Вы находитесь на странице: 1из 32

Client Server System and

Remote Connectivity

Centralized Vs. Distributed


Processing

Centralized Processing

In the initial years of centralized computing, database was


stored in a server which was generally a powerful mainframe.

It has large quantity of memory, storage and multiple CPUs.

Using a LAN or WAN technology users on remote terminals


were connected to mainframe.

The access to database was achieved as follows:


1. The request was typed as the terminal by the user.
2. Request was then transmitted across the network to the
mainframe
3. The request is processed and response is formulated.
4. This response is then transmitted back across the network
and displayed on the terminal.

Distributed Processing

In distributed processing, most of the processing is done by the


client computer and the file server only stores and serves data.
Hence, the client must have more processing power and
memory.

The access to the information in the database was made


possible as follows:
1. A database application is accessed from the client
computer by the user.
2. This application then used to execute the database query.
3. The central file server stores the data needed to process
this query.
4. The query is then executed on the client computer and the
results are displayed.
5. If there are any changes in the data because of query, it
should be recorded on the server.

Remote Access
Communication established with a distant computer
systems or network is called remote access.
Types of Remote Access
Dial up remote access
Virtual Private Network
Dedicated connection

Dial up Remote Access


A remote system is connected to a private
network using a private dial-up
connection.
It requires two systems such as a Remote
Access Server (RAS) and a client running
dial up network.

Virtual Private Network (VPN)


A VPN is a private network created over a public one.
Its done with encryption, this way, your data is encapsulated
and secure in transit this creates the virtual tunnel.
A VPN is a method of connecting to a private network by a
public network like the Internet.
An internet connection in a company is common. An Internet
connection in a Home is common too. With both of these, you
could create an encrypted tunnel between them and pass
traffic, safely - securely.

Creating VPN Connection


If you want to create a VPN connection you will have to
use encryption to make sure that others cannot intercept
the data in transit while traversing the Internet.
Windows XP provides a certain level of security by using
Point-to-Point Tunneling Protocol (PPTP) or Layer Two
Tunneling Protocol (L2TP). They are both considered
tunneling protocols simply because they create that
virtual tunnel just discussed, by applying encryption.

Create a New Connection

If you are prompted, you need to select whether you will use
a dialup connection or if you have a dedicated connection to
the Internet either via Cable, DSL, T1, Satellite, etc. Click
Next.

Connect the VPN

VPN Security
Firewalls
A filtering mechanism which checks the incoming and
outgoing information between the local network and
foreign network.

Encryption
The most effective way to achieve data security is to
translate the data into a secrete code. This translation is
called encryption and the encrypted data is called as the
cipher text.

IPSec
Internet Protocol Security (IPSec) is a protocol which
provides enhanced security features, such as better
encryption and authentication.

VPN Tunneling
Data intended for use only within a private network can
be transmitted through public network. In such a cases,
the public network may not be aware that the data
transmitted is part of the private network. This process is
knows as tunneling.
A Logical network connection is established and
maintained which has packets constructed in a specific
VPN protocol format.
These packets are encapsulated within other carrier
protocol and then tranmsitted between VPN client and
server.

Types of VPN Tunneling


Voluntary tunneling
In voluntary tunneling, the connection setup is managed
by the VPN client. The client first establishes a connection
with the carrier network provider. In the case of Internet
VPNs, the carrier network provider can be an ISP. Then a
tunnel is created by the VPN client application to a VPN
server over the live connections.
Compulsory tunneling
In compulsory tunneling, VPN connection setup is
managed by the carrier network provider. When an
ordinary connection is made by the client to the carrier, it
immediately initiates a VPN connection between the client
and a VPN server.

VPN Tunneling Protocols


Point to Pint Tunneling Protocol (PPTP)
PPTP is popular because it is easy to configure and it was
the first VPN protocol that was supported by Microsoft
Dial-up Networking. All releases of Microsoft Windows
since Windows 95 OSR2 are bundled with a PPTP client.
Layer Two Tunneling Protocol (L2TP)
L2TP = L2F + PPTP.
L2F= Layer 2 Forwarding from CISCO
Allows multiple tunnels between the same end points.
Better compression and flow control.

Internet Connection Sharing

With Internet Connection Sharing, you can use networked


computers to share a single connection to the Internet.

To use Internet Connection Sharing to share your Internet


connection, the host computer must have one network
adapter that is configured to connect to the internal
network, and one network adapter or modem that is
configured to connect to the Internet.

It is assumed that you already have an existing Internet


connection configured on the server and a NIC (network
interface card) is installed in each computer on your LAN.

There are three separate processes involved:


1. Configure the NIC card on your network (LAN)
2. Configure ICS to work with your dialup connection
3. Configure the node PC's on your LAN

Configuring the NIC on the server


1. Open Local Area Connection, select Properties.
2. Highlight Internet Protocol (TCP/IP) and then click on the
Properties button.
3. Assuming you are using private IP address space type in
192.168.0.1 in the "IP address box".
4. Type in 255.255.255.0 in the "Subnet mask:" box.

Configuring ICS on the server


In the Network Connections
window right click on the Icon
you use to connect to the
Internet.
Select Properties =>Advanced.
Click inside the box "Allow
other network users to
connect through this
computers...". Click OK.

ICS is now configured on the


server.

Configuring the PC's on your LAN


1. Click Network Connections.
2. Right-click Local Area Connection, and then click
Properties.
3. Click the General tab, click Internet Protocol (TCP/IP)
4. Click Obtain an IP address automatically and then click
OK.
Note You can also assign a unique static IP address
manually, in the range of 192.168.0.2 to 192.168.0.254.
For example:
IP Address 192.168.0.2
Subnet mask 255.255.255.0
Default gateway 192.168.0.1

Вам также может понравиться