Remote Access Service CPTE 433 John Beckett. Types of Users Need access from home Need access from anywhere Low bandwidth needs High bandwidth needs –This.

Slides:



Advertisements
Similar presentations
By Taylor and Ed. Uses standard voice telephone lines Uses a modem to place a telephone call to another modem at a remote site Two major disadvantages.
Advertisements

Chador Wangdi Page 1of15. Analog (up to 56k/ dial up access) Using a modem connected to your PC, users connect to the internet when the computer dials.
Presented by: Eng. Karam Al-sofy
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
TYPES; 1. Analog Analog 2. ISDN ISDN 3. B-ISDN B-ISDN 4. DSL DSL 5. ADSL ADSL 6. SDSL SDSL 7. VDSL VDSL 8. CABLE CABLE 9. Wireless Wireless 10. T-1 lines.
FIREWALLS Chapter 11.
CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
1 ZIP 4x5 The world’s most functional telephone. 2 PSTN Internet Dallas, TX Sunnyvale, CA VPN Outside callers dial a single extension - phone at the office.
TEL 355: Communication and Information Systems in Organizations Digital Loop Carrier (DLC) Professor John F. Clark.
Cisco 3 - Switches Perrine - Brierley Page 15/10/2015 Module 5 Switches LAN Design LAN Switches.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Internet Connections By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Firing System Administrators CPTE 433 John Beckett.
Communication Asad M. Nafees. Outline Digital Communication ISDN Digital Subscriber Line (DSL) Cable modems Satellite broadband Wireless Communication.
Chapter 12 Network Security.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 2: Teleworker Connectivity.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Retirement Benefits MGMT Managing Employee Reward Systems.
Information Security in Real Business
INTERNET CONNECTIVITY Joe Muscarella Pentastar Communications.
COMMUNICATIONS AND NETWORKS. -2 Competencies Discuss connectivity, the wireless revolution, and communication systems Describe physical and wireless communications.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Types of Internet Connections
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Power point presentation on internet Presentation by: Tenzin wangda.
The Internet is an international Network of Computers.
ADSL Yanmei Tong (103801) Asymmetric Digital Subscriber Line.
SEC835 Database and Web application security Information Security Architecture.
Module CT3004N: Wide Area Networks Lecture Week 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 The Internet and Its Uses Working at a Small-to-Medium Business or.
Networking Types of Internet Connection
CISCO NETWORKING ACADEMY Chabot College ELEC Wide Area Network Introduction.
Marija KUHAR Merkur day - Naklo, 17. october 2003 Marija KUHAR Merkur day - Naklo, 17. october 2003.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 The Internet and Its Uses Working at a Small-to-Medium Business or.
Transfer of data in ICT systems This section covers: Elements of a network Characteristics of a network Communication of data and use of communication.
Communications and Networks Chapter 9. CE06_PP09-2 Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution, and communication systems.
Communication Services Communication Services: –Problem: This chapter expands on topics introduced in earlier chapters related to long-distance communication.
1 Back to Slide 7. 2 Also called dial-up access, it is both economical and slow. Using a modem connected to your PC, users can connect to the Internet.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
Section 11: Implementing Remote Connectivity CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
9 March 2001 Page 1 Broadband in Australia Vicki MacLeod Manager Public Policy and International Regulatory Legal & Regulatory
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Connection Services Hakim S. ADICHE, MSc Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran,
Cisco 3 - Switches Perrine - Brierley Page 112/1/2015 Module 5 Switches.
Connecting to the Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 The Internet and Its Uses Working at a Small-to-Medium Business or.
Stakeholders Definition of stakeholders Theoretical model: 1.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 7B Data Communications.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Communications and Networks 2 Compiled by Maududie Reference: Practicum Module Application Training Institut Teknologi Bandung
ROI for VoIP in the Enterprise A business case for Zultys VoIP Solutions.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
COMPUTER NETWORKING 2 LECTURE 5: CABLE MODEMS Cable Modems.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote.
Careers In Virtual Assistants (Vas) Introduction Eligibility Job Prospects
Overview of E- Business Technologies Irwan Sembiring.
Providing Teleworker Services
Providing Teleworker Services
CONNECTING TO THE INTERNET
McGraw-Hill Technology Education
* Essential Network Security Book Slides.
Virtual Private Network
Customer Service in a Virtual World
McGraw-Hill Technology Education
Presentation transcript:

Remote Access Service CPTE 433 John Beckett

Types of Users Need access from home Need access from anywhere Low bandwidth needs High bandwidth needs –This is your future!

Reliability Offsite access is inherently less reliable. Do they need it to be just as reliable? –Perhaps fallback method is needed.

The “S” Word You need an over-arching solution to the many needs people have for remote access. –When/where they need it. –Secure –Sufficient Bandwidth If you don’t provide it, they’ll find a way –and poke holes in your security.

Policies Define Service Levels What does this have to do with your support people? –Do they get to sleep? Can you include a requirement that testing be done before the person leaves town? –They’re usually too busy getting ready to leave –Corporate culture issue –Can you access schedules?

The Vanguard Group Wanting the advanced access (usually bandwidth) of the new service Tolerant of outages Willing to handle technical challenges Case in book: Mismatch of expectations. –Basis of mismatch was delay in funding –I’ve seen a CIO lose his job over that

Outsourcing You are going to have to outsource connectivity. Dialup, ISDN, Frame Relay –Depending on telecomm company to establish security. Internet –Depending on your own VLAN architecture for protection.

Outsourcing the VLAN Contract/SLA Billing structure Authentication interface Security (bonded employees etc.)

Other Corporate Networks Remote access between a remote network and your own can create a mis-match in security policy that can take either of you down or prevent service. Example: Adjunct teachers entering grades. –Their employers have firewalls and policies against accepting cookies. –Workaround: Grades entered by secretary here.

Perimeter By definition, remote access penetrates your perimeter. Security scheme must focus on traffic crossing the perimeter.

Technology Transitions Aggressively pursue new technologies. Evaluate what old technologies the new technologies actually replace. Give good support at roll-out time. Have firm “sunset” rule on old technology being phased out. Knowing “when” is an intuitive decision –Which you follow up with (supportive) action

Review of Technologies Dial-up analog modem: “56k” ISDN BRI: 128k symmetric, fallback to 64k if phone is in use ADSL: 128k-1,400k asymmetric SDSL: 128k-1,400k symmetric T-1 is a local physical “drop” for: –ISDN-PRI (1,400k) –Frame Relay Cable Modem: Fast but asymmetric “Business Internet” – Cable Modem, better service

Ownership Issue IRS: Must keep a log of personal versus corporate use if a company asset Possibility for avoiding this record-keeping overhead: Issue equipment to users as a taxable benefit –Set it up as a loan –Have a stated policy for what happens if they move on before loan completion –Structure pay so that it can come out of ending pay.