Remote Desktop Connection Techniques Wireless Communication Networks.

Slides:



Advertisements
Similar presentations
How to Set Up, Secure and Manage A Network
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
Remote Access Network Management Kelly Given Allison Traina.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Becoming a Networking Expert Networking Hardware and Protocols.
TCP/IP Protocol Suite 1 Upon completion you will be able to: Virtual Private Networks and Network Address Translation Understand the difference between.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Wi-Fi Structures.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networks Ba 378 Winter What is a VPN? A VPN is a private network linked to a public network, using the internet as its transfer.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
Chapter 11: Dial-Up Connectivity in Remote Access Designs
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Basic Data Communication
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Chapter 4 Computer Networks – Part 1
Telecommunications. Communicating and transmitting information electronically (includes transmitting data, text, pictures, voice and video over.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
ITGS Types of network.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
CCNA 1 v3.0 Module 2 Networking Fundamentals. Objectives.
The University of Oklahoma Virtual Private Network How it works.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
Chapter2 Networking Fundamentals
Reference :Understanding Computers
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Networks The Big Picture. Three Great Leaps of Civilization.
Virtual Private Networks (VPN) By Donald Brown. What is a VPN? A network that uses the internet, to provide remote offices or individual users with a.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
Windows Vista Configuration MCTS : Advanced Networking.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Providing Teleworker Services
Virtual Private Networks (VPN)
Understand Wide Area Networks (WANs)
Virtual Private Networks
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
DIFFERENT TYPES OF INTERNET CONNECTIONS.
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Networking and Security
Topic 12: Virtual Private Networks
Presentation transcript:

Remote Desktop Connection Techniques Wireless Communication Networks

What is Remote Desktop?  Controlling the desktop of a computer from another machine entirely  Using the data, applications, files and network resources.

How It Works?  Remote control is a software application.  A software application turns one computer into the boss of another or a series of others.  The software consists of two modules: 1. Admin Module (viewer or  client) displays screens of the remote computers. 2. Host Module (server) executes the commands sent by Admin Module.  client) displays screens of the remote computers. 2. Host Module (server) executes the commands sent by Admin Module.

Basic Features  Remote Power Management  Multiple Connection Support  Working through firewall support  Modes of working with a remote screen "View Mode" and "Control Mode“ "View Mode" and "Control Mode“  Display modes

Why do we need RDC?  Working at home Full access to all local and remote devices.

Why do we need RDC?  Work from Home  Telecommuting or partial telecommuting  Lower operating costs, more flexibility and higher mobility  Increased availability of broadband access and VPN's

Why do we need RDC? Assistance & Collaborating

Why do we need RDC?  Software Maintenance:  Shut down a malfunctioning software application  install a software upgrade  Saves the time

System Requirements  A computer with a connection to a Local Area Network or the Internet.  Network card, modem or some other communication device.  Network card, modem or some other communication device.  TCP/IP protocol installed.  Network bandwidth recommendation 10/100 Mb network adaptors  Video system recommendation The productivity of the video adapter and video driver.

SETTINGS  Firewall:

How safe is RDC to use?  Access to the remote computer is restricted by password  Works in encrypted mode: All data streams, including screenshots, keystrokes and mouse movements are encrypted  IP-Filtering feature Access to Host only from specified IP addresses and subnets.

What is Virtual Private Network?  A private network that uses a public network (usually the Internet) to connect remote sites or users together.  Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee.

What Makes a VPN?  A well-designed VPN can greatly benefit a company.  Extend geographic connectivity  Improve security  Reduce operational costs versus traditional WAN  Reduce transit time and transportation costs for remote users  Provide telecommuter support  Accommodate more users and different locations much easier than a leased line.

Analogy: Each LAN is an island  Each island represents a private LAN and the ocean is the Internet.  Build a bridge to another island so that there is easier, more secure and direct way.  Having a submarine is like a remote user having access to the company's private network.  Travelling back and forth whenever they wanted to with privacy and security. That's essentially how a VPN works! That's essentially how a VPN works!

The key functions which make VPN technologies SECURE :  Authentication - Ensuring the communication is from a trusted source  Access Control - Preventing unauthorised users from accessing the network  Confidentiality - Preventing the reading or copying of data as it travels across the public network  Data integrity - Ensuring the data has not been tampered with as it travels across the public network

1)Remote-Access VPN Also called a virtual private dial-up network (VPDN) User-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations.

2)Site-to-Site VPN  A company can connect multiple fixed sites over a public network. Site-to-site VPNs can be one of two types:  Intranet-based (If a company has one or more remote locations that they wish to join in a single private network)  Extranet-based (When a company has a close relationship with another company)

Tunnelling  Process of placing an entire packet within another packet and sending it over a network.  The protocol of the outer packet is understood by the network.  Should a VPN encrypt a datagram for transmission?  VPN software uses an IP-in-IP tunnel.  Encrypting the entire datagram and place the result inside another datagram.

Bluetooth Structure&Network A short-range radio technology aimed at simplifying communications among Internet devices and between devices and the Internet. A Bluetooth connection is wireless and automatic.

How Bluetooth Works?  Setting up a connection without any help from the consumer  Create a personal-area network (PAN) or piconet.  An embedding a small, low-powered radio chip  Using a radio band between 2.4 and 2.48 GHz  The capability to transmit both data and voice communication between devices. voice communication between devices.  Bluetooth signals are sent via radio waves.

Piconet

Scatternet

Thanks for Listening!