, different encoding techniques have been developed. The data will be sent in the form of rectangle of pixels. Every rectangle of pixel data is prefixed by a header which provides the position of rectangle on the screen, the width and height of the rectangle and type of encoding used. This encoding type gives detail about the encoding of pixel data. The data then follows using specified encoding. These encoding techniques specify the way to transfer the graphical information. When the client wants to communicate with server, both sides must agree upon the encoding type to be used. If the client requires an encoding which is non-existent, the server will appropriate the next encoding available. There are five basic types of VNC encoding techniques used such as RAW, RRE, Hextile, Zlib and Tight. 4.1 RAW The simplest encoding type is RAW encoding. In this encoding, the data consist of width and height pixel value. The server sends all graphical pixel to the client in the form of width*height pixel values (where width and height are the width and height of rectangle). The values represent each pixel in left-to-right scan line order. All RFB clients must support this encoding method. The process time used is minimal and the performance is very high when the server and the client are on the same machine. The performance is reduced if the client is hosted in a remote device due to the transfer of large amount of data. 4.2 RRE RRE stands for Rise and Run-length encoding. It consists of grouping consecutive identical pixel in order to send only the information of one pixel and the number of replications of that pixel. RRE encoded rectangles arrive at client in a form which can be rendered immediately and effectively by the simplest of graphics engine. The main idea behind RRE is the partitioning of rectangle of pixel data into rectangular sub-regions each of which consists of pixel of single value and the union of which compromises the original rectangular region. It is used when large blocks of same color exists. 142 | P a g e
  • 3. Sejal Patel et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.141-144 4.3 Hextile Hextile is a variation of RRE. Hextile divides the rectangle into 16*16 tiles. It allows the dimensions of the sub-rectangles to be specified in 4 bits each, 16 bits in total. The rectangle is split into tiles starting at the top left going in left to right, top to bottom order. The width of last tile in each row will be correspondingly smaller if the width of the whole rectangle is not an exact multiple of 16. Similarly, if the height of the whole rectangle is not an exact multiple of 16 then the height of each tile in the final row will also be smaller. 4.4 Zlib Zlib is an encoding technique which is used to compress the information in order to reduce the size of the package as much as possible. The main disadvantage of this is that it requires more amount of CPU processing. This method is used when the VNC server does not work with the Tight encoding. 4.5 Tight Tight encoding is a combination of the JPEG and Zlib compression mechanisms. It preprocesses the data to maximize the compression ratio and minimize CPU consumption. This method is also effective for slow network. V. SYSTEM IMPLEMENTATION The prototype system is built on mobile operating system platform. This has been popularly used for mobile devices like smart phones, tablet PC’s. It consist of VNC server and VNC clients. The server and client are connected using TCP/IP connection over Wi-Fi network. 5.1 RFB Protocol Procedure www.ijera.com by exchanging security message. The next phase is initialization phase. When server receives the clientInit message from client it sends the serverInit message. This message informs the client about the width and height of the server’s frame buffer. It also gives information about its pixel format and device name. The last phase is normal protocol interaction. The client sends the server messages such as SetPixelFormat and SetEncoding messages. Various encoding methods are used which comprise of RAW, RRE, Hextile, Zlib, and Tight. After agreeing upon encoding methods the client sends FramebufferUpdateRequset message to the server. The server sends its screen to the client only when it receives update message from the client. 5.2 Region detection algorithm To detect the modified regions the precise prediction of modified pixel location is very important in order to reduce the time. For this, we hierarchically determine the pixel location for comparison. This can be achieved using the algorithm as described below 5.2.1 Hierarchical region detection algorithm In this algorithm, the unit rectangle is downsampled by a factor of 4 in both horizontal and vertical direction. Then pixel comparison is done in a raster scan order. If a modified pixel is detected then the corresponding unit block is a code block, otherwise the unit rectangle is down-sampled by a factor of 2 and again the pixels are compared. If a modified pixel is detected then the unit rectangle is a code block. Otherwise the remaining pixels are compared in the same way as mentioned above. If no modified pixel is determined, the corresponding unit rectangle is determined as a skip block. VI. APPLICATIONS VNC is reliable software for remote assistance, administration, remote desktop sharing and IT help desk. It can also be used in distance education from any place in the world. VNC connected users can chat with other users connected at the same time, or with a host computer user. It also enables connected users to transfer files in either direction or also share with other users connected at the same time. VNC also finds its applications in customer care service. Fig. 2 The RFB protocol procedures of VNC system RFB [6] is used to remotely access graphical user interface. The RFB protocol is divided into 3 phases as illustrated in Fig. 2. When the server and client establish the connection, the server sends the protocol version message to the client. This is called handshaking phase. They agree upon security types www.ijera.com VII. CONCLUSION This application is developed to perform remote control of android device. It is used to enhance remote desktop in terms of screen sharing and file transfer. This is done using RFB protocol. The region detection algorithm is used to consequently increase screen updates at client. With 143 | P a g e
  • 4. Sejal Patel et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.141-144 www.ijera.com the increase in the use of android, this system will be developed for tablets and other handheld devices. REFERENCES [1] [2] [3] [4] [5] [6] [7] T. Richardson, Q. Stafford-Fraser, K. Wood, and A. Hopper, “Virtual network computing”, IEEE Internet Computing, vol. 2, no. 1, pp. 33-38, Jan./Feb.1998. P. M. Corocoran, F. Papal, and A. Zoldi, “User interface technologies for home appliances and networks”, IEEE Trans. Consumer Electron, vol. 44, no. 3, pp. 679685, Aug 1998. K. Tsunashima, T. Shida, H. Kawano, T. Sato, and H. Kosaka, “Compact programmable network display system for portable projectors” IEEE Trans. Consumer Electron, vol. 55, no. 2,pp. 312-315, May 2009. D. Thommes, Q. Wang, A. Gerlicher, and C. Grecos, “Remote UI: A high performance remote user interface system for mobile consumer electronics devices” Proc. Of IEEE International Conference on Consumer Electronics (ICCE 2012), pp. 670-671, Jan 2012. Adam, Skurski, Bartlomiej Swiercz, “VNCbased Remote Control for Symbian OS smartphones”, MIXDES (Mixed Design of Integrated Circuits and Systems) 2009, June 25-27, 2009. T. Richardson, “The RFB Protocol”, Tech. rep., Real VNC Ltd, 2007. Cynthia Taylor, Joseph Pasquale, “Improving Video Performance In VNC Under High Latency Conditions”, Collaborative Technologies and Systems(CTS), 2010 International Symposium on, 17-21 May 2010, pp.26-35. www.ijera.com 144 | P a g e