The coding system used by Dolby Digital. A standard for high-quality digital audio that is used for the sound portion of video stored in digital format.
A type of expansion slot that is solely for video cards. Designed by Intel and supported by Windows XP Professional, AGP is a dedicated bus that provides fast, high-quality video and graphics performance.
The entries on the access control list (ACL) that control user account or group access to a resource. The entry must allow the type of access that is requested (for example, Read access) for the user to gain access. If no ACE exists in the ACL, the user cannot gain access to the resource or folder on an NTFS partition. See access control list (ACL).
A list of all user accounts and groups that have been granted access for the file or folder on an NTFS partition or volume, as well as the type of access they have been granted. When a user attempts to gain access to a resource, the ACL must contain an entry, called an access control entry (ACE), for the user account or group to which the user belongs. See access control entry (ACE).
Features that control access to shared resources in Windows XP Professional.
A data structure containing security information that identifies a user to the security subsystem on a computer running Windows XP Professional, Windows 2000, or Windows NT. An access token contains a user's security ID, the security IDs for groups that the user is a member of, and a list of the user's privileges on the local computer.
See user account.
A Windows XP Professional security feature that locks a user account if a number of failed logon attempts occur within a specified amount of time, based on account policy lockout settings. Locked accounts cannot log on.
Controls how passwords must be used by all user accounts on an individual computer or in a domain.
See access control entry (ACE).
See access control list (ACL).
See Advanced Configuration and Power Interface (ACPI).
The directory service included in Windows 2000 Server products. It identifies all resources on a network and makes them accessible to users and applications.
Determines hardware addresses (MAC addresses) that correspond to an Internet Protocol (IP) address.
See Asymmetric Digital Subscriber Line (ADSL).
An open industry specification that defines power management on a wide range of mobile, desktop, and server components and peripherals. ACPI is the foundation for the OnNow industry initiative that allows system manufacturers to deliver computers that will start at the touch of a keyboard. ACPI design is essential to take full advantage of power management and Plug and Play in Windows XP Professional. Check the manufacturer's documentation to verify that a computer is ACPI-compliant.
A software interface designed by Microsoft and Intel used between hardware-specific power management software, such as that located in a system BIOS, and an operating system power management driver.
A program that performs a background task for a user and reports to the user when the task is done or when some expected event has taken place.
An organization of American industry and business groups dedicated to the development of trade and communication standards. ANSI is the American representative to the International Organization for Standardization (ISO). See also International Organization for Standardization (ISO).
A system that encodes information using frequency modulation in a nonbinary context. Modems use analog encoding to transmit data through a phone line. An analog signal can be any frequency, allowing many possibilities. Because of this, a device has to interpret the signal, often finding errors. See also digital, modem.
A communication line that carries information using frequency modulation. See also digital line.
See application programming interface (API).
See Advanced Power Management (APM).
The top (seventh) layer of the OSI reference model. This layer serves as the window that application processes use to access network services. It represents the services that directly support user applications, such as software for file transfers, database access, and e-mail.
A set of routines that an application program uses to request and carry out lower level services performed by the operating system.
Protocols that work at the higher end of the OSI reference model, providing application-to-application interaction and data exchange. Popular application protocols include File Transfer Access and Management (FTAM), a file access protocol; Simple Mail Transfer Protocol (SMTP), a TCP/IP protocol for transferring e-mail; Telnet, a TCP/IP protocol for logging on to remote hosts and processing data locally; NetWare Core Protocol (NCP), the primary protocol used to transmit information between a NetWare server and its clients.
See Address Resolution Protocol (ARP).
A coding scheme that assigns numeric values to letters, numbers, punctuation marks, and certain other characters. By standardizing the values used for these characters, ASCII enables computers and programs to exchange information.
A recent modem technology that converts existing twisted-pair telephone lines into access paths for multimedia and high-speed data communications. These new connections can transmit more than 8 Mbps to the subscriber and up to 1 Mbps from the subscriber. ADSL is recognized as a physical layer transmission protocol for unshielded twisted-pair media.
An advanced implementation of packet switching that provides high-speed data transmission rates to send fixed-size cells over local area networks (LANs) or wide area networks (WANs). Cells are 53 bytes-48 bytes of data with 5 additional bytes of address. ATM accommodates voice, data, fax, real-time video, CD-quality audio, imaging, and multimegabit data transmission. ATM uses switches as multiplexers to permit several computers to put data on a network simultaneously. Most commercial ATM boards transmit data at about 155 Mbps, but theoretically a rate of 1.2 Gbps is possible.
A form of data transmission in which information is sent one character at a time, with variable time intervals between characters. Asynchronous transmission does not rely on a shared timer that allows the sending and receiving units to separate characters by specific time periods. Therefore, each transmitted character consists of a number of data bits (which compose the character itself), preceded by a start bit and ending in an optional parity bit followed by a 1-, 1.5-, or 2-stop bit.
See asynchronous transfer mode (ATM).
A process that tracks network activities by user accounts and a routine element of network security. Auditing can produce records of users who have accessed-or attempted to access-specific resources; help administrators identify unauthorized activity; and track activities such as logon attempts, connection and disconnection from designated resources, changes made to files and directories, server events and modifications, password changes, and logon parameter changes.
Defines the types of security events that Windows XP Professional records in the security log on each computer.
Verification based on user name, passwords, and time and account restrictions.
An unattended setup using one or more of several methods such as Remote Installation Services, bootable CD, and Sysprep.
A feature of Windows XP Professional that automatically configures a unique Internet Protocol (IP) address from the range 169.254.0.1 to 169.254.255.255 and a subnet mask of 255.255.0.0 when the Transmission Control Protocol/Internet Protocol (TCP/IP) is configured for dynamic addressing and a Dynamic Host Configuration Protocol (DHCP) server is not available.
In a client/server application, the part of the program that runs on the server.
A duplicate copy of a program, a disk, or data, made to secure valuable files from loss.
A single process of backing up data.
In analog communication, the difference between the highest and lowest frequencies in a given range.
A Point-to-Point Protocol (PPP) control protocol that helps provide bandwidth on demand. BAP dynamically controls the use of multilinked lines and is a very efficient mechanism for controlling connection costs while dynamically providing optimum bandwidth.
See Bandwidth Allocation Protocol (BAP).
Specifies a channel through which information is transferred between a computer's hardware, such as the network interface card (NIC) and its CPU.
A measurement derived from the collection of data over an extended period of time. The data should reflect varying but typical types of workloads and user connections. The baseline is an indicator of how individual system resources or a group of resources are used during periods of normal activity.
Defines the address of the location in a computer's memory (RAM) that is used by the network interface card (NIC). This setting is sometimes called the RAM start address.
A physical disk that contains primary partitions or extended partitions with logical drives used by Windows XP Professional, Windows 2000, and all versions of Windows NT. Basic disks can also contain volume, striped, mirror, or RAID-5 sets that were created using Windows NT 4.0 or earlier versions. As long as a compatible file format is used, basic disks can be accessed by MS-DOS, Windows 95, Windows 98, and all versions of Windows NT.
The set of essential software routines that tests hardware at startup, assists with starting the operating system, and supports the transfer of data among hardware devices. The BIOS is stored in read-only memory (ROM) so that it can be executed when the computer is started. Although critical to performance, the BIOS is usually invisible to computer users.
A measure of data-transmission speed named after the French engineer and telegrapher Jean-Maurice-Emile Baudot. It is a measure of the speed of oscillation of the sound wave on which a bit of data is carried over telephone lines. Because baud was originally used to measure the transmission speed of telegraph equipment, the term sometimes refers to the data-transmission speed of a modem. However, current modems can send at a speed higher than one bit per oscillation, so baud is being replaced by the more accurate bps (bits per second) as a measure of modem speed.
Refers to the speed at which a modem can transmit data. Often confused with bps (the number of bits per second transmitted), baud rate actually measures the number of events, or signal changes, that occur in one second. Because one event can actually encode more than one bit in high-speed digital communication, baud rate and bps are not always synonymous, and the latter is the more accurate term to apply to modems. For example, the 9600-baud modem that encodes four bits per event actually operates at 2400 baud, but transmits at 9600 bps (2400 events times 4 bits per event), and thus should be called a 9600-bps modem.
To associate two pieces of information with one another.
A process that establishes the communication channel between network components on different levels to enable communication between those components-for example, the binding of a protocol driver (such as TCP/IP) and a network adapter.
A communications protocol developed by IBM. Bisync transmissions are encoded in either ASCII or EBCDIC. Messages can be of any length and are sent in units called frames, optionally preceded by a message header. Because bisync uses synchronous transmission, in which message elements are separated by a specific time interval, each frame is preceded and followed by special characters that enable the sending and receiving machines to synchronize their clocks.
Short for binary digit: either 1 or 0 in the binary number system. In processing and storage, a bit is the smallest unit of information handled by a computer. It is represented physically by an element such as a single pulse sent through a circuit or small spot on a magnetic disk capable of storing either a 1 or 0. Eight bits make a byte.
A measure of the speed at which a device can transfer data. See also baud rate.
The time it takes for each station to receive and store a bit.
An automated installation method that runs Setup from a CD-ROM. This method is useful for computers at remote sites with slow links and no local IT department.
A critical disk structure for starting your computer, located at sector 1 of each volume or floppy. It contains executable code and data that is required by the code, including information used by the file system to access the volume. The boot sector is created when you format the volume.
A type of virus that resides in the first sector of a floppy disk or hard drive. When the computer is booted, the virus executes. In this common method of transmitting viruses from one floppy disk to another, the virus replicates itself onto the new drive each time a new disk is inserted and accessed.
A device or program that significantly degrades network performance. Poor network performance results when a device uses noticeably more CPU time than it should, consumes too much of a resource, or lacks the capacity to handle the load. Potential bottlenecks can be found in the CPU, memory, network interface card (NIC), and other components.
See bits per second (bps).
A transmission sent simultaneously to more than one recipient. In communication and on networks, a broadcast message is one distributed to all stations or computers on the network.
An event that occurs when there are so many broadcast messages on the network that they approach or surpass the capacity of the network bandwidth. This can happen when one computer on the network transmits a flood of frames, saturating the network with traffic so it can no longer carry messages from any other computer. Such a broadcast storm can shut down a network.
A reserved portion of RAM in which data is held temporarily, pending an opportunity to complete its transfer to or from a storage device or another location in memory.
One type of group account used by Windows XP Professional. Built-in groups, as the name implies, are included with the operating system. Built-in groups have been granted useful collections of rights and built-in abilities. In most cases, a built-in group provides all the capabilities needed by a particular user. For example, if a user account belongs to the built-in Administrators group, logging on with that account gives the user administrative capabilities. See also user account.
Parallel wires or cabling that connect components in a computer.
A unit of information consisting of 8 bits. In computer processing or storage, a byte is often equivalent to a single character, such as a letter, numeral, or punctuation mark. Because a byte represents only a small amount of information, amounts of computer memory are usually given in kilobytes (1024 bytes or 2 raised to the 10th power), megabytes (1,048,576 bytes or 2 raised to the 20th power), gigabytes (1024 megabytes), terabytes (1024 gigabytes), petabytes (1024 terabytes), or exabytes (1024 petabytes).
A special memory subsystem or part of RAM in which frequently used data values are duplicated for quick access. A memory cache stores the contents of frequently accessed RAM locations and the addresses where these data items are stored. When the processor references an address in memory, the cache checks to see whether it holds that address. If it does hold the address, the data is returned to the processor; if it does not, regular memory access occurs. A cache is useful when RAM accesses are slow compared with the microprocessor speed.
See client access license (CAL).
A feature on Windows XP Professional that you can set that causes the remote server to disconnect and call back the client attempting to access the remote server. This reduces the client's phone bill by having the call charged to the remote server's phone number. The callback feature can also improve security by calling back the phone number that you specified.
The computational and control unit of a computer; the device that interprets and carries out instructions. Single-chip CPUs, called microprocessors, made personal computers possible. Examples include the 80286, 80386, 80486, and Pentium processors.
A computer that accesses shared network resources provided by another computer, called a server.
A CAL gives client computers the right to connect to computers running one of the Windows Server family of products.
A network architecture designed around the concept of distributed processing in which a task is divided between a back end (server) that stores and distributes data, and a front end (client) that requests specific data from the server.
Compression/decompression technology for digital video and stereo audio.
A virus that uses the name of a real program but has a different file extension from that of the program. The virus is activated when its companion program is opened. The companion virus uses a .com file extension, which overrides the .exe file extension and activates the virus.
Each file and folder on an NTFS volume has a compression state, either compressed or uncompressed.
A Windows XP Professional installation contains control sets stored as subkeys in the registry. The control sets contain configuration data used to control the system, such as a list of which device drivers and services to load and start.
See central processing unit (CPU).
A layer of software between the physical database and the user. The DBMS manages all requests for database action from the user, including keeping track of the physical details of file locations and formats, indexing schemes, and so on. In addition, a DBMS permits centralized control of security and data integrity requirements.
data encryption See encryption.
A commonly used, highly sophisticated algorithm developed by the U.S. National Bureau of Standards for encrypting and decoding data. This encryption algorithm uses a 56-bit key, and maps a 64-bit input block to a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of the 8 bytes is used for odd parity, resulting in 56 bits of usable key. See also encryption.
Logical, structured packages in which data can be placed. Data being transmitted is segmented into small units and combined with control information such as message start and message end indicators. Each package of information is transmitted as a single unit, called a frame. The data-link layer packages raw bits from the physical layer into data frames. The exact format of the frame used by the network depends on the topology. See also frame.
The second layer in the OSI reference model. This layer packages raw bits from the physical layer into data frames. See also Open Systems Interconnection (OSI) reference model.
An undifferentiated, byte-by-byte flow of data.
See database management system (DBMS).
The process of finding and consolidating fragmented files and folders. Defragmenting involves moving the pieces of each file or folder to one location so that each occupies a single, contiguous space on the hard disk. The system can then access and save files and folders more efficiently.
See data encryption standard (DES).
A generic term for a computer subsystem. Printers, serial ports, and disk drives are referred to as devices.
See Dynamic Host Configuration Protocol (DHCP).
A system that encodes information numerically, such as 0 and 1, in a binary context. Computers use digital encoding to process data. A digital signal is a discrete binary state, either on or off. See also analog, modem.
A communication line that carries information only in binary-encoded (digital) form. To minimize distortion and noise interference, a digital line uses repeaters to regenerate the signal periodically during transmission. See also analog line.
An optical storage medium with higher capacity and bandwidth than a compact disc. A DVD can hold a full-length film with up to 133 minutes of high-quality video, in MPEG-2 format, and audio. Also known as digital versatile disc.
One or more small rocker or sliding switches that can be set to one of two states-closed or open-to control options on a circuit board.
Memory access that does not involve the microprocessor; frequently employed for data transfer directly between memory and an "intelligent" peripheral device such as a disk drive.
A channel for direct memory access that does not involve the microprocessor, providing data transfer directly between memory and a disk drive.
Stores information about network resources, as well as all the services that make the information available and useful. The resources stored in the directory, such as user data, printers, servers, databases, groups, computers, and security policies, are known as objects. The directory is part of Active Directory.
A network service that identifies all resources on a network and makes them accessible to users and applications.
See disk mirroring, fault tolerance.
Computers that have neither a floppy disk nor a hard disk. Diskless computers depend on special ROM to provide users with an interface through which they can log on to the network.
A technique, also known as disk duplicating, in which all or part of a hard disk is duplicated onto one or more hard disks, each of which ideally is attached to its own controller. With disk mirroring, any change made to the original disk is simultaneously made to the other disk or disks. Disk mirroring is used in situations in which a backup copy of current data must be maintained at all times. See also disk striping, fault tolerance.
Divides data into 64K blocks and spreads it equally at a fixed rate and in a fixed order among all disks in an array. However, disk striping does not provide any fault tolerance because there is no data redundancy. If any partition in the set fails, all data is lost. See also disk mirroring, fault tolerance.
Stores the distribution folder structure, which contains the files needed to install a product, for example Windows XP Professional.
See direct memory access (DMA).
See direct memory access (DMA) channel.
See Domain Name System (DNS).
For Microsoft networking, a collection of computers and users that share a common database and security policy that are stored on a computer running Windows 2000 Server and configured as a domain controller. Each domain has a unique name. See also workgroup.
For Microsoft networking, the Windows 2000 Server-based computer that authenticates domain logons and maintains the security policy and master database for a domain.
The naming scheme that provides the hierarchical structure for the DNS database.
A general-purpose distributed, replicated, data-query service used primarily on the Internet and on private Transmission Control Protocol/Internet Protocol (TCP/IP) networks for translating host names into Internet addresses.
The amount of time a computer system or associated hardware remains nonfunctioning. Although downtime can occur because hardware fails unexpectedly, it can also be a scheduled event, such as when a network is shut down to allow time for maintaining the system, changing hardware, or archiving files.
A software component that permits a computer system to communicate with a device. For example, a printer driver is a device driver that translates computer data into a form understood by the target printer. In most cases, the driver also manipulates the hardware to transmit the data to the device.
Also called full-duplex transmission. Communication that takes place simultaneously, in both directions. See also full-duplex transmission.
See digital video disc (DVD).
A physical disk that is managed by Disk Management. Dynamic disks can contain only dynamic volumes, which are created by using Disk Management. Dynamic disks cannot contain partitions or logical drives, nor can they be accessed by MS-DOS.
A protocol for automatic TCP/IP configuration that provides static and dynamic address allocation and management. See also Transmission Control Protocol/Internet Protocol (TCP/IP).
A feature of the Microsoft Windows family of operating systems and the OS/2 operating system. DLLs allow executable routines, generally serving a specific function or set of functions, to be stored separately as files with .dll extensions and to be loaded only when needed by the program that calls them.
See Extensible Authentication Protocol (EAP).
See Extended Binary Coded Decimal Interchange Code (EBCDIC).
The sum of the NTFS permissions assigned to the user account and to all of the groups to which the user belongs. If a user has Read permission for a folder and is a member of a group with Write permission for the same folder, then the user has both Read and Write permission for the folder.
See Extended Industry Standard Architecture (EISA).
A feature of Windows 2000 and Windows XP Professional that protects sensitive data in files that are stored on disk using the NTFS file system. It uses symmetric key encryption in conjunction with public key technology to provide confidentiality for files. It runs as an integrated system service, which makes it easy to manage, difficult to attack, and transparent to the file owner and applications.
The process of making information indecipherable to protect it from unauthorized viewing or use, especially during transmission or when the data is stored on a transportable magnetic medium. A key is required to decode the information. See also data encryption standard (DES).
A standard that can be used with high-capacity hard disks and tape drives to enable high-speed communication with a computer. ESDI drivers typically transfer data at about 10 Mbps.
See Enhanced Small Device Interface (ESDI).
An action or occurrence to which a program might respond. Examples of events are mouse clicks, key presses, and mouse movements. Also, any significant occurrence in the system or in a program that requires users to be notified or an entry to be added to a log.
A coding scheme developed by IBM for use with IBM mainframe and personal computers as a standard method of assigning binary (numeric) values to alphabetic, numeric, punctuation, and transmission-control characters.
A 32-bit bus design for x86-based computers introduced in 1988. EISA was specified by an industry consortium of nine computer companies (AST Research, Compaq, Epson, Hewlett-Packard, NEC, Olivetti, Tandy, Wyse, and Zenith). An EISA device uses cards that are upwardly compatible from ISA. See also Industry Standard Architecture (ISA).
An extension to the Point-to-Point Protocol (PPP) that works with dial-up, PPTP, and L2TP clients. EAP allows for an arbitrary authentication mechanism to validate a dial-up connection. The exact authentication method to be used is negotiated by the dial-up client and the remote access server.
See file allocation table (FAT).
A derivative of the file allocation table file system. FAT32 supports smaller cluster sizes than FAT in the same given disk space, which results in more efficient space allocation on FAT32 drives. See also file allocation table (FAT).
The ability of a computer or an operating system to respond to an event such as a power outage or a hardware failure in such a way that no data is lost and any work in progress is not corrupted.
A standard developed by the ANSI for high-speed, fiber-optic local area networks. FDDI provides specifications for transmission rates of 100 Mbps on networks based on the Token Ring standard.
A file system based on a file allocation table (FAT) maintained by some operating systems, including Windows NT, Windows 2000, and Windows XP Professional, to keep track of the status of various segments of disk space used for file storage.
A type of virus that attaches itself to a file or program and activates any time the file is used. Many subcategories of file infectors exist. See also companion virus, macro virus, polymorphic virus, stealth virus.
A process that provides file transfers between local and remote computers. FTP supports several commands that allow bidirectional transfer of binary and ASCII files between computers. The FTP client is installed with the TCP/IP connectivity utilities. See also ASCII (American Standard Code for Information Interchange), Transmission Control Protocol/Internet Protocol (TCP/IP).
A security system, usually a combination of hardware and software, intended to protect a network against external threats coming from another network, including the Internet. Firewalls prevent an organization's networked computers from communicating directly with computers that are external to the network, and vice versa. Instead, all incoming and outgoing communication is routed through a proxy server outside the organization's network. Firewalls also audit network activity, recording the volume of traffic and information about unauthorized attempts to gain access. See also proxy server
Software routines stored in read-only memory (ROM). Unlike random access memory (RAM), ROM stays intact even in the absence of electrical power. Startup routines and low-level input/output (I/O) instructions are stored in firmware.
Regulating the flow of data through routers to ensure that no segment becomes overloaded with transmissions.
A grouping or hierarchical arrangement of one or more domain trees that form a disjointed namespace.
The scattering of the parts of a file over different parts of the disk rather than having all parts of the file located in contiguous space. When a hard disk contains numerous fragmented files and folders, the computer takes longer to gain access to files and folders because it requires several additional reads to collect the various pieces. Creating new files and folders also takes longer because the available free space on the hard disk is scattered.
A package of information transmitted on a network as a single unit. Frame is a term most often used with Ethernet networks. A frame is similar to the packet used in other networks. See also data frames, packet.
Header information added to the beginning of a data frame in the physical layer of the OSI reference model.
An advanced, fast-packet, variable-length, digital, packet-switching technology. It is a point-to-point system that uses a private virtual circuit (PVC) to transmit variable-length frames at the data-link layer of the OSI reference model. Frame relay networks can also provide subscribers with bandwidth, as needed, that allows users to make nearly any type of transmission.
In a client/server application, the part of the program carried out on the client computer.
See File Transfer Protocol (FTP).
Also called duplex transmission. Communication that takes place simultaneously, in both directions. See also duplex transmission.
A device used to connect networks using different protocols so that information can be passed from one system to the other. Gateways functions at the network layer of the OSI reference model.
See gigabit (Gb).
See gigabyte (GB).
1,073,741,824 bits. Also referred to as 1 billion bits.
Commonly, 1000 megabytes. However, the precise meaning often varies with the context. A gigabyte is 1 billion bytes. In the context of computing, bytes are often expressed in multiples of powers of two. Therefore, a gigabyte can also be either 1000 megabytes or 1024 megabytes, where a megabyte is considered to be 1,048,576 bytes (2 raised to the 20th power).
A service and a physical storage location that contains a replica of selected attributes for every object in Active Directory.
One type of group account used by Windows 2000 Server. Used across an entire domain, global groups are created on domain controllers in the domain in which the user accounts reside. Global groups can contain only user accounts from the domain in which the global group is created. Members of global groups obtain resource permissions when the global group is added to a local group. See also group.
In networking, an account containing other accounts that are called members. The permissions and rights granted to a group are also provided to its members; thus, groups offer a convenient way to grant common capabilities to collections of user accounts. For Windows XP Professional, groups are managed with the Computer Management snap-in. For Windows 2000 Server, groups are managed with the Active Directory Users and Computers snap-in.
An administrator's tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization. In an Active Directory environment, Group Policy is applied to users or components on the basis of their membership in sites, domains, or organizational units.
A term applied to modem-to-modem communication. Refers to the process by which information is transmitted between the sending and receiving devices to maintain and coordinate data flow between them. Proper handshaking ensures that the receiving device will be ready to accept data before the sending device transmits it.
One or more inflexible platters coated with material that allows the magnetic recording of computer data. A typical hard disk rotates at up to 7200 revolutions per minute (RPM), and the read/write heads ride over the surface of the disk on a cushion of air 10 to 25 millionths of an inch deep. A hard disk is sealed to prevent contaminants from interfering with the close head-to-disk tolerances. Hard disks provide faster access to data than floppy disks and are capable of storing much more information. Because platters are rigid, they can be stacked so that one hard-disk drive can access more than one platter. Most hard disks have between two and eight platters.
The physical components of a computer system, including any peripheral equipment such as printers, modems, and mouse devices.
A list of computers and peripherals that have been tested and have passed compatibility testing with the product for which the HCL is being developed. For example, the Windows XP HCL lists products that have been tested and found to be compatible with Windows XP.
A connector on a computer that is useful for troubleshooting hardware problems, allowing data to be transmitted to a line, then returned as received data. If the transmitted data does not return, the hardware loopback detects a hardware malfunction.
See Hardware Compatibility List (HCL).
See High-Level Data Link Control (HDLC).
In network data transmission, one of the three sections of a packet component. It includes an alert signal to indicate that the packet is being transmitted, the source address, the destination address, and clock information to synchronize transmission.
The unit of frequency measurement. Frequency measures how often a periodic event occurs, such as the manner in which a wave's amplitude changes with time. One hertz equals one cycle per second. Frequency is often measured in kilohertz (KHz, 1000 Hz), megahertz (MHz), gigahertz (GHz, 1000 MHz), or terahertz (THz, 10,000 GHz).
A widely accepted international protocol, developed by the International Organization for Standardization (ISO), that governs information transfer. HDLC is a bit-oriented, synchronous protocol that applies to the data-link (message packaging) layer of the OSI reference model. Under the HDLC protocol, data is transmitted in frames, each of which can contain a variable amount of data that must be organized in a particular way. See also data frames, frame.
A chart consisting of horizontal or vertical bars. The widths or heights of these bars represent the values of certain data.
See sector sparing.
See Hypertext Markup Language (HTML).
A firmware specification standard for input and output devices such as drawing tablets, keyboards, universal serial bus (USB) speakers, and other specialized devices designed to improve accessibility.
A language developed for writing pages for the World Wide Web. HTML allows text to include codes that define fonts, layout, embedded graphics, and hypertext links. Hypertext provides a method for presenting text, images, sound, and videos that are linked together in a nonsequential web of associations.
The method by which World Wide Web pages are transferred over the network.
See Image Color Management (ICM) 2.0
See Internet Control Message Protocol (ICMP).
See Integrated Device Electronics (IDE).
See Institute of Electrical and Electronics Engineers (IEEE).
A standard for high-speed serial devices such as digital video and digital audio editing equipment.
A networking model developed by the IEEE. Named for the year and month it began (February 1980), Project 802 defines local area network (LAN) standards for the physical and data-link layers of the OSI reference model. Project 802 divides the data-link layer into two sublayers: media access control (MAC) and logical link control (LLC).
An operating system application programming interface (API) that helps ensure that colors you see on your monitor match those on your scanner and printer.
An unofficial designation for the bus design of the IBM Personal Computer (PC) PC/XT. It allows various adapters to be added to the system by inserting plug-in cards into expansion slots. Commonly, ISA refers to the expansion slots themselves; such slots are called 8-bit slots or 16-bit slots. See also Extended Industry Standard Architecture (EISA), Micro Channel Architecture.
Electromagnetic radiation with frequencies in the electromagnetic spectrum in the range just below that of visible red light. In network communications, infrared technology offers extremely high transmission rates and wide bandwidth in line-of-sight communications.
An organization of engineering and electronics professionals; noted in networking for developing the IEEE 802.x standards for the physical and data-link layers of the OSI reference model, applied in a variety of network configurations.
A type of disk drive interface in which the controller electronics reside on the drive itself, eliminating the need for a separate network interface card. The IDE interface is compatible with the Western Digital ST-506 controller.
A worldwide digital communication network that evolved from existing telephone services. The goal of the ISDN is to replace current telephone lines, which require digital-to-analog conversions, with completely digital switching and transmission facilities capable of carrying data ranging from voice to computer transmissions, music, and video. The ISDN is built on two main types of communications channels: B channels, which carry voice, data, or images at a rate of 64 Kbps (kilobits per second), and a D channel, which carries control information, signaling, and link management data at 16 Kbps. Standard ISDN Basic Rate desktop service is called 2B+D. Computers and other devices connect to ISDN lines through simple, standardized interfaces.
Boundaries that separate layers from each other. For example, in the OSI reference model, each layer provides some service or action that prepares the data for delivery over the network to another computer.
An organization made up of standards-setting groups from various countries. For example, the United States member is the American National Standards Institute (ANSI). The ISO works to establish global standards for communications and information exchange. Primary among its accomplishments is development of the widely accepted OSI reference model. Note that the ISO is often wrongly identified as the International Standards Organization, probably because of the acronym ISO; however, ISO is derived from isos, which means equal in Greek, rather than an acronym.
Used by Internet Protocol (IP) and higher level protocols to send and receive status reports about information being transmitted.
The TCP/IP protocol for packet forwarding. See also Transmission Control Protocol/Internet Protocol (TCP/IP).
A framework of open standards for ensuring secure private communications over IP networks by using cryptographic security services.
A company that provides individuals or companies access to the Internet and the World Wide Web. An ISP provides a telephone number, a user name, a password, and other connection information, so users can connect their computer to the ISP's computers. An ISP typically charges a monthly or hourly connection fee.
The intercommunication in a network that is made up of smaller networks.
A protocol stack that is used in Novell networks. IPX is the NetWare protocol for packet forwarding and routing. It is a relatively small and fast protocol on a local area network (LAN), is a derivative of Xerox Network System (XNS), and supports routing. SPX is a connection-oriented protocol used to guarantee the delivery of the data being sent. NWLink is the Microsoft implementation of the IPX/SPX protocol.
The ability of components in one system to work with components in other systems.
An electronic signal sent to a computer's CPU to indicate that an event has taken place that requires the processor's attention.
A network within an organization that uses Internet technologies and protocols but is available only to certain people, such as employees of a company. An intranet is also called a private network.
See Internet Protocol (IP). See also Transmission Control Protocol/Internet Protocol (TCP/IP).
A 32-bit address used to identify a node on an Internet Protocol (IP) internetwork. Each node on the IP internetwork must be assigned a unique IP address, which is made up of the network ID plus a unique host ID. This address is typically represented with the decimal value of each octet separated by a period (for example, 192.168.7.23). In Windows XP Professional, the IP addresses can be configured manually, or if you have a computer running Windows 2000 Server and DHCP, the IP addresses can be configured dynamically. See also Dynamic Host Configuration Protocol (DHCP).
A diagnostic command that displays all current TCP/IP network configuration values. It is of particular use on systems running DHCP because it allows users to determine which TCP/IP configuration values have been configured by the DHCP server.
See Internet Protocol Security (IPSec).
See Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX).
See interrupt request (IRQ).
See Industry Standard Architecture (ISA).
See Integrated Services Digital Network (ISDN).
See International Organization for Standardization (ISO).
A small plastic-and-metal plug or wire for connecting different points in an electronic circuit. Jumpers are used to select a particular circuit or option from several possible configurations. Jumpers can be used on network interface cards to select the type of connection through which the card will transmit, either DIX or BNC.
An authentication mechanism used to verify user or host identity. The Kerberos v5 authentication protocol is the default authentication service for Windows XP Professional. Internet Protocol security and the QoS Admission Control Service use the Kerberos protocol for authentication.
In database management, an identifier for a record or group of records in a data file. Most often, the key is defined as the contents of a single field, called the key field in some database management programs and the index field in others. Keys are maintained in tables and are indexed to speed record retrieval. Keys also refer to code that deciphers encrypted data.
Refers to 1000 in the metric system. In computing terminology, because computing is based on powers of 2, kilo is most often used to mean 1024 (2 raised to the 10th power). To distinguish between the two contexts, a lowercase k is often used to indicate 1000 and an uppercase K for 1024. A kilobyte is 1024 bytes.
1024 bits. See also bit, kilo (K).
1024 bytes. See also byte, kilo (K).
See Layer Two Tunneling Protocol (L2TP).
See local area network (LAN).
See requester (LAN requester).
Wireless network that uses a laser beam to carry data between devices.
See local area transport (LAT).
The coordination of various protocols in a specific architecture that allows the protocols to work together to ensure that the data is prepared, transferred, received, and acted on as intended.
Its primary purpose is to create an encrypted tunnel through an untrusted network. L2TP is similar to Point-to-Point Tunneling Protocol (PPTP) in that it provides tunneling but not encryption. L2TP provides a secure tunnel by cooperating with other encryption technologies such as IPSec. L2TP functions with IPSec to provide a secure virtual private network solution.
A connectivity tool that runs on client systems and is used to print files to a computer running an LPD server.
A service on the print server that receives documents (print jobs) from line printer remote (LPR) tools running on client systems.
The communication system that connects two local area networks (LANs). Equipment that provides the link, including bridges, routers, and gateways.
Computers connected in a geographically confined network, such as in the same building, campus, or office park.
A nonroutable protocol from Digital Equipment Corporation.
A computer that can be accessed directly without using a communications line or a communications device, such as a network adapter or a modem.
One type of group account used by Windows XP. Implemented in each local computer's account database, local groups contain user accounts and other global groups that need to have access, rights, and permissions assigned to a resource on a local computer. Local groups cannot contain other local groups.
The user at the computer.
A volume created within an extended partition on a basic disk. You can format and assign a drive letter to a logical drive. Only basic disks can contain logical drives. A logical drive cannot span multiple disks.
One of two sublayers created by the IEEE 802 project out of the data-link layer of the OSI reference model. The LLC is the upper sublayer that manages data-link communication and defines the use of logical interface points, called service access points (SAPs), used by computers to transfer information from the LLC sublayer to the upper OSI layers. See also media access control (MAC) sublayer, service access point (SAP)
Files that can be assigned to user accounts. Typically a batch file, a logon script runs automatically every time the user logs on. It can be used to configure a user's working environment at every logon, and it allows an administrator to influence a user's environment without managing all aspects of it. A logon script can be assigned to one or more user accounts.
A virus written in the internal macro language of applications. In many cases macro viruses cause no damage to data, but in some cases malicious macros have been written that can damage your work. See also companion virus, file infector, polymorphic virus, stealth virus.
The first sector on a hard disk, this data structure starts the process of booting the computer. The MBR contains the partition table for the disk and a small amount of executable code called the master boot code.
See megabit (Mb).
See megabyte (MB).
See millions of bits per second (Mbps).
The vast majority of local area networks (LANs) today are connected by some sort of wire or cabling that acts as the LAN transmission medium, carrying data between computers. The cabling is often referred to as the media.
The device driver located at the media access control sublayer of the OSI reference model. This driver is also known as the NIC driver. It provides low-level access to network interface cards (NICs) by providing data-transmission support and some basic NIC management functions. These drivers also pass data from the physical layer to transport protocols at the network and transport layers.
One of two sublayers created by the IEEE 802 project out of the data-link layer of the OSI reference model. The MAC sublayer communicates directly with the network interface card and is responsible for delivering error-free data between two computers on the network. See also logical link control (LLC) sublayer.
Usually, 1,048,576 bits; sometimes interpreted as 1 million bits. See also bit.
1,048,576 bytes (2 raised to the 20th power); sometimes interpreted as 1 million bytes. See also byte.
The design of the bus in IBM PS/2 computers (except Models 25 and 30). The Micro Channel is electrically and physically incompatible with the IBM PC/AT bus. Unlike the PC/AT bus, the Micro Channel functions as either a 16-bit or 32-bit bus. The Micro Channel also can be driven independently by multiple bus master processors. See also Extended Industry Standard Architecture (EISA), Industry Standard Architecture (ISA).
The standard for asynchronous data-error control developed by Microcom Systems. The method works so well that other companies have adopted not only the initial version of the protocol, but later versions as well. Currently, several modem vendors incorporate MNP Classes 2, 3, 4, and 5.
Provides informational support for all aspects of networking, with an emphasis on Microsoft products.
The unit of measure of supported transmission rates on the following physical media: coaxial cable, twisted-pair cable, and fiber-optic cable. See also bit.
See Microcom Network Protocol (MNP).
Incorporates wireless adapters using cellular telephone technology to connect portable computers with the cabled network.
A communications device that enables a computer to transmit information over a standard telephone line. Because a computer is digital, it works with discrete electrical signals representing binary 1 and binary 0. A telephone is analog and carries a signal that can have many variations. Modems are needed to convert digital signals to analog and back. When transmitting, modems impose (modulate) a computer's digital signals onto a continuous carrier frequency on the telephone line. When receiving, modems sift out (demodulate) the information from the carrier and transfer it in digital form to the computer.
A mode of operation offered by an operating system in which a computer works on more than one task at a time. There are two primary types of multitasking: preemptive and nonpreemptive. In preemptive multitasking, the operating system can take control of the processor without the task's cooperation. In nonpreemptive multitasking, the processor is never taken from a task. The task itself decides when to give up the processor. A true multitasking operating system can run as many tasks as it has processors. When there are more tasks than processors, the computer must "time slice" so that the available processors devote a certain amount of time to one task and then move on to the next task, alternating between tasks until all are completed.
An Apple protocol responsible for keeping track of entities on the network and matching names with Internet addresses. It works at the transport layer of the OSI reference model.
Any bounded area in which a name can be resolved. Name resolution is the process of translating a name into some object or information that the name represents. The Active Directory namespace is based on the Domain Name System (DNS) naming scheme, which allows for interoperability with Internet technologies.
See Name Binding Protocol (NBP).
A diagnostic command that displays protocol statistics and current Transmission Control Protocol/Internet Protocol (TCP/IP) connections using NBT (NetBIOS over TCP/IP). This command is available only if the TCP/IP protocol has been installed. See also netstat.
See Network Device Interface Specification (NDIS).
A protocol supplied with all Microsoft network products. NetBEUI advantages include small stack size (important for MS-DOS-based computers), speed of data transfer on the network medium, and compatibility with all Microsoft-based networks. The major drawback of NetBEUI is that it is a local area network (LAN) transport protocol and therefore does not support routing. It is also limited to Microsoft-based networks.
An application programming interface (API) that can be used by application programs on a local area network (LAN) consisting of IBM-compatible microcomputers running MS-DOS, OS/2, or some version of UNIX. Primarily of interest to programmers, NetBIOS provides application programs with a uniform set of commands for requesting the lower level network services required to conduct sessions between nodes on a network and transmit information between them.
A diagnostic command that displays protocol statistics and current Transmission Control Protocol/Internet Protocol (TCP/IP) network connections. This command is available only if the TCP/IP protocol has been installed. See also nbtstat.
Defines the connection control and service-request encoding that make it possible for clients and servers to interact. This is the protocol that provides transport and session services. NetWare security is also provided within this protocol.
In the context of computers, a system in which a number of independent computers are linked together to share data and peripherals, such as hard disks and printers.
See network interface card (NIC).
A standard that defines an interface for communication between the media access control (MAC) sublayer and protocol drivers. NDIS allows for a flexible environment of data exchange. It defines the software interface, called the NDIS interface, which is used by protocol drivers to communicate with the network interface card. The advantage of NDIS is that it offers protocol multiplexing so that multiple protocol stacks can be used
at the same time. See also Open Data-Link Interface (ODI).
An expansion card installed in each computer and server on the network. The NIC acts as the physical interface or connection between the computer and the network cable.
The third layer in the OSI reference model. This layer is responsible for addressing messages and translating logical addresses and names into physical addresses. This layer also determines the route from the source to the destination computer. It determines which path the data should take based on network conditions, priority of service, and other factors. It also manages traffic problems such as switching, routing, and controlling the congestion of data packets on the network. See also Open Systems Interconnection (OSI) reference model.
Monitors that track all or a selected part of network traffic. They examine frame-level packets and gather information about packet types, errors, and packet traffic to and from each computer.
See network interface card (NIC).
On a local area network (LAN), a device that is connected to the network and is capable of communicating with other network devices. For example, clients, servers, and repeaters are called nodes.
A form of multitasking in which the processor is never taken from a task. The task itself decides when to give up the processor. Programs written for nonpreemptive multitasking systems must include provisions for yielding control of the processor. No other program can run until the nonpreemptive program gives up control of the processor. See also multitasking, preemptive multitasking.
One of the leading network architectures.
A distinct, named set of attributes that represent a network resource. Object attributes are characteristics of objects in the Active Directory directory. For example, the attributes of a user account might include the user's first and last names, department, and e-mail address.
See Open Data-Link Interface (ODI).
The unit of measure for electrical resistance. A resistance of 1 ohm will pass 1 ampere of current when a voltage of 1 volt is applied. A 100-watt incandescent bulb has a resistance of approximately 130 ohms.
A specification defined by Novell and Apple to simplify driver development and to provide support for multiple protocols on a single network interface card. Similar to Network Device Interface Specification (NDIS) in many respects, ODI allows Novell NetWare drivers to be written without concern for the protocol that will be used on top of them.
A routing protocol for IP networks, such as the Internet, that allows a router to calculate the shortest path to each node for sending messages.
A seven-layer architecture that standardizes levels of service and types of interaction for computers exchanging information through a network. It is used to describe the flow of data between the physical connection to the network and the end-user application. This model is the best known and most widely used model for describing networking environments.
A container used to organize objects within a domain into logical administrative groups. An OU can contain objects such as user accounts, groups, computers, printers, applications, file shares, and other OUs.
See Open Systems Interconnection (OSI) reference model.
See Open Shortest Path First (OSPF).
A unit of information transmitted as a whole from one device to another on a network. In packet-switching networks, a packet is defined more specifically as a transmission unit of fixed maximum size that consists of binary digits representing data; a header containing an identification number, source, and destination addresses; and sometimes error-control data. See also frame.
A device that breaks large chunks of data into packets, usually for transmission over an X.25 network, and reassembles them at the other end. See also packet switching.
A simple tool that tests if a network connection is complete, from the server to the workstation, by sending a message to the remote computer. If the remote computer receives the message, it responds with a reply message. The reply consists of the remote workstation's Internet Protocol (IP) address, the number of bytes in the message, how long it took to reply-given in milliseconds (ms)-and the length of time-to-live (TTL) in seconds. Ping works at the IP level and will often respond even when higher level TCP-based services cannot.
A message delivery technique in which small units of information (packets) are relayed through stations in a computer network along the best route available between the source and the destination. Data is broken into smaller units and then repacked in a process called packet assembly/disassembly (PAD). Although each packet can travel along a different path, and the packets composing a message can arrive at different times or out of sequence, the receiving computer reassembles the original message. Packet-switching networks are considered fast and efficient. Standards for packet switching on networks are documented in the CCITT recommendation X.25.
See packet assembler/disassembler (PAD).
A language that communicates to a printer how printed output should appear. The printer uses the PDL to construct text and graphics to create the page image. PDLs are like blueprints in that they set parameters and features such as type sizes and fonts, but leave the drawing to the printer.
An error that occurs when the requested code or data cannot be located in the physical memory that is available to the requesting process.
The process of moving virtual memory back and forth between physical memory (RAM) and the disk. Paging occurs when physical memory becomes full.
A special file on one or more of the hard disks of a computer running Windows XP Professional. Windows XP Professional uses virtual memory to store some of the program code and other information in RAM and to temporarily store some of the program code and other information on the computer's hard disks. This increases the amount of available memory on the computer.
An error-checking procedure in which the number of 1s must always be the same-either odd or even-for each group of bits transmitted without error. Parity is used for checking data transferred within a computer or between computers.
A logical division of a hard disk that functions as if it were a physically separate unit. Each partition can be formatted for a different file system.
Access to a shared resource that is granted when a user enters the appropriate password.
A switching telephone network that allows callers within an organization to place intraorganizational calls without going through the public telephone system.
See personal digital assistant (PDA).
See page-description language (PDL).
See public data network (PDN).
A network in which there are no dedicated servers or hierarchy among the computers. All computers are equal and therefore known as peers. Generally, each computer functions as both client and server.
A term used for devices such as disk drives, printers, modems, mouse devices, and joysticks that are connected to a computer and controlled by its microprocessor.
32-bit local bus used in most Pentium computers and in the Apple Power Macintosh. Meets most of the requirements for providing Plug and Play functionality.
A permanent logical connection between two nodes on a packet-switching network; similar to leased lines that are permanent and virtual, except that with PVC the customer pays only for the time the line is used. This type of connection service is gaining importance because both frame relay and ATM use it. See also packet switching, virtual circuit.
See access permissions.
A type of hand-held computer that provides functions including personal organization features-like a calendar, note taking device, database manipulation, calculator, and communications functions. For communication, a PDA uses cellular or wireless technology that is often built into the system but that can be supplemented or enhanced by means of a PC card.
A type of rewritable optical technology in which the optical devices come from one manufacturer (Matsushita/Panasonic) and the media come from two (Panasonic and Plasmon).
The first (bottom) layer of the OSI reference model. This layer addresses the transmission of the unstructured raw bitstream over a physical medium (the networking cable). The physical layer relates the electrical/optical, mechanical, and functional interfaces to the cable and also carries the signals that transmit data generated by all of the higher OSI layers. See also Open Systems Interconnection (OSI) reference model.
See Packet Internet Groper (ping).
A set of specifications developed by Intel that allows a computer to automatically detect and configure a device and install the appropriate device drivers.
The local access point for a network provider. Each POP provides a telephone number that allows users to make a local call for access to online services.
Dedicated circuits that are also known as private, or leased, lines. They are the most popular wide area network (WAN) communication circuits in use today. The carrier guarantees full-duplex bandwidth by setting up a permanent link from each end point, using bridges and routers to connect local area networks (LANs) through the circuits. See also Point-to-Point Protocol (PPP), Point-to-Point Tunneling Protocol (PPTP), duplex transmission.
A data-link protocol for transmitting Transmission Control Protocol/Internet Protocol (TCP/IP) packets over dial-up telephone connections, such as between a computer and the Internet. PPP was developed by the Internet Engineering Task Force in 1991.
An extension of the Point-to-Point Protocol (PPP) used for communications on the Internet. It was developed by Microsoft to support virtual private networks (VPNs), which allow individuals and organizations to use the Internet as a secure means of communication. PPTP supports encapsulation of encrypted packets in secure wrappers that can be transmitted over a Transmission Control Protocol/Internet Protocol (TCP/IP) connection. See also virtual private network (VPN).
A virus that produces varied but operational copies of itself. Polymorphic viruses change their structure to prevent virus scanners from detecting all instances of the virus. See also companion virus, file infector, macro virus, stealth virus.
A form of multitasking (the ability of a computer's operating system to work on more than one task at a time). With preemptive multitasking-as opposed to nonpreemptive multitasking-the operating system can take control of the processor without the task's cooperation. See also nonpreemptive multitasking.
The sixth layer of the OSI reference model. This layer determines the form used to exchange data between networked computers. At the sending computer, this layer translates data from a format sent down from the application layer into a commonly recognized, intermediary format. At the receiving end, this layer translates the intermediary format into a format useful to that computer's application layer. The presentation layer manages network security issues by providing services such as data encryption, provides rules for data transfer, and performs data compression to reduce the number of bits that need to be transmitted. See also Open Systems Interconnection (OSI) reference model.
One or more files containing information that Windows XP Professional requires to convert print commands into a specific printer language, such as PostScript. A printer driver is specific to each print device model.
The software interface through which a computer communicates with a print device by means of a locally attached interface. These supported interfaces include LPT, COM, USB, and network-attached devices such as the HP JetDirect and Intel NetPort.
A buffer in which a print job is held until the printer is ready to print it.
The computer on which the printers reside. The print server receives and processes documents from client computers. You set up and share network printers on print servers.
The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to digitally sign data and to decrypt data that has been encrypted with the corresponding public key.
The system of rules and procedures that govern communication between two or more devices. Many varieties of protocols exist, and not all are compatible, but as long as two devices are using the same protocol, they can exchange data. Networking software usually implements multiple levels of protocols layered one on top of another. Windows XP Professional includes TCP/IP and IPX/SPX-compatible protocols.
The driver responsible for offering four or five basic services to other layers in the network, while "hiding" the details of how the services are actually implemented. Services performed include session management, datagram service, data segmentation and sequencing, acknowledgment, and possibly routing across a wide area network (WAN).
A layered set of protocols that work together to provide a set of network functions.
A firewall component that manages Internet traffic to and from a local area network (LAN). The proxy server decides whether it is safe to let a particular message or file pass through to the organization's network, provides access control to the network, and filters and discards requests as specified by the owner, including requests for unauthorized access to proprietary data. See also firewall.
A commercial packet-switching or circuit-switching wide area network (WAN) service provided by local and long-distance telephone carriers.
The nonsecret half of a cryptographic key pair that is used with a public algorithm. Public keys are typically used to verify digital signatures or decrypt data that has been encrypted with the corresponding private key.
See permanent virtual circuit (PVC).
See quality of service (QoS).
A set of quality assurance standards and mechanisms for data transmission.
See Remote Authentication Dial-In User Service (RADIUS).
See redundant array of independent disks (RAID).
Semiconductor-based memory that can be read and written to by the microprocessor or other hardware devices. The storage locations can be accessed in any order. Note that the various types of read-only memory (ROM) are also capable of random access. However, RAM is generally understood to refer to volatile memory, which can be written as well as read. See also read-only memory (ROM).
Semiconductor-based memory that contains instructions or data that can be read but not modified. See also random access memory (RAM).
Networking software that accepts input/output (I/O) requests for remote files, named pipes, or mail slots and sends (redirects) the requests to a network service on another computer.
A type of microprocessor design that focuses on rapid and efficient processing of a relatively small set of instructions. RISC architecture limits the number of instructions that are built into the microprocessor, but optimizes each so it can be carried out very rapidly, usually within a single clock cycle.
A fault-tolerant system that protects data by duplicating it in different physical sources. Data redundancy allows access to data even if part of the data system fails. See also fault tolerance.
A standardization of fault-tolerant options in five levels. The levels offer various combinations of performance, reliability, and cost. Formerly known as redundant array of inexpensive disks.
See redundant array of independent disks (RAID).
In Windows XP Professional, Windows 2000, Windows NT, Windows 98, and Windows 95, a database of information about a computer's configuration. The registry is organized in a hierarchical structure and consists of subtrees and their keys, hives, and entries.
A security authentication protocol widely used by Internet service providers (ISPs). RADIUS provides authentication and accounting services for distributed dial-up networking.
A special chip in the network interface card that contains the hardwired code that starts the computer and connects the user to the network, used in computers for which there are no hard disk or floppy drives. See also diskless computers.
The process of connecting to a server running Remote Installation Services (RIS), called the RIS server, and then starting an automated installation of Windows XP Professional on a local computer.
A user who dials in to the server over modems and telephone lines from a remote location.
Software that resides in a computer and forwards requests for network services from the computer's application programs to the appropriate server. See also redirector.
A document that defines a standard. RFCs are published by the Internet Engineering Task Force (IETF) and other working groups.
The process of making an object visible and accessible to users in a Windows 2000 domain.
Any part of a computer system. Users on a network can share computer resources, such as hard disks, printers, modems, CD-ROM drives, and even the processor.
See Request for Comment (RFC).
Authorization with which a user is entitled to perform certain actions on a computer network. Rights apply to the system as a whole, whereas permissions apply to specific objects. For example, a user might have the right to back up an entire computer system, including the files that the user does not have permission to access. See also access permissions.
See remote installation.
See Reduced Instruction Set Computing (RISC).
See read-only memory (ROM).
The protocols that support multipath LAN-to-LAN communications. See also protocol.
A device used to connect networks of different types, such as those using different architectures and protocols. Routers work at the network layer of the OSI reference model. This means they can switch and route packets across multiple networks, which they do by exchanging protocol-specific information between separate networks. Routers determine the best path for sending data and filter broadcast traffic to the local segment.
A protocol that uses distance-vector algorithms to determine routes. With RIP, routers transfer information among other routers to update their internal routing tables and use that information to determine the best routes based on hop counts between routers. TCP/IP and IPX support RIP.
An industry standard for serial communication connections. Adopted by the Electrical Industries Association (EIA), this recommended standard defines the specific lines and signal characteristics used by serial communications controllers to standardize the transmission of serial data between devices.
A method of starting Windows XP Professional using basic files and drivers only, without networking. Safe mode is available by pressing the F8 key when prompted during startup. This allows the computer to start when a problem prevents it from starting normally.
See service access point (SAP).
See Service Advertising Protocol (SAP).
Contains a formal definition of the contents and structure of Active Directory, including all attributes, classes, and class properties. For each object class, the schema defines what attributes an instance of the class must have, what additional attributes it can have, and what object class can be a parent of the current object class.
See Small Computer System Interface (SCSI).
See Synchronous Data Link Control (SDLC).
A portion of the data-storage area on a disk. A disk is divided into sides (top and bottom), tracks (rings on each surface), and sectors (sections of each ring). Sectors are the smallest physical storage units on a disk and are of fixed size-typically capable of holding 512 bytes of information each.
A fault-tolerant system also called hot fixing. It automatically adds sector-recovery capabilities to the file system during operation. If bad sectors are found during disk I/O, the fault-tolerant driver will attempt to move the data to a good sector and map out the bad sector. If the mapping is successful, the file system is not alerted. It is possible for SCSI devices to perform sector sparing, but AT devices (ESDI and IDE) cannot.
Making computers and data stored on them safe from harm or unauthorized access.
A data structure of variable length that uniquely identifies user, group, service, and computer accounts within an enterprise. Every account is issued a SID when the account is first created. Access control mechanisms in Windows XP Professional and Windows 2000 identify security principals by SID rather than by name.
Records security events, such as valid and invalid logon attempts and events relating to creating, opening, or deleting files or other objects.
The length of cable on a network between two terminators. A segment can also refer to messages that have been broken up into smaller units by the protocol driver.
Part of Novell's IPX/SPX protocol suite for sequenced data. See also Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX).
One-way data transfer. The data travels on a network cable with one bit following another.
A computer that provides shared resources to network users. See also client.
A network in which resource security and most other network functions are provided by dedicated servers. Server-based networks have become the standard model for networks serving more than 10 users. See also peer-to-peer network.
The protocol developed by Microsoft, Intel, and IBM that defines a series of commands used to pass information between network computers. The redirector packages SMB requests into a network control block (NCB) structure that can be sent over the network to a remote device. The network provider listens for SMB messages destined for it and removes the data portion of the SMB request so that it can be processed by a local device.
The interface between each of the seven layers in the OSI protocol stack that has connection points, similar to addresses, used for communication between layers. Any protocol layer can have multiple SAPs active at one time.
Allows service-providing nodes (including file, printer, gateway, and application servers) to advertise their services and addresses.
A software upgrade to an existing software distribution that contains updated files consisting of patches and fixes.
A connection or link between stations on a network.
The fifth layer of the OSI reference model. This layer allows two applications on different computers to establish, use, and end a connection called a session. This layer performs name recognition and functions, such as security, needed to allow two applications to communicate over the network. The session layer provides synchronization between user tasks. This layer also implements dialog control between communicating processes, regulating which side transmits, when, for how long, and so on. See also Open Systems Interconnection (OSI) reference model.
Establishing, maintaining, and terminating connections between stations on the network.
Means by which files of folders are publicly posted on a network for access by anyone on the network.
A piece of software, usually a separate program, that provides direct communication between the user and the operating system. This usually, but not always, takes the form of a command-line interface. Examples of shells are Macintosh Finder and the MS-DOS command interface program COMMAND.COM.
A TCP/IP protocol for transferring e-mail. See also application protocols, Transmission Control Protocol/Internet Protocol (TCP/IP).
A network management protocol installed with TCP/IP and widely used on TCP/IP and IPX networks. SNMP transports management information and commands between a management program run by an administrator and the network management agent running on a host. The SNMP agent sends status information to one or more hosts when the host requests it or when a significant event occurs.
Facilitates the process of moving a print job from the network into a printer.
A combination of one or more Internet Protocol (IP) subnets, typically connected by a high-speed link.
A standard, high-speed parallel interface defined by the ANSI. A SCSI interface is used for connecting microcomputers to peripheral devices, such as hard disks and printers, and to other computers and LANs. Pronounced "scuzzy."
A credit card-sized device that is used with a PIN number to enable certificate-based authentication and single sign-on to the enterprise. Smart cards securely store certificates, public and private keys, passwords, and other types of personal information. A smart card reader attached to the computer reads the smart card.
See server message block (SMB).
See symmetric multiprocessing (SMP).
See Simple Mail Transfer Protocol (SMTP).
See Simple Network Management Protocol (SNMP).
Computer programs or sets of instructions that allow the hardware to work. Software can be grouped into four categories: system software, such as operating systems, that control the workings of the computer; application software, such as word processing programs, spreadsheets, and databases, which perform the tasks for which people use computers; network software, which enables groups of computers to communicate; and language software, which provides programmers with the tools they need to write programs.
See Synchronous Optical Network (SONET).
An algorithm (mathematical procedure) implemented to eliminate redundant routes and avoid situations in which multiple local area networks (LANs) are joined by more than one path by the IEEE 802.1 Network Management Committee. Under STA, bridges exchange certain control information in an attempt to find redundant routes. The bridges determine which would be the most efficient route, and then use that one and disable the others. Any of the disabled routes can be reactivated if the primary route becomes unavailable.
See Structured Query Language.
See spanning tree algorithm (STA).
A computer that is not connected to any other computers and is not part of a network.
A work environment in which each user has a personal computer but works independently, unable to share files and other important information that would be readily available through server access in a networking environment.
A variant of file-infector virus. This virus is so named because it attempts to hide from detection. When an antivirus program attempts to find it, the stealth virus tries to intercept the probe and return false information indicating that it does not exist.
A form of fault tolerance that combines multiple areas of unformatted free space into one large logical drive, distributing data storage across all drives simultaneously. In Windows 2000, a stripe set requires at least two physical drives and can use up to 32 physical drives. Stripe sets can combine areas on different types of drives, such as Small Computer System Interface (SCSI), Enhanced Small Device Interface (ESDI), and Integrated Device Electronics (IDE) drives.
A widely accepted standard database sublanguage used in querying, updating, and managing relational databases.
A subdivision of an Internet Protocol (IP) network. Each subnet has its own unique subnetted network ID.
A 32-bit value expressed as four decimal numbers from 0 to 255, separated by periods (for example, 255.255.255.0). This number allows TCP/IP to determine the network ID portion of an IP address.
A high-speed, switched-packet service that can provide speeds of up to 34 Mbps.
A logical connection between end computers that uses a specific route across the network. Network resources are dedicated to the circuit, and the route is maintained until the connection is terminated. These are also known as point-to-multipoint connections. See also virtual circuit.
SMP systems, such as Windows 2000, use any available processor on an as-needed basis. With this approach, the system load and application needs can be distributed evenly across all available processors.
In Windows XP Professional, the tool used to ensure that a file or folder on a client computer contains the same data as a matching file or folder on a server.
The data link (data transmission) protocol most widely used in networks conforming to IBM's Systems Network Architecture (SNA). SDLC is a communications guideline that defines the format in which information is transmitted. As its name implies, SDLC applies to synchronous transmissions. SDLC is also a bit-oriented protocol and organizes information in structured units called frames.
A fiber-optic technology that can transmit data at more than one gigabit per second. Networks based on this technology are capable of delivering voice, data, and video. SONET is a standard for optical transport formulated by the Exchange Carriers Standards Association (ECSA) for the ANSI.
The path and folder name where the Windows XP Professional system files are located. Typically, this is C:\Windows, although a different drive or folder can be designated when Windows XP Professional is installed. The value of %systemroot% can be used to replace the actual location of the folder that contains the Windows XP Professional system files. To identify your systemroot folder, click Start, click Run, type %systemroot% and click OK.
See total cost of ownership (TCO).
See Transmission Control Protocol (TCP).
See Transmission Control Protocol/Internet Protocol (TCP/IP).
See transport driver interface (TDI).
See Microsoft Technical Information Network (TechNet).
The command and program used to log on from one Internet site to another. The Telnet command and program brings the user to the logon prompt of another host.
A type of object within a process that runs program instructions. Using multiple threads allows concurrent operations within a process and enables one process to run different parts of its program on different processors simultaneously.
A measure of the data transfer rate through a component, connection, or system. In networking, throughput is a good indicator of the system's total performance because it defines how well the components work together to transfer data from one computer to another. In this case, the throughput would indicate how many bytes or packets the network could process per second.
The arrangement or layout of computers, cables, and other components on a network. Topology is the standard term that most network professionals use when referring to the network's
The total amount of money and time associated with purchasing computer hardware and software, and deploying, configuring, and maintaining the hardware and software. It includes hardware and software updates, training, maintenance and administration, and technical support. One other major factor is lost productivity caused by user errors, hardware problems, software upgrades, and retraining.
A Trace Route command-line tool that shows every router interface through which a TCP/IP packet passes on its way to a destination.
One of the three sections of a packet component. The exact content of the trailer varies depending on the protocol, but it usually includes an error-checking component (CRC).
The TCP/IP protocol for sequenced data. See also Transmission Control Protocol/Internet Protocol (TCP/IP).
An industry standard suite of protocols providing communications in a heterogeneous environment. In addition, TCP/IP provides a routable, enterprise networking protocol and access to the Internet and its resources. It is a transport layer protocol that actually consists of several other protocols in a stack that operates at the session layer. Most networks support TCP/IP as a protocol.
An interface that works between the file-system driver and the transport protocols, allowing any protocol written to TDI to communicate with the file-system drivers.
The fourth layer of the OSI reference model. It ensures that messages are delivered error free, in sequence, and without losses or duplications. This layer repackages messages for efficient transmission over the network. At the receiving end, the transport layer unpacks the messages, reassembles the original messages, and sends an acknowledgment of receipt. See also Open Systems Interconnection (OSI) reference model.
Protocols that provide for communication sessions between computers and ensure that data is able to move reliably between computers.
A grouping of hierarchical arrangements of one or more Windows 2000 domains that share a contiguous namespace.
A type of virus that appears to be a legitimate program that might be found on any system. A Trojan horse virus can destroy files and cause physical damage to disks.
Trust relationships are links between domains that enable pass-through authentication, in which a user has only one user account in one domain but can access the entire network. User accounts and global groups defined in a trusted domain can be given rights and resource permissions in a trusting domain even though those accounts do not exist in the trusting domain's database. A trusting domain honors the logon authentication of a trusted domain.
See User Datagram Protocol (UDP).
Provides the hypertext links between documents on the World Wide Web (WWW). Every resource on the Internet has its own URL that specifies the server to access as well as the access method and the location. URLs can use various protocols including File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP).
A device connected between a computer or another piece of electronic equipment and a power source, such as an electrical outlet. The UPS ensures that the electrical flow to the computer is not interrupted because of a blackout and, in most cases, protects the computer against potentially damaging events such as power surges and brownouts. All UPS units are equipped with a battery and loss-of-power sensor. If the sensor detects a loss of power, it immediately switches to the battery so that users have time to save their work and shut off the computer. Most higher end models have features such as power filtering, sophisticated surge protection, and a serial port so that an operating system capable of communicating with a UPS (such as Windows XP Professional) can work with the UPS to facilitate automatic system shutdown.
A convention for naming files and other resources beginning with two backslashes (\\), indicating that the resource exists on a network computer. UNC names conform to the \\Servername\Sharename syntax.
A serial bus with a data transfer rate of 12 megabits per second (Mbps) for connecting peripherals to a microcomputer. USB can connect up to 127 peripheral devices to the system through a single, general-purpose port. This is accomplished by daisy chaining peripherals together. USB is designed to support the ability to automatically add and configure new devices as well as the ability to add such devices without having to shut down and restart the system.
See uninterruptible power supply (UPS).
See Uniform Resource Locator (URL).
See universal serial bus (USB).
Consists of all of the information that defines a user on a network. This includes the user name and password required for the user to log on, the groups in which the user account has membership, and the rights and permissions the user has for using the system and accessing its resources.
A connectionless protocol, responsible for end-to-end data transmission.
Groups of users who meet online or in person to discuss installation, administration, and other network challenges for the purpose of sharing and drawing on each other's expertise in developing ideas and solutions.
A logical connection between two nodes on a packet-switching network; similar to leased lines that are permanent and virtual, except that with a virtual circuit, the customer pays only for the time the line is used. This type of connection service is gaining importance because both frame relay and ATM use it. See also packet switching, permanent virtual circuit (PVC).
The space on one or more of a computer's hard drives used by Windows XP Professional as if it were random access memory (RAM). This space on the hard drives is known as a paging file. The benefit of virtual memory is being able to run more applications at one time than you would be able to using just the RAM (physical memory)on the computer.
A set of computers on a public network such as the Internet that communicate among themselves using encryption technology. In this way their messages are safe from being intercepted and understood by unauthorized users. VPNs operate as if the computers were connected by private lines.
Computer programming, or code, that hides in computer programs or on the boot sector of storage devices such as hard disk drives and floppy disk drives. The primary purpose of a virus is to reproduce itself as often as possible; a secondary purpose is to disrupt the operation of the computer or the program.
A collection of hard-disk partitions that are treated as a single partition, thus increasing the disk space available in a single drive letter. Volume sets are created by combining between 2 and 32 areas of unformatted free space on one or more physical drives. These spaces form one large logical volume set that is treated like a single partition.
See virtual private network (VPN).
A computer network that uses long-range telecommunication links to connect networked computers across long distances.
A collection of computers grouped for sharing resources such as data and peripherals over a local area network (LAN). Each workgroup is identified by a unique name. See also domain, peer-to-peer network.
The Internet multimedia service that contains a vast store-house of hypertext documents written in Hypertext Markup Language (HTML). See also Hypertext Transfer Protocol (HTTP).
See Write-Once Read-Many (WORM).
Any type of storage medium to which data can be written only once but can be read any number of times. Typically, this is an optical disc whose surface is permanently etched using a laser to record information.
A zone represents a discrete portion of the domain namespace. Zones provide a way to partition the domain namespace into discrete manageable sections.