Beruflich Dokumente
Kultur Dokumente
This project deals with the functionalities of the terminal systems connected through a
network. This system implements Remote control at the application level. This project
controls the remote systems by performing the terminal operations like shutdown,
checking files and its permissions, etc. As the application is built purely on JAVA using
RMI APIs, it is platform independent and the users can run their application using this
software. Java also provides a strong development platform in its own right for remote-
control solutions. This system helps in handling the operations of the administrator, in
order to avoid time delay by executing the tasks, from the server itself. This enhances the
work efficiency of the administrator and also reduces the physical work strain. It can also
be used to reduce the unnecessary power consumption in an organization.
This project helps the user to remotely terminate a system that is
connected through a LAN. This also increases the scope of the
administrator, by accessing the files present on the remote system and
also to modify them.
1.1 INTRODUCTION TO PROJECT
This project helps the user to remotely terminate a system
that is connected through a LAN. This also increases the scope of
the administrator, by accessing the files present on the remote
system and also to modify them. The modules present in this
project are explained in detail in the next chapter.
• Remote Handling.
• Remote File Searching.
• Privileges.
• Remote System Configuration.
• Remote Process Management.
Remote Handling:
The Remote Handling module handles the terminal operations such as
shutdown, restart and logoff, by specifying the IP address of the
remote system. For this purpose we are using RMI (Remote Method
Invocation) and Java Runtime class.
• Host Name.
• Processors.
In order to search the required files, the administrator has to mention the
type of file he wanted to search. The administrator also has to specify the drive in
which the file has to be searched. Incase of the file type not being mentioned, it
searches all the files irrespective of the file type. After the completion of the file
searching, the administrator can download the file from the remote system and
perform the desired operations on it. The administrator can upload the modified
file back to the remote system.
Privileges:
The Privileges module mainly handles the permissions of the files. The
administrator searches a particular file or a folder and then alters the file
permissions on it. The administrator specifies the path and then the permissions of
the file are taken care.
The file permissions include read, write and hidden permissions. The read
permission enables the user to only read the file. The write permission enables the
user to read as well as to modify the file and the hidden permission hides the file
from the user.
The administrator using this module can determine the processes that are
currently running in a particular system, present in a network. The administrator
by specifying the IP address of the remote system obtains the details of the
processes. The administrator can terminate any of the process by selecting that
particular process. By terminating a process, that particular application will be
stopped. This module is similar to that of a task manager present in the windows
operating system.
SOFTWARE SPECIFICATIONS:
HARDWARE SPECIFICATIONS:
PROCESSOR : PENTIUM-4
RAM : 256 MB.(MINIMUM)
remotely, sharing resources and processing load across systems. Unlike other
systems for remote execution which require that only simple data types or
defined structures be passed to and from methods, RMI allows any Java object
type to be used - even if the client or server has never encountered it before.
Any object that can be invoked this way must implement the Remote interface.
When such an object is invoked, its arguments are ``marshaled'' and sent from
the local virtual machine to the remote one, where the arguments are
``unmarshalled''. When the method terminates, the results are marshaled from
the remote machine and sent to the caller's virtual machine. If the method
caller.
Advantages of RMI
The methods used in RMI are defined using the interfaces, which
are implemented by the classes. In a distributed application some
of the implementations are assumed to reside in different virtual
machines. Objects that have methods that can be called across
virtual machines are remote objects. An object becomes remote
by implementing a remote interface, which has the following
characteristics.
When the object is passed from one virtual machine to another, Instead of making
a copy of the implementation object in the receiving virtual machine, RMI passes
a remote stub for a remote object. The stub acts as the local representative, or
proxy. The caller invokes a method on the local stub, which is responsible for
carrying out the method call on the remote object.
A stub for a remote object implements the same set of remote interfaces that the
remote object implements. This allows a stub to be cast to any of the interfaces
that the remote object implements. However, this also means that only those
methods defined in a remote interface are available to be called in the receiving
virtual machine.
parameters and return values for these methods. In case of any of these interfaces
or classes being not available, the user has to define them.
Clients that use remote objects can be implemented at any time after
the remote interfaces are defined, including after the remote objects
has been deployed.