260 likes | 420 Views
Remote Desktop Connection Techniques. Wireless Communication Networks. What is Remote Desktop ?. Controlling the desktop of a computer from another machine entirely Using the data, applications , files and network resources. How It Works?.
E N D
Remote Desktop Connection Techniques Wireless Communication Networks
What is RemoteDesktop? • Controllingthedesktop of a computerfromanothermachineentirely • Usingthe data, applications, filesand network resources.
HowIt Works? • Remotecontrol is a software application. • A software application turns one computer into the bossof another or a series of others. • The software consists of two modules: 1. Admin Module (viewer or • client) displays screens of the remote computers .2. Host Module (server) executes the commands sent by Admin Module.
Basic Features RemotePowerManagement MultipleConnectionSupport Working through firewall support Modes of working with a remote screen "View Mode" and "Control Mode“ Display modes
Why do we need RDC? Working at home Full access to all local and remote devices.
Why do we need RDC? • Work from Home • Telecommuting or partial telecommuting • Lower operating costs, more flexibilityandhigher mobility • Increased availability of broadband access and VPN's
Why do we need RDC? • Assistance & Collaborating
Why do we need RDC? • Software Maintenance: • Shut down a malfunctioning software application • install a software upgrade • Saves the time
System Requirements • A computerwith a connectionto a LocalArea Network orthe Internet. • Network card, modem or some othercommunication device. • TCP/IP protocolinstalled. • Network bandwidth recommendation 10/100 Mb network adaptors • Video system recommendation Theproductivity of the video adapter and video driver.
SETTINGS Firewall:
How safe is RDC to use? Access to the remote computer is restricted bypassword Works in encrypted mode: All data streams, including screenshots, keystrokes and mouse movements are encrypted IP-Filtering feature Access to Host only from specified IP addresses and subnets.
What is Virtual Private Network? A private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee.
What Makes a VPN? • A well-designed VPN can greatly benefit a company. • Extend geographic connectivity • Improve security • Reduce operational costs versus traditional WAN • Reduce transit time and transportation costs for remote users • Provide telecommuter support • Accommodate more users and different locations much easier than a leased line.
Analogy: Each LAN is an island Each island represents a private LAN and the ocean is the Internet. Build a bridge to another island so that there is easier, more secure and direct way. Having a submarine is like a remote user having access to the company's private network. Travelling back and forth whenever they wanted to with privacy and security. That's essentially how a VPN works!
The key functions which make VPN technologies SECURE: • Authentication - Ensuring the communication is from a trusted source • Access Control - Preventing unauthorised users from accessing the network • Confidentiality - Preventing the reading or copying of data as it travels across the public network • Data integrity - Ensuring the data has not been tampered with as it travels across the public network
1)Remote-Access VPN • Also called a virtual private dial-up network (VPDN) • User-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations.
2)Site-to-Site VPN • A company can connect multiple fixed sites over a public network. Site-to-site VPNs can be one of two types: • Intranet-based (If a company has one or more remote locations that they wish to join in a single private network) • Extranet-based (When a company has a close relationship with another company)
Tunnelling Process of placing an entire packet within another packet and sending it over a network. The protocol of the outer packet is understood by the network. Should a VPN encrypt a datagram for transmission? VPN software uses an IP-in-IP tunnel. Encrypting the entire datagram and place the result inside another datagram.
Bluetooth Structure&Network • A short-range radio technology aimed at simplifying communications among Internet devices and between devices and the Internet. • A Bluetooth • connection is • wireless and • automatic. http://www.youtube.com/watch?v=7OFK_4fzLCE&mode=related&search=
How Bluetooth Works? Setting up a connection without any help from the consumer Create a personal-area network (PAN) or piconet. An embedding a small, low-powered radio chip Using a radio band between 2.4 and 2.48 GHz The capability to transmit both data and voice communication between devices. Bluetooth signals are sent via radio waves.