Download presentation
Presentation is loading. Please wait.
1
Providing Teleworker Services
Accessing the WAN – Chapter 6
2
This PowerPoint Presentation can be viewed on my website:
3
Objectives Become aware of remote connection technologies and describe scenarios in which each would be implemented Describe the benefits of a teleworker in business, society and the environment DSL, cable, wireless and VPN technology savy
4
Graphics 6.1.1.1 (use this if you don’t want to make the changes that I recommend below)
The above objective is too long and wordy. Consider breaking it down into 2 objectives for example: Describe the benefits of teleworkers for business, society and the environment (graphic ) List remote connection technologies and describe scenarios in which each would be implemented (graphic )
5
Graphics 6.1.1.1 (use this if you don’t want to make the changes that I recommend below)
The above objective is too long and wordy. Consider breaking it down into 2 objectives for example: Describe the benefits of teleworkers for business, society and the environment (graphic ) List remote connection technologies and describe scenarios in which each would be implemented (graphic )
6
Graphic
7
Graphic
8
Graphic
9
Graphics &
10
Graphics &
11
Graphic
12
Graphic
13
Graphics &
14
Graphics &
15
Graphics &
16
Graphics &
17
Graphic
18
Graphic
19
Graphic
20
Graphic
21
Graphic
22
Summary Requirements for providing teleworker services are:
Maintains continuity of operations Provides for increased services Secure & reliable access to information Cost effective Scalable Components needed for a teleworker to connect to an organization’s network are: Home components Corporate components
23
Summary Broadband services used Cable
transmits signal in either direction simultaneously DSL requires minimal changes to existing telephone infrastructure delivers high bandwidth data rates to customers Wireless increases mobility wireless availability via: municipal WiFi WiMax satellite internet
24
Summary Securing teleworker services
VPN security achieved through using Advanced encryption techniques Tunneling Characteristics of a secure VPN Data confidentiality Data integrity authentication
26
END
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.