Top Banner
Chapter Fourteen Working with Remote Access
30

Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Jan 12, 2016

Download

Documents

Rudolph King
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Chapter Fourteen

Working with Remote Access

Page 2: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Objectives

• Examines some protocols that allows a user to log onto the network from far away

• Examines some different options for connecting remotely

• Looks at some different carrier options• Learns to configure a machine for RAS or DUN

Page 3: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Remote Access Protocols

• Making a remote connection is similar as any other network connection. You need proper protocol:– PPP– PPTP– RDP and ICA

Page 4: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

The Point-to-Point Protocol• An early protocol that supported

dial-up networking or ISDN connections– Based on the Serial Line IP

protocol of the dark ages of computing

• PPP is a layed protocol which is broken down into three layers– Link Control Protocol– Network Control Protocol– IP Control Protocol

Page 5: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

The Point-to-Point Protocol• LCP provides the end-to-end services. It handles the tasks of

establishing the connection, exchanging configuration information, and monitoring the connection while it exists.

• NCP transports the data being sent by specific networking suites, such as TCP/IP or IPX/SPX.

• IPCP allows for IP packets to be transmitted over a PPP connection.

Page 6: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Services Provided by PPP

• There are several services provided by PPP– Address notification– Authentication– Link monitoring– Multiple protocol support

Page 7: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Services Provided by PPP

• Address notification allows a sever to dynamically provide a remote client with TCP/IP configuration that exists only for that specific connection. Once the connection is released, so is the IP configuration.

Page 8: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Authentication in PPP

• Authentication is provided through one of two authentication protocols:– The Password Authentication Protocol (PAP)

• Two-way handshake• The machine attempting to log on will transmits user credentials in

plain text. That information is compared to the security database on the machine being logged on to.

• PAP has a few weak points. The most significant weak is too easy to be hacked.

Page 9: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Authentication in PPP– Challenge Handshake Protocol (CHAP)

• Three-way handshake• When CHAP is first configured on a client, the server provides it

with a string of code, known as secret. The server keeps a database of the secrets it has assigned.

• The secret is used to verify the client during the authentication process and is linked to user ID and password.

• Administrator can limit the number of failed challenges.• CHAP still sends its information in plain text.

Page 10: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Point-to-Point Tunneling Protocol

• Provides for encrypted authentication and data transfer

• Can encapsulate upper layer protocols such as IP or IPX for transmission.

• On the receiving end, the data is stripped from the packets, unencrypted, and reassembled.

• PPTP is used by virtual private network (VPN)

Page 11: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

RDP and ICA

• Both are thin-client protocols.– All applications and data are processed on remote server.– Only screenshots of the results move across the wire.

• Remote Desktop Protocol (RDP) was developed by Microsoft for NT Terminal Server and Windows 2000 server editions.

• Independent Computing Architecture (ICA) is a Citrix protocol which is nearly identical to RDP.

Page 12: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Circuit Switching vs. Packet Switching

• In a LAN, you have control over the entire process.• In a WAN, you have to use service provided by the

third party.

Page 13: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Remote Connection Options•The different services from the third party will come in one of two

basic forms:•Circuit switching: Make a true physical connection from sender to receiver.

This is what happens in traditional telephone systems.•Packet switching: (1) Split any data (i.e. message) into small packets, (2)

route those packets separately from sender to receiver, and (3) assemble them again.

Page 14: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Circuit Switching Options• Circuit switching is primarily the domain of voice

communication. This is because in voice communication, having the packets arrive in sequence is critical to the quality of the connections. There are two telecommunication options:

– PSTN• Public Switched Telephone Network

– Makes use of a modem– Limited to 53.3Kb/s

– ISDN• Integrated Services Digital Network

Page 15: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

PSTN• PSTN also known as POTS (plain old telephone service).

– You need a modem to convert your computer signal from digital to analog.

– This analog signal is converted back to the digital signal at the telecommunication switch center.

Page 16: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

ISDN Options• ISDN signal is digital from end to end.• ISDN consists of at least two data channels (B channels) and

one channel for control data (D channel).– Basic rate ISDN ( BRI ) is two 64K B channels and one 16K D

channel.– Primary rate ISDN (PRI) gives you up to twenty-three 64K B channels

and one 64K D channel.

Page 17: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

ISDN Connection• How you interconnect your system to the ISDN line will be

determined by your location– In U.S., the U interface is used. The U interface only supports a single

device, and that device is Network Termination-1 (NT1)– The NT1 will convert the incoming two-wire circuit to a four-wire S/T

interface. The S/T interface provide up to seven devices to access.– In order to connect to the telephone line, you need a Terminal

Adapter (TA), such as modem to connect your computer to ISDN network

Page 18: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Packet Switching Options

• The majority of the telecommunication network is done by way of packet-switching technologies.– Cellular Digital Packet Data (CDPD)– General Packet Radio Service (GPRS)– WCDMA/3G– Bluetooth– Frame Relay– ATM– Sonet/SDH

Page 19: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

T-lines and E-lines

• Digital Trunk Line (T1) is used to solve two problems:– More calls can be made over a single twisted pair– Increase the transmission distance with several repeater

• T1 lines combine 24 64K digital channels and sends them over the a single carrier in frames. Each frame consists of one 8-bit voice sample for each of the 24 channels plus one single framing bit which makes a 193-bit frame.

• The throughput for T1 is 8000 x 193 = 1.544 Mb/s

Page 20: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

T-lines and E-lines• Fractional T1 is any combination of multiple 64K channels that

do not kill an entire T1 line.– The Europe had a different vision, called the E1 line

Page 21: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

T-lines and E-lines• In order to connect to T1 network, you need to install a

channel service unit/data service unit (CSU/DSU)– CSU transmits and receives signals from the WAN interface– DSU takes those 193-bit frame and converts them into a frame your

computer can recognize.

Page 22: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Frame Relay

• It is based on the HDLC protocol. Data is moves over the wire using HDLC frames

• Error correction is only done at end points.– Relay devices are not involved in error maintenance.

• Since error correction is done at the end points of the link, an intermediate device simply reads the frame deep enough to extract addressing information. As soon as it has that, the frame is on its way to the next stop. As a result, there is extremely low latency.

Page 23: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Frame Relay

• With Frame relay, you can choose either a Virtual Circuit (VC) or a Permanent Virtual Circuit (PVC)– With VC, when a session is first established, the service provider’s

equipment will determine the best route and create a path from point A to point B

– With PVC, a leased line is dedicated for you as long as you subscribe.

• With Frame Relay, if your bandwidth exceeds your committed information rate (CIR), the discharge eligibility (DE) is set to 1. If the network is congested, this frame will be discarded.

Page 24: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

FDDI

• A data link protocol that provides up to 100Mb/s throughput

• Requires a dedicated line to be run• Requires a long-term commitment

Page 25: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Asynchronous Transfer Mode (ATM)

• High-speed fiber backbone• Protocol independent• Transmits data in 53-byte packets

– First 5 bytes are header information– 48 bytes are payload.

• Provides speeds up to 622Mb/s• ATM is a connection-oriented service

Page 26: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Asynchronous Transfer Mode (ATM)

• ATM has 5 layers:– Application - similar to OSI application layer– High-Level Protocols –>agreement on the protocol– Adaptation layer provides end-to-end service, sequencing

of packets, error detection and correction, and synchronization

– ATM layer sets up and maintains the connections– Physical layer similar to OSI physical layer

Page 27: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Sonet/SDH• Synchronous Optical Network (SONET) and Synchronous

Digital Hierarchy (SDH) are very similar technologies. They are physical layer protocol.

• Provides speeds of 155Mb/s and 2.5Gb/s• Mixes multiple protocols into a single carrier using time

division multiplexing• A protection ring acts as a backup in case the primary ring

fails• The core architecture of the Internet

Page 28: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Sonet/SDH• SONET network will be divided into three separate regions:

– Local collector ring provide access to the individual subscriber– Regional network provide service to single service provider– Broadband backbone moves data over the pipeline

Page 29: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Sonet/SDH• Optical carrier level (OCx) is used to define throughput. OC1

represents the base rate of 51.84 Mb/s

Page 30: Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Making the Connection• Dial-up networking

– In My Computer in WIN9x– Network and dial-up connections in WIN2K and later– Dial-up uses PPP protocol

• Virtual private networks– PPTP provides higher security– Allows a user to access a remote network over the Internet

• Remote access services– Allows a network administrator to manage remote access on the

server level