Remote Login


Published on

1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Remote Login

  1. 1. Remote Login
  2. 2. Team Members <ul><li>Project on Remote Login : </li></ul><ul><li>BY QUAD MASTERS </li></ul><ul><li>Team Members : </li></ul><ul><li>Deepak Raj L 3. Hariprasad .N R </li></ul><ul><li>Pavan . S 4. Prakash . P </li></ul><ul><li>Guided by Mr. Siddesh </li></ul>
  3. 3. History <ul><li>Data Sharing </li></ul><ul><li>Development of Internet </li></ul><ul><li>Others </li></ul>
  4. 4. Early Computers Used Textual Interfaces <ul><li>When the Internet was being invented, computers consisted of timesharing systems. </li></ul><ul><li>Allowed many users to access the system simultaneously </li></ul><ul><li>Appeared to operate the same as a personal computer </li></ul>
  5. 5. A Timesharing System Requires User <ul><li>Because multiple users can interact with a timesharing computer, the system requires each user to identify themselves when they begin. </li></ul><ul><li>Requires: </li></ul><ul><li>> a login identifier </li></ul><ul><li>>a password </li></ul>
  6. 6. Remote Login Resembles <ul><li>Remote login service allows a user to access a remote timesharing computer system. </li></ul><ul><ul><li>To use the service, a user: </li></ul></ul><ul><ul><ul><li>Invokes an application program </li></ul></ul></ul><ul><ul><ul><li>Specifies the name of a remote computer </li></ul></ul></ul><ul><ul><ul><li>Provides a login identification </li></ul></ul></ul><ul><ul><ul><li>Specifies a password </li></ul></ul></ul>
  7. 7. Requirements <ul><li>Remote login requires three basic components: </li></ul><ul><ul><li>Software download </li></ul></ul><ul><ul><li>Internet connection </li></ul></ul><ul><ul><li>Secure desktop sharing network </li></ul></ul><ul><li>Desktop sharing software typically includes two distinct programs: </li></ul><ul><ul><li>The desktop sharing client that runs on the host computer </li></ul></ul><ul><ul><li>A viewer program that allows the remote user to view the contents of the host computer's desktop in a resizable window </li></ul></ul>
  8. 8. How Remote Login Works <ul><li>Remote login follows the client-server paradigm. </li></ul><ul><li>The client: </li></ul><ul><ul><li>Is the application that uses TCP/IP to connect </li></ul></ul><ul><li>The server: </li></ul><ul><ul><li>Allows the user to interact with the remote computer </li></ul></ul><ul><ul><li>Sends output to the client </li></ul></ul>
  9. 9. <ul><li>Remote login across the Internet uses two programs. The user invokes an application on the local computer. The local application connects the user’s keyboard and display to the remote timesharing system. </li></ul>
  10. 10. How Remote Login Works <ul><li>Desktop sharing software works by sending packets of information from a host computer to a remote computer describing what's on the host computer's screen at any given time. The encrypted data travels over the Internet. Some data arrives as image files (JPEGs and GIFs), while others arrive as individual pixels assigned to a particular X and Y coordinate. </li></ul>
  11. 13. Wireless Remote Login <ul><li>>Remote administration software has recently started to appear on wireless devices such as the BlackBerry, Pocket PC, and Palm devices, as well as some mobile phones. </li></ul><ul><li>>Generally these solutions do not provide the full remote access seen on software such as VNC or Terminal Services, but do allow administrators to perform a variety of tasks, such as rebooting computers, resetting passwords, and viewing system event logs, thus reducing or even eliminating the need for system administrators to carry a laptop or be within reach of the office. </li></ul>
  12. 14. Initial Steps to Remote Login <ul><li>For remote login to work, both the host computer and all remote users have to download and install the same desktop sharing software. Desktop sharing software typically includes two distinct programs: </li></ul><ul><li>a. The desktop sharing client that runs on the host computer. </li></ul><ul><li>b. A viewer program that allows the remote user to view the contents of the host computer's desktop in a resizable window. </li></ul><ul><li>Remote login will only work if the host computer is powered on, connected to the Internet and running the desktop sharing software. Each time you open and run the desktop sharing software on the host computer, the software starts a new session. Each session has a particular ID and password that's required to remotely log in to the host computer. Once the session has been established, most desktop sharing software quietly runs in the background of the host computer until a remote login request is made. </li></ul><ul><li>To log in to the host computer from home , you'll need to run your version of the same desktop sharing software and enter in the correct session ID or password. Once you're logged in, both computers will communicate with each other over a secure desktop sharing network.. While connected, you'll have access to keyboard controls, mouse controls, all software and all files on the host machine. </li></ul>
  13. 15. Installing Remote Login In Windows <ul><li>To install Remote Desktop Connection software on a client computer </li></ul><ul><li>a. Insert the Windows XP CD into your CD-ROM drive. </li></ul><ul><li>b. When the Welcome page appears, click Perform additional tasks, and then click Remote Desktop Connection as shown in next slide.* </li></ul><ul><li>c. When the installation wizard starts, follow the directions that appear on your screen and agree to the license agreement. </li></ul><ul><li>d. Enter your personal information and click Next.** </li></ul><ul><li>e. Finish the installation and you will now have Remote Desktop installed on your XP system. </li></ul>
  14. 16. Snapshots of Installation of Remote Login * Slide 8 Pt 2 ** Slide 8 Pt 3
  15. 17. Configuring Remote Login In Windows <ul><li>Enable Your Computer as the Host </li></ul><ul><li>Before you use Remote Desktop, your systems have to be set up properly to allow it to be ‘controlled’. One of the first things you will need to do is to ‘enable’ the remote control of a system. To do that, you will need to make a quick setting change in the System Properties. </li></ul><ul><li>  </li></ul><ul><li>1. Log in as an Administrator (or as a member of the Administrators group) </li></ul><ul><li>2. Open the System Applet in the Control Panel. </li></ul><ul><li>3. Click Start =>Control Panel =>System Applet =>Remote Tab* </li></ul><ul><li>4. On the Remote tab, select the Allow users to connect remotely to this computer check box, as shown below. </li></ul><ul><li>5. Make sure that you have the proper permissions to connect to a computer remotely, and click OK. </li></ul><ul><li>Note: Remote Desktop connection will not be established on your PC unless you have the Windows Firewall configured to Allow No Exceptions . </li></ul>
  16. 18. Snapshots of Configuration of Remote Login *Slide 10 Pt 3
  17. 19. Creating a New Remote Desktop Connection <ul><li>Open Remote Desktop Connection. </li></ul><ul><li>Click Start => All Programs => Accessories => Communications => Remote Desktop Connection </li></ul><ul><li>In Computer, type the computer name or TCP/IP address of the host you want to control. (They have to be ‘ allowed ’ to be controlled first.) </li></ul><ul><li>Fill in the credentials, Domain if needed, save the connection as a ‘profile’ so you can quickly go back to it later and use it again. </li></ul><ul><li>It is recommended not to select the ‘Save my password’ check box because if your system becomes compromised, your servers (or other systems) have now become exposed to the hacker. Now in the server, the whole corporate network is potentially exposed. </li></ul>
  18. 20. Creating a New Remote Desktop Connection <ul><li>Once you have put in your credentials and all other pertinent information, Click Connect. ** </li></ul><ul><li>Your request will now be sent to the system you want to connect to. The Log On to Windows dialog box appears. </li></ul><ul><li>In the Log On to Windows dialog box, type your user name, password, and domain (if required), and then click OK. </li></ul><ul><li>The Remote Desktop window will open and you will see the desktop settings, files, and programs that are the system. The system that is in the corporate network can remain locked and safe while you are now inside it, working on it. Whatever you are doing cannot be seen by someone watching the console. </li></ul><ul><li>Problems do occur, most commonly it’s just that the connection is either refused or it timed out because of latency.* </li></ul>
  19. 21. Snapshots of Remote Desktop Connection
  20. 22. Snapshots of Remote Desktop Connection * Slide 14 ** Slide 14
  21. 23. Making The Connection <ul><li>Once you’ve configured your client system, connecting to the remote host system is a snap. To begin, you’ll need to connect to your office network via a dial-up remote access server (RAS) or a virtual private network (VPN) connection. </li></ul><ul><li>Once you establish a connection to your office network, click the Connect button. If you’ve enabled the sharing of disk drives and serial ports on the local resources tab, you’ll immediately see a security message warning you that sharing these devices may be pose a security risk. However, since remote desktop uses 128-bit encryption to protect data sent back and forth between the client and remote host, this shouldn’t be a major concern. </li></ul><ul><li>When you do, you’ll see the Log On to Windows dialog box from the remote host. To continue, just type in your user name and password and click OK. You’ll then be logged on to your office system. </li></ul>
  22. 24. Working in Remote Session <ul><li>Once you’re connected to the remote system you can work on it just as if you were sitting at the keyboard. If you opted to use the full screen setting in the Display tab, you’ll see the connection bar at the top of the screen. This small toolbar displays the name of the host system and provides three standard windows management buttons - minimize, restore down, and close. If you click the minimize button, the Remote Desktop display minimizes and you can see the desktop on your client system. Clicking the restore down button puts the remote desktop display in a window so that you can view both the remote and client desktops. </li></ul><ul><li>Closing or Ending the session: </li></ul><ul><li>If you click the close button, you’ll be prompted to disconnect from the remote system. You can also disconnect from the remote system by clicking the Start button and choosing the disconnect button, which takes the place of the Shut Down button . </li></ul>
  23. 25. Closing or Ending the Session <ul><li>It’s important to understand that disconnecting is not the same as logging off the computer. When you disconnect, any applications you have opened on the screen will still be running on the remote system. This means that you can reconnect at a later time and pick up where you left off. It also means that you can pick up where you left off when you return to the office and log on to the system. </li></ul><ul><li>If you really want to log off the system, make sure you’re in the Remote Desktop session window, click the Start button, and choose the Log Off button. Doing so will have the same effect as logging off your system normally. This is the most secure way of ending a Remote Desktop session. </li></ul><ul><li>OR </li></ul><ul><li>To log off and end the session </li></ul><ul><li>In the Remote Desktop Connection window => click Start => Shut Down. </li></ul><ul><li>The Shut Down Windows dialog box appears </li></ul><ul><li>In the drop-down menu, select Log Off <username> => click OK </li></ul>
  24. 26. Advantages/Applications of Remote Login <ul><li>One of the most common uses of desktop sharing is for real-time collaboration. Real-time collaboration is when two or more coworkers, classmates, colleagues or friends use desktop sharing software to simultaneously work on the same project, share files and work through problems as a team. </li></ul><ul><li>Desktop sharing allows two or more users to work on the same files even when they're not in the same location . One of the most useful applications of real-time collaboration is for remote technical support. </li></ul><ul><li>A helpful feature of many desktop sharing programs is real-time annotating of documents. Whoever is in control of the host computer has access to the drawing and annotating tools, whether it's a remote user or the person sitting at the host computer. Common annotating tools are a highlighter, a freehand drawing tool and a pointer. </li></ul><ul><li>Note : The major disadvantage of the Remote Login would be security problems. A microcomputer connected to a broadcast LAN can easily eavesdrop using snooper software to capture a login name and the corresponding password (even if it is encrypted). To overcome these disadvantages we use more secure tools like Putty, SSH, Ultra VNC, Team Viewer etc for remote login. </li></ul>
  25. 27. Remote Login using Telnet <ul><li>Telnet is the acronym which stands for teletype network </li></ul><ul><li>Developed in 1969 beginning with RFC 15,extended in RFC 854 and standardized as IETF, internet standard STD 8 </li></ul><ul><li>Network protocol used in internet and LAN </li></ul><ul><li>Also refers to the software that implements client part of protocol </li></ul><ul><li>Telnet client application is available in all computer platforms </li></ul>
  26. 28. TELNET FOR REMOTE LOGIN <ul><li>Telnet is standard internet application protocol for remote login </li></ul><ul><li>Most network equipment and OS with a TCP/IP stack supports the telnet service </li></ul><ul><li>Telnet provides the encoding rules to link a users keyboard of the client with the remote server system </li></ul><ul><li>Telnet client performs two important function- interacting with the users terminal and exchanging the message with the server </li></ul>
  27. 29. TELNET- OPTIONS <ul><li>PROTOCOL NAME </li></ul><ul><li>TOPT-BIN Binary Transmission </li></ul><ul><li>TOPT-ECHO Echo </li></ul><ul><li>TOPT-RECN Reconnection </li></ul><ul><li>TOPT-APRX Approx Message Size Negotiation </li></ul><ul><li>TOPT-STAT Status </li></ul><ul><li>TOPT-REM Remote Controlled Trans and Echo </li></ul><ul><li>TOPT-LOGO Logout </li></ul><ul><li>TOPT-SNDL Send Location </li></ul><ul><li>TOPT-ENVIR Telnet Environment Option </li></ul><ul><li>TOPT-RFC Remote Flow Control </li></ul>
  28. 30. PROCEDURE <ul><li>STEP 1 </li></ul><ul><li>Click Start - Run . Type &quot; telnet &quot; in the pop-up window. </li></ul><ul><li>STEP2 </li></ul><ul><li>The Telnet window opens up. Click on Connect - Remote System... </li></ul>
  29. 31. <ul><li>STEP 3 </li></ul><ul><li>You will find three fields in the Connect window. The first lets you specify the Host Name , the second one Port and the third, the Terminal Type </li></ul><ul><li>STEP 4 </li></ul><ul><li>The program now tries to find the host and establish a link. Once a connection has been successfully set up, a welcome message and a login prompt will be displayed in the window. </li></ul>
  30. 32. <ul><li>STEP 5 </li></ul><ul><li>Type in the login name and press enter key. You would then be asked for the password. Type the password and press enter </li></ul><ul><li>If the password is correct ,a prompt is displayed on screen. The telnet window now act as a terminal of a remote machine and you can manipulate files, execute commands on remote compu </li></ul>
  31. 33. ACKNOWLEDGEMENT <ul><li>We first and foremost would like to thank our teacher MYDHILI NAIR for her support throughout and also giving us innovative ideas. </li></ul><ul><li>We would also like to thank all the teachers for giving us this opportunity. </li></ul><ul><li>Finally, a big thanks to all our friends. </li></ul>
  32. 34. Thank U