StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

EDirectory Protocols - Essay Example

Cite this document
Summary
Edirectory has traditionally utilized service location protocol (SLP) and service advertising protocol (SAP) to advertise and search for network services. Such protocols are known as service discovery protocol and are a class of network applications that permit distributed…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
EDirectory Protocols
Read Text Preview

Extract of sample "EDirectory Protocols"

Edirectory protocols By Edirectory has traditionally utilized service location protocol (SLP) and service advertising protocol (SAP) to advertise and search for network services. Such protocols are known as service discovery protocol and are a class of network applications that permit distributed components to use and find needed services available in the network. Domain name system (DNS) was added in the edirectory 8.7.1 as a discovery protocol. The domain name system is a type of edirectory discovery protocol that enables the user to locate and translate internet domain names into internet protocol addresses (Lawton, 2007).

It is often easy to remember and a meaningful handle for an internet address. Since maintaining a central list of IP address/ domain name correspondence would be impractical, the list of IP addresses and Domain names are distributed in hierarchy of authority within the internet. There may be existence of a DNS server available in a closer geographical proximity to the access provider which maps the domain names in the user’s internet request or directs them to other servers. Because of the distributed and the open design of DNS, and its utilization of the user Datagram protocol, domain name system is vulnerable to different forms of attacks.

Public domain name system is often at risk, since they are unable to restrict incoming packets to a set of IP addresses (Weber, 2007). Service location protocol is another edirectory protocol which allows location and organization of resources such as disk drives, printers, databases, schedulers and directories within a network. The protocol gives users a simpler interface to a network’s resource information. The protocol oversees and defines operations and communications that take place among the user agents, directory agents and service agents (Zaki, Ngadi & Razak, 2013).

Maintenance of service and rearrangement and installation of new devices is easier without the need for configuring the work stations of an individual. Despite the service location protocol being simple to implement, it fails to specify anything concerning service creation and does not direct the user on how to utilize it.A service advertising protocol (SAP) is an internetwork packet exchange (IPX) protocol component designed to remove and add services in an edirectory system. It allows network services such as gateway servers, prints or files to register information in the tables within the servers.

The internet packet exchange services are then broadcasted across a network and sub networks. However, SAP depends on the internet packet exchange device collaboration. The associated service is removed if the server fails (Kallinikos, 2009). ReferencesKallinikos, J. 2009. Book Review: Neil Pollock & Robin Williams Software and Organisations: The biography of the enterprise-wide system or how SAP conquered the world: Routledge: Abingdon 2009. 320pp, ISBN: 978--0-415--40397--9.   65.00 (hbk).

Organization Studies, 30(8), 912-916. doi:10.1177/0170840609344001Lawton, G. 2007. Stronger Domain Name System Thwarts Root-Server Attacks. Computer, 40(5), 14-17. doi:10.1109/mc.2007.184Weber, R. 2007. Looking ahead: more harmonisation in the domain name system?. International Journal Of Intercultural Information Management, 1(1), 74. doi:10.1504/ijiim.2007.014372Zaki, S., Ngadi, M., & Razak, S. 2013. Location Service Protocol for Highly Mobile Ad Hoc Network. Arabian Journal For Science And Engineering, 39(2), 861-873. doi:10.1007/s13369-013-0651-9

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“EDirectory Protocols Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
EDirectory Protocols Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1676464-edirectory-protocols
(EDirectory Protocols Essay Example | Topics and Well Written Essays - 250 Words)
EDirectory Protocols Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1676464-edirectory-protocols.
“EDirectory Protocols Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1676464-edirectory-protocols.
  • Cited: 0 times

CHECK THESE SAMPLES OF EDirectory Protocols

Basic Network Technology, Structure, and Protocols

The tutorials available on the site page also include projects done by students and some by the dean. The tutorials… The introductory and general tutorials are categorized into: client-server interactive animation, internet protocol model, internet communications flash animation, internet resiliency interactive demo, OSI reference BASIC NETWORK TECHNOLOGY, STRUCTURE, AND protocols Basic Network Technology, Structure, and protocols Introductory and General ials RAD University TutorialsThe RAD University tutorials available from the RAD University tutorials page is tutorials for Data Communications, telecommunications and computer networking....
2 Pages (500 words) Essay

Lightweight Directory Access Protocol

00 consists of computer networking standards specifically in the area of directory services protocols.... 00 consists of computer networking standards specifically in the area of directory services protocols.... ConclusionLDAP is an open protocol directory service system that helps clients access, manage, and update networks over TCP/IP protocols....
1 Pages (250 words) Essay

The Concept of Networking

The discussion emphasizes the principles and operations of layered communication protocols.... It also briefs about protocol stack, its working and packet headersIn computer networking, there are two important protocols that include Internet Protocol (IP) and Transmission Control Protocol (TCP).... The layered communication protocols of networking are discussed hereunder....
9 Pages (2250 words) Essay

Authenticating iOS devices to join the Active Directory Domain

The paper "Authenticating iOS devices to join the Active Directory Domain" seeks to establish a network that provides all the desirable aforementioned features using a server-client model.... The project suggests the use of Microsoft Active Directory to identify users and resources on the network....
10 Pages (2500 words) Essay

The Origin of the Internet

The paper 'The Origin of the Internet' presents the Internet which started as a US defense initiative has developed into the main communications mechanism for the academic and research community and most recently has expanded into a major business tool for the commercial sector.... hellip; The Internet's potential to change the way we conduct business is only just beginning to be understood....
9 Pages (2250 words) Article

Security Features which are Most Effective on Interconnectivity Using VoIP

This report "Security Features which are Most Effective on Interconnectivity Using VoIP" discusses efforts to improve on networking security, however, the services that are being offered using different software's whose security features are not guaranteed.... hellip; VoIP has gain popularity over the years and it is preferred as a more cost-effective and reliable means of making calls over long distances....
11 Pages (2750 words) Report

The Goal of the Internet Engineering Task Force

The IPTEL Working group in full means the focus of the IP Telephony (intel) group, which is concerned, with handling the challenges related to naming and routing for Voice over IP (VoIP) protocols.... This assignment "The Goal of the Internet Engineering Task Force" presents the Internet Engineering Task Force (IETF) as a global large and open organization concerned with the smooth operation of the Internet and the evolution of the Internet architecture....
10 Pages (2500 words) Assignment

Transmission Control Protocol in Wireless Networks

"Transmission Control Protocol in Wireless Networks" paper argues that the application layer protocols rely on TCP for data transmission, TCP has a few advantages in that it provides congestion control, offers reliable data transmission, provides error detection and flow control.... The application layer can be explained as an abstraction layer specifying the interface methods and shared protocols that are used in the communication network by communicating hosts....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us