Successfully reported this slideshow.
Unit07:
Networking with Remote
Clients and Servers
Overview
• Remote Node
• Remote Control
• Configuring a Connection
Remote Node
• Remote nodes were computers that connected to a
network via a dialup line
• Nodes connect via ISDN, DSL, cab...
Remote Node
Remote Node
Advantages of Remote Node
Computing
• ease of configuration
• it can be run across any dialup line, cable, DSL and so
on
•...
Disadvantages of Remote Node
Computing
• Issue of slow speed
• Driven by the need to use certain
applications
• Problem fo...
Point-to-Point Connection with PPP
• PPP is based on an earlier protocol
• Serial Line Internet Protocol (SLIP )
• SLIP wo...
Using DSL for Remote Node
• Digital Subscriber Line (DSL) is growing
as a dialup technology for remote node
• DSL uses the...
Remote Access Service (RAS)
• When you dial into a network as a remote node, you log
into a remote access server
• A varie...
RAS
Tunneling to a Virtual Private
Network
• Virtual Private Networking (VPN) describes remote nodes that
access a network via...
VPN
Tunneling Protocol
• Point-to-Point Tunneling Protocol
– Point-to-Point Tunneling Protocol (PPTP) takes its
name from PPP ...
Remote Control
• On the remote computer, a window would appear with
the remote computer’s desktop within it
• All applicat...
Remote Control
Remote Control-Thin client
Independent Computing
Architecture from Citrix
• Citrix developed its ICA protocol to facilitate remote control
sessions
•...
Microsoft Remote Desktop Protocol
• Remote Desktop Protocol (RDP) offers much the same
type of service as ICA
• original p...
Configuring a Connection
• A typical VPN deployment begins with a remote client
that needs to access the local network tha...
Server-Side Configuration
• Ras
• Windows 2000 Servers Are Equipped With Routing And
Remote Access Service (Rras )
• Windo...
VPN
Upcoming SlideShare
Loading in …5
×

Unit07

348 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Unit07

  1. 1. Unit07: Networking with Remote Clients and Servers
  2. 2. Overview • Remote Node • Remote Control • Configuring a Connection
  3. 3. Remote Node • Remote nodes were computers that connected to a network via a dialup line • Nodes connect via ISDN, DSL, cable modem, and Virtual Private Networking (VPN) across the Internet • Remote node computing is notoriously slow, primarily because dialup • the remote node is not much different from a local node on the network
  4. 4. Remote Node
  5. 5. Remote Node
  6. 6. Advantages of Remote Node Computing • ease of configuration • it can be run across any dialup line, cable, DSL and so on • wide variety of operating systems natively support remote access • there are no graphics restrictions
  7. 7. Disadvantages of Remote Node Computing • Issue of slow speed • Driven by the need to use certain applications • Problem for network administrators arises —licensing • Support issues can be horrendous
  8. 8. Point-to-Point Connection with PPP • PPP is based on an earlier protocol • Serial Line Internet Protocol (SLIP ) • SLIP worked only on TCP/IP networks
  9. 9. Using DSL for Remote Node • Digital Subscriber Line (DSL) is growing as a dialup technology for remote node • DSL uses the same lines as regular telephone calls – ADSL – G.Lite – HDSL – VDSL
  10. 10. Remote Access Service (RAS) • When you dial into a network as a remote node, you log into a remote access server • A variety of remote access servers is available • RAS server placement is key to performance
  11. 11. RAS
  12. 12. Tunneling to a Virtual Private Network • Virtual Private Networking (VPN) describes remote nodes that access a network via the Internet in a secure fashion • Many encryption schemes can encode data with strengths up to 128 bits • VPN is available to clients who connect to the Internet through nearly any type of link • VPN creates a virtual point-to-point connection to the RAS • Tunneling is driven by the need to protect that virtual point-to-point link from being interrupted or eavesdropped upon
  13. 13. VPN
  14. 14. Tunneling Protocol • Point-to-Point Tunneling Protocol – Point-to-Point Tunneling Protocol (PPTP) takes its name from PPP because it uses PPP – PPTP encapsulates PPP frames within IP datagram • Layer 2 Tunneling Protocol – The Layer 2 Tunneling Protocol (L2TP) was developed to establish a viable alternative to PPTP – Like PPTP, L2TP is an extension of PPP that supports multiple protocols – L2TP clients follow a similar process to PPTP
  15. 15. Remote Control • On the remote computer, a window would appear with the remote computer’s desktop within it • All application processing and data remained on the LAN • the only data that traveled to the LAN from the remote computer were keyboard and mouse clicks • Remote control computing overcame some of the issues with remote node computing • the remote computer didn’t need to be compatible with the network applications • little data had to traverse the connection between the remote computer and the local node • no issues with licensing because the application ran on the local node
  16. 16. Remote Control
  17. 17. Remote Control-Thin client
  18. 18. Independent Computing Architecture from Citrix • Citrix developed its ICA protocol to facilitate remote control sessions • The protocol runs within the upper layers of the OSI reference model, including the application, presentation, and session layers • During the session, ICA carries keystrokes, mouse clicks, and graphical data in the form of compressed draw commands • ICA is supported by the latest Web browsers • ICA client can dial directly into a Citrix MetaFrame server and run a pure ICA session across the direct connection
  19. 19. Microsoft Remote Desktop Protocol • Remote Desktop Protocol (RDP) offers much the same type of service as ICA • original protocol used by Windows NT 4.0 Terminal Services Edition • RDP clients will operate only across a TCP/IP network • RDP is also the protocol used in Windows XP’s two native remote applications – Remote Desktop Connection application, which provides a single remote control session to a Windows XP computer. – Remote Assistance application
  20. 20. Configuring a Connection • A typical VPN deployment begins with a remote client that needs to access the local network that is already connected to the Internet • the client must make a second call across the Internet over the existing PPP connection • The call connects to a RAS providing PPTP or L2TP services and creates a tunnel
  21. 21. Server-Side Configuration • Ras • Windows 2000 Servers Are Equipped With Routing And Remote Access Service (Rras ) • Windows 2000 Rras Is Able To Authenticate Directly To The Active Directory Service • Distribute Dialup Rras Servers Throughout The Network To Reduce Dialup Telephone Costs
  22. 22. VPN

×