Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is sites, why we use it.

Answer Posted / sarav

Active Directory (AD) sites, which consist of well-
connected networks defined by IP subnets that help define
the physical structure of your AD, give you much better
control over replication traffic and authentication traffic
than the control you get with Windows NT 4.0 domains.
Because AD relies on IP, all LAN segments should have a
defined IP subnet. This makes creating your AD site
structure straightforward; you simply group well-connected
subnets to form a site.

Creating AD sites benefits you in several ways, the first
of which is that creating these sites lets you control
replication traffic over WAN links. This control is
important in Windows 2000 because any Win2K domain
controller (DC) can originate changes to AD. To ensure that
a change you make on one DC propagates to all DCs, Win2K
uses multimaster replication (instead of the single-master
replication that NT 4.0 uses). You might think that
multimaster replication would make it difficult to plan for
AD replication’s effect on your WAN links, but you can
overcome this obstacle using AD sites. . .

Is This Answer Correct ?    4 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

917


What is classful and classless routing?

988


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

962


What is information security?

1154


What is the difference between a switch and a hub?

1041


What is proxy firewall?

1000


How long can a ddos attack last?

1203


How does a virtual private network (vpn) work?

1039


Difference between the communication and transmission.

969


What is adware?

1007


What are the different type of networking / internetworking devices

952


What is cybersecurity?

1013


What is meant by port blocking within lan?

1005


What is mesh network

992


Which are the different factors that affect the security of a network?

943