To achieve sub-task 1, two computers has been connected through the same internet. The operating system on both computers is Windows 7 and I have used ‘Remote Desktop Connection’ program to connect both computers.
Pre-requisites before making a connection to remote computer:
To enable Remote Desktop option on computer you want to connect to:
In the above image we can see that the radio button which is selected is “Don’t allow connections to this computer’’. We have to change this in-order to allow remote connections.
To check the name of the computer:
To check firewall:
Go to control panelàClick on System and SecurityàUnder Windows Firewall, click Allow a program through Windows Firewallàclick on change settings and tick the check box adjacent to Remote DesktopàClick Ok
Now the remote computer is ready to get connected with all the settings done we will now make a connection to it through second computer.
Make sure the remote computer has been set to Never in hibernations and sleep settings under power supply otherwise connection will not be possible.
Connection is now set up.
To start working on the remote computer
Type Remote Desktop Connection in the search box then from the list provided select Remote Desktop Connection.
Inside the box: the computer, either type the IP address or name of the computer you want to connect to.
You may start Working.
After a successful connection has been established to the remote computer from the local computer following scenarios was performed on the remote computer via local computer.
File will be copied from D drive to E drive on the remote computer.
A new MS Word file with name ‘Network Project’ will be created on the desktop of the remote computer.
In this case an email will be sent to the receiver with the IP address of the remote computer irrespective it has been handled through local computer.
The file will be permanently deleted from the remote computer and it will not come back after the remote connection is disabled.
All the scenarios designed above when handled on remote computer through local computer will act as if they are being handled locally and any changes made will be permanent and will remain even after the connection is de-established.
After the connection was established, an invitation file was sent to local computer to allow it to take over the controls of remote computer. It was conducted by following steps:
Select ‘Invite someone you trust to help you’ and email the invitation file provided. On the local computer select ‘Help someone who has invited you’ and enter the password provided. Control will be transferred to local computers. When you click on share control option following dialog box is prompted
Select yes and connection is established.
The scenarios designed in sub-task 2 was then operated and below are some screenshots while the scenarios being performed
Secure Shell (SSH) is a way to operate networking services in a secured way on an unsecured network. PuTTY is a free open-source example of SSH connections for windows. It is believed to be the best amongst its alike alternatives. To connect two computers via PuTTY, following steps has to be performed:
Depending upon the version of the windows we have to install the setup. I am using 32-bit operating system so I downloaded “putty-0.70-installer.msi” from the above window.
To make a remote connection using PuTTY
Connection is now established.
To make file operations possible in PuTTY we have to add another setup to our PuTTY software which is pscp.exe. This is a kind of file transfer protocol that allows PuTTY to make file operations possible.
After login to the server we are prompted with following: psftp
(a) To move a file from remote computer to the local computer
This will place you in the E directory
(b) To rename a file on remote computer via local computer
To rename a file on remote computer we will navigate to the file using proper directories and the following command will rename the file to a new name:
(c) Download a file from the remote computer to the local computer
To download a file onto the local computer it is again not possible via PuTTY alone. We need any file transfer protocol to get the files. After navigating to the file to be download. Type the following command in the command prompt window of local computer
This will download the entire file to the local computer.
(d) Deleting a file on remote computer via local computer
Suppose there is a file names NetworkProject to be deleted present at folder Network following command should be typed at local computer to delete it
This assignment on Network Systems has helped me a lot to understand the concepts of making a connection between two computers both theoretically and practically. After completing this assignment I am now able to set up a remote connection between two computers and perform operations on it such as moving or copying a file, creating or deleting a file on remote computer and similar other operations.
From the first task I learned about the remote desktop connections which may prove very helpful in case someone needs assistance on some program which they might not be able handle. In that case remote desktop connection prove to be useful which will provide a direct access and control of client computer’s to the local computer and the problem could be resolved in no time.
The next task in the assignment provided me with a chance to step out of my comfort zone and ask help. I connected with my seniors to assist me with, how to use PuTTY and its different commands. To successfully install and make a SSH connection via PuTTY was really challenging for me but with sufficient help and my hard work I was able to complete it. I also learned the file transfer operations with the help of UNIX commands.
I also learned to set up a virtual machine using Oracle VirtualBox. I learned to make necessary changes to its settings in order to make it work properly. As evidence to my work I have attached some of the screenshots to task 3. In task 4 I was able to design variable length addressing scheme depending upon the given scenario. It helped to enhance my knowledge of how the addresses are broken down and how Subnetting works. I also learned about assigning an IP address with a unique subnet to each interface on the router. Concepts of Address, subnet, subnet mask and interface were not clear to me before but this assignment helped me to understand all its concepts in a better way.
I am glad and thankful to my teachers who gave me this assignment to better understand that ‘how the networking works on real platform’. I feel I still need to improve a little on UNIX commands to handle file operations using PuTTY and I am confident that I will learn it gradually.
References
Abrams, L. C., Cross, R., Lesser, E. & Levin, D. Z. (2013) Nurturing Interpersonal Trust in Knowledge-Sharing Networks, Academy of Management Executive, 17(4): 64-77.
Alizadeh, S., Yang, M., Sharif, S., & Katti, N.(2013). Minimal near-optimal datacenter transport. In Proceedings of the ACM SIGCOMM, Conference on SIGCOMM, SIGCOMM, pages 435–446, New York, NY, USA.
Allen, T. J. (2007). Managing the Flow of Technology: Technology Transfer and the Dissemination of Technological Information within the R&D Organization. Cambridge, Mass.: MIT Press.
Andriessen, H. (2011). Mediated communication and new organizational forms. In c.L. Cooper and I.T.C. Robinson (Eds.), International review of industrial and organizational psychology. New York: Wiley.
Brause, T. & Hepp, M. (2014). Credit card fraud detection by adaptive neural data mining. In Proceedings of the11th IEEE International Conference on Tools with Artificial Intelligence, pages 103-106.
Brown, J. S. & Duguid, P. (2010) ‘Mysteries of the Region: Knowledge Dynamics in Silicon Valley’, in Lee, C.-M. (eds) The Silicon Valley Edge a Habitat for Innovation and Entrepreneurship, Stanford, Calif.: Stanford University Press.
Cambra, G. (2009). The implementation of a french textual teleconferencing prototype and experiments in IT uses. In L. Qvortrup (Ed.), Social experiments witch information technology. Dordrecht: Reidel.
Ciborra, C. U. & Lanzara, G.F. (2011). Designing networks in action, formative contexts and post-modern systems development. In 1.H. Erik Andriessen and R.A. Roe (Eds.), Telematics and work. Hove, UK: Lawrence Erlbaum.
Frednes, K. (2011) ‘Læringsmiljø for Kompetente’, in Brandi, S., Hildebrandt, S. and Nordhaug, O. (eds) Kompetansegullet @ Det Nye Arbeidsliv pp. Oslo: Cappelen. Freeman, C. (1979) ‘Determinants of Innovation. Market Demand, Technonolgy and the Response to Social Problems.’ Futures: 206-215
Gardner, R. M., Overhage, J. M., Steen, E. B., Munger, B. S., Holmes, J. H., Williamson, J. J., & Detmer, D. E. (2012). Core content for the subspecialty of clinical informatics. Journal of the American Medical Informatics Association, 16(2), 153–157. doi:10.1197/jamia.M3045.
Gustavsen, B. and Engelstad, P. H. (2016) ‘The Design of Conferences and the Evolving Role of Democratic Dialog in Changing Working Life’, Human Relations, 39(2): 101-116.
Hampel, E. (2008). Information protectionand network security. SPIE, Washington.
Huttenrauch, H., Green, A., Norman, M., Oestreicher, L., & Eklundh, K.S. (2014). Involving users in the design of a mobile office robot. IEEE Transactions on Systems, Man, and Cybernetics. pp. 113-124.
Kaufman, C. (2015). Network security: Privatecommunication in a public world. Prentice Hall, New Jersey.
Shaffer, L. & Simon, R. (2016). Network security. AP Professional,Boston,
Stallings, W. (2014). Cryptography andnetwork security: Principles and practice, Prentice Hall, New Jersey.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download