Page #36 (U)

V.35

A popular serial transmission interface found on routers.

Overview

V.35 defines a high-speed physical interface for synchronous serial communication between data terminal equipment (DTE) and data communications equipment (DCE). V.35 is part of the V-series standards developed by the International Telecommunication Union (ITU) and is widely used in the networking industry.

V.35 uses balanced lines for signaling and unbalanced lines for sending control information. The standard supports transmission rates of up to 1.544 megabits per second (Mbps) over distances of up to 4000 feet (1200 meters). The V.35 interface is typically used to connect routers and other wide area network (WAN) access devices to Channel Service Unit/Data Service Units (CSU/DSUs) to build WANs using T1 lines.

V.35.

Typical V.35 connector format.

V.35 uses a block-shaped 34-pin block connector for implementing these DTE-to-DCE connections, but you can also use V.35-to-RS-232 gender changers to connect V.35 equipment using 25-pin (DB25) serial cables.

Notes

Although the V.35 standard was replaced by the V.10 and V.11 standards in 1988, it remains one of the more popular DTE/DCE interfaces for local area network/wide area network (LAN/WAN) connectivity.

Notes

Although the V.35 specification tops out at speeds of 1.544 Mbps, routers from most vendors support higher speeds in their implementation of the V.35 interface, with some as high as 10 Mbps. Nevertheless, if you need WAN links faster than T1 speeds, you will probably need to use a router with a high-speed serial interface (HSSI) port instead of V.35.

See Also Channel Service Unit/Data Service Unit (CSU/DSU) , data communications equipment (DCE) ,data terminal equipment (DTE) ,High-Speed Serial Interface (HSSI) ,International Telecommunication Union (ITU) ,router ,serial transmission ,T1 , wide area network (WAN)

V.90

A popular high-speed modem standard.

Overview

V.90 is part of the V-series standards developed by the International Telecommunication Union (ITU). V.90 evolved from two earlier modem standards: the x2 modem technology developed by U.S. Robotics (later bought by 3Com Corporation) and the K56flex modem technology developed by Rockwell. V.90 modems theoretically support downstream communication at 56 kilobits per second (Kbps) and upstream at 33.6 Kbps (upstream transmission is implemented using the same method as the older 33.6 Kbps V.34bis modem standard). V.90 downstream transmission is limited by several factors:

V.90. Comparison between V.90 and earlier modem standards.

V.90 modems have proved enormously popular for dial-up Internet access. Some industry analysts estimate that there are almost 100 million V.90 modems in use around the world. Although use of broadband Internet using Digital Subscriber Line (DSL) and cable modems is increasing, analysts estimate that V.90 modems will continue to remain the dominant solution until around 2004.

See Also cable modem , crosstalk ,Digital Subscriber Line (DSL) ,Internet access ,modem ,Public Switched Telephone Network (PSTN) ,serial transmission ,

V.92

The latest high-speed modem standard from the International Telecommunication Union (ITU).

Overview

V.92 is an emerging standard that provides the same 56 kilobits per second (Kbps) theoretical downstream speeds as the earlier V.90 modem standard. V.92, however, offers some significant enhancements over V.90 modem technology, specifically:

Marketplace

V.92 modems are being developed by a number of modem manufacturers, including U.S. Robotics, Lucent Technologies, Motorola, PCTEL, and several others.

Issues

Because of these features, V.92 appeals to enterprises using modem pools for remote access to corporate networks. Faster call setup and faster upstream speeds mean shorter remote access sessions and hence lower costs. This can be particularly significant when remote access is performed over long-distance telephone lines.

On the other hand, some Internet service providers (ISPs) may be reluctant to implement V.92, because users may leave their modems connected to the Internet all the time. This may mean greater costs for ISPs, who may have to add additional modem pools to handle the longer connection times (the average dial-up Internet access session is estimated by some analysts at 30 minutes).

See Also International Telecommunication Union (ITU) , modem ,remote access ,

value entry

A data entry in the Microsoft Windows registry.

Overview

Value entries are contained in keys and are analogous to variables. They consist of three parts:

Some of the various data types supported by Windows 2000,Windows XP, and Windows .NET Server are shown in the table. Applications can also define other data types when required.

Examples of Value Entry Data Types

Data Type

Description

REG_BINARY

Raw binary data, usually displayed in the registry editor in hexadecimal format

REG_DWORD

Data represented by a number that is 4 bytes long and is displayed in the registry editor in binary, hexadecimal, or decimal format

REG_EXPAND_SZ

An expandable data string (text that contains a variable that is replaced when called by an application)

REG_MULTI_SZ

A multiple string, typically used for lists that are in human- readable text with entries separated by NULL characters

REG_SZ

A sequence of characters in human-readable text, typically used for descriptive information

See Also key (registry) ,registry

variable-length subnet mask (VLSM)

A technique for conserving Internet Protocol (IP) addresses.

Overview

Variable-length subnet mask (VLSM) was developed in response to shortages in the available pool of IP addresses. Large IP internetworks consisting of multiple subnets typically use assigned IP address blocks inefficiently. This is because although different subnets often have different numbers of hosts, network architects usually design IP internetworks using a single "one size fits all" subnet mask.

For example, consider an enterprise assigned the class B network ID 181.63.0.0 that has hosts among four networks. The number of nodes on each network is 600 on network A, 400 on network B, 200 on network C, and 2 for network D (network D is a dedicated leased line, and because this is a form of point-to-point connection, only two nodes are on the network). The simplest scheme for subnetting the network into four parts would be to use the same subnet mask for each network, namely 255.255.252.0, which can support 1022 hosts per subnet. Because there are four subnets, this subnet mask means we are using 4088 IP addresses from the available pool of 65,534 associated with the class B address. But in fact we are only using 600+400+200+2=1202 of these 4088 addresses, and so 2886 addresses are essentially wasted.

VLSM reduces the amount of wasted addresses by selecting a subnet mask closest to the needs of each network. In the above scenario, this means:

Using VLSM, we have reduced the number of wasted addresses from 2886 (when using a fixed subnet mask scheme) to only 522+110+54=686 addresses, a savings of 2200 addresses.

To use VLSM in the enterprise, a routing protocol supporting VLSM must be employed for communication between routers. Although some routing protocols exchange only network addresses with each other, routing protocols supporting VLSM also exchange subnet masks together with these network addresses. The routing protocols that support VLSM are:

Issues

VSLM is most often used when OSPF is used to join pre-existing routing domains that use RIP within their domain boundaries. OSPF thus provides the backbone routing service to connect these "RIP islands," and each RIP island is defined as an OSPF area. The main problem with using VLSM, however, is that it requires careful planning to implement properly-you need to know all your subnets and the maximum possible hosts on each subnet before you start the process of subnetting your network using VLSM. For older networks, implementing VLSM basically means renumbering the network from the ground up, a time-consuming process.

A better alternative to resubnetting your internetwork using VLSM is simply resubnetting it using the private class A network ID 10.0.0.0 and a fixed subnet mask that provides enough addresses for your largest network. In this approach, you simply do not worry about wasting IP addresses because you have 16,777,214 to work with using this network ID. Of course, you can only use this approach if your IP internetwork is connected to the Internet using network address translation (NAT), but this is the standard approach anyway.

See Also Class A ,Class B ,Enhanced Interior Gateway Routing Protocol (EIGRP) ,IP address ,Open Shortest Path First (OSPF) ,Routing Information Protocol (RIP) ,subnet mask ,subnetting

VBScript

Stands for Visual Basic Scripting Edition, a scripting language developed by Microsoft Corporation.

Overview

VBScript was designed primarily for use in Web applications running on the Internet Information Services (IIS) and Internet Explorer platforms. VBScript is a lightweight subset of the more powerful Visual Basic for Applications (VBA) programming language used in Microsoft Office and other Microsoft development platforms. VBScript omits features such as file input/output (I/O) and direct access to the operating system to provide a secure scripting platform for developing Web-based applications using server-side scripting technologies such as Active Server Pages (ASP). Internet Explorer includes a scripting engine for interpreting and running client-side scripts written in VBScript. VBScript can run on all versions of Microsoft Windows as well as on certain UNIX platforms.

Note that you cannot use VBScript to write stand-alone programs. Instead, you must embed script into standard Hypertext Markup Language (HTML) files. The script is executed when a Web browser opens the HTML file. Alternatively, ASP can use VBScript to generate HTML on the fly.

Examples

Script within an HTML page is enclosed within <SCRIPT> ... </SCRIPT> tags. For example, the following HTML segment displays a button that, when pressed, displays a message box that reads "Hello World!":

<INPUT TYPE=BUTTON VALUE="Click me" NAME="BtnHello"> <SCRIPT LANGUAGE="VBScript">    Sub BtnHello_OnClick         MsgBox "Hello World!", 0, "An active         document"    End Sub </SCRIPT>

In this code, the <INPUT> tag creates the command button and the <SCRIPT> tag contains the script for the event handler that handles the button click.

For More Information

Visit the Microsoft Windows Script Technologies site at msdn.microsoft.com/scripting.

See Also Active Server Pages (ASP) ,Hypertext Markup Language (HTML) ,Internet Information Services (IIS) ,JavaScript ,JScript ,scripting

vCalendar

An Internet protocol for interoperability between scheduling programs running on different platforms.

Overview

vCalendar allows Personal Data Interchange (PDI) programs to exchange scheduling information over the Internet to book meetings, schedule events, and plan other activities. The vCalendar standards define the for mat by which scheduling information can be exchanged over the Internet. The basic units of scheduling information are the event, which consists of a scheduled activity and its time, date, and duration, and the to-do, a work item or assignment that is delegated to an individual.

vCalendar is defined in RFCs 2445 to 2447 and is broadly supported in the e-mail and groupware industry. The current version is vCalendar 1. Microsoft Outlook 98 and later can import and export information in vCalendar format.

For More Information

Visit the Internet Mail Consortium's PDI page at www.imc.org/pdi.

See Also vCard

vCard

An Internet protocol for exchanging business information.

Overview

vCard enables users to exchange the kind of information found on business cards by using standard Internet applications such as e-mail clients and Web browsers. It can also be integrated into fax, cellular phone, pager, smart card, and other communication technologies. You can use vCard to electronically communicate information such as a user's name, title, business, address, telephone numbers, e-mail addresses, URLs (Uniform Resource Locators), company logo, photographic likeness, audio clip, and just about anything else. vCard specifies the format for encoding information for transmission over the Internet.

vCard is defined in RFCs 2425 and 2426. The current version is vCard 3. Microsoft Outlook 98 and later and Microsoft Outlook Express 5 support the vCard protocol.

See Also vCalendar

VDSL

Stands for Very-high-rate Digital Subscriber Line, a high-speed flavor of Digital Subscriber Line (DSL).

See Also Very-high-rate Digital Subscriber Line (VDSL)

Very-high-rate Digital Subscriber Line (VDSL)

A high-speed flavor of Digital Subscriber Line (DSL).

Overview

Very-high-rate Digital Subscriber Line (VDSL) was developed in the early 1990s as a high-speed version of Asymmetric Digital Subscriber Line (ADSL). Most existing VDSL implementations support speeds to 52 megabits per second (Mbps) in the upstream direction and 2.3 Mbps downstream over existing local loop copper wiring. A limiting factor is that VDSL operates over very short distances, typically only 1000 feet (300 meters) from the telco central office (CO). At longer distances, VDLS speeds drop sharply, and the service is difficult to provision beyond about 4500 feet (1400 meters).

VDSL is undergoing standardization by the International Telecommunication Union (ITU), so current VDSL services are vendor-specific. The plan is to standardize two different versions of VDSL:

Marketplace

The VDSL marketplace is still growing, and not many carriers offer the technology to customers. VDSL Systems provides 16-port and 32-port VDSL multiplexers for the carrier market that can handle 26 Mbps traffic at distances up to 5000 feet (1500 meters). The company also provides VDSL customer premises equipment (CPE) in various form factors including access routers, PCI cards, and set-top boxes for the hotel industry.

Telco Systems has an innovative switching called CopperMax, which allows companies to use VDSL to link buildings together using existing telephone lines, provided they are less than 0.75 miles (0.5 kilometers) apart.

See Also Asymmetric Digital Subscriber Line (ADSL) ,Digital Subscriber Line (DSL) ,International Telecommunication Union (ITU) ,local loop

virtual circuit

A logical path or connection between nodes in a network.

Overview

The path of a virtual circuit is composed of discrete segments of the network that are interconnected using switches. Before a transmission can be sent over the circuit, both end stations must agree on the path and its signaling characteristics, a process called establishing the circuit. Once the circuit has been established, the end stations communicate as if they were directly connected using physical wires, but it is the switches that actually establish the communication path throughout the network. To change the logical path the virtual circuit takes across the network, you simply reconfigure the switches-you do not need to reconnect any wires. This is called a virtual circuit because, like a real (physical) circuit, it connects two points for transmission purposes, but instead of being hard-wired it is configurable and therefore "virtual" in nature.

Virtual circuits are generally used in packet-switching networks such as Asynchronous Transfer Mode (ATM), frame relay, and X.25 networks. Virtual circuits are used in wide area networks (WANs) to increase efficiency by forwarding packets using circuit identifiers rather than routing packets using physical or logical addresses. The basic procedure is that once a circuit has been established between two stations, the circuit is assigned a circuit identifier (a number) that is then included in the header of every packet sent by the stations. All packets having this identifier are automatically forwarded by switches over the predefined circuit path without the need to add source or destination addresses to the packets (virtual circuits are point-to-point links and as a result do not need addressing). Using small circuit identifiers means less protocol overhead in packet headers and faster forwarding of packets.

Types

There are two basic types of virtual circuits:

ATM networks can be implemented using either permanent or switched virtual circuits, as can older X.25 packet-switching networks. Frame relay generally supports only PVCs, although a few providers have begun to offer SVCs. Because an SVC does not require dedicated carrier resources, they can be billed according to usage, which can save companies money.

See Also Asynchronous Transfer Mode (ATM) ,circuit-switched services ,frame relay ,packet switching ,Public Switched Telephone Network (PSTN) ,wide area network (WAN) ,X.25

virtual directory

A directory that appears to Web browser users to be a subdirectory of a Web site's home directory.

Overview

Although a virtual directory behaves as if it were a subdirectory of the home directory, in fact it might be located in a different folder, drive, or server. The advantage of using virtual directories is that content does not need to be stored only on the Web server-it can be distributed on other servers throughout the Web provider's network. These servers can be located at secure, strategic locations for easy access by Web content developers. The disadvantage is a slight degradation in performance due to data being transmitted over the network.

Virtual directories are supported by Internet Information Services (IIS) on Microsoft Windows 2000, Windows XP, and Windows .NET Server.

Examples

For example, consider a user accessing a Web site by using the following Uniform Resource Locator (URL): www.microsoft.com/otherstuff/file.htm.

The directory otherstuff appears to the user to be a real subdirectory of the home directory www.microsoft.com, while in fact it could be a virtual directory that is mapped to a share on a different server on the Web provider's network.

See Also Internet Information Services (IIS) ,Web server

virtual hosting

Also called reverse hosting, an extension to reverse proxying that is supported by Microsoft Internet and Acceleration (ISA) Server.

See Also reverse hosting

virtual LAN (VLAN)

A group of ports on an Ethernet switch that behaves like a separate network segment.

Overview

The simplest form of a large Ethernet network is one built using only hubs arranged in a cascaded star topology. For example, in a building there might be one workgroup hub for each work area connected to a root hub in the wiring closet. Such a network has two drawbacks:

The first problem, that of collisions, is usually dealt with by replacing the main or root hub with an Ethernet switch, specifically a Layer 2 switch. This has the effect of partitioning the network into multiple smaller collision domains, which in this example means that each work area will be a separate collision domain. This reduces the overall effect of collisions on the network and isolates problems arising from too many collisions occurring in one area from other parts of the network.

Unfortunately, this simple solution does not solve the second problem, that of broadcasts. In a cascaded star topology where workgroup hubs are connected to a Layer 2 switch, the entire network is still one large broadcast domain, which increases the risk of broadcast storms. Furthermore, if network services are running that advertise themselves using broadcasts, then a significant amount of overall bandwidth might be consumed by these broadcasts, reducing the amount of available bandwidth for other forms of network communications.

The traditional solution to this problem has been to use routers to partition the network into multiple smaller broadcast domains, insofar as routers generally do not forward broadcasts between their interfaces. This works well, but as the network increases in size, the number of network devices (hubs, routers, and switches) increases also, which leads to greater infrastructure costs. Another problem with this traditional style of network is that when a user moves to a different work area and takes his or her computer along to the new area, then some recabling is usually necessary. For example, when the user connects the computer to the local area network (LAN) drop in the new work area, the administrator usually has to go to the wiring room and switch the ends of the old and new LAN drop plugs to make sure the user is connected to the right hub or switch. Because cabling is typically somewhat disorganized in wiring rooms, this task can be a nightmare and is prone to error.

Virtual LAN (VLAN) technologies were developed to solve all these problems. VLANs allow networks to be segmented logically without having to be physically rewired. Instead of having all ports on a switch be equal and belong to the same network, ports can be segregated into groups, each belonging to a separate logical network. For example, on a 3-port switch you could configure ports 1 and 2 as belonging to network 10 and port 3 as belonging to network 20 (see the illustration on the following page). Physically, all three ports seem to be on the same network, but in reality they are not-broadcasts sent to port 1 can only reach port 2 and not port 3. Administrators can easily make these port assignments indicating which VLANs are mapped to which ports by accessing the software for the switch. Note that VLAN ports do not have to be contiguous-for example, ports 1 and 3 could be on the same VLAN and port 2 on a different VLAN.

The benefits of using VLAN-enabled switches include

Implementation

VLANs have the following characteristics:

Switch vendors have traditionally developed their own proprietary VLAN technologies, so implementing a VLAN typically means buying all your switching gear from a single vendor. Cisco Systems is the market leader in VLAN-enabled switches, and many of their Catalyst line of switches support VLANs. Cisco Catalyst switches employ several types of technologies in order to implement enterprise VLANs, namely:

Issues

Three main issues have slowed the acceptance of VLANs in the enterprise: standards, Dynamic Host Configuration Protocol (DHCP), and Layer 3 switches. The problem of standards arises from the proprietary nature of VLAN implementations from different switch vendors. This has resulted in interoperability issues where equipment from one vendor fails to work with that from another vendor. There has been some progress toward standardizing VLAN technologies, however. One important step was the development of the 802.1Q standard from the Institute of Electrical and Electronics Engineers (IEEE), which replaces Cisco's proprietary ISL technology with a standards-based solution. Another development has been the adoption of RFC 2878 by the Internet Engineering Task Force (IETF), which standardizes VLAN frame tagging using the new VLAN Tagged Frame format. RFC 2878 also provides guidelines for switch vendors to improve interoperability with regard to signaling, link aggregation, and Layer 2 traffic prioritization.

The second issue is that of address management of stations on the network. VLANs were originally designed to simplify the management of hosts on the network by using their Layer 2 MAC addresses to identify them to switches. When a computer is unplugged from a LAN drop and moved to a different physical location and plugged in to a different drop, VLAN switches can automatically detect the computer's new location by its MAC address and reconfigure themselves dynamically. The problem is that DHCP was designed for the very same job of dynamic address management but uses Layer 3 (IP) addresses instead. Being a much simpler system, most network managers have chosen DHCP instead of VLANs to ensure that computers can be physically moved around the network if needed. As a result, most VLAN administration is performed manually by assigning VLAN IDs to ports using a command- line interface, a difficult chore in a large enterprise.

The third issue that has slowed the adoption of VLANs has been the emergence of Layer 3 switches, which can perform both bridging (Layer 2) and routing (Layer 3) functions in one box. Layer 3 switches have almost eliminated the need for VLANs in most enterprises. Instead of creating multiple VLANs to segment the network into smaller broadcast domains, the same thing can be accomplished by replacing the root Layer 2 switch with a Layer 3 switch. Each port on the Layer 3 switch represents a separate routed subnet, and the network is thus automatically partitioned into separate broadcast domains.

Prospects

Because of the above issues, the future of VLANs is cloudy. Most enterprise network architects see little point in deploying VLANs when Layer 3 switches can accomplish the same result with less effort. And DHCP manages addresses at Layer 3 more easily than VLANs do it at Layer 2, making it simple to move users around the network. Nevertheless, there has been something of a resurgence of interest in VLANs recently, mainly in the service provider market where companies such as Yipes Communications that offer metropolitan Ethernet use VLAN-enabled switches from Extreme Networks to provision metropolitan area VLANs for their customers. Another growing use of VLANs is in the Web hosting arena, where these companies are using VLANs to help isolate traffic between different subscribers.

See Also 802.1Q ,broadcast domain ,collision domain ,Dynamic Host Configuration Protocol (DHCP) ,Ethernet switch ,hub ,Institute of Electrical and Electronics Engineers (IEEE) ,Internet Engineering Task Force (IETF) ,IP address ,Layer 2 switch ,Layer 3 switch ,MAC address ,router

virtual memory

A mechanism by which applications function as though the system has more random access memory (RAM) than it actually does.

Overview

Virtual memory is designed to improve the performance of applications by providing them with greater effective memory than physical RAM provides. Virtual memory works by paging unneeded code from running applications to a file on the hard drive called the page file. In Microsoft Windows 2000, Windows XP, and Windows .NET Server, the Virtual Memory Manager maps the virtual addresses belonging to the address space of a running process to physical pages of memory in the computer. This ensures that each process has sufficient virtual memory to run efficiently and does not trespass on the memory of other processes. The Virtual Memory Manager handles paging between RAM and the page file, swapping pages by using a process called demand paging. The result is that each application has access to up to 4 gigabytes (GB) of memory. A similar process in Windows 98 and Windows Millennium Edition (Me) uses a comparable structure called the swap file.

Virtual memory is also supported by UNIX platforms and the Mac OS X platform.

virtual private network (VPN)

A technology for securely connecting a computer or network to a remote network over an intermediate network such as the Internet.

Overview

The term virtual private network (VPN) is used in various senses in the industry to describe a variety of technologies, but in essence it can have one of two meanings:

The two main types of VPNs are

Architecture

VPNs are based on a client/server architecture:

Two VPN tunneling protocols are in use today: Microsoft Corporation's Point-to-Point Tunneling Protocol (PPTP) and Cisco Systems' Layer 2 Tunneling Protocol (L2TP). Both protocols are essentially extensions of the industry standard Point-to-Point Protocol (PPP) and are used to encapsulate PPP frames within IP datagrams for transmission over the Internet. In other words, VPNs employ two layers of encapsulation:

The result of using PPTP or L2TP is to create a virtual PPP connection between the VPN client and server. In short, the VPN connection behaves as if it were a dedicated point-to-point serial link but packets are actually routed across the Internet.

Virtual Private Network (VPN). How a VPN connection works between a network and a remote host.

Note that L2TP does not include a mechanism for encrypting VPN communications, so it must be combined with Internet Protocol Security (IPsec) when used to create a VPN connection.

Implementation

VPNs are typically implemented in one of two ways:

A third kind of VPN implementation involves using permanent virtual circuits (PVCs) carrying IP over public frame relay networks. This method is employed mainly for enterprise network-network VPNs.

Marketplace

A popular Linux-based VPN/firewall appliance is VelociRaptor from Cobalt Networks, which employs Cobalt's hardware and Raptor's firewall software to provide a secure VPN solution for the small business and remote office markets. Another popular VPN appliance is the Alcatel 7137 Secure VPN Gateway, originally developed by TimeStep (now part of Alcatel). Cisco Systems offers many different VPN-enabled routers and access servers, including the Cisco VPN 3005 Concentrator, which supports up to 100 concurrent users. For the Small Office/Home Office (SOHO) business environment, the Cisco PIX Firewall 506 is a small unit the size of a pocketbook that can support 10 simultaneous VPN connections. Another market contender is the VPN-1 Appliance from Check Point Software Technologies, which includes their widely used Firewall-1 product bundled in a Nokia appliance. Check Point also offers a VPN-1 Gateway for high-end corporate VPN connectivity. 3Com Corporation, Avaya, CoSine Communications, Data Fellows Corporation, Indus River Networks, Intel Corporation, Lucent Technologies, RadGuard, RedCreek Communications, and many other companies offer VPN solutions ranging from VPN gateways and appliances to software products.

Examples of service providers offering standard IP VPN services include Aventail Corporation, Genuity, UUNET, Qwest Communications International, and others. Providers of frame relay-based VPN services include AT&T, Equant, Infonet, MCI/Worldcom, Sprint Corporation, and others. Telera offers a nationwide Voice over IP (VOIP)-enabled managed VPN that employs VPN gateways stationed at colocation centers around the United States.

Prospects

The future of network-network VPNs and corporate host-network VPN gateways may be Digital Subscriber Line (DSL), a technology that provides high-speed Internet access at costs vastly lower than leased lines such as T1 lines. The main issue with most enterprises is that DSL has yet to prove itself as reliable a technology as the more costly leased lines, which are a mature technology that has been around for many years. Nevertheless, the combination of a DSL connection with VPN software to provide security is a tantalizing one for IT departments in times of shrinking budgets.

Notes

Although VPNs typically use the Internet as their transit network, it is also possible to run a VPN over a corporate IP LAN to create a "LAN within a LAN" for secure communications across the network.

For More Information

Visit the VPN Consortium at www.vpnc.org

See Also application service provider (ASP) ,Digital Subscriber Line (DSL) ,firewall ,frame relay ,Internet ,Internet Protocol Security (IPsec) ,Internet service provider (ISP) ,Layer 2 Tunneling Protocol (L2TP) ,permanent virtual circuit (PVC) ,Point-to-Point Protocol (PPP) ,Point-to-Point Tunneling Protocol (PPTP) ,T1 ,wide area network (WAN)

virtual server

A technology that allows multiple independent Web sites to be hosted on a single Web server.

Overview

The term virtual server is another name for Web site. Internet Information Services (IIS) on Microsoft Windows 2000 and Windows .NET Server supports virtual servers to enable a single machine to host multiple Web sites. Virtual servers can be implemented three different ways in Windows 2000:

Notes

The term virtual server is also used in the Windows Clustering component of Microsoft Windows 2000 Server. In this context a virtual server is usually a resource group that contains all the resources necessary for running an application, including the network name and IP address resources.

See Also bindings , Hypertext Transfer Protocol (HTTP) ,Internet Information Services (IIS) ,IP address , Web server

virus

A program designed to infect computer systems.

Overview

Viruses are generally malicious programs created to cause damage or annoyance to computer users. The effects of viruses range from harmless but annoying messages announcing the presence of an "infection" to malicious corruption or deletion of crucial operating system and data files.

Although the term virus is generally used to refer to any form of malicious code, technically viruses that infect computer systems do so by attaching themselves to executable files, and when these files are executed the virus spreads to other files or causes various forms of damage such as lost or corrupted data. Some other related forms of "malware" (malicious software) include

Viruses have many entry points in today's enterprise networks, including Internet connections, remote access connections, electronic mail, and users downloading and saving software from the Internet onto floppy disks and taking these disks to work to install the software on their office machines.

History

The first recorded PC virus was the Pakistani Brain virus detected in 1987. Since then tens of thousands of different "strains" of viruses have been detected over the years, and the rate at which new viruses are appearing is accelerating, mainly as a result of the widespread availability over the Internet of scripts that can be easily assembled to form new types of viruses. Some of the better-known viruses in the history of malware include

Types

Common categories of viruses include the following:

Implementation

Viruses generally consist of two components:

Virus protection software guards enterprise computer systems from the danger of viruses by scanning potential virus-bearing files and prompting the deletion of these files. Virus protection software consists of two components:

Marketplace

The market leaders in virus protection software include Computer Associates, McAfee, Sophos, Symantec Corporation, and Trend Micro. Popular products include Norton AntiVirus from Symantec and VirusScan from McAfee.

Prospects

Viruses seem to be an inevitable fact of life for computer users, and protecting against them is essential for any enterprise connected to the Internet. The earliest viruses were spread from user to user by swapping floppy disks. In the mid-1990s, Word and Microsoft Excel macro viruses became the bane of the office productivity worker, and many enterprises disable macros for these applications to prevent users who open e-mail attachments containing macro viruses from infecting the network. The trend at the beginning of the new millennium seems to be that e-mail viruses are the ones to fear most-many companies have had their messaging systems brought to their knees for days as a results of infections by the Melissa and I Love You viruses, and some have even shut down their in-house mail systems and begun outsourcing their messaging needs from application service providers (ASPs) or Internet service providers (ISPs) who have dedicated resources for combating such viruses when they appear. Some of the more popular ASPs offering virus-protected messaging services include Critical Path and MessageClick.

Some of the newer developments in the virus realm include

Notes

To keep viruses from proliferating on your network, you can take the following measures:

For More Information

You can visit the McAfee Virus Information Center at www.mcafee.com/centers/anti-virus.

See Also application service provider (ASP) ,e-mail ,hacking ,Internet service provider (ISP) ,network security ,Personal Digital Assistant (PDA) ,security ,Simple Mail Transfer Protocol (SMTP)

VLAN

Stands for virtual LAN, a group of ports on an Ethernet switch that behaves like a separate network segment.

See Also virtual LAN (VLAN)

VLSM

Stands for variable-length subnet mask, a technique for conserving Internet Protocol (IP) addresses.

See Also variable-length subnet mask (VLSM)

Voice over IP (VoIP)

An umbrella term for a set of technologies that allow voice traffic to be carried over Internet Protocol (IP) networks such as the Internet.

Overview

Voice over IP (VoIP) is one of the driving forces behind convergence in the networking and telecommunications industry. The term convergence refers to the goal of combining all forms of enterprise communications (voice telephony, fax, and data) into a single IP data stream and managing this through a single integrated system. The goal of convergence is twofold:

To achieve these two goals of convergence, VoIP addresses the first issue and unified messaging (UM) addresses the second. These systems may be deployed separately or together in the enterprise, depending on business needs and goals.

Advantages and Disadvantages

Although VoIP promises to save enterprises money by avoiding costly long-distance toll charges, the expertise needed to implement VoIP and the cost of new equipment is often seen as a barrier to embracing this new technology. Other concerns often voiced by network managers include

Despite these concerns, VoIP is encroaching steadily into large companies and will probably overtake the legacy PBX market in the next five years if trends continue.

Architecture

Most VoIP solutions developed by different vendors are still proprietary solutions that require all customer premises equipment (CPE) to be purchased or leased from a single vendor, but recently there have been moves toward standards-based VoIP solutions that should eventually allow equipment from different vendors to interoperate in a plug and play (PnP) fashion.

The main problem at this point is that competing standards have evolved in the VoIP arena, and it is still unclear which standards will dominate in the emerging VoIP industry. The main standards and protocols of relevance to VoIP are:

For more information on the different VoIP protocols, see the individual entries about them elsewhere in this book.

Implementation

VoIP is all about saving cost for companies, and there are a variety of ways in which it can be implemented using the various architectures outlined previously. One important scenario is for linking offices to eliminate long-distance calling costs. The traditional way for companies to do this has been to connect the PBXs in two offices using tie lines. A tie line is a dedicated connection used for both signaling and call transfer between PBXs. This approach is called a "toll bypass" solution because it bypasses the tolls levied for traditional long-distance traffic, in effect emulating a "toll- free" solution.

Tie lines are usually implemented over T1 lines. For offices relatively near each other, the monthly cost of leasing T1 lines for this purpose can be less than the accumulated cost of a month's long-distance calls between the offices, but when the distance between offices is great, the T1 line costs become excessive as they are billed by the mile for most U.S. telcos. Another problem is that a separate tie line must be deployed between each pair of offices-calls cannot be routed across multiple call lines.

Voice over IP (VoIP). Two common types of VoIP solutions.

VoIP can save costs in this situation by routing voice traffic over existing data lines between offices, also typically T1 lines for large companies. This means instead of needing two T1 lines between offices (one for data and one for tying PBXs together) companies need only one line (voice and data combined). In addition, companies do not need T1 lines between every pair of offices (full mesh topology), as IP packets can be routed across the enterprise provided there is at least one path between each pair of offices (partial mesh).

A more general VoIP solution is to replace existing PBXs with VoIP-enabled routers that perform gateway and gatekeeper functions to handle call setup and routing. One hidden cost in this "all-IP" approach is that traditional digital phones costing about $50 must be replaced by special IP phones often costing hundreds of dollars. This approach to VoIP, championed by Cisco Systems, is sometimes referred to as an IP PBX approach since it completely replaces existing legacy PBX systems. Companies that have invested heavily in legacy PBX equipment may be reluctant to follow this route also and may instead prefer to use VoIP for replacing PBX tie lines to continue leveraging their investment in legacy equipment. Alternatively, some VoIP vendors such as Nortel Networks offer a VoIP gateway approach that let the legacy PBXs continue to handle call processing while line-provisioning is performed by specialized VoIP routers and servers.

Marketplace

Cisco has been the dominant player in the high-end enterprise VoIP market for some time. In fact, Cisco itself uses VoIP across its company, and with more than 10,000 IP phones deployed around the organization, this is still probably one of the largest and most successful VoIP implementations around. Cisco has developed a special architecture for VoIP solutions called Architecture for Voice, Video, and Integrated Data (AVVID) that consisting of three layers: switching and routing infrastructure for routing IP traffic, applications such as Cisco Call Manager running Microsoft Windows 2000 servers for implementing call control, and wired or wireless IP telephones. In the infrastructure area, for example, Cisco 2600, 3600, and AS5300 routers and Cisco Catalyst 6009 switches all support the H.323 standards and can function as H.323 gateways and gatekeepers for building highly scalable VoIP solutions. Cisco's AVVID architecture is straightforward in concept and can effectively scale to more than 100,000 users to meet the needs of the largest enterprise.

The approach taken by Avaya, which, together with Nortel, represents the two dominant players in the legacy PBX market in the United States, is adapted specifically to its own proprietary line of PBX equipment, and scales to 10,000 users for large VoIP deployments. The advantage here is that Avaya offers a clear upgrade path from using its legacy PBXs to move to an all-IP telephony solution. Nortel's Call Pilot solution also supports up to 10,000 users and is popular in Europe but just emerging in the U.S. market. Another large player is Alcatel, whose VoIP solution supports legacy PBX connections and whose call control applications run on UNIX platforms. Alcatel even offers an IP Telephony Starter Kit to enable small companies to quickly and painlessly roll out a VoIP solution. This kit includes an Alcatel OmniStack 6024 Ethernet switch, an OmniPXC 4400 IP PBX, and 10 IP Reflex telephones.

Some larger telecommunication carriers such as AT&T and WorldCom are now offering their own VoIP solutions using Cisco 2600 and 3600 routers deployed at the customer premises in a VoIP gateway approach. AT&T integrates its VoIP solution with Internet access and virtual private network (VPN) support to provide an all- in-one communications infrastructure solution for its customers.

Notes

Despite the great attention garnered by VoIP in the press, other technologies also can serve well for various needs in the enterprise, namely:

The main advantage VoIP has over both of these alternative technologies is scalability-both VoFR and VoHDLC require that voice traffic be encoded and decoded multiple times in transit, and this adds overhead that limits the scalability of these technologies. In contrast, VoIP can be used on IP networks of any size, including the largest of networks, the Internet. The downside of VoIP, of course, is that IP is a best effort packet delivery service with no intrinsic quality of service (QoS). As a result, the quality of voice communications can be poor when using VoIP, especially over a large network such as the Internet, and can result in unacceptable levels of latency, jitter, and dropouts. However, by employing special standards and protocols such as 802.1p, 802.1Q, Resource Reservation Protocol (RSVP), and Multiprotocol Label Switching (MPLS), QoS can be added to IP to the point where voice quality approaches that offered by VoFR, VoHDSL, or even the PSTN.

Another alternative that is used by only a few large companies is Voice over Asynchronous Transfer Mode (VoATM), which provides excellent voice quality since ATM technology has built-in support for QoS. The problem is that to implement VoATM you already need an underlying ATM network connecting branch offices, and only a limited number of large enterprises have implemented ATM across the WAN due to the high cost and complexity of this solution.

An emerging technology gaining a lot of attention is Voice over Digital Subscriber Line (VoDSL), which enables carriers to provision multichannel voice and data communications over Symmetric Digital Subscriber Line (SDSL). Since SDSL is relatively cheap compared to T1 lines, this is an attractive option for certain IP telephony solutions. A typical VoDSL solution involves placing an integrated access device (IAD) at the customer premises, which is connected to both telephone equipment and the computer network. Most VoDSL IADs currently support only 16 voice channels, so this solution is currently marketed mainly toward small and mid-sized businesses. One difficulty is that VoDSL works only with SDSL and does not support the more commonly available Asymmetric Digital Subscriber Line (ADSL) technology. This limits its availability in some areas, but this will still be a technology to watch in the next few years. Vendors of first- generation VoDSL equipment include Copper Mountain Networks, Jetstream Communications, and Tollbridge Technologies.

See Also 802.1p ,802.1Q ,Asynchronous Transfer Mode (ATM) ,Digital Subscriber Line (DSL) ,frame relay ,Frame Relay Access Device (FRAD) ,H.323 ,High-level Data Link Control (HDLC) ,Internet Protocol (IP) ,IP PBX ,IP telephony ,jitter ,latency ,Megaco ,Multiprotocol Label Switching (MPLS) ,permanent virtual circuit (PVC) ,Private Branch Exchange (PBX) ,Public Switched Telephone Network (PSTN) ,Resource Reservation Protocol (RSVP) ,session initiation protocol (SIP) ,Unified Messaging (UM)

voice profile for Internet mail (VPIM)

An Internet Engineering Task Force (IETF) specification that defines a unified way of transmitting voice mail and fax messages over the Internet.

Overview

Voice profile for Internet mail (VPIM) uses e-mail systems that support Multipurpose Internet Mail Extensions (MIME) and Simple Mail Transfer Protocol Service Extensions (ESMTP) standards for Internet messaging. VPIM can also be deployed over corporate intranets for integrated business messaging solutions. VPIM includes a proposed directory service that enables lookup of routable addresses and includes a mapping specification to support interoperability with other voice messaging systems.

VPIM defines the mechanisms by which voice mail and fax messages can be exchanged between Simple Mail Transfer Protocol (SMTP) mail servers on a Transmission Control Protocol/Internet Protocol (TCP/IP) internetwork. However, VPIM leaves open the way in which specific mail clients interface with these SMTP servers to send and receive voice and fax messages, which will initially be accomplished by implementing VPIM helper applications. VPIM is implemented as a MIME profile, which allows voice and fax information to be encoded using any SMTP mail server that supports MIME. You can implement VPIM by running additional VPIM software on existing SMTP mail servers or by installing VPIM-SMTP gateways on the TCP/IP internetwork. VPIM gateways support messaging between telephones, cell phones, fax machines, pagers, and computers. VPIM will be able to use Lightweight Directory Access Protocol (LDAP) or X.500-based directories for white pages lookup to address messages to users.

Notes

VPIM is supported by the popular UNIX mail forwarder software called Sendmail; other vendors are also implementing VPIM. The current standard, VPIM v2, can be found in RFC 2421, and VPIM v3 is under development.

For More information

Find our more about VPIM at www.ema.org/vpimdir.

See Also ESMTP ,Internet Engineering Task Force (IETF) ,Lightweight Directory Access Protocol (LDAP) ,Multipurpose Internet Mail Extensions (MIME) ,Simple Mail Transfer Protocol (SMTP) ,X.500

VoIP

Stands for Voice over IP, an umbrella term for a set of technologies that allow voice traffic to be carried over Internet Protocol (IP) networks such as the Internet.

See Also Voice over IP (VoIP)

VoIP gateway

A device used in Voice over IP (VoIP) systems.

Overview

A VoIP gateway is a device that allows telephone calls to be transmitted over Internet Protocol (IP) backbone networks by converting voice signals into IP packets and transmitting them over the network. The reverse process then takes place at the other end of the call.

Most VoIP gateways are chassis-based units that have either digital or analog built-in Private Branch Exchange (PBX) interfaces. A device called a gatekeeper keeps track of IP address to phone number mappings for routing calls between different gateways. Built-in local area network (LAN) or wide area network (WAN) interfaces, or both, are included for connecting the gateway to the IP backbone. Some gateways also have built-in routing capabilities. The LAN interface is usually Ethernet, but some gateways support Token Ring. The WAN interface is typically T1 or E1, but smaller gateways designed for Small Office/Home Office (SOHO) environments support Integrated Services Digital Network (ISDN) interfaces. The number of voice interfaces per chassis typically ranges from 72 to 960, depending on the vendor. Voice interfaces are typically the digital signal cross-connect level (DSX-1) type, but some gateways also support the foreign exchange station (FXS) type interfaces for direct attachment of analog telephones.

Notes

When shopping for a VoIP gateway, consider the following:

See Also Integrated Services Digital Network (ISDN) , Internet Protocol (IP) ,Private Branch Exchange (PBX) ,

volume

A bounded amount of disk storage.

Overview

In MS-DOS and early Microsoft Windows platforms, a volume is a portion of a hard disk that can be formatted with a file system and can have a unique drive letter assigned to it. In Windows 2000, Windows XP, and Windows .NET Server, a volume is a logical storage entity composed of portions of one or more physical disks. Volumes can be formatted using the NTFS file system (NTFS) or file allocation table (FAT) and can be assigned a drive letter.

Windows 2000, Windows XP, and Windows .NET Server support two different types of disk storage:

See Also basic volume ,dynamic volume ,storage

volume set

A single volume created using discontiguous free areas on hard disks.

Overview

Volume sets can be created in Microsoft Windows NT by combining between 2 and 32 free areas on your disk drives. You can extend a volume set formatted with the NTFS file system (NTFS) without having to reformat the entire volume. In Windows 2000, Windows XP, and Windows .NET Server, volume sets are instead called spanned volumes and are created using the Computer Management snap-in for the Microsoft Management Console (MMC).

Notes

Note that in Windows NT the system and boot partitions cannot be on volume sets.

See Also stripe set ,

VPIM

Stands for voice profile for Internet mail, an Internet Engineering Task Force (IETF) specification that defines a unified way of transmitting voice mail and fax messages over the Internet.

See Also voice profile for Internet mail (VPIM)

VPN

Stands for virtual private network, a technology for securely connecting a computer or network to a remote network over an intermediate network such as the Internet.

See Also virtual private network (VPN)

V-series

A series of communication standards developed by the International Telecommunication Union (ITU).

Overview

V-series protocols define methodologies for exchanging data over digital telephone networks. Standards below V.100 define:

Standards V.100 and higher deal with issues relating to internetworking the telephone system with other types of networks such as packet-switching networks such as X.25.

The following table describes some of the more popular V-series standards relating to modems and other serial interface standards.

Popular Serial Transmission Standards

V Standard

Description

V.22

Early standard for full-duplex serial transmission over one pair of wires at 1200 bits per second (bps).

V.22bis

Same as V.22 but supports 2400 bps.

V.24

The ITU equivalent of the RS-232 serial interface.

V.32

Industry standard for 9600-bps serial transmission.

V.32bis

Same as V.32 but supports 14.4 kilobits per second (Kbps).

V.32ter

Same as V.32 but supports 19.2 Kbps.

V.33

Protocol for full-duplex synchronous serial communication over leased lines with two pairs of wires; supports speeds of up to 14.4 Kbps and is used primarily in IBM mainframe environments.

V.34

Supports 28.8-Kbps serial transmission over dial-up (one wire pair) or leased (one or two wire pairs) lines.

V.34bis

Same as V.34 but supports 33.6 Kbps.

V.35

Protocol for synchronous serial communication at speeds of up to 48 Kbps; typically used for DTE/DCE communication between Channel Service Unit/Data Service Units (CSU/DSUs) and bridges/routers. V.35 has technically been replaced by V.10/11 but is still widely implemented in equipment such as routers, switches, and other wide area network (WAN) access devices.

V.42

Same as V.32 but enhances error correction mechanisms using LAPM (link access procedures for modems) and MNP (Microcom Networking Protocol).

V.42bis

Adds 4-to-1 data compression to V.42 and V.90.

V.44

Adds 6-to-1 data compression to V.42, V.90, and V.92.

V.90

High-speed modem standard that supports asymmetric communication with a maximum downstream data rate of 56 Kbps and an upstream rate of 33.6 Kbps.

V.92

High-speed modem standard that supports asymmetric communication with a maximum downstream data rate of 56 Kbps and an upstream rate of 48 Kbps.

See Also Channel Service Unit/Data Service Unit (CSU/DSU) , International Telecommunication Union (ITU) ,modem ,RS-232 ,serial transmission ,



Microsoft Encyclopedia of Networking
Microsoft Encyclopedia of Networking
ISBN: 0735613788
EAN: 2147483647
Year: 2002
Pages: 36
Authors: Mitch Tulloch, Ingrid Tulloch
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net