1 00:00:00,570 --> 00:00:05,880 Now, let's talk about the history of the actual tree from Wales or ordinator. 2 00:00:06,210 --> 00:00:10,770 So first those introduced this Andy Serwer, uh, new technology. 3 00:00:11,010 --> 00:00:17,850 And with this, they have to do a separate operating system for Sarasate, for managing services, as 4 00:00:17,850 --> 00:00:18,180 you can see. 5 00:00:18,210 --> 00:00:21,940 This is called and Hoya's Operating System Network Operating System. 6 00:00:21,990 --> 00:00:28,580 So this is installed on the Saraa computer, which has very powerful configuration. 7 00:00:28,890 --> 00:00:36,870 And then in this server that we use to carry the information about the cranes and also cranes, request 8 00:00:36,870 --> 00:00:41,960 the queries about some information and the server will do so. 9 00:00:42,600 --> 00:00:49,390 It is introduced in the 1990s, I don't know particularly here, but just here is not a model. 10 00:00:49,680 --> 00:00:56,880 So then what the hell is this empty invoice operating system on Windows Server then? 11 00:00:57,360 --> 00:01:02,450 This, uh, invoice operating system has, uh, uh, limitations. 12 00:01:02,910 --> 00:01:07,660 So that is, uh, it can only generate up to 40000 objects. 13 00:01:07,670 --> 00:01:15,750 So whether if you want to create users or computers, printers, groups, etc., all you can do is up 14 00:01:15,750 --> 00:01:20,340 to only 40000 objects on the water account you can create is part of the. 15 00:01:22,260 --> 00:01:29,130 If your organization is small, then it's OK, if it doesn't is fine, but if any big, upper, big 16 00:01:29,160 --> 00:01:35,250 organization wants to use this and then they have so much limitations because of 40000 objects may not 17 00:01:35,250 --> 00:01:36,190 be sufficient. 18 00:01:36,660 --> 00:01:44,160 So that's why what they have done is they have removed this invoice and they have created the extra 19 00:01:44,180 --> 00:01:45,760 finder directory services. 20 00:01:46,670 --> 00:01:55,940 So this supports more than part objects, and you can see here, this is the diagram, sorry for not 21 00:01:55,940 --> 00:01:57,380 making PowerPoint presentation. 22 00:01:57,530 --> 00:02:01,390 So this is the kind and connected to these servers, to servers. 23 00:02:01,400 --> 00:02:09,260 We have extra funded servers and this client will ask for information using this directory access protocol, 24 00:02:09,590 --> 00:02:12,220 and the server uses a directory service protocol. 25 00:02:12,230 --> 00:02:18,260 So using the staff grant will connect to the server and coding for any information he wants. 26 00:02:19,470 --> 00:02:26,910 So this is a very good one, actually founded it has overcome the limitations of this and its operating 27 00:02:26,910 --> 00:02:27,370 system. 28 00:02:27,390 --> 00:02:30,090 So the directory service is excellent. 29 00:02:30,450 --> 00:02:36,030 So this expert finder uses all you say more as a reference. 30 00:02:36,060 --> 00:02:39,480 So it's a model it uses for interaction and communication. 31 00:02:40,390 --> 00:02:50,590 Then in the early 2000 or 1995, it was then this TCP IP model has been implemented in order to assist 32 00:02:51,040 --> 00:02:52,140 all over the network. 33 00:02:52,480 --> 00:02:59,620 So this became very tough, very tough to handle, and also better application or database replication 34 00:02:59,620 --> 00:03:00,830 from one to another. 35 00:03:00,830 --> 00:03:05,800 Server is very low across this extraordinary directory services. 36 00:03:06,340 --> 00:03:11,630 So if the server wanted to send a database to the server and want to replicate. 37 00:03:11,950 --> 00:03:14,560 So this takes more time. 38 00:03:14,590 --> 00:03:21,830 So whenever you have so much of an application going on, then this is not considered as a good one. 39 00:03:23,080 --> 00:03:30,940 So that's why they have implemented this and ended up stands for Directory Access Protocol. 40 00:03:31,300 --> 00:03:36,940 So this is like Middlesworth between the client and the Explorer Finder, uh, server. 41 00:03:37,330 --> 00:03:42,730 As you can see, the first client since using FDCPA because the computer using the user by the client 42 00:03:43,030 --> 00:03:44,930 has been implemented that E.S.P. 43 00:03:45,070 --> 00:03:52,850 So this request will be converted into the OSA model using this adultry access protocol, because all 44 00:03:52,850 --> 00:04:00,420 of the computers and at the 2000 using this model so that the requested we can return to the Western 45 00:04:00,430 --> 00:04:05,920 model because this already this layers will be understood by the actual vendor. 46 00:04:05,930 --> 00:04:10,900 So that's where this ended up are they want to process have been installed on this, uh, middleware 47 00:04:11,050 --> 00:04:11,550 server. 48 00:04:11,860 --> 00:04:15,640 So to convert this VIP package, it's always separate. 49 00:04:17,260 --> 00:04:25,390 So now the sex offenders understand the request and processes that request and send the response, so 50 00:04:26,350 --> 00:04:27,350 this was verified. 51 00:04:27,520 --> 00:04:34,770 So they have got much idea that to mix these two services. 52 00:04:34,780 --> 00:04:42,550 So be sure we can remove this material and implement this in the server, then this accurately came 53 00:04:42,550 --> 00:04:44,770 into place actually is like a phone book. 54 00:04:44,800 --> 00:04:49,770 It is not any service to directory users and services. 55 00:04:50,050 --> 00:04:53,490 So there is a recent update, uh, version three. 56 00:04:54,070 --> 00:05:01,570 So this portion will be installed along with this actor to try to retrieve the phone. 57 00:05:01,780 --> 00:05:07,410 It contains every other every object information and data. 58 00:05:08,590 --> 00:05:21,490 And this that client access to this data using this services and also this to the tree will be will 59 00:05:23,370 --> 00:05:30,170 I mean, they will ask for any other information on the client, the printers, computers, etc., you 60 00:05:30,190 --> 00:05:38,200 know, set it up so that these are services that are insured on the server, so that for this video, 61 00:05:38,430 --> 00:05:40,290 I hope they understood this history. 62 00:05:40,630 --> 00:05:43,390 Just, uh, we need to notice this. 63 00:05:43,540 --> 00:05:48,660 There is a invoice operating system which has some limitations and overcoming that invoice operating 64 00:05:48,670 --> 00:05:48,910 system. 65 00:05:49,000 --> 00:05:50,340 There is extra fire under it. 66 00:05:50,770 --> 00:06:00,610 And then it has been very, uh, it also has some limitations, uh, like that, uh, slow progression 67 00:06:00,610 --> 00:06:11,080 and also the a model then and what they came into, uh, came into the way and this ended up has been, 68 00:06:11,170 --> 00:06:12,880 uh, implemented, as it were. 69 00:06:12,880 --> 00:06:17,020 And then they had to mix these two into a single whole system.