EDirectory Protocols - Essay Example

Comments (0) Cite this document
Edirectory has traditionally utilized service location protocol (SLP) and service advertising protocol (SAP) to advertise and search for network services. Such protocols are known as service discovery protocol and are a class of network applications that permit distributed…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
EDirectory Protocols
Read TextPreview

Extract of sample "EDirectory Protocols"

Edirectory protocols By Edirectory has traditionally utilized service location protocol (SLP) and service advertising protocol (SAP) to advertise and search for network services. Such protocols are known as service discovery protocol and are a class of network applications that permit distributed components to use and find needed services available in the network. Domain name system (DNS) was added in the edirectory 8.7.1 as a discovery protocol. The domain name system is a type of edirectory discovery protocol that enables the user to locate and translate internet domain names into internet protocol addresses (Lawton, 2007). It is often easy to remember and a meaningful handle for an internet address.
Since maintaining a central list of IP address/ domain name correspondence would be impractical, the list of IP addresses and Domain names are distributed in hierarchy of authority within the internet. There may be existence of a DNS server available in a closer geographical proximity to the access provider which maps the domain names in the user’s internet request or directs them to other servers. Because of the distributed and the open design of DNS, and its utilization of the user Datagram protocol, domain name system is vulnerable to different forms of attacks. Public domain name system is often at risk, since they are unable to restrict incoming packets to a set of IP addresses (Weber, 2007).
Service location protocol is another edirectory protocol which allows location and organization of resources such as disk drives, printers, databases, schedulers and directories within a network. The protocol gives users a simpler interface to a network’s resource information. The protocol oversees and defines operations and communications that take place among the user agents, directory agents and service agents (Zaki, Ngadi & Razak, 2013). Maintenance of service and rearrangement and installation of new devices is easier without the need for configuring the work stations of an individual. Despite the service location protocol being simple to implement, it fails to specify anything concerning service creation and does not direct the user on how to utilize it.
A service advertising protocol (SAP) is an internetwork packet exchange (IPX) protocol component designed to remove and add services in an edirectory system. It allows network services such as gateway servers, prints or files to register information in the tables within the servers. The internet packet exchange services are then broadcasted across a network and sub networks. However, SAP depends on the internet packet exchange device collaboration. The associated service is removed if the server fails (Kallinikos, 2009).
Kallinikos, J. 2009. Book Review: Neil Pollock & Robin Williams Software and Organisations: The biography of the enterprise-wide system or how SAP conquered the world: Routledge: Abingdon 2009. 320pp, ISBN: 978--0-415--40397--9.   65.00 (hbk). Organization Studies, 30(8), 912-916. doi:10.1177/0170840609344001
Lawton, G. 2007. Stronger Domain Name System Thwarts Root-Server Attacks. Computer, 40(5), 14-17. doi:10.1109/mc.2007.184
Weber, R. 2007. Looking ahead: more harmonisation in the domain name system?. International Journal Of Intercultural Information Management, 1(1), 74. doi:10.1504/ijiim.2007.014372
Zaki, S., Ngadi, M., & Razak, S. 2013. Location Service Protocol for Highly Mobile Ad Hoc Network. Arabian Journal For Science And Engineering, 39(2), 861-873. doi:10.1007/s13369-013-0651-9 Read More
Cite this document
  • APA
  • MLA
(“EDirectory Protocols Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
EDirectory Protocols Essay Example | Topics and Well Written Essays - 250 words. Retrieved from
(EDirectory Protocols Essay Example | Topics and Well Written Essays - 250 Words)
EDirectory Protocols Essay Example | Topics and Well Written Essays - 250 Words.
“EDirectory Protocols Essay Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Security protocols

...? School of Computing Module and 6CC513 Security Protocols Assignment No. and Security Report for EEC Assessment Shao Ying ZhuHand-In Deadline Date 08/05/2013 Abdallah Alkhanbashi 100181705 1 Introduction In this report, we will address security loop holes for EEC, as it is comprised of Birmingham, Glasgow and Derby. As per the scenario, Birmingham is considered to be the head office consisting of IT, Human Resource, Research and Development, Management, Marketing, Sales, operations and Finance. The other two branch sites have IT, sales, operations and manufacturing departments. Currently, all company servers (file, email, data, web, radius and FTP servers etc.) are located in the server farm at its head office in...
12 Pages(3000 words)Case Study

Evaluation of Routing Protocols

...— When deploying a corporate network for internationally located business offices, there is always a requirement for selecting suitable routing protocols. The selection of routing protocols emphasize on security, reliability, data transmission carrier, efficiency, and robustness. In this scenario, we have a travel agency named as ECC. The company has different branches in different countries. A solution is designed to connect these offices with appropriate topology design, adequate routing protocols and bandwidth carrier that will save bandwidth cost. Index Terms – BGP, EIGRP, OSPF, RIP I. Introduction Wide area network (WAN) spreads itself to multiple distance regions, leading to its...
8 Pages(2000 words)Essay

Indwelling Catheter Removal Protocols

...? The use of indwelling catheter removal protocols (on in-patient units) to decrease the infection rate (UTI) among patients. SCHOOL Introduction In many cases, the use of an indwelling catheter is inevitable, particularly in the older population. Many hospital visits and in-patient stays associated with this group require that the urine be drained from the bladder in this way. However, indwelling catheters are associated with a number of complications; primarily urinary tract infections (UTIs) (Voss, 2009). It is estimated that between 16% and 25% of all patients hospitalized in the United States have indwelling catheters in place, but there are suggestions that as many as 21% of these did not meet established criteria...
4 Pages(1000 words)Research Paper

CELLULAR PATHOLOGY- Staining protocols

...? CELLULAR PATHOLOGY- Staining protocols Glycogen Glycogen is present in all the animals it the liver, with liver storing the glucose in the form of glycogen. Thus, during starvation or whenever glucose is required by the body, glycogen is converted back into glucose. Glycogen is preserved in the slides using the alcoholic preservation methods. The use of formalin solution will help to reduce the shrinkage and polarization of the tissue. Periodic Acid Schiff (PAS) stain is the most commonly used stain to identify the structures containing large amounts of glycogen, glycoprotein, mucin, proteoglycan and other basement membranes. (McGavin and Zachary 2006). Fig1: Periodic acid Schiff stain (PAS) of kidney. (McGavin and...
3 Pages(750 words)Essay

CELLULAR PATHOLOGY- Staining protocols

...?Cellular Pathology experiment The aim of the practical was to look at sections of small intestine (ileum), kidney and liver. These are sections that were already processed to paraffin wax, sectioned, fixed as well as mounted on slides. Liver slides for glycogen and ileum slides for mucin staining (using Alcian Blue) were prepared as well with use of diastase digestion. Introduction The Periodic Acid Schiff (PAS) stain is a stain routinely employed in several cellular pathology laboratories. Several tissue components can be demonstrated by this stain. It is an important diagnostic tool in most clinical settings. Substances that consist of glycol groups or alkylamino and amino derivatives are normally oxidized to form. An insoluble...
4 Pages(1000 words)Essay

Simulation Of Routing Protocols

...Running Head: SIMULATION OF ROUTING PROTOCOLS Simulation Of Routing Protocols [The [The of the Simulation Of Routing Protocols In Ad Hoc Network In Starlogo Environment Introduction According to the latest research, Multihop, wireless, ad hoc networking has been the focal point of numerous current research and expansion labors for its applications in military, commercial, and instructive environments such as wireless LAN links in the office, networks of appliances at home, and special sensor networks. A amount of routing protocols have been projected to make available multi-hop communication in wireless, ad hoc networks. Usually these protocols are assessing in terms of packet loss rates, routing significance overhead, and route... ...
5 Pages(1250 words)Essay

Advanced Routing Protocols

...become more complex. The largest global computing network is the Internet which is the backbone of millions of businesses across the globe. The power & speed of Internet have achieved this level because of the routing protocols that have ensured smooth & reliable performance irrespective of the number of nodes getting added continuously. The routing protocols can propagate millions of network changes across the globe within a small timeframe to every routing device connected to the Internet. The popular routing protocol used on the Internet is the Border Gateway Protocol (BGP) which is an exterior gateway routing protocol. Corporate networks manage...
22 Pages(5500 words)Essay

Network Management and Protocols

...Network Management and Protocols We also involve our users as much as we can. If the users can be somewhat independent in their own network management functions, the whole system is more effective. If the user can determine whether the LAN segment, the entire network, or the ISP is down, then the number of calls to the technicians can be decreased. The users are also very good at keeping track of consistent problems. They can help determine patterns that result in low response times or complete outages. The fundamental service for network management is SNMP, which stands for "simple network management protocol." It is a component of TCP/IP, which is itself the foundation of the Internet. SNMP is used to provide information about... the...
2 Pages(500 words)Essay

Routine CT scanning protocols

...Introduction Computed tomography (CT) is associated with very high radiation dose. This requires the CT operators to have an adequate knowledge about the amount of radiation dose that is being delivered during routine procedures, as well as strategies to reduce radiation dose. Studies have shown that radiation dose in CT examinations can be reduced by implementing different strategies for dose reduction. These strategies include lowering tube voltage (kVp), tube current-time product (mAs), pitch, individualization of scanning parameters by using automatic exposure control (AEC) and using of bismuth shields to protect radiosensitive organs such as eyes, breast and thyroid. The protocols given below are used in the...
13 Pages(3250 words)Essay

Network Protocols

...Network Protocols Rules and procedures used in communicating are referred to as protocols. However, protocol can get used invarious perspectives, among them in the diplomatic field. Diplomats use the set protocols to be able to interrelate with diplomats from foreign countries. In the computer environment, rules of protocol apply in the same manner. Following the networking of computers, the technical procedures and rules that regulate their communication are referred to as protocols (Dong 45). There are various types of protocols; in the lowest stage protocols are used to define the type of the...
1 Pages(250 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic EDirectory Protocols for FREE!

Contact Us