logo

Research Report on Network and Design | LDAP

   

Added on  2019-11-25

10 Pages2343 Words143 Views
Running head: DESIGN AND REPORTPART 2- Research Paper
Research Report on Network and Design | LDAP_1
1DESIGN AND REPORT Executive summaryThe active directory is configured in the network using windows server for the authentication,management and the authorization of the directory service. LDAP is used for accessing thedatabase and construct the LDAP service for copying the data to be served using the domaincontroller. There are different tools that can be used for the management if the domain servicesuch as group policy editor, management of the printing service, management of the group policyused for the management of the remote servers. For the management of the domainadministrators the services and the sites of the active directory and the trust and domain of theactive directory can be implemented for increasing the efficiency of the network. The resourcesin the network can be shared for increasing the availability of the network.
Research Report on Network and Design | LDAP_2
2DESIGN AND REPORT Table of Contents1. Introduction......................................................................................................................32. Comparison of Windows active directory with different network operating systems....32.1. LDAP and Active Directory.....................................................................................42.2. Windows active directory vs apache active directory..............................................52.3. LINUX /UNIX Servers vs Windows Active Directory............................................52.4. MAC OS X Server vs Windows Active Directory...................................................62.5. Novell vs Windows Active Directory:.....................................................................62.6. Windows NT:............................................................................................................73. Result...............................................................................................................................74. Conclusion.......................................................................................................................8Bibliography........................................................................................................................9
Research Report on Network and Design | LDAP_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Technology Implementation of Security Controls for FNU's Online Learning Network
|36
|1961
|312

Technology Implementation of Security Controls : Assignment
|36
|1961
|258

Server Operating System
|14
|3184
|50

Corporate Structure - Design Report
|8
|1319
|348

File and print share service in Windows Server 2012
|15
|965
|345

Technology Implementation of Security Controls for FNU's Online Learning Network
|20
|762
|412