SlideShare a Scribd company logo
Unit07:
Networking with Remote
Clients and Servers
Overview
• Remote Node
• Remote Control
• Configuring a Connection
Remote Node
• Remote nodes were computers that connected to a
network via a dialup line
• Nodes connect via ISDN, DSL, cable modem, and
Virtual Private Networking (VPN) across the Internet
• Remote node computing is notoriously slow, primarily
because dialup
• the remote node is not much different from a local node
on the network
Remote Node
Remote Node
Advantages of Remote Node
Computing
• ease of configuration
• it can be run across any dialup line, cable, DSL and so
on
• wide variety of operating systems natively support
remote access
• there are no graphics restrictions
Disadvantages of Remote Node
Computing
• Issue of slow speed
• Driven by the need to use certain
applications
• Problem for network administrators arises
—licensing
• Support issues can be horrendous
Point-to-Point Connection with PPP
• PPP is based on an earlier protocol
• Serial Line Internet Protocol (SLIP )
• SLIP worked only on TCP/IP networks
Using DSL for Remote Node
• Digital Subscriber Line (DSL) is growing
as a dialup technology for remote node
• DSL uses the same lines as regular
telephone calls
– ADSL
– G.Lite
– HDSL
– VDSL
Remote Access Service (RAS)
• When you dial into a network as a remote node, you log
into a remote access server
• A variety of remote access servers is available
• RAS server placement is key to performance
RAS
Tunneling to a Virtual Private
Network
• Virtual Private Networking (VPN) describes remote nodes that
access a network via the Internet in a secure fashion
• Many encryption schemes can encode data with strengths up to 128
bits
• VPN is available to clients who connect to the Internet through
nearly any type of link
• VPN creates a virtual point-to-point connection to the RAS
• Tunneling is driven by the need to protect that virtual point-to-point
link from being interrupted or eavesdropped upon
VPN
Tunneling Protocol
• Point-to-Point Tunneling Protocol
– Point-to-Point Tunneling Protocol (PPTP) takes its
name from PPP because it uses PPP
– PPTP encapsulates PPP frames within IP datagram
• Layer 2 Tunneling Protocol
– The Layer 2 Tunneling Protocol (L2TP) was
developed to establish a viable alternative to PPTP
– Like PPTP, L2TP is an extension of PPP that
supports multiple protocols
– L2TP clients follow a similar process to PPTP
Remote Control
• On the remote computer, a window would appear with
the remote computer’s desktop within it
• All application processing and data remained on the LAN
• the only data that traveled to the LAN from the remote
computer were keyboard and mouse clicks
• Remote control computing overcame some of the issues
with remote node computing
• the remote computer didn’t need to be compatible with
the network applications
• little data had to traverse the connection between the
remote computer and the local node
• no issues with licensing because the application ran on
the local node
Remote Control
Remote Control-Thin client
Independent Computing
Architecture from Citrix
• Citrix developed its ICA protocol to facilitate remote control
sessions
• The protocol runs within the upper layers of the OSI
reference model, including the application, presentation,
and session layers
• During the session, ICA carries keystrokes, mouse clicks,
and graphical data in the form of compressed draw
commands
• ICA is supported by the latest Web browsers
• ICA client can dial directly into a Citrix MetaFrame server
and run a pure ICA session across the direct connection
Microsoft Remote Desktop Protocol
• Remote Desktop Protocol (RDP) offers much the same
type of service as ICA
• original protocol used by Windows NT 4.0 Terminal
Services Edition
• RDP clients will operate only across a TCP/IP network
• RDP is also the protocol used in Windows XP’s two
native remote applications
– Remote Desktop Connection application, which
provides a single remote control session to a
Windows XP computer.
– Remote Assistance application
Configuring a Connection
• A typical VPN deployment begins with a remote client
that needs to access the local network that is already
connected to the Internet
• the client must make a second call across the Internet
over the existing PPP connection
• The call connects to a RAS providing PPTP or L2TP
services and creates a tunnel
Server-Side Configuration
• Ras
• Windows 2000 Servers Are Equipped With Routing And
Remote Access Service (Rras )
• Windows 2000 Rras Is Able To Authenticate Directly To
The Active Directory Service
• Distribute Dialup Rras Servers Throughout The Network
To Reduce Dialup Telephone Costs
VPN

More Related Content

PPTX
Remote access service
PPTX
A Guide to Secure Remote Access - Eric Vanderburg
PPTX
Understanding remote access technologies (Nov 16, 2011) (beginner)
PPTX
Chapter04
PPTX
Mersive Solstice & the Corporate Enterprise Network
PPTX
A Deep Dive in the World of IT Networking (part 1)
PPT
Remote access connection
PDF
Remote access service
A Guide to Secure Remote Access - Eric Vanderburg
Understanding remote access technologies (Nov 16, 2011) (beginner)
Chapter04
Mersive Solstice & the Corporate Enterprise Network
A Deep Dive in the World of IT Networking (part 1)
Remote access connection

What's hot (15)

PPTX
Banking and ATM networking reports
PPT
Remote Access
PPT
Chapter03
PPT
Presentation file
PPTX
Unit 4 Assignment 01
PPT
Seminar 2 ppt
PDF
Software Define Networking (SDN)
PPTX
14 coms 525 tcpip - applications - snmp
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
DOCX
Remote Web Desk
PPTX
08. networking-part-2
PPTX
gkkSecurity essentials domain 2
PDF
Carrier grade wi fi integration architecture
PDF
Power point presentation
Banking and ATM networking reports
Remote Access
Chapter03
Presentation file
Unit 4 Assignment 01
Seminar 2 ppt
Software Define Networking (SDN)
14 coms 525 tcpip - applications - snmp
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
Remote Web Desk
08. networking-part-2
gkkSecurity essentials domain 2
Carrier grade wi fi integration architecture
Power point presentation
Ad

Viewers also liked (7)

PPT
PPT
PPT
PPT
PPT
PPT
PPT
Ad

Similar to Unit07 (20)

PPT
Shradhamaheshwari vpn
PPTX
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
PPT
Vpnppt1884
PPT
PPT
Acit Mumbai - understanding vpns
PPT
12 Understanding V P Ns
PPT
Vpn_NJ ppt
PPT
V P N
PPT
VPN_ppt.ppt
PPT
PPT
PPTX
PPT
Vpnppt1884
PPT
Vp npresentation (1)
PPT
Virtual Private Network
PPT
Vpn networks kami
DOC
Virtual private network
PPT
Vp npresentation
Shradhamaheshwari vpn
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
Vpnppt1884
Acit Mumbai - understanding vpns
12 Understanding V P Ns
Vpn_NJ ppt
V P N
VPN_ppt.ppt
Vpnppt1884
Vp npresentation (1)
Virtual Private Network
Vpn networks kami
Virtual private network
Vp npresentation

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation theory and applications.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Empathic Computing: Creating Shared Understanding
CIFDAQ's Market Insight: SEC Turns Pro Crypto
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation_ Review paper, used for researhc scholars
Reach Out and Touch Someone: Haptics and Empathic Computing
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Machine learning based COVID-19 study performance prediction
Encapsulation theory and applications.pdf
Electronic commerce courselecture one. Pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Building Integrated photovoltaic BIPV_UPV.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Empathic Computing: Creating Shared Understanding

Unit07

  • 2. Overview • Remote Node • Remote Control • Configuring a Connection
  • 3. Remote Node • Remote nodes were computers that connected to a network via a dialup line • Nodes connect via ISDN, DSL, cable modem, and Virtual Private Networking (VPN) across the Internet • Remote node computing is notoriously slow, primarily because dialup • the remote node is not much different from a local node on the network
  • 6. Advantages of Remote Node Computing • ease of configuration • it can be run across any dialup line, cable, DSL and so on • wide variety of operating systems natively support remote access • there are no graphics restrictions
  • 7. Disadvantages of Remote Node Computing • Issue of slow speed • Driven by the need to use certain applications • Problem for network administrators arises —licensing • Support issues can be horrendous
  • 8. Point-to-Point Connection with PPP • PPP is based on an earlier protocol • Serial Line Internet Protocol (SLIP ) • SLIP worked only on TCP/IP networks
  • 9. Using DSL for Remote Node • Digital Subscriber Line (DSL) is growing as a dialup technology for remote node • DSL uses the same lines as regular telephone calls – ADSL – G.Lite – HDSL – VDSL
  • 10. Remote Access Service (RAS) • When you dial into a network as a remote node, you log into a remote access server • A variety of remote access servers is available • RAS server placement is key to performance
  • 11. RAS
  • 12. Tunneling to a Virtual Private Network • Virtual Private Networking (VPN) describes remote nodes that access a network via the Internet in a secure fashion • Many encryption schemes can encode data with strengths up to 128 bits • VPN is available to clients who connect to the Internet through nearly any type of link • VPN creates a virtual point-to-point connection to the RAS • Tunneling is driven by the need to protect that virtual point-to-point link from being interrupted or eavesdropped upon
  • 13. VPN
  • 14. Tunneling Protocol • Point-to-Point Tunneling Protocol – Point-to-Point Tunneling Protocol (PPTP) takes its name from PPP because it uses PPP – PPTP encapsulates PPP frames within IP datagram • Layer 2 Tunneling Protocol – The Layer 2 Tunneling Protocol (L2TP) was developed to establish a viable alternative to PPTP – Like PPTP, L2TP is an extension of PPP that supports multiple protocols – L2TP clients follow a similar process to PPTP
  • 15. Remote Control • On the remote computer, a window would appear with the remote computer’s desktop within it • All application processing and data remained on the LAN • the only data that traveled to the LAN from the remote computer were keyboard and mouse clicks • Remote control computing overcame some of the issues with remote node computing • the remote computer didn’t need to be compatible with the network applications • little data had to traverse the connection between the remote computer and the local node • no issues with licensing because the application ran on the local node
  • 18. Independent Computing Architecture from Citrix • Citrix developed its ICA protocol to facilitate remote control sessions • The protocol runs within the upper layers of the OSI reference model, including the application, presentation, and session layers • During the session, ICA carries keystrokes, mouse clicks, and graphical data in the form of compressed draw commands • ICA is supported by the latest Web browsers • ICA client can dial directly into a Citrix MetaFrame server and run a pure ICA session across the direct connection
  • 19. Microsoft Remote Desktop Protocol • Remote Desktop Protocol (RDP) offers much the same type of service as ICA • original protocol used by Windows NT 4.0 Terminal Services Edition • RDP clients will operate only across a TCP/IP network • RDP is also the protocol used in Windows XP’s two native remote applications – Remote Desktop Connection application, which provides a single remote control session to a Windows XP computer. – Remote Assistance application
  • 20. Configuring a Connection • A typical VPN deployment begins with a remote client that needs to access the local network that is already connected to the Internet • the client must make a second call across the Internet over the existing PPP connection • The call connects to a RAS providing PPTP or L2TP services and creates a tunnel
  • 21. Server-Side Configuration • Ras • Windows 2000 Servers Are Equipped With Routing And Remote Access Service (Rras ) • Windows 2000 Rras Is Able To Authenticate Directly To The Active Directory Service • Distribute Dialup Rras Servers Throughout The Network To Reduce Dialup Telephone Costs
  • 22. VPN