Remote Desktop Connection Techniques Wireless

Download Report

Transcript Remote Desktop Connection Techniques Wireless

Remote
Desktop
Connection
Techniques
Wireless
Communication
Networks
What is Remote Desktop?


Controlling the desktop of a computer
from another machine entirely
Using the data, applications, files and
network resources.




How It Works?
Remote control is a software application.
A software application turns one
computer into the boss of another or a
series of others.
The software consists of two modules:
1. Admin Module (viewer or
client) displays screens of the remote
computers .
2. Host Module (server) executes the
commands sent by Admin Module.
Basic Features

Remote Power Management

Multiple Connection Support

Working through firewall support


Modes of working with a remote screen
"View Mode" and "Control Mode“
Display modes
Why do we need RDC?

Working at home
Full access to all local and remote devices.
Why do we need RDC?




Work from Home
Telecommuting or partial
telecommuting
Lower operating costs, more flexibility
and higher mobility
Increased availability of broadband
access and VPN's
Why do we need RDC?
•Assistance & Collaborating
Why do we need RDC?

Software Maintenance:
 Shut down a malfunctioning software
application
install a software upgrade

Saves the time
System Requirements





A computer with a connection to a Local Area
Network or the Internet.
Network card, modem or some other
communication device.
TCP/IP protocol installed.
Network bandwidth recommendation
10/100 Mb network adaptors
Video system recommendation
The productivity of the video adapter and
video driver.
SETTINGS

Firewall:
How safe is RDC to use?


Access to the remote computer is
restricted by password
Works in encrypted mode:
All data streams, including screenshots,
keystrokes and mouse movements are encrypted

IP-Filtering feature
Access to Host only from specified IP
addresses and subnets.
What is Virtual Private Network?

A private network
that uses a public
network (usually
the Internet) to
connect remote
sites or users
together.

Instead of using a
dedicated, real-world
connection such as
leased line, a VPN
uses "virtual"
connections routed
through the Internet
from the company's
private network to
the remote site or
employee.
What Makes a VPN?







A well-designed VPN can greatly benefit a
company.
Extend geographic connectivity
Improve security
Reduce operational costs versus traditional WAN
Reduce transit time and transportation costs for
remote users
Provide telecommuter support
Accommodate more users and different
locations much easier than a leased line.
Analogy: Each LAN is an island




Each island represents a private LAN and the
ocean is the Internet.
Build a bridge to another island so that there
is easier, more secure and direct way.
Having a submarine is like a remote user
having access to the company's private
network.
Travelling back and forth whenever they
wanted to with privacy and security.
That's essentially how a VPN works!
The key functions which make VPN
technologies SECURE :




Authentication - Ensuring the communication
is from a trusted source
Access Control - Preventing unauthorised users
from accessing the network
Confidentiality - Preventing the reading or
copying of data as it travels across the public
network
Data integrity - Ensuring the data has not been
tampered with as it travels across the public
network
1)Remote-Access VPN
•Also called a virtual private dial-up
network (VPDN)
• User-to-LAN connection used by a
company that has employees who need to
connect to the private network from various
remote locations.
2)Site-to-Site VPN

A company can connect multiple fixed
sites over a public network. Site-to-site
VPNs can be one of two types:


Intranet-based (If a company has
one or more remote locations that
they wish to join in a single private
network)
Extranet-based (When a company
has a close relationship with another
company)
Tunnelling





Process of placing an entire packet within
another packet and sending it over a
network.
The protocol of the outer packet is
understood by the network.
Should a VPN encrypt a datagram for
transmission?
VPN software uses an IP-in-IP tunnel.
Encrypting the entire datagram and place
the result inside another datagram.
Bluetooth Structure&Network
•A short-range radio technology
aimed at simplifying communications
among Internet devices and between
devices and the Internet.
•A Bluetooth
connection is
wireless and
automatic.
http://www.youtube.com/watch?v=7OFK_4fzLCE&mode=related&search=
How Bluetooth Works?






Setting up a connection without any help
from the consumer
Create a personal-area network (PAN) or
piconet.
An embedding a small, low-powered radio
chip
Using a radio band between 2.4 and 2.48
GHz
The capability to transmit both data and
voice communication between devices.
Bluetooth signals are sent via radio waves.
Piconet
Scatternet
Thanks for Listening!