Presentation is loading. Please wait.

Presentation is loading. Please wait.

Remote Desktop Connection Techniques Wireless Communication Networks.

Similar presentations


Presentation on theme: "Remote Desktop Connection Techniques Wireless Communication Networks."— Presentation transcript:

1 Remote Desktop Connection Techniques Wireless Communication Networks

2 What is Remote Desktop?  Controlling the desktop of a computer from another machine entirely  Using the data, applications, files and network resources.

3 How It Works?  Remote control is a software application.  A software application turns one computer into the boss of another or a series of others.  The software consists of two modules: 1. Admin Module (viewer or  client) displays screens of the remote computers. 2. Host Module (server) executes the commands sent by Admin Module.  client) displays screens of the remote computers. 2. Host Module (server) executes the commands sent by Admin Module.

4 Basic Features  Remote Power Management  Multiple Connection Support  Working through firewall support  Modes of working with a remote screen "View Mode" and "Control Mode“ "View Mode" and "Control Mode“  Display modes

5 Why do we need RDC?  Working at home Full access to all local and remote devices.

6 Why do we need RDC?  Work from Home  Telecommuting or partial telecommuting  Lower operating costs, more flexibility and higher mobility  Increased availability of broadband access and VPN's

7 Why do we need RDC? Assistance & Collaborating

8 Why do we need RDC?  Software Maintenance:  Shut down a malfunctioning software application  install a software upgrade  Saves the time

9

10 System Requirements  A computer with a connection to a Local Area Network or the Internet.  Network card, modem or some other communication device.  Network card, modem or some other communication device.  TCP/IP protocol installed.  Network bandwidth recommendation 10/100 Mb network adaptors  Video system recommendation The productivity of the video adapter and video driver.

11 SETTINGS  Firewall:

12 How safe is RDC to use?  Access to the remote computer is restricted by password  Works in encrypted mode: All data streams, including screenshots, keystrokes and mouse movements are encrypted  IP-Filtering feature Access to Host only from specified IP addresses and subnets.

13 What is Virtual Private Network?  A private network that uses a public network (usually the Internet) to connect remote sites or users together.  Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee.

14 What Makes a VPN?  A well-designed VPN can greatly benefit a company.  Extend geographic connectivity  Improve security  Reduce operational costs versus traditional WAN  Reduce transit time and transportation costs for remote users  Provide telecommuter support  Accommodate more users and different locations much easier than a leased line.

15 Analogy: Each LAN is an island  Each island represents a private LAN and the ocean is the Internet.  Build a bridge to another island so that there is easier, more secure and direct way.  Having a submarine is like a remote user having access to the company's private network.  Travelling back and forth whenever they wanted to with privacy and security. That's essentially how a VPN works! That's essentially how a VPN works!

16 The key functions which make VPN technologies SECURE :  Authentication - Ensuring the communication is from a trusted source  Access Control - Preventing unauthorised users from accessing the network  Confidentiality - Preventing the reading or copying of data as it travels across the public network  Data integrity - Ensuring the data has not been tampered with as it travels across the public network

17 1)Remote-Access VPN Also called a virtual private dial-up network (VPDN) User-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations.

18 2)Site-to-Site VPN  A company can connect multiple fixed sites over a public network. Site-to-site VPNs can be one of two types:  Intranet-based (If a company has one or more remote locations that they wish to join in a single private network)  Extranet-based (When a company has a close relationship with another company)

19

20 Tunnelling  Process of placing an entire packet within another packet and sending it over a network.  The protocol of the outer packet is understood by the network.  Should a VPN encrypt a datagram for transmission?  VPN software uses an IP-in-IP tunnel.  Encrypting the entire datagram and place the result inside another datagram.

21 Bluetooth Structure&Network A short-range radio technology aimed at simplifying communications among Internet devices and between devices and the Internet. A Bluetooth connection is wireless and automatic. http://www.youtube.com/watch?v=7OFK_4fzLCE&mode=related&search=

22 How Bluetooth Works?  Setting up a connection without any help from the consumer  Create a personal-area network (PAN) or piconet.  An embedding a small, low-powered radio chip  Using a radio band between 2.4 and 2.48 GHz  The capability to transmit both data and voice communication between devices. voice communication between devices.  Bluetooth signals are sent via radio waves.

23 Piconet

24 Scatternet

25

26 Thanks for Listening!


Download ppt "Remote Desktop Connection Techniques Wireless Communication Networks."

Similar presentations


Ads by Google