Vous êtes sur la page 1sur 26

Remote

Desktop
Connection
Techniques

Wireless
Communication
Networks
What is Remote Desktop?

 Controlling the desktop of a computer


from another machine entirely

 Using the data, applications, files and


network resources.
How It Works?
 Remote control is a software application.

 A software application turns one


computer into the boss of another or a
series of others.

 The software consists of two modules:


1. Admin Module (viewer or
 client) displays screens of the remote
computers .
2. Host Module (server) executes the
commands sent by Admin Module.
Basic Features
 Remote Power Management

 Multiple Connection Support

 Working through firewall support

 Modes of working with a remote screen


"View Mode" and "Control Mode“

 Display modes
Why do we need RDC?

 Working at home

Full access to all local and remote devices.


Why do we need RDC?
 Work from Home
 Telecommuting or partial
telecommuting

 Lower operating costs, more flexibility


and higher mobility

 Increased availability of broadband


access and VPN's
Why do we need RDC?
•Assistance & Collaborating
Why do we need RDC?

 Software Maintenance:

 Shut down a malfunctioning software


application
install a software upgrade
 Saves the time
System Requirements
 A computer with a connection to a Local Area
Network or the Internet.
 Network card, modem or some other
communication device.
 TCP/IP protocol installed.

 Network bandwidth recommendation


10/100 Mb network adaptors

 Video system recommendation


The productivity of the video adapter and
video driver.
SETTINGS
 Firewall:
How safe is RDC to use?

 Access to the remote computer is


restricted by password

 Works in encrypted mode:


All data streams, including screenshots,
keystrokes and mouse movements are encrypted

 IP-Filtering feature
Access to Host only from specified IP
addresses and subnets.
What is Virtual Private Network?
 A private network
that uses a public
network (usually  Instead of using a
the Internet) to dedicated, real-world
connect remote connection such as
sites or users leased line, a VPN
together. uses "virtual"
connections routed
through the Internet
from the company's
private network to
the remote site or
employee.
What Makes a VPN?

 A well-designed VPN can greatly benefit a


company.
 Extend geographic connectivity
 Improve security
 Reduce operational costs versus traditional WAN
 Reduce transit time and transportation costs for
remote users
 Provide telecommuter support

 Accommodate more users and different


locations much easier than a leased line.
Analogy: Each LAN is an island
 Each island represents a private LAN and the
ocean is the Internet.

 Build a bridge to another island so that there


is easier, more secure and direct way.

 Having a submarine is like a remote user


having access to the company's private
network.

 Travelling back and forth whenever they


wanted to with privacy and security.
That's essentially how a VPN works!
The key functions which make VPN
technologies SECURE :
 Authentication - Ensuring the communication
is from a trusted source

 Access Control - Preventing unauthorised users


from accessing the network

 Confidentiality - Preventing the reading or


copying of data as it travels across the public
network

 Data integrity - Ensuring the data has not been


tampered with as it travels across the public
network
1)Remote-Access VPN
•Also called a virtual private dial-up
network (VPDN)

• User-to-LAN connection used by a


company that has employees who need to
connect to the private network from various
remote locations.
2)Site-to-Site VPN
 A company can connect multiple fixed
sites over a public network. Site-to-site
VPNs can be one of two types:

 Intranet-based (If a company has


one or more remote locations that
they wish to join in a single private
network)

 Extranet-based (When a company


has a close relationship with another
company)
Tunnelling
 Process of placing an entire packet within
another packet and sending it over a
network.
 The protocol of the outer packet is
understood by the network.

 Should a VPN encrypt a datagram for


transmission?
 VPN software uses an IP-in-IP tunnel.
 Encrypting the entire datagram and place
the result inside another datagram.
Bluetooth Structure&Network
•A short-range radio technology
aimed at simplifying communications
among Internet devices and between
devices and the Internet.

•A Bluetooth
connection is
wireless and
automatic.

http://www.youtube.com/watch?v=7OFK_4fzLCE&mode=related&search=
How Bluetooth Works?
 Setting up a connection without any help
from the consumer
 Create a personal-area network (PAN) or
piconet.
 An embedding a small, low-powered radio
chip
 Using a radio band between 2.4 and 2.48
GHz
 The capability to transmit both data and
voice communication between devices.
 Bluetooth signals are sent via radio waves.
Piconet
Scatternet
Thanks for Listening!

Vous aimerez peut-être aussi