SlideShare a Scribd company logo
1 of 22
Unit07:
Networking with Remote
Clients and Servers
Overview
• Remote Node
• Remote Control
• Configuring a Connection
Remote Node
• Remote nodes were computers that connected to a
network via a dialup line
• Nodes connect via ISDN, DSL, cable modem, and
Virtual Private Networking (VPN) across the Internet
• Remote node computing is notoriously slow, primarily
because dialup
• the remote node is not much different from a local node
on the network
Remote Node
Remote Node
Advantages of Remote Node
Computing
• ease of configuration
• it can be run across any dialup line, cable, DSL and so
on
• wide variety of operating systems natively support
remote access
• there are no graphics restrictions
Disadvantages of Remote Node
Computing
• Issue of slow speed
• Driven by the need to use certain
applications
• Problem for network administrators arises
—licensing
• Support issues can be horrendous
Point-to-Point Connection with PPP
• PPP is based on an earlier protocol
• Serial Line Internet Protocol (SLIP )
• SLIP worked only on TCP/IP networks
Using DSL for Remote Node
• Digital Subscriber Line (DSL) is growing
as a dialup technology for remote node
• DSL uses the same lines as regular
telephone calls
– ADSL
– G.Lite
– HDSL
– VDSL
Remote Access Service (RAS)
• When you dial into a network as a remote node, you log
into a remote access server
• A variety of remote access servers is available
• RAS server placement is key to performance
RAS
Tunneling to a Virtual Private
Network
• Virtual Private Networking (VPN) describes remote nodes that
access a network via the Internet in a secure fashion
• Many encryption schemes can encode data with strengths up to 128
bits
• VPN is available to clients who connect to the Internet through
nearly any type of link
• VPN creates a virtual point-to-point connection to the RAS
• Tunneling is driven by the need to protect that virtual point-to-point
link from being interrupted or eavesdropped upon
VPN
Tunneling Protocol
• Point-to-Point Tunneling Protocol
– Point-to-Point Tunneling Protocol (PPTP) takes its
name from PPP because it uses PPP
– PPTP encapsulates PPP frames within IP datagram
• Layer 2 Tunneling Protocol
– The Layer 2 Tunneling Protocol (L2TP) was
developed to establish a viable alternative to PPTP
– Like PPTP, L2TP is an extension of PPP that
supports multiple protocols
– L2TP clients follow a similar process to PPTP
Remote Control
• On the remote computer, a window would appear with
the remote computer’s desktop within it
• All application processing and data remained on the LAN
• the only data that traveled to the LAN from the remote
computer were keyboard and mouse clicks
• Remote control computing overcame some of the issues
with remote node computing
• the remote computer didn’t need to be compatible with
the network applications
• little data had to traverse the connection between the
remote computer and the local node
• no issues with licensing because the application ran on
the local node
Remote Control
Remote Control-Thin client
Independent Computing
Architecture from Citrix
• Citrix developed its ICA protocol to facilitate remote control
sessions
• The protocol runs within the upper layers of the OSI
reference model, including the application, presentation,
and session layers
• During the session, ICA carries keystrokes, mouse clicks,
and graphical data in the form of compressed draw
commands
• ICA is supported by the latest Web browsers
• ICA client can dial directly into a Citrix MetaFrame server
and run a pure ICA session across the direct connection
Microsoft Remote Desktop Protocol
• Remote Desktop Protocol (RDP) offers much the same
type of service as ICA
• original protocol used by Windows NT 4.0 Terminal
Services Edition
• RDP clients will operate only across a TCP/IP network
• RDP is also the protocol used in Windows XP’s two
native remote applications
– Remote Desktop Connection application, which
provides a single remote control session to a
Windows XP computer.
– Remote Assistance application
Configuring a Connection
• A typical VPN deployment begins with a remote client
that needs to access the local network that is already
connected to the Internet
• the client must make a second call across the Internet
over the existing PPP connection
• The call connects to a RAS providing PPTP or L2TP
services and creates a tunnel
Server-Side Configuration
• Ras
• Windows 2000 Servers Are Equipped With Routing And
Remote Access Service (Rras )
• Windows 2000 Rras Is Able To Authenticate Directly To
The Active Directory Service
• Distribute Dialup Rras Servers Throughout The Network
To Reduce Dialup Telephone Costs
VPN

More Related Content

What's hot

Presentation file
Presentation filePresentation file
Presentation file
Videoguy
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
Anne Starr
 

What's hot (15)

Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Remote Access
Remote AccessRemote Access
Remote Access
 
Chapter03
Chapter03Chapter03
Chapter03
 
Presentation file
Presentation filePresentation file
Presentation file
 
Unit 4 Assignment 01
Unit 4 Assignment 01Unit 4 Assignment 01
Unit 4 Assignment 01
 
Seminar 2 ppt
Seminar 2 pptSeminar 2 ppt
Seminar 2 ppt
 
Software Define Networking (SDN)
Software Define Networking (SDN)Software Define Networking (SDN)
Software Define Networking (SDN)
 
14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmp
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
 
Remote Web Desk
Remote Web DeskRemote Web Desk
Remote Web Desk
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
Vpn
VpnVpn
Vpn
 
Carrier grade wi fi integration architecture
Carrier grade wi fi integration architectureCarrier grade wi fi integration architecture
Carrier grade wi fi integration architecture
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
 

Viewers also liked (7)

Unit03
Unit03Unit03
Unit03
 
Unit10
Unit10Unit10
Unit10
 
Unit05
Unit05Unit05
Unit05
 
Unit09
Unit09Unit09
Unit09
 
Unit11
Unit11Unit11
Unit11
 
Unit00
Unit00Unit00
Unit00
 
Unit01
Unit01Unit01
Unit01
 

Similar to Unit07

Computer Networks
Computer NetworksComputer Networks
Computer Networks
Shylesh BC
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
GLIM Digital
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
Piero Fraternali
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
AmitDeshai
 

Similar to Unit07 (20)

UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
Thin client
Thin clientThin client
Thin client
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
The Evolution Towards Cloud Computing
The Evolution Towards Cloud ComputingThe Evolution Towards Cloud Computing
The Evolution Towards Cloud Computing
 
Protolcols in communication system
Protolcols in communication systemProtolcols in communication system
Protolcols in communication system
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Vp ns
Vp nsVp ns
Vp ns
 
Web technology
Web technologyWeb technology
Web technology
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
 
Networking
Networking Networking
Networking
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
MULTIMEDIA SERVICES OVER IP NETWORKS
MULTIMEDIA SERVICES OVER IP NETWORKSMULTIMEDIA SERVICES OVER IP NETWORKS
MULTIMEDIA SERVICES OVER IP NETWORKS
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Unit07

  • 2. Overview • Remote Node • Remote Control • Configuring a Connection
  • 3. Remote Node • Remote nodes were computers that connected to a network via a dialup line • Nodes connect via ISDN, DSL, cable modem, and Virtual Private Networking (VPN) across the Internet • Remote node computing is notoriously slow, primarily because dialup • the remote node is not much different from a local node on the network
  • 6. Advantages of Remote Node Computing • ease of configuration • it can be run across any dialup line, cable, DSL and so on • wide variety of operating systems natively support remote access • there are no graphics restrictions
  • 7. Disadvantages of Remote Node Computing • Issue of slow speed • Driven by the need to use certain applications • Problem for network administrators arises —licensing • Support issues can be horrendous
  • 8. Point-to-Point Connection with PPP • PPP is based on an earlier protocol • Serial Line Internet Protocol (SLIP ) • SLIP worked only on TCP/IP networks
  • 9. Using DSL for Remote Node • Digital Subscriber Line (DSL) is growing as a dialup technology for remote node • DSL uses the same lines as regular telephone calls – ADSL – G.Lite – HDSL – VDSL
  • 10. Remote Access Service (RAS) • When you dial into a network as a remote node, you log into a remote access server • A variety of remote access servers is available • RAS server placement is key to performance
  • 11. RAS
  • 12. Tunneling to a Virtual Private Network • Virtual Private Networking (VPN) describes remote nodes that access a network via the Internet in a secure fashion • Many encryption schemes can encode data with strengths up to 128 bits • VPN is available to clients who connect to the Internet through nearly any type of link • VPN creates a virtual point-to-point connection to the RAS • Tunneling is driven by the need to protect that virtual point-to-point link from being interrupted or eavesdropped upon
  • 13. VPN
  • 14. Tunneling Protocol • Point-to-Point Tunneling Protocol – Point-to-Point Tunneling Protocol (PPTP) takes its name from PPP because it uses PPP – PPTP encapsulates PPP frames within IP datagram • Layer 2 Tunneling Protocol – The Layer 2 Tunneling Protocol (L2TP) was developed to establish a viable alternative to PPTP – Like PPTP, L2TP is an extension of PPP that supports multiple protocols – L2TP clients follow a similar process to PPTP
  • 15. Remote Control • On the remote computer, a window would appear with the remote computer’s desktop within it • All application processing and data remained on the LAN • the only data that traveled to the LAN from the remote computer were keyboard and mouse clicks • Remote control computing overcame some of the issues with remote node computing • the remote computer didn’t need to be compatible with the network applications • little data had to traverse the connection between the remote computer and the local node • no issues with licensing because the application ran on the local node
  • 18. Independent Computing Architecture from Citrix • Citrix developed its ICA protocol to facilitate remote control sessions • The protocol runs within the upper layers of the OSI reference model, including the application, presentation, and session layers • During the session, ICA carries keystrokes, mouse clicks, and graphical data in the form of compressed draw commands • ICA is supported by the latest Web browsers • ICA client can dial directly into a Citrix MetaFrame server and run a pure ICA session across the direct connection
  • 19. Microsoft Remote Desktop Protocol • Remote Desktop Protocol (RDP) offers much the same type of service as ICA • original protocol used by Windows NT 4.0 Terminal Services Edition • RDP clients will operate only across a TCP/IP network • RDP is also the protocol used in Windows XP’s two native remote applications – Remote Desktop Connection application, which provides a single remote control session to a Windows XP computer. – Remote Assistance application
  • 20. Configuring a Connection • A typical VPN deployment begins with a remote client that needs to access the local network that is already connected to the Internet • the client must make a second call across the Internet over the existing PPP connection • The call connects to a RAS providing PPTP or L2TP services and creates a tunnel
  • 21. Server-Side Configuration • Ras • Windows 2000 Servers Are Equipped With Routing And Remote Access Service (Rras ) • Windows 2000 Rras Is Able To Authenticate Directly To The Active Directory Service • Distribute Dialup Rras Servers Throughout The Network To Reduce Dialup Telephone Costs
  • 22. VPN