V

OASIS

Stands for Organization for the Advancement of Structured Information Systems, a nonprofit consortium that promotes Extensible Markup Language (XML) standards.

See Also Organization for the Advancement of Structured Information Systems (OASIS)

object (Active Directory)

An element of Active Directory directory service that represents a network resource.

Overview

Some common types of objects in Active Directory include

Objects have attributes that define and describe them. For example, the attributes of a user object might include the user's name, e-mail address, and phone number. All objects of the same type or class have the same set of attributes, but they are distinguished from each other by having different values for at least one of these attributes. Some attributes are required to have values (such as the First Name attribute of a user object), but other attributes can be optional (such as Telephone Number).

You can group objects by placing them into container objects (containers) such as the following:

Access to an object in Active Directory is based on the object's discretionary access control lists (DACLs), which list the users and groups authorized to access the object and their access levels. You can group objects with similar security requirements into OUs to simplify assignment of permissions to the objects and to facilitate administration and control of network resources. You can assign permissions to objects by using Active Directory Users and Computers, a snap-in for Microsoft Management Console (MMC).

Objects can be referenced by name by using

Notes

When you use Active Directory Users and Computers to view the property sheet for an object, the Security tab, which displays the Active Directory permissions assigned to that object, is usually not visible. Choose Advanced Features from the View menu to make this tab visible.

If you have resources such as shared folders or printers on computers that are not running Windows 2000 or Windows .NET Server, you must manually publish information about these resources in Active Directory if you want users to be able to locate and access them through Active Directory. You do this by adding the appropriate type of object for that resource to Active Directory and having it point to where the resource is located on the network.

When you create a new Active Directory object, you usually use a wizard to specify values for the important attributes of the object. You can specify other attributes after the object is created by opening the property sheet for that object.

See Also Active Directory ,

object identifier (OID)

A numeric value that universally identifies data and syntax elements for certain distributed systems.

Overview

Object identifiers (OIDs) are employed in distributed systems such as X.500 and Lightweight Directory Access Protocol (LDAP) directories, Simple Network Management Protocol (SNMP) management systems, Open Systems Interconnection (OSI) applications, and so on. In the directory arena, for example, OIDs are used to identify the various classes and attributes used by Microsoft Corporation's Active Directory for Windows 2000 and by Novell Directory Services (NDS).

OIDs are assigned by organizations that are recognized as issuing authorities, such as the International Organization for Standardization (ISO), which also maintains a complete list of the world's various issuing authorities. In the United States, for example, the issuing authority is the American National Standards Institute (ANSI).

Examples

In Microsoft's Active Directory directory service, for example, OIDs are used as globally unique identifiers for object classes and attributes. OIDs ensure that when Active Directory is integrated with other directory systems, no conflicts occur, as each attribute and class in Active Directory has an OID that is globally unique. The OID for a class or attribute remains unchanged even when the distinguished name of a directory object is modified because of system configuration changes.

OIDs are expressed in dotted numeric form using an explicitly defined hierarchy of possible values. For example, the OID 1.2.840.113556.1.5.4 represents the Builtin- Domain class of objects within Active Directory. You can determine this by parsing the OID tree as follows:

1           ISO
2           ANSI
840         United States
113556      Microsoft
1           Active Directory Service
5           Classes
4           Builtin-Domain

An example of an object identifier for a different U.S. company might be 1.2.840.105670, where 1.2.840 is assigned to U.S. companies and 105670 is the number assigned to the specific company. Once your company has an object identifier, you can extend it by appending dotted decimal portions. So if 1.2.840.105670 represents Northwind Traders, 1.2.840.105670.27 might represent the Sales division, 1.2.840.105670.33 might represent the Support division, and so on. Further levels of subdivision are also possible.

Notes

If you want to use Active Directory Schema Manager to create a new class of objects or a new attribute in Active Directory, you should first obtain an object identifier for your organization from ANSI, ISO, or some other issuing authority.

See Also Active Directory ,American National Standards Institute (ANSI) ,directory ,International Organization for Standardization (ISO) ,Lightweight Directory Access Protocol (LDAP) ,Management Information Base (MIB) ,Novell Directory Services (NDS) ,Simple Network Management Protocol (SNMP) ,X.500

object linking and embedding (OLE)

A low-level object-oriented technology that was the precursor of the Component Object Model (COM).

Overview

Object linking and embedding (OLE) was an early Microsoft technology for programmatically providing services to applications to support the creation of compound documents. For example, using OLE, you could insert bitmap images, sound clips, spreadsheet files, and other objects into Microsoft Word documents.

The term object linking and embedding comes from the two possible ways in which OLE enabled the creation of compound documents, specifically:

History

The meaning of the term OLE has shifted somewhat since Microsoft Corporation first introduced it in 1991. Version 1 of OLE, referred to as OLE 1, was Microsoft's first mechanism for creating compound documents. OLE 2, the second version of OLE, improved on OLE 1 and expanded the support for creating more complex compound documents. OLE 2 was based on a new model known as the Component Object Model (COM). Microsoft began to recognize that OLE 2 could be used to solve other software problems and that it could be applied to other areas of software development. Microsoft saw OLE 2 as an expandable architecture to create software and, as such, decided to drop the version number. Microsoft also reduced the name from object linking and embedding (OLE) to just OLE , with no spell-out. At that time, OLE referred to any technology based on COM. In 1996, Microsoft introduced the term ActiveX which initially referred using to COM-based technologies on the Internet, but ActiveX also overlapped with OLE. Soon, OLE technologies were being referred to as ActiveX technologies . At that time, Microsoft decided to change the name OLE back to its original name, object linking and embedding (OLE) , and once again use it to refer to technologies for creating compound documents and the linking and embedding of objects.

Architecture

An OLE application can be one or both of the following:

OLE container documents support in-place activation, which allows users to activate an embedded OLE component from within the container document. Activating the component changes the container application's user interface to include features that allow users to directly edit the component from within the container document.

See Also ActiveX ,Component Object Model (COM)

object (programming)

A construct containing data as well as methods (functions for manipulating the construct's data).

Overview

Object-oriented programming (OOP) focuses on objects instead of functions for manipulating separate data entities. The "blueprint" for an object is a class; a specific object is an "instance" of a class that you access using its associated methods. New classes can be derived from more general classes through a procedure called inheritance. The derived class contains all the methods and data of the original class, which can simplify programming.

See Also C++

OBM

Stands for out-of-band management, remotely managing networking and telecommunications equipment using out-of-band (OOB) signaling.

See Also out-of-band management (OBM)

OCSP

Stands for online certificate status protocol, an emerging specification for validating digital certificates.

See Also Online Certificate Status Protocol (OCSP)

OC-x

Stands for optical carrier level, a measure of Synchronous Optical Network (SONET) capacity.

See Also optical carrier (OC-x) level

ODBC

Stands for open database connectivity, a standard method of accessing data stored in relational databases and other structured data sources.

See Also open database connectivity (ODBC)

ODI

Stands for Open Data-link Interface, a legacy network protocol software interface used by early versions of Novell NetWare.

See Also Open Data-link Interface (ODI)

OFDM

Stands for orthogonal frequency division multiplexing, an emerging technology for achieving higher data rates in wireless communications.

See Also Orthogonal Frequency Division Multiplexing (OFDM)

offline browsing

A feature of Microsoft Internet Explorer that allows users to browse cached or subscribed Web content when they are not connected to the Internet.

Overview

Offline browsing is an easy way to browse Web content on a laptop when an Internet connection is not available. Users can surf their history folder to view recently accessed Uniform Resource Locators (URLs). If users click on an unsaved link, they are notified that they are working offline and are asked whether they would like to connect to the Internet to access the resource.

When you add a Web page to your Favorites list, you can specify that the page be available for offline browsing, indicate how deep you want to be able to browse the page's links offline, and specify how you want to keep the offline content up to date. To view the site offline later, you can

To leave Work Offline mode, choose Work Offline from the File menu.

See Also Internet Explorer

Offline Files

A feature of Windows 2000, Windows XP, and Windows .NET Server that lets you continue working with shared network resources after you disconnect from the network.

Overview

Shared files and folders from any computer that supports Server Message Block (SMB)-based file and print sharing, such as those running Windows .NET Server, Windows XP, Windows 2000, Windows NT 4, Windows 98, or Windows Millennium Edition (Me), can be made available for offline use by Windows 2000 or Windows XP clients. These clients that are configured to use offline folders can cache the network resources in a local folder. When disconnected from the network, the client can continue working normally on the cached files. The client can then synchronize the contents of the cache with the network share when the connection is restored.

Offline Files in Windows 2000. Synchronizing with a network share using Offline Files in Windows 2000.

To enable offline file support on a computer running Windows 2000 or Windows XP, open My Computer and choose Folder Options from the Tools menu. Select the Offline Files tab and check Enable Offline Files. Specify synchronization options, a cache size, and additional advanced options. To make a share on the network available for offline use, select the share in My Computer (where it might appear as a mapped network drive) or My Network Places (where it will appear as a network share) and choose Make Available Offline from the File menu. The contents of the network share will be copied to the local computer's cache in a process known as synchronizing. You can specify additional synchronization settings by selecting Settings in the Synchronizing dialog box.

OID

Stands for object identifier, a numeric value that universally identifies data and syntax elements for certain distributed systems.

See Also object identifier (OID)

OLAP

Stands for online analytical processing, a technology that allows users to perform sophisticated data analysis on typically large amounts of enterprise data to gain insight on the information it contains.

See Also online analytical processing (OLAP)

OLE

Stands for object linking and embedding, a low-level object-oriented technology that was the precursor of the Component Object Model (COM).

See Also object linking and embedding (OLE)

OLE DB

A Microsoft technology for universal data access.

Overview

Based on Component Object Model (COM) technologies, OLE DB represents a specification for developing extensible COM interfaces designed to provide applications with uniform methods of accessing data from diverse data sources that can include

OLE DB is a key element in Microsoft Corporation's Universal Data Access (UDA) initiative and facilitates the development of applications that combine various types of queries from diverse data sources. OLE DB is the successor to Microsoft's earlier data access technology, Open Database Connectivity (ODBC), which was limited mainly to relational databases and was based on C/C++ application programming interfaces (APIs) instead of COM.

A related technology called ActiveX Data Objects (ADO) provides a simplified front-end for OLE DB that enables access to diverse data sources through OLE DB using scripting languages such as VBScript and JScript.

Architecture

OLE DB works by enabling COM interfaces to be defined that can encapsulate various types of database functionality such as record containers, query processors, and transaction coordinators. The architecture of OLE DB has three parts:

Examples

As an example of an OLE DB provider, the OLE DB Provider for AS/400 and VSAM enables record-level access to mainframe Virtual Storage Access Method (VSAM) files and to the AS/400 native file system. The OLE DB Provider for AS/400 and VSAM is included with Microsoft Host Integration Server. You use the OLE DB Provider for AS/400 and VSAM to develop applications for discrete data access and for record- level access to physical and logical files on AS/400 systems, in Partitioned Data Sets (PDS) and Partitioned Data Set Extended (PDSE) files, and in most versions of VSAM on mainframes. Using the OLE DB Provider for AS/400 and VSAM, programmers can access mainframe VSAM or AS/400 data using Microsoft's object- based OLE DB data access technology. Programmers can thus access source data from host systems without having to learn about Systems Network Architecture (SNA) or host applications programming. The OLE DB Provider for AS/400 and VSAM facilitates a broad range of data access, from individual records to complete files. Using ActiveX Data Objects (ADO), you can develop web-to-host integration solutions using programming languages such as Microsoft Visual Basic or scripting languages such as Microsoft Visual Basic, Scripting Edition (VBScript), and Microsoft JScript.

Marketplace

OLE DB is the dominant data access technology on the Microsoft Windows platform and is widely used in Online Analytical Processing (OLAP) systems that employ a variety of popular database platforms, including Oracle, DB2, and SQL Server. A competitor to OLE DB is the Java OLAP (JOLAP) initiative, developed by Sun Microsystems, Oracle Corporation, IBM, and Hyperion Solutions Corporation. JOLAP is a specification for creating Java-based interfaces for universal data access, and JOLAP parallels OLE DB in the same way that Java Database Connectivity (JDBC) parallels ODBC.

Notes

The name OLE DB for this technology can be confusing for two reasons:

See Also ActiveX Data Objects (ADO) , Component Object Model (COM) ,database ,Java Database Connectivity (JDBC) ,Java Online Analytical Processing (JOLAP) ,

OLE DB for OLAP

A set of Component Object Model (COM) interfaces and objects that extends OLE DB to allow access to information stored in multidimensional information sources.

Overview

OLE DB for OLAP is included in OLE DB 2 and leverages the OLE DB architecture to enable online analytical processing (OLAP) functions for COM- based applications.

See Also Component Object Model (COM) ,

online analytical processing (OLAP)

A technology that allows users to perform sophisticated data analysis on typically large amounts of enterprise data to gain insight on the information it contains.

Overview

Examples of OLAP analysis include financial modeling, budget forecasting, production planning, and determining broad sales and distribution trends. A query issued in an online analytical processing (OLAP) system could be, "What would be the effect on sales over the next three quarters if the cost of widgets went up 5 percent while sales dropped 15 percent?" OLAP systems primarily focus on queries that ask "What if . . . ?" In other words, OLAP systems are designed for making predictions, modeling scenarios, and supporting decision-making.

The database for an OLAP system is typically structured to allow for efficient retrieval of information. The database can be a data warehouse. A data warehouse is a database that contains static data on a particular subject, drawn from various sources. Queries issued against data warehouses tend to focus on queries that ask "What was . . . ?" or "Who did . . . ?" and are useful for analyzing past sales and growth figures. For example, "What were the total sales for the five largest subsidiaries in the first two quarters of last year?" OLAP systems and data warehouses thus constitute two complementary tools for analyzing and interpreting business data in order to make intelligent decisions.

An OLAP system is typically based on a multidimensional model, which allows users to select, explore, and view the data easily. An OLAP system generally provides the technology for creating and managing the databases. An OLAP system can have tools to discover relationships between data items by comparing the results of various OLAP queries.

Microsoft SQL Server includes tools for data warehousing and online analytical processing, including Data Transformation Services (DTS) Designer and SQL Server OLAP Services (now called Analysis Services). You can use DTS Designer to specify the workflow steps and transactions for combining multiple heterogeneous data sources into a data warehouse. You can then use OLAP Services to analyze the data, preaggregate data into multidimensional cubes for frequently asked queries, model data, create new views, and perform ad hoc sets of calculations.

For More Information

Visit the OLAP Council at www.olapcouncil.org

See Also database

Online Certificate Status Protocol (OCSP)

An emerging specification for validating digital certificates.

Overview

Traditional public key infrastructure (PKI) systems allow recipients of digitally signed documents to check the validity of digital certificates through comparison with a certificate revocation list (CRL), a list of invalid or expired certificates. This has several disadvantages:

As a result of these problems, widespread adoption of digital signatures and certificates in business-to-business (B2B) e-commerce transactions has been slow. To overcome this, the Internet Engineering Task Force (IETF) has developed the Online Certificate Status Protocol (OCSP) specification to speed the process of validating certificates and shift the burden of processing away from the client.

Implementation

OCSP is implemented using strategically placed special servers called responders that maintain up-to-date CRL information. These responders are linked together using OCSP to ensure that they all share common CRL information. When a B2B trading partner sends a client a digitally signed document over the Internet, the client verifies the validity of the certificate by formatting a special request and submitting it to a responder. The responder either issues an authoritative reply such as GOOD, REVOKED, or UNKNOWN, or forwards the request to the trading partner's responder or to a third-party responder for validation.

See Also B2B ,digital certificate ,digital signature ,public key infrastructure (PKI)

OnNow

A power-management design initiative from Microsoft Corporation.

Overview

OnNow combines innovations in PC hardware and software to produce a computer that is always on but appears to be off and that responds immediately when a user or application makes a request. For example, an incoming telephone call could wake the computer and start a Telephony Application Programming Interface (TAPI)-enabled application. OnNow is designed to make personal computers function like appliances in the sense that they respond instantly to user action instead of requiring a warm-up period or boot process. OnNow is based on the Advanced Configuration and Power Interface (ACPI) specification developed by Intel Corporation, Microsoft, and Toshiba Corporation.

The power management functions of Microsoft Windows 2000, Windows XP, and Windows .NET Server, as well as those of Windows 98 and Windows Millennium Edition (Me), conform to the OnNow specifications. Instead of having the system basic input/output system (BIOS) control the power state of the system devices and peripherals, OnNow lets the operating system control it. The operating system can place various devices in a sleep state to conserve power and wake them to full power instantly when a user or application issues a request. For OnNow to function as designed, the system must have peripherals and applications that support OnNow power-management functions and the system BIOS must support ACPI.

For More Information

Find out more at www.microsoft.com/hwdev/onnow.

See Also Advanced Configuration and Power Interface (ACPI)

OOB

Stands for out-of-band signaling, any transmission technology in which signaling is separate from the data being transmitted.

See Also out-of-band (OOB) signaling

OpenBSD

A free version of UNIX.

Overview

OpenBSD is based on the BSD 4.4 operating system and is maintained and supported by a large community of developers. Theo de Raadt, a computer science graduate of the University of Calgary in Alberta, Canada, heads the OpenBSD project. OpenBSD is viewed as one of the most secure UNIX platforms available; even its default installation is fairly hacker-proof. OpenBSD includes support for the Kerberos IV security protocol and Internet Protocol Security (IPsec). OpenBSD also supports binary emulation of most software written for other popular UNIX flavors, such as HP-UX, SunOS, Solaris (SVR4), Linux, and FreeBSD. The current release of the OpenBSD software is version 2.5.

For More Information

Find out more about OpenBSD at www.openbsd.org

See Also UNIX

open database connectivity (ODBC)

A standard method of accessing data stored in relational databases and other structured data sources.

Overview

Microsoft open database connectivity (ODBC) is a database access technology that specifies a series of C/C++ application programming interfaces (APIs) that enable Microsoft Windows-based applications to access data stored in ODBC-compliant databases. ODBC thus defines a call-level interface that lets applications access data in any data source by using a suitable ODBC driver. Therefore, the ODBC APIs allow applications to be written independently of the specific database management systems (DBMSs) that contain their source data.

ODBC was originally a specification developed by an industry consortium called X/Open, which is now known as the Open Group. ODBC defines a call-level interface for implementing queries using structured query language (SQL).

Implementation

The main components of ODBC are:

ODBC uses database drivers to link applications to any ODBC-compliant DBMS. ODBC database drivers are available for more than 50 popular DBMSs, including Microsoft SQL Server, Microsoft Access, Microsoft FoxPro, Microsoft Excel, Paradox, dBASE, and delimited text files. With ODBC, applications are not tied to proprietary vendor APIs and can run independently of the underlying data communication protocols. Data can be sent and received in a format suitable for the application instead of being tailored for a vendor-specific DBMS.

Prospects

Microsoft ODBC was designed for the Windows platform. ODBC is implemented as a set of C/C++ function calls and is thus not easily accessed by other languages, such as Microsoft Visual Basic or Sun Microsystems' Java language. ODBC is considered a legacy technology and has been superseded largely by OLE DB, Microsoft's COM-based specification for enabling universal data access using any programming language. The parallel to ODBC on the Java platform is Java Database Connectivity (JDBC).

See Also Component Object Model (COM) , dynamic-link library (DLL) , Java Database Connectivity (JDBC), Structured Query Language (SQL)

Open Data-link Interface (ODI)

A legacy network protocol software interface used by early versions of Novell NetWare.

Overview

Novell and Apple Computer developed the ODI specification for defining the communication mechanism between network interface card (NIC) drivers and network protocols. Open Data-link Interface (ODI) is a legacy standard that was defined primarily for the Internetwork Packet Exchange (IPX) protocol on Novell NetWare 2.x and 3.x networks. ODI allows multiple NICs to be bound to multiple protocols.

Microsoft's NWLink IPX/SPX-Compatible Transport supports ODI for backward compatibility, but ODI has been superseded on Microsoft platforms by the network driver interface specification (NDIS).

See Also Internetwork Packet Exchange (IPX) ,NetWare ,network driver interface specification (NDIS) ,network interface card (NIC)

Open Shortest Path First (OSPF)

A popular link state dynamic routing protocol for large Internet Protocol (IP) networks.

Overview

Open Shortest Path First (OSPF) is a routing protocol that enables routers on an IP internetwork to dynamically share their routing table information with each other. The Internet Engineering Task Force (IETF) designed OSPF in the 1980s as a replacement for the earlier Routing Information Protocol (RIP), which scaled poorly for large internetworks.

OSPF is an interior gateway protocol (IGP) used for routing traffic within an autonomous system (AS), which is a large IP network managed by a single authority. Since IGPs such as OSPF are used within (not between) autonomous systems, they are sometimes called intra-AS routing protocols (as opposed to inter- AS routing protocols). OSPF is an open standard developed by the IETF, in contrast to Interior Gateway Routing Protocol (IGRP) and Enhanced Interior Gateway Routing Protocol (EIGRP), which are both vendor- specific IGPs developed by Cisco Systems.

OSPF was originally defined in RFC 1131, but this first version of the protocol was experimental and not widely deployed. OSPFv2 is defined in RFC 2328 and is the most widely deployed version of OSPF in use today. The IETF has recently developed OSPFv3, which improves on earlier versions by supporting any network layer protocol (not just IP), streamlines link state advertisements, enhances security, and supports Internet Protocol version 6 (IPv6).

Uses

OSPF is widely used in two areas of networking:

OSPF is supported by the Internetwork Operating System (IOS) used by Cisco routers, and by the Routing and Remote Access Service (RRAS) of Microsoft Windows 2000 and Windows .NET Server.

Architecture

Dynamic routing protocols work by enabling routers to exchange routing table information with each other automatically without administrative intervention. OSPF excels in both the way it stores routing table information and in how it keeps this information current. OSPF is a link state routing protocol, which means that OSPF routers store information about the "state of the link" between the local router and other routers. OSPF stores this information in a link state database, which essentially stores a topological map of all routers in the same administrative portion of the internetwork. This may either be all routers within the autonomous system, or, if the AS is subdivided into different areas, all routers within the local area. Each OSPF router stores this link state database information in the form of a tree whose root is centered on the local router itself.

To construct the link state database, each interface of every OSPF router is assigned a cost value. This cost is generally inversely proportional to the bandwidth of the link the interface is connected to, although different cost values can be assigned as desired to shape the flow of traffic through the network. These cost values are then used to create the metrics for different routes within routing tables, with the route having the least cost being the preferred one.

Once the link state database has been constructed, OSPF routers can then use the Shortest Path First (SPF) algorithm (also called Dijkstra's algorithm) to compute the shortest path between any two subnets in the AS or area. Thus, when traffic needs to be routed from one point of the internetwork to another, the router calculates the optimal path from the link state database and forwards packets accordingly. The SPF algorithm enables routing information to be quickly recalculated if routers go down, a feature called Fast Convergence. The algorithm also ensures that routing loops do not occur.

OSPF routers communicate with each other using HELLO packets, which are sent periodically every 10 to 15 seconds and basically tell other OSPF routers that the sending router is still alive. If an OSPF router does not receive a HELLO packet from another router within an expected time, it assumes that the other router is down and that the link state database is no longer accurate. The router then floods the network with link state advertisements (LSAs) that are picked up by other OSPF routers, and a recalculation of the link state database for all routers is initiated. This recalculation process generally converges quickly, depending on the size of the internetwork and the number of routers used. LSAs contain information about incremental changes to network topology and therefore are efficient in terms of bandwidth usage. LSAs can be secured by either password protection or MD5 checksums.

Implementation

The reason OSPF scales well for large internetworks is because it is hierarchical in design. OSPF allows large autonomous systems to be further subdivided into multiple areas. OSPF routers within an area only need to know about other routers within their own area, not outside their area, and all OSPF routers within a given area share the same link state database. This keeps the routing tables small enough to prevent processing bottlenecks from occurring. OSPF areas within an AS are designated by unique 32-bit identifiers and typically have no more than about 30 or 40 routers within them.

Open Shortest Path First (OSPF). An example of an internetwork using OSPF, showing different types of OSPF routers.

If an AS is subdivided into multiple OSPF areas, one of these areas must be a specially designated area called the backbone area, which has the identifier 0 (zero). Every other area within an AS must be directly connected to the backbone area in hub-and-spoke fashion, and adjacent areas communicate with each other directly between their backbones.

To support this hierarchical router topology, OSPF routers can be designated to operate in one of four different roles:

Advantages and Disadvantages

OSPF has a number of advantages over earlier dynamic routing protocols such as RIP and over other interior gateway protocols such as IGRP and EIGRP, namely:

Notes

When you design an OSPF-based internetwork, you should work from the top down-that is, you should first plan your autonomous system and how it will interact with other autonomous systems, and then you should subdivide the autonomous system into areas and then into individual networks. Try to map your IP address space and subnets to this hierarchy of areas and networks and assign each area a small set of network IDs that can be summarized as a small series of routes. Be sure that areas connect to each other through your high-speed backbone area and not directly to each other. (In other words, avoid back doors.) Specify cost values that relate to the amount of traffic and each router's hardware characteristics.

See Also autonomous system (AS) ,distance vector routing algorithm ,dynamic routing protocol ,Enhanced Interior Gateway Routing Protocol (EIGRP) ,interior gateway protocol (IGP) ,Interior Gateway Routing Protocol (IGRP) ,IPv6 ,Internetwork Operating System (IOS) ,link state routing algorithm ,Routing Information Protocol (RIP) ,routing protocol ,variable-length subnet mask (VLSM)

open source

A philosophy of software development that makes application code freely available.

Overview

Open source is a philosophy of application development that allows code to be read, redistributed, and modified based on the GNU Public License (GPL) formula. The term open source also refers to a loosely organized community of developers dedicated to producing quality software and making it available free or at minimal cost.

Although the open-source operating system called Linux has recently garnered the majority of media attention for this movement, the underlying ideas of open-source software development go back more than 20 years to the early days of the Internet. The development of the BSD UNIX variants FreeBSD, OpenBSD, and NetBSD was a pioneering effort in opening up the UNIX platform for development. From this effort emerged the "hacker" culture of the 1980s (the term hacker originally meant someone who tinkered with software to make it better, not someone who maliciously tried to break into systems). The overriding philosophy of software development within the hacker community was originally that software must be free (without cost to its users), but this sharply ideological attitude alienated many in the corporate world and slowed their acceptance of software developed by the hacker community.

In 1998 the term open source was coined to replace the confrontational free software label and promote acceptance of this philosophy in the corporate arena. The result has been an acceleration of interest in open source applications and development by enterprises over the last few years, pushed along by large investments in Linux and other open-source technologies by companies such as IBM, Sun Microsystems, Compaq Computer Corporation, and others. The result is that today many open-source applications are packaged and sold by commercial software vendors. These vendors also provide technical support and customization services for their open-source packages, a critical factor in helping open-source software gain acceptance in the corporate world.

Marketplace

Some of the more popular open-source applications and platforms include

For More Information

Visit the Open Source Initiative (OSI) at www.opensource.org

See Also Apache ,GNU General Public License (GPL) ,Linux ,UNIX

Open Systems Interconnection (OSI) reference model

An architectural model for computer networking developed by the International Organization for Standardization (ISO).

Overview

The ISO began work on the Open Systems Interconnection (OSI) model in 1974 to address the problem that the various networking systems being developed at that time could not communicate with each other. The OSI model was intended as a reference model to which vendor-specific networking systems could be compared so that interoperability solutions could be developed. The OSI model was thus intended to allow heterogeneous systems to communicate easily with each other in an open, standardized fashion and to provide a basis for developing standardized network protocols.

Uses

The primary use for the OSI model is as a starting point for understanding how real-world networking protocols work. In other words, the OSI model is a "reference model" to which such protocols as Transmission Control Protocol/Internet Protocol (TCP/IP), DECnet, and Systems Network Architecture (SNA) can be compared. These real world-protocols generally map only loosely to the OSI reference model, however, and usually omit some of the functions, or even levels, of the OSI model. TCP/IP, for example, maps to only four levels of the OSI model-namely, the physical, network, transport, and application layers.

Another popular use of the OSI model is to simplify the process of troubleshooting networking problems. The basic idea is that upper layer protocol functions cannot work unless all lower layer functions first work properly. This means that when you troubleshoot a network problem, you should generally begin with lower-layer issues (addressing such questions as "Is the cable connected?" and "Does the network card have an IP address configured?") before progressing to testing upper layer issues ("Is the httpd daemon running on the Web server?" or "Are the routing tables up to date?"). As such, the OSI model can probably be said to be the networking professional's fundamental troubleshooting tool, as it guides the whole troubleshooting process.

Architecture

The premise behind the OSI model is that communication between hosts on a computer network is too complex a phenomena to be understood as a unity and that it can best be understood by breaking it down into simpler components. The ISO adopted a layered approach in which the OSI model was divided into seven logical layers. Each layer deals with a certain aspect of communications, and upper layers utilize the functions of lower layers to make network communications possible.

You can think of each layer as being logically connected to the same layer on a different computer on the network. For example, the application layer on one machine communicates with the application layer on another machine. But this communication is logical only; physical communication occurs when packets of data are sent down from the application layer of the transmitting computer, encapsulated with header information by each lower layer, and then put on the wire at the transmitting computer's physical layer. After traveling along the wire, the packets are picked up by the receiving computer's physical layer, passed up the seven layers while each layer strips off its associated header information, and then passed to the receiving computer's application layer, where the receiving application can process the data.

The first table lists the seven layers of the OSI model, starting with the lowest layers and working upward, and provides a brief description of the communications functions that operate at each level. The second table provides examples of networking protocols that operate at each layer of the OSI model.

Description of Layers of OSI Model

Layer

Description

Physical

Defines network transmission media, signaling methods, bit synchronization, architecture (such as Ethernet or Token Ring), and cabling topologies. Defines how network interface cards (NICs) interact with the media (cabling).

Data-link

Specifies how data bits are grouped into frames, and specifies frame formats. Responsible for error correction, flow control, hardware addressing (such as MAC addresses), and how devices such as hubs, bridges, repeaters, and Layer 2 switches operate. The Project 802 specifications divide this layer into two sublayers, the logical link control (LLC) layer and the media access control (MAC) layer.

Network

Defines logical host addresses such as IP addresses, creates packet headers, and routes packets across an internetwork using routers and Layer 3 switches. Strips the headers from the packets at the receiving end.

Transport

Sequences packets so that they can be reassembled at the destination in the proper order. Generates acknowledgments and retransmits packets. Assembles packets after they are received.

Session

Defines how connections can be established, maintained, and terminated. Also performs name resolution functions.

Presentation

Translates data to be transmitted by applications into a format suitable for transport over the network. Redirector software, such as the Workstation service for Microsoft Windows NT, is located at this level. Network shells are also defined at this layer.

Application

Connects user applications with network functionality, controls how applications access the network, and generates error messages. Protocols at this level include HTTP, FTP, SMTP, and NFS.

Examples of Network Protocols Operating at Each Layer of OSI Model

Layer

Protocols

Physical

802.3, 802.5, 10BaseX, 100baseX, 1000BaseX, RS-232, V.35, HSSI, FDDI, PPP, DSL, ISDN, Frame Relay, ATM

Data-link

HDLC, SDLC, LAP, LAPB, AAL, SLIP, PPTP, L2F, L2TP, ARP, RARP

Network

IP, ICMP, IGMP, BOOTP, DHCP, IPX, NetBIOS, NetBEUI, APPN, IS-IS, IGRP, EIGRP, BGP, OSPF

Transport

TCP, UDP, SPX, RAS, ATP, NBP, ASP, DVMRP, RTP

Session

LDAP, DNS, RPC, PAP, SSL, TLS

Presentation

ASN.1, LU6.2, Postscript, 3270 Data Stream

Application

HTTP, SMTP, FTP, POP3, IMAP4, Telnet, SNMP, TFTP, RLOGIN, SMB, NLP, NDS, SAP, NCP, X-Windows

Implementation

Although some vendors attempted to develop networking protocols fully compliant with the OSI model, these attempts by and large failed for several reasons:

The U.S. government originally tried to require compliance with the OSI reference model for U.S. government networking solutions in the late 1980s by implementing standards called Government Open Systems Interconnection Profiles (GOSIPs). This effort was abandoned in 1995, however, and today virtually no real-world implementations of OSI model protocols exist outside of Europe, and only a few European governments still use OSI model protocols in specialized systems. Instead, the TCP/IP protocol suite has become the de facto world standard for computer networking.

See Also application layer ,data-link layer ,International Organization for Standardization (ISO) ,Internet Engineering Task Force (IETF) ,network layer ,physical layer ,presentation layer ,session layer ,Transmission Control Protocol/Internet Protocol (TCP/IP) ,transport layer

optical carrier (OC-x) level

A measure of Synchronous Optical Network (SONET) capacity.

Overview

The optical carrier (OC-x) levels represent a set of signaling rates for SONET transmission over fiber-optic cabling. The basic unit is OC-1, which represents an aggregation of 810 DS-0 circuits, each having a capacity of 64 kilobits per second (Kbps), resulting in a total OC-1 capacity of 51.84 megabits per second (Mbps). In SONET transmission, however, 30 of these DS-0 circuits are required for protocol overhead, making the actual data throughput of OC-1 only 50.112 Mbps. A single OC-1 circuit is roughly equivalent to a T3 circuit in the telco T-carrier system. Higher data transmission rates (OC-3, OC-12, and so on) are simply multiplexed OC-1 circuits-in other words, OC-3 is three times faster than OC-1 and so on. The table shows the common OC-x transmission rates used in carrier-class SONET circuits.

Much of the SONET fiber used in the backbone of the Internet still runs at OC-48, although inter-exchange carriers (IXCs) and other carriers are upgrading to higher speeds. AT&T was the first IXC to deploy an OC-192 trunk from coast to coast across the United States, and UUNET, Genuity, and Cable and Wireless also have OC-192 links deployed.

Common Optical Carrier Levels

Level

Line Rate

Payload Rate

OC-1

51.840 Mbps

50.112 Mbps

OC-3

155.520 Mbps

150.336 Mbps

OC-12

622.080 Mbps

601.344 Mbps

OC-24

1.244160 Gbps

1.202688 Gbps

OC-48

2.488320 Gbps

2.405376 Gbps

OC-96

4.976640 Gbps

4.810752 Gbps

OC-192

9.953280 Gbps

9.621504 Gbps

Notes

OC-x levels also apply to Asynchronous Transfer Mode (ATM) networks. For wireline communications, electrical levels called Synchronous Transport Signal (STS) correspond directly to SONET optical carrier levels. For example, the OC-3 rate for SONET corresponds to the STS-3 rate for electrical transmission.

See Also inter-exchange carrier (IXC) ,Internet ,Synchronous Optical Network (SONET) ,T-carrier

optical Ethernet

More commonly called metropolitan Ethernet, the process of using Gigabit Ethernet to provision metropolitan areas with high-speed data services.

See Also metropolitan Ethernet

optical networking

End-to end networking without conversion of electrical signals into optical and back again.

Overview

Traditional optical networks use fiber-optic backbones in local area networks (LANs) or long-haul fiber in wide area networks (WANs). Such networks are not "optical," however, as only a portion of the network (backbone or WAN link) employs light signals traveling over fiber-optic cabling, while the remainder of these networks involves electrical signals traveling over copper cabling. The main reason that all-optical networks have not yet become commonplace is that routing and switching functions have traditionally been implemented at the electrical level, as there has been no easy way to switch light signals themselves. As a result, traditional networks employ devices that transform electrical signals into optical ones and back again.

This situation, however, is just beginning to change as new technologies are being developed to create all- optical switches and routers. Companies in the forefront of research in this area include Cisco Systems, Nortel Networks, Lucent Technologies, and several startups. Some of the technologies being developed include switches that route light signals of a given wavelength using

Uses

Initial uses for optical switches and routers are likely to be in carrier-class switching equipment used by service providers and telcos. Some analysts expect such equipment to become widely available about 2005. Enterprise networks may also want to deploy such equipment in their high-speed switched backbones, but this will not likely become popular until several years later due to initial costs of such equipment. Eventually all-optical mesh networks may displace traditional Synchronous Optical Network (SONET) ring architectures in the metropolitan area network (MAN) arena and in cross-connects for long-haul circuits. SONET was originally designed to support time-sensitive voice traffic and is not efficient for carrying packetized data. About half of the capacity of SONET rings in the MAN environment is currently used for data, but the proportion of data to voice traffic is rising rapidly, a critical factor in driving research and development into new optical switching technologies.

Notes

The term optical networking is sometimes incorrectly used to refer to either metropolitan Ethernet (also called optical Ethernet) or lambda switching technologies.

See Also fiber-optic cabling ,lambda switching ,metropolitan Ethernet ,Synchronous Optical Network (SONET)

opto isolator

A device for electrically isolating networking components that are joined by long runs of copper cabling.

Overview

Opto isolators are commonly used in RS-232 serial connections between mainframe hosts and terminals connected by long cables. Opto isolation is typically built into line drivers for serial communication, so separate opto isolators are not required. Opto isolators also prevent ground loops from damaging networking components.

Implementation

When a network component or cable transmitting a signal is connected to one port on an opto isolator, the signal is converted briefly into light and then back into an electrical signal before exiting through the other port on the opto isolator. This brief metamorphosis from electric current into light and back again breaks the electrical connection between the two ports of the device, allowing the signal (alternating current) to flow but preventing direct current from flowing along the cable.

Opto isolator. Using an opto isolator to eliminate ground loops.

See Also ground loop ,RS-232 ,serial transmission

Orange Book

Another name for the publication Trusted Computer Systems Evaluation Criteria (TCSEC), published by the National Computer Security Center (NCSC) of the U.S. Department of Defense (DoD).

Overview

Orange Book standards are used to evaluate the security of both stand-alone and network operating systems (NOSs). The current version of this publication dates from 1985. The Orange Book, which was named for its orange cover, is actually a part of a series of computer system security guidelines and standards that are collectively known as the Rainbow Series.

The Orange Book provides methods of assessing the security of a specific computer system, and it offers hardware and software manufacturers guidance on how to create products that can be certified as secure by the U.S. government and military.

For example, Microsoft Windows NT Server in certain configurations complies with the C2 (Controlled Access Protection) security standards outlined in the Orange Book. C2 is applied not to operating systems but to specifically tested physical computers running those operating systems. C2 is one of a family of security designations that the Orange Book applies to computer systems, which include the following:

organizational unit (OU)

A container object used in Microsoft Active Directory directory service to group together other objects within a domain.

Overview

Organizational units (OUs) are logical groupings of resources within a domain. An OU can contain a variety of objects, including users, groups, computers, printers, or even other OUs. OUs are essential to the scalability of Active Directory as they allow objects in a domain to be hierarchically organized in tree-like structures for easier administration. OUs thus simplify the management of Active Directory domains by allowing different administrative tasks to be delegated to different people.

OUs are often used to duplicate the organizational structure of the company within Active Directory. For example, a company might have OUs named Dev, Marketing, and Sales that represent the network resources of these three departments. OUs can also be assigned according to geographical criteria (New York, Los Angeles, and Detroit, for example) or by administrative function (Accounts, Shares, and Printers).

If several domains are connected into a domain tree, each domain can have its own specifically designed hierarchy of OUs. The structures of domains within a domain tree are independent of one another. However, an OU can contain objects only from its own domain, not from any other domain within a domain tree.

Implementation

When you run the Active Directory Installation Wizard to install Active Directory on a member server running Windows 2000 (thus turning the member server into a domain controller), a hierarchy of default OUs is created. This default hierarchy helps you begin administering Active Directory. It consists of the following default OUs, which you can display by using Active Directory Users and Computers, a snap-in for Microsoft Management Console (MMC):

OUs are displayed in Windows 2000 administrative consoles as folders, much like the folders in a file system that store individual files. You can create OUs for groups of users who will be assigned similar permissions to network resources. You can also create separate OUs for permanent and temporary employees. You can group shared folders and printers with similar security requirements into OUs.

You should create OUs that are stable and will not change frequently, and you should avoid making the hierarchy of OUs too complicated. In a multidomain scenario with a domain tree, it is usually a good idea to make first-level OUs the same for all domains to provide consistency for the company's network resources. First-level OUs typically represent the following:

When migrating from Windows NT to Windows 2000, you can also create OUs to replace resource domains, which are used in Windows NT to simplify and centralize administration of network resources. You can also create domain trees with separate domains for resources. You should create new domains instead of OUs if you want to implement different security policies in different locations or branches of your company or in an extremely large enterprise. Otherwise, it is simpler to create only one domain and organize resources and administrative tasks using OUs within that domain.

OUs are useful in facilitating the administration of Active Directory and therefore in the administration of resources on the network itself. Administrators use OUs to organize users and resources on the network and to delegate administrative and other rights and permissions to users and groups. The administrator has full access rights on all objects in the directory and can assign permissions to various subtrees of OUs for appropriate users and groups. For any OU, the administrator can delegate either of the following rights to specific users and groups:

Access to objects in Active Directory is based on discretionary access control lists (DACLs), which offer a security model similar to that used in the NTFS file system. Because objects with similar security requirements are grouped into an OU, permissions assigned to the OU are inherited by all objects in the OU. You assign permissions to OUs and other objects by using Active Directory Users and Computers.

Notes

OUs are not part of the namespace of a company, which in Windows 2000 is based on the Domain Name System (DNS). In other words, you can identify a Windows 2000 domain by using a DNS name such as northwind.microsoft.com, but you cannot identify OUs within the domain by using DNS names. However, you can specify OUs by using Lightweight Directory Access Protocol (LDAP) names.

See Also Active Directory , Active Directory Users and Computers ,domain (DNS) ,Domain Name System (DNS) ,domain tree ,Lightweight Directory Access Protocol (LDAP) ,

Organization for the Advancement of Structured Information Systems (OASIS)

A nonprofit consortium that promotes Extensible Markup Language (XML) standards.

Overview

The Organization for the Advancement of Structured Information Systems (OASIS) is a vendor-neutral international organization that strives to develop and promote standards for structured information systems. OASIS was originally formed in 1993 as SGML Open and initially focused on the Standardized Generalized Markup Language (SGML). The name was changed to OASIS in 1998 to reflect the changed focus on XML-based standards and solutions. OASIS acts as a clearinghouse for standards and information concerning structured information systems and helps vendors design products that comply with open XML-based standards.

Together with the United Nations/CEFACT body, OASIS has been active in the development of the Electronic Business Extensible Markup Language (ebXML) standard, a new XML standard for simplifying the exchange of information between business partners to promote e-commerce. OASIS also sponsors the XML.ORG site as a reliable source of information regarding XML standards.

For More Information

Visit OASIS at www.oasis-open.org

See Also Electronic Business Extensible Markup Language (ebXML) ,XML

Orthogonal Frequency Division Multiplexing (OFDM)

An emerging technology for achieving higher data rates in wireless communications.

Overview

Orthogonal Frequency Division Multiplexing (OFDM) is an emerging signal modulation technology for high- speed communications. While OFDM can be employed in both wireless and wireline communication systems, the technology is mainly being developed to enhance transmission speeds of cellular communications systems beyond the range of emerging third-generation (3G) systems. Other improvements that OFDM provides include overcoming line-of-site (LOS) communications problems, extending the range and subscriber coverage areas of cellular communication systems, and overcoming antenna size issues relating to fixed wireless communications.

Prospects

Current work on OFDM involves harmonizing competing standards developed by the Institute of Electrical and Electronic Engineers (IEEE) and the European Telecommunications Standards Institute-Broadband Radio Access Networks (ETSI-BRAN) standards bodies. Practical OFDM systems are under development by AT&T and others for future fourth-generation (4G) cellular communication systems. Another example is Flarion Technologies, a spin-off from Lucent Technologies, which is developing an OFDM signal-processing scheme called Flash OFDM.

See Also 3G ,cellular communications ,wireless networking

OS/2

A network operating system from IBM.

Overview

OS/2 is a 32-bit operating system that was originally developed by IBM and Microsoft Corporation as a replacement for the 16-bit text-based Microsoft Disk Operating System (MS-DOS). After Microsoft left the project to focus on its own Microsoft Windows operating system, IBM continued to develop OS/2, which is now called OS/2 Warp and includes both server and desktop versions.

IBM's current line of OS/2 software includes the OS/2 Warp Server, the OS/2 Advanced Warp Server, and the OS/2 Warp 4 client. OS/2 Warp in its various forms is a 32-bit preemptive multitasking operating system that supports application, file and print, groupware, and Web server configurations as well as desktop workstations. OS/2 Warp Server includes symmetric multiprocessing support and clustering technologies for high-availability server environments. OS/2 Warp Server supports most common networking protocols and all types of clients, including Microsoft Windows, Apple Macintosh, and AIX clients.

For More Information

Visit OS/2 Warp online at www.software.ibm.com/os/warp.

See Also Microsoft Windows ,network operating system (NOS)

OSI model

Stands for Open Systems Interconnection model, a reference model for computer networking developed by the International Organization for Standardization (ISO).

See Also Open Systems Interconnection (OSI) reference model

OSPF

Stands for Open Shortest Path First, a popular link state dynamic routing protocol for large Internet Protocol (IP) networks.

See Also Open Shortest Path First (OSPF)

OS X

A new operating system for the Apple Macintosh computing platform.

Overview

Mac OS X represents a radical departure from earlier versions of the Mac OS. Unlike earlier versions, the OS X kernel called Mach is based on a version of the UNIX operating system called BSD 4.4. This radical departure allows the Macintosh platform to marry its advanced graphical user interface and multimedia features with the stability and reliability of the well-tested UNIX platform.

Other enhancements in Mac OS X include

See Also Macintosh ,UNIX

OU

Stands for organizational unit, a container object used in Active Directory directory service to group together other objects within a domain.

See Also organizational unit (OU)

Outlook

Microsoft Corporation's premier mail client and full-featured desktop information-management application.

Overview

Microsoft Outlook, which is part of the Microsoft Office suite, enables users to manage their messages, appointments, contacts, tasks, and activities. It also integrates with other Office applications at the front end and with Microsoft Exchange at the back end to enable users to collaborate using e-mail, calendar, contact lists, task lists, journals, and notes. Outlook is a full Messaging Application Programming Interface (MAPI) client and interoperates with all e-mail systems that support MAPI.

Outlook can be run as a stand-alone application or as part of the Office suite. Outlook's advanced features include the following:

For More Information

Find out more about Microsoft Outlook at www.microsoft.com/outlook.

See Also e-mail

Outlook Express

A basic Internet mail and news client included with Microsoft Internet Explorer version 4 and later.

Overview

Microsoft Outlook Express replaces the older Microsoft Internet Mail and News client included with Internet Explorer 3 and includes the following features:

out-of-band management (OBM)

Remotely managing telecommunications equipment using out-of-band (OOB) signaling.

Overview

Out-of-band management (OBM) is a popular method of remotely managing the wide area network (WAN) telecommunications components. OBM manages devices "outside of the normally used bandwidth," in other words, using a separate communications link than the one being used for data transmission. These out-of-band (OOB) links are typically secondary serial communication links. WAN devices typically managed using OOB include routers, switches, access servers, multiplexers, and Channel Service Unit/Data Service Units (CSU/DSUs). Devices that can be managed out of band usually have an RS-232 port or some other kind of serial interface for remote control of their functions.

OBM offers several advantages over in-band management systems such as Simple Network Management Protocol (SNMP) management systems. For one thing, OBM is more secure than in-band management since it typically uses a dedicated serial link for management purposes, Also, SNMP employs the network itself for communication, so if the WAN link goes down, the remote station cannot use SNMP to determine the problem because SNMP functions only if the WAN link is working. OBM is often used as a backup system for in-band SNMP management, when the devices have limited SNMP support, or when the cost of an SNMP management system cannot be justified. You can often manage a device in-band by using a remote Telnet client for entering the same commands that are used in OBM.

Implementation

In a typical OBM setup, a remote PC is connected by a modem through a phone line to a code-operated switch located at the office local area network (LAN). This switch controls networking and telecommunication devices such as routers, bridges, switches, CSUs, and even power supplies through their RS-232 serial connections. Alternatively, the modem might be connected directly to a remote modem connected to the device being managed. In either case, the result is a separate low-cost dial-up circuit connecting the administrator and the network devices that is independent of the main network connection, which is usually a more expensive T1 or other leased line. The administrator can thus access the WAN device from a remote location even when the WAN link itself is down, and can troubleshoot the problem from off-site. OBM also allows administrators to access and configure WAN devices without disturbing the WAN link itself.

You could use OBM functions on a power supply to remotely reboot or reset your network devices when they go down. You can use out-of-band switches to select different serial interfaces remotely over a modem by issuing simple ASCII commands to different devices. You can even use OBM to remotely configure and control devices on your network. OBM devices are a useful part of a network disaster recovery plan.

Out-of-band management (OBM). Managing WAN hardware out-of-band.

For networking devices that you can configure and troubleshoot using out-of-band connections, you usually perform management tasks by connecting to a serial port (also called the setup port or configuration port) either locally with a cable or remotely through a modem. You usually use text-based commands from a terminal emulator program such as Windows HyperTerminal, which can emulate a VT100 terminal. You can often control access using passwords for extra security.

You can often use out-of-band transmission so that a device that enters a problem state calls an administrator's pager through a modem. The administrator can then dial in to the device remotely and correct the problem. Some network devices include built-in modems and data switches for remote OBM.

OBM is also used in other areas-for example, servers are often built with OBM capabilities and when they enter a problem state can also take advantage of an OOB connection to deliver an alert.

See Also out-of-band (OOB) signaling ,Simple Network Management Protocol (SNMP) ,wide area network (WAN)

out-of-band (OOB) signaling

Any transmission technology in which signaling is separate from the data being transmitted.

Overview

Out-of-band (OOB) signaling uses one or more channels for transmitting data or voice information and one special out-of-band channel for performing signaling functions such as establishing and terminating the communication link, controlling flow, or transmitting error information. The out-of-band channel can be

The opposite of out-of-band is in-band, in which signaling information is sent over the same channel as the data transmission. Out-of-band transmission is usually considered a better choice than in-band transmission for the following reasons:

Notes

Out-of-band circuits are often used for out-of-band management (OBM) of wide area network (WAN) devices. These are usually physically separate dial-up lines.

See Also in-band signaling ,

outsourcing

Contracting business functions to external companies.

Overview

Outsourcing of IT (information technology) needs has been an increasing trend in recent years, but such outsourcing is not new. Broadly speaking, for the first few decades of the computing era outsourcing reigned supreme as companies either leased mainframe technology and staff or bought time-sharing services from mainframe computing centers. The client/server revolution of the 1980s then saw the rise of in-house IT departments as large companies sought to gain strategic control of their own IT services and smaller companies tended to rely more on outsourcing deployment and troubleshooting services to consultants and system integrators. In the late 1990s, however, the pendulum began to swing back toward outsourcing a larger share of IT functions. This happened for several reasons:

Today, common outsourced IT functions and services include application hosting, messaging, disaster recovery, enterprise resources planning (ERP), customer relationship management (CRM), supply-chain logistics management, and help desk functions.

Marketplace

The big three companies in the enterprise IT outsourcing arena are EDS, Computer Sciences Corporation, and IBM Global Services. These companies together service the largest share of the corporate outsourcing market, but dozens of ASPs and other service providers have arisen in the last few years to compete in this arena. In 2000, the total IT outsourcing market was estimated at over $100 billion and was growing at over 10 percent a year.

See Also application service provider (ASP) ,Customer Relationship Management (CRM) ,enterprise resource planning (ERP) ,Management Service Provider (MSP)

owner

The user ultimately responsible for the permissions assigned to a file, usually the creator of the file.

Overview

In the NTFS file system, for example, a file stored on an NTFS volume always has an owner. Ownership creates a trail of accountability for actions performed on the file. By default, a file's owner has permission to modify the object's discretionary access control list (DACL) by granting users and groups permissions for various objects.

The ownership of a file on an NTFS volume can be changed in two ways:

Notes

In the Microsoft Windows 2000 and Microsoft .NET Server operating systems, objects in Active Directory directory service also have owners. The user who creates an object in Active Directory becomes the object's owner. The owner controls the permissions for the object and its attributes. Ownership of an object in Active Directory can be changed in ways similar to those for a file on an NTFS volume.

See Also NTFS file system (NTFS)



Microsoft Encyclopedia of Networking
Microsoft Encyclopedia of Networking
ISBN: 0735613788
EAN: 2147483647
Year: 2002
Pages: 36
Authors: Mitch Tulloch, Ingrid Tulloch
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net