Wednesday, May 6, 2020

Critical Thinking - Reasoning and Problem Solving

Question Discuss about theCritical Thinking, Reasoning and Problem Solving. Answer: Literature Review Remote Desktop Access According to this paper[1], the authorhas described a procedure to access the desktop by using the android mobiles. This procedure depends on the Virtual Network Computing (VNC) method. For this purpose, the desktops or computers are required to install a virtual network computing servers with the help of wireless service. By using wireless platforms, clients may be able to access and execute the performance. The picture of the desktop is compacted before it is transmitted to the android mobiles. There are few capacities given to facilitate the survey on mobile phones. The alternate operation can be utilized instantly to access the periodically used locations. The responsibility of a current key can be seen utilizing the management work. The function of twin view helps the clients to see two locations at the same time. The prototype or model is now installed utilizing Java and inspected on a Java based android mobiles. This application helps to monitor the assessments and helps in ex changing the file in the network management, inside a wireless location. The application of system through the internet is implemented in the next level. The same RFB convention is utilized for the information exchange. The structure of Virtual Networking Computing (VNC) may be required for the system implementation. Because of wide utilization of android gadgets, this framework will be created for tablets and for all the portable gadget. This framework will give the ability to the clients to access their desktops through internet. In this paper [2], the mobile phones are connected as an accessing device of a remote desktop. The performance of the mobile phone depends on the execution of Java programs in past days. The results for that method contains reading and writing of e-mail and web page browsing. According to this paper, the trend has switched to Android applications. In current situation, the mobile acts as a remotely accessing computer. The remote control through the network is provided by the desktop sharing system, which is denoted as Virtual Network Computing. It provides the controlling function with the updated graphical screen from the mouse, keyboard capturing and through device controllers. This system is only based on the Remote Frame Buffer protocol. These protocols are used to share the information between the connected devices. The TCP/IP protocol is used to transmit the information from one port to another in the range of 5900-5906. There are two types of application that are required for VNC system to do proper work. The server application is used for machine which is controlled by the controller and the client. Also it is used for supervising the device. Based on the performance, the client side is known as viewer. The controlled machine is a major response to view the desktop which shares the information and also is used to convert and capture the activities of the user via RFB protocol messages. In another side, the server should break the events which are collected from the client and sends them to the self-system. Server must have the responsibility to update the graphic screen request via sending the desktop view to client connection. Through the mobile phone the user can directly access the desktop and work with that. If the user wants to talk to anyone using the mobile phone, the user should terminate the connection of the network. As per [3], every android mobiles can access the desktops remotely. The keyboard and the mouse are accessed via touching the screen of the mobile, the computer is handled for the support of accessing the remote desktop. The keyboard and mouse is also used to provide the functionality in typing and handling the desktop. When the application part is accessing the desktop, the server must need on PC and it accesses the mobile phone, where the server must be an android device. The server should break the events which is sent by the client and it is injected to the self-system. The major part of the LAN connection in the network is used to connect the devices such as computer and android device. This process is done by entering the IP address and port number that is generated from any side of the server which is a server in the computer or the server in the android device. Due to this reason, it implements the socket primitives and accesses the android device using the "NANOHTTPD" protoco l. The usage of the updated graphical screen from a keyboard and mouse capturing and controlling the device provides the controlling functionality. The above system used the RFB protocol to transmit the information in between the connected devices. There are two types of application that are required for VNC system to do proper work and the server application is used for machine which is controlled by the controller and client. Moreover, it is also used for supervising the device. With the help of a mobile phone, the user can easily access the desktop from anyplace. It is stated in [4], that the user accesses and controls the remote server (remote desktop) by using the RDP (Remote Desktop Protocol) which gives the capacities of desktop control and remote login. Microsoft Corporation enforces the Remote Desktop Protocol from the protocol families of ITU-T T.120. By differentiating the important benefits when compared to the various remote desktop design, the frame-buffer access protocol depends on ideally transferring the GDI (Graphic Device Interface) data from a server, rather than the complete bitmap pictures. This paper suggests a remote collaborating system that is planned and actualized on the structure of RDP. The proposed framework was comprised of a cross control conspire with transport re-encryption design that gave the full capacities for every single remote coordinated effort. For example, remote control, application approach and transferring towards all the RDP users. Therefore, it gives the recording and replaying plans to the packe ts RDP for replaying the greater part of the definite tracks through which a multiparty gathering experienced. The execution displayed and assessment demonstrates the system practicality and it suggests that it has adaptable model for the modern services. According to this paper [5], the best software tool is a Remote Machine Control System. The user can access the desktop through internet by using this application and can play out the managerial tasks like program accessing, checking the required hardware and checking the users. The software is used to connect two different networks from various locations and also interacts with them. In the most recent decade, dispersed frameworks engineers are frequently dependent on the middleware stages to expand their efficiency. Living amongst the working framework and appropriated applications, middleware frameworks gives reflections that avoids application designers with a few information that is built-in for the circulated programming. For example, arrange correspondence primitives, handling of failure, heterogeneity, administration query, synchronization, information marshalling and unmarshalling. Java RMI is considered as the most well-known middleware stages. Critical Thinking on Issues As per [6], the system administer faces many issues on Remote Desktop Protocol (RDP) when establishing the connection between systems. The Remote Desktop Disconnected is an error message that is shown when it does not support the Microsoft Product. This is why the error message will be displayed. This is a reason for disconnecting the remote system and it points implicitly. The causes for problems are listed below. Misunderstanding the settings and terminologies. Unauthorised access from end-user. Conflicts occurring during port assignment. Misconfiguring RDP- TCP Group policy settings during Remote Desktop Service configuration. When trying to connect a remote computer, the above mentioned problems are attempted by a system administrator. It is important to identify the issues and it delivers the solutions which are mentioned in [7]. Misunderstanding of the Settings and Terminologies The Remote Desktop Licensing Server for example aka Terminal service Licencing should be installed on the system. The Remote Desktop Session Host (aka Terminal Server) is also required to be installed for establishing the remote connection. In the first step, the connection is established on both the servers. After that, the systems are connected. When thinking out of the network, the Remote Desktop always supports two connections concurrently. So, it is not necessary to get licence for the connection establishments. Unauthorised Access from End-user The end-user has an appropriate right to access the remote desktop. The user groups should have an authorized permission to use the remote system. The control will be given by the server. For example, the user receives the right by suggesting and by having authorization to sign up the system. These access controls are provided by the server. The local security policy on the server provides the facility to allow the user to login with the authorized account. Port Assignments The port assignment is a major problem on the Remote Desktop access. The issue causes either blocking the port or port assignment conflicts on the server systems. To detect and resolve this problem, it is required to verify whether the default port for RDP (port number=3389) is either blocked or not. It is necessary to ensure that the port assignment is managed by the TermService. Misconfiguration of Settings Another major issue is that the limited number of end-users can access the Remote Desktop Service at a session time. Obviously, the error message "Failure to connect" will be displayed on the end-users system by the Help Desk call. It can be handled by, Enabling the unlimited connection setting Settings of Network Adapter under (RDP-TCP properties) and displaying on the RD session Host server. It is stated in [8] that in the end-user support centre, the help desk is always associated. While establishing the first help desk, there is no need of information to be implemented. Twenty years ago, the first help desk was established and accepted. Before that, it is difficult to contact friends and colleagues with the assistance of the help desk. But now, the critical issues in help desk is analyzed by the managers of savvy technology. The helpdesk came as a telephonic communication. This technology is considered as an efficient technology and it manages multiple type of communication interaction between the people economically. This efficient technology is called as 'service desk'. The communication between the people may be in terms of voice or non-vice such as email and messaging. By using the transition from self-assistance to remote incident resolution, the operation cost can be reduced as half of the original cost. But the performance is increased by service quality which i s provided for communication. Source of the Support The end-user must evaluate the user support strategy is based on the value and cost. According to the company, the support worker and outsourcing with Third Party Company is important. It is critical to do and it is a very challenging process. So, the end-user strategy is used for supporting the outsourcing process. As the survey says, the technical work to support outsourcing of the company is centralized by using help desks. It is applicable for all the Information technologies and business process outsourcing managements. Thus, 40% of the people from managers are working for a company to resolve this problem in IT industries. The solution is provided by the people who work for the in-house services. Hence, according to the survey only 3% people support only work for outsourcing the process. The major challenge is to find and get help desk workers for an automated products and outsources is mentioned in the paper [9]. While analysing the problem of outsourcing in business industry, the business strategy is well grown by providing the customer services and support systems. According to the help desk value, the price for each call is either fixed or bundled. Method of Support The primary decision is based on the source which is provided by the support given to outsource. Often the end-user contacts the helping people through the dedicated help desk. The issue in this method is handled by the application of question proficiency and convenient to the end-user by receiving help from them. Providing inaccurate, obscure and incomplete information from the help desk to the end-user is a major issue. Because, the help desk should support the end-user by contacting them. Thus, it leads to a big deal in the technical support method. The outsourcing support help desk provides the facility to ask the clearing method by contacting the people who need help. According to the survey, most of the people contact the support people through telephone contact. Because, asking clearly is the best solution for the end users. Thus, the phone contact is preferred for interaction between the end-user and the support specialist. It is a great opportunity for the end user to clarify the issue details. Though the telephonic method helps for support process, sometimes it is too difficult to encounter stress and frustration. Because, not all the end-users have knowledge about the issue thoroughly. Therefore, the support specialist needs to improve the confidence of the application and access the resources. References [1] J. chintalapati and S. Rao T.Y.S, "Remote computer access through Android mobiles",IJCSI International Journal of Computer Science Issues, vol. 9, no. 5, 2012. [2] A. Jadhav, V. Oswal, S. Madane, H. Zope and V. Hatmode, "VNC Architecture Based Remote Desktop Access Through Android Mobile Phones",International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 2, pp. 98-99, 2012. [3] K. Bhandari, V. Mandole, A. Munde and S. Takmare, "Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser",International Journal of Computer Science and Information Technology Research, vol. 3, no. 1, pp. pp: (369-373), 2015. [4] C. Tsai and W. Huang, "Design and Performance Modeling of an Efficient Remote Collaboration System",International Journal of Grid Distribution Computing, vol. 8, no. 4, 2015. [5] R. Kumar and A. Anil, "Development of Remote Access Network Communication (RANC)",International Journal of Computer Applications (0975 8887, vol. 27, no. 8, 2011.ed: 26- Jan- 2017]. [6] K. andeep Bhandari, V. Baliram Mandole, A. Dattatray Munde and S. Takmare, "Secured architecture for remote virtual desktops - IEEE Xplore Document",Ieeexplore.ieee.org, 2015. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/4621741/. [Accessed: 28- Jan- 2017]. [7] . Darabont, K. Kiss and J. Domokos, "Performance Analysis of Remote Desktop Virtualization based on Hyper-V versus Remote Desktop Services",MACRo 2015, vol. 1, no. 1, 2015. [8] S. Kapoor, A. Verma and A. Lala, "To Access Remote Desktop using Windows Azure Cloud Computing",IJARCCE, pp. 98-100, 2015. [9] H. Ohta, Y. Sato, T. Sagawa, T. Fujita and S. Katsuki, "Sa1204 An Introduction to Remote Internet Access for Capsule Endoscopy: Using the Cloud to Diagnose Images and a Remote Desktop Control to Check the Real-Time Viewer",Gastroenterology, vol. 142, no. 5, pp. S-242-S-243, 2012.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.