Welcome to Bucaro TecHelp!

Bucaro TecHelp
HTTPS Encryption not required because no account numbers or
personal information is ever requested or accepted by this site

About Bucaro TecHelp About BTH User Agreement User Agreement Privacy Policy Privacy Site Map Site Map Contact Bucaro TecHelp Contact RSS News Feeds News Feeds

Remote Control Protocols

CompTIA lists three protocols that are associated with remote-control access: Remote Desktop Protocol (RDP), Secure Shell (SSH), and Citrix Independent Computing Architecture (ICA). RDP is used in a Windows environment. Terminal Services provides a way for a client system to connect to a server, such as Windows Server 2008/2003/2000, and, by using RDP, operate on the server as if they were local client applications. Such a configuration is known as thin client computing, whereby client systems use the resources of the server instead of their local processing power.

Windows Server products and Windows 7 (as well as Vista and XP) have built-in support for remote desktop connections. The underlying protocol used to manage the connection is RDP. RDP is a low-bandwidth protocol used to send movements, keystrokes, and bitmap images of the screen on the server to the client computer. RDP does not actually send data over the connection - only screenshots and client keystrokes.

SSH is a tunneling protocol originally created for UNIX systems. It uses encryption to establish a secure connection between two systems and provides alternative, security-equivalent applications for such utilities as Telnet, FTP, and other communications-oriented applications. Although it is available with Windows and other operating systems, it is the preferred method of security for Telnet and other cleartext-oriented programs in the UNIX environment. SSH uses port 22 and TCP for connections.

Citrix ICA enables clients to access and run applications on a server, using the server's resources. Only the user interface, keystrokes, and mouse movements transfer between the client system and the server. In effect, even though you work at the remote computer, the system functions as if you were actually sitting at the computer itself. As with Terminal Services and RDP, ICA is an example of thin client computing.

The above is an excerpt from:

CompTIA Network+ N10-005 Exam Cram is the perfect study guide to help you pass CompTIA's new Network+ N10-005 exam. It provides coverage and practice questions for every exam topic, including substantial new coverage of security, wireless, and voice networking. The book contains an extensive set of preparation tools, such as quizzes, Exam Alerts, and a practice exam, while the CD's state-of-the-art test engine provides real-time practice and feedback.

Covers the critical information you'll need to know to score higher on your Network+ (N10-005) exam!

Understand modern network topologies, protocols, and models
Work effectively with DNS and DHCP
Monitor and analyze network traffic
Understand IP addressing, routing, and switching
Perform basic router/switch installation and configuration
Manage networks and utilize basic optimization techniques
Plan and implement a small office/home office network
Master essential LAN, WAN, and wireless technologies
Install, configure, secure, and troubleshoot wireless networks Safeguard networks with VPNs, authentication, firewalls, and security appliances
Troubleshoot common problems with routers, switches, and physical connectivity

The companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions and two complete practice exams. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.

Reasder Dante from AK says, "Having very little networking experience to begin with, I used solely this book to pass the CompTIA N+ exam. They few questions I did get wrong where in sections that I knew I had simply not studied hard enough in. The material is completely laid out here, just make sure you devote enough time to ALL the sections. I would highly recommend this book, as I was able to pass with flying colors. Click here for more information.

More Networking Protocols and Standards:
• Pv6 Myths
• Network Gateways
• Shortest Path Bridging (SPB) Protocol
• What Is Fabric Networking?
• IPv6 Address Types and Scopes
• IEEE 802.11 Wireless Modulation Methods
• Video - Introducing the OSI Model
• OSI Network Model
• TCP/IP Features
• Session Border Controllers - More Than Just a Voice Firewall

RSS Feed RSS Feed

Follow Stephen Bucaro Follow @Stephen Bucaro

Computer Networking Sections

Fire HD
[Site User Agreement] [Privacy Policy] [Site map] [Search This Site] [Contact Form]
Copyright©2001-2024 Bucaro TecHelp 13771 N Fountain Hills Blvd Suite 114-248 Fountain Hills, AZ 85268