SlideShare a Scribd company logo
How Active Directory
Replication Topology
Works
Active Directory uses sites to:
 Optimize replication for speed and bandwidth consumption between domain
controllers.
 Locate the closest domain controller for client logon, services, and directory
searches.
 Direct a Distributed File System (DFS) client to the server that is hosting the
requested data within the site.
Active Directory KCC Architecture and
Processes
 The replication topology is generated by the Knowledge Consistency Checker
(KCC)
 The KCC functions locally by reading, creating, and deleting Active Directory
data
 KCC that runs on one domain controller does not communicate directly with
the KCC on any other domain controller..
Active Directory KCC Architecture and
Processes
 The KCC communicates with other KCCs only to make a remote procedure call
(RPC) request for replication error information.
 The KCC uses the error information to identify gaps in the replication
topology.
Note
The KCC uses only RPC to communicate with the directory service. The KCC
does not use Lightweight Directory Access Protocol (LDAP).
ISTG & KCC
 One domain controller in each site is selected as the Intersite Topology
Generator (ISTG).
 To enable replication across site links, the ISTG automatically selects one or
more bridgehead servers to perform site-to-site replication.
 A bridgehead acts like a gateway for Site-To-Site Replication.
 Thus, the scope of operation for the KCC is the local server only, and the
scope of operation for the ISTG is a single site.
KCC creates two types of topologies: intrasite and intersite.
Within a site, the KCC creates a ring topology by using all servers in the site. To create the intersite topology, the
ISTG in each site uses a view of all bridgehead servers in all sites in the forest.
Control Replication Latency and Cost
 Replication latency begins when a directory update occurs on an originating
domain controller and ends when replication of the change is received on the
last domain controller in the forest that requires the change.
 A lower-cost route is preferred by the ISTG when generating the replication
topology.
Effect Client Affinity
 Active Directory clients locate domain controllers according to their site
affiliation.
 Domain controllers register SRV resource records in the DNS database that
map the domain controller to a site.
 When a client requests a connection to a domain controller (for example,
when logging on to a domain computer), the domain controller Locator uses
the site SRV resource record to locate a domain controller with good
connectivity whenever possible.
 Sites can also be used by certain applications, such as DFS, to ensure that
clients locate servers that are within the site or, if none is available, a server
in the next closest site.
Connection Objects
Ownership of Connection Objects
 Connections that are created automatically by the KCC are “owned” by the KCC. If
you create a new connection manually, the connection is not owned by the KCC. If
a connection object is not owned by the KCC, the KCC does not modify it or delete
it.
 If you use an LDAP editor such as Ldp.exe or Adsiedit.msc to change a connection
object property, the KCC reverses the change the next time it runs.
 If you use Active Directory Sites and Services to change a connection object
property, the object is changed from automatic to manual and the KCC no longer
owns it.
 If you create a new connection object that duplicates one that the KCC has
already created, your duplicate object is created and the KCC-created object is
deleted by the KCC the next time it runs.
NTDS Site Settings Object
 The identity of the ISTG role owner for the site. The KCC on this domain
controller is responsible for identifying bridgehead servers.
 Whether domain controllers in the site cache membership of universal groups
and the site in which to find a global catalog server for creating the cache.
 The default schedule that applies to connection objects.
Replication Transports
There are three levels of connectivity for replication of Active Directory
information:
 Uniform high-speed, synchronous RPC over IP within a site.
 Point-to-point, synchronous, low-speed RPC over IP between sites.
 Low-speed, asynchronous SMTP between sites. (For DC’s belonging to
different domain. Only Configuration, Schema and GC replication)
Site Link Replication Interval Schedule
AB 30 minutes 12:00 hours to 04:00 hours
BC 60 minutes 01:00 hours to 05:00 hours
Simple Ring Topology that Requires No
Optimization
Ring Topology for Two Domains in a
Site that Has No Global Catalog Server
Intrasite Topology with Optimizing
Connections
Thank You

More Related Content

Similar to AD Replication Topology.pptx

What is active directory
What is active directoryWhat is active directory
What is active directory
rajasekar1712
 
A Distributed Control Law for Load Balancing in Content Delivery Networks
A Distributed Control Law for Load Balancing in Content Delivery NetworksA Distributed Control Law for Load Balancing in Content Delivery Networks
A Distributed Control Law for Load Balancing in Content Delivery NetworksSruthi Kamal
 
Couchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionCouchbase - Yet Another Introduction
Couchbase - Yet Another Introduction
Kelum Senanayake
 
Web Crawling Using Location Aware Technique
Web Crawling Using Location Aware TechniqueWeb Crawling Using Location Aware Technique
Web Crawling Using Location Aware Technique
ijsrd.com
 
Oracle 10g rac_overview
Oracle 10g rac_overviewOracle 10g rac_overview
Oracle 10g rac_overviewRobel Parvini
 
🏗️Improve database performance with connection pooling and load balancing tec...
🏗️Improve database performance with connection pooling and load balancing tec...🏗️Improve database performance with connection pooling and load balancing tec...
🏗️Improve database performance with connection pooling and load balancing tec...
Alireza Kamrani
 
Benchmarking Couchbase Server for Interactive Applications
Benchmarking Couchbase Server for Interactive ApplicationsBenchmarking Couchbase Server for Interactive Applications
Benchmarking Couchbase Server for Interactive Applications
Altoros
 
RAC - The Savior of DBA
RAC - The Savior of DBARAC - The Savior of DBA
RAC - The Savior of DBA
Nikhil Kumar
 
L2s 090701234157 Phpapp02
L2s 090701234157 Phpapp02L2s 090701234157 Phpapp02
L2s 090701234157 Phpapp02google
 
Getting Started With Elasticsearch In .NET
Getting Started With Elasticsearch In .NETGetting Started With Elasticsearch In .NET
Getting Started With Elasticsearch In .NET
Ahmed Abd Ellatif
 
Getting started with Elasticsearch in .net
Getting started with Elasticsearch in .netGetting started with Elasticsearch in .net
Getting started with Elasticsearch in .net
Ismaeel Enjreny
 
MCSA 70-412 Chapter 05
MCSA 70-412 Chapter 05MCSA 70-412 Chapter 05
MCSA 70-412 Chapter 05
Computer Networking
 
How To Scale v2
How To Scale v2How To Scale v2
How To Scale v2
Georgio_1999
 
AWS Network Topology/Architecture
AWS Network Topology/ArchitectureAWS Network Topology/Architecture
AWS Network Topology/Architecture
wlscaudill
 
5. 19. Database Migration between various Applications Over Network (JAVA)
5. 19. Database Migration between various Applications Over Network (JAVA)5. 19. Database Migration between various Applications Over Network (JAVA)
5. 19. Database Migration between various Applications Over Network (JAVA)Ghazala Syed
 
Big Data LDN 2017: Look Ma, No Code! Building Streaming Data Pipelines With A...
Big Data LDN 2017: Look Ma, No Code! Building Streaming Data Pipelines With A...Big Data LDN 2017: Look Ma, No Code! Building Streaming Data Pipelines With A...
Big Data LDN 2017: Look Ma, No Code! Building Streaming Data Pipelines With A...
Matt Stubbs
 
How to scale your web app
How to scale your web appHow to scale your web app
How to scale your web app
Georgio_1999
 
Unit 2
Unit 2Unit 2
Unit 2
Ravi Kumar
 
Remoting and serialization
Remoting and serializationRemoting and serialization
Remoting and serialization
Chathurangi Shyalika
 

Similar to AD Replication Topology.pptx (20)

What is active directory
What is active directoryWhat is active directory
What is active directory
 
A Distributed Control Law for Load Balancing in Content Delivery Networks
A Distributed Control Law for Load Balancing in Content Delivery NetworksA Distributed Control Law for Load Balancing in Content Delivery Networks
A Distributed Control Law for Load Balancing in Content Delivery Networks
 
Couchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionCouchbase - Yet Another Introduction
Couchbase - Yet Another Introduction
 
Web Crawling Using Location Aware Technique
Web Crawling Using Location Aware TechniqueWeb Crawling Using Location Aware Technique
Web Crawling Using Location Aware Technique
 
Oracle 10g rac_overview
Oracle 10g rac_overviewOracle 10g rac_overview
Oracle 10g rac_overview
 
🏗️Improve database performance with connection pooling and load balancing tec...
🏗️Improve database performance with connection pooling and load balancing tec...🏗️Improve database performance with connection pooling and load balancing tec...
🏗️Improve database performance with connection pooling and load balancing tec...
 
Benchmarking Couchbase Server for Interactive Applications
Benchmarking Couchbase Server for Interactive ApplicationsBenchmarking Couchbase Server for Interactive Applications
Benchmarking Couchbase Server for Interactive Applications
 
As25266269
As25266269As25266269
As25266269
 
RAC - The Savior of DBA
RAC - The Savior of DBARAC - The Savior of DBA
RAC - The Savior of DBA
 
L2s 090701234157 Phpapp02
L2s 090701234157 Phpapp02L2s 090701234157 Phpapp02
L2s 090701234157 Phpapp02
 
Getting Started With Elasticsearch In .NET
Getting Started With Elasticsearch In .NETGetting Started With Elasticsearch In .NET
Getting Started With Elasticsearch In .NET
 
Getting started with Elasticsearch in .net
Getting started with Elasticsearch in .netGetting started with Elasticsearch in .net
Getting started with Elasticsearch in .net
 
MCSA 70-412 Chapter 05
MCSA 70-412 Chapter 05MCSA 70-412 Chapter 05
MCSA 70-412 Chapter 05
 
How To Scale v2
How To Scale v2How To Scale v2
How To Scale v2
 
AWS Network Topology/Architecture
AWS Network Topology/ArchitectureAWS Network Topology/Architecture
AWS Network Topology/Architecture
 
5. 19. Database Migration between various Applications Over Network (JAVA)
5. 19. Database Migration between various Applications Over Network (JAVA)5. 19. Database Migration between various Applications Over Network (JAVA)
5. 19. Database Migration between various Applications Over Network (JAVA)
 
Big Data LDN 2017: Look Ma, No Code! Building Streaming Data Pipelines With A...
Big Data LDN 2017: Look Ma, No Code! Building Streaming Data Pipelines With A...Big Data LDN 2017: Look Ma, No Code! Building Streaming Data Pipelines With A...
Big Data LDN 2017: Look Ma, No Code! Building Streaming Data Pipelines With A...
 
How to scale your web app
How to scale your web appHow to scale your web app
How to scale your web app
 
Unit 2
Unit 2Unit 2
Unit 2
 
Remoting and serialization
Remoting and serializationRemoting and serialization
Remoting and serialization
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

AD Replication Topology.pptx

  • 2. Active Directory uses sites to:  Optimize replication for speed and bandwidth consumption between domain controllers.  Locate the closest domain controller for client logon, services, and directory searches.  Direct a Distributed File System (DFS) client to the server that is hosting the requested data within the site.
  • 3. Active Directory KCC Architecture and Processes  The replication topology is generated by the Knowledge Consistency Checker (KCC)  The KCC functions locally by reading, creating, and deleting Active Directory data  KCC that runs on one domain controller does not communicate directly with the KCC on any other domain controller..
  • 4. Active Directory KCC Architecture and Processes  The KCC communicates with other KCCs only to make a remote procedure call (RPC) request for replication error information.  The KCC uses the error information to identify gaps in the replication topology. Note The KCC uses only RPC to communicate with the directory service. The KCC does not use Lightweight Directory Access Protocol (LDAP).
  • 5. ISTG & KCC  One domain controller in each site is selected as the Intersite Topology Generator (ISTG).  To enable replication across site links, the ISTG automatically selects one or more bridgehead servers to perform site-to-site replication.  A bridgehead acts like a gateway for Site-To-Site Replication.  Thus, the scope of operation for the KCC is the local server only, and the scope of operation for the ISTG is a single site.
  • 6.
  • 7. KCC creates two types of topologies: intrasite and intersite. Within a site, the KCC creates a ring topology by using all servers in the site. To create the intersite topology, the ISTG in each site uses a view of all bridgehead servers in all sites in the forest.
  • 8. Control Replication Latency and Cost  Replication latency begins when a directory update occurs on an originating domain controller and ends when replication of the change is received on the last domain controller in the forest that requires the change.  A lower-cost route is preferred by the ISTG when generating the replication topology.
  • 9. Effect Client Affinity  Active Directory clients locate domain controllers according to their site affiliation.  Domain controllers register SRV resource records in the DNS database that map the domain controller to a site.  When a client requests a connection to a domain controller (for example, when logging on to a domain computer), the domain controller Locator uses the site SRV resource record to locate a domain controller with good connectivity whenever possible.  Sites can also be used by certain applications, such as DFS, to ensure that clients locate servers that are within the site or, if none is available, a server in the next closest site.
  • 10.
  • 11. Connection Objects Ownership of Connection Objects  Connections that are created automatically by the KCC are “owned” by the KCC. If you create a new connection manually, the connection is not owned by the KCC. If a connection object is not owned by the KCC, the KCC does not modify it or delete it.  If you use an LDAP editor such as Ldp.exe or Adsiedit.msc to change a connection object property, the KCC reverses the change the next time it runs.  If you use Active Directory Sites and Services to change a connection object property, the object is changed from automatic to manual and the KCC no longer owns it.  If you create a new connection object that duplicates one that the KCC has already created, your duplicate object is created and the KCC-created object is deleted by the KCC the next time it runs.
  • 12. NTDS Site Settings Object  The identity of the ISTG role owner for the site. The KCC on this domain controller is responsible for identifying bridgehead servers.  Whether domain controllers in the site cache membership of universal groups and the site in which to find a global catalog server for creating the cache.  The default schedule that applies to connection objects.
  • 13. Replication Transports There are three levels of connectivity for replication of Active Directory information:  Uniform high-speed, synchronous RPC over IP within a site.  Point-to-point, synchronous, low-speed RPC over IP between sites.  Low-speed, asynchronous SMTP between sites. (For DC’s belonging to different domain. Only Configuration, Schema and GC replication)
  • 14. Site Link Replication Interval Schedule AB 30 minutes 12:00 hours to 04:00 hours BC 60 minutes 01:00 hours to 05:00 hours
  • 15. Simple Ring Topology that Requires No Optimization
  • 16. Ring Topology for Two Domains in a Site that Has No Global Catalog Server
  • 17. Intrasite Topology with Optimizing Connections