Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Why LDAP is called light weight?

Answer Posted / tushar rishipathak

LDAP is called lightweight because it is a smaller and easier protocol which was derived from the X.500 DAP (Directory Access Protocol) defined in the OSI network protocol stack.

LDAP servers store a hierarchical directory of information. In LDAP parlance, a fully-qualified name for a directory entry is called a Distinguished Name. Unlike DNS (Domain Name Service) FQDN's (Fully Qualified Domain Names), LDAP DN's store the most significant data to the right.

Is This Answer Correct ?    6 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is multicasting?

970


What are the data units at different layers of the TCP / IP protocol suite

1055


What is a ddos attack?

937


What are worms?

1023


What is difference between baseband and broadband transmission

1144


How does phishing work?

978


What is udp flood?

1068


What are the different types of network security?

1097


congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....

1629


What is Cross site scripting?

1085


If you need to encrypt and compress data for transmission, how would you achieve it?

1112


What are the benefits of the firewall?

1052


What are Digrams and Trigrams

1148


What is next-generation firewall (ngfw)?

1105


Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?

958