Abstracter

Remote PC Controlling System is an attempt to make remote access of any PC convenient and faster. It has hardware & software components both connected to PC. The function of this Remote PC Control System is to facilitate the applications such as shut down, rebooting, modifying services and accessing peripherals etc from a remote location via E-mail.

 

Remote Administration refers to any method of controlling a computer from a remote location. It may refer to a computer in the next room or the one on the other side of the world. It is used when it is difficult or impossible to be present physically near the system.

 

Applications in which remote administration can be used are:

1. Shutdown: Shutting down or rebooting another computer over a network,

2. Modifying: Editing another computer's registry settings, modifying system service, installing software on another machine, modifying logical groups, etc....

3. Accessing Peripherals: Using a network device like printer, retrieving data from a stream like CCTV system.

4. Viewing: Remotely assisting others, supervising computer or Internet usage.

 

Currently our system will provide facility to shutdown the PC from any remote location.

 

Already there is an existing system for this application with the following requirements:

1. Any computer with an Internet connection, TCP/IP or on a Local Area Network can be remotely administered.

2. The user/ server must install server software on the host system and then the user/client can access the host system from another computer using the installed software.

3. Remote administration is less practical if the host uses a dial-up modem, which is not constantly online and often has a Dynamic IP.

.

 

 

Problems in existing system are:                          

1. Time consuming:  It has to be done by a workgroup or internal member of the network, and then only it is possible to access the systems.

2. Space consuming:  It will take so much network space for the transfer of small commands.

3. Requires more Services: We need to access the different services of the network like FTP, TELNET etc.

 

The proposed solution to overcome the problems of existing system is to design a control system for PC. We can control our PC through a remote mobile via E-mail. We could run as many commands through this service. Our system reads E-mail automatically.

 

The technologies used are VISUAL BASICS and outlook.

Introduction

 

1.1. PROBLEM STATEMENT

We can control our PC through the Mouse, Keyboard but if we want to connect/ control PC via mobile Phone we can do the same using this software. Some times we wish that we could control PC with our mobile phones. So we designed software to control PC with mobile phone.

 

We can control PC operations like shutting down, sending mails, sending files etc. from any location of this universe using our mobile phones with lesser cost.

 

1.2. AIM

The proposed project is aimed towards developing a remote PC control system with the aid of hardware & software components connected to PC.

 

1.3. DOCUMENT CONVENTIONS

Following are the important conventions which we have considered for preparing this document:

Font - TIMES NEW ROMAN

Font size:

For heading – “16” & “14”

For paragraph – “12”

      GLOSSARY OF ACRONYMS

ADO:                ActiveX Direct Object

DFD:                 Data Flow Diagram.

ER:                    Entity-Relationship.

GUI:                  Graphical User Interface.

MSG:                 Message

MSP:                  Mobile service provide

Histroy

2.1. STUDY OF CURRENT SYSTEM

Any computer with an Internet connection, TCP/IP or on a Local Area Network can be remotely administered. The user/ server must install server software on the host system. The user/client can access the host system from another computer using the installed software.

Remote administration is less practical if the host uses a dial-up modem, which is not constantly online and often has a Dynamic IP. When the client connects to the host computer, a window showing the Desktop of the host usually appears. The client may then control the host as if he/she were sitting right in front of it.

Certain versions of Windows XP have a built-in remote administration package called Remote Desktop Connection. A free cross-platform alternative is VNC, which offers similar functionality.

2.2. PROPOSED SYSTEM

The Objective to create this system is an attempt to make to solve the common problem of remote controlling by remote areas. Problems in existing system are:

 

  • Time consuming:  It has to be done by a workgroup or internal member of the network, and then only it is possible to access the systems.
  • Space consuming:  It will take so much network space for the transfer of small commands.
  • Requires more Services: We need to access the different services of the network like FTP, TELNET.

 

The proposed solution is to overcome the problems of existing system. We have designed a control system for PC. We can control our PC through a remote mobile via SMS. We could run as many commands through SMS service. Our system reads SMS automatically.

 

The objective to create this application:

  • We can control our PC through a remote mobile.
  • Control via E-mail.
  • Run Many Commands through E-mail service.
  • Read E-mail by the system automatically.

Controlling cost is less.

Requirement Analysis

3.1. IDENTIFY THE PROBLEM

Sometimes the situations occur as u need to leave our personal computer switched on. In such a situation after sometime we need to shutdown our PC. This made the requirement to design our project for remotely controlling our PC. Other solutions existed for remotely controlling but had some or the other disadvantages. Thus we researched for a simple and effective method for controlling our PC from a remote location. Our project needs to configure Outlook accordingly and run the VB application.

 

3.2. SCOPE OF THE PROBLEM

The importance of security of the data stored in the PC is increasing as with the increase in networking. We are always interested in securing our data. But what about securing data when we need to keep our PC on for some purpose such as downloading and need to leave for other tasks. This system is to provide the remote PC controlling system. The additional function of this system is to authenticate the E-mail ID which demands shut down of the PC.

 

3.3. Requirement SPECIFICATION

Requirement Analysis includes the following activities:

Requirement Investigation:

Using a variety of tools and skills i.e. various fact-finding techniques, requirements, requirement investigation was carried out and the resultant features documented for further analysis.

The following fact finding techniques were used:

  • Interviews:  Unstructured interview methods was used which included a question and answer format to acquire information about the system, the respondent being the users of the proposed system thus, the facts about the actual requirements and the expected results etc, were gathered.
  • Observation: Because we have to design a Remote Control System via Mobile                                       System so we choose Microsoft Visual Basic, because Microsoft Visual Basic has the complete tools and information use to design the System.
  • Requirement specification:  The description of features for a new system was carried out in the following three interrelated parts:

Analysis of factual data:

 The data collected during the fact-finding study was examined thoroughly to                  determine whether the new system would fulfill the demands we required.

Identification of essential requirements:

  • How the present system works
  • How they represent their data to the external users

 OTHER NONFUNCTIONAL REQUIREMENTS

1. PERFORMANCE REQUIREMENTS

Performance by a system must be matched up to such an order that the proper functionality of the system must be at its par. So that the quality attained by our system must be fine enough for its efficient performance. So the requirements for our performance to be matched to the top notch will be effectively fulfilled by us.

2. SAFETY REQUIREMENTS

·      Power Supply: Power supply because our system needs a continuous 24*7 power supply. As the computer is required & so the continuous power supply.

·      Mobile Connectivity: Mobile should always be connected to the PC.

·      PC Suite: The PC suite should there be in our PC which is compatible with the mobile handset connected to the PC.

·      Outlook and Visual basic.

·      Mobile should always be charged.

 

 

 

3.4 IDENTIFY STAKE HOLDERS

The stake holders are the programmers, who made the project and the clients, who will purchase and use the application.

3.5. FEASIBILITY STUDY

  After having studied the requirement it is found that:

1. Time feasibility.

Another big constraint in developing a system is time required to complete the system. But we analyzed properly & decided to work in group. Each member has its own task & owns responsibility of completing that task on time; we had made our system time feasible.

2. Technical Feasibility

 The computerized system has hardware requirement. The system is to be multi user Windows environment and can be easily operated upon PC with minimum of peripherals; beside other I/O devises it includes Mouse and speakers etc. These H/W and S/W can easily acquire in the home.

3. Economic feasibility.

Economic feasibility is one of the important studies for developing any system. Security of the information stored is a costlier issue. For having an efficient Remote Control System good investment is needed in hardware. Our system is much cheaper than those, currently available in market.

4. Operational Feasibility

The Remote PC Shutdown System intends to keep in step with the advantages of information technologies and is aware of the computerized system and is willing to computerize the security of the computer so as to provide quick and reliable services to its owner.

5. Legal Feasibility

The Remote PC Shutdown System is completely legal as to it checks for the logged on user and authenticates with the help of user id and thus the owner of the PC can only avail the facility.

6. Social Feasibility

The Remote PC Shutdown System is socially feasible as it avails us the facility to secure our data in our PC without disturbing our any social relationships

OBJECT ORIENTED ANALYSIS

SCENARIO BASED MODELLING

Use Case Diagram (Requirement & Planning stage):

A use case diagram is a graphical representation of the relationship between actor and use case.

There are two main components in use case diagram:


Actor: An actor represents a user or another system that will interact with the system you are modeling.

Use Case:A use case is a set of scenarios that describing an interaction between a user and a system.

 

Use Case diagram illustrates the functions that are needed to be performed by the user to run the application. It is required to install Outlook and to configure it to import the message (sent by the user) to change it into the required format so that it is executed by the  listener.

 

ACTIVITY DIAGRAM

 

Activity diagrams describe the workflow behavior of a system.  Activity diagrams are similar to state diagrams because activities are the state of doing something

The first activity is to prepare a message to be sent to the PC, desired to be controlled.

When message reaches the Mail Inbox it is imported by the Outlook. Now application listener automatically reads header, if the user is authenticated, it executes the command

SWIMLANE DIAGRAM

A Swim Lane Diagram is a type of Flowchart, and it can be used to display the same type of information. What makes a Swim Lane Diagram unique is that the Flowchart objects are kept in lanes (that is, columns), grouping them together

. The swim lane layout rearranges the elements in a process diagram into a set of rows called swim lanes.


Swimlane diagram distinguishes the activities on the client side and the application side. The client or the user sends the message to invoke the required application with the mobile. The mobile service provider forwards this message to Outlook which converts it into data format after authentication and listener executes the command.

4.2. FLOW ORIENTED MODELLING

Data Flow Diagrams (DFDs)

 

Data flow diagrams illustrate how data is processed by a system in terms of inputs and outputs.


Data Flow diagram illustrates the flow of data on the whole. The message sent by the user to the computer is imported by the Outlook which converts it into the required format after authentication is done. This command is then forwarded to the API by the listener and thus command gets executed.



5.1. PROCESS MODEL


 

The E-mail received by the system from the sender through any mobile or any website is captured by the outlook.

The message received by the by the Outlook, which is configured by making some necessary changes in the registry files. It is configured to check any E-mail and read it.

The sender of the E-mail is authenticated at this stage. The details of the E-mail stored in the Outlook are used to check the sender’s ID. The ID should be one of those which are privileged to shut down the PC so as to make sure that the command is not accepted from any unknown no. If authentication is not carried out then it may lead to undesired results.

 

The application is so designed so that it can process only authenticated messages. The message, saved as the mail is treated as a text command and is then forwarded to the Listener.

Listener executes the command provided by the Application Programming Interface (API).

i.e. Outlook in this software.

Technology survey

1. VISUAL BASIC


A programming language and environment developed by Microsoft. Based on the BASIC language, Visual Basic was one of the first products to provide a graphical programming environment and a paint metaphor for developing user interfaces. Instead of worrying about syntax details, the Visual Basic programmer can add a substantial amount of code simply by dragging and dropping controls, such as buttons and dialog boxes, and then defining their appearance and behavior. Although not a true object-oriented programming language in the strictest sense, Visual Basic nevertheless has an object-oriented philosophy. It is sometimes called an event-driven language because each object can react to different events such as a mouse click. Since its launch in 1990, the Visual Basic approach has become the norm for programming languages. Now there are visual environments for many programming languages, including C, C++, Pascal, and Java. Visual Basic is sometimes called a Rapid Application Development (RAD) system because it enables programmers to quickly build prototype applications. Visual Basic is Microsoft's first programming technology and it's still one of the mainstream products used by Microsoft programmers. Systems from home recipe files to core business applications are written in Visual Basic. Find the fundamental information you need for coding VB statements and syntax, as well as general interest articles and diversions.

Advanced Tools

Visual Basic is a core technology that includes all the latest Microsoft technologies.

· ByVal and ByRef: Passing Arguments in Visual Basic

· Partial Classes in Visual Basic .NET 2005

· Visual Basic Compiler Directives

· Regular Expressions in VB.NET

· Compiling Regular Expressions

· Using Regular Expressions in ASP.NET

Visual Basic has the following traits which differ from C-derived languages:

· Multiple assignments available in C language is not possible. A = B = C does not imply that the values of A, B and C are equaled. The Boolean result of "Is B = C?" is stored in A. The result stored in A could therefore be false(0) or true(-1)

· Boolean constant True has numeric value −1.[3] This is because the Boolean data type is stored as a 16-bit signed integer. In this construct −1 evaluates to 16 binary 1s (the Boolean value True), and 0 as 16 0s (the Boolean value False). This is apparent when performing a Not operation on a 16 bit signed integer value 0 which will return the integer value −1, in other words True = Not False. This inherent functionality becomes especially useful when performing logical operations on the individual bits of an integer such as And, Or, Xor and Not. This definition of True is also consistent with BASIC since the early 1970s Microsoft BASIC implementation and is also related to the characteristics of CPU instructions at the time.

· Logical and bitwise operators are unified. This is unlike some C-derived languages (such as Perl), which have separate logical and bitwise operators. This again is a traditional feature of BASIC.

· Variable array base. Arrays are declared by specifying the upper and lower bounds in a way similar to Pascal and FORTRAN. It is also possible to use the Option Base statement to set the default lower bound. Use of the Option Base statement can lead to confusion when reading Visual Basic code and is best avoided by always explicitly specifying the lower bound of the array. This lower bound is not limited to 0 or 1, because it can also be set by declaration. In this way, both the lower and upper bounds are programmable. In more subscript-limited languages, the lower bound of the array is not variable. This uncommon trait does exist in Visual Basic .NET but not in VBScript.

OPTION BASE was introduced by ANSI, with the standard for ANSI Minimal BASIC in the late 1970s.

· Relatively strong integration with the Windows operating system and the Component Object Model.

· Banker's rounding as the default behavior when converting real numbers to integers with the Round function.

· Integers are automatically promoted to real in expressions involving the normal division operator (/) so that division of an odd integer by an even integer produces the intuitively correct result. There is a specific integer divide operator (\) which does truncate.

· By default, if a variable has not been declared or if no type declaration character is specified, the variable is of type Variant. However this can be changed with Deftype statements such as DefInt, DefBool, DefVar, DefObj, DefStr. There are 12 Deftype statements in total offered by Visual Basic 6.0. The default type may be overridden for a specific declaration by using a special suffix character on the variable name (# for Double, ! for Single, & for Long, % for Integer, $ for String, and @ for Currency) or using the key phrase As (type). VB can also be set in a mode that only explicitly declared variables can be used with the command Option Explicit.

2. OUTLOOK


Microsoft Outlook, formerly Microsoft Office Outlook, is a personal information manager from Microsoft. The 2007 version is available both as a separate application as well as a part of the Microsoft Office suite. The current versions are Microsoft Office Outlook 2007 for Windows and in late 2009, Microsoft released the beta version of Microsoft Outlook 2010.It can be used as a stand-alone application, or can work with Microsoft Exchange Server and Microsoft Office SharePoint Server for multiple users in an organization, such as shared mailboxes and calendars, Exchange public folders, SharePoint lists and meeting schedules. There are third-party add-on applications that integrate Outlook with devices such as BlackBerry mobile phones and with other software like Office & Skype internet communication. Developers can also create their own custom software that works with Outlook and Office components using Microsoft Visual Studio.[1] In addition, Windows Mobile devices can synchronize almost all Outlook data to Outlook Mobilbile.

Internet standards compliance

HTML rendering: Outlook 2007 was the first Outlook to switch from Internet Explorer HTML rendering to Microsoft Word 2007 HTML rendering. This means HTML and CSS items not handled by Word are no longer supported. On the other hand, HTML messages composed in Word will look more or less as they appeared to the author. This most affects those publishing newsletters, because they frequently use intricate HTML and/or CSS to form their layout. For example, forms can no longer be embedded in e-mail.

Transport Neutral Encapsulation Format: Outlook uses a proprietary attachment format called Transport Neutral Encapsulation Format (TNEF) when editing messages in Rich Text Format, utilizing embedded (OLE) documents or Outlook-specific features. It is usually present in a form of attached files winmail.dat or win.dat in the message. These files may also contain any regular files attached to the message.TNEF is not RFC compliant. In addition, no e-mail clients other than Outlook support it natively, although numerous tools for decoding TNEF files exist.

Calendar compatibility: Outlook does not fully support data and syncing specifications for calendaring and contacts, such as iCalendar, CalDAV, SyncML and vCard 3.0. Outlook 2007 claims to be fully iCalendar compliant; however, it does not support all core objects, such as VTODO, VJOURNAL.[10] Also, Outlook supports vCard 2.1 and does not support multiple contacts in the vCard format as a single file. Outlook has also been criticized for having proprietary "Outlook extensions" to these Internet standards.

Security concerns: As part of its Trustworthy Computing initiative, Microsoft took corrective steps to fix Outlook's reputation in Office Outlook 2003. Among the most publicized security features are that Office Outlook 2003 does not automatically load images in HTML e-mails or permit opening executable attachments by default, and includes a built-in Junk Mail filter. Service Pack 2 has augmented these features and adds an anti-Phishing filter.

Importing from other email clients: Currently, Outlook supports importing messages from Outlook Express and Lotus Notes. There are some ways to get the emails from Thunderbird: the first is to use a tool that can convert a Thunderbird folder to a format that can be imported from Outlook Express. This method must be processed folder by folder. The other method is to use a couple of free tools that keep the original folder structure

7.2. Features of the technology related to the project:

· Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model.

· VB is also considered a relatively easy to learn and use, because of its graphical development features and BASIC heritage.

· Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.

· Programming in VB is a combination of visually arranging components or controls on a form, specifying attributes and actions of those components, and writing additional lines of code for more functionality.

· Forms are created using drag-and-drop techniques. A tool is used to place controls (e.g., text boxes, buttons, etc.) on the form (window). Controls have attributes and event handlers associated with them.

· A Visual Basic component can have no user interface, and instead provide ActiveX objects to other programs via Component Object Model (COM). This allows for server-side processing or an add-in module.

Deployment Architecture

Conclusion

CONCLUSION

The world has come more and more close due to increasing interconnectivity. In such a situation we need to prevent our personal data stored in our PC. At times situations arise that we need to leave our PC on and continue with other tasks. This led to the need of a system which may be used to control the PC through a remote location. One of the controlling features is to shutdown the PC from a remote location. This very feature is provided by our project. A quick look to the functioning is as follows.

The mail received from the sender through any mobile or any website is captured and is stored in the Outlook and the sender of the message is authenticated. The message, saved as the mail is treated as a text command and thus is executed.

FUTURE WORK

The system can further be extended to perform other function such as changing the settings, printing the document. Further changes may be performed so as to send the messages to the user for completion of downloading, printing the document.

Comments

No comments yet.

    Sign in or sign up and post using a HubPages Network account.

    0 of 8192 characters used
    Post Comment

    No HTML is allowed in comments, but URLs will be hyperlinked. Comments are not for promoting your articles or other sites.


    Click to Rate This Article
    working