490 likes | 672 Views
Remote Desktop. By Pirasanth Sivalingam. Comprehension and Assignment of IP Addresses. OBJECTIVES: Comprehension of Private and Global Ips Use of CMD Tools. Comprehension of Private and Global Ips. What is an IP address 2 types: Global and Private
E N D
Remote Desktop By PirasanthSivalingam
Comprehension and Assignment of IP Addresses OBJECTIVES: Comprehension of Private and Global Ips Use of CMD Tools
Comprehension of Private and Global Ips • What is an IP address • 2 types: • Global and Private • A global IP address is like the street address for you on the internet. It is always unique and can be identified from anywhere. • A private IP address is like a room number except its for all the computers under your global IP address that are connected to the internet but unlike your global ip address another person could have the same private ip address as you.
Comprehension of Private and Global IPs • A private address range: • 10.0.0.0 – 10.255.255.255 • 172.16.0.0 – 172.31.255.255 • 192.168.0.0 – 192.168.255.255 • These have been classified as the standard range and the only addresses that can be used for private IP’s • Taken from : http://technet.microsoft.com/en-us/library/cc958825.aspx
Comprehension of Private and Global IPs • A public address range can be anything, however you are not in control of it. • In the common case, any address that is not in the private address range is considered a public IP address, the address you are identified by when you are on the internet. • An example: 58.104.15.181
Mini Activity • Identify whether the IP address is global or private: • 192.168.1.2 • 10.100.1.19 • 34.0.1.24 • 192.169.33.3
Use of CMD tools • CMD is a great tool used by all I.T support to try and help identify where the problem might be. • CMD is otherwise known as command prompt interface. • The 2 commands we’ll discuss is ipconfig and ping
Use of CMD tools • Ipconfig is a command that shows you what your current configuration for IP is. It is a configuration using private addresses and it helps determine if your computer has been successfully given an ip address. • You may notice that there is another address called a subnet mask. This would be out of the scope of the course but it usually is 255.255.255.0 and acts almost like a place holder.
Use of CMD tools • Ping is a utility which allows you to see if the other side is online. It also helps you distinguish if you can connect to the internet as well. • The command is used by simply entering ping followed by the destination you want to reach in command prompt. • It will “ping” the destination 4 times. Usually if 3 of the 4 reach the destination and you receive a reply it means the ping has been successful.
Remote login within the Home network OBJECTIVES: Discovering the name of the destination computer Set up and use of remote desktop
Discovering the name of the Destination Computer • There are 2 ways of identifying the computers “name” • The first way is using ipconfig. The ip address in many ways acts as the name of the computer. • The other way is going to my computer -> properties and going to computer name.
Set up and Use of Remote Desktop • Setting up remote desktop with windows is very easy and simple • First navigate to your system panel: • Control Panel -> system • From here there is either a tab that is called remote or something similar on the left hand side of the window once you are in all that is required is that you select the option that allows people to connect to the computer. • *NOTE*: Make sure that there’s a password for the account you wish to log into.
Set up and Use of Remote Desktop • Now you can connect to the computer by going to the application that is installed on all windows machines by default • Depending on version it might vary but with windows greater than XP, there is a search bar so searching there would allow you to find the application. • On XP you would need to go to the task bar -> all programs -> accessories -> communication -> remote desktop • Once the application opens, simply enter the name or the ip address and click connect.
Port Forwarding OBJECTIVES: Comprehension of Firewalls and port numbers Router Configuration Discovery Apply port forwarding to a host
Comprehension of Firewalls and Port numbers • What are firewalls? • They act as gate keepers for your network and are usually attached to your router • Their purpose is to block unauthorized access and monitor incoming and outgoing internet traffic (data).
Comprehension of Firewalls and Port numbers • What are Port numbers? • Port numbers in a sense, are passage ways a firewall has that allows and denies internet traffic. This is how you allow specific programs like games to connect to the internet
Comprehension of Firewalls and Port numbers • Here are some regularly used port numbers • Taken from http://kb.netgear.com/app/answers/detail/a_id/1166/~/port-numbers-for-port-forwarding
Comprehension of Firewalls and Port numbers • In essence you can choose any port number apart from the reserved ones such as the ones in the chart shown previously. For our case 3389 is the designated port.
Router Configuration Discovery • In order to apply some form of port forwarding we need to log into the router. • Usually the router in most cases is your default gateway. • In order to find your default gateway address, you need to use the ipconfig command with cmd.
Router Configuration Discovery • Once that is discovered, you need to open your internet browser and input the address into the address bar. • Sometimes depending on the router, it will ask you for login credentials and usually it is “admin” as the user and “password” as the password.
Applying Port Forwarding • There may be differences as each router is different but the basis is the same. • First you need to find the firewall applications settings. • From there you select the computer, which is identified by the name or by an address, and then add an “application setting” and configure it so it uses the appropriate port and have it set as allowed.
Mini Activity • What’s the port number of HTTP ? • What’s the port number for Remote Desktop?
Remote login from outside the network OBJECTIVES: Discovery of global IP address Set up and use of remote Desktop with global IP
Discovery of your Global IP Address • Ipconfig doesn’t provide the information regarding global IP • So instead we need to use the website: http://www.whatismyip.com/ • There are many sites like this but all provide you with the same information.
Set up and use of remote Desktop with global IP • Similar to the use with private IP • global IP address followed by a “:” and a port number • For Illustrative purposes: • 1) port fortwarding set on the host with a selected port • 2) Open remote desktop app.
Setting up Dynamic DNS: OBJECTIVES: Installing noip configuration Setting and configuring a domain
Installing noip configuration • What is noip? • - Easier to remote log • - Keeps track of IP but ties it to a name • - In other words: it’s a domain name service • Installation is broken down into 2 parts • 1) Sign up for an account and set specifications at www.noip.com • 2) Login and Download the DUC client.
Remote login through Team Viewer: OBJECTIVES: Downloading and installing team viewer Configuration and use of team viewer app
Downloading and Installing TeamViewer • Teamviewer is simple and quick to install. • All you need to do is go to www.teamviewer.com and click the download button.
Downloading and Installing TeamViewer • Installation is basic. Select personal or business and proceed on with basic install and the directory you’d like to install it to.
Configuration and use of team viewer app • Configuring teamviewer is pretty simple and takes no effort at all. All you would be required to do is open the software where then it will present you with a user id and a password –like pin where you can use it to log in from another computer.
Configuration and use of team viewer app • This is required on both systems you wish to remote log-in to and all that is required of you is to enter in the login id of the other computer (which it should have) and click the connect button. The password of the other machine will be requested after to which you enter the password presented on the other machine.