Monday, May 4, 2020

IT Networking Designing for Literature Review- MyAssignmenthelp

Question: Discuss about theIT Networking Designing for Literature Review. Answer: Remote Desktop Access According to this paper [1], every android mobiles can be access the desktop remotely. The desktop mouse and keyboard are accessed by the android mobile. The mouse and keyboards are used to gives the desktop handling and typing functionality. The application part are accessing the desktop, the server requires the PC. In network, the main part of LAN connection is used to connect the one or more devices like android device and computer and it is completed by the entering the port number and IP address. It generated form the both server like computer and android server. Because it implements the socket primitives by using the "NANOHTTOD" protocol. This protocol also access the android devices. The keyboard and mouse graphical usage is used to capturing and controlling the device and it provides the controlling functionality. This protocol use the RFB protocol to transferring the information between the devices. VMC system requires the two types system to do appreciate work and the appl ication of sever is used for machine. This machine is controlled by the client and controller and it is used for supervising the devices by using the android devices. In this paper [2], the remote machine control system is the one of best software tool. This application is used to user access the desktop through the internet and also do the following tasks like checking the users, checking the hardware and accessing the program. The remote machine control system is used to connect the more than one network from the different locations. The frame work engineers are basically depends on the middleware stages to increase the efficiency. The application, proper frame works and middleware frameworks are gives the some reflection to avoid the application designers with the information that is create the circulated programming. Consider the some example like synchronizing, arrange correspondence primitives, heterogeneity, information un-marshalling and marshalling, failure handling and administration query. The java RMI is well known the middle ware stages. This paper [3] describes about the desktop access through mobile phones. It is completely based on the Virtual Network computing. It requires to install the VNC server in the computer or desktop with wireless access. In wireless access the clients can access the platform without any difficulties. The desktop picture should be compacted before it is transmitted to the mobile. It has some additional capabilities based on the survey of the mobiles. It has some alternate options to instantly access the solutions. The current key have the responsibility to manage the network. Twin view helps the clients to view the two locations at the same time. The model is installed using java and it is checked in the java based mobile. It also helps to view the assessments. It also helps to exchange the network management files in the wireless location. The internet system application is implemented at the next level. To exchange the information RFB convention is used. It requires the main structure o f the VNC for implementation process. Because the android applications are used in the world wide level and the framework is created for all the portable gadgets including tablets. They have the ability to access the client desktop through internet. In this paper stated that [4], the users are control and access the remote sever by using the remote desktop protocol. The remote desktop protocol is the powerful protocol. It gives the variety of useful purposes. Remote desktop protocol is developed by Microsoft Corporation and it gives the user with the graphical interface to connect the computer through the network. This protocol provides the desktop control capacities and login. The remote desktop protocol is enforced by the Microsoft Corporation from the protocol families. The remote desktop design has the various benefits compared to other remote desktop design such as ideally transferring the graphic device interface data, and complete the bitmap images. This paper also suggest that the remote collaborating system because that system is actualized and planned the remote desktop protocol structure. The remote collaborating system frame work is used to transport the re encryption design. For example Remote control. The remote co ntrol using the application approach to transferring the all remote desktop protocol users and it provides the replaying and recording the plan to the remote desktop protocol packets. It shows the execution and it gives the system demonstrates. This paper [5] describes about the mobile phones which are connected with the remote desktop. The mobile phones performance is based on the java program execution. The results of the execution method is based on the read and writing of web pages and email. Based on this paper the current trend is based on android applications. In this situation the mobile is used as a remote access computer. The desktop sharing system is used for the remote control access through the network. It has control functions with graphical screens of keyboard, mouse and it has capturing facility by using the device controllers. The entire system is based on the RFB protocol. This protocols is mainly used to share the information within the connected devices. To transmit the information from one port to another, it uses TCP/IP protocol. It has the range from 5900 to 5906. Two types of applications are used in the VNC system for the proper work. The server application is used by the machine and client and cont roller is used to manage this application. This server application is also used to supervise the device. The client side is called as viewer and it is based on the performance. The controlled machine has the main response to monitor the desktop and shared information. It is also used to capture and convert the activities of the user desktop through the RFB protocols messages. In the other side, the server brakes the data and events collected from the client and send it to the self-system. The server is responsible to update the screens with graphics and it must be sent to the desktop view of the client. The users who are having mobile phones can access the desktops directly and it will work well. If the user wants to make a call from the mobile then the connection should be terminated from the network. Critical Thinking To establishing the system connection, the system administrator handle the various problems on the remote desktop protocol [6]. The Remote desktop protocol connecting the remote computer. If remote desktop is disconnected and it show the error message. The error message is, it does not support the Microsoft product. To connect a remote computer, it has some problems are occurred by a system administrator. These are listed below. Misinterpretation of the terminologies and settings. End user unauthorized access Port assignment Setting for Misconfiguration Misinterpretation of the Terminologies and Settings To install a remote computer, first install an aka terminal licensing server on the system. Establishing the remote connection is used to install an aka terminal server or remote desktop session host. The remote connection first establishing the both servers. In out of network, the remote computer is support more than one network concurrently [7]. End user Unauthorized Access To access a remote desktop, the end user has the proper permission but the user groups does not have the proper permission to access the remote system [8]. To user group access the remote computer with the help of the server. The server local security policy provides the facility to allow the user to login. Port assignment In remote desktop access, the port assignment is the main issues. This problem blocking the port number or port assignment on the systems. To solve this problem by using the default port for RDP. The default port number is necessary to ensure the port assignments. The port assignments based on port numbers. The port numbers are based on the three ranges such as user ports, dynamic port and user ports. Commonly all the ports are based on default logical switch. If you want create the new logical switches and it does not have the ports so assign the ports to newly created logical switches. Setting for Misconfiguration Another main problem is limited number of the end user. The limited number of end users are access the remote desktop services [9]. It has the some connection problem. This connection problems are handled by, To enabling the unlimited connections. Setup the Network adapter. The end users are associated with Centre and help desk. First establishing the help desk, it does not need the information to implementation. More than nineteen years ago, the help desk was accepted and established. Then it is difficult to contact colleagues and friends with the help desk assistance. But now, help desk has the some critical issues and it analyzed by the managers. It use the telephonic communication. The help desk technology is the best technology and it manages the various communication type. It also called as service desk. The communication between the people using the non-voice or voice like message and emailing [10]. Source Support The user support strategy must evaluated by the end users based on cost and value. In organization, third party organization outsourcing and support worker are very important. But it is very critical process [11]. The end user support strategy is used for our sourcing and supporting process. In organization, the technical work support the out sourcing process by using the help desks and this process suitable for all the information technologies managements. The managers are resolving this issues in IT industries and the solution is provided by the people. In this problem, the main challenges is to get and find the help desk workers for the out sourcing process and automated products. So analyzing this problem the out sourcing in business industry. The business strategy providing the customer support system and services [12]. Method Support The main decision is depends on the source and it provided by the support given to outsource. The end users contacts are helping the people by using the dedicated help desk [13]. This problem handled by the end user application. The major issue is end user providing the incomplete, inaccurate and obscure information from the help desk because the help desk should support the end user and it leads to the technical support method. The outsourcing support help desk is used to gives the facility to ask the clearing method by the people [14]. Every people contact the support workers through the telephone contact. Telephone contact is used to gives the best solution for the end users and it preferred for the interaction between the support specialist and end user [15]. It is the best opportunity to clarify the issue information to the end users. This telephonic method is used for support process. The support specialist are needs to improve the application confidence and access the resource s [16]. References [1] K. Bhandari, V. Mandole, A. Munde and S. Takmare, "Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser",International Journal of Computer Science and Information Technology Research, vol. 3, no. 1, pp. pp: (369-373), 2015. [2] R. Kumar and A. Anil, "Development of Remote Access Network Communication (RANC)",International Journal of Computer Applications (0975 8887, vol. 27, no. 8, 2011.ed: 26- Jan- 2017]. [3] J. chintalapati and S. Rao T.Y.S, "Remote computer access through Android mobiles",IJCSI International Journal of Computer Science Issues, vol. 9, no. 5, 2012. [4] C. Tsai and W. Huang, "Design and Performance Modeling of an Efficient Remote Collaboration System",International Journal of Grid Distribution Computing, vol. 8, no. 4, 2015. [5] A. Jadhav, V. Oswal, S. Madane, H. Zope and V. Hatmode, "VNC ARCHITECTURE BASED REMOTE DESKTOP ACCESS THROUGH ANDROID MOBILE PHONES",International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 2, pp. 98-99, 2012. [6]D. Caesar -Dare and D. Meisels, "Remote Access",https://rpcug.com, 2017. [Online]. Available: https://rpcug.com/webdocs/RemoteDesktop.pdf. [Accessed: 24- May- 2017]. [7]"Guide to Remote Desktop Connection",nus.edu.sg, 2017. [Online]. Available: https://www.nus.edu.sg/comcen/gethelp/guide/itcare/Guide%20to%20Remote%20Desktop%20Connection.pdf. [Accessed: 24- May- 2017]. [8]"Critical Pains with Remote Scanning",tricerat.com, 2017. [Online]. Available: https://www.tricerat.com/sites/default/files/whitepapers/8criticalpains.pdf. [Accessed: 24- May- 2017]. [9]W. Barre, "Remote Desktop Connection Setup",wp.kings.edu, 2017. [Online]. Available: https://wp.kings.edu/learninghub/wp-content/uploads/sites/7/2015/06/Remote-Desktop-Connection-Setup-Staff-Only.pdf. [Accessed: 24- May- 2017]. [10]R. M. Sweeney, "Implementation of Remote Desktop End-User Support Forum As a Means to Reduce How-To Support Contacts",pdfs.semanticscholar.org, 2017. [Online]. Available: https://pdfs.semanticscholar.org/ca9b/f27c31e07b16be7c157d41427934fd781b7a.pdf. [Accessed: 24- May- 2017]. [11]J. H. Devare and S. D.Kotkar, "Remote Access for Android Phones",ijecs.in, 2017. [Online]. Available: https://www.ijecs.in/issue/v3-i4/19%20ijecs.pdf. [Accessed: 24- May- 2017]. [12]"Setting up a Remote Desktop Connection - JCU Australia",Jcu.edu.au, 2017. [Online]. Available: https://www.jcu.edu.au/library/connect/remote-access/setting-up-a-remote-desktop-connection. [Accessed: 24- May- 2017]. [13]G. Frosio, "Open Access Publishing: A Literature Review",SSRN Electronic Journal. [14]P. Thenkabail, "Remote Sensing Open Access Journal: Increasing Impact through Quality Publications",Remote Sensing, vol. 6, no. 8, pp. 7463-7468, 2014. [15]. Darabont, K. Kiss and J. Domokos, "Performance Analysis of Remote Desktop Virtualization based on Hyper-V versus Remote Desktop Services",MACRo 2015, vol. 1, no. 1, 2015. [16]S. Kapoor, A. Verma and A. Lala, "To Access Remote Desktop using Windows Azure Cloud Computing",IJARCCE, pp. 98-100, 2015.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.