| < Day Day Up > |
|
A range of disk management and striping techniques to implement fault tolerance.
Active Directory uses the concept of a relative distinguished name (RDN), which is the part of the distinguished name that is an attribute of the object itself.
The part of the security identifier (SID) that is unique to each object.
Allows users to connect from remote locations and access their networks for file and printer sharing and e-mail. The computer initiating the connection is the RAS client; the answering computer is the RAS host.
A security authentication system used by many Internet service providers (ISPs). A user connects to the ISP and enters a user name and password. This information is verified by a RADIUS server, which then authorizes access to the ISP system.
Allows clients to boot from a network server and use special preboot diagnostic tools installed on the server, or to automatically install client software.
On network computers, enables the contents of a directory, designated as an export directory, to be copied to other directories, called import directories.
An evolving collection of material that details the functions within the TCP/IP family of protocols. Some RFCs are official documents of the Internet Engineering Task Force (IETF), defining the standards of TCP/IP and the Internet, whereas others are simply proposals trying to become standards, and others fall somewhere in between. Some are tutorial in nature, whereas others are quite technical.
A special-purpose device, computer, or software package that handles the connection between two or more networks. Routers look at the destination addresses of the packets passing through them and decide which route to use to send them.
| < Day Day Up > |
|