Preview

Remote Access

Powerful Essays
Open Document
Open Document
1553 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Remote Access
Remote Access

Remote access • refers to the ability to access a computer, such as a home computer or an office network computer, from a remote location. • Remote access can be set up using a local area network (LAN), wide area network (WAN) or even a virtual private network (VPN) so that resources and systems can be accessed remotely. • To establish a remote connection, both the local machine and the remote computer/server must have remote-access software. Alternatively, there are service providers that offer remote access via the Internet.

• Another method for performing remote access is by establishing a VPN, a network that usually uses the Internet to connect remote sites and users together. • This type of network uses encryption and tunnelling to access a company’s network. This can be a great choice for a relatively small organization.

• This involve a computer, a modem, and some remote access software to connect to the network. Also include the use of an integrated services digital network (ISDN), wireless network, cable modem or digital subscriber line.

Virtual Private Networks (VPN) • is an encrypted connection that is carried across a shared public infrastructure in a manner that makes it appear to be a dedicated and secure link between two cooperating nodes.

• VPN allow organizations to use the public Internet for access to corporate data without the risk of authorized access to the information.
• Data is encrypted at both ends making it impossible for a third party to steal or damage secure information.

• VPN started in 1995 with the Automotive Industry Action Group (AIAG) and their creation of the Automotive Network Exchange project, which was developed to fulfil a need for efficient and secure communications between trading partners, certified service providers, and network exchange points.  Two Key Technology used implementing VPN ( IPSec and PPTP) when

 IPSec is a set of extensions to the IP protocol family. It works

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT220 Lab 7

    • 303 Words
    • 2 Pages

    LAN to LAN tunnels, MPLS network and VPN site to site I would chose the MPLS network its more reliable.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sdsa300 Unit 1

    • 178 Words
    • 1 Page

    Most would say VPN is the low-cost way to establish remote connections between offices and to securely provide connections to a mobile workforce. The central office should be equipped with a VPN concentrator that is configured to maintain the number of connections to be serviced for the mobile sales force. In order to provide complete network access to the mobile workforce the use of IPSec with L2TP, ESP, AH, using SHA-256, RSA2048 and AES256 is recommended over a UDP transport. Each branch office and the central office will require a point of presence to the Internet along with a local loop that provides enough bandwidth to accommodate the office demands. In order to keep cost to a minimum, it is recommended that SDSL be used at each branch…

    • 178 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    Anis, I., Hajjar, M., & Hajjar H., (2008). Remote Administration Tools: A Comparative Study. Journal of Theoretical and Applied Information Technology.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Nt1310 Unit 7 Lab 7.1

    • 1302 Words
    • 6 Pages

    1. One possibility for connecting two locations over a large distance is through the use of Virtual Private Networks over an Internet connection. Why is this type of network cost effective? What connectivity is required for both parties? Use your textbook and the Internet to research your…

    • 1302 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    A computer network connects two or more computers so employees can work together sharing data across computers. The infrastructure of the network would make data available to view in all departments. Dirt Bikes would to set up a wide area network (WAN) for the business to operate across global areas. The ability to communicate anywhere anytime would allow the company to respond immediately to customer needs, order processing, and part suppliers saving time and money by keeping up with current inventory. Connecting the WAN allows employees to send and receive important information from anywhere globally via PDAs or laptop devices and provide almost instant responses to management, customers, vendors and other areas where efficient and immediate communication is preferred such as monitoring global industry trends happening 24 hours a day, seven days a week.…

    • 1072 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Remote access means allowing people to access your business computer systems even when not directly connected to your company network. Options for giving salespeople wireless remote access to the home office server are as follows:…

    • 498 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    During the connection establishment process, the two computers involved in a VPN connection authenticate each other and select a VPN protocol.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    To Use or Not to Use a Database? That is the Question. (2013). Retrieved from http://www.htmlgoodies.com/primers/database/article.php/3478121/To-Use-or-Not-to-Use-a-Database-That-is-the-Question.htm…

    • 972 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    NT2670 Midtern Questions

    • 842 Words
    • 3 Pages

    What role enables users working at another computer on the company network, or on the internet, to establish a connection to a server and open an application or desktop session there?…

    • 842 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    I would suggest installing a Local Area Network, which will supply networking capabilities to computers in the company. The set up for installation requires a modem and wireless routers to be able to connect all computers to the internet, using Ethernet cables or wireless card connections will allow all computers access to the internet via a broadband connection. Each computer or client will be able to access all necessary information on the network this can be achieved by utilizing file sharing will allowing that company to dictate who has access to what information on the network. I would also suggest printer sharing, which will allow the company to dictate who has access to the printer. I would also utilize TCP/IP Protocols; which are the rules that allow computers to connect to one another and that enable computers and peripheral devices to exchange information.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    VPN – virtual private network – it provides the functionality of a privately owned secure network without the associate costs of leased telephone lines, satellites, and other communication equipment.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    VPNs may also be appropriate in an academic setting. Although most dorms are networked, universities employ stringent firewall rules to restrict students from using their computers as a server to the outside world. The Internet control message protocol (ICMP) packets and other types of control packets are disabled on student-used networks. It appears the only way to do gaming is through a website or through VPNs to avoid affecting the servers/configuration/ports and data flow. A VPN can go in front of a firewall or behind it. For example, a VPN router/switch can go in front of the firewall on a…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Good Essays

    Currently the security for the internet server and the location of it in the network is not as protected as it should be and it is not the best design either. The internet server must be located out of the company firewall to protect the systems and network internally. By doing this it separates the remote server system the system has proper validation and connection through the system allows access to the rest of the network. Staffs that are located in the firewall can authenticate through a proxy system and then access the internet, which in turn allows them to communicate…

    • 560 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    A DS3 is a high-speed business network circuit and is about the same speed as a T1 line.…

    • 1389 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven.…

    • 791 Words
    • 4 Pages
    Good Essays