Remote access is essential for network administrators and users who use resources found on the remote computer networks. Remote access allows for authorized log in into a computer system without physically accessing the system. The user does not have to be physically present in order to log into a remote computer network. This system is applicable for both home and corporate computers. This system allows a user to access the user desktop as one can when physically present.
The user can interact and manipulate the desktop in the way that the user can when physically present on the computer. Remote desktop technology is a sophisticated networking technology that involves configuring the network. The software and network are configured consistently to the accessibility policies and networking protocols. The configured networks are created to target host computers that are located in remote locations. Configuration of the network is done at the target computer and host computer to ensure that the network protocols are uniform.
This is also essential in ensuring that the there is no conflict between the host and target computers. The connection process is simple, and the software opens a window on the host computer. The window displays a view of the remote computer desktop. There are a number of operating systems with remote access capabilities, but they are not secured from unauthorized access. It is essential to have remote access software that is well secured and also user friendly. This software is designed for business purposes for the role it plays in remote access of resources. The user application of remote access is essential especially when a user may need resources on a remote host.
Executive Summary
This report recommends a better remote access system to be adopted for the Information Technology firm. This system should begin on a pilot implementation strategy with three to four identified computer networks. These networks already have remote access software that work on them, but the issue is that they are command prompt. The new software is meant to provide remote access capabilities with user friendly graphical interface.
The system engineers evaluated different options available for the remote access software and chose this one. The Virtual Network Computing software is the most appropriate software solution for this problem. This software provides other services that could not be offered by the earlier system that needs to be replaced (Kim & Hariri, 2001). A list of ten best software solutions was provided, and an evaluation process ensued to find the best software solution for the purpose. Each of these softwares was installed to test their limitations with one host acting as the server and another target. The softwares were assigned a numeric rating according to their performance on the network. Functional requirements were analyzed to ensure that the software would meet most of the user requirements.
The result was that none of the softwares met all the user requirements, but the selected software met most of them. The selected software had a hire numeric rating than other softwares, which exuded much confidence to the prospective users. The selected software was found to have a suitable technological planning that is consistent with many systems attributes. These systems attributes include scalability, interoperability, interactivity, integration and many required capabilities. The system engineers came up with a consensus statement that the selected software had an excellent network access model.
Implementing this software system will require substantial staffing for the office installation, and different firm operations. The environment for this installation is not stable and would require strict monitoring to ensure reliability of the system. The system engineers should continue with the evaluation process to ensure that the entire firm is covered.
Introduction
Remote access for a large organization requires the development of a robust software infrastructure that can cover the whole system. This would enable the management and administration of a large network system. It would also provide efficiency for managing large files due to the number operations that are anticipated once the project is complete. A number of operations in the organization need remote access capabilities to prevent inconvenience (Kim & Hariri, 2001). The existing systems are useful, but users are limited to their command capabilities which are inefficient for most operations.
The recommended software solution is meant to bridge the gap between a successful operation and prompt service delivery. The remote access system that is recommended is essential for solving most of the issues that were associated to the access. The size of the organization is large and infrastructure for the proposed system needs to be equally large. A proper assessment of system requirements is essential to ensure that the resultant system is reliable (Bender, 2010). The functional requirements created by the system engineers should be consistent to software capabilities. The user requirements collected on the organizations were used as the metrics for measuring the functional requirements of the system. The methodology and implementation strategies are outlined to ensure that the system functions correctly. The system infrastructure is already established as it uses the previous system infrastructure.
Image retrieved from http://www.softwaregold.net
Figure 1: Virtual Computer Network
Problem Statement
Remote network access is essential for most network operations especially for large organizations. Their existing system has served the organization appropriately for the longest time. The existing software is sophisticated and can only be used by experts who should be always at the disposal of the organization. The complexity of the system is because of its command prompt nature (Kim & Hariri, 2001). Most users are not familiar with operating a command prompt system and find it ineffective. The organization has to call experts to carry out even the simplest operations that should be carried out by an executive. This is a challenge for the organizations since much time is wasted before the experts arrive. It may be a matter of urgency that may stall the essential operations of the organization.
It is essential to find a user friendly solution that any user can easily access and use after training. This would be essential in solving the problem that the large organization may be facing especially in providing essential services. The main problem that the organization faced was finding an interactive system that was user friendly. A command based system is friendly to most users due to the nature of issuing commands in order to provide services. A graphical user interface is essential in order to turn around the performance of the organization. The recommended system software provides a user friendly graphical interface that is user friendly. This would do away with instances where experts would be called in to perform basic tasks. Most users would be trained on how to use the software system to reduce inconvenience when there are issues.
Method used
The expected method that is meant to be used in this for testing this project is prototyping method. Prototype softwares are provided for installation in the selected network to establish the limitations of the system. Each prototype is installed respectively to test which one is meets most of the user requirements (Bender, 2010). A qualitative evaluation is carried out to help in selecting the best prototype that would inform in selecting software.
Different design processes requires different prototype applications prototypes are either part of the design or just design objects. Prototypes that are viewed as design objects have benefits that include support of creativity and helping developer to generate ideas. The prototypes can also help a designer explore the design working space and discover some issues about the user. The prototype also encourages communication between the user and developer during the design process. This is likely to reduce the amount of errors that are usually generated during the development process.
This project design requires the use of representational prototype because it involves the use of computer simulations. This is because the project takes the form of a computer program. A number of sketches on paper are considered a prototype, but a computer simulation is the most appropriate prototype in this case. An online prototype is applicable in this instance because it is expected to run on a computer (Sarmento, 2005). Such prototypes include animations, interactive video presentations, and computer programs written in scripting language. This project prototype would be an application developed with interface builders. Online prototypes are considered to be more expensive than offline prototypes that are usually sketches done on paper. Online prototypes require programming skills to develop and to implement due to interactivity and visualization techniques. It is essential to build the interface prototype as a fast development initiative. This is achieved in the early stages of software development and design. Some programmers also believe that they do not have to develop interfaces but to go straight to the code.
This system’s prototyping is an iterative process as it is essential in providing information about unique aspects in the project. The purpose of this prototype is to illustrate the user’s expectations in order to develop it into software. This is beneficial to the developer in order to get the user’s response on the project design.
There are a number of activities involved in the development of this system. A proper management plan is required in every development stage of the design of this system. The following are the stages involved in the design process of the system. Selecting significant software packages that would be part of the system (Bender, 2010). The next activity involves designing the components of the system, which includes the database structures, procedures, inputs and outputs, system interfaces, technical environment and the entire system architecture. The step that follows involves the development of system procedures for the purpose of converting it from existing systems to new systems.
A walkthrough of the design is required to ensure that the design is technically complete. The next step involves beginning the development approaches including user support and system maintenance. This process is followed by the implementation process. It is essential to ensure that every point of the design is well managed so as to avoid conflicts and errors. Activities of the design phase do not involve much iteration because the system is not large. It is necessary to produce a prototype before embarking on developing the complete system. It is essential to have proper timing in order to carryout a walkthrough, which is determined by the use of design methodologies. The database of this system is meant to play an integral part in ensuring the functionality of the system. The database design is part of the system design and is essential in every development step.
Findings
The qualitative evaluation carried on ten of the best software recommendations using numerical rating system. The evaluation procedure results found that the virtual network computer was the best system for this instance. This system had the best numeric rating against the user requirements that were used as the metrics. For a rating of between 0-3, the system was found to have a 3 out 3 rating. This system is best functional for an infrastructure that has good internet connectivity.
This means that the system can be accessed remotely even out of the organization by authorized users (Syngress, 2000). The system is secure because an appropriate authentication system is provided for users in the system. This system is useful for most users as they can easily interact with its interface. This is different from the initial system that did not have an interface for user interactivity. It is estimated that it would not take long for users to understand how the system works. Training would take a maximum of one week for the system users to understand what is required in operating the software.
Analysis
This systems analysis involves an in depth testing process for the software. The best software tools that were selected were evaluated according to the provided metrics. The system testing preparation included the following procedure: The creation of a staggered testing schedule that would accommodate the provided software. This testing schedule would incorporate the network infrastructure and the internet application.
The selection of the remote access software was facilitated to establish the best system in terms of functionality. This application was integrated with a developed test scenario and appropriate functional capabilities. Identification of additional tools that are necessary that are needed for the full implementation of the software was also essential. This plan contained over a hundred essential tests that were represented in representation softwares.
The test on the selected software found that it was compatible to most of the user requirements. This included the technical infrastructure, workflows, standards and metadata for the system. The evaluation process was essential in eliminating various flaws that were exposed in the end of the tests (Ciampa, 2008). The technical infrastructure was expected to have some basic requirements for the success of the proposed software. The data model for the infrastructure should be suited to the requirements of the organization.
Conclusion
The recommended software fulfills most of the user requirements that include reliability, interoperability, integration and interactivity. This new system solves the problem of delays and remote accessibility that the initial system could not solve comprehensively. The new software was tested and found to be useful and user friendly, which translates to productivity in the organization. Remote access saves time and resources for workers who may have been involved in unnecessary movement in the organization. The security of the system is stable and well secured given the policies that have been implemented to ensure security.
References
Bender, M. (2010). MCTS guide to Microsoft Windows Server 2008 network infrastructure configuration. Boston, MA: Course Technology, Cengage Learning.
Ciampa, M. D. (2008). Security+ guide to network security fundamentals. Clifton Park, N.Y: Delmar Learning.
Kim, D., & Hariri, S. (2001). Virtual computing: Concept, design, and evaluation. Boston, Mass. [u.a.: Kluwer Academic Publ.
Syngress. (2000). Building Cisco Remote Access Networks. Syngress.
Appendix
Figure 1