Definition of Novell Directory Client
Definition of Novell Directory Client
Novell
Directory Services (NDS) is a popular software product for managing access to computer resources and keeping
track of the users of a network, such as a company's intranet, from a single point of administration. Using NDS,
a network administrator can set up and control a database of users and manage them using a directory with an
easy-to-use graphical user interface (GUI). Users of computers at remote locations can be added, updated, and
managed centrally. Applications can be distributed electronically and maintained centrally. NDS can be installed
to run under Windows NT, Sun Microsystems's Solaris, and IBM's OS/390 as well as under Novell's own NetWare
so that it can be used to control a multi-platform network. NDS is generally considered an industry benchmark
against which other products, such as Microsoft's Active Directory, must compete.
2. Lightweight Directory Access Protocol :- LDAP: Lightweight Directory Access Protocol. LDAP is a software
protocol for enabling anyone to locate organizations, individuals, and other resources such as files and devices
in a network, whether on the public Internet or on a corporate intranet. LDAP is a "lightweight" (smaller amount
of code) version of Directory Access Protocol (DAP), which is part of X.500, a standard for directory services in a
network. LDAP is lighter because in its initial version it did not include security features. LDAP originated at the
University of Michigan and has been endorsed by at least 40 companies. Netscape includes it in its latest
Communicator suite of products. Microsoft includes it as part of what it calls Active Directory in a number of
products including Outlook Express. Novell's NetWare Directory Services interoperates with LDAP. Cisco also
supports it in its networking products. In a network, a directory tells you where in the network something is
located. On TCP/IP networks (including the Internet), the domain name system (DNS) is the directory system
used to relate the domain name to a specific network address (a unique location on the network). However, you
may not know the domain name. LDAP allows you to search for an individual without knowing where they're
located (although additional information will help with the search)
3. DSL :- DSL means Digital Subscriber Line. DSL is a high-speed Internet service like cable Internet. DSL provides
high-speed networking over ordinary phone lines using
broadband modem technology. DSL technology allows
Internet and telephone service to work over the same
phone fine without requiring customers to disconnect
either their voice or Internet connections. DSL technology
theoretically supports data rates of 8.448 Mbps, although
typical rates are 1.544 Mbps lower. DSL Internet services
are used primarily in homes and small businesses. DSL
Internet service only works over a limited physical distance
and remains unavailable in many areas where the local
telephone infrastructure does not support DSL technology.
Stands for "Digital Subscriber Line." DSL is a
communications medium used to transfer digital signals
over standard telephone lines. Along with cable Internet. DSL is one of the most popular ways ISPs provide
broadband Internet access. Some DSL modems now have built-in wireless routers, which allows you to connect
to your DSL modem via Wi-Fi. A DSL kit may also include a splitter and filters that you can connect to landline
phones.
4. CATV :- CATV is a shorthand term for cable television service. Many providers offer cable Internet service
together with television to their customers over the same CATV links. Community Access Television (CATV) is
also commonly known as Cable TV. This is one of the most common methods of transmitted television signals
to a consumer's home, using radio frequency signals transmitted through coaxial cable. More recently, CATV can
also be transmitted using optical fiber, which utilizes pulses of light to transmit a signal. CATV origins date back
to 1924 when some cable broadcasting was done using cable in European cities. In 1948, community antennas
were built where over-the-air signal reception was limited. The community antenna received the over-the-air
signal and then transmitted it to many households by use of cables. The origins of cable broadcasting are even
older as radio programming was distributed by çable in some European cities as far back as 1924. Earlier cable
television was analog, but since 2000s all cable operators have switched to or are in process of switching to
digital cable television. CATV is a shared cable system that uses a tree-and-branch topology in which multiple
households within a neighbourhood share the same cable.
5.Vpn protocol :- There are a number of VPN protocols in use that secure the transport of data traffic over a
public network infrastructure. Each protocol varies slightly in the way that data is kept secure. IP security (IPSec)
is used to secure communications over the Internet. IPSec traffic can use either transport mode or tunneling to
encrypt data traffic in a VPN The difference between the two modes is that transport mode encrypts only the
message within the data packet (also known as the payload) while tunnelling encrypts the entire data packet,
IPSec is often referred to as a "security overlay" because of its use as a security layer for other protocols. Hoth
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) use cryptography to secure communications over
the Internet. Both protocols use a "handshake" method of authentication that involves a negotiation of network
parameters between the client and server machines. To successfully initiate a connection, an authentication
process involving certificates is used. Certificates are cryptographic keys that are stored on both the server and
client. Point-To-Point Tunneling Protocol (PPTP) is another tunneling protocol used to connect a remote client
to a private server over the Internet. PPTP is one of the most widely used VPN protocols because of its
straightforward configuration and maintenance and also because it is included with the Windows operating
system. Layer 2 Tunneling Protocol (L2TP) is a protocol used to tunnel data communications traffic between two
sites over the Internet. L2TP is often used in tandem with IPSec (which acts as a security layer) to secure the
transfer of L2TP data packets over the Internet. Unlike PPTP, a VPN jmplementation using L2TP/IPSec requires a
shared key or the use of certificates.
6. Reverse Address Resolution Protocol (RARP) :- RARP means Reverse Address Resolution Protocol. Reverse
Address Resolution Protocol (RARP) is the opposite of (ARP). The address resolution protocol used on every
TCP/IP System. While ARP converts network-Layer IP addresses in to Data Link- Layer hardware addresses. RARP
works by broadcasting a system's hardware address and receiving an IP address return from a RARP Server. RARP
server can supplied IP addresses to all of the system on a network segment.
7. Address Resolution Protocol (ARP) :- The address resolution protocol (arp) is a protocol used by the Internet
Protocol (IP). Specifically IPv4, to map IP network addresses to the hardware addresses used by a data link
protocol. The protocol operates below the network layer as a part of the interface between the OSI network and
OSI link layer. It is used when IPv4 is used over Ethernet. The term address resolution refers to the process of
finding an address of a computer in a network. The address is "resolved" using a protocol in which a piece of
information is sent by a client process executing on the local computer to a server process executing on a remote
computer. The information received by the server allows the server to uniquely identify the network system for
which the address was required and therefore to provide the required address. The address resolution
procedure is completed when the client receives a response from the server containing the required address.
An Ethernet network uses two hardware addresses which identify the source and destination of each frame sent
by the Ethernet. The destination address may also identify a broadcast packet (to be sent to all connected
computers).
8.) IP Address assignments :- The primary function of DHCP to assign IP addresses and to accommodate the
needs of all types of client systems. The standard defines three types of address assignments, which are as
follows. (1) Manual allocation: The administrator configures the DHCP server to assign a specific IP address to a
given system, which will never change unless it is manually modified. This is equivalent in functionality to RARP
and BOOTP. Manual allocation is suitable for Internet servers and other machines that require static IP addresses
because they rely on DNS name resolution for user access. This form of address allocation is nothing more than
remote configuration solutions because the end result is no different than if the administrator manually
configured the TCP/IP client. As an organizational aid, however, this method of address assignment is
recommended over manual system configuration on a network that uses DHCP for its other machines. Keeping
all the address assignments in one database makes it easier to track the assignments and reduces the likelihood
of duplication. Duplicate IP addresses can occur accidentally if you configure a TCP/IP client by hand with an
address that is included in a DHCP scope. Using DHCP for all address assignments, even manual ones, helps to
minimize the chance that this can occur. (2) Automatic allocation: The DHCP server assigns permanent IP
addresses from a pool (called a scope), which do not change unless they are manually modified by the user or
the administrator. Automatic allocation is useful on stable, single-segment networks or multi segment networks
where machines are not routinely moved to other segments. This method reduce the network traffic by
eliminating the address lease renewal procedures. In your organization is working with a limited supply of
registered IP. (3) Dynamic allocation: The DHCP server assigns IP addresses from a pool using a limited-time
lease, so the address can be reassigned if the client system does not periodically renew it.
9.) Introduction to Domain Name Systems (DNS) :- Computers are designed to work with numbers, while
humans are more comfortable working with words. Which is the most reason, introduced the domain name
system (DNS). Back in the past days of the 1970s, when the Internet was the ARPANET and the entire
experimental network consisted of only a few hundred systems, a need was recognized for a mechanism that
would permit users to refer to the network's computer by name, rather than by address. The introduction of the
TCP/IP protocols in the early 1980s led to the use of 32-bit IP addresses, which even in dotted decimal form were
difficult to remember.
DNS Objectives: A hierarchical name space that divides the host system database into discrete elements called
domains. Domain name services that contain information about the host and sub domains within a given
domain. Resolvers that generate requests for information from domain name servers.
10.) Sharing Locally Attached Print Devices:-Perform following step to share a print device for any operating
system. Step-1-Open the Printers folder. (Select Start Settings^ Printers.) Step-2- In the Printers folder, right-
click the printer you want to share, and select Sharing from the menu that appears. Step-3. The printer's
Properties dialog box appears with the Sharing tab on top, as shown in Figure. Step-4. To share the printer,
select the "Shared as" option. Then, either accept the default name for the shared printer or type in the name
you want to use for this shared printer. Step-5- If you don't want to install additional drivers, click OK. Windows
2000 shares the printer. Close the Printers folder, and stop here.
11.) DHCP Architecture
ANS:- The DHCP architecture consists of DHCP clients, DHCP servers, and DHCP relay agents on a network. The
clients interact with servers using DHCP messages in a DHCP conversation to obtain and renew IP address leases.
DHCP client :- A DHCP client is any network enabled device that supports the ability to communicate with a
DHCP server in compliance with RFC 2131, for the purpose of obtaining dynamic leased IP configuration and
related optional information. DHCP Client obtains automatic IP from DHCP server, every time this IP address is
different. DHCP provides support for client computers running any of the following operating systems: (1)
windows 8 (2) windows 7 (3) windows vista (4) windows server 2012 (5) windows XP. DHCP server:- DHCP Server
is used to centrally allocate TCP/IP configurations to computers automatically without setting it manually. DHCP
means Dynamic Host Configuration Protocol. It saves you plenty of time to set up and manage TCP/IP network
especially if you have a big network. This server can be installed as standalone server or a built-in feature on
most network routers. If your network router does support this feature, you can define a pool of IP addresses
and other configurations (subnet mask, default gateway, DNS server) to be allocated to computers. DHCP Relay
Agent:- A relay agent is a small program that relays DHCP/BOOTP messages between clients and servers on
different subnets. The DHCP Relay Agent component is a Bootstrap Protocol (BOOTP) relay agent that relays
Dynamic Host Configuration Protocol (DHCP) messages between DHCP clients and DHCP servers on different IP
networks. The DHCP Relay Agent is compliant with RFC 1542, "Clarifications and Extensions for the Bootstrap
Protocol." For each IP network segment that contains DHCP clients, either a DHCP server or a computer acting
as a DHCP Relay Agent is required, A relay agent relays DHCP/BOOTP messages that are broadcast on one of its
connected physical interfaces, such as a network adapter, to other remote subnets to which it is connected by
other physical interfaces. You cannot use the DHCP Relay Agent component on a computer running the DHCP
service, the network address translation (NAT) routing protocol component with automatic addressing enabled,
or Internet Connection Sharing (ICS).
12.) Top level domain :- In every DNS name, the first word on the right represent the domain at the highest level
in the DNS tree, called a top-level domain. These top-level domains essentially function as registrars for the
domain at the second level. For example, the administrator of sspc.com went to the com top-level domain and
registered the name sspe.In return for a fee, that administrator now has exclusive use of the name sspc.com and
can create any host or subdomain names in that domain that he wishes. It doesn't matter that thousands of
other network administrator have named their Web servers www, because they all have their own individual
domain names. The host name www may be duplicated anywhere, as long as the DNS name www.sspc.com is
unique. The original DNS name space called for seven top-level domains, dedicated to specific purposes, as
follows: 1. Com Commercial organizations 2. Edu Four-year, degree-granting educational institutions in North
America 3. Gov United states government institutions. 4. Int Organization established by international treaty 5.
Mil: United states military applications 6. Net Networking organizations 7. Org: Non-commercial organizations.
The edu, gov, int, and mil domains are reserved for us by certified organizations, but the com, org, and net
domains are called global domain, because organizations anywhere in the world can register second-level
domains within them. Onginally, these top-level domains were managed by a company called Network Solutions,
Inc. (NSI, formerly known as Inter NIC, the Internet Network Information Centre) as a result of cooperative
agreement with the United States government. In 1998, the agreement with the U.S. government was changed
to permit other organizations to compete with NSI in providing domain registrations. An organization called the
internet corporation for assigned names and number (ICANN) is responsible for the accreditation off domain
name registers. Under this new policy. the procedures and different in the functionality of the domain name nor
will duplicate name be permitted.
13.) Resolvers :- The component in the client system that generates the DNS query is called a resolver In most
cases, the resolver is a simple set of library routines in the operating system that generates the queries to be
sent to the DNS server, reads the response information from the server's replies, and feeds the response to the
application that originally requested it. In addition a resolver can resent a query if no reply is forthcoming after
a given time period, and can process error messages returned by the server, such as when it is fails to resolve a
given name.
14.) Resolving a domain name :- With the preceding pieces in place, you are now ready to see how the DNS
servers work together to resolve the name of a server on the Internet (see figure) the process is as follows 1. A
user on a client system specifies the DNS name of an Internet server in an application such as a web browser or
FTP client. 2. The application generates an API call to the resolver on the client system, and the resolver creates
a DNS recursive query message containing the server name. 3. The client system transmits the recursive query
message to the DNS server identified in its TCP/IP configuration. 4. The client's DNS server, after receiving the
query, checks its resource records to see if it is the authoritative source for the zone containing the requested
server name. If it is the authoritative, it generates a reply massage and transmits it back to the client. If the DNS
server is not the authority for the domain in which the requested server is located, it generates an iterative
query and submits it to one of the root name servers. 5. The root name server examines the name requested by
the original DNS server and consults its resource records to identify the authoritative servers for the name's top-
level domain. Because the root name server received an iterative request, it does not send its own request to
the top-level domain server. Instead, it transmits reply to the original DNS server that contains a referral to top-
level domain server addresses. 6. The original DNS server then generates a new iterative query and transmits it
to the top-level domain server. The top-level domain server examines the second- level domain in the requested
name and transmits to the original server a referral containing the addresses of authoritative servers for that
second-level domain. 7. The original server generates yet another iterative query and transmits it to the second
level domain server. If the requested name contains additional domain. names, the second-level domain server
replies with another referral to the third- level domain servers. The second-level domain server may also refer
the original server to the authorities for a different zone. This process continues until the original server receives
a referral to the domain server that is the authority for the domain or zone containing the requested host.Once
the authoritative server for the domain or zone containing the host receives 8 a query from the original server,
it consults its resource records to determine the IP address of the requested system and transmits it in a reply
message back to that original server. The original server receives the reply from the authoritative server and
transmits the IP address back to the resolver on the client system. The resolver relays the address to the
application, which can then initiate communications with the system specified by the user.
15.) define forest and Tree and root :- Forest :- A forest is collection of multiple trees that share a common
global catalog, directory schema logical structure, and directory configuration. Tree:- An active directory tree is
collection of domain within a Microsoft active directory network. Root :- At the top of directory tree is the root
entry. Which contains other entries. These other entries can be containers or leaves.
16.) list any four domain name :- 1) .org 2) .com 3) .net 4) .edu 5) .int
17.) full from :- 1) PSTN :- public switched telephone network 2) ISDN :- integrated services digital network 3)
VPN :- virtual private network 4) DHCP :- dynamic host control protocol
18.) IP security (IPSec) :- is used to secure communications over the Internet. IPSec traffic can use either
transport mode or tunneling to encrypt data traffic in a VPN. The difference between the two modes is that
transport mode encrypts only the message within the data packet (also known as the payload) while tunnelling
encrypts the entire data packet. IPSec is often referred to as a "security overlay" because of its use as a security
layer for other protocols.