ITT Project Presentation

Information about ITT Project Presentation

Published on August 3, 2014

Author: ruchirthakkar

Source: authorstream.com

Content

Controlling Remote Computer through Cell Phone: Controlling Remote Computer through Cell Phone By Ruchi Reason for choosing this Topic : Considering the technological advancement in today's scenario the current project will help in being connected to the system whenever required. This would help to respond to queries and support customers both internal and external as an when required. Reason for choosing this Topic Project Outline: Synopsis Introduction What is a Remote Computer What is VPN VPN Architecture Objectives of VPN Features of VPN Requirements to set up VPN connection Analogy Architecture for How VPN functions How VPN Functions Benefits of VPN Conclusion Bibliography Project Outline Synopsis: In this project we will enlist the process to access the desktops of remote computer systems with the use of a android based cellular phone. This process will be carried out using (VPN) Virtual Private Network based architecture. A user will be able to access and manipulate the desktops of remote computers through a VPN that will be provided on the user’s cell phone A VPN is a private network that uses a public network (usually the Internet )to connect remote sites or users together.  The VPN uses "virtual" connections routed through the Internet from the business's private network to the remote site or employee. By using a VPN, businesses ensure security - anyone intercepting the encrypted data can't read it. Synopsis Introduction: The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets. Many companies have facilities spread out across the country, or even around the world. But there is one thing that all companies need: a way to maintain fast, secure, and reliable communications wherever their offices are located. Until recently, reliable communication has meant the use of leased lines to maintain a wide-area network (WAN). Leased lines, ranging from Integrated Services Digital Network (ISDN, which runs at 144 Kbps) to Optical Carrier-3 (OC3, which runs at 155 Mbps) fiber, provide a company with a way to expand their private network beyond their immediate geographic area. A WAN has obvious advantages over a public network like the Internet when it comes to reliability, performance, and security; but maintaining a WAN, particularly when using leased lines, can become quite expensive (it often rises in cost as the distance between the offices increases). Additionally, leased lines are not a viable solution for organizations where part of the work force is highly mobile (as is the case with the marketing staff) and might frequently need to connect to the corporate network remotely and access sensitive data. As the popularity of the Internet has grown, businesses have turned to it as a means of extending their own networks. First came intranets, which are sites designed for use only by company employees. Now, many companies create their own Virtual Private Networks (VPNs) to accommodate the needs of remote employees and distant offices. Introduction What is a Remote Computer? : A remote computer can be best defined as any type of computer that is accessible remotely over a network rather than physically at a set destination. In layman's terms, a remote computer is a one that can be used over the Internet from a location other than at the actual computer itself. What is a Remote Computer? What is VPN?: VPN –A  virtual private network  ( VPN ) extends a private network across a public network, such as the Internet. It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. It provides remote access to an organization’s network via Internet VPNs allow employees to securely access their company's data while traveling outside the office. Similarly, VPNs securely connect geographically disparate offices of an organization, creating one cohesive network. What is VPN? VPN Architecture: VPN Architecture Objectives of VPN: General : To control the remote computer using mobile phone Specific : To start & stop application To boot a remote server To access files To manipulate data To control other devices of remote computer using mobile Objectives of VPN Features of VPN: A business might not require all these benefits from its VPN, but it should demand the following essential VPN features: Security - The VPN should protect data while it's traveling on the public network. If intruders attempt to capture the data, they should be unable to read or use it. Reliability - Employees and remote offices should be able to connect to the VPN with no trouble at any time (unless hours are restricted), and the VPN should provide the same quality of connection for each user even when it is handling its maximum number of simultaneous connections. Scalability - As a business grows, it should be able to extend its VPN services to handle that growth without replacing the VPN technology altogether. Features of VPN Requirements to Set up VPN Connection: Remote Computer with a VPN Server installed Internet connection Mobile phone with wireless Internet connection & VPN client installed Requirements to Set up VPN Connection Analogy: Analogy Truck 1 Truck 2 VPN 1 Representing Internet – Let these be the roads upon which we travel 2 Representing IP Packets that travel on the roads are transport trucks & these trucks carries data from once location to another 3 As you stand by road side & watch these trucks you can see the contents of Truck1 whereas Truck2 protect their contents from the observers 4 So where does VPN fit into analogy? The Trucks that are open trailers are non VPN carriers And the trucks that have closed trailers are VPN carriers A VPN truck provides a secure means of transport Architecture of How VPN Works: Architecture of How VPN Works Routers Routers Tunnel Computer at a company headquarters Internet Packets/data VPN server installed VPN client installed Encrypted & Encapsulated data Mobile phone How VPN Functions?: A typical VPN might have a main local-area network (LAN) at the corporate headquarters of a company, other LANs at remote offices or facilities, and individual users that connect from out in the field. A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection, such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee. There are two common types of VPNs. Remote-Access - Also called a Virtual Private Dial-up Network (VPDN), this is a user-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations. Typically, a corporation that wishes to set up a large remote-access VPN provides some form of Internet dial-up account to their users using an Internet service provider (ISP). The telecommuters can then dial a 1-800 number to reach the Internet and use their VPN client software to access the corporate network. A good example of a company that needs a remote-access VPN would be a large firm with hundreds of sales people in the field. Remote-access VPNs permit secure, encrypted connections between a company's private network and remote users through a third-party service provider. How VPN Functions? How VPN Functions? Contd…: Site-to-Site —Through the use of dedicated equipment and large-scale encryption, a company can connect multiple fixed sites over a public network such as the Internet. Each site needs only a local connection to the same public network, thereby saving money on long private leased-lines. Site-to-site VPNs can be further categorized into intranets or extranets. A site-to-site VPN built between offices of the same company is said to be an intranet VPN, while a VPN built to connect the company to its partner or customer is referred to as an extranet VPN. How VPN Functions? Contd … Benefits of VPN: Extended connections across multiple geographic locations without using a leased line Improved security for exchanging data by providing secure communication Flexibility for remote offices and employees to use the business related data over an existing Internet connection as if they're directly connected to the network Savings in time and expense for employees to commute if they work from virtual workplaces Improved productivity for remote employees Using VPN technology the employees can essentially take their offices wherever they go thus improving the response time. Benefits of VPN Conclusion: Hence a VPN connections are more secured connections over the normal Internet connections A VPN connections are less expensive and provides wide scalability It provides better functionality compared to other technologies like team – viewer, VNC ( Virtual network Connection) , LogmeIn etc as all these require user interference to get the computer work remotely. Conclusion Bibliography: https://www.youtube.com/watch?v=4Q7bj3dNbR8 http://www.wisegeek.com/what-is-a-remote-computer.htm http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/14106-how-vpn-works.html Bibliography PowerPoint Presentation: Thank you

Related presentations