Networking Dictionary II
Networking Dictionary II
of
Networking
You'll never have doubts about it again.
Part 2
https://www.linkedin.com/in/felipe-c-01a8b1280/
2461book Page 228 Thursday, May 4, 2000 11:59 AM
mail-enabled application
mail-enabled application Any applica- manages all mailslot access and connec-
tion that includes an e-mail function but that tions. Mailslots are used for browse re-
also provides additional services, such as quests and logon authentication.
contact-management software, intelligent
See also named pipe; pipe; semaphore;
mail handling, and workflow automation.
Also known as message-enabled application. shared memory; socket.
See also groupware; Lotus Notes; mail- mailto An HTML attribute that creates a
aware application; workflow software. link to an e-mail address. If a user clicks on
the mailto link, the browser opens a win-
mailer A program used for sending and
dow for composing an e-mail message to
receiving e-mail.
this address.
mailing list On the Internet, a group of See also HyperText Markup Language.
people who share a common interest and
who automatically receive all the e-mail mail transport agent A program that
posted to the listserver or mailing-list man- manages the transportation and delivery of
ager program. e-mail. The mail transport agent accepts the
Contributions are sent as e-mail to the list- message from a mail user agent or client,
server and then distributed to all subscrib- performs any translations required, and
ers. Mailing lists are private or by invitation then routes the message.
only; Usenet newsgroups, by contrast, are
See also mail user agent; Simple Mail
open to everyone.
Transfer Protocol.
See also LISTSERV; listserver; newsgroup;
Usenet. mail user agent A client program that
provides a user interface for sending and re-
mail reflector On the Internet, a pro- ceiving e-mail, as well as all the other fea-
gram that manages a mailing list. tures required by any e-mail application,
See also LISTSERV; listserver; newsgroup; including creating, reading, forwarding,
Usenet. and deleting messages.
228
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 229 Thursday, May 4, 2000 11:59 AM
Manchester encoding
The feature that distinguishes mainframe usually distinguished from a major release
computers from other types is that they per- by an increase in only the decimal portion
form all processing at one central location; of the version number; for example, from
the terminals accessed by users have no lo- 3.1 to 3.11 rather than from 3.1 to 4.0.
cal computing power of their own.
See also service pack.
See also dumb terminal; minicomputer;
network computer; thin client. male connector Any cable connector
with pins designed to engage the sockets on
maintenance release A software up-
the female connector.
grade that corrects minor bugs or adds a
few small features. This type of release is See also female connector.
MALE CONNECTOR
229
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 230 Thursday, May 4, 2000 11:59 AM
230
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 231 Thursday, May 4, 2000 11:59 AM
MCA
The master browser provides this list, and to teach Novell courses. An MCNI must
the backup browser distributes it to a work- have at least two years of teaching experi-
group or domain. ence and be certified as a Master CNE; in
addition, an MCNI must also complete an
See also backup browser; browser.
Annual Update Requirement to keep their
skills up-to-date.
Master Business Continuity
Professional Abbreviated MBCP. A cer- See also Certified Novell Instructor.
tification from Disaster Recovery Institute
International (DRII) that covers advanced Master CNE See Master Certified Nov-
information on business continuity plan- ell Engineer.
ning, disaster recovery, and associated
master file table Abbreviated MFT. In
work experience and board certification.
Microsoft Windows 2000, a system file that
See also Associate Business Continuity contains entries for every file and folder on
Professional; Certified Business Continuity an NTFS volume. The MFT is always the
Professional. first file on the volume, and for backup pur-
poses, two copies are maintained on each
Master Certified Novell Engineer Ab- volume.
breviated Master CNE. A Novell certifica-
master replica In Novell NetWare, the
tion program for CNEs who want to focus
main replica for a partition. The master
on the support of enterprise-wide networks.
replica must be available during major
Previously known as Enterprise CNE.
changes such as partition splitting or merg-
Many consider the Master CNE program ing. Another replica can be assigned as the
the advanced degree of NetWare certifica- master replica if the original is lost or
tion, because candidates must demonstrate damaged.
proficiency in specialized networking tech-
nologies, as well as an in-depth knowledge MAU See medium attachment unit;
of the NetWare operating system. Multi-station Access Unit.
231
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 232 Thursday, May 4, 2000 11:59 AM
232
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 233 Thursday, May 4, 2000 11:59 AM
megahertz
233
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 234 Thursday, May 4, 2000 11:59 AM
member server
member server In Microsoft Windows The Intel 82385 cache controller chip was
NT, a server that participates in a security used with fast static RAM on some systems
domain, but that does not act as a domain to increase performance, but more up-to-
controller and does not store domain user date processors include cache-management
accounts. functions on the main processor.
A member server can be used to store The Intel Pentium contains two separate
shared data, but a user must be authenticat- 512KB caches, one each for data and in-
ed by a primary or a backup domain con- structions.
troller before gaining access to the member See also cache; level 2 cache.
server.
memory chip A chip that holds data or
memory The primary physical RAM in-
program instructions. A memory chip may
stalled in the computer. The operating sys-
hold its contents temporarily, as in the case
tem copies applications from disk into
of RAM, or permanently, as in the case of
memory, where all program execution and
ROM.
data processing take place, and then writes
the results back to disk. The amount of memory leak A programming error that
memory installed in the computer can de- causes a program to request new areas of
termine the size and number of programs computer memory rather than reusing the
that it can run, as well as the size of the larg- memory already assigned to it. This causes
est data file. the amount of memory in use by the pro-
See also dynamic RAM; static RAM; swap- gram to increase as time goes on. In a worst
ping; virtual memory. case, the application may consume all avail-
able memory and stop the computer.
memory address The exact location in
memory that stores a particular data item memory management The way in
or program instruction. which the operating system handles the use
of memory, usually as a combination of
memory board A printed circuit board physical memory and virtual memory.
containing memory chips. When all the
When applications are loaded, they are as-
sockets on a memory board are filled and
signed space in which to run and store data.
the board contains the maximum amount
As they are removed, the memory space
of memory that it can manage, it is said to
they occupied is released for use by the next
be “fully populated.”
program to run.
memory cache An area of high-speed See also memory leak.
memory on the processor that stores com-
monly used code or data obtained from memory management unit Abbrevi-
slower memory, eliminating the need to ated MMU. The part of the processor that
access the system’s main memory to fetch manages the mapping of virtual memory
instructions. addresses to actual physical addresses.
234
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 235 Thursday, May 4, 2000 11:59 AM
message-enabled application
In some systems, such as those based on ear- Merge An MS-DOS emulator from Lo-
ly Intel or Motorola processors, the MMU cus Computing that runs MS-DOS and
was a separate chip; however, in most of to- Windows applications under Unix.
day’s systems, the MMU is integrated into
the processor itself. Merge provides a complete MS-DOS envi-
ronment and acts as though your system is
memory map The organization and al- running only MS-DOS. Merge is available
location of memory in a computer. A mem-
for UnixWare, SCO, and other systems.
ory map indicates the amount of memory
used by the operating system, as well as the mesh network A network topology in
amount remaining for use by applications. which every device is connected by a cable
memory-resident Always located in the to every other device on the network. Mul-
computer’s memory and available for use; tiple links to each device are used to provide
not swapped out. network link redundancy.
MESH NETWORK
235
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 236 Thursday, May 4, 2000 11:59 AM
Message Handling Service Abbreviat- MAPI Version 3.2 provides for cross-plat-
ed MHS. A protocol for e-mail storage, form messaging independent from the op-
management, and exchange, originally cre- erating system.
ated by Action Technologies and then li- See also mail-aware application; Vendor
censed by Novell. MHS can collect, route, Independent Messaging.
and deliver e-mail and other files by using
store-and-forward technology. Messenger service In Microsoft Win-
dows NT, a service that sends and receives
Message Handling System The messages sent by the system administrator
CCITT X.400 standard protocol for global or by the Alerter service.
store-and-forward messaging. The X.400
See also Alerter service; service.
standard specifies everything from the type
of data that a message can contain to rules metafile A file that contains both data
for converting between different message and output control information. For exam-
types, such as from fax to text or vice versa. ple, a graphics metafile contains not only a
See also Consultative Committee for Inter- graphical image of some kind, but also in-
national Telephony and Telegraphy; formation on how the image is to be dis-
X.500. played. Use of a metafile allows one single
version of the image to be output to a vari-
message switching A routing method ety of display devices.
that uses store-and-forward techniques. metering The process of tracking appli-
Each message contains a destination ad- cation software use and availability across a
dress and is passed from source to destina- network to ensure that the terms of the li-
tion through a series of intermediate nodes. cense are being met. Metering can also be
At each intermediate node, the message is used to predict when a license will expire
stored briefly, reviewed, and then forward- and require renewal.
ed to the next node. Message switching al- metropolitan-area network Abbrevi-
lows a network operating system to ated MAN. A public, high-speed network,
regulate traffic and to use the available capable of voice and data transmission over
communications links effectively. a distance of up to 80 kilometers (50 miles).
A MAN is smaller than a wide-area net-
Messaging API Abbreviated MAPI. An
work (WAN) but larger than a local-area
interface used to add messaging capabilities
network (LAN).
to any Microsoft Windows application.
MAPI handles the details of message stor- MFS See Macintosh File System.
age and forwarding and directory services.
MFT See master file table.
Originally developed by Microsoft, MAPI
MHS See Message Handling Service.
has become a widely supported industry
standard. MHz See megahertz.
236
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 237 Thursday, May 4, 2000 11:59 AM
237
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 238 Thursday, May 4, 2000 11:59 AM
microcomputer
238
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 239 Thursday, May 4, 2000 11:59 AM
Microsoft Corporation
239
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 240 Thursday, May 4, 2000 11:59 AM
240
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 241 Thursday, May 4, 2000 11:59 AM
241
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 242 Thursday, May 4, 2000 11:59 AM
242
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 243 Thursday, May 4, 2000 11:59 AM
middleware
243
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 244 Thursday, May 4, 2000 11:59 AM
midsplit
244
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 245 Thursday, May 4, 2000 11:59 AM
245
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 246 Thursday, May 4, 2000 11:59 AM
MIPS
MIPS Acronym for millions of instruc- MLID See multiple-link interface driver.
tions per second. A measure of the process-
MMC See Microsoft Management Con-
ing speed of a computer’s CPU.
sole.
See also benchmark program.
MMJ See modified modular jack.
mirroring The process of duplicating MMU See memory management unit.
stored information in real time to protect vi-
tal data from unexpected hardware failures. mnemonic Pronounced “nee-monic.” A
name or abbreviation used to help you re-
See also clustering; disk duplexing; disk
member a long or complex instruction. Pro-
mirroring; fault tolerance; redundant array
gramming languages use many mnemonics
of inexpensive disks.
to represent complex instructions.
mirror site 1. A duplicate Web site. A MNP See Microcom Networking
mirror site contains the same information Protocol.
as the original Web site and reduces traffic
MO See Magneto-optical storage.
on that site by providing a local or regional
alternative. mobile computing 1. The daily use of a
2. A duplicate data center. Large compa- portable or laptop computer as a normal
nies running mission-critical applications part of the workday.
often mirror their entire data center so that 2. Techniques used to establish links to a
the company can continue to function if the network by employees who move from one
main center is hit by a natural disaster. remote location to another, such as mem-
bers of a sales staff or telecommuters who
MIS See Management Information work from home. Once the connection is
System.
made, users log in and access network re-
mission-critical application A comput- sources as easily as if they were working
er application whose function is vital to the from a computer in the corporate office.
operation of the corporation using it; also See also docking station; laptop computer;
called line-of-business application. portable computer; port replicator; wire-
less communications.
mixed mode In Microsoft Windows
2000 Server, a domain that contains at least mobile IP A mechanism that allows mo-
one Windows NT domain controller. As a bility on the Internet by allowing a comput-
safety precaution, all Windows 2000 do- er to use the same IP address as it moves
mains start up in mixed mode and must be from one location to another. Mobile IP
converted to native mode manually. also allows a user to change from one me-
See also native mode. dium, such as Ethernet, to another, perhaps
a wireless connection.
MJ See modular jack. See also Ethernet; Internet Protocol.
246
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 247 Thursday, May 4, 2000 11:59 AM
modulation
247
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 248 Thursday, May 4, 2000 11:59 AM
module
may be modulated to represent a digital or for Intel’s Gordon Moore, who first made
an analog signal. this statement in 1965.
See also carrier signal; demodulation.
MOPS See Microsoft Office Proficient
Specialist.
module In programming, a self-contained
portion of a larger program written, tested, Mosaic A Web browser, released on the
and compiled separately. Normally, a mod- Internet in 1993 by the National Center for
ule performs only one specific operation. Supercomputing Applications (NCSA) at
See also NetWare Loadable Module; the University of Illinois, and placed in the
Virtual Loadable Module. public domain.
Moore’s Law States that the number of 2. To load a disk volume or tape archive
transistors on a chip of a given size doubles so that users can access files and other
approximately every 18 months. Named resources.
248
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 249 Thursday, May 4, 2000 11:59 AM
multicast
249
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 250 Thursday, May 4, 2000 11:59 AM
multicast backbone
See also broadcast; multicasting; unicast. multidrop line A circuit connecting sev-
eral stations or nodes on a single logical
multicast backbone Abbreviated link; also called a multipoint line.
Mbone. A method of transmitting digital
A multidrop line is often used in IBM’s SNA
video over the Internet in real time.
(Systems Network Architecture). It is con-
The TCP/IP protocols used for Internet trolled by a primary station, and the other
transmissions are unsuitable for real-time nodes are considered secondary.
audio or video; they were designed to deliv-
multihomed computer Any computer
er text and other files reliably, but with
system that contains multiple network inter-
some delay. MBONE requires the creation
face cards and is attached to several physically
of another backbone service with special
separate networks; also know as a multi-
hardware and software to accommodate
homed host. The term can also be applied to
video and audio transmissions; the existing
a computer configured with multiple IP ad-
Internet hardware cannot manage time-
dresses for a single network interface card.
critical transmissions.
See also IP Multicast; multicasting; Real- multihomed host See multihomed
time Transport Protocol; Resource Reser- computer.
vation Protocol; unicast. multilayer A printed circuit board that
contains several layers of circuitry. The lay-
Multicast DHCP Abbreviated MDHCP.
ers are laminated together to make a single
In Microsoft Windows 2000 Server, an ex-
board, onto which the other discrete com-
tension of Dynamic Host Control Protocol
ponents are added.
(DHCP) that distributes multicast address
configurations to network clients automat- multilink In Microsoft Windows NT
ically. Server Remote Access Server, the ability to
combine several slower data streams into
multicasting An Internet standard that one network connection. For example, you
allows a single host to distribute data to can use two 28.8Kbps modems to form a
multiple recipients. single 57.6Kbps connection.
Multicasting can deliver audio and video
Multilink Point-to-Point Protocol See
content in real time so that the person using
PPP Multilink.
the system can interact with the data stream.
A multicast group is created, and every mem- Multimaster Replication In Microsoft
ber of the group receives every datagram. Active Directory, the process by which Ac-
Membership is dynamic; when you join a tive Directory domains replicate and re-
group, you start to receive the datastream, solve conflicting updates as peers.
and when you leave the group, you no longer
All Active Directory domain controllers
receive the datastream.
maintain a writable copy of the domain data-
See also broadcast; IP Multicast; unicast. base, and updating any record on any domain
250
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 251 Thursday, May 4, 2000 11:59 AM
multiplexing
controller will ensure that all other domain sending and receiving of packets to and
controllers are eventually updated. from the physical network medium.
See also Active Directory. See also link-support layer; Open Data-link
Interface/Network Driver Interface Specifi-
multimedia A computer technology that cation Support.
displays information using a combination
of full-motion video, animation, sound, multiple provider router In Microsoft
graphics, and text, with a high degree of Windows 2000, a function that allows two
user interaction. or more Win32 network application pro-
gram interface (API) providers to exist at
multimode fiber A fiber-optic cable the same time.
with a wide core that provides multiple
routes for light waves to travel. Multiple Universal Naming Conven-
tion Provider Abbreviated MUP. In Mi-
Its wider diameter of between 25 to 200 mi-
crosoft Windows 2000, a function that al-
crons prevents multimode fiber from carry-
lows two or more Universal Naming
ing signals as far as single-mode fiber due to
Convention (UNC) providers to exist at the
modal dispersion.
same time.
See also single-mode fiber.
MUP decides which UNC provider should
multipart virus A form of virus that in- handle the UNC request and forwards the
fects both the boot sector of a hard disk and request to that provider automatically.
executable files. Multipart viruses are diffi- Multiple Virtual Storage Abbreviated
cult to locate because they use stealth and MVS. IBM’s standard operating system for
polymorphic techniques to avoid detection. large mainframe computers.
See also boot sector virus; file-infecting vi- See also virtual machine.
rus; macro virus; polymorphic virus;
stealth virus; vaccine; virus. multiplexer Often abbreviated mux. A
device that merges several lower-speed trans-
multiple document interface Abbre- mission channels into one high-speed channel
viated MDI. In Microsoft Management at one end of the link. Another multiplexer
Console, an interface that allows more than reverses this process at the other end of the
one independently-running snap-in to be link to reproduce the low-speed channels.
loaded into the management window at the See also frequency-division multiplexing;
same time. inverse multiplexing; statistical multiplex-
See also Microsoft Management Console; ing; time-division multiplexing.
snap-in.
multiplexing A technique that transmits
multiple-link interface driver Abbrevi- several signals over a single communica-
ated MLID. A Novell Open Datalink Inter- tions channel. Frequency-division multi-
face (ODI) device driver that manages the plexing separates the signals by modulating
251
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 252 Thursday, May 4, 2000 11:59 AM
multipoint line
the data into different carrier frequencies. Multiprotocol over ATM Abbreviated
Time-division multiplexing divides the MPOA. A proposal to allow layer three net-
available time among the various signals. work routing protocols over an Asynchro-
Statistical multiplexing uses statistical tech- nous Transfer Mode Switched network.
niques to dynamically allocate transmission Multiprotocol over ATM allows corpora-
space depending on the traffic pattern. tions to take advantage of ATM’s benefits
while still maintaining legacy LANs.
See also inverse multiplexing.
See also Integrated-Private Network-to-
Network Interface; IP over ATM; LAN
multipoint line See multidrop line.
Emulation.
multiprocessing The ability of an oper-
Multipurpose Internet Mail Extension
ating system to use more than one processor
Abbreviated MIME. An Internet specifica-
in a single computer.
tion that allows users to send multiple-part
Symmetrical multiprocessing refers to the and multimedia messages, rather than sim-
operating system’s ability to assign tasks ple text messages. A MIME-enabled e-mail
dynamically to the next available proces- application can send PostScript images, bi-
sor. Asymmetrical multiprocessing requires nary files, audio messages, and digital video
that the original program designer choose over the Internet.
the processor to use for a given task when See also MIME Content Type; Secure
writing the program. MIME; uudecode; uuencode.
MULTIPLEXER
multiserver network A network that multiport wiring hub for token-ring net-
uses two or more file servers. works that can connect as many as eight
Multi-station Access Unit Abbreviat- lobes to a ring network. IBM refers to an
ed MAU; sometimes abbreviated MSAU. A MAU that can be managed remotely as a
Controlled Access Unit.
252
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 253 Thursday, May 4, 2000 11:59 AM
MVS
253
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 254 Thursday, May 4, 2000 11:59 AM
N
n See nano-. parent, for example, accounting.sybex
.com as a subdomain of sybex.com. In a
NAEC See Novell Authorized Education
disjointed namespace, a child domain does
Center.
not share its parent’s name, as in
NAK See negative acknowledgment. sybex.com and sybexnet.com.
254
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 255 Thursday, May 4, 2000 11:59 AM
NCP
255
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 256 Thursday, May 4, 2000 11:59 AM
NCP
NCP See Network Control Protocol. NEAP See Novell Education Academic
Partner.
NCP packet signature In Novell Net-
Ware, a security feature that allows each near-end crosstalk Abbreviated NEXT.
workstation to add a special signature to Any interference that occurs close to a
each NetWare Core Protocol (NCP) packet connector at either end of a cable. NEXT is
going to the server. This signature changes usually measured near the source of the test
dynamically for each packet, protecting signal.
both the server and the workstation against See also crosstalk; far-end crosstalk.
unauthorized access or any attempt to
use unauthorized network privileges. NEC Corporation Major manufacturer
See also NetWare Core Protocol. of a wide range of electronic products, in-
cluding semiconductors, communications
NCSA See National Center for Super- equipment, the MultiSynch line of moni-
computing Applications. tors, LCD flat-panel monitors, plasma dis-
plays, and PCs.
NCSC See National Computer Security For more information on NEC Corpora-
Center. tion, see www.nec.com.
NDD See NetWare Directory Database. See also Packard Bell NEC.
256
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 257 Thursday, May 4, 2000 11:59 AM
netiquette
DSPACE, SECURITY, SYSCON, and designed to run on Intel processors. The dis-
USERDEF, and has itself been replaced in tribution is usually free, although there may
NetWare 5 by NetWare Administrator. be a small charge to cover the distribution
See also NetWare Administrator. media and packaging.
NetBSD emphasizes multiple platform sup-
NetBEUI See NetBIOS Extended User port and so has been ported to several non-
Interface. Intel systems.
NETBIOS A Novell NetWare 3.x work- See also FreeBSD; Linux.
station utility used to determine if the client
software NETBIOS.EXE is loaded and, if netcasting A method used to deliver Web
so, which interrupts it is using. content automatically to the desktop. Net-
casting is referred to as push technology be-
NetBIOS See network basic input/ cause content is pushed from a Web site to
output system. those users who requested receipt of the con-
NetBIOS Extended User Interface. tent. Content can include weather forecasts,
Abbreviated NetBEUI, pronounced “net- stock market quotes, or software updates.
boo-ee.” A network device driver for the See also Castanet; Marimba, Inc.; Point-
transport layer supplied with Microsoft’s Cast, Inc.; server push.
LAN Manager, Windows for Workgroups,
and Windows NT. NetBEUI communicates NET.CFG A Novell NetWare worksta-
with the network interface card via the NDIS tion configuration file that contains infor-
(Network Driver Interface Specification). mation used to configure the client software
on the workstation. The file is read once,
NetBEUI is a small protocol with no net-
during startup of the network files.
working layer and therefore no routing
capability. It is suitable only for small net- For normal network use, the default values
works; you cannot build internetworks us- established in this file usually work. In some
ing NetBEUI, and so it is often replaced cases, the NET.CFG values must be adjust-
with TCP/IP. ed to work with particular applications or
in certain configurations.
Microsoft has added extensions to Net-
BEUI in Windows NT to remove the limi- NetDDE See Network Dynamic Data
tation of 254 sessions per node and calls Exchange.
this extended NetBEUI the NetBIOS Frame
(NBF). netiquette A contraction of network et-
iquette. The set of unwritten rules govern-
See also network basic input/output
ing the use of e-mail and other computer
system; Transmission Control Protocol/
and network services.
Internet Protocol.
Like any culture, the online world has its
NetBSD An implementation of Unix own rules and conventions, and if you un-
derived from the BSD series of releases; derstand and observe these conventions, you
257
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 258 Thursday, May 4, 2000 11:59 AM
NetPC
can take your place in the online community See also network computer; thin client; to-
without problems. Here are a few tips: tal cost of ownership; Zero Administration
for Windows.
■
Remember that the people reading your
post are human; if you wouldn’t say it to
their face, don’t post it in your e-mail. Netscape Catalog Server A server for
Microsoft Windows NT and Unix systems
■
Lurk before you leap. Spend a few days that allows the publication of complex, hi-
reading the posts in a newsgroup or mail-
erarchically organized documents stored on
ing list before you post anything of your
the Internet or on a corporate intranet;
own.
based on the popular freeware application
■
If you use a signature file to close your e- Harvest.
mail, remember to keep it short; people
don’t want to read lots of cute stuff every Netscape Certificate Management
time you post. System A server for Microsoft Windows
NT and Unix systems that manages digital
■
Don’t post messages in uppercase as it is
certificates and allows the server to become
the e-mail equivalent of YELLING; to add
emphasis, place an asterisk before and af- a certificate authority.
ter a word. See also certificate authority.
■
Don’t flame or mount personal attacks on
other users. Netscape Collabra Server A Network
News Transfer Protocol (NNTP) server for
■
Check your grammar and spelling before Microsoft Windows NT and Unix systems
you post.
that allows the creation and management of
■
Don’t be shy; if you are an expert, share private and secure newsgroups.
your knowledge with others.
Netscape Commerce Server A server
NetPC An initiative from Compaq, Dell, for Microsoft Windows NT and Unix sys-
Hewlett-Packard, Intel, and Microsoft de- tems that manages electronic commerce on
scribing a networked PC designed to give the Internet.
system administrators greater control and
security than a traditional PC. Netscape Communications Corpora-
tion A major publisher of software de-
NetPC is based on a minimum configuration
of a 133MHz Pentium with at least 16MB of velopment tools, Web browsers, and Web-
memory, running a Windows operating sys- server software; based in Menlo Park, Cal-
tem, with a hard disk and the capability to ifornia, and founded in 1994 by Jim Clark
run applications locally. The computer case and Marc Andreessen. Its Web browser,
is sealed and lockable, and floppy disks and Netscape Navigator, was initially very
CD-ROM drives are optional. All software popular, but later lost market share to
distribution is centralized. Microsoft’s Internet Explorer.
258
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 259 Thursday, May 4, 2000 11:59 AM
Netscape SuiteSpot
In 1998, America Online bought Netscape security, users, and groups, as well as Web
Communications and spun off the server- site content management.
based products to Sun Microsystems.
Netscape FastTrack Server A Web
For more information on Netscape Com- server for Microsoft Windows NT and
munications, see www.netscape.com. Unix systems. Designed for non-program-
mers, it lets users establish a Web presence
Netscape Communicator A package
or an intranet quickly and easily.
that includes the Netscape Navigator Web
browser, e-mail support, a newsreader, and Netscape Messaging Server An e-
Netscape Page composer, an HTML editor. mail server for Microsoft Windows NT and
Netscape Communicator is available for Unix systems that supports Lightweight Di-
Microsoft Windows, the Macintosh, and rectory Access Protocol (LADP), Simple
Unix. Mail Transfer Protocol (SMTP), as well as
Post Office Protocol 3 (POP3) and Internet
Netscape Directory Server A general-
Mail Access Protocol (IMAP).
purpose Lightweight Directory Access Pro-
tocol (LADP) directory server that stores, Netscape Navigator A popular Web
publishes, and manages user, group, and browser that runs under Windows and
other information in one location on a net- Unix and on the Macintosh. Netscape is
work and makes this information available distributed free by Netscape Communica-
to the Netscape SuiteSpot servers. tions Corporation, and in an unusual move
See also Netscape SuiteSpot. for a commercial software developer,
Netscape has made the source code to Nav-
Netscape Enterprise Server A high- igator available on the Internet.
performance and very popular Web server
Netscape SuiteSpot A popular package
for Microsoft Windows NT, Novell Net-
of integrated server components designed to
Ware, and Unix systems that is specifically
provide groupware services, document pub-
designed to support large Web sites on the
lishing and management, messaging and e-
Internet or on a corporate intranet.
mail, directory services, and security for cor-
Enterprise Server supports standard CGI porate intranets. SuiteSpot is available in a
(Common Gateway Interface), and for ap- Standard Edition and a Professional Edition.
plication creation, also offers Netscape The Standard Edition includes Communi-
Server API (NSAPI) for in-process server cator, Enterprise Server, Messaging Server,
applications. The LiveWire runtime envi- Calendar Server, Collabra Server, and Di-
ronment supports server-side JavaScript rectory Server. The Professional Edition in-
applications, and for Java developers, the cludes all the components found in the
Sun Java Servlet API is also available. Standard Edition and adds Compass Serv-
Enterprise Server is administered using a er, Certificate Server, Proxy Server, and
Web-based application called Server Man- Netscape Mission Control Desktop for cen-
ager, giving access to server settings such as tralized network management.
259
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 260 Thursday, May 4, 2000 11:59 AM
netstat
260
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 261 Thursday, May 4, 2000 11:59 AM
NetWare/IP
NetWare Connect See NetWare Inter- NDS is based on the 1988 CCITT X.500
net Access Server. standard.
See also Consultative Committee for Inter-
NetWare Core Protocol Abbreviated
national Telephony and Telegraphy.
NCP. In Novell NetWare, a presentation-
layer procedure used by a server when re-
NetWare DOS Requester A group of
sponding to workstation requests. It in-
Virtual Loadable Modules (VLMs) that
cludes routines for manipulating directories
provide NetWare 3.x and 4.x support for
and files, opening semaphores, printing, and
MS-DOS and Windows workstations. The
creating and destroying service connections.
Requester replaces the NetWare shell used
NetWare Directory Database Abbre- by earlier versions of NetWare.
viated NDD. In Novell NetWare, a system
database that holds the information on all NetWare Hub Services A software
the objects in a Novell Directory Services package from Novell that supports the
(NDS) tree. Often referred to as the Direc- management of any hub card that complies
tory or the Directory tree. with the NetWare Hub Management Inter-
face (HMI) standard.
NetWare Directory Services Abbrevi-
ated NDS. In Novell NetWare, a global NetWare Internet Access Server Ab-
naming service that maintains information breviated NIAS. In Novell NetWare, the
on, and provides access to, every resource server software that translates data requests
on the network, including users, groups, from a client using Internetwork Packet
printers, volumes, and servers. eXchange (IPX) into TCP/IP (Transmission
Control Protocol/Internet Protocol) for con-
NDS manages all network resources as ob-
nection to the Internet or other TCP/IP host.
jects in the NetWare Directory Database
Previously known as NetWare Connect.
(NDD), independent of their actual physi-
cal location, and presents them in a hierar- NetWare/IP A set of NetWare Loadable
chical tree structure. NDS is global to the Modules (NLMs) that provide IP support
network, and information is replicated so for NetWare 3.x and 4.x servers by encap-
that a local failure cannot bring down the sulating the IPX information inside an IP
whole system. datagram. Native TCP/IP support is avail-
NDD replaces the bindery, the system da- able in Novell NetWare 5.x, so this capa-
tabase for earlier releases of NetWare. The bility is not needed in a pure NetWare 5
bindery managed the operation of a single environment. NetWare/IP allows a Novell
NetWare server; NDS supports the whole NetWare server to act as a gateway be-
network, including multiserver networks. tween NetWare and a TCP/IP network.
261
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 262 Thursday, May 4, 2000 11:59 AM
NetWare Link Services Protocol Ab- NetWare for Macintosh A set of Net-
breviated NLSP. The Novell NetWare IPX Ware Loadable Modules (NLMs) used to
(Internetwork Packet eXchange) link-state provide file handling, printing, and Apple-
protocol used by IPX routers to share in- Talk routing for Macintosh clients on a
formation about their routes with other NetWare network.
devices on the network.
See also AppleTalk.
Once the network map is built, information
is transferred between routers only when NetWare Management System A net-
the network changes. NLSP allows large or work management system for Novell Net-
small internetworks to be connected with- Ware servers that has been replaced by
out causing routing inefficiencies. ManageWise.
See also Routing Information Protocol.
See also Novell ManageWise.
NetWare Loadable Module Abbreviat-
NetWare Mobile Services In Novell
ed NLM. Server management programs
NetWare, a dial-in remote access client for
and LAN drivers that run on a server under
Windows 3.x and Windows 95.
Novell NetWare’s network operating sys-
tem. NLMs can be loaded and unloaded dy- NetWare Multiprotocol Router PC-
namically, without interrupting the server, based software from Novell that allows
and provide better service than applications network administrators to connect LANs
that run outside the core operating system. using IPX, TCP/IP, or AppleTalk Filing
Several kinds of NLMs are available: Protocol (AFP) over a wide range of LANs
■
Utilities and application modules allow and WANs. The NetWare Multiprotocol
you to look at or change various configu- Router supports Ethernet, Fast Ethernet,
ration options. These NLMs have the token ring, FDDI, and ARCnet network
.NLM filename extension. architectures.
■
Name-space modules allow non-DOS See also Fiber Distributed Data Interface;
filenaming conventions to be used when Internetwork Packet eXchange; PC-based
storing files. These NLMs have the .NAM router; Transmission Control Protocol/
filename extension. Internet Protocol.
262
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 263 Thursday, May 4, 2000 11:59 AM
NetWare Runtime
NetWare Multiprotocol Router Plus be one HAM for each adapter on the
PC-based software from Novell that pro- server.
vides wide-area connectivity for dispersed ■
Host Adapter Interface (HAI) An API
heterogeneous networks over T1, fraction- within NPA for communication between
al T1, X.25, and low-speed synchronous the HAM and the NetWare database that
leased lines. NetWare Multiprotocol tracks the storage devices and media
Router Plus replaces three earlier prod- available on the server.
ucts: NetWare Link/64, NetWare Link/
T1, and NetWare Link/X.25.
■
Custom Device Module (CDM) The
software that controls the devices at-
See also PC-based router. tached to the adapter, usually provided by
the manufacturer, with the filename ex-
NetWare NFS A Novell NetWare Load- tension .CDM. There may be multiple
able Module (NLM) that adds NFS (Net- CDMs for a single adapter as each device
work File System) server capability to an connected to the adapter needs its own
existing NetWare file server. Once loaded, CDM.
Unix NFS clients see the NetWare server as
another NFS server. ■
Custom Device Interface (CDI) An API
within NPA for communication between
See also Network File System.
the CDM and the NetWare database that
tracks the storage devices and media
NetWare NFS Gateway A Novell Net-
available on the server.
Ware Loadable Module (NLM) that lets a
NetWare server mount a Unix file system as The NPA replaces many of the functions
a NetWare volume. Complete NetWare se- found in the NetWare Loadable Module
curity is maintained, and access to the Unix drivers used to control hard disks; the
system is based on the NetWare client’s .DSK drivers controlled the hard-disk con-
privileges. troller and all the devices attached to that
controller.
NetWare Peripheral Architecture Ab-
breviated NPA or NWPA. A feature of Net- See also NetWare Loadable Module; Virtu-
Ware that allows developers to add and al Loadable Module.
support new storage devices and their asso-
ciated controllers. NPA consists of the fol- NetWare Requester for OS/2 A group
lowing components: of Virtual Loadable Modules (VLMs) that
provide NetWare 4.x support for OS/2-
■
Host Adapter Module (HAM) The based workstations.
adapter-specific driver that controls the
interaction between the operating system NetWare Runtime A single-user version
and the hardware; provided by Novell or of Novell NetWare, often used as a commu-
by the manufacturer of the adapter, with nications server or applications server that
the filename extension .HAM. There will provide its own authentication.
263
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 264 Thursday, May 4, 2000 11:59 AM
NetWare shell
264
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 265 Thursday, May 4, 2000 11:59 AM
an intranet or other private network and In- replaces the Windows NT 4 Dial-up Con-
ternet IP addresses. nections and the Network applet in Control
See also name resolution. Panel.
See also Control Panel.
network administrator The person re-
sponsible for the day-to-day operation and network architecture The design of a
management of a network; also known as a network, including the hardware, software,
system administrator. Duties of the network access methods, and the protocols in use.
administrator can include the following: Several well-accepted network architec-
■
Planning for future expansion tures have been defined by standards com-
■
Installing new workstations and network mittees and major vendors. For example,
peripheral devices the International Organization for Stan-
dardization (ISO) developed the seven-lay-
■
Adding and removing authorized users er OSI Reference Model for computer-to-
■
Backing up the system and archiving im- computer communications, and IBM de-
portant files signed SNA (Systems Network Architec-
■
Assigning and changing passwords ture). Both architectures organize network
functions into layers of hardware and soft-
■
Troubleshooting network problems
ware, with each layer building on the func-
■
Monitoring system performance tions provided by the previous layer.
■
Evaluating new products The ultimate goal is to allow different com-
■
Installing hardware and software updates puters to exchange information freely in as
transparent a fashion as possible.
■
Training users
See also configuration management. Network Associates, Inc. Formed in
1997 by the merger of Network General and
network analyzer Any device that de- McAfee Associates, Network Associates
codes and analyzes data transmitted over provides virus detection and protection soft-
the network. A network analyzer may be ware, encryption software, help desk sys-
hardware, software, or a combination of tems, and network management products.
the two. Some analyzers troubleshoot net- For more information on Network Associ-
work problems by decoding packets; others ates, see www.networkassociates.com.
create and transmit their own packets.
network attached storage Abbreviated
See also protocol analyzer; sniffer.
NAS. A collection of mass-storage devices
Network and Dial-up Connections In contained in a single chassis with a built-in
Microsoft Windows 2000, a special folder operating system.
containing icons used to configure and man- Ethernet connectors allow the NAS to con-
age local area network and other connec- nect directly to the network. A NAS might
tions. Network and Dial-Up Connections contain a large hard disk as well as a set of
265
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 266 Thursday, May 4, 2000 11:59 AM
network backbone
266
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 267 Thursday, May 4, 2000 11:59 AM
See also Network Driver Interface See also Component Object Model; Dis-
Specification. tributed Component Object Model; Dy-
namic Data Exchange; Object Linking and
network directory A directory located Embedding.
on a computer other than the one currently
being used. Depending on access privileges, Network File System Abbreviated
the rest of the disk may or may not be avail- NFS. A distributed file-sharing system de-
able to the user. On the Macintosh, a net- veloped well over a decade ago by Sun Mi-
work directory is often referred to as a crosystems, Inc.
shared folder.
NFS allows a computer on a network to use
See also network drive; shared folder.
the files and peripheral devices of another
network drive A drive located on a com- networked computer as if they were local,
puter other than the one currently being used subject to certain security restrictions. Us-
and that is available to users on the network. ing NFS, you can share files on your system
with other computers running MS-DOS,
See also local disk; network directory.
MacOS, Unix, Novell NetWare, VMS, and
Network Driver Interface Specifica- many other operating systems, in both local
tion Abbreviated NDIS. A device driver and global environments.
specification, originally developed by Mi- NFS is platform-independent and runs on
crosoft and 3Com in 1990, that is indepen- mainframes, minicomputers, RISC-based
dent of both the underlying network workstations, diskless workstations, and
interface card hardware and the protocol personal computers. NFS has been licensed
being used. NDIS also allows multiple pro- and implemented by more than 300 vendors.
tocol stacks to be used at the same time in
the same computer. See also Andrews File System; Common
Internet File System; WebNFS.
Windows NT includes the latest version,
NDIS 3, which is backward-compatible
Network Information Service Abbre-
with the original NDIS and NDIS 2.
viated NIS. A recent name for the security
See also Open Data-link Interface; Open and file-access databases on Unix systems,
Data-link Interface/Network Driver Inter- previously known as the Yellow Pages.
face Specification Support. The NIS for most Unix systems comprises
the Unix host files /etc/hosts, /etc/passwd,
Network Dynamic Data Exchange
and /etc/group.
Abbreviated NetDDE. A version of Micro-
soft’s DDE that uses NetBIOS to extend network interface card Abbreviated
DDE features over a network. NIC. In networking, the PC expansion
Using NetDDE, two or more applications board that plugs into a personal computer
running on networked workstations can or server and works with the network op-
dynamically share data. erating system and the appropriate device
267
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 268 Thursday, May 4, 2000 11:59 AM
network layer
268
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 269 Thursday, May 4, 2000 11:59 AM
newsgroup
269
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 270 Thursday, May 4, 2000 11:59 AM
newsreader
structure, and subject matter are decided by NHRP See Next Hop Resolution
the system administrator. Protocol.
270
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 271 Thursday, May 4, 2000 11:59 AM
271
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 272 Thursday, May 4, 2000 11:59 AM
See also Universal Naming Convention. other platforms, including Microsoft Win-
dows NT.
Novell Authorized Education Center
Abbreviated NAEC. A private organization NDS uses a distributed database known as
that provides Novell-approved training the NetWare Directory Database (NDD) to
courses. keep track of all network objects, including
servers, users, groups, printers, and other
See also NEAP.
networked resources. This information is
Novell BorderManager A network pro- presented to the user as a collection of con-
tection package from Novell that provides a tainers, arranged in a hierarchical structure
firewall, circuit-level gateways, proxy ser- according to the organization or corpora-
vices, and Internet access. tion structure, and is known as the Direc-
tory Tree or simply as the Directory.
Novell Certified Internet Professional
Users no longer log in to a single server; they
Abbreviated NCIP. A certification system
from Novell structured for professionals are authenticated by the network through
who design, build, and maintain Web sites. NDS.
The following specializations are available: See also container object; leaf object; Root
Internet Business Strategist, Web Designer, object.
Intranet Manager, Internet Architect, and
Web Developer. Novell Distributed Print Services Ab-
Novell Connect An add-on product breviated NDPS. A set of printer services
from Novell that allows remote users to dial available for Novell NetWare that stan-
in and access network resources. dardizes and centralizes use and manage-
ment of printers and printing on a network.
See also Novell Connect Services,
NDPS was developed jointly by Novell, Xe-
Novell Connect Services A collection rox, and Hewlett-Packard and allows bidi-
of network products from Novell that are rectional communications with newer
designed to simplify WAN administration; printers, supports drag-and-drop printing
includes Novell NetWare, Novell Directory for text and PostScript files without open-
Services, ManageWise, Novell Connect, ing the creating application, and supports
and NetWare Multiprotocol Router. ISO 10175 Document Printing Architec-
Novell Directory Services Abbreviated ture, Simple Network Management Proto-
NDS. A distributed directory system from col (SNMP), Management Information
Novell, similar in scope and concept to the Base (MIB), and automatically download-
X.500 directory services specification. able printer drivers.
Originally designed for use with Novell Networked printers are administered using
NetWare, NDS is now available for several the NetWare Administrator program.
272
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 273 Thursday, May 4, 2000 11:59 AM
273
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 274 Thursday, May 4, 2000 11:59 AM
the maximum file size is 4GB. Disk mirror- Novell NetWare 5 A 32-bit network op-
ing, disk duplexing, support for optical erating system from Novell. NetWare 5
disks, and UPS-monitoring functions are continues Novell’s transition into open sys-
all available. tems, with native TCP/IP support, a Java
Virtual Machine that runs on the server,
Novell NetWare 4.x A 32-bit network and an enhanced file system.
operating system from Novell announced
Improvements have been made to Novell
in 1993 that builds on the successes of No-
Directory Services (NDS), including the ad-
vell NetWare 3.x.
dition of Lightweight Directory Access Pro-
Its most significant feature was the inclusion tocol (LADP), as well as to the Remote
of Novell Directory Services (NDS), which Access Services for dial-in users. NetWare 5
allowed system administrators to organize also includes WAN Traffic Manager, Se-
users and network resources such as printers cure Sockets Layer (SSL), Novell’s Public
and servers the way people naturally access Key Infrastructure Services, Storage Man-
them. NDS is based on the CCITT X.500 di- agement Services, Netscape’s FastTrack
rectory standard and replaces the bindery Web server, DNS/DHCP services, and a
database in earlier versions of NetWare. Z.E.N.works starter pack.
NetWare 4.x also adds support for optical Novell NetWare Connect See Net-
disks, CD-ROMs, data compression, and Ware Internet Access Server.
improved login security mechanisms. Net-
Novell NetWare Navigator An auto-
Ware 4.1 is the first version of NetWare to
mated software distribution package from
integrate Message Handling Service with
Novell.
the directory, and it also adds System Fault
Tolerance. NetWare 4.x is suitable for larg- Novell Support Connection A techni-
er, multisegment internetworks, supporting cal information service available by sub-
up to 1000 nodes per server. It includes a set scription from Novell.
of user and administrator utilities featuring Two update CDs in a searchable format
a graphical user interface, and it is available are issued periodically, containing all the
in several languages. latest files, patches, device drivers, and
technical information, including product
Novell NetWare 4.x SFT III A network
documentation, Novell Appnotes, Novell
software package from Novell that pro-
Developer Notes, and Novell Labs Certi-
vides fault tolerance and protects against
fication Bulletins.
downtime by integrating two physically
separate servers; if one of the servers fails Novell Z.E.N.works A software man-
for whatever reason, the other takes over agement package from Novell that provides
and continues to support users. desktop management, including hardware
274
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 275 Thursday, May 4, 2000 11:59 AM
NWLink NetBIOS
inventory, and adds flexibility to the desk- a null character indicates the end of a char-
top policy capabilities built into Microsoft acter string.
Windows. Z.E.N.works can also control
the applications a client can run and can op- null modem A short serial cable that
erate the client remotely. connects two personal computers so that
they can communicate without the use of
Z.E.N.works maintains a hardware inven- modems.
tory for each client, which is updated each
The cable connects the two computers’ se-
time the client logs on to the network, and
rial ports, and certain lines in the cable are
includes the desktop operating system, the
crossed over so that the wires used for send-
amount of RAM in the workstation, the ca-
ing by one computer are used for receiving
pacity of the local hard disk, and any con-
data by the other computer.
nected peripherals.
See also modem eliminator.
Z.E.N.works also removes the need to log
on twice—once to the operating system and
NWADMIN A Novell NetWare worksta-
once to the network—under Windows.
tion utility that provides most of the func-
See also Novell ManageWise. tions needed to administer a Novell
NetWare network.
NPA See NetWare Peripheral
Referred to as the Network Administrator
Architecture.
in the Novell documentation, NWADMIN
ns See nanosecond. allows you to create users and groups, cre-
ate, move, delete, and rename Novell Direc-
NSAP See Network Service Access tory Services (NDS) objects, and manage
Point. NDS partitions and volumes.
NTFS See New Technology File System. NWLink IPX/SPX In Microsoft Win-
dows NT, a protocol that implements
NT File System See New Technology Novell’s IPX/SPX protocol.
File System.
See also Internetwork Packet eXchange;
NUI See NetWare Users International. Sequenced Packet Exchange.
null A character that has all the binary NWLink NetBIOS In Microsoft Win-
digits set to zero (ASCII 0) and therefore has dows NT, a protocol that enables Novell
no value. NetBIOS packets to be sent between a No-
vell server running NetBIOS and a Win-
In programming, a null character is used for
dows NT computer.
several special purposes, including padding
fields or serving as a delimiter character. In See also network basic input/output
the C programming language, for example, system.
275
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 276 Thursday, May 4, 2000 11:59 AM
NWPA
NULL MODEM
276
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 277 Thursday, May 4, 2000 11:59 AM
O
Object 1. In Novell Directory Services 3. In object-oriented programming, a
(NDS), a representation of a logical or program consists of a set of related but
physical network resource, including users, self-contained objects that can contain
computers, and printers. An Object has both code and data.
both properties and values and may be a See also container object; leaf object; Net-
Root, leaf, or container object. Ware Directory Services.
2. In Microsoft’s Active Directory, a rep-
object counters In Microsoft Windows
resentation of a network resource, includ-
2000, a container built into each service ob-
ing users, computers, and printers. Objects
ject that counts the number of times an
contain properties for definition and object performs its designated task.
configuration.
Object Linking and Embedding Ab-
See also Active Directory; container object;
breviated OLE, pronounced “oh-lay.” A
leaf object; Organizational Unit; Root ob-
Microsoft protocol for application-to-appli-
ject; Schema. cation exchange and communications using
data objects. From a user standpoint, the
object 1. Any distinct entity. Program main benefit to OLE is that it allows any
objects can represent applications such as OLE-compliant application to display infor-
word processors, spreadsheets, and so on. mation created in a different application.
Folder objects can represent a directory and
Data objects can be either embedded or
contain a group of files, a group of pro-
linked. If the source data in its original form
grams, or a group of other folders. Data-file
is actually stored inside the other applica-
objects can include information such as text,
tion program’s data file, the data is embed-
memos, letters, spreadsheets, video, and
ded. In this case, there are two separate
sound. Device objects can be printers, fax
copies of the data: the original data and the
modems, plotters, servers, and CD-ROMS. embedded copy. Any changes made to the
2. In Object Linking and Embedding original document will not be made in the
(OLE), an object can be any user-selected compound document unless the embedded
group of data, such as a block of text, a set object is updated.
of spreadsheet cells, a chart, a sound, or a If the data still exists in a separate file and
graphical image. This data can be embed- a set of pointers to this data is stored in the
ded in or linked to another document cre- other application program’s data file, the
ated by a different OLE application. data is linked. In this case, only one copy of
277
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 278 Thursday, May 4, 2000 11:59 AM
object-oriented
the data exists; any changes made in the These objects interact with other objects
original document will be made automati- by passing messages. Object-oriented
cally in the compound document. programming also lets you create proce-
dures that work with objects whose exact
To determine whether an application sup-
type may not be known until the program
ports OLE, check the Edit menu for com-
actually runs.
mands such as Paste Link, Paste Special,
and Insert Object. If these commands are In object-oriented programming, each object
present, the application supports OLE. contains both data and code and is complete-
See also OpenDoc.
ly self-contained. The program incorporates
an object by making it part of a layered hi-
object-oriented An over-used term that erarchy. Object-oriented programming is
can be applied to any computer system, op- the result of many years of theoretical devel-
erating system, programming language, ap- opment, and many consider it the current ex-
plication, or graphical user interface that tension of the theory behind modular
supports the use of objects. programming, in which code is combined
into reusable modules.
See also object-oriented programming.
Object Request Broker Abbreviated
object-oriented graphics Graphics ORB. A communications mechanism used
that are constructed from individual com- in an object-oriented distributed comput-
ponents, such as lines, arcs, circles, and ing environment in which program mod-
squares. ules can be written in any programming
language and still provide services to other
The image is defined mathematically rather
applications.
than as a set of dots, as in a bitmapped graph-
ic. Object-oriented graphics are used in illus- An object makes a request and sends it to
tration, drawing, and CAD (computer-aided the ORB. The ORB locates the requested
design) programs and are also known as vec- object and establishes communications be-
tor graphics or structured graphics. tween client and server. The receiving ob-
Object-oriented graphics allow the user to ject then responds to the request and sends
manipulate a part of an image without re- a response to the ORB, which, in turn,
drawing. Unlike bitmapped graphics, all or sends the response to the original requester.
parts of object-oriented graphics can be re- The physical location of the object that pro-
sized or rotated without introducing any vides the response is unimportant, and to the
distortion. user, the application appears seamless, even
though the various services may be coming
object-oriented programming Abbre-
from several different parts of the network.
viated OOP. A programming model that
views a program as a set of self-contained The ORB standard is defined by the Object
objects. Management Group, an industry consortium
278
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 279 Thursday, May 4, 2000 11:59 AM
offline reader
279
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 280 Thursday, May 4, 2000 11:59 AM
OLAP
newsgroup the next time you connect to various services. Online services fall into
your service provider. these main groups:
See also newsgroup; newsreader; Usenet. ■
Commercial services Services such as
America Online charge a monthly mem-
OLAP See online analytical processing. bership fee for access to online forums,
OLE See Object Linking and e-mail services, software libraries, and on-
Embedding. line conferences.
■
Internet The Internet is a worldwide
OLTP See online transaction
network of computer systems and is not
processing.
always easy to use, but the wealth of in-
online 1. Most broadly, any work done formation available is staggering. The
on a computer instead of by more tradition- main problem for casual users is that there
al manual means. is no central listing of everything that is
available.
2. Any function available directly on a com-
puter, such as an application’s help system. ■
Specialist databases Specific databases
3. Describes a peripheral device, such as a
aimed at researchers can be accessed
printer or a modem, when it is directly con- through online services such as Dow Jones
nected to a computer and ready to operate. News/Retrieval for business news and
Lexis and Nexis for legal information and
4. In communications, describes a comput- news archives.
er connected to a remote computer over a
network or a modem link. online transaction processing Abbre-
See also offline. viated OLTP. A business system that oper-
ates in real time, collecting and posting
online analytical processing Abbrevi- transaction-related data and making
ated OLAP. A category of software used to changes to shared databases.
analyze historical business data to find A transaction is a single, discrete unit of
previously hidden patterns. work, which is normally part of a business
Analysts use OLAP software to view data in process. Examples of OLTP systems include
a multidimensional form, rather than in the airline and hotel reservation systems, inven-
more usual two-dimensional row and col- tory control systems, and banking systems.
umn format. In a multidimensional format, See also transaction processing.
the intersection of important data is much
more obvious, and data is easier to group OOP See object-oriented programming.
and categorize.
open architecture A vendor-indepen-
See also data mining; data warehousing.
dent design that is publicly available and
online service A service that provides an well understood within the industry.
online connection via modem for access to See also closed architecture.
280
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 281 Thursday, May 4, 2000 11:59 AM
281
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 282 Thursday, May 4, 2000 11:59 AM
Open Desktop
282
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 283 Thursday, May 4, 2000 11:59 AM
Optical Carrier
For more information on Open Group, see while this mainstream software is certainly
www.opengroup.com. configurable, it is basically a take-it-or-
leave-it package.
OpenServer A scalable set of Unix-
based products from SCO, including the See also Free Software Foundation; Linux.
Desktop System, Host System, and Enter-
Open Systems Interconnect See OSI
prise System, based on SVR2 but contain-
Reference Model.
ing many significant SVR4 enhancements.
The Desktop System is a single-user, multi- OpenView A popular network manage-
tasking system with MS-DOS and Win- ment package from Hewlett-Packard that
dows emulations, TCP/IP, and Internet includes Network Node Manager, Event
connectivity. Correlation Services, a Java-based Web
user interface, Open Database Connectiv-
The Host and Enterprise systems provide
ity (ODBC) integration, and other support
high-performance scalable servers for Intel-
services. OpenView is available on HP-
based platforms, supporting more than
UX, a Unix variant, and on Microsoft
8,000 applications, and with extensive net-
Windows NT.
working support, UPS (uninterruptible
power supply), and advanced power man- operating system Abbreviated OS. The
agement support. software responsible for allocating system
See also Open Desktop. resources, including memory, processor
time, disk space, and peripheral devices
Open Shortest Path First Abbreviated such as printers, modems, and monitors.
OSPF. A routing protocol used on TCP/IP All applications use the operating system to
networks that takes into account network gain access to these resources as necessary.
loading and bandwidth when routing infor- The operating system is the first program
mation over the network. Routers maintain loaded into the computer as it boots, and it
a map of the network and swap informa- remains in memory throughout the session.
tion on the current status of each network See also kernel; microkernel; network
link. OSPF incorporates least-cost routing, operating system.
equal-cost routing, and load balancing.
See also Routing Information Protocol.
Optical Carrier Abbreviated OC. A set
of Synchronous Optical Network (SONET)
open source software Any software hierarchies that define how digital signals
package that includes the original source are multiplexed over fiber-optic cable.
code from which the product was originally SONET is the physical-layer standard used
created. by telephone carriers to connect long-
Open source software allows knowledge- distance services. Table O.1 lists the OC
able users to make changes to the way the levels and related data rates.
software actually works, unlike products See also digital signal; Synchronous
from mainstream software developers Optical Network; Synchronous Digital
which never include the source code. And Hierarchy.
283
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 284 Thursday, May 4, 2000 11:59 AM
OC-1 51.84
OC-3 155.52
OC-6 311.04
OC-9 466.56
OC-12 622.08
OC-18 933.12
OC-24 1244.16
OC-36 1866.24
OC-48 2488.32
OC-96 4976.00
OC-192 9952.00
284
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 285 Thursday, May 4, 2000 11:59 AM
Organizational Unit
Oracle Corporation A major developer owners, and that files and other system re-
of powerful relational database software, sources be protected from other processes
client/server development tools, and other that might corrupt them.
related products for multiuser enterprise
According to the standard, a C2 compliant
computing.
workstation cannot be connected to a net-
For more information on Oracle, see work. Secure networking is defined in
www.oracle.com. “Trusted Network Interpretation,” which
is known as the Red Book.
Oracle NCA See Oracle Network Com-
puting Architecture. See also security.
285
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 286 Thursday, May 4, 2000 11:59 AM
Organizational Unit object In Novell OS/2 client Any computer running OS/2
Directory Services (NDS), a container ob- that connects to a network server. OS/2 cli-
ject below the Organization object. The Or- ent workstations support TCP/IP, IPX/SPX,
ganizational Unit object can contain other NetBIOS, and named pipes.
Organizational Unit objects or leaf objects.
This container is not a required container, OS/2 Warp Server A network operat-
but its use allows better management of ing system, based on LAN Server 4, from
workgroups or project teams. IBM. It provides network services, system
management services, remote access, stan-
original equipment manufacturer dard file-sharing and network print servic-
Abbreviated OEM. The original manufac- es, support for up to 1,000 users, and secure
turer of a hardware subsystem or compo- Internet access.
nent. For example, Canon makes the print
As an application server, OS/2 Warp Server
engine used in many laser printers, includ-
supports Microsoft Windows and Windows
ing those from Hewlett-Packard (HP); in
NT applications and can support OS/2,
this case, Canon is the OEM, and HP is a
MS-DOS, Windows, Windows NT, AIX,
value-added reseller (VAR).
and Macintosh clients. All the important
OS See operating system. network protocols are available, including
TCP/IP, NetBIOS, and IPX.
OS/2 A 32-bit multitasking operating sys-
tem from IBM that runs on Intel processors. OSF Abbreviation for Open Software
Foundation. See Open Group.
OS/2 was developed jointly by Microsoft
and IBM as the successor to MS-DOS, OSI Reference Model A networking ref-
with Windows as a stop-gap measure until erence model defined by the ISO (Interna-
OS/2 was ready. When Microsoft chose to tional Organization for Standardization)
back Windows, placing considerable re- that divides computer-to-computer commu-
sources behind the breakthrough release nications into seven connected layers. Such
of Windows 3, IBM took control of OS/2 layers are known as a protocol stack.
development.
Each successively higher layer builds on the
The current version of OS/2 Warp includes
functions of the layers below, as follows:
voice-recognition software, Internet access,
and peer-to-peer networking. It supports ■
Application layer 7 The highest level of
Novell Directory Services (NDS) and in- the model. It defines the manner in which
cludes IBM Personal Communications/ applications interact with the network, in-
3270, a package used to communicate with cluding database management, e-mail,
Systems Network Architecture (SNA) sys- and terminal-emulation programs.
tems over TCP/IP networks. ■
Presentation layer 6 Defines the way in
IBM’s server for network environments is which data is formatted, presented, con-
OS/2 Warp Server. verted, and encoded.
286
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 287 Thursday, May 4, 2000 11:59 AM
OSx
■
Session layer 5 Coordinates communi- ■
Data-link layer 2 Validates the integrity
cations and maintains the session for as of the flow of data from one node to an-
long as it is needed, performing security, other by synchronizing blocks of data and
logging, and administrative functions. controlling the flow of data.
■
Transport layer 4 Defines protocols for
■
Physical layer 1 Defines the mechanism
for communicating with the transmission
structuring messages and supervises the
medium and interface hardware.
validity of the transmission by performing
some error checking. OSPF See Open Shortest Path First.
■
Network layer 3 Defines protocols for OSx A version of Unix from Pyramid
data routing to ensure that the information Technology that includes elements of both
arrives at the correct destination node. AT&T and BSD systems.
287
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 288 Thursday, May 4, 2000 11:59 AM
out-of-band signaling
288
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 289 Thursday, May 4, 2000 11:59 AM
packet filtering
P
P See peta-. packet assembler/disassembler Ab-
breviated PAD. A device that is connected
PABX See private automatic branch to a packet-switched network and that con-
exchange.
verts a serial data stream from a character-
PACE See Priority Access Control oriented device, such as a bridge or a router,
Enabled. into packets suitable for transmission. It
also disassembles packets back into charac-
Packard Bell NEC Major manufacturer ters for transmission to the character de-
of PCs and servers; manages all NEC Cor- vice. PADs are often used to connect a
poration’s computer manufacturing outside terminal or computer to an X.25 packet-
Japan. Packard Bell has recently established switched network.
a configure-it-yourself direct sales promo-
tion known as NEC Now. Packet Burst Protocol Abbreviated
PBP. A Novell NetWare protocol built on
For more information on Packard-Bell, see
www.packardbell.com. top of IPX that speeds up the transfer of
multipacket NetWare Core Protocol (NCP)
See also NEC Corporation. data transfers between a workstation and a
server by removing the need to sequence
packet Any block of data sent over a net-
and acknowledge every packet. Using PBP,
work or communications link.
a workstation or server can transmit a burst
Each packet may contain sender, receiver, of packets before requiring an acknowledg-
and error-control information, in addition ment, thus reducing network traffic.
to the actual message, which may be data,
See also Internetwork Packet eXchange.
connection management controls, or a re-
quest for a service. Packets may be fixed- or
packet filtering A process used by bridges
variable-length, and they will be reassem-
bled if necessary when they reach their des- to limit protocol-specific traffic to one seg-
tination. The actual format of a packet ment of the network, to isolate e-mail do-
depends on the protocol that creates the mains, and to perform other traffic-control
packet; some protocols use special packets functions. The network administrator sets the
to control communications functions in ad- packet-filtering specifications for each bridge.
dition to data packets. If a packet matches the specifications, the
bridge can either accept it or reject it.
See also datagram; frame; packet
switching. See also application-level filter; firewall.
289
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 290 Thursday, May 4, 2000 11:59 AM
packet-level filter
See also application-level filter; firewall. An addressed packet is routed from node to
node until it reaches its destination, al-
Packet-level Procedure Abbreviated though related packets may not all follow
PAP. An X.25 full-duplex protocol for the the same route to that destination. Because
transfer of packets between a computer and long messages may be divided into several
a modem. packets, packet sequence numbers are used
to reassemble the original message at the
packet signature See NCP packet destination node.
signature.
The standard for packet-switching net-
packet sniffer A program used by an in- works is defined in CCITT recommenda-
truder to monitor a data stream for a pat- tion X.25. The Internet is an example of a
tern such as a password or credit card packet-switching network.
number. See also Consultative Committee for Inter-
Packet sniffers also have a more salutary pur- national Telephony and Telegraphy; pack-
pose when used for network analysis and et-switched network.
troubleshooting by the system administrator.
PAD See packet assembler/disassembler.
See also network analyzer; protocol
analyzer. page A single document available on the
World Wide Web or on a corporate intra-
packet-switched network A network net. A page can contain any combination of
that consists of a series of interconnected text, graphics, animated graphics, audio,
circuits that route individual packets of and video and can be static or dynamic.
data over one of several routes, offering
See also HyperText Markup Language.
flexibility and high reliability.
A packet-switched network may also be page fault In Microsoft Windows, the
called connectionless because it contains fault that occurs when Windows attempts
290
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 291 Thursday, May 4, 2000 11:59 AM
parallel processing
to read to or write from a virtual memory PAP See Packet-level Procedure; Pass-
location that is designated not present. word Authentication Protocol; Printer Ac-
cess Protocol.
In Microsoft Windows Task Manager, the
number of times information is read from parallel communications The trans-
disk because it was not present in memory. mission of information from computer to
computer or from computer to peripheral
page-mode RAM A memory-manage- device, in which all the bits that make up the
ment technique used to speed up the perfor- character are transmitted at the same time
mance of dynamic RAM (DRAM). over a multiline cable.
In a page-mode memory system, the mem- See also serial communications.
ory is divided into pages by specialized
DRAM chips. Consecutive accesses to parallel port An input/output (I/O) port
that manages information eight bits at a
memory addresses in the same page result in
time; often used to connect a parallel printer.
a page-mode cycle that takes about half the
time of a regular DRAM cycle. See also parallel communications; RS-232-
C; serial communications; serial port.
paged memory management unit
parallel processing A computing meth-
Abbreviated PMMU. A specialized chip de-
od that can be performed by systems con-
signed to manage virtual memory. High-end
taining two or more processors operating
processors, such as the Motorola 68040 and
simultaneously. In parallel processing, all
the Intel Pentium, have all the functions of a
processors work on different aspects of the
PMMU built into the chip itself.
same program at the same time, in order to
See also virtual memory. share the computational load.
Parallel-processing computers can achieve
paging file In Microsoft Windows 2000, incredible speeds. The Cray X-MP48 peaks
a hidden file used to hold programs and at 1000 million floating-point operations
data files that will not currently fit into per second (1000 MFLOP) using four ex-
memory. The paging file, along with an tremely powerful processors, and parallel-
area of physical memory, make up the vir- hypercube systems, first marketed by Intel,
tual memory system. In most other operat- can exceed 65,536 processors with speeds
ing systems, the paging file is known as the of up to 262 billion floating-point opera-
swap file. tions per second (262 GFLOP).
In all but the most trivial parallel-processing
PalmPilot The hand-held computer from
applications, the programmer or the operat-
3Com Corporation, which has proved to be
ing system must assign approximate proces-
extremely popular, with more than 1 mil-
sor loads; otherwise, it is possible for non-
lion units sold to date.
optimized systems to fail to take advantage
See also 3Com Corporation. of the power available and, in the worst case,
291
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 292 Thursday, May 4, 2000 11:59 AM
parent directory
run more slowly than on single-processor bit is set to zero; if it is even, the parity bit
systems. is set to one.
All this speed is used for applications such ■
Even If the sum of all the 1 bits is even,
as weather forecasting, in which the predic- the parity bit must be set to zero; if it is
tive programs can take as long to run as the odd, the parity bit must be set to one.
weather actually takes to arrive, 3-D seis- ■
Mark The parity bit is always set to one
mic modeling, groundwater and toxic flow and is used as the eighth bit.
studies, and the modeling of full-motion
dinosaur images used in movies.
■
Space The parity bit is set to zero and is
used as the eighth bit.
See also asymmetrical multiprocessing;
symmetrical multiprocessing.
■
None If parity is set to none, there is
no parity bit, and no parity checking is
parent directory In a hierarchical direc- performed.
tory system, such as that used by MS-DOS, The parity settings used by both communi-
OS/2, Windows, and Unix, the directory cating computers must match. Most online
immediately above the current directory. services, such as CompuServe or America
The special symbol .. is shorthand for the Online, use no parity and an 8-bit data word.
name of the parent directory.
See also asynchronous transmission;
See also period and double-period parity checking; parity error.
directories.
parity bit An extra or redundant bit used
parent domain In Microsoft Windows to detect data transmission errors.
2000 Server, any domain that has another
See also parity.
domain subordinate to it.
See also domain; first-layer domain. parity checking A check mechanism ap-
plied to a character or a series of characters
parent object In Novell Directory Ser- that uses the addition of extra or redundant
vices (NDS), an object that contains anoth- parity bits.
er object. This term is relative, because any
Parity checking is useful for a variety of pur-
particular parent object also has parent ob-
poses, including asynchronous communica-
jects of its own and can be considered a
tions and computer memory coordination.
child object from a certain perspective.
See also parity.
parity In communications, a simple form
of error checking that uses an extra or redun- parity error A mismatch in parity bits
dant bit after the data bits but before the stop that indicates an error in transmitted data.
bit or bits. Parity may be set as follows:
See also parity.
■
Odd Indicates that the sum of all the 1
bits in the byte plus the parity bit must be partition 1. A portion of a hard disk that
odd. If the total is already odd, the parity the operating system treats as if it were a
292
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 293 Thursday, May 4, 2000 11:59 AM
password
separate drive. In Windows, a hard disk can the network, sometimes at the expense of
be divided into several partitions. A prima- distance.
ry partition, generally assigned the drive let- See also active hub.
ter C, might contain files that start the
computer. You could also create a non- passive termination A method used to
Windows partition and use it for a different terminate a Small Computer System Inter-
operating system. In Novell NetWare, a face (SCSI) chain of devices. Passive termi-
server must have a NetWare partition de- nation is a simple termination method that
fined in order to function as a part of the works best with four or fewer devices on a
NetWare file system. Other partitions can SCSI daisy chain.
manage file systems used by other operating
See also active termination; forced perfect
systems.
termination; Small Computer System
2. In Novell NetWare, a grouping or col- Interface.
lection of objects in the Novell Directory
Services (NDS) database. Each partition pass-through authentication In Mi-
consists of a container object, all the ob- crosoft Windows NT, an authentication
jects in it, and data about all those objects. method used when the user account must be
Partitions do not include any information authenticated, but the computer used for the
about the file system or the directories or logon is neither the domain controller for
files contained there. The data in a parti- the account nor the computer on which the
tion is also known as a replica. user account is defined. In such a case, the
computer used for the logon passes the
See also disk mirroring; leaf object; replica;
logon information through to the domain
replication; Root object; volume.
controller where the user account is defined.
partition table 1. An area of storage on See also domain; domain controller; user
a hard disk that contains information account.
about the partitions the disk contains. This
password A security method that identi-
information is usually recorded during the
fies a specific, authorized user of a comput-
initial preparation of the hard disk before
er system, a network, or a resource by a
it is formatted.
unique string of characters.
2. In Novell Directory Services (NDS), a
In general, passwords should be a mixture
list on each server containing the NDS rep-
of upper- and lowercase letters and num-
licas. For each replica on the server, the par-
bers and should be more than six charac-
tition table contains the partition name,
ters. Here are some general guidelines:
type, time stamp, and partition state.
■
Passwords should be kept secret and
passive hub A device used in some changed frequently. The worst passwords
networks to split a transmission signal, are the obvious ones: people’s names or
allowing additional hubs to be added to initials, place names, phone numbers,
293
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 294 Thursday, May 4, 2000 11:59 AM
birth dates, and anything to do with com- password encryption In certain operat-
puters or Star Trek. There are a limited ing systems, the password you enter to gain
number of words in the English language, access to the system is not stored as ordinary
and it is easy for a computer to try them all text, but is encrypted, and this encrypted
relatively quickly. form is compared against the encrypted
■
Change all passwords every 90 days, and password stored on the server. If the two
change those associated with high-securi- match, the logon continues; if not, the logon
ty privileges every month. Some network attempt is rejected.
operating systems require that passwords See also Challenge-Handshake Authenti-
expire even more frequently. For exam- cation Protocol; Password Authentication
ple, in NetWare 5, passwords expire after Protocol.
40 days by default.
password protection The use of one or
■
Some systems provide default pass-
more passwords to prevent unauthorized
words, such as MANAGER, SERVICE,
access to computer systems.
or GUEST, as part of the installation pro-
cess. These default passwords should be patch panel A panel, usually located in a
changed immediately. wiring closet, that contains rows of tele-
■
Limit concurrent sessions to one per phone-type modular jacks. A patch panel
system. allows the network administrator to con-
■
Do not allow more than two or three nect, disconnect, move, and test network
invalid password attempts before devices by changing these connections.
disconnecting. path The complete location of a directory
■
Do not allow generic accounts. or a file in the file system. Also called path-
■
Promptly remove the accounts of trans- name or directory path.
ferred or terminated people, as well as all See also Universal Naming Convention.
unused accounts.
pathname See path.
■
Review the security log files periodically.
See also authentication; Challenge- Payload Type Identifier Abbreviated
Handshake Authentication Protocol; PTI. In an Asynchronous Transfer Mode
Password Authentication Protocol. (ATM) cell, a field contained in the 5-byte
cell header that defines the type of informa-
Password Authentication Protocol tion in the payload area, including user, net-
Abbreviated PAP. A security protocol that work, and management information.
requires a user to enter a user name and
See also Cell Loss Priority; Header Error
password before gaining access to a secure
Control; Virtual Channel Identifier; Virtual
server.
Path Identifier.
See also Challenge-Handshake Authenti-
cation Protocol. PB See petabyte.
294
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 295 Thursday, May 4, 2000 11:59 AM
PC-DOS
295
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 296 Thursday, May 4, 2000 11:59 AM
PCI local bus See Peripheral Compo- PC Service and Support Certified Pro-
nent Interconnect local bus. fessional A certification from Learning
Tree designed for the technician. Courses
PCI-X A revision to the PCI standard pro- and exams cover basic PC assembly and
posed by IBM, Hewlett-Packard, and Com- troubleshooting, installation and configu-
paq that increases the bus width to 64 bits, ration of operating systems and peripher-
the bus speed to 133MHz, and the maxi- als, and optimization of networks.
mum throughput to 1GB per second. This
PDA See personal digital assistant.
revision is aimed at future workstation and
server design. PDF See Portable Document Format.
Several vendors also offer hot-plug PCI PDN See private data network; public
slots that allow you to replace a failed com- data network.
ponent without a system reboot.
Peak Cell Rate Abbreviated PCR. In
See also 1394; local bus; Peripheral Com- Asynchronous Transfer Mode (ATM), the
ponent Interconnect local bus; Plug and maximum cell rate that a specific data
Play; Universal Serial Bus. source on the network can sustain.
See also Asynchronous Transfer Mode;
PCMCIA See PC Memory Card Interna-
Available Cell Rate; Minimum Cell Rate;
tional Association.
Sustainable Cell Rate.
PCMCIA slot See PC Card slot.
peer-to-peer architecture A network
PC Memory Card International architecture in which two or more nodes
Association Abbreviated PCMCIA. A can communicate with each other directly,
nonprofit association, formed in 1989, with without the need for any intermediary de-
more than 320 members in the computer vices. In a peer-to-peer system, a node can
and electronics industries, that developed a be both a client and a server.
standard for credit-card-sized, plug-in See also peer-to-peer network.
adapters designed for portable computers.
peer-to-peer network A LAN in which
PCONSOLE A Novell NetWare worksta- drives, files, and printers on each PC can be
tion utility used to set up and manage print available to every other PC on the network,
queues and print servers on the network. eliminating the need for a dedicated file serv-
er. Each PC can still run local applications.
See also NetWare Administrator.
Peer-to-peer networks introduce their own
PCR See Peak Cell Rate. system management problems, including
administration and responsibility for sys-
PCS See Personal Communications tem backup, reliability, and security. Peer-
Services. to-peer systems are often used in relatively
296
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 297 Thursday, May 4, 2000 11:59 AM
Pentium Pro
small networks, with two to ten users, and to execute more than one instruction per
can be based on MS-DOS, Windows, or clock cycle.
Unix. Performance is not usually as good on Available in a range of clock speeds, from
a peer-to-peer network as under the client/ 233MHz all the way up to 450MHz, the
server model, especially under heavy traffic Pentium II can use a 100MHz system bus
loads. and is equivalent to 7.5 million transistors,
See also client/server architecture. more than twice that of the Pentium.
See also Intel Corporation; Pentium;
PEM See Privacy Enhanced Mail. Pentium Pro.
297
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 298 Thursday, May 4, 2000 11:59 AM
PeopleSoft, Inc.
architecture and pipelines and contains the rectory immediately above the current
equivalent of 5.5 million transistors. directory.
Dynamic execution (a combination of See also parent directory; root directory.
branch prediction and speculative execu-
tion) allows the processor to anticipate Peripheral Component Interconnect
and schedule the next instructions for ex- local bus Abbreviated PCI local bus. A
ecution. Pentium Pro offers up to 1MB of specification introduced by Intel in 1992
Level 2 cache that runs at the same speed for a local bus that allows up to 10 PCI-
as the processor. compliant expansion cards to be plugged
See also Intel Corporation; Pentium; into the computer. One of these expansion
Pentium II. cards must be the PCI controller card, but
the others can include a video card, net-
PeopleSoft, Inc. A major developer of work interface card, SCSI interface, or any
large enterprise resource planning (ERP) other basic function.
applications for finance, materials and in- The PCI controller exchanges information
ventory management, distribution, human with the computer’s processor, either 32 or
resources, and manufacturing, all within a 64 bits at a time, and allows intelligent PCI
single computing environment. adapters to perform certain tasks concur-
For more information on PeopleSoft, see rently with the main processor by using
www.peoplesoft.com. bus-mastering techniques.
298
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 299 Thursday, May 4, 2000 11:59 AM
Perl is rapidly becoming the system admin- are not numbered continuously; they are
istrator’s answer to all those problems that numbered only within each command. This
a C program does not seem to fit. It does not makes it easy to add or remove pages as re-
have the arbitrary limitations of other lan- quirements change, but it can make it diffi-
guages, so lines can be of any length, arrays cult to find specific information. The
can be of any size, variable names can be as permuted index is the solution.
long as you care to make them, and binary The permuted index has three columns. The
data does not cause problems. central column, where you start your
permanent swap file A swap file that, search, is in alphabetic order. The column
once created, is used over and over again. to the right lists the command that performs
This file is used in virtual memory opera- the function and the section number in the
tions, in which hard-disk space is used in man pages where you will find a detailed
place of RAM. description, and the column on the left con-
tains additional keywords to help confirm
See also temporary swap file.
that you have found the correct entry.
permanent virtual circuit Abbreviated See also man pages.
PVC. A permanent communications cir-
cuit, created and maintained even when no Personal Communications Services
data is being transmitted. Abbreviated PCS. A digital wireless com-
A PVC has no setup overhead and gives im- munications technology that includes
proved performance for periodic transmis- voice, data, and video.
sions that require an immediate connection. PCS competes with the traditional analog
Packets are transferred in order over a spe- cellular phone system, but PCS’s digital tech-
cific path and arrive at their destination in nology can provide clearer voice quality, bet-
the same order. ter security through encryption, and lower
See also switched virtual circuit. costs, as well as additional services such as
messaging, voice mail, and caller ID.
permissions In a network or multiuser
Personal Computer Disk Operating
environment, the ability of a user to access
System Abbreviated PC-DOS. The ver-
certain system resources, including files and
sion of the DOS operating system supplied
directories. Permissions are based on the
with PCs made by IBM.
rights given to user accounts by the system
administrator. PC-DOS and MS-DOS began as virtually
identical operating systems, with only a few
See also rights.
minor differences in device driver names
permuted index A special kind of index and file sizes, but after the release of DOS 6
used in several of the Unix system manuals. (MS-DOS 6.2 and PC-DOS 6.1), the two
Many of the Unix manuals treat each com- grew much further apart.
mand on a separate page, and these pages See also Microsoft Disk Operating System.
299
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 300 Thursday, May 4, 2000 11:59 AM
Personal NetWare Novell’s peer-to- physical drive A real drive in the com-
puter that you can see or touch, as opposed
peer network replacement for NetWare Lite,
to a conceptual or logical drive. One phys-
released in 1994, that provides MS-DOS
ical drive may be divided into several logical
and Microsoft Windows users with the abil-
drives, which are parts of the hard disk that
ity to share files, printers, CD-ROMs, and
function as if they were separate disk drives.
other resources, as well as run standard net-
work applications. Other features include See also partition; volume.
simplified network administration, in-
physical layer The first and lowest of
creased security, and a single login so that
the seven layers in the OSI Reference Mod-
users can view or access all network resourc-
el for computer-to-computer communica-
es at once. tions. The physical layer defines the
Personal NetWare can manage a maximum physical, electrical, mechanical, and func-
of 50 workstations per server and a maxi- tional procedures used to connect the
mum of 50 servers on each network, giving equipment.
a maximum of 2500 nodes per network. See also OSI Reference Model.
300
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 301 Thursday, May 4, 2000 11:59 AM
pipeline
physical unit Abbreviated PU. The rules for packet size and content, designed
name used in IBM’s Systems Network Ar- to crash the receiving computer.
chitecture (SNA) to indicate a physical de- See also brute-force attack; denial of ser-
vice and its associated resources within the vice attack; dictionary attack.
network.
See also logical unit. pinouts The configuration and purpose
of each pin in a multipin connector.
PIM See Personal Information Manager.
pipe A section of memory that can be
pin-compatible A description of a chip used by a program or a command to pass in-
or other electronic component with con- formation to a second command for pro-
necting pins exactly equivalent to the con- cessing. The information is stored in a first-
necting pins used by a different device. With in first-out basis and is not altered during
a pin-compatible chip, you can easily up- transmission. A pipe is opened like a file
grade a system by replacing the older chip and is read from or written to in the same
with the newer version. way; pipes are also unidirectional in that
one pipe is used to read data and another is
See also plug-compatible.
used to write data.
Ping Acronym formed from packet inter- A special form of pipe, known as a named
net groper. A TCP/IP command used to test pipe, originated in the Unix operating sys-
for network connectivity by transmitting a tem. A named pipe allows two processes to
special ICMP (Internet Control Message exchange information. This concept has
Protocol) diagnostic packet to a specific been extended in several network operating
node on the network, forcing the node to systems as a method of interprocess commu-
acknowledge that the packet reached the nication, allowing data to be exchanged be-
correct destination. If the node responds, tween applications running on networked
the link is operational; if not, something is computers.
wrong. The word ping is often used as a
See also mailslots; named pipe; sema-
verb, as in “ping that workstation to see if
phore; shared memory; socket.
it’s alive.”
Ping is designed for network testing, trou- pipeline A mechanism used in micro-
bleshooting, and measurement, and be- processors that speeds up the processing of
cause of the large load it can impose on a instructions.
busy, working network, it should not be The Intel Pentium processor features two
used during normal operations, unless the pipelines, one for data and one for instruc-
system administrator is tracing a specific tions, and can process two instructions per
problem on the network. clock cycle. A processor with two or more
ping of death A very large, specially pipelines is said to be superscalar.
constructed ICMP packet that violates the See also superscalar.
301
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 302 Thursday, May 4, 2000 11:59 AM
pipeline burst cache A secondary or L2 and read easily while in transit; usually ap-
cache associated with a microprocessor plied to an unencrypted password.
that allows fast data-transfer rates. Pipeline See also cleartext.
burst cache requires RAM chips that can
synchronize with the microprocessor’s platform 1. An operating system envi-
clock. ronment, such as a NetWare platform or a
Unix platform.
pipeline stall A microprocessor design
error that leads to delays in the processing 2. A computer system based on a specific
of an instruction. microprocessor, such as an Intel-based plat-
form or a PowerPC-based platform.
pipelining 1. In processor architecture,
a method of fetching and decoding instruc- platform-specific routers Routers
tions that ensures that the processor never based on a specific and proprietary hard-
needs to wait; as soon as one instruction is ware architecture, which is usually vendor-
executed, the next one is ready. specific.
2. In parallel processing, the method used player A small program launched or used
to pass instructions from one processing by a Web browser to process a specific type
unit to another. of file that the browser cannot handle. A
player is a program that deals with sound
See also parallel processing.
files.
PKI See Public Key Infrastructure. See also helper; plug-in; viewer.
PKUNZIP A very popular file decompres- plenum cable Cable with a special Teflon
sion utility available as shareware. PKUN- coating designed for use in suspended ceil-
ZIP uncompresses files or archives created ings, in inside walls, or between floors.
by PKZIP; both programs are usually avail-
The Teflon coating provides low flame-
able together.
spread and low, nontoxic smoke in the case
See also PKZIP; WinZip. of an accident. Plenum cables should meet
the CMR (Communications Riser Cable) or
PKZIP A very popular file compression CMP (Communications Plenum Cable)
utility available as shareware. PKZIP not specifications of the National Electric Code
only compresses files to save disk space or and are often used for cable runs in air-
cut modem transmission times, but also return areas.
combines compressed files to create com-
See also riser cable.
pressed archives.
See also PKUNZIP; WinZip. Plug and Play Abbreviated PnP. A stan-
dard from Compaq, Microsoft, Intel, and
plaintext Text that has not been encrypt- Phoenix that defines techniques designed
ed in any way and that can be intercepted to make PC configuration simple and
302
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 303 Thursday, May 4, 2000 11:59 AM
Point-to-Point Protocol
automatic. A user can plug in a new device, new file types or content. Plug-ins are avail-
and the operating system will recognize it able from a huge number of companies and
and configure it automatically when the are usually free.
system is next started. See also helper.
PnP adapters contain configuration infor-
mation stored in nonvolatile memory, PMMU See paged memory manage-
which includes vendor information, serial ment unit.
number, and checksum information. The
PNNI See Private Network-to-Network
PnP chipset allows each adapter to be iso-
Interface.
lated, one at a time, until all cards have been
properly identified by the operating system. PnP See Plug and Play.
The PnP-compatible BIOS isolates and POH See power-on hours.
identifies PnP cards at boot time, and when
you insert a new card, the BIOS performs an PointCast, Inc. The largest privately
auto-configuration sequence enabling the held media company on the Internet, pro-
new card with appropriate settings. viding online news to corporations. The
PointCast broadcast receives more than
New PCs with flash BIOS will be easy to up-
120 million hits a day and offers access to a
grade so that they can take advantage of
collection of more than 600 leading busi-
PnP; older systems with ROM-based BIOS
ness sources.
will need a hardware change before they
can take full advantage of PnP. Unlike the World Wide Web and other In-
See also Peripheral Component Intercon-
ternet applications, PointCast uses server
nect local bus; Plug and Pray.
push technology, in which the server auto-
matically sends new data to a client without
Plug and Pray What most of us do when a specific request from that client.
our Plug-and-Play systems do not work For more information on PointCast, see
automatically. www.pointcast.com.
plug-compatible Any hardware device point-to-point link A direct connection
designed to work in exactly the same way between two, and only two, locations or
as a device manufactured by a different nodes.
company. For example, all external serial
devices are plug-compatible, because you Point-to-Point Protocol Abbreviated
can replace one with another without PPP. A TCP/IP protocol used to transmit IP
changing the cabling or connector. datagrams over serial lines and dial-up tele-
phone point-to-point connections.
See also pin-compatible.
PPP allows a PC to establish a temporary di-
plug-in A small program you can link in rect connection to the Internet via modem
to your Web browser to add a special capa- and appear to the host system as if it were
bility not originally present or to recognize an Ethernet port on the host’s network.
303
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 304 Thursday, May 4, 2000 11:59 AM
PPP provides router-to-router, host-to- transmit or pass the token to the next
router, and host-to-host connections and device.
also provides an automatic method of as-
polymorphic virus A form of virus that
signing an IP address so that mobile users
can change its appearance to avoid detec-
can connect to the network at any point.
tion. The virus encrypts itself using a special
See also PPP Multilink; Point-to-Point formula each time an infection occurs.
Tunneling Protocol; Serial Line Internet Virus-detecting software uses special scan-
Protocol. ning techniques to find and remove poly-
morphic viruses.
Point-to-Point Tunneling Protocol
See also boot sector virus; file-infecting vi-
Abbreviated PPTP. A proprietary network-
rus; macro virus; multipart virus; stealth
ing protocol proposed by Microsoft that
virus, vaccine; virus.
supports virtual private networks, allowing
remote users to access Windows NT Server POP See point of presence; Post Office
systems across the Internet without compro- Protocol.
mising security. PPTP allows corporations to
use public networks rather than leasing its port 1. To move a program or an oper-
own lines for wide area communications. ating system from one hardware platform
to another. For example, Windows NT
See also encapsulation; Layer 2 Tunneling
portability refers to the fact that the same
Protocol; PPP Multilink; tunneling.
operating system can run on both Intel and
reduced instruction set computing (RISC)
point of presence Abbreviated POP. A
architectures.
connection to the telephone company or to
long-distance carrier services. 2. The point at which a communications
circuit terminates at a network, serial, or
polling A method of controlling the parallel interface card, usually identified by
transmission sequence of devices on a a specific port number or name.
shared circuit or multi-drop line by sending
3. A number used to identify a connection
an inquiry to each device asking if it wants
point to a specific Internet protocol.
to transmit. If a device has data to send, it
sends back an acknowledgment, and the See also portable; port number.
transmission begins. Three methods are in
portability The ability to transfer an ap-
common use:
plication or operating system from one ven-
■
Roll-call A master station uses a polling dor’s hardware to another, quickly and
list to locate the next node to poll. easily, without rewriting the software and
■
Hub A node polls the next node in without affecting its performance.
sequence. This can be achieved in several ways:
■
Token-passing A token is passed to the ■
Write the program in a portable language,
next node in sequence. This node can such as C, C++, or Java.
304
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 305 Thursday, May 4, 2000 11:59 AM
port number
■
Use only standard programming language Portable Document Format Abbrevi-
features. ated PDF. A file format standard developed
■
Use only standard libraries. by Adobe Systems and others for use in elec-
tronic documents. A file in this format usu-
■
Don’t make assumptions about word size ally has the filename extension of .PDF.
or byte ordering.
Portable Operating System Interface
■
Use layers of software to distance the ap-
plication from operating system or hard- Abbreviated POSIX. A collection of IEEE
ware dependencies. standards that defines a complete set of por-
table operating system services. POSIX is
portable Describes the degree to which a based on Unix services, but it can be imple-
program can be moved easily to different mented by many other operating systems.
computing environments with a minimum
number of changes. Applications written Each of the standards defines a specific as-
for the Unix operating system are often de- pect of an operating system, including such
scribed as portable applications, as are Java areas as system administration, system se-
applets. curity, networking, and the user interface.
305
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 306 Thursday, May 4, 2000 11:59 AM
port replicator
A total of 65,535 port numbers are avail- mailing list, rather than a message sent to
able for use with TCP, and the same num- an individual.
ber are available for UDP (User Datagram See also posting; Usenet.
Protocol).
See also port. Postal Telephone and Telegraph Ab-
breviated PTT. The official government
port replicator A device containing body that administers and manages the tele-
standard computer ports used to avoid con- communications systems in many European
stantly connecting and disconnecting pe- countries.
ripherals from a portable computer.
posting Sending an article or an e-mail
A port replicator duplicates all your com- message to a Usenet newsgroup.
puter’s ports and may even add a Small See also post; Usenet.
Computer System Interface (SCSI) port or a
second Universal Serial Bus port. The exter- Post Office Protocol Abbreviated POP.
nal monitor, full-sized keyboard, and An Internet mail server protocol that
mouse you use in the office are connected to also provides an incoming mail storage
the port replicator; when it is time to take mechanism.
the portable computer on the road, you
POP works with Simple Mail Transfer Pro-
simply unplug the port replicator, leaving
tocol (SMTP), which actually moves the
everything attached to the replicator for
e-mail from one system to another, and the
your return.
latest version of the standard is POP3.
See also docking station.
When a client connects to a POP3 server, all
the messages addressed to that client are
portal A large Web site that acts as a gate-
downloaded; there is no ability to download
way to the Internet and may also offer
messages selectively. Once the messages are
search facilities, free e-mail, online chat, in-
downloaded, the user can delete or modify
stant messaging, as well as other services,
messages without further interaction with
including hard news, sports, and personal
the server.
finance. Portals make money by selling ad-
vertising space. In some locations, POP3 is being replaced
by another standard, Internet Mail Access
POSIX See Portable Operating System Protocol (IMAP) version 4.
Interface.
See also Internet Mail Access Protocol;
POST See power-on self test. Simple Mail Transfer Protocol.
306
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 307 Thursday, May 4, 2000 11:59 AM
power supply
power surges and spikes and ensure clean operating system; designed to ensure that the
power. There are three main types of major system components are present and
power-conditioning devices: operating. If a problem is found, the POST
■
Suppression, which protects against sud- firmware displays an error message on the
den destructive transient voltages. screen, sometimes with a diagnostic code
number indicating the type of fault.
■
Regulation, which modifies the power
waveform back to a clean sine wave. A PowerPC A family of RISC-based, super-
UPS (uninterruptible power supply) is a scalar microprocessors jointly developed by
common form of voltage regulator. It may Apple, Motorola, and IBM, with a 32-bit
be online, actively modifying the power, address bus and a 64-bit data bus.
or offline and available only after the line ■
The 601 houses 2.8 million transistors,
voltage drops below a certain level.
runs at 110MHz, and is designed for use
■
Isolation, which protects against noise. in high-performance, low-cost PCs.
These types of devices are often expensive.
■
The 66MHz 602 is targeted at the con-
Because power conditioning is expensive, sumer electronics and entry-level comput-
usually only the servers or hosts in a network er markets.
are protected. Surge suppressors may be
used with workstations or other important
■
The low-wattage 603e is aimed at battery-
network nodes, such as bridges or routers. powered computers.
power surge
308
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 309 Thursday, May 4, 2000 11:59 AM
See also disk mirroring; shadow member. Printer Agent In Novell Distributed
Print Services, a printer object that replac-
Primary Rate ISDN Abbreviated PRI. es the Print Queue, Printer, and Printer
An ISDN (Integrated Services Digital Net- Server objects used in other Novell print-
work) service that provides 23 B (bearer) ing environments.
channels, capable of speeds of 64Kbps,
printer emulation The ability of a print-
and one D (data) channel, also capable
er to change modes so that it behaves like a
of 64Kbps. The combined capacity of
printer from another manufacturer. For ex-
1.544Mbps is equivalent to one T1 channel.
ample, many dot-matrix printers offer an
See also Basic Rate ISDN. Epson printer emulation in addition to their
own native mode. Most laser printers offer
primary time server In Novell Net- a Hewlett-Packard LaserJet emulation.
Ware, a server that provides time informa- See also emulator; terminal emulation.
tion to secondary time servers and to
workstations. print queue A collection of documents
A primary time server must synchronize waiting to be printed on a particular net-
time information with at least one other pri- work printer.
mary or reference time server. See also Novell Distributed Print Services.
See also reference time server; secondary print server A server that handles print-
time server; single reference time server. ing for all users on the network. A print
server collects print jobs sent by applica-
PRINTCON A Novell NetWare worksta- tions running on other networked PCs,
tion utility used to create, view, or modify places them in a print queue on the hard
print-job configurations on the network. disk, and routes them to one or more print-
Configuration options include the printer ers attached to the print server.
to be used, the print queue to process the
See also local printer; Novell Distributed
job through, the print-device mode, the
Print Services.
printer form number, and the number of
copies. print spooler In an operating system or
PRINTDEF A Novell NetWare worksta- network operating system, the software
tion utility used to create, view, and modify that coordinates print jobs sent to a shared
printer definitions on the network. printer when that printer is busy. Each print
job is stored in a separate file and is printed
Printer Access Protocol Abbreviated in turn when the printer becomes free.
PAP. The protocol used in AppleTalk net-
Priority Access Control Enabled Ab-
works to manage communications between
breviated PACE. A technology from 3Com
computers and printers.
Corporation designed to deliver on-time
See also AppleTalk. multimedia over switched Ethernet networks
309
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 310 Thursday, May 4, 2000 11:59 AM
with insufficient bandwidth and without the PDNs are used to transmit highly sensitive
ability to prioritize traffic. This is accom- data such as banking and other financial in-
plished by the use of the PACE-enabled formation. The service provider guarantees
switches that allow the switch port and end a certain bandwidth will always be avail-
stations to take turns when transmitting. able, although some of that bandwidth may
go unused during periods of light traffic.
Privacy Enhanced Mail Abbreviated
PEM. An e-mail standard that uses a pat- See also Virtual Private Network.
ented RSA encryption scheme to provide a
confidential method of authentication. private key One of two keys used in
PEM is little used due to the proprietary na- public key encryption. The user keeps the
ture of the encryption scheme. private key secret and uses it to encrypt
digital signatures on outgoing messages and
See also Secure MIME; RSA. to decrypt incoming messages.
310
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 311 Thursday, May 4, 2000 11:59 AM
programming language
See also protected mode; privilege level; and one process can run one or more other
real mode. processes.
See also session; thread.
privilege level 1. Those rights granted
to a user or a group of users by the network Professional Server Expert Abbreviat-
administrator that determine the functions ed PSE. A certification from IBM that offers
the user can execute. Rights form an impor- specialization in a specific network operat-
tant component of network security and ing system, including Novell NetWare,
can include supervisor rights and read, OS/2 Warp Server, or Windows NT Server.
write, erase, and modify rights, along with
See also Professional Server Specialist.
several others.
2. A form of protection built into Intel mi- Professional Server Specialist Abbre-
croprocessors. The Intel microprocessor ar- viated PSS. An introductory hardware cer-
chitecture provides two broad classes of tification from IBM designed to assess
protection. One is the ability to separate knowledge of IBM Netfinity and PC server
tasks by giving each task a separate address architecture, installation, configuration,
space. The other mechanism operates with- and management.
in a task to protect the operating system and See also Professional Server Expert.
special processor registers from access by
applications. Within a task, four privilege Profile object In Novell NetWare, a spe-
levels are defined. The innermost ring is as- cial Novell Directory Services (NDS) object
signed privilege level 0 (the highest, or most used to assign the same login script to a
trusted, level), and the outermost ring is group of users. A Profile login script is ex-
privilege level 3 (the lowest, or least privi- ecuted after the container login script has
leged, level). Rings 1 and 2 are reserved for executed, but before the user login script.
the operating system and operating system
extensions; level 3 is available to applica- programming language A language
tions. This protection is maintained by used to write a program that the computer
complex circuitry in the processor’s memo- can execute. Almost 200 programming lan-
ry management unit. guages exist. An example is the popular C
language, which is well suited to a variety of
PRN In MS-DOS, Windows, and OS/2, computing tasks. With C, programmers can
the logical device name for a printer, usual- write anything from a device driver, to an
ly the first parallel port, which is also application, to an operating system.
known as LPT1. Certain kinds of tasks, particularly those
See also parallel port. involving artificial intelligence (LISP or
Prolog), process control (Forth), or highly
process In a multitasking operating sys- mathematical applications (Fortran and
tem, a program or a part of a program. All APL), can benefit from a more specific
EXE and COM files execute as processes, language.
311
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 312 Thursday, May 4, 2000 11:59 AM
Project Athena
Programming languages are also divided Services (NDS); also known as an attribute.
into low-level languages, such as assembly User object properties include name, login
language, and high-level languages, such as name, password restrictions, e-mail address,
C, C++, and Java. and other related information.
See also assembly language; compiler; in- 2. In Microsoft Windows, a characteristic
terpreter; machine language. of an object or device, accessed via that ob-
ject’s Properties dialog box.
Project Athena A Massachusetts Insti-
tute of Technology project that ran from property rights In Novell NetWare,
1983 to 1991, sponsored by MIT, DEC, characteristics of an object in Novell Direc-
and IBM, and developed the X Window tory Services (NDS). Property rights are
system and Kerberos authentication, as Add or Delete Self, Compare, Read, Super-
well as several other important relational visor, and Write.
database and network-related systems.
See also Kerberos; X Window. proprietary software Software devel-
oped in-house by a particular business or
promiscuous mode A mode in which a government agency and never made avail-
network device or interface card captures able commercially to the outside world.
all the packets on the network, not just
The operating systems used in certain
those addressed to it specifically.
portable computers and PDAs (personal
Network analyzers work in promiscuous digital assistants) may also be considered
mode to monitor network traffic and to proprietary, because they are specific to
perform statistical analyses of the traffic.
one system and are not generally available
See also network analyzer; sniffer. anywhere else.
312
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 313 Thursday, May 4, 2000 11:59 AM
PU
Microsoft Windows NT, OS/2, and most Novell NetWare’s IPX/SPX, but the trend
versions on Unix running on Intel proces- these days is moving toward more open sys-
sors run in protected mode. tems such as TCP/IP (Transmission Control
Protocol/Internet Protocol).
See also real mode.
See also OSI Reference Model.
protocol In networking and communica-
tions, the formal specification that defines protocol suite See protocol stack.
the procedures to follow when transmitting
protocol tunneling See tunneling.
and receiving data. Protocols define the for-
mat, timing, sequence, and error checking proxy server A software package run-
used on the network. ning on a server positioned between an in-
See also communications protocol; OSI
ternal network and the Internet.
Reference Model; protocol stack. The proxy server filters all outgoing con-
nections so that they appear to be coming
protocol analyzer A hardware or com- from the same machine, in an attempt to
bined hardware and software product used conceal the underlying internal network
to analyze the performance data of the net- structure from any intruders. By disguising
work and to find and troubleshoot network the real structure of the network, the proxy
problems. server makes it much more difficult for an
intruder to mount a successful attack.
Protocol analyzers vary greatly in complex-
ity. Some use dedicated hardware and can A proxy server will also forward your re-
decode as many as 150 protocols; others quests to the Internet, intercept the re-
convert an existing networked PC into a sponse, and then forward the response to
network-specific analyzer. you at your network node. A system admin-
istrator can also regulate the external sites
See also network analyzer; sniffer.
to which users can connect.
protocol converter A combined hard- See also dual-homed host; firewall.
ware and software product that converts
from one network protocol to another; PSE See Professional Server Expert.
used when two dissimilar networks are PSS See Professional Server Specialist.
connected.
PSTN See Public Switched Telephone
See also gateway.
Network.
protocol stack The several layers of soft- PTI See Payload Type Identifier.
ware that define the computer-to-computer
or computer-to-network protocol. PTT See Postal Telephone and
Telegraph.
Several companies have developed impor-
tant proprietary protocol stacks, including PU See physical unit.
313
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 314 Thursday, May 4, 2000 11:59 AM
public data network Abbreviated PDN. or certificate. Other CAs would then vouch
Any government-owned or government- for those CAs, and they in turn would be
controlled commercial packet-switched net- vouched for by other CAs.
work, offering wide-area services to data- See also certificate authority; digital
processing users. signature.
For digital signatures, the process is re- Public trustee In Novell NetWare, a
versed; the sender uses the private key to special trustee, used only for trustee
create the digital signature, which can then assignments.
be read by anyone who has access to the The Public trustee allows objects in Novell
corresponding public key. This confirms Directory Services (NDS) that do not have
that the message really is from the apparent any other rights to have the rights granted
sender. to the Public trustee. This is similar to the
See also digital signature; private key. way the user GUEST or the group EVERY-
ONE worked in earlier versions of Novell
Public Key Infrastructure A proposal NetWare.
to provide a structure for verifying and au- punch-down block A connecting device
thenticating users involved in transactions used for telephone lines; also known as a
on the Internet or on corporate intranets quick-connect block. The wires are pushed
and extranets. into metal teeth that strip the insulation
The proposal involves a set of trusted certif- away and make a good connection.
icate authorities (CAs) who would publish a
push See server push.
person’s public key and vouch for the au-
thenticity of the data using a digital signature PVC See permanent virtual circuit.
314
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 315 Thursday, May 4, 2000 11:59 AM
quarter-inch cartridge
Q
QIC See quarter-inch cartridge. QoS is often associated with the delivery of
data such as live video, while at the same
QoS See quality of service.
time maintaining sufficient bandwidth for
quadrature amplitude modulation In the delivery of normal network traffic, per-
communications, a data-encoding tech- haps at a lower data rate.
nique used by modems. Quadrature ampli- See also bandwidth on demand; Fast IP;
tude modulation is a combination of phase IP Multicast; IP over ATM; IP switching;
and amplitude change that can encode mul- multicast.
tiple bits on a single carrier signal. For ex-
ample, the CCITT V.42bis standard uses 4 Quantum Corporation A major manu-
phase changes and 2 amplitudes to create facturer of disk storage systems. Quantum
16 different signal changes. now makes a wide variety of disk types, in-
See also trellis-coded modulation. cluding IDE, SCSI, solid-state, and Fibre
Channel.
quality of service Abbreviated QoS. The
For more information on Quantum Corpo-
network requirements to support a specific
ration, see www.quantum.com.
application. Different types of networks and
network traffic have a different QoS. quarter-inch cartridge Abbreviated
QoS includes the ability to guarantee the QIC. A set of tape standards defined by the
delivery of time-sensitive data, control the Quarter-Inch Cartridge Drive Standards
bandwidth, set priorities for specific net- Association, a trade association established
work traffic, and provide an appropriate in 1987. Several standards are in use today
level of security. as Table Q.1 shows.
315
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 316 Thursday, May 4, 2000 11:59 AM
query language
316
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 317 Thursday, May 4, 2000 11:59 AM
QuickTime
quick-connect block See punch-down digital data such as sound, video, MIDI, or
block. other control information. A QuickTime
movie created on one platform can be
QuickTime A cross-platform data for-
played back on another without modifica-
mat from Apple Computer, Inc., used to
tion; versions are available for Macintosh
display movies. QuickTime synchronizes as
and Microsoft Windows.
many as 32 tracks containing time-based
317
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 318 Thursday, May 4, 2000 11:59 AM
RAD
R
RAD See Rapid Application will be erased when the computer is turned
Development. off, so contents must be copied onto a real
disk to be saved.
radio frequency interference Abbrevi-
ated RFI. Many electronic devices, includ- See also disk cache.
ing radios, televisions, computers, and
peripherals, can interfere with other signals random access Describes the ability of
in the radio-frequency range by producing a storage device to go directly to the re-
electromagnetic radiation. The use of radio quired memory address without needing
frequencies is generally regulated by gov- to read from the beginning every time data
ernment agencies. is requested.
See also Class A certification; Class B cer- In a random-access device, the information
tification; extremely low-frequency can be read directly by accessing the appro-
emission; Federal Communications priate memory address. There is nothing
Commission. random or haphazard about random ac-
cess; a more precise term is direct access.
RADIUS See Remote Authentication
See also sequential access.
Dial In User Service.
318
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 319 Thursday, May 4, 2000 11:59 AM
read-only memory
RAS See Remote Access Server. memory is released. If the data does not
match, that block on the disk is marked as
Rate-Adaptive Digital Subscriber bad, and another attempt is made to write
Line Abbreviated RADSL. An Asymmet- the data elsewhere on the disk.
ric Digital Subscriber Line (ADSL) service
with a provision for testing the line length README file A plain text file that con-
and quality before starting the service and tains information about the software,
adjusting the line speed accordingly. placed on the distribution disks by the
See also Asymmetric Digital Subscriber manufacturer.
Line; High-Bit-Rate Digital Subscriber Line; The filename may vary slightly; it might be
Single-Line Digital Subscriber Line; Very- READ.ME, README.1ST, README
High-Bit-Rate Digital Subscriber Line. .TXT, or README.DOC, for example.
README files may contain last-minute,
RBOC See Regional Bell Operating important information that is not in the
Companies. program manuals or online help system.
RCDD See Registered Communications You should always look for a README file
Distribution Designer. when installing a new program on your sys-
tem; it may contain information pertinent
RCONSOLE A Novell NetWare work-
to your specific configuration. You can
station utility that allows network admin-
open a README file in any word processor
istrators to manage routers and servers
or text editor because the file does not con-
from a remote PC using a modem or from
tain embedded formatting commands or
a workstation on the network. RCON-
program-specific characters.
SOLE establishes the connection to the
server and converts the PC into a virtual read-only Describes a file or other collec-
server console. This function is also avail- tion of information that can only be read; it
able in NetWare Administrator from the cannot be updated in any way or deleted.
Tools menu.
Certain important operating system files
In NetWare 3, use ACONSOLE to perform are designated as read-only to prevent their
this function. accidental deletion. Also, certain types of
See also NetWare Administrator; REMOTE. ROM and some devices such as archive
backup tapes and CD-ROMs can be read
RDP See Remote Desktop Protocol. from but not changed.
319
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 320 Thursday, May 4, 2000 11:59 AM
RealAudio
applications and even the operating system Realtime Streaming Protocol Abbre-
are stored in ROM. viated RTSP. A proposed protocol from
Netscape and RealNetworks for streaming
See also flash memory.
live and prerecorded audio and video across
the Internet and corporate intranets. RTSP
RealAudio Technology developed by Re-
also includes features for bidirectional con-
alNetworks (previously known as Progres-
trol, support for IP Multicast, and system
sive Networks, Inc.) that lets you play audio
security.
files as they are in the process of being
downloaded, rather than waiting until the See also IP Multicast; RealAudio; Real-time
complete file has arrived, which gives a Transport Protocol; Resource Reservation
much faster response time. RealAudio uses Protocol.
UDP (User Datagram Protocol) as the de-
Real-time Transport Protocol Abbre-
livery mechanism.
viated RTP. A protocol designed for use in
See also IP Multicast; multicasting; stream- online videoconferencing applications in-
ing; User Datagram Protocol. volving multiple participants.
RTP can be used with any continuous data
real mode 1. An operating state support- stream and so is suitable for use in interactive
ed by all processors in the Intel 80x86 fam- simulators and with control and measure-
ily, and the only operating mode supported ment applications. RTP uses UDP (User Da-
by MS-DOS. In real mode, the processor can tagram Protocol) as the delivery mechanism.
directly address 1MB of memory. Unlike
See also Realtime Streaming Protocol; Re-
protected mode, real mode does not offer
source Reservation Protocol; User Data-
any advanced hardware features for memo-
gram Protocol.
ry management or multitasking.
2. In Microsoft Windows, an operating reboot To restart the computer and re-
mode that runs Windows using less than load the operating system, usually after a
1MB of extended memory. Real mode is crash.
not used in Windows 3.1 or later. In some cases, you may be able to restart the
See also protected mode.
computer from the keyboard; in more se-
vere crashes, you may have to turn the com-
puter off and then back on again.
RealNetworks, Inc. Developer of
streaming audio and video technology for See also boot.
use over the Internet; previously known as
Progressive Networks. Receive Data Abbreviated RXD. A
hardware signal defined by the RS-232-C
For more information on RealNetworks, standard and used to carry serial data from
Inc., see www.real.com. one device to another.
See also RealAudio; streaming. See also Transmit Data.
320
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 321 Thursday, May 4, 2000 11:59 AM
redirector
record locking A method used to control utilities, source code, Apache HTTP Server,
access to individual records in a database. sendmail, and Perl, as well as trial versions
In a multiuser environment, there is always of commercial software.
the possibility that two users will attempt to SAP, IBM, Compaq, Oracle, Intel, and No-
update the same record at the same time but vell have all made equity investments in Red
with different information. The initial at- Hat Software.
tempt to solve this problem was to use file
For more information on Red Hat Software,
locking in which the first user to access the
see www.redhat.com.
file locks out all other users and prevents
them from opening the file. After the file is See also Apache HTTP Server; Linux; Perl.
updated and closed again, the next user can
gain access. Red Horde A nickname for Novell, Inc.,
the leading network operating system soft-
File locking can seriously degrade overall
ware company, as well as the NetWare re-
system performance as many users attempt
sellers worldwide. Red is Novell’s
to access the same files time after time. To
corporate color.
avoid this slowdown, many database man-
agement systems use record locking, which redirection 1. In Unix and many other
limits access to individual records within operating systems, a shell mechanism that
the database files. causes the standard input from a program
See also file and record locking. to come from a file rather than from the ter-
minal; it also causes standard output and
Recovery Console In Microsoft Win- standard error to go to a file rather than to
dows 2000, a command-line interface that the terminal. Because Unix is a file-based
gives access to a set of commands used to re- operating system, and terminals and other
cover a system that will not restart. devices are treated as though they are files,
See also Emergency Repair Disk; safe a program doesn’t care or even know if its
mode. output is going to a terminal or to a file.
2. A mechanism used by most of the pop-
recursion In programming, the ability of
ular Web server software packages that re-
a subroutine to call itself.
routes clients attempting to access a specific
Recursion is often used when solving prob- URL to a different URL, either on the same
lems that repeat the same processing steps. or on a different server. Redirection is a
However, some limiting factor must be convenient way to avoid dead links.
present; otherwise, the program will never
See also link rot; pipe; Uniform Resource
stop.
Locator.
Red Hat Software A major distributor
of Linux. Red Hat Linux is a three-CD redirector A software module loaded
package, containing a stable version of the onto all the workstations on a network that
Linux kernel, a large set of operating system intercepts application requests for file- and
321
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 322 Thursday, May 4, 2000 11:59 AM
printer-sharing services and diverts them to disk duplexing, depending on whether one
the file server for action. or two independent hard-disk controllers
See also NetWare shell; NETx.COM; are used.
requester. ■
RAID 2 Bit-interleaved data is written
across several drives, and then parity and
reduced instruction set computing
error-correction information is written to
Abbreviated RISC, pronounced “risk.” A
additional separate drives. The specific
processor that recognizes only a limited
number of error-correction drives de-
number of assembly-language instructions.
pends on the allocation algorithm in use.
RISC chips are relatively cheap to produce
and debug because they usually contain
■
RAID 3 Bit-interleaved data is written
fewer than 128 instructions. RISC proces- across several drives, but only one parity
sors are commonly used in workstations, drive is used. If an error is detected, the
and they can be designed to run up to 70 data is reread to resolve the problem. The
percent faster than processors that use com- fact that data is reread in the event of an er-
plex instruction set computing (CISC). ror may add a small performance penalty.
322
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 323 Thursday, May 4, 2000 11:59 AM
Registry
Level 0+1, which combines RAID levels 0 Regional Bell Operating Companies
and 1. Abbreviated RBOC. The telephone compa-
nies formed as a result of the breakup of
See also backup; disk striping; disk striping
AT&T, finalized in 1984.
with parity; parity; single large expensive
disk. Each of the RBOCs was assigned a specific
geographical area, and each of these areas
reentrant Describes a programming was divided into service areas known as lo-
technique that allows one copy of a pro- cal access and transport areas (LATA).
gram to be loaded into memory and shared. See also Local Exchange Carrier.
When one program is executing reentrant
Registered Communications Distribu-
code, a different program can interrupt and
tion Designer Abbreviated RCDD. A
then start or continue execution of that
certification from BICSI (a telecommunica-
same code.
tions association) for those involved in the
Many operating system service routines use design and installation of low-voltage wir-
reentrant code so that only one copy of the ing infrastructures in new construction or
code is needed. The technique is also used in in existing buildings. An additional special-
multithreaded applications, in which differ- ization, RCDD: Local Area Network, is
ent events are taking place concurrently in available for those involved with designing
the computer. and installing LAN cabling.
reference time server In Novell Net- Registry In the Microsoft Windows fam-
Ware, a server that provides externally de- ily of operating systems, a system database
rived time data to secondary time servers containing configuration information.
and to workstations. Reference time servers The operating system continually referenc-
take part in time synchronization, but they es the Registry database for information on
do not change their time except in response users and groups, the applications installed
to the external time source. on the system and the type of document
each can create, what hardware is available
See also primary time server; secondary and which ports are in use, and property
time server; single reference time server. sheets for folders and application icons.
Changes to the Registry are usually made
regedit In Microsoft Windows, an appli-
automatically as configuration information
cation that knowledgeable users can access
is changed using Control Panel applications
to edit the contents of the Registry data-
or the Administrative Tools; however,
base. In Windows NT, this application is
knowledgeable users can make changes di-
called regedit32.
rectly using the application regedit or
See also Registry. regedit32.
323
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 324 Thursday, May 4, 2000 11:59 AM
Registry Editor
The Registry database replaces the text-based See also Common name; Context; Distin-
.INI configuration files used in earlier ver- guished Name; NDS tree.
sions of Windows and replaces the MS-DOS
configuration files AUTOEXEC.BAT and REMOTE A Novell NetWare server utili-
CONFIG.SYS. ty used to access the server console from a
PC or a workstation or by using a modem.
See also regedit.
See also RCONSOLE.
Registry Editor See regedit.
remote access A workstation-to-net-
regular expression In Unix, a sequence work connection, made using a modem and
of characters that can match a set of fixed- a telephone line, that allows data to be sent
text strings used in searching for and replac- and received over large distances. Remote
ing text. access and authentication and security for
Many Unix programs, including vi, ed, such access is managed differently in differ-
emacs, grep, and awk, use regular ent network operating systems.
expressions. See also private data network; public data
relational database A database model network; Virtual Private Network.
in which the data always appears from the
Remote Access Server Abbreviated
point of view of the user to be a set of two-
RAS. In Microsoft Windows NT Server, a
dimensional tables, with the data presented
software package that allows remote users
in rows and columns.
to connect to the server via modem and ac-
The rows in a table represent records, which cess network resources. Users can connect
are collections of information about a spe- to the server using a telephone line and an
cific topic, such as the entries in a doctor’s analog modem, an ISDN connection, or an
patient list. The columns represent fields, X.25 network.
which are the items that make up a record,
such as the name, address, city, state, and zip Remote Authentication Dial In User
code in an address list database. Service Abbreviated RADIUS. A third-
party authentication server attached to a
See also database model.
network.
Relative Distinguished Name In Nov- Remote users dial in to the server, and the ac-
ell Directory Services (NDS), a shortened cess server requests authentication services
Distinguished Name that identifies an ob- from the RADIUS server. The RADIUS serv-
ject by its relationship within the current er authenticates users and gives them access
context. to network resources. The access server is
acting as a client to the RADIUS server.
Relative Distinguished Names do not begin
with a period, but you can use a period at the See also access server; authentication;
end of the name to move up the NDS tree. challenge-response authentication.
324
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 325 Thursday, May 4, 2000 11:59 AM
Remote Storage
remote boot A technique used to boot a remote digital loopback test A capa-
workstation from an image file on the file bility of certain modems that allows the
server rather than from a local drive at- whole circuit to be tested.
tached directly to the workstation. See also loopback.
remote connection See remote access. Remote File System Abbreviated RFS.
A distributed file system network protocol
remote-control program A program
that allows programs running on a comput-
that allows the user to link two PCs togeth-
er to use network resources as though they
er so that one of the computers controls the
were local. Originally developed by AT&T,
operation of the other. The connection may
RFS has been incorporated as a part of Unix
be over a dedicated serial line, a local-area
System V Interface Definition.
network, or a modem-to-modem commu-
nications link. Each computer runs a copy Remote Installation Services Abbre-
of the remote-control program. viated RIS. In Microsoft Windows 2000
Remote-control programs are particularly Server, a service that allows the installation
useful for troubleshooting problems at of a single workstation image of Windows
computers located far from the technical 2000 Professional to any number of com-
support center, for installing or removing puters while at the same time ensuring that
demonstration software without needing to each system has unique security identifiers.
visit the customer site, for training remote Remote Procedure Call Abbreviated
users, and for telecommuting. RPC. A set of procedures used to implement
Popular remote control programs include client/server architecture in distributed
Symantec’s pcAnywhere, Microcom’s programming.
Carbon Copy, and Traveling Software’s RPC describes how an application initiates
LapLink for Windows. a process on another network node and
how it retrieves the appropriate result.
See also mobile computing; wireless
communications. RPCs were first implemented by Sun Mi-
crosystems and Hewlett-Packard systems
Remote Desktop Protocol Abbreviat- running the Unix operating system.
ed RDP. An extension to the International See also Common Object Request Broker
Telecommunications Union (ITU) T.120 Architecture; Distributed Component Ob-
protocol that provides the connection be- ject Model; Object Request Broker.
tween a thin client and the terminal server.
RDP works with Microsoft Windows remote resource Any device not at-
workstations using TCP/IP (Transmission tached to the local node, but available
Control Protocol/Internet Protocol). through the network.
325
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 326 Thursday, May 4, 2000 11:59 AM
remote user
frequently used files from local hard disk NetWare contains three major types of
storage to tape when disk resources drop replicas:
below a certain level. If a user requests the ■
Master The original replica, created
file after it has been transferred to tape, the during system installation. A Master rep-
file is read back, and a dialog box explains lica of the Root partition is stored in a hid-
that the file is being retrieved from remote den directory on the first file server
storage. installed.
326
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 327 Thursday, May 4, 2000 11:59 AM
made available to all other replicas as soon Request to Send Abbreviated RTS. A
as possible. hardware signal defined by the RS-232-C
standard to request permission to transmit.
See also Novell Directory Services; parti-
tion; replica. See also Clear to Send.
response time
response time The time lag between REXX is a general-purpose interpreted lan-
sending a request and receiving the data. guage and uses English-like words, rather
Response time can be applied to a complete than the sometimes terse syntax of C or C++.
computer system, as in the time taken to RFC See Request for Comment.
look up a certain customer record, or to a
system component, as in the time taken to RFI See radio frequency interference.
access a specific cluster on disk or for a
memory circuit to return data requested by RFS See Remote File System.
the processor. RG-58 A 50-ohm coaxial cable, used in
restore To copy files from a backup or Ethernet networks, that conforms to the
archival storage to their normal location, IEEE 802.3 10Base2 standard.
especially when the files are being copied to
RG-59 A 75-ohm coaxial cable used in
replace files lost by accident.
ARCnet and in television.
See also backup.
RG-62 A 93-ohm coaxial cable used in
retensioning A maintenance operation ARCnet LANs or in IBM 3270 applications.
required by certain tape drives to ensure
right angle bracket The > symbol that
correct tape tension; retensioning fast for-
is used in Unix and other operating systems
wards and then rewinds the entire tape or
to direct the output from a command to a
tape cartridge.
file or to a device.
Return key See Enter key.
Also commonly used in e-mail messages to
Reverse Address Resolution Protocol indicate the text has been cut from another
Abbreviated RARP. A part of the TCP/IP e-mail message.
(Transmission Control Protocol/Internet
rights In a network or multiuser envi-
Protocol) protocol suite that allows a com-
ronment, the ability of a user to access cer-
puter, more specifically a diskless worksta-
tain system resources, including files and
tion, to obtain an IP address from a server
directories. Permissions are based on the
when only the hardware address is known.
rights given to user accounts by the system
See also Address Resolution Protocol; administrator.
hardware address; IP address.
See also inherited rights.
REXX Acronym formed from Restruc-
tured Extended Executor Language. A rightsizing The process of matching a
scripting language from IBM, originally corporation’s goals to the computing and
written by Mike Cowlishaw of IBM UK in network solutions available to maximize
1979 for the VM mainframe environment business effectiveness in reaching that goal.
and now available on many operating sys- See also downsizing; outsourcing; service
tems, including OS/2, Unix, and VMS. bureau.
328
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 329 Thursday, May 4, 2000 11:59 AM
RJ-12
ring network A network topology in the generation that allows a ring network to
form of a closed loop or circle, with each cover greater distances than star networks
node in the network connected to the next. or bus networks. Ring networks normally
use some form of token-passing protocol to
Messages move in one direction around the
regulate network traffic.
system. When a message arrives at a node,
the node examines the address information The failure of a single node can disrupt net-
in the message. If the address matches the work operations; however, fault tolerant
node’s address, the message is accepted; techniques have been developed to allow
otherwise, the node regenerates the signal the network to continue to function in the
and places the message back on the network event one or more nodes fail.
for the next node in the system. It is this re- See also token-ring network.
RING NETWORK
RIS See Remote Installation Services. RJ-11 A commonly used modular tele-
phone connector. RJ-11 is a four-wire (two-
RISC See reduced instruction set pair) connector most often used for voice
computing. communications.
riser cable Any cable that runs vertically RJ-12 A commonly used modular tele-
between floors in a building. Riser cable phone connector. RJ-12 is a six-wire (three-
may be run through special conduits or in- pair) connector most often used for voice
side the elevator shaft. communications.
329
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 330 Thursday, May 4, 2000 11:59 AM
RJ-45
RJ-11
RJ-45 A commonly used modular tele- See also local user profile; mandatory user
phone connector. RJ-45 is an eight-wire profile.
(four-pair) connector used for data transmis-
sion over unshielded twisted-pair (UTP) ca- robot Sometimes abbreviated bot. A
ble and leased telephone line connections. World Wide Web application that auto-
matically locates and collects information
RLL encoding An efficient method of
about new Web sites. Robots are most often
storing information on a hard disk. Com-
used to create large databases of Web sites.
pared with older, less-efficient methods,
such as modified frequency modulation en- See also spider.
coding (MFM), RLL encoding effectively
doubles the storage capacity of a disk. Rockwell Semiconductor Systems A
See also advanced run-length limited major manufacturer of chip sets for mo-
encoding. dems, cellular and cordless telephones, fax
machines, PC-based videoconferencing
rlogin A Unix utility that establishes a systems, and high-speed communications
terminal to remote host connection on a systems.
TCP/IP (Transmission Control Protocol/In- For more information on Rockwell Semicon-
ternet Protocol) network. Once the connec- ductor Systems, see www.rockwell.com.
tion is established, any commands you
enter will run on the remote system. roll back The ability of a database man-
agement system to abort a transaction
roaming user profile In Microsoft Win-
against the database before the transaction
dows NT Server, a user profile stored on the
is complete and return to a previous stable
server and downloaded to a workstation
condition.
that follows a user from one computer to
another, allowing users to access their pro- See also roll forward; transaction
file from any location on the network. processing.
330
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 331 Thursday, May 4, 2000 11:59 AM
ROT-13
RJ-45
roll forward The ability of a database See also child domain; first-layer domain;
management system to re-create the data in parent domain
the database by rerunning all the transac-
tions listed in the transaction log. root directory In a hierarchical direc-
tory structure, such as that used in Unix
See also roll back; transaction processing.
and many other operating systems, the di-
ROM See read-only memory. rectory from which all other directories
must branch. You cannot delete the root
ROM BIOS See BIOS. directory.
root 1. In many operating systems, the See also parent directory; period and
name of the directory at the top of the di- double-period directories.
rectory tree from which all other directories
are descended. Root object In Novell Directory Services
2. In Unix, the name of the superuser, user (NDS), the original container object, creat-
number 0. The system administrator uses ed when NDS is first installed.
this account for certain administrative The Root object contains all other NDS ob-
tasks. One of the main objectives of an in- jects and cannot be deleted, renamed, or
truder on a Unix system is to gain root user moved. Sometimes written [Root].
status. Once achieved, the intruder has un-
limited access to the system. ROT-13 Pronounced “rote-13.”A simple
encoding scheme often used to scramble
See also avatar; root directory.
posts to Usenet newsgroups.
root domain The top-level Domain ROT-13 works by swapping each alphabet-
Name Service (DNS) domain on the Inter- ic character with another 13 characters re-
net. Also, in Microsoft Windows 2000 moved from its location in the alphabet, so
Server, the top-level domain in a Windows that a becomes n, and so on; numbers and
2000 domain tree. punctuation are unaffected.
331
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 332 Thursday, May 4, 2000 11:59 AM
router
ROT-13 makes the article unreadable until networks connected by routers can use sim-
the text is decoded and is often used when ilar or different networking protocols.
the subject matter might be considered of- A router may be one or more of the follow-
fensive. Many newsreaders have a built-in ing types:
command to unscramble ROT-13 text, and ■
Central Acts as a network backbone,
if you use it, don’t be surprised by what you
connecting many LANs.
read. If you think you might be offended,
don’t decrypt the post.
■
Peripheral Connects individual LANs to
either a central router or to another pe-
You will also find other, inoffensive mate- ripheral router.
rial encoded by ROT-13, including spoilers ■
Local Operates within its LAN driver’s
that give away the ending of a book or film cable-length limitations.
and answers to puzzles or riddles.
■
Remote Connects beyond its device
router An intelligent connecting device driver limitations, perhaps through a mo-
that can send packets to the correct LAN dem or remote connection.
segment to take them to their destination. ■
Internal Part of a network file server.
Routers link LAN segments at the network ■
External Located in a workstation on
layer of the OSI Reference Model for com- the network.
puter-to-computer communications. The See also bridge; brouter; gateway.
ROUTER
332
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 333 Thursday, May 4, 2000 11:59 AM
RS-232-C
Routing and Remote Access Service RPL A Novell NetWare server utility that
Abbreviated RRAS. In Microsoft Windows allows users to boot diskless workstations
2000 Server, the service used by remote users from files on the server.
to access the server. In addition, RRAS pro-
See also remote boot.
vides routing functions. RRAS replaces the
Windows NT Remote Access Service (RAS).
RRAS See Routing and Remote Access
Routing Information Protocol Abbre- Service.
viated RIP. A routing protocol used on
TCP/IP (Transmission Control Protocol/ RS-232-C A recommended standard (RS)
Internet Protocol) networks that main- interface established by the Electronic In-
tains a list of reachable networks and cal- dustries Association (EIA). Also known as
culates the degree of difficulty involved in EIA/TIA-232.
reaching a specific network from a partic- The standard defines the specific electrical,
ular location by determining the lowest functional, and mechanical characteristics
hop count. used in asynchronous transmissions be-
The Internet standard routing protocol tween a computer (data terminal equip-
Open Shortest Path First (OSPF) is the suc- ment, or DTE) and a peripheral device (data
cessor to RIP. communications equipment, or DCE). RS is
the abbreviation for recommended stan-
See also Open Shortest Path First.
dard, and the C denotes the third revision of
that standard. RS-232-C is compatible with
routing protocol The protocol that en-
the CCITT V.24 and V.28 standards, as
ables routing by the use of a specific routing
well as ISO IS2110.
algorithm that determines the most appro-
priate path between the source and destina- RS-232-C uses a 25-pin or 9-pin DB con-
tion nodes. nector. The accompanying illustration
Routing protocols provide dynamic routing shows the pinouts used in a DB-25 male
configuration; without routing protocols, connector. It is used for serial communica-
system administrators would have to man- tions between a computer and a peripheral
ually configure routing tables. device, such as a printer, modem, or mouse.
The maximum cable limit of 15.25 meters
See also Open Shortest Path First; Routing
(50 feet) can be extended by using high-
Information Protocol; routing table.
quality cable, line drivers to boost the sig-
nal, or short-haul modems.
routing table A table stored in a router;
used to keep track of routes to specific net- See also 1394; High Speed Serial Interface;
work destinations. Universal Serial Bus.
333
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 334 Thursday, May 4, 2000 11:59 AM
RS-422
RS-232-C INTERFACE
RS-422 A recommended standard (RS) serial interface, but does not specify a con-
interface established by the Electronic In- nector. Manufacturers who use this stan-
dustries Association (EIA). Also known as dard use many different types of connectors
EIA/TIA-422. with nonstandard pin configurations.
The standard defines the electrical and RS-449 A recommended standard (RS)
functional characteristics used in a bal- interface established by the Electronic In-
anced serial interface, but does not specify dustries Association (EIA). Also known as
a connector. Manufacturers who use this EIA/TIA-449.
standard use many different types of con-
The standard defines the specific electrical,
nectors with nonstandard pin configura-
functional, and mechanical characteristics
tions. Serial ports on some Macintosh
used in serial binary data interchange,
computers are RS-422 ports.
and it is often used with synchronous
RS-423 A recommended standard (RS) transmissions.
interface established by the Electronic In- RS-449 may be implemented using a 37-pin
dustries Association (EIA). Also known as or 9-pin DB connector; the accompanying
EIA/TIA-423. illustration shows a DB-37 male connector.
The standard defines the electrical and func-
tional characteristics used in an unbalanced
334
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 335 Thursday, May 4, 2000 11:59 AM
RS-530
RS-449 INTERFACE
RS-485 A recommended standard (RS) The standard defines the specific electrical,
interface established by the Electronic In- functional, and mechanical characteristics
dustries Association (EIA). Also known as used in transmitting serial binary data, ei-
EIA/TIA-485. ther synchronously or asynchronously, us-
ing a 25-pin DB connector.
RS-485 is similar to RS-422, except that the
associated drivers are tri-state rather than RS-530 works in conjunction with RS-422
dual-state. RS-485 can be used in multi- (balanced electrical circuits) or RS-423 (un-
point applications, in which one computer balanced electrical circuits) and allows data
controls as many as 64 devices. rates from 20Kbps to 2Mbps. The maximum
distance depends on the electrical interface in
RS-530 A recommended standard (RS) use. RS-530 is compatible with CCITT V.10,
interface established by the Electronic In- V.11, X26; MIL-188/114, and RS-449.
dustries Association (EIA). Also known as
EIA/TIA-530.
335
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 336 Thursday, May 4, 2000 11:59 AM
RS/6000
RS-530 INTERFACE
336
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 337 Thursday, May 4, 2000 11:59 AM
SAN
S
S3 Inc. A leader in the field of multimedia SAM See Security Accounts Manager.
and graphics accelerator chips, S3 Inc. sells
SAM database In Microsoft Windows
to companies such as Compaq, Dell, and
NT, the Security Accounts Manager data-
Diamond Multimedia, who use the chips in
base that holds all the user accounts, groups,
their systems and on add-in cards.
policies, and other information relating to
For more information on S3 Inc., see the domain.
www.s3.com.
The SAM database is maintained by the
SAA See Systems Application User Manager for Domains utility and is ac-
Architecture. cessed internally by the Security Accounts
Manager.
safe mode In Microsoft Windows, a
special way of starting the operating system See also domain; Security Accounts
using only the most essential components, Manager.
to allow for problem diagnosis and system
same-server migration In Novell Net-
troubleshooting.
Ware, one of the methods used to upgrade
See also Emergency Repair Disk; Recovery from NetWare 2 to NetWare 4.
Console.
The process involves upgrading the file sys-
sag A short-term drop in line voltage to tem to the NetWare 3 format first and then
between 70 and 90 percent of the nominal upgrading to NetWare 4. The server hard-
voltage. ware must be capable of running NetWare 4.
See also power conditioning; spike; surge. See also across-the-wire migration.
337
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 338 Thursday, May 4, 2000 11:59 AM
sandbox
sandbox In the Java programming sys- SAP AG One of the world’s largest inde-
tem, an area within which the Java applet pendent software suppliers, based in Wall-
may execute. The sandbox is created by the dorf, Germany.
Java Virtual Machine. SAP’s flagship product goes under the un-
The applet can do anything it likes within assuming name of R/3, but the product
the sandbox, but it cannot read or alter any serves a large part of the corporate client/
data outside the sandbox. This security server world and encompasses accounting
measure allows users (at least in theory) to and controlling, production and materials
run untrusted code without compromising management, human resources manage-
the security of their own environment. ment, plant maintenance, workflow soft-
See also Java; Java applet; Java Virtual ware, quality management, sales and
Machine. distribution, and project management.
For more information on SAP, see
Santa Cruz Operation, Inc. Abbreviat- www.sap.com.
ed SCO. Developers of several important
strains of Unix, including XENIX, SCO SAR See segmentation and reassem-
UNIX, and the SCO OpenServer series of bly sublayer.
products. SAS See single-attached station.
SCO began shipping Unix products based
on Intel processors in 1982, and now SCO SATAN See Security Administrator
Tool for Analyzing Networks.
accounts for approximately 40 percent of
the Unix market, with more than 8,000 ap- Scalable Performance Architecture
plications available from various vendors. Abbreviated SPARC. A 32-bit reduced in-
In 1995, SCO bought the rights to Unix struction set computing (RISC) processor
from Novell, and recently the company from Sun Microsystems.
combined UnixWare and OpenServer into See also SPARCstation; Sun Microsystems,
a single integrated operating system. Inc.
For more information on SCO, see
www.sco.com. scalablility The ability of an operating
system to add system resources to provide
See also OpenServer; UnixWare.
faster processing or to handle increased
Santa Cruz Operation Advanced Certi- loads in anticipation of future needs.
fied Engineer Abbreviated SCO ACE. A In practice, this usually means that an op-
certification from Santa Cruz Operation erating system is available on a range of in-
based on its SCO Unix products. Three spe- creasingly capable hardware, with only
cializations are available: Server Track, modest increases in price at each level.
Open Server Track, and UnixWare Track.
Schedule service In Microsoft Win-
SAP See Service Advertising Protocol. dows NT, a system service that performs an
338
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 339 Thursday, May 4, 2000 11:59 AM
SCSI-1
automated task at a specific time using the SCO Unix includes the Korn shell, X Win-
AT command. dow, Level C2 security, multiprocessor
support, and the ability to run MS-DOS
Schema In Microsoft Active Directory,
and Windows applications under software
the definition of the objects and their prop-
emulation.
erties that can be stored in the Active Direc-
tory database. See also Santa Cruz Operation, Inc.
339
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 340 Thursday, May 4, 2000 11:59 AM
SCSI-2
SCSI-2 A 1994 extension to the Small Architecture; Ultra SCSI; Ultra2 SCSI; Wide
Computer System Interface (SCSI) Ultra SCSI; Wide Ultra2 SCSI.
definition.
SCSI bus Another name for the Small
This standard broadened the 8-bit data bus
Computer System Interface (SCSI) interface
to 16 or 32 bits (also known as Wide SCSI),
and communications protocol.
doubling the data transfer rate to 10 or
20Mbps (also known as Fast SCSI). Wide SCSI terminator The Small Computer
SCSI and Fast SCSI can be combined to give System Interface (SCSI) interface must be
Fast/Wide SCSI, with a 16-bit data bus and correctly terminated to prevent signals
a maximum data-transfer rate of 20Mbps. echoing on the bus.
SCSI-2 is backward compatible with SCSI-1,
Many SCSI devices have built-in termina-
but for maximum benefit, you should use
tors that engage when they are needed.
SCSI-2 devices with a SCSI-2 controller.
With some older SCSI devices, you must
SCSI-2 also adds new commands, and al- add an external SCSI terminator that plugs
though the connector is physically smaller, into the device’s SCSI connector.
it uses 68 pins rather than the 50 in SCSI-1.
See also active termination; forced perfect
Higher data-transfer rates are achieved by
termination; passive termination.
using synchronous rather than asynchro-
nous transfers. scuzzy See Small Computer System
See also Fast SCSI; Fast/Wide SCSI; SCSI; Interface.
SCSI-1; SCSI-3; Small Computer System
SDH See Synchronous Digital
Interface; Ultra SCSI; Ultra2 SCSI; Wide Ul-
Hierarchy.
tra SCSI; Wide Ultra2 SCSI.
SDK See software development kit.
SCSI-3 An extension to the Small Com-
puter System Interface (SCSI) standard. SDLC See Synchronous Data Link
This definition increased the number of Control.
connected peripherals from 7 to 16, in- SDRAM See synchronous DRAM.
creased cable lengths, added support for a
variety of interfaces including a serial inter- SDSL See Single-Line Digital Subscriber
face, a Fibre Channel interface, a 1394 in- Line.
terface, and support for Serial Storage
Seagate Desktop Management
Architecture and several packet interfaces.
Suite A package of network manage-
Data-transfer rates depend on the hardware ment utilities from Seagate Software, Inc.,
implementation, but data rates in excess of that includes hardware and software inven-
160Mbps are possible. tory, server monitoring, client monitoring
See also 1394; Fast SCSI; Fast/Wide SCSI; and control, network traffic monitoring, vi-
Fibre Channel; Small Computer System rus protection, remote access, remote con-
Interface; SCSI-1; SCSI-2; Serial Storage trol, and print-queue management.
340
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 341 Thursday, May 4, 2000 11:59 AM
Secure MIME
341
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 342 Thursday, May 4, 2000 11:59 AM
See also Multipurpose Internet Mail Ex- verifiable security level, to Class D, the low-
tension; Pretty Good Privacy; Privacy En- est, which has no security.
hanced Mail.
Class C2 is the security level most appro-
Secure Sockets Layer Abbreviated priate to the business world; higher levels of
SSL. An interface originally developed by security tend to intrude too much into nor-
Netscape that provides encrypted data mal commercial working patterns. C2 secu-
transfer between client and server applica- rity requires that the operating system
tions over the Internet. provide individual logins with separate ac-
counts and a verifiable audit trail, that re-
SSL works at the network level and so can be sources have owners, and that files and
used by any SSL-compliant application. other system resources be protected from
Applications that use SSL use RSA public other processes that might corrupt them.
key encryption and digital signatures to
establish the identity of the two parties in the An operating system that lets anyone have
transaction. unfettered access, such as MS-DOS or the
MacOS, falls into the D category. C1 and
See also RSA; Secure HTTP; SOCKS.
C2 levels can be implemented in a commer-
Secure WAN Abbreviated S/WAN. An cial environment. After the B1 level, the
initiative from RSA Data Security designed computing environment changes radically,
to create secure firewall-to-firewall connec- and many of the mandatory access-control
tions over the Internet. mechanisms become impractical for nor-
mal commercial operations.
S/WAN creates a Virtual Private Network
(VPN) over the Internet, and all data trans- See also intruder.
mitted on this VPN is encrypted to keep it
secure. Security Accounts Manager Abbrevi-
ated SAM. In Microsoft Windows NT, the
See also IPSec; SOCKS; Virtual Private
security system that manages and provides
Network.
access to the account or SAM database.
security Operating system controls used SAM authenticates a user name and pass-
by the network administrator to limit users’ word against information contained in the
access to approved areas. database and creates an access token that
The National Security Agency document includes the user’s permissions.
called “Trusted Computer System Evalua- See also SAM database; security identifier.
tion Criteria” (TCSEC) specifies security lev-
els that vendors must follow to comply with Security Administrator Tool for Ana-
Department of Defense security standards. lyzing Networks Abbreviated SATAN.
This publication details standards for secu- A software package, available free over the
rity levels used to control access to comput- Internet, that allows network administrators
er systems from Class A1, the highest to identify gaps in their security systems.
342
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 343 Thursday, May 4, 2000 11:59 AM
semaphore
Critics of the program argue that SATAN security zone In Microsoft Internet Ex-
lets hackers exploit the information con- plorer, a set of classifications that control
tained in the program on how to infiltrate how a Web-based application can interact
these security systems, but so far, the pro- with the browser.
gram seems to have acted as a wake-up call
The four zones—Internet, Local intranet,
for network administrators.
Trusted sites, and Restricted sites—place
See also intruder; security. different security restrictions on any Web
sites visited and manage ActiveX controls,
security equivalence In Novell Direc- Java applets, cookies, downloads, and
tory Services (NDS), when an object or scripting .
trustee receives the same rights given to an-
other object. segmentation and reassembly
See also implied security equivalence; ex- sublayer Abbreviated SAR. One of two
plicit security equivalence. sublayers that make up the ATM Adapta-
tion Layer, the other being the convergence
security groups In Microsoft Windows sublayer (CS).
2000 Server, the groups used to assign The SAR is the lower of the two sublayers,
rights and permissions. Security groups re- packages variable-sized data packets into
place Windows NT’s user groups. fixed-sized cells at the transmitting end, and
See also distribution groups. repackages the cells at the receiving end.
security ID See security identifier. SAR is also responsible for locating and
managing lost cells and cells that are re-
security identifier Abbreviated security ceived out of sequence.
ID or SID. In Microsoft Windows NT, a
See also ATM Adaptation Layer; conver-
unique name that identifies a logged-on
gence sublayer.
user to the internal security system.
A SID contains a complete set of permis- semaphore An interprocess communica-
sions and can apply to a single user or to a tion signal that indicates the status of a
group. shared system resource, such as shared mem-
See also Security Accounts Manager. ory, in a multitasking operating system.
There are several types of semaphores:
security log In Microsoft Windows
2000, a system log that records changes to Event Allows a thread to tell other
security settings and audited access such as threads that an event has occurred and that
attempts to open files or folders. You can it is safe for them to resume execution.
use the Event Viewer to look at the contents Mutual exclusion (mutex) Protects sys-
of the security log. tem resources, such as files, data, and pe-
See also application log; Event Viewer; ripheral devices, from simultaneous
system log. access by several processes.
343
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 344 Thursday, May 4, 2000 11:59 AM
sendmail
SPX provides additional capabilities over Serial Line Internet Protocol Abbrevi-
IPX. For example, it guarantees packet de- ated SLIP. A protocol used to run Internet
livery by having the destination node verify Protocol over serial lines or telephone con-
that the data were received correctly. If no nections using modems.
response is received within a specified time,
SLIP allows a computer to establish a tem-
SPX retransmits the packet. If several re-
porary direct connection to the Internet via
transmissions fail to return an acknowledg-
modem and to appear to the host system as
ment, SPX assumes that the connection has
if it were a port on the host’s network.
failed and informs the operator. All packets
in the transmission are sent in sequence, SLIP is slowly being replaced by PPP (Point-
and they all take the same path to their des- to-Point Protocol).
tination node.
See also Internet Protocol; Point-to-Point
See also Internetwork Packet eXchange. Protocol.
344
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 345 Thursday, May 4, 2000 11:59 AM
serial port A computer input/output workstation. A server may also have sev-
port that supports serial communications, eral processors rather than just one and
in which information is processed one bit at may be dedicated to a specific support
a time. function such as printing, e-mail, or com-
RS-232-C is a common protocol used on se- munications. Many servers also have large
rial ports when communicating with mo- power supplies, UPS (uninterruptible pow-
dems, printers, mice, and other peripherals. er supply) support, and fault-tolerant fea-
tures, such as RAID technology.
See also parallel port.
On the Internet, a server responds to re-
Serial Storage Architecture Abbrevi- quests from a client, usually a Web browser.
ated SSA. A high-performance serial inter-
See also access server; communications/
face, originally developed by IBM, used to
modem server; file server; print server;
connect peripherals, such as scanners, disk
Web server.
drives, optical disks, and printers, to work-
stations or servers. server application In Object Linking
A typical SSA interface has two ports with and Embedding (OLE), an application that
a total bandwidth of 80Mbps and can man- creates OLE objects.
age two 20Mbps transmissions simulta-
See also Object Linking and Embedding.
neously, one in each direction. The shielded
four-wire cable is configured as two pairs, server-based application An applica-
and the maximum cable length is 25 meters tion run from the server rather than from a
(82 feet). local hard disk.
SSA is also specified as a physical layer se- See also client application; thin client.
rial interface in SCSI-3.
See also 1394; Fibre Channel; SCSI-3; serial server-based computing See Termi-
communications. nal services.
server Any computer that makes access Server Manager A Microsoft Windows
to files, printing, communications, and oth- NT Server utility used to manage domains,
er services available to users of the network. workgroups, and computers.
In large networks, a dedicated server runs a Server Message Block Abbreviated
special network operating system; in small- SMB. A distributed file-system network
er installations, a nondedicated server may protocol, developed by Microsoft and
run a personal computer operating system adopted by many other vendors, that al-
with peer-to-peer networking software run- lows a computer to use the files and other
ning on top. resources of another computer as though
A server typically has a more advanced they were local. For network transfers,
processor, more memory, a larger cache, SMBs are encapsulated within the NetBIOS
and more disk storage than a single-user network control block packet.
345
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 346 Thursday, May 4, 2000 11:59 AM
server push
server push A mechanism used on the See also Alerter service; Messenger ser-
Internet whereby a client application, usu- vice; Server service.
ally a Web browser, maintains an open con-
nection to a Web site, and the Web server Service Advertising Protocol Abbrevi-
provides new content to the client automat- ated SAP. A protocol that provides a meth-
ically, as soon as the new content becomes od for servers, printers, and other devices to
available. This process continues until the advertise their services on a Novell Net-
server decides to close the connection. Ware network and allows routers to create
See also client pull. and maintain a database of current inter-
network server information.
server root A directory on a Web server SAP packets are normally broadcast every
that contains the server program as well as 60 seconds and include the name, network
configuration and information files. address, and type of service offered by a
Server service In Microsoft Windows server.
NT Server, a service that manages access to SAP traffic can be excessive on large net-
and sharing of local resources attached to works, and SAP filtering is often used to re-
the network. duce the traffic; SAP traffic can be severely
reduced or even eliminated from rarely used
server side include Abbreviated SSI. A
servers.
method used to create dynamic Web pages.
The INCLUDE statement is used to embed service bureau A company that pro-
commands within an HTML document and vides data processing or business software
tells the Web server to perform specific development services to its customers.
tasks. A common way of using INCLUDE is
A service bureau might provide typesetting,
to tell the server to load the contents of an-
prepress production, optical document
other external file at a specific point in the
scanning, or other services.
original HTML document.
SSIs can degrade server performance due to By using a service bureau, a company can
the number of repeated disk accesses they avoid the high hardware and personnel costs
make, and they can also prove to be a secu- associated with running its own in-house
rity problem. services.
346
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 347 Thursday, May 4, 2000 11:59 AM
SET
347
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 348 Thursday, May 4, 2000 11:59 AM
setup string
SGML See Standard Generalized See also mailslots; named pipe; pipe;
Markup Language. semaphore; socket.
348
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 349 Thursday, May 4, 2000 11:59 AM
shortcut trust
shielded cable Cable protected against short circuit Often abbreviated to short.
electromagnetic and radio frequency inter- A circuit that is accidentally completed at a
ference (RFI) by metal-backed mylar foil point too close to its origin to allow normal
and plastic or PVC. or complete operation. In cabling, a short
circuit often occurs when two stripped
See also unshielded cable. wires touch.
349
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 350 Thursday, May 4, 2000 11:59 AM
shortest-path routing
350
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 351 Thursday, May 4, 2000 11:59 AM
single-ended SCSI
351
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 352 Thursday, May 4, 2000 11:59 AM
that uses a single wire for each signal trans- LEDs are used to transmit signals through
mitted on the bus. Used more often than dif- the cable.
ferential SCSI.
Single-mode fiber allows only one route for
See also differential SCSI; Small Computer a light wave to pass through, and it can
System Interface. transmit signals over considerable distanc-
es. For this reason, it is often used in tele-
single large expensive disk Abbrevi- phone networks rather than in local-area
ated SLED. The traditional alternative to networks.
RAID (redundant array of inexpensive See also multimode fiber.
disks), used by most networks.
single reference time server In Novell
Single-Line Digital Subscriber Line Ab-
NetWare, the server that determines the
breviated SDSL; sometimes called Symmetri-
network time and provides that informa-
cal Digital Subscriber Line. A symmetrical,
tion to workstations and to secondary time
bidirectional Digital Subscriber Line service
servers on the network.
that operates on one twisted-pair wire.
Single reference time servers are not compat-
SDSL can provide data rates of up to the T1
ible with reference or primary time servers.
rate of 1.544Mbps over a cable length of
up to 1,000 feet, and because it operates See also primary time server; reference
above the voice frequency, voice and data time server; secondary time server.
can be carried on the same connection at
the same time. single sign-on See single login.
352
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 353 Thursday, May 4, 2000 11:59 AM
SCSI-1 5 8 8
353
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 354 Thursday, May 4, 2000 11:59 AM
Fast SCSI 10 8 8
Fast/Wide SCSI 20 16 16
Ultra SCSI 20 8 8
Ultra2 SCSI 40 8 8
354
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 355 Thursday, May 4, 2000 11:59 AM
social engineering
SNA gateway A hardware and software Once this information is in the hands of the
device that connects an SNA (Systems Net- intruder, he or she can log on to that system
work Architecture) mainframe to a local- at will. One weakly secured network can
area network. therefore expose not only the local systems,
but also any remote systems to which the lo-
SNA gateway products are available from cal users connect.
Microsoft and from Novell.
Sniffer is also the name of a network ana-
See also Microsoft SNA Server; NetWare lyzer product from Network General.
for SNA.
See also intruder; network analyzer; spoof-
snail mail A rude reference to the rela- ing; Trojan Horse.
tively slow speed of the conventional postal
SNMP See Simple Network Manage-
service when compared with the speed of
ment Protocol.
online e-mail systems.
SNR See signal-to-noise ratio.
snap-in In Microsoft Management Con-
sole (MMC), the software that constitutes social engineering A method used by
the administrative tool. intruders to collect password information
MMC provides the user interface, and the from genuine users by false pretenses.
snap-in actually performs the management Social engineering can take many forms.
or administrative function. Snap-ins can be For example, a potential intruder tele-
provided by Microsoft or can be written by phones a busy technical support depart-
third-party software developers. ment, claiming to be a new service engineer
355
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 356 Thursday, May 4, 2000 11:59 AM
socket
who has just lost his password. Rather than provides a BIOS-level software interface to
go through the appropriate procedures, the the hardware, effectively hiding the specific
technical support person assigns a new details from higher levels of software. Sock-
password over the phone and implements it et services also detect when you insert or re-
on the system so that the new engineer can move a PCMCIA card and identify the type
use it immediately. of card.
See also brute-force attack; dictionary at- See also card services.
tack; sniffer.
SOCKS A proxy protocol that provides a
socket 1. A general-purpose interpro- secure channel between two TCP/IP (Trans-
cess communication mechanism, original- mission Control Protocol/Internet Proto-
ly developed in the Unix world. Sockets col) systems, usually a Web browser
allow processes that are not running at the running on an internal corporate intranet
same time or on the same system to ex- and a Web server on the Internet.
change information; pairs of cooperating
sockets manage communications between SOCKS provides firewall services, as well
the processes on your computer and those as fault tolerant features, auditing, and
on a remote computer in a networked en- management.
vironment. You can read data from or See also firewall; proxy server; Secure
write data to a socket just as you can to a Sockets Layer; Secure WAN.
file. Sockets are now used in many other
environments. soft modem See controllerless modem.
2. That part of an IPX (Internetwork Pack-
et eXchange) internetwork node address software An application program or op-
that represents the destination of an IPX erating system that a computer can execute.
packet. Certain sockets are reserved by Net- Software is a broad term that can imply one
Ware for particular applications. For exam- or many programs, and it can also refer to
ple, IPX delivers all NetWare Core Protocol applications that may consist of more than
(NCP) request packets to socket 451h. one program.
See also mailslots; named pipe; pipe; software development kit Abbreviat-
semaphore; shared memory; WinSock. ed SDK. A package that contains useful soft-
ware development tools, such as editors,
socket services Part of the software compilers, debuggers, libraries, and techni-
support needed for PCMCIA (PC Memory cal information.
Card International Association) hardware
devices in a portable computer, controlling software interrupt An interrupt gener-
the interface to the hardware. ated by an instruction in a program, often
called a trap.
Socket services is the lowest layer in the
software that manages PCMCIA cards. It See also hardware interrupt.
356
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 357 Thursday, May 4, 2000 11:59 AM
source license
software license A license to use a soft- cost of purchasing each application sepa-
ware package subject to certain conditions. rately. Additional benefits include inter-ap-
These conditions usually define the rights of plication communications, easy installation
the purchaser and limit the liability of the of the whole package, and reduced training
program’s publisher. time.
See also application metering; site license. Microsoft Office and Lotus SmartSuite are
examples of popular software suites.
software piracy The illegal copying and
distribution of copyrighted software. SOHO See small office/home office.
Copying software, like duplicating any
Solaris A version of Unix from SunSoft
copyrighted material, is illegal.
that runs on Intel-based PCs and Sun
In an attempt to discourage software pira- workstations; SunSoft is a subsidiary of
cy, the Software Publishers Association Sun Microsystems.
(SPA) has run several advertising cam-
Solaris is based on Unix System V Release 4
paigns, including a billboard showing a pair
and includes networking support, the
of handcuffs and the message “Copy soft-
OpenWindows graphical user interface,
ware illegally and you could get this hard-
and DeskSet, an integrated desktop that in-
ware absolutely free.” The SPA has been
cludes some 50 productivity tools. Solaris
successful in persuading companies to in-
supports a Java Virtual Machine as well as
ventory their software so that corporations
the Common Desktop Environment and
know which software copies they have pur-
WebNFS. Multiprocessor systems are sup-
chased legally.
ported, and Solaris uses symmetrical multi-
Software Publishers Association Ab- processing techniques to take advantage of
breviated SPA. An association of software the additional processing power.
developers and distributors most notable See also Common Desktop Environment;
for their tactics in fighting software piracy, Java Virtual Machine; SunOS; WebNFS.
including extremely blunt advertising cam-
paigns and unannounced visits to compa- SOM See System Object Model.
nies suspected of acts of piracy.
SONET See Synchronous Optical
software suite A selection of business Network
applications sold as a single integrated
package. source address The address portion of
The standard version of a software suite a packet or datagram that identifies the
usually includes a word processor, a sender.
spreadsheet, presentation graphics, and an See also destination address.
e-mail program, and the professional ver-
sion will often add a database program. The source license A software license that
cost of the suite is significantly less than the gives the user the right to possess and modify
357
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 358 Thursday, May 4, 2000 11:59 AM
source routing
the original source code from which an ap- these loops could lead to packets looping on
plication or operating system is created. their way to their destination.
In the past, source licenses have either been SP See switch processor.
simply impossible to obtain or have been
prohibitively expensive. With the spread of spanning tree algorithm A technique
open source software, things are changing. based on the IEEE 802.1 standard that finds
the most desirable path between segments
See also binary license; open source
of a multilooped, bridged network.
software
If multiple paths exist in the network, the
source routing IBM’s Token Ring spanning tree algorithm finds the most effi-
method of routing data frames through a cient path and limits the link between the
network consisting of multiple LANs by two networks to this single active path. If
specifying the route to be traveled in each this path fails because of a cable failure or
frame. The route is actually determined by other problem, the algorithm reconfigures
the end stations through a discovery pro- the network to activate another path, thus
cess supported by source-bridge routers. keeping the network running.
ST506 Interface
See also power conditioning; power surge; SSI See server side include.
surge suppressor.
SSL See Secure Sockets Layer.
splat A slang expression for the asterisk
ST506 Interface A popular hard-disk in-
character (*) that you can yell across a
terface standard developed by Seagate
crowded room without fear of being mis-
Technologies, first used in IBM’s PC/XT
understood.
computer.
See also bang.
The interface is still used in systems with
splitter server In Internet video, a server disk capacities smaller than about 40MB.
that receives a video signal and then re- ST506 has a relatively slow data-transfer
broadcasts that signal across a network. rate of 5Mbps.
See also IP multicast; multicast; stream A later variation of ST506, called ST412,
thinning. adds several improvements. Because these
two interfaces are so closely related, they
spoofing A security breach in which an are often referred to as ST506/412.
intruder logs on to the system by pretending See also Enhanced Small Device Interface;
to be a genuine user. Integrated Drive Electronics; Small Com-
The intruder may obtain another person’s puter System Interface.
user name and password in casual
359
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 360 Thursday, May 4, 2000 11:59 AM
ST
ST See straight-tip connector. backup to the Active Monitor and can take
over in the event that the Active Monitor
Standard Generalized Markup
fails.
Language Abbreviated SGML. A 1986
standard (ISO 8879) for defining the struc- See also Active Monitor.
ture and managing the contents of any dig-
ital document. star network A network topology in the
form of a star.
The standard specifies a definition for for-
matting a digital document so that it can be At the center of the star is a wiring hub or
modified, viewed, or output on any com- concentrator, and the nodes or workstations
puter system. Each SGML document con- are arranged around the central point
sists of two parts: representing the points of the star. Wiring
costs tend to be higher for star networks than
■
The DTD (Document Type Definition)
for other configurations, because each node
defines the structure of the document.
requires its own individual cable. Star
■
The DI (Document Instance) describes the networks do not follow any of the IEEE
data or text of the document. standards.
HTML, used in World Wide Web docu- See also bus network; ring network;
ments on the Internet, is a part of SGML. topology.
See also Extensible Markup Language;
HyperText Markup Language; Virtual star-dot-star A commonly available file
Reality Modeling Language. specification (*.*) that uses the asterisk
wildcard character. It is equivalent to spec-
Standby Monitor In a Token Ring net- ifying any combination of filename and file-
work, a network node that serves as a name extension.
STAR NETWORK
360
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 361 Thursday, May 4, 2000 11:59 AM
stop bit
361
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 362 Thursday, May 4, 2000 11:59 AM
STRAIGHT-TIP CONNECTOR
362
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 363 Thursday, May 4, 2000 11:59 AM
StreetTalk
streaming A method used to deliver au- the tape is not stopped during a backup. To
dio and video content in real time so that use streaming tape, the computer and back-
the person using the system can interact up software must be fast enough to keep up
with the data stream. with the tape drive.
A client downloads a portion of the audio/ See also DC-2000; tape cartridge.
video file, decompresses it, and starts to
view the video clip before the rest of the file STREAMS A Novell NetWare Loadable
arrives. Data is built up in a buffer before Module (NLM) that provides a common in-
the playback begins, and the next part of terface between NetWare and transport
the file is downloaded as the first part plays. protocols such as IPX/SPX, TCP/IP, and
SNA.
See also IP Multicast multicasting.
STREAMS allows services to be provided
Streaming SIMD Extensions Abbrevi- across the network regardless of the trans-
ated SSE. A set of multimedia instructions port protocol in use, because the protocol is
introduced with Intel’s Pentium III. transparent to the operating system.
SSE provides four main improvements over streams A function within Unix that
the Pentium II instruction set: provides flexible communications paths be-
tween processes and device drivers.
■
Eight new directly addressable 128-bit
floating-point registers. stream thinning In Internet video, the
■
Eight new instructions for streaming data process of removing video frames to protect
to and from memory. the audio feed.
■
Twelve new Single Instruction, Multiple Stream thinning is used to preserve the con-
Data (SIMD) integer instructions. nection in times of network congestion and
to avoid a forced reconnection and its asso-
■
Fifty new SMID floating-point ciated disruptive effect on the transmission.
instructions. Stream thinning restores the full video sig-
SSE can benefit 3-D graphics, 2-D images, nal once additional bandwidth becomes
speech recognition, and MPEG-2 encoding, available.
as well as scientific and engineering applica-
StreetTalk The distributed global
tions. Most standard office and business ap-
naming and directory service for Banyan
plications will see little or no improvement.
VINES network operating system. The
See also Pentium III. StreetTalk database contains all the neces-
sary information about all nodes and de-
Streaming Single Instruction, Mul- vices on the network, and this database is
tiple Data Extensions See Streaming updated constantly.
SIMD Extensions.
Under StreetTalk, all users, printers, and
streaming tape A high-speed tape back- servers have a three-part StreetTalk address
up system designed to optimize throughput; in the form of device or user name, domain
363
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 364 Thursday, May 4, 2000 11:59 AM
string
name, and organization name. StreetTalk SQL contains about 60 commands and is
also allows nicknames for nodes and devices. used to create, modify, query, and access
SteetTalk is designed to manage a large data organized in tables. It can be used ei-
number of different environments, includ- ther as an interactive interface or as embed-
ing Banyan networks, Windows NT, Unix, ded commands in an application:
and Novell NetWare. ■
Dynamic SQL statements are interactive,
See also domain directory services; Enter- and they can be changed as needed. If you
prise Network Services; global directory normally access SQL from a command-
services; NetWare Directory Services; line environment, you are using dynamic
X.500. SQL, which is slower than static SQL but
much more flexible.
string See character string. ■
Static SQL statements are coded into ap-
stripe set A single volume created across plication programs, and as a result, they
multiple hard disk drives and accessed in do not change. These statements are usu-
parallel to optimize disk-access time. ally processed by a precompiler before be-
ing bound into the application.
See also disk striping; disk striping with
parity. Many databases implement SQL queries
behind the scenes, enabling communication
strong password A password that is with database servers in systems with client/
specifically designed to be difficult to guess. server architecture.
Strong passwords are always more than SQL is an ANSI standard in the United
10 characters and always include punctu- States, as well as a worldwide International
ation characters and numbers. Organization for Standardization (ISO)
See also password; weak password. standard.
See also Open Database Connectivity.
structured graphics See object-
oriented graphics. structured wiring A planned cabling
Structured Query Language Abbrevi- system for enterprise-wide network com-
ated SQL, pronounced “sequel.” In rela- munications, including both voice and da-
tional database management systems, a ta. AT&T’s Premises Distribution Systems
query language developed by IBM for use in and IBM’s Cabling System are both struc-
mainframe applications. tured wiring designs.
364
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 365 Thursday, May 4, 2000 11:59 AM
superpipelining
See also current directory; parent directo- subscribe To post to a Usenet news-
ry; period and double-period directories. group or to join a mailing list. This is not a
subscription in the sense of a magazine sub-
sub-hive An organizational element in scription; no money ever changes hands.
the Microsoft Windows Registry, similar to
Sun Certified Solaris Administrator
a subdirectory on a hard disk.
A basic certification from Sun Microsystems
A sub-hive may contain other sub-hives or designed to recognize technical expertise in
may contain keys. Microsoft documentation installing and administering Solaris-based
sometimes refers to sub-hives as sub-keys. systems.
See also hive; key; Registry. See also Sun Microsystems, Inc.
365
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 366 Thursday, May 4, 2000 11:59 AM
superscalar
which two or more execution stages (such for security reasons. The superuser’s login
as fetch, decode, execute, or write back) are name is usually root, with a user ID of 0.
divided into two or more pipelined stages, See also avatar.
giving considerably higher performance.
surfing To browse your way through
superscalar A microprocessor architec-
various Internet resources, exploring tan-
ture that contains more than one execution
gents whenever you feel like it.
unit, or pipeline, allowing the processor to
execute more than one instruction per clock surge A short, sudden, and often de-
cycle. structive increase in line voltage. A voltage-
regulating device, known as a surge
For example, the Pentium processor is super-
suppressor, can protect computer equip-
scalar, with two side-by-side pipelines for
ment against surges.
integer instructions. The processor deter-
mines whether an instruction can be execut- See also power conditioning; spike; surge
ed in parallel with the next instruction in suppressor.
line. If it does not detect any dependencies,
surge protector See surge suppressor.
the two instructions are executed.
See also complex instruction set comput- surge suppressor A voltage-regulating
ing; reduced instruction set computing. device placed between the computer and
the AC line connection that protects the
superserver A computer specifically de- computer system from power surges; also
signed for use as a network server. known as a surge protector.
See also power conditioning.
A superserver is a very high performance sys-
tem, often characterized by scalable input/ Sustainable Cell Rate Abbreviated
output channels, complex multiprocessing SCR. In Asynchronous Transfer Mode
features, and a large price tag. It may have (ATM), the maximum average cell rate that
several processors, large amounts of error- can be maintained over a virtual connec-
correcting memory, cache memory, and tion.
hard-disk space, as well as fault-tolerant fea-
See also Asynchronous Transfer Mode;
tures, such as redundant power supplies.
Available Cell Rate; Minimum Cell Rate;
superuser A special Unix privilege level, Peak Cell Rate.
with unlimited access to all files, directo-
ries, and commands. SVC See switched virtual circuit.
The system administrator must become the SVID See System V Interface Definition.
superuser to perform certain functions, such
S/WAN See Secure WAN.
as creating new accounts, changing pass-
words, and other administrative tasks that swap To temporarily move a process
ordinary users are not allowed to perform from memory to disk, so that another
366
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 367 Thursday, May 4, 2000 11:59 AM
symmetrical multiprocessing
process can use that memory space. When Switched Multimegabit Data
space becomes available again, the process Services Abbreviated SMDS. A high-
is swapped back into memory. This allows speed metropolitan-area network service
more processes to be loaded than there is based on the 802.6 standard for use over T1
physical memory space to run them and T3 circuits. SMDS supports Ethernet,
simultaneously. Token Ring, and FDDI (Fiber Distributed
Data Interface) gateways.
swapping The process of exchanging
See also Asynchronous Transfer Mode.
one item for another. In a virtual memory
system, swapping occurs when a program switched virtual circuit Abbreviated
requests a virtual memory location that is SVC. A communications circuit that is es-
not currently in memory. Swapping may tablished for the duration of the session and
also refer to changing floppy or compact then disconnected, much like a normal
disks as needed when using a single disk voice telephone call. SVCs are used exten-
drive. sively in X.25 networks
swap space On a hard disk, a file used to See also permanent virtual circuit.
store parts of running programs that have
been swapped out of memory temporarily Sybase, Inc. A leading supplier of data-
to make room for other running programs. base management and applications devel-
opment software, including PowerBuilder,
A swap file may be permanent, always occu- a rapid application development environ-
pying the same amount of hard-disk space, ment, and PowerJEnterprise, a Java devel-
even though the application that created it opment package.
may not be running, or temporary, created
For more information on Sybase, Inc., see
as and when needed.
www.sybase.com.
See also permanent swap file; temporary
Symantec Corporation A leading de-
swap file; virtual memory.
veloper of utility programs for the PC and
the Macintosh whose products include ap-
switch processor Abbreviated SP. In
plication and system software, security and
Cisco Systems 7000 series routers, the pro-
antivirus packages, remote productivity,
cessor module that acts as the administrator
and Internet access.
for all bus activity; also known as the cisco-
Bus controller. For more information on Symantec Corpo-
ration, see www.symantec.com.
See also ciscoBus; Cisco Extended Bus.
Symmetrical Digital Subscriber Line
Switched 56 A switched four-wire digi- See Single-Line Digital Subscriber Line
tal data service available from a local ex-
symmetrical multiprocessing A mul-
change carrier that operates at 56Kbps.
tiprocessing design that assigns a task to a
See also Virtual Private Network. processor in response to system load as the
367
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 368 Thursday, May 4, 2000 11:59 AM
synchronization
application starts running. This design See also data-link layer; High-level Data
makes for a much more flexible system Link Control; Systems Network
than asymmetrical multiprocessing, in Architecture.
which the programmer matches a specific
task to a certain processor while writing Synchronous Digital Hierarchy Ab-
the program. breviated SDH. A set of fiber-optic–based
In symmetrical multiprocessing, the overall standards from the ITU for use with
workload is shared by all processors in the SONET and ATM in Europe
system; system performance increases as
synchronous DRAM Abbreviated
more processors are added into the system.
SDRAM. A high-speed memory technolo-
The drawback is that symmetrical multi-
gy, faster than EDO RAM; used in work-
processing operating systems are much
stations and servers.
harder to design than asymmetrical multi-
processing operating systems. synchronous graphics RAM Abbrevi-
See also asymmetrical multiprocessing. ated SGRAM. A type of high-speed dynam-
ic RAM used in video adapters.
synchronization The timing of separate
elements or events to occur simultaneously. Synchronous Optical Network Ab-
In computer-to-computer communica- breviated SONET. A set of fiber-optic–
tions, the hardware and software must be based communications standards with
synchronized so that file transfers can take transmission rates from 51.84Mbps to
place. 13.22Gbps.
See also asynchronous transmission; syn- First proposed by Bellcore in the mid-
chronous transmission. 1980s, SONET was standardized by ANSI,
and the ITU adapted SONET in creating the
Synchronous Data Link Control Ab- worldwide Synchronous Digital Hierarchy
breviated SDLC. The data-link protocol (SDH) standard.
most widely used in networks that con-
form to IBM’s SNA (Systems Network SONET uses synchronous transmissions in
Architecture). which individual channels (called tributar-
ies) are merged into higher-level channels
SDLC is a bit-oriented synchronous proto-
using time-division multiplexing tech-
col that organizes information into well-de-
niques. Data is carried in frames of 810
fined units known as frames. SDLC is
bytes, which also includes control informa-
similar to the HDLC (High-level Data Link
tion known as the overhead.
Control) protocol defined by the Interna-
tional Organization for Standardization See also Optical Carrier; Synchronous
(ISO). Digital Hierarchy.
368
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 369 Thursday, May 4, 2000 11:59 AM
system administration
369
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 370 Thursday, May 4, 2000 11:59 AM
■
Installing, upgrading, and removing System Fault Tolerance Abbreviated
application packages and installing oper- SFT. In Novell NetWare, a method of du-
ating system upgrades plicating data on several hard disks so that
if one disk fails, the data is still available
■
Backing up the system, storing archives
from another disk.
off location, and restoring backups as
needed Several levels of hardware and software
SFT are available in NetWare, with each
■
Installing and configuring new hardware
level of redundancy decreasing the possibil-
such as printers, storage devices, and com-
ity of catastrophic data loss. For example,
munications systems
SFT I includes HotFix redirection, and SFT
■
Monitoring system performance and II adds disk duplexing and disk mirroring.
making tuning adjustments as necessary SFT III uses duplicate servers so that all
transactions are recorded on both; if one
See also system administrator.
fails, the other can take over.
370
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 371 Thursday, May 4, 2000 11:59 AM
371
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 372 Thursday, May 4, 2000 11:59 AM
372
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 373 Thursday, May 4, 2000 11:59 AM
T3
T
T See tera-. time, multipoint data communications over
local area networks and ISDN, dial-up, and
T1 A long-distance, point-to-point cir-
Internet connections. T.120 became well
cuit, providing 24 channels of 64Kbps, giv-
known after Microsoft incorporated it into
ing a total bandwidth of 1.544Mbps.
the NetMeeting package.
The standard T1 frame is 193 bits long,
See also H.323; Microsoft NetMeeting.
made up of twenty-four 8-bit voice samples
and one synchronization bit. It transmits T2 A long-distance, point-to-point com-
8000 frames per second. When a T1 service munications service, providing up to 4 T1
is made available in single 64Kbps incre- channels.
ments, it is known as fractional T1.
T2 offers 96 channels of 64Kbps, for a total
In Europe, the comparable circuit is known bandwidth of 6.3Mbps. T2 is not available
as E-1, and it has a speed of 2.054Mbps. T1 commercially, although it is used within
has been superseded by the CCITT DS-1 telephone company networks.
designation.
See also T1; T-carrier.
See also fractional T1; T-carrier.
T3 A long-distance, point-to-point com-
T1 multiplexer A statistical multiplexer munications service, providing up to 28 T1
that divides the 1.544MbpsT1 bandwidth channels.
into 24 separate 64Kbps channels of digi-
T3 can carry 672 channels of 64Kbps, for a
tized data or voice.
total bandwidth of 44.736Mbps, and is usu-
See also fractional T1; T1. ally available over fiber-optic cable. T3 is
used almost exclusively by AT&T and the
T1 small aperture terminal Abbreviat-
regional telephone operating companies,
ed TSAT. A small satellite terminal used for
although certain large private corporations
digital communications that can handle T1
are using T3 with digital microwave or fiber-
data rates of up to 1.544Mbps.
optic networks.
See also fractional T1; T1.
In Europe, T3 has been superseded by the
T.120 A group of communications and CCITT DS-3 designation.
applications protocols that support real- See also T1; T-carrier.
373
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 374 Thursday, May 4, 2000 11:59 AM
T4
374
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 375 Thursday, May 4, 2000 11:59 AM
T-carrier
TB See terabyte. ■
T4 The equivalent of 168 T1 circuits,
T4 provides 4,032 channels of 64Kbps,
T-carrier A digital communications ser-
for a total bandwidth of 274.176Mbps.
vice from a common carrier for voice or
data transmission. See also T1; T2; T3; T4.
375
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 376 Thursday, May 4, 2000 11:59 AM
Tcl
T-CARRIER
376
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 377 Thursday, May 4, 2000 11:59 AM
TCP ports
T-CONNECTOR
TCP See Transmission Control Protocol. connection is established and a socket is set
up at each end of the connection. This sock-
TCP/IP See Transmission Control
et is created at a particular port number, de-
Protocol/Internet Protocol.
pending on the application in use. Table T.1
TCP ports In a TCP/IP network when a lists the port numbers used for some of the
computer connects with another computer common protocols.
to access a specific service, and end-to-end
23 Telnet
70 Gopher
79 Finger
377
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 378 Thursday, May 4, 2000 11:59 AM
TDM
378
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 379 Thursday, May 4, 2000 11:59 AM
terminator
TSAPI requires that the PBX (private terabyte Abbreviated TB. In computing,
branch exchange) be linked to a server and usually 240, or 1,099,511,627,776 bytes.
so has greater control over the call than Terabytes are used to represent extremely
does Telephony API. large hard-disk capacities.
See also Telephony API. terminal emulation A method of opera-
tion or software that makes a personal com-
Telnet A terminal emulation protocol, puter or a workstation act like a terminal
part of the TCP/IP suite of protocols and attached to a mainframe, usually for the
common in the Unix world, that provides purpose of telecommunications. Commu-
remote terminal-connection services. nications programs often include popular
The most common terminal emulations are emulations, such as ANSI, VT-52, VT-100,
for Digital Equipment Corporation (DEC) VT-200, and TTY.
VT-52, VT-100, and VT-220 terminals, al- See also Telnet; tn3270.
though many companies offer additional
add-in emulations. Terminal services In Microsoft Win-
See also tn3270. dows 2000 Server, an optional component
that provides multiple user sessions from
temporary swap file A swap space the same machine; also known as thin-
that is created every time it is needed. A client computing, multiuser Windows, or
temporary swap file can consist of several server-based computing.
discontinuous pieces of hard-disk space. A With Terminal services installed, the major
temporary swap file does not occupy hard- portion of all application processing takes
disk space if the application that created it place on the server, rather than on the client,
is not running. allowing you to use cheaper client hard-
See also swap space; permanent swap file; ware, install application software on the
virtual memory. server rather than on every client, and ad-
minister the server from a remote console.
ter A term describing a tertiary CCITT
terminate-and-stay-resident
recommendation, an alternative or exten-
program Abbreviated TSR. A small ac-
sion to the primary or secondary recom-
cessory or utility program that stays loaded
mendation.
in memory, even when it is not actually run-
See also bis. ning. A TSR can be invoked quickly to per-
form a specific task.
tera- Abbreviated T. A prefix that means
TSR’s are often used with single-tasking op-
1012 in the metric system,
erating systems such as MS-DOS.
1,000,000,000,000; commonly referred to
as one trillion in the American numbering terminator A device attached to the last
system, and one million million in the Brit- peripheral device in a series or the last node
ish numbering system. on a network.
379
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 380 Thursday, May 4, 2000 11:59 AM
TEX
For example, the last device on a SCSI bus thin client In a client/server network, a
must terminate the bus; otherwise, the bus client that requires relatively small amounts
will not perform properly. A 50-ohm resis- of local memory and hard-disk space and
tor is placed at both ends of an Ethernet leaves most of the processing to the server.
cable to prevent signals reflecting and inter- Sometimes called a Windows terminal.
fering with the transmission. In some cases, the client operating system,
See also active termination; forced perfect as well as the applications the client runs
termination; passive termination. and the data it manipulates, all reside on the
server.
TE X A typesetting language developed by
Donald E. Knuth of Stanford University, See also NetPC; network computer; total
capable of professional-quality typeset text, cost of ownership; Zero Administration for
particularly of mathematical equations and Windows.
scientific, Japanese, Chinese, Cyrillic, and
thin-client computing See Terminal
Arabic text.
services.
TE X is not easy for the casual user to mas-
ter, but several packages are available con- thin Ethernet Connecting coaxial cable
taining macros designed to solve specific used on an Ethernet network; also known
typesetting problems. as thinnet.
text file See ASCII file. The cable is 5 millimeters (0.2 inch) thick,
about as thick as your little finger, and can
text mode A mode in which the comput- be used to connect network nodes up to a
er displays characters on the screen using distance of approximately 165 meters (500
the built-in character set, but does not show feet). Thin Ethernet is primarily used for of-
any graphics characters or a mouse pointer. fice installations.
Also known as character mode.
See also thick Ethernet.
TFTP See Trivial File Transfer Protocol.
thinnet See thin Ethernet.
thick Ethernet Connecting coaxial cable
used on an Ethernet network; also known thrashing An excessive amount of disk
as thicknet. activity that causes a virtual memory sys-
The cable is 1 centimeter (0.4 inch) thick, tem to spend all its time swapping pages in
almost as thick as your thumb, and can be and out of memory, and no time executing
used to connect network nodes up to a dis- the application.
tance of approximately 1006 meters (3300 Thrashing can be caused when poor system
feet). Thick Ethernet is primarily used for configuration creates a swap file that is too
facility-wide installations. small or when insufficient memory is in-
See also thin Ethernet. stalled in the computer. Increasing the size
of the swap file or adding memory are often
thicknet See thick Ethernet. the best ways to reduce thrashing.
380
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 381 Thursday, May 4, 2000 11:59 AM
381
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 382 Thursday, May 4, 2000 11:59 AM
ticket
tie line A private circuit, leased from a timeout Many procedures require a de-
communications carrier, connecting two or vice to respond or reply to an inquiry within
more points in a single organization. a certain period of time; if the device does
not respond, a timeout condition occurs,
Time Division Multiple Access Abbre- thus preventing the procedure from hang-
viated TDMA. A technique used to allocate ing up the computer.
multiple channels on the same frequency on
Timeouts are also used in communications
a cellular phone or satellite communica-
to detect transmission failures. Some time-
tions system.
outs are fixed, such as the amount of time
See also Code Division Multiple Access. during which an operating system will at-
tempt to access a modem or printer; others
time-division multiplexing Abbreviat- can be specified by the user.
ed TDM. A method of sharing a transmis-
sion channel by dividing the available time time-slice multitasking A form of mul-
equally between competing stations. At the titasking in which the operating system as-
receiving end, the different signals are signs the same small time period to each
merged back into their individual streams. process in turn.
See also frequency-division multiplex- See also cooperative multitasking; pre-
ing; inverse multiplexing; statistical emptive multitasking.
multiplexing.
time stamp An identification code that
time-domain reflectometer Abbrevi- includes the time that an event took place.
ated TDR. A diagnostic tool used to detect Most operating systems add a time stamp to
cabling faults. indicate a file’s create time. Automatic error
A TDR calculates the length of a cable by logging or security auditing processes often
measuring the time it takes for a reflected add a time stamp to critical events such as
pulse to return to the TDR and then mul- changes to passwords or accounts.
tiplying that by the nominal velocity of
time synchronization A method of syn-
propagation.
chronizing time across all servers on the
time to live Abbreviated TTL. A mech- network so that all servers report the same
anism used to ensure that misdirected time.
382
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 383 Thursday, May 4, 2000 11:59 AM
token-ring network
tn3270 A special version of the Telnet Using standard telephone wiring, a Token
program specifically designed for use with Ring network can connect a maximum of
large IBM computers using 3270 and 327x 72 devices; with shielded twisted-pair (STP)
series terminals. Most of the computers wiring, each ring can support a maximum
on the Internet use Unix, but if you ever of 256 nodes. Although it is based on a
encounter an IBM mainframe, you will closed-loop ring structure, a Token Ring
definitely need tn3270. network uses a star-shaped cluster of as
So how do you know when to use tn3270 many as eight nodes, all attached to the
rather than Telnet? It’s time to load up same wiring concentrator or Multistation
tn3270 if you try to connect to an Internet Access Unit (MAU). The MAUs are then
host with Telnet and one of the following connected to the main ring circuit.
happens:
A Token Ring network can include person-
■
The on-screen messages are all in upper- al computers, minicomputers, and main-
case letters rather than the usual Unix mix frames. The IEEE 802.5 standard defines
of uppercase and lowercase letters. token-ring networks.
■
You see VM or MVS anywhere in the lo-
token-ring network A LAN with a ring
gin message. These are both names of IBM
structure that uses token passing to regulate
operating systems.
traffic on the network and avoid collisions.
■
Your session is aborted before it really
gets started. On a token-ring network, the controlling
network interface card generates a token
See also Telnet.
that controls the right to transmit. This to-
token passing A network access meth- ken is continuously passed from one node to
od that uses a circulating electronic token to the next around the network. When a node
prevent multiple nodes from transmitting has information to transmit, it captures the
on the network simultaneously. token, sets its status to busy, and adds the
message and the destination address. All
Before a node can transmit, it must be in
other nodes continuously read the token to
possession of the token. Fiber Distributed
determine if they are the recipient of a mes-
Data Interface (FDDI), Token Ring, and
sage. If they are, they collect the token, ex-
Token Bus networks all use token passing
tract the message, and return the token to
to avoid packet collisions.
the sender. The sender then removes the
See also Carrier Sense Multiple Access/ message and sets the token status to free, in-
Collision Detection; token-ring network. dicating that it can be used by the next node
in sequence.
Token Ring network IBM’s implemen-
tation of the token-ring network architec- See also 802.5; Carrier Sense Multiple
ture, which uses a token-passing protocol Access/Collision Detection; Token Ring
transmitting at 4 or 16Mbps. network.
383
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 384 Thursday, May 4, 2000 11:59 AM
Tool Command Language Abbreviat- signifies the type of institution or the coun-
ed Tcl, pronounced “tickle.” Developed by try of its origin.
John Ousterhout while at the University of In the United States, the most common top-
California at Berkeley, Tcl is a general-pur- level domains include:
pose extensible scripting language supplied
as a C library on Unix systems.
■
com A commercial organization. Most
companies end up in this category.
Tcl is also available in versions for MS-DOS,
Windows, and the Macintosh.
■
edu An educational establishment such
as a university.
See also Perl; REXX; scripting.
■
gov A branch of the U.S. government.
TOP See Technical and Office Protocol. ■
int An international organization such
top-level domains On the Internet, the as NATO or the United Nations.
highest category of host name, which either ■
mil A branch of the U.S. military.
384
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 385 Thursday, May 4, 2000 11:59 AM
traffic
■
net A network organization. See also NetPC; network computer; thin
■
org A nonprofit organization. client; Zero Administration for Windows.
topology The map of a network. Physi- See also alert log; counter log; page fault;
cal topology describes where the cables are System Monitor.
run and where the workstations, nodes,
routers, and gateways are located. Net- tracert A utility used on TCP/IP net-
works are usually configured in bus, ring, works to trace the route that datagrams
star, or mesh topologies. Logical topology take between the server and another sys-
refers to the paths that messages take to get tem. As tracert also tells you how long each
from one user on the network to another. hop takes, it can be a useful tool in identi-
fying system trouble spots.
TOPS A local-area network (LAN) from
TOPS Corporation that uses the LocalTalk trackball A device used for pointing, de-
protocol to connect Apple computers, PCs, signed as a space-saving alternative to the
and Sun workstations. mouse.
Toshiba Corporation One of the largest A trackball contains a movable ball that
manufacturers of electrical equipment in you rotate with your fingers to move the
the world, a major supplier of notebook cursor on the screen. Because it does not
computers, and a co-developer of the digital need the area of flat space that a mouse
video disc. needs, trackballs are popular with users of
For more information on Toshiba Corpo- portable computers. The Apple PowerBook
ration, see www.toshiba.com. includes a trackball as part of the keyboard
case, Microsoft has released a small track-
total cost of ownership Abbreviated
ball that clips onto the side of a laptop com-
TCO. A term first used by the Gardener
puter, and IBM has developed a dual-
Group in an attempt to quantify the real
button, touch-sensitive pointing stick called
cost of a particular computer solution.
the TrackPoint.
TCO encompasses the direct costs of the
hardware and the software required and traffic The flow of messages and data
then adds in costs for maintenance and sup- carried by a communications channel or
port, costs for the users performing their link. Traffic on a data network is normally
own technical support rather than their of- measured in bits transferred in a given time
ficial job, and system productivity costs. period.
385
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 386 Thursday, May 4, 2000 11:59 AM
transaction
386
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 387 Thursday, May 4, 2000 11:59 AM
■
Window size Provides a way to increase ning many different operating systems.
packet size, which can improve efficiency Many corporations, universities, and gov-
in data transfers. ernment agencies use TCP/IP, and it is also
■
Urgent pointer Gives the location of the basis of the Internet.
urgent data. TCP/IP is separated from the network hard-
ware and will run over Ethernet, token-ring,
■
Options Reserved for future use or for
X.25 networks, and dial-up connections. It
special options as defined by the protocol.
is a routable protocol, so datagrams can be
■
Padding Ensures that the header ends on sent over specific routes, and it has reliable
a 32-bit boundary. and efficient data-delivery mechanisms.
The data immediately follow this header TCP/IP uses a common expandable address-
information. ing scheme, so any system can address any
See also Internet Protocol; Transmission other system, even in a network as large as
Control Protocol/Internet Protocol; User the Internet, and new networks can be added
Datagram Protocol. without service disruptions.
The popularity that the TCP/IP family of
Transmission Control Protocol/ protocols enjoys today did not arise just be-
Internet Protocol Abbreviated TCP/IP. cause the protocols were available or even
A set of communications protocols first de- because the U.S. government mandated
veloped by the Defense Advanced Research their use. They are popular because they are
Projects Agency (DARPA) in the late 1970s. robust, solid protocols that solve many of
The set of TCP/IP protocols encompasses the most difficult networking problems and
media access, packet transport, session do so in an elegant and efficient way.
communications, file transfer, e-mail, and See also Address Resolution Protocol; File
terminal emulation. Transfer Protocol; Hypertext Transfer Pro-
TCP/IP is a widely published open stan- tocol; Internet Control Message Protocol;
dard, and while completely independent of Internet Mail Access Protocol; Internet Pro-
any specific hardware or software compa- tocol; Post Office Protocol; Simple Mail
ny, it is supported by a huge number of Transfer Protocol; Simple Network Man-
vendors and is available on many different agement Protocol; Telnet; tn3270; User
computers, from PCs to mainframes, run- Datagram Protocol.
387
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 388 Thursday, May 4, 2000 11:59 AM
transmission medium
TCP HEADER
388
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 389 Thursday, May 4, 2000 11:59 AM
trusted domain
transmission mode The manner in tionships that share the same namespace,
which communications can take place be- Directory Schema, and Global Catalog.
tween a sender and a receiver. See also Active Directory; Directory Sche-
Several modes are defined, as follows: ma; Global Catalog.
■
Simplex Communications can go in Tree object In Novell Directory Services
only one direction, so the sender can use (NDS), the hierarchical organization of all
the whole of the available bandwidth. the objects on the network into a single
■
Half-duplex Communications can go in structure.
two directions, but only in one direction See also container object; Novell Directory
at a time. Services; Organization object.
■
Full-duplex Communications can go in
two directions simultaneously. trellis-coded modulation Abbreviated
TCM. A form of quadrature amplitude
■
Echo-plex A rare mode in which charac- modulation used in modems that operate at
ters are retransmitted to the sender for 9600 bits per second or higher. TCM en-
error-checking purposes. codes data as a set of bits associated with
Transmit Data Abbreviated TXD. A both phase and amplitude changes.
hardware signal defined by the RS-232-C Trivial File Transfer Protocol Abbrevi-
standard that carries information from one ated TFTP. A little-used and simplified ver-
device to another. sion of the TCP/IP file transfer protocol that
See also Receive Data. does not include password protection.
Because it has no security associated with it,
transport layer The fourth of seven lay- most system administrators do not support
ers of the OSI Reference Model for comput- its use and recommend File Transfer Proto-
er-to-computer communications. The col instead.
transport layer defines protocols for mes-
See also File Transfer Protocol.
sage structure and supervises the validity of
the transmission by performing some error
Trojan Horse A type of computer virus
checking.
that pretends to be a useful program, such
See also OSI Reference Model. as a game or a utility, to entice you to use it,
when in reality it contains special code that
trap See software interrupt. will intentionally damage any system onto
which it is loaded.
trap door An entry point in a computer
network, through which an intruder can See also logic bomb.
gain access without authentication.
trusted domain In Microsoft Windows
tree In Microsoft Active Directory, a NT Server, a domain that a trusting domain
hierarchy of domains linked via trust rela- will allow to authenticate logons.
389
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 390 Thursday, May 4, 2000 11:59 AM
trustee
See also trusting domain; trust the potential to access the whole network.
relationship. Global groups and user accounts defined in
the trusted domain can be assigned rights
trustee In Novell NetWare, a user or and permissions in a trusting domain, even
group object that has been granted rights to though those accounts do not exist in the
work with a directory, an object, or a file. trusting domain’s directory database.
See also Public trustee; trustee assignment. See also authentication; pass-through
authentication; trusted domain; trusting
trustee assignment In Novell Net-
domain; user account.
Ware, a mechanism that determines how a
user can access an object, a directory, or a TSAPI See Telephony Services API.
file. Also known as trustee rights.
TSAT See T1 small aperture terminal.
For example, trustee rights regulate wheth-
er a user can read a file, change it, change its TSR See terminate-and-stay-resident
name, delete it, or control other users’ trust- program.
ee rights to it. Trustee rights are assigned to
TTL See time to live.
individual users, and one user’s rights can
be different from another user’s rights to TTS See Transaction Tracking System.
the same directory
tunneling The encapsulation of one pro-
See also Public trustee; trustee.
tocol within another, often used to trans-
port a local-area network protocol across a
trustee rights See trustee assignment.
backbone that does not support that partic-
trusting domain In Microsoft Win- ular protocol.
dows NT Server, a domain that lets users Tunneling is also used to create pseudo-
and groups in the trusted domain use its connections across connectionless net-
resources. works such as the Internet and may be re-
See also trusted domain; trust relationship. ferred to as protocol encapsulation or
synchronous pass-through.
trust relationship In Microsoft Win-
See also encapsulation; Point-to-Point
dows NT Server, a link between domains
Tunneling Protocol.
that allows pass-through authentication, in
which a trusting domain allows the logon twinaxial cable A cable with two coaxi-
authentication of a trusted domain. al cables inside a single insulating shield.
With the right trust relationships, a user Twinaxial cable is used with IBM AS/400
with one user account in one domain has minicomputers.
390
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 391 Thursday, May 4, 2000 11:59 AM
TWINAXIAL CABLE
twisted-pair cable Abbreviated TP. Ca- See also on-line transaction processing; roll
ble that comprises two or more pairs of in- back; roll forward; transaction processing.
sulated wires twisted together, at six twists
two-way transitive trust In Microsoft
per inch.
Windows 2000 Server, an automatic trust
In twisted-pair cable, one wire carries the relationship created between two Windows
signal and the other is grounded. The cable 2000 domains.
may be shielded or unshielded. Telephone If domain A trusts domain B, and domain B
wire installed in modern buildings is often trusts domain C, then domain A trusts do-
twisted-pair wiring. main C, and domain C also trusts domain
A. In Windows NT, all trust relationships
two-phase commit A method used in were created and managed manually.
transaction processing to ensure data is
See also downlevel trust; explicit trust;
posted to shared databases correctly by di- shortcut trust;
viding the writing of data into two steps.
TXD See Transmit Data.
Each of the steps must receive a verification
of completeness from the shared databases; Type 1–9 cable IBM Cabling System
otherwise, the transaction-processing sys- specifications, as follows:
tem rolls back the transaction and tries ■
Type 1 Shielded, twisted, dual-pair
again. cable with 22-gauge solid conductors
391
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 392 Thursday, May 4, 2000 11:59 AM
type-ahead buffer
392
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 393 Thursday, May 4, 2000 11:59 AM
unicast
U
UART See universal asynchronous unauthorized access To gain entry to a
receiver/transmitter. computer system using a stolen or guessed
password.
UBR See Unspecified Bit Rate.
See also hacker; intruder.
UDP See User Datagram Protocol.
unbundled software 1. Software sold
Ultra SCSI An extension of the SCSI-2
with a computer system that is priced sep-
standard that increases the data-transfer
arately, rather than included as part of a
rate to 20Mbps independent of the bus
package.
width. Ultra SCSI supports four to eight de-
vices depending on cable type and length. 2. A feature in an application repackaged
and sold by itself at a lower price.
See also SCSI-2; Small Computer System
Interface. See also bundled software.
393
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 394 Thursday, May 4, 2000 11:59 AM
Unicode
By using two bytes to represent each char- Uniform Resource Identifier Abbrevi-
acter, Unicode allows almost all the world’s ated URI. In the HTTP message header, a set
written languages to be represented in a sin- of characters that identifies a resource such
gle character set; for example, the Chinese as a file from anywhere on the Internet.
language defines almost 10,000 basic ideo- The URI includes Uniform Resource
graphs. When universally adopted, Uni- Names and Uniform Resource Locators to
code will make multilingual software much identify the file by type and location.
easier to write and maintain.
See also Uniform Resource Name;
Products such as Novell NetWare and Uniform Resource Locator.
Microsoft Windows NT provide Unicode
support. Uniform Resource Locator Abbreviat-
See also American Standard Code for In-
ed URL. An address for a resource on the
Internet.
formation Interchange; double-byte char-
acter set; Extended Binary Coded Decimal URLs are used as a linking mechanism be-
Interchange Code. tween Web pages and as a method for Web
browsers to access Web pages.
Uniform Resource Characteristic Ab-
A URL specifies the protocol to be used to
breviated URC. A mechanism designed to
access the resource (such as HTTP or FTP),
provide additional information about an
the name of the server where the resource is
Internet site or a Web page.
located (as in www.sybex.com), the path to
A URC lists pairs of attributes and their val- that resource (as in /catalog), and the name
ues and might contain author information, of the document to open (/index.html).
394
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 395 Thursday, May 4, 2000 11:59 AM
A UPS system is usually applied only to the The servername portion identifies the
most critical devices on the network, such name of the server where the resource is lo-
as servers, routers, gateways, and indepen- cated, and sharename identifies the name of
dent hard disks. They are of two main the shared file resource under which the in-
types: formation has been shared. This is fol-
■
An online UPS continuously monitors and lowed by the path and filename of the
modifies the power flowing through the resource.
unit. If an outage occurs, the UPS contin- Universal Serial Bus Abbreviated USB.
ues to provide regulated power. A standard from Intel and Microsoft for a
■
A standby UPS monitors the AC level, but high-speed peripheral bus designed to re-
only switches in when the power drops be- move the need for almost all the connectors
low a preset level; it contains circuitry ca- on the back of a personal computer.
pable of switching to backup power in 5 USB defines the ports and bus characteristics
milliseconds or less. with data transfer rates of up to 12Mbps
See also power conditioning; UPS over a single cable of up to 5 meters (16 feet).
monitoring. USB is capable of supporting a maximum of
395
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 396 Thursday, May 4, 2000 11:59 AM
63 devices such as external CD-ROM drives, they contain no proprietary code, they are
printers, external modems, mice, and the not affected by licensing agreements other
keyboard and also supplies power to some than the GNU General Public License.
devices so there is no need for separate pow- Unix today is a very different animal from
er cords or batteries. Most personal comput- the Unix of the 1980s. A typical system then
ers will have two USB ports. consisted of a minicomputer serving a col-
See also 1394. lection of dumb terminals. Unix today is
more likely to be a graphical workstation
universal synchronous receiver/ on a network or a Web server on the Inter-
transmitter Abbreviated USRT. An elec- net and is a large and complicated commer-
tronic module that combines the transmitting cial offering, serving a wide range of
and receiving circuitry needed for synchro- applications.
nous communications over a serial line.
See also Advanced Interactive Executive;
See also synchronous transmission. A/UX; Berkeley Unix; BSD Unix; FreeBSD;
Interactive Unix; Linux; NetBSD; SCO
Unix Pronounced “yoo-nix.” A multius- Unix; Solaris; System V Interface Defini-
er, multitasking operating system, original- tion; UnixWare.
ly conceived in 1969 at AT&T’s Bell Labs
by Ken Thompson and Dennis Ritchie. Unix client Any computer running Unix
Since then, Unix has gone on to become the that connects to the network.
most widely used general purpose operat-
Unix shell In Unix, a program that acts
ing system in the world.
as a user interface, interpreting commands
Over the last 25 years, there have been three typed at the keyboard and passing them on
major strands in Unix development: to the operating system.
■
Original AT&T Unix from Versions 1 to The shell sets up standard input, standard
7, and Systems III to V. output, and standard error, lets you cus-
■
Microsoft/SCO XENIX. tomize your Unix session environment, and
gives access to a shell programming lan-
■
Berkeley releases from 1BSD to 4.4BSD.
guage for creating shell scripts.
In addition, a large number of commercial
Some versions of Unix provide only one
Unix-related systems have been released by
shell, while others provide a selection from
developers such as Apple, Digital Equip-
which you can choose to use the one you
ment Corporation, Hewlett-Packard, IBM,
like best.
SCO, Silicon Graphics, and Sun Microsys-
tems. Unix is available on a huge range of Common shells include the following:
hardware, from a PC to a supercomputer. ■
Bourne Very compact and simple to use;
Several free (or almost free) versions of the original Unix shell.
Unix are available in the Intel world, in- ■
Korn Perhaps the most popular shell;
cluding Linux, FreeBSD, and NetBSD; since an upward compatible extension to the
396
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 397 Thursday, May 4, 2000 11:59 AM
unsubscribe
Bourne shell with a history file, command- ated newsgroups to be wildly spontaneous,
line editing, aliases, and job control. but they may also contain more than their
share of flames and flame wars.
■
C The first BSD shell, the C shell uses
C-like syntax and offers a history mecha- See also alt newsgroups; moderated
nism, aliasing, and job control. newsgroup.
■
Bash The Bourne-again shell from the
unshielded cable Any cable not pro-
Free Software Foundation extends the ca-
tected from electromagnetic interference
pabilities of the Bourne shell in a similar
or radio frequency interference (RFI) by an
way to the Korn shell.
outer foil shield.
■
Rc A small, compact, and elegant shell
with a strong C flavor but without com- unshielded twisted-pair cable Abbre-
mand-line editing and job control. viated UTP. Cable that contains two or
more pairs of twisted copper wires.
■
Tcsh An enhanced version of the C
The greater the number of twists, the lower
shell.
the crosstalk. UTP is offered in both voice
■
Zsh A large shell that seems to offer all grade and data grade. The advantages of
the features available in all the other UTP include ease of installation and low cost
shells. of materials. Its drawbacks are limited sig-
See also Bash shell; Bourne shell; C shell; naling speeds and shorter maximum cable-
Korn shell. segment lengths.
See also crosstalk; shielded twisted-pair
UnixWare A release of the Unix operat- cable.
ing system, originally from Novell, now
available from SCO. Unspecified Bit Rate Abbreviated
UnixWare is a 64-bit operating system that UBR. A type of Asynchronous Transfer
combines SCO’s OpenServer system with Mode (ATM) service that provides spare
previous versions of UnixWare and in- bandwidth to noncritical services such as
cludes Netscape’s FastTrack Server for file transfers.
Web site creation. A separate software de- See also Asynchronous Transfer Mode;
velopment kit, which includes a C/C++ Available Bit Rate; Constant Bit Rate; Vari-
compiler, a debugger, and other develop- able Bit Rate.
ment tools, is also available.
unsubscribe To remove the name of a
See also Santa Cruz Operation, Inc.
Usenet newsgroup from the list of news-
unmoderated newsgroup A Usenet groups maintained by your newsreader. If
newsgroup or mailing list in which posts are you change your mind, you can always sub-
not subject to review before distribution. scribe to the newsgroup again in the future.
You will find the discussions in unmoder- See also newsgroup; subscribe.
397
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 398 Thursday, May 4, 2000 11:59 AM
unzip
unzip The process of uncompressing an other systems, replacing the main processor
archive created by PKZIP, WinZip, com- can be extremely difficult.
press, or gzip.
upgrade 1. The process of installing a
See also uncompress.
newer and more powerful version of a
software or hardware product. For exam-
update sequence number Abbreviat-
ple, you may upgrade to a newer and more
ed USN. In Microsoft Active Directory, a
capable version of a software package, such
unique 16-bit number used to track updates
as Microsoft Word, or to a larger hard disk.
to Active Directory properties.
In the case of hardware, an upgrade is often
upgradable computer A computer sys- called an upgrade kit.
tem specifically designed to be upgraded as
2. A new and more powerful version of soft-
technology advances.
ware (a noun referring to the improved
The amount of circuitry that must be software itself).
changed when you make the upgrade and
the method of upgrading differ from one uplink The transmission of information
upgradable computer to another. At a min- from an earth station to a communications
imum, you must replace the processor; at satellite.
most, you need to change nearly all the cir- See also downlink.
cuitry installed in the computer. In some
systems, the use of a ZIF socket to hold the upload In communications, sending a file
main processor makes an upgrade easy; in or files from one computer to another over
398
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 399 Thursday, May 4, 2000 11:59 AM
Usenet newsgroups
UPN See user principal name. URL See Uniform Resource Locator.
399
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 400 Thursday, May 4, 2000 11:59 AM
user
throughout Usenet is simply phenomenal; Some PC user groups hold large, well-
if people are interested in a topic, you will attended monthly meetings, run their own
find a newsgroup for that topic. Web sites, and publish newsletters of excep-
tional quality.
user Any person allowed to access a com-
puter system or network. See also special interest group.
400
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 401 Thursday, May 4, 2000 11:59 AM
uuencode
401
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 402 Thursday, May 4, 2000 11:59 AM
V.17
V
V.17 A CCITT (ITU) Group 3 fax mod- includes the disabling of echo suppression
ulation standard for transmitting fax data on manually dialed calls.
at up to 14,400bps, with a fallback to
12,000bps as line conditions deteriorate. V.25 bis A CCITT (ITU) standard for au-
tomatic calling and answering circuits over
V.21 A CCITT (ITU) standard for dial-up lines with three modes: asynchro-
300bps modems using full-duplex trans- nous, character-oriented synchronous, and
mission over dial-up lines. This standard is bit-oriented synchronous (HDLC/SDLC).
not compatible with the Bell 103 standard V.25 bis does not include modem configu-
widely used in the United States. ration commands.
V.22 A CCITT (ITU) standard for 600bps V.26 A CCITT (ITU) standard for
and 1200bps full-duplex modems over two- 1200bps, full-duplex modems used over
wire, dial-up, or leased lines. V.22 uses four-wire leased lines.
phase-shift keying modulation.
V.26 bis A CCITT (ITU) standard for
V.22 bis A CCITT (ITU) standard for 1200bps and 2400bps full-duplex modems
2400bps full-duplex modems over dial-up used on dial-up lines.
and two-wire leased lines, with fallback to
V.27 A CCITT (ITU) standard for
1200bps and then 600bps operation. V.22
4800bps, full-duplex modems used with
bis uses quadrature amplitude modulation.
four-wire leased lines, with a manual
V.23 A CCITT (ITU) standard for 600bps equalizer.
or 1200bps synchronous or asynchronous
V.27 bis A CCITT (ITU) standard for
half-duplex modems used on dial-up lines.
2400bps or 4800bps, full-duplex modems
V.24 A CCITT (ITU) definition of the in- used with four-wire leased lines. The main
terface between a modem and a computer advance over V.27 is the addition of an au-
system. V.24 is functionally equivalent to tomatic adaptive equalizer for use on leased
the RS-232-C standard, but does not spec- circuits.
ify connectors or pin assignments; those are V.27 ter A CCITT (ITU) standard for
defined in ISO 2110. 2400bps or 4800bps, full-duplex modems
used with dial-up lines. Used in some
V.25 A CCITT (ITU) standard for auto-
CCITT Group 3 fax transmissions.
matic calling and answering circuits over
dial-up lines using a parallel interface. V.25 See also CCITT Groups 1–4.
402
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 403 Thursday, May 4, 2000 11:59 AM
V.90
V.29 A CCITT (ITU) standard for over four-wire, leased circuits, with time-
9600bps modems used with point-to- division multiplexing available for line
point, four-wire leased lines. This standard sharing.
has been adopted for CCITT Group 3 fax
V.34 A CCITT (ITU) standard for
transmissions over dial-up lines at
28.8Kbps modems using trellis-coded
9600bps and 7200bps.
modulation techniques and advanced data
See also CCITT Groups 1–4.
compression.
V.32 A CCITT (ITU) standard for See also V.fast.
9600bps modems, with fallback to 4800bps,
used over two-wire, dial-up lines or two- V.42 A CCITT (ITU) standard for error
wire or four-wire leased lines, with echo can- correction rather than for a modem. V.42
celing to remove any telephone-line echo, uses LAP-M (Link Access Procedure-
and quadrature amplitude modulation. Modem) as the primary error-correcting
protocol, with MNP (Microcom Network-
V.32 encodes four data bits for each baud to
ing Protocol) classes 2 through 4 as an
give an effective throughput of 9600bps and
alternative.
includes trellis-coded modulation error-
correcting techniques. V.32 is the first stan- V.42 can be used with V.22, V.22 bis, V.26
dard for 9600bps modems using standard ter, V.32, and V.32 bis.
lines anywhere in the world.
V.42 bis A CCITT (ITU) standard that
V.32 bis A CCITT (ITU) standard ex- adds a British Telecom Lempel-Ziv data-
tending V.32 to 7200, 12,000, and 14,400 compression technique to V.42 error cor-
bits per second. V.32 bis uses trellis-coded rection, usually capable of achieving a com-
modulation. pression ratio of 3.5 to 1.
V.32 terbo A pseudo-standard proposed V.54 A CCITT (ITU) standard that spec-
by AT&T and others that supports trans- ifies the loopback tests incorporated into
mission at up to 19, 200bps. modems for testing the telephone circuit
The name is a pun and does not represent an and isolating any transmission problems.
ITU standard; the next revision of the V.32
V.56 bis A CCITT (ITU) standard that
standard after V.32 bis will be V.32 ter, and
defines a network transmission model used
V.32 terbo has been replaced by the ITU
to evaluate modem performance over two-
standard V.34.
wire voice-grade circuits.
See also V.fast.
V.90 A CCITT (ITU) standard for mo-
V.33 A CCITT (ITU) standard for dems; also known as the 56K modem
12,000bps and 14,400bps modems used standard. V.90 describes an asymmetric
403
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 404 Thursday, May 4, 2000 11:59 AM
V.110
connection, with theoretical speeds of up to amount of code to an existing file, the vac-
56Kbps downstream and an upstream con- cine program causes an alert to be generat-
nection rate of up to 33.6Kbps. ed if a virus does attack.
V.90 modems attain their high speed by See also antivirus program; boot sector
assuming the circuit is a digital circuit and virus; file-infecting virus; infection; mac-
reducing the number of analog-to-digital ro virus; multipart virus; polymorphic
conversions they perform, except for the virus; stealth virus; Trojan Horse; virus.
conversion that takes place for outbound
traffic at the user’s modem. Value Added Network Abbreviated
VAN. Commercially available turn-key
Whether you actually achieve these rates data networks from companies such as
depends on the quality of the phone line and CompuServe, GE Information Services, and
the distance to the local telephone company Infonet Services Corporation.
central office. If the other end of the con-
nection is not digital, the modem switches VANs are available on a leased-line or a
into full analog mode at 28.8 or 33.6Kbps. dial-up rate and save an organization the
trouble of setting up the equipment and
In order to reduce crosstalk between adja- contracting for the lines and service. VANs
cent lines, the FCC has placed restrictions can also provide additional services such as
on maximum signal strength levels, and so message routing, resource management,
54Kbps is the theoretical maximum data and protocol-conversion services.
rate.
value-added process Abbreviated
See also K56Flex; X2.
VAP. In Novell NetWare 2.x, an applica-
tion that adds functions to the network op-
V.110 A CCITT (ITU) standard that
erating system, such as print server or
specifies how DTE (data terminal equip-
communications server software.
ment) using synchronous or asynchronous
serial interfaces is supported on an ISDN NetWare Loadable Modules (NLMs) pro-
(Integrated Services Digital Network). vide a similar function in later versions of
NetWare.
V.120 A CCITT (ITU) standard that
See also Virtual Loadable Module.
specifies how DTE (data terminal equip-
ment) using synchronous or asynchronous value-added reseller Abbreviated
serial interfaces is supported on an ISDN VAR. A company that adds value to a sys-
(Integrated Services Digital Network) using tem, repackages it, and then resells it to the
a protocol to encapsulate the transmitted public.
data.
This added value can take the form of better
vaccine A utility program designed to documentation, user support, service sup-
protect files from viruses. By adding a small port, system integration, or sometimes just a
404
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 405 Thursday, May 4, 2000 11:59 AM
new nameplate on the box. For example, for non-real-time VBR applications such as
Canon makes the print engine used in many transaction processing.
laser printers, including those from Hewlett- See also Asynchronous Transfer Mode;
Packard (HP); in this case, Canon is an OEM Available Bit Rate; Constant Bit Rate; Un-
(original equipment manufacturer) and HP specified Bit Rate.
is the VAR.
VAX Digital Equipment Corporation’s
value entry In Microsoft Windows, the
(DEC’s) popular line of minicomputers and
actual data in the Registry, stored in the
workstations, first introduced in 1977.
keys. Each value entry has a name, a data
type (which determines the length and the See also DECnet; VMS.
format of the value), and the value itself.
VBA See Visual Basic for Applications.
See also hive; key; Registry; sub-hive;
sub-key; volatile key. VBR See Variable Bit Rate.
vampire tap A connector used to connect VCC See Virtual Channel Connection.
one cable segment to another. A needle on VCI See Virtual Channel Identifier.
the connector pierces the cable insulation to
make a connection to the wire within. VDSL See Very-High-Bit-Rate Digital
Subscriber Line.
VAN See Value Added Network.
vector graphics See object-oriented
VAP See value-added process. graphics.
vaporware A slang term for a product vendor The person or company that
that has been announced but has missed its manufactures, supplies, or sells computer
release date, often by a large margin, and so hardware, software, or related services.
is not actually available. Vendor Independent Messaging
VAR See value-added reseller. Abbreviated VIM. An e-mail API
originally developed by Lotus, and
Variable Bit Rate Abbreviated VBR. A supported by Apple, IBM, MCI, Novell,
connection-oriented Asynchronous Trans- and Oracle and other e-mail vendors.
fer Mode service for real-time applications Developers use VIM to add e-mail
for which minor data loss is acceptable, and capabilities to their applications.
405
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 406 Thursday, May 4, 2000 11:59 AM
version number
406
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 407 Thursday, May 4, 2000 11:59 AM
very small aperture terminal Abbrevi- vi A popular Unix screen editor, original-
ated VSAT. A small satellite terminal used ly written by Bill Joy as part of the BSD
for digital communications, from 1 to 3 Unix systems. Pronounced “vee-eye.”
meters (3.3 to 10 feet) in diameter, capable
video adapter An adapter that provides
of managing digital transmissions of up to
the text and graphics output to the moni-
56Kbps. Satellites that can handle T1 data
tor. Some later video adapters, such as the
rates of up to 1.544Mbps are known as
SVGA, are included in the circuitry on the
TSATs.
motherboard rather than as separate plug-
VESA See Video Electronics Standards in boards.
Association.
video conferencing A method used to
VESA local bus Abbreviated VL bus; allow people at remote locations to join
also known as VL local bus. A local bus in a conference and share information.
architecture introduced by VESA (Video Originally done with analog video and ex-
Electronics Standards Association), in which pensive satellite links, video conferencing
as many as three VL bus adapter slots are is now performed with compressed digital
built into the motherboard. The VL bus al- video transmitted over a local-area net-
lows for bus mastering. The most common work or the Internet.
VL bus adapters are video adapters, hard- From an application standpoint, video con-
disk controllers, and network interface ferencing has gone way beyond looking at a
cards. picture of a person; users can look at and
See also Peripheral Component Intercon- update charts, make drawings or sketches
nect local bus; PC Card. on a chalkboard, update spreadsheets, and
so on, all online.
V.everything A marketing term used by A video camera and a speakerphone are
some modem manufacturers to describe mo- linked to a PC at each site, and the PC in
dems that comply with both the K56Flex turn is linked to the network.
and X2 proposed standards as well as with See also CU-SeeMe; desktop video; H.323;
the adopted CCITT (ITU) V.90 standard. Microsoft NetMeeting; T.120.
A V.everything modem should be compat-
ible with any other modem capable of Video Electronics Standards
operating at the same speed. Association Abbreviated VESA. An as-
sociation of video graphics adapter and
V.Fast An interim modem standard for monitor manufacturers that sets standards
uncompressed data-transfer rates of up to for personal computer video. VESA is most
28.8Kbps over dial-up voice-grade phone notable for its role in standardizing Super
lines. Made obsolete by the publication of VGA (SVGA) hardware and the develop-
the CCITT (ITU) V.34 standard. ment of the VESA local bus.
See also V.34. See also VESA local bus.
407
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 408 Thursday, May 4, 2000 11:59 AM
video RAM
A viewer displays video clips and animation See also bandwidth on demand; perma-
files. nent virtual circuit; switched virtual circuit.
408
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 409 Thursday, May 4, 2000 11:59 AM
409
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 410 Thursday, May 4, 2000 11:59 AM
(ATM) cell header, an 8-bit field used to network protocols, including SDLC (Syn-
identify virtual paths between users or be- chronous Data Link Control) and Token
tween users and networks. Ring.
See also Asynchronous Transfer Mode. virtual terminal See virtual console.
Virtual Private Network Abbreviated virus A program intended to damage a
VPN. Originally, a private network for voice computer system without the user’s knowl-
and data built from traditional carrier ser- edge or permission.
vices. More recently, a VPN is an encrypted
A virus clones itself from disk to disk or
private tunnel across the Internet.
from system to system over a network.
Virtual Reality Modeling Language Numbers are hard to come by, but certain
Abbreviated VRML. A specification and authorities claim that there are approxi-
file format for three-dimensional rendering mately 30,000 known viruses, with 400
used in conjunction with Web browsers and new ones appearing each month.
that uses existing Web protocols and works A virus may attach itself to a program or to
within the Internet framework. the partition table or boot track on a hard
VRML is a subset of Silicon Graphics’ In- disk. When a certain event occurs, a date
ventor File Format, created by Mark Pesce passes, or a specific program executes, the
and Tony Parisi in 1994. virus is triggered into action.
virtual root The root directory that a See also boot sector virus; file-infecting vi-
user sees when connected to a Web server. rus; macro virus; multipart virus; polymor-
phic virus; stealth virus; Trojan Horse;
The virtual root is an alias to an actual lo-
vaccine.
cation on a hard disk, either on the Web
server or on a different server. This tech- Visual Basic for Applications Abbrevi-
nique allows one URL to represent the Web ated VBA. A version of Microsoft Visual Ba-
site, while, at the same time, allowing the sic included with Microsoft Windows 98
Webmaster to change the root directory applications such as Excel; it is used to write
without affecting the URL. everything from simple macros to complex
See also Uniform Resource Locator. custom applications.
410
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 411 Thursday, May 4, 2000 11:59 AM
VSAT
VMS A 32-bit, multiuser, multitasking, often referred to by name, uses the term vol-
virtual memory operating system from Dig- ume name instead.
ital Equipment Corporation (DEC) for the
VAX line of computers. volume name See volume label.
411
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 412 Thursday, May 4, 2000 11:59 AM
412
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 413 Thursday, May 4, 2000 11:59 AM
weak password
W
W3 See World Wide Web. WDMA divides each channel into a set of
time slots using time-division multiplexing,
W3C See World Wide Web Consortium.
and data from different sources is assigned
WABI See Windows Application Binary to a repeating set of time slots.
Interface.
See also time-division multiplexing; wave-
WAIS See Wide Area Information length division multiplexing.
Service.
wavelength division multiplexing
wait state A clock cycle during which no
Abbreviated WDM. A frequency-division
instructions are executed, because the pro-
multiplexing (FDM) technique that allows
cessor is waiting for data from memory.
a single fiber-optic cable to carry multiple
Static RAM chips and paged-mode RAM light signals rather than a single light signal.
chips are becoming popular because they WDM places each signal on a different
can store information without being con- frequency.
stantly refreshed by the processor, thus
eliminating the wait state. A computer that See also frequency-division multiplexing;
can process information without wait states inverse multiplexing; time-division multi-
is known as a zero-wait-state computer. plexing; statistical multiplexing.
413
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 414 Thursday, May 4, 2000 11:59 AM
Web
Web See World Wide Web. Netscape Navigator and Microsoft Internet
Explorer are examples of popular Web
Web-Based Enterprise Management browsers.
Abbreviated WBEM. A platform-indepen-
See also ActiveX; helper; HyperText Mark-
dent management standard, originally pro-
up Language; player; plug-in; Uniform Re-
posed by BMC Software, Cisco Systems,
source Locator; viewer; World Wide Web.
Compaq, Intel, and Microsoft and now
supported by more than 70 companies, to
Webmaster The person responsible for
allow network, systems, and applications
maintaining and administering a Web site.
software data from a variety of sources to
be accessed and reported by management WebNFS A technology from Sun Micro-
applications regardless of the original systems that extends the Network File Sys-
source of that data. tem (NFS) to the Internet.
See also Desktop Management Interface; WebNFS makes file access across the Inter-
Simple Network Management Protocol; net as easy as local file access, provides en-
total cost of ownership; Wired for hanced download performance, and can
Management. automatically resume a file transfer after a
broken connection is restored.
Web browser A client application that
lets you look at hypertext documents, fol- Web page Information placed on a Web
low links to other HTML documents, and server for viewing with a Web browser. A
download files on the Internet or on a cor- Web page can contain text, graphics, audio
porate intranet. or video clips, and links to other Web pages.
When you find something that interests you See also Web browser.
as you browse through a hypertext docu-
ment, you can click on that object, and the Web portal See portal.
system automatically takes care of access-
Web server A hardware and software
ing the Internet host that holds the docu-
package that provides services to client
ment you requested; you don’t need to
computers running Web browsers.
know the IP address, the name of the host
system, or any other details. Clients make requests in the form of HTTP
messages; the server responds to these mes-
A Web browser will also display the graph-
sages, returning Web pages or other re-
ics in a Web page, play audio and video
quested documents to the client. Most Web
clips, and execute small Java or ActiveX
servers run a version of Unix or Microsoft
programs called applets, although certain
Windows NT Server.
older Web browsers may need helper, or
plug-in, applications to perform some of See also Hypertext Transfer Protocol; Web
these tasks. browser; Web page; World Wide Web.
414
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 415 Thursday, May 4, 2000 11:59 AM
wideband
Web site A group of HTML documents whitespace A collective name used for
and associated scripts supported by a Web groups of spaces, tabs, and newlines, those
server on the World Wide Web. printable characters that only produce
Most Web sites have a home page used as a blank spaces.
starting point or index into the site, with Wide Area Information Service Ab-
other Web pages or even other Web sites breviated WAIS, pronounced “ways.” A
connected by links. To connect to a Web service used to access text databases or li-
site, you need an Internet connection and a braries on the Internet.
Web browser.
WAIS uses simple natural-language queries
See also HyperText Markup Language;
and takes advantage of index searches for
Web browser; Web page; World Wide
fast retrieval. Unlike Gopher, which search-
Web.
es only the names of Gopher resources,
wedged A slang expression for a frozen WAIS can search the content of all docu-
or hung terminal. ments retrievable from WAIS databases.
WAIS is particularly adept at searching
Western Digital Corp A major manu- through collections of Usenet newsgroups,
facturer of storage systems, including 3.5- electronic texts, and newspaper archives.
inch Enhanced IDE drives for PCs, high- WAIS has largely been replaced by the
capacity SCSI drives for workstations and search engines now available on the World
servers, and RAID systems. Wide Web.
For more information on Western Digital See also search engine.
Corp, see www.wdc.com.
415
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 416 Thursday, May 4, 2000 11:59 AM
wideband transmission
wideband transmission See broad- been replaced by other types of Web server
band network. extensions.
See also Common Gateway Interface;
Wide SCSI A version of the SCSI-2 stan-
Hypertext Transfer Protocol.
dard that provides data transfer rates of up
to 20MBps over a 16-bit data bus.
window In a graphical user interface, a
See also Fast SCSI; Fast/Wide SCSI; rectangular portion of the screen that acts
SCSI-1; SCSI-2; SCSI-3; Small Computer as a viewing area for applications.
System Interface; Ultra SCSI; Ultra2
Windows can be tiled so that they are dis-
SCSI; Wide Ultra SCSI; Wide Ultra2 SCSI.
played side by side, or they can be cascaded
so that their individual title bars are always
Wide Ultra SCSI A version of the SCSI-2
visible. They then can be individually
standard that provides data transfer rates of
moved and sized on the screen. Some pro-
up to 40MBps over a 16-bit data bus.
grams can open multiple document win-
See also Fast SCSI; Fast/Wide SCSI; SCSI- dows inside their application window to
1; SCSI-2; SCSI-3; Small Computer System display several word-processing or spread-
Interface; Ultra SCSI; Ultra2 SCSI; Wide sheet data files at the same time.
SCSI.
See also X Window.
416
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 417 Thursday, May 4, 2000 11:59 AM
417
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 418 Thursday, May 4, 2000 11:59 AM
wireless communications
The following methods are in use: wiring closet A location where cables
are gathered together to connect to the cen-
■
Infrared line of sight High-frequency tral wiring in an office or building.
light waves are used to transmit data
between nodes up to 24.4 meters (80 feet) word length 1. The standard data unit
apart using an unobstructed path; infra- in a particular computer. The most com-
red beams cannot pass through masonry mon words are 8, 16, 32, or 64 bits in
walls. Data rates are relatively high, in the length.
tens of megabits per second range. 2. In communications, the number of data
■
High-frequency radio High-frequency bits in a data word.
radio signals transmit data to nodes from workflow software Software that al-
12.2 to 39.6 meters (40 to 130 feet) apart, lows users to move and manage informa-
depending on the nature of obstructions tion among themselves, combining the
separating them; the signal can penetrate functions of e-mail, imaging, and document
thin walls but not supporting masonry. management.
Data rates are usually less than 1Mbps.
A document moves through various stages
■
Spread-spectrum radio A small set of fre- of processing as it is edited, signed, or vali-
quencies are available for wireless LANs dated by the various members of the work-
without FCC approval. The 902 to 928Mhz group. Each stage is orchestrated and
band is known as the Industrial, Scientific, validated by the workflow software.
Medical (ISM) band and is not regulated.
See also workgroup.
The 2.4 to 2.483Ghz band is regulated and
requires an FCC license for use. Spread- workgroup A group of individuals who
spectrum nodes can be up to 243.8 meters work together and share the same files and
(800 feet) apart in an open environment, databases over a local-area network. Spe-
and these radio waves can pass through ma- cial software coordinates the workgroup
sonry walls. However, in an environment and allows users to edit and exchange files
with fully enclosed offices, distances are lim- and update databases as a group.
ited to 33.5 meters (110 feet). Data rates are
See also workflow software.
usually less than 1Mbps.
Wireless LANs are not always completely WorkGroup Director A Simple Net-
wireless and may be used to replace the ca- work Management Protocol (SNMP) soft-
bling on certain network segments or to ware package from Cisco Systems.
418
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 419 Thursday, May 4, 2000 11:59 AM
WorkGroup Director runs on Unix systems and a lot of fun to access World Wide Web
either as a stand-alone application or as an information.
element in a larger SNMP-based network
See also HyperText Markup Language;
management system.
Internet; portal; search engine; Web
working directory Jargon for the cur- browser.
rent working directory; also known as the
current directory. World Wide Web Consortium Abbre-
viated W3C. An international consortium
workstation 1. In networking, any per- founded in 1994 to develop protocols for
sonal computer attached to the network. the continuing evolution of the World Wide
Web.
2. A high-performance computer optimized
for graphics applications, such as computer- For more information on the World Wide
aided design (CAD), computer-aided engi- Web Consortium, see www.w3.org.
neering (CAE), or scientific applications.
WORM Acronym for Write Once Read
World Wide Web Abbreviated WWW, Many. A high-capacity optical storage de-
W3, or simply the Web. A huge collection vice that can only be written to once, but
of hypertext pages on the Internet. that can be read a number of times.
World Wide Web concepts were developed WORM devices can store huge amounts of
in Switzerland by the European Laboratory data, as much as 1 terabyte, are highly reli-
for Particle Physics (known as CERN), but able, and are well suited to archival and
the Web is not just a tool for scientists; it is other nonchanging storage.
one of the most flexible and exciting tools in
write-back cache A technique used in
existence.
cache design for writing information back
Hypertext links connect pieces of informa- into main memory.
tion (text, graphics, animation, audio, and
In a write-back cache, the cache stores the
video) in separate HTML pages located at
changed block of data, but only updates
the same or at different Internet sites, and
main memory under certain conditions,
you explore these pages and links using a
such as when the whole block must be over-
Web browser such as Netscape Navigator
written because a newer block must be
or Microsoft Internet Explorer.
loaded into the cache or when the control-
You can also access a Web resource directly ling algorithm determines that too much
if you specify the appropriate URL (Uni- time has elapsed since the last update. This
form Resource Locator). method is rather complex to implement,
World Wide Web traffic is growing faster but is much faster than other designs.
than most other Internet services, and the See also cache; write-through cache.
reason for this becomes obvious once you
try a capable Web browser; it is very easy Write Once Read Many See WORM.
419
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 420 Thursday, May 4, 2000 11:59 AM
write-through cache
420
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 421 Thursday, May 4, 2000 11:59 AM
X.500
X
X See X Window. X.29 A CCITT (ITU) standard, devel-
oped in 1977, for user data and the ex-
X2 A modem technology from U.S. Ro- change of control information between a
botics (now part of 3COM) that provides a PAD (packet assembler/disassembler) and
data rate of up to 56Kbps downstream and packet-mode DTE (data terminal equip-
up to 40Kbps upstream. Replaced by the ment) or another PAD.
V.90 standard.
X.75 A CCITT (ITU) standard that de-
See also K56Flex; V.90. fines the procedures used to connect two
separate packet-switched networks, such as
X.21 A CCITT (ITU) standard that de- those located in separate countries; often
fines a protocol used in a circuit-switching referred to as an X.25 gateway.
network.
X.200 A CCITT (ITU) standard that
X.25 A CCITT (ITU) standard, devel- documents the seven-layer OSI Reference
oped in 1976, that defines the connection Model for computer-to-computer
between a terminal and a public packet- communications.
switched network.
X.400 A CCITT (ITU) recommended
X.25 describes the electrical connections, standard, released in 1984 and revised sev-
the transmission protocol, error detection eral times since then, for public or private
and correction, and other aspects of the international e-mail distribution systems,
link. X.25 standards parallel the lowest defining how messages will be transferred
three levels of the OSI Reference Model for across the network or between two or more
computer-to-computer communications: connected heterogeneous networks.
the physical layer, data-link layer, and net-
X.400 defines the components of an elec-
work layer.
tronic address as well as the details of the
X.25 gateway See X.75. envelope surrounding the message and the
rules to follow when converting between
X.28 A CCITT (ITU) standard, devel- message types, such as text or fax.
oped in 1977, that defines a DTE/DCE See also X.500; X.509.
(data terminal equipment/data communi-
cations equipment) interface for accessing a X.500 A CCITT (ITU) recommended
PAD (packet assembler/disassembler) in a standard, first released in 1988 and revised
public data network that does not cross an several times since then, for a global direc-
international boundary but is confined tory system for locating e-mail users, to be
within one country. used with the X.400 e-mail services. X.500
421
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 422 Thursday, May 4, 2000 11:59 AM
X.509
422
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 423 Thursday, May 4, 2000 11:59 AM
423
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 424 Thursday, May 4, 2000 11:59 AM
Y2K problem
Y
Y2K problem The inability of some old- Year 2000 bug See Y2K problem.
er computer programs to process dates cor-
Yellow Pages A name for the security
rectly after midnight on December 31,
and file-access databases on Unix systems.
1999.
These databases are now known as the Net-
Computer programmers in the 1960s and work Information Service (NIS).
‘70s abbreviated the date field to two digits,
See also Network Information Service.
partly to save space and partly because they
were convinced that the software would be Ymodem A popular file transfer proto-
rewritten before the abbreviated date ever col available in many off-the-shelf and
became a problem. So Y2K isn’t really a shareware communications packages.
bug; the programmers and designers did it
Ymodem, a variation of the Xmodem pro-
on purpose.
tocol, divides the data to be transmitted
This means that older software reads 99 as into blocks; each block consists of the start-
1999, and as the year 2000 begins, it will in- of-header character, a block number, 1KB
terpret 00 as the first day of 1900. of data, and a checksum. Ymodem’s larger
Dates and calculations based on dates are data block means less overhead for error
used in almost all business, sales, account- control when compared with Xmodem, but
ing, and commercial software, much of if the block has to be retransmitted because
which was written in computer languages no the protocol detects an error, there is more
longer in common use. Without expensive data to resend. Ymodem also incorporates
and time-consuming modifications and test- the capabilities to send multiple files in the
ing, these systems will at best provide unpre- same session and to abort file transfer dur-
dictable results after January 1, 2000; at ing the transmission.
worst, they will simply fail to operate. See also Kermit; Zmodem.
424
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 425 Thursday, May 4, 2000 11:59 AM
zero-slot LAN
Z
.Z Filename extension that identifies a Zero Administration for Windows
Unix file compressed by the gzip or the Abbreviated ZAWS. A Microsoft-led initia-
compact utility. tive designed to lower the total cost of own-
ership of Windows-based network clients
.z Filename extension that identifies a in the corporate world.
Unix file compressed by the compress
ZAW has evolved over time and now focuses
utility.
on three main areas:
ZAK See Zero Administration Kit. ■
Installing an operating system on a new
computer or on a new hard disk in an
ZAW See Zero Administration for
existing computer
Windows.
■
Deploying applications from central
Z.E.N.works See Novell Z.E.N.works. servers to the desktop
■
Distributing modifications or upgrades to
Zero Administration Kit Abbreviated
applications
ZAK. A collection of tools, scripts, and
methodologies used by system administra- See also NetPC; network computer; thin
tors to simplify the implementation of se- client; total cost of ownership.
cure management on the Windows family
Zero Insertion Force socket A special-
of operating systems.
ly designed chip socket that makes replac-
ZAK allows system administrators to ing a chip easier and safer.
perform three main functions quickly and To change a chip in a ZIF socket, you raise
easily: a lever beside the socket to free the original
■
To centralize configuration chip’s pins from the socket. You then slide
the old chip out and slide in the replacement
■
To eliminate local access to the desktop chip, taking care to align the pins and holes.
computer Finally, you lower the lever again. A ZIF
■
To allow storage of data and applications socket minimizes damage to the delicate
on the server rather than on the client pins that connect the chip to the rest of the
system.
See also Advanced Configuration and
Power Interface; Desktop Management In- zero-slot LAN A local-area network that
terface; NetPC; network computer; thin cli- uses one of the existing serial or parallel
ent; total cost of ownership; Wired for ports on the computer rather than a special
Management; Zero Administration for network interface card plugged in to the
Windows. computer’s expansion bus.
425
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 426 Thursday, May 4, 2000 11:59 AM
zero-wait-state computer
Because zero-slot LANs can only transmit ZIP file A file whose contents have been
as fast as the computer’s output port, they compressed by one of the popular file-com-
are considerably slower than networks that pression utilities, such as PKZIP, WinZip,
use network-specific hardware and soft- or other comparable program; the filename
ware. The maximum length of each cable extension is .ZIP.
segment is also severely limited, so zero-slot
A ZIP file can contain a single compressed
LANs can network only two or three com-
file or a whole collection of archives. A file
puters. The advantage of a zero-slot LAN is
compressed in this way is said to have been
its low cost compared with dedicated net-
zipped.
work systems.
See also peer-to-peer network. To uncompress a ZIP file, use the same util-
ity that compressed it originally. Some ZIP
zero-wait-state computer A computer files are self-extracting and can uncompress
that can process information without pro- themselves when you click their icon.
cessor wait states, which are clock cycles See also file compression; PKZIP; WinZip;
during which no instructions are executed .ZIP.
because the processor is waiting for data
from a device or from memory. zipped See ZIP file.
Static RAM chips and paged-mode RAM
chips are becoming popular because they Zmodem A popular file transfer proto-
can store information without being con- col available in many off-the-shelf and
stantly refreshed by the processor, thus shareware communications packages.
eliminating the wait state. Zmodem is similar to Xmodem and Ymo-
See also wait state. dem but is designed to handle larger data
transfers with fewer errors. Zmodem also
ZIF socket See Zero Insertion Force includes a feature called checkpoint restart,
socket. which allows an interrupted transmission
.ZIP Filename extension that identifies a to resume at the point of interruption, rath-
file compressed by the PKZIP or WinZip er than starting again at the beginning of the
utilities. transmission.
See also PKZIP; WinZip; ZIP file. See also Kermit; Xmodem; Ymodem.
Zip Drive A popular removable storage zombie In Unix and other operating sys-
device from Iomega Corporation, capable tems, a dead process that has not yet been
of storing 100MB on relatively cheap, por- deleted from the process table.
table, 3.5-inch disks.
Most zombies disappear almost immedi-
Zip Drives have emerged as the de facto ately, although from time to time, you may
standard personal computer backup device. find one that is impossible to delete with-
See also Iomega Corporation. out rebooting the system. Zombies do not
426
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 427 Thursday, May 4, 2000 11:59 AM
zone
consume any system resources, other than zone On a local-area network such as
their slot in the process table. AppleTalk, a logical subgroup of users
within a larger group of interconnected
networks.
427
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 428 Thursday, May 4, 2000 11:59 AM
The Web is in a constant state of flux as URLs change and Web sites disappear. The better-
organized sites will simply post a link to the new location if they make substantive changes,
and you can use that new link to go right to the new or reorganized site. Other sites reor-
ganize themselves periodically as a part of their housekeeping; the information you want
is still available, but you have to look in another place to find it or use the site’s built-in
search engine to find it.
When all else fails, use one of the Web sites listed in the “Portals and Search Engines” section
of this appendix. In it you will find a list of the sites you can use to search the Web for doc-
uments using keywords, phrases, or even Boolean expressions. See each individual search
engine site for details.
Hardware Companies
This section lists the major manufacturers and suppliers of networking and computer
hardware.
428
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 429 Thursday, May 4, 2000 11:59 AM
Cyrix www.cyrix.com
IBM www.ibm.com
429
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 430 Thursday, May 4, 2000 11:59 AM
Packard-Bell www.packardbell.com
430
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 431 Thursday, May 4, 2000 11:59 AM
PC Connection www.pcconnection.com
431
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 432 Thursday, May 4, 2000 11:59 AM
SCO www.sco.com
SAP www.sap.com
Internet Organizations
Here you will find URLs relating to the main Internet organizations.
432
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 433 Thursday, May 4, 2000 11:59 AM
ANSI www.ansi.org
CERN www.cern.ch
CERT www.cert.org
EIA www.eia.org
FCC www.fcc.gov
IEEE www.ieee.org
IrDA www.irda.org
ISO www.iso.ch
ITU www.itu.ch
NCSC www.ncsc.com
433
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 434 Thursday, May 4, 2000 11:59 AM
TIA www.tiaonline.org
Chickclick www.chickclick.com
ESPN www.espn.com
Excite www.excite.com
GoTo.com www.goto.com
Hotbot www.hotbot.com
Infoseek www.infoseek.com
Ivillage www.ivillage.com
Lycos www.lycos.com
Netcenter www.netcenter.com
Snap! www.snap.com
Yahoo! www.yahoo.com
434
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 435 Thursday, May 4, 2000 11:59 AM
Slashdot www.slashdot.org
GNU www.gnu.org
XFree86 www.xfree86.org
435
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 436 Thursday, May 4, 2000 11:59 AM
Interexchange Carriers
This section lists the carriers that provide long-distance service in the United States.
436
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 437 Thursday, May 4, 2000 11:59 AM
A+ A+ Certification
CC Certified Consultant
437
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 438 Thursday, May 4, 2000 11:59 AM
CE Certified Expert
438
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 439 Thursday, May 4, 2000 11:59 AM
CS Certified Specialist
CU Certified User
439
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 440 Thursday, May 4, 2000 11:59 AM
N+ Network+ Certification
440
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 441 Thursday, May 4, 2000 11:59 AM
CompTIA A+ Certification
Certified Document Image Architect
Network+ Certification
441
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 442 Thursday, May 4, 2000 11:59 AM
442
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 443 Thursday, May 4, 2000 11:59 AM
443
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 444 Thursday, May 4, 2000 11:59 AM
444
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 445 Thursday, May 4, 2000 11:59 AM
445
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 446 Thursday, May 4, 2000 11:59 AM
8 BS (Backspace) Ctrl+H
446
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 447 Thursday, May 4, 2000 11:59 AM
447
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 448 Thursday, May 4, 2000 11:59 AM
32 space 51 3
33 ! 52 4
34 " 53 5
35 # 54 6
36 $ 55 7
37 % 56 8
38 & 57 9
39 ' 58 :
40 ( 59 ;
41 ) 60 <
42 * 61 =
43 + 62 >
44 , 63 ?
45 - 64 @
46 . 65 A
47 / 66 B
48 0 67 C
49 1 68 D
50 2 69 E
448
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 449 Thursday, May 4, 2000 11:59 AM
70 F 89 Y
71 G 90 Z
72 H 91 [
73 I 92 \
74 J 93 ]
75 K 94 ^
76 L 95 _
77 M 96 `
78 N 97 a
79 O 98 b
80 P 99 c
81 Q 100 d
82 R 101 e
83 S 102 f
84 T 103 g
85 U 104 h
86 V 105 i
87 W 106 j
88 X 107 k
449
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 450 Thursday, May 4, 2000 11:59 AM
108 l 118 v
109 m 119 w
110 n 120 x
111 o 121 y
112 p 122 z
113 q 123 {
114 r 124 |
115 s 125 }
116 t 126 ~
128 Ç 135 ç
129 ü 136 ê
130 é 137 ë
131 â 138 è
132 ä 139 ï
133 à 140 î
450
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 451 Thursday, May 4, 2000 11:59 AM
134 å 141 ì
142 Ä 161 í
143 Å 162 ó
144 É 163 ú
145 æ 164 ñ
146 Æ 165 Ñ
147 ô 166 a_
148 ö 167 _
o
149 ò 168 ¿
2
150 û 169
3
151 ù 170
1
152 ÿ 171 ⁄2
1
153 Ö 172 ⁄4
154 Ü 173 ¡
155 ¢ 174 «
156 £ 175 »
.........
.........
157 ¥ 176
----
----
158 Pt 177 ----
----
- -
-----
-----
159 ƒ 178 -----
-----
---
451
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 452 Thursday, May 4, 2000 11:59 AM
160 á 179
180 199
181 200
182 201
183 202
184 203
185 204
186 205
187 206
188 207
189 208
190 209
191 210
192 211
193 ? 212
195 £ 214
196 – 215
197 1 216
452
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 453 Thursday, May 4, 2000 11:59 AM
198 217
218 237 f
219 238 ´
220 239 \
221 240 [
222 241 6
223 242 ∫
224 ~ 243 π
225 ı 244
226 G 245
227 p 246 4
229 s 248 8
230 m 249 8
231 t 250 -
232 F 251 =
233 Q 252 n
453
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 454 Thursday, May 4, 2000 11:59 AM
2
234 V 253
235 W 254 ■
236 1 255
454
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 455 Thursday, May 4, 2000 11:59 AM
455
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 456 Thursday, May 4, 2000 11:59 AM
456
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 457 Thursday, May 4, 2000 11:59 AM
57 IT (indent tab)
61 NAK (negative 93 )
acknowledge)
62 not assigned 94 ;
64 SP (space) 96 -
|
74 ¢ 106 | (broken pipe)
75 . 107 ,
76 < 108 %
77 ( 109 -
78 + 110 >
457
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 458 Thursday, May 4, 2000 11:59 AM
122 : 145 j
123 # 146 k
124 @ 147 l
|
125 148 m
126 = 149 n
129 a 152 q
130 b 153 r
132 d 161 ~
133 e 162 s
134 f 163 t
135 g 164 u
136 h 165 v
137 I 166 w
167 x 210 K
458
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 459 Thursday, May 4, 2000 11:59 AM
168 y 211 L
169 z 212 M
192 { 214 O
193 A 215 P
194 B 216 Q
195 C 217 R
197 E 224 \
199 G
200 H 226 S
201 I 227 T
208 } 230 W
209 J 231 X
232 Y 245 5
459
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com
2461book Page 460 Thursday, May 4, 2000 11:59 AM
233 Z 246 6
240 0 248 8
241 1 249 9
244 4
460
Copyright © 2000 SYBEX Inc., Alameda, CA. www.sybex.com