Remote Desktop and PuTTY Connection for Network Systems
VerifiedAdded on 2023/06/07
|15
|2745
|137
AI Summary
This assignment explains how to set up a remote desktop connection and PuTTY connection for network systems. It covers file operations and file transfer using UNIX commands. It also explains concepts of addressing, subnetting, and assigning IP addresses.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
etwork SystemsIFN507 N
Assignment ractical roblem Solving asks01 - P P T
Assignment ractical roblem Solving asks01 - P P T
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1. Problem Solving Task 1: Remote Desktop
Sub-task 1:
To achieve sub-task 1, two computers has been connected through the same internet. The
operating system on both computers is Windows 7 and I have used ‘Remote Desktop
Connection’ program to connect both computers.
Pre-requisites before making a connection to remote computer:
Make sure the computer is switched on and connected to network.
Make sure ‘Remote Desktop’ option is enabled and network access is possible.
Note down the name of the computer you are going to connect to.
Make sure firewall is allowing Remote Desktop Connections.
To enable Remote Desktop option on computer you want to connect to:
Right-Click on Computer and Select Properties
Open Remote Settings window
Under Remote tab Remote Desktop Check on the box “Allow Connections only
from computers running Desktop with Network Level Authentication (more secure)
Click Ok.
In the above image we can see that the radio button which is selected is “Don’t allow
connections to this computer’’. We have to change this in-order to allow remote connections.
1
Sub-task 1:
To achieve sub-task 1, two computers has been connected through the same internet. The
operating system on both computers is Windows 7 and I have used ‘Remote Desktop
Connection’ program to connect both computers.
Pre-requisites before making a connection to remote computer:
Make sure the computer is switched on and connected to network.
Make sure ‘Remote Desktop’ option is enabled and network access is possible.
Note down the name of the computer you are going to connect to.
Make sure firewall is allowing Remote Desktop Connections.
To enable Remote Desktop option on computer you want to connect to:
Right-Click on Computer and Select Properties
Open Remote Settings window
Under Remote tab Remote Desktop Check on the box “Allow Connections only
from computers running Desktop with Network Level Authentication (more secure)
Click Ok.
In the above image we can see that the radio button which is selected is “Don’t allow
connections to this computer’’. We have to change this in-order to allow remote connections.
1
To check the name of the computer:
Right-Click on Computer and Select Properties
Under Computer name, domain and workgroup settings you will find Computer name
To check firewall:
Go to control panelClick on System and SecurityUnder Windows Firewall, click
Allow a program through Windows Firewallclick on change settings and tick the check
box adjacent to Remote DesktopClick Ok
Now the remote computer is ready to get connected with all the settings done we will now make
a connection to it through second computer.
Right click on Computer and select properties
Open Remote Settings window
Under Remote tab Remote Desktop Check on the box “Allow Connections only
from computers running Desktop with Network Level Authentication (more secure)
2
Right-Click on Computer and Select Properties
Under Computer name, domain and workgroup settings you will find Computer name
To check firewall:
Go to control panelClick on System and SecurityUnder Windows Firewall, click
Allow a program through Windows Firewallclick on change settings and tick the check
box adjacent to Remote DesktopClick Ok
Now the remote computer is ready to get connected with all the settings done we will now make
a connection to it through second computer.
Right click on Computer and select properties
Open Remote Settings window
Under Remote tab Remote Desktop Check on the box “Allow Connections only
from computers running Desktop with Network Level Authentication (more secure)
2
Click Select Users: In case you are the admin you will automatically be added to the list
of users
Click on add under Remote Desktop Users.
Select Users dialog box will open. Under location tab click on it and select the area where
you want to search
Type a user name under the tab “Enter the object names to select” and click ok
This user name will get displayed under Remote Desktop Users dialog box. Click Ok
twice.
3
of users
Click on add under Remote Desktop Users.
Select Users dialog box will open. Under location tab click on it and select the area where
you want to search
Type a user name under the tab “Enter the object names to select” and click ok
This user name will get displayed under Remote Desktop Users dialog box. Click Ok
twice.
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Make sure the remote computer has been set to Never in hibernations and sleep settings
under power supply otherwise connection will not be possible.
Connection is now set up.
To start working on the remote computer
Type Remote Desktop Connection in the search box then from the list provided select
Remote Desktop Connection.
Inside the box: the computer, either type the IP address or name of the computer you want to
connect to.
You may start Working.
Sub-task 2
After a successful connection has been established to the remote computer from the local
computer following scenarios was performed on the remote computer via local computer.
Copy an existing file from the D drive of the remote computer to the E drive of the
remote computer.
Go to the desktop in remote computer. Select the file explorer folder and double
click it.
Double click on the D drive and select the file to copy with a single click. Hover
the mouse arrow on the file and right click and select copy.
Now go to E drive and click there.
Right click with the mouse and select paste.
File will be copied from D drive to E drive on the remote computer.
Creating a new MS Word file on the desktop and rename it to ‘Network Project’
Go to the desktop in remote computer.
Right click in the empty space on the desktop and select New
From the options select Microsoft Word document
A word document will then appear on the desktop
Right click on it and select Rename
4
under power supply otherwise connection will not be possible.
Connection is now set up.
To start working on the remote computer
Type Remote Desktop Connection in the search box then from the list provided select
Remote Desktop Connection.
Inside the box: the computer, either type the IP address or name of the computer you want to
connect to.
You may start Working.
Sub-task 2
After a successful connection has been established to the remote computer from the local
computer following scenarios was performed on the remote computer via local computer.
Copy an existing file from the D drive of the remote computer to the E drive of the
remote computer.
Go to the desktop in remote computer. Select the file explorer folder and double
click it.
Double click on the D drive and select the file to copy with a single click. Hover
the mouse arrow on the file and right click and select copy.
Now go to E drive and click there.
Right click with the mouse and select paste.
File will be copied from D drive to E drive on the remote computer.
Creating a new MS Word file on the desktop and rename it to ‘Network Project’
Go to the desktop in remote computer.
Right click in the empty space on the desktop and select New
From the options select Microsoft Word document
A word document will then appear on the desktop
Right click on it and select Rename
4
Type ‘Network Project’ and enter.
A new MS Word file with name ‘Network Project’ will be created on the desktop of
the remote computer.
Composing an email and sending it via remote computer
Go to the desktop in remote computer.
Open a browser and type the address of the mail explorer to be used for the
purpose of sending an email
Login with your Id and Passwords.
Compose a mail and send it to the receiver
Logout the email id and close the explorer.
In this case an email will be sent to the receiver with the IP address of the remote
computer irrespective it has been handled through local computer.
Deleting an existing file in the D drive by the name “Network Project”
Go to the desktop in remote computer.
Select the file explorer folder and double click it.
Double click on the D drive and select the file with name “Network Explorer”.
Right click on it and click Delete. A window will appear. Select ok from it.
File will be deleted from the D drive.
The file will be permanently deleted from the remote computer and it will not come
back after the remote connection is disabled.
All the scenarios designed above when handled on remote computer through local
computer will act as if they are being handled locally and any changes made will be
permanent and will remain even after the connection is de-established.
Sub-Task 3
After the connection was established, an invitation file was sent to local computer to allow it to
take over the controls of remote computer. It was conducted by following steps:
5
A new MS Word file with name ‘Network Project’ will be created on the desktop of
the remote computer.
Composing an email and sending it via remote computer
Go to the desktop in remote computer.
Open a browser and type the address of the mail explorer to be used for the
purpose of sending an email
Login with your Id and Passwords.
Compose a mail and send it to the receiver
Logout the email id and close the explorer.
In this case an email will be sent to the receiver with the IP address of the remote
computer irrespective it has been handled through local computer.
Deleting an existing file in the D drive by the name “Network Project”
Go to the desktop in remote computer.
Select the file explorer folder and double click it.
Double click on the D drive and select the file with name “Network Explorer”.
Right click on it and click Delete. A window will appear. Select ok from it.
File will be deleted from the D drive.
The file will be permanently deleted from the remote computer and it will not come
back after the remote connection is disabled.
All the scenarios designed above when handled on remote computer through local
computer will act as if they are being handled locally and any changes made will be
permanent and will remain even after the connection is de-established.
Sub-Task 3
After the connection was established, an invitation file was sent to local computer to allow it to
take over the controls of remote computer. It was conducted by following steps:
5
Type: Windows Help and support in search bar and select Windows Remote Assistance
Select ‘Invite someone you trust to help you’ and email the invitation file provided. On the
local computer select ‘Help someone who has invited you’ and enter the password provided.
Control will be transferred to local computers. When you click on share control option following
dialog box is prompted
Select yes and connection is established.
The scenarios designed in sub-task 2 was then operated and below are some screenshots while
the scenarios being performed
6
Select ‘Invite someone you trust to help you’ and email the invitation file provided. On the
local computer select ‘Help someone who has invited you’ and enter the password provided.
Control will be transferred to local computers. When you click on share control option following
dialog box is prompted
Select yes and connection is established.
The scenarios designed in sub-task 2 was then operated and below are some screenshots while
the scenarios being performed
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
In above a file being copied from one drive to another
7
7
In above desktop being operated to create new MS Word file on remote computer.
2. Problem Solving Task 2: Remote Connection
Sub-Task 1
Secure Shell (SSH) is a way to operate networking services in a secured way on an unsecured
network. PuTTY is a free open-source example of SSH connections for windows. It is believed
8
2. Problem Solving Task 2: Remote Connection
Sub-Task 1
Secure Shell (SSH) is a way to operate networking services in a secured way on an unsecured
network. PuTTY is a free open-source example of SSH connections for windows. It is believed
8
to be the best amongst its alike alternatives. To connect two computers via PuTTY, following
steps has to be performed:
The first step is to install PuTTY in order to make a remote connection
Depending upon the version of the windows we have to install the setup. I am using 32-
bit operating system so I downloaded “putty-0.70-installer.msi” from the above window.
After the download process has ended for the setup. Double click on it to run and finish
the setup process.
To make a remote connection using PuTTY
Enter the IP address of the remote computer into the window opened after installing
PuTTY.
9
steps has to be performed:
The first step is to install PuTTY in order to make a remote connection
Depending upon the version of the windows we have to install the setup. I am using 32-
bit operating system so I downloaded “putty-0.70-installer.msi” from the above window.
After the download process has ended for the setup. Double click on it to run and finish
the setup process.
To make a remote connection using PuTTY
Enter the IP address of the remote computer into the window opened after installing
PuTTY.
9
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Enter the port number of SSH server
Save the connection for the entire session. A desktop shortcut can also be created to store
the PuTTY session.
Connection is now established.
Sub-Task 2
To make file operations possible in PuTTY we have to add another setup to our PuTTY software
which is pscp.exe. This is a kind of file transfer protocol that allows PuTTY to make file
operations possible.
10
Save the connection for the entire session. A desktop shortcut can also be created to store
the PuTTY session.
Connection is now established.
Sub-Task 2
To make file operations possible in PuTTY we have to add another setup to our PuTTY software
which is pscp.exe. This is a kind of file transfer protocol that allows PuTTY to make file
operations possible.
10
After login to the server we are prompted with following:
psftp>
(a) To move a file from remote computer to the local computer
Suppose a file has to be transferred from the directory D, Navigate to the directory D on
the remote computer.
Now If file has to be copied in directory E of local computer, Navigate to it by typing
cd E enter
This will place you in the E directory
To begin the transfer, type command “put filename” in the local computer and file with
the specified file name will be copied to the local computer.
(b) To rename a file on remote computer via local computer
To rename a file on remote computer we will navigate to the file using proper directories
and the following command will rename the file to a new name:
mv original_file new_name
(c) Download a file from the remote computer to the local computer
To download a file onto the local computer it is again not possible via PuTTY alone. We need
any file transfer protocol to get the files. After navigating to the file to be download. Type the
following command in the command prompt window of local computer
$ scp your_username@remotehost.edu:foobar.txt –r /some/local/directory/filename
This will download the entire file to the local computer.
(d) Deleting a file on remote computer via local computer
Suppose there is a file names NetworkProject to be deleted present at folder Network following
command should be typed at local computer to delete it
ssh 182.2.34.1 "rm -f /etc/yum.Network.d/repo.1 master.er top.fg NetworkProject.l"
11
psftp>
(a) To move a file from remote computer to the local computer
Suppose a file has to be transferred from the directory D, Navigate to the directory D on
the remote computer.
Now If file has to be copied in directory E of local computer, Navigate to it by typing
cd E enter
This will place you in the E directory
To begin the transfer, type command “put filename” in the local computer and file with
the specified file name will be copied to the local computer.
(b) To rename a file on remote computer via local computer
To rename a file on remote computer we will navigate to the file using proper directories
and the following command will rename the file to a new name:
mv original_file new_name
(c) Download a file from the remote computer to the local computer
To download a file onto the local computer it is again not possible via PuTTY alone. We need
any file transfer protocol to get the files. After navigating to the file to be download. Type the
following command in the command prompt window of local computer
$ scp your_username@remotehost.edu:foobar.txt –r /some/local/directory/filename
This will download the entire file to the local computer.
(d) Deleting a file on remote computer via local computer
Suppose there is a file names NetworkProject to be deleted present at folder Network following
command should be typed at local computer to delete it
ssh 182.2.34.1 "rm -f /etc/yum.Network.d/repo.1 master.er top.fg NetworkProject.l"
11
5. Reflections
This assignment on Network Systems has helped me a lot to understand the concepts of making a
connection between two computers both theoretically and practically. After completing this
assignment I am now able to set up a remote connection between two computers and perform
operations on it such as moving or copying a file, creating or deleting a file on remote computer
and similar other operations.
From the first task I learned about the remote desktop connections which may prove very helpful
in case someone needs assistance on some program which they might not be able handle. In that
case remote desktop connection prove to be useful which will provide a direct access and control
of client computer’s to the local computer and the problem could be resolved in no time.
The next task in the assignment provided me with a chance to step out of my comfort zone and
ask help. I connected with my seniors to assist me with, how to use PuTTY and its different
commands. To successfully install and make a SSH connection via PuTTY was really
challenging for me but with sufficient help and my hard work I was able to complete it. I also
learned the file transfer operations with the help of UNIX commands.
I also learned to set up a virtual machine using Oracle VirtualBox. I learned to make necessary
changes to its settings in order to make it work properly. As evidence to my work I have attached
some of the screenshots to task 3. In task 4 I was able to design variable length addressing
scheme depending upon the given scenario. It helped to enhance my knowledge of how the
addresses are broken down and how Subnetting works. I also learned about assigning an IP
address with a unique subnet to each interface on the router. Concepts of Address, subnet, subnet
mask and interface were not clear to me before but this assignment helped me to understand all
its concepts in a better way.
I am glad and thankful to my teachers who gave me this assignment to better understand that
‘how the networking works on real platform’. I feel I still need to improve a little on UNIX
commands to handle file operations using PuTTY and I am confident that I will learn it
gradually.
12
This assignment on Network Systems has helped me a lot to understand the concepts of making a
connection between two computers both theoretically and practically. After completing this
assignment I am now able to set up a remote connection between two computers and perform
operations on it such as moving or copying a file, creating or deleting a file on remote computer
and similar other operations.
From the first task I learned about the remote desktop connections which may prove very helpful
in case someone needs assistance on some program which they might not be able handle. In that
case remote desktop connection prove to be useful which will provide a direct access and control
of client computer’s to the local computer and the problem could be resolved in no time.
The next task in the assignment provided me with a chance to step out of my comfort zone and
ask help. I connected with my seniors to assist me with, how to use PuTTY and its different
commands. To successfully install and make a SSH connection via PuTTY was really
challenging for me but with sufficient help and my hard work I was able to complete it. I also
learned the file transfer operations with the help of UNIX commands.
I also learned to set up a virtual machine using Oracle VirtualBox. I learned to make necessary
changes to its settings in order to make it work properly. As evidence to my work I have attached
some of the screenshots to task 3. In task 4 I was able to design variable length addressing
scheme depending upon the given scenario. It helped to enhance my knowledge of how the
addresses are broken down and how Subnetting works. I also learned about assigning an IP
address with a unique subnet to each interface on the router. Concepts of Address, subnet, subnet
mask and interface were not clear to me before but this assignment helped me to understand all
its concepts in a better way.
I am glad and thankful to my teachers who gave me this assignment to better understand that
‘how the networking works on real platform’. I feel I still need to improve a little on UNIX
commands to handle file operations using PuTTY and I am confident that I will learn it
gradually.
12
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References
Abrams, L. C., Cross, R., Lesser, E. & Levin, D. Z. (2013) Nurturing Interpersonal Trust in
Knowledge-Sharing Networks, Academy of Management Executive, 17(4): 64-77.
Alizadeh, S., Yang, M., Sharif, S., & Katti, N.(2013). Minimal near-optimal datacenter transport.
In Proceedings of the ACM SIGCOMM, Conference on SIGCOMM, SIGCOMM, pages
435–446, New York, NY, USA.
Allen, T. J. (2007). Managing the Flow of Technology: Technology Transfer and the
Dissemination of Technological Information within the R&D Organization. Cambridge,
Mass.: MIT Press.
Andriessen, H. (2011). Mediated communication and new organizational forms. In c.L. Cooper
and I.T.C. Robinson (Eds.), International review of industrial and organizational
psychology. New York: Wiley.
Brause, T. & Hepp, M. (2014). Credit card fraud detection by adaptive neural data mining. In
Proceedings of the11th IEEE International Conference on Tools with Artificial Intelligence,
pages 103-106.
Brown, J. S. & Duguid, P. (2010) 'Mysteries of the Region: Knowledge Dynamics in Silicon
Valley', in Lee, C.-M. (eds) The Silicon Valley Edge a Habitat for Innovation and
Entrepreneurship, Stanford, Calif.: Stanford University Press.
Cambra, G. (2009). The implementation of a french textual teleconferencing prototype and
experiments in IT uses. In L. Qvortrup (Ed.), Social experiments witch information
technology. Dordrecht: Reidel.
Ciborra, C. U. & Lanzara, G.F. (2011). Designing networks in action, formative contexts and
post-modern systems development. In 1.H. Erik Andriessen and R.A. Roe (Eds.),
Telematics and work. Hove, UK: Lawrence Erlbaum.
Frednes, K. (2011) 'Læringsmiljø for Kompetente', in Brandi, S., Hildebrandt, S. and Nordhaug,
O. (eds) Kompetansegullet @ Det Nye Arbeidsliv pp. Oslo: Cappelen. Freeman, C. (1979)
13
Abrams, L. C., Cross, R., Lesser, E. & Levin, D. Z. (2013) Nurturing Interpersonal Trust in
Knowledge-Sharing Networks, Academy of Management Executive, 17(4): 64-77.
Alizadeh, S., Yang, M., Sharif, S., & Katti, N.(2013). Minimal near-optimal datacenter transport.
In Proceedings of the ACM SIGCOMM, Conference on SIGCOMM, SIGCOMM, pages
435–446, New York, NY, USA.
Allen, T. J. (2007). Managing the Flow of Technology: Technology Transfer and the
Dissemination of Technological Information within the R&D Organization. Cambridge,
Mass.: MIT Press.
Andriessen, H. (2011). Mediated communication and new organizational forms. In c.L. Cooper
and I.T.C. Robinson (Eds.), International review of industrial and organizational
psychology. New York: Wiley.
Brause, T. & Hepp, M. (2014). Credit card fraud detection by adaptive neural data mining. In
Proceedings of the11th IEEE International Conference on Tools with Artificial Intelligence,
pages 103-106.
Brown, J. S. & Duguid, P. (2010) 'Mysteries of the Region: Knowledge Dynamics in Silicon
Valley', in Lee, C.-M. (eds) The Silicon Valley Edge a Habitat for Innovation and
Entrepreneurship, Stanford, Calif.: Stanford University Press.
Cambra, G. (2009). The implementation of a french textual teleconferencing prototype and
experiments in IT uses. In L. Qvortrup (Ed.), Social experiments witch information
technology. Dordrecht: Reidel.
Ciborra, C. U. & Lanzara, G.F. (2011). Designing networks in action, formative contexts and
post-modern systems development. In 1.H. Erik Andriessen and R.A. Roe (Eds.),
Telematics and work. Hove, UK: Lawrence Erlbaum.
Frednes, K. (2011) 'Læringsmiljø for Kompetente', in Brandi, S., Hildebrandt, S. and Nordhaug,
O. (eds) Kompetansegullet @ Det Nye Arbeidsliv pp. Oslo: Cappelen. Freeman, C. (1979)
13
'Determinants of Innovation. Market Demand, Technonolgy and the Response to Social
Problems.' Futures: 206-215
Gardner, R. M., Overhage, J. M., Steen, E. B., Munger, B. S., Holmes, J. H., Williamson, J. J., &
Detmer, D. E. (2012). Core content for the subspecialty of clinical informatics. Journal of the
American Medical Informatics Association, 16(2), 153–157. doi:10.1197/jamia.M3045.
Gustavsen, B. and Engelstad, P. H. (2016) 'The Design of Conferences and the Evolving Role of
Democratic Dialog in Changing Working Life', Human Relations, 39(2): 101-116.
Hampel, E. (2008). Information protectionand network security. SPIE, Washington.
Huttenrauch, H., Green, A., Norman, M., Oestreicher, L., & Eklundh, K.S. (2014). Involving
users in the design of a mobile office robot. IEEE Transactions on Systems, Man, and
Cybernetics. pp. 113-124.
Kaufman, C. (2015). Network security: Privatecommunication in a public world. Prentice Hall,
New Jersey.
Shaffer, L. & Simon, R. (2016). Network security. AP Professional,Boston,
Stallings, W. (2014). Cryptography andnetwork security: Principles and practice, Prentice Hall,
New Jersey.
14
Problems.' Futures: 206-215
Gardner, R. M., Overhage, J. M., Steen, E. B., Munger, B. S., Holmes, J. H., Williamson, J. J., &
Detmer, D. E. (2012). Core content for the subspecialty of clinical informatics. Journal of the
American Medical Informatics Association, 16(2), 153–157. doi:10.1197/jamia.M3045.
Gustavsen, B. and Engelstad, P. H. (2016) 'The Design of Conferences and the Evolving Role of
Democratic Dialog in Changing Working Life', Human Relations, 39(2): 101-116.
Hampel, E. (2008). Information protectionand network security. SPIE, Washington.
Huttenrauch, H., Green, A., Norman, M., Oestreicher, L., & Eklundh, K.S. (2014). Involving
users in the design of a mobile office robot. IEEE Transactions on Systems, Man, and
Cybernetics. pp. 113-124.
Kaufman, C. (2015). Network security: Privatecommunication in a public world. Prentice Hall,
New Jersey.
Shaffer, L. & Simon, R. (2016). Network security. AP Professional,Boston,
Stallings, W. (2014). Cryptography andnetwork security: Principles and practice, Prentice Hall,
New Jersey.
14
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.