Published on

Published in: Education, Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. <ul><li>GROUP KRAZZY 4 </li></ul><ul><li>PRESENTS </li></ul>
  2. 2. <ul><li>An </li></ul><ul><li>Aayush Himanshu Royston Vinayak </li></ul><ul><li>Presentation </li></ul>
  3. 3. <ul><li>An </li></ul><ul><li>ISE Faculty </li></ul><ul><li>Production </li></ul>
  5. 5. Contents <ul><li>Introduction </li></ul><ul><li>What are the requisites for Remote Login? </li></ul><ul><li>How does Remote Login work </li></ul><ul><li>Remote Login Demonstrations </li></ul><ul><li>Connecting Windows to Linux. </li></ul><ul><li>Connecting Windows to Windows. </li></ul><ul><li>Telnet </li></ul>
  6. 6. Introduction <ul><li>What is Remote Login? </li></ul><ul><li>Remote Login means to access native </li></ul><ul><li>computer from the other computer on the </li></ul><ul><li>network when you are connected to internet. </li></ul>
  7. 7. What does remote Login do? <ul><li>Remote login allows workers to </li></ul><ul><li>access their work computers from any </li></ul><ul><li>Internet-enabled device, including home </li></ul><ul><li>computers, laptops and even PDAs. </li></ul>
  8. 8. Requisites for Remote Login <ul><li>Remote Login requires three components </li></ul><ul><li>Software Download </li></ul><ul><li>Internet Connection </li></ul><ul><li>Secure Desktop Sharing Network </li></ul>
  9. 9. <ul><li>Remote login will only work if the host </li></ul><ul><li>computer is powered on, connected to the </li></ul><ul><li>Internet and running the desktop sharing </li></ul><ul><li>software. </li></ul><ul><li>Each time you open and run the desktop </li></ul><ul><li>sharing software on the host computer, the </li></ul><ul><li>software starts a new session. </li></ul><ul><li>Each session has a particular ID and/or </li></ul><ul><li>password that's required to remotely log in to </li></ul><ul><li>the host computer. </li></ul><ul><li>Once the session has been established, most </li></ul><ul><li>desktop sharing software quietly runs in the </li></ul><ul><li>background of the host computer until a </li></ul><ul><li>remote login request is made. </li></ul>
  10. 10. SSH <ul><li>It stands for Secure Shell. </li></ul><ul><li>Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. </li></ul><ul><li>Used primarily on Linux and Unix based systems to access shell accounts . </li></ul><ul><li>SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary </li></ul>
  11. 11. <ul><li>SSH is a protocol that can be used for many applications. Some of the applications below may require features that are only available or compatible with specific SSH clients or servers. For example, using the SSH protocol to implement a VPN is possible, but presently only with the OpenSSH server and client implementation. </li></ul><ul><li>for login to a shell on a remote host (replacing Telnet and rlogin) </li></ul><ul><li>for executing a single command on a remote host (replacing rsh) </li></ul>
  12. 12. <ul><li>for copying files from a local server to a remote host. See SCP , as an alternative for rcp </li></ul><ul><li>in combination with SFTP , as a secure alternative to FTP file transfer </li></ul><ul><li>in combination with rsync to backup, copy and mirror files efficiently and securely </li></ul><ul><li>for port forwarding or tunneling a port (not to be confused with a VPN which routes packets between different networks or bridges two broadcast domains into one.). </li></ul>
  13. 13. <ul><li>for using as a full-fledged encrypted VPN . Note that only OpenSSH server and client supports this feature. </li></ul><ul><li>for forwarding X11 through multiple hosts </li></ul><ul><li>for browsing the web through an encrypted proxy connection with SSH clients that support the SOCKS protocol . </li></ul>
  14. 14. <ul><li>for securely mounting a directory on a remote server as filesystem on a local computer using SSHFS . </li></ul><ul><li>for automated remote monitoring and management of servers through one or more of the mechanisms as discussed above. </li></ul>
  15. 15. PuTTY <ul><li>PuTTY is a terminal emulator application </li></ul><ul><li>which can act as a client for the ssh, telnet, </li></ul><ul><li>rlogin and raw TCP computing protocols. </li></ul>
  16. 16. Features of PuTTY <ul><li>Storing of hosts and preferences for later use. </li></ul><ul><li>Control over the ssh encryption key and protocol version. </li></ul><ul><li>Control over the port forwarding with ssh(local, remote or dynamic port forwarding) </li></ul><ul><li>Its supports IPv6 </li></ul><ul><li>Support for local serial port connections </li></ul><ul><li>Self contained executable requires no installation </li></ul>
  17. 17. VNC <ul><li>Virtual network computing is a graphical </li></ul><ul><li>desktop sharing system that uses the RFB </li></ul><ul><li>protocol to remotely control another </li></ul><ul><li>computer. </li></ul>
  18. 18. Connecting the Windows OS <ul><li>Introduction </li></ul><ul><li>What software can be used? </li></ul><ul><li>Features </li></ul><ul><li>Functioning </li></ul><ul><li>Security and encryption </li></ul>
  19. 19. TELNET <ul><li>Telnet is an abbreviation for Terminal </li></ul><ul><li>Network. </li></ul><ul><li>It is a general purpose client server application program which is used as a standard TCP/IP protocol for VTD as proposed by ISO. </li></ul><ul><li>It establishes the connection to a remote system in such a way that the local terminal appears to be a terminal at the remote system. </li></ul>
  20. 20. How does Local Login occur? <ul><li>When a user logs in into a time-sharing system it is called local login. </li></ul><ul><li>As the user types at terminal the keystrokes are accepted by the terminal driver which are in turn sent to OS. </li></ul><ul><li>The OS interprets the characters and invokes the desired application program accordingly. </li></ul>
  21. 21. How Does Remote-login Occur in Telnet? <ul><li>Here the Telnet client and server programs come into use. </li></ul><ul><li>The keystrokes are sent to terminal driver where local OS accepts it but does not interpret it. </li></ul><ul><li>The characters are sent to telnet client and transformed into NVT characters and delivers them to local TCP/IP protocol stack. </li></ul>
  22. 22. <ul><li>The command or text in NVT form travels through the internet to TCP/IP stack of remote machine. </li></ul><ul><li>Here characters are then delivered to OS and passed to Telnet server which changes character into understandable form. </li></ul>
  23. 23. <ul><li>THANK YOU </li></ul>