Sei sulla pagina 1di 19

ASIAN INSTITUTE OF TECHNOLOGY, SCIENCES AND THE ARTS

B.T. Librojo Building,P. Burgos Street, Brgy. Uno, City of CABUYAO, Laguna

Configuration of Remote Desktop Connection by the Selected Information,

Communication, and Technology Student in Asian

Institute of Technology, Sciences, and the Arts

A Research Presented

To the Faculty of Senior High School

Asian Institute of Technology, Sciences, and the Arts

In a Partial Fulfillment

of the Requirements for the subject

Practical Research 3

Senior High School Student

Major in Information, Communication, and Technology (ICT).

Argote, Tristan Jay Mostajo, Rashaun Jordan

Bautista, Marion Norbe, Jade Paul

Coniconde, Marvin Onipig, Mark Eduard

Mendoza, Ed Bryant Tanyag, Jharold


CHAPTER 1

THE PROBLEMS AND ITS BACKGROUND

Introduction

This is a study about configuration of remote desktop connection by selected


Information and Communication Technology students of Asian Institute of Technology,
Sciences and the Arts CABUYAO and researchers also conduct a research about the
problems they could possibly encountered on configuration of remote desktop
connection, researchers also make a research about what to do when these problems
arise. Remote desktop connection is remote Personal Computer for Information
Technology services-supported contractors.

Nowadays, many people work on different devices such as Personal Computer,


laptop, tablet or even a smartphone to complete a task or activity, however, they may
not always have the necessary software installed on each of these devices. This could
prevent them from being able to open or work on a file. To help alleviate this problem,
students can use Remote Desktop Connection to access software that they don't have
installed on their device.

According to the researchers research all windows has a built-in remote desktop
connection. Most of the reason why some Information and Communication Technology
Hardware students encountered problems in connecting of remote desktop is the slow
connection, weak signal and disconnection because of some internet connection
casualties.

If they are having problems using remote desktop with their windows server,
there are a couple things that could be at fault.

Even while they might have trouble connecting using remote desktop, they
should always be able to log in to the web console at their UpCloud control panel, or by
their Virtual Network Computing connection, which settings can also be found at their
server details.

Once they’ve connected to their server, through either of the methods mentioned
above, they should be greeted by windows lock screen. Then they have to sign in to their
server with an account that has administrator privileges to continue troubleshooting.
If the connection shows something other than the lock screen, try if the server
seems responsive, should it not react to commands they might have to restart their
server.

Going to remote desktop setting, when they are logged in and the server seems
to be working, but remote desktop still cannot connect, make sure a remote connection
is allowed. The easiest way to get to the option is to open sysdm.cpl by searching for it
on the start menu, and moving to the remote tab.

The remote desktop needs to allow connections from the other computers for
the feature to work. If you server was set to allow remote control with network level
authentication, make sure they own computer supports this or to allow any connection.
They can find more information about network level authentication at Microsoft`s
TechNet.

While still at the remote desktop settings, check the allowed users by clicking the
select users or by pressing S, All users with administrator access are automatically
permitted to connect, but all normal users must be added to this list. If they were trying
to connect with user credentials that do not have admin rights, add the username they
wish to connect with to the list of allowed users.

After that, the windows firewall might be a little restrictive at times, for example,
inbound internet control message protocol that ping connections use are disabled by
default. Open the window firewall with advance security by searching for “firewall” in
the start menu. Move to the inbound rules list and scroll down to remote desktop rules
by pressing R.

Windows server 2008 should show two rules: Remote desktop (Transmission
control protocol-In). Both of these would in most cases be enabled as long as the server
is still using the standard 3389 Transmission control protocol port remote desktop
connections.

With 2012 windows server the rules are split between domain and private, or
Public profiles as well as transmission control protocol and User Datagram Protocol
protocols, which translates to 4 separate Remote Desktop – User Mode rules, all of
which would usually be enabled.

Optionally while at the firewall settings, they may wish to enable Internet
Control Message Protocol for ping. They can find the rules, called File and Printer
Sharing (Echo Request-Internet Control Message Protocol version 4 – In) and version 6
for both Internet Protocol versions, by pressing F.

`When they are certain that the windows firewall is allowing remote desktop
connections, also check the server specific firewall settings at their UpCloud control
panel. If they have set the default incoming rule to reject, remember to add rule to
permit traffic to the port remoter desktop server is listening to, 3389 by default. They
can find out more about the UpCloud firewall at the tutorials.

Moving to the Network Connection, test the internet connection on their server
to make sure all their network resources work as they should. Start by pinging out from
their server. Open the command prompt by typing “cmd” in the start menu search and
press enter then use the command “ping 8.8.8.8”. Then if they enabled the echo requests
from windows firewall, they can also attempt to ping their server from their own
computer. You can find the servers public internet protocol address on their UpCloud
control panel under network and public network.

In case the internet connection does not seem to work, check their internet
protocol configuration on command prompt with the following command “ipconfig”.

The output will list all of their server’s network connections; they should see 3
ethernet adapters: the private network, public internet protocol version 4 and public
internet protocol version 6. Check that these match with the network information in
their server details under network tab at their UpCloud control panel.

If they see differences in the ipconfig output and their server network details page,
check that all network interfaces are set to obtain the internet protocol addresses
automatically. To do this, search for network connections in the start menu and press
enter to open it. Open the properties for one of the Ethernet adapters, select internet
protocol version 6 or 4 and click on properties button underneath. Make sure both
radial buttons are set to automatic and press ok to save. Check through all of the
network adapters on the server the same way.

Another problem is the slow connection, if your Remote Desktop connection


works, but feels slow or disconnects at times, you should try updating the network
drivers. Download the latest Virtio drivers for windows.
After downloading the ISO file on their server, with Windows Server 2008 you
will need to have a program like 7zip to unpack it, on Server 2012 you can simply
mount the file as a disk.

With the files available, open the Device Manager simply by searching for it by
name in the start menu and pressing enter. Browse down to Network adapters, select
each adapter one by one and run the Update Driver Software. In the update wizard,
select browse my computer for driver software, enter the driver location to the search
field and press next. Note to keep the include subfolders selected.

If they were connected through Remote Desktop while updating the network
drivers, they`ll probably get disconnected for a moment, but the client should be able to
restore the connection automatically after the drivers have been installed successfully.

In some cases, it is possible to have another application unintentionally using the


same port as Remote Desktop, which can cause connection issues or prevent Remote
Desktop from connecting.

Check the port used by programs by entering the command “network statistic –a
– o” on command Prompt.

Network statistics will print out a list of Internet protocol addresses and port
numbers they use. Look for rows with their Remote Desktop port number (3389 by
default) and check the program Identifier (Process Identifier) at the end of these lines.
One Process Identifier will belong to the Remote Desktop service, but if they see another
Process Identifier using the same port these will conflict with one another.
Theoretical Framework

Remote Desktop Connection is a Microsoft technology that allows a local


computer to connect to and control a remote PC over a network or the Internet. It is
done through a Remote Desktop Service or a terminal service that uses the company's
proprietary Remote Desktop Protocol. Remote Desktop Connection is also known
simply as Remote Desktop.

Remote Desktop Connection requires the remote computer to enable the RDS
and to be powered on. The connection is established when a local computer requests
connection to a remote computer using a Remote Desktop Connection-enabled
software. On authentication, the local computer has full or restricted access to the
remote computer. Besides desktop computers, servers and laptops, RDC also supports
connecting to virtual machines. This technology was introduced in Windows XP.

Remote Desktop Protocol is based on, and is an extension of, the T-120 family of
protocol standards. A multichannel capable protocol allows for separate virtual
channels for carrying presentation data, serial device communication, licensing
information, highly encrypted data (keyboard, mouse activity), and so on. As RDP is an
extension of the core T.Share protocol, several other capabilities are retained as part of
the RDP, such as the architectural features necessary to support multipoint (multiparty
sessions). Multipoint data delivery allows data from an application to be delivered in
"real-time" to multiple parties without having to send the same data to each session
individually (for example, Virtual Whiteboards).

RDP was developed to be entirely independent of its underlying transport stack,


in this case TCP/IP. RDP, being completely independent of its transport stack, means
that we can add other transport drivers for other network protocols as customers needs
for them grow, with little or no significant changes to the foundational parts of the
protocol. These are key elements to the performance and extendibility of RDP on the
network.
Conceptual Framework

This study premised from the concept that the Configuration of Remote Desktop
Connection requires the extent of its;

INPUT PROCESS OUTPUT

00

Respondents

Profile Gathering of
Conceptual and
 Name Research Literature
 Age
 Gender The recommendation
 Section of Remote Desktop
Formulation, gives the Information,
The topic that the Validation and Communication, and
students had studied Technology students
Administration of
in Configuration of a new knowledge of
Remote Desktop Research Instrument learning
Configuration of
 The use of
Remote Desktop
Remote
Connection in AITSA
Desktop Analysis and
CABUYAO
Connection Interpretation of Data
The use of through the Use of
Configuration of Statistical Tools
Remote Desktop
Connection

FEEDBACK
Objectives

 To help the user to connect to a computer in another location, see that

computer's desktop and interact with it as if it were local.

 To allow the user to build a server application that allows to view or even control

the desktop session on another machine that is running a compatible client

application, with the efficiency to provide the real time information about

the remote machine.

 To know and elaborate the help of Remote Desktop Connection.


Statement of the Problem

This study aims to determine about configuration of remote desktop


connection by selected Information and Communication Technology students of Asian
Institute of Technology, Sciences and the Arts CABUYAO. Specifically, it seeks to answer
the question below;

1. What is the demographic profile of the respondents in terms of

1.1. Name
1.2. Age
1.3. Gender
1.4. Section

2. What did the Information, Communication, and Technology students about Remote
Desktop?

3. What did the Infor5mation, Communication, and Technology learn about the use of
remote desktop connection?

4. What recommendations can be given to Information, Communication, and


Technology students in terms of Remote Desktop Connection?

Hypothesis

The following hypothesis are generated by the researcher and was tested in
this study;

1.
Significance of the Study

The researchers aim to gain wider knowledge about Configuration of Remote


Desktop Connection, the researcher’s objective in gathering information will benefit;

STUDENTS; This study can increase their knowledge about remote desktop
connection.

TEACHERS; This study can help them to lessen their time discussing this topic
because their students can already know about remote desktop by this research.

COMMUNITY; this study will help them to be acquainted about the experiences of
some Information, Communication, and Technology students.

FUTURE RESEARCHERS; this study will serve as benefaction of source and


knowledge, and other researchers that can benefit to this study.
Definition of Terms

CONFIGURATION- In communications or computer systems, a configuration of a


system refers to the arrangement of each of its functional units, according to their
nature, number and chief characteristics. Often, configuration pertains to the choice of
hardware, software, firmware, and documentation.

REMOTE DESKTOP- Remote Desktop Services (RDS), known as Terminal Services in


Windows Server 2008 and earlier, is one of the components of Microsoft Windows that
allow a user to take control of a remote computer or virtual machine over a network
connection.

PC- A personal computer is a multi-purpose computer whose size, capabilities, and


price make it feasible for individual use. Personal computers are intended to be
operated directly by an end user, rather than by a computer expert or technician.

IT SERVICES-SUPPORTED CONTRACTORS- Services that involve or relate to the


development of regulations. Services that involve or relate to the evaluation of another
contractor's services. Services in support of acquisition planning. Contractors providing
assistance in contract management.

WEB CONSOLE- Web Console is a web-based application that allows to execute shell
commands on a server directly from a browser (web-based SSH). The application is
very light, does not require any database and can be installed and configured in about 3
minutes.

UPCLOUD CONTROL PANEL- Hosting Controller or Hosting Controller Automation


Solution is a commercial automation ... HCnix[edit]. HCnix is a "Linux only" control panel
by Hosting Controller and is an independent product.

VNC- In computing, Virtual Network Computing (VNC) is a graphical desktop-sharing


system that uses the Remote Frame Buffer protocol (RFB) to remotely control another
computer. It transmits the keyboard and mouse events from one computer to another,
relaying the graphical-screen updates back in the other direction, over a network.

SYSDM.CPL- sysdm.cpl is a System Applet for the Control Panel from Microsoft
Corporation belonging to Microsoft Windows Operating System. In Windows Task
Manager, you can see what CPU, memory, disk and network utilization is causing the
System Applet for the Control Panel process.
MICROSOFT TECHNET- Microsoft TechNet is a Microsoft web portal and web service
for IT professionals. It includes a library containing documentation and technical
resources for Microsoft products, a learning center which provides online training,
discussion forums, an evaluation center for downloading trialware, blogs for Microsoft
employees and a wiki.

WINDOWS FIREWALL- Windows Firewall is a firewall component of Microsoft


Windows. It was first included in Windows XP and Windows Server 2003. Prior to the
release of Windows XP Service Pack 2 in 2004, it was known as Internet Connection
Firewall.

ICMP PROTOCOL- the Internet Control Message Protocol is a supporting protocol in the
Internet protocol suite. It is used by network devices, including routers, to send error
messages and operational information indicating, for example, that a requested service
is not available or that a host or router could not be reached.

TCP- TCP (Transmission Control Protocol) is a standard that defines how to establish
and maintain a network conversation via which application programs can exchange
data. TCP works with the Internet Protocol (IP), which defines how computers send
packets of data to each other.

STANDARD 3389 TCP PORT- By default, the server listens on TCP port 3389 and UDP
port 3389. Microsoft currently refers to their official RDP client software as Remote
Desktop Connection, formerly "Terminal Services Client".

UDP- UDP (User Datagram Protocol) is an alternative communications protocol to


Transmission Control Protocol (TCP) used primarily for establishing low-latency and
loss-tolerating connections between applications on the internet.

PING- Ping is a computer network administration software utility used to test the
reachability of a host on an Internet Protocol network. It measures the round-trip time
for messages sent from the originating host to a destination computer that are echoed
back to the source.

IP- an Internet Protocol address is a numerical label assigned to each device connected
to a computer network that uses the Internet Protocol for communication. An IP
address serves two principal functions: host or network interface identification and
location addressing.
UPCLOUD FIREWALL- UpCloud control panel offers an L3 firewall that is positioned
just before the network interface connecting your cloud server to the internet.
Therefore, it's in a perfect position to secure all of the connections to your server. The
firewall is configured per-server basis and billed according to our pricing.

NETWORK CONNECTION- A computer network, or data network, is a digital


telecommunications network which allows nodes to share resources. In computer
networks, computing devices exchange data with each other using connections (data
links) between nodes. ... The best-known computer network is the Internet.

CMD- Command Prompt, also known as cmd.exe or cmd, is the command-line


interpreter on Windows NT, Windows CE, OS/2, eComStation and ReactOS operating
systems. It is the counterpart of COMMAND.COM in DOS and Windows 9x systems, and
analogous to the Unix shells used on Unix-like systems.

IP CONFIGURATION- In computing, ipconfig (internet protocol configuration) is a


console application of some operating systems that displays all current TCP/IP network
configuration values and can modify Dynamic Host Configuration Protocol (DHCP) and
Domain Name System (DNS) settings.

PING 8.8.8.8- ping 8.8.8.8 -t -l 65500 would ping the server with IP address 8.8.8.8
which is Google DNS server endlessly until stopped as you have mentioned -t and with a
buffer size of 65500 bytes as specified by -l. ... It is used to DoS (Denial of Service) a
server, which means that you are trying to take down a server.

PUBLIC IPV4- An Internet Protocol address (IP address) is a numerical label assigned
to each device connected to a computer network that uses the Internet Protocol for
communication. ... Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit
number.

PUBLIC IPV6-An Internet Protocol Version 6 address (IPv6 address) is a numerical


label that is used to identify a network interface of a computer or a network node
participating in an IPv6 computer network. ... In contrast to IPv4, which defined an IP
address as a 32-bit value, IPv6 addresses have a size of 128 bits.

ETHERNET ADAPTER-Also called a "network interface card" (NIC), an Ethernet


adapter is a card that plugs into a slot on the motherboard and enables a computer to
access an Ethernet network (LAN). In the past, desktop computers always used cards.
IPCONFIG OUTPUT- Ipconfig (sometimes written as IPCONFIG) is a command line tool
used to control the network connections on Windows NT/2000/XP machines. ...
Ipconfig displays all current TCP/IP network configuration values and refreshes
Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.

RADIAL BUTTONS- A radio button or option button is a graphical control element that
allows the user to choose only one of a predefined set of mutually exclusive options. The
singular property of a radio button makes it distinct from a checkbox, which allows
more than one (or no) item to be selected and for the unselected state to be restored.

VIRTIO DRIVERS- Virtio is a virtualization standard for network and disk device
drivers where just the guest's device driver "knows" it is running in a virtual
environment, and cooperates with the hypervisor.

ISO FILE- an ISO image is a disk image of an optical disc. In other words, it is an archive
file that contains everything that would be written to an optical disc, sector by sector,
including the optical disc file system. ISO image files bear the .iso filename extension.

7ZIP- 7-Zip is a free and open-source file archiver, a utility used to place groups of files
within compressed containers known as "archives". It is developed by Igor Pavlov and
was first released in 1999. 7-Zip uses its own 7z archive format, but can read and write
several other archive formats.

DEVICE MANAGER- Device Manager is a Control Panel applet in Microsoft Windows


operating systems. It allows users to view and control the hardware attached to the
computer. When a piece of hardware is not working, the offending hardware is
highlighted for the user to deal with. The list of hardware can be sorted by various
criteria.

NETSTAT- netstat (network statistics) is a command-line network utility tool that


displays network connections for the Transmission Control Protocol (both incoming
and outgoing), routing tables, and a number of network interface (network interface
controller or software-defined network interface) and network.

PID- (Process IDentifier) A temporary number assigned by the operating system to a


process or service. (2) (Proportional-Integral-Derivative) The most common control
methodology in process control.
SVCHOST.EXE- (Generic Host Process for Win32 Services) is an integral part of
Windows OS. It cannot be stopped or restarted manually. This process manages system
services that run from dynamic link libraries (files with extension .dll).

INTRUSION- To compromise a computer system by breaking the security of such a


system or causing it to enter into an insecure state. The act of intruding—or gaining
unauthorized access to a system—typically leaves traces that can be discovered by
intrusion detection systems.

OBFUSCATION- Obfuscation is the practice of making something difficult to


understand. Programming code is often obfuscated to protect intellectual property and
prevent an attacker from reverse engineering a proprietary software program.
CHAPTER 2

REVIEW OF RELATED LITERATURE AND STUDIES


This chapter presents the literature and studies relevant to presentation
investigation.

Foreign Literature and Studies


Economic indicators have shown moreover that the construction industry has
realized rich dividends of this boom (AEO, 2013). The economic growth has resulted in
rapid expansion of the construction industry. For example, the road and real estate
sectors have received significant attention recently, as the government is the main
developer.
According to Osei-Tutu (2014), the traditional method in the construction
management process, especially procurement, can lead to delays in communication,
bribery and tender manipulations. Therefore, the need to intensify the search for a more
innovative way such as the deployment of e-business in the construction process to
improve communication is of paramount significance.
According to Patel & Somaiya (2014) Virtual Network Computing is a graphical
desktop sharing system providing remote control via a computer network. It supports a
controlling functionality by usage of a graphical screen update from a controlled device
and capturing a mouse and or a keyboard.
According to Lahaie (2013), Remote access is the connection to a system from a
secondary location other than that of the primary location of the system being accessed.
Since remote access or remote connections to computers are done using remote
access applications and each remote access application is based on an existing and or
appropriate technology or technologies, this paper looks at how the Virtual Network
Computing the Remote Desktop and a “secure Android App” developed by Ganaa (2015)
are used by Network Administrators. The study further looked at how effective and
reliable the uses of these tools are.
According to Nandhini, (2013) the Virtual Network Computing software is able
to communicate with the remote system and can find out descriptions about the remote
system and also have control on the peripheral devices from the cellular phones.
Remote system administration tasks can also be performed from a cellular phone using
Virtual Networking.
According to Youming (2013), Remote Desktop is a proprietary protocol
designed by Microsoft for remote input and display of host running the windows
operating systems which is based on the Multipoint Application Sharing (T.128)
recommendation by Telecommunication Union.

According to Masthan (2013), applications of VNC which are based on RFB


protocol are generally slower, offer fewer features and security options than those
based on RDP protocol, together with the above conclusion further confirms that the
RDP protocol is a better protocol than the RFB protocol since both VNC and the secure
android app are based on the RFB protocol with the remote desktop being on the RDP
protocol. However, it is worth noting that the two protocols, that is the RDP and the
RFB protocols were developed to serve different purposes.

According to Clarke (2013), in England, an evaluation study looked at the


feasibility and educational impact of giving one-to-one tablets to every child in school.
All these studies concluded that one to one initiatives are were highly beneficial for
schools.

According to Inamdar (2013), with the Compdroid app, when a user wants to
access a remote system, the user runs the Compdroid application on his or her android
phone and broadcast the request to establish the connection on the network using an IP
address and the server whose IP address 15 matches the broadcasted IP address will
accept the request (Inamdar et al., 2013).
Local Literature and Studies

According to Tholons (2014), the global offshore IT-enabled services industry


has grown significantly over the years. It is the fastest growing segment of the “Other
commercial services” that have overtaken the traditional “travel” and “transport”
components of services trade. As shown in Figure 2, the biggest contributors to this
growth are knowledge-intensive business services, particularly computer and IT
services, R&D, and other business activities. Within the APEC region, the most
established outsourcing destinations for these services are India, the Philippines, and
China.

According to reports of Mitra (2013), although the US has traditionally been the
major export market of Philippine firms, demand from EU and Japan has been
increasing and most of these are for animation and software development services,
which is a big departure from the United States’ requests for call center services.

According to Herguner (2013), fiber optics was also installed, which made a
standard E1 or high bandwidth telephone line two or three times cheaper in the
Philippines than in India.

According to Q.J.Pastrana (2013) from the study entitled “Library System with
web android based OPAC” technology is a big factor to keep going to the libraries.
Whether the books that they want to borrow are on the barrowed section or it is still
available. So on this situation the students will have more fun on this new library
system. Therefore the author use what is the trending device make student come to the
libraries because their task on searching books inside the library become easier and
faster.

According to D.Loudes (2013) from the article entitled “The DOST-ESEP


Libraries: The First Library Network in The Philippines” the planning of this system are
way back year 1995 but it`s difficult to implement in during those time so it took long
time to be able to release it on the public. There are some universities that quickly get
the partnership since it was started in 2012. It means networking is also a major key on
collaborating inside the library. Therefore this type of system is exactly a big help on the
state of the Philippine libraries. It can make our library a world class and can complete
on other country`s libraries.
As for this time (2013) technology has been a vital part of improvement in many
aspects of life. Technology can be seen everywhere. One particular aspect that
technology helps is the maintenance of records. It can create multiple processes in no
time that any individual a do manually. In this study, we will focus on books, and when I
say books I mean plenty of books.

According to techneth.microsoft.com we have another quotation from a vendor


for Open Licenses for Remote Desktop Services and Office 2013 Standard. We do not
want to take into account any software that may be on the client side - they will be using
an unforeseeable mixture of platforms to access this system.

According to E.Valenti (2016) from the article entitled “The State Of Library
Management Systems” are systems that helps big in terms of some transactions on the
library. On this article the automated library systems said that it can do multitasking. It
can also make different transactions. It can do recording books on library but it can also
make different transactions. It will make the library service convenient like making card
cataloging. Therefore multitasking inside the library so it decreases the tasks of the
librarian so it can avoid the cases of lost records due to human error.

According to A.Agarwal (2013) on the research entitled “Online Library


Management System” The main problem of the different libraries worldwide they are
still using manual method. So the researcher proposed to make an automated system
that will have better log in form and to record quickly the borrowed and still existing
books. So the librarian or the staffs can monitor every time the books that carried
outside by the students. Therefore online library management system can be use
outdoor or even without the school library. You can access borrow books using the
internet. It will be very convenient and less time consuming.

The Coastal Mapping Laboratory, Graduate School of Oceanography/University


of Rhode Island. 2015. Developing Protocols for Reconstructing Submerged
Paleocultural Landscapes and Identifying Ancient Native American Archaeological Sites
in Submerged Environments: Summary Report of the Initial Project Workshop. U.S.
Department of the Interior, Bureau of Ocean Energy Management, Office of Renewable
Energy Programs, Herndon, VA. OCS Study BOEM 2015-048. [44] pp. with Appendices.

Potrebbero piacerti anche