FSMO Chinese translation into operation master, before explaining the role of FSMO, first introduce two concepts:
Single master copy: so-called single Master replication refers to copying from one place to another. This is mainly used for the previous NT4 domain. We know that in the NT4 domain, the PDC and BDC are distinguished on the domain network, and all replications are from PDC to BDC. This is because the NT4 domain uses this kind of replication mechanism, so the modification of the domain on the network must be performed on the PDC, and it is invalid on the BDC. If your network is small, the shortcomings of this kind of organization cannot be fully reflected, but if it is a cross-city network, such as your PDC is in Shanghai and BDC is in Beijing, then your network modification will be very Trouble.
Multi-master replication: Multi-master replication is relative to single-master replication. It refers to the mutual replication of all domain controllers, mainly to compensate for the defects of single-master replication. Microsoft from Windows Beginning with the 2000 domain, PDC and BDC are no longer distinguished on the network. All domain controllers are in an equivalent position, and modifications on any one domain controller are copied to other domain controllers.
Since the domain controllers in the Windows 2000 domain are all equivalent, what is the role of these domain controllers? The role of a domain controller in a Windows 2000 domain does not depend on whether it is the number of domain controllers in the network. Depending on the distribution of the five roles of the FSMO in the network, it is now beginning to get to the point. FSMO has five roles. , divided into two categories:
1, the forest level (that is, only one DC exists in a forest has this role):
(1), Schema Master Chinese translation: architecture master < Br>
(2), Domain Naming Master Chinese translation: domain naming master
2, domain level (that is, only one DC in a domain has this role):
(1), PDC Emulator Chinese translation: PDC emulator
(2), RID Master Chinese translation: RID master
(3), Infrastructure Master Chinese translation: basic Architecture Master
First, let's explain what these five role spaces do:
1. Schema Maste
Use to modify the source data of the Active Directory. . We know that there are various objects in the Active Directory, such as users, computers, printers, etc. These objects have a series of properties. The Active Directory itself is a database. The objects and attributes are like tables. With the correspondence, then the relationship between these objects and attributes is defined by Schema Maste. If you deploy Excahnge, you will know that Schema can be extended, but you need to pay attention to the extension. Schema must be extended in Schema Maste. Execute extensions on other domain controllers or member servers. In fact, the data is transferred to the Schema through the network and then extended on Schema Maste. To extend the Schema, you must Permissions with the Schema Admins group are fine.
Suggestion: High performance is not required on domain controllers that have Schema Maste, because we don't often manipulate Schema unless we often extend Schema, but this is very rare, but We must guarantee availability, otherwise we will make mistakes when installing software such as Exchnage or LCS.
2, Domain Naming Master
This is also a forest-level role, its main role is to manage the addition or deletion of domains in the forest. If you want to add a domain to your existing forest or delete a domain, you must contact the Domain Naming Master. If the Domain Naming Master is in the Down state, your additions and deletions will definitely fail. of.
Suggestion: The domain controller that owns the Domain Naming Master also does not need high performance. I don't think any network administrator will often add or delete domains in the forest. Of course, high availability is necessary, otherwise there is no way to add a domain to delete the forest.
3, PDC Emulator
As mentioned above, Windows 2000 domain starts, no longer distinguish between PDC or BDC, but in fact some operations must be done by PDC, then these What should I do in the Windows 2000 domain? That is done by the PDC Emulator, mainly the following operations:
(1), handle password verification requirements;
By default, all DCs in the Windows 2000 domain will be copied every 5 minutes. However, there are some exceptions, such as password modification. In general, once the password is modified, it will be copied to the PDC Emulator first, and then an immediate update will be triggered by the PDC Emulator to ensure the real-time password. Of course, the actual Since network replication also takes time, there will still be a certain time difference. As for this time difference, it depends on your network size and line conditions.
(2) Time in the unified domain;
Microsoft Active Directory uses the Kerberos protocol for identity authentication. By default, the time difference between the authenticator and the authenticated party cannot exceed 5 Minutes, otherwise it will be rejected. Microsoft's design is mainly used to prevent replay attacks. Therefore, the time in the domain must be unified. This unified time work is done by the PDC Emulator.
Due to differences in living habits and geography, the format of time and date varies from region to
Running the Active Directory Installation Wizard Upgrading a Windows 2000 Server computer to a domai
Compared with the previous Windows, Win2K/XP user interface has made many improvements, greatly faci
Microsoft introduced the latest service pack Service Pack 4 (hereafter referred to as SP4) for Windo
Win Server 2008 Multilingual User Interface Package
Vista, XP, 2008 32-bit /64-bit performance comparison test
Win2000 boot disk and system recovery
Use "management tools" to optimize the operating system
Windows 2000/XP installation driver compatibility issue
Windows 2000 Common System Process List
How to effectively manage Win 2003 storage space
How to make Windows 2003 more secure
Windows Server 2003 feature level
Windows Server 2008 Server Core - Small footprints, great security
Four kinds of Active Directory AD to install as well as configure the way to
Let the address bar hidden behind the WIN7 taskbar expose
How to use the screen recording function that comes with Win7
How to disable the win10 system driver forced update problem
How does Win7 hide usage records? Win7 hides the method of using records recently
What should I do when the win7 system automatically returns to the desktop when playing LOL games?
Fix issues that Windows 7 Aero effects can't display
Win10 start menu: Win7 users will like