Preview

Nt1310 Unit 4 Reaction Paper

Good Essays
Open Document
Open Document
623 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 4 Reaction Paper
The Routing and Remote Access Service (RRAS) is part of Microsoft API and server software. This protocol will make it possible to create applications that will administer the routing and remote access service capabilities of the operating system. This will follow the server functionality and will built upon the Remote Access Service that is found in Windows NT 4.

RRAS is a protocol make it possible to create applications that will administer the routing and remote access service capabilities of the operating system.

The Remote Access will provide the Virtual Private Networks with services that the users can use to access the corporate networks over the Internet as it they were directly connected. This remote access will enable the remote
…show more content…
Telnet, Secure Shell
The Telnet is an Application Layer protocol that will provide a bidirectional interactive text-orientated communication facility over the Internet or Local Area Networks. It is a client-server protocol that is based on a reliable connection-oriented transport. The user data is interspersed in-band with Telnet control information in an 8-bit data connection over the TCP.

Telnet is an Application Layer protocol that will provide the user with access to a remote host through a command-line interface.

Historically is was user to provide access to a remote host through the use of a command-line interface. This protocol will run on the computer and create a connection to the server on the network. Commands can then be entered through the Telnet application and it will then be executed as it the user entered them directly onto the server console. This will enable the user to control the server and then communicate this with other servers on the network. In order to start a Telnet session, the user would have to log in to a server by entering a valid username and password.
Most of the network equipment and the operating systems will be configured with this. Because of the security concerns of using Telnet protocols over an open network like the Internet, means that its use have waned significantly in favour of Secure

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Remote access means allowing people to access your business computer systems even when not directly connected to your company network. Options for giving salespeople wireless remote access to the home office server are as follows:…

    • 498 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Remote Access Domain- connects remote users to the organization’s IT infrastructure. Remote access is critical for staff members who work in the field or from…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the remote access domain, we need to make sure the VPN in use is secure so that our employees are not exposing sensitive data to anyone outside the network. In order to do so we will ensure everyone is using a VPN to access the network which has to authenticate to the system to get authorization.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT2670 Midtern Questions

    • 842 Words
    • 3 Pages

    What role enables users working at another computer on the company network, or on the internet, to establish a connection to a server and open an application or desktop session there?…

    • 842 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Mansfield, k. and atonakos, j., 2009.computer networking from lans to wans hardware, software, and security. (online). USA: Cengage Learning…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In the past, Telnet was the most common network protocol used to remotely configure network devices.…

    • 2464 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Client Server Model

    • 974 Words
    • 4 Pages

    Client/server systems evolved from mainframe architecture when it was realized that personal computers had become more self-sufficient, both in data storage and processing power, not to mention more affordable. Personal computers were able to offer just about all the features that were offered on mainframe computers. At the outset, the client-server model existed as a two-tier architecture – a client and an application server, in which the client acts as a presentation layer that communicates with the server, a centralized data layer. Most client-server architectures are two-tier. In fact, most Internet applications are simple two-tier applications. This includes Email (SMTP), web browsing (HTTP), and file transfer applications (FTP). Each application for these…

    • 974 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Tcpip

    • 1696 Words
    • 7 Pages

    In information technology, a protocol is a special set of rules or instructions that end points in a telecommunication connection use when they communicate. In the context of data communication between two points, a network protocol can also be referred as a formal set of rules, conventions and data structure that governs over how computers and other network devices exchange information over a network. From that, we can understand that a protocol is a standard procedure and format that two data communication devices must understand, accept and use to be able to talk to each other.…

    • 1696 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The Internet Protocol Suite also known as TCP/IP is the set of communications protocols used for the Internet and other similar networks. It is named from two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two networking protocols defined in this standard. IP networking represents a synthesis of several developments that began to evolve in the 1960s and 1970s, namely the Internet and LANs (LocalArea Networks), which emerged in the mid- to late-1980s, together with thea dvent of the World Wide Web in early 1990s.The Internet Protocol Suite, like many protocol suites, may be viewed as a set of layers. Each layer solves a set of problems involving the transmission of data, and provides a well-defined service to the upper layer protocols based on using services from some lower layers. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be physically transmitted. The main differences between the two models are as follows:…

    • 550 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Future of the OSI Model

    • 478 Words
    • 2 Pages

    The TCP/IP model has become the model of reference in place of the OSI model. Contrary to the OSI model, the TCP/IP model was first implemented before being specified. This particular story makes TCP/IP's characteristics, its advantages and drawbacks. TCP/IP dates from the ARPANET network. ARPANET is a telecommunication network developed by the ARPA (Advanced Research Projects Agency), the research agency of the American ministry of defense (the DOD: Department Of Defense). Besides the possibility to interconnect heterogeneous networks, this network was supposed to resist to a possible nuclear war, contrary to the telephone network usually used for telecommunication but considered as too vulnerable. It was then decided that ARPANET would use a standing out and promising new technology: packet switching (datagram mode). It is to meet this context that the TCP and IP protocols were invented in 1974. The ARPA then signed several agreements with manufacturers (especially BBN) and the Berkeley University, where a Unix system was under development, to…

    • 478 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The client-server architecture has become one of the basic models of network computing. Many types of applications have being written using the client-server model. Standard networked functions such as E-mail exchange, web access and database access, are based on the client-server model. For example, a web browser is a client program at the user computer that may…

    • 804 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Remote Desktop Protocol

    • 297 Words
    • 2 Pages

    Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    An intranet is a private computer network that allows access only to authorized users within an organization. Often safeguarded with user IDs and passwords, intranets are used by companies to deposit global documents and other resources of internal use. Intranet is very similar to Internet, but the difference is that an intranet is local, while Internet is global. In other words, an intranet (a secure information-sharing system) uses data stored on an internal corporate network, while the Internet uses data stored on the servers all around the world. One main difference between internet and intranet is users of an intranet can get on the Internet, but due to protection measures like computer firewalls, global Internet users cannot get onto an intranet unless they have access to it.…

    • 500 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Remote Method Invocation

    • 1965 Words
    • 8 Pages

    I1 Introduction Distributed systems require entities which reside in different address spaces, potentially on different machines, to communicate. The Java™ system (hereafter referred to simply as “Java”) provides a basic communication mechanism, sockets [13]. While flexible and sufficient for general communication, the use of sockets requires the client and server using this medium to engage in some application-level protocol to encode and decode messages for exchange. An alternative to sockets is Remote Procedure Call (RPC) [13].…

    • 1965 Words
    • 8 Pages
    Better Essays