1 00:00:00,240 --> 00:00:07,040 In the last lecture, we talked about the remote access services and remote Nexstar protocol, it does 2 00:00:07,050 --> 00:00:12,810 get done with the other remaining or access protocols which help us. 3 00:00:12,810 --> 00:00:15,630 The first one is the point to point protocol. 4 00:00:16,200 --> 00:00:20,380 The point-to-point protocol is a layer to protocol. 5 00:00:20,760 --> 00:00:22,310 I forgot to display that. 6 00:00:22,320 --> 00:00:22,820 I'm sorry. 7 00:00:23,550 --> 00:00:30,510 So, yeah, point to point protocol is layer to protocol that provides authentication, encryption and 8 00:00:30,510 --> 00:00:34,660 competition services to clients logging in remotely. 9 00:00:35,220 --> 00:00:43,050 Now Internet service providers use up a lot to authenticate clients dialing in with a dial up modem 10 00:00:43,050 --> 00:00:45,290 or DSL or cable modem. 11 00:00:46,560 --> 00:00:54,000 Many network servers that provide remote access services such as RSS, can also use PGP as an authentication 12 00:00:54,000 --> 00:00:54,450 protocol. 13 00:00:56,250 --> 00:01:02,550 Now the next protocol is I'm sorry we have done this P2P point protocol PGP. 14 00:01:02,580 --> 00:01:07,950 Now, the next protocol that we're going to see is this one they point to point protocol over Ethernet. 15 00:01:08,580 --> 00:01:13,230 Now, Point-to-point protocol over Ethernet is an extension of PGP. 16 00:01:13,650 --> 00:01:21,480 Its purpose is to encapsulate the frames within the Ethernet frames, the need for people. 17 00:01:21,480 --> 00:01:28,350 E was born out of the need to deal with the massive increase in high speed Internet connections. 18 00:01:28,810 --> 00:01:35,760 Now service providers offering customers high speed access using asymmetric digital subscriber line 19 00:01:35,760 --> 00:01:45,510 that is DSL or cable modems needed a Ofay to offer authentication and encryption services of point-to-point 20 00:01:45,510 --> 00:01:46,080 protocol. 21 00:01:46,990 --> 00:01:54,540 Remote authentication diron user service radius, which we are going to see in upcoming lecture's is 22 00:01:54,540 --> 00:02:03,420 something I'll get into it a little later in this section is a radius is used to manage PBB or reconnections. 23 00:02:03,420 --> 00:02:05,250 Make sure you remember the sentence. 24 00:02:06,720 --> 00:02:09,550 The next is independent computing architecture. 25 00:02:09,600 --> 00:02:17,100 I see now independent computing architecture is a protocol which was designed by Citrix Systems to provide 26 00:02:17,100 --> 00:02:20,210 communication between these servers and the clients. 27 00:02:20,700 --> 00:02:25,920 The most common application that uses I.C.E. is systems districts. 28 00:02:25,920 --> 00:02:34,560 Winfree, which administers can use to set up Windows application on a Windows based server and then 29 00:02:34,560 --> 00:02:40,680 allow the clients with virtually any operating system to access those applications. 30 00:02:41,220 --> 00:02:50,100 Client computers running Linux, Unix or Marquises can access Windows based applications using the ICC 31 00:02:50,100 --> 00:02:50,720 protocol. 32 00:02:51,540 --> 00:02:58,770 Now, connections like these, which I just told you, tend to be slow because of the huge amount of 33 00:02:58,770 --> 00:03:06,020 translation that is required to enable the client and the server to communicate with each other properly. 34 00:03:07,800 --> 00:03:10,380 The next protocol is secure socket cell. 35 00:03:10,380 --> 00:03:11,340 That is SSX. 36 00:03:11,350 --> 00:03:16,620 You have heard this protocol when it comes to ethical hacking or, you know, networking earlier. 37 00:03:17,130 --> 00:03:23,460 Secure Cell is a network protocol that is designed as an alternative to command based utilities such 38 00:03:23,460 --> 00:03:24,450 as Tenet. 39 00:03:25,080 --> 00:03:33,450 Now, Telnet is a protocol that transmits requests and responses in clear text and hence provides no 40 00:03:33,450 --> 00:03:41,580 security, whereas the search creates a secure channel between the devices and provides confidentiality 41 00:03:41,580 --> 00:03:44,130 and integrity of the data transmission. 42 00:03:45,150 --> 00:03:51,660 As the search uses public key cryptography to authenticate the remote computer and allow the remote 43 00:03:51,660 --> 00:03:55,080 computer to authenticate the user if necessary. 44 00:03:56,410 --> 00:04:02,860 Now, this publicly is placed on any computer that must allow access to the owner of the matching private 45 00:04:02,860 --> 00:04:10,270 key, which is kept secret, obviously, and the private key is never transferred to the network during 46 00:04:10,270 --> 00:04:11,040 authentication. 47 00:04:11,530 --> 00:04:16,960 So just make sure that Secich is an alternative to Tenet and it is more secure. 48 00:04:17,830 --> 00:04:23,830 The next and the last remote access service protocol that we are going to see is, Vincey, that is 49 00:04:23,830 --> 00:04:28,840 virtual network computing, virtual network computing. 50 00:04:28,840 --> 00:04:34,950 The ANC is a remote desktop sharing system that uses the remote frame buffer protocol. 51 00:04:35,500 --> 00:04:42,250 Now, Vincey includes Yansi Server, that is a software which runs on the machine sharing its screen. 52 00:04:42,670 --> 00:04:49,780 Then the client, that is a machine that receives the shared screen and the B and C protocol, which 53 00:04:49,780 --> 00:04:53,020 is a type of Pardeep remote or Ixtapa protocol. 54 00:04:53,560 --> 00:05:03,040 Now, one big difference between VMC and our DP is that VSC sends raw pixel data, which does make it 55 00:05:03,040 --> 00:05:11,530 work on any desktop type, whereas RTP sends graphic primitives on higher level commands for the screen 56 00:05:11,680 --> 00:05:12,850 transfer process. 57 00:05:14,380 --> 00:05:20,800 Well, this was it for the other protocols we have seen or as we have seen already, B, we have seen 58 00:05:20,800 --> 00:05:23,940 PBB Point-to-point over Ethernet. 59 00:05:24,520 --> 00:05:33,090 I see a secure shell and virtual network computing for your exam or any network based exam or clearing 60 00:05:33,190 --> 00:05:33,670 interviews. 61 00:05:34,150 --> 00:05:39,550 You just have to remember these protocols and you will come out with flying colors. 62 00:05:40,060 --> 00:05:40,720 That is it. 63 00:05:40,720 --> 00:05:42,600 I will see you in the next lecture.