remote desktop connection techniques wireless communication networks

26
Remote Remote Desktop Desktop Connection Connection Techniques Techniques Wireless Wireless Communication Communication Networks Networks

Post on 20-Dec-2015

227 views

Category:

Documents


3 download

TRANSCRIPT

Remote Remote Desktop Desktop Connection Connection TechniquesTechniques

Wireless Wireless Communication Communication NetworksNetworks

What is Remote Desktop?What is Remote Desktop?

Controlling the desktop of a computer Controlling the desktop of a computer from another machine entirelyfrom another machine entirely

Using the data, applications, files and Using the data, applications, files and network resources.network resources.

How It Works?How It Works? Remote control is a software application.Remote control is a software application.

A A software application turns one software application turns one computer into the bosscomputer into the boss of another or a of another or a series of others.series of others.

The software consists of two modules: The software consists of two modules:

1. 1. Admin Module Admin Module (viewer or(viewer or client) displays screens of the remote client) displays screens of the remote

computers computers ..

2. 2. Host ModuleHost Module (server) executes the (server) executes the commands sent by Admin Module. commands sent by Admin Module.   

Basic Features Basic Features Remote Power Management Remote Power Management

Multiple Connection Support Multiple Connection Support

Working through firewall supportWorking through firewall support

Modes of working with a remote screen Modes of working with a remote screen

""View ModeView Mode" and "" and "Control ModeControl Mode““

Display modesDisplay modes

  

Why do we need RDC?Why do we need RDC?

Working at home Working at home

FFull access to all local and remote devicesull access to all local and remote devices..

Why do we need RDC?Why do we need RDC? Work from HomeWork from Home Telecommuting or partial Telecommuting or partial

telecommutingtelecommuting

LLower operating costsower operating costs, , more flexibilitymore flexibility and and higher mobilityhigher mobility

IIncreased availability of broadband ncreased availability of broadband access and VPN'saccess and VPN's

Why do we need RDC?Why do we need RDC?

•Assistance & Collaborating

Why do we need RDC?Why do we need RDC?

Software Maintenance:Software Maintenance:

SShut down a malfunctioning software hut down a malfunctioning software application application

install a software upgradeinstall a software upgrade SSaves the timeaves the time

System RequirementsSystem Requirements A computer with a connection to a Local Area Network A computer with a connection to a Local Area Network

or the Internet. or the Internet. Network card, modem or some otherNetwork card, modem or some other communication communication

device.  device.   TCP/IP protocol installed.TCP/IP protocol installed.

Network bandwidth recommendation Network bandwidth recommendation 10/100 Mb network adaptors 10/100 Mb network adaptors

Video system recommendation Video system recommendation TheThe productivity of the video adapter and video driverproductivity of the video adapter and video driver..

SETTINGSSETTINGS

Firewall:Firewall:

How safe is RHow safe is RDCDC to use? to use?

Access to the remote computer is Access to the remote computer is restricted restricted byby passwordpassword

WWorks in orks in encrypted modeencrypted mode: : All data streams, including screenshots, All data streams, including screenshots, keystrokes and mouse movementkeystrokes and mouse movementss are encrypted are encrypted

IP-Filtering feature IP-Filtering feature

AAccess to Host only from specified IP ccess to Host only from specified IP addresses and subnets.addresses and subnets.

What is Virtual Private Network?What is Virtual Private Network? AA private network private network

that uses a public that uses a public network (usually network (usually the Internet) to the Internet) to connect remote connect remote sites or users sites or users together. together.

Instead of using a Instead of using a dedicated, real-world dedicated, real-world connection such as connection such as leased line, a VPN leased line, a VPN uses "virtual" uses "virtual" connections routed connections routed through the Internet through the Internet from the company's from the company's private network to private network to the remote site or the remote site or employeeemployee..

What Makes a VPN?What Makes a VPN?

A well-designed VPN can greatly benefit a A well-designed VPN can greatly benefit a companycompany..

Extend geographic connectivity Extend geographic connectivity Improve security Improve security Reduce operational costs versus traditional WAN Reduce operational costs versus traditional WAN Reduce transit time and transportation costs for Reduce transit time and transportation costs for

remote users remote users Provide telecommuter support Provide telecommuter support

AAccommodate more users and different ccommodate more users and different locations much easier than a leased line. locations much easier than a leased line.

Analogy: Each LAN is an islandAnalogy: Each LAN is an island EEach island represents a private LAN and the ach island represents a private LAN and the

ocean is the Internetocean is the Internet..

Build Build a bridge to another island so that there is a bridge to another island so that there is easier, more secure and direct wayeasier, more secure and direct way..

HHaving a submarine is like a remote user aving a submarine is like a remote user having access to the company's private having access to the company's private networknetwork..

Travelling Travelling back and forth whenever they back and forth whenever they wanted to with privacy and security.wanted to with privacy and security.

That's essentially how a VPN worksThat's essentially how a VPN works!!

The key functions which make VPN The key functions which make VPN technologies technologies SECURESECURE ::

AuthenticationAuthentication - Ensuring the communication - Ensuring the communication is from a trusted source is from a trusted source

Access Control - Preventing unauthorised users Access Control - Preventing unauthorised users from accessing the network from accessing the network

ConfidentialityConfidentiality - Preventing the reading or - Preventing the reading or copying of data as it travels across the public copying of data as it travels across the public network network

Data integrity - Ensuring the data has not been Data integrity - Ensuring the data has not been tampered with as it travels across the public tampered with as it travels across the public networknetwork

1)Remote-Access VPN1)Remote-Access VPN

•Also called a virtual private dial-up network (VPDN)

• User-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations.

2)Site-to-Site VPN2)Site-to-Site VPN AA company can connect multiple fixed company can connect multiple fixed

sites over a public network. Site-to-site sites over a public network. Site-to-site VPNs can be one of two types: VPNs can be one of two types:

Intranet-basedIntranet-based ( (If a company has If a company has one or more remote locations that one or more remote locations that they wish to join in a single private they wish to join in a single private networknetwork))

Extranet-basedExtranet-based ( (When a company When a company has a close relationship with another has a close relationship with another companycompany))

TunnellingTunnelling PProcess of placing an entire packet within rocess of placing an entire packet within

another packet and sending it over a another packet and sending it over a networknetwork..

The protocol of the outer packet is The protocol of the outer packet is understood by the networkunderstood by the network..

Should a VPN encrypt a datagram for Should a VPN encrypt a datagram for transmission?transmission?

VPN software uses an IP-in-IP tunnel.VPN software uses an IP-in-IP tunnel. Encrypting the entire datagram and place Encrypting the entire datagram and place

the result inside another datagram.the result inside another datagram.

Bluetooth Structure&NetworkBluetooth Structure&Network•A short-range radio technology aimed at simplifying communications among Internet devices and between devices and the Internet.

•A Bluetooth connection is wireless and automatic.

http://www.youtube.com/watch?v=7OFK_4fzLCE&mode=related&search=

How Bluetooth Works?How Bluetooth Works? SSetettingting up a connection up a connection without without any help any help

from the consumerfrom the consumer CCreate a personal-area network (PAN) or reate a personal-area network (PAN) or

piconetpiconet.. An An embedding a small, low-powered radio embedding a small, low-powered radio

chipchip UUssinging a radio band between 2.4 and 2.48 a radio band between 2.4 and 2.48 GHzGHz TThe capability to transmit both data andhe capability to transmit both data and

voice communication between devicesvoice communication between devices.. Bluetooth signals are sent via radio wavesBluetooth signals are sent via radio waves..

PiconetPiconet

ScatternetScatternet

Thanks for Listening!Thanks for Listening!