Good Morning, Today's topic will dig into the DNS technology and how it can benefit you in a Microsoft Active Directory Environment. So how does an Active Directory integrated environment separate itself from a typical DNS setup? AD-Integrated DNS allows the replication and storage of the DNS zones, typically zones are stored as text files on DNS systems. These text files are then sync'd to other DNS systems using replication or zone transfers. With AD-Integration you can implement a domain controller and install the DNS role, the zone data is then available on the system as an AD object and is replicated to all other locations. Implementing this integration is fairly easy, when setting up the zone you need to assign the zone type as Active Directory Integrated. When you create the object it is created in the Microsoft DNS container that is a part of the system container. Each zone created in DNS will be its separate Active Directory container object ( class dnsZone, ie. domain.com, reskit.com ) which contains the DNS object node ( class dnsNode). These are unique names that contain information about a particular system such as the PDC emulator, root domain controllers or general domain systems. Below is a great visual representation courtesy from Microsoft tech-net website, of the connection of the dnsNode object (client1 object) in the zone. When a computer registers itself in DNS they are shown as attribute values on the dnsNode object.
That is as far as i will dig into the technical side of DNS, now to add more on advantages of AD integrated zones. Consider you have 4 sites, 1 of the sites being corporate with about 1,000 computers. 3 of your remote sites each have about 300 computers.Your are hosting an Active directory environment at corporate, your remote sites also support it, but your current setup only has a separate namespace server that serves corporate and your remote sites. You have identified you want to add some redundancy to the DNS environment and separate some of your DNS network traffic. The perfect solution would be to implement AD Integrated DNS. You would simply load up the domain controller with the DNS role, import or create your new AD integrated zone, install a secondary domain controller with AD DNS. Take your remote sites domain controllers and also load up the AD DNS role, it will automatically take your DNS zone you create at corporate and copy it down, now any changes that are made to DNS will automatically replicate within the sites at the next interval. You can then reconfigure your clients to re-point DNS to their corresponding sites and traffic for queries will stay local and you will have that redundancy in the event local DNS is not available. You will also have that global redundancy if your site DNS goes out along with a primary DNS server, we have implemented a secondary DNS server. And what makes this great is that you don't have to worry about configuring zone transfers, or making sure your DNS transfers are happening and best of all your replications are secure, to keep data secure while in route, RPC over IP replication utilizes authentication (using the Kerebros V5 authentication protocol) and data encryption. Many zone transfers can go through as plain text, you can imagine this security risk involved with that. This is still reliant on domain replication, so you have to make sure your sites and services are properly configured and that replication is happening. Any of your new applications installed or systems brought online can be managed at the site level and will be all automatically synced across the whole infrastructure without manually pushing those changes to each site. A tornado rolls through your data center and your system is gone, well now all my DNS entries are gone, i have to recreate them all? NO! In any event of disaster recovery and your domain controller and DNS server are gone you can easily build a new system at the site and once its promoted to the domain it will automatically pull all zones back down. If any day you have the choice of implementing this type of infrastructure, i would recommend it as you can clearly see some of the main advantages it has.
http://technet.microsoft.com/en-us/library/cc978010.aspx