what is sites, why we use it.
Answers were Sorted based on User's Feedback
Answer / sarav
Active Directory (AD) sites, which consist of well-
connected networks defined by IP subnets that help define
the physical structure of your AD, give you much better
control over replication traffic and authentication traffic
than the control you get with Windows NT 4.0 domains.
Because AD relies on IP, all LAN segments should have a
defined IP subnet. This makes creating your AD site
structure straightforward; you simply group well-connected
subnets to form a site.
Creating AD sites benefits you in several ways, the first
of which is that creating these sites lets you control
replication traffic over WAN links. This control is
important in Windows 2000 because any Win2K domain
controller (DC) can originate changes to AD. To ensure that
a change you make on one DC propagates to all DCs, Win2K
uses multimaster replication (instead of the single-master
replication that NT 4.0 uses). You might think that
multimaster replication would make it difficult to plan for
AD replication’s effect on your WAN links, but you can
overcome this obstacle using AD sites. . .
Is This Answer Correct ? | 4 Yes | 0 No |
Answer / ravi kumar
Well, sites is basically use Design the network
infrastructure and control the replication.
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / sadanandan tm
Sites in Active Directory® represent the physical
structure, or topology, of your network. Active Directory
uses topology information, stored as site and site link
objects in the directory, to build the most efficient
replication topology. You use Active Directory Sites and
Services to define sites and site links. A site is a set of
well-connected subnets. Sites differ from domains; sites
represent the physical structure of your network, while
domains represent the logical structure of your organization
Is This Answer Correct ? | 1 Yes | 0 No |
What is the general data protection regulation (gdpr)?
What is a Password?
How Can I recover My Hotmail Account without phone no and email?
What are the main components of the CERT Taxonomy?
What is phishing?
What is site-to-site vpn?
What are the types fo ddos attacks?
How long can a ddos attack last?
What is remote access vpn?
What is mesh network
1- what is PHP ? 2- what is TS getway and TS application ? 3- what is channel in telecom and y we use ? 4- what is difference between spyware and mallware ? 5- what is main difference between standard and extended ACL ? please repley in sequence
Describe the term intrusion detection in the context of IT- security?