Remote Desktop and PuTTY Connection for Network Systems
Verified
Added on 2023/06/07
|15
|2745
|137
AI Summary
This assignment explains how to set up a remote desktop connection and PuTTY connection for network systems. It covers file operations and file transfer using UNIX commands. It also explains concepts of addressing, subnetting, and assigning IP addresses.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
etwork SystemsIFN507 N Assignmentracticalroblem Solvingasks01 - PPT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1. Problem Solving Task 1: Remote Desktop Sub-task 1: To achieve sub-task 1, two computers has been connected through the same internet. The operating system on both computers is Windows 7 and I have used ‘Remote Desktop Connection’ program to connect both computers. Pre-requisites before making a connection to remote computer: Make sure the computer is switched on and connected to network. Make sure ‘Remote Desktop’ option is enabled and network access is possible. Note down the name of the computer you are going to connect to. Make sure firewall is allowing Remote Desktop Connections. To enable Remote Desktop option on computer you want to connect to: Right-Click on Computer and Select Properties Open Remote Settings window Under Remote tabRemote DesktopCheck on the box “Allow Connections only from computers running Desktop with Network Level Authentication (more secure) Click Ok. In the above image we can see that the radio button which is selected is “Don’t allow connections to this computer’’. We have to change this in-order to allow remote connections. 1
To check the name of the computer: Right-Click on Computer and Select Properties Under Computer name, domain and workgroup settings you will find Computer name To check firewall: Go to control panelClick on System and SecurityUnder Windows Firewall, click Allow a program through Windows Firewallclick on change settings and tick the check box adjacent to Remote DesktopClick Ok Now the remote computer is ready to get connected with all the settings done we will now make a connection to it through second computer. Right click on Computer and select properties Open Remote Settings window Under Remote tabRemote DesktopCheck on the box “Allow Connections only from computers running Desktop with Network Level Authentication (more secure) 2
Click Select Users: In case you are the admin you will automatically be added to the list of users Click on add under Remote Desktop Users. Select Users dialog box will open. Under location tab click on it and select the area where you want to search Type a user name under the tab “Enter the object names to select” and click ok This user name will get displayed under Remote Desktop Users dialog box. Click Ok twice. 3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Make sure the remote computer has been set to Never in hibernations and sleep settings under power supply otherwise connection will not be possible. Connection is now set up. To start working on the remote computer Type Remote Desktop Connection in the search box then from the list provided select Remote Desktop Connection. Inside the box: the computer, either type the IP address or name of the computer you want to connect to. You may start Working. Sub-task 2 After a successful connection has been established to the remote computer from the local computer following scenarios was performed on the remote computer via local computer. Copy an existing file from the D drive of the remote computer to the E drive of the remote computer. Go to the desktop in remote computer. Select the file explorer folder and double click it. Double click on the D drive and select the file to copy with a single click. Hover the mouse arrow on the file and right click and select copy. Now go to E drive and click there. Right click with the mouse and select paste. File will be copied from D drive to E drive on the remote computer. Creating a new MS Word file on the desktop and rename it to ‘Network Project’ Go to the desktop in remote computer. Right click in the empty space on the desktop and select New From the options select Microsoft Word document A word document will then appear on the desktop Right click on it and select Rename 4
Type ‘Network Project’ and enter. A new MS Word file with name ‘Network Project’ will be created on the desktop of the remote computer. Composing an email and sending it via remote computer Go to the desktop in remote computer. Open a browser and type the address of the mail explorer to be used for the purpose of sending an email Login with your Id and Passwords. Compose a mail and send it to the receiver Logout the email id and close the explorer. In this case an email will be sent to the receiver with the IP address of the remote computer irrespective it has been handled through local computer. Deleting an existing file in the D drive by the name “Network Project” Go to the desktop in remote computer. Select the file explorer folder and double click it. Double click on the D drive and select the file with name “Network Explorer”. Right click on it and click Delete. A window will appear. Select ok from it. File will be deleted from the D drive. The file will be permanently deleted from the remote computer and it will not come back after the remote connection is disabled. All the scenarios designed above when handled on remote computer through local computer will act as if they are being handled locally and any changes made will be permanent and will remain even after the connection is de-established. Sub-Task 3 After the connection was established, an invitation file was sent to local computer to allow it to take over the controls of remote computer. It was conducted by following steps: 5
Type: Windows Help and support in search bar and select Windows Remote Assistance Select ‘Invite someone you trust to help you’ and email the invitation file provided. On the local computer select ‘Help someone who has invited you’ and enter the password provided. Control will be transferred to local computers. When you click on share control option following dialog box is prompted Select yes and connection is established. The scenarios designed in sub-task 2 was then operated and below are some screenshots while the scenarios being performed 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
In above a file being copied from one drive to another 7
In above desktop being operated to create new MS Word file on remote computer. 2. Problem Solving Task 2: Remote Connection Sub-Task 1 Secure Shell (SSH) is a way to operate networking services in a secured way on an unsecured network. PuTTY is a free open-source example of SSH connections for windows. It is believed 8
to be the best amongst its alike alternatives. To connect two computers via PuTTY, following steps has to be performed: The first step is to install PuTTY in order to make a remote connection Depending upon the version of the windows we have to install the setup. I am using 32- bit operating system so I downloaded “putty-0.70-installer.msi” from the above window. After the download process has ended for the setup. Double click on it to run and finish the setup process. To make a remote connection using PuTTY Enter the IP address of the remote computer into the window opened after installing PuTTY. 9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Enter the port number of SSH server Save the connection for the entire session. A desktop shortcut can also be created to store the PuTTY session. Connection is now established. Sub-Task 2 To make file operations possible in PuTTY we have to add another setup to our PuTTY software which is pscp.exe. This is a kind of file transfer protocol that allows PuTTY to make file operations possible. 10
After login to the server we are prompted with following: psftp> (a) To move a file from remote computer to the local computer Suppose a file has to be transferred from the directory D, Navigate to the directory D on the remote computer. Now If file has to be copied in directory E of local computer, Navigate to it by typing cd E enter This will place you in the E directory To begin the transfer, type command “put filename” in the local computer and file with the specified file name will be copied to the local computer. (b) To rename a file on remote computer via local computer To rename a file on remote computer we will navigate to the file using proper directories and the following command will rename the file to a new name: mv original_file new_name (c)Download a file from the remote computer to the local computer To download a file onto the local computer it is again not possible via PuTTY alone. We need any file transfer protocol to get the files. After navigating to the file to be download. Type the following command in the command prompt window of local computer $ scp your_username@remotehost.edu:foobar.txt –r /some/local/directory/filename This will download the entire file to the local computer. (d) Deleting a file on remote computer via local computer Suppose there is a file names NetworkProject to be deleted present at folder Network following command should be typed at local computer to delete it ssh 182.2.34.1 "rm -f /etc/yum.Network.d/repo.1 master.er top.fg NetworkProject.l" 11
5. Reflections This assignment on Network Systems has helped me a lot to understand the concepts of making a connection between two computers both theoretically and practically. After completing this assignment I am now able to set up a remote connection between two computers and perform operations on it such as moving or copying a file, creating or deleting a file on remote computer and similar other operations. From the first task I learned about the remote desktop connections which may prove very helpful in case someone needs assistance on some program which they might not be able handle. In that case remote desktop connection prove to be useful which will provide a direct access and control of client computer’s to the local computer and the problem could be resolved in no time. The next task in the assignment provided me with a chance to step out of my comfort zone and ask help. I connected with my seniors to assist me with, how to use PuTTY and its different commands. To successfully install and make a SSH connection via PuTTY was really challenging for me but with sufficient help and my hard work I was able to complete it. I also learned the file transfer operations with the help of UNIX commands. I also learned to set up a virtual machine using Oracle VirtualBox. I learned to make necessary changes to its settings in order to make it work properly. As evidence to my work I have attached some of the screenshots to task 3. In task 4 I was able to design variable length addressing scheme depending upon the given scenario. It helped to enhance my knowledge of how the addresses are broken down and how Subnetting works. I also learned about assigning an IP address with a unique subnet to each interface on the router. Concepts of Address, subnet, subnet mask and interface were not clear to me before but this assignment helped me to understand all its concepts in a better way. I am glad and thankful to my teachers who gave me this assignment to better understand that ‘how the networking works on real platform’. I feel I still need to improve a little on UNIX commands to handle file operations using PuTTY and I am confident that I will learn it gradually. 12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References Abrams, L. C., Cross, R., Lesser, E. & Levin, D. Z. (2013) Nurturing Interpersonal Trust in Knowledge-Sharing Networks,Academy of Management Executive, 17(4): 64-77. Alizadeh, S., Yang, M., Sharif, S., & Katti, N.(2013). Minimal near-optimal datacenter transport. In Proceedings of the ACM SIGCOMM,Conference on SIGCOMM, SIGCOMM, pages 435–446, New York, NY, USA. Allen, T. J. (2007). Managing the Flow of Technology: Technology Transfer and the Dissemination of Technological Information within the R&D Organization. Cambridge, Mass.: MIT Press. Andriessen, H. (2011). Mediated communication and new organizational forms. In c.L. Cooper and I.T.C. Robinson (Eds.), International review of industrial and organizational psychology. New York: Wiley. Brause, T. & Hepp, M. (2014). Credit card fraud detection by adaptive neural data mining. In Proceedings of the11th IEEE International Conference on Tools with Artificial Intelligence, pages 103-106. Brown, J. S. & Duguid, P. (2010) 'Mysteries of the Region: Knowledge Dynamics in Silicon Valley', in Lee, C.-M. (eds)The Silicon Valley Edge a Habitat for Innovation and Entrepreneurship,Stanford, Calif.: Stanford University Press. Cambra, G. (2009). The implementation of a french textual teleconferencing prototype and experiments in IT uses. In L. Qvortrup (Ed.), Social experiments witch information technology. Dordrecht: Reidel. Ciborra, C. U. & Lanzara, G.F. (2011). Designing networks in action, formative contexts and post-modern systems development. In 1.H. Erik Andriessen and R.A. Roe (Eds.), Telematics and work. Hove, UK: Lawrence Erlbaum. Frednes, K. (2011) 'Læringsmiljø for Kompetente', in Brandi, S., Hildebrandt, S. and Nordhaug, O. (eds) Kompetansegullet @ Det Nye Arbeidsliv pp. Oslo: Cappelen. Freeman, C. (1979) 13
'Determinants of Innovation. Market Demand, Technonolgy and the Response to Social Problems.' Futures: 206-215 Gardner, R. M., Overhage, J. M., Steen, E. B., Munger, B. S., Holmes, J. H., Williamson, J. J., & Detmer, D. E. (2012). Core content for the subspecialty of clinical informatics.Journal of the American Medical Informatics Association, 16(2), 153–157. doi:10.1197/jamia.M3045. Gustavsen, B. and Engelstad, P. H. (2016) 'The Design of Conferences and the Evolving Role of Democratic Dialog in Changing Working Life', Human Relations, 39(2): 101-116. Hampel, E. (2008).Information protectionand network security. SPIE, Washington. Huttenrauch, H., Green, A., Norman, M., Oestreicher, L., & Eklundh, K.S. (2014). Involving users in the design of a mobile office robot.IEEE Transactions on Systems, Man, and Cybernetics.pp. 113-124. Kaufman, C. (2015).Network security: Privatecommunication in a public world. Prentice Hall, New Jersey. Shaffer, L. & Simon, R. (2016).Network security. AP Professional,Boston, Stallings, W. (2014).Cryptography andnetwork security: Principles and practice, Prentice Hall, New Jersey. 14