Remote access is defined as the ability of a user to log onto a network from a distant location. This is accomplished with a remote computer connected to the distant network. Whereas remote control refers to taking control of another computer, remote access means that the remote computer becomes a work station on the network. Communication between the network facility equipment and the remote computer is accomplished through a data link. The only difference between a remote user and workstations connected directly to the network is slower data transfer speeds. Remote Access is also useful when you want to connect local office computers with corporate networks. This allows the business to share resources as if all computers are connected to the same LAN. Two common methods of providing this type of remote access are dial-up and Virtual Private Network (VPN).
Dial-up remote access is when a client uses the telecommunications infrastructure to create a physical connection with a remote access server, which is attached to a Local Area Network (LAN). The physical or logical connection between the remote access server and the remote access client is made possible through dial-up equipment. Dial-up remote access is considered a private communication portal. The nature of the dial-up equipment and WAN infrastructure varies, depending on the type of connection. There are several telecommunications technologies can make up the WAN infrastructure used in dial-up remote access. These technologies include Plain Old Telephone Service (POTS), T-carriers, Integrated Services Digital Network (ISDN), Asynchronous Transfer Mode (ATM), and Digital Subscriber Line (DSL). The remote access software dials in...
... middle of paper ...
...fice location will have a VPN capable router connected to the T1 connection. Various workstations will also be connected to the LAN at each office.
Podsedly, M (2006, May) Network Security Basics for Telecommuting Programs
Faulkner Information Services
Lombardi, C.B., (2007, April) Virtual Private Network Services Selection Guide
Faulkner Information Services
Barr, J. (2007, May) Network Access Control Technologies
Faulkner Information Services
Howarth, F., (2007, May) Best Practices: Implementing VPN Technology
Faulkner Information Services
Barr, J. (2008, January) Remote Access Security Guidelines. Faulkner Information Services.
Goodwin, B. (2006, March 21) Failure to secure remote access leaves firms at risk. Computer Weekly, 00104787
Ainsworth, M (2007, March) Network Security Best Practices. Faulkner Information Services.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- VPN stands for Virtual Private Network. VPN is the term used to refer to any device that is capable of creating a semi-permanent encrypted tunnel over the public network between two private machines or networks to pass non-protocol specific, or arbitrary, traffic. This tunnel can carry all forms of traffic between these two machines meaning it is encrypting on a link basis, not on a per application basis. VPNs are useful in situations where an entity is paying for dedicated leased lines due to security concerns or the need to provide layer two communications over a WAN link via transparent bridging, WINS servers, or other broadcast repeaters (Snyder, 2004).... [tags: Network Technology]
1475 words (4.2 pages)
- Introduction Micro Widgets, Incorporated is a dynamic organization constantly looking to expand its customer base. To do so, the company utilizes the skills of a mobile sales force. Being mobile, the sales force requires access to the corporate network from time to time while on the road. The Chief Information Officer (CIO) issued a mandate that all employees of the organization have remote access to the corporate network. This enables the sales force to do their job. It also affords the company the ability to offer the benefit of working from home to the employees of the organization.... [tags: micro widgets, access from a distance]
1289 words (3.7 pages)
- ... Challenges One issue that was of particular importance to the bank was ensuring that files on its internal network could only be accessed by authorized employees. Another focal point for enhancing access security was providing employees remote access to the network nationwide. The Key challenges were: • Secure remote access for all employees • Convenient Solution for End-users • Centralize solution • Enable Mobility (Globalization and mobility of the workforce) Besides above in the previous setup NiB was running remote access VPN through ISA server which is resided in the inside network (Enterprise LAN) and with Windows based authentication through username and password.... [tags: NIB bank, infrastructure, remote access]
622 words (1.8 pages)
- Mobile Medics: Benefits of Remote Diagnosis Overview Mobile medics are so helpful in remote areas. These are places where people live but they cannot access medication easily. The innovation of mobile medics has been improved by the new technology whereby the patient can connect with the doctor online. The doctor will then recommend medication and you can buy the medicine making it easier, cheap and saves time. The mobile medics have helped those individuals who go in remote areas to research. Most remote areas include the deserts, arid and semi arid areas whereby the only medication is herbs.... [tags: Patient, Physician, Hospital, Doctor Who]
804 words (2.3 pages)
- Access to the Countryside At present, the countryside is accessible to everyone; there are certain projects, such as the KSCP (Kentish Stour Countryside Project) that promote easy access to rural areas for all visitors whatever their ability. They believe that access should be available by many forms of transport; the KSCP promotes walking, cycling, and public transport as a means of getting to rural areas. The Countryside Agency The countryside agency promotes access to the countryside; it brings together all the different countryside dimensions, for example economic, environmental, community and enjoyment into a single national body.... [tags: Papers]
1077 words (3.1 pages)
- ... Mobile health or mHealth, provides an entire new aspect of the relationship between patients and their doctors and other medical providers. Mobile devices place important and critical information into a medical professional’s hands in real-time. Doctors can monitor a patient’s condition more frequently, allowing them to make better and more informed decisions and diagnoses. In the hectic and harried environment of a hospital, a nurse or technician does not have to search for an available workstation when they can pull up an individual chart on their tablet.... [tags: remote healthcare management]
1170 words (3.3 pages)
- Weighted Objectives Our facility has given weight to the top four considerations for a CPOE system. Equally important to us is a system geared both towards the safety of our residents and user friendly for adoption so a weighted value of 30% has been given to each requirement. Security and HIPPA compliance, although a must, is somewhat assumed to be the industry standard of information systems and applications, and we have given its value as 25%. Finally, the ability to interface with other systems and applications, although a ways down the road is a requirement that we must take into consideration and this was given a value of 15%.... [tags: Medical Information, Geriatric Resident]
1841 words (5.3 pages)
- Assess how Ericsson benefitted from Amazon Web Services (AWS) in terms of cost reduction, automated software updates, remote access, and on-demand availability. Amazon Web Services has benefitted Ericsson. Ericsson had specific business needs for the support of their business and Amazon’s Web Services was able to provide them with a robust global infrastructure that provided Ericson some significant cost savings. AWS gave them the ability to scale their application according to the business demand or changes.... [tags: cost, reduction, software, updates, remote]
734 words (2.1 pages)
- Introduction Remote access can be clearly defined as one’s ability to gain computer or network access from a remote location. Today many business people who travel often need to have remote access to their corporation's network. There is however vulnerabilities that all types of remote access have common, and it doesn’t matter what method used, the endpoint machine is vulnerable like all other systems that have access to the Internet. Whenever a system is accessible via the internet, that system is exposed to danger.... [tags: Computer, Network Access, Remote Location]
1331 words (3.8 pages)
- Assignment On Tele Health Project Table of Contents Introduction:- 2 Description:- 3 Functional & Non functional Requirements 3 Mobile & cloud based solutions for Tele Health 3 Cloud computing:- 4 Image: - Cloud & mobile based Tele Health service 4 Security mechanism in cloud:- 5 Image: - Access control method 6 FURPS Table 6 SDLC:- 7 References 8 Introduction:- In the final part of Tele Health project, there are various aspects which we have to focus on. Tele Health services is already working successfully through remote connection, but it needs a server where it can store even large database, and it needs a security system also.... [tags: Medicine, Healthcare, Health care]
1211 words (3.5 pages)