Presentation on theme: "Remote Networking Architectures"— Presentation transcript:
1 Remote Networking Architectures What is Remote Networking?Remote Access NetworkingVirtual Private Networks (VPN)Remote Control Computing
2 What is Remote Networking? A type of network communication that enable users to access resources that are not at their physical location.InternetRemote ComputerRemote access serverNetwork Resources
3 Remote Access Networking A type of network communication that enables a user to access a computer or network from a remote distance.InternetClient configured for remote accessvia the internetServer configured to receive remote accessconnections from the internetClient configured fordirect dial-up accessServer configured to receivedial-up connections
4 Remote Access Authentication Process Remote Access ServerRemote ClientStep 1 : A remote user initiates a session.Step 2 : The remote computer requests connection to a remote access server.Step 3 : The remote server acknowledges the connection.Step 4 : The client is requested to authenticate itself by using a remote authentication protocol.Step 5 : A connection is established between both computers by using the agreed-upon authentication protocol and credentials.
5 Protocols used in Remote Access Networking Point-to-Point Protocol (PPP)Password Authentication Protocol (PAP)Challenge Handshake Authentication Protocol (CHAP)Remote Authentication Dial-In User Service (RADIUS)Terminal Access Controller Access Control System (TACACS)Diameter
6 Password Authentication Protocol An authentication method that sends clients IDs and passwords as clear text.Client identifies itselfServer requests verificationClient provides password
7 Challenge Handshake Authentication Protocol (CHAP) Process An authentication method that is used for encrypting clients’ IDs and passwords.Logon requestedChallengeResponseLogon accepted
8 The CHAP ProcessStep 1 : A remote client requests a connection to the remoteaccess server.Step 2 : The remote server sends a challenge sequence, whichis usually a random value.Step 3 : The remote client uses its password to encrypt thechallenge sequence and sends the results to theserver.Step 4 : The server verifies the response and allows access toresources.
9 Remote Authentication Dial-In User Service (RADIUS) Remote clients connectto dial-up serversDial-up servers receive requests andpass credentials to RADIUS severRADIUS server acceptsand processes allauthentication requestsRADIUS serverDial-up servers configured as RADIUS clientsRemote Clients
10 TunnelingA data-transport technique whereby a data packet from one protocol is transferred inside the frame or packet of another protocol.IP data unencapsulatedCarrier protocol (IP)moves the dataInternetPassenger protocolenters the networkPassenger protocolleaves the networkISPIP data encapsulated
13 Access Virtual Private Network A type of VPN that provides remote access to single users via dial-up, ISDN, xDSL and cable modem connections.InternetISPRemote clientMain OfficeVPN routerProvides hardwarebased VPN
14 Intranet Virtual Private Network A type of VPN that connects sections of network , such as remote offices tying into a corporate headquarters.InternetProvides hardwarebased VPNIntranet remote officeVPN routerISPIntranetmain office
15 Extranet Virtual Private Network A type of VPN that connects networks belonging to different companies for the purpose of sharing resources.Intranet main officeVPN routerInternetVPN routerISPISPVPN routerIntranet remote officeExtranet partner office
16 Secure Socket Layer VPN (SSL VPN) A VPN format that works with a web browser.Encryption protocolsSecure the dataTunneling protocolssecure the pathInternetT-1CSU/DSUVPN serverISPEncryption protocols secure the data
17 Protocols used in Virtual Private Network Point-to-Point Tunneling Protocol (PPTP)Layer Two Tunneling Protocol (L2TP)
18 VPN ConcentratorA device that allow users to use an encrypted tunnel to securely access a corporate or other network via the internet.Main OfficeVPN ConcentratorInternetISPISPBranch OfficeRemote userRemote user
19 Remote Control Computing A type of network communication that uses special software package that enables a remote client to take over a host computer on the network, as well as run applications from a server.Host client should bea dedicated serverInternetRemote clientHost client
20 Protocols used in Remote Control Remote Desktop Protocol (RDP)Virtual Network Computing (VNC)ICA (Independent Computing Architecture)X Windows System
21 Benefits of Remote Control Computing Supports connection and communication of multiple devices.Provides enhanced security due to implementation of both basic and advanced encryption schemes.Provides Remote Desktop Connection for sever administration and maintenance.Provides a centralized system for application deployments and remote access to those applications.
22 Microsoft Windows Terminal Services A Client/Server system that enables multiple clients to run applications or manage a server remotely.Terminal ServerRemote Clients
23 Web-Based Remote Access A type of network communication that provides remote access to services and data via web browsers.Remote user accessesapplications via a web browserInternetRemote administrator managesapplication servers via a web browserWeb servers hostapplications