SlideShare a Scribd company logo
1 of 133
UNIT-1
Exploring directory services and
remote access
Network management &
administration (3360703)
6th semester (DCE)
Directory Services
• Directory services are an essential part of
today‘s network-centric computing
infrastructure.
• Directory-enabled applications -now power
almost all the mission critical processes of an
enterprise, including resource planning, value
chain management, security and firewalls, and
resource provisioning.
• So what exactly is a Directory Service?
Directory Services:
• A DS is the collection of software and processes that
store information about your enterprise, subscribers,
or both.
• Ex. is the Domain Name System (DNS), which is
provided by DNS servers. A DNS server stores the
mappings of computer host names and other forms of
domain name to IP addresses. A DNS client sends
questions to a DNS server about these mappings (e.g.
what is the IP address of test.example .com?).
• The mapping of host names enables users of the
computing resources to locate computers on a
network, using host names rather than complex
numerical IP addresses.
• In a telephone directory , the nodes are names and the data
items are telephone numbers.
• In the DNS the nodes are domain names and the data items
are IP addresses (and alias, mail server names, etc.).
• In a directory used by a network operating system, the nodes
represent resources that are managed by the OS, including
users, computers, printers and other shared resources.
 A directory service is a shared information infrastructure for
locating, managing, administering, and organizing common
items and network resources, which can include volumes,
folders, files, printers, users, groups, devices, telephone
numbers and other objects. A directory service is an important
component of a NOS (Network Operating System)
Directory Services:
Directory Services: a directory service can be considered an
extension of a database, directory services generally have the
following characteristics:
Hierarchical naming model
• A hierarchical name scheme uses a tree structure that reflects the actual
structure of a company. At the topmost (first) node of the tree is the
organization name, which is usually the company name. After the
organization name are organizational units, which you create to suit the
structure of the company; you can organize the structure geographically,
departmentally, or both.
• A hierarchical name may include these components:
– Common name (CN) -- Corresponds to a user's name or a server's name. All names must include a common name
component.
– Organizational unit (OU) -- Identifies the location of the user or server in the organization. Domino allows for a
maximum of four organizational units in a hierarchical name. Organizational units are optional.
– Organization (O) -- Identifies the organization to which a user or server belongs. Every name must include an
organization component.
– Country (C) --Identifies the country in which the organization exists. The country is optional.
– An example of a hierarchical name that uses all of the components is:
– Julia Herlihy/Sales/East/Renovations/USTypically a name is entered and displayed in this abbreviated format, but it is
stored internally in canonical format, which contains the name and its associated components, as shown in the
following example:
– CN=Julia Herlihy/OU=Sales/OU=East/O=Renovations/C=US
Directory Characteristics:
• Extended search capability
Directory services provide robust search
capabilities, allowing searches on individual
attributes of entries.
• Distributed information model
A directory service enables directory data to
be distributed across multiple servers within a
network.
• Shared network access
The resources are shared over the network.
Directory Characteristics:
• Replicated data
Directories support replication (copies of directory data
on more than one server) which make information
systems more accessible and more resistant to failure.
• Data store optimized for reads
The storage mechanism in a directory service is
generally designed to support a high ratio of reads to
writes.
• Extensible schema
The schema describes the type of data stored in the
directory. Directory services generally support the
extension of schema, meaning that new data types can
be added to the directory.
For example,
• An employee directory for a company will include all
employees of that company and certain types of information
associated with those employees.
• All useful information must be systematically associated with
the entry for each employee in the directory.
• As changes occur (New hires, terminations, promotions, job
changes and so on.), The directory needs to be updated to
reflect the changes.
Directory structure:
• Directory structure serves as the administrative aspect of
directory and fulfills 2 purpose:
– 1.Object Identification
• that ensures, all objects within a directory can be uniquely
identified.
– 2. Object Organization
• The organization of objects represented in a directory also serves
to make access to information about the objects in the directory
easier.
• This can also assist in the management of information in the
directory through the grouping (or partitioning) in some structured
manner so that the groups of objects can be managed separately.
• You should know about five important
directory services: Novell eDirectory,
Microsoft’s Windows NT domains, Microsoft’s
Active Directory, X.500 Directory Access
Protocol, and Lightweight Directory Access
Protocol
Novell eDirectory
• Novell eDirectory has been available since 1993,
introduced as NDS as part of NetWare 4.x.
• NetWare is a computer network operating system
developed by Novell.
• This product was rapidly implemented in Novell
networks, particularly in larger organizations that
had many NetWare servers and needed its
capabilities.
• eDirectory is a reliable, well made directory service.
• NDS can be installed to run under Windows
NT, SunMicrosystems’s Solaris and UNIX and
as well as under Novelle’s own Netware.
• So, it can be used to control a multi-platform
network.
• You manage the eDirectory tree from a client
computer logged in to the network with
administrative privileges.
• eDirectory is a hierarchical, object oriented
database used to represent certain assets in
an organization in a logical tree, including
organizations, organizational units, people,
positions, servers, volumes, workstations,
applications, printers, services, and groups.
• eDirectory can manage more than a billion
objects in a tree.
Windows NT Domains
• The Windows NT domain model breaks an organization into
chunks called domains, all of which are part of an
organization.
• The domains are usually organized geographically, which helps
minimize domain-to-domain communication requirements
across WAN links, although you’re free to organize domains as
you wish.
• Each domain is controlled by a primary domain controller
(PDC), which might have one or more backup domain
controllers (BDCs) to kick in if the PDC fails.
• All changes within the domain are made to the PDC, which
then replicates those changes to any BDCs. BDCs are read-
only, except for valid updates received from the PDC.
• In case of a PDC failure, BDCs automatically continue
authenticating users. To make administrative changes to a
domain that suffers PDC failure, any of the BDCs can be
promoted to PDC.
• Once the PDC is ready to come back online, the promoted BDC
can be demoted back to BDC status.
• Windows NT domains can be organized into one of four
domain models:
■ Single domain
In this model, only one domain contains all network resources.
■ Master domain
The master model usually puts users at the top-level domain and then
places network resources, such as shared folders or printers, in lower level
domains (called resource domains). In this model, the resource domains
trust the master domain.
■ Multiple master domain
This is a slight variation on the master domain model, in which users might
exist in multiple master domains, all of which trust one another, and in
which resources are located in resource domains, all of which trust all the
master domains.
■ Complete trust
This variation of the single-domain model spreads users and resources
across all domains, which all trust each other.
• You choose an appropriate domain model depending on the
physical layout of the network, the number of users to be
served, and other factors.
• Explicit trust relationships must be maintained between
domains using the master or multiple master domain model,
and must be managed on each domain separately.
• Maintaining these relationships is one of the biggest
difficulties in the Windows NT domain structure approach, at
least for larger organizations.
• If you have 100 domains, you must manage the 99 possible
trust relationships for each domain, for a total of 9,900 trust
relationships. For smaller numbers of domains (for example,
fewer than 10 domains), management of the trust
relationships is less of a problem, although it can still cause
difficulties.
X.500 DIRECTORY ACCESS
PROTOCOL
• X.500 is a series of computer networking standards covering
electronic directory services.
• The X.500 series was developed by ITU-T, formerly known as
CCITT, and first approved in 1988.
• ISO was a partner in developing the standards, incorporating
them into the Open Systems Interconnection suite of
protocols.
X.500 DIRECTORY ACCESS
PROTOCOL
• The protocols defined by X.500 include :
– DAP (Directory Access Protocol)
– DSP (Directory System Protocol)
– DISP (Directory Information Shadowing Protocol)
– DOP (Directory Operational Bindings Management Protocol)
– As these protocols used the OSI networking stack, a number of
alternatives to DAP were developed to allow Internet clients to access
the X.500 directory using the TCP/IP networking stack.
– The most well-known alternative to DAP is Lightweight Directory
Access Protocol (LDAP).
– While DAP and the other X.500 protocols can now use the TCP/IP
networking stack, LDAP remains a popular directory access protocol.
X.500 DIRECTORY ACCESS
PROTOCOL
• The primary concept of X.500 is that there is a single Directory
Information Tree (DIT), a hierarchical organization of entries
which are distributed across one or more servers, called
Directory System Agents (DSA).
• An entry consists of a set of attributes, each attribute with
one or more values.
• Each entry has a unique Distinguished Name, formed by
combining its Relative Distinguished Name (RDN), one or
more attributes of the entry itself, and the RDNs of each of
the superior entries up to the root of the DIT.
X.500 DIRECTORY ACCESS
PROTOCOL
• Client –DUA, server-DSA
• There are two sub protocols used to
communicate between systems.
• 1. communication protocol between DUA and
DSA is called DAP(Directory access protocol).
• 2. communication protocol between one DSA
and another DSA is called DSP(Directory
System protocol).
X.500 DIRECTORY ACCESS
PROTOCOL
• DAP specifies how an X.500 DUA communicates with
a DSA to issue a query.
• Using DAP, users can view,modify,delete and search
for information stored in the X.500 directory if they
have suitable access permission.
• DAP is complex protocol with lot of overhead.
• LDAP is used to access and update directory
information in x.500 directories.so, LDAP is more
suitable than DAPfor implementation on internet.
ACTIVE DIRECTORY ARCHITECTURE
• Active Directory (AD) is a directory service that Microsoft
developed for Windows domain networks.
• It is included in most Windows Server operating systems as a
set of processes and services.
• Initially, Active Directory was only in charge of centralized
domain management. Starting with Windows Server 2008,
however, Active Directory became an umbrella title for a
broad range of directory-based identity-related services.
• A server running Active Directory Domain Services (AD DS) is
called a domain controller. It authenticates and authorizes all
users and computers in a Windows domain type network—
assigning and enforcing security policies for all computers and
installing or updating software.
Object types in AD
• Container object
• Leaf object
Container Object
• A container object is simply an object that stores
other objects.
• Container objects are function as the branches of the
tree.
• AD uses container objects such as organizational unit
(OUs) and groups to store other objects.
• Container can store other container or leaf objects,
such as users and computers.
Leaf Object
• A leaf object stands alone and cannot store
other objects.
Object naming in AD
• Every object in active directory database is uniquely
identified.
• The naming conventions are based on the LDAP standard.
• The distinguished name (DN) of an object consist of the name
of the domain in which the object is located, plus the path
down the domain tree through the container objects to the
object itself.
• The part of object’s name that is stored in the object itself is
called its relative distinguished name (RDN)
DN & RDN
• Every object in active directory database is uniquely identified
by name that can be expressed in several forms.
• Naming conventions are based on LDAP standard defined by
RFC2251 published by IETF.
• The distinguished name(DN) of an object made up of the
name of the domain in which the object is located, plus the
path down the domain tree through the container objects to
the object itself.
• The part of an object’s name that is stored in the object itself
is called its relative distinguished name(RDN).
Canonical name
• Most AD applications refer to objects using
their canonical names.
• Canonical name is DN in which the domain
name comes first ,followed by the names of
the object’s parent containers working down
from the root of the domain and separated by
forward slashes, followed by object’s RDN as
follows:
• Zacker.com/sales/inside/jdoe
LDAP notation
• DN can also be expressed in LDAP notation.
• LDAP notation reverses the order of the object
names, starting with the RDN on the left and
the domain name on the right.
• Elements are separated by commas and
include the LDAP abbreviations that define
each type of element.
• Ldap://cz1.zacker.com/cn=jdeo,ou=inside,ou=
sales,dc=zacker,dc=com
• cn=common name ou=organizational unit dc=domain component
Globally unique Identifiers
• In addition to its DN, every object in the tree has a globally
unique identifier(GUID), which is a 128-bit number that is
automatically assigned by Directory System Agent when
object is created.
• DN can be changed but GUID can not be changed .
• The directory system agent (DSA) is a collection of services
and processes that run on each Windows 2000 Server and
later domain controller and provides access to the data store.
The data store is the physical store of directory data located
on a hard disk.
User principle names
• DN are used by applications and services when they
communicate with AD, but they are not easy for users to
understand ,type or remember.
• So each user object has a UPN that consists of username and
suffix , separated by @ symbol, just like standard email
address.
• User account name. Also known as the logon name.
UserName
• Separator. A character literal, the at sign (@).
• UPN suffix. Also known as the domain name.
Example.Microsoft.com
LDAP
• Lightweight Directory Access Protocol
• As the name suggests, it is a lightweight client-server
protocol for accessing directory services, specifically
X.500-based directory services
• Directory services play an important role in
developing intranet and Internet applications by
allowing the sharing of information about users,
systems, networks, services, and applications
throughout the network.
LDAP
• LDAP is software protocol for enabling anyone to
locate organization, individuals and other resources
such as files and devices in a network, whether on
the public internet or on a corporate intranet.
• It is lightweight version of DAP , which is part of
X.500, a standard for directory services in a network.
• It is lighter because in its initial version it did not
include security features.
• Microsoft includes it as part of what it calls active
directory in a number of products including Outlook
Express.
LDAP
• LDAP allows you to search for an individual
without knowing where they’re located.
• LDAP directory is organized in a simple “tree”
hierarchy consisting of the following levels:
• The root directory, which branches out to
• Countries, each of which branches out to
• Organizations, which branch out to
• Organizational units, which branches out to
• individuals
Forests, Trees, Roots and Leaves
Forest:--
– A forest is a collection of one or more Active Directory domains. The first
domain installed in a forest is called the forest root domain.
– A forest contains single definition of network configuration and share a
common global catalog, directory schema, logical structure and directory
configuration.
– No data is replicated by Active Directory outside the boundaries of the forest.
Therefore, the forest defines a security boundary.
– At the top of each directory tree is the root.
Trees:--Trees are created within the forest. If a domain is a subdomain of another
domain, the two domains are considered a tree.
Leaves:--
A leaf object represents an actual resource on the network, such as a
workstation, printer, shared directory, file, or user account. Leaf objects can
not contain other objects.
Active Directory Architecture:
Various Components of Active Directory are as below-
OBJECTS
Objects are the network resources. There are basically 3 Type of Objects which are
further categorized as below –
Container Objects
– Default Container Objects
• Computers
• Users
• Built-in
• Foreign Security Principles
– Generic or Created Container Objects
• Domain
– Domain Categories –
» Single Domain
» Master Domain
» Multiple Master Domain
– Domain Terminologies –
» Tree
» Forest
» Trust Relationship –
• Two way Trust
• Transitive Trust
• Site
• Organizational Units
Leaf Objects
Other Objects
CONTAINER OBJECTS
• A container object holds other objects.
• They have a defined location in the directory sub-tree hierarchy.
• A container is very similar to the folder concept in Windows. A folder contains files and other
folders. In Active Directory, a container holds objects and other containers.
• Container Objects can be categorized in 2 types –
– Default Container Objects
– Generic/ Created Container Objects
DEFAULT CONTAINER OBJECT
– There are several container objects that are installed by default when you promote the first domain
controller on your network.
– They differ from manually created containers because their object attribute type is literally named a
container.
– They don’t have the same properties as other generic Active Directory containers (such as sites, domains,
and OUs).
– You cannot delete them nor can you create new objects of that container object type.
– You can also not associate Group Policy Objects with these.
• COMPUTERS
• USERS
• BUILTIN
• FOREIGN SECURITY PRINCIPALS
GENERIC AND CREATED CONTAINER OBJECTS
– There are three major types of containers that are configured manually and are considered as generic –
• Domain
• Site
• Organizational Units
– These objects are most often used to link group policy objects.
– When you link a group policy to a container it enforces that policy on all the objects (users, computers,
nested groups etc.) inside it.
Domains – The domain container holds all of the other objects that are a
part of that domain and also hold organizational unit objects and their
contents.
-Domains are responsible for creating Trees and Forest as well as maintain
trust relationship between each other to access the resources of other
domains.
• A Windows domain is a form of a computer network in which all user
accounts, computers, printers and other security principals, are registered
with a central database (called a directory service) .
• Authentication takes place on domain controllers.
• Each person who uses computers within a domain receives a unique user
account that can then be assigned access to resources within the domain
• Windows domains can be organized into following domain models.
• Single domain: In this model, only one domain contains all network
resources.
• Master domain: The master model usually puts users at the top-level
domain and then places network resources, such as shared folders or
printers, in lower-level domains (called resource domains). In this model,
the resource domains trust the master domain.
• Multiple master domains: This is a slight variation on the master domain
model, in which users might exist in multiple master domains, all of which
trust one another, and in which resources are located in resource
domains, all of which trust all the master domains.
TREES
A tree is a group of domains that have the same DNS name; for example,
nks.com (the top domain), sales.nks.com and software.sal
es.nks.com (the child domains).
FORESTS
• A forest is a collection of trees, which can be treated as
one administrative unit and Active Directory
automatically manages trusts between domains.
• For security purposes, organizations have set up
multiple forests, but trusts between forests must be
managed manually by the administrator.
• Because the forest is a security boundary, each forest
does not trust or allow access from any other forest by
default.
• However, in Windows Server 2003 and higher Active
Directory, transitive trust relationships can be manually
established between forests to establish cross-forest
access to resources, so that users in one forest can
access resources in another forest.
TRUST RELATIONSHIP
There are basically 2 types of trusts –
a. TWO WAY
When you create a new child domain, the child domain
automatically trusts the parent domain, and vice versa. At
the practical level, this means that authentication requests
can be passed between the two domains in both directions.
b. TRANSITIVE
An automatic trust association between parent and child
domains and between root domains in a Windows Active
Directory forest. For example, if domain A trusts B, and B
trusts C, then A automatically trusts C.
Sites
• A site is actually a physical grouping of objects based
upon IP Addresses.
• A site cannot span multiple physical locations, but
rather encompasses network objects and devices in
one area.
• For example, the XYZ company has offices in pune,
delhi, and ahmedabad. Each office is a physical
location, and therefore is considered as a “site”.
• The site container is a logical representation of what is
physically true.
• Specifically, sites are used to distinguish between local
and remote locations.
Organizational Units
• They are simple a container that the administrator
creates that he can use for any purpose.
• Most administrators will create logical
organizational units and place users and/or groups
inside them in order to setup specific permissions or
policy.
• For example, he may create an organizational unit
called “Accounting” and place the executives and the
accounting department into it in so that they can have
access to specific resources that are not available to
the rest of the network.
LEAF OBJECT
• Objects are either container objects or leaf
objects (also called non-container objects).
• A container object stores other objects
and a leaf object does not.
• For example, a folder is a container object
for files, which are leaf objects.
• Leaf objects are located at the end of the
sub-tree hierarchy.
OTHER OBJECTS
In addition active directory also supports some other types of objects like
Group, Contact, Shared Folder and Printer as listed in below.
• Group –
– A group object represents a collection of user accounts, computer accounts,
contacts and other groups that can be managed as a single unit.
– Groups facilitate role based access to network resources.
– There are two types of groups – Security and Distribution groups.
– Security groups are mainly used for the purpose of providing access to
network resources.
– Distribution groups are not security enabled and can be used only for
communication purpose.
– Groups can vary in scope which limits its membership and scope of operation.
• Contact – A contact object contains the contact information about people
who are associated with the organization.
• Shared folder – A shared folder object is used to share files across the
network.
• Printer – A printer object corresponds to a printer resource in a network.
ATTRIBUTES
Attributes are characteristics of objects in the directory. For
example, the attributes of a user might include the user’s first and
last names, department, and e-mail address
SCHEMA
• The schema is the component that defines all object classes and
attributes that AD uses to store data.
• It is sometimes referred to as the blueprint for AD.
• The schema is replicated among all domain controllers in the
forest. Any change that is made to the schema is replicated to every
domain controller.
• In Schema each attribute is defined only once and can be used in
multiple classes. For example, the Description attribute is defined
once but is used in many different classes.
• Each class of objects in the Active Directory schema has attributes
that ensure:
– Unique identification of each object in a directory data store.
– security principals (users, computers, or groups)
– Compatibility with LDAP standards for directory object names.
LDAP NOTATION
Three object naming formats that are supported by AD are –
LDAP DN and RDN names
• LDAP defines operations for adding, searching, modifying, and
deleting directory entries.
• An LDAP server is required to provide a LDAP directory service.
• LDAP is based on entries; an entry is a set of attributes identified by
a globally unique Distinguished Name (DN).
• Each of a directory entry’s attributes has a type and one or more
values.
• The attributes in a directory entry’s distinguished name(DN) are
arranged in a hierarchy from right to left with the rightmost
attribute as the top entry and with the leftmost attribute(s) that are
unique to its level called a Relative Distinguished Name (RDN).
• A DN is a sequence of RDNs.
LDAP URL’s
• An LDAP URL begins with the prefix “LDAP,”
and then it names the server holding Active
Directory services followed by the attributed
name of the object (the distinguished name).
For example:
• LDAP://ADserver.example.com/cn=nikhil,
ou=People, dc=example, dc=com
LDAP based canonical names
• By default, Active Directory administrative tools
display object names using the canonical name
format, which lists the RDNs from the root
downward and without the RFC 1779 naming
attribute descriptors (dc=, ou=, or cn=).
• The canonical name uses the DNS domain name
format
• DN: cn=nikhil, ou=People, dc=example, dc=com
• Canonical Name: example.com/people/nikhil
Remote Network
Access
 What is Remote Network Access?
 The remote access technology allows
logging into system as an authorized user
from any location.
 Where it is Used?
 Remote access is commonly used on
corporate computer network but can also
be utilized on home network.
 If only the file or network service are
needed , then remote access network is
the best solution.
 Why Remote Access Network?
 Internet Access
 Remote access to stored private or shared
files on the LAN
 Access centralized Database
 Access hosted web Application
 For send or receive E-mail
 Remote access to a centralized application ,
such as an accounting system
PSTN
NETWORK
Content over view
 What is PSTN
 Evolution of PSTN
 Band width allocation
 Numbering schemes
 Call set-up, signaling and
switching
What is PSTN?
PSTN - short for public switched telephone network, also
knows as the plain old telephone system(POTS) is
basically the inter-connected telephone system over
which telephone calls are made via copper wires.
PSTN is based on the principles of circuit switching
Therefore when a call is made a particular dedicated
circuit activates which eventually deactivates when the
call ends
Telephone calls transmits as analogue signals across
copper wires
Structure of the PSTN
Evolution of PSTN
Inception
1876 – Invention of the first telephone by sir Alexander
Graham Bell
• Telephones were sold in pairs and the customers
were supposed to lay out there own cables
• Connectivity type – point to point connections
• Network structure – mesh topology
28th January 1878 – Worlds’ first telephone exchange
was established at New-Haven in Connecticut in the USA
• Network structure – star topology
• Switching technique – manual switching
Manual
exchanges
Manual switch
board
Manual
switching
Intermediate
 1887 – Almon Brown Strowger invented the first
electromechanical switch, known as the Strowger
switch or step by step switch
 Switch operated according to the train of
pulses generated by the customer
premises telephone
 Pulses were generated by a telegraph key
on the telephone until the dial was
introduces
 1920’s – Rotary dial telephones enters service
Intermediate
 1935 – Crossbar switches were introduced
 Intersecting bars move to make contact in order
to complete the circuit
 Markers were used to control exchanges
 Takes only 1/10 of a second to complete a call
 1950 – Time division multiplexing (TDM) is introduced
 1960’s – touch tone pad phones were introduces
 1968 – stored program control switching was introduces
 An electronic switch
 Upgradable to new versions since software
dependant
 Call set-up is controlled by programmed
software's
Electro-mechanical
exchanges
Strowger switch
Crossbar
switch
Present
 In today’s PSTN, call routing from source to destination
is predominantly controlled by digital switches that
were introduced in the 1970’s
 Apart from voice communications, data
communications are also provided via the PSTN at
present
DMS - 100 digital
switch
Evolution of the Telephone
Bandwidth allocation
 voice bandwidth – 300 – 3400Hz
 DSL frequency bands
 Up stream – 25.875kHz –138kHz
 Down stream – 142kHz –1104kHz
Numbering schemes
• n = country code + international access code
• most international access code are either (00) or
(011) except for few exceptions like (009 - Nigeria) and
(119 - Cuba)
 A PSTN number comprises of,
• A international access code/exit code (IAC/EC)
• A country code (CC)
• A national destination code also know as an area code
(NDC/AC)
• A subscriber number (SN)
 Maximum length of a number is 15digits
Signaling
 Signaling is the controlling of communications
 Basically anything but voice transmission is signaling
 Ex : call setup, call termination, billing , caller ID etc…
 There are types of signaling
 Channel associated signaling (CAS) - signaling information is
transmitted within the same voice channels
 Also know as in-band signaling
Ex : Dual tone multi frequency signaling (DTMF)
 Common channel signaling (CCS) - signaling information is
transmitted via a separate channel
 Also know as out-band signaling
Ex : signaling system #7 (SS7)
Switching systems
 Switching systems, basically are what determines the routing
pathway of a call
 Switches are contained in local exchanges and central
offices
Call setup process
Call setup process
Example : Suppose the calling subscriber dialed “5834975”
 At first the exchange(294) which the calling subscriber is directly
connected to, examines the dialed digits “583-4975”
 Secondly it acts upon the first three digits and access its look up
table to rout the call to the “583” exchange
 Then the “583” exchange acts upon the information
 It identifies the dialed number and connects the correct subscriber loop
which matches the “4975” number
 Then ring current is applied to the loop to alert the called subscriber
and when the call is answered conversation begins
INTEGRATED
SERVICES DIGITAL
NETWORK (ISDN)
INTRODUCTI
ON
• Integrated Services
Digital Network (ISDN)
is a set of communication
standards for digital
telephone connection and
the transmission of voice
and data over a digital line.
• Integrated Service Digital
Network (ISDN) is a set
of CCITT/ITU standards.
WORKING OF ISDN
• Home and business users who install an ISDN adapter receive Web pages
at up to 128Kbps compared with the maximum 56Kbps rate of a modem
connection.
• ISDN requires adapters at both ends of the transmission, so your access
provider also needs an ISDN adapter.
• There are two levels of service:
1. The Basic Rate Interface (2B+D) – Intended for the home and small
enterprise. (Consist of two 64Kbps B-channels and one 16Kbps D-channel.
Thus user can have up to 128Kbps service.)
(B channel is a telecommunications term which refers to the ISDN channel in
which the primary data or voice communication is carried. It has a bit rate of
64 kbit/s in full duplex. D channel is a telecommunications term which refers
to the ISDN channel in which the control and signalling information is
carried. The bit rate of the D channel of a basic rate interface is 16 kbit/s,
whereas it amounts to 64 kbps on a primary rate interface.)
1. The Primary Rate Interface(23B+D) – Intended for larger users. (Consist of
23 B-channels and one 64Kbps D-channel In the United States or 30 B-
channels and 1 D-channel in Europe.)
ISDN channel Types
• Bearer channel (B channel) :
• A bearer channel is defined at a rate of 64 Kbps. It is the basic
user channel and can carry any type of digital information in
full-duplex mode as long as the required transmission rate
does not exceed 64 Kbps.
• Data Channel (D channel) :
• A data channel can be either 16 or 64 Kbps, depending on the
needs of the user. The name says data but the primary
function of a D channel is to carry control signaling for the B
channel.
• Hybrid channel (H channel) :
• Hybrid channels are available with data rates of 384 Kbps
(H0), 1536 Kbps (H11), or 1920 Kbps (H12). These rates suit H
channels for high data-rate applications such as video,
teleconferencing and so on.
SUPPORTED SERVICES
• Voice calls
• Facsimile
• Videotext
• Teletext
• Electronic Mail
• Database access
• Data transmission and voice
• Connection to internet
• Electronic Fund transfer
• Image and graphics exchange
• Document storage and transfer
• Audio and Video Conferencing
• Automatic alarm services to fire stations, police, medical etc.
CONCLUSION
• ISDN is concept is the integration of both Analog or
voice data together with digital data over the same
network.
• Although the ISDN you can install is integrating
these on a medium designed for Analog
transmission, broadband ISDN is intended to extend
the integration of both services throughout the rest
of the end-to-end path using fiber optic and radio
media.
SUMMARY
• ISDN Stands for Integrated Service Digital
Network.
• It is standard for transmission of voice and data over
digital line
• Two level of services The Basic Rate interface and
The Primary Rate Interface.
DSL (Digital
Subscriber Line)
Network Management & Administration 90
 What is DSL ?
 Digital Subscriber Line (DSL, originally, digital subscriber
loop) is a communication medium, which is used to transfer
internet through copper wire telecommunication line.
 DSL is a technology which uses the existing transmission
medium (telephone wire) to provide high – speed transfer of
information across the internet.
 Along with cable internet, DSL is one of the most popular
ways ISP’s provide broadband internet access.
 DSL allows simultaneous voice and high – speed data service
such as super fast internet access over a single pair of
copper telephone wire.
 Although the transmitted information is in digital form, the
transmission medium is usually an analog carrier signal (or
the combination of many analog carrier signals) that is
modulated by the digital information signal.
Network Management & Administration 91
 How DSL Works ?
 The underlying technology of transport across DSL
facilities uses high-frequency sinusoidal carrier wave
modulation, which is an analog signal transmission.
 A DSL circuit terminates at each end in a modem which
modulates patterns of bits into certain high-frequency
impulses for transmission to the opposing modem. Signals
received from the far-end modem are demodulated to
yield a corresponding bit pattern that the modem
retransmits, in digital form, to its interfaced equipment,
such as a computer, router, switch, etc.
 If we ask that how we achieve such thing i.e., both
telephone and internet facility, then the answer is by
using splitters or DSL filters. Basically, the use of
splitter is to splits the frequency and make sure that
they can’t get interrupted.
Network Management & Administration 92
Network Management & Administration 93
 Types of DSL :
 There are Two Types of DSL’s :
1) Symmetric DSL – SDSL, splits the upstream and downstream
frequencies evenly, providing equal speeds to both
uploading and downloading data transfer. This connection
may provide 2 Mbps upstream and downstream. It is mostly
preferred by small organizations.
2) Asymmetric DSL – ADSL, provides a wider frequency range
for downstream transfers, which offers several times faster
downstream speeds. An ADSL connection may offer 20 Mbps
downstream and 1.5 Mbps upstream, It is because most
users download more data than they upload.
► ADSL are widely used DSL modems. There are Two Splitting
Methods used.
Network Management & Administration 94
 The CAP System :
 An earlier and more easily implemented standard was the
carrierless amplitude/phase (CAP) system, which was used
on many of the early installations of ADSL.
 CAP operates by dividing the signals on the telephone line
into three distinct bands:
 Voice conversations are carried in the 0 to 4 KHz (kilohertz)
band, as they are in all POTS circuits.
 The upstream channel (from the user back to the server) is
carried in a band between 25 and 160 KHz.
 The downstream channel (from the server to the user)
begins at 240 KHz and goes up to a point that varies
depending on a number of conditions (line length, line
noise, number of users in a particular telephone company
switch) but has a maximum of about 1.5 MHz (megahertz).
 This system, with the three channels widely separated,
minimizes the possibility of interference between the
channels on one line, or between the signals on different
lines.
Network Management & Administration 95
 CAP System Diagram :
Network Management & Administration 96
 The DMT System :
 DMT also divides signals into separate channels, but doesn't use two
fairly broad channels for upstream and downstream data. Instead,
DMT divides the data into 247 separate channels, each 4 KHz wide.
 One way to think about it is to imagine that the phone company
divides your copper line into 247 different 4-KHz lines and then
attaches a modem to each one. You get the equivalent of 247
modems connected to your computer at once.
 Each channel is monitored and, if the quality is too impaired, the
signal is shifted to another channel. This system constantly shifts
signals between different channels, searching for the best channels
for transmission and reception.
 In addition, some of the lower channels (those starting at about 8
KHz), are used as bidirectional channels, for upstream and
downstream information.
 Monitoring and sorting out the information on the bidirectional
channels, and keeping up with the quality of all 247 channels, makes
DMT more complex to implement than CAP, but gives it more
flexibility on lines of differing quality.
Network Management & Administration 97
 DMT System Diagram :
Network Management & Administration 98
 Advantages of DSL :
 Broadband Internet and Phone can be used at same time.
And it is because the voice is transferred on other
frequency and digital signals are transferred on others.
 Faster internet above 2 Mbps. (Dial up connection
provides 52 Kbps connection).
 No special wiring is needed.
 DSL internet is a very cost-effective method and is best
in connectivity.
 User can choose between different
connection speeds and pricing from various providers.
Network Management & Administration 99
 Disadvantages of DSL :
 DSL Internet service only works over a limited physical
distance and remains unavailable in many areas where
the local telephone infrastructure does not support DSL
technology.
 Your DSL connection works faster if you live closer to
provider’s central office. The farther your home is from
ISP’s office the more your speed will reduce.
 The connection is faster for receiving data than it is for
sending data over the Internet.
Network Management & Administration 100
CATV
History
• CATV origins date back to 1924 when some cable
broadcasting was done using cable in European cities.
• In 1948, community antenna received were built where over-
the-air signal reception was limited.
• Today, CATV offers Analog and digital channels. Receiving
digital channels typically requires a cable box conversion.
• The abbreviation CATV is often used for cable television. It
originally stood for Community Access Television or
Community Antenna Television, from cable television's origins
in 1948. In areas where over-the-air TV reception was limited
by distance from transmitters or mountainous terrain, large
"community antennas" were constructed, and cable was run
from them to individual homes.
CATV
• Community Access Television(CATV) is also commonly
known as Cable TV.
• Cable television is a system of delivering television
programming to consumers via radio frequency (RF)
signals transmitted through coaxial cables, or in more
recent systems, light pulses through fiber-optic cables.
• This contrasts with broadcast television (also known as
terrestrial television), in which the television signal is
transmitted over the air by radio waves and received by a
television antenna attached to the television.
• satellite television, in which the television signal is
transmitted by a communications satellite orbiting the
Earth and received by a satellite dish on the roof.
CATV
CATV
BROADCAST
TELEVISION
SATELLITE
TELEVISION
CATV
• FM radio programming, high-speed Internet,
telephone services, and similar non-television
services may also be provided through these cables.
• Analog television was standard in the 20th century,
but since the 2000s, cable systems have been
upgraded to digital cable operation.
• CATV is an shared cable system that uses a tree-
and-branch topology in which multiple households
within a neighborhood share the same cable.
 Virtual :
Virtual means not real or in a different state of being.
 Private :
Private means to keep something secret from the general
public.
 Network :
A network consists of two or more devices that can freely
and electronically communicate with each other via cables
and wire.
 VPN, Virtual Private Network, is defined as a network
that uses public network paths but maintains the
security and protection of private networks.
 It can transmit information over long distances
effectively and efficiently.
 Large corporations, educational institutions, and
government agencies use VPN technology to enable
remote users to securely connect to a private network.
 The VPN uses strong encryption and restricted, private
data access which keeps the data secure from the other
users of the underlying network.
VPN
 A virtual private network (VPN) extends a private
network across a public network, such as the Internet.
It enables users to send and receive data across shared
or public networks as if their computing devices were
directly connected to the private network.
 Applications running across the VPN may therefore
benefit from the functionality, security, and
management of the private network
 Virtual Private Networks may allow employees to securely
access a corporate intranet while located outside the office.
 They are used to securely connect geographically separated
offices of an organization, creating one cohesive network.
Individual Internet users may secure their wireless
transactions with a VPN, to circumvent geo-restrictions
and censorship, or to connect to proxy servers for the
purpose of protecting personal identity and location.
 However, some Internet sites block access to known VPN
technology to prevent the circumvention of their geo-
restrictions
 A VPN is created by establishing a virtual point-to-
point connection through the use of dedicated
connections, virtual tunneling protocols, or traffic
encryption.
 A VPN available from the public Internet can provide
some of the benefits of a wide area network (WAN).
From a user perspective, the resources available within
the private network can be accessed remotely.
 VPNs cannot make online connections completely
anonymous, but they can usually increase privacy and
security. To prevent disclosure of private information,
VPNs typically allow only authenticated remote access
using tunneling protocols and encryption techniques.
 The VPN security model provides:
 Confidentiality such that even if the network traffic is
sniffed at the packet level (see network sniffer and
Deep packet inspection), an attacker would only see
encrypted data
 Sender authentication to prevent unauthorized users
from accessing the VPN
 Message integrity to detect any instances of tampering
with transmitted messages
Tunneling
 In computer networks, a tunneling protocol allows a network
user to access or provide a network service that the underlying
network does not support or provide directly.
 One important use of a tunneling protocol is to allow a foreign
protocol to run over a network that does not support that
particular protocol; for example, running IPv6 over IPv4.
 Another important use is to provide services that are impractical
or unsafe to be offered using only the underlying network
services; for example, providing a corporate network address to a
remote user whose physical network address is not part of the
corporate network.
 Because tunneling involves repackaging the traffic data into a
different form, perhaps with encryption as standard, a third use
is to hide the nature of the traffic that is run through the tunnels.
 The tunneling protocol works by using the data
portion of a packet (the payload) to carry the packets
that actually provide the service.
 Tunneling uses a layered protocol model such as
those of the OSI or TCP/IP protocol suite, but usually
violates the layering when using the payload to carry a
service not normally provided by the network.
 Typically, the delivery protocol operates at an equal or
higher level in the layered model than the payload
protocol.
Types of VPN
 Remote Access VPN:- Also called as Virtual Private dial-up
network (VPDN) is mainly used in scenarios where remote
access to a network becomes essential. Remote access VPN
allows data to be accessed between a company’s private network
and remote users through a third party service provider;
Enterprise service provider
 Site to Site VPN – Intranet based: This type of VPN can be
used when multiple Remote locations are present and can be
made to join to a single network. Machines present on these
remote locations work as if they are working on a single network.
 Site to Site VPN – Extranet based: This type of VPN can be
used when several different companies need to work in a shared
environment. E.g. Distributors and service companies. This
network is more manageable and reliable
 A ‘VPN Protocol’ is the set of procedures a VPN service
uses to keep you protected online.
 IP security (IPSec)
 Secure Sockets Layer (SSL)
 Point-To-Point Tunneling Protocol (PPTP)
 Layer 2 Tunneling Protocol (L2TP)
 IPSec:
 IPsec VPN is one of two common VPN protocols, or set
of standards used to establish a VPN connection.
 IPsec is set at the IP layer, and it is often used to allow
secure, remote access to an entire network.
 SSL:
 Secure Sockets Layer, or SSL VPN, is the second
common VPN protocol.
 A big plus for SSL VPNs is that they can allow
segmented access for users. For example, users can be
limited to checking email and accessing shared drives
rather than having access to the entire network.
 Point to Point Tunneling Protocol:
 Point-to-point tunneling protocol (PPTP) is a set of
communication rules that govern the secure implementation
of virtual private networks (VPN), which allow organizations
a method of extending their own private networks over the
public Internet via "tunnels.“
 Layer 2 Tunneling Protocol :
 In computer networking, Layer 2 Tunneling Protocol (L2TP)
is a tunneling protocol used to support virtual private
networks (VPNs) or as part of the delivery of services by ISPs.
It does not provide any encryption or confidentiality by itself.
 PPTP (Point-to-Point Tunneling Protocol) it’s the most
widely supported VPN method among Windows users
and it was created by Microsoft in association with
other technology companies.
 The disadvantage of PPTP is that it does not provide
encryption and it relies on the PPP (Point-to-Point
Protocol) protocol to implement security measures
 But compared to other methods, PPTP is faster and it
is also available for Linux and Mac users.
 L2TP (Layer 2 Tunneling Protocol) it’s another
tunneling protocol that supports VPNs. Like PPTP,
L2TP does not provide encryption and it relies on PPP
protocol to do this.
 The difference between PPTP and L2TP is that the
second one provides not only data confidentiality but
also data integrity.
 L2TP was developed by Microsoft and Cisco as a
combination between PPTP and L2F(Layer 2
Forwarding).
 IPsec protocol can be used for encryption in
correlation with L2TP tunneling protocol. It is used as
a “protocol suite for securing Internet Protocol (IP)
communications by authenticating and encrypting
each IP packet of a data stream”. IPSec requires
expensive, time consuming client installations and this
can be considered an important disadvantage.
 SSL (Secure Socket Layer) is a VPN accessible via https
over web browser. The advantage of this SSL VPN is
that it doesn’t need any software installed because it
uses the web browser as the client application.
Through SSL VPNs the user’s access can be restrict to
specific applications instead of allowing access to the
whole network.
VPN CLIENT & SSL
VPNs
VPN Client
• A VPN client is a software based technology that establishes a
secure connection between the user and a VPN server.
• Some VPN clients work in the background automatically, while
others have front-end interfaces that allow users to interact with and
configure them.
• VPN clients are often applications that are installed on a computer,
though some organizations provide a purpose-built VPN client that
is a hardware device pre-installed with VPN software.
• Both sides of VPN connection must be running compatible VPN
software using compatible protocols.
• For the remote access VPN solutions, the software you install
depends on the VPN itself.
VPN Client
• Dedicated VPN solutions also sell client software that we can
distribute to our users. Usually this software carries a per-copy
charge.
• Mainly there are two types of VPN clients:
a) Native or built-in VPN clients
b) Third Party VPN clients
• Some of the VPN Software which are used now a days are as listed
below:
1. Cisco System VPN Client
2. SoftEther VPN
3. OpenVPN Client
SSL VPN
• SSL VPN means Secure Socket Layer Virtual Private
Network.
• An SSL VPN is a form of VPN that can be used with a
standard Web browser. In contrast to the traditional
Internet Protocol Security (IPSec) VPN.
• This VPN does not required the installation of
specialized client software on the end user’s computer.
• It’s used to give remote users with access to Web
applications, client/server applications and internal
network connections.
SSL VPN
• VPN provides a secure communications mechanism data and
other information transmitted between two endpoints.
• SSL VPN consists of one or more VPN devices to which the
users connects by using his Web browser.
• The traffic between the Web browser and the SSL VPN
device is encrypted with the SSL protocol or its successor, the
Transport Layer Security protocol.
• An SSL VPN offers versatility, ease of use and granular
control for the range of users on a variety of computers,
accessing recourses from many locations.
SSL VPN
Types of SSL VPN
1. SSL Protocol VPN: -
This type of SSL VPN allows for a single SSL connection to a
Web site so the end user securely access multiple network
services.
The site is called portal because it is one door that leads to
many other resources.
 The remote user accesses the SSL VPN Gateway using any
modern Web browser, identifies himself or herself to the
gateway using an authentication method supported by the
gateway and is then presented with a web page that acts as the
portal to the other services.
Types of SSL VPN
2. SSL Tunnel VPN: -
This type of SSL VPN allows a Web browser to securely access
multiple network services, including applications and protocols that
are not Web based, through a tunnel that is running under SSL.
SSL tunnel VPNs require that the Web browser be able to handle
active content, which allows them to provide functionally that is not
accessible to the SSL portal VPNs.
Example of active content include Java, JavaScript, Active X or Flash
applications or plug-ins.
END

More Related Content

What's hot

DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name SystemPeter R. Egli
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directorythoms1i
 
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-ITPresentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-ITMd. Abdul Barek
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction Mohamed Gad
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewSam Bowne
 
Ten Reasons Why You Should Prefer PostgreSQL to MySQL
Ten Reasons Why You Should Prefer PostgreSQL to MySQLTen Reasons Why You Should Prefer PostgreSQL to MySQL
Ten Reasons Why You Should Prefer PostgreSQL to MySQLanandology
 
02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptxAdiWidyanto2
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name SystemChinmay Joshi
 
BIND’s New Security Feature: DNSRPZ - the "DNS Firewall"
BIND’s New Security Feature: DNSRPZ - the "DNS Firewall"BIND’s New Security Feature: DNSRPZ - the "DNS Firewall"
BIND’s New Security Feature: DNSRPZ - the "DNS Firewall"Barry Greene
 
Active Directory Domain Services.pptx
Active Directory Domain Services.pptxActive Directory Domain Services.pptx
Active Directory Domain Services.pptxsyedasadraza13
 
Shipping Data from Postgres to Clickhouse, by Murat Kabilov, Adjust
Shipping Data from Postgres to Clickhouse, by Murat Kabilov, AdjustShipping Data from Postgres to Clickhouse, by Murat Kabilov, Adjust
Shipping Data from Postgres to Clickhouse, by Murat Kabilov, AdjustAltinity Ltd
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxMeriemBalhaddad
 
A Fast Intro to Fast Query with ClickHouse, by Robert Hodges
A Fast Intro to Fast Query with ClickHouse, by Robert HodgesA Fast Intro to Fast Query with ClickHouse, by Robert Hodges
A Fast Intro to Fast Query with ClickHouse, by Robert HodgesAltinity Ltd
 

What's hot (20)

DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
Security of DNS
Security of DNSSecurity of DNS
Security of DNS
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directory
 
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-ITPresentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction
 
Directory services
Directory servicesDirectory services
Directory services
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts Review
 
Ten Reasons Why You Should Prefer PostgreSQL to MySQL
Ten Reasons Why You Should Prefer PostgreSQL to MySQLTen Reasons Why You Should Prefer PostgreSQL to MySQL
Ten Reasons Why You Should Prefer PostgreSQL to MySQL
 
Protocols and tools
Protocols and toolsProtocols and tools
Protocols and tools
 
02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx
 
Unix - Filters
Unix - FiltersUnix - Filters
Unix - Filters
 
Ldap intro
Ldap introLdap intro
Ldap intro
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name System
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
BIND’s New Security Feature: DNSRPZ - the "DNS Firewall"
BIND’s New Security Feature: DNSRPZ - the "DNS Firewall"BIND’s New Security Feature: DNSRPZ - the "DNS Firewall"
BIND’s New Security Feature: DNSRPZ - the "DNS Firewall"
 
Active Directory Domain Services.pptx
Active Directory Domain Services.pptxActive Directory Domain Services.pptx
Active Directory Domain Services.pptx
 
Shipping Data from Postgres to Clickhouse, by Murat Kabilov, Adjust
Shipping Data from Postgres to Clickhouse, by Murat Kabilov, AdjustShipping Data from Postgres to Clickhouse, by Murat Kabilov, Adjust
Shipping Data from Postgres to Clickhouse, by Murat Kabilov, Adjust
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptx
 
A Fast Intro to Fast Query with ClickHouse, by Robert Hodges
A Fast Intro to Fast Query with ClickHouse, by Robert HodgesA Fast Intro to Fast Query with ClickHouse, by Robert Hodges
A Fast Intro to Fast Query with ClickHouse, by Robert Hodges
 
Pentesting ntp-17-02-18
Pentesting ntp-17-02-18Pentesting ntp-17-02-18
Pentesting ntp-17-02-18
 

Similar to Directory Services Nma Unit-1

Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network conceptsDuressa Teshome
 
09 - Active Directory.ppt
09 - Active Directory.ppt09 - Active Directory.ppt
09 - Active Directory.pptssuserf7cd2b
 
network administration directory access and remote access
network administration directory access and remote accessnetwork administration directory access and remote access
network administration directory access and remote accessSangeetha Rangarajan
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioAVEVA
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxJavedAjmal1
 
Win2KServer Active Directory
Win2KServer Active DirectoryWin2KServer Active Directory
Win2KServer Active DirectoryPhil Ashman
 
Big Data Storage Concepts from the "Big Data concepts Technology and Architec...
Big Data Storage Concepts from the "Big Data concepts Technology and Architec...Big Data Storage Concepts from the "Big Data concepts Technology and Architec...
Big Data Storage Concepts from the "Big Data concepts Technology and Architec...raghdooosh
 
BITM3730 11-22.pptx
BITM3730 11-22.pptxBITM3730 11-22.pptx
BITM3730 11-22.pptxMattMarino13
 
Database management system.pptx
Database management system.pptxDatabase management system.pptx
Database management system.pptxRamyaGr4
 
Directory services by SAJID
Directory services by SAJIDDirectory services by SAJID
Directory services by SAJIDSajid khan
 
Ctive directory interview question and answers
Ctive directory interview question and answersCtive directory interview question and answers
Ctive directory interview question and answerssankar palla
 
Chapter 10 Domain Name Systems_MWSA.pptx
Chapter 10 Domain Name Systems_MWSA.pptxChapter 10 Domain Name Systems_MWSA.pptx
Chapter 10 Domain Name Systems_MWSA.pptxmanju772238
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networkingRaja Waseem Akhtar
 
What is active directory
What is active directoryWhat is active directory
What is active directoryrajasekar1712
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Serious_SamSoul
 
Database Administration & Management - 01
Database Administration & Management - 01Database Administration & Management - 01
Database Administration & Management - 01FaisalMashood
 

Similar to Directory Services Nma Unit-1 (20)

Active directoryfinal
Active directoryfinalActive directoryfinal
Active directoryfinal
 
Active directory
Active directoryActive directory
Active directory
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network concepts
 
09 - Active Directory.ppt
09 - Active Directory.ppt09 - Active Directory.ppt
09 - Active Directory.ppt
 
network administration directory access and remote access
network administration directory access and remote accessnetwork administration directory access and remote access
network administration directory access and remote access
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web Studio
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptx
 
Win2KServer Active Directory
Win2KServer Active DirectoryWin2KServer Active Directory
Win2KServer Active Directory
 
Big Data Storage Concepts from the "Big Data concepts Technology and Architec...
Big Data Storage Concepts from the "Big Data concepts Technology and Architec...Big Data Storage Concepts from the "Big Data concepts Technology and Architec...
Big Data Storage Concepts from the "Big Data concepts Technology and Architec...
 
BITM3730 11-22.pptx
BITM3730 11-22.pptxBITM3730 11-22.pptx
BITM3730 11-22.pptx
 
Database management system.pptx
Database management system.pptxDatabase management system.pptx
Database management system.pptx
 
Directory services by SAJID
Directory services by SAJIDDirectory services by SAJID
Directory services by SAJID
 
Final domain control policy
Final domain control policy  Final domain control policy
Final domain control policy
 
Ctive directory interview question and answers
Ctive directory interview question and answersCtive directory interview question and answers
Ctive directory interview question and answers
 
Chapter 10 Domain Name Systems_MWSA.pptx
Chapter 10 Domain Name Systems_MWSA.pptxChapter 10 Domain Name Systems_MWSA.pptx
Chapter 10 Domain Name Systems_MWSA.pptx
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
 
What is active directory
What is active directoryWhat is active directory
What is active directory
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
Database Administration & Management - 01
Database Administration & Management - 01Database Administration & Management - 01
Database Administration & Management - 01
 

Recently uploaded

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Recently uploaded (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Directory Services Nma Unit-1

  • 1. UNIT-1 Exploring directory services and remote access Network management & administration (3360703) 6th semester (DCE)
  • 2. Directory Services • Directory services are an essential part of today‘s network-centric computing infrastructure. • Directory-enabled applications -now power almost all the mission critical processes of an enterprise, including resource planning, value chain management, security and firewalls, and resource provisioning. • So what exactly is a Directory Service?
  • 3. Directory Services: • A DS is the collection of software and processes that store information about your enterprise, subscribers, or both. • Ex. is the Domain Name System (DNS), which is provided by DNS servers. A DNS server stores the mappings of computer host names and other forms of domain name to IP addresses. A DNS client sends questions to a DNS server about these mappings (e.g. what is the IP address of test.example .com?). • The mapping of host names enables users of the computing resources to locate computers on a network, using host names rather than complex numerical IP addresses.
  • 4. • In a telephone directory , the nodes are names and the data items are telephone numbers. • In the DNS the nodes are domain names and the data items are IP addresses (and alias, mail server names, etc.). • In a directory used by a network operating system, the nodes represent resources that are managed by the OS, including users, computers, printers and other shared resources.  A directory service is a shared information infrastructure for locating, managing, administering, and organizing common items and network resources, which can include volumes, folders, files, printers, users, groups, devices, telephone numbers and other objects. A directory service is an important component of a NOS (Network Operating System) Directory Services:
  • 5. Directory Services: a directory service can be considered an extension of a database, directory services generally have the following characteristics: Hierarchical naming model • A hierarchical name scheme uses a tree structure that reflects the actual structure of a company. At the topmost (first) node of the tree is the organization name, which is usually the company name. After the organization name are organizational units, which you create to suit the structure of the company; you can organize the structure geographically, departmentally, or both. • A hierarchical name may include these components: – Common name (CN) -- Corresponds to a user's name or a server's name. All names must include a common name component. – Organizational unit (OU) -- Identifies the location of the user or server in the organization. Domino allows for a maximum of four organizational units in a hierarchical name. Organizational units are optional. – Organization (O) -- Identifies the organization to which a user or server belongs. Every name must include an organization component. – Country (C) --Identifies the country in which the organization exists. The country is optional. – An example of a hierarchical name that uses all of the components is: – Julia Herlihy/Sales/East/Renovations/USTypically a name is entered and displayed in this abbreviated format, but it is stored internally in canonical format, which contains the name and its associated components, as shown in the following example: – CN=Julia Herlihy/OU=Sales/OU=East/O=Renovations/C=US
  • 6. Directory Characteristics: • Extended search capability Directory services provide robust search capabilities, allowing searches on individual attributes of entries. • Distributed information model A directory service enables directory data to be distributed across multiple servers within a network. • Shared network access The resources are shared over the network.
  • 7. Directory Characteristics: • Replicated data Directories support replication (copies of directory data on more than one server) which make information systems more accessible and more resistant to failure. • Data store optimized for reads The storage mechanism in a directory service is generally designed to support a high ratio of reads to writes. • Extensible schema The schema describes the type of data stored in the directory. Directory services generally support the extension of schema, meaning that new data types can be added to the directory.
  • 8. For example, • An employee directory for a company will include all employees of that company and certain types of information associated with those employees. • All useful information must be systematically associated with the entry for each employee in the directory. • As changes occur (New hires, terminations, promotions, job changes and so on.), The directory needs to be updated to reflect the changes.
  • 9. Directory structure: • Directory structure serves as the administrative aspect of directory and fulfills 2 purpose: – 1.Object Identification • that ensures, all objects within a directory can be uniquely identified. – 2. Object Organization • The organization of objects represented in a directory also serves to make access to information about the objects in the directory easier. • This can also assist in the management of information in the directory through the grouping (or partitioning) in some structured manner so that the groups of objects can be managed separately.
  • 10. • You should know about five important directory services: Novell eDirectory, Microsoft’s Windows NT domains, Microsoft’s Active Directory, X.500 Directory Access Protocol, and Lightweight Directory Access Protocol
  • 11. Novell eDirectory • Novell eDirectory has been available since 1993, introduced as NDS as part of NetWare 4.x. • NetWare is a computer network operating system developed by Novell. • This product was rapidly implemented in Novell networks, particularly in larger organizations that had many NetWare servers and needed its capabilities. • eDirectory is a reliable, well made directory service.
  • 12. • NDS can be installed to run under Windows NT, SunMicrosystems’s Solaris and UNIX and as well as under Novelle’s own Netware. • So, it can be used to control a multi-platform network. • You manage the eDirectory tree from a client computer logged in to the network with administrative privileges.
  • 13. • eDirectory is a hierarchical, object oriented database used to represent certain assets in an organization in a logical tree, including organizations, organizational units, people, positions, servers, volumes, workstations, applications, printers, services, and groups. • eDirectory can manage more than a billion objects in a tree.
  • 14. Windows NT Domains • The Windows NT domain model breaks an organization into chunks called domains, all of which are part of an organization. • The domains are usually organized geographically, which helps minimize domain-to-domain communication requirements across WAN links, although you’re free to organize domains as you wish. • Each domain is controlled by a primary domain controller (PDC), which might have one or more backup domain controllers (BDCs) to kick in if the PDC fails.
  • 15. • All changes within the domain are made to the PDC, which then replicates those changes to any BDCs. BDCs are read- only, except for valid updates received from the PDC. • In case of a PDC failure, BDCs automatically continue authenticating users. To make administrative changes to a domain that suffers PDC failure, any of the BDCs can be promoted to PDC. • Once the PDC is ready to come back online, the promoted BDC can be demoted back to BDC status.
  • 16. • Windows NT domains can be organized into one of four domain models: ■ Single domain In this model, only one domain contains all network resources. ■ Master domain The master model usually puts users at the top-level domain and then places network resources, such as shared folders or printers, in lower level domains (called resource domains). In this model, the resource domains trust the master domain. ■ Multiple master domain This is a slight variation on the master domain model, in which users might exist in multiple master domains, all of which trust one another, and in which resources are located in resource domains, all of which trust all the master domains. ■ Complete trust This variation of the single-domain model spreads users and resources across all domains, which all trust each other.
  • 17. • You choose an appropriate domain model depending on the physical layout of the network, the number of users to be served, and other factors. • Explicit trust relationships must be maintained between domains using the master or multiple master domain model, and must be managed on each domain separately. • Maintaining these relationships is one of the biggest difficulties in the Windows NT domain structure approach, at least for larger organizations. • If you have 100 domains, you must manage the 99 possible trust relationships for each domain, for a total of 9,900 trust relationships. For smaller numbers of domains (for example, fewer than 10 domains), management of the trust relationships is less of a problem, although it can still cause difficulties.
  • 18. X.500 DIRECTORY ACCESS PROTOCOL • X.500 is a series of computer networking standards covering electronic directory services. • The X.500 series was developed by ITU-T, formerly known as CCITT, and first approved in 1988. • ISO was a partner in developing the standards, incorporating them into the Open Systems Interconnection suite of protocols.
  • 19. X.500 DIRECTORY ACCESS PROTOCOL • The protocols defined by X.500 include : – DAP (Directory Access Protocol) – DSP (Directory System Protocol) – DISP (Directory Information Shadowing Protocol) – DOP (Directory Operational Bindings Management Protocol) – As these protocols used the OSI networking stack, a number of alternatives to DAP were developed to allow Internet clients to access the X.500 directory using the TCP/IP networking stack. – The most well-known alternative to DAP is Lightweight Directory Access Protocol (LDAP). – While DAP and the other X.500 protocols can now use the TCP/IP networking stack, LDAP remains a popular directory access protocol.
  • 20. X.500 DIRECTORY ACCESS PROTOCOL • The primary concept of X.500 is that there is a single Directory Information Tree (DIT), a hierarchical organization of entries which are distributed across one or more servers, called Directory System Agents (DSA). • An entry consists of a set of attributes, each attribute with one or more values. • Each entry has a unique Distinguished Name, formed by combining its Relative Distinguished Name (RDN), one or more attributes of the entry itself, and the RDNs of each of the superior entries up to the root of the DIT.
  • 21. X.500 DIRECTORY ACCESS PROTOCOL • Client –DUA, server-DSA • There are two sub protocols used to communicate between systems. • 1. communication protocol between DUA and DSA is called DAP(Directory access protocol). • 2. communication protocol between one DSA and another DSA is called DSP(Directory System protocol).
  • 22. X.500 DIRECTORY ACCESS PROTOCOL • DAP specifies how an X.500 DUA communicates with a DSA to issue a query. • Using DAP, users can view,modify,delete and search for information stored in the X.500 directory if they have suitable access permission. • DAP is complex protocol with lot of overhead. • LDAP is used to access and update directory information in x.500 directories.so, LDAP is more suitable than DAPfor implementation on internet.
  • 23. ACTIVE DIRECTORY ARCHITECTURE • Active Directory (AD) is a directory service that Microsoft developed for Windows domain networks. • It is included in most Windows Server operating systems as a set of processes and services. • Initially, Active Directory was only in charge of centralized domain management. Starting with Windows Server 2008, however, Active Directory became an umbrella title for a broad range of directory-based identity-related services. • A server running Active Directory Domain Services (AD DS) is called a domain controller. It authenticates and authorizes all users and computers in a Windows domain type network— assigning and enforcing security policies for all computers and installing or updating software.
  • 24. Object types in AD • Container object • Leaf object
  • 25. Container Object • A container object is simply an object that stores other objects. • Container objects are function as the branches of the tree. • AD uses container objects such as organizational unit (OUs) and groups to store other objects. • Container can store other container or leaf objects, such as users and computers.
  • 26. Leaf Object • A leaf object stands alone and cannot store other objects.
  • 27.
  • 28. Object naming in AD • Every object in active directory database is uniquely identified. • The naming conventions are based on the LDAP standard. • The distinguished name (DN) of an object consist of the name of the domain in which the object is located, plus the path down the domain tree through the container objects to the object itself. • The part of object’s name that is stored in the object itself is called its relative distinguished name (RDN)
  • 29. DN & RDN • Every object in active directory database is uniquely identified by name that can be expressed in several forms. • Naming conventions are based on LDAP standard defined by RFC2251 published by IETF. • The distinguished name(DN) of an object made up of the name of the domain in which the object is located, plus the path down the domain tree through the container objects to the object itself. • The part of an object’s name that is stored in the object itself is called its relative distinguished name(RDN).
  • 30.
  • 31. Canonical name • Most AD applications refer to objects using their canonical names. • Canonical name is DN in which the domain name comes first ,followed by the names of the object’s parent containers working down from the root of the domain and separated by forward slashes, followed by object’s RDN as follows: • Zacker.com/sales/inside/jdoe
  • 32. LDAP notation • DN can also be expressed in LDAP notation. • LDAP notation reverses the order of the object names, starting with the RDN on the left and the domain name on the right. • Elements are separated by commas and include the LDAP abbreviations that define each type of element. • Ldap://cz1.zacker.com/cn=jdeo,ou=inside,ou= sales,dc=zacker,dc=com • cn=common name ou=organizational unit dc=domain component
  • 33. Globally unique Identifiers • In addition to its DN, every object in the tree has a globally unique identifier(GUID), which is a 128-bit number that is automatically assigned by Directory System Agent when object is created. • DN can be changed but GUID can not be changed . • The directory system agent (DSA) is a collection of services and processes that run on each Windows 2000 Server and later domain controller and provides access to the data store. The data store is the physical store of directory data located on a hard disk.
  • 34. User principle names • DN are used by applications and services when they communicate with AD, but they are not easy for users to understand ,type or remember. • So each user object has a UPN that consists of username and suffix , separated by @ symbol, just like standard email address. • User account name. Also known as the logon name. UserName • Separator. A character literal, the at sign (@). • UPN suffix. Also known as the domain name. Example.Microsoft.com
  • 35. LDAP • Lightweight Directory Access Protocol • As the name suggests, it is a lightweight client-server protocol for accessing directory services, specifically X.500-based directory services • Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network.
  • 36. LDAP • LDAP is software protocol for enabling anyone to locate organization, individuals and other resources such as files and devices in a network, whether on the public internet or on a corporate intranet. • It is lightweight version of DAP , which is part of X.500, a standard for directory services in a network. • It is lighter because in its initial version it did not include security features. • Microsoft includes it as part of what it calls active directory in a number of products including Outlook Express.
  • 37. LDAP • LDAP allows you to search for an individual without knowing where they’re located. • LDAP directory is organized in a simple “tree” hierarchy consisting of the following levels: • The root directory, which branches out to • Countries, each of which branches out to • Organizations, which branch out to • Organizational units, which branches out to • individuals
  • 38.
  • 39. Forests, Trees, Roots and Leaves Forest:-- – A forest is a collection of one or more Active Directory domains. The first domain installed in a forest is called the forest root domain. – A forest contains single definition of network configuration and share a common global catalog, directory schema, logical structure and directory configuration. – No data is replicated by Active Directory outside the boundaries of the forest. Therefore, the forest defines a security boundary. – At the top of each directory tree is the root. Trees:--Trees are created within the forest. If a domain is a subdomain of another domain, the two domains are considered a tree. Leaves:-- A leaf object represents an actual resource on the network, such as a workstation, printer, shared directory, file, or user account. Leaf objects can not contain other objects.
  • 40.
  • 41. Active Directory Architecture: Various Components of Active Directory are as below- OBJECTS Objects are the network resources. There are basically 3 Type of Objects which are further categorized as below – Container Objects – Default Container Objects • Computers • Users • Built-in • Foreign Security Principles – Generic or Created Container Objects • Domain – Domain Categories – » Single Domain » Master Domain » Multiple Master Domain – Domain Terminologies – » Tree » Forest » Trust Relationship – • Two way Trust • Transitive Trust • Site • Organizational Units Leaf Objects Other Objects
  • 42.
  • 43. CONTAINER OBJECTS • A container object holds other objects. • They have a defined location in the directory sub-tree hierarchy. • A container is very similar to the folder concept in Windows. A folder contains files and other folders. In Active Directory, a container holds objects and other containers. • Container Objects can be categorized in 2 types – – Default Container Objects – Generic/ Created Container Objects DEFAULT CONTAINER OBJECT – There are several container objects that are installed by default when you promote the first domain controller on your network. – They differ from manually created containers because their object attribute type is literally named a container. – They don’t have the same properties as other generic Active Directory containers (such as sites, domains, and OUs). – You cannot delete them nor can you create new objects of that container object type. – You can also not associate Group Policy Objects with these. • COMPUTERS • USERS • BUILTIN • FOREIGN SECURITY PRINCIPALS GENERIC AND CREATED CONTAINER OBJECTS – There are three major types of containers that are configured manually and are considered as generic – • Domain • Site • Organizational Units – These objects are most often used to link group policy objects. – When you link a group policy to a container it enforces that policy on all the objects (users, computers, nested groups etc.) inside it.
  • 44. Domains – The domain container holds all of the other objects that are a part of that domain and also hold organizational unit objects and their contents. -Domains are responsible for creating Trees and Forest as well as maintain trust relationship between each other to access the resources of other domains.
  • 45. • A Windows domain is a form of a computer network in which all user accounts, computers, printers and other security principals, are registered with a central database (called a directory service) . • Authentication takes place on domain controllers. • Each person who uses computers within a domain receives a unique user account that can then be assigned access to resources within the domain • Windows domains can be organized into following domain models. • Single domain: In this model, only one domain contains all network resources. • Master domain: The master model usually puts users at the top-level domain and then places network resources, such as shared folders or printers, in lower-level domains (called resource domains). In this model, the resource domains trust the master domain. • Multiple master domains: This is a slight variation on the master domain model, in which users might exist in multiple master domains, all of which trust one another, and in which resources are located in resource domains, all of which trust all the master domains.
  • 46. TREES A tree is a group of domains that have the same DNS name; for example, nks.com (the top domain), sales.nks.com and software.sal es.nks.com (the child domains).
  • 47. FORESTS • A forest is a collection of trees, which can be treated as one administrative unit and Active Directory automatically manages trusts between domains. • For security purposes, organizations have set up multiple forests, but trusts between forests must be managed manually by the administrator. • Because the forest is a security boundary, each forest does not trust or allow access from any other forest by default. • However, in Windows Server 2003 and higher Active Directory, transitive trust relationships can be manually established between forests to establish cross-forest access to resources, so that users in one forest can access resources in another forest.
  • 48.
  • 49. TRUST RELATIONSHIP There are basically 2 types of trusts – a. TWO WAY When you create a new child domain, the child domain automatically trusts the parent domain, and vice versa. At the practical level, this means that authentication requests can be passed between the two domains in both directions. b. TRANSITIVE An automatic trust association between parent and child domains and between root domains in a Windows Active Directory forest. For example, if domain A trusts B, and B trusts C, then A automatically trusts C.
  • 50.
  • 51. Sites • A site is actually a physical grouping of objects based upon IP Addresses. • A site cannot span multiple physical locations, but rather encompasses network objects and devices in one area. • For example, the XYZ company has offices in pune, delhi, and ahmedabad. Each office is a physical location, and therefore is considered as a “site”. • The site container is a logical representation of what is physically true. • Specifically, sites are used to distinguish between local and remote locations.
  • 52. Organizational Units • They are simple a container that the administrator creates that he can use for any purpose. • Most administrators will create logical organizational units and place users and/or groups inside them in order to setup specific permissions or policy. • For example, he may create an organizational unit called “Accounting” and place the executives and the accounting department into it in so that they can have access to specific resources that are not available to the rest of the network.
  • 53. LEAF OBJECT • Objects are either container objects or leaf objects (also called non-container objects). • A container object stores other objects and a leaf object does not. • For example, a folder is a container object for files, which are leaf objects. • Leaf objects are located at the end of the sub-tree hierarchy.
  • 54. OTHER OBJECTS In addition active directory also supports some other types of objects like Group, Contact, Shared Folder and Printer as listed in below. • Group – – A group object represents a collection of user accounts, computer accounts, contacts and other groups that can be managed as a single unit. – Groups facilitate role based access to network resources. – There are two types of groups – Security and Distribution groups. – Security groups are mainly used for the purpose of providing access to network resources. – Distribution groups are not security enabled and can be used only for communication purpose. – Groups can vary in scope which limits its membership and scope of operation. • Contact – A contact object contains the contact information about people who are associated with the organization. • Shared folder – A shared folder object is used to share files across the network. • Printer – A printer object corresponds to a printer resource in a network.
  • 55. ATTRIBUTES Attributes are characteristics of objects in the directory. For example, the attributes of a user might include the user’s first and last names, department, and e-mail address SCHEMA • The schema is the component that defines all object classes and attributes that AD uses to store data. • It is sometimes referred to as the blueprint for AD. • The schema is replicated among all domain controllers in the forest. Any change that is made to the schema is replicated to every domain controller. • In Schema each attribute is defined only once and can be used in multiple classes. For example, the Description attribute is defined once but is used in many different classes. • Each class of objects in the Active Directory schema has attributes that ensure: – Unique identification of each object in a directory data store. – security principals (users, computers, or groups) – Compatibility with LDAP standards for directory object names.
  • 56. LDAP NOTATION Three object naming formats that are supported by AD are – LDAP DN and RDN names • LDAP defines operations for adding, searching, modifying, and deleting directory entries. • An LDAP server is required to provide a LDAP directory service. • LDAP is based on entries; an entry is a set of attributes identified by a globally unique Distinguished Name (DN). • Each of a directory entry’s attributes has a type and one or more values. • The attributes in a directory entry’s distinguished name(DN) are arranged in a hierarchy from right to left with the rightmost attribute as the top entry and with the leftmost attribute(s) that are unique to its level called a Relative Distinguished Name (RDN). • A DN is a sequence of RDNs.
  • 57.
  • 58.
  • 59. LDAP URL’s • An LDAP URL begins with the prefix “LDAP,” and then it names the server holding Active Directory services followed by the attributed name of the object (the distinguished name). For example: • LDAP://ADserver.example.com/cn=nikhil, ou=People, dc=example, dc=com
  • 60. LDAP based canonical names • By default, Active Directory administrative tools display object names using the canonical name format, which lists the RDNs from the root downward and without the RFC 1779 naming attribute descriptors (dc=, ou=, or cn=). • The canonical name uses the DNS domain name format • DN: cn=nikhil, ou=People, dc=example, dc=com • Canonical Name: example.com/people/nikhil
  • 62.  What is Remote Network Access?  The remote access technology allows logging into system as an authorized user from any location.  Where it is Used?  Remote access is commonly used on corporate computer network but can also be utilized on home network.
  • 63.  If only the file or network service are needed , then remote access network is the best solution.
  • 64.  Why Remote Access Network?  Internet Access  Remote access to stored private or shared files on the LAN  Access centralized Database  Access hosted web Application  For send or receive E-mail  Remote access to a centralized application , such as an accounting system
  • 66. Content over view  What is PSTN  Evolution of PSTN  Band width allocation  Numbering schemes  Call set-up, signaling and switching
  • 67. What is PSTN? PSTN - short for public switched telephone network, also knows as the plain old telephone system(POTS) is basically the inter-connected telephone system over which telephone calls are made via copper wires. PSTN is based on the principles of circuit switching Therefore when a call is made a particular dedicated circuit activates which eventually deactivates when the call ends Telephone calls transmits as analogue signals across copper wires
  • 69. Evolution of PSTN Inception 1876 – Invention of the first telephone by sir Alexander Graham Bell • Telephones were sold in pairs and the customers were supposed to lay out there own cables • Connectivity type – point to point connections • Network structure – mesh topology 28th January 1878 – Worlds’ first telephone exchange was established at New-Haven in Connecticut in the USA • Network structure – star topology • Switching technique – manual switching
  • 71. Intermediate  1887 – Almon Brown Strowger invented the first electromechanical switch, known as the Strowger switch or step by step switch  Switch operated according to the train of pulses generated by the customer premises telephone  Pulses were generated by a telegraph key on the telephone until the dial was introduces  1920’s – Rotary dial telephones enters service
  • 72. Intermediate  1935 – Crossbar switches were introduced  Intersecting bars move to make contact in order to complete the circuit  Markers were used to control exchanges  Takes only 1/10 of a second to complete a call  1950 – Time division multiplexing (TDM) is introduced  1960’s – touch tone pad phones were introduces  1968 – stored program control switching was introduces  An electronic switch  Upgradable to new versions since software dependant  Call set-up is controlled by programmed software's
  • 74. Present  In today’s PSTN, call routing from source to destination is predominantly controlled by digital switches that were introduced in the 1970’s  Apart from voice communications, data communications are also provided via the PSTN at present DMS - 100 digital switch
  • 75. Evolution of the Telephone
  • 76. Bandwidth allocation  voice bandwidth – 300 – 3400Hz  DSL frequency bands  Up stream – 25.875kHz –138kHz  Down stream – 142kHz –1104kHz
  • 77. Numbering schemes • n = country code + international access code • most international access code are either (00) or (011) except for few exceptions like (009 - Nigeria) and (119 - Cuba)  A PSTN number comprises of, • A international access code/exit code (IAC/EC) • A country code (CC) • A national destination code also know as an area code (NDC/AC) • A subscriber number (SN)  Maximum length of a number is 15digits
  • 78. Signaling  Signaling is the controlling of communications  Basically anything but voice transmission is signaling  Ex : call setup, call termination, billing , caller ID etc…  There are types of signaling  Channel associated signaling (CAS) - signaling information is transmitted within the same voice channels  Also know as in-band signaling Ex : Dual tone multi frequency signaling (DTMF)  Common channel signaling (CCS) - signaling information is transmitted via a separate channel  Also know as out-band signaling Ex : signaling system #7 (SS7)
  • 79. Switching systems  Switching systems, basically are what determines the routing pathway of a call  Switches are contained in local exchanges and central offices
  • 81. Call setup process Example : Suppose the calling subscriber dialed “5834975”  At first the exchange(294) which the calling subscriber is directly connected to, examines the dialed digits “583-4975”  Secondly it acts upon the first three digits and access its look up table to rout the call to the “583” exchange  Then the “583” exchange acts upon the information  It identifies the dialed number and connects the correct subscriber loop which matches the “4975” number  Then ring current is applied to the loop to alert the called subscriber and when the call is answered conversation begins
  • 83. INTRODUCTI ON • Integrated Services Digital Network (ISDN) is a set of communication standards for digital telephone connection and the transmission of voice and data over a digital line. • Integrated Service Digital Network (ISDN) is a set of CCITT/ITU standards. WORKING OF ISDN
  • 84. • Home and business users who install an ISDN adapter receive Web pages at up to 128Kbps compared with the maximum 56Kbps rate of a modem connection. • ISDN requires adapters at both ends of the transmission, so your access provider also needs an ISDN adapter. • There are two levels of service: 1. The Basic Rate Interface (2B+D) – Intended for the home and small enterprise. (Consist of two 64Kbps B-channels and one 16Kbps D-channel. Thus user can have up to 128Kbps service.) (B channel is a telecommunications term which refers to the ISDN channel in which the primary data or voice communication is carried. It has a bit rate of 64 kbit/s in full duplex. D channel is a telecommunications term which refers to the ISDN channel in which the control and signalling information is carried. The bit rate of the D channel of a basic rate interface is 16 kbit/s, whereas it amounts to 64 kbps on a primary rate interface.) 1. The Primary Rate Interface(23B+D) – Intended for larger users. (Consist of 23 B-channels and one 64Kbps D-channel In the United States or 30 B- channels and 1 D-channel in Europe.)
  • 85. ISDN channel Types • Bearer channel (B channel) : • A bearer channel is defined at a rate of 64 Kbps. It is the basic user channel and can carry any type of digital information in full-duplex mode as long as the required transmission rate does not exceed 64 Kbps. • Data Channel (D channel) : • A data channel can be either 16 or 64 Kbps, depending on the needs of the user. The name says data but the primary function of a D channel is to carry control signaling for the B channel. • Hybrid channel (H channel) : • Hybrid channels are available with data rates of 384 Kbps (H0), 1536 Kbps (H11), or 1920 Kbps (H12). These rates suit H channels for high data-rate applications such as video, teleconferencing and so on.
  • 86.
  • 87. SUPPORTED SERVICES • Voice calls • Facsimile • Videotext • Teletext • Electronic Mail • Database access • Data transmission and voice • Connection to internet • Electronic Fund transfer • Image and graphics exchange • Document storage and transfer • Audio and Video Conferencing • Automatic alarm services to fire stations, police, medical etc.
  • 88. CONCLUSION • ISDN is concept is the integration of both Analog or voice data together with digital data over the same network. • Although the ISDN you can install is integrating these on a medium designed for Analog transmission, broadband ISDN is intended to extend the integration of both services throughout the rest of the end-to-end path using fiber optic and radio media.
  • 89. SUMMARY • ISDN Stands for Integrated Service Digital Network. • It is standard for transmission of voice and data over digital line • Two level of services The Basic Rate interface and The Primary Rate Interface.
  • 90. DSL (Digital Subscriber Line) Network Management & Administration 90
  • 91.  What is DSL ?  Digital Subscriber Line (DSL, originally, digital subscriber loop) is a communication medium, which is used to transfer internet through copper wire telecommunication line.  DSL is a technology which uses the existing transmission medium (telephone wire) to provide high – speed transfer of information across the internet.  Along with cable internet, DSL is one of the most popular ways ISP’s provide broadband internet access.  DSL allows simultaneous voice and high – speed data service such as super fast internet access over a single pair of copper telephone wire.  Although the transmitted information is in digital form, the transmission medium is usually an analog carrier signal (or the combination of many analog carrier signals) that is modulated by the digital information signal. Network Management & Administration 91
  • 92.  How DSL Works ?  The underlying technology of transport across DSL facilities uses high-frequency sinusoidal carrier wave modulation, which is an analog signal transmission.  A DSL circuit terminates at each end in a modem which modulates patterns of bits into certain high-frequency impulses for transmission to the opposing modem. Signals received from the far-end modem are demodulated to yield a corresponding bit pattern that the modem retransmits, in digital form, to its interfaced equipment, such as a computer, router, switch, etc.  If we ask that how we achieve such thing i.e., both telephone and internet facility, then the answer is by using splitters or DSL filters. Basically, the use of splitter is to splits the frequency and make sure that they can’t get interrupted. Network Management & Administration 92
  • 93. Network Management & Administration 93
  • 94.  Types of DSL :  There are Two Types of DSL’s : 1) Symmetric DSL – SDSL, splits the upstream and downstream frequencies evenly, providing equal speeds to both uploading and downloading data transfer. This connection may provide 2 Mbps upstream and downstream. It is mostly preferred by small organizations. 2) Asymmetric DSL – ADSL, provides a wider frequency range for downstream transfers, which offers several times faster downstream speeds. An ADSL connection may offer 20 Mbps downstream and 1.5 Mbps upstream, It is because most users download more data than they upload. ► ADSL are widely used DSL modems. There are Two Splitting Methods used. Network Management & Administration 94
  • 95.  The CAP System :  An earlier and more easily implemented standard was the carrierless amplitude/phase (CAP) system, which was used on many of the early installations of ADSL.  CAP operates by dividing the signals on the telephone line into three distinct bands:  Voice conversations are carried in the 0 to 4 KHz (kilohertz) band, as they are in all POTS circuits.  The upstream channel (from the user back to the server) is carried in a band between 25 and 160 KHz.  The downstream channel (from the server to the user) begins at 240 KHz and goes up to a point that varies depending on a number of conditions (line length, line noise, number of users in a particular telephone company switch) but has a maximum of about 1.5 MHz (megahertz).  This system, with the three channels widely separated, minimizes the possibility of interference between the channels on one line, or between the signals on different lines. Network Management & Administration 95
  • 96.  CAP System Diagram : Network Management & Administration 96
  • 97.  The DMT System :  DMT also divides signals into separate channels, but doesn't use two fairly broad channels for upstream and downstream data. Instead, DMT divides the data into 247 separate channels, each 4 KHz wide.  One way to think about it is to imagine that the phone company divides your copper line into 247 different 4-KHz lines and then attaches a modem to each one. You get the equivalent of 247 modems connected to your computer at once.  Each channel is monitored and, if the quality is too impaired, the signal is shifted to another channel. This system constantly shifts signals between different channels, searching for the best channels for transmission and reception.  In addition, some of the lower channels (those starting at about 8 KHz), are used as bidirectional channels, for upstream and downstream information.  Monitoring and sorting out the information on the bidirectional channels, and keeping up with the quality of all 247 channels, makes DMT more complex to implement than CAP, but gives it more flexibility on lines of differing quality. Network Management & Administration 97
  • 98.  DMT System Diagram : Network Management & Administration 98
  • 99.  Advantages of DSL :  Broadband Internet and Phone can be used at same time. And it is because the voice is transferred on other frequency and digital signals are transferred on others.  Faster internet above 2 Mbps. (Dial up connection provides 52 Kbps connection).  No special wiring is needed.  DSL internet is a very cost-effective method and is best in connectivity.  User can choose between different connection speeds and pricing from various providers. Network Management & Administration 99
  • 100.  Disadvantages of DSL :  DSL Internet service only works over a limited physical distance and remains unavailable in many areas where the local telephone infrastructure does not support DSL technology.  Your DSL connection works faster if you live closer to provider’s central office. The farther your home is from ISP’s office the more your speed will reduce.  The connection is faster for receiving data than it is for sending data over the Internet. Network Management & Administration 100
  • 101. CATV
  • 102. History • CATV origins date back to 1924 when some cable broadcasting was done using cable in European cities. • In 1948, community antenna received were built where over- the-air signal reception was limited. • Today, CATV offers Analog and digital channels. Receiving digital channels typically requires a cable box conversion. • The abbreviation CATV is often used for cable television. It originally stood for Community Access Television or Community Antenna Television, from cable television's origins in 1948. In areas where over-the-air TV reception was limited by distance from transmitters or mountainous terrain, large "community antennas" were constructed, and cable was run from them to individual homes.
  • 103. CATV • Community Access Television(CATV) is also commonly known as Cable TV. • Cable television is a system of delivering television programming to consumers via radio frequency (RF) signals transmitted through coaxial cables, or in more recent systems, light pulses through fiber-optic cables. • This contrasts with broadcast television (also known as terrestrial television), in which the television signal is transmitted over the air by radio waves and received by a television antenna attached to the television. • satellite television, in which the television signal is transmitted by a communications satellite orbiting the Earth and received by a satellite dish on the roof.
  • 104. CATV
  • 106. CATV • FM radio programming, high-speed Internet, telephone services, and similar non-television services may also be provided through these cables. • Analog television was standard in the 20th century, but since the 2000s, cable systems have been upgraded to digital cable operation. • CATV is an shared cable system that uses a tree- and-branch topology in which multiple households within a neighborhood share the same cable.
  • 107.
  • 108.  Virtual : Virtual means not real or in a different state of being.  Private : Private means to keep something secret from the general public.  Network : A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire.
  • 109.  VPN, Virtual Private Network, is defined as a network that uses public network paths but maintains the security and protection of private networks.  It can transmit information over long distances effectively and efficiently.  Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network.  The VPN uses strong encryption and restricted, private data access which keeps the data secure from the other users of the underlying network.
  • 110. VPN  A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.  Applications running across the VPN may therefore benefit from the functionality, security, and management of the private network
  • 111.  Virtual Private Networks may allow employees to securely access a corporate intranet while located outside the office.  They are used to securely connect geographically separated offices of an organization, creating one cohesive network. Individual Internet users may secure their wireless transactions with a VPN, to circumvent geo-restrictions and censorship, or to connect to proxy servers for the purpose of protecting personal identity and location.  However, some Internet sites block access to known VPN technology to prevent the circumvention of their geo- restrictions
  • 112.  A VPN is created by establishing a virtual point-to- point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption.  A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely.
  • 113.
  • 114.  VPNs cannot make online connections completely anonymous, but they can usually increase privacy and security. To prevent disclosure of private information, VPNs typically allow only authenticated remote access using tunneling protocols and encryption techniques.  The VPN security model provides:  Confidentiality such that even if the network traffic is sniffed at the packet level (see network sniffer and Deep packet inspection), an attacker would only see encrypted data  Sender authentication to prevent unauthorized users from accessing the VPN  Message integrity to detect any instances of tampering with transmitted messages
  • 115. Tunneling  In computer networks, a tunneling protocol allows a network user to access or provide a network service that the underlying network does not support or provide directly.  One important use of a tunneling protocol is to allow a foreign protocol to run over a network that does not support that particular protocol; for example, running IPv6 over IPv4.  Another important use is to provide services that are impractical or unsafe to be offered using only the underlying network services; for example, providing a corporate network address to a remote user whose physical network address is not part of the corporate network.  Because tunneling involves repackaging the traffic data into a different form, perhaps with encryption as standard, a third use is to hide the nature of the traffic that is run through the tunnels.
  • 116.  The tunneling protocol works by using the data portion of a packet (the payload) to carry the packets that actually provide the service.  Tunneling uses a layered protocol model such as those of the OSI or TCP/IP protocol suite, but usually violates the layering when using the payload to carry a service not normally provided by the network.  Typically, the delivery protocol operates at an equal or higher level in the layered model than the payload protocol.
  • 117. Types of VPN  Remote Access VPN:- Also called as Virtual Private dial-up network (VPDN) is mainly used in scenarios where remote access to a network becomes essential. Remote access VPN allows data to be accessed between a company’s private network and remote users through a third party service provider; Enterprise service provider  Site to Site VPN – Intranet based: This type of VPN can be used when multiple Remote locations are present and can be made to join to a single network. Machines present on these remote locations work as if they are working on a single network.  Site to Site VPN – Extranet based: This type of VPN can be used when several different companies need to work in a shared environment. E.g. Distributors and service companies. This network is more manageable and reliable
  • 118.  A ‘VPN Protocol’ is the set of procedures a VPN service uses to keep you protected online.  IP security (IPSec)  Secure Sockets Layer (SSL)  Point-To-Point Tunneling Protocol (PPTP)  Layer 2 Tunneling Protocol (L2TP)
  • 119.  IPSec:  IPsec VPN is one of two common VPN protocols, or set of standards used to establish a VPN connection.  IPsec is set at the IP layer, and it is often used to allow secure, remote access to an entire network.  SSL:  Secure Sockets Layer, or SSL VPN, is the second common VPN protocol.  A big plus for SSL VPNs is that they can allow segmented access for users. For example, users can be limited to checking email and accessing shared drives rather than having access to the entire network.
  • 120.  Point to Point Tunneling Protocol:  Point-to-point tunneling protocol (PPTP) is a set of communication rules that govern the secure implementation of virtual private networks (VPN), which allow organizations a method of extending their own private networks over the public Internet via "tunnels.“  Layer 2 Tunneling Protocol :  In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself.
  • 121.  PPTP (Point-to-Point Tunneling Protocol) it’s the most widely supported VPN method among Windows users and it was created by Microsoft in association with other technology companies.  The disadvantage of PPTP is that it does not provide encryption and it relies on the PPP (Point-to-Point Protocol) protocol to implement security measures  But compared to other methods, PPTP is faster and it is also available for Linux and Mac users.
  • 122.  L2TP (Layer 2 Tunneling Protocol) it’s another tunneling protocol that supports VPNs. Like PPTP, L2TP does not provide encryption and it relies on PPP protocol to do this.  The difference between PPTP and L2TP is that the second one provides not only data confidentiality but also data integrity.  L2TP was developed by Microsoft and Cisco as a combination between PPTP and L2F(Layer 2 Forwarding).
  • 123.  IPsec protocol can be used for encryption in correlation with L2TP tunneling protocol. It is used as a “protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream”. IPSec requires expensive, time consuming client installations and this can be considered an important disadvantage.
  • 124.  SSL (Secure Socket Layer) is a VPN accessible via https over web browser. The advantage of this SSL VPN is that it doesn’t need any software installed because it uses the web browser as the client application. Through SSL VPNs the user’s access can be restrict to specific applications instead of allowing access to the whole network.
  • 125. VPN CLIENT & SSL VPNs
  • 126. VPN Client • A VPN client is a software based technology that establishes a secure connection between the user and a VPN server. • Some VPN clients work in the background automatically, while others have front-end interfaces that allow users to interact with and configure them. • VPN clients are often applications that are installed on a computer, though some organizations provide a purpose-built VPN client that is a hardware device pre-installed with VPN software. • Both sides of VPN connection must be running compatible VPN software using compatible protocols. • For the remote access VPN solutions, the software you install depends on the VPN itself.
  • 127. VPN Client • Dedicated VPN solutions also sell client software that we can distribute to our users. Usually this software carries a per-copy charge. • Mainly there are two types of VPN clients: a) Native or built-in VPN clients b) Third Party VPN clients • Some of the VPN Software which are used now a days are as listed below: 1. Cisco System VPN Client 2. SoftEther VPN 3. OpenVPN Client
  • 128. SSL VPN • SSL VPN means Secure Socket Layer Virtual Private Network. • An SSL VPN is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPSec) VPN. • This VPN does not required the installation of specialized client software on the end user’s computer. • It’s used to give remote users with access to Web applications, client/server applications and internal network connections.
  • 129. SSL VPN • VPN provides a secure communications mechanism data and other information transmitted between two endpoints. • SSL VPN consists of one or more VPN devices to which the users connects by using his Web browser. • The traffic between the Web browser and the SSL VPN device is encrypted with the SSL protocol or its successor, the Transport Layer Security protocol. • An SSL VPN offers versatility, ease of use and granular control for the range of users on a variety of computers, accessing recourses from many locations.
  • 131. Types of SSL VPN 1. SSL Protocol VPN: - This type of SSL VPN allows for a single SSL connection to a Web site so the end user securely access multiple network services. The site is called portal because it is one door that leads to many other resources.  The remote user accesses the SSL VPN Gateway using any modern Web browser, identifies himself or herself to the gateway using an authentication method supported by the gateway and is then presented with a web page that acts as the portal to the other services.
  • 132. Types of SSL VPN 2. SSL Tunnel VPN: - This type of SSL VPN allows a Web browser to securely access multiple network services, including applications and protocols that are not Web based, through a tunnel that is running under SSL. SSL tunnel VPNs require that the Web browser be able to handle active content, which allows them to provide functionally that is not accessible to the SSL portal VPNs. Example of active content include Java, JavaScript, Active X or Flash applications or plug-ins.
  • 133. END