Sunteți pe pagina 1din 37

REMOTE ACCESS

Definition
Remote access is the ability to get access to a computer or a network from a remote distance. Ex. Dial-up connection through desktop, notebook, or handheld computer modem over regular telephone lines is a common method of remote access.

Journals
1. Enhancing Mobile Business Through a TaskOriented Model for Mobile Remote Access (Khankan and Steele, 2007) Main Thought: Facilitating a global remote access to existing enterprise applications.

The paper proposes an architecture that provides task oriented access to existing remote applications in order to provide mobile users with the functionalities they need anywhere, anytime.

Textual and Graphical Task User Interfaces

Recording Phase

Architecture and Implementation

Key Benefits * Improves mobile services but requires additional device and network capabilities. * Promotes a simplified task-oriented mobile user interface * Exposes the functionalities of desktop applications as independent services.

2. Distributed Technologies for Remote Access of HDF Data (Shasharina,Li, Wang, Pundaleeka, Stein)

Main Thought: Describe several approaches to provide an access to remote HDF data and compares their performances.
HDF - Hierarchical Data Format - data format usually obtained from fusion, and plasma physics, geosciences, astronomy and medical research. (HDF, HDF4, HDF5)

PROTOTYPE SOLUTIONS * COBRA System - implemented using TAO 1.5.2 (C++ client and server) - uses HDF5 C language API functions which extract the specified data set from a given HDF5 file
* H5WS System - built using the C WS of Globus - has methods for retrieving the metadata of a dataset as well as extracting a dataset.

Test Results

With LAN, H5WS has too much overhead and is less efficient.
With WAN, H5ws gives the best results and uses the bandwidth well. With ESnet, H5WS seemingly looses if a single stream is used for GridFTP. But is still better than COBRA.

The study poses the challenges of using the WS C Core from the Globus Toolkit and GridFTP as a means for accesseing remote HDF5 data. It further recommends extending the service capability of the said prototype.

3. Web Based Remote Access Microcontroller Laboratory (Cimen, Yabanova, Cinar, Nartkaya, 2008)
Main Thought: Presentation of a web based remote access microcontroller laboratory. This is basically a laboratory on-line.

Remote access provides laboratory interface through the Web such that students can make the experiments by connecting to the experiment set which is connected to the computer that set as the web server.

Hardware Architecture

User Interface

Conclusion
A possibility for making microcontroller experiments independent from the time and place has been obtained for the students. Thus, increasing the programming skills of the students in doing remote experiments.

VPNs
Virtual Private Networks

Definition
A virtual private network (VPN) is a secure way of connecting to a private Local Area Network at a remote location, using the Internet or any unsecure public network to transport the network data packets privately, using encryption.

The VPN uses authentication to deny access to unauthorized users, and encryption to prevent unauthorized users from reading the private network packets. The VPN can be used to send any kind of network traffic securely, including voice, video or data.

Journals
1. Design of Survivable Optical Virtual private Networks (O-VPNs) Main Thought: Propose two novel ILP models namely, ILP-I and ILP-II, which aims to compromise between the capacity efficiency and computation time without losing the ability of addressing QoS requirements in each O-VPN.

O-VPN = extends enterprises private intranets across public networks which provides secure private interconnections essentially through private tunnels supported by WDM transmission.

Proposed Schemes 1. ILP-I 2. ILP-II

The ILP-I is designed to optimally allocate the working and space capacity in each O-VPN such that the total number of wavelength channels required for the working and protection paths is minimized.

With the exponential increase in the computation time of the ILP-I as the number of interconnections increase, the ILP-II provides a certain solution. - Dividing an O-VPN into multiple protection groups

Results

The paper proposed two models for survivable O-VPNs; ILP-I and ILP-II. ILP-I - considers each O-VPN as protection groups and performs resource allocation according to the traffic matrix. ILP-II - an O-VPN is broken down into small protection groups where all the working light paths in a group are mutually link-disjointedly routed.

2. A New VPN Routing Approach for Large Scale Networks

Main Thought: This paper shows that BGP is not appropriate for large scale VPN routing because it causes some router to keep state for all routes in the network.

Border Gateway Protocol (BGP) is the protocol backing the core routing decisions on the Internet.

Problem Definition
Provider goals and desired properties
Isolation is a key word in the VPN service provisioning. The different VPNs have to be isolated as if they had dedicated links between their different sites.

A simple provider network model


A VPN is composed of a set of sites that need to be interconnected. A VPN site is identified by one (or more) site identifier(s). The proposed model is even capable of determining the CoS (class of service).

Basic VPN routing needs


By Routing, we mean the set of procedures that allow a source host to reach a destination host. By definition, distant VPN sites that want to communicate do not have direct connectivity. Therefore, routing is done by the VPN provider.

Proposed Solution * Two- Step VPN routing


- an End-to-End signaling approach in which we separate two concerns: the creation of VPN topology and the advertisement of VPN site reachability.

3. Network Programmability for VPN Overlay Construction and Bandwidth Management

Main Thought: Present an application of a new programmable architecture to enable ondemand VPN construction, bandwidth management, and secure autonomous VPN control onto shared commercial structure.

Solution
SXD-PNP is a flexible programmable router architecture that enables on-demand service deployment. SXD-PNP services modify the handling of traffic. SXD-PNP builds on an abstract node model called the Hardware Base Abstraction (HBA).

Results
A new platform was presented, SXD-PNP, that allows practical, secured and true partitioning of network resources on commercial devices.

S-ar putea să vă placă și