Types of VPNs Mainly there are two basic types of VPNs are 1. Remote-Access —Also called a Virtual Private Dial-up Network (VPDN), this i...
Read More
VPN Protocols
VPN Protocols The three most popular tunneling protocols used for VPNs are Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Pro...
Read More
Virtual Private Networks
Virtual Private Networks A virtual private network (VPN) is a network link formed through the Internet between the remote user connected t...
Read More
Remote Access Needs
Determining Remote Access Needs Users who require remote access generally fall into one of the following four categories: ...
Read More
Digital Subscriber Line (DSL)
DSL: Ø Although there are several other media that can be used to provide broadband access to residential and business subscribers, no...
Read More
Cable Antenna Television(CATV)
CATV: Ø CATV (originally "community antenna television," now often "community access television") is more commonl...
Read More
Integrated Service Digital Network (ISDN)
ISDN: Ø ISDN is defined by the ITU-T. Ø ISDN is used to support wide range of voice (telephone calls) and non-voice (data exchange) ...
Read More
Public Switch Telephone Network (PSTN)
PSTN: Ø The public switched telephone network (PSTN) is the aggregate of the world's circuit-switched telephone networks that ar...
Read More
LDAP Notation
LDAP Notation Same Domain Name can be expressed in LDAP notation like: CN=xyz, OU=comp, OU=stbs, DC=tapi, DC=com -->...
Read More
User Principle Name (UPN)
UPN: Ø UPN or User Principal Name is a logon method of authentication when user enters the credentials as username@domainname.com ins...
Read More
Active Directory Architecture
Disadvantages of Windows NT Domains · Windows NT can’t scale up to larger network. · Here each domain must be maintained individual...
Read More
Global Unique Identifier
GUID: Ø A Globally Unique Identifier is a unique reference number used as an identifier in computer software Ø Short for Globally Un...
Read More
Object Naming
Object Naming · Every object in AD database is uniquely identifying the name that can be expressed in several forms. · The naming ...
Read More
Canonical Names
Canonical Names · Most active directory application refers to objects by using their canonical names. · A canonical name is a Domai...
Read More
Object Types
Object Types · There are basically two types of object in AD. 1. Container Object 2. Leaf Object · A container object is an ...
Read More
Network Backup
Que:- What is Network Backup? Or What is Backup Process? A network disaster recovery plan is worthless without some way of recovering the d...
Read More
Subscribe to:
Posts (Atom)