Vocab List - Module 2 Flashcards
Module 2
it is an address family that is used to identify routing sessions for protocols that use standard IP version 4 address prefixes, such as BGP. In the IPv4 address family:
Unicast or multicast address prefixes can be specified.
Unicast routing information is advertised by default when a BGP peer is configured unless the advertisement of unicast IPv4 information is explicitly turned off.
IPv4 (Internet Protocol version 4)
A new packet structure that has 128-bit source and destination IP addresses, which are four times larger than the current Ipv4. _______ also provides for a simplified header format and supports time-dependent traffic for use with voice and video that require specified bandwidth. _____ is also extensible to provide for additional headers if needed.
IPv6
It is an older communication protocol used to interconnect clients and servers on a Novell NetWare operating system environment. _____ is a connectionless packet protocol that operates at the Network layer of communication. SPX is a transport layer protocol that sits on top of the IPX layer providing connection- oriented services between network nodes.
IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange)
A physical line that devices use to send signals to the processor when they want to send or receive information.
IRQ (Interrupt Request Line)
This organization has the responsibility to coordinate all TCP/IP-related research projects.
IRTF (Internet Research Task Force)
It is a network protocol that encapsulates storage device communication data into IP packets for transmission over an Ethernet connection allowing IP- connected hosts to access a Storage Area Network (SAN). iSCSI provides the benefits of a FC SAN without the cost of fibre channel hardware. Using Ethernet and iSCSI, you can create a very powerful, very fast SAN using off- the-shelf, commodity-grade Ethernet hardware such as Cat5/5e cabling and Ethernet switches.
ISCSI
It is another alternative to traditional dial-up that can be used to connect to the Internet or to directly communicate with another computer connected to the ISDN network. ISDN is more common in Europe than in the U.S. ISDN can use regular telephone wiring, but must be connected to a special ISDN network.
Levels of ISDN service include:
BRI (Basic Rate Interface):
2 64-Kbps bearer (B) channels can transfer data up to 128 Kbps. Only one B channel is used during phone use.
1 16-Kbps delta (D) channel for connection control.
PRI (Primary Rate Interface):
23 B channels (each at 64 Kbps) for data transmission. 1 D channel (at 64 Kbps) for connection control.
ISDN (Integrated Services Digital Network)
Intermediate System to Intermediate System (IS-IS) is an OSI-based link-state routing protocol.
IS-IS (Intermediate System to Intermediate System)
A global organization created in 1992. Responsible for the internetworking technologies and applications of the Internet. It is also responsible for the further development of the standards and protocols that allow the Internet to function.
ISOC (Internet Society)
An ISP (Internet service provider) is a company that provides Internet access and other web related services.
ISP (Internet service provider)
A domain controller whose Knowledge Consistency Checker (KCC) establishes inbound intersite Connection objects for all bridgehead servers in a site.
ISTG (Intersite Topology Generator)
A committee that has set most standards related to modems since the late 1980s.
ITU (International Telecommunications Union)
Exchange 2007’s database engine is referred to as the Extensible Storage Engine (ESE). ESE is a transactional database that writes information into RAM memory and into a log file. Once it is in the log file, it will be written to disk.
There are a number of files used to store information:
.JRS file
A programming language designed to let programmers create applications for the Internet. Java applications do not depend on a particular operating system or hardware platform to run.
Java
Journaling is the ability to record and retain all communications in an organization.
Journaling
A process that runs on each domain controller and creates inbound Connection objects (almost always intrasite Connection objects).
Keepalive messages act as hello packets to ensure that routers are still responsive.
KCC (Knowledge Consistenc Checker)
Keepalive messages
It is an authentication encryption protocol designed to provide security for the initial logon process and service requests. Kerberos uses symmetric key cryptography, employs DES, and provides end-to-end security.
Kerberos
A privileged operating mode for the operating system files and processes that interact directly with the computer’s hardware.
Kernel mode
A part of the Registry. Keys appear as folders in the Registry window and can contain subkeys and values.
Key
A process that runs on each domain controller and creates inbound Connection objects (almost always intrasite Connection objects).
Knowledge Consistency Checker (KCC)
L2F is a VPN protocol which offers no data encryption.
L2F was combined with PPTP, creating L2TP. Support for IPSec was added, and the result is a very versatile, nearly universally interoperable VPN protocol that provides solid authentication and reliable data encryption.
L2F (Layer 2 Forwarding Protocol)
It is (Layer 2 Tunneling Protocol) is the VPN protocol that typically employs IPSec as its data encryption mechanism.
It is the recommended VPN protocol to use on dial-up VPN connections.
L2TP (Layer Two Tunneling Protocol)
A group of closely located computers or peripherals connected so that they can interact with each other as a network.
LAN (Local area network)
A Data Link layer protocol called Link Access Procedure for Modems (LAPM) used by newer modems for error detection. LAPM is implemented in the modem hardware. LAPM is described by ITU’s V.42 standard.
LAPM (Link Access Procedure for Modems)
It is a VPN protocol which offers no data encryption.
Layer 2 Forwarding Protocol (L2F)
A ____________ operates at the Network layer reading the logical address and making forwarding and receiving decisions. Contrast this with most switches that operate at the Data Link layer which read the MAC address.
Layer 3 switch
It is the VPN protocol that typically employs IPSec as its data encryption mechanism. It is the recommended VPN protocol to use on dial-up VPN connections.
_______ was created by combining PPTP and L2F and adding in support for IPSec. The result is a very versatile, nearly universally interoperable VPN protocol that provides solid authentication and reliable data encryption.
Layer Two Tunneling Protocol (L2TP)
A ________________ distributes link-state information and defines the characteristics of an IS-IS router.
Layered Service Provider (LSP)
A lightweight protocol that clients such as Outlook Express use to look up and search for addresses in an online directory. It also allows a user to add, edit, and delete information from the directory.
LDAP (Lightweight Directory Access Protocol)
The period of time for which a dynamically assigned IP address remains valid for a DHCP client. Before the end of the lease, the client has to renew the lease or be assigned a new lease by DHCP.
Lease
__________ is the traditional method of backup for Exchange environments.
Legacy streaming
The way you pay to use an application or operating system. You can choose Per Server or Per Seat licensing for Windows 2000.
Licensing mode
A lightweight protocol that clients such as Outlook Express use to look up and search for addresses in an online directory. It also allows a user to add, edit, and delete information from the directory.
Lightweight Directory Access Protocol (LDAP)
A service residing on a UNIX print server that receives print jobs from clients using the LPR utility.
Line Printer Daemon (LPD)
LPD/LPR is the most widely-used cross platform print protocol. LPD/LPR establishes connection between printing devices and workstations. LPD is usually loaded on the printing device. LPR is usually loaded onto the client workstation.
Line Printer Daemon/Line Print Remote (LPD/LPR)
This utility obtains the status of a print queue on a host running the Line Printing Daemon (LPD) service.
Line Printer Queue (LPQ)
A utility on a client that allows it to send print jobs to the Line Printer Daemon on the server.
Line Printer Remote (LPR)
A Data Link layer protocol called Link Access Procedure for Modems (LAPM) used by newer modems for error detection. LAPM is implemented in the modem hardware. LAPM is described by ITU’s V.42 standard.
Link Access Procedure for Modems (LAPM)
Routing algorithm in which each router broadcasts or multicasts information regarding the cost of reaching each of its neighbors to all nodes in the internetwork. Link state algorithms create a consistent view of the network and are therefore not prone to routing loops, but they achieve this at the cost of relatively greater computational difficulty and more widespread traffic (compared with distance vector routing algorithms). Compare with distance vector routing algorithm.
Linked mailboxes are used in environments in which there are multiple forests (known as resource forests). When a linked mailbox is created, a mailbox and a disabled user account are created in the forest which hosts the Exchange organization. Once the mailbox has been created, it is then linked or associated with a user account that resides in the second forest. In order to assign an account from the second forest to the mailbox, a trust relationship must exist between the domain that contains the Exchange server and the domain in which the user account resides.
Link state routing protocol
Linked mailbox
Link-local Multicast Name Resolution (LLMNR) enables IP hosts to perform IP address-to-host name resolution without a DNS server. LLMNR is feature used in Zeroconf networking and is being developed by Microsoft.
Link-local Multicast Name Resolution (LLMNR)
A popular (freely-distributable open source) operating system that runs on multiple hardware platforms.
Linux
In the OSI model, the Logical Link Control (LLC) layer is one of two sublayers of the Data-Link layer. The LLC manages traffic (flow and error control) over the physical medium.
LLC (Logical Link Control)
Link-local Multicast Name Resolution (LLMNR) enables IP hosts to perform IP address-to-host name resolution without a DNS server. LLMNR is feature used in Zeroconf networking and is being developed by Microsoft.
LLMNR (Link-local Multicast Name Resolution)
An ASCII text file that associates IP addresses to computer names outside the local subnet. In Windows 2000, the Lmhost file is located in systemroot
\System32\Drivers\Etc. You must manually update the LMHOSTS file.
LMHOSTS file
Load balancing is the capability of a router to distribute traffic over all of its network ports that are the same metric from the destination address.
Load balancing
A group of closely located computers or peripherals connected so that they can interact with each other as a network.
Local area network (LAN)
Local Continuous Replication (LCR) is a cluster implementation which maintains a copy of the production storage group on a second set of disks that are connected to the same server using built-in asynchronous log shipping and log replay technology.
Local Continuous Replication (LCR)
A Group Policy Object (GPO) stored on the local computer. Every Windows 2000 computer has exactly one local GPO.
Local GPO
Groups used to provide users with permissions to access a network resource and to provide rights to perform system tasks.
Local group
Addresses in the 127.0.0.0 range are reserved to refer to the local host (in other words “this” host or the host you’re currently working at).
Local Host
The local preference (type code 5) is a well-known discretionary BGP attribute that describes the preferred exit path from an AS. Local preferences are configured by assigning a number between 1 and 100; higher values representing higher preference over lower values.
Local preference attribute
A neighbor table contains a list of neighbors with which it has a BGP connection.
The USN of the local domain controller when an Active Directory update is made.
Local routing table
Local update sequence number
User name and password information stored in the directory database of the local computer.
Local user accounts
A profile stored on a user’s local workstation.
Local user profile
A text file that contains detailed information about the backup procedures you perform with Windows Backup. Other processes, such as the Performance Monitor, also generate log files.
Log file
The process by which a user disconnects from a network and closes connections to mapped drives and printers.
Log off
The process by which a user gains access to a network by providing security credentials (usually a user name and password).
Log on
In the OSI model, the Logical Link Control (LLC) layer is one of two sublayers of the Data-Link layer. The LLC manages traffic (flow and error control) over the physical medium.
Logical Link Control (LLC)
A script that executes when a user logs off.
Logoff script
A script that executes when a user logs on.
Logon script
A name for a file or folder that includes more characters than the standard MS- DOS 8.3 filename convention.
Long file name
A reserved IP address, 127.0.0.1, that is used to perform loopback functions.
Loopback address
A mode of processing Active Directory-based Group Policy Objects (GPOs) in which computer-specific settings replace or take precedence over user-specific settings.
Loopback Processing Mode
An Active Directory container that holds objects that no longer have a valid parent container. For example, this could happen if an object is created on one domain controller while simultaneously the object’s container is deleted or renamed on another domain controller.
LostAndFound container
A hard disk formatting process, usually performed by the disk manufacturer, that defines the basic physical structure of the disk. It runs a surface analysis to test the disk heads, defines sectors and assigns sector IDs, temporarily fills each sector, identifies bad sectors on the drive, and defines the interleave ratio.
Low-level disk formatting
A service residing on a UNIX print server that receives print jobs from clients using the LPR utility.
LPD (Line Printer Daemon)
LPD/LPR is the most widely-used cross platform print protocol. LPD/LPR establishes connection between printing devices and workstations. LPD is usually loaded on the printing device. LPR is usually loaded onto the client workstation.
LPD/LPR (Line Printer Daemon/Line Print Remote)
This utility obtains the status of a print queue on a host running the Line Printing Daemon (LPD) service.
LPQ (Line Printer Queue)
A utility on a client that allows it to send print jobs to the Line Printer Daemon on the server.
LPR (Line Printer Remote)
A Layered Service Provider (LSP) distributes link-state information and defines the characteristics of an IS-IS router.
LSP (Layered Service Provider)
A unique hardware address that is assigned to each device by the vendor. For example, a LAN adapter has a unique MAC address that is permanent to the adapter card.
MAC (Media Access Control) Address
MADCAP is a multicast addressing server, which provides multicast address allocation.
MADCAP (multicast addressing server)
Madman.mib is the Management Information Base (MIB) for Simple Network Management Protocol (SNMP) Mail and Directory Management (MADMAN). Windows NT Performance Monitor counters are made available as MIB objects that can be monitored through SNMP.
MADMAN MIB
A DNS resource record that you can define in DNS. The MX records specify a mail exchanger for a domain name: a host that will either process or forward mail for the domain name.
Mail Exchanger (MX) record
Mailbox delivery queues only exist on Hub Transport servers in Exchange 2007. They hold messages for recipients whose mailbox data is stored on a Mailbox server within the same site as the Hub Transport server. More than one mailbox delivery queue can exist on a Hub Transport server.
Mailbox delivery queue
The Mailbox server in Exchange 2007 contains the mailbox and public folder databases. The Mailbox server role in Exchange 2007 supports multiple storage groups and multiple stores, making it possible to have up to 50 storage groups and up to 5 stores (databases) per storage group. The maximum number of stores on a single Exchange server is limited to 50.
Mailbox server
A mailbox-enabled user is an Active Directory user that has a mailbox that is hosted on one of the mailbox servers within an Exchange organization. A mailbox-enabled user can logon to the domain and access resources on the network according to the permissions and groups to which they are assigned. Mailbox-enabled users are the most common type of Exchange recipient.
Mailbox-enabled user
Mail-enabled contacts are used to make it easier for users within an Exchange organization to locate the contact details of people outside of your organization.
Mail-enabled contacts
A mail-enabled user is an Active Directory user the has an e-mail address associated with their account, but whose mailbox is stored on an external mail system. For example, a contractor who is working for the organization but is using their own e-mail address.
Mail-enabled user
Another name for virus, which is a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found.
Malware
Management domains are the network subdivisions specified in the X.400 international messaging standard. Management domains include Administration Management Domains (ADMDs) and Private Management Domains (PRMDs).
Management domains
A database containing the data gathered by SNMP agents which monitor network traffic and components.
Management Information Base (MIB)
A set of standard commands developed by Microsoft. Messaging services use these commands to communicate with other MAPI-compliant applications.
MAPI (Messaging Application Programming Interface)
Making an association between two different elements, such as computer names and IP addresses, drives and drive letters, and so on.
Mapping
The area of the hard disk containing the partition table for the drive and the specialized executable code necessary to boot the computer.
Master Boot Record (MBR)
The central connecting point for a token ring network.
MAU (Multistation Access Unit)
A hub or concentrator that connects a group of computers to a local area network in token ring topology.
MAU (Multi-station Access Unit)
The area of the hard disk containing the partition table for the drive and the specialized executable code necessary to boot the computer.
MBR (Master Boot Record)
Message-Digest algorithm 5 (MD5) is a cryptographic authentication method that prevents unauthorized routing messages from unapproved sources in EIGRP.
MD5 (Message-Digest algorithm 5)
MDBEF is the internal format for e-mail messages in Exchange. The Exchange directory database (Dir.edb) is based on (but not entirely identical to) the International Telecommunications Union’s X.500 directory recommendations.
MDBEF (Message Database Encoding Format)
The MultiExist-Discriminator (MED) (type code 4) is an optional, nontransitive BGP attribute (also known as a metric) that communicates to neighbors the preferred path for information to be sent to them.
MED attribute
In the realm of information technology, transmission media refers to the cables and wires through which signals (such as electric current or light impulse) are transmitted through a network.
Media (Transmission Media)
A unique hardware address that is assigned to each device by the vendor. For example, a LAN adapter has a unique MAC address that is permanent to the adapter card.
Media Access Control (MAC) Address
Use a media tester to make sure that a cable is unbroken and that all cables are connected to the correct pins inside the connector.
Media tester
An Windows 2000 Server computer that is not a domain controller. Member servers provide file and print services for the network.
Member server
Interleaving increases the rate at which data can be written to or read from a memory module by grouping data into contiguous blocks instead of dispersing data intermittently. The following components must be interleaving-enabled in order for interleaving to work:
Motherboard BIOS
Memory Module
Memory Interleaving
Mesh is a network topology that exists when there are multiple paths between any two nodes on a network. Mesh topologies are created using point-to-point connections. This increases the network’s fault tolerance because alternate paths can be used when one path fails. Two variations of mesh topologies exist:
Partial Mesh–Some redundant paths exist.
Full Mesh–Every node has a point-to-point connection with every other node.
MDBEF is the internal format for e-mail messages in Exchange. The Exchange directory database (Dir.edb) is based on (but not entirely identical to) the International Telecommunications Union’s X.500 directory recommendations.
Mesh
Message Database Encoding Format (MDBEF)
In the Exchange 2007 messaging environment, messages are placed in queues as they wait to be sent. Queues are stored in an Extensible Storage Engine (ESE) databases which reside on Hub Transport servers. Exchange 2007 queues can hold up to a million messages, so in the event of a Hub Transport server failure, the database can be retrieved and mounted onto another Hub Transport server, at which point the queued messages will be sent to their recipients.
Message queue
Message-Digest algorithm 5 (MD5) is a cryptographic authentication method that prevents unauthorized routing messages from unapproved sources in EIGRP.
Message-Digest algorithm 5 (MD5)
A client access specification that enables clients to communicate with a messaging system. It is implemented as a subsystem in the Windows operating system. Microsoft and many other vendors support this standard.
Messaging Application Programming Interface (MAPI)
A database containing the data gathered by SNMP agents which monitor network traffic and components.
MIB (Management Information Base)
A set of manageable objects representing various types of information about a network device, such as the number of active sessions or the version of the network operating system software that is running on a host.
MIBs (Management Information Bases)
A company called Microcom introduced a series of standards for early modems that described error detection techniques. The standards were called MNP Class 2, Class 3, and Class 4. This standard became popular with several modem manufacturers
Microcom Network Protocol (MNP)
The part of the operating system that handles vital low-level processes. These include deferred procedure calls, first-level interrupt handling, thread scheduling, and so on.
Microkernel
A certificate server for issuing and administering in-house digital certificates that let you authenticate the identity of visitors to your Web sites. It also lets you enable SSL encryption.
Microsoft Certificate Server
Microsoft Cluster servers are fault-tolerant servers that use two separate nodes.
Microsoft Cluster Servers
A bulletin board sponsored by Microsoft. Check the MSDN for support information and downloadable code.
Microsoft Download Service (MSDN)
The Exchange Management Console is the graphical administration tool. It is comprised of a three-paned view that includes a tree view, results, and an actions pane. It cannot perform many of the administrative tasks that can be performed in the Exchange Management Shell.
Microsoft Exchange Management Console
Microsoft Exchange Management Shell (Windows PowerShell) is a command line environment designed for automating administration and maintenance. The Exchange Management Shell is the primary management interface of 2007.
Microsoft Exchange Management Shell
Microsoft Exchange Management Shell (Windows PowerShell) is a command line environment designed for automating administration and maintenance. The Exchange Management Shell is the primary management interface of 2007.
Microsoft Exchange PowerShell
A store is a database of Microsoft Exchange information. There are two types of Exchange stores:
A Mailbox store holds the information that comprise mailboxes in Exchange 2007, such as data, data definitions, indexes, checksums, and flags. Sent and received e-mails are held in the mailbox store.
A Public Folder store holds information that can be shared by users. Messages posted to public folders are held in the public folder store.
Microsoft Exchange Public store
A Microsoft Exchange storage group is a collection of Exchange stores (databases). A Recovery Storage Group (RSG) is a special storage group used for recovering Mailbox stores.
Microsoft Exchange recovery storage group
A Microsoft Exchange storage group is a collection of Exchange stores (databases). A Recovery Storage Group (RSG) is a special storage group used for recovering Mailbox stores.
Microsoft Exchange storage group
A store is a database of Microsoft Exchange information. There are two types of Exchange stores:
A Mailbox store holds the information that comprise mailboxes in Exchange 2007, such as data, data definitions, indexes, checksums, and flags. Sent and received e-mails are held in the mailbox store.
A Public Folder store holds information that can be shared by users. Messages posted to public folders are held in the public folder store.
Microsoft Exchange store
An application that includes not only a Web browser but also a set of tools that integrates it with Microsoft Windows 95/98, NT, and 2000.
Microsoft Internet Explorer
A Windows NT Server file and application server designed to host Internet sites. IIS is integrated with Windows 2000 Server.
Microsoft Internet Information Server
A common framework for a variety of Windows 2000 administrative tools. It provides no functionality of its own.
Microsoft Management Console (MMC)
A compact disc from Microsoft that contains information to help you administer and troubleshoot networks.
Microsoft Technet
The Internet site that you can use to read information about Microsoft products or reach Microsoft support.
Microsoft Web site
The process of transferring files, folders, and account information from a NetWare server to a Windows 2000 server.
Migration
A measure of performance. Many computer companies use MIPS to measure the cost of computing. MIPS is also the name of a company that makes RISC processors.
Millions of Instructions Per Second (MIPS)
MIME’s primary purpose is allowing users to send attachments along with e- mail messages through the Internet. With MIME, you can use several different character sets, as well as binary data.
MIME (Multipurpose Internet Mail Extensions)
A measure of performance. Many computer companies use MIPS to measure the cost of computing. MIPS is also the name of a company that makes RISC processors.
MIPS (Millions of Instructions Per Second)
A mirrored volume stores data to two duplicate disks simultaneously. It provides fault tolerance because if one disk fails, data is preserved on the other disk, and the system switches immediately from the failed disk to the functioning disk to maintain service. Mirrored volumes:
Provide fault tolerance. Data is available even if one disk in the set fails. Do not increase performance.
Require two disks.
Have a 50% overhead. Data is written twice, meaning that half of the disk space is used to store the second copy of the data.
Mirrored volume
Mirroring is a data protection method. To mirror data is to duplicate and store it in a separate location.
Mirroring
A common framework for a variety of Windows 2000 administrative tools. It provides no functionality of its own.
MMC (Microsoft Management Console)
A NetBIOS node that provides support over TCP/IP. The M-node is a combination of B-nodes and P-Nodes. The default is to function as a B-node.
M-node
A company called Microcom introduced a series of standards for early modems that described error detection techniques. The standards were called MNP Class 2, Class 3, and Class 4. This standard became popular with several modem manufacturers
MNP (Microcom Network Protocol)
A modem is a device that modulates and demodulates signals being sent and received across transmission media (telephone wire). For example, computer data is in digital form, which must be converted to analog. To receive data, the modem reconverts the signal back to digital form.
Modem
A component that allows computers to use file and print resources on the network by routing requests to the correct redirector or provider.
MPR (Multiple Provider Router)
The central connecting point for a token ring network.
MSAU (Multistation Access Unit)
A bulletin board sponsored by Microsoft. Check the MSDN for support information and downloadable code.
MSDN (Microsoft Download Service)
Multicast Source Discovery Protocol (MSDP) is a mechanism that connects multiple PIM-SM domains; allowing the discovery of multicast sources in other domains.
MSDP (Multicast Source Discovery Protocol)
An online network sponsored by Microsoft. You can find answers to technical questions, read articles about Microsoft products, chat with other users, and much more.
A processing system for creating and distributing Web applications using Active Server Pages. It tracks unique transactions, and ensures that each component of a process must be completed in order for the transaction to succeed.
MSN (The Microsoft Network)
MTS (Microsoft Transaction Server)
Multicast is a transmission method that transmits packets from a single device to a specific set of hosts. It is optimal for transmitting voice and video applications and streaming video.
Multicast
MADCAP is a multicast addressing server, which provides multicast address allocation.
Multicast addressing server (MADCAP)
A range of multicast group IP addresses available to be leased to multicast clients by DHCP. Addresses are in the Class D address range – 224.0.0.0 to 239.255.255.255 – are reserved for use in IP multicasting.
Multicast scope
Multicast Source Discovery Protocol (MSDP) is a mechanism that connects multiple PIM-SM domains; allowing the discovery of multicast sources in other domains.
Multicast Source Discovery Protocol (MSDP)
The ability of a router to function using both static and dynamic routing. For example, you can configure a Windows 2000 computer with multiple network adapters and route between the two cards. Computers configured in this fashion are known as multihomed computers.
Multi-homed
Multihoming is the term used to describe an AS that has more than one connection to the Internet. If an organization performs multihoming with BGP, it is accomplished in one of the following ways:
Each ISP only passes a default route to the AS.
Each ISP only passes a default route and provider-owned specific routes to the AS.
Each ISP passes all routes to the AS.
Multihoming
A replication model in which updates can be made to any of several domain controllers (masters). The master that receives the update then replicates its updates to other domain controllers. Windows 2000 uses this replication model.
Multi-master replication model
In this Windows NT domain model, user accounts are distributed among more than one master domain and the domains communicate via trust relationships. In this model a user can log on from any domain because pass-through authentication sends the request to the user’s home domain. This model is typically used for large companies that want centralized administration. Each network user account is created in one of the master domains. Other domains in the network are resource domains, which are usually created at the department level.
Multiple master domain model
A component that allows computers to use file and print resources on the network by routing requests to the correct redirector or provider.
Multiple Provider Router (MPR)
A component that allows a remote computer to accept paths and filenames written in UNC format. The MUP keeps the UNC list so that the client computer does not have to rewrite the UNC names for each redirector on the network.
Multiple Universal Naming Convention Provider (MUP)
A communications device that combines signals for transmission over a single transmission medium. A multiplexer is sometimes called a mux.
Multiprotocol BGP is an enhanced extension of BGP that has the ability to carry IP multicast routes.
Multiplexer
Multiprotocol BGP
MIME’s primary purpose is allowing users to send attachments along with e- mail messages through the Internet. With MIME, you can use several different character sets, as well as binary data.
Multipurpose Internet Mail Extensions (MIME)
The central connecting point for a token ring network.
Multistation Access Unit (MAU)
A hub or concentrator that connects a group of computers to a local area network in token ring topology.
Multi-station Access Unit (MAU)
The central connecting point for a token ring network.
Multistation Access Unit (MSAU)
In multitasking operating systems, the processor is time-sliced across tasks, devoting a certain amount of processing time to each task. The processor then alternates between tasks until they have all been completed. This process occurs so rapidly that the computer appears to be working on multiple tasks at one time.
Multitasking
An operating system feature that allows more than one process to work at the same time. For example, Winnt32.exe can decompress and copy files at the same time, since each task is a separate thread.
Multithreading
A component that allows a remote computer to accept paths and filenames written in UNC format. The MUP keeps the UNC list so that the client computer does not have to rewrite the UNC names for each redirector on the network.
MUP (Multiple Universal Naming Convention Provider)
A DNS resource record that you can define in DNS. The MX records specify a mail exchanger for a domain name: a host that will either process or forward mail for the domain name.
MX (Mail Exchanger) record
A mechanism that processes use to communicate with each other locally or remotely.
Named pipes
A group of unique labels for objects in a shared computing environment. For example, the DNS database is a a tree structure called the domain namespace. Each domain (node) is named and can contain subdomains. The domain name identifies the position of the domain in relation to its parent domain. A group of contiguous names in such a structure constitutes a namespace.
Namespace
The process of converting the IP addresses used in private network (such as an intranet) to Internet IP addresses. This increases the number addresses available within the the intranet without reducing the number of available Internet addresses.
NAT (Network Address Translation)
An NonBroadcast MultiAccess (NBMA) network is a network that interconnects multiple routers but does not have broadcast capabilities (examples are Frame Relay, X.25, and ATM).
NBMA (NonBroadcast MultiAccess)
A Microsoft utility that checks the state of current NetBIOS over TCP/IP connections. It also updates the LMHOSTS cache, and determines your registered name and scope ID. The utility is also used for troubleshooting and pre-loading the NetBIOS name cache.
NBTSTAT
A set of software rules that specify how protocols communicate with device drivers. All NDIS-compatible cards and drivers can communicate with each other without needing to use specifically tailored protocols.
NDIS (Network Device Interface Specification) 4.0
NDS lets you display a list of shared objects and servers in a NetWare network. The NDS tree shows the available resources as a hierarchical list.
NDS (NetWare Directory Services)
Neighbor discovery/recovery is a mechanism that enables routers to dynamically learn about the other routers on their directly attached networks. Neighbor discovery/recovery:
Allows routers to know when neighbors become unreachable or inoperative.
Has low overhead.
Periodically sends and receives small hello packets to and from neighboring routers. If hello packets start to not be received from a particular router, neighbor discovery/recovery will assume that the router is not functioning.
Neighbor discovery/recovery
This command accepts several command arguments that control functions such as logon, logoff, and resource connections.
NET command
A protocol supported by all Microsoft products. It has a small stack size, excellent data transfer rates, and is compatible with all Microsoft networks. It cannot be routed, and it is not compatible with non-Microsoft networks.
NetBEUI (NetBIOS Extended User Interface)
A program that allows computers to share resources on a network. Each computer has a unique NetBIOS name that provides applications with a common set of commands for requesting the lower-level network services that are necessary to transmit information between network resources.
NetBIOS (Network Basic Input/Output System)
A utility that checks the state of current NetBIOS over TCP/IP connections. It is also used to update the LMHOSTS cache and determine your registered name and scope ID.
NetBIOS applications
A protocol supported by all Microsoft products. It has a small stack size, excellent data transfer rates, and is compatible with all Microsoft networks. It cannot be routed, and it is not compatible with non-Microsoft networks.
NetBIOS Extended User Interface (NetBEUI)
The NetBIOS scope parameter is configured on the remote host. The scope ID must match the scope ID on your Microsoft clients or they will not be able to communicate with NetBIOS.
NetBIOS scope
A Win32 service that can share processes with other Win32 services. It is a service registered under the Services subkey in the Registry.
NetDDE (Network Dynamic Share)
Software that runs on the client computer and lets you play, start, and stop audio, illustrated audio (slide show), and full-motion video files.
NetShow Player
A Microsoft utility that displays the protocol statistics and the current state of TCP/IP connections.
Netstat
Networking software from Novell.
NetWare
NDS lets you display a list of shared objects and servers in a NetWare network. The NDS tree shows the available resources as a hierarchical list.
NetWare Directory Services (NDS)
A system group that is not used for network administration. It includes any user who is currently connected from another computer on the network to a shared resource on your computer.
Network
The process of converting the IP addresses used in private network (such as an intranet) to Internet IP addresses. This increases the number addresses available within the the intranet without reducing the number of available Internet addresses.
Network Address Translation (NAT)
A standardized set of physical and data link layer protocols that serve as the network’s foundation upon which other protocol layers can function.
Network architecture
A program that allows computers to share resources on a network. Each computer has a unique NetBIOS name that provides applications with a common set of commands for requesting the lower-level network services that are necessary to transmit information between network resources.
Network Basic Input/Output System (NetBIOS)
A set of software rules that specify how protocols communicate with device drivers. All NDIS-compatible cards and drivers can communicate with each other without needing to use specifically tailored protocols.
Network Device Interface Specification (NDIS) 4.0
A Win32 service that can share processes with other Win32 services. It is a service registered under the Services subkey in the Registry.
Network Dynamic Share (NetDDE)
The network ID identifies the TCP/IP hosts that are located on the same physical network. Any hosts that are on the same physical network must be assigned the same network ID in order to communicate.
Network ID
The base of the Department of Defense (DOD) model. This layer has the responsibility to place frames on the wire and retrieve frames from the wire.
Network Interface Layer
Layer 3 of the OSI reference model. This layer provides connectivity and path selection between two end systems. The network layer is the layer at which routing occurs. Corresponds roughly with the path control layer of the SNA model. See also application layer, data link layer, physical layer, presentation layer, session layer, and transport layer.
Network Layer
A Windows troubleshooting tool. It monitors the information in frames which are transferred over the network to or from the local computer.
Network Monitor
A protocol that provides access to Internet newsgroups. It allows a client to read messages sent to newsgroups and makes it possible for hosts to replicate articles back and forth.
The unique number that the NWLink IPX/SPX protocol uses to identify a specific part of the network. Also called an external network number.
Network News Transfer Protocol (NNTP)
Network number
A printer connected to the network and registered as a shared resource.
Network printer
Protocols that allow computers to communicate with each other over a network. For example, AppleTalk and NetBEUI are network protocols.
Network protocols
A Network Service Access Point (NSAP) is used to identify routers and build the topology table in IS-IS.
Network Service Access Point (NSAP)
NTP is used to communicate time synchronization information between systems on a network.
Network Time Protocol (NTP)
Network-Attached Storage (NAS) is another method of adding storage capacity to a network. A NAS system plugs directly into the network in the same way that workstations and other peripherals do. A NAS device is typically a pared down file server consisting of:
A RAID array with terabytes of storage space. A motherboard (logic board).
One or more network interface cards. Multiple interface cards allow you to perform adapter teaming.
A minimal network operating system.
Network-Attached Storage (NAS)
A Windows NT file system that provides secure and robust file access. File and folder names can be up to 255 characters (long file names). Permissions can be assigned to individual files and folders. Windows 2000 updates NTFS with new features.
New Technology File System (NTFS)
A client that uses NNTP to read postings in Internet newsgroups.
Newsreader
The next-hop (type code 3) is a well-known mandatory BGP attribute that indicates the next-hop IP address that can be used to reach a destination.
Next-hop attribute
A protocol that provides access to Internet newsgroups. It allows a client to read messages sent to newsgroups and makes it possible for hosts to replicate articles back and forth.
NNTP (Network News Transfer Protocol)
A node is a device that acts as a connection point within a network. Nodes can be used for redistributing or forwarding data or providing services to other devices or programs. Node and host, in the network context, are often used interchangeably.
Node
The priority assigned to each computer (values between 0 and 8) in a token ring. Computers with higher priority levels get first rights to the token. Computers that perform critical network functions may need higher priority.
Node prioritization
A restoration method which uses the Backup utility to return the Active Directory database to the state it was in before the back up. Windows 2000 automatically performs a consistency check on and re-indexes the Active Directory database. It then updates Active Directory and File Replication service (FRS) with data from the server’s replication partners.
Nonauthoritative restore
An NonBroadcast MultiAccess (NBMA) network is a network that interconnects multiple routers but does not have broadcast capabilities (examples are Frame Relay, X.25, and ATM).
NonBroadcast MultiAccess (NBMA)
A Group Policy Object (GPO) stored in Active Directory. Settings in a non-local GPO can be applied to users and computers throughout the network. Also called an Active Directory-based (GPO).
Non-local GPO
The part of operating system memory that remains in physical memory instead of being swapped into virtual memory.
Non-paged pool system memory
A system in which each application currently running a process voluntarily passes control of the CPU to another application between processes. Also called cooperative multitasking.
Non-preemptive multitasking
Nontransit AS peering provides access to a single EBGP peer; excluding all other EBGP peers. This is optimal for scenarios in which a customer is connected to two ISP’s networks and wishes to have each ISP’s customers use their own connections for communication.
Nontransit AS peering
A backup method that backs up selected files and folders, and marks their archive attributes.
Normal backup
A Not So Stubby Area (NSSA) is similar to a stub area because it does not allow external ASBR routes, but it does allow ASBR routes that originate from within the area. These ASBR routes are flagged as Type 7 LSA packets (NSSA type LSA packets).
Not So Stubby Area (NSSA)
Notification messages are transmitted when errors have been detected.
Notification messages
A name service record that is placed in a DNS server.
NS (Name Service) record
A Network Service Access Point (NSAP) is used to identify routers and build the topology table in IS-IS.
NSAP (Network Service Access Point)
A Microsoft utility used to diagnose problems with DNS. Users can interact with the DNS server, and this utility can be used to display resource records on DNS servers, including UNIX DNS servers.
NSLOOKUP
A Not So Stubby Area (NSSA) is similar to a stub area because it does not allow external ASBR routes, but it does allow ASBR routes that originate from within the area. These ASBR routes are flagged as Type 7 LSA packets (NSSA type LSA packets).
NSSA (Not So Stubby Area)
A Windows NT utility which checks the hardware installed on an Intel x86 computer before you begin installing Windows NT. This helps you prevent problems during installation.
NT Hardware Qualifier (NTHQ)
A specialized environment that allows MS-DOS and Win16 applications to run under Windows NT.
NT Virtual DOS Machine (NTVDM)
This program has the responsibility to pass hardware configuration information to the NTLDR program.
Ntdetect.com
The NTVDM equivalent of the MSDOS.SYS in MS-DOS.
Ntdos.sys
An object in System Monitor which represents Directory Services and can be monitored to observe the performance of Active Directory.
NTDS Performance Object
A partition formatted with the NTFS file system.
NTFS partition
A Windows NT utility which checks the hardware installed on an Intel x86 computer before you begin installing Windows NT. This helps you prevent problems during installation.
NTHQ (NT Hardware Qualifier)
The NTVDM equivalent to the IO.SYS in MS-DOS.
Ntio.sys
The Windows NT operating system loader. During the startup phase, the pre- boot sequence locates the boot partition of the hard disk. NTLDR (the boot loader) is then loaded and initialized from the boot sector. This program switches the processor to the 32-bit flat memory mode, starts the appropriate minifile system, and reads the Boot.ini file.
Ntldr
NTP is used to communicate time synchronization information between systems on a network.
NTP (Network Time Protocol)
A specialized environment that allows MS-DOS and Win16 applications to run under Windows NT.
NTVDM (NT Virtual DOS Machine)
The executable that emulates MS-DOS and manages an NTVDM. It runs in kernel mode.
Ntvdm.exe
A discrete piece of information, such as a graphic, chart, or paragraph of text, that you can create in one application and link or embed into a file created in another application.
Object
A standard for embedding objects and text in electronic documents.
Object Linking and Embedding (OLE)
A term used to describe 8 bits in an IP address. An IP address consists of a 4 octet address. An octet is separated by periods. The octet represents a decimal number in the range of 0-255 known as dotted decimal notation.
Octet
On-Demand Routing (ODR) uses the Cisco Discovery Protocol (CDP) to transfer network information between routers. ODR makes it possible to find the following types of characteristics about neighboring devices:
Device type IP address
Cisco IOS version being run Network capabilities
ODR (On-Demand Routing)
A company that uses parts of other company’s products to create its own products.
OEM (Original Equipment Manufacturer)
A defragmentation method you perform manually using NTDSUTIL when the computer is not connected to the network. It rearranges the data in the Active Directory database, compresses the file, and creates a compact, new file.
Offline defragmentation
Backup tapes stored at a location different from the business location.
Off-site storage
An application programming interface (API) that lets COM applications access data from an OLE DB provider without regard to the data storage format of the provider. For example, the provider could be a database, a spreadsheet, or text files.
OLE DB
Wireless networks require antennas for sending and receiving transmitted signals. An omni-directional antenna disperses a radio frequency wave in an equal 360-degree pattern. This type of antenna is used to provide access to many clients in a radius.
Omni-directional Antenna
On-Demand Routing (ODR) uses the Cisco Discovery Protocol (CDP) to transfer network information between routers. ODR makes it possible to find the following types of characteristics about neighboring devices:
Device type IP address
Cisco IOS version being run Network capabilities
On-Demand Routing (ODR)
A defragmentation method that the Extensible Storage engine performs automatically at regular intervals, following the garbage collection process. It rearranges the data in the Active Directory database, but does not compress the data or reduce the size of the database file.
Online defragmentation
Backup tapes stored at the business location.
On-site storage
The standard software interface you can use on any hardware or software platform to create high-quality graphics.
Open Graphics Language (OpenGL)
The first message sent by each side of an established TCP session is an open message. Open messages exchange information on how to set up a session
Open message
A routing protocol like RIP. This routing protocol periodically exchanges routes to known networks among dynamic routers. If a route changes, other routers are automatically informed of the change. Dynamic routing requires a protocol such as Open Shortest Path First.
Open Shortest Path First (OSPF)
It includes the Application, Presentation, Session, Transport, Network, Data Link, and Physical layers, which correspond to the model created by the International Standards Organization (ISO).
Open Systems Interconnection (OSI) model
The standard software interface you can use on any hardware or software platform to create high-quality graphics.
OpenGL (Open Graphics Language)
The origin (type code 1) is a well-known mandatory BGP attribute used to describe the origination of information in transit.
Origin attribute
A company that uses parts of other company’s products to create its own products.
Original Equipment Manufacturer (OEM)
The domain controller on which an Active Directory update was originally made.
Originating domain controller
An update to the Active Directory update that is made directly rather than through replication. For example, if BSmith’s password is changed on Server1 then replicated to Server2, the originating update was made on Server1.
Originating update
The local USN of the domain controller on which an Active Directory update was originally made.
Originating update sequence number
An electronic device that displays signal voltage information. You can use an oscilloscope to detect shorts, breaks, bends, or crimps in a network cable.
Oscilloscopes can also indicate attenuation problems (loss of signal power).
It includes the Application, Presentation, Session, Transport, Network, Data Link, and Physical layers, which correspond to the model created by the International Standards Organization (ISO).
Oscilloscope
OSI (Open Systems Interconnection) model
A routing protocol like RIP. This routing protocol periodically exchanges routes to known networks among dynamic routers. If a route changes, other routers are automatically informed of the change. Dynamic routing requires a protocol such as Open Shortest Path First.
OSPF (Open Shortest Path First)
Outlook Web Access (OWA) provides browser access to e-mail.
Outlook Anywhere
The term used to describe information that is compartmentalized for transport across the network. For example, the IP protocol has a packet structure that contains the Source IP address, Destination IP Address, Protocol type, Checksum, data, and so on.
Packet
A packet filtering firewall filters packets based on source and destination addresses, ports, and service protocols. This type of firewall uses ACLs or filter rules to control traffic. It operates at OSI layer 3 (Network layer), Offers high performance because it only examines addressing information in the packet header and it is subject to DoS and buffer overflow attacks.
Packet filtering firewall
A TCP/IP utility that verifies TCP/IP is configured correctly and that another host is available.
Packet InterNet Groper (PING)
A packet switched network allows data to be broken up into packets. Packets are transmitted along the most efficient route to the destination. Packet switching is ideal for transmitting data that can handle transmission delays, as is often the case with Web pages and e-mail.
Packet Switching
A contiguous, fixed-length block of virtual addresses. It is copied from memory to disk and back during paging operations. Windows 2000 uses 4 KB blocks to map physical and virtual memory addresses. SQL Server allocates database space in 8K pages.
Page
A program that tells a printer how printed output should appear on a page. PostScript and TrueType are two different PDLs.
Page Description Languages (PDL)
Pagefile.sys. A file on a hard disk that Windows 2000 uses to transfer information in and out of RAM and virtual memory. Also called a swap file or a virtual memory page file.
Paging file
One of the less-secure protocols, where the username and password are sent in clear text for authentication increasing the chance of interception. PAP should be used only when no other form of authentication is supported. PAP protocols are supported by multiple platforms, including Microsoft and Linux.
PAP (Password Authentication Protocol)
A mesh topology exists when there are multiple paths between any two nodes on a network. Mesh topologies are created using point-to-point connections. In a partial mesh topology, some redundant paths exist.
Partial Mesh
A replica that contains only selected attributes of objects on which a searches are likely to be performed. Partial replicas are read-only.
Partial replica
A portion of the free space on a hard disk that you format with a file system. Partitions can be either primary or extended.
A partition can also refer to a division (part) of the Active Directory database. In this case, it is called an Active Directory partition or directory partition.
Partition
Passive interfaces stop the routing process from participating out of a particular interface. The interface still listens and receives network traffic, but the interface does not participate, advertise, or generate any traffic for a given protocol. Passive interfaces are often used with protocol migration or redistribution.
Passive interface
The process by which users log on to the network from computers or domains in which they have no account. Pass-through authentication allows a user with an account on one domain to access the entire network. Pass-through authentication can occur when a user logs on to a trusted domain or connects to a resource in a trusting domain.
Pass-through authentication
A credential used to verify a user’s request to log on to the network. A password is associated with a user account name and both are used during the authentication process.
Password
One of the less-secure protocols, where the username and password are sent in clear text for authentication increasing the chance of interception. PAP should be used only when no other form of authentication is supported. PAP protocols are supported by multiple platforms, including Microsoft and Linux.
Password Authentication Protocol (PAP)
A 32 or 64-bit bus providing compatibility with both 486 and Pentium machines. PCI buses:
Have a maximum throughput rate of 133 MB/s.
Are processor independent (the CPU and the PCI bus can process concurrently).
Use a divisor to synchronize the system bus speed and the PCI bus speed. Are most commonly 5V, but specifications provide for 3V and dual- voltage cards.
Can support ISA and EISA; however if PCI and ISA share a bus, then the use of one disables the other.
Are plug-and-play.
Are normally white plastic.
Are available in 64-bit as well as 32-bit. 64-bit PCI cards are often backwards compatible with 32-bit PCI slots.
PCI (Peripheral Component Interconnect)
The PCI-X specification is a high-performance enhancement to the conventional PCI bus specification.
PCI-X has a maximum throughput rate of 1.06 GB/s.
PCI-X provides maximum clock frequencies of 266 MHz and 533 MHz increasing transfer rates up to 4.3 GB/s.
PCI-X 1.0 improved the efficiency of the PCI bus itself and the devices attached to it by providing new features such as split transactions and transaction byte counts.
PCI-X 2.0 adds additional features for systems reliability to minimize errors at high speeds and keep up with other advances made to such as RAID, Fiber Channel, and iSCSI architectures.
PCI-X is used primarily in server systems.
PCI-X
A GSNW or CSNW utility that allows you to manage NetWare print servers from a Windows 2000 client computer.
PCONSOLE
Any portable hand-held device used for computing.
PDA (Personal Digital Assistant)
A PDC holds all security and account information for a Windows NT domain and is responsible to communicate all changes to the BDCs.
PDC (Primary Domain Controller)
A program that tells a printer how printed output should appear on a page. PostScript and TrueType are two different PDLs.
PDL (Page Description Languages)
PEAP (an extension of EAP) is one of the most effective wireless security solutions. PEAP provides authentication, including passwords. PEAP, provides the following two options:
PEAP-EAP-TLS. This method uses certificates (either on the local system or on a smart card).
PEAP-MS-CHAP v2. This method uses certificates on the server, but passwords on the client. Use this method when the client does not have a certificate.
PEAP (Protected Extensible Authentication Protocol)
A network in which every computer on the network is equal in providing and requesting resources. These networks have no central administration and only share-level security.
Peer-to-peer network
A licensing mode that requires you to buy a license for every client computer that will connect to resources on the server running Windows 2000.
Per seat licensing
A licensing mode that requires you to buy a license for each server that will be running Windows 2000.
Per server licensing
A 32 or 64-bit bus providing compatibility with both 486 and Pentium machines. PCI buses:
Have a maximum throughput rate of 133 MB/s.
Are processor independent (the CPU and the PCI bus can process concurrently).
Use a divisor to synchronize the system bus speed and the PCI bus speed. Are most commonly 5V, but specifications provide for 3V and dual- voltage cards.
Can support ISA and EISA; however if PCI and ISA share a bus, then the use of one disables the other.
Are plug-and-play.
Are normally white plastic.
Are available in 64-bit as well as 32-bit. 64-bit PCI cards are often backwards compatible with 32-bit PCI slots.
Peripheral Component Interconnect (PCI)
An interpreted script language that includes UNIX facilities with C. It is faster and easier to code than other languages, but works best for small, limited applications.
PERL (Practical Extraction and Report Language)
A virtual circuit that provides permanent access to the network like a permanent physical connection. Leasing a PVC is cheaper than leasing a permanent physical connection because the physical circuit is not dedicated to a single PVC and can be used to carry data from other virtual circuits.
Permanent Virtual Circuit (PVC)
A static route entry or entry in a router that is stored in the registry. Static routes are stored in memory unless you specify through the Bp parameter that the route is persistent. When you restart a Windows 2000 computer, you will need to re- create all non-persistent routes.
Persistent route
A personal area network is the interconnection of components, such as laptops, personal digital assistants, printers, mice, keyboards, and other Bluetooth equipped devices, using some form of wireless technology within a personal range (typically 10 meters).
Personal Area Network (PAN)
Any portable hand-held device used for computing.
Personal Digital Assistant (PDA)
If you install Microsoft Internet Information Server on a computer running Windows 2000 Professional, it installs as Microsoft Personal Web Server (PWS). PWS is not a full Internet server, but you can use it to publish content on your local LAN, or to remotely administer an IIS server.
Personal Web Server (PWS)
A list of the settings Dial-Up Networking uses to connect a client to a remote computer. The entry includes information such as the country code, area code, phone number, name of the remote computer, and so on.
Phonebook entry
The lowest layer in the seven-layer OSI model that represents the hardware on a network. The physical layer is the adapter card and the physical media that transport protocols across the network.
Physical Layer
A text file that contains the information Windows needs to run MS-DOS applications, such as the path and filename of the executable file.
PIF (Program Information File)
Entering a secured building immediately behind another employee without authenticating yourself is a piggyback attack.
Piggyback attack
Protocol Independent Multicast (PIM) is a very important multicast routing protocol that tells the router to ignore any Layer 3 protocol when making multicast-routing decisions (e.g. OSPF and EIGRP). PIM:
Uses the routing table that is populated by the unicast routing protocol in its multicast routing calculations.
Does not send routing updates between PIM routers.
PIM (Protocol Independent Multicast)
PIM Dense Mode (PIM-DM) is a push method controlled by the source to push multicast information. PIM-DM:
Is used when there are many clients requesting the same multicast information.
Builds shortest-path trees by flooding multicast traffic domain wide, then prunes back the branches of the tree where no receivers are present.
Generally has poor scaling properties.
PIM Dense Mode (PIM-DM)
PIM Source Specific Multicast (PIM-SSM) builds trees that are rooted in just one source. PIM-SSM:
Sources (S) transmit an IP datagram to an SSM destination address (G). Receivers can receive data by subscribing to channel (S,G).
PIM Source Specific Multicast (PIM-SSM)
PIM Dense Mode (PIM-DM) is a push method controlled by the source to push multicast information. PIM-DM:
Is used when there are many clients requesting the same multicast information.
Builds shortest-path trees by flooding multicast traffic domain wide, then prunes back the branches of the tree where no receivers are present.
Generally has poor scaling properties.
PIM-DM (PIM Dense Mode)
PIM Sparse Mode (PIM-SM) is a client-initiated pull method to get multicast information. PIM-SM:
Is used when there are few sources of information. Uses a shared tree.
Requires an RP to be defined.
Requires multicast sources and receivers to register with their local RP.
PIM-SM (PIM Sparse Mode)
PIM Source Specific Multicast (PIM-SSM) builds trees that are rooted in just one source. PIM-SSM:
Sources (S) transmit an IP datagram to an SSM destination address (G). Receivers can receive data by subscribing to channel (S,G).
PIM-SSM (PIM Source
Specific Multicast)
A TCP/IP utility that verifies TCP/IP is configured correctly and that another host is available.
PING (Packet Internet Groper)
POTS refers to the telephone system. Early on, Internet connectivity was accomplished with a modem converting digital signals into analog for transmission via POTS. Newer, better, and faster methods are quickly replacing POTS as a signal transport medium.
Plain Old Telephone Service (POTS)
A peer to peer protocol that uses NetBIOS over TCP/IP. The P-node uses a NetBIOS name server (NBNS) such as WINS to resolve NetBIOS names and does not use broadcasts. It will query the name server directly. All computers using P-node must be configured with the IP address of the NBNS. Computers can communicate as long as the NBNS is working.
P-node
A protocol designed as an enhancement to the original SLIP specification. PPP is a data link protocol that provides a standard protocol for sending packets across a point to point network link.
Point to Point Protocol (PPP)
A special resource record that is added to DNS to associate the IP addresses and the corresponding host name. Part of the administration of a DNS name server is ensuring that pointer records are created for hosts.
Pointer (PTR) record
PPPoE is a variation of Point-to-Point Protocol (PPP) that sends PPP packets over an Ethernet network and an “always on” WAN link (DSL or cable modem, for example) rather than over a dial-up connection. In this way, Internet service providers can install PPP-based remote access servers and require remote clients to establish a connection before being granted access to the Internet. This
Point-to-Point Protocol over Ethernet (PPPoE)
A protocol that allows a remote user to connect to the network over the Internet so that a company does not have to lease dedicated lines.
Poison message queues are used to isolate messages that contain potentially harmful errors caused by an Exchange 2007 system failure. This queue is only viewable in the case that such messages have been directed to the poison message queue. Delivery of all messages within the poison message queue is suspended. If a message is deemed unharmful, it will be passed to the submission queue. All other messages within the poison message queue are deleted.
Point-to-Point Tunneling Protocol (PPTP)
Poison message queue
Using the split horizon with poison reverse method (also called poison reverse or route poisoning), routers continue to send information about routes back to the next hop router, but advertise the path as unreachable. If the next hop router notices that the route is still reachable, it ignores the information. If, however, the path timeout has been reached, the route is immediately set to unreachable (16 hops for RIP).
Poison reverse
A mail-drop protocol designed to work with clients that are not always connected to the network. It allows a mail server to receive mail messages and store them on a server until the client comes back on line and requests them.
POP3 (Post Office Protocol Version 3)
Network ports are logical connections, provided by the TCP or UDP protocols at the Transport layer, for use by protocols in the upper layers of the OSI model. The TCP/IP protocol stack uses port numbers to determine what protocol incoming traffic should be directed to. Some ICANN specified categories for ports are listed below:
Well Known – Port numbers range from 0 to 1023 and are assigned for specific protocols and services.
Registered – Port numbers range from 1024 to 49151 and are specifically assigned, by ICANN, for newly created network services.
Dynamic, Private, or High – Port numbers range from 49,152 to 65,535 and are assigned when a network service establishes contact and released when the session ends.
Port
A standard for versions of UNIX and UNIX-like operating systems. POSIX allows developers to create applications that meet certain US Federal standards.
POSIX
The first stage in the Windows NT boot process, during which the system checks to make sure all necessary hardware components and memory are in place and functioning correctly.
POST (Power On Self-Test)
A mail-drop protocol designed to work with clients that are not always connected to the network. It allows a mail server to receive mail messages and store them on a server until the client comes back on line and requests them.
Post Office Protocol Version 3 (POP3)
A programming language developed by Adobe that determines how a page will look when you print it.
PostScript
POTS refers to the telephone system. Early on, Internet connectivity was accomplished with a modem converting digital signals into analog for transmission via POTS. Newer, better, and faster methods are quickly replacing POTS as a signal transport medium.
POTS (Plain Old Telephone Service)
The first stage in the Windows NT boot process, during which the system checks to make sure all necessary hardware components and memory are in place and functioning correctly.
Users that can perform user functions on workstations and servers. They can also create user accounts and modify the accounts they have created. Power users can also add user accounts to the built-in groups Users, Guests, and Power Users.
Power On Self-Test (POST)
Power Users
An open-standard microprocessor architecture that uses RISC instead of Intel x86 processors. IBM, Motorola, and Apple worked together to develop the PowerPC.
PowerPC
A protocol designed as an enhancement to the original SLIP specification. PPP is a data link protocol that provides a standard protocol for sending packets across a point to point network link.
PPP (Point to Point Protocol)
PPPoE is a variation of Point-to-Point Protocol (PPP) that sends PPP packets over an Ethernet network and an “always on” WAN link (DSL or cable modem, for example) rather than over a dial-up connection. In this way, Internet service providers can install PPP-based remote access servers and require remote clients to establish a connection before being granted access to the Internet. This lets Internet usage be better tracked and regulated. PPP over Ethernet automatically discovers the remote access server using broadcast messages.
PPPoE (Point-to-Point Protocol over Ethernet)
A protocol that allows a remote user to connect to the network over the Internet so that a company does not have to lease dedicated lines.
PPTP (Point-to-Point Tunneling Protocol)
An interpreted script language that includes UNIX facilities with C. It is faster and easier to code than other languages, but works best for small, limited applications.
Practical Extraction and Report Language (PERL)
The ability of the Windows 2000 operating system to service multiple requests of the CPU by preempting a task to execute another task.
Preemptive multitasking
A domain controller that can potentially be chosen as a bridgehead server.
Preferred bridgehead server
Layer 6 of the OSI reference model. This layer ensures that information sent by the application layer of one system will be readable by the application layer of another. The presentation layer is also concerned with the data structures used by programs, and therefore negotiates data transfer syntax for the application layer. Corresponds roughly with the presentation services layer of the SNA model. See also application layer, data link layer, network layer, physical layer, session layer, and transport layer.
Presentation Layer
A PDC holds all security and account information for a Windows NT domain and is responsible to communicate all changes to the BDCs.
Primary Domain Controller (PDC)
An operations master that simulates a Windows NT 4.0 Primary Domain Controller (PDC). Also called a PDC Emulator master.
Primary Domain Controller (PDC) Emulator operations master
The ID assigned to a specific user for auditing purposes. With the impersonation (or client) ID, this information tells a system administrator who is using which network functions.
Primary ID
The partition of a hard disk that the operating system uses. One basic hard disk can have up to four primary partitions.
Primary partition
In the Windows 2000 environment, the hardware that produces printed output (what the rest of the world calls a printer). When the term “printer” is used, it refers to the software interface between the operating system and the print device. The print devices are connected to print servers or client computers that have the correct printing software installed on it.
Print device
A piece of software that translates the graphics commands in documents into a language the print device can understand.
Print driver
A description of and location for a specific size of paper in a particular tray in the print device.
Print forms
A component of the print spooler that controls access to and monitors the status of a specific print device.
Print monitor
A special group of users that have been given the necessary rights to manage a printer or printers.
Print Operators
Specific printing-related rights you assign to users. There are four levels of printer permissions that can be assigned, including Print, Manage Documents, and Manage Printers.
Print permissions
A component of the print spooler that works in conjunction with a print driver to despool the spooled print jobs. Despooling is the process of reading the contents from a spool file and converting the print data into a format the print device can understand.
Print processor
In the Windows 2000 environment, a list of print jobs waiting to be processed by the printer and printed by the print device. This terminology is a little different from other operating systems such as NetWare. In NetWare, the print queue is a directory on a server that holds print jobs waiting to be printed and has configurable properties and settings.
Print queue
A component of the print spooler that receives print jobs from the remote print provider and routes them to the appropriate print processor.
Print router
Software components that reside on the print server. They receive print jobs from clients and send them on to the spooler.
Print services
A collection of DLLs that receive, process, schedule, and distribute print jobs. Every print job goes through the print spooler.
Print spooler
In the Windows 2000 environment, the “printer” is the software interface between the operating system and the print device. The printer determines how a print job travels to the print devices. A single printer can send print jobs to multiple print devices. Multiple printers can send jobs to a single print device.
Printer
An I/O port through which the printer and computer communicate.
Printer port
A technique that helps you use the available resources more efficiently in a high traffic printing environment. In a printing pool, the print server directs new print jobs to the print device with the lightest load.
Printing pool
The private (secret) member of a cryptographic key pair associated with a public key algorithm. The private key can be used to decrypt data that has been encrypted using the public key.
Private key
ain A PRMD is a private company that controls an X.400 management domain.
These domains are the backbone for transferring electronic messages. PRMDs handle internal messages and communicate with each other through ADMDs.
Private Management Dom (PRMD)
A LAN or WAN for private individual or group use which may or may not be secure. Examples include home and organization (small business, corporate,
Private Network
A PRMD is a private company that controls an X.400 management domain. These domains are the backbone for transferring electronic messages. PRMDs handle internal messages and communicate with each other through ADMDs.
PRMD (Private Management Domain)
Lets you run each application separately. This means that if one application fails, it can’t affect the other applications running on your server.
Process isolation
The logic circuitry that responds to instructions and runs the computer. Also called a CPU (central processing unit).
Processor
How long the processor queue is. A counter measures how many threads are requesting processor time at once.
Processor queue length
A text file that contains the information Windows needs to run MS-DOS applications, such as the path and filename of the executable file.
Program Information File (PIF)
The ability for an adapter card to view packets travelling across the network. A LAN adapter must support promiscuous mode if it is used to monitor network traffic.
Promiscuous mode
The process of changing a Windows 2000 member server into a domain controller. The process transfers an up-to-date copy of the Active Directory database from a current domain controller to the new domain controller.
Promote
PEAP (an extension of EAP) is one of the most effective wireless security solutions. PEAP provides authentication, including passwords. PEAP, provides the following two options:
PEAP-EAP-TLS. This method uses certificates (either on the local system or on a smart card).
PEAP-MS-CHAP v2. This method uses certificates on the server, but passwords on the client. Use this method when the client does not have a certificate.
Protected Extensible Authentication Protocol (PEAP)
Conventions or rules for sending data across a network. These conventions may deal with content, format, timing, sequencing, and error control.
Protocol
Protocol Independent Multicast (PIM) is a very important multicast routing protocol that tells the router to ignore any Layer 3 protocol when making multicast-routing decisions (e.g. OSPF and EIGRP). PIM:
Uses the routing table that is populated by the unicast routing protocol in its multicast routing calculations.
Does not send routing updates between PIM routers.
Protocol Independent Multicast (PIM)
Protocol stacks are installed and configured versions of protocols that connectors use to communicate. For example, the X.400 Connector uses TCP/IP, TP4/CLNP, and/or X.25.
Protocol stacks
A Protocol-Dependent Module (PDM) is used by EIGRP to carry out the requirements specific to independent protocols. PDMs:
Operate completely independent of one another.
Protocol-Dependent Modules (PDM)
A computer on the network that keeps a cache of resolved names and responds to queries for names outside the local subnet.
Proxy
A computer on the network that keeps a cache of resolved names and responds to queries for names outside the local subnet.
Proxy server
The network you use when you make a typical telephone call. It is a worldwide, circuit-switched, analog network. Computers connect to the PSTN through a modem. The PSTN can be used on an on-demand (dial-up) basis or a circuit can be leased permanently as a dedicated line.
PSTN (Public Switched Telephone Network)
A special resource record that is added to DNS to associate the IP addresses and the corresponding host name. Part of the administration of a DNS name server is ensuring that pointer records are created for hosts.
PTR (Pointer) record
Public folders provide a simple and efficient way to collect, organize, and share Exchange 2007 collaborative applications such as calendars, contact lists, task lists, and message lists.
Public folder
The public (non-secret) member of a cryptographic key pair associated with public key algorithm. When the public key is used to encrypt data, the corresponding private key is necessary to decrypt it.
Public key
Also called PKI. The policies and software relating to digital certificates and public and private keys. It includes digital certificates and certification authorities the guarantee the identity the parties involved in an electronic transaction.
Public key infrastructure
A large collection of unrelated computers, with each node on the network having a unique address. The Internet, for example, is a public network. Because computers are unrelated and many companies and individuals share the same communication media, the public network is by nature insecure.
Public Network
The network you use when you make a typical telephone call. It is a worldwide, circuit-switched, analog network. Computers connect to the PSTN through a modem. The PSTN can be used on an on-demand (dial-up) basis or a circuit can be leased permanently as a dedicated line.
Public Switched Telephone Network (PSTN)
In a pull feed, a computer connects to a host at scheduled times and requests any new information.
Pull feed
A WINS server that pulls (requests) WINS database entries from its push partners. The pull partner pulls new WINS database entries by requesting entries with a higher version number than the last entry it received during the last replication from that push partner.
Pull partners
A punch-down block is typically used in telephone wiring cabinets to connect individual strands of twisted pair wires. For example, the punch-down block connects the outside phone lines to inside extensions or phone plugs at the demark (where the local network ends and the telephone company’s network begins). You use a punch-down tool to attach wires to the punch down block.
Punch-down block
In a push feed, the computer containing replicated information connects to its partners at specified intervals and uploads new information.
Push feed
A virtual circuit that provides permanent access to the network like a permanent physical connection. Leasing a PVC is cheaper than leasing a permanent
PVC (Permanent Virtual Circuit)
RADIUS (Remote Authentication Dial-In User Service) is primarily used for pre-authenticating remote clients before access to the network is granted.
RADIUS maintains client profiles in a centralized database. It offloads the authentication burden for dial-in users from the normal authentication of local network clients. For environments with a large number of dial-in clients, RADIUS provides improved security, easier administration, improved logging, and less-performance impact on LAN security systems.
The primary benefit of RADIUS (Remote Authentication Dial-In User Service) can be summarized as centralized. RADIUS is a centralized database of user access profiles. User access profiles determine the rules and restrictions dial-in users must comply with to establish a dial-up link to the network. Only after satisfying the criteria enforced by RADIUS is a remote client granted access to the network.
RADIUS (Remote Authentication Dial-in User Service)
A method of categorizing the use of multiple disks to provide performance enhancement and/or fault tolerance.
RAID (Redundant Array of Inexpensive Disks)
With a given host name, the RARP request will discover the IP address on a network.
RARP (Reverse Address Resolution Protocol)
A Windows NT service that you install on one of your network’s servers to allow clients to access your network remotely. The RAS software can manage up to 256 simultaneous remote connections.
RAS (Remote Access Service)
A GSNW or CSNW utility that allows you to view and perform console functions on a remote NetWare system console.
RCONSOLE
A Windows utility that you can use to restore the hard disk configuration and to update a Emergency Repair Disk.
RDISK
The process of a domain controller pulling updates from its replication partner as well as pushing updates to its replication partner. In comparison, each replication partner typically pulls updates from its partner.
Reciprocal replication
Recomputation is the process of a router comparing routes in search for a new successor route. Recomputation occurs when a successor route to a destination goes down and there are no feasible successors for the destination.
Recomputation
An entry in a DNS name server is known as a record.
In SQL Server, a record is a set of related fields (columns) of data joined as a unit. In a SQL database, it is more common to talk about rows and columns than records and fields.
Record
A file system driver that receives I/O requests for network resources and send the requests into the network. For example, a redirector redirects print jobs away from the client computer’s printer port and out to the network.
Redirector
A RISC computer has a microprocessor that performs a small subset of instructions. This lets it process data more quickly.
Reduced Instruction Set Computing (RISC)
Redundancy is the implementation of one or more backup components that perform duplicate functions. Redundancy:
Improves system performance.
Allows a system to keep functioning normally in the event of a component failure. Increases fault tolerance.
Redundancy
A method of categorizing the use of multiple disks to provide performance enhancement and/or fault tolerance.
Redundant Array of Inexpensive Disks (RAID)
Prefix for Registry data types REG_BINARY, REG_DWORD, REG_EXPAND_SZ, REG_MULTI_SZ, AND REG_SZ.
REG_
A unified database in which Windows 2000 stores all hardware and software configuration information for the local computers.
Registry
A Windows utility you can use to display, troubleshoot, and manually edit the contents of the registry.
Registry Editor
A regular area (also known as nonbackbone area)does not allow traffic to pass through it. The regular area’s primary function is to connect users and resources.
Regular area
Rehoming is the process of moving a public folder from one server to another.
Rehoming
A collection of units of data stored in tables that represent a group of objects (for example, Empoyees, Products, or Customers). Columns in a table represent an attribute of the object (for example, an attribute of an Employee might be LastName, or an attribute of a Product might be shipping weight). Each row in a table represents a single instance of that kind of object (for example, the employee name Jane Smith or the part number 3Y557). Data from one table can be used to find related data in another.
Relational database
Software used to store, update, and retrieve data. It has a client/server architecture, stores data in tables with rows (records) and columns (fields), defines and enforces relationships among data items, and uses some version of Structured Query Language (SQL).
Relational database management system (RDBMS)
A relay domain is a domain for which a server accepts mail but is not authoritative.
Relay domain
Reliable Transport Protocol (RTP) is used by EIGRP to deliver packets to neighboring routers in a guaranteed, ordered manner. RTP:
Supports intermixed transmission of unicast or multicast packets. Only reliably sends certain EIGRP packets.
Sends hello packets that contain an indicator as to whether or not the packet needs to be acknowledged by the recipient.
Ensures low convergence time by sending packets even when unacknowledged packets are pending.
Reliable Transport Protocol (RTP)
administrators who manage servers at multiple location. Windows 2000 and Network and Dial-up Connections let users access networks remotely for such services as file and printer sharing, electronic mail, and database access.
Remote access is part of the integrated Routing and Remote Access service.
An Windows NT utility used to configure a RAS server. This utility can also be used to start a RAS server.
Remote Access Admin
A Windows NT service that you install on one of your network’s servers to allow clients to access your network remotely. The RAS software can manage up to 256 simultaneous remote connections.
Remote Access Service (RAS)
RADIUS (Remote Authentication Dial-In User Service) is primarily used for pre-authenticating remote clients before access to the network is granted.
RADIUS maintains client profiles in a centralized database. It offloads the authentication burden for dial-in users from the normal authentication of local network clients. For environments with a large number of dial-in clients, RADIUS provides improved security, easier administration, improved logging, and less-performance impact on LAN security systems.
The primary benefit of RADIUS (Remote Authentication Dial-In User Service) can be summarized as centralized. RADIUS is a centralized database of user access profiles. User access profiles determine the rules and restrictions dial-in users must comply with to establish a dial-up link to the network. Only after satisfying the criteria enforced by RADIUS is a remote client granted access to the network.
Remote Authentication Dial-in User Service (RADIUS)
Remote delivery queues hold messages that will be delivered using SMTP to recipient mailboxes that reside on remote servers in Exchange 2007. Each remote delivery queue holds messages that are routed to recipients with the same delivery destination. Each time multiple recipients have the same delivery destination, a remote delivery queue is dynamically created. Once the messages have been successfully delivered, the queue expires and is automatically deleted three minutes later.
Remote delivery queue
A Windows utility that lets you run a process on a remote computer.
Remote Execution (REXEC)
A backup method that uses a tape drive installed on a single server or workstation to back up data other servers and computers connected to the network. This method backs up the registry on the computer attached to the tape drive, but not the registries of the other computers.
Remote network backup
Remote Procedure Calls are based on a client/server model in which one server runs processes on another server. Both servers assume the calls are local, when in reality they run over LAN connections and through software libraries on both servers.
Remote Procedure Call (RPC)
A Windows NT utility that lets you run commands on a UNIX host.
Remote Shell (RSH)
A Rendezvous Point (RP) is a temporary connection between a multicast receiver and an existing shared multicast tree. When a volume of traffic crosses a threshold, the receiver is joined to a source-specific tree, and the feed through the RP is dropped.
Rendezvous Point (RP)
A command-line Windows 2000 support tool that lets you perform replication- related tasks.
Repadmin.exe
A device that reamplifies packets sent on a network. A repeater provides additional distance on a network by reamplifying packets and sending them on.
Repeater
An update to the Active Directory update that is made through replication. For example, if BSmith’s password is changed on Server1 then replicated to Server2, the replicated update was made on Server1.
Replicated update
A process by which a collection data is copied to one or more computers in order to create synchronized sets of data. Changes to Active Directory, for example, are regularly replicated to all domain controllers in a forest.
Replication
The time period between when a change is made to a server’s directory and when that change appears on other servers in the same site. It is usually 5 minutes.
Replication latency
Replmon.exe. A graphical Windows 2000 support tool that lets you monitor the replication process and perform replication-related tasks.
Replication Monitor
One of two domain controllers that exchange updated information.
Replication partner
The series of connections over which replication takes place.
Replication topology
A local group used by the Directory Replicator service. This group is not used for administration.
Replicator
A series of documents regarding TCP/IP standards. RFCs describe the internal workings and processes of the Internet. TCP/IP standards, however, are developed by consensus. Member of the Internet Society can submit a document to be published as an RFC. After submittal, the document is reviewed for technical accuracy and assigned a classification. There are five classifications of RFCs, including Required, Recommended, Elective, Limited Use, Not Recommended. If a document is being considered as a standard, it goes through stages known as maturity levels. These levels include proposed standard, draft standard, and Internet standard.
Request for Comment (RFC)
A specific IP address permanently set aside for use by a specific DHCP client. Addresses are reserved in the DHCP database by using DHCP Manager. Each reserved address is associated with a unique client device identifier.
Reservation
A client computer running DNS that queries a DNS server on the network for name resolution.
Resolver
Any network service, such as file and print are resources. Microsoft provides many resource types, including DHCP server, file shares, print spooler, and so on.
Resource
Resource mailboxes are used to manage meeting rooms, projectors, and additional facilities in Exchange 2007. When a resource mailbox is created, a disabled user account is created for the mailbox. Rights are then designated to a user who will manage the resource mailbox, or rules are created for the mailbox so it can manage itself.
Resource mailboxes
A DNS record that is to be placed in the name service. Using the DNS Manager, you can configure new host records and new resource records.
Resource records
Retransmit Time-Out (RTO) is the amount of time in milliseconds that a router will wait for an acknowledgement before sending a reliable packet to a neighbor from the retransmission queue.
Retransmit Time-Out (RTO)
With a given host name, the RARP request will discover the IP address on a network.
Reverse Address Resolution Protocol (RARP)
is made to access a particular application, the application can contact the DNS server and do a reverse lookup on the client’s IP address. If the host name returned by the DNS server is not in the access list for the NFS volume, or if the host name was not found in DNS, then the request would be denied.
Reverse Path Forwarding (RPF) routes traffic away from the source rather than to the receiver.
Reverse Path Forwarding (RPF)
A Windows utility that lets you run a process on a remote computer.
REXEC (Remote Execution)
A series of documents regarding TCP/IP standards. RFCs describe the internal workings and processes of the Internet. TCP/IP standards, however, are developed by consensus. Member of the Internet Society can submit a document to be published as an RFC. After submittal, the document is reviewed for technical accuracy and assigned a classification. There are five classifications of RFCs, including Required, Recommended, Elective, Limited Use, Not Recommended. If a document is being considered as a standard, it goes through stages known as maturity levels. These levels include proposed standard, draft standard, and Internet standard.
RFC (Request for Comment)
A person who has the responsibility to review an RFC submitted for publication and assign a classification to the document. See RFC for information on classifications and maturity levels for RFCs.
RFC editor
Rights allow you to carry out specific tasks in Windows 2000. For example, with Backup Operator, you can back up and restore user and system state data on a Windows 2000 computer.
Rights
A ring topology connects neighboring nodes until they form a ring. Signals travel in one direction around the ring. In ring topologies, each device on the network acts as a repeater to send the signal to the next device. With a ring:
Installation requires careful planning to create a continuous ring. Isolating problems can require going to several physical locations along the ring.
A malfunctioning node or cable break can prevent signals from reaching nodes further along on the ring.
Ring
A technique for rerouting data on an FDDI ring network to a secondary ring to prevent a break in the network from interrupting network service. Also referred to as dual counter-rotating rings.
Ring wrapping
A protocol that allows a router to communicate routing information to another router on the network.
RIP (Routing Information Protocol)
A protocol that routers use to exchange information between other routers on an IPX network and that hosts use to decide on the best route when forwarding remote IPX traffic.
RIPX (Routing Information Protocol over IPX)
A RISC computer has a microprocessor that performs a small subset of instructions. This lets it process data more quickly.
RISC (Reduced Instruction Set Computing)
A user profile located on the server but downloaded to the local computer when the user logs on. Changes to the profile are saved both locally and on the server when the user logs off.
Roaming user profiles are convenient for users that move from location to location and use different computers, but want to keep the same desktop. The
Roaming user profile
A program that explores links inside and outside a Web site. Also called a spider.
A rogue DHCP server is an unauthorized DHCP server on the network.
Robot
Rogue DHCP Server
A certification authority that has no higher authority to vouch for it. The root authority is at the top of a certification hierarchy.
Root authority
A certificate that is digitally signed by the authority that issued it. This occurs when the issuing authority is the root authority and there is no higher authority to verify the certificate.
Root certificate
The first-level directory on a hard disk or partition.
Root directory
A Microsoft utility that views or modifies the local routing table in a TCP/IP network.
ROUTE
Route aggregation allows the aggregation of specific routes into a single route in BGP. When route aggregation is implemented without any modifiers, granularity is lost because there is no inheritance of the individual route attributes (such as AS_PATH or community).
Route aggregation
The process by which routers exchange route information between themselves. Each routing table entry learned through RIP is given a time-out value of three minutes past the last time it was last received in a RIP advertisement.
Route convergence
A route map is an access list that has the ability to apply logic and make modifications to parameters by using route map statements. Route maps are best used in:
PBR NAT BGP
Route filtering during redistribution
Route map
Using the split horizon with poison reverse method (also called poison reverse or route poisoning), routers continue to send information about routes back to the next hop router, but advertise the path as unreachable. If the next hop router notices that the route is still reachable, it ignores the information. If, however, the path timeout has been reached, the route is immediately set to unreachable (16 hops for RIP).
Route poisoning
Route redistribution is the capability of boundary routers connecting different routing domains to exchange and advertise routing information.
Route redistribution
Route summarization is the consolidation of multiple routes into a single advertisement.
Route summarization
A device that receives packets, reads their headers to find addressing information, and sends them on to their correct destination on the network or Internet.
Router
A protocol that allows a router to communicate routing information to another router on the network.
Routing Information Protocol (RIP)
A protocol that routers use to exchange information between other routers on an IPX network and that hosts use to decide on the best route when forwarding remote IPX traffic.
A table that gives network bridges and routers the information needed to forward data packets to locations on other networks. Routing tables must be updated frequently as changes to machines and connections occur.
Routing tables include network addresses, the subnet mask, and the gateway addresses. They may also include the subnet broadcast address, network broadcast address, local loopback address, local network address, and the local host address.
Routing Information Protocol over IPX (RIPX)
Routing table
A Rendezvous Point (RP) is a temporary connection between a multicast receiver and an existing shared multicast tree. When a volume of traffic crosses a threshold, the receiver is joined to a source-specific tree, and the feed through the RP is dropped.
RP (Rendezvous Point)
Remote Procedure Calls are based on a client/server model in which one server runs processes on another server. Both servers assume the calls are local, when in reality they run over LAN connections and through software libraries on both servers.
RPC (Remote Procedure Call)
Reverse Path Forwarding (RPF) routes traffic away from the source rather than to the receiver.
RPF (Reverse Path Forwarding)
A Windows NT utility that lets you run commands on a UNIX host.
RSH (Remote Shell)
Retransmit Time-Out (RTO) is the amount of time in milliseconds that a router will wait for an acknowledgement before sending a reliable packet to a neighbor from the retransmission queue.
RTO (Retransmit Time-Out)
Reliable Transport Protocol (RTP) is used by EIGRP to deliver packets to neighboring routers in a guaranteed, ordered manner. RTP:
Supports intermixed transmission of unicast or multicast packets. Only reliably sends certain EIGRP packets.
Sends hello packets that contain an indicator as to whether or not the packet needs to be acknowledged by the recipient.
Ensures low convergence time by sending packets even when unacknowledged packets are pending.
RTP (Reliable Transport Protocol)
A database hive in the Registry that includes the directory database for a Windows NT computer.
SAM (Security Accounts Manager)
Samba is an open source file sharing protocol that provides file and print services. Samba (based on SMB) allows non-Windows servers to communicate with Windows based applications and networks.
Samba
A Storage Area Network (SAN) is an out-of-the-computer storage option for large systems. Instead of storage devices being connected inside of a server (known as Direct Attached Storage (DAS)), storage devices are instead connected to the network and then associated with one or more servers. SANs allow for greater capacity storage than is possible with DAS, and support high data transfer rates and clustering to provide high availability.
SAN (Storage Area Network)
The capacity of a single computer or an entire network to function well as you add or remove components (hardware or software).
One mode that an infrared device operates in is diffuse mode (also called scatter mode), which operates by broadcasting a large beam of light rather than a narrow beam. It does not require line-of-sight connections.
Scalability
Scatter Mode (Diffuse Mode)
Single Copy Cluster (SCC) uses shared storage in a failover cluster configuration which allows multiple servers to manage a single copy of storage groups. Because nothing in a single copy cluster is shared between the nodes, nodes have access to shared data, but cannot access it at the same time.
SCC (Single Copy Cluster)
The schema is used to hold the blueprint for Active Directory in Exchange 2007. It defines all of the valid object types and attributes that can be associated with each object type on the Active Directory. If you try to create an object on an Active Directory domain controller that has not been defined within the schema, the domain controller will contact the schema master to make sure it has the latest copy of the schema. If the object is not defined, then the attempt to create the new object will fail.
Schema
An Active Directory partition that stores which types objects and attributes can be created in the Active Directory database.
Schema partition
A Microsoft term for a range of IP addresses that have been configured on a DHCP server awaiting assignment to a host.
Scope
A file that lists actions to be executed when the script is run.
Script
An interface used to connect microcomputers to physical devices (hard disks, scanners, and so on). The American National Standards Institute (ANSI) defines SCSI as a standard high-speed parallel interface.
SCSI (Small Computer System Interface)
Session Description Protocol (SDR) is an application tool that is commonly used to find multicast traffic by querying directories or listening to announcements. SDR encapsulates the following protocols:
Session Directory Protocol (SDP) Session Announcement Protocol (SAP)
SDR (Session Description Protocol)
A fault-tolerant feature that detects bad sectors of a hard disk, moves data from bad sectors to good sectors, and maps out bad sectors to prevent future use.
Sector sparing
SFTP is a file transfer protocol that uses Secure Shell (SSH) to secure data transfers. SSH ensures that SFTP transmissions use encrypted commands and data which prevent data from being transmitted over the network in clear text.
Secure File Transfer Protocol (SFTP)
SHTTP (Secure Hypertext Transfer Protocol) is a proposed standard for security enhanced HTTP. It is used only for Web traffic. SHTTP is an alternative to SSL for Web traffic, but it does not employ SSL.
SHTTP should not be confused with HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), which uses a URL of https://.
Secure Hypertext Transfer Protocol (SHTTP)
HTTPS is a secure form of HTTP that uses SSL as a sublayer for security.
Secure Socket Layer over Hypertext Transfer Protocol (SHTTPS)
A protocol that provides encryption for communication between the Internet servers and browser clients. It uses public/private key cryptography and digital certificates to verify users’ identities.
Secure Sockets Layer (SSL)
A database hive in the Registry that includes the directory database for a Windows NT computer.
Security Accounts Manager (SAM)
A Microsoft Management Console (MMC) snap-in that lets you compare a computer’s current security settings with an existing security template. You can also save security settings as a new security templates.
Security Analysis and Configuration Snap-In
A unique ID used to identify everything in the domain.
Security Identifier (SID)
A text file containing records of events you have chosen to audit. For example, if you chose to monitor unsuccessful attempts to log on to your system, you would look at the security log to find the results of that audit.
Security log
The Windows subsystem that handles the process of logging on to a domain. It works with the Security Accounts Manager to validate the given user name and password, generates an access token, and returns it to the user.
Security Subsystem
A group of security-related settings stored in a file. Security templates can be imported into a Group Policy Object (GPO).
Security template
The seed metric is the default metric or cost for a redistributed route.
In OSPF, the seed metric is based on the interface’s bandwidth. In IS-IS, the default seed metric is 10.
In EIGRP and IGRP, the default seed metric is based on the interface bandwidth and delay.
In RIP, the seed metric starts with a hop count of 0 and increases from router to router in increments.
Seed metric
Segmentation is a Transport layer process of breaking large packets of information from higher layers into smaller packets called segments. Segmentation is necessary to enable the data to meet network size and format restrictions. The other function of segmentation happens when the receiving Transport layer uses packet sequence numbers to reassemble segments into the original message.
Segmentation
A page you can print between each print job sent to a printer. Also called a banner.
Separator page file
An industry-standard protocol developed in 1984 to support TCP/IP over low- speed serial interfaces. Windows 2000 supports SLIP client functionality, but not server functionality. Also, Windows NT RAS Servers do not accept SLIP client connections.
Serial Line Internet Protocol (SLIP)
A serial port transmits and receives data one bit at a time. The modem and mouse connect to a computer through a serial port.
Serial port
A Microsoft management utility that provides management for Windows NT servers.
Server Management Services (SMS)
The file-sharing protocol used on all MS Net products. A workstation communicates with an SMB server process at the remote host.
Server Message Block (SMB)
An Active Directory object that represents the physical location of a server (usually a domain controller) on a Windows 2000 network.
Server object
A built-in local group on domain controllers only. Server Operators share disk resources and can back up and restore the server.
Server Operators
A backup technique that backs up the data stored on the server. This requires fewer backup devices and storage media, but requires all users to store critical files on the server.
Server-only backup
A computing process that performs a specific task in the system. It may also provide a programming interface for other processes.
Service
Updates to the Windows 2000 operating system that Microsoft periodically issues. They include bug fixes and other improvements and are available at no cost from the Microsoft web site.
Service packs
The organization that provides a WAN service to an individual or company. A service provider might be the same organization that owns the WAN, or it might be a separate organization that purchases network access from a WAN carrier and then resells network access to the general public.
Service provider
A type of wireless security feature used to group several wireless devices and access points as part of the same network and to distinguish these devices from other adjacent wireless networks. The SSID is also commonly referred to as the network name. Most WAPs come with a default SSID, which you should change as part of your security implementation. Even after you change the SSID, it is still only a minimal security feature. There are two type of SSIDs:
BSSID (Basic Service Set Identification) is used by an ad-hoc wireless network with no access points.
ESSID (Extended Service Set Identification), or ESS Identifier, is used in an infrastructure wireless network that has access points.
Service Set Identification (SSID)
A session refers to a communication between two end points (usually between client and service) that occur during a single connection. The session begins when the connection is established at both ends and terminates when the connection is ended.
Session
Session Description Protocol (SDR) is an application tool that is commonly used to find multicast traffic by querying directories or listening to announcements. SDR encapsulates the following protocols:
Session Directory Protocol (SDP) Session Announcement Protocol (SAP)
Session Description Protocol (SDR)
SFTP is a file transfer protocol that uses Secure Shell (SSH) to secure data transfers. SSH ensures that SFTP transmissions use encrypted commands and data which prevent data from being transmitted over the network in clear text.
SFTP (Secure File Transfer Protocol)
The name of a folder that many users will access on a network. Use intuitive share names so that your users can easily identify resources.
Share name
Security to control how users access a shared folder.
Share permissions
A folder that is used by a group of people on the network. Shared folders give access to users of applications, data, and home folders.
Shared folder
A printer that is connected to the network so many users can access it.
Shared printer
A messaging system based on a server/client relationship in which the client takes the active role in delivering and processing messages. The server is simply a repository of shared files. Microsoft Mail 3.x and Lotus cc:Mail are shared- file messaging systems.
Shared-file messaging system
Twisted pair cables support a wide variety of fast, modern network standards. Twisted pair cabling is composed of two wires that carry the data signals. PVC plastic insulation surrounds each wire. Two wires are twisted to reduce the effects of electromagnetic interference and crosstalk. Because the wires are twisted, EMI should affect both wires equally and can be cancelled out.
Multiple wire pairs are bundled together in an outer sheath. Twisted pair cable can be classified according to the makeup of the outer sheath. Shielded Twisted Pair (STP) has a grounded outer copper shield around the bundle of twisted pairs or around each pair. This provides added protection against EMI.
Shielded Twisted Pair (STP)
The SPAP protocol is a more secure version of PAP. SPAP uses an encrypted password for authentication. Password encryption is easily reversible. SPAP is required to be connected to a Shiva LAN Rover (proprietary).
Shiva Password Authentication Protocol (SPAP)
SHTTP (Secure Hypertext Transfer Protocol) is a proposed standard for security enhanced HTTP. It is used only for Web traffic. SHTTP is an alternative to SSL for Web traffic, but it does not employ SSL.
SHTTP should not be confused with HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), which uses a URL of https://.
SHTTP (Secure Hypertext Transfer Protocol)
HTTPS is a secure form of HTTP that uses SSL as a sublayer for security.
SHTTPS (Secure Socket Layer over Hypertext Transfer Protocol)
A script that executes when a computer shuts down.
Shutdown script
A unique ID used to identify everything in the domain.
SID (Security Identifier)
The Internet standard protocol for transferring e-mail messages between hosts. SMTP assumes that both host and client are constantly connected, but you can use both permanent and dial-up connections to an SMTP host.
Simple Mail Transfer Protocol (SMTP)
the information in a management information base (MIB). Windows 2000 uses SNMP to check the status of another computer on a TCP/IP network.
Simple Password Authentication Protocol is used to authenticate a user to a network access server. Simple password authentication protocol:
Allows a password (key) to be configured per area. Routers in the same area that want to participate in the routing domain will have to be configured with the same key.
Is commonly used by internet service providers. Is a Point to Point Protocol.
Is supported by almost all network operating system remote servers.
Simple Password Authentication Protocol
Simplex and duplex are methods of communication transmission. Simplex is the one-way transmission of a signal across a medium. Duplex is the two-way transmission of a signals across a medium. There are two types of duplex transmission; half-duplex and full-duplex. Half-duplex allows transmission of signals, one party at a time. Full-duplex allows transmission and reception of signals to occur concurrently.
Simplex (Duplex)
Single Copy Cluster (SCC) uses shared storage in a failover cluster configuration which allows multiple servers to manage a single copy of storage groups. Because nothing in a single copy cluster is shared between the nodes, nodes have access to shared data, but cannot access it at the same time.
Single Copy Cluster (SCC)
A Windows NT domain model in which all users and groups reside in one domain, with a single PDC and one or more BDCs. This model does not use trust relationships because there is only a single domain. Typically used for centralized administration of accounts and resources.
Single domain model
A Windows NT domain model consisting of at least two domains. Each of the domains has its own domain controller, but all account information is kept on the master domain’s controllers. The single master domain model is used when a company has divisions and departments where each entity has its own resource management, but there is still centralized account management.
Single master domain model
A replication model in which updates can only be made to one domain controller (master). The master then replicates its updates to other domain controllers. Windows NT 4.0 used this replication model.
Single-master replication model
A TCP/IP subnet or group of well connected subnets. If subnets are well connected the connection is very reliable and fast. Sites make it easier to configure Active Directory access and replication to best utilize the physical network.
In Windows 2000, a site is a physical unit that defines replication for Active Directory informatioon. Each site includes one or more servers within an organization. To be in the same site, servers need permanent, high-speed LAN or WAN connections to each other.
Site
An Active Directory object that models which site links should be bridged (in other words, over which site links IP packets can be routed).
Site link bridge object
An Active Directory object that represents a non-permanent or low-bandwidth link between multiple sites.
Site link object
An Active Directory object that represents a group of permanent, high- bandwidth TCP/IP subnets.
A sliding window is used to buffer data transmission between two hosts. Each TCP/IP host maintains two sliding windows: one for receiving and the other for transmitting data. The size of the window is the amount of data that can be buffered on a computer.
Site object Sliding windows
An industry-standard protocol developed in 1984 to support TCP/IP over low- speed serial interfaces. Windows 2000 supports SLIP client functionality, but not server functionality. Also, Windows NT RAS Servers do not accept SLIP client connections.
SLIP (Serial Line Internet Protocol)
An interface used to connect microcomputers to physical devices (hard disks, scanners, and so on). The American National Standards Institute (ANSI) defines SCSI as a standard high-speed parallel interface.
Small Computer System Interface (SCSI)
The file-sharing protocol used on all MS Net products. A workstation communicates with an SMB server process at the remote host.
SMB (Server Message Block)