Data Communication and Network
Data Communication and Network
A directory is a hierarchical structure in which information about network objects is stored. The
directory is, in general, a long list of objects. A telephone book is a type of directory that
includes information about individuals, businesses, and the government. Phone books are
typically used to record names, phone numbers, and addresses.
Active Directory (AD) is a Microsoft Technology that is used to manage networks and other
devices. Directory services, such as Active Directory, are a type of directory service. It is a key
feature of Windows Serbian's local and Internet operating systems.
Literature Review:
A directory service is designed to give users access to a tree of objects. However, AD is more
than just a localizer. It supports all network activities for central management organizations. A
Network Manual Service performs the following functions:
Information about user objects, computers, and network services is provided.
This information is saved in a secure database with the help of directory management and
search tools.
Allows the company to manage user accounts and resources while also consistently
implementing policies.
Conclusion:
Active Directory Benefits Hierarchical structure of organization. Multimaest Authentication and
Multimaest Replication (capability to use multiple AD DS to access and amend Management
Points).
A single point of network access. Capability to establish trust relationship with external networks
that run previous Active Directory and Unix versions.
Functioning of Active Directory Controller:
To perform the Domain Controller test on your local system, run the DCDiag utility without any
argument.
If you want to check the health of a remote domain controller, run the DCDiag utility by
specifying your remote domain controller name, administrator username and password.
You can also test your DNS using the /test:dns switch as shown below.
SYN
SYN-ACK
ACK
Possible scenario in when video file sharing between two devices in unsecured network.
An attacker can launch the denial service of attacks-flooding to exploit this vulnerability.
I Protocol header modification, attacker can launch the IP spoofing attack.
DNS Protocol Vulnerability: attackers modify the legitimate DNS Record. So it gets resolved
to incorrect IP Address.
DNS Cache Poisoning: An may poison the cache by forging a response to recursive DNS
query sent by a resolver to authoritative server.
Sniffer Attack: By using the sniffer application, Sniffers can capture the network packets
then hacking the network.
Man in the Middle attack: Where attacker intrude into an existing communication between
two computers and then monitor, capture and control the network.