StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Active Directory - a Contemporary Network Management Techniques - Research Paper Example

Cite this document
Summary
The project “Active Directory - a Contemporary Network Management Techniques” discusses a development and implementation of the tool which allows handling assign rights and security parameters. Active Directory is a Windows characteristic presenting data management by network users…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Active Directory - a Contemporary Network Management Techniques
Read Text Preview

Extract of sample "Active Directory - a Contemporary Network Management Techniques"

Active Directory Table of Contents Table of Contents 1 Abstract 2 Introduction 2 Background 3 Active Directory operational structure 3 Network management though Active Directory 5 Conclusion 7 References 8 Abstract The implementation of network technology in organizational scenario is turned out to be a vital need. The network implementation and management are two main areas those are now taking more concentration of researchers for the potential enhancements. This research is going to provide a deep insight into the development and implementation of the network management and administration tool like Active Directory. Introduction Active Directory is a windows characteristic that presents information management in relation to the network users and resources (Shelly, Cashman, & Vermaat, 2005). Active Directory is the contemporary network management techniques that allow managing, handling assign rights and security parameters. Active Directory is a network management technology developed through the efforts of the Microsoft for the better network management and provides a range of network management services. Active Directory is a form of database that enlists the network security, polices and user information. Active Directory employing the similar database, for exercise of main MS Windows settings, Active Directory as well permits network administrators to allocate deploy software, policies, as well as implement important updates to an association. AD supplies data and information as well as settings in a fundamental database (Sullivan, 2001). Background It is the windows execution of lightweight directory access protocol (LDAP) services. Active Directory keeps the topology information regarding the domain, keeps the domain based user and group accounts and passwords, and offers a domain based store for technologies such as group rules and intellimirror. Network Administrators utilize rules to set up principles for desktop preferences and software. For a lot of corporate information technology groups, consistency radically diminishes the expenditure of computing. Intellimirror is utilized together with group rules to indicate what software should be offered to each category of users, no matter automatically installing it on demand from a corporate server (Silberschatz, Galvin, & Gagne, 2004). Active directory is a most important part of the Windows platform. Active Directory service presents the ways to handle the identities and associations that form network environments. Windows Server 2003 creates Active Directory in a simple way to administer, lessening migration and operation (Microsoft, 2009). Active Directory operational structure An active directory is a directory configurations which are utilized by Microsoft Windows based computers and servers to keep information and data regarding networks and domains. It was developed in 1996 and it was used for online information in the starting (Tech-FAQ, 2009). An active directory (mostly acknowledged as an AD) carries of an assortment of tasks, which comprise, the capability to present information on objects, facilitates systematize these objects for trouble-free recovery and contact, permits right of entry by end users and administrators and helps the network administrator to put the security for the directory (Tech-FAQ, 2009). In more simple words, an active directory can be described as a hierarchical formation and normally this hierarchical formation is divided into three most important classes, the resources which might consist of hardware for instance printers, services for end users for instance web email servers and objects which are the most important tasks of the domain and network (Tech-FAQ, 2009). Here it is necessary to define the object. An object is a part of hardware for instance, printer, end user, or security settings put by the network administrator (Tech-FAQ, 2009). These objects can store further objects inside their file structure. All the objects have an ID; normally this ID is the object name (in other words folder name). Additionally, these objects are capable to store other objects, every object has its own attributes which permits it to be distinguished by means of the information which it holds (Tech-FAQ, 2009). Normally, IT experts acknowledge it as “setting or characterizations” schemas. The utilization of these objects depends on the type of scheme that is produced for a folder. This scheme determines how to utilize these objects. Such as, a number of objects with definite schemas can not be removed, they can simply be deactivated. On the other hand, different types of schemas with definite attributes can be removed completely. For example, a user object can be removed, however the administrator object can not be removed (Tech-FAQ, 2009). It is imperative to be familiar with the framework that objects can be observed at while understanding the active directories. Actually, an active directory can be observed at whichever one of three levels, these levels are acknowledged as forests, trees or domains. The uppermost configuration is acknowledged as the forest for the reason that all the objects comprised inside the active directory can be viewed. Inside the Forest structure are trees, these structures typically keep one or more domains, reaching more downward the structure of an active directory are single domains (Tech-FAQ, 2009). To set the forest, trees and domains into point of view, think about the given example. A huge corporation has numerous users and processes. The forest would be the complete network of end users and definite computers at a set location. Inside this forest directory are at this time trees that store information on definite objects for instance domain controllers, program data, etc. Actually, inside these objects there are more objects which can be managed and classified (Tech-FAQ, 2009). Computer or network administrator working for large organization can without problems update all end users computers with modern and up-to-date software, patches, files, etc straightforwardly through updating one object in a forest or tree (Tech-FAQ, 2009). For the reason that each object fits on a structure and has definite characteristics, a computer administrator can straightforwardly clear a person on a set tree or immediately offer right of entry to various users for definite applications or refuse right of entry to definite users for others (Tech-FAQ, 2009). The Microsoft servers utilize trust to make a decision right of entry should be given or not. There are two types of trust that Microsoft active directories uses one is transitive trusts and other is one way transitive trusts (Tech-FAQ, 2009). Network management though Active Directory The network administrator can have right of entry for the majority trees in the forest together with a definite end user's domain (Tech-FAQ, 2009). On the other hand the end user, at the same time as capable to access his/her personal domain is not capable to access additional trees. The whole discussion outlines that active directories are an enormous method to systematize a huge organization’s computers data and network. Without the utilization of an active directory, the majority end users would have computers that would require to be updated separately and would not have right of entry to a main network where data can be processed and reports can be produced (Tech-FAQ, 2009). Despite the fact that active directories are tremendously technical and have need of many skills to find the way, they are indispensable to keeping information and data on networks (Tech-FAQ, 2009). Mostly large organizations handle right of entry to their employee network and security policies by means of Microsoft Active Directory. Several are satisfied with the system, however a number of state it's complicated and also hard to employ (Brenner, 2006). “One confront is having the time and capabilities to actually describe Active Directory consequently it's reliable and facilitates the organizations to put group rules that work for IT and the users," stated Mark Cardono, an IT expert for the Shore Educational Collaborative, a Chelsea, Mass.-based special needs school serving 10 districts in Massachusetts (Brenner, 2006). AD provides the network management facility is a hierarchical arrangement as well as this arrangement is typically changes into 3 major groups, those are given below (Sullivan, 2001): Network resources The resources can be printers, or some other hardware Services These services are for the end-users like that web based email servers Objects These objects are the major functions of the network domain Active Directory Implementation In this scenario, when this takes place wrongly, the Active Directory arrangement is not extremely tolerant. Setting the incorrect rights in the incorrect hands could guide to a entirety reconstruction of an organization’s network domain. For this reason it is imperative to obtain 3 straightforward phases to augment support of Active Directory arrangement implementation (Petri, 2009). These phases are 1. Plan 2. Delegate 3. Audit. Conclusion In this research I have presented a detailed analysis of the active directory. This research has outlined the main areas of the network management and handling those are managed through the active directory. This research also presented the detailed analysis of main operations of active directory and facilities for the network management. This paper will be helpful to understand the active directory working and operations. References Brenner, B. (2006, June 29). Active Directory users finding their way. Retrieved August 22, 2009, from SearchSecurity.com: http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1195751,00.html Microsoft. (2009). Windows Server 2003 Active Directory. Retrieved August 22, 2009, from Microsoft.com: http://www.microsoft.com/windowsserver2003/technologies/directory/activedirectory/default.mspx Petri, D. (2009). Active Directory Tips and Tricks. Retrieved August 22, 2009, from Petri IT Knowledge Base: http://www.petri.co.il/ad.htm Shelly, Cashman, & Vermaat. (2005). Discovering Computers 2005. Boston: Thomson Course Technology. Silberschatz, A., Galvin, P. B., & Gagne, G. (2004). Operating System Concepts (7th Edition). Wiley. Sullivan, A. (2001, August 01). An Audit of Active Directory Security, Part One: An Overview of Active Directory and Security . Retrieved August 22, 2009, from http://www.securityfocus.com/infocus/1292 Tech-FAQ. (2009). What is Active Directory? Retrieved August 22, 2009, from tech-faq.com: http://www.tech-faq.com/active-directory.shtml Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Active Directory - a Contemporary Network Management Techniques Research Paper”, n.d.)
Active Directory - a Contemporary Network Management Techniques Research Paper. Retrieved from https://studentshare.org/information-technology/1726601-active-directory
(Active Directory - a Contemporary Network Management Techniques Research Paper)
Active Directory - a Contemporary Network Management Techniques Research Paper. https://studentshare.org/information-technology/1726601-active-directory.
“Active Directory - a Contemporary Network Management Techniques Research Paper”, n.d. https://studentshare.org/information-technology/1726601-active-directory.
  • Cited: 0 times

CHECK THESE SAMPLES OF Active Directory - a Contemporary Network Management Techniques

Project Management Principles

The Planning stage sets out the human resource plan, the financing plan, the communication plan, the risk management plan.... Wysocki (2009) indicates that effective project management is not the product of a fixed set of steps to be followed in every project.... However, effective project management requires that projects go through a series of steps that are clearly defined (RDI 2009).... The five major phases of a project are: identification of needs; formation of objectives and project definition; detailed planning and scheduling; project activity management; and closure and feedback (RDI 2009)....
22 Pages (5500 words) Essay

Performance Management

These factors will include the potential problems associated with traditional budgeting techniques including several behavioural aspects as well as the benefits the organisation has gained by shifting to Beyond Budgeting' model.... Performance management Table of Contents Introduction 3 Aim of the Report 4 Problems and Weaknesses in Traditional Budgeting Approach 4 Strategies to overcome the problems of Traditional Budgeting Approach 7 Benefits for Companies Employing Beyond Budgeting Model 8 Conclusion 10 Reflective Journal 11 References 13 Bibliography 15 Introduction In the current highly dynamic business environment, performance management considered as a vital activity within an organisation....
10 Pages (2500 words) Essay

Online Marketing Trends in 2014

hellip; The author describes the techniques such as social media, and online advertising as the marketing strategies that may gain popularity among marketers by the year 2014 as indicated in Appendix 1.... Demer (2013) argues that effective marketing techniques enhance the communication between sellers and consumers concerning products features and quality dimensions of their merchandise at the right place and time.... This means that in 2014, organizations that do not employ effective marketing techniques may fail to sell their goods because of inefficient communication....
5 Pages (1250 words) Essay

Key Words in Marketing - Customer Relationship Management

hellip; Following the Industrial revolution and subsequent industrialisation of countries, however, the companies and consumers grew more and more distant, owing to quicker manufacturing techniques, complex organisational hierarchy and employee-maintained distribution channels.... Customer Relationship management (CRM) Introduction CRM can be defined as a company's framework to create long-term relationships with current and potential consumers through the effective coordination of its marketing, post-marketing, sales and after-sales service efforts....
7 Pages (1750 words) Essay

Analysis of important issues to consider when choosing a technology to use

The most important benefit users find in software-defined storage is the increased flexibility, cost efficiency and automated management.... This functionality allows automatic pooling of storage infrastructures found in a software storage environment to suit the application preferences of… The separation of the managing software from the storage hardware in SDS, serves the end user to larger extend, as it opens an avenue for purchase of heterogeneous storage hardware with less fear....
5 Pages (1250 words) Article

Clean Water as a Fundamental Need the Whole World

There are various aspects of organizational design, namely strategy, structure, reward process, business process and human resource management (Ziegler, 1996).... Protecting water for the purpose of drinking contributes positively towards health of individuals and this in turn contributes to overall development of the economy....
12 Pages (3000 words) Essay

The Principles of Project Management

The principles of project management revolve around five pillars: initiation, planning, execution, monitoring and control then lastly closure.... Any project whether it is meant to initiate projects, or manage an ongoing project share in terms of the elements which are prerequisite for their… The elements may vary but the most common elements revolve around the following: strategic planning, product development, communication, resources and people....
15 Pages (3750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us