| Lesson 2 | Physical structure |
| Objective | Define the Physical Structure of Active Directory. |
Active Directory Domain Services (AD DS) is typically described using two complementary views: logical structure and physical structure.
A key principle: sites and domains are independent. A single domain can span multiple sites, and a single site can contain domain controllers from multiple domains. You map sites to network topology, not to your DNS namespace or domain boundaries.
The physical structure of AD DS defines where and when logon and replication traffic occurs. When site and subnet mappings are accurate, clients discover and authenticate to nearby domain controllers, and replication is scheduled and optimized for WAN links. When mappings are wrong, you can see slow logons, excess WAN traffic, and replication delays.
In practical administration, physical structure knowledge is a troubleshooting multiplier: it helps you interpret replication health, explain inconsistent logon behavior, and predict how quickly changes (password resets, group membership updates, GPO changes) converge across the environment.
The physical structure centers on domain controllers and sites. Domain controllers host the AD database and provide authentication and directory services. Sites group “well-connected” IP subnets and guide client DC selection and replication topology.
The following images summarize how domain controllers relate to sites, replication, and client service location.
It’s easy to mix terms here, so keep this mental model:
In other words: domain controllers store directory information, but “physical structure” is not a separate database of objects—it’s the topology and configuration that determines where clients authenticate and how replication converges.
Some security settings are scoped at the domain level and are intended to apply consistently to domain accounts. Historically, password and lockout settings were strictly “one set per domain.” In modern AD DS, this is more flexible:
Design implication: you usually don’t create extra domains just to support different password policies. Instead, use FGPP where appropriate, and reserve additional domains/forests for genuine administrative boundaries, isolation requirements, or namespace constraints.
AD DS uses multi-master replication: changes can be made on any writable domain controller and then replicated to other DCs. Replication ensures that directory information is available across the environment, but convergence is not instantaneous—site links, schedules, and replication health all affect how quickly changes spread.
For some logon scenarios, specific role holders matter. For example, the PDC Emulator plays a special role in time synchronization, password change referrals, and certain account-lockout behaviors—so physical placement and connectivity to role holders can impact user experience.
Sites and subnets let you shape replication and client authentication behavior using your real network topology. With correct site design, AD can keep replication traffic efficient across WAN links while still providing timely directory convergence.
Multi-master replication reduces single points of administration and supports resilience: you can make directory changes on multiple DCs, and the system propagates those changes according to the replication topology. The details and operational advantages are covered in the supporting lesson linked below.