logo

Comparison of Remote Access Strategy and Direct Access Strategy

12 Pages2896 Words375 Views
   

Added on  2023-06-13

About This Document

This essay discusses the comparison between Remote Access Strategy and Direct Access Strategy in terms of their response time, functionality, pros and cons, and security. It also highlights the differences between the two strategies and concludes that Direct Access Strategy is better for higher security and lesser response time.

Comparison of Remote Access Strategy and Direct Access Strategy

   Added on 2023-06-13

ShareRelated Documents
Running head: COMPARISON OF RAS AND DAS
Comparison of Remote Access Strategy and Direct Access Strategy
Name of the Student
Name of the University
Author’s Note:
Comparison of Remote Access Strategy and Direct Access Strategy_1
1
COMPARISON BETWEEN RAS AND DAS
Introduction
Remote access is the capability to have access to all computers or systems from
remote location. It helps in the accessing of network even if the person is not present in the
specific part (Rhodes-Ousley, 2013). Direct access is the capability to access any physical
record, which is kept in the discrete location. Both remote access and direct access strategies
have their distinct functions.
The following essay will outline a brief discussion on the two important strategies of
memory allocation viz. remote access strategy and direct access strategy in terms of their
response time for any particular organization. A detailed comparison between the response
times of each strategy for the company is provided in the essay.
Discussion
i) Functionality of Each Strategy
Both the Remote Access Strategy and the Direct Access Strategy have unique
functionalities (Chuang & Chen, 2014). These functions extremely important as well as
relevant in managing any network and memory and also any company where there is a high
demand to establish connections remotely. The main functions of the remote access strategy
are given below:
i) Provides Allowances: This is the first and the foremost function of remote access
strategy (Jones et al., 2014). It helps to provide allowances for the purpose that any single
operator might have administrative overview on the various disparate systems, which are
taken into consideration within the information of the organization.
Comparison of Remote Access Strategy and Direct Access Strategy_2
2
COMPARISON BETWEEN RAS AND DAS
ii) Acknowledges Interruption: This is the second functionality of remote access
strategy (Melkonyan et al., 2014). It explicitly acknowledges any type of interruption,
prevention, hijacking or capturing of remote access through the specific activities of any
party that has security controls even after the communications are operated by system owner.
iii) Builds Connection: This is the most important and significant functionality of
remote access strategy. It helps to build the connection with the virtual private network or
VPN, local area network or LAN and the wide area network or WAN (Maiti, Maxwell &
Kist, 2014). This type of connection helps the user to access any type of network remotely
and without any type of complexity.
iv) Excludes Communication: The fourth functionality of remote access strategy is to
exclude the communication between the network areas that are protected.
v) Providing Common Environment: The remote access strategy is responsible for
providing common environment, where all the different sources like clients, intermediaries
and even the offsite employees could access information through emails and all types of web
browsers (Maiti, Kist & Maxwell, 2015). Most of the organizations supply their own specific
virtual private network connections
vi) Includes Communications over Equipments: Remote access strategy even
includes communication over various equipments where the logical and physical security is
not validated explicitly (Gill, Yang & Wang, 2013).
There are various functionalities of the Direct Access strategy as well. They are given
below:
i) Provides Intranet Connectivity: The first and the foremost functionality of direct
access strategy. The Direct Access provides intranet connectivity to the client computers as
Comparison of Remote Access Strategy and Direct Access Strategy_3
3
COMPARISON BETWEEN RAS AND DAS
long as they are being connected to the Internet connection (Oberto, 2013). It helps to
connect to the computer automatically and without any type of external connections.
ii) Establishes IPsec tunnels: The direct access strategy establishes IPsec tunnels to
the server of Direct Access from the clients and thus utilizes IPv6 for reaching to the intranet
resources or all clients of Direct Access (Brisaboa, Ladra & Navarro, 2013).
ii) Highlighting the Pros and Cons of Each Strategy
There are some of the most significant and important pros and cons of remote access
and direct access strategies. The various pros and cons of remote access strategy are as
follows:
Pros of Remote Access Strategies
i) The first advantage is that it responds well in every emergency situation, which
needs immediate access (Li et al., 2014).
ii) The second significant benefit of remote access is that documentation could be
done anywhere.
iii) Connections to the local area network, wide area network and virtual private
network are extremely easier in comparison to all other networks (Liyanage, Ylianttila &
Gurtov, 2014).
iv) The fourth important advantage of remote access strategy is that the systems could
be easily accessed.
v) The fifth advantage of the remote access strategy it helps to include
communications over the equipments (Li et al., 2014).
Comparison of Remote Access Strategy and Direct Access Strategy_4

End of preview

Want to access all the pages? Upload your documents or become a member.