Linux Terms

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Here Documents

A block of text that is redirected as input to a command.

Convergence

A routing metric is a value used by routing protocols to determine the length of paths within a network. Different routing protocols use various measurements to calculate metrics, such as: Bandwidth, Network delay, Hop count, Interface speed, Path cost, Load MTU, Reliability, or Communication cost.

.CSV File

A comma-delimited text file.

gpresult.exe

A command-line Windows 2000 Server Resource Kit tool that lists the group policy settings applied to a particular user or computer.

ITU (International Telecommunications Union)

A committee that has set most standards related to modems since the late 1980s.

Microsoft Management Console (MMC)

A common framework for a variety of Windows 2000 administrative tools. It provides no functionality of its own.

Community

A community is a group that contains hosts that are running the SNMP service. These communities are identified by a community name and provide the first level of security and context checking for agents.

Coaxial Cable

A type of network transmission media. It is an older technology that is usually implemented with a bus topology. It is not suitable for ring or star topologies because the ends of the cable must be terminated. It is composed of two conductors, which share a common axis, within a single cable.

Autonomous System (AS)

A set of routers under a common administration and with common routing policies.

NDIS (Network Device Interface Specification) 4.0

A set of software rules that specify how protocols communicate with device drivers. All compatible cards and drivers can communicate with each other without needing to use specifically tailored protocols.

MUP (Multiple Universal Naming Convention Provider)

A component that allows a remote computer to accept paths and filenames written in UNC format. It keeps the UNC list so that the client computer does not have to rewrite the UNC names for each redirector on the network.

MPR (Multiple Provider Router)

A component that allows computers to use file and print resources on the network by routing requests to the correct redirector or provider.

Desktop Environment

A component that controls the desktop features, including desktop menus, screensavers, wallpapers, desktop icons, and taskbars.

DEC (Digital Equipment Corporation)

A computer manufacturing company that makes RISC-based processors such as Alpha.

Digital Equipment Corporation

A computer manufacturing company that makes RISC-based processors such as Alpha.

Proxy

A computer on the network that keeps a cache of resolved names and responds to queries for names outside the local subnet.

Brouter

A device that combines the features of a bridge and a router.

Hard Link

A directory entry with the same inode as another directory entry that essenttially gives one file multiple names.

/usr/share/man

A directory that contains documentation resources for many of the different components of the Linux system.

Object

A discrete piece of information, such as a graphic, chart, or paragraph of text, that you can create in one application and link or embed into a file created in another application.

Wayland Compositor

A display server using the Wayland protocol.

VGA (Video Graphics Array)

A display system that is the standard for PC computers.

Extranet

A division of a private network that is accessible to a limited number of external users, such as business partners, suppliers, and certain customers.

Preferred Bridgehead Server

A domain controller that can potentially be chosen as this.

Bridgehead Server

A domain controller that participates in intersite replication.

ISTG (Intersite Topology Generator)

A domain controller whose Knowledge Consistency Checker (KCC) establishes inbound intersite Connection objects for all bridgehead servers in a site.

Relay Domain

A domain for which a server accepts mail but is not authoritative.

Virtual Network Computing (VPC)

A system that allows you to connect and control a remote computer.

DNS Domain

A domain that defines different levels of authority in a hierarchical structure. The highest level is called the root domain. The other levels of domains are currently defined as com, edu, org, net, gov, mil, num, and arpa. Second level domains are any domains defined by companies such as Microsoft.com or Novell.com.

Redirector

A file system driver that receives I/O requests for network resources and send the requests into the network.

Script

A file that lists actions to be executed when this is run.

.MSI file

A file with extension that contains software installation instructions and data for use with the Windows Installer service.

Windows Installer package

A file with the .MSI extension that contains software installation instructions and data for use with the Windows Installer service.

Transform File

A file with the .MST extension that can be applied to a Windows Installer package (.MSI file) to customize it. Also called a software modification file.

Software Modification File

A file with the .MST extension that can be applied to a Windows Installer package (.MSI file) to customize it. Also called a transform file (.MST).

Boot Disk

A floppy disk containing an operating system that is used to boot up a PC in the absence of the PC's operating system.

Shared Folder

A folder that is used by a group of people on the network. These give access to users of applications, data, and home folders.

Address Family

A group of network protocols whose network addresses share a common format.

Diffusing Update Algorithm (DUAL)

A technology makes decisions concerning EIGRP routing computations and guarantees freedom from routing loops.

Backup Log

A text file that records backup operations. The log is helpful when restoring data. You can print it or read it in a text editor.

Wire Crimper

A tool used to attach cable connectors to bare wires (by crimping), such as when you are making your own cables.

LDAP (Lightweight Directory Access Protocol)

A lightweight protocol that clients such as Outlook Express use to look up and search for addresses in an online directory. It also allows a user to add, edit, and delete information from the directory.

COM (Component Object Model)

A method that allows objects to communicate with each other. It is the basis for both OLE and ActiveX.

Partition

A portion of the free space on a hard disk that you format with a file system. They can be either primary or extended.

Uninterruptible Power Supply (UPS)

A power supply that is typically used on file servers to provide battery backup power in case of a power failure. This provides power to a server until an emergency shutdown of the system can occur.

Mandatory User Profile

A pre-configured user profile that the user cannot change, including desktop arrangement, screen saver, printer connections, and so on. One of these can be assigned to many users.

Online Defragmentation

A method that the Extensible Storage engine performs automatically at regular intervals, following the garbage collection process. It rearranges the data in the Active Directory database, but does not compress the data or reduce the size of the database file.

CRC (Cyclic Redundancy Check)

A method used to verify correct transmission and reception of data that has been sent across a network.

Network printer

A printer connected to the network and registered as a shared resource.

Administrative Distance

A metric used to show how trustworthy a router deems information from a specific protocol.

ICANN (Internet Corporation for Assigned Names and Numbers)

A private non-profit corporation tasked with IP address space allocation, protocol assignment, and domain name system management.

Local User Profile

A profile stored on a user's local workstation.

Bluetooth

A proposed standard of the IEEE 802.15 committee, designed to allow people to connect in PAN (personal area network) configurations using cell phones, PDAs (personal digital assistants), printers, mice, keyboards and other similar equipped devices.

Point to Point Protocol (PPP)

A protocol designed as an enhancement to the original SLIP specification. This type of protocol is a data link protocol that provides a standard protocol for sending packets across a point to point network link.

SNA (Systems Network Architecture)

A protocol suite that is a complete networking system, including proprietary hardware. This enables communication between IBM mainframes and terminals. It also interfaces with IBM Token Ring local area networks.

NetBEUI (NetBIOS Extended User Interface)

A protocol supported by all Microsoft products. It has a small stack size, excellent data transfer rates, and is compatible with all Microsoft networks. It cannot be routed, and it is not compatible with non-Microsoft networks.

RIP (Routing Information Protocol)

A protocol that allows a router to communicate routing information to another router on the network.

Routing Information Protocol (RIP)

A protocol that allows a router to communicate routing information to another router on the network.

Network News Transfer Protocol (NNTP)

A protocol that provides access to Internet newsgroups. It allows a client to read messages sent to newsgroups and makes it possible for hosts to replicate articles back and forth.

Secure Sockets Layer (SSL)

A protocol that provides encryption for communication between the Internet servers and browser clients. It uses public/private key cryptography and digital certificates to verify users' identities.

RIPX (Routing Information Protocol over IPX)

A protocol that routers use to exchange information between other routers on an IPX network and that hosts use to decide on the best route when forwarding remote IPX traffic.

Exchange ActiveSync

A protocol used by Internet-enabled mobile devices to send and retrieve Exchange data.

Service User

A System User.

Finger Service

A TCP/IP service that allows you to gather system information from a remote computer.

DHCP Manager

A Microsoft utility used to manage DHCP servers.

Network Monitor

A Windows troubleshooting tool. It monitors the information in frames which are transferred over the network to or from the local computer.

Control Panel

A Windows utility that displays other utilities that are used to manage the local computer.

Workstation-Only Backup

A backup technique that allows users to back up the critical information they store on their own local computer. Each computer needs its own backup device and storage media.

Ad Hoc

A wireless networking architecture topology that does the following: Works in peer-to-peer mode without a WAP (the wireless NICs in each host communicate directly with one another) Uses a physical mesh topology Cheap and easy to set up but cannot handle more than four hosts Requires special modifications to reach wired networks.

Virtual Server

An independent Web, FTP, or other site hosted on a Microsoft Internet Information Server. You can configure each one of these independently, as if it were a physically separate server.

SLIP (Serial Line Internet Protocol)

An industry-standard protocol developed in 1984 to support TCP/IP over low-speed serial interfaces.

Disk Partition

Also called a partition. A portion of the free space on a hard disk that you format with a file system. Partitions can be either primary or extended.

Host Headers

Alternative names that differentiate multiple Web sites hosted on the same Microsoft Internet Information Server computer. You can allow Web sites to use the same IP address and port number by configuring a unique host headerone of these for each site.

Server Object

An Active Directory object that represents the physical location of a server (usually a domain controller) on a Windows 2000 network.

Configuration Partition

An Active Directory partition that stores the domain, site, and replication structure of a Windows 2000 network.

Schema Partition

An Active Directory partition that stores which types objects and attributes can be created in the Active Directory database.

Printer Port

An I/O port through which the printer and computer communicate.

Class A Address

An IP address range that is assigned to networks with very large numbers of hosts. This arrangement assigns the high order bit to zero. The next seven bits complete the network ID portion of the address. The remaining 24 bits make up the host ID. The address range for the first octet (8 bits) is 1-126.

Standard User

An account that log into the system.

Persistent Alias

An alias that stays active after logging out or rebooting.

Kerberos

An authentication encryption protocol designed to provide security for the initial logon process and service requests. It uses symmetric key cryptography, employs DES, and provides end-to-end security.

Anonymous Authentication

An authentication method that does not require the user to enter a username and password to gain access to resources such as Web sites. Some anonymous access methods (like FTP) require an e-mail address as a username, but this is not a secure solution because a fake e-mail address can be used.

Digital Volt Meter (DVM)

An electrical device that you can use to diagnose cable problems. This ddevice can determine if there is a break or short in the cable by testing the resistance (measured in ohms) of the network cable.

Scatter Mode (Diffuse Mode)

One mode that an infrared device operates in is diffuse mode, which operates by broadcasting a large beam of light rather than a narrow beam. It does not require line-of-sight connections.

Diffuse Mode (Scatter Mode)

One mode that an infrared device operates in which operates by broadcasting a large beam of light rather than a narrow beam. It does not require line-of-sight connections.

Baselining

Documenting a network's average performance statistics over time.

Replication Partner

One of two domain controllers that exchange updated information.

AH (Authentication Header)

One of two services comprising IPSec, Encapsulating Security Payload (ESP) being the other. It is used primarily for authenticating the two communication partners of an IPSec link. It also provides message integrity through authentication, verifying that data are received unaltered from the trusted destination. Final point is, it provides no privacy however, and is often combined with ESP to achieve integrity and confidentiality.

Share Name

The name of a folder that many users will access on a network. You should use intuitive identifiers here so that your users can easily identify resources.

PSTN (Public Switched Telephone Network)

The network you use when you make a typical telephone call. It is a worldwide, circuit-switched, analog network. Computers connect to this network through a modem. The network can be used on an on-demand (dial-up) basis or a circuit can be leased permanently as a dedicated line.

Active Directory

The new Windows 2000 directory service. It stores information about all the network resources such as user accounts, computers, printers, servers, and so on. This vehicle makes it easy for administrators to manage the network resources, and makes it easy for users to locate and use the resources.

Authentication Header (AH)

One of two services comprising IPSec, Encapsulating Security Payload (ESP) being the other. This element is used primarily for authenticating the two communication partners of an IPSec link. The process provides message integrity through authentication, verifying that data are received unaltered from the trusted destination.

Worms

Pieces of software code written expressly to cause problems with servers and workstations by "tunneling" through the data and code on the hard drive. These are a type of computer virus.

Trojan Horses

Pieces of software code written expressly to cause problems with servers and workstations. It conceals harmful code inside what looks like a harmless data string or program. Once it is inside a computer, however, it damages data or systems. It is a type of computer virus.

Pass-Through Authentication

The process by which users log on to the network from computers or domains in which they have no account. Pass-through authentication allows a user with an account on one domain to access the entire network. These can occur when a user logs on to a trusted domain or connects to a resource in a trusting domain.

Promote

The process of changing a Windows 2000 member server into a domain controller. The process transfers an up-to-date copy of the Active Directory database from a current domain controller to the new domain controller.

NAT (Network Address Translation)

The process of converting the IP addresses used in private network (such as an intranet) to Internet IP addresses. This increases the number addresses available within the the intranet without reducing the number of available Internet addresses.

Host Name Nesolution

The process of mapping TCP/IP host names to IP addresses.

Rehoming

The process of moving a public folder from one server to another.

Failover

The process of moving services from a failed server to another available server.

Zone Transfer

The process of replicating updates to the zone information among multiple DNS servers. Regular instances of these are necessary because as computers and other devices are added to or removed from a network, host names and IP addresses change.

NetBIOS name resolution

The process of successfully mapping a computer's NetBIOS name to an IP address. Before an IP address can be resolved to a hardware address, a computer's NetBIOS computer name must be resolved to an IP address.

Dual Boot

The ability to boot a computer with either one of two operating systems. Both operating systems must be loaded on the computer. At bootup a menu prompts the user to load the operating system the computer should use.

Journaling

The ability to record and retain all communications in an organization.

Eavesdropping

The act of capturing and examining traffic on a network cable. Eavesdropping is the primary security vulnerability of networking systems using 802.11 technology. On wireless networks, eavesdropping is made more difficult by using WEP keys. Fiber optic cable is the most resistant to tapping.

Boot

The act of starting a computer.

Windows NT Executive

The collective name for the Windows NT subsystems and components that run in kernel mode. These include the Executive Services, Microkernel, and HAL.

Remote Desktop Client

The computer requesting a remote session with another computer.

Subnet Mask

The concept of blocking out a portion of the IP address so that TCP/IP can determine the network ID from the host ID. TCP/IP hosts use this to determine whether the destination host is located on a local or remote network. Typically these are 255.255.255.0.

Adjacency

The connection that is established when neighboring routers transfer packets.

Standby Server

This is a Windows 2000 server that you have configured as an emergency backup server. It has Windows 2000 and all necessary components installed, but has not joined a domain.

Microsoft Exchange PowerShell

This is a command line environment designed for automating administration and maintenance. The Exchange Management Shell is the primary management interface of 2007.

Volume Shadow Copy Service (VSS)

This is a component of Windows Server 2003 that takes a point-in-time snapshot of files on the disk. By enabling this, you can quickly back up and restore files.

MD5 (Message-Digest algorithm 5)

This is a cryptographic authentication method that prevents unauthorized routing messages from unapproved sources in EIGRP.

Warm Site

This is a fault tolerant strategy which provides a redundant work location. If a disaster renders a work site unusable, the effected organization may have a warm site in which to relocate.

Virtual Link

This is a link that allows for discontinuous area 0s to be connected. These also all disconnected areas to be connected to area 0.

Shiva Password Authentication Protocol (SPAP)

This is a more secure version of PAP. SPAP uses an encrypted password for authentication. Password encryption is easily reversible. This is required to be connected to a Shiva LAN Rover (proprietary).

Star

This is a network topology that uses a hub (or switch) to concentrate all network connections to a single physical location. Today it is the most popular type of topology for a LAN.

Secure Hypertext Transfer Protocol (SHTTP)

This is a proposed standard for security enhanced HTTP. It is used only for Web traffic. SHTTP is an alternative to SSL for Web traffic, but it does not employ SSL. This term should not be confused with HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), which uses a URL of https://.

Secure Shell (SSH)

This is a secure and acceptable alternative to remote control systems such as Telnet. It allows for secure interactive control of remote systems. It uses RSA public key cryptography for both connection and authentication. SSH uses the IDEA algorithm for encryption by default, but is able to use Blowfish and DES.

Secure Socket Layer over Hypertext Transfer Protocol (SHTTPS)

This is a secure form of HTTP that uses SSL as a sublayer for security.

X.500

This is a set of recommendations from the International Telecommunications Union. It lays out the rules that allow combining local directory services into one global directory.

Template

This is a standard user account that you create to simplify creating accounts for other users with similar needs.

Thicknet

This is a term for the larger size of coaxial cable used in Ethernet local area networks.

Hub Transport server

This is responsible for handling all message delivery in Exchange 2007.

Retransmit Time-Out (RTO)

This is the amount of time in milliseconds that a router will wait for an acknowledgement before sending a reliable packet to a neighbor from the retransmission queue.

Route Redistribution

This is the capability of boundary routers connecting different routing domains to exchange and advertise routing information.

Transit AS Peering

This is the communication of information between all EBGP peers. This is optimal for scenarios in which an ISP allows their customers using BGP to access all their other customers using BGP.

Virtual Private Network (VPN)

This is the extension of a private network over a shared or public network such as the Internet. It makes use of encrypted and authenticated links that provide remote access and routed connections between private networks or computers.

PAN (Personal Area Network)

This is the interconnection of components, such as laptops, personal digital assistants, printers, mice, keyboards, and other Bluetooth equipped devices, using some form of wireless technology within a personal range (typically 10 meters).

PCIe

This is the latest expansion bus standard, replacing AGP in newer systems.

Transport Policies

This provide an easy, flexible way for administrators to process, filter, store, and modify all e-mail messages within an Exchange organization.

Service Packs

Updates to the Windows 2000 operating system that Microsoft periodically issues. They include bug fixes and other improvements and are available at no cost from the Microsoft web site.

Session

This refers to a communication between two end points (usually between client and service) that occur during a single connection. These begins when the connection is established at both ends and terminates when the connection is ended.

Tone Generator

This sends an electronic signal on a wire or cable. Use this to locate the other end of a specific cable. Generate the tone on one end of the cable, then test the other ends of many cables until you detect the tone.

Serial Port

This transmits and receives data one bit at a time. The modem and mouse connect to a computer through a serial port.

Forward Lookup

The query process in which DNS domain names are resolved to IP addresses. In contrast, reverse lookup is the query process in which IP addresses are resolved to domain names.

HTTP (Hypertext Transfer Protocol)

The standard protocol for Internet browsing. Using this protocol with Exchange lets both users and anonymous users access mailboxes, public folders, and address lists by typing the Exchange server's URL into an Internet browser.

Carrier Sense Media Access/Collision Avoidance (CSMA/CA)

The technology used by Ethernet and wireless networks to control media access and avoid (rather than detect) collisions.

Multihoming

The term used to describe an AS that has more than one connection to the Internet. If an organization performs multihoming with BGP, it is accomplished in one of the following ways:

Replication Latency

The time period between when a change is made to a server's directory and when that change appears on other servers in the same site. It is usually 5 minutes.

Legacy streaming

The traditional method of backup for Exchange environments.

Unified Messaging Server

This automates and integrates voice, e-mail, and fax communications in a single store within the Exchange environment which is accessible through either telephone or the computer. This server communicates with an IP-based phone system which directs all voicemails to this server. All voicemails are converted to windows media audio files which are then sent to the user's Mailbox server and stored as attachments in an e-mail. This also supports voice-prompt calendar and planning services.

Default Route

This can be used to create sufficient reachability, especially for route between an edge and the core. This also reduce the burden on network resources caused by dynamic routing.

Mailbox Server

This contains the mailbox and public folder databases. It's role in Exchange 2007 supports multiple storage groups and multiple stores, making it possible to have up to 50 storage groups and up to 5 stores (databases) per storage group.

Link-local Multicast Name Resolution (LLMNR)

This enables IP hosts to perform IP address-to-host name resolution without a DNS server. It is feature used in Zeroconf networking and is being developed by Microsoft.

IGMP snooping

This enables a switch to detect multicast patterns and multicast traffic in the overall traffic flow on a network; thus making a switch aware of Layer 3.

Bidirectional PIM

This explicitly builds shared bi-directional trees.

Memory Interleaving

This increases the rate at which data can be written to or read from a memory module by grouping data into contiguous blocks instead of dispersing data intermittently.

LAPM (Link Access Procedure for Modems)

This is a Data Link layer protocol that is used by newer modems for error detection. It is implemented in the modem hardware.

Industry Standard Architecture (ISA)

A 16-bit I/O bus slot found on 286 through Pentium machines.

PCI (Peripheral Component Interconnect)

A 32 or 64-bit bus providing compatibility with both 486 and Pentium machines.

Peripheral Component Interconnect (PCI)

A 32 or 64-bit bus providing compatibility with both 486 and Pentium machines.

FAT32

A 32-bit file allocation table which was first shipped with Windows 95. It supports large volumes and is more efficient than the 16-bit FAT system.

BGP Peer

A BGP speaker that is configured to form a neighbor relationship with another BGP speaker. Neighbor relationships allow BGP speakers to directly exchange BGP routing information with one another.

CGMP (Cisco Group Management Protocol)

A Cisco proprietary protocol that works between the router and the switch. In this arrangement, the switch only allows multicast traffic to flow through specific ports according to client data from the router instead of flooding data across all ports.

Resource Records

A DNS record that is to be placed in the name service. Using the DNS Manager, you can configure new host records and new resource records.

MX (Mail Exchanger) record

A DNS resource record that you can define in DNS. It records specify a mail exchanger for a domain name: a host that will either process or forward mail for the domain name.

Mail Exchanger (MX) Record

A DNS resource record that you can define in DNS. The MX records specify this for a domain name: a host that will either process or forward mail for the domain name.

Authoritative Server

A DNS server that has a full, complete copy of all the records for a particular domain.

Shell Variable

A Linux Variable that is not inherited by child shells and processes.

apropos

A Linux utility that displays one-line man page descriptions contained in the whatis database for all commands that match a given command or partial command.

Environmental Variable

A Linux variable that provides a shared setting and configuration across different applications, processes and services and is inherited by child shells and processes.

Active Directory Sites and Services Snap-In

A Microsoft Management Console (MMC) snap-in that lets you create and work with the configuration partition of an Active Directory database.

Run

A Windows utility that is used to start applications.

REXEC (Remote Execution)

A Windows utility that lets you run a process on a remote computer.

RDISK

A Windows utility that you can use to restore the hard disk configuration and to update a Emergency Repair Disk.

Registry Editor

A Windows utility you can use to display, troubleshoot, and manually edit the contents of the registry.

Emergency Repair Disk (ERD)

A backup disk that can provide the necessary files to bring back the Windows operating system in the case of a disk disaster running the Windows operating system.

Normal backup

A backup method that backs up selected files and folders, and marks their archive attributes.

Incremental backup

A backup method that copies to tape only those files that have not been marked by the previous normal or similar type backups. After backing the files to tape, it backup marks each file as having been backed up.

Differential Backup

A backup process that copies to tape only those files that have not been marked by previous backups. This backup does not mark the files after backing them up.

Windows Backup

A backup solution for Windows that allows you to transfer files to and from tape. You can either perform backups manually or schedule an unattended backup.

Domain DFS

A configuration of Dynamic File Systems in which Active Directory stores the information about the virtual file structure. Advantages include fault-tolerance.

Multitasking

A configuration where the processor is time-sliced across tasks, devoting a certain amount of processing time to each task. The processor then alternates between tasks until they have all been completed. This process occurs so rapidly that the computer appears to be working on multiple tasks at one time.

Router

A device that receives packets, reads their headers to find addressing information, and sends them on to their correct destination on the network or Internet.

Application Server

A device that runs certain software applications that can be accessed by users.

TDR (Time-Domain Reflectometer)

A device you can use to examine the breaks and shorts in a network and identify their locations within a few feet. These work by sending a sonar-like pulse down the cable. The pulse looks for shorts or breaks in the cable and reports their location.

Certificate

A digitally signed statement issued by a Certification Authority (CA). It contains a public key and certifies that a specific person, organization, device, or service is the only holder of the corresponding private key.

Cold Site

A fault tolerant strategy which provides a redundant work location. If a disaster renders a work site unusable, the effected organization may have one of these in which to relocate.

Hot Site

A fault tolerant strategy which provides a redundant work location. If a disaster renders a work site unusable, the effected organization may have these in which to relocate.

Sector Sparing

A fault-tolerant feature that detects bad sectors of a hard disk, moves data from bad sectors to good sectors, and maps out bad sectors to prevent future use.

DFS (Distributed File System)

A file management system that lets users and administrators create a virtual file structure such that a folder or hierarchy of folders appear to contain a collection of files that are, if fact, located on multiple computers or drives connected at various physical locations on the network.

FAT (File Allocation Table)

A file system that is required for Windows 95 and MS-DOS based computers.

Boot.ini

A file that builds the Boot Loader Operating System Selection menu. The screen that is displayed is known as the boot loader screen and allows a user to select an operating system from the screen. If no selection is made, NTLDR loads the operating system specified by the default parameter in the Boot.ini file. To change the default entry, you must edit this file.

.MST file

A file that can be applied to a Windows Installer package (.MSI file) to customize it. Also called a software modification file.

Symbolic Link

A file that contains a reference or pointer to another file.

Cache

A file that contains host information needed to resolve names outside of authoritative domains. It also contains names and addresses of root name servers.

Shadow

A file that holds password and password expiration information for user accounts.

Administrative Template

A group of registry settings stored in a file (Registry.pol). These settings then can be distributed using Active Directory-based Group Policy Objects (GPOs).

Security template

A group of security-related settings stored in a file. Security templates can be imported into a Group Policy Object (GPO).

Namespace

A group of unique labels for objects in a shared computing environment. For example, the DNS database is a a tree structure called the domain namespace. Each domain (node) is named and can contain subdomains. The domain name identifies the position of the domain in relation to its parent domain. A group of contiguous names in such a structure constitutes what this term actualizes as.

Group Account

A group of users that have common privileges only in the domain which they were created. Local groups can contain both users and global groups. Global groups are lists of user accounts from within a single domain. A global group can include user accounts from only the domain in which the global group was created.

Backup Operators

A group that has permission to perform backups on a system. This group should have only sufficient rights to perform a backup. They typically use the Windows backup software.

Channel Service Unit/Data Service Unit

A hardware device that converts a digital data frame from a LAN format into a WAN format and vice versa.

DNS (Domain Name System)

A hierarchical client/server-based database management system that translates computer names into IP addresses. This system maps to the application layer and uses UDP and TCP as the underlying protocols. Clients, known as resolvers, contact name servers for the IP address they are seeking.

Backbone Area

A hub for inter-area transit traffic and the distribution of routing information between areas. It is also known as an area 0.

Subkeys

A key inside another key in the Registry. These can contain more of these or values.

Public Network

A large collection of unrelated computers, with each node on the network having a unique address. The Internet, for example, is a public network. Because computers are unrelated and many companies and individuals share the same communication media, the public network is by nature insecure.

MBR (Master Boot Record)

A legacy system that refers to the boot sector on a hard disk or other storage device.

Shared Library

A library of routines that can be used by other applications.

Per Server Licensing

A licensing mode that requires you to buy a license for each server that will be running Windows 2000.

Per Seat Licensing

A licensing mode that requires you to buy a license for every client computer that will connect to resources on the server running Windows 2000.

Phonebook entry

A list of the settings Dial-Up Networking uses to connect a client to a remote computer. The entry includes information such as the country code, area code, phone number, name of the remote computer, and so on.

Print Audit Policy

A list of the types of print events you want to record in your auditing logs. These should include both file and object access.

Distribution List

A list that contains addresses for individual users, public folders, and other distribution lists. They allow each member to receive a copy of a message sent to the entire list. Applications use distribution lists.

Named Pipes

A mechanism that processes use to communicate with each other locally or remotely.

Print Driver

A piece of software that translates the graphics commands in documents into a language the print device can understand.

Bootleneck

A point in a system of processes that does not have the capacity to perform the functions required of it. This lack of processing capacity impedes overall information flow and negatively impacts the performance of the whole system.

BGP (Border Gateway Protocol)

A policy-based, interautonomous system routing protocol that exchanges reachability information with other BGP systems.

Linux

A popular (freely-distributable open source) operating system that runs on multiple hardware platforms.

ARP Cache

A portion of memory that is used to store a hardware address and IP address.

Three-way handshake

A process by which a TCP session is initialized. The purpose of the handshake is to synchronize the sending and receiving of segments, and to communicate to the other host the window size and segment size of data it is capable of receiving.

Directory Service Agent (DSA)

A process that runs on a domain controller and provides access to the Active Directory database.

CDFS

A read-only file system for CD-ROMs, supported by Windows 2000.

TCP (Transmission Control Protocol)

A reliable protocol that divides data into packets, which the IP protocol then sends to other computers on the network.

Callback

A remote access server configuration that provides network security by restricting network access to a specified list of phone numbers. When a client calls the server, the server hangs up, then calls the client back at the appropriate phone number.

Destination Replication Partner

A replication partner that receives updates from a source replication partner. Also called a target replication partner.

Source Replication Partner

A replication partner that sends updates to a target replication partner.

Broadcasts

A request from the source host for a name query request on the local network. Each computer on the local network receives the broadcast and checks its local NetBIOS table to see if it owns the requested name.

Loopback Address

A reserved IP address, 127.0.0.1, that is used to perform loopback functions.

Authoritative Restore

A restoration method which uses the Backup utility to return Active Directory database to the state it was in before the backup, then uses NTDSUTIL to mark an object as the most current. Most current objects will not be overwritten with the data from the server's replication partners during Windows 2000 replication. Use the method when an object is deleted after the last backup. Restore the database with the last backup file, then update all the data modified after the last backup, except the one you marked with NTDSUTIL.

HTTPS (Hypertext Transfer Protocol over Secure Socket Layer)

A secure form of HTTP that uses SSL as a sublayer for security.

Encryption

A security technique that uses a cryptographic algorithm to encode information so that only someone with the proper key can unencode it.

Request for Comment (RFC)

A series of documents regarding TCP/IP standards. These describe the internal workings and processes of the Internet. TCP/IP standards, however, are developed by consensus.

DNS Service Discovery (DNS-SD)

A service location feature used in Zeroconf networking implementation. This service allows IP hosts to automatically find available services, such as file servers, printers, and routers. It is a Mac OS related feature.

LPD (Line Printer Daemon)

A service residing on a UNIX print server that receives print jobs from clients using the LPR utility.

Batch File

A set of commands used to perform a specific operation on a computer.

export

A shell command that essentially changes a variables's export attribute to make it an environment variable that can inherit by child shells and processes.

touch

A shell command that is normally used to create an empty file.

less

A shell command that is similar to the more command but also allows the user to navigate within the display.

Device Driver

A software component that allows a hardware device to communicate with the operating system of a computer.

POST

A software process that verifies that the computer hardware works properly.

CGI (Common Gateway Interface)

A software program that allows Web servers to send data to an application and receive information back from the application, regardless of the operating system the application is running under.

Dial-Up Networking

A software program that allows a client computer to connect to an external or remote network via modem.

Account Operator

A specific user who has been designated as this term. THis designee can create, delete, and modify user accounts, global and local groups, and set account policies.

Hop

A stage on an electronic message's journey from sender to receiver.

Enhanced Integrated Drive Electronics (EIDE)

A standard electronic interface that allows a computer to communicate with a storage device such as the hard drive or a CD-ROM drive.

IDE (Integrated Device Electronics)

A standard electronic interface that allows a computer to communicate with a storage device such as the hard drive or a CD-ROM drive.

Object Linking and Embedding (OLE)

A standard for embedding objects and text in electronic documents.

stdin

A standard stream that is inputted into terminal through keyboard or input device.

UNC (Universal Naming Convention)

A standardized convention used for describing network servers. These names start with two backslashes followed by the server computer name, and then the shared folder name. For example, \\server_name\users\%username%

Universal Naming Convention (UNC)

A standardized convention used for describing network servers. This convention names start with two backslashes followed by the server computer name, and then the shared folder name. For example, \\server_name\users\%username%

Network Architecture

A standardized set of physical and data link layer protocols that serve as the network's foundation upon which other protocol layers can function.

Custom Subnet Mask

A subnet mask that is defined by a network administrator. Each host on a TCP/IP network requires a subnet mask. If this is not used, then a default subnet mask is automatically used.

DDE (Dynamic Data Exchange)

A system by which applications can share data and commands.

Cooperative Multitasking

A system in which each application currently running a process voluntarily passes control of the CPU to another application between processes. It is also called non-preemptive multitasking.

GUID (Globally Unique Identifier)

A system software program that uses to identify the location of a data object.

IAB (Internet Architecture Board)

A technical advisory group of the Internet Society responsible for setting Internet standards including publishing RFC's and overseeing the standards process. This organization governs the Internet Engineering Task Force (IETF), Internet Assigned Number Authority (IANA), and the Internet Research Task Force (IRTF).

IEEE (Institute of Electrical and Electronics Engineers)

A technical professional group that, among other contributions, develops standards (such as the 802.x series of standards) that often become national and international standards.

Cluster Continuous Replication (CCR)

A technique that combines the asynchronous log shipping and replay technology of Exchange 2007 with the failover and management features provided by the Microsoft Windows Cluster service. It does not have a single point of failure and provides high availability by replicating data on a passive node, so the clustered Mailbox server can operate on either node at any time.

Printing Pool

A technique that helps you use the available resources more efficiently in a high traffic printing environment. When in this term, the print server directs new print jobs to the print device with the lightest load.

ZAP File

A text file that references a conventional setup program. This can be distributed to network users using Active Directory-based Group Policy Objects (GPOs).

Firewire

A type of media (cable and connectors) that interface between computers to create a network.

Roaming user profile

A user profile located on the server but downloaded to the local computer when the user logs on. Changes to the profile are saved both locally and on the server when the user logs off.

Administrator

A user who is granted rights to create, delete, or modify user accounts. They also have rights to create user policies, move folders, add and remove hardware from the computer, and access the file system.

Line Printer Remote (LPR)

A utility on a client that allows it to send print jobs to the Line Printer Daemon on the server.

Local Host

Addresses in the 127.0.0.0 range are reserved to refer to the local host (in other words "this" host or the host you're currently working at).

DHCP Offer

All DHCP servers that have valid IP addressing information available send this to the client when the client makes a request.

Case Sensitive

All capital and lower-case characters must be typed exactly as they appear.

Full Duplex

Allows transmission and reception of signals to occur concurrently.

Half Duplex

Allows transmission of signals, one party at a time.

TAPI (Telephony Application Programming Interface)

An API that Windows 2000 communication applications use when they make calls over the telephone line. These calls can include data, fax, and voice.

Telephony Application Programming Interface (TAPI)

An API that Windows 2000 communication applications use when they make calls over the telephone line. These calls can include data, fax, and voice.

LMHOSTS file

An ASCII text file that associates IP addresses to computer names outside the local subnet. In Windows 2000, this file is located in systemroot \System32\Drivers\Etc. You must manually update this file.

LostAndFound container

An Active Directory container that holds objects that no longer have a valid parent container. For example, this could happen if an object is created on one domain controller while simultaneously the object's container is deleted or renamed on another domain controller.

GPO (Group Policy Object)

An Active Directory object that contains user-specific and/or computer-specific settings that Windows 2000 must enforce.

Group Policy Object (GPO)

An Active Directory object that contains user-specific and/or computer-specific settings that Windows 2000 must enforce.

Site Link Bridge Object

An Active Directory object that models which site links should be bridged (in other words, over which site links IP packets can be routed).

Subnet Object

An Active Directory object that represents a TCP/IP subnet.

Site Object

An Active Directory object that represents a group of permanent, high-bandwidth TCP/IP subnets.

Site Link Object

An Active Directory object that represents a non-permanent or low-bandwidth link between multiple sites.

Application Log

An Event Viewer file containing application events such as file errors.

Circuit-Level Gateway

An apparatus that monitors traffic between trusted hosts and un-trusted hosts via virtual circuits or sessions.

OLE DB

An application programming interface (API) that lets COM applications access data from a provider without regard to the data storage format of the provider. For example, the provider could be a database, a spreadsheet, or text files.

Source Compatible

An application that can run only on the hardware platform for which it was originally compiled.

Windows 95

An operating system that runs on client computers. It is not a networking operating system.

HTTP Boot

An option for booting the Linux kernel and as a function in the UEFI specifications. It is a client-server communication-based application. It combines the DHCP, DNS and HTTP to provide the capability for system deployment and configuration over the network.

NAS (Network-Attached Storage)

Another method of adding storage capacity to a network. A NAS system plugs directly into the network in the same way that workstations and other peripherals do.

Text Stream

Any information redirected from the standard output of a command to the standard input of another command.

Event Log

Any of three log files in which Windows records monitored events such as errors, warnings, and the success or failure of tasks. These logs include the system, security, and application logs.

Domain Users

Any user account created in a Windows domain is a domain user. It is a global group.

Distributed Applications

Applications that split processing tasks between a client (front-end) and a server (back-end).

Off-site storage

Backup tapes stored at a location different from the business location.

On-Site Storage

Backup tapes stored at the business location.

System Groups

Built-in groups that organize users for system use. You do not assign users to this particular group; these groups are automatically updated by Windows 2000. Users become members of these groups by default or as a result of network activity. The the four main categories of these groups, which are Everyone, Creator Owner, Network, and Interactive.

Fiber Optic Cable

Cable that uses glass strands to transmit light pulses rather than electricity to communicate. Thus, it is not susceptible to most forms of interference or wire taping technologies. The biggest disadvantage is the high cost of the cable, its components and installation.

Direct Memory Area (DMA)

Channels that are conduits used by high-speed devices to communicate directly with RAM, bypassing the CPU.

Switches

Codes you can use at the command prompt when starting an application or installation program to customize the way the program runs.

>, >>, &>, <

Command line operators used when implementing redirection.

Domain Controller

Controllers that contain copies of the Active Directory database. They provide a centralized approach to administration and account maintenance.

Protocol

Conventions or rules for sending data across a network. These conventions may deal with content, format, timing, sequencing, and error control.

mkdir

Create directory.

Data Redundancy

Creating and maintaining multiple copies of the same data.

cd

Current directory.

rmdir

Deletes empty directories.

Account Policy

Determines the characteristics of passwords for user accounts. The policy sets requirements for password age, length, and uniqueness.

Certificate Revocation List (CRL)

Digital certificates usually expire after one year, but CAs can revoke certificates earlier for various reasons. All revoked certificates are stored in the instrument, which is open to all users. This allows users to check the list to verify whether a given certificate is valid.

Directory Replication

Directory replication is the process of sharing directory information between servers inside and between sites.

Canonical Name (CNAME) Record

Enables you to associate more than one host name with an IP address. This concept is also referred to as aliasing.

Digital Certificate

Encoded computer information that provides verification of the identity of a client or server.

Piggyback Attack

Entering a secured building immediately behind another employee without authenticating yourself is an example.

Application Files

Files necessary for an application to run, such as .EXE, .DLL, and other files.

.INF file

Files that contain the necessary Registry keys for specific policy settings. You use the System Preparation Tool and the Setup Manager Wizard to create .INF files for Windows 2000.

Primary Group

Groups that are created by default on most Linux distributions when a standard user is created and are used to manage access to files and directories.

Secondary Group

Groups that are used to manage access to files and directories.

Processor queue length

How long the processor queue is. A counter measures how many threads are requesting processor time at once.

Classful IP Address

IP addresses that use the default subnet mask.

Personal Web Server (PWS)

If you install Microsoft Internet Information Server on a computer running Windows 2000 Professional, it installs as this. It is not a full Internet server, but you can use it to publish content on your local LAN, or to remotely administer an IIS server.

Print Queue

In the Windows 2000 environment, a list of print jobs waiting to be processed by the printer and printed by the print device. This terminology is a little different from other operating systems such as NetWare. In NetWare, this is a directory on a server that holds print jobs waiting to be printed and has configurable properties and settings.

Printer

In the Windows 2000 environment, it is the software interface between the operating system and the print device. This determines how a print job travels to the print devices. A single one of these can send print jobs to multiple print devices. Multiple of these can send jobs to a single print device.

Digital Network Architecture

In the mid-1970s, Digital Equipment Corporation developed a protocol suite known as this. It is also known as DECnet. The Physical and Data Link layers of DNA were the predecessors of the Ethernet IEEE 802.3 standard.

Transmission Media (Media)

In the realm of information technology, this refers to the cables and wires through which signals (such as electric current or light impulse) are transmitted through a network.

Multiple Master Domain Model

In this Windows NT domain model, user accounts are distributed among more than one of these and the domains communicate via trust relationships. In this model a user can log on from any domain because pass-through authentication sends the request to the user's home domain. This model is typically used for large companies that want centralized administration. Each network user account is created in one of the master domains. Other domains in the network are resource domains, which are usually created at the department level.

Pull feed

In this arrangement, a computer connects to a host at scheduled times and requests any new information.

Recursive Query

In this arrangement, a name server uses its own resources to resolve the request. A client sends a name resolution request to a server. If it has the information, it sends the results back to the client. If it does not have the information, it passes the request to another server. A server can answer one of these types of request with either the requested information or an error message. It cannot refer the client to another server.

Push Feed

In this arrangement, the computer containing replicated information connects to its partners at specified intervals and uploads new information.

Open Systems Interconnection (OSI) model

It includes the Application, Presentation, Session, Transport, Network, Data Link, and Physical layers, which correspond to the model created by the International Standards Organization (ISO).

initramfs

It is used as the first root filesystem that your machine has acces to. It is used for mounting the real rootfs, which contains all of the data.

Plain Old Telephone Service (POTS)

It refers to the telephone system. Early on, Internet connectivity was accomplished with a modem converting digital signals into analog for transmission via the telephone. Newer, better, and faster methods are quickly replacing this as a signal transport medium.

Network Layer

Layer 3 of the OSI reference model. This layer provides connectivity and path selection between two end systems. This layer is the layer at which routing occurs. Corresponds roughly with the path control layer of the SNA model. See also application layer, data link layer, physical layer, presentation layer, session layer, and transport layer.

Process Isolation

Lets you run each application separately. This means that if one application fails, it can't affect the other applications running on your server.

apt-get

Linux command for installing or updating a program using the Debian packages.

ls

List files and directories.

Cookie

Marker downloaded from Internet servers and stored on the hard drives of client computers. These markers store information about your preferences, browser settings, location, and so on. They identify you (or your browser) to Web sites.

Active Server Pages (ASP)

Microsoft's answer to the slower and more limited performance of CGI scripts written in Perl. They combine HTML pages, scripts, programming objects, and ActiveX components to create dynamic Web pages.

mv

Moves and renames files and directories.

NTP (Network Time Protocol)

NTP is used to communicate time synchronization information between systems on a network.

Administrative Share

Names that Windows 2000 provides that are used to remotely connect to a computer to perform administrative tasks.

EDirectory

NetWare 4.x and higher uses a directory service that was formerly called Novell Directory Services (NDS). User accounts are configured in the directory. This can also run on other servers such as Windows and Linux.

Netware

Networking software from Novell.

Backup Designated Router (BDR)

On each subnet, a single OSPF router is identified as this. It becomes the Designated Router (DR) if the DR becomes unavailable.

LLC (Logical Link Control)

One of two sublayers of the Data-Link layer. It manages traffic (flow and error control) over the physical medium.

Outlook Anywhere

Outlook Web Access (OWA) provides browser access to e-mail.

Standard Stream

Preconnected input and output communication channels available to Linux shells and processes.

REG_

Prefix for Registry data types.

pwd

Present working Directory

Login Shell

Program that provides the user's command line prompt.

Classful Routing Protocols

Protocols do not include default subnet mask information in routing updates. Instead here the default subnet mask is used to identify the network and host portions of the address.

Network Protocols

Protocols that allow computers to communicate with each other over a network. For example, AppleTalk and NetBEUI are network protocols.

Replication Monitor

Replmon.exe. A graphical Windows 2000 support tool that lets you monitor the replication process and perform replication-related tasks.

Hives

Sections of the Registry made up of keys, subkeys, and values, which are saved as files on your hard disk.

File-level security

Security that is applied to individual files and folders on a local computer.

Share Permissions

Security to control how users access a shared folder.

Print Services

Software components that reside on the print server. They receive print jobs from clients and send them on to the spooler.

IAS (Internet Authentication Service)

Software services that furnish authentication and security for dial-in users.

Bootloader/Boot Manger

Software that controls the process of loading the operating system.

Locally Compiled Software

Software that is compiled from downloaded or custom source.

Firmware

Software that is embedded in the hardware, usually on a ROM chip.

HAL (Hardware Abstraction Layer)

Software that makes it easy for operating systems to interact with different types of hardware.

Hardware Abstraction Layer (HAL)

Software that makes it easy for operating systems to interact with different types of hardware.

NetShow Player

Software that runs on the client computer and lets you play, start, and stop audio, illustrated audio (slide show), and full-motion video files.

CAL (Client Access License)

Something that permits a client to connect to a Windows 2000 server.

Print Permissions

Specific printing-related rights you assign to users. There are four levels of these that can be assigned, including Print, Manage Documents, and Manage Printers.

.ADM File

Template files that Internet Explorer and its Profile Manager use to create system policy files that control the IE options that are available to network users.

.CDF File

Text files that contain a personalized index for a Web site, so you can download only the content that interests you. Using this type of a file converts a Web site into a channel.

sed

Text stream editor that takes a stream of input, manipulates it and sends it to a stdout.

awk

Text stream editor that takes it's input as records, manipulates it and then sends it to stdout.

Info Node

Text-based help information that is similar to a man-page, but is more verbose and more specific to how to use Linux commands or utilities.

Command Prompt

The 32-bit Windows command-line interface similar to the MS-DOS prompt. You can use it to start programs and type Windows commands.

dbkg

The Debian Package Manager that installs Debian packages.

Primary ID

The ID assigned to a specific user for auditing purposes. With the impersonation (or client) ID, this information tells a system administrator who is using which network functions.

Dig

The Linux preferred tool for testing name resolution. Dig resolves (looks up) the IP address of a host name. Displays other name resolution-related information such as the DNS server used for the lookup request.

ntdos.sys

The NTVDM equivalent of the MSDOS.SYS in MS-DOS.

Local Update Sequence Number

The USN of the local domain controller when an Active Directory update is made.

User Manager for Domains

The Windows NT tool used to manage the security for domains, member servers, and workstations. If the computer is not configured as a domain controller, this is installed. Windows 2000 uses Active Directory Users and Computers instead.

DARPA (Defense Advanced Research Projects Agency)

The agency of the U.S. Department of Defense which created the industry-standard TCP/IP suite of protocols based on packet-switching network experiments conducted in the late 1960's and 1970's.

Hold Time

The amount of time that a neighbor is considered to be functioning properly without a router receiving a packet from the neighbor.

Master Boot Record (MBR)

The area of the hard disk containing the partition table for the drive and the specialized executable code necessary to boot the computer.

Network Interface Layer

The base of the Department of Defense (DOD) model. This layer has the responsibility to place frames on the wire and retrieve frames from the wire.

Firewall

The best device to deploy to protect your private network from a public untrusted network. These devices are used to control traffic entering and leaving your trusted network environment. They can manage traffic based on source or destination IP address, port number, service protocol, application or service type, user account, and even traffic content.

Load Balancing

The capability of a router to distribute traffic over all of its network ports that are the same metric from the destination address.

Scalability

The capacity of a single computer or an entire network to function well as you add or remove components (hardware or software).

Executive Services

The central component of Windows network architecture. It includes the managers and device drivers that run in kernel mode.

Front End

The client in the client/server computing model. It provides an interface for the user to enter requests, formats user requests so that the server understands them, and displays data from the server.

Body Parts

The codes for the text, data, and other information included in an e-mail message.

Community Attribute

The community (type code 8) is an optional BGP transitive attribute that filters incoming or outgoing routes. BGP communities are routes that share some common properties and policies, which allows routers to act on the community as a whole rather than on individual routes.

Certificate Authority (CA)

The component of the public key infrastructure entrusted to issue, store, and revoke certificates. This agency accepts certificate requests, verifies the information provided by the requester, creates and digitally signs the certificate, and issues the certificate to the requester. It also revokes certificates and publishes a certificate revocation list (CRL).

Remote Destop Server

The computer being accessed by another computer.

Linux Kernel

The core component of the Linux operating system. It is written almost entirely in the C programming language.

AD (Advertised Distance)

The cost to the destination network as reported by the neighbor router.

DNF

The danified YUM package manager.

Absolute Path

The defining of a file location from the file system.

Relative Path

The defining of a file location.

SMB (Server Message Block)

The file-sharing protocol used on all MS Net products. A workstation communicates with an SMB server process at the remote host.

Server Message Block (SMB)

The file-sharing protocol used on all MS Net products. A workstation communicates with an SMB server process at the remote host.

System Policy Files

The files containing the rules governing how a Windows NT client computer will display the desktop, use Control Panel options, access the network, and so on. ntconfig.pol is a default system policy file. Windows 2000 computer use Group Policy Objects (GPOs) instead.

ARPA (Advanced Research Projects Agency)

The first group to conduct packet-switching network experiments.

Advanced Research Projects Agency (ARPA)

The first group to conduct packet-switching network experiments.

Open Message

The first message sent by each side of an established TCP session.

Root Directory

The first-level directory on a hard disk or partition.

Subtree

The folders and subfolders contained inside the export directory you use for directory replication.

Event ID

The identification for the event that displays in the Event Detail window in the Event Viewer.

Header

The initial section of an IPM which contains addressing and routing information for the e-mail message.

ANDing Process

The internal process used by TCP/IP to determine whether a packet is destined for a host on a local or remote network. TCP/IP performs this function. When a packet is sent on the network, the destination IP address is ANDed with the same subnet mask.

UDP (User Datagram Protocol)

The is a connectionless communications service that does not guarantee delivery of packets. Applications using these typically deliver small amounts of data and the application has the responsibility for reliable delivery.

Console Tree

The left pane of the Microsoft Management Console (MMC). It shows a hierarchical structure of functions and/or objects.

Originating update sequence number

The local USN of the domain controller on which an Active Directory update was originally made.

Processor

The logic circuitry that responds to instructions and runs the computer. Also called a CPU (central processing unit).

Central Processing Unit (CPU)

The logic circuitry that responds to instructions and runs the computer. Also called a processor.

Centralized Network Administration

The logic circuitry that responds to instructions and runs the computer. Also called a processor.

Synchronization

The mechanism by which domain controllers share directory changes and ensure that their information is accurate.

BGP Peer Group

The neighbors of a router that is being configured. All routers in this configuration have the same update policies.

Public key

The non-secret member of a cryptographic key pair associated with public key algorithm. When this is used to encrypt data, the corresponding private key is necessary to decrypt it.

Baud Rate

The number of bits per second that are physically signaled over a communication medium. The term "baud" originally referred to the number of dots per second that could be signaled using Morse code over particular telegraph systems.

Non-Paged Pool System Memory

The part of operating system memory that remains in physical memory instead of being swapped into virtual memory.

Microkernel

The part of the operating system that handles vital low-level processes. These include deferred procedure calls, first-level interrupt handling, thread scheduling, and so on.

root partition

The partition at the top of the directory tree. It contains all of the programs and files necessary for running Linux. I is represented by the a forward slash (/).

Adapter Card

The physical interface between the computer and the network cable. An adapter card communicates with the computer's hardware, firmware, and software to allow the computer to communicate with the local area network. Also called a network adapter card, network card, or NIC.

Topology

The physical layout of a network. This term describes how the network's computers are connected to each other. Common topologies include buses and rings.

Public Key Infrastructure

The policies and software relating to digital certificates and public and private keys. It includes digital certificates and certification authorities the guarantee the identity the parties involved in an electronic transaction.

GPC (Group Policy Container)

The portion of a Group Policy Object (GPO) that is stored in Active Directory.

Group Policy Container (GPC)

The portion of a Group Policy Object (GPO) that is stored in Active Directory.

GPT (Group Policy Template)

The portion of a Group Policy Object (GPO) that is stored on the domain controller's file system.

Group Policy Template (GPT)

The portion of a Group Policy Object (GPO) that is stored on the domain controller's file system.

Broadcast Domain

The portion of the network that can receive a broadcast. Not all routers have the capability to forward broadcasts. Those that do usually disable this feature and keep the broadcast on the local network.

Group Policy

The primary Windows 2000 desktop administration feature. This is used to create Group Policy objects to control and manage users' computing environments. This includes desktop features such as Start menu options, shortcuts, and available applications, as well as security settings, home folder assignments, auditing, and more.

Thunking

The process by which Win16 on Win32 (WOW) converts calls from 16-bit applications into 32-bit calls for Win32 functions.

Reciprocal Replication

The process of a domain controller pulling updates from its replication partner as well as pushing updates to its replication partner. In comparison, each replication partner typically pulls updates from its partner.

Binding

The process of assigning services to network components.

File Globbing

The process of wildcard expansion-for instance, matching the existing file glossary.txt when the string glos*.txt is typed.

PXE

The process whereby a computer initially boots from firmware installed on the computer's network card. This method is often used on thin clients where no hard drives exists.

Display Server

The program responsible for coordinating the input and output of the programs and applications running the GUI interface to and from the rest of the operatingsystem, the hardware, and each other.

Window Manager

The program that controls the placement and appearance of windows on a Linuxcomputer (such as moving, hiding, resizing, or closing), as well as controlling what theydisplay. In X11, this is a separate program.

BIOS

The program used to get a computer the computer started. It is a legacy system that has been replaced by UEFI.

Apple MacOS

The proprietary Macintosh operating system used by Apple computers.

NX

The remote desktop protocol developed by a company named NoMachine.

Permissions

The rights granted to a user or group to access files and folders on a Windows 2000 computer or a network. These may reside in the local computer's security database or in the Active Directory database of a domain controller on the network.

Seed Metric

The seed metric is the default metric or cost for a redistributed route.

Bit

The smallest unit of data a computer uses. It is a binary value, either a 0 or a 1.

ARC (Advanced RISC Computing)

The syntax used for recovering data in a secondary partition.

ARC (Advanced RISC Computing Naming Convention)

The syntax used for recovering data in a secondary partition. The paths that are used here specify the hardware adapter and disk controller, the numbers of the hardware adapter, the SCSI bus, the disk, and the partition.

Bindery

The system that networks running Novell NetWare use to validate user accounts and passwords. It is the equivalent of the directory database in Windows NT.

Packet

The term used to describe information that is compartmentalized for transport across the network.

Network number

The unique number that the NWLink IPX/SPX protocol uses to identify a specific part of the network. Also called an external network number.

GRUB2

The update of the boot utility that is greater than 1.98.

ErrorControl Levels

The values Windows uses to determine what to do in case of an error in loading or initializing drivers.

Licensing Mode

The way you pay to use an application or operating system. You can choose Per Server or Per Seat licensing for Windows 2000.

Wireless

These type of networking uses radio waves or infrared light (with the air as the transmission medium) to send data between hosts. Networks that use this type of technology, are common in homes, businesses, airports, and hotels. Most networks of this type connect into larger wired networks (such as LANs) which are in turn connected to the Internet.

Rights

This allow you to carry out specific tasks in Windows 2000. For example, with Backup Operator, you can back up and restore user and system state data on a Windows 2000 computer.

Standard Area

This allows any type of route information to enter or leave the area.

Route Aggregation

This allows the aggregation of specific routes into a single route in BGP. When route aggregation is implemented without any modifiers, granularity is lost because there is no inheritance of the individual route attributes (such as AS_PATH or community).

Totally Stubby Area

This area does not allow ASBR routes or inter-area routes; only routes within its own specific area are allowed.

Topology Table

This is a record of the updates sent between neighboring routers when a new router is discovered.

SNMP agent

This performs get, get-next, and set operations requested by a management system. An agent can be any computer running the accompanying software, usually a server or router.

ntdetect.com

This program has the responsibility to pass hardware configuration information to the NTLDR program.

File transfer protocol (FTP)

This protocol provides bi-directional file transfers between two TCP/IP hosts. These hosts must be running FTP software.

Edge Rules Agent

This runs on an Edge Transport server and helps control spam and unwanted mail flow within an organization.

In-band management

This uses a normal network connection with the server for performing management tasks. Tools such as Telnet, Remote Desktop, or SNMP provide in-band server management.

Out-of-Band Management

This uses communication channels and methods that are different from those used by the server to communicate with normal network clients. With out-of-band management, you separate server management traffic from normal network traffic. You might also use unique tools that allow you to communicate with a server before the operating system loads or if the server is unresponsive to normal network communications.

Single Copy Cluster (SCC)

This uses shared storage in a failover cluster configuration which allows multiple servers to manage a single copy of storage groups. Because nothing in a single copy cluster is shared between the nodes, nodes have access to shared data, but cannot access it at the same time.

Line Printer Queue (LPQ)

This utility obtains the status of a print queue on a host running the Line Printing Daemon (LPD) service.

UUENCODE

This was the first widely-used format for binary attachments. It is still an alternative to MIME. It comes in several different flavors, due to different implementations, but it characteristically sends attachments as encoded 7-bit text strings.

YUM

Thr Yellowdog Updater. a free and open-source command-line package-management utility for computers running the Linux operating system using the RPM Package Manager.

Format

To set up partitions and volumes on a hard disk that will use file system such as FAT or NTFS.

Client-Based Administration Tools

Tools that allow you to perform several network administration tasks from a Windows 95/98 or Windows 2000 Professional workstation, such as creating users and groups, sharing folders, and assigning permissions to access resources.

Media Tester

Use a media tester to make sure that a cable is unbroken and that all cables are connected to the correct pins inside the connector.

Virtual LAN (VLAN)

Use a switch to create these. The various ports on a switch can be assigned to a specific one of these to create logically distinct networks on the same physical network topology. These reduce the likelihood of traffic interception because the switch creating the terms transmits traffic only over the specific port hosting the intended recipient of a message. Thus, eavesdropping on any given segment will reveal only the traffic occurring on that specific segment rather than from the entire network. These decrease broadcast traffic and allow the connection of geographically separate systems into the same network. These usually reduce collisions.

Port

Used over the network, these are logical connections, provided by the TCP or UDP protocols at the Transport layer, for use by protocols in the upper layers of the OSI model. The TCP/IP protocol stack uses port numbers to determine what protocol incoming traffic should be directed to.

Domain User Accounts

User name and password information stored in the Active Directory database on the domain controllers.

Local User Accounts

User name and password information stored in the directory database of the local computer.

SMP (Symmetric Multiprocessing)

Using multiple processors that share the same operating system and memory to process programs more quickly.

Symmetric Multiprocessing (SMP)

Using multiple processors that share the same operating system and memory to process programs more quickly.

Best Information

Using the split horizon method (also called best information), routers keep track of where the information about a route came from. Routers do not report route information to the routers on that path. In other words, routers do not report information back to the router from which their information originated.

Route Poisoning

Using the split horizon with poison reverse method, routers continue to send information about routes back to the next hop router, but advertise the path as unreachable. If the next hop router notices that the route is still reachable, it ignores the information.

Hold-Down Method

When this method is routers will, for a period of time, "hold" an update that reinstates an expired link. The time period typically reflects the time required to attain convergence on the network. The hold-down timer is reset when the timer runs out or when a network change occurs.

Windows-on-Windows (WOW)

Win16 on Win32. A 32-bit program inside Windows NT that lets you run Win16 applications. This program works inside an NTVDM.

Windows socket Service (Winsock)

Winsock provides a standard application programming interface to transport protocols such as TCP/IP and IPX. Network applications can use this interface to use the services of the TCP/IP protocol stack.

Reverse Address Resolution Protocol (RARP)

With a given host name, the RARP request will discover the IP address on a network.

stdout

a standard stream that accepts normal output information to be streamed to the console screen or shell window.

Paging file

pagefile.sys. A file on a hard disk that Windows 2000 uses to transfer information in and out of RAM and virtual memory. Also called a swap file or a virtual memory page file.

Whatis Database

A database containing short man page descriptions.

Service

A computing process that performs a specific task in the system. It may also provide a programming interface for other processes.

~/bashrc

A hidden user specific script file that runs when a user logs in and that can contain alias commands to form persistent aliases relating to the terminal session.

~/.profile file

A hidden user specific script file that runs when a user logs in and that can contain alias commands to form persistent aliases that dates back to the original Bourne shell.

KCC (Knowledge Consistency Checker)

A process that runs on each domain controller and creates inbound Connection objects (almost always intrasite Connection objects).

Knowledge Consistency Checker (KCC)

A process that runs on each domain controller and creates inbound Connection objects (almost always intrasite Connection objects).

Computer Account

An account entry in the local SAM database or the Active Directory domain database that identifies a computer (workstation) as part of a domain.

Default

An action that a system performs, or a characteristic that it displays unless explicitly instructed otherwise.

Alert

An action, defined by an administrator, that takes place in response to an administrator-specified event. The action can be the execution of a job, or e-mailing/paging a particular operator.

CLNS (Connectionless Network Service)

An address family that is used to identify routing sessions for protocols that use standard network service access point (NSAP) address prefixes, such as BGP.

Connectionless Network Service (CLNS)

An address family that is used to identify routing sessions for protocols that use standard network service access point (NSAP) address prefixes, such as BGP.

Event Viewer

An administration tool that provides information about such events as errors, warnings, and the success or failure of tasks.

Host Name

An alias assigned to a computer by an administrator to identify a TCP/IP host. These can be any 256-character string. Multiple host names can be assigned to the same host. Many utilities can use host names rather than the TCP/IP address. It always corresponds to an IP address that is stored in a HOSTS file or in a database on a DNS or NetBIOS name server.

16-bit Application

An application that has been written using the 16 bit length for communicating data.

32-bit Application

An application that has been written using the 32 bit length for communicating data.

64-bit Application

An application that has been written using the 64 bit length for communicating data.

Microsoft Internet Explorer

An application that includes not only a Web browser but also a set of tools that integrates it with Microsoft Windows 95/98, NT, and 2000.

Windows Media Player

An application that lets you use streaming audio, illustrated audio, and video to download real-time content from the Internet.

Binary Compatible

An application that runs on any Windows-supported platform, not only on the hardware for which it was originally compiled.

Debian Package Manager

An archive file, which contains the executable files, libraries, and documentation associated with a particular suite of program or set of related programs.

Challenge Handshake Authentication Protocol (CHAP)

An authentication encryption protocol designed to protect passwords while in transit from a client to the logon server.

Basic Authentication

An authentication method that requires the user to enter a valid username and password for a Windows user account. This information passes between the server and client in clear text.

Standard Primary Zone

An authoritative DNS server for a zone that contains a read-write copy of the zone file and can be updated directly. The updated zone information can then be replicated to secondary zones.

Internal Relay

An e-mail domain that is hosted by another Active Directory Forest within the Exchange organization. This system uses different e-mail addresses, but all incoming mail goes through the Exchange organization.

FC (Fibre Channel)

An integrated set of standards developed to provide a reliable method for quickly transferring large amounts of data.

Small Computer System Interface (SCSI)

An interface used to connect microcomputers to physical devices (hard disks, scanners, and so on). The American National Standards Institute (ANSI) defines the interface in this term as a standard high-speed parallel interface.

SCSI (Small Computer System Interface)

An interface used to connect microcomputers to physical devices (hard disks, scanners, and so on). The American National Standards Institute (ANSI) defines this as a standard high-speed parallel interface.

PERL (Practical Extraction and Report Language)

An interpreted script language that includes UNIX facilities with C. It is faster and easier to code than other languages, but works best for small, limited applications.

NTDS Performance Object

An object in System Monitor which represents Directory Services and can be monitored to observe the performance of Active Directory.

Thread

An object inside a process that runs program instructions. If an operating system allows it, multiple of these can run on different processors at the same time.

SVC (Switched Virtual Circuit)

An on-demand virtual circuit that is maintained for the length of a conversation. When the conversation ends, the connection is released.

Resource

An onject such as a socket, filesystem or device.

Software Repository

An online location that stores software packages for a Linux distribution.

MSN (The Microsoft Network)

An online network sponsored by Microsoft. You can find answers to technical questions, read articles about Microsoft products, chat with other users, and much more.

xrdp

An open source implementation of Microsoft'a Remote Desktop Protocol.

Multithreading

An operating system feature that allows more than one process to work at the same time. For example, Winnt32.exe can decompress and copy files at the same time, since each task is a separate thread.

Windows NT

An operating system from Microsoft that you can use for both client and server computers. The two types of this type of OS are Windows NT Server and Windows NT Workstation.

UNIX

An operating system invented at Bell Labs in 1969. This OS is a non-proprietary operating system, so there are many independently-produced versions of this system, called "flavors."

Bounce

The longest acceptable round-trip time for a test message to travel between the monitor's home server and the target server.

Attenuation

The loss of signal strength over distance.

SDR (Session Description Protocol)

This is an application tool that is commonly used to find multicast traffic by querying directories or listening to announcements.

Session Description Protocol (SDR)

This is an application tool that is commonly used to find multicast traffic by querying directories or listening to announcements.

Transit Area

This is an area that has more than one way into itself.

Social Engineering

This is an attack where someone claims to be someone other than who they are. Attackers can assume any role within your organization or of anyone outside of your organization. Their goal is to get you to disclose confidential or sensitive information verbally or to perform some action on the computer system that would grant the attacker access, such as changing a password based on a verbal request over the phone by someone claiming to be an offsite manager.

Samba

This is an open source file sharing protocol that provides file and print services. This prptocol (based on SMB) allows non-Windows servers to communicate with Windows based applications and networks.

MED attribute

This is an optional, nontransitive BGP attribute (also known as a metric) that communicates to neighbors the preferred path for information to be sent to them.

Resolver

A client computer running DNS that queries a DNS server on the network for name resolution.

Newsreader

A client that uses NNTP to read postings in Internet newsgroups.

ROUTE

A Microsoft utility that views or modifies the local routing table in a TCP/IP network.

Demand Paging

A Windows process that moves data between the computer's RAM and a paging file on the hard drive.

ARIN

A Windows Socket specification using Visual Basic.

printenv

A shell command that displays current environment variables.

vi Operating Modes

Command, Command Line, Insert and Replace.

cp

Copy files and directories.

rm

Deletes files and directories.

EBGP (External BGP)

This is used by BGP to route information between autonomous systems.

Binary Synchronous Communications Protocol (BISYNC)

A Data Link layer protocol for synchronous communication devices.

winipcfg

A Microsoft Windows NT utility that is used to verify a TCP/IP configuration. For Windows 2000, use the IPCONFIG utility.

Simplex

The one-way transmission of a signal across a medium.

TRACERT

A Microsoft diagnostic utility that verifies the route used from the local host to a remote host.

BISYNC (Binary Synchronous Communications Protocol)

A Data Link layer protocol for synchronous communication devices.

PCONSOLE

A GSNW or CSNW utility that allows you to manage NetWare print servers from a Windows 2000 client computer.

RCONSOLE

A GSNW or CSNW utility that allows you to view and perform console functions on a remote NetWare system console.

SYSCON

A GSNW or CSNW utility that lets you set up user accounts, define policies, and grant user permissions on a NetWare network from a Windows NT computer.

Non-Local GPO

A Group Policy Object (GPO) stored in Active Directory. Settings in a non-local GPO can be applied to users and computers throughout the network. Also called an Active Directory-based (GPO).

Private Network

A LAN or WAN for secret individual or group use which may or may not be secure. Examples include home and organization (small business, corporate, institute, government) networks. Intranets and extranets, although related to the Internet, are varieties of this term. Both an extranet and intranet are tightly controlled, and made available only to select organizations. An extranet is made available to the public and an intranet is made available internally.

-h

A Linux command option that displays information about the command including command options.

help

A Linux command that displays information abot commands that are built-in to the shell itself.

tee

A Linux command that redirects output to both stdout and to a file.

User Variable

A Linux shell variable that is typically defined at the shell prompt or added when scripts that are defined in a user's profile are run.

Local Variable

A Linux shell variable that is typically defined in scripts and in script functions and generally do not exist after the script is run.

Security Analysis and Configuration Snap-In

A Microsoft Management Console (MMC) snap-in that lets you compare a computer's current security settings with an existing security template. You can also save security settings as a new security templates.

Group Policy Snap-In

A Microsoft Management Console (MMC) snap-in that lets you view and edit settings for a Group Policy Object (GPO). Also called the Group Policy Editor.

Automatic Private IP Addressing (APIPA)

A Microsoft implementation of automatic IP address assignment without a DHCP server. Using this method, hosts assign themselves an IP address on the 169.254.0.0 network (mask of 255.255.0.0).

APIPA (Automatic Private IP Addressing)

A Microsoft implementation of automatic IP address assignment without a DHCP server. Using this, hosts assign themselves an IP address on the 169.254.0.0 network (mask of 255.255.0.0).

SMS (Server Management Services)

A Microsoft management utility that provides management for Windows NT servers.

Server Management Services (SMS)

A Microsoft management utility that provides management for Windows NT servers.

Scope

A Microsoft term for a range of IP addresses that have been configured on a DHCP server awaiting assignment to a host.

NBTSTAT

A Microsoft utility that checks the state of current NetBIOS over TCP/IP connections. It also updates the LMHOSTS cache, and determines your registered name and scope ID. The utility is also used for troubleshooting and pre-loading the NetBIOS name cache.

Netstat

A Microsoft utility that displays the protocol statistics and the current state of TCP/IP connections.

WINS Manager

A Microsoft utility that is used to manage the Microsoft Windows Internet Name Service. With this utility, you can make configuration changes to your WINS server such as disabling logging or configuring static mappings.

NSLOOKUP

A Microsoft utility used to diagnose problems with DNS. Users can interact with the DNS server, and this utility can be used to display resource records on DNS servers, including UNIX DNS servers.

M-node

A NetBIOS node that provides support over TCP/IP. This node is a combination of B-nodes and P-Nodes. The default is to function as a B-node.

Site

A TCP/IP subnet or group of well connected subnets. If subnets are well connected the connection is very reliable and fast. Sites make it easier to configure Active Directory access and replication to best utilize the physical network. In Windows 2000, it is a physical unit that defines replication for Active Directory informatioon. Each one of these includes one or more servers within an organization. To be in the same grouping, servers need permanent, high-speed LAN or WAN connections to each other.

PING (Packet Internet Groper)

A TCP/IP utility that verifies TCP/IP is configured correctly and that another host is available.

Packet InterNet Groper (PING)

A TCP/IP utility that verifies TCP/IP is configured correctly and that another host is available.

AWG (American Wire Gauge)

A U.S. standard set of wire sizes that apply to copper wires, including household electrical wiring and telephone lines. The higher the number, the thinner the wire.

American Wire Guage (AWG)

A U.S. standard set of wire sizes that apply to copper wires, including household electrical wiring and telephone lines. The higher the number, the thinner the wire.

L2F (Layer 2 Forwarding Protocol)

A VPN protocol which offers no data encryption.

Pull Partners

A WINS server that pulls (requests) WINS database entries from its push partners. This pulls new WINS database entries by requesting entries with a higher version number than the last entry it received during the last replication from that push partner.

NetDDE (Network Dynamic Share)

A Win32 service that can share processes with other Win32 services. It is a service registered under the Services subkey in the Registry.

Network Dynamic Share (NetDDE)

A Win32 service that can share processes with other Win32 services. It is a service registered under the Services subkey in the Registry.

Package Manager

A collection of software tools that automates the process of downloading, installing, upgrading, configuring and removing computer applications in Linux.

Global Catalog Server

A Windows 2000 domain controller that stores at least partial replicas of each partition in the forest. The partial replicas are read-only and make it possible to search the Active Directory database on a forest-wide basis.

Gateway Services for NetWare (GSNW)

A Windows 2000 service that allows a Windows 2000 server to use file and print resources on a NetWare server.

Windows Installer Service

A Windows 2000 service that uses Windows Installer packages (MSI files) to automate software installation and re-installation.

System Monitor

A Windows 2000 tool that is used to monitor real-time and historical system performance, trends, bottlenecks, and the effects of system configuration changes.

Software Package

A Windows Installer package (.MSI file) or ZAP file that is distributed to network users using an Active Directory-based Group Policy Object (GPO).

Microsoft Internet Information Server

A Windows NT Server file and application server designed to host Internet sites. IIS is integrated with Windows 2000 Server.

TDI (Transport Driver Interface)

A Windows NT boundary layer that gives file system drivers a common programming interface so that they do not have to be tied to specific protocols.

Transport Driver Interface (TDI)

A Windows NT boundary layer that gives file system drivers a common programming interface so that they do not have to be tied to specific protocols.

Single Master Domain Model

A Windows NT domain model consisting of at least two domains. Each of the domains has its own domain controller, but all account information is kept on the master domain's controllers. This model is used when a company has divisions and departments where each entity has its own resource management, but there is still centralized account management.

Single Domain Model

A Windows NT domain model in which all users and groups reside in one domain, with a single PDC and one or more BDCs. This model does not use trust relationships because there is only a single domain. Typically used for centralized administration of accounts and resources.

NTFS (New Technology File System)

A Windows NT file system that provides secure and robust file access. File and folder names can be up to 255 characters (long file names). Permissions can be assigned to individual files and folders.

New Technology File System (NTFS)

A Windows NT file system that provides secure and robust file access. File and folder names can be up to 255 characters (long file names). Permissions can be assigned to individual files and folders. Windows 2000 updates NTFS with new features.

RAS (Remote Access Service)

A Windows NT service that you install on one of your network's servers to allow clients to access your network remotely. This service's software can manage up to 256 simultaneous remote connections.

Remote Access Service (RAS)

A Windows NT service that you install on one of your network's servers to allow clients to access your network remotely. This software can manage up to 256 simultaneous remote connections.

Remote Shell (RSH)

A Windows NT utility that lets you run commands on a UNIX host.

NT Hardware Qualifier (NTHQ)

A Windows NT utility which checks the hardware installed on an Intel x86 computer before you begin installing Windows NT. This helps you prevent problems during installation.

NTHQ (NT Hardware Qualifier)

A Windows NT utility which checks the hardware installed on an Intel x86 computer before you begin installing Windows NT. This helps you prevent problems during installation.

ClipBook Viewer

A Windows shared resource that uses OLE to store up to 127 pieces of information, each called a Page. Users can create and share these pages for use in OLE applications.

Server-Only Backup

A backup technique that backs up the data stored on the server. This requires fewer backup devices and storage media, but requires all users to store critical files on the server.

American National Standards

A body that provides computing standards. It is a voluntary organization comprised of corporate, government, and other members that coordinates standards-related activities, approves U.S. national standards, and develops positions for the United States in international standards organizations. ANSI helps develop international and U.S. standards relating to, among other things, communications and networking. ANSI is a member of the IEC and the ISO.

Demilitarized Zone (DMZ)

A buffer subnet, that should only contain servers that are to be accessed by external visitors. Often it is assumed that any server placed in this area will be compromised. Thus, no mission critical or sensitive systems are located here.

Guest

A built-in account that is used to give occasional users the ability to log on and access limited resources.

Domain Guests

A built-in global group in which the Guest user account is a member.

Domain Admins

A built-in global group that is added automatically to the Administrators local group, making all members of this Admins group domain administrators.

Administrators

A built-in group in Windows 2000. This group has full administrative capabilities.

Creator Owner

A built-in group that is used for network administration. It includes the user that created or took ownership of a resource.

Server Operators

A built-in local group on domain controllers only. These share disk resources and can back up and restore the server.

Microsoft Download Service (MSDN)

A bulletin board sponsored by Microsoft. Check this board for support information and downloadable code.

Crossover Cable

A cable connecting one hub with another hub or with a repeater in a network.

Bootstarp Router (BSR)

A capability that was added in PIM version 2 to automate and simplify the Auto-RP process. It is enabled by default in Cisco IOS releases supporting PIMv2.

Client

A computer that uses files and resources from another computer on a network. Also called a workstation.

Root Certificate

A certificate that is digitally signed by the authority that issued it. This occurs when the issuing authority is at the level of this term where is no higher authority to verify the certificate.

Root Authority

A certification authority that has no higher authority to vouch for it. This is at the top of a certification hierarchy.

Messaging Application Programming Interface (MAPI)

A client access specification that enables clients to communicate with a messaging system. It is implemented as a subsystem in the Windows operating system. Microsoft and many other vendors support this standard.

LCR (Local Continuous Replication)

A cluster implementation which maintains a copy of the production storage group on a second set of disks that are connected to the same server using built-in asynchronous log shipping and log replay technology.

Print Spooler

A collection of DLLs that receive, process, schedule, and distribute print jobs. Every print job goes through the print spooler.

Microsoft Exchange Recovery Storage Group

A collection of Exchange stores (databases).

Exchange Storage Group

A collection of Exchange stores (databases). A Recovery Storage Group (RSG) is a special storage group used for recovering Mailbox stores.

Database

A collection of information, tables, and other objects organized and presented to serve a specific purpose, such as facilitating searching, sorting, and recombining data.

Forest

A collection of one or more domains linked with two-way transitive trusts and sharing a common schema, configuration, and global catalog.

Relational Database

A collection of units of data stored in tables that represent a group of objects (for example, Empoyees, Products, or Customers). Columns in a table represent an attribute of the object (for example, an attribute of an Employee might be LastName, or an attribute of a Product might be shipping weight). Each row in a table represents a single instance of that kind of object (for example, the employee name Jane Smith or the part number 3Y557). Data from one table can be used to find related data in another.

Exchange PowerShell

A command line environment designed for automating administration and maintenance. The Exchange Management Shell is the primary management interface of 2007.

Microsoft Exchange Management Shell

A command line environment designed for automating administration and maintenance. The Exchange Management Shell is the primary management interface of 2007.

Shell

A command line interface that allows users to interact with the Linux Kernel.

$()

A command line operator that is used when implementing command substitution.

<<

A command line operator that is used when implementing here documents.

|

A command line operator that is used when implementing piping.

gpotool.exe

A command-line Windows 2000 Server Resource Kit tool that lets you check replication status of Group Policy Objects (GPOs) on a computer.

repadmin.exe

A command-line Windows 2000 support tool that lets you perform replication-related tasks.

Data Encryption Standard (DES)

A common symmetric cryptography method. It was created in 1972 and re-certified in 1993. It has a limitation of 56-bit keys and offers little encryption security since it can be easily broken.

DES (Data Encryption Standard)

A common symmetric cryptography method. It was created in 1972 and re-certified in 1993. This standard has a limitation of 56-bit keys and offers little encryption security since it can be easily broken.

Wayland System

A communication protocol that specifies the communication between a display server and its clients, as well as a C library implementation of that protocol.

Multiplexer

A communications device that combines signals for transmission over a single transmission medium. It is sometimes called a mux.

Microsoft Technet

A compact disc from Microsoft that contains information to help you administer and troubleshoot networks.

ISP (Internet service provider)

A company that provides Internet access and other web related services.

OEM (Original Equipment Manufacturer)

A company that uses parts of other company's products to create its own products.

Windows Internet Naming Service (WINS)

A component of Microsoft Windows NT Server that resolves NetBIOS names into IP addresses for computers and resources on the network using a dynamically-updated database.

Print Monitor

A component of the print spooler that controls access to and monitors the status of a specific print device.

Print Router

A component of the print spooler that receives print jobs from the remote print provider and routes them to the appropriate print processor.

Print Processor

A component of the print spooler that works in conjunction with a print driver to despool the spooled print jobs. Despooling is the process of reading the contents from a spool file and converting the print data into a format the print device can understand.

VMM (Virtual Memory Manager)

A component of the virtual memory architecture in Windows NT. It intercepts data storage requests from an application, figures out how much space is needed for the data, then gives the data an unused memory address in either virtual or physical memory. With this mechanism, an application does not have to keep track of how the physical memory is organized.

Multiple Universal Naming Convention Provider (MUP)

A component that allows a remote computer to accept paths and filenames written in UNC format. It keeps the UNC list so that the client computer does not have to rewrite the UNC names for each redirector on the network.

Multiple Provider Router (MPR)

A component that allows computers to use file and print resources on the network by routing requests to the correct redirector or provider.

Hot Swap

A component that can be removed and replaced while the system is still running.

Hot Spare

A component that is connected to a system. It can take over automatically when another component fails.

Cold Spare

A component that sits on the shelf until there is a failure.

Proxy Server

A computer on the network that keeps a cache of resolved names and responds to queries for names outside the local subnet.

Daemon

A computer program that runs as a background process. It may run in response to events or be set to run a specific time.

Server

A computer that runs a server program (or the server program itself) providing services to users and other computer programs on a network.

Centralized Computing

A configuration in which all the data and applications are stored and executed on a mainframe computer. The terminals act only to accept keystrokes on the keyboard and display data from the mainframe computer.

Page

A contiguous, fixed-length block of virtual addresses. It is copied from memory to disk and back during paging operations. Windows 2000 uses 4 KB blocks to map physical and virtual memory addresses. SQL Server allocates database space in 8K pages.

Replica

A copy of the data in a directory partition or shared folder.

Attribute Version Number

A counter that identifies how many times the value for an Active Directory attribute has changed.

Password

A credential used to verify a user's request to log on to the network. It is associated with a user account name and both are used during the authentication process.

Bridge

A data forwarding device that provides data transfer at the data link layer in the OSI model. Currently this technique is not used as much in networks because routers have assumed the responsibility for routing data at the network layer of the OSI model.

Variable

A data object that has a name and one or more assigned values.

Mirroring

A data protection method. Essentially, it is to duplicate and store it in a separate location.

inode

A data structure identified with a number that stores meta information about a file or a directory.

Scenegraph

A data structure representing a graphical scene. When using the Wayland system, the Wayland compositor keeps track of what's on the screens in this structure.

Uniqueness Database File (UDF)

A database containing supplementary information for a Windows 2000 answer file. For example, a single one of these may contain the unique IDs, user data, and other information that varies for each installation.

UDF (Uniqueness Database File)

A database containing supplementary information for a Windows 2000 answer file. For example, one of these may contain the unique IDs, user data, and other information that varies for each installation.

Management Information Base (MIB)

A database containing the data gathered by SNMP agents which monitor network traffic and components.

SAM (Security Accounts Manager)

A database hive in the Registry that includes the directory database for a Windows NT computer.

Gateway

A generic term used to describe any device that connects one administratively managed network with another.

Print Forms

A description of and location for a specific size of paper in a particular tray in the print device.

Home Directory

A designated folder that is accessible to the user and can contain his or her files and programs. It is assigned in Active Directory Users and Computers or Local Users and Groups and can be assigned to one user or shared by many.

Windows NT Workstation

A desktop operating system that can function alone or also be part of a network in a workgroup or Windows NT Server domain environment.

/dev/null

A device file that is associated with a null device that is commonly used for disposing unwanted output streams.

/dev/tty

A device file that is associated with the computer's controlling terminal or the shell's window.

Node

A device that acts as a connection point within a network. These can be used for redistributing or forwarding data or providing services to other devices or programs. In a network context , it is often used intercgangeably with host.

Modem

A device that modulates and demodulates signals being sent and received across transmission media (telephone wire). For example, computer data is in digital form, which must be converted to analog. To receive data, this device then reconverts the signal back to digital form.

Repeater

A device that reamplifies packets sent on a network. This device provides additional distance on a network by reamplifying packets and sending them on.

Time-Domain Reflectometer (TDR)

A device you can use to examine the breaks and shorts in a network and identify their locations within a few feet. These work by sending a sonar-like pulse down the cable. The pulse looks for shorts or breaks in the cable and reports their location.

/etc/profile.d/

A directory that contains global login scripts that can contain alias commands to perform persistent aliases.

Dynamic Disk

A disk device managed by Windows 2000 Disk Management. Dynamic disks do not contain partitions or logical drives. They can contain only dynamic volumes created with Disk Management. They cannot be accessed by earlier version of Windows or by MS-DOS.

Group Policy Creator Owners Group

A domain global group that lets members create Group Policy Objects (GPOs) within the domain.

Active Desktop

A feature of Microsoft Internet Explorer that lets you display content from Web pages on the computer desktop, using Dynamic HTML, Webcasting, and active channels.

Virtual Directory

A feature of Microsoft Internet Information Server that lets you include information from other folders (besides the designated home directory) in your Web, FTP, and other sites without physically copying the material.

Command Substitution

A feature of the bash shell that substitutes the output of one shell command as the arguments to another shell command.

Windows NT Server

A file and application server product from Microsoft that allows applications and files to be stored on it. The latest release of this application is version is 4.0.

Archive Bit

A file attribute that indicates whether a file was backed up since it was modified.

Audit Log

A file containing information about events you have chosen to monitor, such as logging on and logging off, accessing files and objects, and system shutdowns.

Distributed File System (DFS)

A file management system that lets users and administrators create a virtual file structure such that a folder or hierarchy of folders appear to contain a collection of files that are, if fact, located on multiple computers or drives connected at various physical locations on the network. A Dfs directory tree helps users to browse through, search for, and access data on the network.

NFS (Network File System)

A file system that allows the storage and retrieval of data over the network. You can boot Linux from this system to reduce administrative overhead. It requires a PXE environment.

.CHK File

A file that is used to identify which log files have been committed to the database. The size of this file varies from 2-3 KB.

ISOC (Internet Society)

A global organization created in 1992. Responsible for the internetworking technologies and applications of the Internet. It is also responsible for the further development of the standards and protocols that allow the Internet to function.

Exchange 2007 Management Console

A graphic interface used to manage an Exchange environment. It has been simplified from previous versions of Exchange so it now focuses only on the most commonly executed tasks. Additional tasks that could traditionally only be performed in REGEDIT or ADSIEDIT were also added here.

ADSI Edit

A graphical Windows 2000 support tool that lets you view, edit, and create objects and attributes in the Active Directory database.

Microsoft Exchange Management Console

A graphical administration tool. It is comprised of a three-paned view that includes a tree view, results, and an actions pane. It cannot perform many of the administrative tasks that can be performed in the Exchange Management Shell.

Tape Catalog

A graphical representation of the contents of a backup tape. Windows 2000 automatically creates catalogs during backup and stores them on the tape. This shows all the backup sets on a tape.

World Wide Web

A graphically-based and user-friendly part of the Internet. You need a software application called an Internet browser (to view the information on this vehicle. It uses the Hypertext Transfer Protocol (HTTP) to connect a system of graphical pages, called Web sites, formatted using Hypertext Markup Language (HTML).

LAN (Local area network)

A group of closely located computers or peripherals connected so that they can interact with each other as a network.

Access Token

A grouping of information used to control a user's access to network resources. After the logon process, the access token is used to control access to all secured objects. An access token includes the user's SID (security ID), ID of users' group memberships, and rights assigned to the user. The access token is generated during the logon process and is not updated while the user is logged on.

Low-level disk formatting

A hard disk formatting process, usually performed by the disk manufacturer, that defines the basic physical structure of the disk. It runs a surface analysis to test the disk heads, defines sectors and assigns sector IDs, temporarily fills each sector, identifies bad sectors on the drive, and defines the interleave ratio.

Connectionless Communication

A linkage that assume an existing link between devices and allow transmission without extensive session establishment. This communication use no error checking, session establishment, or acknowledgements. Connectionless protocols allow quick, efficient communication at the risk of data errors and packet loss. Connectionless protocols are a good choice where speed is important and smaller chunks of data are being sent.

Connection-Oriented Communication

A linkage that does not assume that there is an existing link between devices. This communications use error detection/correction, session establishment, or acknowledgements, and, if necessary, retransmission. This communication provides a more reliable communication when are delivery is more important than speed and is a good method to use when larger chunks of data are being sent.

whatis

A linux utility that displays a one-line man page description contained in the whatis database for a given command.

Hardware Compatibility List (HCL)

A list of hardware devices that have been tested by Microsoft and are known to be compatible with Windows 2000.

ACL (Access Control List)

A list that contains information on allowed and denied access to folders and files.

Acces Control List (ACL)

A list that contains information on allowed and denied access to folders and files.

NetBIOS Name Cache

A local cache containing the NetBIOS names that the local computer has recently resolved. Having the IP address in cache eliminates the need for extraneous broadcasts on the network.

Replicator

A local group used by the Directory Replicator service. This group is not used for administration.

Local Repository

A local storage location that contains software packages for a Linux distribution.

HOSTS File

A local text file in the same format as the 4.3 Berkeley Software Distribution (BSD) UNIX\etc\host file that maps host names to IP addresses. This file is used to resolve host names for TCP/IP utilities.

Circular Logging

A logging method in which older logs are overwritten with new logging information.

Tunnel

A logical connection that carries encapsulated and possibly encrypted data. Encapsulation and encryption make the this a secure and private link for users across a public network such as the internet.

High-Level Formatting

A logical formatting process that prepares the disk to be used by a specific file system. It scans the disk and marks bad sectors, creates the partition boot sector, modifies the partition table on the hard disk, creates the File Allocation Table for FAT volumes, and creates the Master File Table for NTFS volumes.

Domain

A logical grouping of computers and users. In this construct, all users have access to a central directory database that stores security and user account information for the domain.

Foreign Connector

A logical object that controls the sending of messages to non-SMTP mail systems or to fax systems.

Cascading Physical Star

A logical ring topology created with the FDDI standard. In this topology, single-attachment hubs connect single-attachment stations to a network.

Reverse lookup

A lookup capability provided by DNS that allows a resolver to provide an IP address and request a matching host name. Some applications provide the ability to implement security based on connecting host names.

DirectX APIs

A low-level API that provides fast response to user input. Microsoft designed DirectX specifically to run graphically-intensive computer games. DirectX components are Microsoft DirectDraw, Microsoft DirectPlay, and Microsoft DirectSound.

Hard Disk

A magnetic storage device used to store computer data. Workstation computers and servers employ these.

POP3 (Post Office Protocol Version 3)

A mail-drop protocol designed to work with clients that are not always connected to the network. It allows a mail server to receive mail messages and store them on a server until the client comes back on line and requests them.

Post Office Protocol Version 3 (POP3)

A mail-drop protocol designed to work with clients that are not always connected to the network. It allows a mail server to receive mail messages and store them on a server until the client comes back on line and requests them.

Checkpoint

A marked point in a SQL transaction log. It represents a point at which completed transactions and modified database pages were written to disk.

Millions of Instructions Per Second (MIPS)

A measure of performance. Many computer companies use this measurement to measure the cost of computing. This term is also the name of a company that makes RISC processors.

GUI

A mechanism in Linux that allows a user to performfunctions using a mouse and keyboard (similar to the Windows and Mac interfaces) asopposed to performing all functions from a Linux shell.

Multicast Source Discovery Protocol (MSDP)

A mechanism that connects multiple PIM-SM domains; allowing the discovery of multicast sources in other domains.

Neighbor Discovery/Recovery

A mechanism that enables routers to dynamically learn about the other routers on their directly attached networks. Neighbor discovery/recovery:

Account Lockout

A mechanism to lock out accounts after multiple failed logon attempts. This reduces the chance of an unauthorized person gaining access to the network.

SMTP Service Domains

A method of organizing e-mail messages. The default domain and local domains include e-mail addresses hosted on the local Microsoft Internet Information Server computer. Remote domains include e-mail addresses hosted on other SMTP computers.

Partial Mesh

A mesh topology exists when there are multiple paths between any two nodes on a network. Mesh topologies are created using point-to-point connections. In this type of topology, some redundant paths exist.

Full Mesh

A mesh topology exists when there are multiple paths between any two nodes on a network. Mesh topologies are created using point-to-point connections. This particular mesh topology connects every node in a point-to-point connection with every other node. Full mesh topologies are usually impractical because the number of connections increases dramatically with every new node added to the network. However, a full mesh topology becomes more practical through the implementation of an ad-hoc wireless network.

DHCP Discover

A message that makes a request for an IP lease. The message contains the client's hardware address and computer name, so that DHCP servers know which client sent the request.

Shared-File Messaging System

A messaging system based on a server/client relationship in which the client takes the active role in delivering and processing messages. The server is simply a repository of shared files. Microsoft Mail 3.x and Lotus cc:Mail are shared-file messaging systems.

RAID (Redundant Array of Inexpensive Disks)

A method of categorizing the use of multiple disks to provide performance enhancement and/or fault tolerance.

Redundant Array of Inexpensive Disks (RAID)

A method of categorizing the use of multiple disks to provide performance enhancement and/or fault tolerance.

Volume Set

A method of combining areas on different hard drives into a single volume. Data fills each part of the volume before filling the next.

Distributed Component Object Model (DCOM)

A method of configuring a client/server application so that several computers can use it at the same time. It uses remote procedure calls (RPCs) to allow applications to interoperate and communicate with each other.

DCOM (Distributed Component Object Model)

A method of configuring a client/server application so that several computers can use it at the same time. This convention uses remote procedure calls (RPCs) to allow applications to interoperate and communicate with each other.

Distributed Parity

A method of data protection used in a RAID 5 configuration. Duplicate data (parity) is placed on multiple disks (distributed) to protect against data loss in the event of a storage disk failure.

Digital Envelope

A method of hiding the content of a message from anyone but the recipient. The sender uses the recipient's public key to encrypt the contents of the message. The recipient uses her own private key to decrypt and read the message.

Unattended Installation

A method of installing Windows 2000 using an answer file that automates the installation so you do not have to be physically present at the computer during the installation.

Write-Ahead Log

A method of logging transactions. Using this method, the log is always written to disk before the data.

Stripe Sets

A method of saving data by writing it in stripes across several different hard disks at once.

Digital Signature

A method of verifying the sender of a message, but does not encrypt the message itself. The sender uses his own private key to encrypt handshake which is attached to a message. The recipient uses the sender's public key to decrypt the handshake and verify the sender's identity.

Dual Stack

A method used to allow concurrent support for both IPv4 and IPv6 within the same network.

Offline Defragmentation

A method you perform manually using NTDSUTIL when the computer is not connected to the network. It rearranges the data in the Active Directory database, compresses the file, and creates a compact, new file.

User Mode

A mode in which applications run. This mode confines each application to its own address space and does not allow any application to access the computer's hardware directly.

Loopback Processing Mode

A mode of processing Active Directory-based Group Policy Objects (GPOs) in which computer-specific settings replace or take precedence over user-specific settings.

Boot Target

A mode that a system can boot into.

BGP Address Family Identifier (AFI)

A model that was introduced with multiprotocol BGP. It is designed to be scalable and modular, and to support multiple AFI and Subsequent Address Family Identifier (SAFI) configurations.

MADCAP (multicast addressing server)

A multicast addressing server, which provides multicast address allocation.

Multicast addressing server (MADCAP)

A multicast addressing server, which provides multicast address allocation.

Long file name

A name for a file or folder that includes more characters than the standard MS-DOS 8.3 filename convention.

Time to Live (TTL)

A name server caches all of the information that it receives during a process known as iterative queries. The amount of time that the data is stored in cache is referred to as Time to Live.

Name Service (NS) Record

A name service record that is placed in a DNS server.

Local Routing Table

A neighbor table contains a list of neighbors with which it has a BGP connection.

Hub

A network device that ties multiple workstations (or other devices) together for communication on a network. It can come with 5 ports or more and is basically a repeater of data. Also called a multi-port repeater.

Peer-to-Peer Network

A network in which every computer on the network is equal in providing and requesting resources. These networks have no central administration and only share-level security.

ISCSI

A network protocol that encapsulates storage device communication data into IP packets for transmission over an Ethernet connection allowing IP-connected hosts to access a Storage Area Network (SAN).

IIS (Internet Information Server)

A network server that allows you to send HTML documents using HTTP. IIS installs with Windows 2000 Server. Peer Web Services (PWS) installs with Windows 2000 Professional.

Software Distribution Point

A network share that stores software installation programs and/or data and from which software can be installed.

Heterogenous

A network that consists of many foreign TCP/IP-based hosts is known as this kind of a environment. TCP/IP provides the protocol to connect many foreign computer systems, because each system uses the same protocol.

NBMA (NonBroadcast MultiAccess)

A network that interconnects multiple routers but does not have broadcast capabilities (examples are Frame Relay, X.25, and ATM).

NonBroadcast MultiAccess (NBMA)

A network that interconnects multiple routers but does not have broadcast capabilities (examples are Frame Relay, X.25, and ATM).

Token Ring

A network topology in which computers are connected in a closed ring. Tokens passed from one computer to another allow each computer to use the network.

Bus

A network topology that consists of a trunk cable with nodes either inserted directly into the trunk, or nodes tapping into the trunk using offshoot cables called drop cables.

Mesh

A network topology that exists when there are multiple paths between any two nodes on a network.

WAN (Wide Area Network)

A network whose computers and servers are geographically far apart but still connected.

802.1x

A networking protocol that defines how to support EAP (Extensible Authentication Protocol) over a wired or wireless LAN.

DLC (Data Link Control)

A non-routable protocol. Windows NT computers use it to connect to IBM mainframes via 3270 terminal emulators and to connect to IBM AS/400 computers via 5250 emulators. Microsoft SNA Server for Windows NT uses it to communicate with mainframes on a token ring network. It is also used with some HP print devices that are attached to the network through a built-in adapter card.

Data Link Control (DLC)

A non-routable protocol. Windows NT computers use this mechanism to connect to IBM mainframes via 3270 terminal emulators and to connect to IBM AS/400 computers via 5250 emulators. Microsoft SNA Server for Windows NT uses device to communicate with mainframes on a token ring network.

Separator Page File

A page you can print between each print job sent to a printer. Also called a banner.

NetBIOS scope

A parameter that is configured on the remote host. The scope ID must match the scope ID on your Microsoft clients or they will not be able to communicate with NetBIOS.

Cache Manager

A part of the I/O Manager that improves a computer's performance by temporarily storing files in memory instead of reading and writing them to the hard disk. It uses virtual address space to cache data.

Key

A part of the Registry. These appear as folders in the Registry window and can contain subkeys and values.

NTFS partition

A partition formatted with the NTFS file system.

Volume

A partition or several partitions you have formatted to use a file system such as FAT or NTFS.

P-node

A peer to peer protocol that uses NetBIOS over TCP/IP. The P-node uses a NetBIOS name server (NBNS) such as WINS to resolve NetBIOS names and does not use broadcasts. It will query the name server directly. All computers using this must be configured with the IP address of the NBNS. Computers can communicate as long as the NBNS is working.

Workgroup

A peer-to-peer network where each Windows 2000 workstation is a member of a logical grouping of computers. The model that this network falls under, has no central user account database or computer that validates a logon. Each Windows 2000 workstation in a network like this must contain accounts for every person who needs to gain access to resources on that workstation. These are convenient for very small networks, but because there is no central database for maintaining accounts, administration is difficult.

RFC Editor

A person who has the responsibility to review an RFC submitted for publication and assign a classification to the document. See RFC for information on classifications and maturity levels for RFCs.

Basic Disk

A physical disk containing primary partitions, extended partitions, or logical drives. Using Windows NT 4.0 or earlier, you can create RAID-5 volumes for basic disks; they can also be spanned, mirrored, or part of a stripe set. MS-DOS can access basic disks. Compare dynamic disk.

Subnet

A physical segment in a TCP/IP environment that uses IP addresses created from a single network ID. The subnet is created by partitioning the bits in the host ID into two parts. The first part is used to identify the segment as a unique network, and the other part is used to identify the hosts. Companies typically used subnetting because they exceeded the maximum number of hosts per segment with their IP address.

Zone

A portion of the DNS namespace made up of a single domain or of a domain and subdomains that are administered as a single, separate entity. A particular name server is responsible for each of these. The name server stores all address mappings for the domain name space with this term. It also answers client queries for those names.

Shared Printer

A printer that is connected to the network so many users can access it.

Kernel mode

A privileged operating mode for the operating system files and processes that interact directly with the computer's hardware.

Replication

A process by which a collection data is copied to one or more computers in order to create synchronized sets of data. Changes to Active Directory, for example, are regularly replicated to all domain controllers in a forest.

MTS (Microsoft Transaction Server)

A processing system for creating and distributing Web applications using Active Server Pages. It tracks unique transactions, and ensures that each component of a process must be completed in order for the transaction to succeed.

Microsoft Transaction Server (MTS)

A processing system for creating and distributing Web applications using Active Server Pages. It tracks unique transactions, and ensures that each component of a process must be completed in order for the transaction to succeed.

NetBIOS (Network Basic Input/Output System)

A program that allows computers to share resources on a network. Each computer has a unique name that provides applications with a common set of commands for requesting the lower-level network services that are necessary to transmit information between network resources.

Network Basic Input/Output System (NetBIOS)

A program that allows computers to share resources on a network. Each computer has a unique name that provides applications with a common set of commands for requesting the lower-level network services that are necessary to transmit information between network resources.

Spider

A program that explores links inside and outside a Web site. Also called a robot.

Robot

A program that explores links inside and outside a Web site. Also called a spider.

Windows NT Diagnostics

A program that provides a graphical interface to view computer hardware and operating system information. It is used to gather information to help troubleshoot hardware and memory problems.

Page Description Languages (PDL)

A program that tells a printer how printed output should appear on a page. PostScript and TrueType are two different types of these.

UEFI (Unified Extensible Firmware Interface)

A program used to start a computer system.

Java

A programming language designed to let programmers create applications for the Internet. The applications generated from this language do not depend on a particular operating system or hardware platform to run.

PostScript

A programming language developed by Adobe that determines how a page will look when you print it.

ADMD (Administration Management Domain)

A public operating agency that controls an X.400 management domain. These domains are the backbone for transferring electronic messages.

NetBIOS Extended User Interface (NetBEUI)

A protocol supported by all Microsoft products. It has a small stack size, excellent data transfer rates, and is compatible with all Microsoft networks. It cannot be routed, and it is not compatible with non-Microsoft networks.

Point-to-Point Tunneling Protocol (PPTP)

A protocol that allows a remote user to connect to the network over the Internet so that a company does not have to lease dedicated lines.

DHCP (Dynamic Host Configuration Protocol)

A protocol that dynamically assigns IP addresses to each computer on a network.

Telnet

A protocol that emulates a terminal so you can log on to a remote computer. Also called Virtual Terminal Protocol.

Gopher

A protocol that makes it easier to browse resources on the Internet by displaying Internet resources in a menu structure.

ARP (Address Resolution Protocol)

A protocol that maps an IP address to the Media Access Control (MAC) address of a computer on a network.

Address Resolution Protocol (ARP)

A protocol that maps an IP address to the Media Access Control (MAC) address of a computer on a network.

NNTP (Network News Transfer Protocol)

A protocol that provides access to Internet newsgroups. It allows a client to read messages sent to newsgroups and makes it possible for hosts to replicate articles back and forth.

Routing Information Protocol over IPX (RIPX)

A protocol that routers use to exchange information between other routers on an IPX network and that hosts use to decide on the best route when forwarding remote IPX traffic.

Distance Vector Multicast Routing Protocol (DVMRP)

A protocol that shares information between routers to transport IP Multicast packets among networks.

H-Node

A protocol used to support NetBIOS over TCP/IP. It is a combination of the p-node and b-node. The default function of an h-node is a P-node. If it cannot resolve a name through the NetBIOS name server, it uses a broadcast to resolve the name.

Virtual File Systems

A psuedo file system that is dynamically created as it is accessed.

SQL (Structured Query Language)

A query and programming language for databases, widely used with relational database systems. This language translates what the user sees on the display to commands that the server can understand. IBM originally developed this language as an English-like query language for entering, editing, and retrieving data in mainframes. There is now an ANSI-standard definition.

Multicast Scope

A range of multicast group IP addresses available to be leased to multicast clients by DHCP. Addresses are in the Class D address range -- 224.0.0.0 to 239.255.255.255 -- are reserved for use in IP multicasting.

NS (Name Service) record

A record that is placed in a DNS server.

Hardware Profile

A registry entry that lists the physical devices and services on your computer that Windows 2000 should enable on startup. These files can be created for computers that alternate between two or more hardware configurations.

Nonbackbone Area

A regular area does not allow traffic to pass through it. The regular area's primary function is to connect users and resources.

Partial Replica

A replica that contains only selected attributes of objects on which a searches are likely to be performed. These are read-only.

Multi-Master Replication Model

A replication model in which updates can be made to any of several domain controllers (masters). The master that receives the update then replicates its updates to other domain controllers. Windows 2000 uses this replication model.

Single-Master Replication Model

A replication model in which updates can only be made to one domain controller (master). The master then replicates its updates to other domain controllers. Windows NT 4.0 used this replication model.

Target Replication Partner

A replication partner that receives updates from a source replication partner. Also called a destination replication partner.

Nonauthoritative restore

A restoration method which uses the Backup utility to return the Active Directory database to the state it was in before the back up. Windows 2000 automatically performs a consistency check on and re-indexes the Active Directory database. It then updates Active Directory and File Replication service (FRS) with data from the server's replication partners.

CAS (Client Access Server)

A role is required in every Exchange 2007 organization because it supports the client applications Outlook Web Access and Exchange ActiveSync and also the Post Office Protocol version 3 (POP3), and Internet Message Access Protocol version 4rev1 (IMAP4) protocols.

Designated Router (DR)

A router in a PIM-Sparse Mode tree that initiates the Join/Prune message cascade upstream in response to the IGMP membership information that is received from IGMP hosts.

ASBR (Autonomous System Boundary Router)

A router that has an interface to an external autonomous system (e.g. RIP or EIGRP).

Autonomous System Boundary Router (ASBR)

A router that has an interface to an external autonomous system (e.g. RIP or EIGRP).

Static Mapping

A router that is configured to communicate only with networks to which it has a configured interface. To route IP packets to other networks, each static router must be configured with either an entry in each router's routing for each network in the internetwork or a default gateway address of another router's local interface.

Backbone Router

A router that is located in the perimeter of the backbone area. These routers: Maintain OSPF routing information using the same procedures and algorithms as internal routers. Have at least one interface that is connected to area 0.

OSPF (Open Shortest Path First)

A routing protocol like RIP. This routing protocol periodically exchanges routes to known networks among dynamic routers. If a route changes, other routers are automatically informed of the change. Dynamic routing requires a protocol such as Open Shortest Path First.

Open Shortest Path First (OSPF)

A routing protocol like RIP. This routing protocol periodically exchanges routes to known networks among dynamic routers. If a route changes, other routers are automatically informed of the change. Dynamic routing requires a protocol such as this one.

IGP (Interior Gateway Protocol)

A routing protocol that exchanges information within an autonomous system and can be controlled by the system in which they operate.

Vector-Based Routing Protocol

A routing protocol that uses a vector of nearest routers to create a routing table.

BGP Synchronization Rule

A rule which states that a BGP router cannot use or advertise a route that it has learned from internal BGP (iBGP) to an external neighbor unless it has also been established through an internal gateway protocol, such as RIP or OSPF.

/etc/profile

A script file that runs when all users log in and that can contain alias commands to form persistent aliases.

Answer File

A script file that you use to automate Windows installations by supplying answers to questions that you would normally have to answer yourself. You can modify the sample Unattend.txt file or use Setup Manager to create a new one of these.

Shutdown script

A script that executes when a computer shuts down.

Startup Script

A script that executes when a computer starts up.

Logoff script

A script that executes when a user logs off.

Logon Script

A script that executes when a user logs on.

WSH (Windows Scripting Host)

A scripting host that lets you run scripts, batch files, and command files from the command prompt or the Windows desktop.

Windows Scripting Host (WSH)

A scripting host that lets you run scripts, batch files, and command files from the command prompt or the Windows desktop.

HTML (Hypertext Markup Language)

A series of rules for formatting documents that you can transfer between platforms. It is the language used to format ASCII text files as pages for the World Wide Web.

Microcom Network Protocol (MNP)

A series of standards for early modems that described error detection techniques. The standards were called MNP Class 2, Class 3, and Class 4. This standard became popular with several modem manufacturers

Backup Domain Controller (BDC)

A server containing a replicated copy of the domain database.

Microsoft Certificate Server

A server for issuing and administering in-house digital certificates that let you authenticate the identity of visitors to your Web sites. It also lets you enable SSL encryption.

UNIX LPD Print Server

A server running the line printer daemon (LPD) service, which allows you to print documents from a remote computer.

Certification Authority Server

A server that creates new encryption keys for clients and publishes public keys for users.

DNS (Domain Name Server)

A server that maintains a database of IP address/computer name mappings. This server has the responsibility to resolve fully qualified domain names and other host names to IP addresses. In DNS, the clients are called resolvers and the servers are called name servers.

High-Water Mark

A server's highest local USN value for which another server has received updates. For example, if Server2 has received updates from Server1 up to Server1's local USN value 4653, then 4653 is Server2's high-water mark for Server1.

Up-to-Date Vector

A server's highest originating USN received from a particular originating domain controller. For example, if Server1 has received originating updates from Server6 corresponding to Server6's local USN value 4653, then Server1's uses this term for Server6 is Server6-4653.

Client Service for Netware (CSNW)

A service included with Windows 2000 that allows a Windows workstation to use file and print resources residing on NetWare servers.

Line Printer Daemon (LPD)

A service residing on a UNIX print server that receives print jobs from clients using the LPR utility.

Character Set

A set of 256 letters, digits, and symbols specific to a country or language. When selected during SQL installation, it specifies the characters SQL Server will recognize in the various data types. The first 128 values are called printable characters, and the last 128 values are called extended characters.

EAP (Extensible Authentication Protocol)

A set of interface standards that provide various authentication methods (smartcards, biometrics, and digital certificates), define access definitions, providing protection mechanisms and custom solutions, and does not maintain a database of user accounts and passwords.

ActiveX

A set of programming tools based on the Component Object Model (COM), which provides the low-level services that allow programming objects to communicate with each other. ActiveX is used for Internet applications that need to be optimized for speed and size.

System Policy

A set of registry settings that controls what users can see and do on their Windows NT computers. These are used to control and manage desktop computers. You can use these to provide all users or computers with a uniform system policy, or customize settings for specific users, groups, and computers. Windows 2000 computers use Group Policy instead.

AS (Autonomous System)

A set of routers under a common administration and with common routing policies.

MAPI (Messaging Application Programming Interface)

A set of standard commands developed by Microsoft. Messaging services use these commands to communicate with other MAPI-compliant applications.

Frame Type

A setting that controls how a network adapter card formats the data you want to send over the network. Ethernet network can operate using various frame types. Ethernet frames are between 64 and 1518 bytes in length. For two computers to communicate, they must use the same frame type. These are the four Ethernet frame types: Ethernet 802.3, Ethernet 802.2, Ethernet II, and Ethernet SNAP.

Dynamic Library

A shared library that is not directly integrated into the code of a software application.

Static Library

A shared library usually installed with an application, that is integrated into the code of a software application.

xargs

A shell command that can be used to split large text streams into 128 KB chunks and to execute shell commands using these chunks as arguments.

more

A shell command that displays the contents of a file one page at a time.

cat

A shell command that displays the contents of a file.

echo

A shell command that displays the contents of a variable.

file

A shell command that displays the file's type.

head

A shell command that displays the first few lines of a file.

tail

A shell command that displays the last few lines of a file.

lsattr

A shell command that list the attributes of a file.

shred

A shell command that overwrites files so that they are difficult for a third party to remove.

Non-Login Shell

A shell that is opened without requiring the user to authenticate with a user ID and password.

Alias

A shortcut stored in memory that runs a command on your Linux system.

Simple Network Management Protocol (SNMP)

A simple protocol for managing TCP/IP networks. It is used to report the status of a host on a Windows TCP/IP network. Network equipment vendors developed SNMP to let management software monitor network components. Using this, programs called agents are loaded on to each network component. The agents monitor network traffic and other network components and compile the information in a management information base (MIB). Windows 2000 uses this to check the status of another computer on a TCP/IP network.

Clustering

A situation in which groups of independent computers work together as a single system.

Applet

A small application built into another application or an operating system. The programs in the Windows Control Panel are examples. Also called programs in Microsoft documentation.

Baseline

A snapshot of the performance statistics of your server that is used as a logical basis for future comparison. When put to use these enable you to effectively monitor the performance of your system to determine when changes negatively impact performance or when systems need upgrading or replacing.

E-Mail Client

A software application that supports specific protocols and provides the user with an interface to a server.

Browser

A software application you use to display pages from the World Wide Web.

File and Print Services for NetWare (FPNW)

A software component that allows NetWare clients to access file and print services on a Windows 2000 server.

Common Gateway Interface (CGI)

A software program that allows Web servers to send data to an application and receive information back from the application, regardless of the operating system the application is running under.

Application

A software program that performs a specific function for the user or another program.

Shell Configuration File

A special file containing a script that is run during a shell startup.

Print Operators

A special group of users that have been given the necessary rights to manage a printer or printers.

Everyone

A special group or identity that includes all users and can be used to assign permissions that all users in a domain hold in common, including guests and users from other domains.

Pointer (PTR) Record

A special resource record that is added to DNS to associate the IP addresses and the corresponding host name. Part of the administration of a DNS name server is ensuring that these records are created for hosts.

Directory Services Restore Mode

A special safe mode you use to restore the system state data on a domain controller.

NT Virtual DOS Machine (NTVDM)

A specialized environment that allows MS-DOS and Win16 applications to run under Windows NT.

NTVDM (NT Virtual DOS Machine)

A specialized environment that allows MS-DOS and Win16 applications to run under Windows NT.

Reservation

A specific IP address permanently set aside for use by a specific DHCP client. Addresses are reserved in the DHCP database by using DHCP Manager. Each reserved address is associated with a unique client device identifier.

Daily Copy Backup

A specific backup type that copies only files and folders that have changed during that day. It does not mark their archive attributes.

Drive Mapping

A specific letter used to map a drive or volume on a workstation or server.

Copy Backup

A specific type of backup that backs up selected files and folders but does not mark their archive attributes.

Distributed Management Interface (DMI)

A standard for organizing information about desktop, notebook, and server computers. DMI is part of the System Management BIOS (SMBIOS) specification which allows data about a system to be stored in the individual system's BIOS. Management software interfaces with the BIOS on a monitored system to gather this information and assemble it into an administrator-specified format such as a report or a database.

DMI (Distributed Management Interface)

A standard for organizing information about desktop, notebook, and server computers. This standard is part of the System Management BIOS (SMBIOS) specification which allows data about a system to be stored in the individual system's BIOS. Management software interfaces with the BIOS on a monitored system to gather this information and assemble it into an administrator-specified format such as a report or a database.

POSIX

A standard for versions of UNIX and UNIX-like operating systems. This allows developers to create applications that meet certain US Federal standards.

Built-In Account

An account already created by Windows. The Guest account and the Administrator account are built-in examples.

FDDI (Fiber Distributed Data Interface)

A standard produced by the American National Standards Committee for transmitting data on fiber optic lines. It is based on token ring topology and can support a large network over large geographic areas.

stderr

A standard stream that accepts normal error information to be streamed to the console screen or shell window.

ANSI (American National Standards Institute)

A standards body that provides computing standards. It is a voluntary organization comprised of corporate, government, and other members that coordinates standards-related activities, approves U.S. national standards, and develops positions for the United States in international standards organizations. This agency helps develop international and U.S. standards relating to, among other things, communications and networking. This body is a member of the IEC and the ISO.

Persistent Route

A static route entry or entry in a router that is stored in the registry. Static routes are stored in memory unless you specify through the BP parameter that the route is persistent. When you restart a Windows 2000 computer, you will need to re-create all non-persistent routes.

Floating Static Route

A static route whose administrative distance has been manually configured to be greater than the administrative distance of dynamic routes; thus making it less desirable than the dynamic route it supports.

Configuration Container

A storage area that is used to store information about the configuration of the Active Directory environment in Exchange 2007, such as site configuration and areas of optimal connectivity. When AD is employed over a WAN, a site for each end of the WAN link is defined along with the site link that represents the WAN connection. Exchange 2007 uses this site information to route messages within the environment. This container also contains additional Exchange configuration such as the definition of the connectors within the environment, the accepted domains, and which servers hold which roles.

Default Subnet Mask

A subnet mask that is used on TCP/IP networks that are not divided into subnets. All TCP/IP hosts require a subnet mask even if the network is a single segment.

FHS

A subset of the Linux Standards Base (LSB) that defines a consistent file system for Linux systems by defining a standard set of directories, subdirectories and files.

Network

A system group that is not used for network administration. It includes any user who is currently connected from another computer on the network to a shared resource on your computer.

Non-Preemptive Multitasking

A system in which each application currently running a process voluntarily passes control of the CPU to another application between processes. Also called cooperative multitasking.

Authoriative Domain

A system that is used when an organization hosts mailboxes for recipients within the domain.

Individual NTFS permissions (special access permissions)

A system that provides the ability to assign individual users access rights to files and folders.

Routing table

A table that gives network bridges and routers the information needed to forward data packets to locations on other networks. These must be updated frequently as changes to machines and connections occur.

Tape Device

A tape drive which can reads a magnetic storage tape, write data to it, and position it to receive data.

Ring Wrapping

A technique for rerouting data on an FDDI ring network to a secondary ring to prevent a break in the network from interrupting network service.

Circuit Switching

A technique in which one endpoint creates a single path connection to another, depending on the requirement.

Distributed Processing

A technique of using both the client and server's processors to complete a task. The client or "front end" accepts input and runs simple calculations, while the server or "back end" handles processes that require more processing power.

System User

An account created by default during the Linux installation and are used by the syetem for specific time.

CIDR (Classless Inter-Domain Routing)

A technique used to collapse Class C entries into a single entry corresponding to all the Class IDs that are being used by that organization. This allows companies to use many Class C addresses rather than requesting a Class B address, since the availability of IP addresses is scarce.

Classless Inter-Domain Routing (CIDR)

A technique used to collapse Class C entries into a single entry corresponding to all the Class IDs that are being used by that organization. This allows companies to use many Class C addresses rather than requesting a Class B address, since the availability of IP addresses is scarce.

Octet

A term used to describe 8 bits in an IP address. An IP address consists of a 4 octet address. An octet is separated by periods. The octet represents a decimal number in the range of 0-255 known as dotted decimal notation.

Backup Set

A term used to describe a group of files or folders on a single volume from a single backup operation. A group of tapes is called a family set.

Terminal

A terminal with no processor. It accepts keystrokes and displays data from a mainframe computer. Also called a dumb terminal.

Security Log

A text file containing records of events you have chosen to audit. For example, if you chose to monitor unsuccessful attempts to log on to your system, you would look at the security log to find the results of that audit.

system log

A text file containing the events that Windows 2000 components log, such as driver failures. You can use the Event Viewer to display the this file.

Log File

A text file that contains detailed information about the backup procedures you perform with Windows Backup. Other processes, such as the Performance Monitor, also generate these type of files.

PIF (Program Information File)

A text file that contains the information Windows needs to run MS-DOS applications, such as the path and filename of the executable file.

Program Information File (PIF)

A text file that contains the information Windows needs to run MS-DOS applications, such as the path and filename of the executable file.

Man Page

A text-based help file for a specific command stored on the computer. It shows the command's syntax, options, and related files and commands.

THT (Token Holding Timer)

A timer in which determines how long each station of an FDDI network can keep the token. Each station has one of these.

Snap-In

A tool used through Microsoft Management Console (MMC). These can be stand-alone (can be added to MMC by itself) or extension (can be added to MMC only to extend the function some other of these).

Ring

A topology that connects neighboring nodes until they form a ring. Signals travel in one direction around the ring. In ring topologies, each device on the network acts as a repeater to send the signal to the next device.

ESE (Extensible Storage Engine)

A transactional database that writes information into RAM memory and into a log file. Once it is in the log file, it will be written to disk.

Multicast

A transmission method that transmits packets from a single device to a specific set of hosts. It is optimal for transmitting voice and video applications and streaming video.

Distributionn Tree

A tree shows the source of multicast information and the path that multicast traffic use across the network infrastructure.

Distribute List

A type of access list that is applied to routing updates. Unlike normal access lists, distribute lists can control routing updates no matter their origin.

B-Node

A type of broadcast used by NetBIOS over TCP/IP. It uses UDP datagrams to broadcast for name registration and resolution. this type of broadcasts are usually not forwarded by routers, and only computers on the local network can respond.

Enhanced Small Device Interface (ESDI)

A type of hard disk that uses CHS addressing and has a 1024 cylinder limitation. These hard disks are predecessors of the newer IDE disks.

IN record

A type of name service record that can be defined by using the DNS Console utility.

Transport protocol

A type of protocol that allows two computers to communicate with each other. For example, TCP/IP and IPX/SPX are both examples of this type of protocol.

Baseband

A type of signalling allows one signal at a time on the network medium (cabling).

FHSS (Frequency Hopping Spread Spectrum)

A type of signalling method, used by a wireless networking architecture, where a narrow frequency band 'hops' data signals in a predictable sequence from frequency to frequency over a wide band of frequencies.

Direct-Sequence Spread (DSSS)

A type of signalling method, used by a wireless networking architecture, where the transmitter breaks data into pieces and sends the pieces across multiple frequencies in a defined range.

DSSS (Direct Sequence Spread Spectrum)

A type of signalling method, used by a wireless networking architecture, where the transmitter breaks data into pieces and sends the pieces across multiple frequencies in a defined range. It is more susceptible to interference and less secure then other forms of signalling, such as Frequency Hopping Spread Spectrum (FHSS).

Service Set Identification (SSID)

A type of wireless security feature used to group several wireless devices and access points as part of the same network and to distinguish these devices from other adjacent wireless networks. This feature is also commonly referred to as the network name. Most WAPs come with a default one of these, which you should change as part of your security implementation. Even after you change this feature, it is still only a minimal security feature. There are two type of these: BSSID (Basic Service Set Identification and ESSID (Extended Service Set Identification).

Registry

A unified database in which Windows 2000 stores all hardware and software configuration information for the local computers.

SID (Security Identifier)

A unique ID used to identify everything in the domain.

Security Identifier (SID)

A unique ID used to identify everything in the domain.

Media Access Control (MAC) Address

A unique hardware address that is assigned to each device by the vendor. For example, a LAN adapter has a unique MAC address that is permanent to the adapter card.

MAC (Media Access Control) Address

A unique hardware address that is assigned to each device by the vendor. For example, a LAN adapter has this address that is permanent to the adapter card.

Byte

A unit of information made up of eight bits. Usually, it represents a character.

Distribution Group

A universal group that has been mail-enabled, such as a security group. This group can be used to send an e-mail to a large number of people in an Exchange organization, such as entire departments or groups.

User Account

A user name and password that allows a user to log on to a domain or a local computer and gain access to resources.

GRUB

A utility that boots a Linux kernel or any other operating system.

NetBIOS applications

A utility that checks the state of current NetBIOS over TCP/IP connections. It is also used to update the LMHOSTS cache and determine your registered name and scope ID.

nano

A utility that creates and modifies text files.

vi

A utility that creates and modifies text files.

yundownloader

A utility that downloads an RPM package from a software repository.

ldd

A utility that shows the shared libraries required by an application.

snmputil

A utility that verifies whether the SNMP Service has been correctly configured to communicate with SNMP management stations. For example, you can use the utility to determine the number of DHCP Server addresses leased by a DHCP server in the Public Community.

Permanent Virtual Circuit (PVC)

A virtual circuit that provides permanent access to the network like a permanent physical connection. Leasing a one of these is cheaper than leasing a permanent physical connection because the physical circuit is not dedicated to a single one of these and can be used to carry data from other virtual circuits.

PVC (Permanent Virtual Circuit)

A virtual circuit that provides permanent access to the network like a permanent physical connection. Leasing one of these is cheaper than leasing a permanent physical connection because the physical circuit is not dedicated to a single one of these and can be used to carry data from other virtual circuits.

CMOS (complementary metal-oxide semiconductor)

A volatile form of memory that uses a small battery to provide it with power to keep the data in memory even when the computer is turned off. It stores settings that are used by the BIOS.

Spanned Volume

A volume on a dynamic disk that spans multiple physical drives. These are not fault tolerant and nor can you mirror spanned volume. In Windows NT 4.0, it was called a volume set.

Duplex

The two-way transmission of a signals across a medium. There are two types: half-duplex and full-duplex.

Local Preference Attribute

A well-known discretionary BGP attribute that describes the preferred exit path from an AS. They are configured by assigning a number between 1 and 100; higher values representing higher preference over lower values.

Next-Hop Attribute

A well-known mandatory BGP attribute that indicates the next-hop IP address that can be used to reach a destination.

AS Path

A well-known mandatory BGP attribute that lists the different autonomous systems to reach a network.

Hyperlink

A word, phrase, or graphic formatted so that clicking it allows you to display data from another file on your computer, the network, or the Internet.

Connection Object

An Active Directory object that represents a uni-directional connection between a source and target replication partner over which Active Directory data is replicated.

Domain Partition

An Active Directory partition that stores objects, attribute, and attribute values for a particular domain. Each domain in Active Directory has its own domain partition.

Standard Secondary Zone

An DNS server that contains a read-only copy of the zone file. The zone information is updated by replication from other servers. Its zone file can then be replicated to other similar zones.

Dynamic Distribution Group

An Exchange distribution group whose membership is defined by the results of a query which is executed every time a message is sent to the group. This is optimal for environments in which people move groups or buildings often and e-mail groups need to be able to accommodate changes as they occur.

Remote Access Admin

An Windows NT utility used to configure a RAS server. This utility can also be used to start a RAS server.

Class B Address

An IP address range that is assigned to networks with medium to large networks. This arrangement assigns the two high order bits to binary 1 0 . The next 14 bits complete the network ID. The last 16 bits are used for the host ID. The address range for the first octet (8 bits) is 128 B 191.

Class C Address

An IP address range that is used for small local area networks. This arrangement assigns the three high order bits to binary 1 1 0. The next 21 bits are used to complete the network ID. The last 8 bits are used to represent the network ID. The address range for the first octet (8 bits) is 192 B223.

FCIP

An IP-based storage networking technology developed by the Internet Engineering Task Force (IETF). It enables the transmission of data to and from FC storage devices over standard Ethernet copper cabling and switches.

ICMP (Internet Control Message Protocol)

An Internet protocol used to report errors and control messages on behalf of IP. ICMP This reports errors and provides feedback on specific conditions. The messages that emanate are carried as IP datagrams and therefore are not reliable.

#PRE

An LMHOSTS file keyword that defines which entries should be initially preloaded as permanent entries in the name cache. The preloaded entries can reduce network broadcasts, because the names will be resolved from cache rather than making a broadcast. Any entries with a #PRE tag get loaded automatically during initialization.

#DOM

An LMHOSTS keyword and facilitates domain activity such as logon validation over a router or account sychronization and browsing.

FDISK

An MS-DOS utility you can use to create a primary partition or logical drive on a hard disk.

Chkdsk

An MS-DOS utility you can use to scan and repair both FAT and Windows NT NTFS volumes.

Windows Sockets

An NWLink API that provides an interface for communication between NetWare Loadable Modules (IPX/SPX sockets) and TCP/IP protocols.

IS-IS (Intermediate System to Intermediate System)

An OSI-based link-state routing protocol.

SNMP trap

An SNMP agent performs a trap, which is an alert that is sent to management systems for some event that has occurred with that device. This event could be excess traffic, password violations, or a hardware failure.

Member Server

An Windows 2000 Server computer that is not a domain controller. These servers provide file and print services for the network.

Oscilloscope

An electronic device that displays signal voltage information. You can use an it to detect shorts, breaks, bends, or crimps in a network cable. They also can be used to indicate attenuation problems (loss of signal power).

Telecomuter

An employee who works outside the office, at home or on the road, and uses a network or the Internet to communicate with the office.

Dual Ring

An enhanced version of the ring networking topology. This network includes two rings; the primary and secondary rings, which increase performance and fault tolerance.

Transaction

An entire operation consisting of multiple steps that must all be completed properly, or the entire interaction fails.

Record

An entry in a DNS name server. In SQL Server, it is a set of related fields (columns) of data joined as a unit. In a SQL database, it is more common to talk about rows and columns than records and fields.

Echange Management PowerShell

An environment that allows administrators to perform all of their tasks from a command line environment, thus making it easier to automate tasks. The PowerShell must be installed before Exchange 2007 is fully installed, then extensions are installed to the PowerShell during Exchange 2007 installation to create the Exchange 2007 PowerShell environment. The PowerShell uses with verb/noun-based syntax and is the primary platform for all administration; the graphical interface is simply running atop of the command shell.

Exchange Management Shell

An environment that allows administrators to perform all of their tasks from a command line environment, thus making it easier to automate tasks. The PowerShell must be installed before Exchange 2007 is fully installed, then extensions are installed to the PowerShell during Exchange 2007 installation to create the Exchange 2007 PowerShell environment. The PowerShell uses with verb/noun-based syntax and is the primary platform for all administration; the graphical interface is simply running atop of the command shell.

sysdiff.exe

An executable file you can use during an unattended installation of Windows NT if you need to install an application that does not support scripted installations.

External Relay

An external relay accepts e-mail for an external organization and then delivers it to an external entity such as the Internet via the Edge Transport server.

Full-mesh iBGP

An iBGP network in which each BGP speaker has a neighbor statement containing updated information for all other iBGP speakers in the AS.

Host IDs

An identifier of a workstation, server, router, or other TCP/IP host within a segment. The network ID must be unique to the network ID.

ISO

An image file that is an identical copy of the original media. This file(s) contains the Linux distribution and can be used from a variety of medium including a CD/DVD, a USB stick or a Hard Drive. The media containing these file(s) can be configured to be bootable, allowing the Linux distribution to be loaded from the media. It is commonly used as a recovery tool.

Serial Line Internet Protocol (SLIP)

An industry-standard protocol developed in 1984 to support TCP/IP over low-speed serial interfaces. Windows 2000 supports SLIP client functionality, but not server functionality. Also, Windows NT RAS Servers do not accept this type of client connections.

Windows for Workgroups

An operating system that runs on client computers. It is not a networking operating system.

Windows 98

An operating system that runs on client computers. It is not a networking operating system. First appeared in the late 90's.

Primary Domain Controller (PDC) Emulator operations master

An operations master that simulates a Windows NT 4.0 Primary Domain Controller (PDC). Also called a PDC Emulator master.

Originating Update

An update to the Active Directory update that is made directly rather than through replication. For example, if BSmith's password is changed on Server1 then replicated to Server2, the originating update was made on Server1.

Replicated Update

An update to the Active Directory update that is made through replication.

Malware

Another name for virus, which is a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found.

Datagram

Another term used to describe a packet. The term is also used to describe the Internet protocol known as the User Datagram Protocol, a connectionless protocol that does not guarantee delivery of datagrams.

VDD (Virtual Device Driver)

Component that an NTVDM uses to intercept the calls an MS-DOS application makes to the computer's hardware and send them to the Win32 system instead. The application behaves as if it interacts directly with the hardware device.

Virtual Device Driver (VDD)

Component that an NTVDM uses to intercept the calls an MS-DOS application makes to the computer's hardware and send them to the Win32 system instead. The application behaves as if it interacts directly with the hardware device.

Command Line Switches

Codes you can use at the command prompt when starting an application or installation program to customize the way the program runs.

DROTHER

Any other router that is not a DR or a BDR is called a DROTHER. This is simply a term used to describe a non-DR or non-BDR router. It is not technically an OSPF router role.

PDA (Personal Digital Assistant)

Any portable hand-held device used for computing.

Personal Digital Assistant (PDA)

Any portable hand-held device used for computing.

BGP Speaker

Any router that runs BGP.

Distance Vector Routing Protocol

Class of routing algorithms that iterate on the number of hops in a route to find a shortest-path spanning tree. Distance vector routing algorithms call for each router to send its entire routing table in each update, but only to its neighbors. Distance vector routing algorithms can be prone to routing loops, but are computationally simpler than link state routing algorithms. Also called Bellman-Ford routing algorithm. See also link state routing algorithm.

T-Carriers

Digital lines that carry data, digitized voice, and digitized video signals. One of these line multiplexes several channels on to a single physical communication medium. Each channel operates at 64 kilobits per second.

DDS (Digital Data Service)

Digital lines to which a computer can connect using a channel service unit/digital service unit (CSU/DSU). These kinds of lines carry 99 percent error-free digital signals at speeds ranging from 2.4 to 56 kilobits per second.

.JRS file

Exchange 2007's database engine is referred to as the Extensible Storage Engine (ESE). ESE is a transactional database that writes information into RAM memory and into a log file. Once it is in the log file, it will be written to disk.

xargs

Execute utility, passing constructed argument list(s). It has a 128 KB limitation.

Local Group

Groups used to provide users with permissions to access a network resource and to provide rights to perform system tasks.

FQDN (Fully Qualified Domain Names)

Host names inside domains that are added to the beginning of the domain name. For example, any name given that is placed in front of Microsoft.com, such as support.Microsoft.com, is a fully qualified domain name.

Classless IP Addresses

IP addresses that use a custom mask value to separate network and host portions of the IP address.

Superscope

In Windows 2000 Server, a grouping of multiple DHCP scopes into a single unit. One of these makes it possible to have multiple logical subnets on a single physical subnet. The individual scopes are called member scopes or child scopes.

Remote Access

In a broad sense, remote access is access to a local area network from home or some other place that is not directly connected to the LAN. More specifically, it is remote networking for mobile workers or system administrators who manage servers at multiple location. Windows 2000 and Network and Dial-up Connections let users access networks remotely for such services as file and printer sharing, electronic mail, and database access. It is part of the integrated Routing and Remote Access service.

Trusts

In a one-way of this, accounts in one domain can be given permission to access resources in another domain. In a two-way, of this, permission is given to each domain to access resources in the other domain.

Token

In computer networking, this can be either a physical or a virtual object (often used to authenticate users). Security tokens can be in the form of code, PIN number, or devices like smartcards.

Piping

The process of redirecting the output from one command to be the input of another command.

Logical Link Control (LLC)

In the OSI model, this layer is one of two sublayers of the Data-Link layer. It manages traffic (flow and error control) over the physical medium.

System Hive

In the Registry, these are what includes information about the devices and services installed on the computer.

Values

In the Registry, this contain the value name, the type of data the value uses, and the value. Both keys and subkeys can contain these. In Active Directory, properties common to all objects contain these that correspond to a single user, computer, and so on.

Print Device

In the Windows 2000 environment, the hardware that produces printed output. When the term "printer" is used, it refers to the software interface between the operating system and this term. These are connected to print servers or client computers that have the correct printing software installed on it.

ARPANET (Advanced Research Projects Agency Network)

In the late 1960s and early 1970s, the United States Department of Defense sponsored this project to create a network between government and research institutions. The project became the foundation for what is now known as the Internet.

Media (Transmission Media)

In the realm of information technology, transmission media refers to the cables and wires through which signals (such as electric current or light impulse) are transmitted through a network.

Complete Trust Domain Model

In this Windows NT network model, every domain on the network trusts every other domain. No single domain has control over the other domains. The complete trust model distributes administration of users, groups, domains, and resources among different departments rather than using a centralized approach.

Simple Protocol for Independent Computing Environment (SPICE)

Provides a complete open-source solution for remote asccess to virtual machines.

Data Link Layer (OSI Model)

Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The data link layer is concerned with physical addressing, network topology, line discipline, error notification, ordered delivery of frames, and flow control. The IEEE has divided this layer into two sublayers: the MAC sublayer and the LLC sublayer. Sometimes simply called link layer. Roughly corresponds to the data link control layer of the SNA model. See also application layer, MAC address, network layer, physical layer, presentation layer, session layer, and transport layer.

Transport Layer (OSI Model)

Layer 4 of the OSI reference model. This layer is responsible for reliable network communication between end nodes. The transport layer provides mechanisms for the establishment, maintenance, and termination of virtual circuits, transport fault detection and recovery, and information flow control. Corresponds to the transmission control layer of the SNA model. See also application layer, data link layer, network layer, physical layer, presentation layer, and session layer.

Session Layer

Layer 5 of the OSI reference model. This layer establishes, manages, and terminates sessions between applications. It also manages data exchange between presentation layer entities. It corresponds to the data flow control layer of the SNA model. See also application layer, data link layer, network layer, physical layer, presentation layer, and transport layer.

Presentation Layer

Layer 6 of the OSI reference model. This layer ensures that information sent by the application layer of one system will be readable by the application layer of another. This layer is also concerned with the data structures used by programs, and therefore negotiates data transfer syntax for the application layer. Corresponds roughly with the presentation services layer of the SNA model. See also application layer, data link layer, network layer, physical layer, session layer, and transport layer.

Application layer (OSI model)

Layer 7 of the OSI reference model. This layer provides services to application processes (such as electronic mail, file transfer, and terminal emulation) that are outside of the OSI model. This layer identifies and establishes the availability of intended communication partners (and the resources required to connect with them), synchronizes cooperating applications, and establishes agreement on procedures for error recovery and control of data integrity. Corresponds roughly with the transaction services layer in the SNA model. See also data link layer, network layer, physical layer, presentation layer, session layer, and transport layer.

IMAP4 (Internet Message Access Protocol Version 4)

Like POP3, IMAP4 is a protocol that allows a client to download messages from a server. (It does not allow you to send messages.) IMAP4 is much more powerful than POP3.

Mapping

Making an association between two different elements, such as computer names and IP addresses, drives and drive letters, and so on.

Guests

Members of the local Guest group on workstations and servers have limited rights. They can maintain a profile on a Windows 2000 workstation, but they cannot manage local groups.

Keepalive messages

Messages that act as hello packets to ensure that routers are still responsive.

chattr

Modifies file attributes. A+ or A- is used to add or remove attributes respectively.

Password Authentication Protocol (PAP)

One of the less-secure protocols, where the username and password are sent in clear text for authentication increasing the chance of interception. These should be used only when no other form of authentication is supported. These protocols are supported by multiple platforms, including Microsoft and Linux.

PAP (Password Authentication Protocol)

One of the less-secure protocols, where the username and password are sent in clear text for authentication increasing the chance of interception. This should be used only when no other form of authentication is supported. These protocols are supported by multiple platforms, including Microsoft and Linux.

Ethernet

One of the major families of network architectures. The structure of all of this related network structure is based on the bus topology. Most Ethernet networks use baseband signaling and CSMA/CD as a media access method.

Accepted Domains

One of the three types of allowed domains in Exchange 2007: Authoritative, internal relay and external Relay.

Encapsulating Security Payload (ESP)

One of two services comprising IPSec. ESP supports both authentication of the sender and is used primarily to encrypt and secure the data transferred between IPSec partners.

Boundary Layer

Parts of the network architecture that provide a common programming interface. Programmers can use these components to create independently-coded drivers and other programs which extend the operating system's abilities.

Broadcast

QA transmission, where a single device transits a message to all of the other devices in a given address range. The messages from this can be received by all hosts on the subnet, all subnets, or all hosts on all subnets.

Link state routing protocol

Routing algorithm in which each router broadcasts or multicasts information regarding the cost of reaching each of its neighbors to all nodes in the internetwork. Link state algorithms create a consistent view of the network and are therefore not prone to routing loops, but they achieve this at the cost of relatively greater computational difficulty and more widespread traffic (compared with distance vector routing algorithms). Compare with distance vector routing algorithm.

Update Sequence Number (USN)

Servers track directory changes using these numbers. Each server keeps track of the changes it has already received or made. When a server requests changes from another server, they compare to the numbers associated with this term. If the numbers are the same, neither server makes any changes. If one server's number is higher than another, the server with the lower number requests the changes corresponding to the higher numbers.

Broadband

Signalling that divides the network medium (cabling) into multiple channels, allowing several signals to traverse the medium at the same time.

Relational database management system (RDBMS)

Software used to store, update, and retrieve data. It has a client/server architecture, stores data in tables with rows (records) and columns (fields), defines and enforces relationships among data items, and uses some version of Structured Query Language (SQL).

Microsoft Web site

The Internet site that you can use to read information about Microsoft products or reach Microsoft support.

Simple Mail Transfer Protocol (SMTP)

The Internet standard protocol for transferring e-mail messages between hosts. These assumes that both host and client are constantly connected, but you can use both permanent and dial-up connections to an SMTP host.

SMTP (Simple Mail Transfer Protocol)

The Internet standard protocol for transferring e-mail messages between hosts. This protocol assumes that both host and client are constantly connected, but you can use both permanent and dial-up connections to an SMTP host.

MADMAN MIB

The Management Information Base (MIB) for Simple Network Management Protocol (SNMP) Mail and Directory Management (MADMAN). Windows NT Performance Monitor counters are made available as MIB objects that can be monitored through SNMP.

Console

The Microsoft Management Console (MMC) is a graphical interface for the administration of Windows 2000 and some earlier Microsoft operating systems. It accommodates various "snap-in" tools.

Certificate Services

The Microsoft Windows 2000 component that lets a system administrator create a certificate authority to issue, revoke, and manage digital certificates as part of a public key infrastructure.

NWLink

The Microsoft implementation of Novell's IPX/SPX protocol. It is a communications protocol that helps Windows 2000 and NetWare operate in a single environment. Client Services for NetWare is also needed to complete the connection.

ntio.sys

The NTVDM equivalent to the IO.SYS in MS-DOS.

RPM

The Red Hat Package Manager used to install software packages on Red Hat, Fedora, Open SUSE and other Linux distributions.

ntldr

The Windows NT operating system loader. During the startup phase, the pre-boot sequence locates the boot partition of the hard disk. NTLDR (the boot loader) is then loaded and initialized from the boot sector. This program switches the processor to the 32-bit flat memory mode, starts the appropriate minifile system, and reads the Boot.ini file.

Windows Sockets Applications

The Windows Sockets service provides a standard application programming interface (API) to different transport protocols such as IPX and TCP/IP. Applications that take advantage of this service are known as this.

Security Subsystem

The Windows subsystem that handles the process of logging on to a domain. It works with the Security Accounts Manager to validate the given user name and password, generates an access token, and returns it to the user.

CSR Subsystem

The Windows subsystem that supports 32- and 16-bit Windows and MS-DOS applications within Windows 2000. Also called the Win32 subsystem, client/server subsystem, or CSRSS.

Promiscuous Mode

The ability for an adapter card to view packets travelling across the network. A LAN adapter must support this mode if it is used to monitor network traffic.

Multi-Homed

The ability of a router to function using both static and dynamic routing. For example, you can configure a Windows 2000 computer with multiple network adapters and route between the two cards. Computers configured in this fashion are known as multihomed computers.

Preemptive multitasking

The ability of the Windows 2000 operating system to service multiple requests of the CPU by preempting a task to execute another task.

Uniform Resource Locator (URL)

The address of a World Wide Web page, graphic file, or program file on the Internet. Each resource has an exclusive address that allows your computer to find and display it. This address includes the code for the transfer protocol, plus the unique name of the Web server containing the page. For example, http://www.universal.com/widgets uses the Hypertext Transfer Protocol (http://) to connect to a specific server (www.universal.com) and display a specific Web page (/widgets).

Trunk Cable

The central cable connecting all of the nodes, either inserted directly into the trunk, or nodes tapping into the trunk using offshoot cables called drop cables. Commonly used in the physical bus topology.

MAU (Multistation Access Unit)

The central connecting point for a token ring network.

MSAU (Multistation Access Unit)

The central connecting point for a token ring network.

systemroot

The directory in which you installed the Windows 2000 operating system files.

Electromagnetic Interference (EMI)

The disruption of one electronic device, caused by an electromagnetic field (in the radio frequency spectrum) generated by another electronic device.

Originating domain controller

The domain controller on which an Active Directory update was originally made.

Final partition

The domain naming context partition in Exchange 2007. This is used to hold all of the user accounts, groups, and computer accounts. If mail-enabled context is used, then it is stored in the final partition. The domain naming context stores the largest amount of information in a typical employment.

Authoritative Domain

The domain over which the Exchange server has sole responsibility. In a typical environment, the organization will have an e-mail domain of "company.com" which is hosted by the company's e-mail server. If another e-mail system or domain exists in the environment, internal and external relays are employed.

ntvdm.exe

The executable that emulates MS-DOS and manages an NTVDM. It runs in kernel mode.

winnt.exe

The executable you use to install Windows 2000 on a computer that does not have a previous version of Windows 95, 98, or NT installed.

winnt32.exe

The executable you use to re-install or upgrade Windows 2000 on a computer that already has Windows 95, 98, or NT installed.

init

The first process started when booting the Linux system. It is a daemon process that continues running until the system is shut down. It is a legacy process that has been replaced by systemd.

POST (Power On Self-Test)

The first stage in the Windows NT boot process, during which the system checks to make sure all necessary hardware components and memory are in place and functioning correctly.

Default Gateway

The gateway you always want to use to communicate with a host on a different network. It receives packets from the local network and transfers them to another gateway on the other network. You specify a default gateway when you configure TCP/IP.

Exchange Management Console

The graphical administration tool. It is comprised of a three-paned view that includes a tree view, results, and an actions pane. It cannot perform many of the administrative tasks that can be performed in the Exchange Management Shell.

Physical Layer

The lowest layer in the seven-layer OSI model that represents the hardware on a network. This layer is the adapter card and the physical media that transport protocols across the network.

FD (Feasible Distance)

The lowest total cost to a destination network.

Line Printer Daemon/Line Print Remote (LPD/LPR)

The most widely-used cross platform print protocol. This establishes connection between printing devices and workstations. It is usually loaded on the printing device. This is usually loaded onto the client workstation.

Real File Systems

The ordinary file system that is organized into directories and file.

Service Provider

The organization that provides a WAN service to an individual or company. This organization might be the same organization that owns the WAN, or it might be a separate organization that purchases network access from a WAN carrier and then resells network access to the general public.

Origin attribute

The origin (type code 1) is a well-known mandatory BGP attribute used to describe the origination of information in transit.

System State Data

This includes all the Windows 2000 system components and distributed services that Active Directory depends on.

Primary Partition

The partition of a hard disk that the operating system uses. One basic hard disk can have up to four of this type of partition.

Boot Partition

The partition on a hard drive where the Windows operating system files reside.

System Partition

The partition on the hard disk containing the boot files and hardware-specific files for the operating system.

ESP (Extensible Firmware Interface Partition)

The partitioning scheme used by the UEFI. It is the format used for the boot sector where the operating system and utilities for starting a computer is stored.

Lease

The period of time for which a dynamically assigned IP address remains valid for a DHCP client. Before the end of the lease, the client has to renew or be assigned a new lease by DHCP.

Node Prioritization

The priority assigned to each computer (values between 0 and 8) in a token ring. Computers with higher priority levels get first rights to the token. Computers that perform critical network functions may need higher priority.

Database Replication

The process by which a WINS server can resolve NetBIOS names of hosts registered with another WINS server. For example, if a host on subnet A is registered with a local WINS server, but wants to communicate with a host on subnet B where the host is registered with a different WINS server, the NetBIOS name cannot be resolved unless the two WINS servers have replicated their databases with each other.

Log Off

The process by which a user disconnects from a network and closes connections to mapped drives and printers.

Log On

The process by which a user gains access to a network by providing security credentials (usually a user name and password).

Name Resolution

The process by which host names (such as Computer1) are translated to numerical IP addresses (such as 192.168.35.2). The principle means of such in Windows 2000 is DNS. WINS may be used for some in place of DNS, subsequently when earlier versions of Windows are still part of the network..

Route Convergence

The process by which routers exchange route information between themselves. Each routing table entry learned through RIP is given a time-out value of three minutes past the last time it was last received in a RIP advertisement.

Encapsulation

The process of adding an additional header to a packet before transporting the packet onto the network.

Supernetting

The process of combining multiple network addresses into a single larger subnet. For example, this allows multiple Class C addresses to be combined into a single network.

Network Address Translation (NAT)

The process of converting the IP addresses used in private network (such as an intranet) to Internet IP addresses. This increases the number addresses available within the the intranet without reducing the number of available Internet addresses.

Data Definition

The process of creating a database and associated objects, such as tables, indexes, constraints, defaults, rules, procedures, triggers, and views.

Redirection

The process of modifying a shell command to divert the standard input, output and error streams to locations other than the default.

Failback

The process of moving services back to the original server when it comes back online.

Authentication

The process of supplying a valid user name and password in order to access resources on a network or computer.

Migration

The process of transferring files, folders, and account information from a NetWare server to a Windows 2000 server.

Private key

The secret member of a cryptographic key pair associated with a public key algorithm. This member can be used to decrypt data that has been encrypted using the public key.

Replication Topology

The series of connections over which replication takes place.

Back End

The server where database operations occur. This server fulfills client requests by receiving structured requests from the client, processing the requests, and returning the results. It is usually more powerful than the client.

Package Dependency

The set of circumstances that occurs when one software package requires another package to be installed to work properly.

Unicode Characters

The set of letters, numbers, and symbols that SQL Server recognizes in the nchar, nvarchar, and ntext data types. It includes characters for most languages. This term is related to character sets, but is not the same thing as a typical character set, having some 200 times as many possible values and requiring twice the storage space.

AppleTalk

The set of network protocols native to Apple computers.

IUSR_computername

The standard Internet guest account that the server uses to allow anonymous connections to your Windows Internet server. When you install IIS or PWS, this file is automatically created.

Transact-SQL

The standard language for communicating between applications and SQL Server. It is an implementation of ANSI-standard Structured Query Language (SQL) that includes extensions such as stored procedures that make this a full programming language. Sometimes referred to as T-SQL.

Open Graphics Language (OpenGL)

The standard software interface you can use on any hardware or software platform to create high-quality graphics.

OpenGL (Open Graphics Language)

The standard software interface you can use on any hardware or software platform to create high-quality graphics.

Adapter Teaming

The use of two or more adapter cards in a system to eliminate a network adapter as a single point of failure.

Transport Policy Agents

These apply transport policies to e-mails within an Exchange organization.

Transport Rules Agent

These apply transport policies to e-mails within an Exchange organization.

Forwarder

These are designated DNS servers that accept and resolve recursively all queries regarding external or off-site addresses. Other servers are configured to send all such queries to this server.

Protocol Stacks

These are installed and configured versions of protocols that connectors use to communicate. For example, the X.400 Connector uses TCP/IP, TP4/CLNP, and/or X.25.

Management Domains

These are the network subdivisions specified in the X.400 international messaging standard.

Notification Messages

These are transmitted when errors have been detected.

Linked Mailbox

These are used in environments in which there are multiple forests (known as resource forests).

Hashing Algorithms

These are used to create a message digest to ensure that data integrity is maintained. A sender creates a message digest by performing the hash function on the data files to be transmitted. The receiver performs the same action on the data received and compares the two message digests. If they are the same then the data was not altered.

E-Mail Address Policies

These are used to generate e-mail addresses for Exchange recipients within an Exchange 2007 organization. Policies can be used to generate e-mail addresses for a number of environments, such as SMTP, X400, Lotus Notes, or Novell GroupWise.

Poison Message Queue

These are used to isolate messages that contain potentially harmful errors caused by an Exchange 2007 system failure. This queue is only viewable in the case that such messages have been directed to the poison message queue. Delivery of all messages within the poison message queue is suspended. If a message is deemed unharmful, it will be passed to the submission queue. All other messages within the poison message queue are deleted.

Mail-Enabled Contacts

These are used to make it easier for users within an Exchange organization to locate the contact details of people outside of your organization.

Resource mailboxes

These are used to manage meeting rooms, projectors, and additional facilities in Exchange 2007. When one of these is is created, a disabled user account is created for the mailbox.

BGP Attributes

These are used to select the best path to be entered into the routing table and propagated to the BGP neighbors. BGP attributes can be well-known mandatory, well-known discretionary, optional transitive, or optional nontransitive.

Remote Delivery Queue

These hold messages that will be delivered using SMTP to recipient mailboxes that reside on remote servers in Exchange 2007. Each remote delivery queue holds messages that are routed to recipients with the same delivery destination. Each time multiple recipients have the same delivery destination, a remote delivery queue is dynamically created. Once the messages have been successfully delivered, the queue expires and is automatically deleted three minutes later.

Transport Policy Conditions

These identify the e-mail messages to which a transport policy action are applied.

Transport Policy Exceptions

These identify the e-mail messages which are excluded from a policy, even if the message matches a transport policy condition.

IGMP message

These messages to exchange information, such as routing diagrams, with other routers.

Transport Policy Actions

These modify some aspect of message content or the delivery for e-mail messages that match all the conditions and none of the exceptions of a transport policy.

Mailbox Delivery Queue

These only exist on Hub Transport servers in Exchange 2007. They hold messages for recipients whose mailbox data is stored on a Mailbox server within the same site as the Hub Transport server.

Public folder

These provide a simple and efficient way to collect, organize, and share Exchange 2007 collaborative applications such as calendars, contact lists, task lists, and message lists.

Microsoft Cluster Servers

These servers are fault-tolerant servers that use two separate nodes.

Passive interface

These stop the routing process from participating out of a particular interface. The interface still listens and receives network traffic, but the interface does not participate, advertise, or generate any traffic for a given protocol. They are often used with protocol migration or redistribution.

Striped Volume

This breaks data into units and stores the units across a series of disks (as opposed to a spanned volume that fills the first area with data, then the second area, and so on).

PIM Source Specific Multicast (PIM-SSM)

This builds trees that are rooted in just one source.

PIM-SSM (PIM Source Specific Multicast)

This builds trees that are rooted in just one source.

API (Application Programming Interface)

This can be provided by any vendor to provide functionality to an application or operating system.

CCR (Logical Continuous Replication)

This combines the asynchronous log shipping and replay technology of Exchange 2007 with the failover and management features provided by the Microsoft Windows Cluster service.

NET command

This command accepts several command arguments that control functions such as logon, logoff, and resource connections.

X.400 standard

This contains guidelines for exchanging messages electronically. It includes rules for addressing messages as well as an addressing scheme that uses management domains, originator/recipient names, and other information to uniquely identify users within the hierarchy of the organization.

TFTP (Trivial File Transfer Protocol)

This data transfer utility provides bi-directional file transfers between two TCP/IP hosts, where one is running the software for this protocol. No user authentication is required.

LSP (Layered Service Provider)

This distributes link-state information and defines the characteristics of an IS-IS router.

Stub Area

This does not allow ASBR routes, so routes that are external to the OSPF routing process are not transmitted.

Packet filtering firewall

This filters packets based on source and destination addresses, ports, and service protocols. This type of firewall uses ACLs or filter rules to control traffic. It operates at OSI layer 3 (Network layer), Offers high performance because it only examines addressing information in the packet header and it is subject to DoS and buffer overflow attacks.

Unreachable Queue

This hold messages that cannot be routed to their destination due to configuration changes or modified routing paths in Exchange 2007. Each transport server can have only one unreachable queue.

PDC (Primary Domain Controller)

This holds all security and account information for a Windows NT domain and is responsible to communicate all changes to the BDCs.

Primary Domain Controller (PDC)

This holds all security and account information for a Windows NT domain and is responsible to communicate all changes to the BDCs.

Network ID

This identifies the TCP/IP hosts that are located on the same physical network. Any hosts that are on the same physical network must be assigned the same network IDof these in order to communicate.

Traceroute

This is a Linux diagnostic utility that tests connectivity between devices, but as it does so it shows the path between the two devices. Responses from each hop on the route are measured three times to provide an accurate representation of how long the packet takes to reach, and be returned by that host.

Segmentation

This is a Transport layer process of breaking large packets of information from higher layers into smaller packets called segments. This is necessary to enable the data to meet network size and format restrictions. The other function of this process happens when the receiving Transport layer uses packet sequence numbers to reassemble segments into the original message.

PIM Sparse Mode (PIM-SM)

This is a client-initiated pull method to get multicast information.

PIM-SM (PIM Sparse Mode)

This is a client-initiated pull method to get multicast information.

Striping

This is a data protection method. Striping divides data into units and stores the units across a series of disks. Distributing the data removes the threat of losing all of the data in event of a single disk failure.

Secure File Transfer Protocol (SFTP)

This is a file transfer protocol that uses Secure Shell (SSH) to secure data transfers. SSH ensures that SFTP transmissions use encrypted commands and data which prevent data from being transmitted over the network in clear text.

SFTP (Secure File Transfer Protocol)

This is a file transfer protocol that uses Secure Shell (SSH) to secure data transfers. SSH ensures that these type of transmissions use encrypted commands and data which prevent data from being transmitted over the network in clear text.

Token passing

This is a mechanism that uses a digital pass card. Only the system holding the token is allowed to communicate.

SNPA (Subnetwork Point of Attachment)

This is a point in a network that provides subnetwork services; comparable to the layer 2 address corresponding to the NET or NSAP address.

Subnetwork Point of Attachment (SNPA)

This is a point in a network that provides subnetwork services; comparable to the layer 2 address corresponding to the NET or NSAP address.

PIM Dense Mode (PIM-DM)

This is a push method controlled by the source to push multicast information.

PIM-DM (PIM Dense Mode)

This is a push method controlled by the source to push multicast information.

Static Route

This is a route that is manually configured to a remote destination. They can be used to reduce overall traffic because they do not require information to be generated.

zeroconf

This is a standards-based initiative of an IETF working groups whose goals are to: --> Make current computer network administration easier by performing configuration tasks automatically without the need for network services such as DNS or DHCP --> Enable the creation and implementation of a new generation of network related products Accomplish all of this without disrupting the existing network infrastructure of large networks With this standard, you should be able to connect two computers and automatically have them be able to communicate. You should also be able to set up a small network (even a network with multiple subnets or connected to the Internet) by simply connecting devices and without performing any additional configuration tasks.

Rendezvous Point (RP)

This is a temporary connection between a multicast receiver and an existing shared multicast tree. When a volume of traffic crosses a threshold, the receiver is joined to a source-specific tree, and the feed through this point is dropped.

Thinnet

This is a term for the smaller size of coaxial cable used in Ethernet local area networks.

Stub Routing

This is a topology in which the remote router forwards all traffic that is not local to a hub router.

Unicast

This is a transmission method in which packets are sent from a single host to a single host.

Universal Serial Bus (USB)

This is a type of media (cable and connectors) that interface between computer and external devices (hubs, audio players, joysticks, keyboards, telephones, scanners, and printers). A network can be created by linking these cables between multiple computers.

Point-to-Point Protocol over Ethernet (PPPoE)

This is a variation of Point-to-Point Protocol (PPP) that sends PPP packets over an Ethernet network and an "always on" WAN link (DSL or cable modem, for example) rather than over a dial-up connection. In this way, Internet service providers can install PPP-based remote access servers and require remote clients to establish a connection before being granted access to the Internet. This lets Internet usage be better tracked and regulated. This protocol automatically discovers the remote access server using broadcast messages.

PIM (Protocol Independent Multicast)

This is a very important multicast routing protocol that tells the router to ignore any Layer 3 protocol when making multicast-routing decisions (e.g. OSPF and EIGRP).

Backup Marker

This is also known as the archive attribute, indicating that the file has been backed up.

Mailbox-Enabled User

This is an Active Directory user that has a mailbox that is hosted on one of the mailbox servers within an Exchange organization. It can logon to the domain and access resources on the network according to the permissions and groups to which they are assigned. These are the most common type of Exchange recipient.

Mail-Enabled User

This is an Active Directory user the has an e-mail address associated with their account, but whose mailbox is stored on an external mail system. For example, a contractor who is working for the organization but is using their own e-mail address.

Route Map

This is an access list that has the ability to apply logic and make modifications to parameters by using statements that emanate from this term.

Static Routing

This is an addressing method in which IP configuration information must be built and updated manually on each host by an administrator.

SAN (Storage Area Network)

This is an out-of-the-computer storage option for large systems. Instead of storage devices being connected inside of a server (known as Direct Attached Storage (DAS)), storage devices are instead connected to the network and then associated with one or more servers. These allow for greater capacity storage than is possible with DAS, and support high data transfer rates and clustering to provide high availability.

Storage Area Network (SAN)

This is an out-of-the-computer storage option for large systems. Instead of storage devices being connected inside of a server (known as Direct Attached Storage (DAS)), storage devices are instead connected to the network and then associated with one or more servers. These allow for greater capacity storage than is possible with DAS, and support high data transfer rates and clustering to provide high availability.

Rogue DHCP Server

This is an unauthorized DHCP server on the network.

ISDN (Integrated Services Digital Network)

This is another alternative to traditional dial-up that can be used to connect to the Internet or to directly communicate with another computer connected to its network. It is more common in Europe than in the U.S.

Network-Attached Storage (NAS)

This is another method of adding storage capacity to a network. This type of system plugs directly into the network in the same way that workstations and other peripherals do.

Thrashing

This is excessive paging. It occurs when the computer spends too much time passing pages between physical memory and the paging file on a hard drive. A symptom of thrashing is that the CPU is under-used but the I/O system is working exceptionally hard.

Packet Switching

This is ideal for transmitting data that can handle transmission delays, as is often the case with Web pages and e-mail.

Sockets

This is much like a file handle and functions as an endpoint for network communication. Each application creates one of these by specifying the IP address of the host, the type of service (connection oriented, connectionless), and the port that the application is using.

PEAP (Protected Extensible Authentication Protocol)

This is one of the most effective wireless security solutions. it provides authentication, including passwords.

RADIUS (Remote Authentication Dial-in User Service)

This is primarily used for pre-authenticating remote clients before access to the network is granted. This service maintains client profiles in a centralized database. It offloads the authentication burden for dial-in users from the normal authentication of local network clients. For environments with a large number of dial-in clients, This database provides improved security, easier administration, improved logging, and less-performance impact on LAN security systems. The primary benefit of it can be summarized as centralized.

Transceiver

This is responsible for transmitting and receiving network communications. To send signals to the network, the transceiver converts digital data from a PC to digital signals. To receive signals, it converts digital signals from the network to digital data for the PC. Many of these are attached to network interface cards.

NSSA (Not So Stubby Area)

This is similar to a stub area because it does not allow external ASBR routes, but it does allow ASBR routes that originate from within the area. These ASBR routes are flagged as Type 7 LSA packets (NSSA type LSA packets).

Not So Stubby Area (NSSA)

This is similar to a stub area because it does not allow external ASBR routes, but it does allow ASBR routes that originate from within the area. These ASBR routes are flagged as Type 7 LSA packets (NSSA type LSA packets).

L2TP (Layer Two Tunneling Protocol)

This is the VPN protocol that typically employs IPSec as its data encryption mechanism. It is the recommended VPN protocol to use on dial-up VPN connections.

RTO (Retransmit Time-Out)

This is the amount of time in milliseconds that a router will wait for an acknowledgement before sending a reliable packet to a neighbor from the retransmission queue.

Smooth Round Trip Time (SRTT)

This is the average time in milliseconds between the transmission of a packet to a neighbor and the receipt of an acknowledgement.

Successor Route

This is the best route to a destination.

Successor route

This is the best route to a destination.

Virus

This is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found. These are a serious threat to computer systems, especially if they are connected to the Internet. It is often a minimal requirement to have an anti-virus scanner installed on every machine of a secured network to protect against these items. E-mail is the most common means of virus distribution. Often these will employ self-contained SMTP servers to facilitate self-replication and distribution over the Internet. These are able to spread quickly and broadly by exploiting the communication infrastructure of Internet e-mail. For this reason, it is important to keep your anti-virus software updated so as to block any possible attempt of these to infect your systems or to spread to other systems from your system. Floppy disks, downloaded music files, and commercial software CDs all have the potential to spread these, but they are not as common as e-mail.

Route Summarization

This is the consolidation of multiple routes into a single advertisement.

Subnetting

This is the division of a network address into multiple smaller subnets. For example, this allows a single Class B or Class C addresses to be divided and used by multiple organizations.

Personal Area Network (PAN)

This is the interconnection of components, such as laptops, personal digital assistants, printers, mice, keyboards, and other Bluetooth equipped devices, using some form of wireless technology within a personal range (typically 10 meters).

MDBEF (Message Database Encoding Format)

This is the internal format for e-mail messages in Exchange. The Exchange directory database (Dir.edb) is based on (but not entirely identical to) the International Telecommunications Union's X.500 directory recommendations.

Message Database Encoding Format (MDBEF)

This is the internal format for e-mail messages in Exchange. The Exchange directory database (Dir.edb) is based on (but not entirely identical to) the International Telecommunications Union's X.500 directory recommendations.

Recomputation

This is the process of a router comparing routes in search for a new successor route. This occurs when a successor route to a destination goes down and there are no feasible successors for the destination.

TCP/IP

This is the protocol suite used on the Internet and on most networks. Nearly all computers today use this for communication because it is highly scalable and routable.

Punch-Down Block

This is typically used in telephone wiring cabinets to connect individual strands of twisted pair wires. For example, this connects the outside phone lines to inside extensions or phone plugs at the demark (where the local network ends and the telephone company's network begins).

PDM (Protocol-Dependent Modules)

This is used by EIGRP to carry out the requirements specific to independent protocols.

Basic Service Set Identification (BSSID)

This is used by an ad-hoc wireless network with no access points.

EAPoL (Extensible Authentication Protocol over LAN)

This is used for authentication of 802.1X port access control over either wired or wireless LANs.

Extended Service Set Identification (ESSID)

This is used in an infrastructure wireless network that has access points.

Tunneling

This is used primarily to support private traffic through a public communication medium. The most widely known form of this is VPN (Virtual Private Networking). A VPN establishes a secured communications tunnel through an insecure network connecting two systems.

Simple Password Authentication Protocol

This is used to authenticate a user to a network access server.

Sliding Windows

This is used to buffer data transmission between two hosts. Each TCP/IP host maintains two of these: one for receiving and the other for transmitting data. The size of the window is the amount of data that can be buffered on a computer.

Network Time Protocol (NTP)

This is used to communicate time synchronization information between systems on a network.

BootP (Bootstrap Protocol)

This is used to discover the IP address of a device with a known MAC address. It is an enhancement to RARP, and is more commonly implemented than RARP. As its name implies, This is used by computers as they boot to receive an IP address from a likewise server. The address request packet sent by the host is answered by the server.

Schema

This is used to hold the blueprint for Active Directory in Exchange 2007. It defines all of the valid object types and attributes that can be associated with each object type on the Active Directory.

NSAP (Network Service Access Point)

This is used to identify routers and build the topology table in IS-IS.

Network Service Access Point (NSAP)

This is used to identify routers and build the topology table in IS-IS.

Hierarchical Storage Management (HSM)

This is used to monitor the way data is used, then automatically moves data between high- and low-cost storage media in a way that will maximize storage utilization. The bulk of an organization's data is kept on slower devices, then a copy of that data is transferred to faster disk drives when needed. This process optimizes utilization by allowing the high-speed disk drives to act as caches for the slower mass storage devices.

NDS (NetWare Directory Services)

This lets you display a list of shared objects and servers in a NetWare network.

NetWare Directory Services (NDS)

This lets you display a list of shared objects and servers in a NetWare network.

Domain Name

This locates entities (for example, websites) on the Internet. They are managed within a domain name system (DNS), which is a hierarchy that is made up of the following components: . (dot) domain (also called the root domain), Top Level Domains (TLDs) such as .com, .edu, .gov, additional domains such as yahoo.com, microsoft.com, etc.

Tombstone

This marks the fact that someone deleted an object in the directory. When you delete an object in the directory, that item is no longer part of directory replication. Instead, tombstones are replicated to servers to notify them to delete these objects.

HSM (Hierarchical Storage Management)

This monitors the way data is used, then automatically moves data between high- and low-cost storage media in a way that will maximize storage utilization. The bulk of an organization's data is kept on slower devices, then a copy of that data is transferred to faster disk drives when needed. This process optimizes utilization by allowing the high-speed disk drives to act as caches for the slower mass storage devices.

Update Messages

This notify all routers in a network of any updates that have been made within the network.

Broadcast Storm

This occurs when so many messages are broadcast across the network at the same time that they exceed the network's bandwidth.

Layer 3 switch

This operates at the Network layer reading the logical address and making forwarding and receiving decisions. Contrast this with most switches that operate at the Data Link layer which read the MAC address.

IETF (Internet Engineering Task Force)

This organization works to develop solutions to technical problems as they occur on the Internet. They also work to develop Internet standards and protocols.

WAP (Wireless Application Protocol)

This protocol's access points privacy, integrity, and authentication to wireless client devices and using WTLS (Wireless Transport Layer Security). WTLS is a wireless security services protocol. It protects data between the wireless hub/router/access point and all wireless NICs.

Winsock (Windows socket service)

This provides a standard application programming interface to transport protocols such as TCP/IP and IPX. Network applications can use this interface to use the services of the TCP/IP protocol stack.

Nontransit AS Peering

This provides access to a single EBGP peer; excluding all other EBGP peers. This is optimal for scenarios in which a customer is connected to two ISP's networks and wishes to have each ISP's customers use their own connections for communication.

Edge Transport Server

This server handles all Internet-facing mail flow and provides Simple Mail Transfer Protocol (SMTP) relay and smart host services for the Exchange 2007 organization.

Autodiscover Service

This service is used in Exchange 2007, it is designed to make it easier for users to set up their profiles in Outlook or for their Exchange Active Sync devices.

PCI-X

This specification is a high-performance enhancement to the conventional PCI bus specification.

Tombstone Lifetime

This specifies how long a tombstone will exist before the garbage collection process deletes it as well. One of these should be long enough for directory replication to reach every server in your organization.

Mirrored volume

This stores data to two duplicate disks simultaneously. It provides fault tolerance because if one disk fails, data is preserved on the other disk, and the system switches immediately from the failed disk to the functioning disk to maintain service.

Basic Multicast

This supports multicast applications within an enterprise campus. It is an interactive, intra-domain form of multicast that provides integrity within a network when combined with a reliable multicast transport such as PGM.

MIME (Multipurpose Internet Mail Extensions)

This term's primary purpose is allowing users to send attachments along with e-mail messages through the Internet. When you use this method, you can use several different character sets, as well as binary data.

Autosummarization

This transpires when a router that uses a classful routing protocol sends and update about a subnet of a classful network across an interface belonging to a different classful network and assumes that the remote router will use the default subnet mask for that class of IP address.

Reduced Instruction Set Computing (RISC)

This type of computer has a microprocessor that performs a small subset of instructions. This lets it process data more quickly.

SCC (Single Copy Cluster)

This uses shared storage in a failover cluster configuration which allows multiple servers to manage a single copy of storage groups. Because nothing in entity is shared between the nodes, nodes have access to shared data, but cannot access it at the same time.

ODR (On-Demand Routing)

This uses the Cisco Discovery Protocol (CDP) to transfer network information between routers. It makes it possible to find the following types of characteristics about neighboring devices: Device type, IP address, Cisco IOS version being run and Network capabilities.

Wired Equivalent Privacy (WEP)

This was designed to provide wireless networks the same type of protection that cables provide on a wired network. WEP requires that authorized users have a valid WEP key to communicate with the access point. Likewise, cables provide this type of protection in that a client can only communicate with a hub or router if they have an active network cable connected to them. On a wireless network that is employing this, only users with the correct WEP key are allowed to authenticate through the WAP (Wireless Application Protocol) access points. That's the whole point of this term, to prevent unauthorized users by employing a wireless session key for access.

Reverse Path Forwarding (RPF)

This will route traffic away from the source rather than to the receiver.

Shielded Twisted Pair (STP)

Twisted pair cables support a wide variety of fast, modern network standards. Twisted pair cabling is composed of two wires that carry the data signals. PVC plastic insulation surrounds each wire. Two wires are twisted to reduce the effects of electromagnetic interference and crosstalk. Because the wires are twisted, EMI should affect both wires equally and can be cancelled out. Multiple wire pairs are bundled together in an outer sheath. Twisted pair cable can be classified according to the makeup of the outer sheath. This term is a special reference to the twisted pair cable that has a grounded outer copper shield around the bundle of twisted pairs or around each pair. This provides added protection against EMI.

Poison Reverse

Using the split horizon with this method, routers continue to send information about routes back to the next hop router, but advertise the path as unreachable. If the next hop router notices that the route is still reachable, it ignores the information. If, however, the path timeout has been reached, the route is immediately set to unreachable (16 hops for RIP).

Split Horizon

Using this method (also called best information), routers keep track of where the information about a route came from. Routers do not report route information to the routers on that path. In other words, routers do not report information back to the router from which their information originated.

Split Horizon with Poison Reverse

Using this method, routers continue to send information about routes back to the next hop router, but advertise the path as unreachable. If the next hop router notices that the route is still reachable, it ignores the information. If, however, the path timeout has been reached, the route is immediately set to unreachable (16 hops for RIP).

Channels

Web sites that you can customize with a .CDF file to give you only the information that you want to see.

Omni-directional Antenna

Wireless networks require antennas for sending and receiving transmitted signals. An omni-directional antenna disperses a radio frequency wave in an equal 360-degree pattern. This type of antenna is used to provide access to many clients in a radius.

RARP (Reverse Address Resolution Protocol)

With a given host name, this protocol's request will discover the IP address on a network.

Triggered Update

With the triggered update method (also known as a flash updates), routers that receive updated (changed) information broadcast those changes immediately rather than waiting for the next reporting interval. With this method, routers broadcast their routing tables periodically, punctuated by special broadcasts if conditions have changed. This method reduces the convergence time.

Flash Updates

With the triggered update method, routers that receive updated (changed) information broadcast those changes immediately rather than waiting for the next reporting interval. With this method, routers broadcast their routing tables periodically, punctuated by special broadcasts if conditions have changed. This method reduces the convergence time.

Digital Subscriber Line (DSL)

a form of high-speed dial-up connection used to connect remote systems to the Internet. It operates over existing copper phone lines and is an economical choice for homes and small businesses.

System Policy Editor

poledit.exe. is a graphical front-end to the registry included with Windows NT Server that allows you to make registry changes without using the registry editor.

Microsoft Exchange Mailbox store

store A store is a database of Microsoft Exchange information.


Set pelajaran terkait

Pediatric Nursing - NCLEX Cardiac

View Set

Chapter 20- The Circulatory System: Blood Vessels and Circulation Practice Problems

View Set