How does the NetWare Directory Services (NDS) work??

What will be an ideal response?


In the NDS, all network resources are considered to be objects, regardless of their actual physical location. NDS is global to the network and is replicated on multiple servers to protect it from failure at a single point. Because NDS is global, users can log in from any location on the network and access any resources for which they have been granted permission. Every user who is allowed to log in to the network is entered into the NDS by the network administrator. Likewise, all network support devices such as printers are also entered into the NDS. For example, if user X wants to use printer Y, the network administrator has to assign the appropriate permissions to allow user X to access printer Y. These permissions are also entered into the NDS. Every time user X logs on and tries to send a print job to printer Y, the NDS is referenced for the necessary permissions.??The basic idea underlying NDS is that the network administrator must create a hierarchical tree that represents the layout of the organization. This hierarchical structure actually resembles an inverted tree, with the root at the top and the users and network resources-the leaves-at the bottom. This tree  ould correspond to the physical layout of the organization: for example, workstations 1 through 20 will be on the third floor of an office building, workstations 21 through 40 on the second floor, and workstations 41 through 60 on the first floor. A more powerful and flexible hierarchical tree can be created based on a logical layout. For example, a logical layout could describe the organization in terms of its departmental structure: the engineering department (which could be scattered over floors 1 through 3), the sales department (which could be situated on floors 2, 6, and 7), and marketing (which might be physically located in two different buildings).

Computer Science & Information Technology

You might also like to view...

A class’s initializes instance variables of that class.

a) constructor b) utility method c) access modifier d) None of the above.

Computer Science & Information Technology

To change the font size for a portion of the text in WordArt, make sure the object is selected with a ________ border

A) black, solid B) dashed C) double-lined D) red, solid

Computer Science & Information Technology

Documents can have only one author defined in the document properties

Indicate whether the statement is true or false

Computer Science & Information Technology

The format command-line utility is used to change an existing FAT or FAT32 partition that contains data to NTFS without losing the data

Indicate whether the statement is true or false

Computer Science & Information Technology