Introduction
Active directory (AD) is a windows domain network or Network Operating (NOS) directory mainly designed for windows server 2003 and windows 2000. Active directory therefore is directory service, which catalog information stored in an organized manner allowing access to information in the directory matching their values and names. For example, a user trying to log into a computer in a client computer in the server domain of the network, active network aid access by verifying the back end user by matching a user password and the directory domain thereby determines whether you are a system administrator or a regular user before authenticating access. It also manages information by storing it at on an admin level in addition to designing information structure able to perform other related services for managing an enterprise-wide information more effectively.
Active directory contains all information of clients such as the computers, the printers, the scanners, and the user's information which can easily be accessed anywhere within the network topology. The framework of the stored information in the active directory similarly is a structured hierarchy that resembles the organization framework and system of operation. It contains all the objects that comprise the information of all the resource in the network topology. Each object is structured in with attributes for example, the user name, employee number, login details, and email address (Wilkins, 2001). All the objects are contained in a domain, which it the basic unit for security and access for the organization. In the domain, the object is then contained in a logical unit, which is the organization unit. Network Operating System (NOS) is an application platform for the server that aid active directory (AD) to organize its information into a logical unit to a hierarchical structured for the back end user to retrieve and organize easily. Consequently, active directory depends on NOS to perform it functions more effectively and efficiently at ease which otherwise is a daunting and time-consuming process (Wilkins, M. 2001).
Operation transmission protocol of LAN and WAN
Networking protocols is a system of rules and regulation that permits an exchange of data in a network topology thus communicating. The current protocols in networking topologies use internet protocol (IP) and Transmission Control Protocol (TCP), a high-level language to switch packets between client and server in a network structure. The implementation of these network protocols within a system is aided with in-built software in a web browser and network driver enabling them to function (Rendell, 2013). Data packet switching over the Local Area Network (LAN) and Wide Area Network (WAN) broken down into small pieces of packets attached with an IP address of the receiver. The packets contain a header, footer, and payloads that contain data to be identified by nodes connected via an Ethernet LAN cable and a modem connected to Internet Service Providers ISP. LAN is a network topology used within the same locality using Ethernet cables and packet switch which are the backbone connecting the server and the clients. On the hand, WAN is network topology used over a wide geographical region, which can be the web on intricate LAN connections (Khan & Khwaja, 2003).
The difference between LAN and WAN network
In order to connect all the offices in Peru, France, USA, and Hungary the respective office will be connected over LAN topology using a packet switching node, Ethernet cable, and backbone server. The LAN is then designed a firewall for security and malware protection. Secondly, a Virtual Private Network VPN is set up to connect all the clients in the LAN to WAN connecting other offices in those previously mentioned regions (Rendell, 2013). VPN provides an encrypted connection to a private network in the various offices in those regions with gateways handling the connection between these four different sites using Cisco (Khan & Khwaja, 2003). VPN also allow for remote access by the user to the private network that can be accessed at home using a personal VPN remote access. Using a VPN provide a secure connection through this site because it is tunneling a connection which is encrypted making you anonymous online. These prevent hacks and public from phishing your traffic data online (Khan & Khwaja, 2003). .
Connection-oriented vs connectionless network
The connection-oriented network is a physical network such as used in the telephone to make calls. The connection-oriented network first creates connections between the sender of the information and the receiver usually completing the connection after a dial tone. It can only establish a single connection at a time (Rendell, 2013). The connectionless network is established after the telephone network and unlike its predecessor; it does not first establish the connection. For example, internet enables you to connect first online and send a message without connecting without making an actual connection to the sender, which will be relayed later once the connection is established, or the user is online. Connectionless can send multiple information and connections.
Reference
Khan, J., & Khwaja, A. (2003). Building secure wireless networks with 802.11. Indianapolis, IN: Wiley.
Rendell, C. (2013). Network topologies: types, performance impact, and advantages/disadvantages. New York: Novinka.
Wilkins, M. (2001). Administering Active directory. New York: McGraw-Hill.