1 / 26

Remote Desktop Connection Techniques

Remote Desktop Connection Techniques. Wireless Communication Networks. What is Remote Desktop ?. Controlling the desktop of a computer from another machine entirely Using the data, applications , files and network resources. How It Works?.

Télécharger la présentation

Remote Desktop Connection Techniques

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Remote Desktop Connection Techniques Wireless Communication Networks

  2. What is RemoteDesktop? • Controllingthedesktop of a computerfromanothermachineentirely • Usingthe data, applications, filesand network resources.

  3. HowIt Works? • Remotecontrol is a software application. • A software application turns one computer into the bossof another or a series of others. • The software consists of two modules: 1. Admin Module (viewer or • client) displays screens of the remote computers .2. Host Module (server) executes the commands sent by Admin Module.

  4. Basic Features RemotePowerManagement MultipleConnectionSupport Working through firewall support Modes of working with a remote screen "View Mode" and "Control Mode“ Display modes

  5. Why do we need RDC? Working at home Full access to all local and remote devices.

  6. Why do we need RDC? • Work from Home • Telecommuting or partial telecommuting • Lower operating costs, more flexibilityandhigher mobility • Increased availability of broadband access and VPN's

  7. Why do we need RDC? • Assistance & Collaborating

  8. Why do we need RDC? • Software Maintenance: • Shut down a malfunctioning software application • install a software upgrade • Saves the time

  9. System Requirements • A computerwith a connectionto a LocalArea Network orthe Internet. • Network card, modem or some othercommunication device.   • TCP/IP protocolinstalled. • Network bandwidth recommendation 10/100 Mb network adaptors • Video system recommendation Theproductivity of the video adapter and video driver.

  10. SETTINGS Firewall:

  11. How safe is RDC to use? Access to the remote computer is restricted bypassword Works in encrypted mode: All data streams, including screenshots, keystrokes and mouse movements are encrypted IP-Filtering feature Access to Host only from specified IP addresses and subnets.

  12. What is Virtual Private Network? A private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee.

  13. What Makes a VPN? • A well-designed VPN can greatly benefit a company. • Extend geographic connectivity • Improve security • Reduce operational costs versus traditional WAN • Reduce transit time and transportation costs for remote users • Provide telecommuter support • Accommodate more users and different locations much easier than a leased line.

  14. Analogy: Each LAN is an island Each island represents a private LAN and the ocean is the Internet. Build a bridge to another island so that there is easier, more secure and direct way. Having a submarine is like a remote user having access to the company's private network. Travelling back and forth whenever they wanted to with privacy and security. That's essentially how a VPN works!

  15. The key functions which make VPN technologies SECURE: • Authentication - Ensuring the communication is from a trusted source • Access Control - Preventing unauthorised users from accessing the network • Confidentiality - Preventing the reading or copying of data as it travels across the public network • Data integrity - Ensuring the data has not been tampered with as it travels across the public network

  16. 1)Remote-Access VPN • Also called a virtual private dial-up network (VPDN) • User-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations.

  17. 2)Site-to-Site VPN • A company can connect multiple fixed sites over a public network. Site-to-site VPNs can be one of two types: • Intranet-based (If a company has one or more remote locations that they wish to join in a single private network) • Extranet-based (When a company has a close relationship with another company)

  18. Tunnelling Process of placing an entire packet within another packet and sending it over a network. The protocol of the outer packet is understood by the network. Should a VPN encrypt a datagram for transmission? VPN software uses an IP-in-IP tunnel. Encrypting the entire datagram and place the result inside another datagram.

  19. Bluetooth Structure&Network • A short-range radio technology aimed at simplifying communications among Internet devices and between devices and the Internet. • A Bluetooth • connection is • wireless and • automatic. http://www.youtube.com/watch?v=7OFK_4fzLCE&mode=related&search=

  20. How Bluetooth Works? Setting up a connection without any help from the consumer Create a personal-area network (PAN) or piconet. An embedding a small, low-powered radio chip Using a radio band between 2.4 and 2.48 GHz The capability to transmit both data and voice communication between devices. Bluetooth signals are sent via radio waves.

  21. Piconet

  22. Scatternet

  23. Thanks for Listening!

More Related