0% found this document useful (0 votes)
3 views51 pages

1

Uploaded by

143travelworld
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views51 pages

1

Uploaded by

143travelworld
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 51

EXPLORING DIRECTORY SERVICES & REMOTE A

Unit - I
1
SYLLABUS
1.1 Directory Services: Define Directory Service,
Definition of Novell Directory, Windows Domain, MS
Active Directory, X.500 Directory Access Protocol,
Lightweight Directory Access Protocol, Forests, Trees,
Roots and Leaves.

1.2 Active Directory Architecture: Object Types, Object


Naming, Canonical Names, LDAP Notation, Globally
unique identifiers, User Principle Names, Domain,
Trees & Forests.

1.3 Remote Network Access: Need of Remote Network


Access,
PSTN, ISDN, DSL, CATV.

1.4 Virtual Private Network: VPN Protocols, Types of


VPN, VPN Clients, SSL VPNs
2
DIRECTORY SERVICES: DEFINE
DIRECTORY SERVICE
 Directory services is the collection of
software and processes that store
information about enterprise, subscribers or
both and make information available to the
users.
 Example: Domain Name System (DNS)
 A Directory service consists of at least one
instance of Directory Server and at least one
Directory Client Program.
 Client program can access names, phone
numbers, addresses and other data stored in
the directory services.
 Directory server stores all user and
network information in a
single, network-accessible3
repository.
 Directory services are network services that
identify every resources such as email
address, peripheral devices and computers
on the network and make these resources
accessible to users and applications.
 Most used Directory services are Lightweight
Directory Access Protocol which is used for
email addresses and Netware Directory
Services which is used in Novell Netware
Networks.

4
NOVELL DIRECTORY (NDS)
 It is known as Netware Directory Services.
 Novell directory services is a popular
software product for managing access to
computer resources and keeping track of the
users of a network such as a company’s
intranet from single point of administration.
 Using NDS, a network administrator can set
up and control a database of users and
manage them.
 Users of computers at remote locations can
be added, updated and managed centrally.
5
WINDOWS DOMAIN

 A Windows domain is a form of a computer


network in which all user accounts,
computers, printers and other security
principals, are registered with a central
database located on one or more clusters of
central computers known as domain
controllers.
 Authentication takes place on domain controllers.
 Each person who uses computers within a
domain receives a unique user account that
can then be assigned access to resources
within the domain.
 The concept of Windows domain is in contrast
with that of a workgroup in which each
computer
6
maintains its own database of security principals.
MS ACTIVE DIRECTORY

 Active Directory (AD) is a


directory service that Microsoft developed for
Windows domain networks.
 It is an object-oriented, hierarchical, distributed
directory services database system.
 That provide central database about
hardware,software and human resources of entire
network.
 A server running Active Directory Domain Services
(AD
DS) is called a domain controller.
 It authenticates and authorizes all users and
computers in a Windows domain type network—
assigning and enforcing security policies for all
computers and installing 7
or updating software.
X500 DIRECTORY ACCESS PROTOCOL

 X.500 is a series of computer networking


standards covering electronic directory
services. The X.500 series was developed by
ITU-T, formerly known as CCITT, and first
approved in 1988.
 The primary concept of X.500 is that there is
a single Directory Information Tree (DIT), a
hierarchical organization of entries which are
distributed across one or more
servers, called Directory System Agents
(DSA).
 An entry consists of a set of attributes, each
attribute with one or more values.
8
 Each entry has a unique Distinguished
Name, formed by combining its Relative
Distinguished Name (RDN), one or more
attributes of the entry itself, and the RDNs
of each of the superior entries up to the
root of the DIT.
 As LDAP implements a very similar data
model to that of X.500, there is further
description of the data model in the
article on LDAP.
9
LDAP
 The Lightweight Directory Access Protocol
(LDAP) is an open, scaled-down
implementation of X.500.
 Active directory and eDirectory are based on
LDAP.
 It is light weight and sufficient straight forward.
 Easy to implement.
 Runs directly above TCP/IP.
 LDAP security model defines how information
can be protected.
 Oldest version is written in C, new in Perl or
Java. Client constructs an LDAP message
containing request and send it to server.
 It provides directory access, a centralized
database of information about people, groups
and other entities. 10
 LDAP is based on a simpler subset of the standards
contained within the X.500 standard. Because of
this relationship, LDAP is sometimes called X.500-
lite.
Client-server: LDAP connection

client

 LDAP server(s)

11
OBJECT TYPES, OBJECT NAMING, CANONICAL
NAMES, LDAP NOTATION, GLOBALLY UNIQUE
IDENTIFIERS, USER PRINCIPLE NAMES,
DOMAIN, TREES & FORESTS.
Objects types in AD
 Container object:
 It is simply an object that stores other objects.
 It functions as branches of tree.
 AD uses container object like Organization Unit(OU).
 Rights and permissions flow downward through tree.
 Leaf object
 It stands alone and cannot store other objects.
 Object naming in AD
 Every object is unique and based on LDAP standard.
 Follows DN (distinguished name),RDN
(relative distinguished name)rules.
 Canonical Name: A canonical name in DN in
which domain name comes first then object’s parent
containers
working down from the root separated by forward slashes.
12
 Ex: tracker.com/sales/inside
ACTIVE DIRECTORY STRUCTURE ELEMENT
FORESTS, TREES, AND DOMAINS
 The Active Directory frameworkthat holds
the objects can be viewed at a number of
levels.
 The object, forest, tree, and
domain are the logical divisions in
an Active Directory network.
 Object: It represents various resources on
network
 Domain: Logical group of network objects
(computers, users, devices) that share the
same Active Directory database. Domains are
identified by their DNS name structure
 Tree: A set of active directory names that
share a common namespaces.
13
 Forest: A forest is a collection of more domain
trees.
1.3REMOTE NETWORK ACCESS
 In computer networking, remote access
technology allows logging into a system as
an authorized user from remote location.
 Remote access is commonly used on
corporate computer networks but can
also be utilized on home networks.
 If only the files or network services are
needed, then remote network access
would be the right solution.

14
NEED OF REMOTE NETWORK ACCESS

 Internet Access
 Remote access to stored private or shared
files on the LAN
 For send or receive E-Mail
 Remote access to a
centralized application, such
as an accounting system.
 Remote access to groupware programs
or applications.
 Access hosted web application.
 Access centralized database.
15
PSTN
 PSTN (public switched telephone network) is the
world's collection of interconnected voice-
oriented public telephone networks, both
commercial and government- owned.
 It's also referred to as the Plain Old Telephone
Service (POTS).
 This service sets up a path(circuit) between the
calling and called party, and maintains it for the
duration of call , so called public switched
telephone network.
 Switching offices are categorized in five class:
 Regional office
 Sectional office
 Primary office
 Toll office
 End office 16
Region
al
office

Loc 17
al
loo
 A small town may have one toll free office
while large city will have several end
offices.
 End offices are connected to one toll office.
 Many toll offices are connected to primary office.
 Many primary offices are connected
to sectional
office.
 Finally sectional offices are connected to
Regional office.
 Dialing is performedthrough a touch tone
technique.
 The frequency of signal depends on the row
and column of the pressed pad. 18
ISDN
 (Integrated Services Digital Network) An
international standard for switched, digital
dial-up telephone service for voice and data.
 Analog telephones and fax machines are used
over ISDN lines, but their signals are
converted into digital by the ISDN terminal
adapter.
 Channels
 ISDN uses 64 Kbps "B" (bearer) channels to carry
voice and data.
 A separate "D" (delta) channel is used for control.
 The D channel signals the carrier's voice switch to
make calls, put them on hold
and activate features such as19 conference
calling and call forwarding.
20
 Basic Service (BRI)
 ISDN BRI (Basic Rate Interface) uses one wire
pair to carry two 64 Kbps B channels and one 16
Kbps D channel (2B+D).
 Both B channels are often "bonded" into one,
providing a
total data rate of 128 Kbps.

 Higher Capacity (PRI)


 ISDN PRI (Primary Rate Interface) uses four wire
pairs to provide 23 B channels and one 64 Kbps
D channel (23B+D).
 A PRI line is equivalent to a 24-channel T1 line.
Bonding channels is common; for example, six
channels provide 384 Kbps for high-quality
videoconferencing.
21
DSL
 DSL (Digital Subscriber Line) is a technology
for bringing high- bandwidth information to
homes and small businesses over ordinary
copper telephone lines.
 xDSL refers to different variations of DSL, such
as ADSL, HDSL, and RADSL.
 Assuming your home or small business is close
enough to a telephone company central office
that offers DSL service, you may be able to
receive data at rates up to
6.1 megabits (millions of bits) per second (of a
theoretical 8.448 megabits per second),
enabling continuous transmission of motion
video, audio, and even 3-D effects. 22
23
 More typically, individual connections will
provide from 1.544 Mbps to 512 Kbps
downstream and about 128 Kbps upstream.
 A DSL line can carry both data and voice
signals and the data part of the line is
continuously connected.
 DSL installations began in 1998 and will
continue at a greatly increased pace through
the next decade in a number of communities
in the U.S. and elsewhere.
 DSL is expected to replace ISDN in many
areas and to compete with the cable modem
in bringing multimedia and 3-D to homes and
small businesses.
24
CATV
 Cable TV started to distribute
broadcast video signals to locations.
 Antenna at the top of a hill or building
received signals from TV stations and
distributed them, to the community so
known as CATV.
 Cable TV office called the head end
receives video signals from broadcasting
stations and feeds them into coaxial
cables.
 The signal becomes weaker with
distance so amplifiers were installed
through network.
 There could be up to 35 amplifiers between head
25
end and the subscriber channel.
26
1.4VIRTUAL PRIVATE NETWORK
 A VPN ( or Virtual Private Network) is a way of
creating a secure connection ‘to’ and ‘from’ a
network or a computer.
 The VPN uses strong encryption and
restricted, private data access which keeps
the data secure from the other users of the
underlying network which could often be a
public network like the Internet.
 VPNs have been used for years, but they have
become more robust only in recent years.
 They are more affordable and also much faster.

27
28
REMOTE ACCESS VPN

29
SITE TO SITE VPN

30
VPN PROTOCOLS
 IP Security (IPSec)
 Transport mode
 Tunnel mode
 Point-to-Point Tunneling Protocol (PPTP)
 Voluntary tunneling method
 Uses PPP (Point-to-Point Protocol)
 Layer 2 Tunneling Protocol (L2TP)
 Exists at the data link layer of OSI
 Composed from PPTP and L2F (Layer 2 Forwarding)
 Compulsory tunneling method
 SSL & TLS – 31
 is not used as much as the ones above
VPN CLIENT
 To use the VPN, both sides of a VPN
connection must be running compatible
VPN software using compatible protocols.
 A VPN Client software on one computer
connects to a VPN server on another
computer and by using encryption and
other security measures.
 Types of VPN Clients are as below
 SSL VPN Client
 CISCO VPN Client
 IPSec VPN Client
 Open VPN Client
32
ADVANTAGE OF VPN
 Advantages:
Greater scalability
Easy to add/remove users
Reduced long-distance telecommunications costs
Mobility
Security

33
DISADVANTAGE OF VPN
 Disadvantages
 Lack of standards
 Understanding of security issues
 Unpredictable Internet traffic
 Difficult to accommodate products from different
vendors

34
IMP QUESTION FOR GTU EXAM
 Explain X.500 – directory access protocol
 Define forest, tree, root
 Explain DSL in detail
 Explain VPN in detail
 Explain need of remote network access
 Explain Directory Service.
 Explain Light Weight Directory Access Protocol.
 Explain Active Directory Architecture
 Explain PSTN.
35
36
37

You might also like