Download presentation
Presentation is loading. Please wait.
1
Remote Desktop Connection Techniques Wireless Communication Networks
2
What is Remote Desktop? Controlling the desktop of a computer from another machine entirely Using the data, applications, files and network resources.
3
How It Works? Remote control is a software application. A software application turns one computer into the boss of another or a series of others. The software consists of two modules: 1. Admin Module (viewer or client) displays screens of the remote computers. 2. Host Module (server) executes the commands sent by Admin Module. client) displays screens of the remote computers. 2. Host Module (server) executes the commands sent by Admin Module.
4
Basic Features Remote Power Management Multiple Connection Support Working through firewall support Modes of working with a remote screen "View Mode" and "Control Mode“ "View Mode" and "Control Mode“ Display modes
5
Why do we need RDC? Working at home Full access to all local and remote devices.
6
Why do we need RDC? Work from Home Telecommuting or partial telecommuting Lower operating costs, more flexibility and higher mobility Increased availability of broadband access and VPN's
7
Why do we need RDC? Assistance & Collaborating
8
Why do we need RDC? Software Maintenance: Shut down a malfunctioning software application install a software upgrade Saves the time
10
System Requirements A computer with a connection to a Local Area Network or the Internet. Network card, modem or some other communication device. Network card, modem or some other communication device. TCP/IP protocol installed. Network bandwidth recommendation 10/100 Mb network adaptors Video system recommendation The productivity of the video adapter and video driver.
11
SETTINGS Firewall:
12
How safe is RDC to use? Access to the remote computer is restricted by password Works in encrypted mode: All data streams, including screenshots, keystrokes and mouse movements are encrypted IP-Filtering feature Access to Host only from specified IP addresses and subnets.
13
What is Virtual Private Network? A private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee.
14
What Makes a VPN? A well-designed VPN can greatly benefit a company. Extend geographic connectivity Improve security Reduce operational costs versus traditional WAN Reduce transit time and transportation costs for remote users Provide telecommuter support Accommodate more users and different locations much easier than a leased line.
15
Analogy: Each LAN is an island Each island represents a private LAN and the ocean is the Internet. Build a bridge to another island so that there is easier, more secure and direct way. Having a submarine is like a remote user having access to the company's private network. Travelling back and forth whenever they wanted to with privacy and security. That's essentially how a VPN works! That's essentially how a VPN works!
16
The key functions which make VPN technologies SECURE : Authentication - Ensuring the communication is from a trusted source Access Control - Preventing unauthorised users from accessing the network Confidentiality - Preventing the reading or copying of data as it travels across the public network Data integrity - Ensuring the data has not been tampered with as it travels across the public network
17
1)Remote-Access VPN Also called a virtual private dial-up network (VPDN) User-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations.
18
2)Site-to-Site VPN A company can connect multiple fixed sites over a public network. Site-to-site VPNs can be one of two types: Intranet-based (If a company has one or more remote locations that they wish to join in a single private network) Extranet-based (When a company has a close relationship with another company)
20
Tunnelling Process of placing an entire packet within another packet and sending it over a network. The protocol of the outer packet is understood by the network. Should a VPN encrypt a datagram for transmission? VPN software uses an IP-in-IP tunnel. Encrypting the entire datagram and place the result inside another datagram.
21
Bluetooth Structure&Network A short-range radio technology aimed at simplifying communications among Internet devices and between devices and the Internet. A Bluetooth connection is wireless and automatic. http://www.youtube.com/watch?v=7OFK_4fzLCE&mode=related&search=
22
How Bluetooth Works? Setting up a connection without any help from the consumer Create a personal-area network (PAN) or piconet. An embedding a small, low-powered radio chip Using a radio band between 2.4 and 2.48 GHz The capability to transmit both data and voice communication between devices. voice communication between devices. Bluetooth signals are sent via radio waves.
23
Piconet
24
Scatternet
26
Thanks for Listening!
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.