Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is sites, why we use it.

Answer Posted / sarav

Active Directory (AD) sites, which consist of well-
connected networks defined by IP subnets that help define
the physical structure of your AD, give you much better
control over replication traffic and authentication traffic
than the control you get with Windows NT 4.0 domains.
Because AD relies on IP, all LAN segments should have a
defined IP subnet. This makes creating your AD site
structure straightforward; you simply group well-connected
subnets to form a site.

Creating AD sites benefits you in several ways, the first
of which is that creating these sites lets you control
replication traffic over WAN links. This control is
important in Windows 2000 because any Win2K domain
controller (DC) can originate changes to AD. To ensure that
a change you make on one DC propagates to all DCs, Win2K
uses multimaster replication (instead of the single-master
replication that NT 4.0 uses). You might think that
multimaster replication would make it difficult to plan for
AD replication’s effect on your WAN links, but you can
overcome this obstacle using AD sites. . .

Is This Answer Correct ?    4 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the types of LAN cables used? What is a cross cable?

992


Name the port used by PING.

1015


What is network security?

1005


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

939


What is proxy firewall?

1050


Difference between bit rate and baud rate.

1104


Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?

958


What are the benefits of the firewall?

1052


Explain what does cia stand for in security management?

970


What is a ddos attack?

937


What is ransomware?

985


Which are the different factors that affect the security of a network?

963


What is frame relay, in which layer it comes

1097


If you need to encrypt and compress data for transmission, how would you achieve it?

1112


What is udp flood?

1068